Professional Documents
Culture Documents
net/publication/323150609
CITATIONS READS
9 2,242
1 author:
Pallavi Agarwal
6 PUBLICATIONS 17 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Pallavi Agarwal on 13 February 2018.
Abstract
Vehicular ad-hoc networks (VANETs) technology has turned out as a vital research field
throughout the most recent couple of years. VANETs are the likely an impacting way to deal
with giving security of driver and different applications for the activity conditions and
additionally travelers. Being dynamic in nature, it created the network, according to the
condition and requirement of the users and provides consistent communication between the
vehicles. Due to its excessive advantages, it is highly susceptible to numerous attacks and
security in VANET should be taken into consideration. This paper presented the security
issues such as authenticity, integrity, availability, confidentiality, anonymity and non-
repudiation to provide the secure communication between Vehicle-to-Vehicle (V2V) and
Vehicle-to-Infrastructure (V2I). Numerous research works have been done to recover the
performance and security of this network. The fundamental point of this paper is the several
security challenges and the applications of VANETs.
JoMTRA (2017) 21-30 © STM Journals 2017. All Rights Reserved Page 21
Technical Review on Different Applications in VANET Pallavi Agarwal
about congested driving conditions, road network, some need roadside units
earthquake, tsunami, etc. for lessening the road exclusively at intersections, while others
accidents, fuel consumption and provides safe require roadside units solely at region borders.
driving atmosphere. Figure 1. shows the In spite of the fact that it's safe to expect that
infrastructure of MANET and VANET. infrastructure exists to some extent and
vehicles have access to that occasionally.
OVERVIEW OF VANET
Intelligent Transportation Systems (ITSs) The probable communication structure of
In intelligent transportation systems, each intelligent transportation frameworks integrates
vehicle broadcast data [3] to the vehicular inter-vehicle and vehicle-to-roadside
network or transportation company by having communications. Inter-vehicle and vehicle-to-
the part of the sender, receiver, and the router roadside communications rely upon exact and
by using the data to authenticate safe, free-flow forward information with respect to the
of traffic. Vehicles should be equipped with a neighboring geographical area, which in turn,
few variations of radio interface or Onboard needs the employment of accurate positioning
Unit (OBU) for communication to occur systems and elegant communication protocols
between vehicles and Road Side Units (RSUs) for exchanging data. In this network, the
that enables ad hoc short-range wireless communication medium [5] is shared,
networks to be created [4]. Vehicles should extremely undependable, and with constrained
even be fitted with hardware that permits the bandwidth. The elegant communication
data with the precise location of the vehicle protocols should guarantee quick and reliable
such as Global Positioning System (GPS) or a delivery of information to all or any vehicles
Differential Global Positioning System within the section. It's worth remarkable that
(DGPS) receiver. RSUs are immobile and are Intra vehicle communication uses technologies
associated with the backbone network, which such as IEEE 802.15.1 (Bluetooth), IEEE
should be in place to encourage 802.15.3 (Ultra-wide Band) and IEEE 802.15.4
communication. The distribution and number (Zigbee) that may be used to support wireless
of roadside units should be relying on the communication within a vehicle, however, this
communication protocol is to be used. Be that can be outside the scope of this paper and
as it may, a few protocols need roadside units cannot be mentioned additional.
to be allocated similarly throughout the full
JoMTRA (2017) 21-30 © STM Journals 2017. All Rights Reserved Page 22
Journal of Multimedia Technology & Recent Advancements
Volume 4, Issue 3
ISSN: 2349-9028 (Online)
JoMTRA (2017) 21-30 © STM Journals 2017. All Rights Reserved Page 23
Technical Review on Different Applications in VANET Pallavi Agarwal
vehicles. Message forwarding will enable to move, radio channel characteristics vary and
spread the warning message to all vehicles users might be a part of or leave the network.
outside the radio transmission range of a single It's accepted that once user density is low, a
hop [9]. high proportion of nodes could also be isolated
or form isolated clusters. It's possible to
Clustering influence this problem by increasing
A neighbor of the vehicles should be clustered transmission power, so the nodes can
into manageable units, is crucial to realize communicate in less population. On the other
economical and reliable safety hand, if the user density is just too high, nodes
communications. Without boundary lines have to compete for radio transmission
among vehicles: resources and also the average quantity of
• Several vehicles will interfere with one radio capacity per user could also be too small.
another in contention for transmissions in This problem will be approached by reducing
radio bandwidth. the transmission power so, in a given area,
• All messages might propagate all over, fewer nodes can compete for the radio
flooding the system with messages. channel.
