You are on page 1of 6

IJIRST International Journal for Innovative Research in Science & Technology| Volume 2 | Issue 02 | July 2015

ISSN (online): 2349-6010

Improving Energy Efficiency of VANET based


Secure and Privacy Preserving Navigation Scheme
using LTE
Mrs. Dhakshu Sivan
Department of Computer Science and Engineering
NCERC, University of Calicut Thrissur, India

Mrs. Jini K.M.


Department of Computer Science and Engineering
NCERC, University of Calicut Thrissur, India

Abstract
A navigation system which utilizes the online information gathered from the VANET to guide the drivers to desired destinations
in a continuous and real time manner. Vanet based secure and privacy preserving navigation scheme (VSPN) helps to find a
better route and also it satisfies all privacy and security requirements. For improving the energy efficiency of individual nodes in
VSPN, Long Term Evolution (LTE) technique is introduced. LTE will help to achieve better data rates and content distribution
delay can be minimized. This paper aims at describing the analysis and evaluation of VSPN navigation schemes and its
enhancement using LTE.
Keywords: Navigation, On Board Unit (OBU), Road Side Unit (RSU), Vehicular Adhoc Network (VANET), Long Term
Evolution (LTE)
_______________________________________________________________________________________________________

I. INTRODUCTION
Vehicular adhoc network (VANET) is emerging as a new promising field in wireless technology which aims to deploy vehicle to
vehicle communication as well as vehicle to infrastructure communication. Many countries use this technology for efficient
traffic management. It forms a core part of intelligent transportation system (ITS). In VANET system, each vehicle is equipped
with an onboard unit (OBU), which is responsible for all communication and computation tasks. There are certain roadside units
(RSU), which are the wireless infrastructures that are deployed on the roadside. Also, there is a trusted authority and underlying
servers which are responsible for security related issues between the vehicle and the RSU unit. The OBUs and RSUs
communicate over the wireless channel using the Dedicated Short Range Communications (DSRC) protocol while the RSUs,
TA, and the application servers communicate using a wired structure (fixed internet).Before entering the network, each vehicle
has to register with the authority and preloaded sign in keys and credentials are obtained offline from authority. For ensuring
security, filtering of messages is essential. One of the main applications of VANET is to broadcast the information collected
from the vehicles which includes vehicles speed, turning direction, road condition, traffic accident information etc. This
information will be passed to nearby vehicles and RSU units periodically such that other vehicles can change their travelling
route whenever needed. Vanet can also be interpreted as a sensor network. One of the main challenge in the area of Vanet is that
how to utilize the collected information for various applications.

Fig. 1: Structure of Vanet

Earlier, a hardcopy of atlas is used for finding a route from source to destination. But it is a tedious approach. Global
positioning system (GPS)[1] system is introduced. By receiving GPS signals, device can determine its current location and finds

All rights reserved by www.ijirst.org

196

Improving Energy Efficiency of VANET based Secure and Privacy Preserving Navigation Scheme using LTE
(IJIRST/ Volume 2 / Issue 02/ 034)

the geographically shortest route to destination based on local map database. Here the real time road conditions are not
considered while performing navigation. Then Traffic message channel (TMC)[2] is introduced.TMC uses an FM radio system
to broadcast real time information. But it has its own limitations. Only special conditions are recorded and general fluency of
vehicles cannot be obtained. So the requirement persists for an efficient navigation system.
The rapid increase of vehicular traffic and congestion on the highways began hampering the safe and efficient movement of
traffic. Vanet based secure and privacy preserving navigation (VSPN)[3] scheme utilizes online information collected from the
RSU and helps to find the route to the destination. A driver can issue a query (e.g. road conditions along the roads to his
destination) to a nearby RSU; this system will automatically collect the required information from the appropriate RSUs. The
gathering process is done in a real-time and distributed manner. This system requires security and privacy requirements which
includes sender authentication (to ensure that sender is the valid subscriber) and conditional identity privacy preserving (to
ensure that a drivers travelling route cannot be traced by any third party except the trusted authority). And there are additional
security and privacy requirements. Conditional identity privacy preserving implies that only the trusted authority is capable of
knowing the real identity of a vehicle.
Similar to other networks, security issues are common in Vanet. Here vehicle to vehicle authentication, vehicle to RSU
authentication and RSU to TA authentication should be ensured. Privacy protection is essential as the vehicles onboard unit
frequently communicate with RSU. One of the solutions to ensure privacy is by using pseudo identity for different RSU. Also
different authentication mechanisms can be used. So that messages between the vehicles and RSUs cannot be linked and
travelling route can be protected. Based on the pseudo identity, real identity of vehicle can be obtained from TA.
Long Term Evolution (LTE) technique can be implemented with VSPN, hence the efficiency of individual node can be
improved and high data rates can be achieved. LTE uses multiple input multiple output(MIMO) antenna technology which is a
similar technology that is used in IEEE 802.11n wireless local area network(WLAN) standard. The higher signal to noise ratio at
the receiver provides improved coverage and throughput, especially in dense urban areas.
In this paper, analysis and evaluation of various navigation schemes are done. Related work is included in section 2. System
Model is given in section 3. Section 4 describes the working of VSPN scheme. STE technique is done in section 5 , Simulation
results in section 6 and Conclusion in section 7.

