318 research outputs found
Infocast: A New Paradigm for Collaborative Content Distribution from Roadside Units to Vehicular Networks Using Rateless Codes
In this paper, we address the problem of distributing a large amount of bulk
data to a sparse vehicular network from roadside infostations, using efficient
vehicle-to-vehicle collaboration. Due to the highly dynamic nature of the
underlying vehicular network topology, we depart from architectures requiring
centralized coordination, reliable MAC scheduling, or global network state
knowledge, and instead adopt a distributed paradigm with simple protocols. In
other words, we investigate the problem of reliable dissemination from multiple
sources when each node in the network shares a limited amount of its resources
for cooperating with others. By using \emph{rateless} coding at the Road Side
Unit (RSU) and using vehicles as data carriers, we describe an efficient way to
achieve reliable dissemination to all nodes (even disconnected clusters in the
network). In the nutshell, we explore vehicles as mobile storage devices. We
then develop a method to keep the density of the rateless codes packets as a
function of distance from the RSU at the desired level set for the target
decoding distance. We investigate various tradeoffs involving buffer size,
maximum capacity, and the mobility parameter of the vehicles
DFCV: A Novel Approach for Message Dissemination in Connected Vehicles using Dynamic Fog
Vehicular Ad-hoc Network (VANET) has emerged as a promising solution for
enhancing road safety. Routing of messages in VANET is challenging due to
packet delays arising from high mobility of vehicles, frequently changing
topology, and high density of vehicles, leading to frequent route breakages and
packet losses. Previous researchers have used either mobility in vehicular fog
computing or cloud computing to solve the routing issue, but they suffer from
large packet delays and frequent packet losses. We propose Dynamic Fog for
Connected Vehicles (DFCV), a fog computing based scheme which dynamically
creates, increments and destroys fog nodes depending on the communication
needs. The novelty of DFCV lies in providing lower delays and guaranteed
message delivery at high vehicular densities. Simulations were conducted using
hybrid simulation consisting of ns-2, SUMO, and Cloudsim. Results show that
DFCV ensures efficient resource utilization, lower packet delays and losses at
high vehicle densities
Stable Infrastructure-based Routing for Intelligent Transportation Systems
Intelligent Transportation Systems (ITSs) have been instrumental
in reshaping transportation towards safer roads, seamless
logistics, and digital business-oriented services under the umbrella of
smart city platforms. Undoubtedly, ITS applications will demand
stable routing protocols that not only focus on Inter-Vehicle Communications
but also on providing a fast, reliable and secure interface to
the infrastructure. In this paper, we propose a novel stable infrastructure-
based routing protocol for urban VANETs. It enables vehicles
proactively to maintain fresh routes towards Road-Side Units
(RSUs) while reactively discovering routes to nearby vehicles. It
builds routes from highly stable connected intersections using a selection
policy which uses a new intersection stability metric. Simulation
experiments performed with accurate mobility and propagation
models have confirmed the efficiency of the new protocol and its
adaptability to continuously changing network status in the urban
environment
MARINE: Man-in-the-middle attack resistant trust model IN connEcted vehicles
Vehicular Ad-hoc NETwork (VANET), a novel technology holds a paramount importance within the transportation domain due to its abilities to increase traffic efficiency and safety. Connected vehicles propagate sensitive information which must be shared with the neighbors in a secure environment. However, VANET may also include dishonest nodes such as Man-in-the-Middle (MiTM) attackers aiming to distribute and share malicious content with the vehicles, thus polluting the network with compromised information. In this regard, establishing trust among connected vehicles can increase security as every participating vehicle will generate and propagate authentic, accurate and trusted content within the network. In this paper, we propose a novel trust model, namely, Man-in-the-middle Attack Resistance trust model IN connEcted vehicles (MARINE), which identifies dishonest nodes performing MiTM attacks in an efficient way as well as revokes their credentials. Every node running MARINE system first establishes trust for the sender by performing multi-dimensional plausibility checks. Once the receiver verifies the trustworthiness of the sender, the received data is then evaluated both directly and indirectly. Extensive simulations are carried out to evaluate the performance and accuracy of MARINE rigorously across three MiTM attacker models and the bench-marked trust model. Simulation results show that for a network containing 35% MiTM attackers, MARINE outperforms the state of the art trust model by 15%, 18%, and 17% improvements in precision, recall and F-score, respectively.N/A
Towards a Framework for Preserving Privacy in VANET
