Inter Vehicle Inter Vehicle CommunicationCommunication
Akhil Parekh
Manan Shah
OutlookOutlook IntroductionIntroduction MotivationMotivation Overview of Smart VehicleOverview of Smart Vehicle ArchitectureArchitecture Types of CommunicationTypes of Communication Radio BandsRadio Bands ProtocolsProtocols Classes of Information and Information ParametersClasses of Information and Information Parameters Types of IVCTypes of IVC Threats, Challenges and Attacks Threats, Challenges and Attacks Security Architecture Security Architecture Applications Applications Real Time ExamplesReal Time Examples ConclusionsConclusions
IntroductionIntroduction
What is Inter Vehicle Communication?What is Inter Vehicle Communication?
Communication among drivers and vehicles in Intelligent Communication among drivers and vehicles in Intelligent Transportation Systems (ITS)Transportation Systems (ITS)
Communication conducted between onboard information Communication conducted between onboard information equipmentequipment
IVC enables the service of exchange and distribution of dataIVC enables the service of exchange and distribution of data
MotivationMotivation
Study shows - “About 60% roadway collisions could be avoided if the operator of the vehicle was provided warning at least one-half second prior to a collision”
(- US. Patent No. 5,613,039)
Approximately 40,000 people are killed each year on the European Union’s roads, with around 1.7 million people incurring critical injuries.
The annual costs associated with traffic accidents total nearly 3 percent of the world’s gross domestic product (GDP), or roughly US$1 trillion.
Number of vehicles is increasing faster than the number of roads, leading to frequent traffic jams.
Constraints of human drivers’ perception
Line-of-sight limitation of brake lightLarge processing/forwarding delay for emergency events.
Statistics Statistics
CarsCars TrucksTrucks(class 7, 8)(class 7, 8)
On-road populationOn-road population 231 million231 million 3.5 million3.5 million
Annual New Vehicle SalesAnnual New Vehicle Sales 16 million16 million 260, 000260, 000
Annual VMTAnnual VMT 8,4008,400 63,00063,000
Total FatalitiesTotal Fatalities 37,44637,446 4,3904,390
Total InjuriesTotal Injuries 2,672,0002,672,000 116,000116,000
Estimated Total cost of Estimated Total cost of crashescrashes
$188 billion$188 billion $30 billion$30 billion
Overview of Smart VehicleOverview of Smart Vehicle
F o r w a r d r a d a r
C o m p u t i n g p l a t f o r m
E v e n t d a t a r e c o r d e r ( E D R )
P o s i t i o n i n g s y s t e m
R e a r r a d a r
C o m m u n i c a t i o n f a c i l i t y
D i s p l a y
TermsTerms
EDR – EDR – • used in vehicles to register all important parameters such as velocity, used in vehicles to register all important parameters such as velocity,
acceleration, etc. especially during abnormal situations, such as acceleration, etc. especially during abnormal situations, such as accidentsaccidents
• This data is used for reconstruction.This data is used for reconstruction.
