SlideShare a Scribd company logo
1 of 26
VEHICULAR AD-HOC NETWORKs(VANET)
Presented by :
Mayuresh Bhagat
Shubham Khati
Ankita Panchabhai
Priya Mude
CONSIDER THE SITUATIONS?
You are on the way in a car and….
 Wish to know about traffic jam condition at next turn or road
condition ahead.
 Wish to have prior alert, if vehicle in front of you applying breaks.
 Wish to have advance information, if any vehicle meet with an
accidents on the road ahead.
 Wish to know whether the nearby parking area has vacancy or not.
 Wish to avoid accidents in ever increasing traffic conditions
THE ANSWER IS?
VANET
WHAT IS VANET?
 A large self-organized communication network in automobiles referred to as a
Vehicular ad-hoc network (VANET).
 VANET is V2V communication in ad hoc manner that enables the intelligent
transportation system(ITS).
 In a VANET each vehicle periodically broadcasts its geographic information
through GPS.
 The VANET provides an omnipresent computing atmosphere.
System model of VANET
WHY VANET?
 Today’s car accident alert system is not efficient.
 The accident first needs to be physically reported and then announced via a
radio broadcast or a portable GPS unit before a driver is alerted.
 It leads to jams, car collisions and inconvenience in traffic flow as well as for
people.
 Poor traffic monitoring.
KEY MANAGEMENT TECHNIQUES
 Safety Message Broadcast in VANET
 Shared Key Management Framework
 Distributed Key Management Frame
 Efficient Cooperative Message Authentication in Vehicular Ad Hoc
Networks
 RFID authentication
ROUTING PROTOCOL ANALYSIS
A routing protocol specifies how routers communicate with each other and enables
them to select routes between any two nodes on a computer network.
 AODV(Ad hoc on-demand distance vector)
 DSR(Dynamic Source Routing)
 DSDV(Destination-Sequenced Distance-Vector Routing)
AODV(AD-HOC ON-DEMAND DISTANCE VECTOR)
 AODV is a routing protocol that creates routes between nodes only when
the routes are requested by the source nodes.
 This gives the network the flexibility to allow nodes to enter and leave
the network at will.
 AODV is a reactive protocol: the routes are created only when they are
needed.
DSR(DYNAMIC SOURCE ROUTING)
 DSR is a routing protocol for wireless mesh networks.
 It uses source routing supplied by packet’s originator to determine
packet’s path through the network.
 This protocol is truly based on source routing whereby all the routing
information is maintained (continually updated) at mobile nodes.
DSDV(DESTINATION SEQUENCED DISTANCE VECTOR
ROUTING)
 DSDV is one of the early algorithms available for data relay.
 The main contribution of the algorithm was to solve routing loop
problem.
 There is no commercial implementation of this algorithm, since no
formal specification of this algorithm is present.
COMPARISON OF ROUTING PROTOCOLS
parameters AODV DSR DSDV
Definition
Selection of routes
Bandwidth consumption
Packet delivery rate
Latency
This protocol establishes
routes to destinations on
demand and supports
both unicast and
multicast routing.
Destination sequence
numbers are used to find
the latest route .
Good
More
More
This protocol is
specifically designed for
multi-hop ad hoc
networks.
Source routing supplied
by packet’s originator to
determine packet’s path
.
Less than AODV.
Less than AODV
Less than AODV
It is quite suitable for
creating ad hoc
networks with small
number of nodes.
The route with the better
metrics is used if the
latest sequence number
matches the one already
present.
Wastage of bandwidth.
Less than both
Less
ISSUES IN VANET
 The complicated physical domain of VANET incurs many challenging
issues to the cyber domain.
 Frequent broadcast of safety messages from a vehicle along the road may leak the
travelling route of a vehicle, which could be a privacy issue.
 Vehicles communicate with each other through radio over the IEEE 802.11p on 5.9GHz.
 If a vehicle would like to cheat others, it will send false messages.
 For example, a vehicle may claim a traffic jam somewhere; however in fact no traffic jam
happens there.
 The other phrase we will use in the cooperative message authentication is invalid
message.
COOPERATIVE MESSAGE AUTHENTICATION
PROTOCOL(CMAP)
 A cooperative message authentication protocol (CMAP) is developed to
