SlideShare a Scribd company logo
AN EFFICIENT PRIVACY PRESERVING AUTHENTICATION
WITH INSIDER ATTACK RESISTANCE FOR VANET
Presented by
1.SANJAY K (722820106116)
2.SARAN S (722820106121)
3.SOMANSANKARA P R (722820106134)
4.VISHNUPRASANTH B (722820106159)
Guided by
Mrs. K.Suganyadevi.,M.E.,(Ph.D.,)
ASSISTANT PROFESSOR
DEPARTMENT OF ECE
SRI ESHWAR COLLEGE OF
ENGINEERING.
21-11-2023 1
Batch no : 13
21-11-2023 Batch no : 13 2
Presentation Outline
• Introduction
• Abstract
• Literature Survey
• Objective
• Block Diagram
• Expected Outcome
• Execution Plan
• References
21-11-2023 Batch no : 13 3
Introduction
• VANETs support dynamic communication between fast-moving vehicles using
OBUs and RSUs. They facilitate safety-related applications and optimize
traffic through V2V and V2I protocols.
• VANETs demand robust security measures, including authentication for
communication between vehicles, privacy protection against unauthorized
access, and data verification to ensure integrity.
• Insider attacks in VANETs originate from authenticated entities within the
network.
• Balancing real-time communication and efficiency with comprehensive
security is crucial.
• Maintaining VANETs' efficiency while ensuring robust security against insider
threats requires a delicate balance in security measures to safeguard
communication while real-time exchanges between vehicles.
21-11-2023 Batch no : 13 4
Abstract
• VANETs, while pivotal for traffic management and safety, face vulnerabilities
like insider attacks due to their open and dynamic nature, posing significant
challenges for privacy and authentication.
• A novel approach merges Proof of Chain (PoC) and Causal Dependency
mechanisms to address privacy concerns and resist insider attacks during
authentication in VANETs.
• Causal Dependency mechanisms ensure message sequencing, guarding against
replay attacks and aiding vehicles in determining the relevance of received
information to their current state.
• By implementing these methods, individual vehicle traceability is significantly
reduced, enabling data exchange, traffic management, and safety
communication without compromising privacy or security in VANETs.
21-11-2023 Batch no : 13 5
Literature Survey
Paper Title Journal details Methodology
Advantages/
Disadvantages
1.PairingFree
Signatures with Insider
Attack Resistance for
Vehicular AdHoc
Networks (VANETs)
IEEE Access, vol. 9,
pp. 159587-159597.
Cryptographic operations
measured using C MIRACL
Core Cryptographic Library
Advantages:
It ensures message integrity, authentication,
privacy, tracing, non-repudiation, and resistance to
insider attacks
Disadvantages:
Limited Scalability,
Increased Latency,
Complexity of Revocation.
2. Comparative study
on security and privacy
issues in VANETs
Cloud and
IoT‐Based Vehicular
Ad Hoc Networks
(2021): 145-162.
Geolocalization Abilities,
Dedicated Short-Range
Communication (DSRC),
Low Motionlessness
Necessities
Advantages:
It achieves security and privacy in VANETs.
It enhances vehicle authentication time, collision
rate, data transmission rate, and privacy
preservation levels
Disadvantages:
Rapidly Evolving Technology,
Availability of Data,
Scope and Complexity
21-11-2023 Batch no : 13 6
Literature Survey
Paper Title Journal details Methodology
Advantages/
Disadvantages
3.Proven Secure Tree-
Based Authenticated
Key Agreement for
Securing V2V and V2I
Communications in
VANETs
IEEE Transactions
on Mobile
Computing, vol. 21,
no. 9, pp. 3280-3297,
1 Sept. 2022, doi:
10.1109/TMC.2021.
3056712.
V2V and V2I
Communications, Full
authentication mechanism,
Light weight Cryptography
mechanism
Advantages:
The outcome is proven secure, it has low
computational and communication overhead
Disadvantages:
Scalability,
Complexity,
Infrastructure Dependence,
Single Point of Failure.
4.Batch-Assisted
Verification Scheme
for Reducing Message
Verification Delay of
the Vehicular Ad Hoc
Networks
IEEE Internet of
Things Journal, vol.
7, no. 9, pp. 8144-
8156, Sept. 2020,
doi:
10.1109/JIOT.2020.3
004811
Dedicated Short Range
Communication (DSRC)
protocol, Collaborative
authentication method.
