Integrated Intelligent Research (IIR)
International Journal of Data Mining Techniques and Applications Volume: 07, Issue: 01, June 2018, Page No.177-180 SSN: 2278-2419
Widespread Review of Vehicular Ad Hoc Network R.Monisha1, T.Prabu2 Research Scholar1, Assistant Professor2 Department of Computer Application, Dr.M.G.R Educational and Research Institute, Chennai Abstract - In this paper, main objective is collecting the information from road side traffic and share the collected information. The Identity based Batch verification (IBV) scheme is one such scheme, which makes VANET more secure and efficient maintaining privacy through anonymity and reduction of verification time of messages by verifying the min batch, are the ideas of this scheme. This paper highlights the security issues of the current IBV scheme and introduces the concept of the random change of anonymous identity with time as well as location, to prevent the security attack and to maintain the privacy. In this scheme, performances are evaluated in terms of delay and transmission overhead. Keywords : Identity based Batch verification, VANET, Security I. INTRODUCTION A Vehicular Ad Hoc Network (VANET) is a sub class of mobile ad hoc networks. VANET is a technology that uses moving cars as nodes in a network to create a mobile network. The wireless devices collect the traffic related information and send them to other devices at a low cost. Each vehicle is mounted with a wireless communication device, known as on board unit (OBU). Each OBU communicates with the road side unit (RSU) and other OBUs. These communications are said to be ‘vehicle to vehicle’ communication or ‘vehicle to infrastructure’ communication. DSRC is a communication service that uses the 5.850-5.925 GHz band for the use of public safety and private applications. This allocated frequency and other newly developed technologies allow the vehicles and roadside devices to form Vehicular Ad Hoc network to communicate wirelessly with each other and central access point. In these networks, vehicles can exchange messages with each other in Vehicle-to-Vehicle communication (V2V) and also with a roadside base station Vehicle-to-Roadside Communication (V2R). An Intelligent System allows safe and free flow traffic. It uses GPS and DGPS equipped devices. It uses various technologies such as wireless communications, computational technology, sensing technology, Bluetooth. The main aim of this paper is gathering information from the road side traffic and share that collected information to the other wanted vehicle and maintain the privacy using IBV scheme in VANET communication. A. Basic Component of VANET Communication:- Wireless Access in Vehicular Environment On-Board Unit (OBU):- A device which is inside the vehicle which processes the data collected from various sensors fitted inside the cars and gives conditions of the vehicles is responsible for communication with outside network i.e with other vehicles and infrastructure. Road Side Unit (RSU):- Infrastructure for communication between the cars for sharing and information from various vehicles. B. Applications of VANET There are various ways in which VANET can be used such as vehicle collision warning, security distance warning, driver assistance, cooperative driving, cooperative cruise control, Internet access, map location, automatic parking, congestion detection, road conditions warning, stoplight assistant, emergency vehicle warning, deceleration warning, toll collection, border clearance, drive-through payment, merge assistance , public safety applications, traveller information support applications, comfort applications, air pollution emission measurement and reduction, law enforcement, broadband services and many more.
177
Integrated Intelligent Research (IIR)
International Journal of Data Mining Techniques and Applications Volume: 07, Issue: 01, June 2018, Page No.177-180 SSN: 2278-2419
C. Objective The main aim of this project is gathering information from the road side traffic and share that collected information to the other wanted vehicle and maintain the privacy using IBV scheme in VANET communication. D. Problem This scheme is vulnerable to trace ability attack and also lacks of efficient memory management and privacy issue for V2V and V2I communications. Signature verification induces extra delay and computational cost. The traditional way that verifying messages signature individually could induce tremendous delay. It will affect severely the Quality of Service, especially when network traffic is heavy and a large number of signatures need to be verified. II. PROPOSED SYSTEM An efficient broadcast authentication scheme called prediction-based authentication.it resist packet losses caused by high mobility of vehicles. PBA is an efficient and lightweight scheme it is primarily built on symmetric cryptography. To reduce the verification delay for some emergency applications PBA is designed to exploit the sender vehicles ability to predict future beacons in advance. To prevent memory-based attacks PBA only stores shortened rekeyed message authentication of signatures without decreasing the security. The analyse the security of our scheme and simulate PBA under varying vehicular network scenarios. A. Localizability-aided localization (LAL) Localizability-aided localization, which basically consists of three phases: node localizability testing, structure analysis, and network adjustment. Node Localizability Testing: By deriving the necessary and sufficient conditions for node localizability, for the first time, it is possible to analyse how many nodes one can expect to locate in sparsely or moderately connected networks. Structure Analysis: Networks have also been studied extensively in the social sciences. Typical network studies in sociology involve the circulation of questionnaires, asking respondents to detail their interactions with others. One can then use the responses to reconstruct a network in which vertices represent individuals and edges the interactions between them. Network Adjustment: As the proliferation of wireless and mobile devices continues, a wide range of contextaware applications are deployed, including smart space, modern logistics and so on. In these applications, location information is the basis of other services, such as geographic routing, boundary detection, and network coverage control. In some Other applications, such as military surveillance and environment monitoring, sensed data without location information are almost useless. Localization in wireless ad hoc and sensor networks Is the problem in which every node determines its own location. B. Greedy Perimeter Stateless Routing Protocol (GPSR) Greedy Perimeter Stateless Routing (GPSR), a novel routing protocol for wireless datagram networks that uses the positions of routers and a packet’s destination to make packet forwarding decisions. GPSR makes greedy forwarding decisions using only information about a router’s immediate neighbours in the network topology. When a packet reaches a region where greedy forwarding is impossible, the algorithm recovers by routing around the perimeter of the region. By keeping state only about the local topology, GPSR scales better in per-router state than shortest-path and ad-hoc routing protocols as the number of network destinations increases. C. System Architecture Diagram It consists of Trusted Authority, Road side Unit, and On Board Unit. The communication of vehicles with other vehicles and with infrastructures, achieved through wireless channel. TA considered as Trusted Unit which generate cryptographic domain parameters for RSU and vehicles in its region. And deliver the key to them over secure channel. Each vehicle is mounted with tamper proof devices. This is responsible for generating private key. RSU works between vehicle-to-vehicle and vehicle-to-infrastructure communication.
