05JulyPresentation SanjayDeshmukh
05JulyPresentation SanjayDeshmukh
& Technology
A Presentation on
Presented By
Mr. Sanjay Deshmukh
(A70466220002)
Amity School of Engineering
& Technology
Index
• Introduction
• Literature Review
• Research Gaps
• Research Objectives
• References
Amity School of Engineering
& Technology
Introduction
• VANET (Vehicular ad hoc network ) is a particular case of wireless multi-hop
network, which has the constraint of fast topology changes due to the high node
mobility . VANETs are largest real world mobile ad hoc network.
• With the increasing number of vehicles equipped with computing technologies and
wireless communication devices, intervehicle communication is becoming a promising
field of research, standardization, and development.
• VANETs enable a wide range of applications, such as prevention of collisions, safety,
blind crossing, dynamic route scheduling, real-time traffic condition monitoring, etc
• Another important application for VANETs is providing Internet connectivity to
vehicular nodes. Figure on the next slide shows an example of a VANET
Amity School of Engineering
& Technology
Introduction
Amity School of Engineering
& Technology
Introduction
• It is a subclass of mobile ad hoc networks. It is a network of vehicles moving with
relatively high speeds. So it allows you to create a data exchange between vehicles in
wireless way. Internet of Vehicles (IoV). IoV forms a solid backbone for Intelligent
Transportation Systems (ITS), which paves the way for technologies that better explain
about traffic efficiency and their management applications.
• The vehicles are fitted with sensors and these sensors interact with other vehicles and
infrastructure outside the vehicle . The car is fitted with on- board Unit(OBU). The
road on which the car is moving has road side units(RSU). The RSUs are connected to
base stations .
• It provides a promising network scenario for facilitating safety on roads, managing
traffic, and infotainment dissemination for both passengers and drivers. Traffic flow
parameters, driver behavior, and driving conditions can be detected and shared with
vehicles within their vicinity .
Amity School of Engineering
& Technology
Introduction
• Global IOV market is believed to be $200 Billion by 2024 due to which companies
like BMW and Daimler are interested in this sector
• The internet of vehicles (IoV) is a distributed network that supports the use of data
created by connected cars in VANET. IoV supports different communications like :
• Intra vehicle, Vehicle to Vehicle(V2V) , Vehicle to Infrastructure (V2I) , Vehicle to
cloud (V2 C). Vehicle to road (V2 R), Vehicle to human (V2 H) and vehicle to
sensor(V2S).
• Many vehicles transmit data such as identification, position and speed of vehicle. A
high level of security and privacy insurance is prime requirement for acceptance of
communication between vehicles. Automotive safety related applications are
developed using V2V and V2 R(Vehicle to roadside unit).
Amity School of Engineering
& Technology
Introduction
• VANET is vulnerable to security attacks.
• It is must to guarantee the authenticity and integrity of a message ( which contains
data), and also to protect the user related privacy information .
• A safety message has to reach all the vehicles in VANET, so it is authenticated first and
then message integrity is checked.
Amity School of Engineering
& Technology
Literature Review
•In 2010 , J . Sun et al proposed a security system for VANET to handle problems
in access control
•In 2013, S.Hong et al proposed software based solution for privacy requirements
for vehicles.
•.
Amity School of Engineering
& Technology
Literature Review..
• In2018 J Harsrouny et al proposed trust metric for every vehicle and its behavior.
Literature Review..
Literature Review..
Author Algorithm Results Gap
. In this paper, we
propose a security Proposed is a privacy-preserving
system for VANETs to defense technique for network
achieve privacy authorities to handle misbehavior in
desired by vehicles VANET access. Experimenting with real security system
Amity School of Engineering
& Technology
Literature Review..
Author Description Features Challenges
Literature Review..
Author Description Features Challenges
Literature Review..
Author Description Features Challenges
Literature Review..
Author Description Features Challenges
Literature Review..
