ºÝºÝߣ

ºÝºÝߣShare a Scribd company logo
A Framework for Secure
   and Efficient Data
Acquisition in Vehicular
   Ad Hoc Networks

             BY

        LAVANYA BANDLA
             B.T.I
What are Vanets?
ï‚—   A Vehicular Ad-Hoc Network, or VANET is a
    technology that uses moving cars as nodes in a
    network to create a mobile network.

ï‚—   VANET turns every participating car
    approximately 100 to 300 meters to connect and
    in turn create a network with a wide range.

ï‚—   vehicles communicate with each other using the
    roadside units (RSUs).
APPLICATIONS:
ï‚— GPS and navigation systems can benefit, as they can
    be integrated with traffic reports to provide the fastest
    route to work.
ï‚—   It would also allow for free services such as Google
    Talk or Skype between employees, lowering
    telecommunications costs.
ï‚—    Future applications could involve cruise control making
    automatic adjustments to maintain safe distances
    between vehicles or alerting the driver of emergency
    vehicles in the area.
ARCHITECTURE OF A REACT
REGISTRATION USING REACT
ï‚— When users register using the RSU
  website, they specify their personal
  details (i.e., name, address, and phone)
  plus a username and password to use for
  authentication when they connect to the
  RSU network from their vehicle.
ï‚— Users also choose a default RSU, which
  will save their account in its database
HARDY(HIEARCHIAL PASSWORD BASED-KEY
DERIVATION)
Packet format for READY
ï‚—   sensitive data can be encrypted using a 128- or 256-b symmetric key, whereas
    less sensitive data could be encrypted using an 80- or a 128-b key.
Interface between user and RSU
ANALYSIS:
ï‚—   Mathematical expressions were derived for
    the encryption and the decryption delays
    of AES. These are expressed as a function
    of the key size, the block size, and the
    number of processing cycles required for
    performing basic operations that are used
    in AES such as bytewise AND
    (Ta), bytewise OR (To), and bytewise shift
    (Ts). The resulting expression is:
ANALYSIS:
   TAES−Enc =(46NbNr − 30Nb)Ta
   + [31NbNr + 12(Nr − 1) − 20Nb] To
   + [64NbNr + 96(Nr − 1) − 61Nb] Ts (1)
   where TAES−Enc is the number of processing cycles
    required to encrypt one block of data, Nb is the block
    size, and Nr is the number of iterations (which is equal
    to 10 when the key size is 128 b). Assuming that each
    basic operation requires one processing cycle, i.e., Ta =
    To = Ts = 1, [41] derives the
ï‚—   number of processing cycles to encrypt one block of
    data as TAES−Enc = 6168 processing cycles.
RSU Deployment Cost
ï‚— Increasing the number of RSUs (NRSU) leads to more RSU
  coverage and, consequently, less packet delays and higher
  delivery success ratio.
 For ex. Lets consider NRSU between 1 and 20 in a 9 ×9 km2
  area, which corresponds to varying the RSU density between
  0.012 and 0.25 RSUs per Km2. The results showed that
  increasing NRSU from 5 to 20 increased the packet delivery
  ratio from 85% to 93% and decreased the packet delay from 8
  s to 5 s. This, how it comes at the expense of increasing the
  cost of the RSU network deployment.
ï‚— Moreover, a vehicle in REACT will make a higher RSU
  density will lead to more handover occurrences and
  consequently increase the load on the network.
ï‚— Hence, there is a tradeoff between improving the performance
  and reducing the deployment cost and network load.
CONCLUSION:
ï‚— The evaluation of our proposed scheme confirmed
  its effectiveness compared to a recent security
  mechanism for VANETs. We are designing an RSU
  scheduling mechanism in which an RSU builds a
  schedule that is divided into time slots (TSs). In
  each
 Hence, an RSU prepares users’ data and caches
  them during a free TS before the users connect.
  Using this scheme, the RSU distributes its load
  among the available TSs.
THANK YOU

More Related Content

Similar to A framework for secure and efficient data acquisition (20)

