Group 1 Aswin, Prithvi, Subramaniam, Valampuri. MI-VANET : A NEW MOBILE INFRASTRUCTURE BASED VANET ARCHITECTURE FOR URBAN ENVIRONMENT Paper 1.

Slides:



Advertisements
Similar presentations
1 A Static-Node Assisted Adaptive Routing Protocol in Vehicular Networks Yong Ding, Chen Wang, Li Xiao {dingyong, wangchen, Department.
Advertisements

Efficient Secure Aggregation in VANETs Maxim Raya, Adel Aziz, and Jean-Pierre Hubaux Laboratory for computer Communications and Applications (LCA) EPFL.
CodeTorrent: Content Distribution using Network Coding in VANET Uichin Lee, JoonSang Park, Joseph Yeh, Giovanni Pau, Mario Gerla Computer Science Dept,
CSLI 5350G - Pervasive and Mobile Computing Week 6 - Paper Presentation “Exploiting Beacons for Scalable Broadcast Data Dissemination in VANETs” Name:
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
Securing Vehicular Communications Author : Maxim Raya, Panos Papadimitratos, and Jean-Pierre Hubaux From : IEEE Wireless Communications Magazine, Special.
Delay bounded Routing in Vehicular Ad-hoc Networks Antonios Skordylis Niki Trigoni MobiHoc 2008 Slides by Alex Papadimitriou.
GrooveSim: A Topography- Accurate Simulator for Geographic Routing in Vehicular Networks 簡緯民 P
CSLI 5350G - Pervasive and Mobile Computing Week 3 - Paper Presentation “RPB-MD: Providing robust message dissemination for vehicular ad hoc networks”
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
overview Motivation Ongoing research on VANETs Introduction Objectives Applications Possible attacks Conclusion.
Evaluation of Ad hoc Routing Protocols under a Peer-to-Peer Application Authors: Leonardo Barbosa Isabela Siqueira Antonio A. Loureiro Federal University.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
InVANET(Intelligent Vehicular Ad Hoc Network
CS 672 Paper Presentation Presented By Saif Iqbal “CarNet: A Scalable Ad Hoc Wireless Network System” Robert Morris, John Jannotti, Frans Kaashoek, Jinyang.
University1 GVGrid: A QoS Routing Protocol for Vehicular Ad Hoc Networks Weihua Sun, Hirozumi Yamaguchi, Koji Yukimasa, Shinji.
Di Wu 03/03/2011 Geographic Routing in Clustered Multi-layer Vehicular Ad Hoc Networks for Load Balancing Purposes.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
Department of Computer Engineering Koc University, Istanbul, Turkey
Geographic Routing Without Location Information A. Rao, C. Papadimitriou, S. Shenker, and I. Stoica In Proceedings of the 9th Annual international Conference.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad-hoc Networks
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
ENHANCING AND EVALUATION OF AD-HOC ROUTING PROTOCOLS IN VANET.
Performance Evaluation of Vehicular DTN Routing under Realistic Mobility Models Pei’en LUO.
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
A Study of Live Video Streaming over Highway Vehicular Ad hoc Networks Meenakshi Mittal ©2010 International Journal of Computer Applications ( )Volume.
Tonghong Li, Yuanzhen Li, and Jianxin Liao Department of Computer Science Technical University of Madrid, Spain Beijing University of Posts & Telecommunications.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
A study of Intelligent Adaptive beaconing approaches on VANET Proposal Presentation Chayanin Thaina Advisor : Dr.Kultida Rojviboonchai.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Small-Scale and Large-Scale Routing in Vehicular Ad Hoc Networks Wenjing Wang 1, Fei Xie 2 and Mainak Chatterjee 1 1 School of Electrical Engineering and.
Connectivity-Aware Routing (CAR) in Vehicular Ad Hoc Networks Valery Naumov & Thomas R. Gross ETH Zurich, Switzerland IEEE INFOCOM 2007.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
A Sociability-Based Routing Scheme for Delay-Tolerant Networks May Chan-Myung Kim
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
MMAC: A Mobility- Adaptive, Collision-Free MAC Protocol for Wireless Sensor Networks Muneeb Ali, Tashfeen Suleman, and Zartash Afzal Uzmi IEEE Performance,
Kun-chan Lan and Chien-Ming Chou National Cheng Kung University
SHORT: Self-Healing and Optimizing Routing Techniques for Mobile Ad Hoc Networks Presenter: Sheng-Shih Wang October 30, 2003 Chao Gui and Prasant Mohapatra.
1 Vehicular Networks Slides are integrated from researchers at EPFL.
1 A traffic-aware infrastructure- based Architecture for inter- vehicules File Sharing Amine K., Sadeq Ali M., Mesut G IEEE 學生:羅英辰、董藝興 學號: M97G0216.
A Multicast Routing Algorithm Using Movement Prediction for Mobile Ad Hoc Networks Huei-Wen Ferng, Ph.D. Assistant Professor Department of Computer Science.
Using Ant Agents to Combine Reactive and Proactive strategies for Routing in Mobile Ad Hoc Networks Fredrick Ducatelle, Gianni di caro, and Luca Maria.
指導教授:許子衡 教授 學 生:黃群凱 2016/2/251 Proceedings of the 2008 IEEE International Conference on Vehicular Electronics and Safety Columbus, OH, USA. September 22-24,
DETECTION AND IGNORING BLACK HOLE ATTACK IN VANET NETWORKS BASED LATENCY TIME CH. BENSAID S.BOUKLI HACENE M.K.FAROUAN 1.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Connectivity-Aware Routing (CAR) in Vehicular Ad Hoc Network Valery Naumov, and Thomas R. Gross Proceedings of IEEE 26 th International Conference on Computer.
-Internet On Road. INTRODUCTION Driving means constantly changing location. This, in turn, means a constant demand for information on the current location.
Spatial Aware Geographic Forwarding for Mobile Ad Hoc Networks Jing Tian, Illya Stepanov, Kurt Rothermel {tian, stepanov,
Realistic Mobility Models for Vehicular Ad hoc Network (VANET) Simulations ITST 高弘毅 洪佳瑜 蔣克欽.
Indian Institute Of Technology, Delhi Page 1 Enhancements in Security, Performance Modeling and Optimization in Vehicular Networks Ashwin Rao 2006SIY7513.
Presented by Edith Ngai MPhil Term 3 Presentation
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Jérôme Härri, Fethi Filali, Christian Bonnet
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
Presentation transcript:

Group 1 Aswin, Prithvi, Subramaniam, Valampuri

MI-VANET : A NEW MOBILE INFRASTRUCTURE BASED VANET ARCHITECTURE FOR URBAN ENVIRONMENT Paper 1

Summary Traditional VANETS Author’s observations about VANETS Experiments Improved architecture Routing Performance analysis MI-VANET : A New Mobile Infrastructure Based VANET Architecture for Urban Environment

Traditional Vanets MANET instance IVC RVC MI-VANET : A New Mobile Infrastructure Based VANET Architecture for Urban Environment

Traditional Vanets Routing MI-VANET : A New Mobile Infrastructure Based VANET Architecture for Urban Environment

Observations MI-VANET : A New Mobile Infrastructure Based VANET Architecture for Urban Environment

Observations Traffic light patterns Vehicle type Constrained movement Clusters have more connection time than roadside units MI-VANET : A New Mobile Infrastructure Based VANET Architecture for Urban Environment

Experiments 80 cars:20 buses Sample undisclosed MI-VANET : A New Mobile Infrastructure Based VANET Architecture for Urban Environment

Experiments Communication range, Connection time 200m, 250s 150m, 200s MI-VANET : A New Mobile Infrastructure Based VANET Architecture for Urban Environment

Experiments 10 buses Avg. speed = 15 km/h Top speed = 50 km/h MI-VANET : A New Mobile Infrastructure Based VANET Architecture for Urban Environment

Improved architecture 2 tiered High tier – buses Low tier – cars Buses have 2 radio interfaces Low power for c2b High power for b2b MI-VANET : A New Mobile Infrastructure Based VANET Architecture for Urban Environment

Improved architecture (a) MI-VANET architecture example (b) An example of message delivery in MI-VANET MI-VANET : A New Mobile Infrastructure Based VANET Architecture for Urban Environment