Forward radar-Forward radar-• Used to detect any forward obstacles as far as 200 meters Used to detect any forward obstacles as far as 200 meters
Positioning System-Positioning System-• Used to locate vehiclesUsed to locate vehicles• Accuracy can be improved by knowledge of road topologyAccuracy can be improved by knowledge of road topology
Computing platform-Computing platform-• Inputs from various components is used to generate useful informationInputs from various components is used to generate useful information
Pictorial ViewPictorial View
Flowchart of IVCFlowchart of IVC
ArchitectureArchitecture
Key ComponentsKey Components
On-board Equipment (OBE): On-board Equipment (OBE): human machine interfacehuman machine interface vehicle interfaces, (to on-board networks)vehicle interfaces, (to on-board networks) Applications, memory and processingApplications, memory and processing positioning, (GPS and dead-reckoning system) positioning, (GPS and dead-reckoning system) communications functions (radio, antenna, etc)communications functions (radio, antenna, etc)
Roadside Equipment (RSE): Roadside Equipment (RSE): access access “nodes” positioned along highways, at traffic intersections and “nodes” positioned along highways, at traffic intersections and other locationsother locations includes a DSRC radio, GPS, processor, and router to send messages includes a DSRC radio, GPS, processor, and router to send messages back through the IVC Networkback through the IVC Network
Network: Network: The IVC Network interconnects the road-side RSEs, network services, The IVC Network interconnects the road-side RSEs, network services,
and the network end-usersand the network end-users
General ViewGeneral View
Center for Information ProcessingCenter for Information ProcessingVehicle to Vehicle Communication
Vehicle to Infrastructure to Vehicle Communication
The VehicleThe Vehicleas a part ofas a part ofthe Networkthe Network
Types of CommunicationTypes of Communication
Vehicle to Vehicle Communication –Vehicle to Vehicle Communication – It demonstrates properties of both peer-to-peer network and mobile ad-It demonstrates properties of both peer-to-peer network and mobile ad-
hoc network.hoc network. In Peer-to-peer systems participants rely on another for service rather In Peer-to-peer systems participants rely on another for service rather
than solely relying on a dedicated and centralized infrastructurethan solely relying on a dedicated and centralized infrastructure A mobile ad hoc network is a collection of mobile hosts with wireless A mobile ad hoc network is a collection of mobile hosts with wireless
communication capabilities forming temporary network. communication capabilities forming temporary network.
Vehicle to Infrastructure CommunicationVehicle to Infrastructure Communication – – Information is available from roadside sourcesInformation is available from roadside sources uses 63 GHz banduses 63 GHz band Ex- Electronic Toll Collection (ETC)Ex- Electronic Toll Collection (ETC) allows for electronic payment of highway tollsallows for electronic payment of highway tolls communication is traditionally via microwave or infrared techniques, communication is traditionally via microwave or infrared techniques,
more recently through GPS technologymore recently through GPS technology an electronic monetary transaction occurs between a vehicle passing an electronic monetary transaction occurs between a vehicle passing
through a toll station and the toll agencythrough a toll station and the toll agency
Radio BandsRadio Bands
Communicating vehicles can use both infrared and radio wavesCommunicating vehicles can use both infrared and radio waves
Radio waves include VHF, micro, and millimeter wavesRadio waves include VHF, micro, and millimeter waves
Bluetooth operates at 2.4 GHz , and is reliable up to a speed of 80 km/h and Bluetooth operates at 2.4 GHz , and is reliable up to a speed of 80 km/h and range of 80meters.range of 80meters.
It can take up to 3 seconds to establish the communication.It can take up to 3 seconds to establish the communication.
requires a master and slave setuprequires a master and slave setup
alternative to Bluetooth is a new radio frequency technique called UWBalternative to Bluetooth is a new radio frequency technique called UWB
main advantages of UWB technology are its high data rate, low cost, etc.main advantages of UWB technology are its high data rate, low cost, etc.
TechnologiesTechnologies
Broadcasting Technologies:Broadcasting Technologies: I2V: RDS/TMC, DAB, DVB, DVB-H, S-DMB, T-DMBI2V: RDS/TMC, DAB, DVB, DVB-H, S-DMB, T-DMB
Short Range:Short Range: I2V: DSRCI2V: DSRC V2V: DSRC, UWB/SRRV2V: DSRC, UWB/SRR
Long Range:Long Range: V2I/I2V: GSM, GPRS/EDGE, UMTS, Wi-Fi, WiMAXV2I/I2V: GSM, GPRS/EDGE, UMTS, Wi-Fi, WiMAX V2V: GSM, GPRS/EDGE, UMTS, Wi-FiV2V: GSM, GPRS/EDGE, UMTS, Wi-Fi
In-Vehicle Systems:In-Vehicle Systems: Bluetooth, ZigbeeBluetooth, Zigbee
ProtocolsProtocolsMedium Access Control (MAC) in IVCMedium Access Control (MAC) in IVC
An ad-hoc network between vehicles is better suited for vehicle An ad-hoc network between vehicles is better suited for vehicle communications than centralized service.communications than centralized service.
Centralized architecture is not very efficient Centralized architecture is not very efficient
Wireless connectivity between moving vehicles can be provided by Wireless connectivity between moving vehicles can be provided by existing 802.11 compliant devices. existing 802.11 compliant devices.
