VANET Security and Privacy. V-Sec April 2012
|
|
- Ilene Austin
- 6 years ago
- Views:
Transcription
1 VANET Security and Privacy V-Sec April 2012
2 A Brief Introduction to VANET Mobile Ad-hoc Network (MANET) Vehicle to Infrastructure (V2I) Vehicle to Vehicle (V2V) 2
3 3 Applications Safety Congestion P2P I've can haz internets I'm here. 911! I am incoming. There's a lot of people over here. Hmmm...
4 4 Physical Layer Challenges Differences from classic MANET QoS Time Variability in density Delay Tolerant Networks Store-carry-forward CSMA a p Prevailing protocol for traffic simulations Can be improved for flooding
5 Safety Routing Constraints Time Flooding Suggested Protocols Core Assisted Mesh Protocol On-Demand Multicast Routing Protocol Multicast AODV Multicast OLSR
6 An Example of Flooding Geographic Aware Flooding Accident Site Biswas et al. from VEHICLE AD HOC NETWORKS: APPLICATIONS AND RELATED TECHNICAL ISSUES
7 Data Dissemination Limitation It's all about relevance Limit by geographic area Limit by hop count
8 Packet Storm AODV 5.9 GHz, 10MHz channel, 20mW transmission power, receiver sensitivity threshold -95dBm N. WISITPONGPHAN et al. BROADCAST STORM MITIGATION TECHNIQUES IN VEHICULAR AD HOC NETWORKS
9 Introduction Questions Questions on these topics? Implementation Application Flooding
10 An Introduction to Security Get your security hat on Integrity Privacy Authenticity / Liability Verification of Data Consistency Availability (Timeliness) Who is the adversary? Insider vs Outsider (Not a Stephen King villain!) Malicious vs Rational Active vs Passive Local vs Extended M. Raya and J.-P. Hubaux / Securing vehicular ad hoc networks
11 PKI Every vehicle obtains trust from a trust authority Do you see problems with this?
12 Key Storage and Management Keys stored psuedo-securely within the vehicle TPM Identity Electronic License Plate Electronic Chassis Number ID paired to Key Anonymous Keys Preserve Privacy Define a set of authenticated psuedonyms
13 Key Revocation Send a revocation message to the vehicle Send a revocation to the region Send a revocation to the world! Do you see a problem here?
14 Alternate Keying Schemes In short, why we don't use these. Pairwise keys Does not scale Short connection times Group Communication Fast fragmentation Fast join Rekeying Vehicles traveling in the opposite direction
15 Geographic Grouping Group membership defined by road segment Preloaded segments and GPS needed Leader needed No Non-repudiation
16 Anonymity Key changing Interval Lower bound Upper bound Number of Messages This makes no sense to me d r d v d r datt
17 More Problems Questions? Secure Geocast DoS Hopeless for now, but can we notify the driver? Data Verification This is the same as MANET node consensus Secure GPS Non-existent
18 Flooding-Resilient Broadcast Authentication for VANETs Hsu-Chun Hsiao, Ahren Studer, Chen Chen, Adrian Perrig Carnegie Mellon University Fan Bai, Bhargav Bellur, Aravind Lyer General Motors
19 Vehicular Ad Hoc Network (VANET)! Each vehicle possesses an On Board Unit (OBU) " Broadcast information for safety and convenience Location, Speed Obstacle ahead Obstacle ahead Location, Speed Flooding-Resilient Broadcast Authentication for VANETs
20 Broadcast Signatures! Secure wireless communications 1. Origin Authentication G at (x,y ) 2. Message Authentication G at (x,y ) G at (x,y) 3. Non-repudiation G at (x,y) G at (x,y)! IEEE VANET security standard " Digitally signs every message using ECDSA algorithm Flooding-Resilient Broadcast Authentication for VANETs
21 Signature Flooding! Expensive verification " 22ms to verify ECDSA signature on 400MHz processor! Many messages may arrive in a short time period " Every vehicle broadcasts location every 100ms Signature flooding severely limits effectiveness of VANET applications. Flooding-Resilient Broadcast Authentication for VANETs
22 Outline! Background and Motivation! Entropy-aware authentication! Flooding-resilient schemes " FastAuth: single-hop periodic messages " SelAuth: multi-hop messages! Conclusion Flooding-Resilient Broadcast Authentication for VANETs
23 Entropy-Aware Authentication Scheme s overhead should match the entropy of broadcast messages.! Fast Authentication (FastAuth) --- exploits predictability of future messages " Replaces expensive ECDSA sigs! Selective Authentication (SelAuth) --- selective verification before forwarding " Avoid checking sigs with high certainty of validity Flooding-Resilient Broadcast Authentication for VANETs
24 Cryptographic Primitives! One-Time Signature (OTS) " To sign 1-bit messages m " Two key pairs: {pk0, sk0} and {pk1, sk1} (pk=h(sk))! Merkle Tree Signature " To sign 2-bit messages " v 0 =00,, v 3 =11 " Sig for v 2 is {h 0-1, h 3, r 2 } h 0 1 PK h 0 = H(v 0 r 0 ) h 2 3 h 0 h 1 h 2 h 3 Per-signature overhead ECDSA-256 OTS Generation 7ms 320µs Verification 22 ms 160µs Public key size 256 bits 320 hashes (1 hash) Signature size 512 bits 160 hashes (160 hashes) h 1 = H(v 1 r 1 ) h 2 = H(v 2 r 2 ) h 3 = H(v 3 r 3 ) h 0 1 = H(h 0 h 1 ) h 2 3 = H(h 2 h 3 ) PK = H(h 0 1 h 2 3 ) Flooding-Resilient Broadcast Authentication for VANETs
