VANET Security and Privacy. V-Sec April 2012

Size: px
Start display at page:

Download "VANET Security and Privacy. V-Sec April 2012"

Transcription

1 VANET Security and Privacy V-Sec April 2012

2 A Brief Introduction to VANET Mobile Ad-hoc Network (MANET) Vehicle to Infrastructure (V2I) Vehicle to Vehicle (V2V) 2

3 3 Applications Safety Congestion P2P I've can haz internets I'm here. 911! I am incoming. There's a lot of people over here. Hmmm...

4 4 Physical Layer Challenges Differences from classic MANET QoS Time Variability in density Delay Tolerant Networks Store-carry-forward CSMA a p Prevailing protocol for traffic simulations Can be improved for flooding

5 Safety Routing Constraints Time Flooding Suggested Protocols Core Assisted Mesh Protocol On-Demand Multicast Routing Protocol Multicast AODV Multicast OLSR

6 An Example of Flooding Geographic Aware Flooding Accident Site Biswas et al. from VEHICLE AD HOC NETWORKS: APPLICATIONS AND RELATED TECHNICAL ISSUES

7 Data Dissemination Limitation It's all about relevance Limit by geographic area Limit by hop count

8 Packet Storm AODV 5.9 GHz, 10MHz channel, 20mW transmission power, receiver sensitivity threshold -95dBm N. WISITPONGPHAN et al. BROADCAST STORM MITIGATION TECHNIQUES IN VEHICULAR AD HOC NETWORKS

9 Introduction Questions Questions on these topics? Implementation Application Flooding

10 An Introduction to Security Get your security hat on Integrity Privacy Authenticity / Liability Verification of Data Consistency Availability (Timeliness) Who is the adversary? Insider vs Outsider (Not a Stephen King villain!) Malicious vs Rational Active vs Passive Local vs Extended M. Raya and J.-P. Hubaux / Securing vehicular ad hoc networks

11 PKI Every vehicle obtains trust from a trust authority Do you see problems with this?

12 Key Storage and Management Keys stored psuedo-securely within the vehicle TPM Identity Electronic License Plate Electronic Chassis Number ID paired to Key Anonymous Keys Preserve Privacy Define a set of authenticated psuedonyms

13 Key Revocation Send a revocation message to the vehicle Send a revocation to the region Send a revocation to the world! Do you see a problem here?

14 Alternate Keying Schemes In short, why we don't use these. Pairwise keys Does not scale Short connection times Group Communication Fast fragmentation Fast join Rekeying Vehicles traveling in the opposite direction

15 Geographic Grouping Group membership defined by road segment Preloaded segments and GPS needed Leader needed No Non-repudiation

16 Anonymity Key changing Interval Lower bound Upper bound Number of Messages This makes no sense to me d r d v d r datt

17 More Problems Questions? Secure Geocast DoS Hopeless for now, but can we notify the driver? Data Verification This is the same as MANET node consensus Secure GPS Non-existent

18 Flooding-Resilient Broadcast Authentication for VANETs Hsu-Chun Hsiao, Ahren Studer, Chen Chen, Adrian Perrig Carnegie Mellon University Fan Bai, Bhargav Bellur, Aravind Lyer General Motors

19 Vehicular Ad Hoc Network (VANET)! Each vehicle possesses an On Board Unit (OBU) " Broadcast information for safety and convenience Location, Speed Obstacle ahead Obstacle ahead Location, Speed Flooding-Resilient Broadcast Authentication for VANETs

20 Broadcast Signatures! Secure wireless communications 1. Origin Authentication G at (x,y ) 2. Message Authentication G at (x,y ) G at (x,y) 3. Non-repudiation G at (x,y) G at (x,y)! IEEE VANET security standard " Digitally signs every message using ECDSA algorithm Flooding-Resilient Broadcast Authentication for VANETs

21 Signature Flooding! Expensive verification " 22ms to verify ECDSA signature on 400MHz processor! Many messages may arrive in a short time period " Every vehicle broadcasts location every 100ms Signature flooding severely limits effectiveness of VANET applications. Flooding-Resilient Broadcast Authentication for VANETs

22 Outline! Background and Motivation! Entropy-aware authentication! Flooding-resilient schemes " FastAuth: single-hop periodic messages " SelAuth: multi-hop messages! Conclusion Flooding-Resilient Broadcast Authentication for VANETs

23 Entropy-Aware Authentication Scheme s overhead should match the entropy of broadcast messages.! Fast Authentication (FastAuth) --- exploits predictability of future messages " Replaces expensive ECDSA sigs! Selective Authentication (SelAuth) --- selective verification before forwarding " Avoid checking sigs with high certainty of validity Flooding-Resilient Broadcast Authentication for VANETs

24 Cryptographic Primitives! One-Time Signature (OTS) " To sign 1-bit messages m " Two key pairs: {pk0, sk0} and {pk1, sk1} (pk=h(sk))! Merkle Tree Signature " To sign 2-bit messages " v 0 =00,, v 3 =11 " Sig for v 2 is {h 0-1, h 3, r 2 } h 0 1 PK h 0 = H(v 0 r 0 ) h 2 3 h 0 h 1 h 2 h 3 Per-signature overhead ECDSA-256 OTS Generation 7ms 320µs Verification 22 ms 160µs Public key size 256 bits 320 hashes (1 hash) Signature size 512 bits 160 hashes (160 hashes) h 1 = H(v 1 r 1 ) h 2 = H(v 2 r 2 ) h 3 = H(v 3 r 3 ) h 0 1 = H(h 0 h 1 ) h 2 3 = H(h 2 h 3 ) PK = H(h 0 1 h 2 3 ) Flooding-Resilient Broadcast Authentication for VANETs

