what are the security requirements and challenges of VANETs?
Solution
CHALLENGING ISSUE IN VANET :
Although the characteristics of VANET distinguishes it a different network but some
characteristics imposes some challenges to deploy the VANET. These are the following
categories:
Technical Challenges
:
The technical challenges deals with the technical obstacles which should be resolved before the
deployment of VANET. Some challenges are given below:
• Network Management:
Due to high mobility, the network topology and channel
condition change rapidly. Due to this, we can’t use structures like tree because these
structures can’t be set up and maintained as rapidly as the topology changed.
• Congestion and collision Control:
The unbounded network size also creates a
challenge. The traffic load is low in rural areas and night in even urban areas. Due to this,
the network partitions frequently occurs while in rush hours the traffic load is very high
and hence network is congested and collision occurs in the network.
• Environmental Impact:
VANETs use the electromagnetic waves for communication.
These waves are affected by the environment. Hence to deploy the VANET the
environmental impact must be considered.
• MAC Design:
VANET generally use the shared medium to communicate hence the
MAC design is the key issue. Many approaches have been given like TDMA, SDMA,
and CSMA etc. IEEE 802.11 adopted the CSMA based Mac for VANET.
• Security: As VANET provides the road safety applications which are life critical
therefore security of these messages must be satisfied
SECURITY ISSUES IN VANET
:
Among all the challenges of the VANET, security got less attention so far. VANET packets
contains life critical information hence it is necessary to make sure that these packets are not
inserted or modified by the attacker; likewise the liability of drivers should also be established
that they inform the traffic environment correctly and within time.
Real time Constraint:
VANET is time critical where safety related message should be
delivered with 100ms transmission delay. So to achieve real time constraint, fast cryptographic
algorithm should be used. Message and entity authentication must be done
in time.
• Data Consistency Liability:
In VANET even authenticate node can perform malicious
activities that can cause accidents or disturb the network. Hence a mechanism should be
designed to avoid this inconsistency. Correlation among the received data from different node
on particular information may avoid this type of inconsistency.
• Low tolerance for error:
Some protocols are designed on the basis of probability.
VANET uses life critical information on which action is performed in very short time. A
small error in probabilistic algorithm may cause harm.
Security requirements in VANET
:
VANET must satisfy some security requirements before they are deployed. A security system in
VANET should satisfy the following requirements:
• Authentication:
Authentication ensures that the message is generated by the legitimate
user. In VANET a vehicle reacts upon the information came from the other vehicle hence
authentication must be satisfied.
• Availability:
Availability requires that the information must be available to the legitimate
users. DoS Attacks can bring down the network and hence information cannot be shared.
• Non-Repudiation: Non-repudiation means a node cannot deny that he/she does not
transmit the message. It may be crucial to determine the correct sequence in crash
reconstruction.

More Related Content

PDF
SECURITY ISSUES AND SOLUTIONS IN VEHICULAR ADHOC NETWORK : A REVIEW APPROACH
PDF
Security issues and solutions in vehicular adhoc network a review approach
PDF
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
PDF
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
PPT
Security issues and challenges in MANET,VANET and FANET: A Survey
PPTX
Introduction to SDN: Software Defined Networking
PPTX
Asn unit 1
PPT
SECURITY ISSUES AND SOLUTIONS IN VEHICULAR ADHOC NETWORK : A REVIEW APPROACH
Security issues and solutions in vehicular adhoc network a review approach
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
Security issues and challenges in MANET,VANET and FANET: A Survey
Introduction to SDN: Software Defined Networking
Asn unit 1

Similar to what are the security requirements and challenges of VANETsSolu.pdf (20)