A Secure Intrusion Prevention Protocol for VANET to Enhance Security
A Secure Intrusion Prevention Protocol for VANET to Enhance SecurityA Secure Intrusion Prevention Protocol for VANET to Enhance Security
A Secure Intrusion Prevention Protocol for VANET to Enhance Security
International journal of scientific and technical research in engineering (IJSTRE)
Ìý
Improved Greedy Routing Protocol for VANET
Improved Greedy Routing Protocol for VANETImproved Greedy Routing Protocol for VANET
Improved Greedy Routing Protocol for VANET
paperpublications3
Ìý
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop Communication
IJCSIS Research Publications
Ìý
Smart optimization in 802.11p media access control protocol for vehicular ad ...
Smart optimization in 802.11p media access control protocol for vehicular ad ...Smart optimization in 802.11p media access control protocol for vehicular ad ...
Smart optimization in 802.11p media access control protocol for vehicular ad ...
IJECEIAES
Ìý
IEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and AbstractIEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and Abstract
tsysglobalsolutions
Ìý
D044021420
D044021420D044021420
D044021420
IJERA Editor
Ìý
IRJET- Survey on Delivering Hazardous Event Messages to Distinct Vehicles
IRJET- Survey on Delivering Hazardous Event Messages to Distinct VehiclesIRJET- Survey on Delivering Hazardous Event Messages to Distinct Vehicles
IRJET- Survey on Delivering Hazardous Event Messages to Distinct Vehicles
IRJET Journal
Ìý
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992
Editor IJARCET
Ìý
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992
Editor IJARCET
Ìý
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
IJLT EMAS
Ìý
Ec34781784
Ec34781784Ec34781784
Ec34781784
IJERA Editor
Ìý
Communications in Vehicular networks
Communications in Vehicular networksCommunications in Vehicular networks
Communications in Vehicular networks
DaisyWatson5
Ìý
IRJET- Density-Aware Rate Adaptation for Vehicle Safety Communications in...
IRJET-  	  Density-Aware Rate Adaptation for Vehicle Safety Communications in...IRJET-  	  Density-Aware Rate Adaptation for Vehicle Safety Communications in...
IRJET- Density-Aware Rate Adaptation for Vehicle Safety Communications in...
IRJET Journal
Ìý
Automotive Ethernet architecture and security: challenges and technologies
Automotive Ethernet architecture and security: challenges and technologies Automotive Ethernet architecture and security: challenges and technologies
Automotive Ethernet architecture and security: challenges and technologies
IJECEIAES
Ìý
pack prediction-based cloud bandwidth and cost reduction system
pack prediction-based cloud bandwidth and cost reduction systempack prediction-based cloud bandwidth and cost reduction system
pack prediction-based cloud bandwidth and cost reduction system
swathi78
Ìý
Towards Improving Road Safety Using Advanced Vehicular Networks
Towards Improving Road Safety Using Advanced Vehicular NetworksTowards Improving Road Safety Using Advanced Vehicular Networks
Towards Improving Road Safety Using Advanced Vehicular Networks
TELKOMNIKA JOURNAL
Ìý
A Novel De Routing Scheme for Vehicular Ad-Hoc Network
A Novel De Routing Scheme for Vehicular Ad-Hoc NetworkA Novel De Routing Scheme for Vehicular Ad-Hoc Network
A Novel De Routing Scheme for Vehicular Ad-Hoc Network
IRJET Journal
Ìý
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
IJECEIAES
Ìý
Performance evaluation of vanets
Performance evaluation of vanetsPerformance evaluation of vanets
Performance evaluation of vanets
csandit
Ìý
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
Ìý
Improved Greedy Routing Protocol for VANET
Improved Greedy Routing Protocol for VANETImproved Greedy Routing Protocol for VANET
Improved Greedy Routing Protocol for VANET
paperpublications3
Ìý
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop Communication
IJCSIS Research Publications
Ìý
Smart optimization in 802.11p media access control protocol for vehicular ad ...
Smart optimization in 802.11p media access control protocol for vehicular ad ...Smart optimization in 802.11p media access control protocol for vehicular ad ...
Smart optimization in 802.11p media access control protocol for vehicular ad ...
IJECEIAES
Ìý
IEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and AbstractIEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and Abstract
tsysglobalsolutions
Ìý
IRJET- Survey on Delivering Hazardous Event Messages to Distinct Vehicles
IRJET- Survey on Delivering Hazardous Event Messages to Distinct VehiclesIRJET- Survey on Delivering Hazardous Event Messages to Distinct Vehicles
IRJET- Survey on Delivering Hazardous Event Messages to Distinct Vehicles
IRJET Journal
Ìý
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992
Editor IJARCET
Ìý
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992
Editor IJARCET
Ìý
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
IJLT EMAS
Ìý
Communications in Vehicular networks
Communications in Vehicular networksCommunications in Vehicular networks
Communications in Vehicular networks
DaisyWatson5
Ìý
IRJET- Density-Aware Rate Adaptation for Vehicle Safety Communications in...
IRJET-  	  Density-Aware Rate Adaptation for Vehicle Safety Communications in...IRJET-  	  Density-Aware Rate Adaptation for Vehicle Safety Communications in...
IRJET- Density-Aware Rate Adaptation for Vehicle Safety Communications in...
IRJET Journal
Ìý
Automotive Ethernet architecture and security: challenges and technologies
Automotive Ethernet architecture and security: challenges and technologies Automotive Ethernet architecture and security: challenges and technologies
Automotive Ethernet architecture and security: challenges and technologies
IJECEIAES
Ìý
pack prediction-based cloud bandwidth and cost reduction system
pack prediction-based cloud bandwidth and cost reduction systempack prediction-based cloud bandwidth and cost reduction system
pack prediction-based cloud bandwidth and cost reduction system
swathi78
Ìý
Towards Improving Road Safety Using Advanced Vehicular Networks
Towards Improving Road Safety Using Advanced Vehicular NetworksTowards Improving Road Safety Using Advanced Vehicular Networks
Towards Improving Road Safety Using Advanced Vehicular Networks
TELKOMNIKA JOURNAL
Ìý
A Novel De Routing Scheme for Vehicular Ad-Hoc Network
A Novel De Routing Scheme for Vehicular Ad-Hoc NetworkA Novel De Routing Scheme for Vehicular Ad-Hoc Network
A Novel De Routing Scheme for Vehicular Ad-Hoc Network
IRJET Journal
Ìý
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
IJECEIAES
Ìý
Performance evaluation of vanets
Performance evaluation of vanetsPerformance evaluation of vanets
Performance evaluation of vanets
csandit
Ìý
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
Ìý

