Survey of Vehicular Ad-hoc Networks (VANETs) With Security Requirements

Size: px
Start display at page:

Download "Survey of Vehicular Ad-hoc Networks (VANETs) With Security Requirements"

Transcription

1 Survey of Vehicular Ad-hoc Networks (VANETs) With Security Requirements A.Prabhaharan 1 M.Phil Research Scholar, Department of Computer Science NGM College Pollachi, Bharathiar University, Coimbatore, India. prabhavsr@gmail.com K.Vijayakumar 2 Assistant Professor, Department of Computer Science NGM College, Pollachi, Bharathiar University, Coimbatore, India. vijayakumarngm@gmail.com Abstract: Vehicular Ad-hoc Networks (VANETs) are the most prominent enabling network technology for Intelligent Transportation Systems. The aim of VANET ranges from improved road safety, time critical safety applications, and optimized traffic flow, delay tolerant, and infotainment and so on. High relative nodes pace and high active nodes mass has offered a typical challenges for connectivity within VANET.A lot of researches from the industry, academia, and standardized agencies to develop standards and prototypes for vehicular networks. This paper provides a summary of the recent state of the art of VANETs; it presents the communication architecture of VANETs and outlines the privacy and security challenges that need to be overcome to make such networks safety usable in practice. The challenges facing ad hoc networks are the topology of the network changes rapidly. Vehicles in VANET have high degree of mobility. The average length of time that two vehicles are in direct communication range with each other is approximately one minute. Keywords: VANET (Vehicular Ad-hoc Network), OBU (On Board Unit), RSU (Road Side Unit), AU (Application Unit), WAVE (Wireless Access for Vehicular Environment). I. INTRODUCTION In Vehicular ad-hoc networks (VANETs) Vehicle-to-Vehicle (V2V) communication takes place between Vehicles/Rsu which meet by chance. (VANETs) are networks in which each node is a vehicle. Such systems aim to provide communications between individual vehicles and between vehicles and nearby fixed equipment, or road side units like routers. The goal of VANETs, and more broadly vehicular networks, is to improve traffic safety by providing real time information of driver, to drivers and concerned authorities. An important property is the absence of infrastructure VANET occurs as soon as two or more vehicles are within communication distance. Because no infrastructure is involved, VANET surely heavily on distributed measures to regulate access to the wireless channel. VANETs applications types are classified into safety and efficiency. There are many difficulties in VANET systems design and implementation, including: security, privacy, routing, connectivity, and quality of services. The term VANET was originally adopted to reflect the ad hoc nature of these highly dynamic networks. However, because the term ad hoc network was associated widely with unicast routing-related research, there is currently a debate among the pioneers of this field about redefining the acronym VANET to deemphasize ad hoc networking. Because this discussion has not yet reached consensus, we will continue to refer to vehicle-to-vehicle and vehicle-to-roadside communication based on wireless local area networking technology as a VANET. VANETs can use any wireless networking technology as their basis. The most prominent are short range radio technologies like WLAN (either standard Wi-fi or ZigBee). In addition, cellular technologies can be used for VANETs [1]. In VANET, a node can be a vehicle with a radio system. The node can be also roadside equipment to communicate with mobile ad hoc vehicular nodes. Such roadside units serve as gateways to provide access to infrastructures for mobile nodes. We refer to the radio system on vehicular nodes On Board Unit (OBU) and the unit fixed to roadside as Road Side Unit (RSU).This paper offers an overview of the current status of security issues over VANETs. For this purpose, different communication models have been identified and analyzed from the security point of view. Moreover, security requirements and potential attacks will be studied. Finally, the security developments to achieve such requirements will be analyzed. II. ARCHITECTURE OF THE VECHICULAR AD HOC NETWORK (VANET) The communication between vehicles or between a vehicle and an RSU is achieved through a wireless medium called WAVE. This method of communication provides a wide range of information to drivers and travelers and enables safety applications to enhance road safety and provide a comfortable driving [1].The main system components are the application unit (AU), OBU and RSU. Typically the RSU hosts an application that provides services and the OBU is a peer device that uses the services provided. The application may reside in the RSU or in the OBU; the device that hosts the application is RES Publication 2012 Page 69

2 called the provider and the device using the application is described as the user. Each vehicle is equipped with an OBU and a set of sensors to collect and process the information then send it on as a message to other vehicles or RSUs through the wireless medium; it also carries a single or multiple AU that use the applications provided by the provider using OBU connection capabilities[2]. The RSU can also connect to the Internet or to another server which allows AU's from multiple vehicles to connect to the Internet. Each vehicle has OBU (on board unit), this unit connects the vehicle with RSU via DSRC radios, and another device is TPD (Tamper Proof Device), this device holding the vehicle secrets, all the information about the vehicle like keys, drivers identity, trip details, speed, rout etc. The RSU works as a router between the vehicles on the road and connected to other network devices. B. Application unit (AU) The AU is the device equipped within the vehicle that uses the applications provided by the provider using the communication capabilities of the OBU. The AU can be a dedicated device for safety applications or a normal device such as a personal digital assistant (PDA) to run the Internet, the AU can be connected to the OBU through a wired or wireless connection and may reside with the OBU in a single physical unit; the distinction between the AU and the OBU is logical [4]. The AU communicates with the network solely via the OBU which takes responsibility for all mobility and networking functions. C. Roadside unit (RSU) The RSU is a wave device usually fixed along the road side or in dedicated locations such as at junctions or near parking spaces. The RSU is equipped with one network device for a dedicated short range communication based on IEEE p radio technology, and can also be equipped with other network devices so as to be used for the purpose of communication within the infrastructural network. A. On board unit (OBU) An OBU is a wave device usually mounted on-board a vehicle used for exchanging information with RSUs or with other OBUs. It consists of a resource command processor (RCP), and resources include a read/write memory used to store and retrieve information, a user interface, a specialized interface to connect to other OBUs and a network device for short range wireless communication based on IEEE p radio technology [3]. It may additionally include another network device for non-safety applications based on other radio technologies such as IEEE a/b/g/n. The OBU connects to the RSU or to other OBUs through a wireless link based on the IEEE p radio frequency channel, and is responsible for the communications with other OBUs or with RSUs; it also provides a communication services to the AU and forwards data on behalf of other OBUs on the network. The main functions of the OBU are wireless radio access, ad hoc and geographical routing, network congestion control, reliable message transfer, data security and IP mobility. D. Characteristics of the Vanet Extremely active topology: The super swiftness of the vehicles in VANET leads to constant change in the topology and the availability of multiple paths makes VANET an extremely active topology Predictable [4]. Motion Patterns: In spite of fast motion of vehicle it is difficult to predict the position and movement of vehicle, but in VANET environment most of the vehicles move on pre-defined roads and highways. This allows the use of predictable motion patterns in network design Interaction with onboard sensors. Sensors are the means of communications in VANET. Sensors can communicate to the main data center by reading data associated to velocity and direction of the vehicle [8]. III. COMMUNICATIONS TYPES IN VANET A. Vehicle to Vehicle communication V2V (Vehicle to Vehicle) is designed to allow automobile to talk to each other. The system will use a region of 5.9GHz band using wireless protocol standard p for various public safety services. This technology is for safety and is dynamic wireless exchange of data between nearby vehicles that offers the opportunity for significant safety improvements. Data RES Publication 2012 Page 70