Advantages:
It reduces verification delay and achieves fast
message verification
Disadvantages:
Publication Bias,
Rapidly Evolving Technology,
Availability of Data,
Scope and Complexity
21-11-2023 Batch no : 13 7
Literature Survey
Paper Title Journal details Methodology
Advantages/
Disadvantages
5.The Delay-
Constrained and
Network-Situation-
Aware V2V2I VANET
Data Offloading Based
on the Multi-Access
Edge Computing (MEC)
Architecture,
IEEE Open Journal
of Vehicular
Technology, vol. 1,
pp. 331-347, 2020,
doi:
10.1109/OJVT.2020.
3028684.
MEC protocol Advantages:
Ensures lifetime and quality of the V2V2I path to
derive suitable offloading paths
Disadvantages:
Limited scope,
Simplified assumptions,
Lack of real-world validation
6.A novel cyber‐attack
modelling and detection
in overcurrent
protection relays based
on wavelet signature
analysis.
IET Generation,
Transmission &
Distribution (2023).
Wavelet analysis,BRFD
algorithm,NDN-VANET
interconnection techniques
Advantages:
Detecting cyber attacks, reducing redundancy and
improving packet satisfaction rate and delay
Disadvantages:
It does not provide a comprehensive analysis of all
possible cyber threats and vulnerabilities in the
smart grid
21-11-2023 Batch no : 13 8
Literature Survey
Paper Title Journal details Methodology
Advantages/
Disadvantages
7.A Survey of
VANET/V2X Routing
from the Perspective of
Non-Learning- and
Learning-Based
Approaches
IEEE Access, vol.
10, pp. 23022-
23050, 2022, Doi:
10.1109/ACCESS.2
022.3152767.
V2X routing protocols Advantages:
It delivers optimized packet delivery, handling
congestion and shadowing effects, reducing
network overhead
Disadvantages:
Potential limitation, Does not capture future
protocols, a lack of coverage of innovative
approaches
8.A receiver-forwarding
decision scheme based on
Bayesian for NDN-
VANET,
China
Communications,
vol. 17, no. 8, pp.
106-120, Aug. 2020,
doi:
10.23919/JCC.2020.
08.009.
Bayesian decision theory and
the BRFD (Bayesian-based
Receiver Forwarding
Decision) scheme
Advantages:
Reducing redundancy and improving packet
satisfaction rate and delay
Disadvantages:
It does not provide a comprehensive evaluation
of the proposed BRFD scheme.
21-11-2023 Batch no : 13 9
Literature Survey
Paper Title Journal details Methodology
Advantages/
Disadvantages
9.Comment on Secure
and Lightweight
Conditional Privacy-
Preserving
Authentication for
Securing Traffic
Emergency Messages
in VANETs
IEEE Transactions
on Information
Forensics and
Security, vol. 18, pp.
1037-1038, 2023,
doi:
10.1109/TIFS.2021.
3066277
PPA (privacy-preserving
authentication) protocol
Advantages:
The scheme does not satisfy conditional privacy and
allows for the forging of valid signatures on
arbitrary messages
Disadvantages:
Reliability and Availability,
Privacy Concerns,
Scalability,
Security Vulnerabilities
10.R.S. State-of-the-art
approach to clustering
protocols in VANET: a
survey
Wireless Netw 26,
5307–5336 (2020).
https://doi.org/10.10
07/s11276-020-
02392-2.
Clustering protocol,MAC
protocol
Advantages:
Improved scalability and reliability
Disadvantages:
Communication overhead,limited clustered node
percentage
21-11-2023 Batch no : 13 10
Objective
• Implement causal dependency mechanisms to ensure proper message
sequencing, guarding against replay attacks and enabling accurate
relevance assessment of received information based on current conditions.
• Utilize causal dependency to reduce the traceability of individual cars
within the VANET network, enhancing privacy measures without
compromising communication efficiency.
• Implement causal dependency mechanisms to deter unauthorized tracking
or tracing of vehicles, thereby safeguarding sensitive location and identity
information.
• Utilize causal dependency to enable secure data exchange among vehicles
while reducing the risk of privacy breaches or malicious tracking attempts
in VANETs.
21-11-2023 Batch no : 13 11
Motivation of the Work
• Address the vulnerability of VANETs to insider attacks and privacy
breaches by proposing a novel strategy combining Proof of Chain (PoC)
and Causal Dependency mechanisms.