25 FastAuth: First Attempt 1. Predict location 2. Create verifiable ACK 3. Broadcast ACK L 0 L 1 L 2 L 3 L 1 L 2 L 3 A 1 A 1 A 2 P A 3 A i = H(A i+1 ) : Hash function H P : public value Ai : ACK of location Li : ECDSA signature 4. Verification P is signed & P = H(A 1 ) so blue car indeed said L 1 Verify Ai 22000x faster than Li Flooding-Resilient Broadcast Authentication for VANETs
26 Location Uncertainty Ideal case: perfect prediction Avg overhead 1 us P Loc A 1 A 2 A 3 Verification time Ai : 1 us : us Unfortunately incorrect prediction requires re-prediction Avg overhead >> 1 us P Loc A 1 P Loc! Challenge: commit all possible movements into ACKs A 3 Flooding-Resilient Broadcast Authentication for VANETs
27 Location Predication! Sender predicts its own movements! Narrow down possible movements for efficiency " Laws of physics and road topology e.g., slower than 110mph cannot move > 5m per 0.1s " Coarse-grained position 5m Δ y Δ x past trajectory D l D f D r movement D f =(1,0) D l =(1,1) D r =(1, 1) Prediction table probability Flooding-Resilient Broadcast Authentication for VANETs
28 Verifiable ACK Construction 2.-Verifiable-ACK-Construc5on- Possible Movement (L i L i-1 ) Stay (D S ) Forward (D F ) Forward left (D L ) Forward right (D R ) : Hash function H : public value : ACK of location Li : ECDSA signature L 0 P Commit movements using Merkle Hash Tree H(H(D L ) H(D R )) H(D R ) D S,1 D F,1 D L,1 D R,1 D S,2 S D F,2 F D L,2 L D R,2 R Flooding-Resilient Broadcast Authentication for VANETs
29 Signed Location Broadcast 3.-Signed-Loca5on-Broadcast- L 0 P A 2 A 3 A 11 A 20 A 100 A 211 D F,1 D S,1 D F,1 D L,1 D R,1 D L,2 D S,2 D F,2 D L,2 D R,2 A 211 A 3 L 0 P A 100 A 2 D F,1 A 11 D L,2 A 20 Flooding-Resilient Broadcast Authentication for VANETs
30 Verification Flooding-Resilient Broadcast Authentication for VANETs
31 Further Improvement! Verification overhead reduced " Expensive ECDSA => lightweight Merkle tree sigs! How to reduce the communication overhead? " Location predictability Possible Movement (L i L i-1 ) Stay (Ds) Forward (Df) Forward left (Dl) Forward right (Dr) Probability???? Flooding-Resilient Broadcast Authentication for VANETs
32 Huffman and Merkle Tree Possible Movement (L i L i-1 ) Stay (D S ) Forward (D F ) Forward left (D L ) Forward right (D R ) Probability P S P F P L P R Re-arrange based on probability (Huffman encoding) D F D S D F D L D R D L D S D R Flooding-Resilient Broadcast Authentication for VANETs
33 Dealing with Packet Loss! Trade-offs " Pros: instant verification, low comp. & comm. Overhead " Cons: low update frequency! Low update frequency due to verification dependency " Missing messages prevent verification of subsequent msgs! Reed-Solomon Coding (RS(w,u)) " Beacon B i " u out of w succeeding beacons (B i+1, B i+2,, B i+w ) Flooding-Resilient Broadcast Authentication for VANETs
34 Public Key Rebinding! Public key is broadcasted at the beginning of the predication period L 0 P! Every I E beacons, vehicle signs its beacon by ECDSA in addition to OTS Flooding-Resilient Broadcast Authentication for VANETs
35 Evaluation Settings! Data collection " 4 traces, each by driving along a 2-mile path for 2 hours " default prediction model " use the first half of each trace as the training data and evaluate FastAuth using the second half of trace Δ y Δ y Δ x Δ x (a) default (b) trained Flooding-Resilient Broadcast Authentication for VANETs
36 Simulation Comm. Overhead ratio of communication trained, I E = 20 default, I E = 20 trained, I E = 50 default, I E = prediction interval (I) Fig. 1 Communication Overhead compared to ECDSA Flooding-Resilient Broadcast Authentication for VANETs
37 Simulation Comp. Overhead ratio of sender comp. ratio of receiver comp RS(5,2), I E = 20 RS(3,2), I E = 20 RS(5,2), I E = 50 RS(3,2), I E = ratio of comm. ratio of update frequency Flooding-Resilient Broadcast Authentication for VANETs
38 Outline! Background and Motivation! Entropy-aware authentication! Flooding-resilient schemes " FastAuth: single-hop periodic messages " SelAuth: multi-hop messages! Conclusion Flooding-Resilient Broadcast Authentication for VANETs
39 SelAuth Overview! Promptly isolates malicious parties! Quickly adjusts P xy s.t. " P xy = Pr{y verifies signatures forwarded by x} " P xy goes to 0 for benign x and goes to 1 for malicious x A Y G B Send invalid sig S A Relay S A Relay S A Verify S A 1. Increase P GB 1. Increase P YG 2. Pushback [S A is bad] 1. Increase P AY 2. Pushback [S A is bad] 2. Pushback [S A is bad] Flooding-Resilient Broadcast Authentication for VANETs
40 Fast Isolation Propagation of invalid signatures (hops) NS-2 simulation time (sec) time (sec) time (sec) time (sec) time (sec) Flooding-Resilient Broadcast Authentication for VANETs One verification prob. for all neighbors One verification prob. for all neighbors + Pushback warning Per-neighbor verification prob. SelAuth Per-neighbor verification prob. + Pushback warning Verify every signature with p = 1 21
