SlideShare uma empresa Scribd logo
1 de 29
1
2
• PRESENTED BY: AKASH R



• GUIDED BY: Smt. GEETHA RAJ R



• CO-ORDINATED BY: Smt. ANJU J




                                 3
•   What is a VANET?
•   Intelligent transportation system
•   Vehicle to vehicle communication
•   Vehicle to infrastructure communication
•   Dedicated Short Range Communication
•   challenges
•   Applications of VANET
•   conclusion
•   references


                                              4
Event data recorder (EDR)
                                                 Positioning system (GPS)
     Forward radar

                                                               Communication
                                                                  facility




                                                            Rear radar

Human-Machine Display
              Interface              Computing platform




A modern vehicle is a network of sensors/actuators on wheels !
 Vehicles Transformed into “Computers on the
 Wheels” or “Networks on the Wheel”
 Vehicular Communication System (VCS):- Two main
 type of communications
 Vehicle to Vehicle (V2V) Communication:-
    Vehicle to Infrastructure (V2I) communication:-
 Advantage and Usage of VCS:-
  Information sharing
  Co-operative driving
  Other value added services like Navigation, internet
access etc.
 ad-hoc means to a system of network elements that
    combine to form a network requiring little or no planning

                                                                6
 Communication between V2V and V2I are “ad-hoc" in
  nature.
 This special kind of communication network is known as
  “Vehicular Ad-hoc Network (VANET)”
 VANET will become Worlds largest ad-hoc network




                                                           7
8
• Communication:- Wireless Access in Vehicular
   Environment (WAVE): IEEE 1609.2 Standard also Known
   DSRC 802.11p
• Supports Multi-Hop communication for vehicles out of
   range (Max. Range DSRC is 1000m)
• On-Board Unit (OBU):- A device which is inside the
   vehicle which
       processes the data collected from various sensors
fitted inside the cars and gives conditions of the vehicles
      is responsible for communication with outside network
i.e with other vehicles and infrastructure.

                                                          9
• Road Side Unit (RSU): Infrastructure for communication
  between the cars for sharing and information from
  various vehicles.




                                                       10
 It allows safe and free flow traffic.

 It uses GPS and DGPS equipped devices.

 It uses various technology like:-
1. Wireless communications
2. Computational technologies
3. Floating car data/floating cellular data
4. Sensing technologies
5. Inductive loop detection
6. Video vehicle detection
7. Bluetooth Detection                        11
 Uses multi-hop/multi cast technique.
 uses two type of broadcasting
1. naive broadcasting
2. intelligent broadcasting




                                         12
 High bandwidth link with vehicle and roadside equipment.
 Roadside units broadcast messages.




                                                        13
• Uses multi hop unicast




                           14
15
16
Each vehicle is a node with unique ID.


 proactive routing
•   It tries to maintain routes to all destinations.
   Reactive routing
•   It initiates route discovery in demand of data traffic.
 Position based Routing
•   Routing based on destination’s position.


                                                              17
• Broadcasting algorithms used.
• Data and control packet forwarding are loop free.
• Ad hoc routing algorithms are used.

 Mobicasting
• Consider time into account.
• Main goal is delivery of information to all nodes in a point
  of time.




                                                             18
• Indicates level of performance given to user.
• Provide robust routes among nodes.


Security

• Many threats for Vanet.
• Avoid some threats using digital signatures.



                                                  19
 Routing
• Large end-to-end delays and decreased packet delivery
  ratio.
 Security Frameworks
• Need lightweight, scalable authentication frameworks.
• Need reliable and secureness .
• Need fast and low-cost message exchange facility.




                                                          20
 Quality of Service.
• QoS challenges are packet delivery ratio and connection
  duration.

 Broadcasting.
• Most messages in Vanet are broadcast messages.
• Collisions affects message delivery.




                                                        21
22
Three major classes of applications possible in VANET are
 safety oriented
 convenience oriented
 commercial oriented




                                                        23
24
• Consists of vehicle-to-vehicle, vehicle-to-infrastructure
  communication.

• It improves the safety of vehicles.

• Supports Intelligent Transportation system.




                                                              25
• Raya, M. and Hubaux, J.,     “The Security of Vehicular Ad Hoc
Networks”, in Proceedings of the 3rdACM Workshop on Security of
Ad Hoc and Sensor Networks (SASN 2005), Alexandria, VA,

• Harsch, C., Festag, A. & Papadimitratos, P., “Secure Position-Based
Routing for VANETs”,      in Proceedings of     IEEE 66thVehicular
Technology Conference (VTC-2007).

• Gerlach, M., Full Paper: Assessing and Improving Privacy in
VANETs, www.networkon-wheels.de/downloads/escar2006gerlach.pdf
.


