International Journal of Advance Research, IJOAR .org ISSN 2320-9194 International Journal of Advance Research, IJOAR .org Volume 3, Issue 2, February 2015, Online: ISSN 2320-9194 HIGHLY SCALABLE OPPORTUNISTIC ROUTING SOLUTIONS VANET MILIEU FOR AEGIS Fathima Parveen Banu .K (1), Natchadalingam .R (2) 1 is currently pursuingME Computer Science Engineering(specialization in Networks) in PSN Engineering College,Tirunelveli,TamilNadu, India, PH-9600537637. E-mail: sfatim.banu@gmail.com 2 is currently working as a Professor in Computer Science Engineering Department in PSN Engineering College, Tirunelveli, Tamil Nadu, India, PH-9442034296. E-mail: yraja1970@gmail.com ABSTRACT Here we propose a new application VANET –based aegis scheme that uses real time road conditions to guide the drivers by providing them with the better route. To maintain the privacy of drivers, their real identity and navigation query are completely separated using the idea of anonymous credentials. Here High Lifetime Opportunistic Routing scheme is suggested to provide stable communication paths with high link stability and reliable solution. Besides satisfying all security and privacy requirements, our solution is reliable in the sense that a vehicle can complete the whole navigation querying process and receive urgent notification in a very short time when compared with the offline map data searching approach. KeyWords Anonymous credential, Forwarder candidate selection, opportunistic routing, pseudo identity, link stability, authentication. IJOAR© 2015 http://www.ijoar.org International Journal of Advance Research, IJOAR .org ISSN 2320-9194 I. INTRODUCTION A VANET is a decentralized and self-organizing network composed of high speed moving vehicles. VANET is an important element of the Intelligent Transportation Systems (ITS). In VANET each vehicle has an on-board unit (OBU) and there is road–side units (RSU) installed along the roads. Trusted Authority (TA) is an essential entity which provides identity for vehicles and monitors the network. Vehicular ad hoc network (VANET) allows vehicles to broadcast safety messages to nearby vehicles (V2V) and to RSU (V2I) communication. [3] VANETs are a promising solution to improve the vehicular traffic safety, reduce the impact of vehicles on environmental pollution, or simply provide the in-vehicle infotainment services such as Internet access, advertisements, etc. Dedicated Short Range Communication (DSRC) is a short to medium range communication service that supports both public safety and private communication over wireless channel to about 300m [9]. However, high mobility of vehicles causes frequent failures of intervehicle links. To increase the multihop communications reliability in VANETs, opportunistic routing (OR) has received much attention recently. The main idea of opportunistic routing is that multiple nodes can potentially be served as the next-hop forwarders instead of preselecting a single specific node to be the next-hop forwarder. Once the existing node transmits a packet via a single-hop broadcast, all the other nodes that have received the packet will resolve which one or ones would actually forward the packet according to some criteria (e.g. the one that is closest to the destination will perform the forwarding while the rest will simply drop the packet ) [2] . The major problem in opportunistic routing is when there are multiple paths of similar expected number of anypath transmissions (ETX), there is route flapping (at some time, one path is slightly better than the other; at another time, the other path is slightly better) [12]. In this paper, a new application highly scalable and secure VANET Navigation System is proposed, which makes use of the collected data to provide navigation service to drivers. Based on the location information of the driver, the system can automatically find for a route that yields minimum traveling delay using the online information of the road condition. The link stability is an important factor considered here for preventing route flapping[15]. This issue is very important for many real-time safety services with stringent QoS requirements. The security of VANET is one of the most critical issues because their information transmission is propagated in open access (wireless) environments. Security requirements include [11] Message integrity: A vehicle should be authenticated before it can issue a navigation query. On the other hand, an RSU (vehicle) is able to verify that a message is from an authorized entity and unchanged. Identity privacy preserving: The real identity of a vehicle should be kept secret and a third-party should not be able to unveil a vehicle’s real identity by breaking down the multiple messages sent by it. Traceability: TA should have the facility to obtain a vehicle’s real identity for charging the vehicle which uses this navigation service. Also TA must maintain accountability revealing the vehicles identity when accidents happen on the road. The proposed scheme adopts some security primitives in a nontrivial way to provide the pursuing security characteristic [1]: 1. The entire vehicle is properly authenticated and privacy is preserved using the idea of pseudo identity. 