Professional Documents
Culture Documents
CHAPTER 1
INTRODUCTION
Generally vehicular networks are considered to contain two types of nodes; vehicles
and roadside stations. Both are Dedicated Short Range Communications (DSRC) devices.
DSRC works in 5.9 GHz band with bandwidth of 75 MHz and approximate range of 1000m.
The network should support both private data communications and public (mainly safety)
communications but higher priority is given to public communications. Vehicular
communications is usually developed as a part of Intelligent Transport Systems (ITS). ITS
seeks to achieve safety and productivity through intelligent transportation which integrates
communication between mobile and fixed nodes. To this end ITS heavily relies on wired and
wireless communications.
1.1 Motivation:
The main motivation for vehicular communication systems is safety and eliminating
the excessive cost of traffic collisions. According to World Health Organizations (WHO),
road accidents annually cause approximately 1.2 million deaths worldwide; one fourth of all
deaths caused by injury. Also about 50 million persons are injured in traffic accidents. If
preventive measures are not taken road death is likely to become the third-leading cause of
death in 2020 from ninth place in 1990.
However the deaths caused by car crashes are in principle avoidable. US Department
of Transport states that 21,000 of the annual 43,000 road accident deaths in the US are caused
by roadway departures and intersection-related incidents. This number can be significantly
lowered by deploying local warning systems through vehicular communications. Departing
vehicles can inform other vehicles that they intend to depart the highway and arriving cars at
intersections can send warning messages to other cars traversing that intersection. Studies
show that in Western Europe a mere 5 km/h decrease in average vehicle speeds could result
in 25% decrease in deaths. Policing speed limits will be notably easier and more efficient
using communication technologies.
Although the main advantage of vehicular networks is safety improvements, there are
several other benefits. Vehicular networks can help in avoiding congestion and finding better
routes by processing real time data. This in return saves both time and fuel and has significant
economic advantages.
CHAPTER 2
VEHICULAR COMMUNICATION
2.1 Development:
Intelligent Transportation Society of America (ITSA), which has members from many
diverse areas including private companies, universities, and governmental agencies, aims to
improve cooperation among public and private sector organizations. ITSA summarizes its
mission statement as “vision zero” meaning its goal is to reduce the fatal accidents and delays
as much as possible.
Integrated automobile devices like OnStar have begun to make a presence on U.S.
markets, with automobile manufacturers like GM offering them as options on their vehicles.
Third party companies use these devices to offer services such as directions and emergency
assistance to their customers. Although these devices may add an extra level of safety and
peace of mind, they do not offer drivers the freedom to communicate with each other
2.2 V2V:
V2V is currently in active development by General Motors, which demonstrated the system
in 2006 using Cadillac vehicles. Other automakers working on V2V include BMW, Daimler,
Honda, Mercedes and Volvo.
Two categories of draft standards provide outlines for vehicular networks. These
standards constitute a category of IEEE standards for a special mode of operation of IEEE
802.11 for vehicular networks called Wireless Access in Vehicular Environments (WAVE).
802.11p is an extension to 802.11 Wireless LAN medium access layer (MAC) and physical
layer (PHY) specification. As of November 2006 Draft 1.3 of this standard is approved.
802.11p aims to provide specifications needed for MAC and PHY layers for specific needs of
vehicular networks. IEEE 1609 is a family of standards which deals with issues such as
management and security of the network:
1609.1 -Resource Manager: This standard provides a resource manager for WAVE, allowing
communication between remote applications and vehicles.
1609.3 -Networking Services: This standard addresses network layer issues in WAVE.
1609.4 -Multi-channel Operation: This standard deals with communications through multiple
channels.
In North America DSRC devices operate over seven 10 MHz channels. Two of the
channels are used solely for public safety applications which mean that they can only be used
for communications of message with a certain priority or higher.
Although 802.11p and 1609 drafts specify baselines for developing vehicular
networks, many issues are not addressed yet and more research is required.
CHAPTER 3
APPLICATIONS
3.1 Safety
Obstacle discovery
Reporting accidents
Traffic management is utilized by authorities to ease traffic flow and provide a real time
response to congestions. Authorities may change traffic rules according to a specific situation
such as hot pursuits and bad weather. Applications include:
Roadside units can provide drivers with information which help them in controlling
the vehicle. Even in the absence of RSUs, small transmitters may be able to issue warnings
such as bridge or tunnel height or gate width:
Parking a vehicle
Cruise control
Roadsign recognition
Surveillance
Restricted entries
Pull-over commands
Toll collecting
Parking payments
For reaching a destination there are usually many different routes. By collecting
relevant information system can find the best paths in terms of travel time, expenses (such as
toll and fuel)
Maps
Business locations
Car services
Gas stations
Web surfing
File downloads
Gaming
CHAPTER 4
4.2 Sensors:
Radars send narrow microwave beams that are reflected from objects and then
received back by the radars. Based on this information, the relative position and velocity of
other objects can be determined.
