You are on page 1of 7

Traffic Management through Inter-Communication between Cars using VANET System

Trupti Gajbhiye1, Akhilesh A. Waoo2, P.S Pathija3 M. Tech. (CSE)-BIST-Bhopal, 2M. Tech. (CSE)- BIST- Bhopal, 3M.Tech. (CSE), BIST, Bhopal 1 truptiee@gmail.com, 2akhilesh_waoo@rediffmail.com, 3pspatheja@gmail.com Abstract: Vehicular Ad-hoc Network (VANET) basically used to provide various services to its user. Misbehaviour of such system should be defended. VANET system provides the intercommunication between the vehicles by letting them exchange the traffic information. Such kind of exchanges may create privacy apprehension since the vehicle-generated information can contain much confidential data of the vehicle and its driver. Vehicular networks pose a number of unique challenges. The traffic information flowing in the network may affect the traffic decisions. TraffcView is a mechanism that can be routed with a vehicle as the future aspect. The vehicles which have Trafficview device installed will broadcast the traffic infromation using short range wireless communication. This paper reviews the TrafficView prototype and its approachs and shows the experiment result of traffic management considering speed and distance factor in mind. The importance of broadcasting traffic information in a vehicle-to-vehicle fashion is scalability and ease of utilization. Keywords: TrafficView,VANET Szecurity ,Experiment design of traffic management

1.

INTRODUCTION

Vehicular Ad-hoc Networks (VANETs), is a one particular kind of Mobile Ad-hoc Networks (MANETs) in which the communications are among the adjacent vehicles.VANETs are collection of a set of vehicles intercommunicating with each other using wireless network devices that are proficient to interconnect each other without any pre-existing structure. This is an add-on feature which if added can improve drivers traveling knowledge by providing suitable Internet access, map reading etc. Other applications could also be possible like messages regarding traffic jam avoidance, changing route or directions, road condition etc. The intelligent transport system can be proposed using inter-vehicle communication. With the help of the TrafficView we can generate a framework which gathers information of vehicles on the road. This stage should hold safe driving, dynamic route development, emergency message distribution, and traffic condition monitoring. A GPS receiver shows the static view whereas the TrafficView shows the driver with the dynamic view. This paper shows the review of how the TrafficView works and the various Security measures required for safety of the broadcast messages. A. VANET Security requirements

VANET security requirements includes the assurance of data authentication, data integrity, non-repudiation and confidentiality which will protect from the unauthorized message insertion, updation etc. An important aspect of VANET security is the digital signature [3]. Another cryptographic method to achieve data integrity is through message authentication code (MAC). The uniqueness of VANET include changes in the topology according to the requirement, data compression/aggregation, vehicle position identification, sensing and fixing malicious data, suitable routing protocols for reliability, effectiveness and scalability of the security system.The main objective of the VANET system is to communicate with the vehicles in the ad-hoc network but we have to look after its security so that no one can tamper the massage or do any kind of mischief with the data flowing in the network. B. problems and defense in anonymous VANETs
Transport Admin Office Network

Figure 1: VANET System

International Journal on Advanced Computer Engineering and Communication Technology Vol-1 Issue:1 :ISSN 2278 5140

19

Traffic Management through Inter-Communication between Cars using VANET System

Figure 1. Shows the main VANET system. Misbehavior proceeds from time to time as a result of either intentional malicious behaviors or hardware faultyness. Base stations can be used to provide authentication so that it can reject access and service requests from outsiders. In contrast, misbehavior of valid users of VANETs is more complicated and difficult to prevent, the cause being that insiders acquire the identifications issued by the authority to achieve authentication with peer vehicles or base stations that can be with no trouble tricked into trusting the insiders. Fortunately, certain techniques can be employed to detect such misbehavior and misbehaving users will be punished accordingly. For instance, misbehavior can be the spreading of false messages, anticipation of broadcast messages from reaching other vehicles, addition of irrelevant messages, escaping from an accident, improper use of network resource exceeding the allowed bandwidth etc. 2. PROBLEM DESCRIPTION

