SlideShare une entreprise Scribd logo
1  sur  20
User Requirements Model for Vehicular Ad hoc
Network (VANET) Applications
Dr. IA. Sumra
overview
 Introduction
 Dedicated Short Range Communication (DSRC)
 Propose Model
 VANET Applications
 Conclusion
 References
 Q&A
2
Introduction
 Problems in Current Traffic System(TS)
 Road Accident
 Traffic Congestion
Fig.1 Road Accident Fig.2 Traffic Congestion
3
Introduction
 Accidents
 1.27 million people are died over the globe in traffic accidents.
 50 million people are seriously injured
 In poor countries the children death rate due to road accident is high as compare
to any other serious disease such as malaria or AIDS.
 Passage of time the rate of road accidents is increasing and by 2020 the increasing
road accidents will become serious threats to human lives.
People
Injuries
People
Died
4
Introduction
 Traffic Jam
 In 2003, US drivers lost a total of 3.5 billion hours and
5.7 billion gallons of fuel to traffic congestion.
5
Time Fuel
Vehicular Ad hoc Network (VANET)
 Vehicular ad-hoc network is a special kind of network in which nodes (Vehicles) can
communicate with each other on the road and with its Infrastructure.
 Benefits of VANET to users
 Avoids Road Accidents
 Reduces Traffic Congestion
 Improves Entertainment
Road Side
Unit (RSU)
V2I
V2
V
Server (Location
Based Service)
Server (Traffic
Monitoring)
Fig3. Basic VANET Architecture
Motivation for VANET
Increase safety Traffic Optimization
Safe Human
lives
Save Time Save Fuel
VANET Motivation
Fig4. VANET Motivation
7
Dedicated Short Range Communication (DSRC)
 Federal Communication Commission (FCC)
allocate frequency band and purpose of this is to
provide wireless communication between vehicle
to vehicle (V2I) and vehicle to Infrastructure (V2I).
 DSRC provides multiple channels and its
transmission ranges from 5.850 to 5.925 GHz.
 DSRC provides seven channels (safety and non
safety channels) and each channel range is 10
MHz.
8
9
Dedicated Short Range Communication (DSRC)
Fig5. DSRC and its safety and non safety Channels
Proposed Model
10
 Proposed model is consist of three layers.
 First layer describe the basic users’ requirements which are Security, privacy
and trust.
 Second and third layers are consisting of the safety and non safety
applications of the
VANET and these two layers meet first layer requirement.
Fig.6 User Requirements Model
User Requirement and VANET Applications
11
Security
Trust
Privacy
Safety
Application
Non Safety
Application
VANET
Security, Privacy and Trust(SPT)
 Security
 Security is an important user’s requirement in VANET as if VANET is not secure from attackers then
these applications may not achieve the primary purpose i.e. safer human lives.
 VANET applications require the integrity because life critical information should not be changed by
any attacker.
 Vehicle wants to access the other vehicles in the network or access the infrastructure, then network is
not available to user due to some kind of fault or any kind of attack (denial of service).
 Privacy
 Privacy in VANET is to secure the user’s personal data and their location. When user sends any
message to other vehicles, it should not affect their privacy. Users’ need privacy and may not allow
seeing their personal data and their locations. Users sensitive information can not open to
unauthorized persons.
 Name of user / driver
 License plate of the vehicle
 Speed of the vehicle
 Position / Location
 Route for traveling
 Internal car sensor data
 Trust
 Trust is the key element of security system. When users receive any message from other nodes or
from infrastructure it should be trusted because user reacts according to the message. The attackers
change the contents of the message and break the trust between the vehicles.
12
Security
Accident at
location Z!
Road is
CLEAR!!!!
Fig.7 Attacker alters the message
RSU
TOC
Fig.8 Jam Communication Channel between V2V and V2I
Safety Applications
 Active Safety Applications
 Active safety application can help to prevent accidents and work as pre crash applications.
 Active safety applications are based on control functions and the purpose of this to
exchange the sensor data or status information between the vehicle to vehicle (V2V) and
vehicles to infrastructure (V2I).
 The goal of sending this kind of information to users is to react accordingly and avoid the
accident.
 Passive Safety Applications
 Passive safety applications work inside the vehicle and protect the passengers against injury in the
event of accident.
 Safety belt and air bags are the examples of passive safety applications.
 Passive safety applications can not provide help to avoid accidents.
14
Work
in Progress
Plz!use Alt.
route
Work Zone
Warning:!!!
Fig.9 Safety Application
Work Zone
Warning:!!!
Non Safety Applications
Shopping MALL
( TESCO )
Parking Slot
Available!!!
RSU
Fig.11 Non Safety Application
Parking Slot
Available!!!
 Convenience Applications
 Road Status Services (RSS)
 Parking Availability Services (PAS) Road is
CLEAR!!!!
Fig.10 Road Status Services (RSS)
15
Non Safety Applications
 Comfort Applications
 Toll Collection Services (TCS)
 Personal and Diagnostics Services (PDS)
 Services offering Messages (SOM)
 Map Download Services (MDS)
 Entertainment Service (ES)
16
Fig.12 Summary of all Applications17
Conclusion
 Due to high death rate and congestion on roads,
researchers and car manufacturing industries want to find
some possible solutions by using of VANET technology.
 VANET potential applications directly focus on user’s life
on the road by sending some safety messages. In propose
model it is explained the relationship between the user
requirements and VANET safety and non safety
applications are meets these requirements.
 In future these VANET applications will improve the traffic
system and reduces the death rate in road accidents.
19
20
 Send email: isomro28@gmail.com
 Please download complete paper
 IEEEE website
 ResearchGate
 Video Available on given link:-
 https://www.youtube.com/watch?v=aNQEF9qkpfM