II. RELATED WORKS


A similar navigation scheme is SPARK [4]. It is a navigation scheme which helps to find a vacant space in a parking lot. For
providing parking convenience for the drivers, a parking guidance system consisting of dynamically updated guide signs has
been created to properly guide drivers to park their vehicle in the free space. Earlier sensors were deployed at large parking lots,
which was costly, inaccurate and had functionality problems. With the help of Vanet, vehicles communicate with each other and
also with RSU from which real time information are collected. Hence this scheme ensures reliable and effective parking. This
scheme covers a small parking area whereas the VSPN scheme covers a large city. SPARK scheme is controlled by three RSU
whereas the VSPN scheme contains more number of RSU, as it covers the whole city. Providing security to VSPN is also a
tedious task. In SPARK, due to limited number of RSU, security guards can monitor the whole system but this is not possible
with VSPN.SPARK system could not solve the problem mentioned in this paper.
In Vanet, all the vehicles will be moving so that its topology changes rapidly. Hence security issues are common. The Identity
based batch verification scheme (IBV)[5] protocol was proposed for vehicle-to-RSU communications. Using three pairing
operations, the RSU can verify a large number of signatures as a batch. Each vehicle is equipped with a tamperproof device, in
which all the secret keys will be preloaded. If one device is compromised, them the whole system will be compromised. Its
privacy requirement is not satisfied as its real identity can be traced by anyone. Anti-traceability attack and impersonation attack
are likely to occur. Also this protocol is not suitable for Vehicle to vehicle communication. Another protocol called RSU-Aided
Message Authentication Scheme (RAISE) [6] is proposed. It is a software based protocol. With the help of RSU, each vehicle is
allowed to verify the signature of nearby vehicles. Here the RSU verifies the signatures one after the other. Hence each RSU
need to verify thousands of signatures within a short interval of time. This causes heavy message overhead. Privacy preserving
querying is based on the idea of anonymous credential [7][8]. The system allows a user to obtain a credential from one
organization and later show the possession of the credential to another organization while the transactions at the two
organizations are not linkable. In different applications, the idea of anonymous credential has been adopted.
A group signature based communication scheme is proposed [9]. In conventional digital signature scheme, vehicles need to
store an extensive number of public/private key pairs, and keys must be changed frequently. Secure distribution of keys, key
management, and storage are extremely troublesome in this kind of plan. This novel group signature based security scheme
which relies on tamper resistance devices (requiring password access) for preventing adversarial attacks on vehicular networks.
This scheme achieves authenticity, data integrity, anonymity, and accountability. A single group public key is used to verify the
signature. Security and privacy are key issues. The signature of any vehicle can be verified by the same group key but the actual
signer can only be traced by a trusted party. Though privacy can be preserved, these schemes are rather complicated and may not be
practical.

All rights reserved by www.ijirst.org

197

Improving Energy Efficiency of VANET based Secure and Privacy Preserving Navigation Scheme using LTE
(IJIRST/ Volume 2 / Issue 02/ 034)

III. SYSTEM MODEL


We have discussed that a vehicular adhoc network consists of on-board units installed on vehicles, road-side units along the
roads, and a trusted authority.
A. Assumptions
The following are some assumptions:
1) TA is trusted, as the real identity of vehicles should be known only by the TA. All the other vehicles and RSU are
forbidden from knowing the real identity of the vehicle. All the cryptographic functions of key generation are done.
Generation and management of anonymous credential should be trusted and is done by TA. Also, the real identity of
vehicle is known only by TA. Redundant TAs is developed for avoiding a single point of failure.
2) RSUs are not trusted and inquisitive. Since they are set along roadside, they can be effortlessly bargained. Likewise they
are interested about drivers' protection for example, route inquiries. There should be a fixed communication between
RSUs and TA.
3) Public key infrastructure (PKI) is used for initial vehicle authentication. Each vehicle Vi has a conventional public key
CPKi and a conventional private key CSKi and is given a TA-signed certificate.TA and RSU uses an identity based
public key infrastructure. Public key is known by everyone. Also any RSU Ri broadcasts its public key which is the
same as its real identity RRIDi periodically to vehicles that are travelling within the RSU-Vehicle Communications
(RVC) range of it. The validity of RRIDi can be ensured using a certificate issued by the TA.
4) Our VSPN scheme is assumed to have more number of navigation queries. Each RSU consist of a local database which
stores current road conditions and important landmarks and also the directions and distance to nearby RSUs.
5) Each vehicle is equipped with a tamper proof device, in which all cryptographic functions are done. TA will send
current time to all RSUs and RSUs will sent it to vehicles.
B. Security Requirements
The following are various needed security requirements:
1) Message Integrity and authentication: All vehicles and RSUs which sent out messages should be properly authenticated.
2) Identity privacy preserving: Real identity of vehicle should not be known to other vehicles and RSU units otherwise
there is a possibility of hacking messages.
3) Traceability: Real identity of the vehicle should be known only to TA.
4) Confidentiality: Navigation query raised by the driver and also the query results should be kept confidential from third
party.
5) Unlinkability: Real identity of vehicle should not be linked with query, even though RSUs and TA communicate.