The objective of the paper is to show various mechanisms and techniques used to monitor the TrafficView, what are the prototype they have used & which algorithms are introduced. The Main Objective is to exchange the information among the vehicles which are inside the ad-hoc network, locating the position of the vehicles and most importantly generating the broadcast messages to deliver the driver and vehicle information. The Research in the field of inter-vehicle communication using wireless technology has taken big step in past few years. Several research centers are included in this field to investigate on the MANET (Mobile Ad-hoc Network) and VANET (Vehicular Ad-hoc Network) system such as GM Reasearch Center in CMU[15], BMW Research Lab[18], Rice University[19][17] and many more are still investigating on it. 3. TRAFFICVIEW USING VARIOUS APPROACHES USED

TrafficView needs to be installed in a vehicle which basically consists of three main mechanisms: a computer system with display unit, a short-range wireless network interface (802.11b), and a GPS receiver. Where the computer system is used to store the data temporarily in its buffer and the display unit will show the maps & routes, similarly the GPS receiver gives the information like position, rate, present time, and track of the vehicle. The short-range wireless interface helps in broadcasting the message to the vehicles in a route and propagating it further. Figure 2 presents the TrafficView software architecture. Here the local validated dataset is responsible for storing records of each vehicle. Then the navigation module generates the local GPS readings from time to time. Now the non-validated dataset stores the records which are received through the broadcast messages. It might contain the unwanted data through the broadcast messages. This data is passed through the validation procedure i.e. through validated dataset. The aggregation module is basically used to shrink the size of data on the network. For instance, if a vehicle has two records about two vehicles which are close to each other and are moving with relatively the same speed, an aggregation algorithm can replace those two records with one record representing both vehicles. Here in this technique the simulation aggregation algorithm for TrafficView [24] is designed and evaluated in [12]. 1. TrafficView Software Design
Current Data Data From Vehicle Navigation Module To Display Device Broadcast Data

Validation process

Aggregation Module

A. Technique used for Navigation System

Both unwanted and Legal data

Valid Data

International Journal on Advanced Computer Engineering and Communication Technology Vol-1 Issue:1 :ISSN 2278 5140

20

Traffic Management through Inter-Communication between Cars using VANET System

Figure 2: TrafficView software Design 2. Navigation Module In TrafficView, the navigation module basically works on the relative positions and directions of the vehicles. It also focuses on the distance between the vehicles. The main concept used for navigation module requires the closest mapped point on the road and its directions. The graph needs to be plotted which will provide the map of that area along with other information. The software module devloped by [12], that processes the output from a Garmin GPS device [21] using the Garmin Simple Text Output Protocol(GSTOP)[22]. The distance between the vehicles are computed using conversion tables from latitude and longitude degrees to meters. These conversion of latitude/longitude to meter is computed using interpolation.To create the road graph, Record Type1(RT1) and Record Type2 (RT2) files [23] presented by the US Census Bureau through the 2000 Tiger Line database [25] are used. In this concept every record which is inside the network is considered as the reference points. Where RT1 contains information of the road like its name, its type, its starting and ending points etc. and RT2 file contains information about the intermediary reference point if any. Next step is to identify the closest sample points on the map. To gather all refrence points on the map the mechanism is required which will help to cluster the map points. As mentioned in [12] the mechenism is designed based on what is called as simple Peano keys [23], which is used to crush a 2D coordinate system into a 1D coordinate system. A simple Peano key can be obtained just by Interleaving their digits. The simple peano keys can be generated interleaving the longitutde and latitude shown on the map. Now we need to create peano keys for every reference point present on the map and order it by ascending manner. The neighbour keys represent map points that are close to each other on the map. Classifying the closest road or the map

point does not make sure that road or map point is correct. If the vehicles collides with an intersection points, in such cases the approach used is to use a software module which tries to identify closest road on which the vehicle are moving in the same direction then the angle between the two sample points which may intersect is computed by this modul. If the angle between two map points is less than 15 degrees then the vehicle is considered to be on the same road with two refrence map points. This module may help in avoiding the intersection. The road that appears by large amountin frequent manner in the absolute m identified roads is considered to the road on which vehicle is currently present. B. TECHNIQUE USED FOR DATA AGGREGATION As in [12] two main mechanisms which could be used to accomplish these above mentioned goals i.e. flooding and diffusion. In flooding each individual vehicle broadcast its information whereas in the diffusion mechanism each vehicle broadcast information about itself and other vehicles in its range.This technique also follows the same system design but approach is dfferent.This approach mainly focus on the data aggregation module. 1. System components used In Figure 2 the System components are shown which are the main software modules used for VANET System as discussed above GPS Module: used to update the road map formats time to time which helps in navigation. Validated dataset and Non-validated dataset Modules: These are basically used to store the broadcast message in the Non-validated dataset and after removing unwanted data it is stored in the validated dataset module. Aggregation Module: These modules works with the help of the aggregation algorithms which takes input as the validated data set and

International Journal on Advanced Computer Engineering and Communication Technology Vol-1 Issue:1 :ISSN 2278 5140

21

Traffic Management through Inter-Communication between Cars using VANET System

produces the valid and efficient broadcast message. Send and Display Module: Send module sends the broadcast message on the wireless using wireless card. Whereas the Display module make the valid records available on the display.