                                                                   26
• Jinyuan, S., Chi, Z. & Yuguang, F., “An ID-based Framework Achieving
Privacy and Non-Repudiation”, in Proceedings of IEEE Vehicular Ad Hoc
Networks, Military Communications Conference (MILCOM 2007).

• Stampoulis, A. & Chai, Z., A Survey of Security in Vehicular Networks.

• Balon, N., Introduction to Vehicular Ad Hoc Networks and the Broadcast
Storm   Problem,http://www.csie.ntpu.edu.tw/~yschen/course/96-
2/Wireless/papers/broadcast-5.pdf .




                                                                           27
28
29

Mais conteúdo relacionado

Mais procurados

Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Divya Tiwari
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)ArunChokkalingam
 
Vanet routing protocols issues and challenges
Vanet routing protocols   issues and challengesVanet routing protocols   issues and challenges
Vanet routing protocols issues and challengesBehroz Zarrinfar
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...ArunChokkalingam
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocolPradeep Kumar TS
 
Lecture 1 mobile and adhoc network- introduction
Lecture 1  mobile and adhoc network- introductionLecture 1  mobile and adhoc network- introduction
Lecture 1 mobile and adhoc network- introductionChandra Meena
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network LayerRahul Hada
 
localization in wsn
localization in wsnlocalization in wsn
localization in wsnnehabsairam
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkChandra Meena
 
Design Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDesign Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDushhyant Kumar
 
VANETs Presentation
VANETs PresentationVANETs Presentation
VANETs PresentationiQra Rafaqat
 

Mais procurados (20)

VANET
VANETVANET
VANET
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Vanet routing protocols issues and challenges
Vanet routing protocols   issues and challengesVanet routing protocols   issues and challenges
Vanet routing protocols issues and challenges
 
Manet
ManetManet
Manet
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
 
Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture ppt
 
Lecture 1 mobile and adhoc network- introduction
Lecture 1  mobile and adhoc network- introductionLecture 1  mobile and adhoc network- introduction
Lecture 1 mobile and adhoc network- introduction
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 
localization in wsn
localization in wsnlocalization in wsn
localization in wsn
 
Routing in vanet
Routing in vanetRouting in vanet
Routing in vanet
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
 
Design Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDesign Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC Protocol
 
VANETs Presentation
VANETs PresentationVANETs Presentation
VANETs Presentation
 

Destaque

Gestion de la mobilité et de la Qos chez un opérateur de téléphonie mobile:UMTS
Gestion de la mobilité et de la Qos chez un opérateur de téléphonie mobile:UMTSGestion de la mobilité et de la Qos chez un opérateur de téléphonie mobile:UMTS
Gestion de la mobilité et de la Qos chez un opérateur de téléphonie mobile:UMTSMkMk Kachallah
 
Packet Switching and X.25 Protocol
Packet Switching and X.25 ProtocolPacket Switching and X.25 Protocol
Packet Switching and X.25 ProtocolMiles Kevin Galario
 
Do s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanetDo s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanetsirojiddin
 
Vehicle To Vehicle Communication System
Vehicle To Vehicle Communication SystemVehicle To Vehicle Communication System
Vehicle To Vehicle Communication SystemMonaco Motors
 
Presentation on GSM(2G & GPRS)
Presentation on GSM(2G & GPRS)Presentation on GSM(2G & GPRS)
Presentation on GSM(2G & GPRS)Brijesh Kaushik
 
ppt on GSM architechture
ppt on GSM architechtureppt on GSM architechture
ppt on GSM architechtureHina Saxena
 
GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...
GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...
GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...GPRS MYGPRSEXPRESS
 

Destaque (11)

VANET, Security and Trust
VANET, Security and TrustVANET, Security and Trust
VANET, Security and Trust
 
Gestion de la mobilité et de la Qos chez un opérateur de téléphonie mobile:UMTS
Gestion de la mobilité et de la Qos chez un opérateur de téléphonie mobile:UMTSGestion de la mobilité et de la Qos chez un opérateur de téléphonie mobile:UMTS
Gestion de la mobilité et de la Qos chez un opérateur de téléphonie mobile:UMTS
 
Packet Switching and X.25 Protocol
Packet Switching and X.25 ProtocolPacket Switching and X.25 Protocol
Packet Switching and X.25 Protocol
 
Do s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanetDo s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanet
 
Vehicle To Vehicle Communication System
Vehicle To Vehicle Communication SystemVehicle To Vehicle Communication System
Vehicle To Vehicle Communication System
 
Mobile IP 1
Mobile IP 1Mobile IP 1
Mobile IP 1
 
Presentation on GSM(2G & GPRS)
Presentation on GSM(2G & GPRS)Presentation on GSM(2G & GPRS)
Presentation on GSM(2G & GPRS)
 
ppt on GSM architechture
ppt on GSM architechtureppt on GSM architechture
ppt on GSM architechture
 
GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...
GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...
GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...
 