The Register and The Routing Register [MIRG] – Low tier nodes register on buses – Wait for beacon from bus – Compute expected connection time MI-VANET : A New Mobile Infrastructure Based VANET Architecture for Urban Environment

The Register and The Routing R : Radio Range dist : Distance b/w car and bus T : Expected Connection time S : Score MI-VANET : A New Mobile Infrastructure Based VANET Architecture for Urban Environment

The Register and The Routing Routing [MIRT] – Select optimal route – Efficiently forward packets MI-VANET : A New Mobile Infrastructure Based VANET Architecture for Urban Environment

The Register and The Routing Routing [MIRT] – Select optimal route Road Segment based routing approach – Select best neighboring road segment – Uses min hop count as the deciding metric – Buses have fixed routes and timings – Hop count is related to bus density and road length MI-VANET : A New Mobile Infrastructure Based VANET Architecture for Urban Environment

The Register and The Routing MI-VANET : A New Mobile Infrastructure Based VANET Architecture for Urban Environment

The Register and The Routing MI-VANET : A New Mobile Infrastructure Based VANET Architecture for Urban Environment

The Register and The Routing MI-VANET : A New Mobile Infrastructure Based VANET Architecture for Urban Environment

The Register and The Routing MI-VANET : A New Mobile Infrastructure Based VANET Architecture for Urban Environment Route selection in MI-VANET

Performance Evaluation MI-VANET : A New Mobile Infrastructure Based VANET Architecture for Urban Environment

Performance Evaluation MI-VANET : A New Mobile Infrastructure Based VANET Architecture for Urban Environment

Performance Evaluation MI-VANET : A New Mobile Infrastructure Based VANET Architecture for Urban Environment Simulation parameters

Performance Evaluation Software used – VanetMobiSim Area 1700m*1000m – NS2 MI-VANET : A New Mobile Infrastructure Based VANET Architecture for Urban Environment

Drawbacks Local minima ? – Would carry and forward work Data set, real world testing Bunching of buses, service interruptions Potentially unused computing resources MI-VANET : A New Mobile Infrastructure Based VANET Architecture for Urban Environment

PEJMAN PANAHI IRANIAN ACADEMIC CENTER FOR EDUCATION, CULTURE AND RESEARCH, DEPARTMENT OF COMPUTER, URMIA, IRAN. Providing Consistent Global Sharing Services over VANET Providing Consistent Global Sharing Services over VANET : Pejman Panahi

MOTIVATION Peer to peer technology over Internet has boosted the file sharing services. Implementing P2P over a mobile ad hoc network and VANET in specific is a challenging task. Many architectures for P2P over Vehicular ad hoc network like Car-Torrent have been proposed. Opportunistic file sharing protocols (car-torrent) have limitations like absence of support for information sharing between distant vehicles. Providing Consistent Global Sharing Services over VANET : Pejman Panahi

INTRODUCTION An infrastructure based approach is proposed in this paper which connects all vehicles in the network. Data transfer between distant vehicles is made possible by taking advantage of the predictable and restricted mobility of vehicles along their paths on fixed streets. Goal : Provide information globally among all vehicles rather than relying on opportunistic meetings, which improves peer to peer techniques proposed earlier. Providing Consistent Global Sharing Services over VANET : Pejman Panahi

MODEL ARCHITECTURE Role of access points are extended beyond direct communication to cars. Access points behave like stationary cars communicating with each other to determine the vehicles possessing the information requested. The end access point fetches the information and transmits it to the vehicle which requested it through other intermediate access points. Providing Consistent Global Sharing Services over VANET : Pejman Panahi

Overlay Protocol The dynamicity of the vehicular network and the high mobility of the nodes demand for a distributed management of file-requests. The author proposes Chord protocol to decentralize the service. Chord uses consistent hashing to map nodes onto an m-bit circular identifier space and each node holds a fraction of the data. Providing Consistent Global Sharing Services over VANET : Pejman Panahi