25 FastAuth: First Attempt 1. Predict location 2. Create verifiable ACK 3. Broadcast ACK L 0 L 1 L 2 L 3 L 1 L 2 L 3 A 1 A 1 A 2 P A 3 A i = H(A i+1 ) : Hash function H P : public value Ai : ACK of location Li : ECDSA signature 4. Verification P is signed & P = H(A 1 ) so blue car indeed said L 1 Verify Ai 22000x faster than Li Flooding-Resilient Broadcast Authentication for VANETs

26 Location Uncertainty Ideal case: perfect prediction Avg overhead 1 us P Loc A 1 A 2 A 3 Verification time Ai : 1 us : us Unfortunately incorrect prediction requires re-prediction Avg overhead >> 1 us P Loc A 1 P Loc! Challenge: commit all possible movements into ACKs A 3 Flooding-Resilient Broadcast Authentication for VANETs

27 Location Predication! Sender predicts its own movements! Narrow down possible movements for efficiency " Laws of physics and road topology e.g., slower than 110mph cannot move > 5m per 0.1s " Coarse-grained position 5m Δ y Δ x past trajectory D l D f D r movement D f =(1,0) D l =(1,1) D r =(1, 1) Prediction table probability Flooding-Resilient Broadcast Authentication for VANETs

28 Verifiable ACK Construction 2.-Verifiable-ACK-Construc5on- Possible Movement (L i L i-1 ) Stay (D S ) Forward (D F ) Forward left (D L ) Forward right (D R ) : Hash function H : public value : ACK of location Li : ECDSA signature L 0 P Commit movements using Merkle Hash Tree H(H(D L ) H(D R )) H(D R ) D S,1 D F,1 D L,1 D R,1 D S,2 S D F,2 F D L,2 L D R,2 R Flooding-Resilient Broadcast Authentication for VANETs

29 Signed Location Broadcast 3.-Signed-Loca5on-Broadcast- L 0 P A 2 A 3 A 11 A 20 A 100 A 211 D F,1 D S,1 D F,1 D L,1 D R,1 D L,2 D S,2 D F,2 D L,2 D R,2 A 211 A 3 L 0 P A 100 A 2 D F,1 A 11 D L,2 A 20 Flooding-Resilient Broadcast Authentication for VANETs

30 Verification Flooding-Resilient Broadcast Authentication for VANETs

31 Further Improvement! Verification overhead reduced " Expensive ECDSA => lightweight Merkle tree sigs! How to reduce the communication overhead? " Location predictability Possible Movement (L i L i-1 ) Stay (Ds) Forward (Df) Forward left (Dl) Forward right (Dr) Probability???? Flooding-Resilient Broadcast Authentication for VANETs

32 Huffman and Merkle Tree Possible Movement (L i L i-1 ) Stay (D S ) Forward (D F ) Forward left (D L ) Forward right (D R ) Probability P S P F P L P R Re-arrange based on probability (Huffman encoding) D F D S D F D L D R D L D S D R Flooding-Resilient Broadcast Authentication for VANETs

33 Dealing with Packet Loss! Trade-offs " Pros: instant verification, low comp. & comm. Overhead " Cons: low update frequency! Low update frequency due to verification dependency " Missing messages prevent verification of subsequent msgs! Reed-Solomon Coding (RS(w,u)) " Beacon B i " u out of w succeeding beacons (B i+1, B i+2,, B i+w ) Flooding-Resilient Broadcast Authentication for VANETs

34 Public Key Rebinding! Public key is broadcasted at the beginning of the predication period L 0 P! Every I E beacons, vehicle signs its beacon by ECDSA in addition to OTS Flooding-Resilient Broadcast Authentication for VANETs

35 Evaluation Settings! Data collection " 4 traces, each by driving along a 2-mile path for 2 hours " default prediction model " use the first half of each trace as the training data and evaluate FastAuth using the second half of trace Δ y Δ y Δ x Δ x (a) default (b) trained Flooding-Resilient Broadcast Authentication for VANETs

36 Simulation Comm. Overhead ratio of communication trained, I E = 20 default, I E = 20 trained, I E = 50 default, I E = prediction interval (I) Fig. 1 Communication Overhead compared to ECDSA Flooding-Resilient Broadcast Authentication for VANETs

37 Simulation Comp. Overhead ratio of sender comp. ratio of receiver comp RS(5,2), I E = 20 RS(3,2), I E = 20 RS(5,2), I E = 50 RS(3,2), I E = ratio of comm. ratio of update frequency Flooding-Resilient Broadcast Authentication for VANETs

38 Outline! Background and Motivation! Entropy-aware authentication! Flooding-resilient schemes " FastAuth: single-hop periodic messages " SelAuth: multi-hop messages! Conclusion Flooding-Resilient Broadcast Authentication for VANETs