Data rates of up to 54 Mbps can be achieved with 802.11a Data rates of up to 54 Mbps can be achieved with 802.11a hardware. hardware.
Robust MAC scheme is needed so that channel is shared efficiently Robust MAC scheme is needed so that channel is shared efficiently between mobile nodes.between mobile nodes.
Types- DMAC and ASDMTypes- DMAC and ASDM
Protocols (Cont’d)Protocols (Cont’d)Directional MACDirectional MAC
Ad-hoc network uses Omni-directional antennas (less spatial coverage) Directional antennas can be used to improve network performance by improving spatial reuse of channel DMAC uses physical layer’s directional transmission capabilities It tells the neighbors to delay their transmissions if it is going to harm pending transmission Helps to avoid hidden terminal and deafness problems RTS is send in circular way when node is ready to transmit Circular RTS consist of RTS-CTS-DATA-ACK
Adaptive Space Division MultiplexingAdaptive Space Division Multiplexing
Security and scalability are the major issues in wireless Security and scalability are the major issues in wireless communicationcommunication
Need of protocol to scale well as the available bandwidth shrinksNeed of protocol to scale well as the available bandwidth shrinks
ASDM breaks the roadway up into cells and contains a mapping ASDM breaks the roadway up into cells and contains a mapping function that maps the cell to time slotsfunction that maps the cell to time slots
Assignment rule - determines a time slot for each vehicleAssignment rule - determines a time slot for each vehicle
ASDM ensures QoS by maintaining adequate distance between ASDM ensures QoS by maintaining adequate distance between vehiclesvehicles
Vehicle keeps its frequency of transmission constant by maintaining Vehicle keeps its frequency of transmission constant by maintaining a certain following distance.a certain following distance.
Data Packet FormatData Packet Format
Network ID: To filter a packet from other network
Destination: Destination ID
Source: Source ID
Type/Seq: Type of packet/Number of sequence
Size: Size of the whole packet
Data: Actual data to transfer
CRC: 16-bit CRC to check the validity of the packet
Active Collision Warning /Avoidance SystemActive Collision Warning /Avoidance System
By continuing with the passive safety technologies, it will be difficult By continuing with the passive safety technologies, it will be difficult to reduce crash coststo reduce crash costs
Thus people have started developing active safety features in order Thus people have started developing active safety features in order to reduce coststo reduce costs
The introduction of automotive collision warning/ avoidance systems The introduction of automotive collision warning/ avoidance systems represents the next significant leap in vehicle safety technologyrepresents the next significant leap in vehicle safety technology
Automotive collision warning systems try to warn drivers of an Automotive collision warning systems try to warn drivers of an impending collision event. Allowing driver little bit extra time to reactimpending collision event. Allowing driver little bit extra time to react
If the collision warning systems are built in conjunction with drive by If the collision warning systems are built in conjunction with drive by wire technology, then the system could try to automatically wire technology, then the system could try to automatically maneuver the vehicle in order to avoid an impending collisionmaneuver the vehicle in order to avoid an impending collision
Contd…Contd…
An Object Vehicle and its Restricted Boundary Around a Subject An Object Vehicle and its Restricted Boundary Around a Subject VehicleVehicle
Parameter to Detect an Impending CollisionParameter to Detect an Impending Collision
Vehicles ParameterVehicles Parameter
There are two types of parameters: Static and DynamicThere are two types of parameters: Static and Dynamic
Static Parameters:Static Parameters: The static parameter indicates the size of the vehicle and the The static parameter indicates the size of the vehicle and the
location of its GPS receiver within itself.location of its GPS receiver within itself.
Dynamic Parameters:Dynamic Parameters: The dynamic parameters are vehicle’s position (Xn,Yn), speed The dynamic parameters are vehicle’s position (Xn,Yn), speed
acceleration, direction and the status of the brakes, steering acceleration, direction and the status of the brakes, steering
wheel, gas paddle, turn signal etc.wheel, gas paddle, turn signal etc.
Contd….Contd….
