( Right Click Save As )

advertisement
International Journal of Advance Research, IJOAR .org
ISSN 2320-9194
International Journal of Advance Research, IJOAR .org
Volume 3, Issue 2, February 2015, Online: ISSN 2320-9194
HIGHLY SCALABLE OPPORTUNISTIC ROUTING SOLUTIONS
VANET MILIEU
FOR
AEGIS
Fathima Parveen Banu .K (1), Natchadalingam .R (2)
1 is currently pursuingME Computer Science Engineering(specialization in Networks) in PSN Engineering College,Tirunelveli,TamilNadu, India, PH-9600537637.
E-mail: sfatim.banu@gmail.com
2 is currently working as a Professor in Computer Science Engineering Department in PSN Engineering College, Tirunelveli, Tamil Nadu, India, PH-9442034296.
E-mail: yraja1970@gmail.com
ABSTRACT
Here we propose a new application VANET –based aegis scheme that uses real time road conditions to guide the drivers by providing them with the better route. To maintain the privacy of drivers, their real identity and navigation query are completely separated using
the idea of anonymous credentials. Here High Lifetime Opportunistic Routing scheme is suggested to provide stable communication paths
with high link stability and reliable solution. Besides satisfying all security and privacy requirements, our solution is reliable in the sense that
a vehicle can complete the whole navigation querying process and receive urgent notification in a very short time when compared with the
offline map data searching approach.
KeyWords
Anonymous credential, Forwarder candidate selection, opportunistic routing, pseudo identity, link stability, authentication.
IJOAR© 2015
http://www.ijoar.org
International Journal of Advance Research, IJOAR .org
ISSN 2320-9194
I. INTRODUCTION
A VANET is a decentralized and self-organizing
network composed of high speed moving vehicles.
VANET is an important element of the Intelligent
Transportation Systems (ITS). In VANET each
vehicle has an on-board unit (OBU) and there is
road–side units (RSU) installed along the roads.
Trusted Authority (TA) is an essential entity which
provides identity for vehicles and monitors the
network.
Vehicular ad hoc network (VANET) allows
vehicles to broadcast safety messages to nearby
vehicles (V2V) and to RSU (V2I) communication.
[3] VANETs are a promising solution to improve the
vehicular traffic safety, reduce the impact of vehicles
on environmental pollution, or simply provide the
in-vehicle infotainment services such as Internet
access, advertisements, etc. Dedicated Short Range
Communication
(DSRC) is a short to medium
range communication service that supports both
public safety and private communication over
wireless channel to about 300m [9]. However, high
mobility of vehicles causes frequent failures of intervehicle links.
To increase the multihop communications
reliability in VANETs, opportunistic routing (OR)
has received much attention recently. The main idea
of opportunistic routing is that multiple nodes can
potentially be served as the next-hop forwarders
instead of preselecting a single specific node to be
the next-hop forwarder. Once the existing node
transmits a packet via a single-hop broadcast, all the
other nodes that have received the packet will resolve
which one or ones would actually forward the packet
according to some criteria (e.g. the one that is closest
to the destination will perform the forwarding while
the rest will simply drop the packet ) [2] . The major
problem in opportunistic routing is when there are
multiple paths of similar expected number of anypath
transmissions (ETX), there is route flapping (at some
time, one path is slightly better than the other; at
another time, the other path is slightly better) [12].
In this paper, a new application highly
scalable and secure VANET Navigation System is
proposed, which makes use of the collected data to
provide navigation service to drivers. Based on the
location information of the driver, the system can
automatically find for a route that yields minimum
traveling delay using the online information of the
road condition. The link stability is an important
factor considered here for preventing route
flapping[15]. This issue is very important for many
real-time safety services with stringent QoS
requirements.
The security of VANET is one of the most
critical issues because their information transmission
is propagated in open access (wireless) environments.
Security requirements include [11]
Message integrity: A vehicle should be authenticated
before it can issue a navigation query. On the other
hand, an RSU (vehicle) is able to verify that a
message is from an authorized entity and unchanged.
Identity privacy preserving: The real identity of a
vehicle should be kept secret and a third-party should
not be able to unveil a vehicle’s real identity by
breaking down the multiple messages sent by it.
Traceability: TA should have the facility to obtain a
vehicle’s real identity for charging the vehicle which
uses this navigation service. Also TA must maintain
accountability revealing the vehicles identity when
accidents happen on the road.
The proposed scheme adopts some security
primitives in a nontrivial way to provide the pursuing
security characteristic [1]:
1. The entire vehicle is properly authenticated and
privacy is preserved using the idea of pseudo
identity.
2. The real identity and navigation query are
completely delinked using the idea of anonymous
credential.
3. Navigation queries and results can be computed
within reasonable amount of time.
In this paper, new type of anypath routing namely
High life time opportunistic routing scheme is
suggested here which provides efficient routing
IJOAR© 2015
http://www.ijoar.org
International Journal of Advance Research, IJOAR .org
ISSN 2320-9194
solution to implement above security mechanism in
VANET environment.
