On-Board Unit Hardware and Software Design for Vehicular Ad-Hoc Networks

Author(s):  
Matteo Petracca ◽  
Paolo Pagano ◽  
Riccardo Pelliccia ◽  
Marco Ghibaudi ◽  
Claudio Salvadori ◽  
...  

Intelligent Transport Systems (ITS) are a focus of public authorities and research communities in order for them to provide effective solutions for improving citizens’ security and lifestyle. The effectiveness of such systems relies on the prompt processing of the acquired traffic- and vehicle-related information to react to congestion and dangerous situations. To obtain a dynamic and pervasive environment where vehicles are fully integrated in the ITS, low cost technologies (capable of strongly penetrating the market) must be made available by the effort of academic and industrial research. In this chapter, the authors discuss the design and implementation of a prototype vehicular unit capable of interacting with both roadside networks and in-vehicle electronic devices. More in detail, in order to scientifically characterize the solution, the authors start from a clear statement of the requirements that the vehicle equipment should respond to. Then they detail the selection of the off-the-shelf components adopted in the prototyped on-board unit. In the last part of the chapter, the authors discuss several possible applications in which the developed device can be adopted, as well as open issues for future research activities.

Author(s):  
Matteo Petracca ◽  
Paolo Pagano ◽  
Riccardo Pelliccia ◽  
Marco Ghibaudi ◽  
Claudio Salvadori ◽  
...  

Intelligent Transport Systems (ITS) are a focus of public authorities and research communities in order for them to provide effective solutions for improving citizens' security and lifestyle. The effectiveness of such systems relies on the prompt processing of the acquired traffic- and vehicle-related information to react to congestion and dangerous situations. To obtain a dynamic and pervasive environment where vehicles are fully integrated in the ITS, low cost technologies (capable of strongly penetrating the market) must be made available by the effort of academic and industrial research. In this chapter, the authors discuss the design and implementation of a prototype vehicular unit capable of interacting with both roadside networks and in-vehicle electronic devices. More in detail, in order to scientifically characterize the solution, the authors start from a clear statement of the requirements that the vehicle equipment should respond to. Then they detail the selection of the off-the-shelf components adopted in the prototyped on-board unit. In the last part of the chapter, the authors discuss several possible applications in which the developed device can be adopted, as well as open issues for future research activities.


2021 ◽  
Vol 7 (2) ◽  
Author(s):  
Akshay Kumar MV ◽  
Amogh C ◽  
Bhuvan S Kashyap ◽  
Drupad N Maharaj ◽  
Shazia Sultana

India accounts for the highest road accidents and traffic congestion globally. The necessity for a canny vehicle framework is of great importance. VANET, abbreviated as Vehicular ad hoc networks is a network created in an ad hoc manner where different vehicles can exchange useful information among each other with dedicated servers ensuring safe travel. Security in VANET has always been a challenge in implementing a real time intelligent transport system. VANET is a type of mobile ad-hoc, to give correspondences among close by vehicles and among vehicles and close by fixed hardware. Vehicular ad hoc networks are highly dynamic in nature and suffer from frequent path breakage due to the high velocity of the moving vehicle. Hence, there are many security challenges and different types of attacks that makes VANETs less secure. Therefore, providing secure dedicated short-range communication (DSRC) easefully with any loss of data or malicious nodes has been a major research area. The major concern being addressed in the paper is to provide secure communication and save lives in road accidents. The role of security is high and messages in DSRC send warning messages to other vehicles. If attackers change these messages, then accidents become a part of the network and users’ lives can be at risk. Different classes of attacks include monitoring attack, social attack, timing attack, application attack and network attack to name a few. Advanced encryption standard is a symmetric block encryption algorithm. There is no evidence to crack this algorithm till date. This paper will provide a detailed overview of VANET architecture, types of attacks on VANET, AES algorithm and its salient features and how this algorithm could be utilized to make intelligent transport systems secure.


Author(s):  
Y. Khayati ◽  
T. Mazri

Abstract. The Vehicular Ad-hoc Network (VANET) is a fast-growing and highly motivated area of research to provide Intelligent Transport Systems (ITS) services to end-users; these services are also responsible for providing an efficient driving environment. in VANET networks, several routing protocols have been designed, but still networks are vulnerable to many threats in the presence of malicious nodes. Today, security is a major challenge in various VANET applications where a bad message can directly or indirectly affect human lives. In this paper, we examine some routing attacks such as Black hole & Wormhole attacks, as well as available solutions for such attacks in existing VANET protocols.