Author Description Features Challenges
D. Manivannan, S. Moni, S.
Zeadally,"Secure authentication and
privacy-preserving techniques in Vehicular . Authors present
Adhoc NETworks (VANETs)", Vehicular an overview of the
Communications, Vol. 25, 2020.[3] following issues
that arise in The paper presents a
VANETs: privacy, comprehensive review
authentication, of various solutions
and secure proposed in the last 10
message years which address
dissemination these issues Make message dissemination more secure
Paper proposes a
design of a secure
M. Al-Mehdhara, N, Ruan "MSOM: VANET architecture
Efficient Mechanism for Defense against using a Experimental results
DDoS Attacks in VANET", Wireless SoftwareDefined show that our solution
Communications and Mobile Computing, Networking (SDN) can efficiently detect
pp. 17, ID: 8891758, 2021. [4] controller and malicious traffic, prevent
Neural Network and mitigate DDoS
Self-Organizing attacks, and increase Preventing the attacks not covered by the
Maps (SOMs). system security proposed system
Amity School of Engineering
& Technology
Literature Review..
Author Description Features Challenges
Research Gaps
•As per [34] , define a procedure to avoid denial of service (DoS) attack.
•As per [8] , check the identity –based security system for user privacy in real –time.
•As per [7] , design a scheme to prevent impersonation attack on VANET.
•As per [5] , design a scheme to reduce average communication delay in VANET.
•As per [16] , create a procedure to confirm scalability of optimal dropbox deployment
algorithm
•As per [15] make a detailed study report for various safety aspects of Internet of Vehicle
(IoV)
•As per [14] , Compare privacy preservation mechanisms in various location based
services.
Amity School of Engineering
& Technology
Research Gaps
•As per [12] , test the proposed trust model for Sybil and blackhole attacks.
•As per [10] combine cloud with VANET for improving security aspects of VANET.
•As per [11], combine multiple roadside units (RSUs) in a given domain to reduce load
on the system.
•As per [3] design system for making message dissemination more secure.
•As per [1], design smart authentication mechanisms for reducing overall communication
cost in VANET.
Amity School of Engineering
& Technology
Research Objectives
1. Firstly, we design the key virtualization method is applied into V2I authentication for VANETs.
In this scheme, the user’s private key is divided into two portions: one is managed by a secure
device and the other is held at virtual layer and both of them are updated periodically
2. Secondly, it will construct the proposed system model and security model for system
initialization and key generation.
3. Finally, we perform the security analysis of the proposed scheme to evaluate the enhancement of
the authentication.
Amity School of Engineering
& Technology
1. Initially, it will design the secure message encryption and decryption method for VANETs and
also the process of verification.
2. Later it constructs the system initialization and key generation for message security process.
3. It develop a message runtime verification process to checks the authenticity and integrity of the
message.
4. Finally, we perform the security analysis of the proposed scheme to evaluate the enhancement of
the authentication.
Amity School of Engineering
& Technology
1. First, we will design an efficient framework to solve security and privacy issues in VANETs to
provide a practical authentication solution in reality.
2. Secondly, we will construct the system initialization and authentication parameters to generate
message signing and verification process.
3. Finally, evaluation of the proposed framework for security analysis and enhancement against the
various attacks.
Amity School of Engineering
& Technology
References
1. N. Gupta, R. Manaswini, B. Saikrishna, F. Silva, A. Teles, "Authentication-Based Secure Data
Dissemination Protocol and Framework for 5G-Enabled VANET", Future Internet, Vol. 12, pp. 63, 2020.
2. K. N. Qureshi, S. Din, G. Jeon and F. Piccialli, "Internet of Vehicles: Key Technologies, Network Model,
Solutions and Challenges With Future Aspects," in IEEE Transactions on Intelligent Transportation
Systems, vol. 22, no. 3, pp. 1777-1786, March 2021.
