You are on page 1of 11

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/323150609

Technical Review on Different Applications, Challenges and Security in


VANET

Article · November 2017

CITATIONS READS

9 2,242

1 author:

Pallavi Agarwal

6 PUBLICATIONS   17 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Vehicular Ad Hoc Network View project

All content following this page was uploaded by Pallavi Agarwal on 13 February 2018.

The user has requested enhancement of the downloaded file.


Journal of Multimedia Technology & Recent Advancements
ISSN: 2349-9028 (Online)
Volume 4, Issue 3
www.stmjournals.com

Technical Review on Different Applications, Challenges


and Security in VANET
Pallavi Agarwal*
Department of Computer Science and Engineering, Madhav Institute of Technology and Science,
Gwalior, Madhya Pradesh, India

Abstract
Vehicular ad-hoc networks (VANETs) technology has turned out as a vital research field
throughout the most recent couple of years. VANETs are the likely an impacting way to deal
with giving security of driver and different applications for the activity conditions and
additionally travelers. Being dynamic in nature, it created the network, according to the
condition and requirement of the users and provides consistent communication between the
vehicles. Due to its excessive advantages, it is highly susceptible to numerous attacks and
security in VANET should be taken into consideration. This paper presented the security
issues such as authenticity, integrity, availability, confidentiality, anonymity and non-
repudiation to provide the secure communication between Vehicle-to-Vehicle (V2V) and
Vehicle-to-Infrastructure (V2I). Numerous research works have been done to recover the
performance and security of this network. The fundamental point of this paper is the several
security challenges and the applications of VANETs.

Keywords: MANET, Overview of VANETs, ITS, Applications, Challenges and Security

*Author for Correspondence E-mail: pallaviagarwal015@gmail.com

INTRODUCTION drivers. Security systems have to make sure


VANET might be a specific category of that transmission comes from an approved
Mobile Ad-Hoc Network (MANET) that offers source and not interfered in the path by
communication between the vehicles and the different sources. Security frameworks need to
vehicles and roadside infrastructure. VANET ensure that transmission originates from an
differs from MANET because it provides approved source and not altered in the course
advanced quality of nodes, bigger scale by various sources.
networks, geographically unnatural topology
and frequent network fragmentation. There are Accidents can be avoided if the vehicles follow
no fixed infrastructure networks and have the traffic rules and road limit. The malicious
confidence the vehicles themselves for node could spread out spam messages and send
implementing any network practicality. A false messages to make matters like false data
VANET may be a reorganized network as each of collision and theft and heavy traffic.
node accomplishes the functions of host and VANET has become a rising space of
router. investigation. Researchers have put lots of
efforts [2] in this field to create the robust plan
It is the technology [1] of building a secure and the implementation of VANET network
network between vehicles, i.e., vehicles environment. With the expanding amount of
communicate to every alternative and pass the vehicles, streets can most likely get more
information to another vehicle. The most rushful. Therefore, it is exceptionally important
favorable position of VANET communication to expand street protection and decrease
is the enhanced driver's safety by virtue of movement blockage. In VANET, the
exchanging warning messages among vehicles. communication is built up by exchanging the
VANET security is essential because of an refreshed data about the street and movement
inadequately planned VANET is vulnerable to conditions to avoid road accidents and efficient
organize to network attacks and this result of traffic. VANET is utilized to give the
successively compromises the protection of assurance and movement reports to the clients

JoMTRA (2017) 21-30 © STM Journals 2017. All Rights Reserved Page 21
Technical Review on Different Applications in VANET Pallavi Agarwal