Vehicular Ad-hoc Network (VANET) is envisioned as an integral part of the Intelligent Transportation Systems as it promises various services and benefits such as road safety, traffic efficiency, navigation and infotainment services. However, the security and privacy risks associated with the wireless communication are often overlooked. Messages exchanged in VANET wireless communication carry inferable Personally Identifiable Information(PII). This introduces several privacy threats that could limit the adoption of VANET. The quantification of these privacy threats is an active research area in VANET security and privacy domains. The Pseudonymisation technique is currently the most preferred solution for critical privacy threats in VANET to provide conditional anonymous authentication. In the existing literature, several Pseudonym Changing Schemes(PCS) have been proposed as effective de-identification approaches to prevent the inference of PII. However, for various reasons, none of the proposed schemes received public acceptance. Moreover, one of the open research challenges is to compare different PCSs under varying circumstances with a set of standardized experimenting parameters and consistent metrics. In this research, we propose a framework to assess the effectiveness of PCSs in VANET with a systematic approach. This comprehensive equitable framework consists of a variety of building blocks which are segmented into correlated sub-domains named Mobility Models, Adversary Models, and Privacy Metrics. Our research introduces a standard methodology to evaluate and compare VANET PCSs using a generic simulation setup to obtain optimal, realistic and most importantly, consistent results. This road map for the simulation setup aims to help the research \& development community to develop, assess and compare the PCS with standard set of parameters for proper analysis and reporting of new PCSs. The assessment of PCS should not only be equitable but also realistic and feasible. Therefore, the sub-domains of the framework need coherent as well as practically applicable characteristics. The Mobility Model is the layout of the traffic on the road which has varying features such as traffic density and traffic scenarios based on the geographical maps. A diverse range of Adversary Models is important for pragmatic evaluation of the PCSs which not only considers the presence of global passive adversary but also observes the effect of intelligent and strategic \u27local attacker\u27 placements. The biggest challenge in privacy measurement is the fact that it is a context-based evaluation. In the literature, the PCSs are evaluated using either user-oriented or adversary-oriented metrics. Under all circumstances, the PCSs should be assessed from both user and adversary perspectives. Using this framework, we determined that a local passive adversary can be strong based on the attacking capabilities. Therefore, we propose two intelligent adversary placements which help in privacy assessment with realistic adversary modelling. When the existing PCSs are assessed with our systematic approach, consistent models and metrics, we identified the privacy vulnerabilities and the limitations of existing PCSs. There was a need for comprehensive PCS which consider the context of the vehicles and the changing traffic patterns in the neighbourhood. Consequently, we developed a Context-Aware \& Traffic Based PCS that focuses on increasing the overall rate of confusion for the adversary and to reduce deterministic information regarding the pseudonym change. It is achieved by increasing the number of dynamic attributes in the proposed PCS for inference of the changing pattern of the pseudonyms. The PCS increases the anonymity of the vehicle by having the synchronized pseudonym changes. The details given under the sub-domains of the framework solidifies our findings to strengthen the privacy assessment of our proposed PCS
Hybrid-Vehcloud: An Obstacle Shadowing Approach for VANETs in Urban Environment
Routing of messages in Vehicular Ad-hoc Networks (VANETs) is challenging due
to obstacle shadowing regions with high vehicle densities, which leads to
frequent disconnection problems and blocks radio wave propagation between
vehicles. Previous researchers used multi-hop, vehicular cloud or roadside
infrastructures to solve the routing issue among the vehicles, but they suffer
from significant packet delays and frequent packet losses arising from obstacle
shadowing. We proposed a vehicular cloud based hybrid technique called
Hybrid-Vehcloud to disseminate messages in obstacle shadowing regions, and
multi-hop technique to disseminate messages in non-obstacle shadowing regions.
The novelty of our approach lies in the fact that our proposed technique
dynamically adapts between obstacle shadowing and non-obstacle shadowing
regions. Simulation based performance analysis of Hybrid-Vehcloud showed
improved performance over Cloud-assisted Message Downlink Dissemination Scheme
(CMDS), Cross-Layer Broadcast Protocol (CLBP) and Cloud-VANET schemes at high
vehicle densities
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Networks
Vehicular Ad-hoc Network (VANET) technology is the basis of Intelligent Transportation System (ITS) connectivity that enables the delivery of useful information to and fro between vehicles in vehicle-to-vehicle communication mode; or between vehicle and infrastructure in vehicle-to-infrastructure mode for safety and comfort. However, due to the openness of the wireless medium used by VANET, the technology is vulnerable to security threats in both communication modes. In this study, the essential background of VANET from architectural point of view and communication types are discussed. Then, the overview of modification attack in VANET is presented. In addition, this paper thoroughly reviews the existing prevention schemes for modification attack in VANET. This review paper reveals that there is still a need for a better and more efficient preventive scheme to address the modification attack in VANET
A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks
The initial phase of the deployment of Vehicular Ad-Hoc Networks (VANETs) has
begun and many research challenges still need to be addressed. Location privacy
continues to be in the top of these challenges. Indeed, both of academia and
industry agreed to apply the pseudonym changing approach as a solution to
protect the location privacy of VANETs'users. However, due to the pseudonyms
linking attack, a simple changing of pseudonym shown to be inefficient to
provide the required protection. For this reason, many pseudonym changing
strategies have been suggested to provide an effective pseudonym changing.
Unfortunately, the development of an effective pseudonym changing strategy for
VANETs is still an open issue. In this paper, we present a comprehensive survey
and classification of pseudonym changing strategies. We then discuss and
compare them with respect to some relevant criteria. Finally, we highlight some
current researches, and open issues and give some future directions
- …