Recently uploaded (20)

Yale VMOC Special Report - Measles Outbreak Southwest US 3-30-2025 FINAL v2...
Yale VMOC Special Report - Measles Outbreak  Southwest US 3-30-2025  FINAL v2...Yale VMOC Special Report - Measles Outbreak  Southwest US 3-30-2025  FINAL v2...
Yale VMOC Special Report - Measles Outbreak Southwest US 3-30-2025 FINAL v2...
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
Ìý
2025 Women Leaders Program - Award Winning
2025 Women Leaders Program  - Award Winning2025 Women Leaders Program  - Award Winning
2025 Women Leaders Program - Award Winning
Sonia McDonald
Ìý
S. Y. G. N. M. CHILD HEALTH NURSING Leukemia in Children.pptx
S. Y. G. N. M. CHILD HEALTH NURSING Leukemia in Children.pptxS. Y. G. N. M. CHILD HEALTH NURSING Leukemia in Children.pptx
S. Y. G. N. M. CHILD HEALTH NURSING Leukemia in Children.pptx
sachin7989
Ìý
Design approaches and ethical challenges in Artificial Intelligence tools for...
Design approaches and ethical challenges in Artificial Intelligence tools for...Design approaches and ethical challenges in Artificial Intelligence tools for...
Design approaches and ethical challenges in Artificial Intelligence tools for...
Yannis
Ìý
Crafting Winning STEM & Science Grant Proposals
Crafting Winning STEM & Science Grant ProposalsCrafting Winning STEM & Science Grant Proposals
Crafting Winning STEM & Science Grant Proposals
Kevin Welch
Ìý
Tollywood Quiz- 21st March 2025, Quiz Club NITW
Tollywood Quiz- 21st March 2025, Quiz Club NITWTollywood Quiz- 21st March 2025, Quiz Club NITW
Tollywood Quiz- 21st March 2025, Quiz Club NITW
Quiz Club NITW
Ìý
VTU notes for Indian Knowledge System 2022 scheme ppt
VTU notes for Indian Knowledge System 2022 scheme pptVTU notes for Indian Knowledge System 2022 scheme ppt
VTU notes for Indian Knowledge System 2022 scheme ppt
Suvarna Hiremath
Ìý
The basics of sentences session 9pptx.pptx
The basics of sentences session 9pptx.pptxThe basics of sentences session 9pptx.pptx
The basics of sentences session 9pptx.pptx
heathfieldcps1
Ìý
Studying and Notetaking: Some Suggestions
Studying and Notetaking: Some SuggestionsStudying and Notetaking: Some Suggestions
Studying and Notetaking: Some Suggestions
Damian T. Gordon
Ìý
List View Attributes in Odoo 18 - Odoo ºÝºÝߣs
List View Attributes in Odoo 18 - Odoo ºÝºÝߣsList View Attributes in Odoo 18 - Odoo ºÝºÝߣs
List View Attributes in Odoo 18 - Odoo ºÝºÝߣs
Celine George
Ìý
Antifungal agents by Mrs. Manjushri Dabhade
Antifungal agents by Mrs. Manjushri DabhadeAntifungal agents by Mrs. Manjushri Dabhade
Antifungal agents by Mrs. Manjushri Dabhade
Dabhade madam Dabhade
Ìý
UTI Quinolones by Mrs. Manjushri Dabhade
UTI Quinolones by Mrs. Manjushri DabhadeUTI Quinolones by Mrs. Manjushri Dabhade
UTI Quinolones by Mrs. Manjushri Dabhade
Dabhade madam Dabhade
Ìý
Karin Clavel - Collection Wall: Inspiring connection and collaboration
Karin Clavel - Collection Wall: Inspiring connection and collaborationKarin Clavel - Collection Wall: Inspiring connection and collaboration
