• Title/Summary/Keyword: vehicular Networks

Search Result 222, Processing Time 0.036 seconds

Performance Evaluation of Transmitting Brainwave Signals for Driver's Safety in Urban Area Vehicular Ad-Hoc Network (운전자의 안전을 위한 도심지역 자동차 애드혹 통신망의 뇌파전송 성능평가)

  • Jo, Jun-Mo
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.6
    • /
    • pp.26-32
    • /
    • 2011
  • Recently, in the U-health area, there are research related on monitoring brainwaves in real-time for coping with emergent situations like the fatigue driving, cerebral infarction or the heart attack of not only the patients but also the normal elderly folks by transmitting of the EEG(Electroencephalograph). This system could be applied to hospitals or sanatoriums. In this paper, it is applied for the vehicular ad-hoc network to prevent the car accident in advance by monitoring the brainwaves of a driver in real-time. In order to do this, I used mobile ad-hoc nodes supported in the Opnet simulator for the efficient EEG brainwave transmission in the VANET environment. The vehicular ad-hoc networks transmitting the brainwaves to the nearest road-side unit are designed and simulated to draw an efficient and proper vehicular ad-hoc network environment.

Analysis of VANET Authentication Protocol using Casper in the Formal Verification (정형검증 도구인 Casper를 이용한 VANET 인증 프로토콜 분석)

  • Lee, Su-Youn;Ahn, Hyo-Beom
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.27-33
    • /
    • 2012
  • VANET(Vehicular Ad-hoc Network) is a kind of ad hoc networks consist of intelligence vehicular ad nodes, and has become a hot emerging research project in many fields. It provide traffic safety, cooperative driving and etc. but has also some security problems that can be occurred in general ad hoc networks. Also, in VANET, vehiculars sho uld be able to authenticate each other to securely communicate with network-based infrastructure, and their location s and identifiers should not be exposed from the communication messages. This paper explains V2I authentication pr otocol using a hash function that preserves the user privacy. In addition, we analyze the security stability of the V2I authentication protocol using Casper in the formal verification technique. As a result, V2I authentication protocol us ing hash function prove a stability.

Robust Conditional Privacy-Preserving Authentication based on Pseudonym Root with Cuckoo Filter in Vehicular Ad Hoc Networks

  • Alazzawi, Murtadha A.;Lu, Hongwei;Yassin, Ali A.;Chen, Kai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.6121-6144
    • /
    • 2019
  • Numerous privacy-preserving authentication schemes have been proposed but vehicular ad hoc networks (VANETs) still suffer from security and privacy issues as well as computation and communication overheads. In this paper, we proposed a robust conditional privacy-preserving authentication scheme based on pseudonym root with cuckoo filter to meet security and privacy requirements and reduce computation and communication overheads. In our proposed scheme, we used a new idea to generate pseudonyms for vehicles where each on-board unit (OBU) saves one pseudonym, named as "pseudonym root," and generates all pseudonyms from the same pseudonym. Therefore, OBU does not need to enlarge its storage. In addition, the scheme does not use bilinear pairing operation that causes computation overhead and has no certification revocation list that leads to computation and communication overheads. The proposed scheme has lightweight mutual authentication among all parties and just for once. Moreover, it provides strong anonymity to preserve privacy and resists ordinary attacks. We analyzed our proposed scheme and showed that it meets security and privacy requirements of VANETs and is more efficient than traditional schemes. The communication and computation overheads were also discussed to show the cost-effectiveness of the proposed scheme.

Efficient Interference Control Technology for Vehicular Moving Networks

  • Oh, Sung-Min;Lee, Changhee;Lee, Jeong-Hwan;Park, Ae-Soon;Shin, Jae Sheung
    • ETRI Journal
    • /
    • v.37 no.5
    • /
    • pp.867-876
    • /
    • 2015
  • This paper proposes an efficient interference control scheme for vehicular moving networks. The features of the proposed scheme are as follows: radio resources are separated into two resource groups to avoid interference between the cellular and vehicle-to-vehicle (V2V) links; V2V links are able to share the same radio resources for an improvement in the resource efficiency; and vehicles can adaptively adjust their transmission power according to the interference among the V2V links (based on the distributed power control (DPC) scheme derived using the network utility maximization method). The DPC scheme, which is the main feature of the proposed scheme, can improve both the reliability and data rate of a V2V link. Simulation results show that the DPC scheme improves the average signal-to-interference-plus-noise ratio of V2V links by more than 4 dB, and the sum data rate of the V2V links by 15% and 137% compared with conventional schemes.

An Efficient Group Key Management Scheme using Counting Bloom Filter in VANET (VANET에서 카운팅 블룸 필터를 사용한 효율적인 그룹 키 관리 기법)

  • Lee, SuYoun;Ahn, HyoBeom
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.47-52
    • /
    • 2013
  • VANET(Vehicular Ad-hoc Network) is a kind of ad hoc networks which is consist of intelligence vehicular ad nodes, and has become a hot emerging research project in many fields. It provides traffic safety, cooperative driving and etc. but has also some security problems that can be occurred in general ad hoc networks. In VANET, it has been studies that group signature method for user privacy. However, among a group of group key generation phase and group key update phase, RSU(Road-Side Unit) and the computational overhead of the vehicle occur. In this paper, we propose an efficient group key management techniques with CBF(Counting Bloom Filter). Our group key management method is reduced to the computational overhead of RSU and vehicles at the group key generation and renewal stage. In addition, our method is a technique to update group key itself.