2. The real identity and navigation query are completely delinked using the idea of anonymous credential. 3. Navigation queries and results can be computed within reasonable amount of time. In this paper, new type of anypath routing namely High life time opportunistic routing scheme is suggested here which provides efficient routing IJOAR© 2015 http://www.ijoar.org International Journal of Advance Research, IJOAR .org ISSN 2320-9194 solution to implement above security mechanism in VANET environment. The rest of the paper is organized as follows: related work is reviewed in Section II. Section III outlines the details of our HLO routing concept, while Section IV shows the system model. The main security schemes are presented in Section V and the analysis and evaluation of our schemes are given in Sections VI. Finally, Section VII concludes the paper. II RELATED WORK R. Lu in [5] suggested an efficient social-tierassisted packet forwarding protocol STAP for achieving receiver-location privacy preservation in VANETs was proposed. The authors proposed to install RSUs at social spots and this forms a virtual social tier. Without the receiver’s exact location’s knowledge, a packet for him/her can first be forwarded and disseminated in the desired social tier. Later if the receiver visits one of social spots, he/she can receive the packet successfully. In [8], a proficient self-generated pseudonym method based on Identity-Based Encryption (IBE) was proposed for preserving drivers’ privacy. In the same year, a policy was formulated for pseudonym update to sustain privacy when a vehicle is being observed by an adversary who has special capabilities [14]. Another scheme suggested in [13], which covered a car park, while ours is large scale to cover the whole city and nearby areas. This scheme has a car park is monitored by three RSUs that determines the vehicle’s location, searching for a free parking zone, and providing direction-finding service to guide the vehicle to go to the selected parking space. Jie Zhinzhong in [4] introduced a trust model based on trust degree and applied opportunistic routing in VANET within the coverage of one RSU. In [7] T.W.Chim and his colleagues provided the group communication protocol to allow the vehicles to authenticate and securely communicate with others in a group of known vehicles. In [6] an algorithm to compute least-cost anypath routes is proposed to decrease energy transmission costs in union with anypath routing using single path metrics. III HIGH LIFETIME OPPORTUNISTIC (HLO) ROUTING CONCEPT In our HLO scheme , sij denotes stability index of link (i,j) at any time t0 based on vehicles movement in the previous interval.cij value represents the expected number of anypath transmissions needed to successfully deliver the packet sent by node i to any node from j. pij indicate the packet delivery ratio from node i to atleast one node from j [15][10]. The weight wij denotes probability of node j being the forwarding node of a packet received from vehicle i. cij= 1/(1- ПjϵJ (1- pij. sij) ) wij= (pij. sij П k=1j-1 (1-pik.sik)) /(1- ПjϵJ (1- pij. sij) ) Steps involved are Forwarder candidate selection: Build a set of potential forwarders. Forwarder selection: determine the forwarder. Forwarder role change Notification: Notify other nodes about who will be forwarding the packet. Cost and weight calculation: cij=1/(1- Пj€J (1- pij. sij) ) (1) wij= (pij. sij П k=1j-1 (1-pik.sik)) /(1- Пj€J (1- pij. sij) ) (2) IV SYSTEM MODEL Fig 1 shows the overall system architecture. The system implementation involves the following modules: Node creation and Network formation: This module creates the vehicle node, RSU Network Simulator ns-2. Protocol implementation: The HLO routing algorithm is implemented for routing information among nodes. Security implementation: Trusted authority creates the anonymous credentials for node communication and authentication process. Route discovery and notification: When any accident or any blocking of road is is identified, immediately the route conditions are informed to vehicles as an alternate route suggestion. IJOAR© 2015 http://www.ijoar.org International Journal of Advance Research, IJOAR .org ISSN 2320-9194 which is stored and maintained locally, which is used for encryption at later stages [1]. From RSU to vehicles the route information includes average speed, vehicle random number, session number, direction, RSU’s ID, vehicle id. The urgent change of route initiated by RSU consists of message which contains blocked message, session number, RSU Id, direction. VI SIMULATION AND ANALYSIS Simulation Environment Based on the IEEE 802.11b of MAC layer, our simulation environment is NS2. The vehicles move from a random initial point to destination along the road in the uniform speed. The transport protocol is User Datagram Protocol (UDP). Traffic sources are Constant Bit Rate (CBR). The number of vehicles is equally scattered over the entire network. Fig 2. Shows the simulation environment of our proposed scheme. Fig1. The overall system architecture V THE SECURITY SCHEME The security scheme that has been implemented here is summarized below: 1. TA stores the parameters and generates anonymous credentials. 