Contenu connexe

Tendances

Vehicular ad hoc network - VANET
Vehicular ad hoc network - VANETVehicular ad hoc network - VANET
Vehicular ad hoc network - VANETSarah Baras
 
Cooperative Message Authentication Protocol(CMAP) in VANET
Cooperative Message Authentication Protocol(CMAP) in VANETCooperative Message Authentication Protocol(CMAP) in VANET
Cooperative Message Authentication Protocol(CMAP) in VANETMayuresh Bhagat
 
vehicular communications
vehicular communicationsvehicular communications
vehicular communicationsSaikiran Guduri
 
V2V communications
V2V communicationsV2V communications
V2V communicationsSai Avinash
 
The Security and Privacy Requirements in VANET
The Security and Privacy Requirements in VANETThe Security and Privacy Requirements in VANET
The Security and Privacy Requirements in VANETAnkit Singh
 
Vehicular sensor netwks ppt
Vehicular sensor netwks pptVehicular sensor netwks ppt
Vehicular sensor netwks pptVenkatesh Kaduru
 
Security issues and solutions in vehicular adhoc network a review approach
Security issues and solutions in vehicular adhoc network  a review approachSecurity issues and solutions in vehicular adhoc network  a review approach
Security issues and solutions in vehicular adhoc network a review approachcsandit
 
VANETs Presentation
VANETs PresentationVANETs Presentation
VANETs PresentationiQra Rafaqat
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol     for vehicular ad hoc networksEmap expedite message authentication protocol     for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksMadan Golla
 
Vehicle to vehicle communication
Vehicle to vehicle communicationVehicle to vehicle communication
Vehicle to vehicle communicationVijayalakshmi Joger
 
V2V Training, Vehicle to-vehicle (v2v) communications training
V2V Training, Vehicle to-vehicle (v2v) communications trainingV2V Training, Vehicle to-vehicle (v2v) communications training
V2V Training, Vehicle to-vehicle (v2v) communications trainingBryan Len
 
[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network SecurityLim Jung
 
VANET for Security using Cryptography
VANET for Security using Cryptography VANET for Security using Cryptography
VANET for Security using Cryptography Pallavi Agarwal
 
VANET in Mobile Computing
VANET in Mobile ComputingVANET in Mobile Computing
VANET in Mobile ComputingKABILESH RAMAR
 
Vehicle To Vehicle Communication System
Vehicle To Vehicle Communication SystemVehicle To Vehicle Communication System
Vehicle To Vehicle Communication SystemMonaco Motors
 
VANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSVANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSSridhar Raghavan
 