• Aim to overcome challenges concerning privacy preservation and vehicle
traceability, which hinder the widespread deployment of VANETs, ensuring
that participating cars' identities and whereabouts remain protected.
• Enable secure communication among vehicles and roadside infrastructure
to manage traffic effectively while ensuring data integrity and non-
repudiation, crucial for conveying vital safety information.
• Strive to find a balance between robust security measures and the seamless
exchange of critical safety and traffic-related information, ensuring that
privacy and security concerns do not impede the functionality of VANETs.
21-11-2023 Batch no : 13 12
Flow Chart
21-11-2023 Batch no : 13 13
Explanation
• OBUs generate a signature key that is used to sign their messages and prove
their identity.
• They apply a probabilistic function to their signature key.
• They introduce dummy packets contain random data instead of fake data.
• OBU’s send a request to join a Trusted Authority (TA).
• The TA receives the request from the OBU and verifies its signature key.
• If the verification is successful, the TA sends a certification key to the OBU.
• The certification key is used to prove the OBU’s identity and verify its
signature by other OBU’s or RSU’s.
• RSUs verify received messages using OBUs' certification-derived public
keys; upon successful signature validation, RSUs grant access to requested
services or information.
21-11-2023 Batch no : 13 14
Process Diagram
21-11-2023 Batch no : 13 15
Software Details
Software used
Ns-3(Network Simulator version 3).
Language used
C++.
Software description
• It is a discrete event simulator for networking research.
• It provides substantial support to simulate bunch of protocols like TCP, FTP,
UDP, https and DSR.
• It simulates wired and wireless network.
• It helps users to visualize the behavior of network simulations.
21-11-2023 Batch no : 13 16
Methodology for the Proposed work
Causal Dependency
• Causal Dependency refers to the idea that in a VANET, the trustworthiness and
reliability of information exchanged between vehicles or between a vehicle
and roadside infrastructure should be established based on a causal
relationship.
Proof of Chain (PoC) Method
• Proof of Chain (PoC) is a security mechanism designed to establish the causal
dependency of messages or events in VANETs. It is a method used to provide
evidence that a particular event or message is part of a legitimate chain of events or
messages with a verifiable source.
21-11-2023 Batch no : 13 17
Results and Discussion
• Causal dependency tracking captures the inter-node relationships and
dependencies, offering a more comprehensive view of data flow.
• Causal dependency enables the reconstruction of true data flow patterns,
enhancing the accuracy and reliability of tracing data propagation paths.
• Causal dependency is fundamental in preserving meaningful traceability as the
system matures and adapts to increasing complexities.
• Causal dependency fosters a robust framework that can navigate intricate
network scenarios and maintain reliable traceability in the evolving landscape
of blockchain technology.
21-11-2023 Batch no : 13 18
Output
21-11-2023 Batch no : 13 19
References
1. L. E. Funderburg, H. Ren and I. -Y. Lee, "Pairing-Free Signatures with Insider-Attack Resistance for Vehicular
Ad-Hoc Networks (VANETs)," in IEEE Access, vol. 9, pp. 159587-159597, 2021, Doi:
10.1109/ACCESS.2021.3131189.
2. B T Rao, B. Tarakeswara, RSM Lakshmi Patibandla, and V. Lakshman Narayana. "Comparative study on security
and privacy issues in VANETs." Cloud and IoT‐Based Vehicular Ad Hoc Networks (2021): 145-162.
3. L. Wei, J. Cui, H. Zhong, Y. Xu and L. Liu, "Proven Secure Tree-Based Authenticated Key Agreement for
Securing V2V and V2I Communications in VANETs," in IEEE Transactions on Mobile Computing, vol. 21, no. 9,
pp. 3280-3297, 1 Sept. 2022, Doi: 10.1109/TMC.2021.3056712.
4. F. Wu, X. Zhang, C. Zhang, X. Chen, W. Fan and Y. Liu, "Batch-Assisted Verification Scheme for Reducing
Message Verification Delay of the Vehicular Ad Hoc Networks," in IEEE Internet of Things Journal, vol. 7, no. 9,
pp. 8144-8156, Sept. 2020, Doi: 10.1109/JIOT.2020.3004811.