PPT
Unit-1 (1).ppt
PDF
IT6601 Mobile Computing Unit I
PDF
The capability to automatically carry out certain processing related to servi...
PDF
Chapter 20.pdf
PPTX
Mohammed Al Mulla - Best practices to secure working environments
PDF
Dfghjjhjnhhhnmjcghgghhhjjjjjhhhhjjjjjjjjjj
PDF
Review Paper on VANET
PDF
The Not So Smart Grid
PDF
The Not So Smart Grid
PPT
Spiceworks IT Boot Camp - Pt. 1
PDF
Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...
DOCX
Activity 3 watch the video and answer
PDF
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
PDF
abstract LNG world
PDF
chaos-monkey-increasing (1) (1)
PPTX
PACE-IT: Common WAN Components and Issues
PPTX
An internet of things based lift protective maintenance system.pptx
PDF
Telco Cloud - 01. introduction to Telco cloud
PPTX
WMN Chapter5.pptx
PPTX
Manet - The Art of Networking without a Network
Unit-1 (1).ppt
IT6601 Mobile Computing Unit I
The capability to automatically carry out certain processing related to servi...
Chapter 20.pdf
Mohammed Al Mulla - Best practices to secure working environments
Dfghjjhjnhhhnmjcghgghhhjjjjjhhhhjjjjjjjjjj
Review Paper on VANET
The Not So Smart Grid
The Not So Smart Grid
Spiceworks IT Boot Camp - Pt. 1
Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...
Activity 3 watch the video and answer
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
abstract LNG world
chaos-monkey-increasing (1) (1)
PACE-IT: Common WAN Components and Issues
An internet of things based lift protective maintenance system.pptx
Telco Cloud - 01. introduction to Telco cloud
WMN Chapter5.pptx
Manet - The Art of Networking without a Network
Ad

More from arjuncp10 (20)

PDF
I l Show that if X has the discrete topology, then its only conn.pdf
PDF
In 2006 the CEO of Bear Sterns, James Caynes, received a compensatio.pdf
PDF
How would a CFE devise a plan to prevent subsequent employee fraud.pdf
PDF
Hilary rode her horse for 8 miles until it was hurt.Then she walked .pdf
PDF
fully comments for my program, thank you will thumb up#include io.pdf
PDF
Find the admittance Yab in the circuit seen in the figure. Take that.pdf
PDF
Diversity Paper Each student will complete a diversity research assig.pdf
PDF
Detailed solutions please 1. Let R and S be commutative rings and le.pdf
PDF
Describe the mechanisms of asexual reproduction inProkaryotesPr.pdf
PDF
Define intermediate phenotype and then imagine some intermediate phe.pdf
PDF
Consider a population of lizards living on the coast of Africa. A sto.pdf
PDF
Can “discovery science” (for example, the discovery of a new species.pdf
PDF
C++Write a function void headEnqueue(Queue q, int key) which enqu.pdf
PDF
All of the following are features or functions of nanobodies except _.pdf
PDF
A girl running at a constant speed of 1.4ms in a straight line thro.pdf
PDF
You have a rural dial-up customer who complains that a large number .pdf
PDF
You are given a mixed culture containing a anaerobic thermophile, ae.pdf
PDF
Woyld removing phenylethyl alcohol from PEA alter the mediumsS.pdf
PDF
Which abstraction uses slates, state transitions, inputs and outputs .pdf
PDF
What is the target cell for the hormone AngiotensionogenSolut.pdf
I l Show that if X has the discrete topology, then its only conn.pdf
In 2006 the CEO of Bear Sterns, James Caynes, received a compensatio.pdf
How would a CFE devise a plan to prevent subsequent employee fraud.pdf
Hilary rode her horse for 8 miles until it was hurt.Then she walked .pdf
fully comments for my program, thank you will thumb up#include io.pdf
Find the admittance Yab in the circuit seen in the figure. Take that.pdf
Diversity Paper Each student will complete a diversity research assig.pdf
Detailed solutions please 1. Let R and S be commutative rings and le.pdf
Describe the mechanisms of asexual reproduction inProkaryotesPr.pdf
Define intermediate phenotype and then imagine some intermediate phe.pdf
Consider a population of lizards living on the coast of Africa. A sto.pdf
Can “discovery science” (for example, the discovery of a new species.pdf
C++Write a function void headEnqueue(Queue q, int key) which enqu.pdf
All of the following are features or functions of nanobodies except _.pdf
A girl running at a constant speed of 1.4ms in a straight line thro.pdf
You have a rural dial-up customer who complains that a large number .pdf
You are given a mixed culture containing a anaerobic thermophile, ae.pdf
Woyld removing phenylethyl alcohol from PEA alter the mediumsS.pdf
Which abstraction uses slates, state transitions, inputs and outputs .pdf
What is the target cell for the hormone AngiotensionogenSolut.pdf
Ad

Recently uploaded (20)