41 SelAuth: Low Overhead overall computation (# of verification) initial probability overall communication (KB) SelAuth Verify-All one-prob-for-all-neighbors initial probability Flooding-Resilient Broadcast Authentication for VANETs
42 Conclusion! Flooding-resilient broadcast signature " Required for timely verification of safety messages " Unachievable in current standard even in benign settings! Entropy-aware authentication to mitigate flooding " FastAuth: instant verification for on-hop messages " SelAuth: selective authentication for multi-hop messages Flooding-Resilient Broadcast Authentication for VANETs
43 Questions? 2012/04/05
44 Providing VANET Security Through Active Position Detection Click to edit Master subtitle style Gongjun Yan, Stephan Olariu, Michele C. Weigle Department of Computer Science, Old Dominion University
45 Introduction Assumption: Majority (~85%) of vehicles are honest and behave responsibly. Main contribution: Detect and isolate malicious cars using GPS and radar-provided data. Key Points: Achieve local security On-board radar Extend to global security Preset position based groups and dynamic challenges Measured results using simulations
46 Related work Cryptography based methods Significant overhead using PKI Using hard thresholds to detect false locations Not flexible because of uncertainties in VANETs Measure signal strength Could be forged, bounced off another car, etc..
47 VANET Applications Two categories of VANET applications: Non-Position Related Online payment services Online shopping Position Related Traffic condition reports Collision avoidance Emergency alert Cooperative driving Resource availability
48 Position Related Attacks Dropping packets Accidents Modifying existing or inserting bogus packets Traffic Jam Illusion Replaying packets Pretend to be at a fake position Well-known, dangerous attack: Sybil Attack Forge multiple identities to create illusions o Could trigger collision warning
49 Proposed Solution Seeing is Believing Hear : Report of GPS coordinates See : on-board radar Reduce fender-benders, advanced cruise control Limited by short range Compare the two: Corroborate real positions Isolate malicious vehicles Result: Achieve local security in a cell
50 Cells Preset position-based cell Within cell: Vehicles can directly communicate Verify position of specific vehicle in cell Outside of cell: Radar not strong enough Use radar in oncoming traffic to challenge and confirm
51 Acquired Data Each vehicle has three types of data: Local radar-detected data from itself Remote radar detected data from oncoming traffic Agreed-upon data from cell neighbors Achieve global security: Apply cosine similarity, using defined thresholds Construct history of vehicle movement o Help determine if newly received data is valid
52 Cell Positioning Creating the preset position-based cell: Compare GPS coords with pre-set maps Broadcast GPS coords to other cars Creates rough topology Cars in overlap act as routers, notify cell leaders
53 Cell Leaders Responsibilities: Verifies GPS position of all vehicles in cell Aggregates the data Broadcasts it intra-cell Other cars now know of all cars in their cell Sends it inter-cell Picking a Cell Leader Closest to Center Approaching current cell leader
54 Cell Routers Routers 2 per cell forward and backward Communicate aggregate data Picked by proximity to overlap region and traveling direction Leader and Routers are watched by cell members and neighbors Silence if all is good Send out protest packets otherwise Leader put into question table Majority vote determines if leader is malicious --> distrust table
55 Radar Detection Radar gives us: Relative velocity Angle Position Two events trigger radar detection: Reactive: Timeout threshold Proactive: Randomly during communication Both combine to give us Active Position Detection
56 Position Verification Active Position Verification Need Overlap of GPS and Radar with tolerance Accept/Reject
57 Global Security Attacks Global Security: An adversary can launch three types of attacks: Sybil attack Continually lying about position Occasionally lying about position To detect latter two: Message routing
58 Preventing Sybil Attacks Vehicle claims to be several vehicles at the same time or in succession. Very detrimental: o Example: 100s of vehicles worth of network overhead Even more dangerous: Sybil + position attack Possible when: Local vehicle has no direct physical knowledge of remote car In other words, only has abstract data. Solution proposed: Using weighted data: o When radar is working: highest weight o When radar isn t working: neighbor data has highest weight
59 Map History Purpose: Classify new data as real or fake Basic idea: Any vehicle without history is highly suspect Build database of history on local car Don t trust new cars with router or leader position Once it behaves for quite a while and falls within probably speeds and distances travelled, trust it