5. C. M. Huang and C. -F. Lai, "The Delay-Constrained and Network-Situation-Aware V2V2I VANET Data
Offloading Based on the Multi-Access Edge Computing (MEC) Architecture," in IEEE Open Journal of Vehicular
Technology, vol. 1, pp. 331-347, 2020, Doi: 10.1109/OJVT.2020.3028684
6. Yousefi kia, Mohammad, Mohsen Saniei, and Seyyed Ghodratollah Seifossadat. "A novel cyber‐attack modelling
and detection in overcurrent protection relays based on wavelet signature analysis." IET Generation, Transmission
& Distribution (2023).
21-11-2023 Batch no : 13 20
References
7. T. Chatterjee, R. Karmakar, G. Kaddoum, S. Chattopadhyay and S. Chakraborty, "A Survey of VANET/V2X
Routing from the Perspective of Non-Learning- and Learning-Based Approaches," in IEEE Access, vol. 10, pp.
23022-23050, 2022, Doi: 10.1109/ACCESS.2022.3152767.
8. X. Guo, Y. Chen, L. Cao, D. Zhang and Y. Jiang, "A receiver-forwarding decision scheme based on Bayesian for
NDN-VANET," in China Communications, vol. 17, no. 8, pp. 106-120, Aug. 2020, Doi:
10.23919/JCC.2020.08.009.
9. J. Zhang and Q. Zhang, "Comment on “Secure and Lightweight Conditional Privacy-Preserving Authentication for
Securing Traffic Emergency Messages in VANETs”,in IEEE Transactions on Information Forensics and Security,
vol. 18, pp. 1037-1038, 2023, Doi: 10.1109/TIFS.2021.3066277.
10. J. Zhang and Q. Zhang, "Comment on “Secure and Lightweight Conditional Privacy-Preserving Authentication for
Securing Traffic Emergency Messages in VANETs”,in IEEE Transactions on Information Forensics and Security,
vol. 18, pp. 1037-1038, 2023, Doi: 10.1109/TIFS.2021.3066277.
21-11-2023 Batch no : 13 21

More Related Content

PDF
First Review Final PPT.pdf for final years
PDF
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
PDF
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
PDF
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
PDF
Data Dissemination in VANET: A Review
PDF
24 83-1-pb
PDF
LSKA-ID: A lightweight security and key agreement protocol based on an identi...
PDF
A Computational Analysis of ECC Based Novel Authentication Scheme in VANET
First Review Final PPT.pdf for final years
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Data Dissemination in VANET: A Review
24 83-1-pb
LSKA-ID: A lightweight security and key agreement protocol based on an identi...
A Computational Analysis of ECC Based Novel Authentication Scheme in VANET

Similar to Final Presentation PPT for final years project (20)

PDF
A secure trust-based protocol for hierarchical routing in wireless sensor ne...
PDF
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
PDF
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
PDF
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
PDF
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
PDF
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
PDF
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
PDF
Jb3515641568
PDF
Improving Network Security in MANETS using IEEACK
PDF
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
DOC
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
PDF
Volume 2-issue-6-1987-1992
PDF
Volume 2-issue-6-1987-1992
PDF
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
PDF
Cp3210151018
PDF
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
PDF
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
PDF
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
PDF
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
PDF
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
A secure trust-based protocol for hierarchical routing in wireless sensor ne...
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
Jb3515641568
Improving Network Security in MANETS using IEEACK
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Cp3210151018
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
Ad

Recently uploaded (20)

PPTX
CEE 2 REPORT G7.pptxbdbshjdgsgjgsjfiuhsd
PDF
Mega Projects Data Mega Projects Data
PPT
Chapter 2 METAL FORMINGhhhhhhhjjjjmmmmmmmmm
