You are on page 1of 10

PERI INSTITUTE OF TECHNOLOGY

INNOVATION X 2024
REVIEW - 1
Privacy and Security Data Acquisition in VANET using
vehicle-assisted data delivery (VADD)

Prepared By,
Name of the faculty 1: Athirayan .S
Name of the faculty 2:Noble Lourdhu Raj S.R

DATE : 26-12-2023
Brief Problem Statement:
Inter vehicular communication lies at the core of a number of industry and academic research initiatives
that aim at enhancing the safety and efficiency of transportation systems. Vehicular ad hoc networks
(VANETs) enable vehicles to communicate with each other and with roadside units (RSUs).
Service oriented vehicular networks are special types of VANETs that support diverse infrastructure-based
commercial services, including Internet access, real-time traffic management, video streaming, and
content distribution.
Many forms of attacks against service oriented VANETs that attempt to threaten their security have
emerged. The success of data acquisition and delivery systems depends on their ability to defend against
the different types of security and privacy attacks that exist in service-oriented VANETs. This paper
introduces a system that takes advantage of the RSUs that are connected to the Internet and that provide
various types of information to VANET users
Summary of Literature survey

Name of Author Title of Literature Key findings

Mohandas.B, A service discovery Vehicular network is an emerging wireless network


Nayak.A, Naik.K, approach for vehicular ad where vehicles and roadside units are the
and Goel.N hoc networks,” communicating nodes, which provides information
with each other such as safety warning, traffic
information and the services available in region.
There are numerous service providers available in the
network providing various services, vehicles can get
benefit from them. Service discovery protocols enable
the vehicles to discover service provider in their
region of interest providing desired service.
Summary of Literature survey

Name of Author Title of Literature Key findings

Biswas.S, Misic.J, ID-based safety message In this paper, a security system for VANETs to
and Misic.J, authentication for security achieve privacy desired by vehicles and traceability
and trust in vehicular required by law enforcement authorities, in addition to
networks satisfying fundamental security requirements
including authentication, non repudiation, message
integrity, and confidentiality. Moreover, I propose a
privacy-preserving defense technique for network
authorities to handle misbehavior in VANET access,
considering the challenge that privacy provides
avenue for misbehavior.
Name of Author Title of Literature Key findings

El Ali.F and A light architecture for . In this paper, an architecture designed for
Ducmythial.B opportunistic vehicle-to- opportunistic vehicles to infrastructure
infrastructure communication. This light architecture allows to
communications transfer data from the vehicles to the infrastructure
through IPv4 or IPv6 connections using 4G networks
or WiFi access points, depending on their availability.
It relies on any VANET routing protocol like geocast
or conditional based routing instead of traditional
routing. I use conditional transmissions to benefit
from its intrinsic discovery facilities, in order to find a
gateway towards the infrastructure and the
architecture, its implementation and my road test
beds, allowing to conclude on the interest of such an
architecture that allows to exploit already installed
net- works.
Name of Author Title of Literature Key findings

Li.C.T, Hwang.M. A secure and efficient This proposed scheme not only accomplishes vehicle-
S and Chu.Y. P communication scheme to-vehicle and vehicle-to-roadside infrastructure
with authenticated key authentication and key establishment for
establishment and privacy communication between members, but also integrates
preserving for vehicular ad blind signature techniques into the scheme in allowing
hoc networks mobile vehicles to anonymously interact with the
services of roadside infrastructure. I also show that
my scheme is efficient in its implementation on
mobile vehicles in comparison with other related
proposals. A secure and efficient communication
scheme for vehicular ad hoc networks is proposed.
Name of Author Title of Literature Key findings

Lochert.C, Data aggregation and This proposed scheme not only accomplishes vehicle-
Scheuermann.B,Iitz roadside unit placement to-vehicle and vehicle-to-roadside infrastructure
er.C,Luebke.A,and for a VANET traffic authentication and key establishment for
Mauve information system,” communication between members, but also integrates
blind signature techniques into the scheme in allowing
mobile vehicles to anonymously interact with the
services of roadside infrastructure. I also show that my
scheme is efficient in its implementation on mobile
vehicles in comparison with other related proposals. A
secure and efficient communication scheme for
vehicular ad hoc networks is proposed.
Name of Author Title of Literature Key findings

Papadimitratos.P, Secure vehicular The concepts of memory-hard algorithms and


Buttyan.L, communication systems: sequential memory-hard functions, and argue that in
Holczer.T, Schoch.E Design and architecture order for key derivation functions to be maximally
secure against attacks using custom hardware, they
should be constructed from sequential memory-hard
functions.
THANK YOU

You might also like