JoMTRA (2017) 21-30 © STM Journals 2017. All Rights Reserved Page 24
Journal of Multimedia Technology & Recent Advancements
Volume 4, Issue 3
ISSN: 2349-9028 (Online)
Once a vehicle brake toughly, the EEBL Road Hazard Control Notification
application conveys this data to This application informs the vehicles
surrounding vehicles via one or additional concerning the geographical features of the
Basic Safety Messages. The current brake road resembling having a pointy curve ahead
lamp goes on once the driver applies the or occurrence of a landslide, etc. Sensors are
brake (Figure 2). The EEBL application won't often mounted on RSU to capture data
solely enhance the range, however, conjointly concerning wild animals within the roads
may give necessary information like running through forests. There could also be
acceleration/deceleration rate and time taken. cases, once dangerous animals cross the road
or halt on the road the data are often broadcast
At present, brake lamps do not differentiate
to the encircling vehicles so the vehicles will
levels of speed and are solely helpful as so be prevented from moving ahead.
much rearward as the line of sight permits.
This application is extremely crucial to Cooperative Collision Warning
prevent the crash. First two cars concerned in Cooperative Collision Warning (CCW), that
an accident could take profit from EEBL, provides a dynamic safety mechanism for
however, the remainder of the cars within the vehicles on highways, is enforced by
network will avoid the crash. exchanging static and dynamic vehicle
parameters with neighboring vehicles through
Post Crash Notifications inter-vehicle wireless communications.
Vehicles met with accidents will broadcast Received info isn't solely used for calculating
messages about its position to neighboring the relative safety distance between
vehicles (Figure 3). It will send messages to neighboring (Figure 4). The CCW conception
the highway patrol for seeking more help provides warnings or position awareness
[13]. displays to drivers based on info concerning
the motions of neighboring vehicles obtained
Collision Avoidance by wireless communications from those
Improving collision avoidance application vehicles, while not use any sensors. Collision
reduces road accidents to a good extent. By Warning Systems share a typical need: the
vehicle must realize the locations and motions
mounting sensors at the RSU information are
of all the neighboring vehicles, representing
often collected, processed and warning the state of the vehicle neighborhood.
messages are often forwarded to the vehicles
to avoid a collision. Various ways are often Slow/Stop Vehicle Advisor
followed to avoid collision like to warn A slow or a halted vehicle will send warning
vehicles concerning violating traffic signals, signals/messages to the encircling vehicles
low bridge warning, wrong side driving alert within the network [13].
etc.
JoMTRA (2017) 21-30 © STM Journals 2017. All Rights Reserved Page 25
Technical Review on Different Applications in VANET Pallavi Agarwal
JoMTRA (2017) 21-30 © STM Journals 2017. All Rights Reserved Page 26
Journal of Multimedia Technology & Recent Advancements
Volume 4, Issue 3
ISSN: 2349-9028 (Online)
their addresses, and forwards packets (when could stay with the original and be forwarded
possible) in a very greedy manner towards the once later to enhance reliability. Some
destination. The most broadly illustrious straightforward implementations, e.g., two
proposal is GFG/GPSR [17]. One in all the nodes exchange information whenever they
key challenges in geographic routing is the will communicate [24], work well if the
method to accomplish dead-ends, wherever information needs to be propagated to
greedy routing fails as a result of a node has everyone. However, they're inefficient if a
no neighbor closer to the destination; a range message is to be delivered to some specific
of ways (such as perimeter routing in receivers, e.g., those in a very sure region.
GPSR/GFG) is projected for this. A lot of During this case, it's a lot of economical to
recently, GOAFR+ [18] proposes a technique forward messages in a very methodical that
for routing around voids that's each they migrate nearer to the eventual destination,
asymptotically worst case ideal in addition to and not others.
average case economical. Geographic routing
is scalable, as nodes solely keep state for his or SECURITY CHALLENGES IN
her neighbors, and supports an entirely general VANETS
any-to-any communication pattern without The challenges of security should have
explicit path formation. This forwarding throughout the design of VANET
strategy can be utilized in VANETs for each architectures, security protocols,
unicasting and multi-casting [19]. cryptographic, algorithms, etc. There are some
security challenges in VANET.
Trajectory Forwarding
This mechanism [20] directs messages on Real-time Constraint
predefined trajectories. It absolutely was VANET is time essential where security
presented to work well in a very dense associated message must be conveyed with
network. Despite their sparseness, V2V 100 ms transmission delay. Hence fast
networks have to be a natural application of cryptographic algorithm must be utilized to
trajectory-based forwarding as a result of realize real-time constraint.
messages are moving on the road graph.