PPTX
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
PPTX
Data_Analytics_and_PowerBI_Presentation.pptx
PPT
Quality review (1)_presentation of this 21
PDF
Galatica Smart Energy Infrastructure Startup Pitch Deck
PDF
“Getting Started with Data Analytics Using R – Concepts, Tools & Case Studies”
PPT
Chapter 3 METAL JOINING.pptnnnnnnnnnnnnn
PPTX
Introduction-to-Cloud-ComputingFinal.pptx
PPTX
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
PPTX
Business Acumen Training GuidePresentation.pptx
PPTX
Database Infoormation System (DBIS).pptx
PPTX
05. PRACTICAL GUIDE TO MICROSOFT EXCEL.pptx
PPTX
climate analysis of Dhaka ,Banglades.pptx
PPTX
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
PDF
Foundation of Data Science unit number two notes
PPT
Miokarditis (Inflamasi pada Otot Jantung)
PPTX
Computer network topology notes for revision
CEE 2 REPORT G7.pptxbdbshjdgsgjgsjfiuhsd
Mega Projects Data Mega Projects Data
Chapter 2 METAL FORMINGhhhhhhhjjjjmmmmmmmmm
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
Data_Analytics_and_PowerBI_Presentation.pptx
Quality review (1)_presentation of this 21
Galatica Smart Energy Infrastructure Startup Pitch Deck
“Getting Started with Data Analytics Using R – Concepts, Tools & Case Studies”
Chapter 3 METAL JOINING.pptnnnnnnnnnnnnn
Introduction-to-Cloud-ComputingFinal.pptx
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
Business Acumen Training GuidePresentation.pptx
Database Infoormation System (DBIS).pptx
05. PRACTICAL GUIDE TO MICROSOFT EXCEL.pptx
climate analysis of Dhaka ,Banglades.pptx
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
Foundation of Data Science unit number two notes
Miokarditis (Inflamasi pada Otot Jantung)
Computer network topology notes for revision
Ad

Final Presentation PPT for final years project

  • 1. AN EFFICIENT PRIVACY PRESERVING AUTHENTICATION WITH INSIDER ATTACK RESISTANCE FOR VANET Presented by 1.SANJAY K (722820106116) 2.SARAN S (722820106121) 3.SOMANSANKARA P R (722820106134) 4.VISHNUPRASANTH B (722820106159) Guided by Mrs. K.Suganyadevi.,M.E.,(Ph.D.,) ASSISTANT PROFESSOR DEPARTMENT OF ECE SRI ESHWAR COLLEGE OF ENGINEERING. 21-11-2023 1 Batch no : 13
  • 2. 21-11-2023 Batch no : 13 2 Presentation Outline • Introduction • Abstract • Literature Survey • Objective • Block Diagram • Expected Outcome • Execution Plan • References
  • 3. 21-11-2023 Batch no : 13 3 Introduction • VANETs support dynamic communication between fast-moving vehicles using OBUs and RSUs. They facilitate safety-related applications and optimize traffic through V2V and V2I protocols. • VANETs demand robust security measures, including authentication for communication between vehicles, privacy protection against unauthorized access, and data verification to ensure integrity. • Insider attacks in VANETs originate from authenticated entities within the network. • Balancing real-time communication and efficiency with comprehensive security is crucial. • Maintaining VANETs' efficiency while ensuring robust security against insider threats requires a delicate balance in security measures to safeguard communication while real-time exchanges between vehicles.
  • 4. 21-11-2023 Batch no : 13 4 Abstract • VANETs, while pivotal for traffic management and safety, face vulnerabilities like insider attacks due to their open and dynamic nature, posing significant challenges for privacy and authentication. • A novel approach merges Proof of Chain (PoC) and Causal Dependency mechanisms to address privacy concerns and resist insider attacks during authentication in VANETs. • Causal Dependency mechanisms ensure message sequencing, guarding against replay attacks and aiding vehicles in determining the relevance of received information to their current state. • By implementing these methods, individual vehicle traceability is significantly reduced, enabling data exchange, traffic management, and safety communication without compromising privacy or security in VANETs.