The static parameters are to be exchanged only once, The static parameters are to be exchanged only once, when two vehicles first form a networkwhen two vehicles first form a network
But, the dynamic parameters are to be continuously But, the dynamic parameters are to be continuously exchanged after certain interval of timeexchanged after certain interval of time
The successful operation of a Collision The successful operation of a Collision Warning/Avoidance system depends on how accurately Warning/Avoidance system depends on how accurately the vehicle’s parameters can be measuredthe vehicle’s parameters can be measured
All parameters, except the vehicle’s position and All parameters, except the vehicle’s position and direction can be measured with a very high accuracydirection can be measured with a very high accuracy
Classes of InformationClasses of Information
Movement Related – speed, velocity, acceleration, etcMovement Related – speed, velocity, acceleration, etc
Traffic Related – number of vehicles, traffic volume, density, Traffic Related – number of vehicles, traffic volume, density, congestioncongestion
Passenger Related – weather related information, Passenger Related – weather related information,
Movement Related Wireless TechnologyMovement Related Wireless Technology
Technologies Used:-Technologies Used:-Magnetic NailsMagnetic NailsMagnetic TapeMagnetic TapeLive wiresLive wiresRadar for imagingRadar for imagingCar to car communicationCar to car communicationInfrastructure to car communicationInfrastructure to car communication
Traffic Related Wireless TechnologyTraffic Related Wireless Technology
Infrastructure Based:-Infrastructure Based:- Adjusting traffic flowAdjusting traffic flow Operation on individual vehicleOperation on individual vehicle
Vehicle Based:-Vehicle Based:-Automated CollectionAutomated Collection Providing WarningsProviding Warnings
Passenger Related Wireless TechnologyPassenger Related Wireless Technology
Providing Information to passengersProviding Information to passengersWeatherWeatherTrafficTrafficGeneral NewsGeneral News
Interaction with passengersInteraction with passengersWeb accessWeb accessRouting, food/hotel/fuel inquiriesRouting, food/hotel/fuel inquiriesAccess to special services.Access to special services.
Types of IVCTypes of IVC
Stop And Go Adaptive Cruise ControlStop And Go Adaptive Cruise Control
Taking over automatic braking and driving when vehicles are in traffic jam
Co-operative DrivingCo-operative Driving
Co-operative driving exchanges respective data such as position velocity etc
Hazard WarningHazard Warning
includes obstacle warning, stopped vehicle warning and slowing down warning
Merging and Lane Changing WarningMerging and Lane Changing Warning
Safe and smooth lane change and merging with communication
Inter/Intra Platoon CommunicationInter/Intra Platoon Communication
Ad-hoc communication between vehicles
Mobile Ad-hoc NetworkMobile Ad-hoc Network
MANET is an autonomous system composed of mobile MANET is an autonomous system composed of mobile nodes which communicates with each other in wireless nodes which communicates with each other in wireless environment where there is no infrastructure supportenvironment where there is no infrastructure support
Every mobile node is self organized and relies on the Every mobile node is self organized and relies on the other nodes to forward informationother nodes to forward information
IVC networks are regarded as new type of MANET IVC networks are regarded as new type of MANET systemssystems
One of the key characteristics is the mobility of mobile One of the key characteristics is the mobility of mobile node which produces dynamic topology than wired node which produces dynamic topology than wired networksnetworks
Challenges in IVCChallenges in IVC
Liability Vs Privacy:- Accountability and liability of the vehicles is Liability Vs Privacy:- Accountability and liability of the vehicles is required and context specific information such as coordinates, time required and context specific information such as coordinates, time intervals should be possible to extract but such requirements raise intervals should be possible to extract but such requirements raise privacy concernsprivacy concerns
Real Time Communication:- Driver assistance applications are time Real Time Communication:- Driver assistance applications are time sensitive therefore security protocols should impose low processing sensitive therefore security protocols should impose low processing overheadoverhead
Vehicular Network Scale:- With roughly billion vehicles,Vehicular Network Scale:- With roughly billion vehicles,
the design of a facility that provides cryptographic keys is big the design of a facility that provides cryptographic keys is big challengechallenge
Vulnerabilities in IVCVulnerabilities in IVC