alleviate vehicles' computation burden.
 With CMAP, all the vehicles share their verification results with each other in a
cooperative way, so that the number of safety messages that each vehicle needs
to verify reduces significantly.
 A promising thread of techniques to reduce the computation overhead in
authentication is cooperative authentication.
HOW DOES CMAP WORKS?
 In the CMAP, each vehicle sends periodically broadcasted messages (PBM) which include its
current geographic information every 300 ms.
 When its neighboring vehicles receive the PBM, they will decide whether they are verifiers
of this message.
 If a vehicle is the verifier of the message, it will start to verify the message by itself.
 Once an invalid message is identified, verifiers will broadcast a one hop warning message
to others. Otherwise, verifiers will keep silent.
 Non-verifiers will wait for cooperative warning messages (CWM) from verifiers.
PROCESS IN CMAP TECHNIQUE
COMPUTATION AND COMMUNICATION
OVERHEAD
 Verifying the group signature attached to each broadcast message is the dominating
component that consumes computation capacity.
 In our simulation, we use the average number of verified messages per vehicle per second
as the metric for the computation overhead.
 It is worth noting that CMAP method achieves a much lower missed detection ratio than
the non cooperative authentication with the same computation overhead.
 We have the following observations:
1) Compared with the conventional non-cooperative authentication protocol, our CMAP method achieves
significantly lower computation overhead.
2) The computation overhead of CMAP is independent of vehicle density, while that of the non-cooperative
protocol increases with the density.
Characteristics of VANET
 High Mobility of nodes
 Dynamic Topology
 Unbounded network size
 Frequent exchange of information
 Wireless Communication
 Crucial effect of privacy and security
 Real time , time sensitive data exchange
Safety applications(to enhance driving safety) like :
 EEBL – Emergency Electronic Brake Light(sudden braking)
 PCN – Post Crash Notification
 RFN – Road Feature Notification(ex. Downhill curve)
 LCA – Lane Change Assistance
 CCW – Cooperative Collision Warning
 Blind Merge Assistant and many more…
APPLICATIONS
Convenience Applications (for better driving experience):
 Road Congestion Notification
 Dynamic Route/ Travel Time Planning
 Querying Parking Availability
 Finding Parking Spots
Other Commercial/Infotainment/Telematics Applications:
 Remote Vehicle Diagnostics
 Free Flow Tolling
 Social Networking
 Multimedia Content Exchange
 Advertising
KEY RESEARCH AREAS IN VANET
 Quality of Service (QoS)
 Network Security
 MAC layer protocol
 Scalability and Robustness
 Image processing
 Co-operative Communication
 Mobility model
 Efficient Routing Algorithms Design
 Fault tolerance
MAJOR PLAYERS IN VANET RESEARCH
CONCLUSION
 The CMAP significantly reduces the computation overhead of each
vehicle at the cost of a slightly increased communication
overhead.
 AODV is the most effective algorithm in terms of throughput and
data transmission delay time for mobile ad hoc networks in urban
areas.
 VANET security system achieves privacy, traceability, non frame
ability, and privacy preserving defense against misbehavior.
REFERENCES
[1] Y. Toor and P. Mühlethaler, “Vehicle Ad Hoc Networks: Applications and Related Technical
issues”, IEEE Communications surveys & Tutorials, 3rd quarter, vol. 10, no. 3, (2008), pp. 74-88.
[2] M. Raya and J. P. Hubaux, “Securing vehicular ad hoc networks,” J. Comput. Security, vol. 15, no.
1, pp.39–68, Jan. 2007. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS,
VOL.14, NO. 1, MARCH 2013.
[3] Xiaodong Lin, Xu Li “Achieving Efficient Cooperative Message Authentication in Vehicular Ad-
hoc Network”, IEEE Transactions on Vehicular Technology, volume 62, no. 7, September 2013.
[4] A. Boukerche, “Performance Evaluation of Routing Protocols for Ad Hoc Wireless Networks”,
Mobile Networks and Applications vol. 9, Netherlands, 2004.
[5] Y. Hao, Y. Cheng, C. Zhou, and W. Song, ``A distributed key management framework with
cooperative message authentication in VANETs,'' IEEE J.Sel. Areas Commun., vol. 29, no. 3, pp.
616_629, Mar. 2011.
THANK YOU

