Article Preview
Top1. Introduction
Communication among vehicles is an important area of research for intelligent transportation systems. Vehicular Ad Hoc Networks (VANETs) are self-organizing networks that can be applied to intelligent transportation systems. However, VANET is a network with high dynamic topology and their communication is vulnerable to attacks, for instance, attackers may exploit VANETs to send fake information to deceive other vehicles. Therefore, providing security in VANETs is essential.
Authentication of vehicular safety messages poses a challenge in a high-density road-traffic scenario as the verification time for gathered messages gets longer than the average interarrival time. Due to the highly mobile and continuously changing topology, the major problem in Vehicular Ad Hoc Networks (VANETs) is how and where the collected information needs to be transmitted. An intelligent approach can adaptively select the next hop for data forwarding and aggregation from the other nodes in the networks.
There is a need for a new self-organizing method of authentication for VANETs, which allows their widespread, fast and secure implementation. The dynamic behavior of the vehicular adhoc network (VANET) imposes great challenges in privacy preservation of credentials or the data where there exist sets of intermediate vehicular nodes, which may not be interested to cooperate for providing services to other nodes in the network. The attacker may try to reveal the data. In the recent era of modern communication, as the communication of data, like a secret document, e-money, scanned certificates etc., is in digitized form, they have to be sent to the desired destination with confidentiality.
Figure 1. VANET communication hierarchy for proposed system
Figure 1 shows the VANET architecture for the proposed system. It shows the hierarchical view of the network. TA (Trusted Authority) is present at the top which performs the task of registration of RSU (Roadside Unit) s and Vehicles in starting phase. It also issues keys and certificates to RSUs and vehicles. RSUs are deployed along the roadside at fixed distances. RSU is authenticated by TA. Each RSU provides services to vehicles coming under their communication range. VANET supports three types of communications viz., Infrastructure to Infrastructure (I2I) e.g. RSU to RSU and RSU to TA, Vehicle to Infrastructure (V2I), and Vehicle to Vehicle (V2V). Communication between RSU to TA takes place using direct connection i.e. Wi-Fi or direct cable (Internet). Vehicle to Vehicle & Vehicle to Infrastructure communication takes place using DSRC (Dedicated Short-range Communication) protocol. DSRC is renamed as WAVE (Wireless Access in Vehicular Environment), also known as IEEE 802.11p standard. This standard provides various services in VANET like WAVE Architecture by IEEE 1609.0, resource management by IEEE1609.1, Security Services for Applications and Management Messages by IEEE 1609.2, Networking services by IEEE 1609.3, and multi-channel operations by IEEE 1609.4.
In this paper, Section 1 gives the introduction and research direction, Section 2 addresses work done by previous researchers in the area of authentication, message forwarding, and attack detection. Section 3 focuses on architecture and propositions made for research activity. Each proposition is explained by the derived mathematical model. Section 4 highlights the results of set propositions with corresponding graphs and formulae.
TopNodes in Vehicular Adhoc Networks moving with high mobility, establish a connection with other vehicles in their communication range that may or may not be connected earlier.This connection lasts only for few seconds as each vehicle moves in its direction, and they may never meet again. So secure communication in VANET is a challenge. Table 1 shows the detailed survey of strength, weakness and future scope of the latest research in VANET,