178
Integrated Intelligent Research (IIR)
International Journal of Data Mining Techniques and Applications Volume: 07, Issue: 01, June 2018, Page No.177-180 SSN: 2278-2419
Figure 1: System Architecture Diagram III.
RESULTS
This Table shows Packet Loss Ratio for WIFI and LAL. The value of time and losses data show in figures Table 1 : Packet Loss Ratio WIFI TIMES_ms PACKET LOSSES 12.036916 1672 15.759866 2337 24.224961 3587 35.854918 5526 58.499041 8995
TIMES_ms 12.137065 15.657863 24.082078 35.971846 59.082861
LAL PACKET LOSSES 90 44 174 44 44
Figure 2 : Result of Packet Loss Ratio IV.
CONCLUSION
The propose an effective, efficient and scalable broadcast authentication scheme to provide both computationbased DoS attacks resilient and packet losses resilient in VANETs. Moreover, PBA has the advantage of fast verification by leveraging the predictability of beacons for single-hop relevant applications. To defend against memory- based DoS attacks, PBA only keeps shortened MACs of signatures to reduce the storage overhead the signaling overhead of a VANET is significantly reduced along with improved communication quality. The
179
Integrated Intelligent Research (IIR)
International Journal of Data Mining Techniques and Applications Volume: 07, Issue: 01, June 2018, Page No.177-180 SSN: 2278-2419
proposed cluster head selection also guarantees seamless access to the operators’ services for cluster users. In order to further accommodate the varying traffic over the trunk link and reduce the latency during traffic distribution, an adaptive trunk link transmission scheme and cooperative communication of mobile gateway candidates were proposed for the aggregated V2I traffic transmission in this integrated network. Simulation results show that coordinated vehicle clustering and beam formed transmission are suitable to support fast varying traffic conditions with extremely large dynamic range. Reference [1] J. A. Misener, “Vehicle-infrastructure integration (VII) and safety: Rubber and radio meets the road in California,” Intellimotion, vol. 11, no. 2, pp. 1-3,2005. [2] Y. B. Jinila and K. Komathy, “a Privacy Preserving Authentication Framework for Safety Messages in Vanet”, Fourth International Conference on Sustainable Energy and Intelligent Systems, pp. 456461, 12-14 Dec 2013 - K.C.G College of Technology – Chennai [3] B. Ducourthial, Y. Khaled, and M. Shawky, “Conditional transmissions: Performance study of a new communication strategy in VANET,” IEEE Trans. Veh. Technol., vol. 56, no. 6, pp. 3348–3357, 2007. [4] S. R. Kolte and M. S. Madankar, “Adaptive congestion control for transmission of safety messages in VANET,” 2014 Int. Conf. Converg. Technol. I2CT 2014, pp. 1–5, 2014. [5] C. Campolo and a Vinel, “Modeling broadcasting in IEEE 802.11 p/WAVE vehicular networks,” … Lett. IEEE, vol. 15, no. 2, pp. 199–201, 2011. [6] K. Azogu, M. T. Ferreira, J. A. Larcom, and H. Liu, “A new anti-jamming strategy for VANET metricsdirected security defense,” 2013 IEEE Globecom Work. GC Wkshps 2013, pp. 1344–1349, 2013. [7] Kumar and R. P. Nayak, “An efficient group-based safety message transmission protocol for VANET,” Int. Conf. Commun. Signal Process. ICCSP 2013 - Proc., pp. 270–274, 2013 [8] S. Roselinmary, M. Maheshwari, and M. Thamaraiselvan, “Early detection of DOS attacks in VANET using Attacked Packet Detection Algorithm (APDA),” 2013 Int. Conf. Inf. Commun. Embed. Syst. ICICES 2013, pp. 237–240, 2013. [9] J. Copeland, F. Khan, K. Sanil, and F. Elahi, “Recovering VANET safety messages in transmission holes,” Glob. Inf. Infrastruct. Symp. GIIS 2013, pp. 0– 4, 2013. [10] K. Verma and H. Hasbullah, “IP-CHOCK (filter)Based Detection Scheme for Denial of Service (DoS) attacks in VANET”, International Conference on Computer and Information Sciences (ICCOINS), pp. 1-6, 3-5 June 2014. [11] G. M. Valantina and S. Jayashri, “Q-Learning Based Point to Point Data Transfer in Vanets,” Procedia Comput. Sci., vol. 57, pp. 1394–1400, 2015.
180