You are on page 1of 4

Hello and a very good morning Today I would be introducing Vanet and its issues.

Many of you wont be knowing what is VANET. Well VANET are subclass on manet.
Many of you have heard of mobile ad hoc networks. A mobile ad hoc network (MANET)
is a continuously self-configuring, infrastructure-less network of mobile devices
connected without wires. In the same way Vehicular Ad-Hoc Network, or VANET, is a
technology that uses moves cars as nodes in a network to create a mobile
network.VANET turns every participating car into a wireless router or node, allowing
cars approximately 100 to 300 metres of each other to connect and, in turn, create a
network with a wide range. Nearly 1.3 million people die in road crashes each year, on
average 3,287 deaths a day. Due to such a huge number of road accidents take place,
Vanet is been introduced. Vehicular Ad hoc Networks (VANETs) are the promising
approach to provide safety and other applications to the drivers as well as passengers. It
becomes a key component of the intelligent transport system. With the help of VANET
traffic will also be reduced drastically. Probably most of you would be knowing there are
different sensors are used in cars. Basic examples would be rain sensor if the sensor
detects rain then the wipers start automatically, in the same way light sensor are used
when its even and dark the headlight of the car starts automatically. VANETs are also
infrastructure less , they work through sensors. But there is also a plan with infrastructure.
In the vanet technology messages are exchanged through sensors. There are different
types of communication in VANET. Firstly its vehlice to vehicle communication.
Message are sent through each other without and infrastructure involved. Secondly we
have Vehicle to infrastructure (V2I) and infrastructure to vehicle(I2V). Messages are sent
to infrastructure and received from infrastructure.
Slide 4
Now I would give you a brief idea of VANET components, first we will discuss about
Infrastructure environment. On one hand, manufacturers are sometimes considered within
the VANET model. As part of the manufacturing process, they identify uniquely each
vehicle. On the other hand, the legal authority is commonly present in VANET models.
Despite the different regulations on each country, it is habitually related to two main tasks
- vehicle registration and offence reporting. Every vehicle in an administrative region
should get registered once manufactured. As a result of this process, the authority issues a
license plate. On the other hand, it also processes traffic reports and fines. Trusted Third
Parties (TTP) are also present in this environment. They offer different services like
credential management or timestamping. Both manufacturers and the authority are related
to TTPs because they eventually need their services (for example, for issuing electronic
credentials). Service providers are also considered in VANETs. They offer services that
can be accessed through the VANET. Location-Based Services (LBS) or Digital Video
Broadcasting (DVB) are two examples of such services. In this part of the network,
sporadic (ad-hoc) communications are established from vehicles. From the VANET point
of view, they are equipped with three different devices. Firstly, they are equipped with a
communication unit (OBU, On-Board Unit) that enables Vehicle-to-Vehicle (V2V) and
Vehicle-to-Infrastructure (V2I, I2V) communications. On the other hand, they have a set
of sensors to measure their own status (e.g. fuel consumption) and its environment (e.g.
slippery road, safety distance). These sensorial data can be shared with other vehicles to
increase their awareness and improve road safety. Finally, a Trusted Platform Module
(TPM) is often mounted on vehicles. These devices are especially interesting for security
purposes, as they offer reliable storage and computation. They usually have a reliable

internal clock and are supposed to be tamper-resistant or at least tamper-evident. In this


way, sensitive information (e.g. user credentials or pre-crash information) can be reliably
stored. As mentioned before, VANETs as communications network impose several unique
requirements. Vehicles move at a relatively high speed and, on the other hand, the high
amount of vehicles present in a road could lead to an enormous network. Thus, a specific
communication standard, called Dedicated Short Range Communications (DSRC) has
been developed to deal with such requirements (Armstrong Consulting Inc.). This
standard specifies that there will be some communications devices located aside the
roads, called Road-Side Units (RSU). In this way, RSUs become gateways between the
infrastructure and vehicles and vice versa.

Slide 5
Now I would be talking about different VANET settings. V2V group communication is
communication with the group members, a warning message is sent when an emergency
is occurred. This message is sent without the help of infrastructure, but it uses nodes.
Only cars having this technology can use this message exchanging system. A routing
protocol is needed to forward that message to the destination. We can take an example as
a ambulance need a clear way at highway N9 , vehicle using N9 will receive message for
the clearance of the road so that Ambulance can move faster. Next we talk about V2V
beaconing, here messages include hard braking, current speed etc. This messages are only
single hop they are not forwarded. Beacon messages are sent periodically to nearby
vehicles. Next is V2I I2V , messages are exchanged through infrastructure via Road side
unit.

Slide 6

Slide 8
Now we talk about different attacks in VANET Identification is and person is identified
by its name which is unique. On the other hand, authentication means a person needs to
claim himself as a genuine person/authorized person.First problem is Impersonation in
which a person claims to be another entity. Warning message sent to the desired one
reached undesired one. This can be done by plagiarism. False Attribute Possession is a
sub type of impersonation. In this attack attacker tries to be a part of the group to get
some benefit. It is not necessary that the attacker enters the group with its own entity. It
can enter as a regular vehicle and sends message to others claiming a police vehicle for a
freeway. Sybil the attacker uses multiple identity at a same time. For example, a vehicle
enters with identity named Y but as soon he joins another group he changes its identity as
well Now he claims to be Z. As presented in the VANET model, TPMs mounted on
vehicles can store sensitive information like identifiers. In this way, the Sybil threat is
alleviated. However, security mechanisms must be designed to provide identification and
authentication, thus protecting against impersonation attacks.
Slide 9
Privacy means information one would not like to share such as home address, name
etc. Drivers personal information should be private and not to be shared, attackers
may use another persons information. This can lead to location tracking of the
registered vehicle. With the help of the address the person can be also be revealed.
Confidentiality involves a set of rules or a promise that limits access or restrictions on
certain types of information. Eavesdropping is the most prominent attack over Vanets against
confidentiality. Attacker can perform this attack by being a part of the group or by falsifying
RSU. By this way it gets another entity information.