GSM ARCHITECTURE
GSM ARCHITECTUREGSM ARCHITECTURE
GSM ARCHITECTURE
 
GPRS
GPRSGPRS
GPRS
 

Semelhante a VANET: An Overview of Vehicular Ad-Hoc Networks

Internet for vanet network communications fleetnet
Internet for vanet network communications  fleetnetInternet for vanet network communications  fleetnet
Internet for vanet network communications fleetnetIJCNCJournal
 
Vehicular network-project-fin
Vehicular network-project-finVehicular network-project-fin
Vehicular network-project-finASMA HADELI
 
Communications in Vehicular networks
Communications in Vehicular networksCommunications in Vehicular networks
Communications in Vehicular networksDaisyWatson5
 
IVC DOC-20230921-WA0004..pdf
IVC DOC-20230921-WA0004..pdfIVC DOC-20230921-WA0004..pdf
IVC DOC-20230921-WA0004..pdfNanDhu551039
 
Preparing for CV Deployment read ahead 9-8-18
Preparing for CV Deployment   read ahead 9-8-18Preparing for CV Deployment   read ahead 9-8-18
Preparing for CV Deployment read ahead 9-8-18raymurphy9533
 
Collision_Avoidance_in_VANETs_Grp5_Topic.ppt
Collision_Avoidance_in_VANETs_Grp5_Topic.pptCollision_Avoidance_in_VANETs_Grp5_Topic.ppt
Collision_Avoidance_in_VANETs_Grp5_Topic.pptMohammedThanishA
 
Cognitive Radio For Vehicular Adhoc Networks
Cognitive Radio For Vehicular Adhoc NetworksCognitive Radio For Vehicular Adhoc Networks
Cognitive Radio For Vehicular Adhoc NetworksAkshaya V
 
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...IJLT EMAS
 

Semelhante a VANET: An Overview of Vehicular Ad-Hoc Networks (20)

SAHITHI - VANET ppt.pptx
SAHITHI - VANET ppt.pptxSAHITHI - VANET ppt.pptx
SAHITHI - VANET ppt.pptx
 
SAHITHI - VANET ppt.pptx
SAHITHI - VANET ppt.pptxSAHITHI - VANET ppt.pptx
SAHITHI - VANET ppt.pptx
 
Adhoc network
Adhoc networkAdhoc network
Adhoc network
 
Adhoc network
Adhoc networkAdhoc network
Adhoc network
 
Internet for vanet network communications fleetnet
Internet for vanet network communications  fleetnetInternet for vanet network communications  fleetnet
Internet for vanet network communications fleetnet
 
Vanets
VanetsVanets
Vanets
 
Intelligent transportation system
Intelligent transportation systemIntelligent transportation system
Intelligent transportation system
 
vanets presentation-.pdf
vanets presentation-.pdfvanets presentation-.pdf
vanets presentation-.pdf
 
Vehicular network-project-fin
Vehicular network-project-finVehicular network-project-fin
Vehicular network-project-fin
 
Ivwc
IvwcIvwc
Ivwc
 
Communications in Vehicular networks
Communications in Vehicular networksCommunications in Vehicular networks
Communications in Vehicular networks
 
Jb3515641568
Jb3515641568Jb3515641568
Jb3515641568
 
IVC DOC-20230921-WA0004..pdf
IVC DOC-20230921-WA0004..pdfIVC DOC-20230921-WA0004..pdf
IVC DOC-20230921-WA0004..pdf
 
Preparing for CV Deployment read ahead 9-8-18
Preparing for CV Deployment   read ahead 9-8-18Preparing for CV Deployment   read ahead 9-8-18
Preparing for CV Deployment read ahead 9-8-18
 
Collision_Avoidance_in_VANETs_Grp5_Topic.ppt
Collision_Avoidance_in_VANETs_Grp5_Topic.pptCollision_Avoidance_in_VANETs_Grp5_Topic.ppt
Collision_Avoidance_in_VANETs_Grp5_Topic.ppt
 
VANET overview & technical review
VANET overview &  technical reviewVANET overview &  technical review
VANET overview & technical review
 
Cognitive Radio For Vehicular Adhoc Networks
Cognitive Radio For Vehicular Adhoc NetworksCognitive Radio For Vehicular Adhoc Networks
Cognitive Radio For Vehicular Adhoc Networks
 