39 SelAuth Overview! Promptly isolates malicious parties! Quickly adjusts P xy s.t. " P xy = Pr{y verifies signatures forwarded by x} " P xy goes to 0 for benign x and goes to 1 for malicious x A Y G B Send invalid sig S A Relay S A Relay S A Verify S A 1. Increase P GB 1. Increase P YG 2. Pushback [S A is bad] 1. Increase P AY 2. Pushback [S A is bad] 2. Pushback [S A is bad] Flooding-Resilient Broadcast Authentication for VANETs

40 Fast Isolation Propagation of invalid signatures (hops) NS-2 simulation time (sec) time (sec) time (sec) time (sec) time (sec) Flooding-Resilient Broadcast Authentication for VANETs One verification prob. for all neighbors One verification prob. for all neighbors + Pushback warning Per-neighbor verification prob. SelAuth Per-neighbor verification prob. + Pushback warning Verify every signature with p = 1 21

41 SelAuth: Low Overhead overall computation (# of verification) initial probability overall communication (KB) SelAuth Verify-All one-prob-for-all-neighbors initial probability Flooding-Resilient Broadcast Authentication for VANETs

42 Conclusion! Flooding-resilient broadcast signature " Required for timely verification of safety messages " Unachievable in current standard even in benign settings! Entropy-aware authentication to mitigate flooding " FastAuth: instant verification for on-hop messages " SelAuth: selective authentication for multi-hop messages Flooding-Resilient Broadcast Authentication for VANETs

43 Questions? 2012/04/05

44 Providing VANET Security Through Active Position Detection Click to edit Master subtitle style Gongjun Yan, Stephan Olariu, Michele C. Weigle Department of Computer Science, Old Dominion University

45 Introduction Assumption: Majority (~85%) of vehicles are honest and behave responsibly. Main contribution: Detect and isolate malicious cars using GPS and radar-provided data. Key Points: Achieve local security On-board radar Extend to global security Preset position based groups and dynamic challenges Measured results using simulations

46 Related work Cryptography based methods Significant overhead using PKI Using hard thresholds to detect false locations Not flexible because of uncertainties in VANETs Measure signal strength Could be forged, bounced off another car, etc..

47 VANET Applications Two categories of VANET applications: Non-Position Related Online payment services Online shopping Position Related Traffic condition reports Collision avoidance Emergency alert Cooperative driving Resource availability

48 Position Related Attacks Dropping packets Accidents Modifying existing or inserting bogus packets Traffic Jam Illusion Replaying packets Pretend to be at a fake position Well-known, dangerous attack: Sybil Attack Forge multiple identities to create illusions o Could trigger collision warning

49 Proposed Solution Seeing is Believing Hear : Report of GPS coordinates See : on-board radar Reduce fender-benders, advanced cruise control Limited by short range Compare the two: Corroborate real positions Isolate malicious vehicles Result: Achieve local security in a cell

50 Cells Preset position-based cell Within cell: Vehicles can directly communicate Verify position of specific vehicle in cell Outside of cell: Radar not strong enough Use radar in oncoming traffic to challenge and confirm

51 Acquired Data Each vehicle has three types of data: Local radar-detected data from itself Remote radar detected data from oncoming traffic Agreed-upon data from cell neighbors Achieve global security: Apply cosine similarity, using defined thresholds Construct history of vehicle movement o Help determine if newly received data is valid

52 Cell Positioning Creating the preset position-based cell: Compare GPS coords with pre-set maps Broadcast GPS coords to other cars Creates rough topology Cars in overlap act as routers, notify cell leaders

53 Cell Leaders Responsibilities: Verifies GPS position of all vehicles in cell Aggregates the data Broadcasts it intra-cell Other cars now know of all cars in their cell Sends it inter-cell Picking a Cell Leader Closest to Center Approaching current cell leader

54 Cell Routers Routers 2 per cell forward and backward Communicate aggregate data Picked by proximity to overlap region and traveling direction Leader and Routers are watched by cell members and neighbors Silence if all is good Send out protest packets otherwise Leader put into question table Majority vote determines if leader is malicious --> distrust table

55 Radar Detection Radar gives us: Relative velocity Angle Position Two events trigger radar detection: Reactive: Timeout threshold Proactive: Randomly during communication Both combine to give us Active Position Detection

56 Position Verification Active Position Verification Need Overlap of GPS and Radar with tolerance Accept/Reject

57 Global Security Attacks Global Security: An adversary can launch three types of attacks: Sybil attack Continually lying about position Occasionally lying about position To detect latter two: Message routing

58 Preventing Sybil Attacks Vehicle claims to be several vehicles at the same time or in succession. Very detrimental: o Example: 100s of vehicles worth of network overhead Even more dangerous: Sybil + position attack Possible when: Local vehicle has no direct physical knowledge of remote car In other words, only has abstract data. Solution proposed: Using weighted data: o When radar is working: highest weight o When radar isn t working: neighbor data has highest weight

59 Map History Purpose: Classify new data as real or fake Basic idea: Any vehicle without history is highly suspect Build database of history on local car Don t trust new cars with router or leader position Once it behaves for quite a while and falls within probably speeds and distances travelled, trust it