3. D. Manivannan, S. Moni, S. Zeadally,"Secure authentication and privacy-preserving techniques in
Vehicular Adhoc NETworks (VANETs)", Vehicular Communications, Vol. 25, 2020.
4. M. Al-Mehdhara, N, Ruan "MSOM: Efficient Mechanism for Defense against DDoS Attacks in VANET",
Wireless Communications and Mobile Computing, pp. 17, ID: 8891758, 2021.
5. Y. Wang, H. Zhong, Y. Xu, and J. Cui, "ECPB: efficient conditional privacy-preserving authentication
scheme supporting batch verification for VANETs", International Journal of Network Security, vol. 18,
no. 2, pp. 374–382, 2016.
Amity School of Engineering
& Technology
References
[6]. C. Bernardini, M.R. Asghar, B. Crispoc, "Security and privacy in vehicular communications:
challenges and opportunities", Veh. Commun. Vol. 10 pp. 13–28, 2017.
[7]. S. Horng, S. Tzeng, Y. Pan, P. Fan, X. Wang, T. Li, M. K. Khan, "SPECS+: Batch verification for
secure pseudonymous authentication in VANET", IEEE Transaction on Information Forensics and Security.
vol. 8 (11) pp. 1860-1875, 2013.
[8]. J. Sun, C. Zhang, Y. Zhang, Y. Fang, "An identity-based security system for user privacy in
vehicular ad hoc networks", IEEE Transaction on Parallel and Distributed systems. vol. 21 (9), pp. 1227-
1239, 2010.
[9]. K. Taimur, A. Naveed, C. Yue, S.A. Jalal, A. Muhammad, S. ul Haq, C. Haitham, "Certificate
revocation in vehicular ad hoc networks techniques and protocols: a survey, Sci. China Inf. Sci. Vol. 60(10),
2017.
[10]. S. H. Islam, M. S. Obaidat, P. Vijayakumar, E. Abdulhay, F. Li, and M. K. C. Reddy, "A robust and
efficient password based conditional privacy preserving authentication and group-key agreement protocol
for VANETs", Future Generation Computer Systems, vol. 84, pp. 216-227, 2018.
Amity School of Engineering
& Technology
References
[11]. K. Lim, W. Liu, X. Wang, J. Joung, "SSKM: Scalable and Secure Key Management Scheme for
Group Signature Based Authentication and CRL in VANET", Electronics, 8(11), pp. 1330, 2019.
[12]. H. Hasrouny, A. E. Samhat, C. Bassil, and A. Laouiti, "Trust model for secure group leader-based
communications in VANET", Wireless Networks, vol. 6, pp. 1-23, 2018.
[13]. Z. Lu, G. Qu, Z. Liu, "A survey on recent advances in vehicular network security, trust, and
privacy", IEEE Trans. Intell. Transp. Syst. Vol. 20(2), pp. 760–776, 2019.
[14]. P. Asuquo, H. Cruickshank, J. Morley, C.P.A. Ogah, A. Lei, W. Hathal, S. Bao, Z. Sun, "Security and
privacy in location-based services for vehicular and mobile communications: an overview, challenges and
countermeasures", IEEE Internet of Things Journal, Vol: 5, Issue: 6, 2018.
[16]. J. He, Y. Ni, L. Cai, J. Pan, C. Chen, Optimal dropbox deployment algorithm for data
dissemination in vehicular networks", IEEE Trans. Mob. Comput. Vol.17(3) pp. 632–645, 2018.
Amity School of Engineering
& Technology
References
[17]. L. Wang, X. Liu, Secure cooperative communication scheme for vehicular heterogeneous
networks", Veh. Commun. Vol. 11, pp 46–56, 2018.
[19]. F. Sakiz, S. Sen, "A survey of attacks and detection mechanisms on intelligent transportation
systems: VANETs and IoV", Ad Hoc Netw. Vol. 61(1), pp. 33–50, 2017.