An Anomaly Detection Method for the Security of VANETs (VANETs의 보안을 위한 비정상 행위 탐지 방법)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.77-83
    • /
    • 2010
  • Vehicular Ad Hoc Networks are self-organizing Peer-to-Peer networks that typically have highly mobile vehicle nodes, moving at high speeds, very short-lasting and unstable communication links. VANETs are formed without fixed infrastructure, central administration, and dedicated routing equipment, and network nodes are mobile, joining and leaving the network over time. So, VANET-security is very vulnerable for the intrusion of malicious and misbehaving nodes in the network, since VANETs are mostly open networks, allowing everyone connect, without centralized control. In this paper, we propose a rough set based anomaly detection method that efficiently identify malicious behavior of vehicle node activities in these VANETs, and the performance of a proposed scheme is evaluated by a simulation in terms of anomaly detection rate and false alarm rate for the threshold ${\epsilon}$.

A Resource Allocation Strategy for Cloud Computing in Vehicular Datacenter (차량 데이터센터에서 클라우드 컴퓨팅을 위한 자원 선택 기법)

  • Kim, Seoyeon;Jung, Jinman;Kim, Taesik;Min, Hong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.4
    • /
    • pp.183-189
    • /
    • 2018
  • With the recent advancement of vehicle wireless communication technology, many vehicular clouds have been proposed. The existing research focused on cloud services through data collection based on vehicular networks of mobile V2V (Vehicle-to-Vehicle) and V2I (Vehicle-to-Infrastructure). In this paper, we present a vehicular datacenter model that utilizes the vehicle in the parking space as a resource for the datacenter. Also, we derive resource allocation strategy based on the expected execution time considering the leave rate of each vehicle in our vehicular datacenter model. Simulation results show that our proposed resource allocation strategies outperform the existing strategy in terms of mean execution time.

Revocation Protocol for Group Signatures in VANETs: A Secure Construction

  • Shari, Nur Fadhilah Mohd;Malip, Amizah;Othman, Wan Ainun Mior
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.299-322
    • /
    • 2020
  • Vehicular ad hoc networks (VANETs) enable wireless communication between vehicles and roadside infrastructure to provide a safer and more efficient driving environment. However, due to VANETs wireless nature, vehicles are exposed to several security attacks when they join the network. In order to protect VANETs against misbehaviours, one of the vital security requirements is to revoke the misbehaved vehicles from the network. Some existing revocation protocols have been proposed to enhance security in VANETs. However, most of the protocols do not efficiently address revocation issues associated with group signature-based schemes. In this paper, we address the problem by constructing a revocation protocol particularly for group signatures in VANETs. We show that this protocol can be securely and efficiently solve the issue of revocation in group signature schemes. The theoretical analysis and simulation results demonstrate our work is secure against adversaries and achieves performance efficiency and scalability.

CMS: Application Layer Cooperative Congestion Control for Safety Messages in Vehicular Networks

  • Lee, Kyu-haeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.3
    • /
    • pp.1152-1167
    • /
    • 2018
  • In this paper, I propose an application layer cooperative congestion control scheme for safety message broadcast in vehicular networks, called CMS, that adaptively controls a vehicle's safety message rate and transmit timing based on the channel congestion state. Motivated by the fact that all vehicles should transmit and receive an application layer safety message in a periodic manner, I directly exploit the message itself as a means of estimating the channel congestion state. In particular, vehicles can determine wider network conditions by appending their local channel estimation result onto safety message transmissions and sharing them with each other. In result CMS realizes cooperative congestion control without any modification of the existing MAC protocol. I present extensive NS-3 simulation results which show that CMS outperforms conventional congestion control schemes in terms of the packet collision rate and throughput, especially in a high-density traffic environment.

Design of Generalized Distributed Architecture for Applications Development in VANETs (VANETs에서의 어플리케이션 개발을 위한 분산 구조 설계)

  • Kanize, Thamina;Lee, Mee-Jeong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06d
    • /
    • pp.190-195
    • /
    • 2010
  • Vehicular ad hoc networks (VANETs) have a number of interesting applications to preserve road safety, notify users about changed road/traffic condition, handling post accident hazards and moreover service oriented applications to make the travel convenient to the drivers. Use of common information format for diverse applications enables the application developers to easily design flexible information dissemination system for new applications or add new features to existing application. This paper introduces a common information format for various applications in VANETs. The main goal of the paper is to design generalized distributed architectures for vehicular networks, which considers diverse application development scenarios and uses common information format. The proposed architectures enable the application developers to flexibly disseminate information to affected or interested user. In this paper, we have given a detail description of each component of the architectures and how they communicate with each other. In future, we will implement the proposed architecture using suitable simulator.

  • PDF