3 exchanged may include a vehicle s position, speed, steering angle, brake status, turn signal status, number of people in vehicle etc [3]. V2V communications enables a vehicle to sense threats and hazards with an awareness of position of other vehicles and the threat or hazard they present. Message can be derived using non vehicle based technology such as GPS V2V communication technology uses Dedicated Short Range Communications (DSRC). B. Vehicle to Infrastructure Communication In vehicle to infrastructure allows a vehicle to communicate with the roadside infrastructure mainly for information and data gathering applications. It is also called as Ad Hoc domain on VANET. Vehicle communicates with RSU in order to increase the range of communication by sending, receiving and forwarding data from one node to RSU to process special application forming vehicle to infrastructure. The information transferred between vehicle and RSU is more secure, because the RSU provides unique key for each and every user connected to it. V2I provides long range of communication. V2I system should contain the following part a. Vehicle On - Board Unit or Equipment (OBU/OBE) b. Road Side Unit or Equipment (RSU/RSE). IV. WIRELESS TECHNOLOGIES IN VANET There are numerous wireless access technologies available today, which can be used to provide the radio interface required by the vehicles in order to communicate with each other, V2V communication, or to communicate with the RSUs, V2I communication. A. Cellular systems(2/2.5/2.75/3g) Global system for mobile (GSM) communication considered to be one of the cellular system standards that provides a data rate of a maximum of 9.6 Kbps and is characterized as a second generation (2G).GSM uses both frequency division multiple GSM uses both frequency division multiple access (FDMA) and time division multiple access (TDMA) schemes. Two frequency bands area availableforgsm MHz for uplink and MHz for downlink; these frequency bands are divided into channels and the capacity of each channel is 200 khz. B. General packet radio service (GPRS) It known as 2.5 G is an evolved version of GSM; GPRS is standardized by the European Telecommunications Standards Institute (ETSI) to accommodate data transmissions at high bandwidth efficiency, so as to enable a data rate of up to 170 Kbps.It can work at MHz for uplink and MHz for downlink, further to MHz and MHz bands for down-linking and up linking respectively. Enhanced Data rates for GSM Evolution (EDGE); also known as 2.75G are an evolution of GPRS which provide a peak date rate of 384 Kbps To transmit a multimedia data a high data rate is required; this led to the development of the 3G. The universal mobile telecommunication system (UMTS) and it is evolved version the high-speed downlink packet access (HSDPA), providing a data rate of up to 2 Mbps. Another comparable cellular system is the CDMA2000 which provides 3 Mbps for downlink and 1.8 Mbps for uplink respectively. C. WLAN/Wi-Fi: Wireless local area network (WLAN) or wireless fidelity (Wi-Fi) It can provide wireless access to enable V2V communication or V2I communication. IEEE standards can be applied to provide wireless connectivity; IEEE a works at 5 GHz and provides a data rate of 54 Mbps with a communication range of at least 38 m indoor and a 140 m range for outdoor use. Another standard for IEEE is IEEE g, which provides the same data rate and covers the same range as IEEE a but working at 2.4 GHz. IEEE b works at 2.4 GHz and provides data rate of up to 11 Mbps. D. WiMAX: Mobile WiMAX or IEEE e It is an amendment to the original worldwide inter operability for microwave access (WiMAX), or IEEE , adopted by IEEE in the year IEEE e provides a high data rate and covers a wide transmission range with reliable communications and high quality of service (QoS), which makes it suitable for those applications requiring these features such as multimedia, video and voice over internet protocol (VoIP) applications. WiMAX achieves a high data rate of up to 35 Mbps using multiple-input and multiple-output (MIMO), with an orthogonal frequency division multiplexing (OFDM) and covers a transmission ranges of 15 Kms. E. Combined wireless access technologies Continuous air interface for long and medium range (CALM M5) incorporating a set of wireless technologies including RES Publication 2012 Page 71

4 GSM-2G/GPRS-2.5G, UMTS-3G, Infrared communication and wireless systems in the 60 GHz band, adapted to IEEE p by the addition of new interface protocols. Peoples using smart phones that can connect to the internet can communicate with each other via the internet forming people to people (P2P) network and vehicles can communicate with each other via the internet. A. Sybil Attacks V. POSSIBLE ATTACKS IN VANET Sybil attack is the creation of multiple fake nodes broadcasting false information. In this, On Board Unit (OBU) installed in vehicle sends multiple copies of messages to other nodes and each message contains a different fabricated identity. The problem arises when attacker is able to pretend as multiple vehicles and reinforce false data. B. Node Impersonation It is an attempt by an attacker to send modified version of message and claims that the message comes from original node for the unknown purpose. C. Masquerade attack A subscriber which is unauthorized may overhear the authentication messages on the air and try to have it authenticated to the access point by replaying them. The attacker can replay the car s authentication request by getting the car s public key and certificate. D. ID Disclosure Attackers sometimes disclose the identity of nodes in the network and track the location of the target nodes. Then it monitors the target nodes and sends a virus to the neighbors of the target nodes. When the virus attacks the neighbors of the attacker, then they take the ID of the target nodes as well as current location of target node. Various techniques have been proposed to deal with privacy one of them is identity disclosure which is used to prevent vehicle from being tracked by identifying keys that are used [7]. A. Confidentiality VI. SECURITY REQUIRMENTS OF VANET In VANETs, the definition of confidentiality refers to confidential communication. In a group, none except group members are able to decrypt the messages that are broadcasted to every member of group; and none (even other members) except a dedicated receiver member is capable to decrypt the message devoted to it. B. Integrity This concept in VANETs often combines with the concept authentication to guarantee that: A node should be able to verify that a message is indeed sent and signed by another node without being modified by anyone. [5] In order to gain this property, Data Verification is also required: Once the sender vehicle is authenticated, the receiving vehicle performs data verifications to check whether the message contains the correct or corrupted data. C. Availability The network should be available even if it is under an attack without affecting its performance. This concept of VANETs is not different from itself in other kinds of networks but not easy to ensure because of the mobility in high speed of vehicles. D. Privacy The profile or a driver s personal information must be maintained against unauthorized access. We consider the following two cases: Communications between vehicles and RSUs: Privacy means that an eavesdropper is impossible to decide whether two different messages come from the same vehicle. Communications between vehicles: Privacy means that determining whether two different valid messages coming from the same vehicle is intensely burdensome for everyone except a legitimate component (e.g., tracing manager [10]). E. Traceability and revocability Although a vehicles real identity should be hidden from other vehicles, there should be still a component (e.g., Trace Manager) that has the ability to obtain vehicles' real identities and to revoke them from future usage. RES Publication 2012 Page 72