CHORD Providing Consistent Global Sharing Services over VANET : Pejman Panahi

CHORD The peers are arranged in a logical ring topology. Each retrieval operation is forwarded to a node that is closer to the location until the location is found. Each node holds a finger table containing the addresses of nodes which are 1/2 i -way around the ring (with i = 1... m). When a node receives a query, it forwards it to the node in its finger table with the highest ID not exceeding hash(key). The number of nodes that must be contacted to find a successor in an N-node network is O(logN). Providing Consistent Global Sharing Services over VANET : Pejman Panahi

CHORD Providing Consistent Global Sharing Services over VANET : Pejman Panahi

CLUSTER & CLUSTER HEADS Chord-model with a single ring would result in heavy message-overhead for the updating of car positions. The author introduces the concept of clustering to organize the access points. Cluster heads or super nodes handles the management of the position of vehicles. Each cluster is responsible for indexing a partial range of the file indices. The management of indices within a cluster is still done according the Chord protocol Providing Consistent Global Sharing Services over VANET : Pejman Panahi

CLUSTERING Cluster heads are chosen while satisfying the criteria of minimizing overhead. This implies that inter-cluster vehicle-traffic should be minimized which will reduce the inter-cluster head message overhead. Cluster heads are chosen from locations where vehicular traffic is dense. With such a design, clusters will have the most possible maximum coherence and the most possible minimum coupling to other clusters (traffic from one cluster to another one should be minimized). k-medoid clustering algorithm is used to build clusters. Providing Consistent Global Sharing Services over VANET : Pejman Panahi

k – medoid clustering algorithm 1. Choose k points to be the initial cluster-heads (Medoids) 2. Assign each node to the closest Medoid. 3. When all nodes have been assigned, try swapping cluster-nodes with their cluster-heads and see if the costs are decreased. 4. Repeat Steps 2 and 3 until the Medoids no longer move. Providing Consistent Global Sharing Services over VANET : Pejman Panahi

CLUSTERING The coherence of a cluster is measured by the traffic of vehicles inside it rather than distances between its nodes. Two access points are (virtually) close to each other if the traffic between them is high. Cluster heads have to be the most central nodes not regarding the spatial repartition of the gateways belonging to their clusters but regarding the cars traffic in their clusters. The best known type of centrality that corresponds to this idea is the Betweenness-Centrality. Betweenness centrality : Nodes are somehow central to the degree they stand between other nodes on the paths of communication. Providing Consistent Global Sharing Services over VANET : Pejman Panahi

BETWEENNESS CENTRALITY Providing Consistent Global Sharing Services over VANET : Pejman Panahi

Synchronization of requests The synchronization of equivalent requests has a direct impact on the scalability of proposed architecture. Equivalent requests refers to search-requests looking for the same file on different cars, apart from being generated from one car-request (when the file is shared by more than one car) or issued from many cars. Synchronization of requests is done at file indices since a request consults a file index to get the list of cars sharing the requested file. Providing Consistent Global Sharing Services over VANET : Pejman Panahi

Synchronization of requests Requests for each file have to be temporarily registered in the corresponding file-index. As soon as a gateway retrieves a file, it sends a message to clear the list of requests registered for this file (or check whether it has already been cleared). If the requests-list is empty this gateway abandons the delivery of this file otherwise it takes into responsibility to transmit the retrieved file to all requesting cars. From time to time, gateways have to check whether the non yet retrieved files have been already retrieved by another gateway by checking the requests-cache. Providing Consistent Global Sharing Services over VANET : Pejman Panahi

Prediction of Next-Car-Positions The prediction of next car positions is used in a first stage to avoid flooding access points with file-requests In the second stage it is used to accelerate the deliverance of files to cars by forwarding the retrieved files to probable next positions of requesting cars. Any prediction strategy should be based on the knowledge about the current car-position, this prediction is done at cluster heads. A classified list of next-possible gateways could be dynamically built at cluster heads for each gateway belonging to its cluster, by counting the vehicular traffic between gateways. After a learning period of time, the system predicts out good estimations for the next-probable positions on most gateways while adapting to traffic shape at different moments of a day. Providing Consistent Global Sharing Services over VANET : Pejman Panahi