The rest of the paper is organized as follows:
related work is reviewed in Section II. Section III
outlines the details of our HLO routing concept,
while Section IV shows the system model. The main
security schemes are presented in Section V and the
analysis and evaluation of our schemes are given in
Sections VI. Finally, Section VII concludes the paper.
II RELATED WORK
R. Lu in [5] suggested an efficient social-tierassisted packet forwarding protocol STAP for
achieving receiver-location privacy preservation in
VANETs was proposed. The authors proposed to install RSUs at social spots and this forms a virtual
social tier. Without the receiver’s exact location’s
knowledge, a packet for him/her can first be forwarded and disseminated in the desired social tier.
Later if the receiver visits one of social spots, he/she
can receive the packet successfully. In [8], a proficient self-generated pseudonym method based on
Identity-Based Encryption (IBE) was proposed for
preserving drivers’ privacy.
In the same year, a policy was formulated for
pseudonym update to sustain privacy when a vehicle
is being observed by an adversary who has special
capabilities [14].
Another scheme suggested in [13], which covered a car park, while ours is large scale to cover the
whole city and nearby areas. This scheme has a car
park is monitored by three RSUs that determines the
vehicle’s location, searching for a free parking zone,
and providing direction-finding service to guide the
vehicle to go to the selected parking space.
Jie Zhinzhong in [4] introduced a trust model
based on trust degree and applied opportunistic routing in VANET within the coverage of one RSU. In
[7] T.W.Chim and his colleagues provided the group
communication protocol to allow the vehicles to authenticate and securely communicate with others in a
group of known vehicles.
In [6] an algorithm to compute least-cost
anypath routes is proposed to decrease energy
transmission costs in union with anypath routing using single path metrics.
III HIGH LIFETIME OPPORTUNISTIC (HLO)
ROUTING CONCEPT
In our HLO scheme , sij denotes stability index of link (i,j) at any time t0 based on vehicles
movement in the previous interval.cij value represents the expected number of anypath transmissions
needed to successfully deliver the packet sent by
node i to any node from j.
pij indicate the packet delivery ratio from node i to
atleast one node from j [15][10]. The weight wij denotes probability of node j being the forwarding
node of a packet received from vehicle i.
cij=
1/(1- ПjϵJ (1- pij. sij) )
wij= (pij. sij П k=1j-1 (1-pik.sik)) /(1- ПjϵJ (1- pij. sij) )
Steps involved are
 Forwarder candidate selection: Build a set of
potential forwarders.
 Forwarder
selection:
determine
the
forwarder.
 Forwarder role change Notification: Notify
other nodes about who will be forwarding the
packet.
 Cost and weight calculation:
cij=1/(1- Пj€J (1- pij. sij) )
(1)
wij= (pij. sij П k=1j-1 (1-pik.sik)) /(1- Пj€J (1- pij.
sij) )
(2)
IV SYSTEM MODEL
Fig 1 shows the overall system architecture. The system implementation involves the following modules:
Node creation and Network formation:
This module creates the vehicle node, RSU
Network Simulator ns-2.
Protocol implementation:
The HLO routing algorithm is implemented
for routing information among nodes.
Security implementation:
Trusted authority creates the anonymous credentials for node communication and authentication process.
Route discovery and notification:
When any accident or any blocking of road is
is identified, immediately the route conditions are
informed to vehicles as an alternate route suggestion.
IJOAR© 2015
http://www.ijoar.org
International Journal of Advance Research, IJOAR .org
ISSN 2320-9194
which is stored and maintained locally, which
is used for encryption at later stages [1].
From RSU to vehicles the route information
includes average speed, vehicle random
number, session number, direction, RSU’s
ID, vehicle id. The urgent change of route initiated by RSU consists of message which
contains blocked message, session number,
RSU Id, direction.
VI SIMULATION AND ANALYSIS
Simulation Environment
Based on the IEEE 802.11b of MAC layer, our simulation environment is NS2. The vehicles move from
a random initial point to destination along the road
in the uniform speed. The transport protocol is User
Datagram Protocol (UDP). Traffic sources are Constant Bit Rate (CBR). The number of vehicles is
equally scattered over the entire network.
Fig 2. Shows the simulation environment of our proposed scheme.
Fig1. The overall system architecture
V THE SECURITY SCHEME
The security scheme that has been implemented here
is summarized below:
1. TA stores the parameters and generates
anonymous credentials.
2. Vehicle Vi requests a navigation credential
from RSU and stores it in a tamper-proof
device.
3. Vi’s tamper-proof device sends out its
navigation request to RSU Rk.
4. RSU Rk relays the navigation request to its
neighbors until the request reaches RSU Rd
covering the destination.
5. RSU Rk forwards the reply message to Vi’s
tamper-proof device which then checks the
messages from all RSUs along the route.
6. TA reveals Vi’s real identity for billing
purpose, based on Vi’s pseudo identity
received from RSU Rj,
7. For authentication verification, TA gives for
each vehicle a real identity, license plate
number. Based on the current time the pseudo identity for each vehicle is generated randomly. The navigation request message is
M= {IV_REQ,DEST}, where DEST represents the destination point. Vehicles tamperproof device picks a random number rand
Fig 2.NS2 simulation of HLO scheme
Performance Analysis
A.
