Download - inter vehicle communication
![Page 1: inter vehicle communication](https://reader035.vdocuments.mx/reader035/viewer/2022081421/55d4d737bb61ebe5488b46ff/html5/thumbnails/1.jpg)
INTER VEHICLE COMMUNICATION
BY:- MEENA VIKAS SITARAM
![Page 2: inter vehicle communication](https://reader035.vdocuments.mx/reader035/viewer/2022081421/55d4d737bb61ebe5488b46ff/html5/thumbnails/2.jpg)
INTRODUCTION
Vehicular communication systems are a type of network in which vehicles and roadside units are the communicating nodes, providing each other with information, such as safety warnings and traffic information.
![Page 3: inter vehicle communication](https://reader035.vdocuments.mx/reader035/viewer/2022081421/55d4d737bb61ebe5488b46ff/html5/thumbnails/3.jpg)
F o r w a r d r a d a r
C o m p u t i n g p l a t f o r m
E v e n t d a t a r e c o r d e r ( E D R )
P o s i t i o n i n g s y s t e m
R e a r r a d a r
C o m m u n i c a t i o n f a c i l i t y
D i s p l a y
Over view of smart vehicle
![Page 4: inter vehicle communication](https://reader035.vdocuments.mx/reader035/viewer/2022081421/55d4d737bb61ebe5488b46ff/html5/thumbnails/4.jpg)
Communicating vehicles can use both infrared and radio waves
Radio waves include VHF, micro, and millimeter waves
Bluetooth operates at 2.4 GHz , and is reliable up to a speed of 80 km/h and range of 80meters.
It can take up to 3 seconds to establish the communication.
Radio Bands
![Page 5: inter vehicle communication](https://reader035.vdocuments.mx/reader035/viewer/2022081421/55d4d737bb61ebe5488b46ff/html5/thumbnails/5.jpg)
Vehicles Parameter
There are two types of parameters: Static and Dynamic
Static Parameters: The static parameter indicates the size of the vehicle and the
location of its GPS receiver within itself.
Dynamic Parameters: The dynamic parameters are vehicle’s position (Xn,Yn), speed
acceleration, direction and the status of the brakes, steering
wheel, gas paddle, turn signal etc.
![Page 6: inter vehicle communication](https://reader035.vdocuments.mx/reader035/viewer/2022081421/55d4d737bb61ebe5488b46ff/html5/thumbnails/6.jpg)
Classes of Information
![Page 7: inter vehicle communication](https://reader035.vdocuments.mx/reader035/viewer/2022081421/55d4d737bb61ebe5488b46ff/html5/thumbnails/7.jpg)
Flow chart of IVC
![Page 8: inter vehicle communication](https://reader035.vdocuments.mx/reader035/viewer/2022081421/55d4d737bb61ebe5488b46ff/html5/thumbnails/8.jpg)
Vehicle-to-Roadside Communication
Information is also available from roadside sources. Car to roadside communications use the 63 GHz band. This very high frequency provides a very high bandwidth link with roadside beacons.
The vehicle drivers and passengers are thus able to receive traffic information, browse the web while on the move, shop online, and even participate in video-conferences .
Another application that takes advantage of vehicle-to-roadside communication technologies is Electronic Toll Collection (ETC).
![Page 9: inter vehicle communication](https://reader035.vdocuments.mx/reader035/viewer/2022081421/55d4d737bb61ebe5488b46ff/html5/thumbnails/9.jpg)
Hazard Warning
![Page 10: inter vehicle communication](https://reader035.vdocuments.mx/reader035/viewer/2022081421/55d4d737bb61ebe5488b46ff/html5/thumbnails/10.jpg)
Information sharing between vehicles
![Page 11: inter vehicle communication](https://reader035.vdocuments.mx/reader035/viewer/2022081421/55d4d737bb61ebe5488b46ff/html5/thumbnails/11.jpg)
![Page 12: inter vehicle communication](https://reader035.vdocuments.mx/reader035/viewer/2022081421/55d4d737bb61ebe5488b46ff/html5/thumbnails/12.jpg)
Vulnerabilities in IVC
In Transit Traffic Tempering:- Nodes acting as a relay can disrupt
communication of other nodes
Impersonation:- An attacker masquerading an emergency vehicle to
mislead other vehicles
![Page 13: inter vehicle communication](https://reader035.vdocuments.mx/reader035/viewer/2022081421/55d4d737bb61ebe5488b46ff/html5/thumbnails/13.jpg)
Jamming:- The Jammer deliberately generates interfering
transmissions that prevents communication
![Page 14: inter vehicle communication](https://reader035.vdocuments.mx/reader035/viewer/2022081421/55d4d737bb61ebe5488b46ff/html5/thumbnails/14.jpg)
Forgery:- Fast contamination of large portions of the vehicular network coverage area with false information
![Page 15: inter vehicle communication](https://reader035.vdocuments.mx/reader035/viewer/2022081421/55d4d737bb61ebe5488b46ff/html5/thumbnails/15.jpg)
Attacks on IVCAttack 1: Bogus Traffic Information
Traffic jam
ahead
![Page 16: inter vehicle communication](https://reader035.vdocuments.mx/reader035/viewer/2022081421/55d4d737bb61ebe5488b46ff/html5/thumbnails/16.jpg)
Attack 3: Cheating with Identity, Position or Speed
I was not there!