SIMULATION To evaluate proposed architecture, generating car traffic based on the Manhattan mobility model were done. Some intersection points of the streets were chosen to place access points. A grid of 5 blocks at both the horizontal and the vertical axis, where each block represents 1 km. Cars have a speed of about 50km/h with a turn probability of 0.7. The number of access points were varied from 13 to 23 and thereof 2 to 6 cluster heads should be chosen. All nodes use IEEE b MAC operating at 5 Mbps. The transmission range is about 250 m. Providing Consistent Global Sharing Services over VANET : Pejman Panahi

Messages overhead for each clustering strategy Providing Consistent Global Sharing Services over VANET : Pejman Panahi

Download time for each clustering strategy Providing Consistent Global Sharing Services over VANET : Pejman Panahi

Effect of concurrent requests on the download time Providing Consistent Global Sharing Services over VANET : Pejman Panahi

CONCLUSION An architecture that enhances the efforts made in the field of vehicular ad hoc networks to support realistic P2P services between cars. File sharing services cannot be achieved without connecting all cars of the network for that purpose. Simulation results and analysis proves suggested architecture is efficient over the previous proposed techniques. Providing Consistent Global Sharing Services over VANET : Pejman Panahi

Strength Weakness Using traffic information for k-medoid algorithm for clustering and betweeness centrality for cluster head selection proves to be a more realistic solution over the previous proposed ideas. The previously presented MI-VANET relies on public transports, absence of which could fail the whole architecture. The proposed architecture is based on access points with cluster heads being elected according to the traffic density. The prediction technique for next-car-position needs to be refined. The suggested model should best work in a city where we have same set of vehicles appearing in the clusters. Profile cast techniques could further enhance the probability of predicting the next-car-position correctly. Providing Consistent Global Sharing Services over VANET : Pejman Panahi

Small Scale routing in Vehicular Ad-hoc Networks Wenjing Wang, Fei Xie and Mainak Chatterjee,Small Scale and large scale routing in Vehicular Ad-hoc Networks IEEE Transactions on Vehicular Technology, Nov. 2009, Vol. 58, No. 9, pp

VANET Routing issues Highly dynamic topology Hard delay constraints Frequently disconnected network Sufficient energy and storage Mobility modeling

Routing Protocols Discussed Table driven/On demand Position Based

Mobility Model Saha and Johnson Simulator framework Shortest Path Random Src/Dest Speed limit +/- 5Mph NS2 Scenarios

STRAW TIGER database Traffic control/Car following Probability to turn Support for stop signs/Traffic lights

Proposed Model NS2 Scenarios Maps from Orlando Downtown and residential area (1000m x 1000m) for simulation Shortest Path from Random Source/Destination with Random senders New set of senders/Receivers every 50 SECs

Road Specs Speed Limits Overtaking with a probability ‘p’/ Acceleration ‘a’ defined for overtaking for a vehicle less than d meters ahead Car following for Vehicle greater than d meters

Intersection Specs Deceleration of ‘b’ towards a traffic light/Stop sign Waiting time at intersection computed using Straw Acceleration of ‘a’ until the speed limit arrives after which the Road mobility model takes over

Routing Protocols. CBRF Connection Based like AODV RREQ/RREP cycles RADIO RANGE R Nodes within a range r<R are forced not to broadcast Avoid broadcast by nodes in r to Nodes in R-r Carry and Run instead of RERR Routing Overhead / Delivery ratio

Packet Delivery Ratio

Routing overhead

CLGF Location Based Routing GPSR - Progressively Closest Node To the Destination CLGF - Progressively Closest Node to the Destination with manageable Congestion MAC layer Queue size/buffer length ratio with HELLO packets to set threshold TOCTOU???

Average Delay

Observations Layout/Intersections and Speed limit had the highest impact Following Distance, Deceleration, Acceleration, Overtaking Probability etc did not make much of an impact

Comments Obstacles in downtown/how to simulate Performance of one of the Protocols in both STRAW and the New model as a proper comparison instead of Average speed Simulation of one flow to actually see the impact of the Acceleration/Deceleration Different Maps

?

