#1.Jayanth S, #2.Saravanan I S and #3.Kapilavani R K
Abstract- Amongst many different communication paradigms, Vehicular ad hoc networks (VANET’s) are an area of developing techniques. It has become an upcoming technology of this modern world in vehicular communications. The main reason of using VANET is to exchange live messages regarding traffic congestions. A Trusted authority (TA) is designed to provide authentication services for users and managing keys of several users. Like in any other networks in VANET also there is a necessity to maintain authentication and confidentiality among the users. To authenticate the users the authority classifies users into primary, …show more content…
The first is V2V (vehicle to vehicle) type in which a vehicle user communicates with another directly which is the purest form of infrastructure-less characteristic of ad hoc networks. The other is V2R (vehicle to RSU) type where a vehicle communicates with RSU which is a fixed infrastructure. These vehicles communicate using the Dedicated Short Range Communication (DSRC) protocol [3]. The RSU, OBU and TA communicate using this protocol which is based on the IEEE 802.11p radio technology. The vehicles can access the wireless channel either using a directional antenna or a unidirectional antenna. Because of this wireless access VANETs are vulnerable to many attacks due to collision, eavesdropping, interference, jamming and other problems. To avoid these attacks only we introduce a concept of security in VANET. The intention of providing security is to maintain confidentiality among users by grouping them together and to efficiently provide authentication services. In many literature systems all the authentication services, key storage and updating services are performed by the authority. This imposes a huge overhead on the authority. Also this situation results in a scenario where it becomes easier to an attacker to attack only the authority end and collapse the whole system. It is inefficient if the authority is attacked that results to handing over the control to an attacker. This issue must be …show more content…
TA possesses computational, communicational and storage capabilities compared to other RSUs and OBUs in the network.
III. SYSTEM MODEL
The System model that depicts the proposed system is demonstrated in Fig.1. Fig.1. System Model Trusted Authority (TA): TA takes the responsibility of providing authentication of the users, manage and store the keys for encrypt and decrypt the message shared amongst the VANET users. It is also responsible for registering the users and storing their information that is used later to authenticate them by verifying the stored credentials.
Road Side Units (RSUs): RSU’s are the fixed infrastructures that can capable of routing message from TA and OBUs and vice versa. RSUs are connected with the TA in a secure wired connection and are managed, monitored by the TA.
On Board Unit: Each user in the VANET contains an OBU that is embedded inside their vehicle. The OBU consists of Tamper Proof Device (TPD), vehicle sensors like GPS, DSRC medium, Event Data Recorder (EDR),decision making agent, fuzzy rule base and inference engine.
IV. ATTACKS Since all the communication between vehicles and RSUs happen through an open wireless channel, there are many kinds of attacks possible. Listed below are some of the possible