5 F. Non-repudiation Drivers must be reliably identified in case of accidents. A sender should have mandatory Responsibility in transmitting the messages for the investigation that will determine the correct sequence and content of messages exchanged before the accident. G. Real-time constraints Since vehicles are able to randomly move in and quickly move out to a group of a VANET for a short duration, real-time constraints should be maintained. H. Low Overhead All messages in VANETs are time critical. Thus, low overhead is essential to retain the usefulness and validity of messages. VII. CONCLUSION This paper has briefly introduced Vehicular Ad Hoc Networks and challenges associated with security attacks and Security Requirements. I have presented communications security, as well as a revolution for vehicular safety, comfort and efficiency in road transport. Any design for VANETs should be wide applicability, node privacy, efficient group management, strong authentication, and data verification. In order to reach them, any solution has to combine well-known building blocks according to a modular design that includes several components specifically devoted to authentication, encryption, group management, data aggregation, simulation, safety-related/value-added applications, etc. The goal of VANET is to provide security while communicating, and also safety to drivers and other road users. REFERENCES [1] M. Raya, and J.-P. Hubaux, The security of vehicular ad hoc networks, in Proc. 3rd ACM workshop on Security of ad hoc and sensor networks, Alexandria, VA, USA, 2005, pp [2] Bhuvaneshwari.S1, Divya.G2, Kirithika.K.B3 and Nithya.S4 A SURVEY ON VEHICULAR AD-HOCNETWORK International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 2, Issue 10, October 2013 [3] L. Zhang, Q. Wu, A. Solanas, and D.-F. Josep, A Scalable Robust Authentication Protocol for Secure Vehicular Communications, Vehicular Technology, IEEE Transactions on, vol. 59, no. 4, pp , [4] Yanmin Zhu1, Chao Chen1 and Min Gao An evaluation of vehicular networks with real vehicular GPS traces EURASIP Journal on Wireless Communications and Networking 2013,pp.190, 13 July [5] Tanuja K, Sushma T M, Bharathi M, Arun K H A Survey On VANET Technologies International Journal of Computer Applications ( ) Volume 121 No.18, July 2015 [6] A. Dhamgaye and N. Chavhan, Survey on security challenges in VANET, Int. J. Comput. Sci., vol. 2, no. 1, pp , [7] Irshad Ahmed Sumra, Iftikhar Ahmad, Halabi Hasbullah, Jamalul-lail bin Ab Manan, Classes of attacks in VANET, in Tenth International Conference on Wireless and Optical Communications Networks (WOCN), pp 1-5, 2013 [8] I.Ahmed Soomro, H.B.Hasbullah,J.lb.Ab Manan, User requirements model for vehicular ad hoc network applications, in International Symposium on Information Technology 2010 (ITSim 2010), [9] M.Raya, P. Papadimitratos, and JP. Hubaux, Securing Vehicular Communications, in IEEE Wireless Communications Magazine, Special Issue on Inter-Vehicular Communications, 2006, pp. 8 [10] M. Raya, A. Aziz, and J.-P. Hubaux, Efficient secure aggregation in VANETs, in Proc. 3rd Int. Workshop VANET, 2006, pp AUTHOR S BIOGRAPHIES A.Prabhaharan has obtained his M.sc Computer Science in Bharathiar Universityaty Coimbatore on Now he is doing M.Phil. in Computer Scienceat NGM College, Pollachi, under Bharathiar University, Coimbatore. He attended International Seminar on Research Performance Analysis and Strategy, and "One Day National level Research Workshop on Recent Trends in Computer Science (NRWRTCS'16)", At Bharathiar University,Coimbatore. He presented a paper about Network security in Third international conference on the Advances in Information Technology and Networking (ICATN 16) in G.R.D COLLEGE FOR SCIENCE, and presented paper on the National conference on Data Science (NCDS 16), in Sri Krishna arts and science college, Coimbatore. His research interests include Network Security. Mr. K. Vijayakumar received his MCA Degree from Bharathiar University in 1999 and completed his M.Phil. Degree in Computer Science from Bharathiar University in He is currently pursuing his Ph.D. (Ind. Mode). at the Research Department of Computer Science, NGM College, Pollachi, under Bharathiar University, Coimbatore. His research interests include Computer Simulation and Networks Security. He has 15 years of teaching experience. He is presently RES Publication 2012 Page 73

6 working as an Assistant Professor and Head, Department of InformationTechnology, NGM College, Pollachi RES Publication 2012 Page 74

Overview of Challenges in VANET

Overview of Challenges in VANET Overview of Challenges in VANET Er.Gurpreet Singh Department of Computer Science, Baba Farid College, Bathinda(Punjab), India ABSTRACT VANET are becoming active area of research and development because

More information

A Surveying on Road Safety Using Vehicular Communication Networks

A Surveying on Road Safety Using Vehicular Communication Networks Journal of Computer Applications ISSN: 0974 1925, Volume-5, Issue EICA2012-4, February 10, 2012 A Surveying on Road Safety Using Vehicular Communication Networks Padmavathi K Asst. Professor, Department

More information

Vehicular Ad Hoc Networks (VANETs), Past Present and Future: A survey

Vehicular Ad Hoc Networks (VANETs), Past Present and Future: A survey Vehicular Ad Hoc Networks (VANETs), Past Present and Future: A survey Farhan Aadil 1, Shahzad Rizwan 2, Adeel Akram 3 farhan.aadil, Shahzad.rizwan [@ciit-attock.edu.pk], adeel.akram@uettaxila.edu.pk Abstract.