![Page 17: inter vehicle communication](https://reader035.vdocuments.mx/reader035/viewer/2022081421/55d4d737bb61ebe5488b46ff/html5/thumbnails/17.jpg)
Attack 2:Disruption of Network Operation
SLOW DOWN
The way is clear
![Page 18: inter vehicle communication](https://reader035.vdocuments.mx/reader035/viewer/2022081421/55d4d737bb61ebe5488b46ff/html5/thumbnails/18.jpg)
Challenges in IVC
Liability Vs Privacy:- Accountability and liability of the vehicles is required and context specific information such as coordinates, time intervals should be possible to extract but such requirements raise privacy concerns
Real Time Communication:- Driver assistance applications are time sensitive therefore security protocols should impose low processing overhead
Vehicular Network Scale:- With roughly billion vehicles,
the design of a facility that provides cryptographic keys is big challenge
![Page 19: inter vehicle communication](https://reader035.vdocuments.mx/reader035/viewer/2022081421/55d4d737bb61ebe5488b46ff/html5/thumbnails/19.jpg)
Components of Security Architecture
Event Data Recorder:- The EDR will be responsible for recording the vehicles critical data such as position, time, speed etc. EDR will also record all the received safety messages
Tamper Proof Device:- The TPD will store all the cryptographic materials and perform cryptographic operations like signing and verifying safety messages
Vehicular Public Key Infrastructure:- In VPKI infrastructure Certificate Authorities will issue certified public/private key pairs to vehicles
Authentication:- Vehicles will sign each message with their private key and attach
corresponding certificate. Thus when another vehicle receives the message it verifies key used to sign the message and then it verifies the message.
Privacy:- To conceal vehicles identity , set of anonymous keys that changes frequently can be used. This keys are preloaded into vehicles Tamper Proof Device for long duration
![Page 20: inter vehicle communication](https://reader035.vdocuments.mx/reader035/viewer/2022081421/55d4d737bb61ebe5488b46ff/html5/thumbnails/20.jpg)
Application of IVC
Information and Warning Functions:-
Dissemination of road information to vehicles distant from the subjected site
Communication based longitudinal control:-
Exploiting the look through capacity to avoid accidents, platooning vehicles etc.
Co-operative Assistant Systems:-
Coordinating vehicles at critical points
Added Value Applications:-
Internet Access, Location based services, Multiplayer games
![Page 21: inter vehicle communication](https://reader035.vdocuments.mx/reader035/viewer/2022081421/55d4d737bb61ebe5488b46ff/html5/thumbnails/21.jpg)
Future developments
Use of radar, laser, ultrasonic sensors have certain limitations and will not offer communication between large number of vehicles, such as vehicles at a junction, etc. So, GPS and Wi-Fi are the two methods by which any type of communication can be achieved in all types of conditions. Automatically analyzing the traffic signs and signals is also possible by incorporation if cameras onto the vehicles or emission of warning signals directly from the traffic boards which can be read by the receivers in the vehicles
![Page 22: inter vehicle communication](https://reader035.vdocuments.mx/reader035/viewer/2022081421/55d4d737bb61ebe5488b46ff/html5/thumbnails/22.jpg)
Conclusion
Design of communication protocols in IVC is extremely challenging
Protocols have potential to support many new innovative applications
These technologies can greatly enhance the infotainment, safety, comfort, communication and convenience value of new vehicles.
As vehicles become “smarter”, security and privacy gain importance