  • 5. 21-11-2023 Batch no : 13 5 Literature Survey Paper Title Journal details Methodology Advantages/ Disadvantages 1.PairingFree Signatures with Insider Attack Resistance for Vehicular AdHoc Networks (VANETs) IEEE Access, vol. 9, pp. 159587-159597. Cryptographic operations measured using C MIRACL Core Cryptographic Library Advantages: It ensures message integrity, authentication, privacy, tracing, non-repudiation, and resistance to insider attacks Disadvantages: Limited Scalability, Increased Latency, Complexity of Revocation. 2. Comparative study on security and privacy issues in VANETs Cloud and IoT‐Based Vehicular Ad Hoc Networks (2021): 145-162. Geolocalization Abilities, Dedicated Short-Range Communication (DSRC), Low Motionlessness Necessities Advantages: It achieves security and privacy in VANETs. It enhances vehicle authentication time, collision rate, data transmission rate, and privacy preservation levels Disadvantages: Rapidly Evolving Technology, Availability of Data, Scope and Complexity
  • 6. 21-11-2023 Batch no : 13 6 Literature Survey Paper Title Journal details Methodology Advantages/ Disadvantages 3.Proven Secure Tree- Based Authenticated Key Agreement for Securing V2V and V2I Communications in VANETs IEEE Transactions on Mobile Computing, vol. 21, no. 9, pp. 3280-3297, 1 Sept. 2022, doi: 10.1109/TMC.2021. 3056712. V2V and V2I Communications, Full authentication mechanism, Light weight Cryptography mechanism Advantages: The outcome is proven secure, it has low computational and communication overhead Disadvantages: Scalability, Complexity, Infrastructure Dependence, Single Point of Failure. 4.Batch-Assisted Verification Scheme for Reducing Message Verification Delay of the Vehicular Ad Hoc Networks IEEE Internet of Things Journal, vol. 7, no. 9, pp. 8144- 8156, Sept. 2020, doi: 10.1109/JIOT.2020.3 004811 Dedicated Short Range Communication (DSRC) protocol, Collaborative authentication method. Advantages: It reduces verification delay and achieves fast message verification Disadvantages: Publication Bias, Rapidly Evolving Technology, Availability of Data, Scope and Complexity
  • 7. 21-11-2023 Batch no : 13 7 Literature Survey Paper Title Journal details Methodology Advantages/ Disadvantages 5.The Delay- Constrained and Network-Situation- Aware V2V2I VANET Data Offloading Based on the Multi-Access Edge Computing (MEC) Architecture, IEEE Open Journal of Vehicular Technology, vol. 1, pp. 331-347, 2020, doi: 10.1109/OJVT.2020. 3028684. MEC protocol Advantages: Ensures lifetime and quality of the V2V2I path to derive suitable offloading paths Disadvantages: Limited scope, Simplified assumptions, Lack of real-world validation 6.A novel cyber‐attack modelling and detection in overcurrent protection relays based on wavelet signature analysis. IET Generation, Transmission & Distribution (2023). Wavelet analysis,BRFD algorithm,NDN-VANET interconnection techniques Advantages: Detecting cyber attacks, reducing redundancy and improving packet satisfaction rate and delay Disadvantages: It does not provide a comprehensive analysis of all possible cyber threats and vulnerabilities in the smart grid
  • 8. 21-11-2023 Batch no : 13 8 Literature Survey Paper Title Journal details Methodology Advantages/ Disadvantages 7.A Survey of VANET/V2X Routing from the Perspective of Non-Learning- and Learning-Based Approaches IEEE Access, vol. 10, pp. 23022- 23050, 2022, Doi: 10.1109/ACCESS.2 022.3152767. V2X routing protocols Advantages: It delivers optimized packet delivery, handling congestion and shadowing effects, reducing network overhead Disadvantages: Potential limitation, Does not capture future protocols, a lack of coverage of innovative approaches 8.A receiver-forwarding decision scheme based on Bayesian for NDN- VANET, China Communications, vol. 17, no. 8, pp. 106-120, Aug. 2020, doi: 10.23919/JCC.2020. 08.009. Bayesian decision theory and the BRFD (Bayesian-based Receiver Forwarding Decision) scheme Advantages: Reducing redundancy and improving packet satisfaction rate and delay Disadvantages: It does not provide a comprehensive evaluation of the proposed BRFD scheme.
  • 9. 21-11-2023 Batch no : 13 9 Literature Survey Paper Title Journal details Methodology Advantages/ Disadvantages 9.Comment on Secure and Lightweight Conditional Privacy- Preserving Authentication for Securing Traffic Emergency Messages in VANETs IEEE Transactions on Information Forensics and Security, vol. 18, pp. 1037-1038, 2023, doi: 10.1109/TIFS.2021. 3066277 PPA (privacy-preserving authentication) protocol Advantages: The scheme does not satisfy conditional privacy and allows for the forging of valid signatures on arbitrary messages Disadvantages: Reliability and Availability, Privacy Concerns, Scalability, Security Vulnerabilities 10.R.S. State-of-the-art approach to clustering protocols in VANET: a survey Wireless Netw 26, 5307–5336 (2020). https://doi.org/10.10 07/s11276-020- 02392-2. Clustering protocol,MAC protocol Advantages: Improved scalability and reliability Disadvantages: Communication overhead,limited clustered node percentage
  • 10. 21-11-2023 Batch no : 13 10 Objective • Implement causal dependency mechanisms to ensure proper message sequencing, guarding against replay attacks and enabling accurate relevance assessment of received information based on current conditions. • Utilize causal dependency to reduce the traceability of individual cars within the VANET network, enhancing privacy measures without compromising communication efficiency. • Implement causal dependency mechanisms to deter unauthorized tracking or tracing of vehicles, thereby safeguarding sensitive location and identity information. • Utilize causal dependency to enable secure data exchange among vehicles while reducing the risk of privacy breaches or malicious tracking attempts in VANETs.