2. Vehicle Vi requests a navigation credential from RSU and stores it in a tamper-proof device. 3. Vi’s tamper-proof device sends out its navigation request to RSU Rk. 4. RSU Rk relays the navigation request to its neighbors until the request reaches RSU Rd covering the destination. 5. RSU Rk forwards the reply message to Vi’s tamper-proof device which then checks the messages from all RSUs along the route. 6. TA reveals Vi’s real identity for billing purpose, based on Vi’s pseudo identity received from RSU Rj, 7. For authentication verification, TA gives for each vehicle a real identity, license plate number. Based on the current time the pseudo identity for each vehicle is generated randomly. The navigation request message is M= {IV_REQ,DEST}, where DEST represents the destination point. Vehicles tamperproof device picks a random number rand Fig 2.NS2 simulation of HLO scheme Performance Analysis A. Message Loss Fig 3. Message loss with traffic load Figure 3 shows the relationship between the message loss and the traffic load. Here the traffic IJOAR© 2015 http://www.ijoar.org International Journal of Advance Research, IJOAR .org ISSN 2320-9194 load is denoted by the number of vehicles associated with the RSU. Clearly we can observe that the message loss increases with the increase in traffic load but using our scheme, the lowest message loss is yielded. B. Throughput VII CONCLUSION In this paper, we build a highly scalable and secure VANET navigation environment which is based on High Lifetime Opportunistic (HLO) Routing scheme. We addressed the problem of anypath link stability. Our solution provides an efficient way of implementing security and authentication schemes for inter vehicular communication as well as between the RSU and TA. Route notification and urgent message delivery are key features of the system which scales the usage of system. In our future work, we will expand our idea about opportunistic routing with congestion control mechanism to decrease the traffic overhead and test it by simulation. Fig 4. Throughput with time interval Figure 4 shows the correlation between the throughput and the time interval. As the time increases the system attains the maximum throughput value. C. Link Stability Fig 5. Link stability with time interval Figure 5 shows the variations in link stability indices with time interval. As the time increases, the link stability indices for each link increases and attain a stable value. IJOAR© 2015 http://www.ijoar.org International Journal of Advance Research, IJOAR .org ISSN 2320-9194 REFERENCES [1] Chim, TW; Yiu, SM; Hui, CK; Li, VOK “VSPN: VANET-based Secure and Privacy-preserving Navigation”, IEEE transactions on computer, February 2014 [2] Zhizhong jie,Chuanhe huang,Liya Xu, Bo Wang, Wenzhong Yang, “Oppurtunistic unicast and multicast routing protocol for VANET”, SciRes 2013. [3] J. Rak, “Providing differentiated levels of service availability in VANET communications,” IEEE Commun. Let. vol. 17, no. 7, pp. 1380–1383, 2013 [4] Zhizhong jie,Chuanhe huang,Liya Xu, Bo Wang, Wenzhong Yang, ”Efficient oppurtunistic Routing Protocols for VANET”, International Journal of Digital content Technology and its application, April 2013. [5] X. Lin, R. Lu, X. Liang, and X. Shen, “STAP: A Social-Tier-Assisted Packet Forwarding Protocol for Achieving Receiver-Location Privacy Preservation in VANETs,” Proc. IEEE INFOCOM ’11, pp. 21472155, Apr. 2012. [6] H. Dubios-Ferriere, et al., “Valuable detours: least cost anypath,” IEEE/ACM Trans. Network, vol. 19, no. 2, pp. 333–346, 2011. [7] T.W.Chin, S.M.Yui, Lucas C.K.Hui, Victor O.K.Li, “SPECS: Secure and Privacy Enhancing Communications Schemes for VANETs”, Proc. IEEE transactions on VANET, 2011. [8] R. Hwang, Y. Hsiao, and Y. Liu, “Secure Communication Scheme of VANET with Privacy Preserving,” Proc. IEEE 17th Int’l Conf. Parallel and Distributed Systems (ICPADS ’11), pp. 654-659, Dec. 2011 [9] G. Yan and S. Olariu, “A probabilistic analysis of link duration in vehicular ad hoc networks,” IEEE Trans. Intell. Transport. Syst., vol. 12, no. 4, pp. 1227–1236, 2011. [10] T. Li, et al., “Opportunistic routing for interactive traffic in wireless networks,” in Proc. 2010 ICDCS, pp. 458–467. [11] Ghasssan Samara, Wafaa, R.Sures,”Security and challenges of Vehicular AD hoc Networks (VANET)”, Proc. IEEE fourth Int’l Conf. New trends in information Science and Service Science (NISS’10), May 2010. [12] W.L.Jin and W. W. Recker, “An analytical model of multihop connectivity of inter-vehicle communication systems,” IEEE Trans. Wireless Commun., vol. 9, no. 1, pp. 106–112, 2010 [13] R. Lu, X. Lin, H. Zhu, and X. Shen, “SPARK: A New VANET Based Smart Parking Scheme for Large Parking Lots,” Proc. IEEE INFOCOM ’09, pp. 1413-1421, Apr. 2009. [14] C. Zhang, X. Lin, R. Lu, and P. H. Ho, “RAISE: An Efficient RSU aided Message Authentication Scheme in Vehicular Communication Networks,” in Proceedings of the IEEE ICC ’08, May 2008, pp. 1451–145 [15] Khandani, et al., “Reliability and route diversity in wireless net-works,” IEEE Trans. Wireless Commun., vol. 7, no. 12, pp. 4772–4776, 2008 IJOAR© 2015 http://www.ijoar.org