In Transit Traffic Tempering:- Nodes acting as a relay can disrupt In Transit Traffic Tempering:- Nodes acting as a relay can disrupt
communication of other nodescommunication of other nodes
Impersonation:- An attacker masquerading an emergency vehicle to Impersonation:- An attacker masquerading an emergency vehicle to
mislead other vehiclesmislead other vehicles
Jamming:- The Jammer deliberately generates interfering Jamming:- The Jammer deliberately generates interfering
transmissions that prevents communication transmissions that prevents communication
Forgery:- Fast contamination of large portions of the Forgery:- Fast contamination of large portions of the vehicular network coverage area with false informationvehicular network coverage area with false information
Privacy:-With Vehicular networks deployed, the collection Privacy:-With Vehicular networks deployed, the collection of vehicle specific information from overhead of vehicle specific information from overhead
vehicular communications will become particularly easyvehicular communications will become particularly easy
Attacks on IVCAttacks on IVCAttack 1: Bogus Traffic InformationAttack 1: Bogus Traffic Information
Traffic jam
ahead
Attack 2:Disruption of Network OperationAttack 2:Disruption of Network Operation
SLOW DOWN
The way is clear
Attack 3: Cheating with Identity, Position or SpeedAttack 3: Cheating with Identity, Position or Speed
I was not there!
Open ProblemsOpen Problems
Data Verification:- can be achieved by data correlation Data Verification:- can be achieved by data correlation mechanism but such mechanisms are in design stagemechanism but such mechanisms are in design stage
Secure Routing:- In vehicular networking messages Secure Routing:- In vehicular networking messages need to be delivered to specific areas for example:- in need to be delivered to specific areas for example:- in the case of traffic jam queue, this can be achieved by the case of traffic jam queue, this can be achieved by position based routing protocols but none of the solution position based routing protocols but none of the solution is secureis secure
DoS Resillience:- DoS and jamming problems can not DoS Resillience:- DoS and jamming problems can not be completely solve by frequency hoppingbe completely solve by frequency hopping
Public Key InfrastructurePublic Key Infrastructure
A
B
PKI
Security servicesPositioning
ConfidentialityPrivacy
...
CA
PA PB
Shared session key
Security Architecture of IVCSecurity Architecture of IVC
Components of Security ArchitectureComponents of Security Architecture
Event Data Recorder:- The EDR will be responsible for recording the vehicles critical Event Data Recorder:- The EDR will be responsible for recording the vehicles critical data such as position, time, speed etc. EDR will also record data such as position, time, speed etc. EDR will also record all the received safety messagesall the received safety messages
Tamper Proof Device:- The TPD will store all the cryptographic materials and perform Tamper Proof Device:- The TPD will store all the cryptographic materials and perform cryptographic operations like signing and verifying safety cryptographic operations like signing and verifying safety messagesmessages
Vehicular Public Key Infrastructure:- In VPKI infrastructure Certificate Authorities will Vehicular Public Key Infrastructure:- In VPKI infrastructure Certificate Authorities will issue certified public/private key pairs to vehiclesissue certified public/private key pairs to vehicles
Authentication:- Vehicles will sign each message with their private key and attach Authentication:- Vehicles will sign each message with their private key and attach
corresponding certificate. Thus when another vehicle receives the corresponding certificate. Thus when another vehicle receives the message it verifies key used to sign the message and then it message it verifies key used to sign the message and then it verifies the message.verifies the message.
Privacy:- To conceal vehicles identity , set of anonymous keys that changes Privacy:- To conceal vehicles identity , set of anonymous keys that changes frequently can be used. This keys are preloaded into vehicles Tamper Proof frequently can be used. This keys are preloaded into vehicles Tamper Proof Device for long durationDevice for long duration
Application of IVCApplication of IVC
Information and Warning Functions:-Information and Warning Functions:-
Dissemination of road information to vehicles distant from the subjected siteDissemination of road information to vehicles distant from the subjected site
Communication based longitudinal control:-Communication based longitudinal control:-
Exploiting the look through capacity to avoid accidents, platooning vehicles Exploiting the look through capacity to avoid accidents, platooning vehicles etc.etc.