2. Data Aggregation Mechanism In this paper we are reviewing the concepts used for Traffic View[12][24] where the aggregated record contains Identification field and other fields like Position, Speed and the broadcast message of the vehicle. The Identification field is aggregated as the single record i.e. if the records (Identity1,Position1,Speed1,BroadcastMsg1) ( Identityn,Positionn,Speedn,BroadcastMsgn) are the aggregated records then the estimated distance is calculated between the current car and the car with ID Identityi. Now the aggregated record can be stored as ({Identity1,.., Identityn}, Positionn, Speedn, BroadcastMsgn). All the fields can be calculated as follows: Position of the vehicle = Speed of the Vehicle = Broadcast Time = min x x

The algorithm first of all divides the road into number of regions say Ri. Then the aggregation ratio needs to be calculated say Ai. Where the aggregation ratio can be calculated as the inverse of the number of records that are aggregated into one single record. Now every region in the network is assigned a portion of the left over complimentary space of the broadcast message. Both the agrregation ratio and the portion values are given to it according to the importance of the region and accuracy of broadcast message.In this algorithm[12] steps involved are : Firstly the region boundaries are calculated say (|Bi,Bi-1|) by using the distance between the current and the farthest vehicle. Secondly the Merging threshold value needs to be calculated. Let it be THi for each region. This threshold value helps in making the decision about making the aggrtegation of records i.e. when the relative distance between the first and the last record is less than the merging threshold value then it is aggregated into single record. i.e. THi = Where, Li is the Number of records that may fit in the required Bytes and Ai is the aggregation ratio. To avoid over-aggregation of the records the optimun aggregation needs to be calculated for every region. If this aggregation ratio is greater than or equal to one, the algorithm may end as no aggregation is needed.

Where ,

As the result the records are always picked for the aggregation procedure according to the relative distances of the vehicles. Here the aggregation process is applied only to the records which are currently present in the validated dataset. 3. Algorithms Used The algorithms used in the process of data aggregation are as follows: a. Ratio Based Algorithm

Optimum

Aggregation

Ratio=

Where, R is the size of the message and L is the Number records in the input list. Lastly when all the aggregation is done on the records, it writes all the record to the broadcast message uptill all the free space is used. b. Cost Based Algorithm

International Journal on Advanced Computer Engineering and Communication Technology Vol-1 Issue:1 :ISSN 2278 5140

22

Traffic Management through Inter-Communication between Cars using VANET System

In Cost Based algorithm [12] the cost for every record which is to be aggregated is calculated.The two records which are having the minimum cost is considered for aggregation.The algorithm takes the fiest step by just selecting two records having minimum cost and aggregating them.This process of selecting two records and aggregating them continues till the number of records left is equivalent to value needed by the aggregation ratio. After this process is over the records are written in broadcast message in sorted manner util the specified portion value space is filled.The same process is repeated for every iteration i.e. of aggregating and writing. To avoid over aggregation the optimum aggregation ratio is calculated and compared with the current aggregation ratio. The conclusion from both the algorithm shows that ratio based algorithm blindly aggregates the records where as the cost based algorithm firstly calculate cost of the aggregation and then make it available for broadcast messages. The drawback of the algorithm should be when the number of records left may have the relative distance maximum so then they cannot be aggregated. Therefore when such condition is met the algorithm terminates by comparing the threshold value. If it crosses the range then no aggregation is required. 4. SYSTEM AND PROTOCOL ARCHITECTURE

of different technology components for radio, networking, middleware and applications. Radio. For VANETs, IEEE 802.11 [6] represents a costefficient and widely deployed solution that will be applied in OBUs and RSUs of future VANETs. More specifically, its variant IEEE 802.11p [4] is designated for safety applications. The basic data rate of IEEE 802.11p is 3 Mbps for a 10-MHz channel but higher data rates up to 27 Mbps are also possible. In WSNs, IEEE 802.15.4 realizes a low costs, energy-optimized radio technology for small, _250 kbps data rates. 5. TRAFFIC MANAGEMENT BY CONSIDERING SPEED AND DISTANCE FACTOR