Vehicle to vehicle communication
Vehicle to vehicle communicationVehicle to vehicle communication
Vehicle to vehicle communicationNavin B S
 

Tendances (20)

Vehicular ad hoc network - VANET
Vehicular ad hoc network - VANETVehicular ad hoc network - VANET
Vehicular ad hoc network - VANET
 
Cooperative Message Authentication Protocol(CMAP) in VANET
Cooperative Message Authentication Protocol(CMAP) in VANETCooperative Message Authentication Protocol(CMAP) in VANET
Cooperative Message Authentication Protocol(CMAP) in VANET
 
vehicular communications
vehicular communicationsvehicular communications
vehicular communications
 
V2V communications
V2V communicationsV2V communications
V2V communications
 
The Security and Privacy Requirements in VANET
The Security and Privacy Requirements in VANETThe Security and Privacy Requirements in VANET
The Security and Privacy Requirements in VANET
 
Vehicular sensor netwks ppt
Vehicular sensor netwks pptVehicular sensor netwks ppt
Vehicular sensor netwks ppt
 
Security issues and solutions in vehicular adhoc network a review approach
Security issues and solutions in vehicular adhoc network  a review approachSecurity issues and solutions in vehicular adhoc network  a review approach
Security issues and solutions in vehicular adhoc network a review approach
 
Issues of routing in vanet
Issues of routing in vanetIssues of routing in vanet
Issues of routing in vanet
 
VANETs Presentation
VANETs PresentationVANETs Presentation
VANETs Presentation
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol     for vehicular ad hoc networksEmap expedite message authentication protocol     for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
VANET, Security and Trust
VANET, Security and TrustVANET, Security and Trust
VANET, Security and Trust
 
Vehicle to vehicle communication
Vehicle to vehicle communicationVehicle to vehicle communication
Vehicle to vehicle communication
 
V2V Training, Vehicle to-vehicle (v2v) communications training
V2V Training, Vehicle to-vehicle (v2v) communications trainingV2V Training, Vehicle to-vehicle (v2v) communications training
V2V Training, Vehicle to-vehicle (v2v) communications training
 
[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security
 
VANET
VANETVANET
VANET
 
VANET for Security using Cryptography
VANET for Security using Cryptography VANET for Security using Cryptography
VANET for Security using Cryptography
 
VANET in Mobile Computing
VANET in Mobile ComputingVANET in Mobile Computing
VANET in Mobile Computing
 
Vehicle To Vehicle Communication System
Vehicle To Vehicle Communication SystemVehicle To Vehicle Communication System
Vehicle To Vehicle Communication System
 
VANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSVANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkS
 
Vehicle to vehicle communication
Vehicle to vehicle communicationVehicle to vehicle communication
Vehicle to vehicle communication
 

Similaire à VANET Applications and User Requirement

User Requirements Model for VANET Applications
User Requirements Model for VANET ApplicationsUser Requirements Model for VANET Applications
User Requirements Model for VANET ApplicationsDr.Irshad Ahmed Sumra
 
Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)
Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)
Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)Dr. Amarjeet Singh
 
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...IJERA Editor
 
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationSurvey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationIJERA Editor
 
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Dr. Amarjeet Singh
 
Security Requirements for IVC Network
 Security Requirements for IVC Network  Security Requirements for IVC Network
Security Requirements for IVC Network IRJET Journal
 
Vehicular network-project-fin
Vehicular network-project-finVehicular network-project-fin
Vehicular network-project-finASMA HADELI
 
Trust and Trusted Computing in VANET
Trust and Trusted Computing in VANETTrust and Trusted Computing in VANET
Trust and Trusted Computing in VANETDr.Irshad Ahmed Sumra
 
Forming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETForming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETDr.Irshad Ahmed Sumra
 
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...Dr.Irshad Ahmed Sumra
 
ACCIDENT DETECTION AND AVOIDANCE USING VEHICLE TO VEHICLE COMMUNICATION (V2V)
ACCIDENT DETECTION AND AVOIDANCE USING VEHICLE TO VEHICLE COMMUNICATION (V2V)ACCIDENT DETECTION AND AVOIDANCE USING VEHICLE TO VEHICLE COMMUNICATION (V2V)
ACCIDENT DETECTION AND AVOIDANCE USING VEHICLE TO VEHICLE COMMUNICATION (V2V)IRJET Journal
 