  • 11. 21-11-2023 Batch no : 13 11 Motivation of the Work • Address the vulnerability of VANETs to insider attacks and privacy breaches by proposing a novel strategy combining Proof of Chain (PoC) and Causal Dependency mechanisms. • Aim to overcome challenges concerning privacy preservation and vehicle traceability, which hinder the widespread deployment of VANETs, ensuring that participating cars' identities and whereabouts remain protected. • Enable secure communication among vehicles and roadside infrastructure to manage traffic effectively while ensuring data integrity and non- repudiation, crucial for conveying vital safety information. • Strive to find a balance between robust security measures and the seamless exchange of critical safety and traffic-related information, ensuring that privacy and security concerns do not impede the functionality of VANETs.
  • 12. 21-11-2023 Batch no : 13 12 Flow Chart
  • 13. 21-11-2023 Batch no : 13 13 Explanation • OBUs generate a signature key that is used to sign their messages and prove their identity. • They apply a probabilistic function to their signature key. • They introduce dummy packets contain random data instead of fake data. • OBU’s send a request to join a Trusted Authority (TA). • The TA receives the request from the OBU and verifies its signature key. • If the verification is successful, the TA sends a certification key to the OBU. • The certification key is used to prove the OBU’s identity and verify its signature by other OBU’s or RSU’s. • RSUs verify received messages using OBUs' certification-derived public keys; upon successful signature validation, RSUs grant access to requested services or information.
  • 14. 21-11-2023 Batch no : 13 14 Process Diagram
  • 15. 21-11-2023 Batch no : 13 15 Software Details Software used Ns-3(Network Simulator version 3). Language used C++. Software description • It is a discrete event simulator for networking research. • It provides substantial support to simulate bunch of protocols like TCP, FTP, UDP, https and DSR. • It simulates wired and wireless network. • It helps users to visualize the behavior of network simulations.
  • 16. 21-11-2023 Batch no : 13 16 Methodology for the Proposed work Causal Dependency • Causal Dependency refers to the idea that in a VANET, the trustworthiness and reliability of information exchanged between vehicles or between a vehicle and roadside infrastructure should be established based on a causal relationship. Proof of Chain (PoC) Method • Proof of Chain (PoC) is a security mechanism designed to establish the causal dependency of messages or events in VANETs. It is a method used to provide evidence that a particular event or message is part of a legitimate chain of events or messages with a verifiable source.
  • 17. 21-11-2023 Batch no : 13 17 Results and Discussion • Causal dependency tracking captures the inter-node relationships and dependencies, offering a more comprehensive view of data flow. • Causal dependency enables the reconstruction of true data flow patterns, enhancing the accuracy and reliability of tracing data propagation paths. • Causal dependency is fundamental in preserving meaningful traceability as the system matures and adapts to increasing complexities. • Causal dependency fosters a robust framework that can navigate intricate network scenarios and maintain reliable traceability in the evolving landscape of blockchain technology.
  • 18. 21-11-2023 Batch no : 13 18 Output
  • 19. 21-11-2023 Batch no : 13 19 References 1. L. E. Funderburg, H. Ren and I. -Y. Lee, "Pairing-Free Signatures with Insider-Attack Resistance for Vehicular Ad-Hoc Networks (VANETs)," in IEEE Access, vol. 9, pp. 159587-159597, 2021, Doi: 10.1109/ACCESS.2021.3131189. 2. B T Rao, B. Tarakeswara, RSM Lakshmi Patibandla, and V. Lakshman Narayana. "Comparative study on security and privacy issues in VANETs." Cloud and IoT‐Based Vehicular Ad Hoc Networks (2021): 145-162. 3. L. Wei, J. Cui, H. Zhong, Y. Xu and L. Liu, "Proven Secure Tree-Based Authenticated Key Agreement for Securing V2V and V2I Communications in VANETs," in IEEE Transactions on Mobile Computing, vol. 21, no. 9, pp. 3280-3297, 1 Sept. 2022, Doi: 10.1109/TMC.2021.3056712. 4. F. Wu, X. Zhang, C. Zhang, X. Chen, W. Fan and Y. Liu, "Batch-Assisted Verification Scheme for Reducing Message Verification Delay of the Vehicular Ad Hoc Networks," in IEEE Internet of Things Journal, vol. 7, no. 9, pp. 8144-8156, Sept. 2020, Doi: 10.1109/JIOT.2020.3004811. 5. C. M. Huang and C. -F. Lai, "The Delay-Constrained and Network-Situation-Aware V2V2I VANET Data Offloading Based on the Multi-Access Edge Computing (MEC) Architecture," in IEEE Open Journal of Vehicular Technology, vol. 1, pp. 331-347, 2020, Doi: 10.1109/OJVT.2020.3028684 6. Yousefi kia, Mohammad, Mohsen Saniei, and Seyyed Ghodratollah Seifossadat. "A novel cyber‐attack modelling and detection in overcurrent protection relays based on wavelet signature analysis." IET Generation, Transmission & Distribution (2023).