[20]. S.S. Manvi, S. Tangade, "A survey on authentication schemes in VANETs for secured
communication", Veh. Commun. Vol. 9, pp. 19–30, 2017.
[21]. M. A. Ferrag, L. Maglaras, A. Ahmim, "Privacy-preserving schemes for ad hoc social networks: a
survey", IEEE Commun. Surv. Tutor. Vol. 19(4), pp. 3015–3045, 2017.
[22]. A. Boualouache, S.-M. Senouci, S. Moussaoui, "A survey on pseudonym changing strategies for
vehicular adhoc networks", IEEE Commun. Surv. Tutor. Vol. 20(1), pp.770–790, 2018.
Amity School of Engineering
& Technology
References
[23]. B. Ramakrishnan, R.B. Nishanth, M.M. Joe, M. Selvi, "Cluster based emergency message
broadcasting technique for vehicular ad hoc network", Wirel. Netw. Vol. 23(1), pp. 233–248, 2017.
[25]. C. Lai, H. Zhou, N. Cheng, X.S. Shen, "Secure group communications in vehicular networks: a
software defined network enabled architecture and solution", IEEE Veh. Technol. Mag. Vol. 12(4), pp. 40–
49, 2017.
[26]. C. Lai, R. Lu, D. Zheng, "Achieving secure and seamless IP communications for group-oriented
software defined vehicular networks, in: 12th International Conference on Wireless Algorithms", Systems,
and Applications, Springer, pp.356–368, 2017.
[27]. J. Cui, J. Zhang, H. Zhong, Y. Xu, "SPACF: a secure privacy-preserving authentication scheme for
VANETwith cuckoo filter, IEEE Trans. Veh. Technol. Vol. 66(11), pp. 10283–10295, 2017.
Amity School of Engineering
& Technology
References
[28]. M. Azees, P. Vijayakumar, L.J. Deboarh, "EAAP: efficient anonymous authentication with
conditional privacy-preserving scheme for vehicular ad hoc networks, IEEE Trans. Intell. Transp. Syst. Vl.
18(9), pp. 2467–2476, 2017.
[29]. H. Sedjelmaci, S.M. Senouci, T. Bouali, "Predict and prevent from misbehaving intruders in
heterogeneous vehicular networks, Veh. Commun. Vol. 10, pp. 74–83, 2017.
[30]. S. Wang, N. Yao, "LIAP: a local identity-based anonymous message authentication protocol in
VANETs, Comput. Commun. Vol. 112, pp. 154–164, 2017.
[31]. C. Lai, K. Zhang, N. Cheng, H. Li, X. Shen, "SIRC: a secure incentive scheme for reliable
cooperative downloading in highway VANETs, IEEE Trans. Intell. Transp. Syst. Vol. 18(6), pp. 1559–1574,
2017.
[32]. Q. Kang, X. Liu, Y. Yao, Z. Wang, and Y. Li, "Efficient authentication and access control of
message dissemination over vehicular ad hoc network", Neurocomputing, vol. 181, pp. 132-138, 2016.
Amity School of Engineering
& Technology
References
[33]. L. Zhang, X. Men, K. K. R. Choo, Y. Zhang, and F. Dai, "Privacy-preserving cloud establishment
and data dissemination scheme for vehicular cloud", IEEE Transactions on Dependable and Secure
Computing, p. 1, 2018.
[35]. N. Kumar, J. P. Singh, R. S. Bali, S. Misra, and S. Ullah, "An intelligent clustering scheme for
distributed intrusion detection in vehicular cloud computing", Cluster Computing, vol. 18, no. 3, pp. 1263-
1283, 2015.
[36]. H. H. R. Sherazi, Z. A. Khan, R. Iqbal, M. Imran, and K. M. Awan, "A heterogeneous IoV
architecture for data forwarding in vehicle to infrastructure communication", Mobile Inf. System, 2019.
Amity School of Engineering
& Technology