More information

Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network

Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network Deivanai.P 1, K.Sudha 2, K.Radha 3 Department of CSE, Muthayammal Engineering College, Rasipuram, India 1 Assistant Professor,

More information

Protection Against DDOS Using Secure Code Propagation In The VANETs

Protection Against DDOS Using Secure Code Propagation In The VANETs Protection Against DDOS Using Secure Code Propagation In The VANETs Mandeep Kaur, Manish Mahajan Mandeepcheema6@gmail.com,cgccoe.hodcse@gmail.com ABSTRACT--VANETs are the vehicular networks used to connect

More information

LTE : The Future of Mobile Broadband Technology

LTE : The Future of Mobile Broadband Technology LTE : The Future of Mobile Broadband Technology Erick Setiawan tukangbajaksawah@gmail.com 1 Become a necessity today, where the wireless broadband technology needed to meet increasing expectations in terms

More information

MAC Protocols for VANETs

MAC Protocols for VANETs MAC Protocols for VANETs Alexandru Oprea Department of Computer Science University of Freiburg Click to edit Master subtitle style Ad Hoc Networks Seminar Based on: Hamid Menouar and Fethi Filali, EURECOM

More information

LTE and IEEE802.p for vehicular networking: a performance evaluation

LTE and IEEE802.p for vehicular networking: a performance evaluation LTE and IEEE802.p for vehicular networking: a performance evaluation Zeeshan Hameed Mir* Fethi Filali EURASIP Journal on Wireless Communications and Networking 1 Presenter Renato Iida v2 Outline Introduction

More information

Wireless Networking: An Introduction. Hongwei Zhang

Wireless Networking: An Introduction. Hongwei Zhang Wireless Networking: An Introduction Hongwei Zhang http://www.cs.wayne.edu/~hzhang Outline Networking as resource allocation A taxonomy of current practice Technical elements Outline Networking as resource

More information

Introduction to VANET

Introduction to VANET VANET Introduction to VANET -Vehicles connected to each others through an ad hoc formation form a wireless network called Vehicular Ad Hoc Network. -Vehicular ad hoc networks (VANETs) are a subgroup of

More information

International Journal of Information Movement. Website: ISSN: (online) Pages

International Journal of Information Movement. Website:   ISSN: (online) Pages REVIEW: VANET ARCHITECTURES AND DESIGN Chetna Research Scholar Department Of Electronic & Communication Engg. Galaxy Global Group of Institutions, Dinarpur Saranjeet Singh Faculty Department of Electronic

More information

PIONEER RESEARCH & DEVELOPMENT GROUP

PIONEER RESEARCH & DEVELOPMENT GROUP Realistic Mobility Model And Co-Operative Peer To Peer Data Transmission For VANET s Using SUMO And MOVE Nataraj B, Dr. T. Kantharaju 1,2 Electronics and Communication, JNTUA, BITIT, Hindupur, Andhra Pradesh,

More information

Enhancement of VANET Communication Range using WiMAX and Wi-Fi: A Survey

Enhancement of VANET Communication Range using WiMAX and Wi-Fi: A Survey International Journal of Urban Design for Ubiquitous Computing Vol.1, No.1, (2013), pp. 9-16 http://dx.doi.org/10.21742/ijuduc.2013.1.1.02 Enhancement of VANET Communication Range using WiMAX and Wi-Fi:

More information

Unit title: Mobile Technology: Device Connectivity (SCQF level 5) Outcome 1

Unit title: Mobile Technology: Device Connectivity (SCQF level 5) Outcome 1 1 Outcome 1 A description of mobile device internet connectivity using two current Wi-Fi methods. A description of mobile device internet connectivity using two current GSM mobile telephony methods. A

More information

ENSC 427, Spring 2012

ENSC 427, Spring 2012 ENSC 427, Spring 2012 Outline A Study of VANET Networks Introduction DSRC channel allocation Standards : IEEE 802.11p + IEEE 1604 PHY LAYER MAC LAYER Communication Walkthrough Ns-3, Node Mobility, SUMO

More information

4G Mobile Communications

4G Mobile Communications 4G Mobile Communications Welcome to 4G The term 4G is used broadly to include several types of broadband wireless access communication systems, not only cellular telephone systems. One of the terms to

More information

New Lightweight Security Protocol for VANET by Using Registration Identity and Group Certificate

New Lightweight Security Protocol for VANET by Using Registration Identity and Group Certificate New Lightweight Security Protocol for VANET by Using Registration Identity and Group Certificate Aditi Garg 1, Ankita Agrawal 2, Niharika Chaudhary 3, Shivanshu Gupta 4, Devesh Pandey 5, Tumpa Roy 6 G.L.N.A

More information

Chapter 9. Vehicle to Infrastructure interaction (V2I)

Chapter 9. Vehicle to Infrastructure interaction (V2I) Prev Chapter 9. Vehicle to Infrastructure interaction (V2I) Next Chapter 9. Vehicle to Infrastructure interaction (V2I) Table of Contents 9.1. Architecture 9.2. Wireless Technologies 9.2.1. DSRC 9.2.2.

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems

More information

Intelligent Transportation Systems. Wireless Access for Vehicular Environments (WAVE) Engin Karabulut Kocaeli Üniversitesi,2014

Intelligent Transportation Systems. Wireless Access for Vehicular Environments (WAVE) Engin Karabulut Kocaeli Üniversitesi,2014 Intelligent Transportation Systems Wireless Access for Vehicular Environments (WAVE) Engin Karabulut Kocaeli Üniversitesi,2014 Outline Wireless Access for Vehicular Environments (WAVE) IEEE 802.11p IEEE

More information

COOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS

COOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS COOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS Deepa B 1 and Dr. S A Kulkarni 2 1 IV Sem M. Tech, Dept of CSE, KLS Gogte Institute of Technology, Belagavi deepa.bangarshetru@gmail.com

More information

Various Issues in Vehicular Ad hoc Networks : A Survey

Various Issues in Vehicular Ad hoc Networks : A Survey International Journal of Computer Science & Communication Vol. 1, No. 2, July-December 2010, pp. 399-403 Various Issues in Vehicular Ad hoc Networks : A Survey Shinde S. S. 1 & Patil S. P 2 1,2 Annasaheb

More information

EFFICIENT TRAJECTORY PROTOCOL FOR MULTICASTING IN VEHICULAR AD HOC NETWORKS

EFFICIENT TRAJECTORY PROTOCOL FOR MULTICASTING IN VEHICULAR AD HOC NETWORKS EFFICIENT TRAJECTORY PROTOCOL FOR MULTICASTING IN VEHICULAR AD HOC NETWORKS Nandhini P. 1 and Ravi G. 2 1 Department of Electronics and Communication Engineering, Communication Systems, Sona College of

More information

EXPEDITE MESSAGE AUTHENTICATION PROTOCOL FOR VANETs USING DATA AGGREGATION

EXPEDITE MESSAGE AUTHENTICATION PROTOCOL FOR VANETs USING DATA AGGREGATION EXPEDITE MESSAGE AUTHENTICATION PROTOCOL FOR VANETs USING DATA AGGREGATION Shaiba Wahab Dept. Of Computer Science and Engineering M.E.A. Engineering College Perinthalmanna, Kerala Jemsheer Ahmed P Dept.