about congested driving conditions, road network, some need roadside units
earthquake, tsunami, etc. for lessening the road exclusively at intersections, while others
accidents, fuel consumption and provides safe require roadside units solely at region borders.
driving atmosphere. Figure 1. shows the In spite of the fact that it's safe to expect that
infrastructure of MANET and VANET. infrastructure exists to some extent and
vehicles have access to that occasionally.
OVERVIEW OF VANET
Intelligent Transportation Systems (ITSs) The probable communication structure of
In intelligent transportation systems, each intelligent transportation frameworks integrates
vehicle broadcast data [3] to the vehicular inter-vehicle and vehicle-to-roadside
network or transportation company by having communications. Inter-vehicle and vehicle-to-
the part of the sender, receiver, and the router roadside communications rely upon exact and
by using the data to authenticate safe, free-flow forward information with respect to the
of traffic. Vehicles should be equipped with a neighboring geographical area, which in turn,
few variations of radio interface or Onboard needs the employment of accurate positioning
Unit (OBU) for communication to occur systems and elegant communication protocols
between vehicles and Road Side Units (RSUs) for exchanging data. In this network, the
that enables ad hoc short-range wireless communication medium [5] is shared,
networks to be created [4]. Vehicles should extremely undependable, and with constrained
even be fitted with hardware that permits the bandwidth. The elegant communication
data with the precise location of the vehicle protocols should guarantee quick and reliable
such as Global Positioning System (GPS) or a delivery of information to all or any vehicles
Differential Global Positioning System within the section. It's worth remarkable that
(DGPS) receiver. RSUs are immobile and are Intra vehicle communication uses technologies
associated with the backbone network, which such as IEEE 802.15.1 (Bluetooth), IEEE
should be in place to encourage 802.15.3 (Ultra-wide Band) and IEEE 802.15.4
communication. The distribution and number (Zigbee) that may be used to support wireless
of roadside units should be relying on the communication within a vehicle, however, this
communication protocol is to be used. Be that can be outside the scope of this paper and
as it may, a few protocols need roadside units cannot be mentioned additional.
to be allocated similarly throughout the full

Fig. 1: Architecture of MANET and VANET.

JoMTRA (2017) 21-30 © STM Journals 2017. All Rights Reserved Page 22
Journal of Multimedia Technology & Recent Advancements
Volume 4, Issue 3
ISSN: 2349-9028 (Online)

Inter-vehicle Communication driving, intersection collision warning, and


The inter-vehicle communication design lane modification assistance [7]. There are two
utilizes multi-hop multi-cast/broadcast to varieties of safety messages flow into within
spread traffic activity associated data over the control channel, (e.g., of DSRC) and might
numerous hops to an extensive number be classified depending on, however, they're
receiver. In an intelligent transportation generated: event-driven and periodic. The
system, vehicles want to solely be concerned primary ones are the results of the detection of
with activity on the road ahead and very rates an unsafe position, (e.g., an automobile crash,
and increased delivery times [6]. Intelligent the proximity of vehicles at high speed, etc.).
broadcasting with implicit acknowledgment Periodic messages instead may be seen as
addresses the issues characteristic in naïve preventive messages in terms of safety, and
broadcasting by limiting the quantity of their info can also be utilized by alternative
messages broadcast for a given emergency (non-safety) applications, (e.g., traffic
event. If the event-detecting vehicle receives an monitoring) or protocols, (e.g., routing).
analogous message from behind, it accepts that
a smallest of one vehicle has received it in the Periodic message exchange (also known as
back and ceases broadcasting. The idea is that beaconing) is required to form vehicles aware
the vehicle in the back will be liable for of their surroundings. Thus, they'll be ready to
moving the message on to the remainder of the avoid an emergency or unsafe thing even
vehicles. If a vehicle receives a message from a before they seem. Therefore, beacon messages
lot of than one supply it'll act on the primary primarily contain the state of the sending
message solely. vehicle, i.e., position, direction, speed, etc., and
also aggregated information relating to the state
Vehicle-to-roadside Communication of their neighbors. It is affordable to assume
The vehicle-to-roadside communication that these periodic messages can be sent in a
configuration characterizes one-hop broadcast very broadcast fashion since the messages'
wherever the roadside unit sends a broadcast content will be helpful for all vehicles around.
message to all or any equipped vehicles in the Within the following, we tend to return to
segment. Vehicle-to-roadside communication discuss the previous connected works making
configuration offers a high bandwidth link an attempt to provide safety applications.
between vehicles and roadside units. The
roadside units could also be placed each MAC Layer Issues
kilometer or less, enabling higher data rates to As stated before, event-driven messages have
be maintained in serious traffic. Let's say, once to have higher priority than periodic and
broadcasting dynamic speed limits, the comfort messages. Therefore, some
roadside unit can verify the acceptable mechanisms for service differentiation and
regulation, according to its internal timetable admission management are required. Within
and traffic conditions. The roadside unit can the alternative words, we tend to may outline
periodically broadcast a message containing three levels of priority: event-driven safety
the regulation and can compare any geographic messages, beaconing safety messages and
or directional limits with vehicle knowledge to comfort messages, in decreasing order.
see if a speed limit warning applies to any of Therefore, in the beginning, the analysis and
the vehicles within the section. If a vehicle trade community should have standardized
violates the specified regulation, a broadcast is typical for MAC layer in VANETs. There are
delivered to the vehicle within the type of some promising MAC techniques for future
auditory or visual warning, requesting that the VANETs [8].
driver reduce his speed.
Message Dissemination
APPLICATIONS OF VANET As a result of specific characteristics of safety
Safety Applications messages, broadcasting might be the single
Examples of vehicle-to-vehicle safety possible means for message exchange.
communication might include collision Therefore, it might be possible to have
warning, road obstacle warning, cooperative complete coverage of all or any relevant