60 Isolating Malicious Cars Isolating malicious vehicles using tables: Trust, Question, Distrust Tables Procedure: 1. New vehicle broadcasts HELLO 2. Cell Leader responds with IDs: It s own, routers, cell members; 3. Members put new car in question table Builds history 4. If it behaves, members promote to trust table 5. if it misbehaves, it gets put into distrust table

61 Simulation and Testing Parameters: Two direction, 3km highway with two lanes in each direction Cell radius = Traffic arrival rate = Mean velocity = 100m 1600 cars/h 33.3 m/s Transmission radius = 100m 16 malicious cars, a single observer, varying number of other cars Procedure: Observer enters road Initiates request to find malicious vehicles Ends when it reaches 3 km traveled

62 Results of Simulation Metric: Time required to detect 16 adversaries Varying Total Car Number Varying Transmission Range

63 Future Work Future work: Effective Size of Map History Impersonating a long-standing honest vehicle that just let the highway Colluding groups of malicious vehicles

64 Questions? 2012/04/05

Providing VANET Security Through Active Position Detection

Providing VANET Security Through Active Position Detection Providing VANET Security Through Active Position Detection Gongjun Yan, Stephan Olariu, Michele C. Weigle Department of Computer Science, Old Dominion University, Norfolk, VA 23529-0162, USA Abstract Vehicle

More information

Mitigating the Effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks

Mitigating the Effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks Mitigating the Effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks Nizar Alsharif, Albert Wasef, and Xuemin (Sherman) Shen Department of Electrical and Computer Engineering, University

More information

Defenses against Wormhole Attack

Defenses against Wormhole Attack Defenses against Wormhole Attack Presented by: Kadhim Hayawi, ID: 20364216 COURSE PRESENTATION FOR ECE750 - INTELLIGENT SENSORS AND SENSOR NETWORKS Prof. Otman A. Basir Outline Introduction Packet Leashes

More information

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar

More information

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet

More information

Introduction to VANET

Introduction to VANET VANET Introduction to VANET -Vehicles connected to each others through an ad hoc formation form a wireless network called Vehicular Ad Hoc Network. -Vehicular ad hoc networks (VANETs) are a subgroup of

More information

Introduction to Vehicular Networks

Introduction to Vehicular Networks CS 795/895 Vehicular Networks Introduction to Vehicular Networks Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/courses/cs795-s07/

More information

Sybil Attack Detection and Prevention Using AODV in VANET

Sybil Attack Detection and Prevention Using AODV in VANET Sybil Attack Detection and Prevention Using in VANET Navneet 1, Rakesh Gill 2 1 M. Tech. Student, GITM, Bilaspur-Tauru Road, Gurgaon (Haryana) navneet_tehlan@yahoo.com 2 Asst. Prof., GITM, Bilaspur-Tauru

More information

Enhanced Management of Certificate Caching and Revocation Lists in VANET

Enhanced Management of Certificate Caching and Revocation Lists in VANET Enhanced Management of Certificate Caching and Revocation Lists in VANET Sadiq H. Abdulhussain Computer Engineering Department College of Engineering University of Baghdad ABSTRACT Vehicular network security

More information

Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network

Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network Deivanai.P 1, K.Sudha 2, K.Radha 3 Department of CSE, Muthayammal Engineering College, Rasipuram, India 1 Assistant Professor,

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions

More information

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET International Journal of Scientific and Research Publications, Volume 3, Issue 5, May 2013 1 Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET Ms.T.R.Panke * M.B.E.S.College of

More information

Analyzing Routing Protocols Performance in VANET Using p and g

Analyzing Routing Protocols Performance in VANET Using p and g Analyzing Routing Protocols Performance in VANET Using 802.11p and 802.11g Rasha Kaiss Aswed and Mohammed Ahmed Abdala Network Engineering Department, College of Information Engineering, Al-Nahrain University

More information

ICMP and Monitoring to Detect and Isolate Sybil Attack in VANET

ICMP and Monitoring to Detect and Isolate Sybil Attack in VANET ICMP and Monitoring to Detect and Isolate Sybil Attack in VANET Jaydeep P. Kateshiya 1, Anup Parkash Singh 2 P.G. Student, Department of Computer Engineering, Lovely Professional University, Punjab, India

More information

Short-term Linkable Group Signatures with Categorized Batch Verification

Short-term Linkable Group Signatures with Categorized Batch Verification Short-term Linkable Group Signatures with Categorized Batch Verification Lukas Malina 1, Jordi Castella-Rocà 2, Arnau Vives-Guasch 2, Jan Hajny 1 1 Department of Telecommunications Faculty of Electrical

More information

A Review on Vehicular Ad-Hoc Network

A Review on Vehicular Ad-Hoc Network A Review on Vehicular Ad-Hoc Network Arshdeep Kaur 1, Shilpa Sharma 2 M.Tech Student, Dept. of Computer Science Engineering, Lovely Professional University, Phagwara, Punjab, India 1 Assistant Professor,

More information

EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks

EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks IEEE TRANSACTIONS ON MOBILE COMPUTING VOL.12 NO.1 YEAR 2013 EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks 1 Albert Wasef and Xuemin (Sherman) Shen, IEEE Fellow Department

More information

TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs

TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs Ahren Studer, Elaine Shi, Fan Bai, Adrian Perrig March 14, 2008 CMU-CyLab-08-011 CyLab Carnegie Mellon University Pittsburgh,