More information

QOS ANALYSIS OF 3G AND 4G. Khartoum, Sudan 2 unversity of science and Technology, Khartoum, Sudan

QOS ANALYSIS OF 3G AND 4G. Khartoum, Sudan 2 unversity of science and Technology, Khartoum, Sudan QOS ANALYSIS OF 3G AND 4G Doaa Hashim Osman 1, Amin Babiker 2 and Khalid hammed Bellal 1 Department of Communication, Faculty of Engineering, AL Neelain University, Khartoum, Sudan 2 unversity of science

More information

Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks

Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks D.Balamahalakshmi Department of Computer Science and Engineering, V.S.B Engineering College, Karur, Tamilnadu, India 1

More information

Privacy in Vehicular Ad-hoc Networks. Nikolaos Alexiou, LCN, EE KTH

Privacy in Vehicular Ad-hoc Networks. Nikolaos Alexiou, LCN, EE KTH Privacy in Vehicular Ad-hoc Networks Nikolaos Alexiou, LCN, EE KTH alexiou@kth.se 2/10/2012 Outline Introduction VANETs: an overview VANET privacy - Anonymity - Location Privacy - VPKI Privacy Attacks

More information

Improving Energy Efficiency of VANET based Secure and Privacy Preserving Navigation Scheme using LTE

Improving Energy Efficiency of VANET based Secure and Privacy Preserving Navigation Scheme using LTE IJIRST International Journal for Innovative Research in Science & Technology Volume 2 Issue 02 July 2015 ISSN (online): 2349-6010 Improving Energy Efficiency of VANET based Secure and Privacy Preserving

More information

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar

More information

Lecture - 01 Evolution of Wireless Communication Technologies

Lecture - 01 Evolution of Wireless Communication Technologies Principles of Modern CDMA/MIMO/OFDM Wireless Communications Prof. Aditya K. Jagannatham Department of Electrical Engineering Indian Institute of Technology, Kanpur Lecture - 01 Evolution of Wireless Communication

More information

DELIVERING MULTIMEDIA CONTENT FOR THE FUTURE GENERATION MOBILE NETWORKS

DELIVERING MULTIMEDIA CONTENT FOR THE FUTURE GENERATION MOBILE NETWORKS Research Article DELIVERING MULTIMEDIA CONTENT FOR THE FUTURE GENERATION MOBILE NETWORKS S. Swarna Parvathi, Dr. K. S. Eswarakumar Address for Correspondence S. Swarna Parvathi, PhD Scholar Department

More information

WiMAX Capacity Enhancement: Capacity Improvement of WiMAX Networks by Dynamic Allocation of Subframes

WiMAX Capacity Enhancement: Capacity Improvement of WiMAX Networks by Dynamic Allocation of Subframes WiMAX Capacity Enhancement: Capacity Improvement of WiMAX Networks by Dynamic Allocation of Subframes Syed R. Zaidi, Shahab Hussain, M. A. Ali Department of Electrical Engineering The City College of The

More information

A Review on Vehicular Ad-Hoc Network

A Review on Vehicular Ad-Hoc Network A Review on Vehicular Ad-Hoc Network Arshdeep Kaur 1, Shilpa Sharma 2 M.Tech Student, Dept. of Computer Science Engineering, Lovely Professional University, Phagwara, Punjab, India 1 Assistant Professor,

More information

Hacking the Fast Lane: security issues in p, DSRC and WAVE

Hacking the Fast Lane: security issues in p, DSRC and WAVE Hacking the Fast Lane: security issues in 802.11p, DSRC and WAVE Bruno Gonçalves de Oliveira boliveira@trustwave.com Rob Havelt rhavelt@trustwave.com THIS IS NOT A USER-MODE CALLBACK TO RING0 PRESENTATION

More information

Medium Access Protocols for Cooperative Collision Avoidance in Vehicular Ad-Hoc Networks

Medium Access Protocols for Cooperative Collision Avoidance in Vehicular Ad-Hoc Networks Medium Access Protocols for Cooperative Collision Avoidance in Vehicular Ad-Hoc Networks Md. Imrul Hassan ihassan@swin.edu.au Centre for Advanced Internet Architecture (CAIA) Swinburne University of Technology

More information

Mitigating the Effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks

Mitigating the Effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks Mitigating the Effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks Nizar Alsharif, Albert Wasef, and Xuemin (Sherman) Shen Department of Electrical and Computer Engineering, University

More information

An Efficient Data Transmission in VANET Using Clustering Method

An Efficient Data Transmission in VANET Using Clustering Method INTL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2017, VOL. 63, NO. 3, PP. 309-313 Manuscript received April 29, 2016; revised July, 2017. DOI: 10.1515/eletel-2017-0045 An Efficient Data Transmission

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Analyzing Routing Protocols Performance in VANET Using p and g

Analyzing Routing Protocols Performance in VANET Using p and g Analyzing Routing Protocols Performance in VANET Using 802.11p and 802.11g Rasha Kaiss Aswed and Mohammed Ahmed Abdala Network Engineering Department, College of Information Engineering, Al-Nahrain University

More information

Vehicle Connectivity in Intelligent Transport Systems: Today and Future Prof. Dr. Ece Güran Schmidt - Middle East Technical University

Vehicle Connectivity in Intelligent Transport Systems: Today and Future Prof. Dr. Ece Güran Schmidt - Middle East Technical University Vehicle Connectivity in Intelligent Transport Systems: Today and Future Prof. Dr. Ece Güran Schmidt - Middle East Technical University OUTLINE Intelligent Transportation Systems (ITS) Vehicle connectivity

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

It is the process of sharing data, programs, and information between two or more computers.