Trajectory forwarding will facilitate limit Data Consistency Liability
information propagation in specific ways and VANET even validate node will perform
therefore, scale back message overhead. A malicious activities that can cause accidents or
forwarding trajectory is such as a path covering disturb the network. Consequently, the
from the source to the destination area. The correlation between the received information
street organize is preoccupied with a from an alternate node on particular
coordinated chart with hubs speaking to information could maintain a strategic distance
crossing points and edges speaking to street from this kind of irregularity.
fragments. Geological sending tries to draw the
message topographically closer to the goal. For Low Tolerance for Error
a specially appointed system conveyed in an A number of the protocols are designed with
extremely two-dimensional space, the idea of possibility. VANET uses life
topographical separation is regularly delineated essential information on that action is
as Cartesian separation [21]. In any case, in performed in terribly short time and little error
V2V systems geological separation ought to be in probabilistic algorithmic could cause
sketched out as diagram remove [22]. damage.
JoMTRA (2017) 21-30 © STM Journals 2017. All Rights Reserved Page 27
Technical Review on Different Applications in VANET Pallavi Agarwal
keys in several ways and public key Driver privacy is a very important issue in
infrastructure trust on CA becomes a major communications. Drivers do not wish their
issue. Thus, the distribution of keys among personal and private info to be accessible by
vehicles may be a major challenge in coming others. Since the vehicle info similar to
up with a security protocol. location, speed, time and other vehicle
knowledge are transmitted via wireless
Incentives communication. Among this information,
Manufacturers need to make applications that driver's location and tracing vehicle
client like most. Only a few of the customers movements are a lot of sensitive and should be
can consider a vehicle that automatically taken into consideration carefully.
reports any traffic rule violation. Hence
successful consumption of vehicular networks Non-Repudiation
will require incentives for vehicle makers, A sender should not deny that he/she does not
consumers and therefore, the government may transmit the message whenever an
be a challenge to implement security in investigation or the identity of a vehicle is
VANET. needed. For, e.g., when the message is sent,
the vehicle didn’t deny sending the message
SECURITY REQUIREMENTS IN this can be referred to as sender non-
VANET repudiation. Additionally, when receiving a
In this segment, we deliver security message, the vehicle shouldn't deny having
requirements for VANETs. In order to possess received the message this can be referred to as
a secure and dependable network, a variety of receiver non-repudiation.
security needs should be considered. An
amount of these security requirements is Availability
identical for all networks, however, some are The network has to be accessible even if it is
valid and precise to vehicular networks solely. controlled by an attacker while not affecting
There are numerous essential necessities for its performance. For, e.g., the services
achieving security in VANETs [25]. provided by the RSU have to be accessible to
the vehicles whenever it is needed.
Authentication
Vehicles have to respond solely to the message Confidentiality
transmitted by the legitimate member of the Since safety in networks is related to security,
network, authentication ensures that the all network users have to usually have full
message is generated by the legitimate user. access to network information, i.e. traffic
Thus, it is very important to certify the sender information, road conditions, etc. in order to
of a message. Despite the shortage of form informed action. Since messages in
confidentiality, network nodes should be VANETs do not contain any sensitive info and
authenticated so as to be ready to send are not confidential, there's no want for secret
messages through the network. Before writing and confidentiality isn't a very
responding to messages and events a vehicle important issue. Therefore, vehicular networks
should check the authenticity of the message do not have to be protected against
and its sender, so there's a desire for eavesdropping. However, network data have to
authentication. While no authentication, be sent from an authenticated node and this
illegitimate and malicious users will inject could be done by source authentication.
false messages into the network and confuse
different vehicles by distributing false Integrity
information. With authentication, vehicles will All messages that are sent and received on the
merely drop messages from unauthenticated network should be protected against alteration
users. attacks. A protected vehicular network has to
suggest protection against message alteration.
Privacy A message will be transformed in numerous
The profile or a driver’s personal details must ways throughout its transfer from source to
be maintained against unauthorized access. destinations.
JoMTRA (2017) 21-30 © STM Journals 2017. All Rights Reserved Page 28
Journal of Multimedia Technology & Recent Advancements
Volume 4, Issue 3
ISSN: 2349-9028 (Online)
JoMTRA (2017) 21-30 © STM Journals 2017. All Rights Reserved Page 29
Technical Review on Different Applications in VANET Pallavi Agarwal
JoMTRA (2017) 21-30 © STM Journals 2017. All Rights Reserved Page 30