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #12 Routing Security; Forwarding Security 2016 Patrick Tague 1 SoW Presentation SoW Thursday in class I'll post a template Each team gets ~5 minutes

More information

Packet Estimation with CBDS Approach to secure MANET

Packet Estimation with CBDS Approach to secure MANET Packet Estimation with CBDS Approach to secure MANET Mr. Virendra P. Patil 1 and Mr. Rajendra V. Patil 2 1 PG Student, SSVPS COE, Dhule, Maharashtra, India 2 Assistance Professor, SSVPS COE, Dhule, Maharashtra,

More information

Overview of Challenges in VANET

Overview of Challenges in VANET Overview of Challenges in VANET Er.Gurpreet Singh Department of Computer Science, Baba Farid College, Bathinda(Punjab), India ABSTRACT VANET are becoming active area of research and development because

More information

Secure Routing and Transmission Protocols for Ad Hoc Networks

Secure Routing and Transmission Protocols for Ad Hoc Networks MobiHoc 2002 Working Session on Security in Ad Hoc Networks Secure Routing and Transmission Protocols for Ad Hoc Networks Zygmunt J. Haas and P. Papadimitratos (Panos) Cornell University Wireless Networks

More information

Wireless Network Security Spring 2013

Wireless Network Security Spring 2013 Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #19 Location Privacy & Tracking Agenda Location privacy and tracking Implications / risks of location information Location privacy and anonymity

More information

Mobile Security Fall 2011

Mobile Security Fall 2011 Mobile Security 14-829 Fall 2011 Patrick Tague Class #17 Location Security and Privacy HW #3 is due today Announcements Exam is in-class on Nov 9 Agenda Location security Location privacy Location, Location,

More information

Wireless Network Security Spring 2013

Wireless Network Security Spring 2013 Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #11 Control-Plane Routing Misbehavior Agenda Control-Plane Routing Misbehavior MANET Routing Misbehavior at the control-plane Toward secure

More information

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Lecture 13: Routing in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Routing in multihop networks Figure out a path from source to destination. Basic techniques of routing

More information

Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs

Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

Aanchal Walia #1, Pushparaj Pal *2

Aanchal Walia #1, Pushparaj Pal *2 An Implemented approach of VANET using Location Information based Technique for safe city and vehicle Aanchal Walia #1, Pushparaj Pal *2 #1. M.Tech Scholor,ECE,Krukshetra University, *2. A.P.ECE Department,

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #16 Network Privacy & Anonymity 2014 Patrick Tague 1 Network Privacy Issues Network layer interactions in wireless networks often expose

More information

Location Awareness in Ad Hoc Wireless Mobile Neworks

Location Awareness in Ad Hoc Wireless Mobile Neworks Location Awareness in Ad Hoc Wireless Mobile Neworks Lijuan Ai Wenyu Wang Yi Zhou 11/14/2001 Mobile Computing, Fall 2001 1 PART I INTRODUCTION TO MANET & LOCATION-AWARE COMPONENTS 11/14/2001 Mobile Computing,

More information

Dynamic Time-stable Geocast Routing in Vehicular Ad Hoc Networks

Dynamic Time-stable Geocast Routing in Vehicular Ad Hoc Networks Dynamic Time-stable Geocast Routing in Vehicular Ad Hoc Networks by Hamidreza Rahbar A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of

More information

STRAW - An integrated mobility & traffic model for vehicular ad-hoc networks

STRAW - An integrated mobility & traffic model for vehicular ad-hoc networks STRAW - An integrated mobility & traffic model for vehicular ad-hoc networks David R. Choffnes & Fabián E. Bustamante Department of Computer Science, Northwestern University www.aqualab.cs.northwestern.edu

More information

Protection Against DDOS Using Secure Code Propagation In The VANETs

Protection Against DDOS Using Secure Code Propagation In The VANETs Protection Against DDOS Using Secure Code Propagation In The VANETs Mandeep Kaur, Manish Mahajan Mandeepcheema6@gmail.com,cgccoe.hodcse@gmail.com ABSTRACT--VANETs are the vehicular networks used to connect

More information

An Efficient Data Transmission in VANET Using Clustering Method

An Efficient Data Transmission in VANET Using Clustering Method INTL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2017, VOL. 63, NO. 3, PP. 309-313 Manuscript received April 29, 2016; revised July, 2017. DOI: 10.1515/eletel-2017-0045 An Efficient Data Transmission

More information

International Journal of Information Movement. Website: ISSN: (online) Pages

International Journal of Information Movement. Website:   ISSN: (online) Pages REVIEW: VANET ARCHITECTURES AND DESIGN Chetna Research Scholar Department Of Electronic & Communication Engg. Galaxy Global Group of Institutions, Dinarpur Saranjeet Singh Faculty Department of Electronic

More information

Security in Mobile Ad-hoc Networks. Wormhole Attacks

Security in Mobile Ad-hoc Networks. Wormhole Attacks Security in Mobile Ad-hoc Networks Wormhole Attacks What are MANETs Mobile Ad-hoc Network (MANET) is a collection of wireless mobile hosts without fixed network infrastructure and centralized administration.