Karin Clavel - Collection Wall: Inspiring connection and collaboration
voginip
Ìý
The Sentence and the Phrase presentation.pdf
The Sentence and the Phrase presentation.pdfThe Sentence and the Phrase presentation.pdf
The Sentence and the Phrase presentation.pdf
Netzi Valdelomar Miranda
Ìý
Unit 3: Combustion in Spark Ignition Engines
Unit 3: Combustion in Spark Ignition EnginesUnit 3: Combustion in Spark Ignition Engines
Unit 3: Combustion in Spark Ignition Engines
NileshKumbhar21
Ìý
Cut Through the Noise_ Reaching Supporters When (and Where) It Matters Most.pdf
Cut Through the Noise_ Reaching Supporters When (and Where) It Matters Most.pdfCut Through the Noise_ Reaching Supporters When (and Where) It Matters Most.pdf
Cut Through the Noise_ Reaching Supporters When (and Where) It Matters Most.pdf
TechSoup
Ìý
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptx
heathfieldcps1
Ìý
Key Frameworks in Systematic Reviews - Dr Reginald Quansah
Key Frameworks in Systematic Reviews - Dr Reginald QuansahKey Frameworks in Systematic Reviews - Dr Reginald Quansah
Key Frameworks in Systematic Reviews - Dr Reginald Quansah
Systematic Reviews Network (SRN)
Ìý
How to Configure Outgoing and Incoming mail servers in Odoo 18
How to Configure Outgoing and Incoming mail servers in Odoo 18How to Configure Outgoing and Incoming mail servers in Odoo 18
How to Configure Outgoing and Incoming mail servers in Odoo 18
Celine George
Ìý
Urinary Tract Infection & Sexually Transmt ted Diseases.pptx
Urinary Tract Infection & Sexually Transmt ted Diseases.pptxUrinary Tract Infection & Sexually Transmt ted Diseases.pptx
Urinary Tract Infection & Sexually Transmt ted Diseases.pptx
Ashish Umale
Ìý
2025 Women Leaders Program - Award Winning
2025 Women Leaders Program  - Award Winning2025 Women Leaders Program  - Award Winning
2025 Women Leaders Program - Award Winning
Sonia McDonald
Ìý
S. Y. G. N. M. CHILD HEALTH NURSING Leukemia in Children.pptx
S. Y. G. N. M. CHILD HEALTH NURSING Leukemia in Children.pptxS. Y. G. N. M. CHILD HEALTH NURSING Leukemia in Children.pptx
S. Y. G. N. M. CHILD HEALTH NURSING Leukemia in Children.pptx
sachin7989
Ìý
Design approaches and ethical challenges in Artificial Intelligence tools for...
Design approaches and ethical challenges in Artificial Intelligence tools for...Design approaches and ethical challenges in Artificial Intelligence tools for...
Design approaches and ethical challenges in Artificial Intelligence tools for...
Yannis
Ìý
Crafting Winning STEM & Science Grant Proposals
Crafting Winning STEM & Science Grant ProposalsCrafting Winning STEM & Science Grant Proposals
Crafting Winning STEM & Science Grant Proposals
Kevin Welch
Ìý
Tollywood Quiz- 21st March 2025, Quiz Club NITW
Tollywood Quiz- 21st March 2025, Quiz Club NITWTollywood Quiz- 21st March 2025, Quiz Club NITW
Tollywood Quiz- 21st March 2025, Quiz Club NITW
Quiz Club NITW
Ìý
VTU notes for Indian Knowledge System 2022 scheme ppt
