546 research outputs found

    2nd Joint ERCIM eMobility and MobiSense Workshop

    Get PDF

    Inter-vehicular communication for collision avoidance using Wi-Fi Direct

    Get PDF
    Inter vehicular collision avoidance systems warn vehicle drivers of potential collisions. The U.S Department of Transportation (USDOT) National Highway Traffic Safety Administration, in February 2014 has decided to enable vehicular communication among lightweight vehicles to exchange warning messages to prevent accidents. Dedicated Short Range Communications (DSRC) is a communication standard that allows short-range communication between vehicles and infrastructure, exchanging critical safety information to avoid collision. DSRC safety applications include forward collision warning, sudden brake warning and blind spot warning among many other warnings. It is also important to exchange location information between vehicles and pedestrians to avoid accidents. To exchange safety messages using DSRC, dedicated equipment is required. Pedestrians may not benefit from DSRC, as they may not carry dedicated DSRC safety equipment with them. Wi-Fi Direct technology can be used as an alternate to DSRC to exchange safety messages. Wi-Fi Direct enabled smartphones can exchange important safety information without the need of additional equipment. Peer-to-Peer (P2P) connections are formed between Wi-Fi Direct devices to exchange safety information. The Group Owner acts as the access point through which all clients communicate. This work examines how Wi-Fi Direct can be used in vehicular environment to exchange basic safety information between smartphones of vehicle drivers. Wi-Fi Direct and DSRC transmission delays are calculated are calculated. The results show, with more devices in a Wi-Fi Direct group the congestion in the network increases due to unnecessary retransmissions through the group owner. As mitigation, a broadcast method is proposed to reduce the delay. The results illustrate that the P2P group can now accommodate more vehicles and the delay is lesser. The calculations are extended to compute the transmission delay when P2P groups of same size exchange safety messages. The results help analyse the limitations of the system

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201

    Internet of Things Security Using Proactive WPA/WPA2

    Get PDF
    The Internet of Things (IoT) is a natural evolution of the Internet and is becoming more ubiquitous in our everyday home, business, health, education, and many other aspects. The data gathered and processed by IoT networks might be sensitive whichcallsforfeasibleandadequatesecuritymeasures.This paper describes the use of the Wi-Fi technology in the IoT connectivity, then proposes a new approach, the Proactive Wire- less Protected Access (PWPA), to protect the access networks. Then a new end to end (e2e) IoT security model is suggested to include the PWPA scheme. To evaluate the solution?s security and performance, firstly, the cybersecurity triad: confidentiality, integrity, and availability aspects were discussed, secondly, the solution?s performance was compared to a counterpart e2e security solution, the Secure Socket Layer security. A small IoT network was set up to simulate a real environment that uses HTTP protocol. Packets were then collected and analyzed. Data analysis showed a bandwidth efficiency increase by 2% (Internet links) and 12% (access network), and by 344% (Internet links) and 373% (access network) when using persistent and non- persistent HTTP respectively. On the other hand, the analysis showed a reduction in the average request-response delay of 25% and 53% when using persistent and non-persistent HTTP respectively. This scheme is possibly a simple and feasible solution that improves the IoT network security performance by reducing the redundancy in the TCP/IP layers security implementation

    Construction of a real vehicular delay-tolerant network testbed

    Get PDF
    Vehicular Delay-Tolerant Networks (VDTNs) appear as innovative network architecture, able to outline communication challenges caused by issues like variable delays, disruption and intermittent connectivity once that it utilizes the store-carry-and-forward method to allow that in-transit messages (called bundles) can be delivered to the destination by hopping over the mobile vehicles even that an end-to-end path does not exist. Since messages are stored persistently in a buffer and forward to the next hop, a new communication infrastructure is created allowing low-cost asynchronous opportunistic communication under the most critical situations like variable delays and bandwidth constraints. VDTN introduces a layered architecture, acting as an overlay network over the link layer, aggregating incoming IP packets in data bundles (large IP packets), using out-of-band signaling, based on the separation of the control plane and planes. This dissertation presents and evaluates the performance of a real VDTN testbed, demonstrating the real applicability of this new vehicular communication approach. It includes an embedded VDTN testbed created to evaluate safety systems in a real-world scenario. It was used cars with laptops to realize terminal and relay nodes. A real testbed is very important because some complex issues presented in vehicular communication systems can be treated with more realism in real-world environments than in a laboratory environment. The experiments were performed on the internal streets of Brazilian Fiat Automobile manufacturing plant. Performance measurements and analysis were also conduct to verify the efficiency of the system. The results obtained show that safety applications and services can be executed with the actual proposal VDTN architecture in several environments, although notable interference as fading and characteristics of the radio channel, require the use of more modern, appropriate and robust technologies. Thus, the real deployment of VDTNs confirms that VDTNs can be seen as a very promising technology for vehicular communications.Fundação para a Ciência e a Tecnologia (FCT

    Early Detection and Prevention of DDOS attack on VANET

    Get PDF
    Growing number of vehicles in use has ushered in the service to provide human and resource safety. The present trend calls for the application of technology to automate safety measures in road traffic and since has been known as Intelligent Transport System (ITS). Vehicular Ad hoc Network is like a fork to Mobile Ad hoc Network , where the nodes are mobile vehicles moving in constrained road topology. VANET networks are envisioned to be used in practical ITS systems around the world. A network standard has been developed as Wireless Access In Vehicular Environment (IEEE 802.11p) to be used in VANET which is an amendment to IEEE 802.11 standard. With every new technological applications especially computers and network applications, come new security challenges. Every network in modern day is susceptible to security attacks and VANET is no exception. The most infamous of those attacks is the Distributed Denial of Service Attack which is unavoidable because unlike other security attacks the data packets used in it are legitimate packets. In this thesis work previous solutions are reviewed and a new offensive measure for detection, mitigation and prevention has been propose
    corecore