More information

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 11, November -2017 Improved OLSR Protocol for VANET Ravi Shrimali

More information

EXPEDITE MESSAGE AUTHENTICATION PROTOCOL FOR VANETs USING DATA AGGREGATION

EXPEDITE MESSAGE AUTHENTICATION PROTOCOL FOR VANETs USING DATA AGGREGATION EXPEDITE MESSAGE AUTHENTICATION PROTOCOL FOR VANETs USING DATA AGGREGATION Shaiba Wahab Dept. Of Computer Science and Engineering M.E.A. Engineering College Perinthalmanna, Kerala Jemsheer Ahmed P Dept.

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

LTE and IEEE802.p for vehicular networking: a performance evaluation

LTE and IEEE802.p for vehicular networking: a performance evaluation LTE and IEEE802.p for vehicular networking: a performance evaluation Zeeshan Hameed Mir* Fethi Filali EURASIP Journal on Wireless Communications and Networking 1 Presenter Renato Iida v2 Outline Introduction

More information

Broadcast algorithms for Active Safety Applications over Vehicular Ad-hoc Networks

Broadcast algorithms for Active Safety Applications over Vehicular Ad-hoc Networks Broadcast algorithms for Active Safety Applications over Vehicular Ad-hoc Networks M.N. Mariyasagayam, M. Lenardi HITACHI Europe, "Le Thélème", 1503 Route des Dolines, 06560 Sophia Antipolis, France Phone:

More information

Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs

Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs by Charikleia Zouridaki Charikleia Zouridaki 1, Marek Hejmo 1, Brian L. Mark 1, Roshan K. Thomas 2, and Kris Gaj 1 1 ECE

More information

MAC Protocols for VANETs

MAC Protocols for VANETs MAC Protocols for VANETs Alexandru Oprea Department of Computer Science University of Freiburg Click to edit Master subtitle style Ad Hoc Networks Seminar Based on: Hamid Menouar and Fethi Filali, EURECOM

More information

Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks

Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks D.Balamahalakshmi Department of Computer Science and Engineering, V.S.B Engineering College, Karur, Tamilnadu, India 1

More information

Sleep/Wake Aware Local Monitoring (SLAM)

Sleep/Wake Aware Local Monitoring (SLAM) Sleep/Wake Aware Local Monitoring (SLAM) Issa Khalil, Saurabh Bagchi, Ness Shroff Dependable Computing Systems Lab (DCSL) & Center for Wireless Systems and Applications (CWSA) School of Electrical and

More information

ANALYSIS OF SAFETY MEASURES AND QUALITY ROUTING IN VANETS

ANALYSIS OF SAFETY MEASURES AND QUALITY ROUTING IN VANETS Vol.2, Issue.2, Mar-Apr 2012 pp-062-066 ISSN: 2249-6645 ANALYSIS OF SAFETY MEASURES AND QUALITY ROUTING IN VANETS Vedha Vinodha.D*, Mrs.V.Seethalakshmi** *II M.E CS, Sri Shakthi Institute of Engineering

More information

SURVEY OF VEHICLE AD-HOC NETWORK

SURVEY OF VEHICLE AD-HOC NETWORK SURVEY OF VEHICLE AD-HOC NETWORK DEESHA G. DEOTALE 1 & UMA NAGARAJ 2 1,2 Department of Computer Engineering M.A.E Alandi (D) Pune India E-mail : disha.deotale21@gmail.com & umanagaraj67.@gmail.com Abstract

More information

Ad Hoc Networks: Issues and Routing

Ad Hoc Networks: Issues and Routing Ad Hoc Networks: Issues and Routing Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Mobile Ad-hoc Networks

Mobile Ad-hoc Networks Mobile Ad-hoc Networks Fred Baker 1 The manet problem Mobile Random and perhaps constantly changing Ad-hoc Not engineered Networks Elastic data applications which use networks to communicate 2 Examples

More information

SRPS: Secure Routing Protocol for Static Sensor Networks

SRPS: Secure Routing Protocol for Static Sensor Networks SRPS: Secure Routing Protocol for Static Sensor Networks Hamoinba Vebarin and Samourqi Difrawi International Awarness Institute Email: {hvebarin, sdifrawi}@iwi.org.jp Abstract In sensor networks, nodes

More information

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures By Chris Karlof and David Wagner Lukas Wirne Anton Widera 23.11.2017 Table of content 1. Background 2. Sensor Networks vs. Ad-hoc

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks 15-441: Computer Networking Lecture 24: Ad-Hoc Wireless Networks Scenarios and Roadmap Point to point wireless networks (last lecture) Example: your laptop to CMU wireless Challenges: Poor and variable

More information

Kun Sun, Peng Ning Cliff Wang An Liu, Yuzheng Zhou

Kun Sun, Peng Ning Cliff Wang An Liu, Yuzheng Zhou Kun Sun, Peng Ning Cliff Wang An Liu, Yuzheng Zhou Abstract Accurate and synchronized time is crucial in many sensor network applications Time synchronization becomes an attractive target due to its importance

More information

CHAPTER I INTRODUCTION TO VANETS

CHAPTER I INTRODUCTION TO VANETS CHAPTER I INTRODUCTION TO VANETS 1.1 PERVASIVE NETWORK Pervasive Networking is perceived as the ability to communicate and access the same types of services-anytime, anywhere. This is regardless of the

More information

MC-Safe: Multi-Channel Real-time V2V Communication for Enhancing Driving Safety

MC-Safe: Multi-Channel Real-time V2V Communication for Enhancing Driving Safety RTSS 2018 MC-Safe: Multi-Channel Real-time V2V Communication for Enhancing Driving Safety Yunhao Bai, Kuangyu Zheng, Zejiang Wang, Xiaorui Wang, Junmin Wang Dept. of Electrical and Computer Engineering

More information

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types Kapitel 5: Mobile Ad Hoc Networks Mobilkommunikation 2 WS 08/09 Wireless Communication Wireless communication networks types Infrastructure-based networks Infrastructureless networks Ad hoc networks Prof.

