Preview

Vanet

Powerful Essays
Open Document
Open Document
3371 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Vanet
ENCHANCING PRIVACY AND REDUCING TRAFFIC LEVELS IN VEHICULAR AD-HOC NETWORKS A.Naveenkumar, P.G Scholar, Mail id:anaveenkumar@live.com Angel College of Engineering and Technology, Tripur.

ABSTRACT. Vehicular Ad Hoc Networks is a kind of special wireless ad hoc network, which has the characteristics of high node mobility and fast topology changes. The Vehicular Networks can provide wide variety of services, ranges from safety and crash avoidance to internet access and multimedia applications. Attacking and misusing such network could cause destructive consequences. It is therefore necessary to integrate security requirements into the design of VANETs and defend VANET systems against misbehaviour, in order to ensure correct and smooth operations of the network. In this paper, I propose a security system for VANETs to achieve privacy desired by vehicles and traceability required by law enforcement authorities, in addition to satisfying fundamental security requirements including authentication, nonrepudiation, message integrity, and confidentiality. Moreover, we propose a privacy-preserving defense technique for network authorities to handle misbehaviour in VANET access, considering the challenge that privacy provides avenue for misbehaviour. The proposed system employs an identitybased cryptosystem where certificates are not needed for authentication. I show the fulfilment and feasibility of our system with respect to the security goals and efficiency.

1 INTRODUCTION VEHICULAR ad hoc networks (VANETs) are receiving increasing attentions from academic and deployment efforts from industry, due to the various applications and potential tremendous benefits they offer for future VANET users. Safety information exchange enables life-critical applications, such as the alerting functionality during intersection traversing and lane merging, and thus, plays a key role in VANET applications. Valueadded services can enhance drivers’ traveling experience by providing



References: [1] M. Raya and J-P. Hubaux, “Securing Vehicular Ad Hoc Networks,” J. Computer Security, special issue on security of ad hoc and sensor networks, vol. 15, no. 1, pp. 39-68, 2007. [2] J.Y. Choi, M. Jakobsson, and S. Wetzel, “Balancing Auditability and Privacy in Vehicular Networks,” Proc. First ACM Int’l WorkshopQoS and Security for Wireless and Mobile Networks (Q2SWinet ’05), pp. 79-87, Oct. 2005. [3] J. Sun, C. Zhang, and Y. Fang, “An Id-Based Framework Achieving Privacy and Non-Repudiation in Vehicular Ad Hoc Networks,” Proc. IEEE Military Comm. Conf., pp. 1-7, Oct. 2007. [4] X. Lin, X. Sun, P.-H. Ho, and X. Shen, “GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications,”IEEE Trans. Vehicular Technology, vol. 56, no. 6, pp. 3442-3456, Nov. 2007. [5] M. Raya, P. apadimitratos, I. Aad, D. Jungels, and J.-P. Hubaux,“Eviction of Misbehaving and Faulty Nodes in Vehicular Networks,” IEEE J. Selected Areas Comm., vol. 25, no. 8, pp. 15571568,Oct. 2007. [6] C. Gamage, B. Gras, B. Crispo, and A.S. Tanenbaum, “An Identity Based Ring Signature Scheme with Enhanced Privacy,” Proc.Second Int’l Conf. Security and Privacy in Comm. Networks (SecureComm ’06), Aug. 2006. [7] P. Tsang, M.H. Au, A. Kapadia, and S.W. Smith, “Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs,” Proc. ACM Conf. Computer and Comm. Security (CCS),pp. 72-81, 2007. [8] J. Sun and Y. Fang, “A Defense Technique against Misbehavior in VANETs Based on Threshold Authentication,” Proc. IEEE Military Comm. Conf., Nov. 2008. AUTHORS BIOGRAPHY V.Surendhiran received his Bachelor of Engineering degree in Computer Science and Engineering stream from Anna University of Technology Coimbatore. He is currently pursuing Master of Engineering in Computer Science at Angel College of Engineering and Technology affiliated to Anna University of Technology, Chennai. His area of interest Network security and hacking. P.Rajeshwari received her Bachelor of Engineering degree in Computer Science and Engineering stream from Anna University of Trichy. She is currently pursuing Master of Engineering in Computer Science at Angel College of Engineering and Technology affiliated to Anna University of Technology, Chennai. Her area of interest Networking and Cloud computing. S.Padmavathi received her Bachelor of Engineering degree in Computer Science and Engineering stream from Anna University of Technology Coimbatore. She is currently pursuing Master of Engineering in Computer Science at Angel College of Engineering and Technology affiliated to Anna University of Technology, Chennai. Her area of interest Network security, Grid computing and Wireless Technology. A.Naveenkumar received his Bachelor of Engineering degree in Computer Science and Engineering stream from Anna University of Technology Coimbatore. He is currently pursuing Master of Engineering in Computer Science at Angel College of Engineering and Technology affiliated to Anna University of Technology, Chennai. His area of interest Vehicular Ad-hoc Networks, Network security and Theory of computation.

