vanets

21
1

Upload: siir-ayoub

Post on 20-Jul-2015

118 views

Category:

Technology


2 download

TRANSCRIPT

1

• What is a VANET?

• Vehicle to vehicle communication

• Vehicle to infrastructure communication

• Dedicated Short Range Communication

• Security challenges

• Attacks

• Security solution of VANET

• Applications of VANET

• conclusion

2

Forward radar

Computing platform

Event data recorder (EDR)

Positioning system

Rear radar

Communication facility

Display

(GPS)

Human-Machine Interface

A modern vehicle is a network of sensors/actuators on wheels !

Vehicular Communication System (VCS):-Two main type of communications Vehicle to Vehicle (V2V) Communication:-

Vehicle to Infrastructure (V2I) communication:-

Advantage and Usage of VCS:-

Information sharing

Co-operative driving

Other value added services like Navigation, internet access etc.

4

It allows safe and free flow traffic.

It uses GPS and DGPS equipped devices.

It uses various technology like:-

1. Wireless communications

2. Floating car data/floating cellular data

3. Sensing technologies

4. Inductive loop detection

5. Video vehicle detection

6. Bluetooth Detection5

6

Uses multi-hop/multi cast technique.

uses two type of broadcasting

1. naive broadcasting

2. intelligent broadcasting

7

High bandwidth link with vehicle and roadside equipment.

Roadside units broadcast messages.

8

• Uses multi hop unicast

9

Each vehicle is a node with unique ID.

proactive routing • It tries to maintain routes to all destinations.

Reactive routing • It initiates route discovery in demand of data traffic.

Position based Routing• Routing based on destination’s position.

10

• Broadcasting algorithms used.

• Data and control packet forwarding are loop free.

• Ad hoc routing algorithms are used.

Mobicasting• Consider time into account.

• Main goal is delivery of information to all nodes in a point

of time.

11

Challenges

• Authentication and data encryption

• Auditing sensor data

• Privacy (avoid tracking)

• Infrastructure boot-strapping

• Negative perception of smart vehicles

12

Key Features

• Context sensors (front-end radar, ultra-sound, etc)

• Event data recorder (i.e., “black box”)

• Tamper-proof device to handle encrypted

transmissions

• Location detection (GPS or distance bounding)

• Communication with road-side base stations

13

• Fake information

• message falsification

• Cheating (data manipulation, impersonation)

• Identity détection for vehicle tracking

• Denial of service

14

Security Mechanisms

• Electronic License Plate (post-mortem auditing)

• Asymmetric encryption using public key

infrastructure

• Large number of anonymous keys (no identity

information)

• Vehicles frequently change keys to avoid tracking

• Keys can be revoked (more later)

• Physical layer protection against denial of service

• Channel switching

• Implement more than one communication

technology

15

1. ARAN (Authenticated Routing for Ad hoc network)

Secure routing protocol for ad hoc network based on

authentication.

2. SEAD (Secure and Efficient Ad hoc Distance Vector)

Secure routing protocol which protects against

multiple uncoordinated attackers who creates

incorrect routing in any other node.

16

3. SMT (Secure Message Transmission)

Secure Message Transmission protocol which is light

and operates on end to end manner

4. NDM (Non-Disclosure Method)

Method to protect location information in mobile IP

5. ARIADNE

routing protocol which prevents the attacker from terming

the routes of uncompromised nodes and DoS attacks

17

18

19

• Consists of vehicle-to-vehicle, vehicle-to-infrastructure

communication.

• It improves the safety of vehicles.

• Supports Intelligent Transportation system.

20

21