Author(s):  
Stefano Busanelli ◽  
Gianluigi Ferrari ◽  
Vito Andrea Giorgio ◽  
Nicola Iotti

In recent years, Vehicular Ad-hoc NETworks (VANETs) have experienced an intense development phase, driven by academia, industry, and public authorities. On the basis of the obtained results, it is reasonable to expect that VANETs will finally hit the market in the near future. In order to reach commercial success, VANETs must effectively operate during the first years of deployment, when the market penetration rate will be unavoidably low, and, consequently, only a small number of suitably equipped vehicles (VANET-enabled) will be present on the roads. Among the possible strategies to face the initial sparse VANET scenarios, the deployment of an auxiliary network constituted by fixed Road Side Units (RSUs), either Dissemination Points (DPs) or relays, is certainly one of the most promising. In order to maximize the benefits offered by this support infrastructure, the placement of RSUs needs to be carefully studied. In this chapter, the authors analyze, by means of numerical simulations, the performance of an application that leverages on a finite number of DPs for disseminating information to the transiting vehicles. The positions of the DPs are determined through a recently proposed family of optimal placement algorithms, on the basis of proper vehicular mobility traces. The analysis is carried out considering two realistic urban scenarios. In both cases, the performance improvement brought by the use of multi-hop broadcast protocols, with respect to classical single-hop communications with DPs, is investigated.


Author(s):  
Amira Kchaou ◽  
Ryma Abassi ◽  
Sihem Guemara El Fatmi

Vehicular ad-hoc networks (VANETs) allow communication among vehicles using some fixed equipment on roads called roads side units. Vehicular communications are used for sharing different kinds of information between vehicles and RSUs in order to improve road safety and provide travelers comfort using exchanged messages. However, falsified or modified messages can be transmitted that affect the performance of the whole network and cause bad situations in roads. To mitigate this problem, trust management can be used in VANET and can be distributive for ensuring safe and secure communication between vehicles. Trust is a security concept that has attracted the interest of many researchers and used to build confident relations among vehicles. Hence, the authors propose a secured clustering mechanism for messages exchange in VANET in order to organize vehicles into clusters based on vehicles velocity, then CH computes the credibility of message using the reputation of vehicles and the miner controls the vehicle's behavior for verifying the correctness of the message.


Author(s):  
Ali Kamil Ahmed ◽  
Mohanad Najm Abdulwahed ◽  
Behnam Farzaneh

<p>Vehicular Ad-hoc Networks (VANETs) are one of the most important types of networks which are widely used in recent years. Along with all the benefits of Quality of Service (QoS) improvements, vulnerability analysis for this type of networks is an important issue. For instance, a Gray-hole attack decreases network performance. We proposed a novel solution to help to secure these networks against this vulnerability. The proposed method can detect and prevent the Gray-hole attack. Anywhere in the network, each node (vehicle) can distinguish between the Gray-hole attack and the failed link. Some topology related information helps us to detect attacks more accurately. Also, the proposed method uses the most reliable path in terms of link failure when there is no malicious node. In this paper, we used the TOPSIS method for choosing the most trusted node for routing intelligently. We validated our proposal using a simulation model in the NS-2 simulator. Simulation results show that the proposed method can prevent Gray-hole attack efficiently with low overhead.</p>


Author(s):  
Varun G. Menon ◽  
Joe Prathap

In recent years Vehicular Ad Hoc Networks (VANETs) have received increased attention due to its numerous applications in cooperative collision warning and traffic alert broadcasting. VANETs have been depending on cloud computing for networking, computing and data storage services. Emergence of advanced vehicular applications has led to the increased demand for powerful communication and computation facilities with low latency. With cloud computing unable to satisfy these demands, the focus has shifted to bring computation and communication facilities nearer to the vehicles, leading to the emergence of Vehicular Fog Computing (VFC). VFC installs highly virtualized computing and storage facilities at the proximity of these vehicles. The integration of fog computing into VANETs comes with a number of challenges that range from improved quality of service, security and privacy of data to efficient resource management. This paper presents an overview of this promising technology and discusses the issues and challenges in its implementation with future research directions.


Sensors ◽  
2020 ◽  
Vol 20 (15) ◽  
pp. 4253
Author(s):  
Xiaoqiang Sun ◽  
F. Richard Yu ◽  
Peng Zhang ◽  
Weixin Xie ◽  
Xiang Peng

In vehicular ad hoc networks (VANETs), the security and privacy of vehicle data are core issues. In order to analyze vehicle data, they need to be computed. Encryption is a common method to guarantee the security of vehicle data in the process of data dissemination and computation. However, encrypted vehicle data cannot be analyzed easily and flexibly. Because homomorphic encryption supports computations of the ciphertext, it can completely solve this problem. In this paper, we provide a comprehensive survey of secure computation based on homomorphic encryption in VANETs. We first describe the related definitions and the current state of homomorphic encryption. Next, we present the framework, communication domains, wireless access technologies and cyber-security issues of VANETs. Then, we describe the state of the art of secure basic operations, data aggregation, data query and other data computation in VANETs. Finally, several challenges and open issues are discussed for future research.


Sign in / Sign up

Export Citation Format

Share Document