IV. VSPN-WORKING
Vanet based secure and privacy preserving navigation (VSPN) utilizes the collected data to provide navigation services [3]. This
scheme is based on the idea of anonymous credential. Based on the requirements of the driver, query is raised. System will
search for the route with minimum travelling delay. TA will generate navigation credential. This will be refreshed periodically so
that the security can be ensured. Summarization of the fundamental steps in VSPN working is shown below:
1) At first TA will setup parameters and generate anonymous credential. TA will generate a master secret key, s and it will
be broadcasted to all RSU. Conventional public key and private key is used for master key re-encryption.
2) Vehicle Vi login to the network using the username and password provided by TA. A master key request is passed to
nearby RSU, Rc.
3) Vehicles tamperproof device will request for a navigation credential from RSU,Rj.
4) After verifying vehicle Vi identity, RSU Rj send an anonymous credential to vehicles tamperproof device.
5) Vis tamper-proof device will request for a navigation request from RSU, R k. As there are more number of requests, it will
cause delay in processing the navigation query.
6) 6. Query generated by the vehicle, Vi is propagated along the RSU network. RSU, R k initiates the route searching process
till the query reaches the destination. RSU will check whether the destination is within the communication area. If it is,
then the query will be passed to nearby RSU which are closer to destination.
7) A navigation reply message will be constructed by RSU, Rd which will be passed along the reverse direction. The message
contains the hop information which includes signatures, road condition and average speed of vehicles.
8) Up on receiving the reply message from RSU R k, the vehicle tamperproof device verifies the messages in the forward
direction, till it reaches the destination.
9) Each RSU is provided with a navigation session number by which navigation path can be determined.
10) By using Vis pseudo identity and master secret key, s TA can reveal Vis real identity for billing purposes.

All rights reserved by www.ijirst.org

198

Improving Energy Efficiency of VANET based Secure and Privacy Preserving Navigation Scheme using LTE
(IJIRST/ Volume 2 / Issue 02/ 034)

Fig. 2: VSPN Steps

Advantages of VSPN scheme is that, information provided by RSUs can properly authenticated before the route is being used
and route blocking can be reduced. Navigation queries and results are protected from eavesdroppers. No one including TA can
link up query and its identity. Also, it will satisfy all security requirements. One of the disadvantages is that, the existing method
will search for all nodes and request of all nodes other than RSU area; it will take more time and more energy for request and
data transmission. Also, data advertisement cannot guarantee the delivery of data.

V. LTE TECHNIQUE AND WORKING


LTE, an abbreviation for Long Term Evolution is a standard for wireless communication and is used for high speed data
transmission. This 4G wireless broadband technology is developed by the Third Generation Partnership Project (3GPP). LTE
provides significantly increased peak data rates, with the potential for 100 Mbps downstream and 30 Mbps upstream,
reduced latency, scalable bandwidth capacity, and backwards compatibility with existing GSM and UMTS technology. LTE will
support mixed data, voice, video and messaging traffic.

Fig 3: Working of LTE

In network Formation, vehicles form clusters. Vehicles in the range of an LTE base station(BS), should communicate a
content of common interest (files, maps, live video from disaster area, etc.) to the vehicles, which can communicate with each
other using IEEE 802.11p on the short range(SR). LTE communication is considered on the long range (LR) links. In LTE, the
available spectrum is divided into resource blocks (RB) consisting of 12 adjacent subcarriers, allocated in a 0.5 ms time slot.
Here unicasting and multicasting is done. Base station will unicast the message to the selected vehicle and by means of
multicasting, message will be passed to nearby vehicles. Vehicles receive the messages on LTE and transmit on the SR 802.11p
links. Hence content distribution delay can be minimized. The content distribution time is computed as the sum of the time
needed to receive the content on the LR and the time needed to multicast it on the SR. For clustering, an hierarchical clustering
algorithm, LEACH is used. Nodes calculate the participation standards of candidate Cluster Head (CH), and then nodes choose