4.2.1 Limitations:
Stereo cameras monitor the environment around a vehicle, and image processing is
used for determining dangerous situations, such as a possible collision or a vehicle that
dangerously approaches the lateral side of a road.
4.3.1 Limitations:
First 2 in sensors, also low speed of image processing and large number of false
alarms are drawbacks of this technology.
CHAPTER 5
The components of this method of approach are the internet, cellular network,
and traffic service centre. The block diagram is shown below.
CHAPTER 6
Technology:
goal is that vehicular networks will contribute to safer and more efficient roads in the future
by providing timely information to drivers and concerned authorities.
As discussed, the term vehicular Ad hoc network (VANET) is used for a subgroup of
mobile Ad hoc networks (MANETs). Both VANET and MANET are characterized by the
movement and self-organization of the nodes. But they are also different in some ways.
MANET can contain many nodes that have un-controlled moving patterns. But since VANET
is formed mainly by vehicles so node movement is restricted by factors like road course,
traffic and traffic regulations. Because of the restricted node movement it is quite likely that
the VANET will be supported by some fixed infrastructure that provide some services and
access to stationary networks. The fixed infrastructure will be deployed at critical locations
like slip roads, service stations, dangerous intersections or places well-known for hazardous
weather conditions. Nodes are expected to communicate by means of North American DSRC
standard that employs the IEEE 802.11p standard for wireless communication. Vehicles that
are not subjected to the strict energy, space and computing capabilities restrictions normally
adopted MANETs. The very high speed of the nodes (up to 250 km/h) and the large
dimensions of the VANET are more challenging problems in recent research areas.
CHAPTER 7
In order to meet performance goals, it is widely agreed that vehicular ad hoc networks
(VANETs) must rely heavily on node-to-node communication, thus allowing for malicious
data traffic. At the same time, the easy access to information afforded by VANETs
potentially enables the difficult security goal of data validation. We propose a general
approach to evaluating the validity of VANET data. In our approach a node searches for
possible explanations for the data it has collected based on the fact that malicious nodes may
be present. Explanations that are consistent with the node's model of the VANET are scored
and the node accepts the data as dictated by the highest scoring explanations. Our techniques
for generating and scoring explanations rely on two assumptions: 1) nodes can tell "at least
some" other nodes apart from one another and 2) a parsimony argument accurately reflect
adversarial behavior in a VANET. We justify both assumptions and demonstrate our
approach on specific VANETs.
The basic objective of congestion control is to best exploit the available network
resources while preventing sustained overloads of network nodes and links. Appropriate
congestion control mechanisms are essential to maintain the efficient operation of a network.
Ensuring congestion control within vehicular ad hoc networks address special challenges, due
to the characteristic and specificities of such environment (High dynamic and mobility of
nodes, high rate of topology changes, high variability in nodes density and neighborhood,
broadcast/geocast communication nature ...). In this context, we present in this paper a
congestion control approach, based on the concept of dynamic priorities-based scheduling, to
ensure a reliable and safe communications architecture within VANET. Messages priorities
are dynamically evaluated according to their types, the network context and the
neighborhood.
proposed MAC scheme realizes strict packet-level priority scheduling for emergency packets
in a fully distributed way. With the same mechanism, the proposed scheme supports multiple
levels of strict priority for emergency packets.
Design of VANET MAC protocol should give more significance to fast topology
changes and types of services rather than power constraints, MAC protocols have to reduce
the medium access delay and increase the reliability.
Vehicular communications have been one of the hottest research topics for the last
few years. Many routing protocols have been proposed for such kind of networks. Most of
them try to exploit the information which may be available at the vehicle by the time that a
routing decision must be made. In addition, some solutions are designed taking into account
the particular, highly partitioned, network connectivity in vehicular settings. To do so, they
embrace the store-carry- forward paradigm of delay-tolerant networks. Despite the great
variety of approaches which have been proposed, we found that there is a set of issues which
are common to many vehicular ad hoc routing protocols in the literature. In this paper, we
perform a simulation-based analysis of five of those protocols, which are representative of the
various categories of vehicular routing.
