Vehicular Ad-hoc Network
Create New

Vehicular Ad-hoc Network



Vehicular Ad-hoc Network
Vehicular Ad-hoc Network

Project Rating

Overall Rating
0
0
0
0
0

Vehicular ad-hoc networks (VANETs) are created by applying the principles of mobile ad hoc networks (MANETs) – the spontaneous creation of a wireless network of mobile devices – to the domain of vehicles.[1] VANETs were first mentioned and introduced [2] in 2001 under "car-to-car ad-hoc mobile communication and networking" applications, where networks can be formed and information can be relayed among cars. It was shown that vehicle-to-vehicle and vehicle-to-roadside communications architectures will co-exist in VANETs to provide road safety, navigation, and other roadside services. VANETs are a key part of the intelligent transportation systems (ITS) framework. Sometimes, VANETs are referred to as Intelligent Transportation Networks

While, in the early 2000s, VANETs were seen as a mere one-to-one application of MANET principles, they have since then developed into a field of research in their own right. By 2015, (p3) the term VANET became mostly synonymous with the more generic term inter-vehicle communication (IVC), although the focus remains on the aspect of spontaneous networking, much less on the use of infrastructures like Road Side Units (RSUs) or cellular networks.

Why: Problem statement

For the long term of vehicle communication research, now VANET is in a stage of implementation. However, most VANET researches focus on message transmission. The vehicle is extremely personal device; therefore personal information, so-called privacy has to be protected. In this paper, we analyze identity and location privacy threatening factors, problems, and solutions based on the network models. To analyze the solution’s effectiveness, we define four attack models: External attack, Internal attack, Correlational attack, and Relational attack. According to our research, most of the solutions use pseudonym identity or address changing schemes to protect identity privacy. Also, solutions are weak to or do not consider the relational attack. We analyze this is due to the meet the network model’s transparency design goal and protect the vehicle’s real identity even revealing the vehicle’s location. The result of this paper could guide a way to design a privacy preserve solution and present a trend of existing solutions

How: Solution description

Vehicular ad hoc networks (VANETs) have the potential to transform the way people travel through the creation of a safe interoperable wireless communications network that includes cars, buses, traffic signals, cell phones, and other devices. However, VANETs are vulnerable to security threats due to increasing reliance on communication, computing, and control technologies. The unique security and privacy challenges posed by VANETs include integrity (data trust), confidentiality, nonrepudiation, access control, real-time operational constraints/demands, availability, and privacy protection. The trustworthiness of VANETs could be improved by addressing holistically both data trust, which is defined as the assessment of whether or not and to what extent the reported traffic data are trustworthy, and node trust, which is defined as how trustworthy the nodes in VANETs are. In this paper, an attack-resistant trust management scheme (ART) is proposed for VANETs that is able to detect and cope with malicious attacks and also evaluate the trustworthiness of both data and mobile nodes in VANETs. Especially, data trust is evaluated based on the data sensed and collected from multiple vehicles; node trust is assessed in two dimensions, i.e., functional trust and recommendation trust, which indicate how likely a node can fulfill its functionality and how trustworthy the recommendations from a node for other nodes will be, respectively. The effectiveness and efficiency of the proposed ART scheme are validated through extensive experiments. The proposed trust management theme is applicable to a wide range of VANET applications to improve traffic safety, mobility, and environmental protection with enhanced trustworthiness.

How is it different from competition

In our project, we provide data integrity (data trust), confidentiality, nonrepudiation, access control, real-time operational constraints/demands, availability, and privacy protection

Who are your customers

  • Vehicle drivers
  • Common people

Project Phases and Schedule

Proposing attack-resistant trust management 

Node trust is assessed in two dimensions

The effectiveness and efficiency of the proposed ART scheme is validated through extensive experiments

 

Resources Required

NS2

TCL procedure

Network Animator Window

Comments

Leave a Comment

Post a Comment

About This Project

Project period

08/15/2019 - 09/13/2019

Views

38

Courses

Get trained in Learny Technologies and develop your own applications.

New batch starts from Nov 13th.