More Related Content

What's hot

VANET: Trust and Hashing
VANET: Trust and HashingVANET: Trust and Hashing
VANET: Trust and HashingPallavi Agarwal
 
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc NetworksEMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc NetworksPonmudiselvan.N Selvan
 
Architecture and security in Vanet PPT
Architecture and security in Vanet PPTArchitecture and security in Vanet PPT
Architecture and security in Vanet PPTMeghaj Mallick
 
Performance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocolsPerformance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocolsjournalBEEI
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
 
VANETs Presentation
VANETs PresentationVANETs Presentation
VANETs PresentationiQra Rafaqat
 
Data Aggregation and Dissemination in Vehicular Ad-Hoc Networks
Data Aggregation and Dissemination in Vehicular Ad-Hoc NetworksData Aggregation and Dissemination in Vehicular Ad-Hoc Networks
Data Aggregation and Dissemination in Vehicular Ad-Hoc NetworksMichele Weigle
 
Master Thesis on Vehicular Ad-hoc Network (VANET)
Master Thesis on Vehicular Ad-hoc Network (VANET)Master Thesis on Vehicular Ad-hoc Network (VANET)
Master Thesis on Vehicular Ad-hoc Network (VANET)Prof Ansari
 
VANET in Mobile Computing
VANET in Mobile ComputingVANET in Mobile Computing
VANET in Mobile ComputingKABILESH RAMAR
 
Presentation pfe
Presentation pfePresentation pfe
Presentation pfeMalik Riahi
 
VANET for Security using Cryptography
VANET for Security using Cryptography VANET for Security using Cryptography
VANET for Security using Cryptography Pallavi Agarwal
 

What's hot (20)

VEHICULAR ADHOC NETKWOK
VEHICULAR ADHOC NETKWOKVEHICULAR ADHOC NETKWOK
VEHICULAR ADHOC NETKWOK
 
Introduction to VANET
Introduction to VANETIntroduction to VANET
Introduction to VANET
 
VANET: Trust and Hashing
VANET: Trust and HashingVANET: Trust and Hashing
VANET: Trust and Hashing
 
VANET, Security and Trust
VANET, Security and TrustVANET, Security and Trust
VANET, Security and Trust
 
VANET (BY-VEDANT)
VANET (BY-VEDANT)VANET (BY-VEDANT)
VANET (BY-VEDANT)
 
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc NetworksEMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
 
Architecture and security in Vanet PPT
Architecture and security in Vanet PPTArchitecture and security in Vanet PPT
Architecture and security in Vanet PPT
 
Routing in vanet
Routing in vanetRouting in vanet
Routing in vanet
 
Performance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocolsPerformance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocols
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANET
 
VANETs Presentation
VANETs PresentationVANETs Presentation
VANETs Presentation
 
Data Aggregation and Dissemination in Vehicular Ad-Hoc Networks
Data Aggregation and Dissemination in Vehicular Ad-Hoc NetworksData Aggregation and Dissemination in Vehicular Ad-Hoc Networks
Data Aggregation and Dissemination in Vehicular Ad-Hoc Networks
 
VANET
VANETVANET
VANET
 
Master Thesis on Vehicular Ad-hoc Network (VANET)
Master Thesis on Vehicular Ad-hoc Network (VANET)Master Thesis on Vehicular Ad-hoc Network (VANET)
Master Thesis on Vehicular Ad-hoc Network (VANET)
 
VANET in Mobile Computing
VANET in Mobile ComputingVANET in Mobile Computing
VANET in Mobile Computing
 
Presentation pfe
Presentation pfePresentation pfe
Presentation pfe
 
VANET for Security using Cryptography
VANET for Security using Cryptography VANET for Security using Cryptography
VANET for Security using Cryptography
 
Vanet ppt
Vanet pptVanet ppt
Vanet ppt
 
Issues of routing in vanet
Issues of routing in vanetIssues of routing in vanet
Issues of routing in vanet
 
Routing protocols in Vanet
Routing protocols in VanetRouting protocols in Vanet
Routing protocols in Vanet
 

