Professional Documents
Culture Documents
(VSRG)
Dr I.A.Sumra
Introduction
V2V V2V
2
Safety Applications
Work Zone Work Zone
Warning:!!! Warning:!!!
Work
in Progress
Plz! use Alt.
route
Parking Slot
RSU Parking Slot
Available!!! Available!!!
3
Vehicular network applications require security and the objective of these applications is to
serve users and make their journey secure and comfortable.
Attackers have their own role in this network and we cannot predict the dynamic behavior of the
attacker. If an attacker works on a safety application and changes the content of the safety
message then it poses a very difficult condition on the road and many users will be affected due
to this kind of attack.
Accidents are often the result of an alteration of any safety message or the sending of even one
wrong safety message in a network and many human lives are at risk [1].
Network Behavior
Attacker Behavior
STP in VANET
In trusted vehicular networks, trust and security are two key
requirements for users. While privacy is a basic necessary
requirement for security in life saving vehicular networks, a
guarantee that not only the vehicle platform but also the
infrastructure can be trusted is also vital.
When users receive any safety message in vehicular
communications, it is important that the message is authentic
and that the source making the request is legitimate. A new
and practical cardbased scheme has been proposed in this
paper to make possible the trusted authentication of users
while enabling various transactions with a Vehicle Service
Provider (VSP).
Please download complete paper from
◦ IEEEE website
◦ ResearchGate
14
15