  • 20. 21-11-2023 Batch no : 13 20 References 7. T. Chatterjee, R. Karmakar, G. Kaddoum, S. Chattopadhyay and S. Chakraborty, "A Survey of VANET/V2X Routing from the Perspective of Non-Learning- and Learning-Based Approaches," in IEEE Access, vol. 10, pp. 23022-23050, 2022, Doi: 10.1109/ACCESS.2022.3152767. 8. X. Guo, Y. Chen, L. Cao, D. Zhang and Y. Jiang, "A receiver-forwarding decision scheme based on Bayesian for NDN-VANET," in China Communications, vol. 17, no. 8, pp. 106-120, Aug. 2020, Doi: 10.23919/JCC.2020.08.009. 9. J. Zhang and Q. Zhang, "Comment on “Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs”,in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 1037-1038, 2023, Doi: 10.1109/TIFS.2021.3066277. 10. J. Zhang and Q. Zhang, "Comment on “Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs”,in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 1037-1038, 2023, Doi: 10.1109/TIFS.2021.3066277.

Editor's Notes

  • #2: Don’t include any decorative contents ( images , animations , sounds etc..) Don’t change background in to different colors. Ensure that date of presentation & batch number is updated before sending this ppt.
  • #3: This order can be varied based on the project Domain
  • #4: About the domain of your project (i.e embedded, wireless n/w , Iot etc….) Problems related to your project can be highlighted (Context and background of the idea)
  • #5: Discuss about the problem statement identified in your project and their solutions (not in paragraphs ….only bulletins )
  • #6: A minimum of 4 journal papers to be used. (select papers from the Journals like IEEE, Springer, Elsevier, Wiley) Paper details : title of the paper Journal Detail : Name of the journal , year , volume no , issue no Methodology : Technique , Algorithm, Domain etc…
  • #7: A minimum of 4 journal papers to be used. (select papers from the Journals like IEEE, Springer, Elsevier, Wiley) Paper details : title of the paper Journal Detail : Name of the journal , year , volume no , issue no Methodology : Technique , Algorithm, Domain etc…
  • #8: A minimum of 4 journal papers to be used. (select papers from the Journals like IEEE, Springer, Elsevier, Wiley) Paper details : title of the paper Journal Detail : Name of the journal , year , volume no , issue no Methodology : Technique , Algorithm, Domain etc…
  • #9: A minimum of 4 journal papers to be used. (select papers from the Journals like IEEE, Springer, Elsevier, Wiley) Paper details : title of the paper Journal Detail : Name of the journal , year , volume no , issue no Methodology : Technique , Algorithm, Domain etc…
  • #10: A minimum of 4 journal papers to be used. (select papers from the Journals like IEEE, Springer, Elsevier, Wiley) Paper details : title of the paper Journal Detail : Name of the journal , year , volume no , issue no Methodology : Technique , Algorithm, Domain etc…
  • #11: Mention the problem statement ….(what is your project work in statements …….not in paragraph ………only bulletin points)
  • #12: Mention the problem statement ….(what is your project work in statements …….not in paragraph ………only bulletin points)
  • #14: Explain about the proposed work
  • #15: Explain about the proposed work
  • #16: Provide Hardware / Software Details
  • #17: Project work flow
  • #18: Discuss about the Expected results from the Project
  • #20: Provide the list of references as per journal format Avoid putting links as Google.com, Wikipedia.com etc…. Provide the http link of the page or article refered
  • #21: Provide the list of references as per journal format Avoid putting links as Google.com, Wikipedia.com etc…. Provide the http link of the page or article refered