Previous studies on VANET routing focused more on single ad hoc routing method (e.g.
most researchers focused on traditional ad hoc topology based routing, while some other
focused on position based ad hoc routing method in VANET). The selection of routing
method heavily depends on the nature of the network. Thus single ad hoc routing method is
not sufficient enough in meeting all the different types of ad hoc networks. In this study we
focus on different ad hoc routing methods and figure out which recent advancement had been
made to provide „in time‟ and scalable routing in order to avoid any critical situation on
roads. Furthermore, most researchers focused on single environment of VANET i.e. either on
highway or in city to evaluate the performance of different routing protocols. Therefore in our
study we focus on both environments i.e. city and highway for the performance evaluation
of different routing protocols. Moreover, the performance of different routing protocols had
not been well measured since each researcher used different simulator and performance
metrics for performance evaluation. Due to aforementioned problems there is continuous
need to study various ad hoc routing methods in order to select appropriate method for
different environments of VANET.
7.7.1.1. Authentication
This is very much requires as this ensures the message is not changes in transit that the
messages the driver receives are not false.
In this security based system a sender cannot deny the fact having sent the
message. But that doesn’t mean that everyone can identify the sender only specific authorities
should be allowed to identify a vehicle from the authenticated messages it sends.
It ensures that the sender who has generated the message is still inside the network and
that the driver can be assured that the sender has send the message within a very short period.
It is required to ensure that all nodes function according to the roles and privileges
authorized to them in the network. Towards access control, Authorization specifies what each
node can do in the network and what messages can be generated by it.
7.7.1.7 Privacy
This system is used to ensure that the information is not leaked to the unauthorized
people who are not allowed to view the information Third parties should also not be able to
track vehicle movements as it is a violation of personal privacy. Therefore, a certain degree of
anonymity should be available for messages and transactions of vehicles. However, in liability
related cases, specified authorities should be able to trace user identities to determine
responsibilities. Location privacy is also important so that no one should be able to learn the
past or future locations of vehicles.
The problems can be classified into tree distinct parts which are challenges that
are faced while implementing the system, adversaries that can attack the
system and the type of attacks that can be encountered in VANET. The latter
two parts are explained together. Later the chapter will illustrate the existing
properties that support security issues, i.e. which will mitigate some security
situation.
7.7.2 Challenges
As the major VANET applications are used for collision avoidance, hazard warning and
accident warning information, so applications require strict deadlines for message delivery.
Certain location based service is essential for most VANET applications to be truly
effective, so that reliance of the VANET system on GPS or other specific location based
instruments can be increased as any error in these is likely to effect in the VANET applications.
It can be thought that most of the drivers in the road is honest and will follow all
the rules and regulations but there can be greedy drivers as well who will try to
attack for their own benefit and we cannot deny the fact. For example, in our
congestion avoidance system, a greedy driver might try to convince his
neighbors that there is congestion ahead, and if his neighbors choose other
routes, our greedy driver will get a terrific driving condition. Message Falsification
is a type of attack usually done by the greedy drivers. An attacker can send false
messages in a VANET network such as false hazard warnings to divert traffic
from a route for freeing up resources for it. Message delay is also another type of
attacks where in case of road traffic accident the driver will not pass the message
to its neighboring cars in appropriate time so as to create road traffic congestion.
7.7.3.2 Snoops/Eavesdropper
These people are those who try to collect information about you. While data mining is
acceptable over aggregate data, but for identifying information for an
individual, that raises serious privacy concerns and is not acceptable.
Impersonation is a type of attack done by the snoops. An attacker may take on
someone else’s identity and gain certain advantages or cause damage to other
vehicles. Privacy Violation is also done by the snoops and is done by using a
simple mechanism which is to associate the identity of vehicles with the
messages they send using asymmetric key cryptography. However, this lends
itself to people being able to identify the sender of the message. Thus, vehicles
can be tracked and anyone can identify a vehicle’s owner. This raises some
serious privacy issues as in all applications like safety, traffic management and
toll access the messages would reveal the driver’s identity, his location, his actions and
preferences. Consumers would not like to adopt a technology which violates their privacy.
7.7.3.3 Pranksters
Pranksters are especially the bored teenagers who will attempt things for fun. For
example, a prankster targeting a collision-avoidance might sit by the road and
convince one vehicle to slow down while convincing the vehicle behind to speed
up. A prankster could also abuse the security vulnerability to Denial of Service
(DoS) attacks to disable applications or prevent critical information from reaching
another vehicle. Message Alteration is a form of attack that is done by the
pranksters by changing a hazard warning to a no hazard warning to cause road
traffic accidents.