You May Also Find These Documents Helpful

  • Powerful Essays

    It230 Unit 3 Assignment 1

    • 5629 Words
    • 23 Pages

    Vehicular Ad hoc Network (VANET), a subclass deriving from Mobile Ad Hoc networks (MANET), is a promising approach for future intelligent transportation system…

    • 5629 Words
    • 23 Pages
    Powerful Essays
  • Powerful Essays

    Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. Consumer Electronics, IEEE Transactions on, 50(1), 231-…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Kendall, J., Dr. (2008, June). Cryptographic Techniques for Network Security. University of Portsmouth. Retrieved from https://learn.umuc.edu/d2l/le/content/57178/viewContent/2562147/View.…

    • 1135 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. Consumer Electronics, IEEE Transactions on, 50(1), 231.…

    • 1465 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Bs311 Unit 3 Essay

    • 3508 Words
    • 15 Pages

    Designing secure key distribution in an ad-hoc network might be an extremely hard task. Any reliance on a certificate of authority is not trivial at all, for the same reasons that reliance in any centralized authority is problematic. Additional problems include the increased packet sizes required by authentication extensions, unicast/multicast routing, Quality of Service support and power aware routing. Furthermore, due to the limited transmission range of wireless network interfaces, multiple hops may be needed to exchange data between nodes in the network (c.f.…

    • 3508 Words
    • 15 Pages
    Powerful Essays
  • Better Essays

    Self-Driving Cars

    • 3778 Words
    • 16 Pages

    This paper will present information about self-driving cars and smart transportation systems. The technological barriers, security concerns and privacy issues concerning the implementation of these new systems will be addressed. The impact they will have on society, business, and government will be explored. Supporting data from research papers, news articles, and industry reports will be presented. The technology will be adopted because it will provide travelers with a safe, reliable, and convenient form of transportation. It will save people time and money and it will save thousand of lives every year. The measured evolution and introduction of self-driving cars and smart transportation infrastructure is important so it can allow business, consumers, and governments to adjust to the change in the way people and goods are transported.…

    • 3778 Words
    • 16 Pages
    Better Essays
  • Powerful Essays

    different networks

    • 1817 Words
    • 13 Pages

    Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT COMPUTER NETWORKS R/601/7320 LEVEL 3 UNIT 7 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 COMPUTER NETWORKS R/601/7320 LEVEL 3 UNIT 7 AIM OF THE UNIT This unit aims to give the learners an understanding of the key components, the network protocols and the services provided by network systems. Learners will develop skills required to ensure network security, gain an understanding to the functions of hardware and software components, the purpose, connections and connection devices and why network security is important. Networks are used not only in large organisations but in small businesses and homes. Learners will understand the types of network and the principles across LAN and WANs.…

    • 1817 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    Driverless cars are autonomous vehicles that can control and navigating the vehicle. Environmental scientists prefer them as they use the precise amount of fuel for a trip. Driverless cars reduce traffic congestions tremendously, each car can communicate with other nearby vehicles creating an undisturbed flow of traffic. However, hacking is a significant drawback for driverless cars, a passenger’s privacy and safety is at risk if the vehicle is…