Figure 3 below shows the output of the VANET traffic management design considering speed factor. a. Software Requirements The language considered for implementing this project is C#.net and VB.net having the version 5 version 8 any of it installed on the system. b. Explaination The goal of the indoor tests was to observe the capability of every vehicle inside the Geobroadcast range to receive warning signals initiated by the WSN. Three VANET nodes run a application that displays hazard warnings to drivers via a visual HMI. Each VANET nodes run Geocast as part of the communication protocol stack. The positions of the vehicles are mocked by a 4th control PC, which feeds the VANET nodes with position information and permits to reset, pause or start the experiment at every time. Because of the proximity of the equipment, packet dropping is also emulated based on the distance between communication nodes. In the experiment, one of the VANET nodes is connected via IEEE 802.15.4 to a sensor note that acts as a gateway to the sensor network. If this node is in the vicinity of the sensor network, it will receive sensor data, and forward to other VANET

Although VANETs and WSNs have common distinctiveness, like network self-organizatio, they also have important differences. VANET nodes have the set of relatively powerful computing devices. Additionally, since nodes of VANET are connected to the power supply of a car or are located at the roadside, they usually do not have restriction on energy consumption. In contrast, sensor nodes have extremely small physical dimensions and strong constraint in the processing and energy capabilities. VANET nodes are also highly mobile, resulting in frequent topology changes of the network, whereas sensor nodes are assumed to be static. The different characteristics of VANETs and WSN have led to the development

International Journal on Advanced Computer Engineering and Communication Technology Vol-1 Issue:1 :ISSN 2278 5140

23

Traffic Management through Inter-Communication between Cars using VANET System

nodes nearby using Geobroadcast. Highway relay model scenario. 6. CONCLUSION

[2].

In this paper, we have taken a review of the different approaches used for TrafficView and implemented the experiment on these reviewed approaches. The main goal of the VANET system is to provide information about the traffic to the driver. It is also used in the intercommunication between the vehicles. The TrafficView concept provides with all information regarding traffic to the driver if the TrafficView device is installed in the vehicle. This paper has reviewed the software architecture of the TrafficView and the various approaches used to get the desired result. Among approaches used in this paper we have studied different techniques could be proposed for TrafficView. The information gathered by the device helps the driver to get aware about the traffic conditions which would help the driver in critical or messy situations like rainy or foggy weather, finding the shortest path etc. In this paper, various approches has been reviewed and the experiment is implemented based on it.Furthermore, the comparison results conclude that for multimedia applications, this critical environment could negatively affect the performance of the network. In this situation, the major concern is to design and develop an efficient routing protocol for multimedia communication in such harsh environment which has very rapid changes. All these changes must be synchronized with the software and hardware environment for the efficient control and improvement.There are still a number of unattended challenges to be solved for these solutions to be nearly deployable.Among approaches used in this paper we may proposed it for are project work . REFRENCES [1]. Jinyuan Sun,Yuguang fang,Defense against misbehavior vehicular ad-hoc network,University of Florida,P.O.box 116130,Gainesville,FL 32611,United States,Ad-hoc Networks 7(2009)1515-1525