JoMTRA (2017) 21-30 © STM Journals 2017. All Rights Reserved Page 23
Technical Review on Different Applications in VANET Pallavi Agarwal

vehicles. Message forwarding will enable to move, radio channel characteristics vary and
spread the warning message to all vehicles users might be a part of or leave the network.
outside the radio transmission range of a single It's accepted that once user density is low, a
hop [9]. high proportion of nodes could also be isolated
or form isolated clusters. It's possible to
Clustering influence this problem by increasing
A neighbor of the vehicles should be clustered transmission power, so the nodes can
into manageable units, is crucial to realize communicate in less population. On the other
economical and reliable safety hand, if the user density is just too high, nodes
communications. Without boundary lines have to compete for radio transmission
among vehicles: resources and also the average quantity of
• Several vehicles will interfere with one radio capacity per user could also be too small.
another in contention for transmissions in This problem will be approached by reducing
radio bandwidth. the transmission power so, in a given area,
• All messages might propagate all over, fewer nodes can compete for the radio
flooding the system with messages. channel.

Although within the literature [10] there are Security Applications


several clustering algorithms planned in a Besides above applications, there are many
vehicle network, wherever nodes could also be other applications which are also related to the
densely settled and lined on roadways, the safety of the vehicles or the drivers. These
traditional clustering methods might not be applications handle all safety connected
effective to make economical groups and problems like road conditions, atmospheric
organize vehicles in clusters. Chen and Cai condition, monitor alternative vehicles within
[11] planned a completely unique grouping the network, etc. Some of the security
(clustering) technique for VANETs called applications are mentioned below:
Local Peer Groups (LPG). There are two Emergency Electronic Brake Light (EEBL)
alternatives for the proposed grouping they are The Emergency Electronic brake light (EEBL)
static and dynamic LPG. Also, application application permits a vehicle to broadcast a
level clustering has been mentioned by self-generated emergency event to encompass
Reumerman et al. [12] that considers the vehicles. Upon receiving the event data, the
concern of cluster managing in the application receiving vehicle determines the relevancy of
layer. the event and if applicable, provides a warning
to the driver so as to avoid a crash. This
Power Assignment application is especially helpful once the
However, mobile nodes exchange information driver's line of sight is blocked by alternative
with their neighbors and network topology is vehicles or terrible weather conditions, (e.g.,
formed. The topology varies with time as users fog, significant rain).

Fig. 2: Emergency Braking.

JoMTRA (2017) 21-30 © STM Journals 2017. All Rights Reserved Page 24
Journal of Multimedia Technology & Recent Advancements
Volume 4, Issue 3
ISSN: 2349-9028 (Online)