    • 238 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Why I Choose Engineering

    • 513 Words
    • 3 Pages

    An enormous number of challenges, thrown out by rapid development in science and technology, have made me choose engineering profession. My predilection to this field of study is because of its immense diversity in applications and the range of complexities it possesses. I chose to major in Computer Science Engineering with an intense urge to develop deeper into this challenging field. This century can be credited with have given birth to too many ideas, visions, ways of living and working. It can be credited with almost as many revelations of thoughts and practices. One of this faith in technology as the panacea of all the problems of mankind and a means to human progress. Perhaps our age will be known as the Information Revolution or the Computer Revolution, for we are witnessing a remarkable growth and development of computer and information technology and applications. I have learnt various fundamentals of Computer Science and information technology, which together with practical course work reinforced my interest.…

    • 513 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Wireless sensor networks (WSNs) are in a wide usage. Many applications in military, ecology use them, which often need sensitive information. Security is therefore really important in WSNs. But many constraints of WSNs make security a challenge. Various kinds of attacks can target the network resultants in performance degradations and wrong info. The key management, authentication and secure routing protocols don’t secure WSNs against internal breach. IDS are a solution to this issue. Various approaches have been proposed. In this paper, different types of attacks on WSNs, various approaches of detection mechanisms in a WSNs are discussed. Introduction WSNs are a great advancement in wireless communication. They comprise of sink or base and a no. of sensor nodes deployed S.node gather useful info from their surroundings and transmits it to sink or BS which is user controlled Some app of WSNs at involve battle surveillance, volcanic observation, animal movement observation, tsunami prediction etc. WSNs are of interest to adversary as they are deployed in open and unprotected environments. In order to handle unknown attacks preservative mechanisms can be applied. Intrusion detection mechanisms can prevent intrudes and also acquires info about attacks techniques which can be useful in deploying prevention schemes. WSNs consist of sensor nodes and sink or base station(BS). Sensor nodes are small sized, low power and self-controlled. These nodes have low memory, less computation capacity and limited battery life.…

    • 2943 Words
    • 12 Pages
    Powerful Essays
  • Better Essays

    Bibliography: Certic, S. (2013, February 18). The Future of Mobile Security. Computer Science - Cryptography and Security.…

    • 1441 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Cell Phone

    • 1832 Words
    • 8 Pages

    Levi 7 United States of Transportation. Natl. Highway Traffic Safety Administration. “An Investigation of the Safety Implications of Wireless Communications in Vehicles.” Natl. Highway Traffic Safety Administration, Nov. 1999. Web. 12 Mar. 2001.…

    • 1832 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Introduction A network that allows two wireless devices to communicate with the help of other wireless devices that lie within range of each other. Challenges Lack of resources The absence of a central node High mobility Different devices and platforms Leads to Key distribution problem Coping with attacks What model to use…

    • 701 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Subject Evaluation

    • 5249 Words
    • 21 Pages

    Some new routing protocols have been proposed to address the issue of securing routing information. However, a secure routing protocol cannot single-handedly guarantee the secure operation of the network in every situation. The objectives of the thesis are two-fold: (a) To simulate various scenarios of attacks at MANET; (b) To study the performance and effectiveness of some secure routing protocols, including the Secure Ad-hoc On demand Distance Vector routing protocol (SAODV) [8] and ARIADNE [6], in these simulated malicious scenarios. If time permits, I would like to propose an optimal security solution to improve the…

    • 5249 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    Intervehicular Communication

    • 7414 Words
    • 30 Pages

    [14]Q. Xu, T. Mak, J. Ko, R. Sengupta, “Medium access control protocol design for vehicle–vehicle safety messages”, IEEE Transactions on VehicularTechnology, vol. 56, no. 2, pp. 499-518, Mar. 2007.…

    • 7414 Words
    • 30 Pages
    Powerful Essays