More information

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS S. P. Manikandan 1, R. Manimegalai 2 and S. Kalimuthu 3 1 Department of Computer Science and Engineering, Sri Venkateshwara

More information

A SECURE ALERT MESSAGING FOR VEHICULAR AD HOC NETWORKS

A SECURE ALERT MESSAGING FOR VEHICULAR AD HOC NETWORKS INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) ISSN 0976 6367(Print) ISSN 0976

More information

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group

More information

The Challenges of Robust Inter-Vehicle Communications

The Challenges of Robust Inter-Vehicle Communications The Challenges of Robust Inter-Vehicle Communications IEEE VTC2005-Fall Marc Torrent-Moreno, Moritz Killat and Hannes Hartenstein DSN Research Group Institute of Telematics University of Karlsruhe Marc

More information

Defense Against Packet Injection in Ad Hoc Networks

Defense Against Packet Injection in Ad Hoc Networks Defense Against Packet Injection in Ad Hoc Networks Qijun Gu 1 Peng Liu 2 Chao-Hsien Chu 2 Sencun Zhu 3 1 Department of Computer Science Texas State University, San Marcos, TX 78666 2 School of Information

More information

CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS

CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS 130 CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS 5.1 INTRODUCTION The feasibility of direct and wireless multi-hop V2V communication based on WLAN technologies, and the importance of position based

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

DTN Interworking for Future Internet Presented by Chang, Dukhyun

DTN Interworking for Future Internet Presented by Chang, Dukhyun DTN Interworking for Future Internet 2008.02.20 Presented by Chang, Dukhyun Contents 1 2 3 4 Introduction Project Progress Future DTN Architecture Summary 2/29 DTN Introduction Delay and Disruption Tolerant

More information

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS 1 PRASHANTH JAYAKUMAR, 2 P.S.KHANAGOUDAR, 3 VINAY KAVERI 1,3 Department of CSE, GIT, Belgaum, 2 Assistant Professor, Dept.

More information

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE)

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE) An Effect of Route Caching Scheme in DSR for Vehicular Adhoc Networks Poonam kori, Dr. Sanjeev Sharma School Of Information Technology, RGPV BHOPAL, INDIA E-mail: Poonam.kori@gmail.com Abstract - Routing

More information

MANET ROUTING ATTACKS

MANET ROUTING ATTACKS MANET ROUTING ATTACKS Black Hole Attack Detection And Prevention Strategy In DYMO For MANET DYMO is advance version of AODV routing protocol develop to improve the network performance. Here, a mitigation

More information

Flexible, Extensible, and Efficient VANET Authentication

Flexible, Extensible, and Efficient VANET Authentication Flexible, Extensible, and Efficient VANET Authentication Ahren Studer, Fan Bai, Bhargav Bellur & Adrian Perrig Carnegie Mellon University General Motors {astuder, perrig}@cmu.edu {fan.bai, bhargav.bellur}@gm.com

More information

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing

More information

A Review on Security in Vehicular Ad-hoc Networks

A Review on Security in Vehicular Ad-hoc Networks A Review on Security in Vehicular Ad-hoc Networks Ramandeep Kaur 1, Er. Rupinderpal Singh 2 1M.Tech Scholar Computer Science & Engineering Department 2Asst. Prof. in Computer Science & Engineering Department

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #12 Forwarding Security 2015 Patrick Tague 1 SoW Presentation SoW Thursday in class I'll post a template Each team gets ~5-8 minutes Written SoW

More information

A Review on Black Hole Attack in MANET

A Review on Black Hole Attack in MANET A Review on Black Hole Attack in MANET Gourav Ahuja 1, Mrs. Sugandha 2 1 Department of Computer Science and Engineering, VCE, Rohtak, Haryana (India) 2 Asst. Prof., Department of Computer Science and Engineering,

More information

Onroad Vehicular Broadcast

Onroad Vehicular Broadcast Onroad Vehicular Broadcast Jesus Arango, Alon Efrat Computer Science Department University of Arizona Srinivasan Ramasubramanian, Marwan Krunz Electrical and Computer Engineering University of Arizona

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

D.David Neels Ponkumar 1, Janeshwari.S 2, Gomathi Sankari.A 3

D.David Neels Ponkumar 1, Janeshwari.S 2, Gomathi Sankari.A 3 Fast and Secure Countermand Verification Process Using MAP in VANET D.David Neels Ponkumar 1, Janeshwari.S 2, Gomathi Sankari.A 3 1 Profeesor, Einstein College of Engineering, david26571@gmail.com 2 PG