Once a vehicle brake toughly, the EEBL Road Hazard Control Notification
application conveys this data to This application informs the vehicles
surrounding vehicles via one or additional concerning the geographical features of the
Basic Safety Messages. The current brake road resembling having a pointy curve ahead
lamp goes on once the driver applies the or occurrence of a landslide, etc. Sensors are
brake (Figure 2). The EEBL application won't often mounted on RSU to capture data
solely enhance the range, however, conjointly concerning wild animals within the roads
may give necessary information like running through forests. There could also be
acceleration/deceleration rate and time taken. cases, once dangerous animals cross the road
or halt on the road the data are often broadcast
At present, brake lamps do not differentiate
to the encircling vehicles so the vehicles will
levels of speed and are solely helpful as so be prevented from moving ahead.
much rearward as the line of sight permits.
This application is extremely crucial to Cooperative Collision Warning
prevent the crash. First two cars concerned in Cooperative Collision Warning (CCW), that
an accident could take profit from EEBL, provides a dynamic safety mechanism for
however, the remainder of the cars within the vehicles on highways, is enforced by
network will avoid the crash. exchanging static and dynamic vehicle
parameters with neighboring vehicles through
Post Crash Notifications inter-vehicle wireless communications.
Vehicles met with accidents will broadcast Received info isn't solely used for calculating
messages about its position to neighboring the relative safety distance between
vehicles (Figure 3). It will send messages to neighboring (Figure 4). The CCW conception
the highway patrol for seeking more help provides warnings or position awareness
[13]. displays to drivers based on info concerning
the motions of neighboring vehicles obtained
Collision Avoidance by wireless communications from those
Improving collision avoidance application vehicles, while not use any sensors. Collision
reduces road accidents to a good extent. By Warning Systems share a typical need: the
vehicle must realize the locations and motions
mounting sensors at the RSU information are
of all the neighboring vehicles, representing
often collected, processed and warning the state of the vehicle neighborhood.
messages are often forwarded to the vehicles
to avoid a collision. Various ways are often Slow/Stop Vehicle Advisor
followed to avoid collision like to warn A slow or a halted vehicle will send warning
vehicles concerning violating traffic signals, signals/messages to the encircling vehicles
low bridge warning, wrong side driving alert within the network [13].
etc.

Fig. 3: Post Warning.

JoMTRA (2017) 21-30 © STM Journals 2017. All Rights Reserved Page 25
Technical Review on Different Applications in VANET Pallavi Agarwal

Fig. 4: Cooperative Warning.

Comfort Applications represented before in this paper, data


Generally, four services that have immediate dissemination, especially, comfort messages
application for comfort problems are unicast, come in the shadow of a category of routing
multi-cast, anycast and scan. Consider a methods which treat the matter in distributed
vehicle want to get information regarding networks. Within the following, we tend to in
some remote region, the vehicle/controller short introduce these algorithms and
needing the knowledge initial queries its own investigate their relevance to VANETs. Data
proximity (multi-cast) to see if a nearby delivery in ad-hoc network heavily depends on
vehicle happens to have this info. Any vehicle the routing protocol, that has been extensively
having such info can respond (unicast with studied for several years.
approximate/precise location). If no one
replies among an explicit quantity of your Since the network diameter in VANETs is
time, the vehicle/controller sends a question to comparatively tiny, there have to be alternative
any vehicle within the remote region (anycast). methods for information delivery in-vehicle
Receivers within the remote region with this networks and ancient algorithms are not
information will respond. The response is applicable. To manage disconnections on
disseminated as unicast with the distributed ad hoc networks, researchers [14]
approximate/precise location, or multi-cast if adopt the concept of carrying and forward,
caching is desired. wherever nodes carry the packet once routes
do not exist, and forward the packet to the new
Another application is mobile web access. receiver that moves into its section. There
Fixed location web gateways could also be exist three vital classes of information delivery
placed on roads. A vehicle wants to access the protocols which might be utilized in
net initial propagates a question through a companion with carrying and forward
locality for gateways (scan). Gateways mechanism in VANETs: Geographical
receiving the query will reply to the requesting forwarding, Trajectory Forwarding,
vehicle (unicast with approximate location). Opportunistic forwarding, that are mentioned
The requesting vehicle picks one responder in short in following. In addition, recently
and begins to move with it. The some algorithms are conferred that use the mix
communication from the vehicle to the of 2 or 3 of the mentioned mechanisms
gateway is unicast with precise location while [15,16].
the reverse direction is unicast with an
approximate location. Because of distinctive Geographic Forwarding
networking characteristics of VANETs as Geographic routing uses nodes’ positions as