Similar to Cooperative Message Authentication Protocol(CMAP) in VANET

Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...IJERA Editor
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Performance evaluation of vanets
Performance evaluation of vanetsPerformance evaluation of vanets
Performance evaluation of vanetscsandit
 
Predictive Data Dissemination in Vanet
Predictive Data Dissemination in VanetPredictive Data Dissemination in Vanet
Predictive Data Dissemination in VanetDhruvMarothi
 
Challenging Issues in VANET Network and its Routing Algorithms-An Analysis
Challenging Issues in VANET Network and its Routing Algorithms-An AnalysisChallenging Issues in VANET Network and its Routing Algorithms-An Analysis
Challenging Issues in VANET Network and its Routing Algorithms-An Analysisidescitation
 
Security and Trust Management in VANET
Security and Trust Management in VANETSecurity and Trust Management in VANET
Security and Trust Management in VANETPallavi Agarwal
 
Multicast Dual Arti-Q System in Vehicular Adhoc Networks
Multicast Dual Arti-Q System in Vehicular Adhoc NetworksMulticast Dual Arti-Q System in Vehicular Adhoc Networks
Multicast Dual Arti-Q System in Vehicular Adhoc NetworksIOSR Journals
 
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...rifat1tasnim
 
vehicular communications
vehicular communicationsvehicular communications
vehicular communicationsSaikiran Guduri
 
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc NetworksCross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc NetworksIJCNCJournal
 
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKSCROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKSIJCNCJournal
 
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANETUsing Computing Methods to Secure VANET
Using Computing Methods to Secure VANETDr.Irshad Ahmed Sumra
 
Communications in Vehicular networks
Communications in Vehicular networksCommunications in Vehicular networks
Communications in Vehicular networksDaisyWatson5
 
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...IJLT EMAS
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 

Similar to Cooperative Message Authentication Protocol(CMAP) in VANET (20)

Adhoc network
Adhoc networkAdhoc network
Adhoc network
 
Adhoc network
Adhoc networkAdhoc network
Adhoc network
 
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Performance evaluation of vanets
Performance evaluation of vanetsPerformance evaluation of vanets
Performance evaluation of vanets
 
Predictive Data Dissemination in Vanet
Predictive Data Dissemination in VanetPredictive Data Dissemination in Vanet
Predictive Data Dissemination in Vanet
 
Challenging Issues in VANET Network and its Routing Algorithms-An Analysis
Challenging Issues in VANET Network and its Routing Algorithms-An AnalysisChallenging Issues in VANET Network and its Routing Algorithms-An Analysis
Challenging Issues in VANET Network and its Routing Algorithms-An Analysis
 
Security and Trust Management in VANET
Security and Trust Management in VANETSecurity and Trust Management in VANET
Security and Trust Management in VANET
 
Multicast Dual Arti-Q System in Vehicular Adhoc Networks
Multicast Dual Arti-Q System in Vehicular Adhoc NetworksMulticast Dual Arti-Q System in Vehicular Adhoc Networks
Multicast Dual Arti-Q System in Vehicular Adhoc Networks
 
Ivwc
IvwcIvwc
Ivwc
 
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
 
A Secure Intrusion Prevention Protocol for VANET to Enhance Security
A Secure Intrusion Prevention Protocol for VANET to Enhance SecurityA Secure Intrusion Prevention Protocol for VANET to Enhance Security
A Secure Intrusion Prevention Protocol for VANET to Enhance Security
 
vehicular communications
vehicular communicationsvehicular communications
vehicular communications
 
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc NetworksCross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
 
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKSCROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
 
Review Paper on VANET
Review Paper on VANETReview Paper on VANET
Review Paper on VANET
 
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANETUsing Computing Methods to Secure VANET
Using Computing Methods to Secure VANET
 
Communications in Vehicular networks
Communications in Vehicular networksCommunications in Vehicular networks
Communications in Vehicular networks
 
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 

Recently uploaded

Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesRAJNEESHKUMAR341697
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersMairaAshraf6
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086anil_gaur
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfsmsksolar
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projectssmsksolar
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stageAbc194748
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...soginsider
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxnuruddin69
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 