IRJET- Smart Technology for Vehicle Safety
IRJET- Smart Technology for Vehicle SafetyIRJET- Smart Technology for Vehicle Safety
IRJET- Smart Technology for Vehicle SafetyIRJET Journal
 
Overview of VANET with Its Features and Security Attacks
Overview of VANET with Its Features and Security AttacksOverview of VANET with Its Features and Security Attacks
Overview of VANET with Its Features and Security AttacksIRJET Journal
 
IRJET- Future of Transport: Connected Vehicles
IRJET-  	  Future of Transport: Connected VehiclesIRJET-  	  Future of Transport: Connected Vehicles
IRJET- Future of Transport: Connected VehiclesIRJET Journal
 
A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...
A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...
A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...IOSR Journals
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
 

Similaire à VANET Applications and User Requirement (20)

User Requirements Model for VANET Applications
User Requirements Model for VANET ApplicationsUser Requirements Model for VANET Applications
User Requirements Model for VANET Applications
 
Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)
Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)
Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)
 
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...
 
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationSurvey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
 
[IJET-V1I5P11]Authors: Medhavi Malik, Rupika Dureja
[IJET-V1I5P11]Authors: Medhavi Malik, Rupika Dureja[IJET-V1I5P11]Authors: Medhavi Malik, Rupika Dureja
[IJET-V1I5P11]Authors: Medhavi Malik, Rupika Dureja
 
Jb3515641568
Jb3515641568Jb3515641568
Jb3515641568
 
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
 
Security Requirements for IVC Network
 Security Requirements for IVC Network  Security Requirements for IVC Network
Security Requirements for IVC Network
 
Ijetr042176
Ijetr042176Ijetr042176
Ijetr042176
 
Vehicular network-project-fin
Vehicular network-project-finVehicular network-project-fin
Vehicular network-project-fin
 
Trust and Trusted Computing in VANET
Trust and Trusted Computing in VANETTrust and Trusted Computing in VANET
Trust and Trusted Computing in VANET
 
Forming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETForming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANET
 
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
 
ACCIDENT DETECTION AND AVOIDANCE USING VEHICLE TO VEHICLE COMMUNICATION (V2V)
ACCIDENT DETECTION AND AVOIDANCE USING VEHICLE TO VEHICLE COMMUNICATION (V2V)ACCIDENT DETECTION AND AVOIDANCE USING VEHICLE TO VEHICLE COMMUNICATION (V2V)
ACCIDENT DETECTION AND AVOIDANCE USING VEHICLE TO VEHICLE COMMUNICATION (V2V)
 
IRJET- Smart Technology for Vehicle Safety
IRJET- Smart Technology for Vehicle SafetyIRJET- Smart Technology for Vehicle Safety
IRJET- Smart Technology for Vehicle Safety
 
Overview of VANET with Its Features and Security Attacks
Overview of VANET with Its Features and Security AttacksOverview of VANET with Its Features and Security Attacks
Overview of VANET with Its Features and Security Attacks
 
IRJET- Future of Transport: Connected Vehicles
IRJET-  	  Future of Transport: Connected VehiclesIRJET-  	  Future of Transport: Connected Vehicles
IRJET- Future of Transport: Connected Vehicles
 
A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...
A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...
A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
 

Plus de Dr.Irshad Ahmed Sumra

Using the grades mechanism to differentiate the users in VANET
Using the grades mechanism to differentiate the users in VANETUsing the grades mechanism to differentiate the users in VANET
Using the grades mechanism to differentiate the users in VANETDr.Irshad Ahmed Sumra
 
Security issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A SurveySecurity issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A SurveyDr.Irshad Ahmed Sumra
 
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANETUsing Computing Methods to Secure VANET
Using Computing Methods to Secure VANETDr.Irshad Ahmed Sumra
 
Comparative study of security hardware modules in VANET
Comparative study of security hardware modules in VANETComparative study of security hardware modules in VANET
Comparative study of security hardware modules in VANETDr.Irshad Ahmed Sumra
 