JoMTRA (2017) 21-30 © STM Journals 2017. All Rights Reserved Page 26
Journal of Multimedia Technology & Recent Advancements
Volume 4, Issue 3
ISSN: 2349-9028 (Online)

their addresses, and forwards packets (when could stay with the original and be forwarded
possible) in a very greedy manner towards the once later to enhance reliability. Some
destination. The most broadly illustrious straightforward implementations, e.g., two
proposal is GFG/GPSR [17]. One in all the nodes exchange information whenever they
key challenges in geographic routing is the will communicate [24], work well if the
method to accomplish dead-ends, wherever information needs to be propagated to
greedy routing fails as a result of a node has everyone. However, they're inefficient if a
no neighbor closer to the destination; a range message is to be delivered to some specific
of ways (such as perimeter routing in receivers, e.g., those in a very sure region.
GPSR/GFG) is projected for this. A lot of During this case, it's a lot of economical to
recently, GOAFR+ [18] proposes a technique forward messages in a very methodical that
for routing around voids that's each they migrate nearer to the eventual destination,
asymptotically worst case ideal in addition to and not others.
average case economical. Geographic routing
is scalable, as nodes solely keep state for his or SECURITY CHALLENGES IN
her neighbors, and supports an entirely general VANETS
any-to-any communication pattern without The challenges of security should have
explicit path formation. This forwarding throughout the design of VANET
strategy can be utilized in VANETs for each architectures, security protocols,
unicasting and multi-casting [19]. cryptographic, algorithms, etc. There are some
security challenges in VANET.
Trajectory Forwarding
This mechanism [20] directs messages on Real-time Constraint
predefined trajectories. It absolutely was VANET is time essential where security
presented to work well in a very dense associated message must be conveyed with
network. Despite their sparseness, V2V 100 ms transmission delay. Hence fast
networks have to be a natural application of cryptographic algorithm must be utilized to
trajectory-based forwarding as a result of realize real-time constraint.
messages are moving on the road graph.
Trajectory forwarding will facilitate limit Data Consistency Liability
information propagation in specific ways and VANET even validate node will perform
therefore, scale back message overhead. A malicious activities that can cause accidents or
forwarding trajectory is such as a path covering disturb the network. Consequently, the
from the source to the destination area. The correlation between the received information
street organize is preoccupied with a from an alternate node on particular
coordinated chart with hubs speaking to information could maintain a strategic distance
crossing points and edges speaking to street from this kind of irregularity.
fragments. Geological sending tries to draw the
message topographically closer to the goal. For Low Tolerance for Error
a specially appointed system conveyed in an A number of the protocols are designed with
extremely two-dimensional space, the idea of possibility. VANET uses life
topographical separation is regularly delineated essential information on that action is
as Cartesian separation [21]. In any case, in performed in terribly short time and little error
V2V systems geological separation ought to be in probabilistic algorithmic could cause
sketched out as diagram remove [22]. damage.

Opportunistic Forwarding Key Distribution


This system as instructed by Chen et al. [23], All the VANET security mechanisms that are
targets networks wherever an end-to-end path enforced are dependent on keys. The messages
cannot be accepted to exist. Messages are have to be required to be encrypted and
holding on and forwarded as opportunities decrypt at receiver side either with the same
present themselves. Once a message is key or different key. Additionally, the
forwarded to a different node, a duplicate completely different manufacturer will install

JoMTRA (2017) 21-30 © STM Journals 2017. All Rights Reserved Page 27
Technical Review on Different Applications in VANET Pallavi Agarwal