More information

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks December 1. 2006 Jong Oh Choi Department of Computer Science Yonsei University jochoi@emerald.yonsei.ac.kr Contents Motivation

More information

WIRELESS sensor networks have received a lot of attention

WIRELESS sensor networks have received a lot of attention IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 2, FEBRUARY 2006 395 Secure and Resilient Clock Synchronization in Wireless Sensor Networks Kun Sun, Peng Ning, Member, IEEE, and Cliff Wang,

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #10 Network Layer Threats; Identity Mgmt. 2015 Patrick Tague 1 Class #10 Summary of wireless network layer threats Specific threats related to

More information

A Review on Mobile Ad Hoc Network Attacks with Trust Mechanism

A Review on Mobile Ad Hoc Network Attacks with Trust Mechanism A Review on Mobile Ad Hoc Network Attacks with Trust Mechanism categorized into two classes: active attacks and passive attacks. Rinki Bhati 1, Dr. Deepti Sharma 2 M-Tech Student, Department of CSE, Advance

More information

Fast and Secure Multi-hop Broadcast Solutions for Inter-Vehicular Communication

Fast and Secure Multi-hop Broadcast Solutions for Inter-Vehicular Communication Fast and Secure Multi-hop Broadcast Solutions for Inter-Vehicular Communication Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio E. Palazzi Univ. Bordeaux, LaBRI, CNRS, France, Email: wafa.benjaballah@labri.fr,

More information

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack

More information

Proxy Signature-based RSU Message Broadcasting in VANETs

Proxy Signature-based RSU Message Broadcasting in VANETs Proxy Signature-based RSU Message Broadcasting in VANETs Subir Biswas Dept. of Computer Science University of Manitoba Winnipeg MB, Canada R3T 2N2 Email: bigstan@cs.umanitoba.ca Jelena Mišić Dept. of Computer

More information

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,

More information

Efficient and Secure Source Authentication for Multicast

Efficient and Secure Source Authentication for Multicast Efficient and Secure Source Authentication for Multicast Authors: Adrian Perrig, Ran Canetti Dawn Song J. D. Tygar Presenter: Nikhil Negandhi CSC774 Network Security Outline: Background Problem Related

More information

Achieving Privacy in Mesh Networks

Achieving Privacy in Mesh Networks Achieving Privacy in Mesh Networks Xiaoxin Wu Intel China Research Center Ltd Beijing, China xiaoxin.wu@intel.com Ninghui Li Department of Computer Science Purdue University West Lafayette, IN 47907-2086,

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

Vehicular Ad Hoc Networking - Overview

Vehicular Ad Hoc Networking - Overview - Overview CSI5140 Arnaud Casteigts http://www.site.uottawa.ca/ casteig/ October 21, 2008 Outline Quick Overview New possibilities VANETs Technological context Architecture Standards Introduction Broadcasting

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala. Mobile Ad Hoc Networks: Routing TOPIC 8 UCS-805 MOBILE COMPUTING Jan-May,2011 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com Mobile Ad Hoc Networks (MANET) Introduction

More information

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Mandadapu Sravya M.Tech, Department of CSE, G. Narayanamma Institute of Technology and Science. Ch.Mandakini

More information

Security for Structured Peer-to-peer Overlay Networks. Acknowledgement. Outline. By Miguel Castro et al. OSDI 02 Presented by Shiping Chen in IT818

Security for Structured Peer-to-peer Overlay Networks. Acknowledgement. Outline. By Miguel Castro et al. OSDI 02 Presented by Shiping Chen in IT818 Security for Structured Peer-to-peer Overlay Networks By Miguel Castro et al. OSDI 02 Presented by Shiping Chen in IT818 1 Acknowledgement Some of the following slides are borrowed from talks by Yun Mao

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

Efficient Working of Vehicular Ad-Hoc Network with Carry Forward Technique

Efficient Working of Vehicular Ad-Hoc Network with Carry Forward Technique Efficient Working of Vehicular Ad-Hoc Network with Carry Forward Technique Govind Sood 1, Dr. Tanu Preet Singh 2 ergovind.sood333@gmail.com, tanupreet.singh@gmail.com Abstract Vehicular Ad-Hoc network

More information

Various Issues in Vehicular Ad hoc Networks : A Survey

Various Issues in Vehicular Ad hoc Networks : A Survey International Journal of Computer Science & Communication Vol. 1, No. 2, July-December 2010, pp. 399-403 Various Issues in Vehicular Ad hoc Networks : A Survey Shinde S. S. 1 & Patil S. P 2 1,2 Annasaheb

More information

SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS

SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS INTRODUCTION 1. With the advancement in radio technologies like Bluetooth, IEEE 802.11or Hiperlan, a new concept of networking has emerged, known as ad hoc networks,

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review

More information

Mobile-Gateway Routing for Vehicular Networks 1

Mobile-Gateway Routing for Vehicular Networks 1 Mobile-Gateway Routing for Vehicular Networks 1 Hsin-Ya Pan, Rong-Hong Jan 2, Andy An-Kai Jeng, and Chien Chen Department of Computer Science National Chiao Tung University Hsinchu, 30010, Taiwan {hypan,

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #11 - Identity Mgmt.; Routing Security 2016 Patrick Tague 1 Class #11 Identity threats and countermeasures Basics of routing in ad hoc networks

More information