Co-operative Assistant Systems:-Co-operative Assistant Systems:-
Coordinating vehicles at critical pointsCoordinating vehicles at critical points
Added Value Applications:-Added Value Applications:-
Internet Access, Location based services, Multiplayer gamesInternet Access, Location based services, Multiplayer games
Differences Between Different StandardsDifferences Between Different Standards
Real Time ApplicationsReal Time Applications
FleetNet:- The Internet on the road project was set up by FleetNet:- The Internet on the road project was set up by six companies and three universities in order to promote six companies and three universities in order to promote
the development of inter vehicular communication the development of inter vehicular communication
CarTALK:- Focused on developing new driver assistance systems CarTALK:- Focused on developing new driver assistance systems which are based on inter vehicle communication for safe which are based on inter vehicle communication for safe and comfortable drivingand comfortable driving
Network On Wheels (NOW):- The main objectives of NOW are to Network On Wheels (NOW):- The main objectives of NOW are to solve technical key questions on the communication solve technical key questions on the communication protocols and data security for car to car communicationprotocols and data security for car to car communication
Advance Driver Assistant System In Europe (ADASE):- ADASE Advance Driver Assistant System In Europe (ADASE):- ADASE project has a mission to increase the road and traffic safety in project has a mission to increase the road and traffic safety in Europe by avoiding collisions before they occurEurope by avoiding collisions before they occur
FleetNetFleetNet
Objectives Objectives To develop a communication platform for inter vehicle communicationTo develop a communication platform for inter vehicle communication To implement demonstrator applicationsTo implement demonstrator applications To develop promising introduction strategies To develop promising introduction strategies Standardize the solution foundStandardize the solution found
Key FeaturesKey Features Wireless multi hop ad hoc networkingWireless multi hop ad hoc networking Allows for low cost data transmissionAllows for low cost data transmission Very low data transmission delayVery low data transmission delay Extends the range of awarenessExtends the range of awareness Vehicles are addressed according to theirVehicles are addressed according to their
positionposition
FleetNet ApplicationsFleetNet Applications
Co-operative Driver Assistance:-Co-operative Driver Assistance:- Emergency NotificationEmergency Notification Overtaking AssistanceOvertaking Assistance Obstacle WarningObstacle Warning
Decentralized floating car data:-Decentralized floating car data:- Traffic jam monitorTraffic jam monitor Dynamic NavigationDynamic Navigation
User Communications:-User Communications:- Inter vehicle chatInter vehicle chat Mobile advertisingMobile advertising
StandardizationStandardization
Is necessary so that vehicles from different car manufacturers can Is necessary so that vehicles from different car manufacturers can communicate with each othercommunicate with each other
NEC which is Japanese technology company is the member of NEC which is Japanese technology company is the member of C2CC consortium and is working in close collaboration with BMW, C2CC consortium and is working in close collaboration with BMW, Daimler ChryslerDaimler Chrysler
Objective – open industrial standard for internet vehicle Objective – open industrial standard for internet vehicle communication with wireless components to ensure interoperabilitycommunication with wireless components to ensure interoperability
First product to be expected between 2009 to 2012First product to be expected between 2009 to 2012
ConclusionConclusion
Design of communication protocols in IVC is extremely challenging
Protocols have potential to support many new innovative applications
These technologies can greatly enhance the infotainment, safety, comfort, communication and convenience value of new vehicles.
As vehicles become “smarter”, security and privacy gain importance
QuestionsQuestions What are two types of communication in IVC?What are two types of communication in IVC?
Vehicle to Vehicle Communication –Vehicle to Vehicle Communication – It demonstrates properties of both peer-to-peer network and mobile ad-hoc It demonstrates properties of both peer-to-peer network and mobile ad-hoc
network.network. In Peer-to-peer systems participants rely on another for service rather than solely In Peer-to-peer systems participants rely on another for service rather than solely
relying on a dedicated and centralized infrastructurerelying on a dedicated and centralized infrastructure A mobile ad hoc network is a collection of mobile hosts with wireless A mobile ad hoc network is a collection of mobile hosts with wireless
communication capabilities forming temporary network. communication capabilities forming temporary network.
