Skip to main content

2017 | OriginalPaper | Buchkapitel

VTrack: Emergency Services for Vehicular Networks with Enhanced Security Using Raspberry Pi

verfasst von : Pradnya Shidhaye, Pooja Pawar, Hitesh Jha, Jeril Kuriakose

Erschienen in: Computing and Network Sustainability

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A lot of literature is found in the area of vehicular networks. There are several studies that focus on the security issue. Security and privacy become major issues since the public disclosure of identity and location of vehicle is possible. Not only security but also vehicular networking lacks in applications such as emergency services. This paper presents anonymity of driver or passenger in vehicle, the privacy issue by authenticating the vehicle based on a time-dependent secret. The vehicle communicates with the remote server over a reliable and secure medium. For the purpose of simulation, Raspberry Pi, a Linux-based minicomputer, acts as a vehicle interfaced with a GPS module which gives the position of the vehicle. In the case of emergency, the driver pushes the emergency button on his vehicle and its most recent position is recorded at the server. Server sends this location to ambulance or other emergency services which in turn provides the service at the accident-prone zone with minimum delay. Security of entire communication is enhanced by using AES algorithm along with RSA key exchange technique. The entire implementation is a wireless system with added security and can aid to provide quick emergency services in the accident-prone area. This can save the lives of many people.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kuriakose J et al (2014) A review on localization in wireless sensor networks. In: Advances in signal processing and intelligent recognition systems. Springer, pp 599–610 Kuriakose J et al (2014) A review on localization in wireless sensor networks. In: Advances in signal processing and intelligent recognition systems. Springer, pp 599–610
2.
Zurück zum Zitat Abumansoor O, Boukerche A (2012) A secure cooperative approach for non line-of-sight location verification in VANET. IEEE Trans Veh Technol 61(1):275–285 Abumansoor O, Boukerche A (2012) A secure cooperative approach for non line-of-sight location verification in VANET. IEEE Trans Veh Technol 61(1):275–285
3.
Zurück zum Zitat Kuriakose J et al (2014) A review on mobile sensor localization. In: Security in computing and communications. Springer, Heidelberg, pp 30–44 Kuriakose J et al (2014) A review on mobile sensor localization. In: Security in computing and communications. Springer, Heidelberg, pp 30–44
4.
Zurück zum Zitat Malandrino F, Casetti C, Fiore M (2014) Verification and inference of positions in vehicular networks through anonymous beaconing. IEEE Trans Mobile Comput 13(10) Malandrino F, Casetti C, Fiore M (2014) Verification and inference of positions in vehicular networks through anonymous beaconing. IEEE Trans Mobile Comput 13(10)
5.
Zurück zum Zitat Diffie W, Hellman M (1979) Privacy and authentication: an introduction to cryptography. Proc IEEE 67(3):397–427 Diffie W, Hellman M (1979) Privacy and authentication: an introduction to cryptography. Proc IEEE 67(3):397–427
6.
Zurück zum Zitat Kuriakose J, Joshi S (2015) A comparative review of moveable sensor location identification. Int J Rob Appl Technol (IJRAT) 3(2):20–37 Kuriakose J, Joshi S (2015) A comparative review of moveable sensor location identification. Int J Rob Appl Technol (IJRAT) 3(2):20–37
7.
Zurück zum Zitat Amruth V et al (2015) Attacks that downturn the performance of wireless networks. In: 2015 International conference on computing communication control and automation (ICCUBEA). IEEE Amruth V et al (2015) Attacks that downturn the performance of wireless networks. In: 2015 International conference on computing communication control and automation (ICCUBEA). IEEE
8.
Zurück zum Zitat Kuriakose J, Amruth V, Raju RV (2015) Secure multipoint relay node selection in mobile ad hoc networks. In: Security in computing and communications. Springer, pp 402–411 Kuriakose J, Amruth V, Raju RV (2015) Secure multipoint relay node selection in mobile ad hoc networks. In: Security in computing and communications. Springer, pp 402–411
9.
Zurück zum Zitat Kuriakose J, Amruth V, Nandhini NS (2014) A survey on localization of wireless sensor nodes. In: 2014 International conference on information communication and embedded systems (ICICES). IEEE Kuriakose J, Amruth V, Nandhini NS (2014) A survey on localization of wireless sensor nodes. In: 2014 International conference on information communication and embedded systems (ICICES). IEEE
10.
Zurück zum Zitat Kuriakose J et al (2016) Assessing the severity of attacks in wireless networks. In: Proceedings of the international conference on recent cognizance in wireless communication and image processing. Springer, India Kuriakose J et al (2016) Assessing the severity of attacks in wireless networks. In: Proceedings of the international conference on recent cognizance in wireless communication and image processing. Springer, India
Metadaten
Titel
VTrack: Emergency Services for Vehicular Networks with Enhanced Security Using Raspberry Pi
verfasst von
Pradnya Shidhaye
Pooja Pawar
Hitesh Jha
Jeril Kuriakose
Copyright-Jahr
2017
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-3935-5_32

Neuer Inhalt