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
 
V2V tech
V2V techV2V tech
V2V tech
 
Jn2416531655
Jn2416531655Jn2416531655
Jn2416531655
 

Último

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 

VANET: An Overview of Vehicular Ad-Hoc Networks

  • 1. 1
  • 2. 2
  • 3. • PRESENTED BY: AKASH R • GUIDED BY: Smt. GEETHA RAJ R • CO-ORDINATED BY: Smt. ANJU J 3
  • 4. What is a VANET? • Intelligent transportation system • Vehicle to vehicle communication • Vehicle to infrastructure communication • Dedicated Short Range Communication • challenges • Applications of VANET • conclusion • references 4
  • 5. Event data recorder (EDR) Positioning system (GPS) Forward radar Communication facility Rear radar Human-Machine Display Interface Computing platform A modern vehicle is a network of sensors/actuators on wheels !
  • 6.  Vehicles Transformed into “Computers on the Wheels” or “Networks on the Wheel”  Vehicular Communication System (VCS):- Two main type of communications Vehicle to Vehicle (V2V) Communication:- Vehicle to Infrastructure (V2I) communication:-  Advantage and Usage of VCS:- Information sharing Co-operative driving Other value added services like Navigation, internet access etc.  ad-hoc means to a system of network elements that combine to form a network requiring little or no planning 6
  • 7.  Communication between V2V and V2I are “ad-hoc" in nature.  This special kind of communication network is known as “Vehicular Ad-hoc Network (VANET)”  VANET will become Worlds largest ad-hoc network 7
  • 8. 8
  • 9. • Communication:- Wireless Access in Vehicular Environment (WAVE): IEEE 1609.2 Standard also Known DSRC 802.11p • Supports Multi-Hop communication for vehicles out of range (Max. Range DSRC is 1000m) • On-Board Unit (OBU):- A device which is inside the vehicle which processes the data collected from various sensors fitted inside the cars and gives conditions of the vehicles is responsible for communication with outside network i.e with other vehicles and infrastructure. 9
  • 10. • Road Side Unit (RSU): Infrastructure for communication between the cars for sharing and information from various vehicles. 10
  • 11.  It allows safe and free flow traffic.  It uses GPS and DGPS equipped devices.  It uses various technology like:- 1. Wireless communications 2. Computational technologies 3. Floating car data/floating cellular data 4. Sensing technologies 5. Inductive loop detection 6. Video vehicle detection 7. Bluetooth Detection 11
  • 12.  Uses multi-hop/multi cast technique.  uses two type of broadcasting 1. naive broadcasting 2. intelligent broadcasting 12
  • 13.  High bandwidth link with vehicle and roadside equipment.  Roadside units broadcast messages. 13
  • 14. • Uses multi hop unicast 14
  • 15. 15
  • 16. 16
  • 17. Each vehicle is a node with unique ID.  proactive routing • It tries to maintain routes to all destinations.  Reactive routing • It initiates route discovery in demand of data traffic.  Position based Routing • Routing based on destination’s position. 17
  • 18. • Broadcasting algorithms used. • Data and control packet forwarding are loop free. • Ad hoc routing algorithms are used. Mobicasting • Consider time into account. • Main goal is delivery of information to all nodes in a point of time. 18
  • 19. • Indicates level of performance given to user. • Provide robust routes among nodes. Security • Many threats for Vanet. • Avoid some threats using digital signatures. 19
  • 20.  Routing • Large end-to-end delays and decreased packet delivery ratio.  Security Frameworks • Need lightweight, scalable authentication frameworks. • Need reliable and secureness . • Need fast and low-cost message exchange facility. 20
  • 21.  Quality of Service. • QoS challenges are packet delivery ratio and connection duration.  Broadcasting. • Most messages in Vanet are broadcast messages. • Collisions affects message delivery. 21
  • 22. 22
  • 23. Three major classes of applications possible in VANET are  safety oriented  convenience oriented  commercial oriented 23
  • 24. 24
  • 25. • Consists of vehicle-to-vehicle, vehicle-to-infrastructure communication. • It improves the safety of vehicles. • Supports Intelligent Transportation system. 25
  • 26. • Raya, M. and Hubaux, J., “The Security of Vehicular Ad Hoc Networks”, in Proceedings of the 3rdACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005), Alexandria, VA, • Harsch, C., Festag, A. & Papadimitratos, P., “Secure Position-Based Routing for VANETs”, in Proceedings of IEEE 66thVehicular Technology Conference (VTC-2007). • Gerlach, M., Full Paper: Assessing and Improving Privacy in VANETs, www.networkon-wheels.de/downloads/escar2006gerlach.pdf . 26
  • 27. • Jinyuan, S., Chi, Z. & Yuguang, F., “An ID-based Framework Achieving Privacy and Non-Repudiation”, in Proceedings of IEEE Vehicular Ad Hoc Networks, Military Communications Conference (MILCOM 2007). • Stampoulis, A. & Chai, Z., A Survey of Security in Vehicular Networks. • Balon, N., Introduction to Vehicular Ad Hoc Networks and the Broadcast Storm Problem,http://www.csie.ntpu.edu.tw/~yschen/course/96- 2/Wireless/papers/broadcast-5.pdf . 27
  • 28. 28
  • 29. 29