Vehicle to Infrastructure CommunicationVehicle to Infrastructure Communication – – Information is available from roadside sourcesInformation is available from roadside sources uses 63 GHz banduses 63 GHz band Ex- Electronic Toll Collection (ETC)Ex- Electronic Toll Collection (ETC) allows for electronic payment of highway tollsallows for electronic payment of highway tolls communication is traditionally via microwave or infrared techniques, more communication is traditionally via microwave or infrared techniques, more
recently through GPS technologyrecently through GPS technology an electronic monetary transaction occurs between a vehicle passing through a an electronic monetary transaction occurs between a vehicle passing through a
toll station and the toll agencytoll station and the toll agency
What are the challenges in IVC?What are the challenges in IVC?
Liability Vs Privacy:- Accountability and liability of the Liability Vs Privacy:- Accountability and liability of the vehicles is required and context specific information such vehicles is required and context specific information such as coordinates, time intervals should be possible to as coordinates, time intervals should be possible to extract but such requirements raise privacy concernsextract but such requirements raise privacy concerns
Real Time Communication:- Driver assistance Real Time Communication:- Driver assistance applications are time sensitive therefore security applications are time sensitive therefore security protocols should impose low processing overheadprotocols should impose low processing overhead
Vehicular Network Scale:- With roughly billion vehicles,Vehicular Network Scale:- With roughly billion vehicles, the design of a facility that provides cryptographic keys is the design of a facility that provides cryptographic keys is
big challengebig challenge
What are the main Components in Security Architecture What are the main Components in Security Architecture of IVC?of IVC?
Event Data Recorder:- The EDR will be responsible for Event Data Recorder:- The EDR will be responsible for recording the vehicles critical data such as position, recording the vehicles critical data such as position, time, speed etc. EDR will also record all the received time, speed etc. EDR will also record all the received safety messagessafety messages
Tamper Proof Device:- The TPD will store all the Tamper Proof Device:- The TPD will store all the cryptographic materials and perform cryptographic cryptographic materials and perform cryptographic operations like signing and verifying safety messagesoperations like signing and verifying safety messages
Vehicular Public Key Infrastructure:- In VPKI Vehicular Public Key Infrastructure:- In VPKI infrastructure Certificate Authorities will infrastructure Certificate Authorities will issue certified public/private key pairs to issue certified public/private key pairs to vehiclesvehicles
ReferencesReferences
http://www.cs.wustl.edu/~jain/cse574-06/ftp/vehicular_wireless/indehttp://www.cs.wustl.edu/~jain/cse574-06/ftp/vehicular_wireless/index.htmlx.html
http://www.comms.scitech.susx.ac.uk/research/bluetooth.phphttp://www.comms.scitech.susx.ac.uk/research/bluetooth.php
http://www.et2.tu-harburg.de/fleetnet/english/documents.htmlhttp://www.et2.tu-harburg.de/fleetnet/english/documents.html
http://www.de.nec.de/textpage.php/id/1304http://www.de.nec.de/textpage.php/id/1304
http://icwww.epfl.ch/publications/documents/IC_TECH_REPORT_2http://icwww.epfl.ch/publications/documents/IC_TECH_REPORT_200424.pdf00424.pdf
www.//ivc.epfl.theocracymanan/page2959.htmlwww.//ivc.epfl.theocracymanan/page2959.html
ReferencesReferences
http://ec.europa.eu/transport/roadsafety/road_safety_observatory/cahttp://ec.europa.eu/transport/roadsafety/road_safety_observatory/care_en.htmre_en.htm
http://ieeexplore.ieee.org/iel5/8061/22289/01041242.pdf?tp=&arnuhttp://ieeexplore.ieee.org/iel5/8061/22289/01041242.pdf?tp=&arnumber=1041242&isnumber=22289mber=1041242&isnumber=22289
http://www.cartalk2000.net/http://www.cartalk2000.net/
http://www.adase2.net/http://www.adase2.net/
http://www.comcar.de/http://www.comcar.de/
http://ivc.epfl.ch/page2959.htmlhttp://ivc.epfl.ch/page2959.html