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...Dr.Irshad Ahmed Sumra
 
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...Dr.Irshad Ahmed Sumra
 
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...Dr.Irshad Ahmed Sumra
 
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDenial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDr.Irshad Ahmed Sumra
 
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Dr.Irshad Ahmed Sumra
 
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANETUsing tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANETDr.Irshad Ahmed Sumra
 
VANET Security Research and Development Ecosystem
VANET Security Research and Development EcosystemVANET Security Research and Development Ecosystem
VANET Security Research and Development EcosystemDr.Irshad Ahmed Sumra
 
Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
Behavior of Attacker and Some New Possible Attacks in Vehicular CommunicationBehavior of Attacker and Some New Possible Attacks in Vehicular Communication
Behavior of Attacker and Some New Possible Attacks in Vehicular CommunicationDr.Irshad Ahmed Sumra
 

Plus de Dr.Irshad Ahmed Sumra (18)

Using the grades mechanism to differentiate the users in VANET
Using the grades mechanism to differentiate the users in VANETUsing the grades mechanism to differentiate the users in VANET
Using the grades mechanism to differentiate the users in VANET
 
Security issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A SurveySecurity issues and challenges in MANET,VANET and FANET: A Survey
Security issues and challenges in MANET,VANET and FANET: A Survey
 
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANETUsing Computing Methods to Secure VANET
Using Computing Methods to Secure VANET
 
Trusted Computing in VANET
Trusted Computing in VANETTrusted Computing in VANET
Trusted Computing in VANET
 
Comparative study of security hardware modules in VANET
Comparative study of security hardware modules in VANETComparative study of security hardware modules in VANET
Comparative study of security hardware modules in VANET
 
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
 
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
 
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
 
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDenial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
 
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
 
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANETUsing tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
 
VANET Security Research and Development Ecosystem
VANET Security Research and Development EcosystemVANET Security Research and Development Ecosystem
VANET Security Research and Development Ecosystem
 
Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
Behavior of Attacker and Some New Possible Attacks in Vehicular CommunicationBehavior of Attacker and Some New Possible Attacks in Vehicular Communication
Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
 
Timing Attack in Vehicular Network
Timing Attack in Vehicular NetworkTiming Attack in Vehicular Network
Timing Attack in Vehicular Network
 
Classes of Attacks in VANET
Classes of Attacks in VANETClasses of Attacks in VANET
Classes of Attacks in VANET
 
VANET Security and Trust
VANET Security and TrustVANET Security and Trust
VANET Security and Trust
 
ITS and VSS
ITS and VSSITS and VSS
ITS and VSS
 
VANET Trust
VANET TrustVANET Trust
VANET Trust
 

Dernier

Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 

Dernier (20)

Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 

VANET Applications and User Requirement

  • 1. User Requirements Model for Vehicular Ad hoc Network (VANET) Applications Dr. IA. Sumra
  • 2. overview  Introduction  Dedicated Short Range Communication (DSRC)  Propose Model  VANET Applications  Conclusion  References  Q&A 2
  • 3. Introduction  Problems in Current Traffic System(TS)  Road Accident  Traffic Congestion Fig.1 Road Accident Fig.2 Traffic Congestion 3
  • 4. Introduction  Accidents  1.27 million people are died over the globe in traffic accidents.  50 million people are seriously injured  In poor countries the children death rate due to road accident is high as compare to any other serious disease such as malaria or AIDS.  Passage of time the rate of road accidents is increasing and by 2020 the increasing road accidents will become serious threats to human lives. People Injuries People Died 4
  • 5. Introduction  Traffic Jam  In 2003, US drivers lost a total of 3.5 billion hours and 5.7 billion gallons of fuel to traffic congestion. 5 Time Fuel
  • 6. Vehicular Ad hoc Network (VANET)  Vehicular ad-hoc network is a special kind of network in which nodes (Vehicles) can communicate with each other on the road and with its Infrastructure.  Benefits of VANET to users  Avoids Road Accidents  Reduces Traffic Congestion  Improves Entertainment Road Side Unit (RSU) V2I V2 V Server (Location Based Service) Server (Traffic Monitoring) Fig3. Basic VANET Architecture
  • 7. Motivation for VANET Increase safety Traffic Optimization Safe Human lives Save Time Save Fuel VANET Motivation Fig4. VANET Motivation 7
  • 8. Dedicated Short Range Communication (DSRC)  Federal Communication Commission (FCC) allocate frequency band and purpose of this is to provide wireless communication between vehicle to vehicle (V2I) and vehicle to Infrastructure (V2I).  DSRC provides multiple channels and its transmission ranges from 5.850 to 5.925 GHz.  DSRC provides seven channels (safety and non safety channels) and each channel range is 10 MHz. 8
  • 9. 9 Dedicated Short Range Communication (DSRC) Fig5. DSRC and its safety and non safety Channels
  • 10. Proposed Model 10  Proposed model is consist of three layers.  First layer describe the basic users’ requirements which are Security, privacy and trust.  Second and third layers are consisting of the safety and non safety applications of the VANET and these two layers meet first layer requirement. Fig.6 User Requirements Model
  • 11. User Requirement and VANET Applications 11 Security Trust Privacy Safety Application Non Safety Application VANET
  • 12. Security, Privacy and Trust(SPT)  Security  Security is an important user’s requirement in VANET as if VANET is not secure from attackers then these applications may not achieve the primary purpose i.e. safer human lives.  VANET applications require the integrity because life critical information should not be changed by any attacker.  Vehicle wants to access the other vehicles in the network or access the infrastructure, then network is not available to user due to some kind of fault or any kind of attack (denial of service).  Privacy  Privacy in VANET is to secure the user’s personal data and their location. When user sends any message to other vehicles, it should not affect their privacy. Users’ need privacy and may not allow seeing their personal data and their locations. Users sensitive information can not open to unauthorized persons.  Name of user / driver  License plate of the vehicle  Speed of the vehicle  Position / Location  Route for traveling  Internal car sensor data  Trust  Trust is the key element of security system. When users receive any message from other nodes or from infrastructure it should be trusted because user reacts according to the message. The attackers change the contents of the message and break the trust between the vehicles. 12
  • 13. Security Accident at location Z! Road is CLEAR!!!! Fig.7 Attacker alters the message RSU TOC Fig.8 Jam Communication Channel between V2V and V2I
  • 14. Safety Applications  Active Safety Applications  Active safety application can help to prevent accidents and work as pre crash applications.  Active safety applications are based on control functions and the purpose of this to exchange the sensor data or status information between the vehicle to vehicle (V2V) and vehicles to infrastructure (V2I).  The goal of sending this kind of information to users is to react accordingly and avoid the accident.  Passive Safety Applications  Passive safety applications work inside the vehicle and protect the passengers against injury in the event of accident.  Safety belt and air bags are the examples of passive safety applications.  Passive safety applications can not provide help to avoid accidents. 14 Work in Progress Plz!use Alt. route Work Zone Warning:!!! Fig.9 Safety Application Work Zone Warning:!!!
  • 15. Non Safety Applications Shopping MALL ( TESCO ) Parking Slot Available!!! RSU Fig.11 Non Safety Application Parking Slot Available!!!  Convenience Applications  Road Status Services (RSS)  Parking Availability Services (PAS) Road is CLEAR!!!! Fig.10 Road Status Services (RSS) 15
  • 16. Non Safety Applications  Comfort Applications  Toll Collection Services (TCS)  Personal and Diagnostics Services (PDS)  Services offering Messages (SOM)  Map Download Services (MDS)  Entertainment Service (ES) 16
  • 17. Fig.12 Summary of all Applications17
  • 18. Conclusion  Due to high death rate and congestion on roads, researchers and car manufacturing industries want to find some possible solutions by using of VANET technology.  VANET potential applications directly focus on user’s life on the road by sending some safety messages. In propose model it is explained the relationship between the user requirements and VANET safety and non safety applications are meets these requirements.  In future these VANET applications will improve the traffic system and reduces the death rate in road accidents.
  • 19. 19
  • 20. 20  Send email: isomro28@gmail.com  Please download complete paper  IEEEE website  ResearchGate  Video Available on given link:-  https://www.youtube.com/watch?v=aNQEF9qkpfM

Notes de l'éditeur

  1. 3