All rights reserved by www.ijirst.org

199

Improving Energy Efficiency of VANET based Secure and Privacy Preserving Navigation Scheme using LTE
(IJIRST/ Volume 2 / Issue 02/ 034)

the best CH according to the ratio between the nodes residual energy and the distance to the sink node. By means of unicasting,
the messages will be passed to the cluster head. Vehicles take turn in transmitting a certain message. The message contains
information about the transmitting vehicle (its ID, IP address, etc.), its channel state information (CSI) on the LR and a pilot
sequence on the SR so that the other vehicles estimate their SR CSI with the transmitting vehicle. Unicasting and multicasting
are implemented in each vehicle independently. To implement optimized collaborative content distribution, signaling
information needs to be exchanged between the vehicles themselves, and between the vehicles and the BS.

VI. SIMULATION RESULTS


In this section, LTE technique and VSPN scheme is evaluated. Simulation results show that the content distribution delay can be
minimized. Graph is plot with number of connections along X-axis and delay along Y-axis. Fig 4.1 illustrates the same.

Fig. 4.1: Number of connections versus Delay

LTE technique will help to reduce routing overhead. Graph is plot with number of connections along X-axis and routing
overhead along Y-axis.Fig 4.2 clearly shows that the LTE technique dominates the existing VSPN scheme.

Fig. 4.2: Number of connections versus Routing overhead

Simulation result of LTE integrated architecture is given in Fig 4.3. Here all the parameters are computed and the results are
evaluated. From results, it is clear that the energy efficiency of the whole network can be improved by means of LTE technique.

All rights reserved by www.ijirst.org

200

Improving Energy Efficiency of VANET based Secure and Privacy Preserving Navigation Scheme using LTE
(IJIRST/ Volume 2 / Issue 02/ 034)

VII. CONCLUSION
Vanet based secure and privacy preserving navigation (VSPN) scheme help to find a better navigation path using the real time
information collected from RSU. It will satisfy all security and privacy requirements. But there is no provision to improve the
lifetime of the individual node. In many applications, the node closer to the sink are overburdened with huge traffic load as the
data from the entire region are forwarded through them to reach to the destination. For long range communication, Long term
evolution (LTE) technique is introduced. With the help of LTE, co-operative delay-sensitive content distribution in public safety
vehicular ad hoc networks was investigated and high data rates can be achieved. Simulation results shows that the best
performance was achieved when the base station unicasts the content to a selected vehicle on the long range, and that vehicle
multicasts the data to other vehicles within its cooperating cluster. By means of LTE, throughput can be improved and delay can
be minimized. Also, packet delivery ratio and data packet received can also be improved.

REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]

Global Positioning System Standard Positioning Service Signal Specification. Navtech GPS Supply, 1995.
TrafficMessageChannel (TMC), Available at the link: http://www.tmcforum.com/,2004.
T.W. Chim, S.M. Yiu, Lucas C.K. Hui and Victor O.K. Li, VSPN: VANET-Based Secure and Privacy-Preserving Navigation, IEEE TRANSACTIONS
ON COMPUTERS, Vol. 63, No. 2, February 2014
R. Lu, X. Lin, H. Zhu, and X. Shen, SPARK: A New VANET BasedSmart Parking Scheme for Large Parking Lots, Proc. IEEEINFOCOM 09, pp. 14131421, Apr. 2009.
C. Zhang, R. Lu, X. Lin, P.H. Ho, and X. Shen, An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks, Proc. IEEE
INFOCOM 08, pp. 816-824, Apr. 2008.
C. Zhang, X. Lin, R. Lu, and P.H. Ho, RAISE: An Efficient RSU Aided Message Authentication Scheme in Vehicular Communication Networks, Proc.
IEEE Intl Conf. Comm. (ICC 08), pp. 1451-1457, May 2008.
E. Aimeur, H. Hage, and F. S. M. Onana Anonymous Credentials for Privacy-Preserving E-learning, In Proceedings of the IEEE MCETECH08, pages
70 80, July 2008.
Z. Chen and L. Xu,Anti-Collusion Anonymous Credentials Scheme, In Proceedings of the IEEE CIT 06, pages 150 155, September 2006.
A. Wasef and X. Shen,PPGCV: Privacy Preserving Group Communications Protocol for Vehicular Ad Hoc Networks, In Proceedings of the IEEE ICC
08, pages 1458 1463, May 2008.

All rights reserved by www.ijirst.org

201

You might also like