60 Isolating Malicious Cars Isolating malicious vehicles using tables: Trust, Question, Distrust Tables Procedure: 1. New vehicle broadcasts HELLO 2. Cell Leader responds with IDs: It s own, routers, cell members; 3. Members put new car in question table Builds history 4. If it behaves, members promote to trust table 5. if it misbehaves, it gets put into distrust table
61 Simulation and Testing Parameters: Two direction, 3km highway with two lanes in each direction Cell radius = Traffic arrival rate = Mean velocity = 100m 1600 cars/h 33.3 m/s Transmission radius = 100m 16 malicious cars, a single observer, varying number of other cars Procedure: Observer enters road Initiates request to find malicious vehicles Ends when it reaches 3 km traveled
62 Results of Simulation Metric: Time required to detect 16 adversaries Varying Total Car Number Varying Transmission Range
63 Future Work Future work: Effective Size of Map History Impersonating a long-standing honest vehicle that just let the highway Colluding groups of malicious vehicles
64 Questions? 2012/04/05
Providing VANET Security Through Active Position Detection
Providing VANET Security Through Active Position Detection Gongjun Yan, Stephan Olariu, Michele C. Weigle Department of Computer Science, Old Dominion University, Norfolk, VA 23529-0162, USA Abstract Vehicle
More informationMitigating the Effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks
Mitigating the Effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks Nizar Alsharif, Albert Wasef, and Xuemin (Sherman) Shen Department of Electrical and Computer Engineering, University
More informationDefenses against Wormhole Attack
Defenses against Wormhole Attack Presented by: Kadhim Hayawi, ID: 20364216 COURSE PRESENTATION FOR ECE750 - INTELLIGENT SENSORS AND SENSOR NETWORKS Prof. Otman A. Basir Outline Introduction Packet Leashes
More informationAnalysis of GPS and Zone Based Vehicular Routing on Urban City Roads
Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar
More informationLecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT
Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet
More informationIntroduction to VANET
VANET Introduction to VANET -Vehicles connected to each others through an ad hoc formation form a wireless network called Vehicular Ad Hoc Network. -Vehicular ad hoc networks (VANETs) are a subgroup of
More informationIntroduction to Vehicular Networks
CS 795/895 Vehicular Networks Introduction to Vehicular Networks Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/courses/cs795-s07/
More informationSybil Attack Detection and Prevention Using AODV in VANET
Sybil Attack Detection and Prevention Using in VANET Navneet 1, Rakesh Gill 2 1 M. Tech. Student, GITM, Bilaspur-Tauru Road, Gurgaon (Haryana) navneet_tehlan@yahoo.com 2 Asst. Prof., GITM, Bilaspur-Tauru
More informationEnhanced Management of Certificate Caching and Revocation Lists in VANET
Enhanced Management of Certificate Caching and Revocation Lists in VANET Sadiq H. Abdulhussain Computer Engineering Department College of Engineering University of Baghdad ABSTRACT Vehicular network security
More informationEfficient Authentication and Congestion Control for Vehicular Ad Hoc Network
Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network Deivanai.P 1, K.Sudha 2, K.Radha 3 Department of CSE, Muthayammal Engineering College, Rasipuram, India 1 Assistant Professor,
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions
More informationClustering Based Certificate Revocation Scheme for Malicious Nodes in MANET
International Journal of Scientific and Research Publications, Volume 3, Issue 5, May 2013 1 Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET Ms.T.R.Panke * M.B.E.S.College of
More informationAnalyzing Routing Protocols Performance in VANET Using p and g
Analyzing Routing Protocols Performance in VANET Using 802.11p and 802.11g Rasha Kaiss Aswed and Mohammed Ahmed Abdala Network Engineering Department, College of Information Engineering, Al-Nahrain University
More informationICMP and Monitoring to Detect and Isolate Sybil Attack in VANET
ICMP and Monitoring to Detect and Isolate Sybil Attack in VANET Jaydeep P. Kateshiya 1, Anup Parkash Singh 2 P.G. Student, Department of Computer Engineering, Lovely Professional University, Punjab, India
More informationShort-term Linkable Group Signatures with Categorized Batch Verification
Short-term Linkable Group Signatures with Categorized Batch Verification Lukas Malina 1, Jordi Castella-Rocà 2, Arnau Vives-Guasch 2, Jan Hajny 1 1 Department of Telecommunications Faculty of Electrical
More informationA Review on Vehicular Ad-Hoc Network
A Review on Vehicular Ad-Hoc Network Arshdeep Kaur 1, Shilpa Sharma 2 M.Tech Student, Dept. of Computer Science Engineering, Lovely Professional University, Phagwara, Punjab, India 1 Assistant Professor,
More informationEMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