Recently uploaded (20)

Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stage
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 

Cooperative Message Authentication Protocol(CMAP) in VANET

  • 1. VEHICULAR AD-HOC NETWORKs(VANET) Presented by : Mayuresh Bhagat Shubham Khati Ankita Panchabhai Priya Mude
  • 2. CONSIDER THE SITUATIONS? You are on the way in a car and….  Wish to know about traffic jam condition at next turn or road condition ahead.  Wish to have prior alert, if vehicle in front of you applying breaks.  Wish to have advance information, if any vehicle meet with an accidents on the road ahead.  Wish to know whether the nearby parking area has vacancy or not.  Wish to avoid accidents in ever increasing traffic conditions
  • 4. WHAT IS VANET?  A large self-organized communication network in automobiles referred to as a Vehicular ad-hoc network (VANET).  VANET is V2V communication in ad hoc manner that enables the intelligent transportation system(ITS).  In a VANET each vehicle periodically broadcasts its geographic information through GPS.  The VANET provides an omnipresent computing atmosphere.
  • 6. WHY VANET?  Today’s car accident alert system is not efficient.  The accident first needs to be physically reported and then announced via a radio broadcast or a portable GPS unit before a driver is alerted.  It leads to jams, car collisions and inconvenience in traffic flow as well as for people.  Poor traffic monitoring.
  • 7. KEY MANAGEMENT TECHNIQUES  Safety Message Broadcast in VANET  Shared Key Management Framework  Distributed Key Management Frame  Efficient Cooperative Message Authentication in Vehicular Ad Hoc Networks  RFID authentication
  • 8. ROUTING PROTOCOL ANALYSIS A routing protocol specifies how routers communicate with each other and enables them to select routes between any two nodes on a computer network.  AODV(Ad hoc on-demand distance vector)  DSR(Dynamic Source Routing)  DSDV(Destination-Sequenced Distance-Vector Routing)
  • 9. AODV(AD-HOC ON-DEMAND DISTANCE VECTOR)  AODV is a routing protocol that creates routes between nodes only when the routes are requested by the source nodes.  This gives the network the flexibility to allow nodes to enter and leave the network at will.  AODV is a reactive protocol: the routes are created only when they are needed.
  • 10. DSR(DYNAMIC SOURCE ROUTING)  DSR is a routing protocol for wireless mesh networks.  It uses source routing supplied by packet’s originator to determine packet’s path through the network.  This protocol is truly based on source routing whereby all the routing information is maintained (continually updated) at mobile nodes.
  • 11. DSDV(DESTINATION SEQUENCED DISTANCE VECTOR ROUTING)  DSDV is one of the early algorithms available for data relay.  The main contribution of the algorithm was to solve routing loop problem.  There is no commercial implementation of this algorithm, since no formal specification of this algorithm is present.
  • 12. COMPARISON OF ROUTING PROTOCOLS parameters AODV DSR DSDV Definition Selection of routes Bandwidth consumption Packet delivery rate Latency This protocol establishes routes to destinations on demand and supports both unicast and multicast routing. Destination sequence numbers are used to find the latest route . Good More More This protocol is specifically designed for multi-hop ad hoc networks. Source routing supplied by packet’s originator to determine packet’s path . Less than AODV. Less than AODV Less than AODV It is quite suitable for creating ad hoc networks with small number of nodes. The route with the better metrics is used if the latest sequence number matches the one already present. Wastage of bandwidth. Less than both Less
  • 13. ISSUES IN VANET  The complicated physical domain of VANET incurs many challenging issues to the cyber domain.  Frequent broadcast of safety messages from a vehicle along the road may leak the travelling route of a vehicle, which could be a privacy issue.  Vehicles communicate with each other through radio over the IEEE 802.11p on 5.9GHz.  If a vehicle would like to cheat others, it will send false messages.  For example, a vehicle may claim a traffic jam somewhere; however in fact no traffic jam happens there.  The other phrase we will use in the cooperative message authentication is invalid message.