VTU notes for Indian Knowledge System 2022 scheme pptVTU notes for Indian Knowledge System 2022 scheme ppt
VTU notes for Indian Knowledge System 2022 scheme ppt
Suvarna Hiremath
Ìý
The basics of sentences session 9pptx.pptx
The basics of sentences session 9pptx.pptxThe basics of sentences session 9pptx.pptx
The basics of sentences session 9pptx.pptx
heathfieldcps1
Ìý
Studying and Notetaking: Some Suggestions
Studying and Notetaking: Some SuggestionsStudying and Notetaking: Some Suggestions
Studying and Notetaking: Some Suggestions
Damian T. Gordon
Ìý
List View Attributes in Odoo 18 - Odoo ºÝºÝߣs
List View Attributes in Odoo 18 - Odoo ºÝºÝߣsList View Attributes in Odoo 18 - Odoo ºÝºÝߣs
List View Attributes in Odoo 18 - Odoo ºÝºÝߣs
Celine George
Ìý
Antifungal agents by Mrs. Manjushri Dabhade
Antifungal agents by Mrs. Manjushri DabhadeAntifungal agents by Mrs. Manjushri Dabhade
Antifungal agents by Mrs. Manjushri Dabhade
Dabhade madam Dabhade
Ìý
UTI Quinolones by Mrs. Manjushri Dabhade
UTI Quinolones by Mrs. Manjushri DabhadeUTI Quinolones by Mrs. Manjushri Dabhade
UTI Quinolones by Mrs. Manjushri Dabhade
Dabhade madam Dabhade
Ìý
Karin Clavel - Collection Wall: Inspiring connection and collaboration
Karin Clavel - Collection Wall: Inspiring connection and collaborationKarin Clavel - Collection Wall: Inspiring connection and collaboration
Karin Clavel - Collection Wall: Inspiring connection and collaboration
voginip
Ìý
The Sentence and the Phrase presentation.pdf
The Sentence and the Phrase presentation.pdfThe Sentence and the Phrase presentation.pdf
The Sentence and the Phrase presentation.pdf
Netzi Valdelomar Miranda
Ìý
Unit 3: Combustion in Spark Ignition Engines
Unit 3: Combustion in Spark Ignition EnginesUnit 3: Combustion in Spark Ignition Engines
Unit 3: Combustion in Spark Ignition Engines
NileshKumbhar21
Ìý
Cut Through the Noise_ Reaching Supporters When (and Where) It Matters Most.pdf
Cut Through the Noise_ Reaching Supporters When (and Where) It Matters Most.pdfCut Through the Noise_ Reaching Supporters When (and Where) It Matters Most.pdf
Cut Through the Noise_ Reaching Supporters When (and Where) It Matters Most.pdf
TechSoup
Ìý
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptx
heathfieldcps1
Ìý
Key Frameworks in Systematic Reviews - Dr Reginald Quansah
Key Frameworks in Systematic Reviews - Dr Reginald QuansahKey Frameworks in Systematic Reviews - Dr Reginald Quansah
Key Frameworks in Systematic Reviews - Dr Reginald Quansah
Systematic Reviews Network (SRN)
Ìý
How to Configure Outgoing and Incoming mail servers in Odoo 18
How to Configure Outgoing and Incoming mail servers in Odoo 18How to Configure Outgoing and Incoming mail servers in Odoo 18
How to Configure Outgoing and Incoming mail servers in Odoo 18
Celine George
Ìý
Urinary Tract Infection & Sexually Transmt ted Diseases.pptx
Urinary Tract Infection & Sexually Transmt ted Diseases.pptxUrinary Tract Infection & Sexually Transmt ted Diseases.pptx
Urinary Tract Infection & Sexually Transmt ted Diseases.pptx
Ashish Umale
Ìý