It is the process of sharing data, programs, and information between two or more computers. 1 Communications It is the process of sharing data, programs, and information between two or more computers. Numerous applications depend on communication systems: E-mail Instant messaging (IM) Internet

More information

SURVEY OF VEHICLE AD-HOC NETWORK

SURVEY OF VEHICLE AD-HOC NETWORK SURVEY OF VEHICLE AD-HOC NETWORK DEESHA G. DEOTALE 1 & UMA NAGARAJ 2 1,2 Department of Computer Engineering M.A.E Alandi (D) Pune India E-mail : disha.deotale21@gmail.com & umanagaraj67.@gmail.com Abstract

More information

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks Rev.Confirming Pages VISUAL SUMMARY Communications and Networks COMMUNICATIONS COMMUNICATION CHANNELS Communications is the process of sharing data, programs, and information between two or more computers.

More information

VANETs. Marc Torrent-Moreno, Prof. Hannes Hartenstein Decentralized Systems and Network Services Institute for Telematics, University of Karlsruhe

VANETs. Marc Torrent-Moreno, Prof. Hannes Hartenstein Decentralized Systems and Network Services Institute for Telematics, University of Karlsruhe VANETs Marc Torrent-Moreno, Prof. Hannes Hartenstein Decentralized Systems and Network Services Institute for Telematics, University of Karlsruhe April 15 th 2005 Marc Torrent Moreno 1 Main Motivation

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part II WiFi vs 802.11 IEEE 802.11 Features Hidden Node

More information

ITS (Intelligent Transportation Systems) Solutions

ITS (Intelligent Transportation Systems) Solutions Special Issue Advanced Technologies and Solutions toward Ubiquitous Network Society ITS (Intelligent Transportation Systems) Solutions By Makoto MAEKAWA* Worldwide ITS goals for safety and environment

More information

To realize Connected Vehicle Society. Yosuke NISHIMURO Ministry of Internal Affairs and Communications (MIC), Japan

To realize Connected Vehicle Society. Yosuke NISHIMURO Ministry of Internal Affairs and Communications (MIC), Japan To realize Connected Vehicle Society Yosuke NISHIMURO Ministry of Internal Affairs and Communications (MIC), Japan Services provided by Connected Vehicle 1 Vehicle 5G V2X Connected Vehicle Big Data AI

More information

DSRC - WAVE. VITMMA10 Okos város MSc mellékspecializáció. Simon Csaba

DSRC - WAVE. VITMMA10 Okos város MSc mellékspecializáció. Simon Csaba DSRC - WAVE VITMMA10 Okos város MSc mellékspecializáció Simon Csaba Overview DSRC Dedicated Short-Range Communications ASTM Standard E2213-03, based on 802.11a ITS communications on 5.9/5.8GHz band WAVE

More information

WIRELESS COMMUNICATION SYSTEMS ARE TRANSFORMING OUR LIVES

WIRELESS COMMUNICATION SYSTEMS ARE TRANSFORMING OUR LIVES WIRELESS COMMUNICATION SYSTEMS ARE TRANSFORMING OUR LIVES S. Thangadurai Assistant Professor, Department of computer Science, New Horizon College, Bangalore, Karnataka Abstract As a subscriber becomes

More information

Mobile Ad Hoc Networks: Basic Concepts and Research Issues

Mobile Ad Hoc Networks: Basic Concepts and Research Issues Mobile Ad Hoc s: Basic Concepts and Research Issues Ing. Alessandro Leonardi aleonardi@dieei.unict.it Wireless s Generations (1/3) Generation 1G 2G 2.5G 3G 4/5G Time 1980s 1990s Late1990s 2000s (2010 full

More information

Mobile Computing Introduction

Mobile Computing Introduction Mobile Computing Introduction UNIT - 1 Prepared By:- NITIN PANDYA Assistant Professor, SVBIT. What is Mobile Computing 2 NTIIN PANDYA 3 NTIIN PANDYA Definitions Mobile Computing What is mobile computing?

More information

Ad Hoc Networks - Applications and System Design

Ad Hoc Networks - Applications and System Design Ad Hoc Networks - Applications and System Design Prof Sanjay Srivastava DA-IICT, Gandhinagar Modelling and Analysis Group of NeTworks (MAGNeT) Two day workshop on Ad Hoc Networks: Design, Applications,

More information

Ad-hoc Trusted Information Exchange Scheme for Location Privacy in VANET

Ad-hoc Trusted Information Exchange Scheme for Location Privacy in VANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 1, January 2015,

More information

4G Technology in contrast with other G Technologies Raja Solanki,Vineeet Godara, Prashant Solanki, Dhronacharya Engineering College,Gurgaon,India

4G Technology in contrast with other G Technologies Raja Solanki,Vineeet Godara, Prashant Solanki, Dhronacharya Engineering College,Gurgaon,India Technology in contrast with other G Technologies Raja Solanki,Vineeet Godara, Prashant Solanki, Dhronacharya Engineering College,Gurgaon,India Abstract-Wireless services have the highest demand in internet

More information

Wireless Communication

Wireless Communication Wireless Communication Hwajung Lee Key Reference: Prof. Jong-Moon Chung s Lecture Notes at Yonsei University Wireless Communications Bluetooth Wi-Fi Mobile Communications LTE LTE-Advanced Mobile Communications

More information

Reliable and Efficient flooding Algorithm for Broadcasting in VANET

Reliable and Efficient flooding Algorithm for Broadcasting in VANET Reliable and Efficient flooding Algorithm for Broadcasting in VANET Vinod Kumar*, Meenakshi Bansal Mtech Student YCOE,Talwandi Sabo(india), A.P. YCOE, Talwandi Sabo(india) Vinod_Sharma85@rediffmail.com,

More information

Short-term Linkable Group Signatures with Categorized Batch Verification

Short-term Linkable Group Signatures with Categorized Batch Verification Short-term Linkable Group Signatures with Categorized Batch Verification Lukas Malina 1, Jordi Castella-Rocà 2, Arnau Vives-Guasch 2, Jan Hajny 1 1 Department of Telecommunications Faculty of Electrical

More information

4G Wireless Systems. Outlines. Data Rates of Wireless Networks. Wireless Networks. Wireless Networks Throughput versus Range

4G Wireless Systems. Outlines. Data Rates of Wireless Networks. Wireless Networks. Wireless Networks Throughput versus Range Outlines 4G Wireless Systems Vijay K. Garg, Ph.D., P.E. Department of Electrical & Computer Engineering, College of Engineering, University of Illinois at Chicago e-mail: garg.v@comcast.net Types of wireless

More information

Introduction to Vehicular Networks

Introduction to Vehicular Networks CS 795/895 Vehicular Networks Introduction to Vehicular Networks Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/courses/cs795-s07/

More information

OPNET based Performance Evaluation of WIMAX Network with WIMAX Management using Different QoS

OPNET based Performance Evaluation of WIMAX Network with WIMAX Management using Different QoS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.862