IEEE TRANSACTIONS ON MOBILE COMPUTING VOL.12 NO.1 YEAR 2013 EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks 1 Albert Wasef and Xuemin (Sherman) Shen, IEEE Fellow Department
More informationTACKing Together Efficient Authentication, Revocation, and Privacy in VANETs
TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs Ahren Studer, Elaine Shi, Fan Bai, Adrian Perrig March 14, 2008 CMU-CyLab-08-011 CyLab Carnegie Mellon University Pittsburgh,
More informationWireless Network Security Spring 2016
Wireless Network Security Spring 2016 Patrick Tague Class #12 Routing Security; Forwarding Security 2016 Patrick Tague 1 SoW Presentation SoW Thursday in class I'll post a template Each team gets ~5 minutes
More informationPacket Estimation with CBDS Approach to secure MANET
Packet Estimation with CBDS Approach to secure MANET Mr. Virendra P. Patil 1 and Mr. Rajendra V. Patil 2 1 PG Student, SSVPS COE, Dhule, Maharashtra, India 2 Assistance Professor, SSVPS COE, Dhule, Maharashtra,
More informationOverview of Challenges in VANET
Overview of Challenges in VANET Er.Gurpreet Singh Department of Computer Science, Baba Farid College, Bathinda(Punjab), India ABSTRACT VANET are becoming active area of research and development because
More informationSecure Routing and Transmission Protocols for Ad Hoc Networks
MobiHoc 2002 Working Session on Security in Ad Hoc Networks Secure Routing and Transmission Protocols for Ad Hoc Networks Zygmunt J. Haas and P. Papadimitratos (Panos) Cornell University Wireless Networks
More informationWireless Network Security Spring 2013
Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #19 Location Privacy & Tracking Agenda Location privacy and tracking Implications / risks of location information Location privacy and anonymity
More informationMobile Security Fall 2011
Mobile Security 14-829 Fall 2011 Patrick Tague Class #17 Location Security and Privacy HW #3 is due today Announcements Exam is in-class on Nov 9 Agenda Location security Location privacy Location, Location,
More informationWireless Network Security Spring 2013
Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #11 Control-Plane Routing Misbehavior Agenda Control-Plane Routing Misbehavior MANET Routing Misbehavior at the control-plane Toward secure
More informationLecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday
Lecture 13: Routing in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Routing in multihop networks Figure out a path from source to destination. Basic techniques of routing
More informationVorlesung Kommunikationsnetze Research Topics: QoS in VANETs
Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen
More informationAanchal Walia #1, Pushparaj Pal *2
An Implemented approach of VANET using Location Information based Technique for safe city and vehicle Aanchal Walia #1, Pushparaj Pal *2 #1. M.Tech Scholor,ECE,Krukshetra University, *2. A.P.ECE Department,
More informationWireless Network Security Spring 2014
Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #16 Network Privacy & Anonymity 2014 Patrick Tague 1 Network Privacy Issues Network layer interactions in wireless networks often expose
More informationLocation Awareness in Ad Hoc Wireless Mobile Neworks
Location Awareness in Ad Hoc Wireless Mobile Neworks Lijuan Ai Wenyu Wang Yi Zhou 11/14/2001 Mobile Computing, Fall 2001 1 PART I INTRODUCTION TO MANET & LOCATION-AWARE COMPONENTS 11/14/2001 Mobile Computing,
More informationDynamic Time-stable Geocast Routing in Vehicular Ad Hoc Networks
Dynamic Time-stable Geocast Routing in Vehicular Ad Hoc Networks by Hamidreza Rahbar A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of
More informationSTRAW - An integrated mobility & traffic model for vehicular ad-hoc networks
STRAW - An integrated mobility & traffic model for vehicular ad-hoc networks David R. Choffnes & Fabián E. Bustamante Department of Computer Science, Northwestern University www.aqualab.cs.northwestern.edu
More informationProtection Against DDOS Using Secure Code Propagation In The VANETs
Protection Against DDOS Using Secure Code Propagation In The VANETs Mandeep Kaur, Manish Mahajan Mandeepcheema6@gmail.com,cgccoe.hodcse@gmail.com ABSTRACT--VANETs are the vehicular networks used to connect
More informationAn Efficient Data Transmission in VANET Using Clustering Method
INTL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2017, VOL. 63, NO. 3, PP. 309-313 Manuscript received April 29, 2016; revised July, 2017. DOI: 10.1515/eletel-2017-0045 An Efficient Data Transmission
More informationInternational Journal of Information Movement. Website: ISSN: (online) Pages
REVIEW: VANET ARCHITECTURES AND DESIGN Chetna Research Scholar Department Of Electronic & Communication Engg. Galaxy Global Group of Institutions, Dinarpur Saranjeet Singh Faculty Department of Electronic
More informationSecurity in Mobile Ad-hoc Networks. Wormhole Attacks
Security in Mobile Ad-hoc Networks Wormhole Attacks What are MANETs Mobile Ad-hoc Network (MANET) is a collection of wireless mobile hosts without fixed network infrastructure and centralized administration.