  • 14. COOPERATIVE MESSAGE AUTHENTICATION PROTOCOL(CMAP)  A cooperative message authentication protocol (CMAP) is developed to alleviate vehicles' computation burden.  With CMAP, all the vehicles share their verification results with each other in a cooperative way, so that the number of safety messages that each vehicle needs to verify reduces significantly.  A promising thread of techniques to reduce the computation overhead in authentication is cooperative authentication.
  • 15. HOW DOES CMAP WORKS?  In the CMAP, each vehicle sends periodically broadcasted messages (PBM) which include its current geographic information every 300 ms.  When its neighboring vehicles receive the PBM, they will decide whether they are verifiers of this message.  If a vehicle is the verifier of the message, it will start to verify the message by itself.  Once an invalid message is identified, verifiers will broadcast a one hop warning message to others. Otherwise, verifiers will keep silent.  Non-verifiers will wait for cooperative warning messages (CWM) from verifiers.
  • 16. PROCESS IN CMAP TECHNIQUE
  • 17. COMPUTATION AND COMMUNICATION OVERHEAD  Verifying the group signature attached to each broadcast message is the dominating component that consumes computation capacity.  In our simulation, we use the average number of verified messages per vehicle per second as the metric for the computation overhead.  It is worth noting that CMAP method achieves a much lower missed detection ratio than the non cooperative authentication with the same computation overhead.
  • 18.  We have the following observations: 1) Compared with the conventional non-cooperative authentication protocol, our CMAP method achieves significantly lower computation overhead. 2) The computation overhead of CMAP is independent of vehicle density, while that of the non-cooperative protocol increases with the density.
  • 19. Characteristics of VANET  High Mobility of nodes  Dynamic Topology  Unbounded network size  Frequent exchange of information  Wireless Communication  Crucial effect of privacy and security  Real time , time sensitive data exchange
  • 20. Safety applications(to enhance driving safety) like :  EEBL – Emergency Electronic Brake Light(sudden braking)  PCN – Post Crash Notification  RFN – Road Feature Notification(ex. Downhill curve)  LCA – Lane Change Assistance  CCW – Cooperative Collision Warning  Blind Merge Assistant and many more… APPLICATIONS
  • 21. Convenience Applications (for better driving experience):  Road Congestion Notification  Dynamic Route/ Travel Time Planning  Querying Parking Availability  Finding Parking Spots Other Commercial/Infotainment/Telematics Applications:  Remote Vehicle Diagnostics  Free Flow Tolling  Social Networking  Multimedia Content Exchange  Advertising
  • 22. KEY RESEARCH AREAS IN VANET  Quality of Service (QoS)  Network Security  MAC layer protocol  Scalability and Robustness  Image processing  Co-operative Communication  Mobility model  Efficient Routing Algorithms Design  Fault tolerance
  • 23. MAJOR PLAYERS IN VANET RESEARCH
  • 24. CONCLUSION  The CMAP significantly reduces the computation overhead of each vehicle at the cost of a slightly increased communication overhead.  AODV is the most effective algorithm in terms of throughput and data transmission delay time for mobile ad hoc networks in urban areas.  VANET security system achieves privacy, traceability, non frame ability, and privacy preserving defense against misbehavior.
  • 25. REFERENCES [1] Y. Toor and P. Mühlethaler, “Vehicle Ad Hoc Networks: Applications and Related Technical issues”, IEEE Communications surveys & Tutorials, 3rd quarter, vol. 10, no. 3, (2008), pp. 74-88. [2] M. Raya and J. P. Hubaux, “Securing vehicular ad hoc networks,” J. Comput. Security, vol. 15, no. 1, pp.39–68, Jan. 2007. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL.14, NO. 1, MARCH 2013. [3] Xiaodong Lin, Xu Li “Achieving Efficient Cooperative Message Authentication in Vehicular Ad- hoc Network”, IEEE Transactions on Vehicular Technology, volume 62, no. 7, September 2013. [4] A. Boukerche, “Performance Evaluation of Routing Protocols for Ad Hoc Wireless Networks”, Mobile Networks and Applications vol. 9, Netherlands, 2004. [5] Y. Hao, Y. Cheng, C. Zhou, and W. Song, ``A distributed key management framework with cooperative message authentication in VANETs,'' IEEE J.Sel. Areas Commun., vol. 29, no. 3, pp. 616_629, Mar. 2011.