More information

Performance Evaluation of Adaptive Control Channel Interval in VANET Based on Network Simulation Model

Performance Evaluation of Adaptive Control Channel Interval in VANET Based on Network Simulation Model Performance Evaluation of Adaptive Control Channel Interval in VANET Based on Network Simulation Model Rendy Munadi Doan Perdana Shalahuddin Al Ayyubi rendymunadi@telkomuniversity.ac.id doanperdana@telkomuniversity.ac.id

More information

Wireless Network Introduction

Wireless Network Introduction Wireless Network Introduction Module W.bas.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Wireless network introduction W.bas.1-2

More information

Wireless systems overview

Wireless systems overview Wireless systems overview Evolution of systems from 1G to 4G 1G, 4G major features Specifications comparison 5G communication systems Summary Wireless Systems 2016 Evolution of cellular networks WiMAX

More information

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester. Contact Hrs / week: 4 Total hrs: 64

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester. Contact Hrs / week: 4 Total hrs: 64 Govt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester Subject: Mobile Computing Contact Hrs / week: 4 Total hrs: 64 Table of Contents SN Topic Hours Marks 1 Introduction

More information

E vo lu t io n T ech n o lo g y:

E vo lu t io n T ech n o lo g y: Background Long Term Evolution (LTE) is a 4G wireless broadband technology developed by the Third Generation Partnership Project (3GPP), an industry trade group. 3GPP named the technology Long Term Evolution

More information

Wireless Sensor Networks (WSN)

Wireless Sensor Networks (WSN) Wireless Sensor Networks (WSN) Introduction M. Schölzel Difference to existing wireless networks Infrastructure-based networks e.g., GSM, UMTS, Base stations connected to a wired backbone network Mobile

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK MOBILE COMMUNICATION AMOL RATAN VAIDKAR 1, PROF. G. D. GULHANE 2, DR. H. R. DESHMUKH

More information

Comparison of Three Greedy Routing Algorithms for Efficient Packet Forwarding in VANET

Comparison of Three Greedy Routing Algorithms for Efficient Packet Forwarding in VANET Comparison of Three Greedy Routing Algorithms for Efficient Packet Forwarding in VANET K. Lakshmi 1, K.Thilagam 2, K. Rama 3, A.Jeevarathinam 4, S.Manju Priya 5. 1,3&4 Lecturer, Dept. of Computer Applications,

More information

Requirements Analysis of IP and MAC Protocols for Dedicated Short Range Communications (DSRC)

Requirements Analysis of IP and MAC Protocols for Dedicated Short Range Communications (DSRC) Requirements Analysis of IP and MAC Protocols for Dedicated Short Range Communications (DSRC) James T. Yu, jyu@cs.depaul.edu School of Computer Science, Telecommunications, and Information Systems DePaul

More information

CEN 538 Wireless LAN & MAN Networks

CEN 538 Wireless LAN & MAN Networks King Saud University College of Computer and Information Sciences Department of Computer Engineering CEN 538 Wireless LAN & MAN Networks Dr. Ridha OUNI rouni@ksu.edu.sa LMS web site References Text book

More information

Sybil Attack Detection and Prevention Using AODV in VANET

Sybil Attack Detection and Prevention Using AODV in VANET Sybil Attack Detection and Prevention Using in VANET Navneet 1, Rakesh Gill 2 1 M. Tech. Student, GITM, Bilaspur-Tauru Road, Gurgaon (Haryana) navneet_tehlan@yahoo.com 2 Asst. Prof., GITM, Bilaspur-Tauru

More information

A Glimpse at the Wireless Data Communications Standards. Fanny Mlinarsky 8 August 2007

A Glimpse at the Wireless Data Communications Standards. Fanny Mlinarsky 8 August 2007 A Glimpse at the Wireless Data Communications Standards Fanny Mlinarsky 8 August 2007 IMS Infrastructure for FMC IP Multimedia Subsystem (IMS) IP Network Fixed Mobile Convergence Mobile Fixed www.octoscope.com

More information

Enhanced Management of Certificate Caching and Revocation Lists in VANET

Enhanced Management of Certificate Caching and Revocation Lists in VANET Enhanced Management of Certificate Caching and Revocation Lists in VANET Sadiq H. Abdulhussain Computer Engineering Department College of Engineering University of Baghdad ABSTRACT Vehicular network security

More information

HMEP: Hasten Message Endorsement Protocol for Vehicular Ad hoc Networks

HMEP: Hasten Message Endorsement Protocol for Vehicular Ad hoc Networks HMEP: Hasten Message Endorsement Protocol for Vehicular Ad hoc Networks D.Thriveni 1, G.T.Prasanna Kumari 2 1 M.Tech Student, S.V.Engineering College for Women, Tirupati, India 2 Associate Professor, Dept.

More information

Introduction to Mobile Broadband (imb)

Introduction to Mobile Broadband (imb) Introduction to Mobile Broadband (imb) Teaching By Asst.Prof.Dr. Suwat Pattaramalai suwat.pat@kmutt.ac.th Tel. 02-470-9079 Material: http://webstaff.kmutt.ac.th/~suwat.pat/ 3GPP WiMAX FORUM Introduction

More information

Wireless Technologies

Wireless Technologies Wireless Technologies Networking for Home and Small Businesses Chapter 7 Manju. V. Sankar 1 Objectives Describe wireless technologies. Describe the various components and structure of a WLAN Describe wireless

More information

This tutorial has been designed to help beginners understand the basic concepts of WiMAX.

This tutorial has been designed to help beginners understand the basic concepts of WiMAX. About the Tutorial WiMAX is one of the hottest broadband wireless technologies around today. It is based on IEEE 802.16 specification and it is expected to deliver high quality broadband services. This

More information

CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS

CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS 130 CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS 5.1 INTRODUCTION The feasibility of direct and wireless multi-hop V2V communication based on WLAN technologies, and the importance of position based

More information

Enhancing Security on Vehicular Adhoc Networks using EMAP-HMAC

Enhancing Security on Vehicular Adhoc Networks using EMAP-HMAC www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962 Page No.: 704-711 Volume-5, Issue-2, April-2015 International Journal of Engineering and Management Research Enhancing Security on Vehicular

More information

Network Security: Broadcast and Multicast. Tuomas Aura T Network security Aalto University, Nov-Dec 2011

Network Security: Broadcast and Multicast. Tuomas Aura T Network security Aalto University, Nov-Dec 2011 Network Security: Broadcast and Multicast Tuomas Aura T-110.5241 Network security Aalto University, Nov-Dec 2011 Outline 1. Broadcast and multicast 2. Receiver access control (i.e. data confidentiality)