K. Pll, T. Nowey, C. Mletzko, Towards a security architecture for vehicular ad hoc networks, in: Proc. First Int. Conf. on Availability, Reliability and Security, ARES06, April 2006. [3]. Parno, A. Perrig, Challenges in securing vehicular networks, in:Proc. Fourth Workshop on Hot Topics in Networks, HotNets-IV, November 2005. [4]. M. Raya, J.-P. Hubaux, Securing vehicular ad hoc networks, Journal of Computer Security 15 (1) (2007) 3968. special issue on Security of Ad Hoc and Sensor Networks. [5]. J.Y. Choi, M. Jakobsson, S. Wetzel, Balancing auditability and privacy in vehicular networks, in: Proc. First ACM Int. Workshop on QoS and Security for Wireless and Mobile Networks, Q2SWinet05, October 2005, pp. 7987. [6]. T. Leinmller, C. Maihfer, E. Schoch, F. Kargl, Improved security in geographic ad hoc routing through autonomous position verification, in: Proc. Third ACM Int. Workshop on Vehicular Ad Hoc Networks, VANET06, September 2006. [7]. M.E. Zarki, S. Mehrotra, G. Tsudik, N. Venkatasubramanian, Security issues in a future vehicular network, in: Proc. European Wireless 2002, February 2002. [8]. M. Raya, J.P. Hubaux, Security aspects of inter-vehicle communications, in: Proc. Swiss Transport Research Conference, STRC, March 2005. [9]. J. Sun, C. Zhang, Y. Fang, An id-based framework achieving privacy and nonrepudiation in vehicular ad hoc networks, in: Proc. IEEE Military Communications Conf., October, 2007, pp. 17. [10]. C.-P. Schnorr, Efficient signature generation by smart cards, J. Cryptol 4 (3) (1991) 161 174. [11]. X. Lin, X. Sun, P.-H. Ho, X. Shen, GSIS: a secure and privacypreserving protocol for vehicular communications, IEEE Trans. Vehicular Tech. 56 (6) (2007) 34423456. [12]. T. Nadeem,S.Dastinezhad,C.Liao and L. iftode,Trafficview: Traffic Data Dissemination Using Car-to-Car Communication in ACM Mobile Computing and Communication Review (MC2R),Special Issue on Mobile Data

International Journal on Advanced Computer Engineering and Communication Technology Vol-1 Issue:1 :ISSN 2278 5140

24

Traffic Management through Inter-Communication between Cars using VANET System

[13].

[14].

[15].

[16].

[17].

[18].

[19].

[20]. [21]. [22].

[23].

[24].

Management, Vol. 8,No. 3,July 2004,pp. 619 P. Kamat, A. Baliga, W. Trappe, An identity-based security framework for VANETs, in Proc. Third ACM Int. orkshop on Vehicular Ad Hoc Networks, VANET06, pp. 9495, September 2006 IEEE 802.11 WG, part 11: Wireless LAN Medium Access Control (MAC) and physical layer (PHY) specifications, August 1999. General Motors Collaborative Laboratory website available online at http://gm.web.cmu.edu/. R. Miller, Q. Huang, An Adaptive Peer-toPeer Collision Warning System, IEEE Vehicular Technology Conference (VTC), Birmingham, May 2002. P.Murphy, E. Welsh, P. Frantz, Using Bluetooth for Short-term Ad-Hoc connections Between Moving Vehicles: A Feasibility Study, IEEE Birmingham, AL, May 2002. C. Schwingenschloegl, T. Kosch, Geocast Enhancements for AODV in Vehicular Networks, ACM, Mobile Computing ACM and Communications Review, Vol. 6(3), pp. 9697 Jul 2002. Device for Traffic Monitoring based on Carto-Car Communication E. Welsh, P. Murphy, P. Frantz, A Mobile Tested for GPS-Based ITS/IVC and Ad Hoc Routing Experimentation, International Symposium on Wireless Personal Multimedia Communications (WPMC), Honolulu, HI, Oct. 2002. Bryan parno and Adrian perrig.Challenges in securing vehicular networks. Garmin Device, http://www.garmin.com Garmin, Simple Text Output Protocol, http://www.Garmin.com/support/text_out.ht ml. US Census Bureau, Tiger Line Technical Documentation, http://www.Census.gov/geo/www/Tiger/rd_ 2ktiger/tgrrd2k.pdf. T.Nadeem,S.Dastinezhad,C. Liao and L. Iftode,TrafficView: A Scalable Traffic Monitoring System in Proceedings of 2004 IEEE International Conference on Mobile Data Management (MDM 2004) Berkeley, GA Jan- 2004.

U.S Census Bureau, Topologically Integrated Geographic Encoding and Referencing System(Tiger Line), http://www.census.gov/geo/www/tiger [26]. Sasan, Tamer, Bogdan and Cristian,TrafficView: A Driver Assistant Device for Traffic Monitoring based on Carto-Car Communication, http://cs.njit.edu/borcea/ papers/vtcsp04.pdf . [27]. IEEE Std 802.11, 1999 Edition, Information Technology Telecommunications and Information Exchange Between Systems Local and Metropolitan Area Networks Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. [25].

Figure 3: Design output for traffic management using VANET system

International Journal on Advanced Computer Engineering and Communication Technology Vol-1 Issue:1 :ISSN 2278 5140

25

You might also like