PPTX
Education and Perspectives of Education.pptx
PPTX
Computer Architecture Input Output Memory.pptx
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PDF
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
semiconductor packaging in vlsi design fab
PDF
Complications of Minimal Access-Surgery.pdf
PDF
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 1).pdf
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PDF
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI .pdf
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
International_Financial_Reporting_Standa.pdf
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PDF
Mucosal Drug Delivery system_NDDS_BPHARMACY__SEM VII_PCI.pdf
PDF
Race Reva University – Shaping Future Leaders in Artificial Intelligence
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PDF
Uderstanding digital marketing and marketing stratergie for engaging the digi...
PPTX
Core Concepts of Personalized Learning and Virtual Learning Environments
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
Education and Perspectives of Education.pptx
Computer Architecture Input Output Memory.pptx
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
B.Sc. DS Unit 2 Software Engineering.pptx
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
semiconductor packaging in vlsi design fab
Complications of Minimal Access-Surgery.pdf
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 1).pdf
AI-driven educational solutions for real-life interventions in the Philippine...
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI .pdf
Cambridge-Practice-Tests-for-IELTS-12.docx
International_Financial_Reporting_Standa.pdf
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
Mucosal Drug Delivery system_NDDS_BPHARMACY__SEM VII_PCI.pdf
Race Reva University – Shaping Future Leaders in Artificial Intelligence
Share_Module_2_Power_conflict_and_negotiation.pptx
Uderstanding digital marketing and marketing stratergie for engaging the digi...
Core Concepts of Personalized Learning and Virtual Learning Environments
Environmental Education MCQ BD2EE - Share Source.pdf

what are the security requirements and challenges of VANETsSolu.pdf

  • 1. what are the security requirements and challenges of VANETs? Solution CHALLENGING ISSUE IN VANET : Although the characteristics of VANET distinguishes it a different network but some characteristics imposes some challenges to deploy the VANET. These are the following categories: Technical Challenges : The technical challenges deals with the technical obstacles which should be resolved before the deployment of VANET. Some challenges are given below: • Network Management: Due to high mobility, the network topology and channel condition change rapidly. Due to this, we can’t use structures like tree because these structures can’t be set up and maintained as rapidly as the topology changed. • Congestion and collision Control: The unbounded network size also creates a challenge. The traffic load is low in rural areas and night in even urban areas. Due to this, the network partitions frequently occurs while in rush hours the traffic load is very high and hence network is congested and collision occurs in the network. • Environmental Impact: VANETs use the electromagnetic waves for communication. These waves are affected by the environment. Hence to deploy the VANET the environmental impact must be considered. • MAC Design: VANET generally use the shared medium to communicate hence the MAC design is the key issue. Many approaches have been given like TDMA, SDMA, and CSMA etc. IEEE 802.11 adopted the CSMA based Mac for VANET. • Security: As VANET provides the road safety applications which are life critical therefore security of these messages must be satisfied SECURITY ISSUES IN VANET : Among all the challenges of the VANET, security got less attention so far. VANET packets contains life critical information hence it is necessary to make sure that these packets are not
  • 2. inserted or modified by the attacker; likewise the liability of drivers should also be established that they inform the traffic environment correctly and within time. Real time Constraint: VANET is time critical where safety related message should be delivered with 100ms transmission delay. So to achieve real time constraint, fast cryptographic algorithm should be used. Message and entity authentication must be done in time. • Data Consistency Liability: In VANET even authenticate node can perform malicious activities that can cause accidents or disturb the network. Hence a mechanism should be designed to avoid this inconsistency. Correlation among the received data from different node on particular information may avoid this type of inconsistency. • Low tolerance for error: Some protocols are designed on the basis of probability. VANET uses life critical information on which action is performed in very short time. A small error in probabilistic algorithm may cause harm. Security requirements in VANET : VANET must satisfy some security requirements before they are deployed. A security system in VANET should satisfy the following requirements: • Authentication: Authentication ensures that the message is generated by the legitimate user. In VANET a vehicle reacts upon the information came from the other vehicle hence authentication must be satisfied. • Availability: Availability requires that the information must be available to the legitimate users. DoS Attacks can bring down the network and hence information cannot be shared. • Non-Repudiation: Non-repudiation means a node cannot deny that he/she does not transmit the message. It may be crucial to determine the correct sequence in crash reconstruction.