Message Loss
Fig 3. Message loss with traffic load
Figure 3 shows the relationship between the
message loss and the traffic load. Here the traffic
IJOAR© 2015
http://www.ijoar.org
International Journal of Advance Research, IJOAR .org
ISSN 2320-9194
load is denoted by the number of vehicles associated
with the RSU. Clearly we can observe that the message loss increases with the increase in traffic load
but using our scheme, the lowest message loss is
yielded.
B.
Throughput
VII CONCLUSION
In this paper, we build a highly scalable and
secure VANET navigation environment which is
based on High Lifetime Opportunistic (HLO) Routing scheme. We addressed the problem of anypath
link stability. Our solution provides an efficient way
of implementing security and authentication schemes
for inter vehicular communication as well as between the RSU and TA. Route notification and urgent message delivery are key features of the system
which scales the usage of system.
In our future work, we will expand our idea
about opportunistic routing with congestion control
mechanism to decrease the traffic overhead and test
it by simulation.
Fig 4. Throughput with time interval
Figure 4 shows the correlation between the
throughput and the time interval. As the time increases the system attains the maximum throughput
value.
C.
Link Stability
Fig 5. Link stability with time interval
Figure 5 shows the variations in link stability
indices with time interval. As the time increases, the
link stability indices for each
link increases and
attain a stable value.
IJOAR© 2015
http://www.ijoar.org
International Journal of Advance Research, IJOAR .org
ISSN 2320-9194
REFERENCES
[1] Chim, TW; Yiu, SM; Hui, CK; Li, VOK “VSPN: VANET-based Secure and Privacy-preserving Navigation”,
IEEE transactions on computer, February 2014
[2] Zhizhong jie,Chuanhe huang,Liya Xu, Bo Wang, Wenzhong Yang, “Oppurtunistic unicast and multicast
routing protocol for VANET”, SciRes 2013.
[3] J. Rak, “Providing differentiated levels of service availability in VANET communications,” IEEE Commun.
Let. vol. 17, no. 7, pp. 1380–1383, 2013
[4] Zhizhong jie,Chuanhe huang,Liya Xu, Bo Wang, Wenzhong Yang, ”Efficient oppurtunistic Routing Protocols for VANET”, International Journal of Digital content Technology and its application, April 2013.
[5] X. Lin, R. Lu, X. Liang, and X. Shen, “STAP: A Social-Tier-Assisted Packet Forwarding Protocol for
Achieving Receiver-Location Privacy Preservation in VANETs,” Proc. IEEE INFOCOM ’11, pp. 21472155, Apr. 2012.
[6] H. Dubios-Ferriere, et al., “Valuable detours: least cost anypath,” IEEE/ACM Trans. Network, vol. 19, no. 2,
pp. 333–346, 2011.
[7] T.W.Chin, S.M.Yui, Lucas C.K.Hui, Victor O.K.Li, “SPECS: Secure and Privacy Enhancing Communications Schemes for VANETs”, Proc. IEEE transactions on VANET, 2011.
[8] R. Hwang, Y. Hsiao, and Y. Liu, “Secure Communication Scheme of VANET with Privacy Preserving,”
Proc. IEEE 17th Int’l Conf. Parallel and Distributed Systems (ICPADS ’11), pp. 654-659, Dec. 2011
[9] G. Yan and S. Olariu, “A probabilistic analysis of link duration in vehicular ad hoc networks,” IEEE Trans.
Intell. Transport. Syst., vol. 12, no. 4, pp. 1227–1236, 2011.
[10] T. Li, et al., “Opportunistic routing for interactive traffic in wireless networks,” in Proc. 2010 ICDCS, pp.
458–467.
[11] Ghasssan Samara, Wafaa, R.Sures,”Security and challenges of Vehicular AD hoc Networks (VANET)”,
Proc. IEEE fourth Int’l Conf. New trends in information Science and Service Science (NISS’10), May 2010.
[12] W.L.Jin and W. W. Recker, “An analytical model of multihop connectivity of inter-vehicle communication
systems,” IEEE Trans. Wireless Commun., vol. 9, no. 1, pp. 106–112, 2010
[13] R. Lu, X. Lin, H. Zhu, and X. Shen, “SPARK: A New VANET Based Smart Parking Scheme for Large
Parking Lots,” Proc. IEEE INFOCOM ’09, pp. 1413-1421, Apr. 2009.
[14] C. Zhang, X. Lin, R. Lu, and P. H. Ho, “RAISE: An Efficient RSU aided Message Authentication Scheme
in Vehicular Communication Networks,” in Proceedings of the IEEE ICC ’08, May 2008, pp. 1451–145
[15] Khandani, et al., “Reliability and route diversity in wireless net-works,” IEEE Trans. Wireless Commun.,
vol. 7, no. 12, pp. 4772–4776, 2008
IJOAR© 2015
http://www.ijoar.org
Download