More informationInternational Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET
Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 11, November -2017 Improved OLSR Protocol for VANET Ravi Shrimali
More informationEXPEDITE MESSAGE AUTHENTICATION PROTOCOL FOR VANETs USING DATA AGGREGATION
EXPEDITE MESSAGE AUTHENTICATION PROTOCOL FOR VANETs USING DATA AGGREGATION Shaiba Wahab Dept. Of Computer Science and Engineering M.E.A. Engineering College Perinthalmanna, Kerala Jemsheer Ahmed P Dept.
More informationContent. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.
Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management
More informationLTE and IEEE802.p for vehicular networking: a performance evaluation
LTE and IEEE802.p for vehicular networking: a performance evaluation Zeeshan Hameed Mir* Fethi Filali EURASIP Journal on Wireless Communications and Networking 1 Presenter Renato Iida v2 Outline Introduction
More informationBroadcast algorithms for Active Safety Applications over Vehicular Ad-hoc Networks
Broadcast algorithms for Active Safety Applications over Vehicular Ad-hoc Networks M.N. Mariyasagayam, M. Lenardi HITACHI Europe, "Le Thélème", 1503 Route des Dolines, 06560 Sophia Antipolis, France Phone:
More informationAnalysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs
Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs by Charikleia Zouridaki Charikleia Zouridaki 1, Marek Hejmo 1, Brian L. Mark 1, Roshan K. Thomas 2, and Kris Gaj 1 1 ECE
More informationMAC Protocols for VANETs
MAC Protocols for VANETs Alexandru Oprea Department of Computer Science University of Freiburg Click to edit Master subtitle style Ad Hoc Networks Seminar Based on: Hamid Menouar and Fethi Filali, EURECOM
More informationSybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks
Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks D.Balamahalakshmi Department of Computer Science and Engineering, V.S.B Engineering College, Karur, Tamilnadu, India 1
More informationSleep/Wake Aware Local Monitoring (SLAM)
Sleep/Wake Aware Local Monitoring (SLAM) Issa Khalil, Saurabh Bagchi, Ness Shroff Dependable Computing Systems Lab (DCSL) & Center for Wireless Systems and Applications (CWSA) School of Electrical and
More informationANALYSIS OF SAFETY MEASURES AND QUALITY ROUTING IN VANETS
Vol.2, Issue.2, Mar-Apr 2012 pp-062-066 ISSN: 2249-6645 ANALYSIS OF SAFETY MEASURES AND QUALITY ROUTING IN VANETS Vedha Vinodha.D*, Mrs.V.Seethalakshmi** *II M.E CS, Sri Shakthi Institute of Engineering
More informationSURVEY OF VEHICLE AD-HOC NETWORK
SURVEY OF VEHICLE AD-HOC NETWORK DEESHA G. DEOTALE 1 & UMA NAGARAJ 2 1,2 Department of Computer Engineering M.A.E Alandi (D) Pune India E-mail : disha.deotale21@gmail.com & umanagaraj67.@gmail.com Abstract
More informationAd Hoc Networks: Issues and Routing
Ad Hoc Networks: Issues and Routing Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/
More informationMobile Ad-hoc Networks
Mobile Ad-hoc Networks Fred Baker 1 The manet problem Mobile Random and perhaps constantly changing Ad-hoc Not engineered Networks Elastic data applications which use networks to communicate 2 Examples
More informationSRPS: Secure Routing Protocol for Static Sensor Networks
SRPS: Secure Routing Protocol for Static Sensor Networks Hamoinba Vebarin and Samourqi Difrawi International Awarness Institute Email: {hvebarin, sdifrawi}@iwi.org.jp Abstract In sensor networks, nodes
More informationSecure Routing in Wireless Sensor Networks: Attacks and Countermeasures
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures By Chris Karlof and David Wagner Lukas Wirne Anton Widera 23.11.2017 Table of content 1. Background 2. Sensor Networks vs. Ad-hoc
More informationPerformance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s
Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations
More information15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks
15-441: Computer Networking Lecture 24: Ad-Hoc Wireless Networks Scenarios and Roadmap Point to point wireless networks (last lecture) Example: your laptop to CMU wireless Challenges: Poor and variable
More informationKun Sun, Peng Ning Cliff Wang An Liu, Yuzheng Zhou
Kun Sun, Peng Ning Cliff Wang An Liu, Yuzheng Zhou Abstract Accurate and synchronized time is crucial in many sensor network applications Time synchronization becomes an attractive target due to its importance
More informationCHAPTER I INTRODUCTION TO VANETS
CHAPTER I INTRODUCTION TO VANETS 1.1 PERVASIVE NETWORK Pervasive Networking is perceived as the ability to communicate and access the same types of services-anytime, anywhere. This is regardless of the
More informationMC-Safe: Multi-Channel Real-time V2V Communication for Enhancing Driving Safety
RTSS 2018 MC-Safe: Multi-Channel Real-time V2V Communication for Enhancing Driving Safety Yunhao Bai, Kuangyu Zheng, Zejiang Wang, Xiaorui Wang, Junmin Wang Dept. of Electrical and Computer Engineering
More informationKapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types
Kapitel 5: Mobile Ad Hoc Networks Mobilkommunikation 2 WS 08/09 Wireless Communication Wireless communication networks types Infrastructure-based networks Infrastructureless networks Ad hoc networks Prof.
More informationSEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS
SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS S. P. Manikandan 1, R. Manimegalai 2 and S. Kalimuthu 3 1 Department of Computer Science and Engineering, Sri Venkateshwara
More informationA SECURE ALERT MESSAGING FOR VEHICULAR AD HOC NETWORKS
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) ISSN 0976 6367(Print) ISSN 0976
More informationAnalysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group
More informationThe Challenges of Robust Inter-Vehicle Communications
The Challenges of Robust Inter-Vehicle Communications IEEE VTC2005-Fall Marc Torrent-Moreno, Moritz Killat and Hannes Hartenstein DSN Research Group Institute of Telematics University of Karlsruhe Marc
More informationDefense Against Packet Injection in Ad Hoc Networks
Defense Against Packet Injection in Ad Hoc Networks Qijun Gu 1 Peng Liu 2 Chao-Hsien Chu 2 Sencun Zhu 3 1 Department of Computer Science Texas State University, San Marcos, TX 78666 2 School of Information
More informationCHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS
130 CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS 5.1 INTRODUCTION The feasibility of direct and wireless multi-hop V2V communication based on WLAN technologies, and the importance of position based
More informationRouting Protocols in MANETs
Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an
More informationDTN Interworking for Future Internet Presented by Chang, Dukhyun
DTN Interworking for Future Internet 2008.02.20 Presented by Chang, Dukhyun Contents 1 2 3 4 Introduction Project Progress Future DTN Architecture Summary 2/29 DTN Introduction Delay and Disruption Tolerant
More informationPRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS
PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS 1 PRASHANTH JAYAKUMAR, 2 P.S.KHANAGOUDAR, 3 VINAY KAVERI 1,3 Department of CSE, GIT, Belgaum, 2 Assistant Professor, Dept.
More informationPoonam kori et al. / International Journal on Computer Science and Engineering (IJCSE)
An Effect of Route Caching Scheme in DSR for Vehicular Adhoc Networks Poonam kori, Dr. Sanjeev Sharma School Of Information Technology, RGPV BHOPAL, INDIA E-mail: Poonam.kori@gmail.com Abstract - Routing
More informationMANET ROUTING ATTACKS
MANET ROUTING ATTACKS Black Hole Attack Detection And Prevention Strategy In DYMO For MANET DYMO is advance version of AODV routing protocol develop to improve the network performance. Here, a mitigation
More informationFlexible, Extensible, and Efficient VANET Authentication
Flexible, Extensible, and Efficient VANET Authentication Ahren Studer, Fan Bai, Bhargav Bellur & Adrian Perrig Carnegie Mellon University General Motors {astuder, perrig}@cmu.edu {fan.bai, bhargav.bellur}@gm.com
More informationGetting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg
Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing
More informationA Review on Security in Vehicular Ad-hoc Networks
A Review on Security in Vehicular Ad-hoc Networks Ramandeep Kaur 1, Er. Rupinderpal Singh 2 1M.Tech Scholar Computer Science & Engineering Department 2Asst. Prof. in Computer Science & Engineering Department
More informationWireless Network Security Spring 2015
Wireless Network Security Spring 2015 Patrick Tague Class #12 Forwarding Security 2015 Patrick Tague 1 SoW Presentation SoW Thursday in class I'll post a template Each team gets ~5-8 minutes Written SoW
More informationA Review on Black Hole Attack in MANET
A Review on Black Hole Attack in MANET Gourav Ahuja 1, Mrs. Sugandha 2 1 Department of Computer Science and Engineering, VCE, Rohtak, Haryana (India) 2 Asst. Prof., Department of Computer Science and Engineering,
More informationOnroad Vehicular Broadcast
Onroad Vehicular Broadcast Jesus Arango, Alon Efrat Computer Science Department University of Arizona Srinivasan Ramasubramanian, Marwan Krunz Electrical and Computer Engineering University of Arizona
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationD.David Neels Ponkumar 1, Janeshwari.S 2, Gomathi Sankari.A 3
Fast and Secure Countermand Verification Process Using MAP in VANET D.David Neels Ponkumar 1, Janeshwari.S 2, Gomathi Sankari.A 3 1 Profeesor, Einstein College of Engineering, david26571@gmail.com 2 PG
More informationAn Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks
An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks December 1. 2006 Jong Oh Choi Department of Computer Science Yonsei University jochoi@emerald.yonsei.ac.kr Contents Motivation
More informationWIRELESS sensor networks have received a lot of attention
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 2, FEBRUARY 2006 395 Secure and Resilient Clock Synchronization in Wireless Sensor Networks Kun Sun, Peng Ning, Member, IEEE, and Cliff Wang,
More informationWireless Network Security Spring 2015