keys in several ways and public key Driver privacy is a very important issue in
infrastructure trust on CA becomes a major communications. Drivers do not wish their
issue. Thus, the distribution of keys among personal and private info to be accessible by
vehicles may be a major challenge in coming others. Since the vehicle info similar to
up with a security protocol. location, speed, time and other vehicle
knowledge are transmitted via wireless
Incentives communication. Among this information,
Manufacturers need to make applications that driver's location and tracing vehicle
client like most. Only a few of the customers movements are a lot of sensitive and should be
can consider a vehicle that automatically taken into consideration carefully.
reports any traffic rule violation. Hence
successful consumption of vehicular networks Non-Repudiation
will require incentives for vehicle makers, A sender should not deny that he/she does not
consumers and therefore, the government may transmit the message whenever an
be a challenge to implement security in investigation or the identity of a vehicle is
VANET. needed. For, e.g., when the message is sent,
the vehicle didn’t deny sending the message
SECURITY REQUIREMENTS IN this can be referred to as sender non-
VANET repudiation. Additionally, when receiving a
In this segment, we deliver security message, the vehicle shouldn't deny having
requirements for VANETs. In order to possess received the message this can be referred to as
a secure and dependable network, a variety of receiver non-repudiation.
security needs should be considered. An
amount of these security requirements is Availability
identical for all networks, however, some are The network has to be accessible even if it is
valid and precise to vehicular networks solely. controlled by an attacker while not affecting
There are numerous essential necessities for its performance. For, e.g., the services
achieving security in VANETs [25]. provided by the RSU have to be accessible to
the vehicles whenever it is needed.
Authentication
Vehicles have to respond solely to the message Confidentiality
transmitted by the legitimate member of the Since safety in networks is related to security,
network, authentication ensures that the all network users have to usually have full
message is generated by the legitimate user. access to network information, i.e. traffic
Thus, it is very important to certify the sender information, road conditions, etc. in order to
of a message. Despite the shortage of form informed action. Since messages in
confidentiality, network nodes should be VANETs do not contain any sensitive info and
authenticated so as to be ready to send are not confidential, there's no want for secret
messages through the network. Before writing and confidentiality isn't a very
responding to messages and events a vehicle important issue. Therefore, vehicular networks
should check the authenticity of the message do not have to be protected against
and its sender, so there's a desire for eavesdropping. However, network data have to
authentication. While no authentication, be sent from an authenticated node and this
illegitimate and malicious users will inject could be done by source authentication.
false messages into the network and confuse
different vehicles by distributing false Integrity
information. With authentication, vehicles will All messages that are sent and received on the
merely drop messages from unauthenticated network should be protected against alteration
users. attacks. A protected vehicular network has to
suggest protection against message alteration.
Privacy A message will be transformed in numerous
The profile or a driver’s personal details must ways throughout its transfer from source to
be maintained against unauthorized access. destinations.

JoMTRA (2017) 21-30 © STM Journals 2017. All Rights Reserved Page 28
Journal of Multimedia Technology & Recent Advancements
Volume 4, Issue 3
ISSN: 2349-9028 (Online)

Authorization (VANETs) - An Overview and


Authorization is on a better level enforced by Challenges, J Wireless Netw Commun.
access control that it is outlined by network 2013; 3(3): 29–38p.
policies. Authorization defines the role of a 3. Jinyuan S, Chi Z, Yuguang F. An ID-
node within the network which includes the based Framework Achieving Privacy and
kinds of messages a node will read or write on Non-repudiation, In Proceedings of IEEE
the network, actions it's allowed to require and vehicular ad hoc networks, military
generally the protocols that it will execute. communications conference (MILCOM
2007), October 2007, 1–7p.
Anonymity 4. Antonios Stampoulis, Zheng Chai, A
Anonymity defines the requirement that Survey of Security in Vehicular Networks,
network nodes must not be prepared to Available at:
suppose if a node achieved or can accomplish http://zoo.cs.yale.edu/~ams257/projects/wi
some specific action in the future. So as to reless-survey.pdf, (2007).
stop such inferences, there should be an equal 5. Balon N. Introduction to Vehicular ad hoc
probability of doing a selected action by all Networks and the Broadcast Storm
nodes or have robust probabilistic anonymity, Problem, Available at:
with the chances being equal for all nodes. By http://www.csie.ntpu.edu.tw/~yschen/cour
not necessitating a vehicle to authenticate with se/96-2/Wireless/papers/broadcast-5.pdf,
its authentic identity to dissimilar vehicles to (2006).
which it sends data. 6. Bickel G. Inter/intra-vehicle wireless
communication, Available at:
CONCLUSION http://userfs.cec.wustl.edu/~gsb1/index.ht
VANET provides the communication within ml#toc2008.
the network and there are various methods 7. Yang X, Liu J, Zhao F. A Vehicle-to-
which are used to deliver the messages among Vehicle Communication Protocol for
the vehicles. In this paper, we considered the Cooperative Collision Warning,
outline of the VANET which defines the MobiQuitous'04, 2004.
communication systems. Security is one of the 8. Borgonovo F, Campelli L, Cesana M, et
chief matters in the field of communication al. MAC for Ad-Hoc Inter-Vehicle
and to implement in the VANET. In this Network: Services and Performance, IEEE
paper, the various applications related to the VTC, 2003.
VANET, security challenges and requirements 9. Ming-Fong Tsai, Yung-Cheng Chao, Lien-
and challenges to employing the measure of Wu Chen, et al. Cooperative Emergency
security in the VANET. Among all Braking Warning System in Vehicular
prerequisite authentication and privacy are the Networks, EURASIP J Wireless Commun
main matters in VANET. However, Netw, DOI: 10.1186/s13638-015-0262-0,
confidentiality is not essential in the VANET February 2015.
because normally packets on the network do 10. Yu JY, Chong PHJ. A Survey of
not comprise any confidential information. Clustering Schemes for Mobile Ad Hoc
The main goals of the structure of VANETs Networks, IEEE Communications Surveys
should be broad applicability, node privacy, and Tutorials, First Quarter 2005, 7(1):
strong authentication, proficient group 32–48p.
management, and data verification. 11. Chen W, Cai S. Ad Hoc Peer-to-Peer
Network Architecture for Vehicle Safety
REFERENCES Communications, IEEE Communications
1. Md Mahbubul Haque, Jelena Misic, Magazine, April 2005; 43(4): 100–107p.
Vojislav Misic, et al. Vehicular Network 12. Hans J. Reumerman, Roggero M, Ruffini
Security, Encyclopedia of Wireless and M. The Application-based Clustering
Mobile Communications, second edition, Concept and Requirements for
2013. Intervehicle Networks, IEEE
2. Sabih ur Rehman, Arif Khan M, Tanveer Communications Magazine, April 2005;
A. Zia, et al. Vehicular Ad-Hoc Networks 43(4): 108–113p.