Security of Vehicular ad Hoc Networks

Need for Security Essential to make sure that life-critical information cannot be inserted or modified by an attacker; The system should be able to help establish the liability of drivers; but at the same time, it should protect as far as possible the privacy of the drivers and passengers. Maxim Raya and Jean-Pierre Hubaux The security of vehicular ad hoc networks. In Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks (SASN '05). ACM, New York, NY, USA

Application categories Safety-related applications, such as collision avoidance, cooperative driving, and traffic optimization Other applications, including payment services (e.g., toll collection), location-based services (e.g., finding the closest fuel station), infotainment (e.g., Internet access). Maxim Raya and Jean-Pierre Hubaux The security of vehicular ad hoc networks. In Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks (SASN '05). ACM, New York, NY, USA

Safety messages Maxim Raya and Jean-Pierre Hubaux The security of vehicular ad hoc networks. In Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks (SASN '05). ACM, New York, NY, USA

Attacker’s model Maxim Raya and Jean-Pierre Hubaux The security of vehicular ad hoc networks. In Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks (SASN '05). ACM, New York, NY, USA Insider vs. Outsider Malicious vs. Rational Active vs. Passive

Specific attacks Maxim Raya and Jean-Pierre Hubaux The security of vehicular ad hoc networks. In Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks (SASN '05). ACM, New York, NY, USA Bogus information Cheating with positioning information ID disclosure Denial of Service Masquerade

Security Model Maxim Raya and Jean-Pierre Hubaux The security of vehicular ad hoc networks. In Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks (SASN '05). ACM, New York, NY, USA Requirements – Authentication – Verification of data consistency – Availability – Non-repudiation – Privacy – Real-time constraints

Security Model Maxim Raya and Jean-Pierre Hubaux The security of vehicular ad hoc networks. In Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks (SASN '05). ACM, New York, NY, USA Securing messages V → * : M, SigPrK V [M|T], Cert V where – V : Sending Vehicle – M : Message – * : all the receivers – SigPrKv : Signed with private key – M | T : Message concatenated with Timestamp – Certv : Digital Signature for V

Security Model Maxim Raya and Jean-Pierre Hubaux The security of vehicular ad hoc networks. In Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks (SASN '05). ACM, New York, NY, USA Tamper-proof device – storing the secret information – signing outgoing messages Key management – Electronic License Plate (ELP) – Electronic Chassis Number (ECN) – Anonymous key pairs – Key bootstrapping and rekeying – Key certification Cert V [PuK i ] = PuK i |SigPrK CA [PuK i |ID CA ]

Security Model Maxim Raya and Jean-Pierre Hubaux The security of vehicular ad hoc networks. In Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks (SASN '05). ACM, New York, NY, USA Compliance with the security requirements – DoS resilience – Verification by correlation – Non-repudiation ELPs cannot be forged Usage of anonymous key pairs

Security Model Maxim Raya and Jean-Pierre Hubaux The security of vehicular ad hoc networks. In Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks (SASN '05). ACM, New York, NY, USA Implementation issues – Certificate lifetime – Anonymous key set size – Signature size T oh (M) = T sign (M) + T tx (M|SigPrK V [M]) + T verify (M)

Security Model Maxim Raya and Jean-Pierre Hubaux The security of vehicular ad hoc networks. In Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks (SASN '05). ACM, New York, NY, USA

Security Model Maxim Raya and Jean-Pierre Hubaux The security of vehicular ad hoc networks. In Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks (SASN '05). ACM, New York, NY, USA Simulations Scenario 1: A highway with 6 lanes (3 in each direction) of 3 m each. We assume a uniform presence of vehicles, with an inter-vehicle space of 30 m. Vehicles are mobile and trasmit DSRC messages every 300 ms over a 300 m communication range. Scenario 2: We consider the same highway as in the previous case but this time vehicles are very slow or stopped (congestion scenario) and spaced by 5 m (including the vehicle length). Each vehicle transmits a safety message over a range of 15 m every 100 ms.

Security Model Maxim Raya and Jean-Pierre Hubaux The security of vehicular ad hoc networks. In Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks (SASN '05). ACM, New York, NY, USA

Disadvantages Maxim Raya and Jean-Pierre Hubaux The security of vehicular ad hoc networks. In Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks (SASN '05). ACM, New York, NY, USA Key-revocation Updating keys periodically