Industrial insiders are those who stays inside the car manufacturing company
Attacks from insiders can be very harmful, and the extent to which vehicular
networks are vulnerable will depend on other security design decisions. For
example, if mechanics can update the firmware of a vehicle, they also have an
opportunity to load malicious firmware. If we allow vehicle manufacturers to
distribute keys, then a insider at one manufacturer could create keys that would
be accepted by all other vehicles. Hardware Tampering is usually done by the
industrial insiders. Attackers can tamper with the security hardware of a vehicle
to steal identities as well as extract cryptographic keys. Therefore, specific
mechanism like tamper proof hardware needs to be implemented to ensure such
attacks cannot be easily accomplished. Sensors tampering are also another easy
attack done by the insiders If the main system is tamper proof it is easy to fool
the vehicle’s sensors with wrong information by simulating false conditions.
Examples include tampering with the GPS system and temperature sensors.
This kind of attackers deliberately attempt to cause harm via the applications on the
vehicular network. Normally, these attackers have specific targets, and they have access to
more resources than other attackers. They are more
professional. For example, a terrorist might manipulate the deceleration warning system to
create gridlock before detonating a bomb. In general, although such kind of attackers will be
less than other kinds of attackers, they are probably the most important concern for our security
system.
VANET systems have certain properties which make them a unique from other ad hoc
network.
VANET nodes are the vehicles itself which have their own power in the form of
batteries and can have high computing powers. This means that unlike a majority of the ad hoc
networks, they do not need power efficient protocols. And high computing power allows the
nodes to run complex cryptographic calculations.
The location of a node with time would be available for the implementation of various
security purposes as it is thought that most vehicles will be equipped with the GPS system.
In most cases, cars receive periodic maintenance, which can be used for regular checks
and updates of firmware and software. In case public key cryptography is implemented, it can
also be used for updating certificates and keys, along with provision of fresh Certificate
Revocation Lists (CRLs).
Usually ad hoc networks are not registered but the good thing is that all the VANET
nodes ie the vehicles are registered with a central authority and already have a unique identity
in the form of a license plate. There is an existing infrastructure which maintains records of all
vehicles.
Usually it is thought that majority of the drivers in the system are honest and there are
few vehicles or nodes which will try to attack in some ways If anything wrong happens then
the set of good drivers will help the law enforcement to find the adversary with the help of
polling and voting system.
If there is any sort of attacks done by the adversary the law enforcement group can
catch the wrong doers although the law enforcement officers.
CHAPTER 8
SUMMARY
The overview of the vehicular Ad Hoc Network (VANET) helps understanding the idea
behind the communication between vehicles without using any dedicated network infrastructure.
After getting the idea about VANET the main issues related to that can be considered and the
solution of each can be studied. The most important issue of security in VANET should be taken
in the account for improved performance.
8.2 Conclusion:
VANETs combine short range communications, with the scalability and mobility of
classic ad hoc networks, in order to support a number of applications aiding in the safety,
entertainment and simplification of everyday driving. Emerging wireless technologies are
expected to enhance the better models in vehicular networks. To enhance the performance the
issues described here must be considered.
After considering the main issues related to VANET it is possible to get the solution of
each to enhance the performance and reliability. Taking in the account the constant growth of
automotive market and the increasing demand for the car safety, also driven by the regulatory
domain, the potential of car to car connectivity is immense. The classes of application for
vehicular networks range from time critical safety application to delay tolerant internet
connectivity applications.
We can analyze the factors that are critical in deciding the networking framework over
which the future vehicular application would be deployed and show that there are active
research efforts towards making VANETs a reality in the near future.
BIBLIOGRAPHY
Papers:
[1] Real-World VANET Security Protocol Performance: Jason J. Haas and Yih-Chun Hu,
University of Illinois at Urbana-Champaign, Urbana, Illinois, U.S.A.
[2] Street Smart Traffic: Discovering and Disseminating Automobile Congestion Using
VANET’s: Sandor Dornbush and Anupam Joshi, Dept. of Computer Science and Electrical
Engineering, University of Maryland Baltimore County, Baltimore, Maryland 21250
[3] Detecting and Correcting Malicious Data in VANETs: Philippe Golle, Palo Alto
Research Center.
[5] Mobility Management for Vehicular Ad Hoc Networks: Marc Bechler, Lars Wolf,
Institute of Operating Systems and Computer Networks, Technische Universität
Braunschweig, Germany.
[6] Content Distribution using Network Coding in VANET: Uichin Lee, Joon-Sang Park,
Joseph Yeh, Giovanni Pau, Mario Gerla, University of California, Los Angeles, CA
90095.
Books:
Websites:
1) www.google.com.
2) http://en.wikipedia.org/wiki/Vehicular_communication_systems.
3) http://en.wikipedia.org/wiki/Electronic_stability_control.
4) http://drghassan.net/resources/SecurityIssues.