Wireless Network Security Spring 2015 Patrick Tague Class #10 Network Layer Threats; Identity Mgmt. 2015 Patrick Tague 1 Class #10 Summary of wireless network layer threats Specific threats related to
More informationA Review on Mobile Ad Hoc Network Attacks with Trust Mechanism
A Review on Mobile Ad Hoc Network Attacks with Trust Mechanism categorized into two classes: active attacks and passive attacks. Rinki Bhati 1, Dr. Deepti Sharma 2 M-Tech Student, Department of CSE, Advance
More informationFast and Secure Multi-hop Broadcast Solutions for Inter-Vehicular Communication
Fast and Secure Multi-hop Broadcast Solutions for Inter-Vehicular Communication Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio E. Palazzi Univ. Bordeaux, LaBRI, CNRS, France, Email: wafa.benjaballah@labri.fr,
More informationBlackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine
International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack
More informationProxy Signature-based RSU Message Broadcasting in VANETs
Proxy Signature-based RSU Message Broadcasting in VANETs Subir Biswas Dept. of Computer Science University of Manitoba Winnipeg MB, Canada R3T 2N2 Email: bigstan@cs.umanitoba.ca Jelena Mišić Dept. of Computer
More informationA Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks
A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,
More informationEfficient and Secure Source Authentication for Multicast
Efficient and Secure Source Authentication for Multicast Authors: Adrian Perrig, Ran Canetti Dawn Song J. D. Tygar Presenter: Nikhil Negandhi CSC774 Network Security Outline: Background Problem Related
More informationAchieving Privacy in Mesh Networks
Achieving Privacy in Mesh Networks Xiaoxin Wu Intel China Research Center Ltd Beijing, China xiaoxin.wu@intel.com Ninghui Li Department of Computer Science Purdue University West Lafayette, IN 47907-2086,
More informationEfficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks
Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,
More informationVehicular Ad Hoc Networking - Overview
- Overview CSI5140 Arnaud Casteigts http://www.site.uottawa.ca/ casteig/ October 21, 2008 Outline Quick Overview New possibilities VANETs Technological context Architecture Standards Introduction Broadcasting
More informationUnicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks
Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on
More informationUCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.
Mobile Ad Hoc Networks: Routing TOPIC 8 UCS-805 MOBILE COMPUTING Jan-May,2011 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com Mobile Ad Hoc Networks (MANET) Introduction
More informationEffective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report
Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Mandadapu Sravya M.Tech, Department of CSE, G. Narayanamma Institute of Technology and Science. Ch.Mandakini
More informationSecurity for Structured Peer-to-peer Overlay Networks. Acknowledgement. Outline. By Miguel Castro et al. OSDI 02 Presented by Shiping Chen in IT818
Security for Structured Peer-to-peer Overlay Networks By Miguel Castro et al. OSDI 02 Presented by Shiping Chen in IT818 1 Acknowledgement Some of the following slides are borrowed from talks by Yun Mao
More informationWSN Routing Protocols
WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before
More informationEfficient Working of Vehicular Ad-Hoc Network with Carry Forward Technique
Efficient Working of Vehicular Ad-Hoc Network with Carry Forward Technique Govind Sood 1, Dr. Tanu Preet Singh 2 ergovind.sood333@gmail.com, tanupreet.singh@gmail.com Abstract Vehicular Ad-Hoc network
More informationVarious Issues in Vehicular Ad hoc Networks : A Survey
International Journal of Computer Science & Communication Vol. 1, No. 2, July-December 2010, pp. 399-403 Various Issues in Vehicular Ad hoc Networks : A Survey Shinde S. S. 1 & Patil S. P 2 1,2 Annasaheb
More informationSECURE ROUTING PROTOCOLS IN AD HOC NETWORKS
SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS INTRODUCTION 1. With the advancement in radio technologies like Bluetooth, IEEE 802.11or Hiperlan, a new concept of networking has emerged, known as ad hoc networks,
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More informationLiterature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks
International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review
More informationMobile-Gateway Routing for Vehicular Networks 1
Mobile-Gateway Routing for Vehicular Networks 1 Hsin-Ya Pan, Rong-Hong Jan 2, Andy An-Kai Jeng, and Chien Chen Department of Computer Science National Chiao Tung University Hsinchu, 30010, Taiwan {hypan,
More informationWireless Network Security Spring 2016
Wireless Network Security Spring 2016 Patrick Tague Class #11 - Identity Mgmt.; Routing Security 2016 Patrick Tague 1 Class #11 Identity threats and countermeasures Basics of routing in ad hoc networks
More information