More information

Operational Inferences on VANETs in e and p with Improved Performance by Congestion Alert

Operational Inferences on VANETs in e and p with Improved Performance by Congestion Alert The 8th Annual IEEE Consumer Communications and Networking Conference - Special Session Information Dissemination in Vehicular Networks Operational Inferences on VANETs in 802.16e and 802.11p with Improved

More information

ANALYSIS OF SAFETY MEASURES AND QUALITY ROUTING IN VANETS

ANALYSIS OF SAFETY MEASURES AND QUALITY ROUTING IN VANETS Vol.2, Issue.2, Mar-Apr 2012 pp-062-066 ISSN: 2249-6645 ANALYSIS OF SAFETY MEASURES AND QUALITY ROUTING IN VANETS Vedha Vinodha.D*, Mrs.V.Seethalakshmi** *II M.E CS, Sri Shakthi Institute of Engineering

More information

Accelerating solutions for highway safety, renewal, reliability, and capacity. Connected Vehicles and the Future of Transportation

Accelerating solutions for highway safety, renewal, reliability, and capacity. Connected Vehicles and the Future of Transportation Accelerating solutions for highway safety, renewal, reliability, and capacity Regional Operations Forums Connected Vehicles and the Future of Transportation ti Session Overview What are connected and automated

More information

Classification of Security attack in Vehicular Adhoc network: A survey

Classification of Security attack in Vehicular Adhoc network: A survey Classification of Security attack in Vehicular Adhoc network: A survey Swapnil G. Deshpande Arts, Commerce, Science College, Kiran Nagar, Amravati, Maharashtra, India Abstract: Vehicular ad hoc networks

More information

Multiprotocol Label Switching in Vehicular Ad hoc Network for QoS

Multiprotocol Label Switching in Vehicular Ad hoc Network for QoS Information Management and Business Review Vol. 6, No. 3, pp. 115-120, Jun 2014 (ISSN 2220-3796) Multiprotocol Label Switching in Vehicular Ad hoc Network for QoS * Kashif Naseer Qureshi, Abdul Hanan Abdullah

More information

Abstract of the Book

Abstract of the Book Book Keywords IEEE 802.16, IEEE 802.16m, mobile WiMAX, 4G, IMT-Advanced, 3GPP LTE, 3GPP LTE-Advanced, Broadband Wireless, Wireless Communications, Cellular Systems, Network Architecture Abstract of the

More information

Alternate PHYs

Alternate PHYs A whitepaper by Ayman Mukaddam 2018, LLC Page 1 of 12 Contents Modern 802.11 Amendments... 3 Traditional PHYs Review (2.4 GHz and 5 GHz PHYs)... 3 802.11ad Directional Multi-Gigabit - DMG PHY... 4 Frequency

More information

OVERVIEW OF VANET WITH ITS FEATURES AND SECURITY ATTACKS

OVERVIEW OF VANET WITH ITS FEATURES AND SECURITY ATTACKS OVERVIEW OF VANET WITH ITS FEATURES AND SECURITY ATTACKS M.Newlin Rajkumar 1, M.Nithya 2,P.HemaLatha 3 1Assistant Professor, Department of Computer Science, Anna University Regional Centre Coimbatore 2P.G

More information

Network Security: Broadcast and Multicast. Tuomas Aura T Network security Aalto University, Nov-Dec 2010

Network Security: Broadcast and Multicast. Tuomas Aura T Network security Aalto University, Nov-Dec 2010 Network Security: Broadcast and Multicast Tuomas Aura T-110.5240 Network security Aalto University, Nov-Dec 2010 Outline 1. Broadcast and multicast 2. Receiver access control (i.e. data confidentiality)

More information

A Perspective on V2X in the United States

A Perspective on V2X in the United States A Perspective on V2X in the United States John B. Kenney, Ph.D Director and Principal Researcher Toyota InfoTechnology Center, USA jkenney@us.toyota-itc.com November 14, 2017 SIP-adus Workshop on Connected

More information

OPNET BASED SIMULATION AND INVESTIGATION OF WIMAX NETWORK USING DIFFERENT QoS

OPNET BASED SIMULATION AND INVESTIGATION OF WIMAX NETWORK USING DIFFERENT QoS OPNET BASED SIMULATION AND INVESTIGATION OF WIMAX NETWORK USING DIFFERENT QoS Kamini Jaswal 1, Jyoti 2, Kuldeep Vats 3 1 M.tech, Department of electronics and communication, South point institute of engineering

More information

CSC 4900 Computer Networks: Wireless Networks

CSC 4900 Computer Networks: Wireless Networks CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission

More information

Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur

Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 50 Connected Vehicles II So, now we are going to continue

More information

V2V and V2I Communication. 건국대학교 MBC Lab

V2V and V2I Communication. 건국대학교 MBC Lab V2V and V2I Communication 건국대학교 MBC Lab Contents V2I/V2V Communication Introduction DSRC WAVE CALM V2V Network Protocols Projects and Standards V2I/V2V Communication Introduction Introduction What is ITS?

More information

Architectures of Next Generation Wireless Networks. Pascal LORENZ.

Architectures of Next Generation Wireless Networks. Pascal LORENZ. Architectures of Next Generation Wireless Networks lorenz@ieee.org Internet is increasing exponentially: 2001: 180 million users today: more than 2 billions users Internet traffic and the bandwidth double

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Beyond 3G Wireless. K.Raghunandan (RAGHU) Construction Administrator (Wireless) Communication Engineering New York City Transit (MTA)

Beyond 3G Wireless. K.Raghunandan (RAGHU) Construction Administrator (Wireless) Communication Engineering New York City Transit (MTA) Beyond 3G Wireless K.Raghunandan (RAGHU) Construction Administrator (Wireless) Communication Engineering New York City Transit (MTA) 3G Deployments today Rev C? 3G -1X EVDO CDMA2000 Rev A 3G -1XRTT CDMA2000

More information

CHAPTER I INTRODUCTION TO VANETS

CHAPTER I INTRODUCTION TO VANETS CHAPTER I INTRODUCTION TO VANETS 1.1 PERVASIVE NETWORK Pervasive Networking is perceived as the ability to communicate and access the same types of services-anytime, anywhere. This is regardless of the

More information

Wireless Communication

Wireless Communication Wireless Communication Hwajung Lee Key Reference: Prof. Jong-Moon Chung s Lecture Notes at Yonsei University Wireless Communications Bluetooth Wi-Fi Mobile Communications LTE LTE-Advanced Mobile Communications

More information