A framework for secure and efficient data acquisition

  • 1. A Framework for Secure and Efficient Data Acquisition in Vehicular Ad Hoc Networks BY LAVANYA BANDLA B.T.I
  • 2. What are Vanets? ï‚— A Vehicular Ad-Hoc Network, or VANET is a technology that uses moving cars as nodes in a network to create a mobile network. ï‚— VANET turns every participating car approximately 100 to 300 meters to connect and in turn create a network with a wide range. ï‚— vehicles communicate with each other using the roadside units (RSUs).
  • 3. APPLICATIONS: ï‚— GPS and navigation systems can benefit, as they can be integrated with traffic reports to provide the fastest route to work. ï‚— It would also allow for free services such as Google Talk or Skype between employees, lowering telecommunications costs. ï‚— Future applications could involve cruise control making automatic adjustments to maintain safe distances between vehicles or alerting the driver of emergency vehicles in the area.
  • 5. REGISTRATION USING REACT ï‚— When users register using the RSU website, they specify their personal details (i.e., name, address, and phone) plus a username and password to use for authentication when they connect to the RSU network from their vehicle. ï‚— Users also choose a default RSU, which will save their account in its database
  • 7. Packet format for READY ï‚— sensitive data can be encrypted using a 128- or 256-b symmetric key, whereas less sensitive data could be encrypted using an 80- or a 128-b key.
  • 9. ANALYSIS: ï‚— Mathematical expressions were derived for the encryption and the decryption delays of AES. These are expressed as a function of the key size, the block size, and the number of processing cycles required for performing basic operations that are used in AES such as bytewise AND (Ta), bytewise OR (To), and bytewise shift (Ts). The resulting expression is:
  • 10. ANALYSIS: ï‚— TAES−Enc =(46NbNr − 30Nb)Ta ï‚— + [31NbNr + 12(Nr − 1) − 20Nb] To ï‚— + [64NbNr + 96(Nr − 1) − 61Nb] Ts (1) ï‚— where TAES−Enc is the number of processing cycles required to encrypt one block of data, Nb is the block size, and Nr is the number of iterations (which is equal to 10 when the key size is 128 b). Assuming that each basic operation requires one processing cycle, i.e., Ta = To = Ts = 1, [41] derives the ï‚— number of processing cycles to encrypt one block of data as TAES−Enc = 6168 processing cycles.
  • 11. RSU Deployment Cost ï‚— Increasing the number of RSUs (NRSU) leads to more RSU coverage and, consequently, less packet delays and higher delivery success ratio. ï‚— For ex. Lets consider NRSU between 1 and 20 in a 9 ×9 km2 area, which corresponds to varying the RSU density between 0.012 and 0.25 RSUs per Km2. The results showed that increasing NRSU from 5 to 20 increased the packet delivery ratio from 85% to 93% and decreased the packet delay from 8 s to 5 s. This, how it comes at the expense of increasing the cost of the RSU network deployment. ï‚— Moreover, a vehicle in REACT will make a higher RSU density will lead to more handover occurrences and consequently increase the load on the network. ï‚— Hence, there is a tradeoff between improving the performance and reducing the deployment cost and network load.
  • 12. CONCLUSION: ï‚— The evaluation of our proposed scheme confirmed its effectiveness compared to a recent security mechanism for VANETs. We are designing an RSU scheduling mechanism in which an RSU builds a schedule that is divided into time slots (TSs). In each ï‚— Hence, an RSU prepares users’ data and caches them during a free TS before the users connect. Using this scheme, the RSU distributes its load among the available TSs.