Non-Repudiation is the assurance that someone cannot deny something.


Typically, nonrepudiation refers to the ability to ensure that a party to a contract or a
communication cannot deny the authenticity of their signature on a document or the sending
of a message that they originated. Non Repudiation can be circumvented if two or more
entities share same credentials. The main threat is denying some action by some of the
implicated entites. This attack is different from impersonation which was discussed earlier. In
this way, they get indistinguishable, so their actions can be repudiated
Slide 10
Availability is service/information available at request time.A Denial-of-service (DoS)
attack is an attempt to make a machine or network resource unavailable to its intended
users, such as to temporarily or indefinitely interrupt or suspend services of a host
connected to the Internet. Attackers attempt to make this service unavailable by
sending many messages at once or by compromising enough RSU.
Routing anomalies it is particular attack which could lead to DOS. There are further
two types of attack. Firstly we would like to talk about sinkhole attack , in this attack
attacker would drop all the messages which he received he wont be forwarding it. In
another attack called Selfish behaviour , attacker may only send messages which
interest him , it can also be altererd message. That means only few messages /only
few would receive message.
Computation DoS means putting the vehicles computation power to stress. Pushing
the systems beyond its limits by sending to much information or too many task at
once.
Data trust can be compromised in many different ways in VANETs. Inaccurate data
calculation and sending affects message reliability, as they do not reflect the reality.
This could be performed by manipulating in-vehicle sensors, or by altering the sent
information. Imagine that a vehicle reports an accident in road E-7, while it really
took place in E-9. Such information should compromise such messages trust. Even
worse, sending false warnings (e.g. the accident didnt take place) would also affect
the whole system reliability.
Slide 12
To cure this attack, we have few proposals. VIN (Vehicle Identification Number) is
been provided by car manufactures. The identification numbers are unique, each car
has one unique ID. VINs were first used in 1954, from 1954-1981 different
manufactures used different formats. Licence plate is the second ID proposal. It is
issued by legal authorities. Even each car usually carries unique number in this case.
ELP (Electronic licence plate) is introduced which will be also be issued by legal
authorities and its helps to get identified and authenticate itself.
Slide 13
Digital signature has been brought up in VANET. When senders send the warning
message it will have its digital signature. Receiver can verify using a public key.
Elliptic curve cryptography (ECC) is an approach to public-key
cryptography based on the algebraic structure of elliptic curves over finite fields.
Group signature has also been used in VANET. Each group member has to digital sign
the message without revealing their identity. Only Trusted Third Parties has the
authority to reveal the real identity of the group member who has signed with the
message. Signature checking requires public key to validate the received message and
comparing the resulted value with the calculated has value of the information. If this

matches perfectly then the signature and the message is geneuiene.NRR is not
extensively used in vanet but would be used in future. For example a car is overspeed
and a message should be sent and delivery receipt should be also received.
NRR1 Problem is only within group leader and receiver of the message. NRR should
get for other member of the group. Secondly a large groups can lead to scalability
problems, so small groups has been made called splits. This can help to use NRR as
well no sacalabilty problems would occur. Third problems is all NRR is stores under
group leader, prof would be required by the legal authroirtes.Collection should be
continuous
Slide 14
Confidentiality in vanet is needed in V2V communication.
1) First proposals RSU should provide symmetric key with each registered
vehicle .If a vehicle enters a RSU region RSU should provide a symmetric
key, it will help to encrypt the data with the range of RSU. Bigger RSU can
lead to conflict so smaller region is better called Split. The next split key is
automatically generated as soon as the vehicle joins another RSU region. The
key management is managed by service provider.
2) Second proposal is to establish self-organizing geofraphically region. Often a
group is created and a group leader is required. The group leader is been made
which ever member is the centremost. The group leader is often incharge to
provide symmetric key to the newest member of the group. This options
allows a group to have a longer communication period.
3) Attribute-based encryption is a type of public-key encryption in which
the secret key of a user and the ciphertext are dependent upon attribute. Each
vehicle has its own attributes which are fed while manufacturing of the
vehicle. Each attribute is associated with one public key and its private key is
divided into several parts called key shares. Each key share is installed in a
different vehicle . In that only way only the group members would be able to
decrypt the message . RSU should be employed to deliver key shares .
Slide 15
As we discussed about the sinkhole and selfish behaviour. Nugglets are been
introduced to deal with this attack. Nugglets are electronic currecy which are earned
by being honestly in networking issues or by being genuine.
Data Trust
Information trust has been brought up in VANET which means entity trust.
Information 1trust depends upon relaiblity of an entity. It is very important how
thruthful information it is

You might also like