JoMTRA (2017) 21-30 © STM Journals 2017. All Rights Reserved Page 29
Technical Review on Different Applications in VANET Pallavi Agarwal

13. Bharathi Mishra, Security in Vehicular Ad 21. Mauve M, Widmer A, Hartenstein H. A


Hoc Networks: A Survey, Proceedings of Survey on Position-Based Routing in
the 2011 International Conference on Mobile Ad Hoc Networks, IEEE Network,
Communication, Computing & Security, 15(6), 2001.
2011, 590–595p. 22. Tian J, Stepanov I, Rothermel K. Spatial
14. Davis J, Fagg A, Levine B. Wearable Aware Geographic Forwarding for Mobile
Computers as Packet Transport Ad Hoc Networks, University of Stuttgart,
Mechanisms in Highly-partitioned ad-hoc 2002.
Networks, in International Symposium on 23. Zong Da Chen, Kung HT, Dario Vlah, Ad
Wearable Computing, October 2001.
Hoc Relay Wireless Networks over
15. Zhao J, Cao G. VADD- Vehicle-Assisted
Data Delivery in Vehicular Ad Hoc Moving Vehicles on Highways, MobiHoc,
Networks, IEEE INFOCOM 2006. 2001, 247–250p.
16. Wu H, Fujimoto R, Guensler R, et al. 24. Abdelmajid Khelil, Christian Becker, Jing
MDDV: Mobility-centric Data Tian, et al. An Epidemic Model for
Dissemination Algorithm for Vehicular Information Diffusion in MANETs, in
Networks, In ACM's VANET, 2004, MSWiM'02, Proceedings of the 5th ACM
Proceedings of the 1st ACM International, international workshop on Modeling
Workshop on Vehicular ad hoc Networks, analysis and simulation of wireless and
47–56p. mobile systems, 2002, 54–60p.
17. Bose P, Morin P, Stojmenovic I, et al. 25. Swapnil G. Deshpande, Classification of
Routing with Guaranteed Delivery in Ad- Security Attack in Vehicular Adhoc
Hoc Wireless Networks, ACM Wireless Network: A Survey, Int J Emerg Trends
Netw. November 2001; 7(6): 609–616p. Tech Comp Sci. March–April 2013; 2(2):
18. Kuhn F, Wattenhofer R, Zhang Y, et al. 371–377p.
Geometric Ad-Hoc Routing: Of Theory
and Practice, in Principles of Distributed
Computing, 2003. Cite this Article
19. Maihofer C, Eberhardt R. Geocast in Pallavi Agarwal. Technical Review on
Vehicular Environments Caching and Different Applications, Challenges and
Transmission Range Control for Improved Security in VANET. Journal of
Efficiency, IEEE Intelligent Vehicles Multimedia Technology & Recent
Symposium, Italy. June 14-17, 2004. Advancements. 2017; 4(3): 21–30p.
20. Dragos Niculescu, Badri Nath, Trajectory
Based Forwarding and Its Applications, in
MobiCom'03, (2003).

JoMTRA (2017) 21-30 © STM Journals 2017. All Rights Reserved Page 30

View publication stats

You might also like