Pub Date : 2017-11-01DOI: 10.1109/VNC.2017.8275619
Gurjashan Singh Pannu, Florian Klingler, C. Sommer, F. Dressler
We present Multi-Queue Distributed Channel Access (QQDCA), an improved MAC scheme to mitigate the head-of-line (HOL) blocking problem observed in highly dynamic networks when Wireless LAN (WLAN) unicast (re-)transmissions are used. Focusing on Vehicular Ad Hoc Networks (VANETs) as a prime example, our novel MAC protocol can be used for all IEEE 802.11 based wireless networks having very dynamic topologies. In brief, failing unicast messages create a problem by blocking all remaining frames in the transmit queue until they are successfully acknowledged or the maximum retransmission counter expires. This HOL blocking has been identified as a rare or temporary phenomenon in the late 1990s already. However, it turned out that the problem is both much more frequent and persistent in VANETs due to their very dynamic nature. Here, it may take a substantial amount of time in which no other message can be sent. We present and discuss QQDCA to address this problem, analytically show its benefits, and evaluate the protocol in an extensive simulation study. QQDCA can reduce the delay induced by HOL blocking by up to 95 %.
{"title":"QQDCA: Adapting IEEE 802.11 EDCA for unicast transmissions at high topology dynamics","authors":"Gurjashan Singh Pannu, Florian Klingler, C. Sommer, F. Dressler","doi":"10.1109/VNC.2017.8275619","DOIUrl":"https://doi.org/10.1109/VNC.2017.8275619","url":null,"abstract":"We present Multi-Queue Distributed Channel Access (QQDCA), an improved MAC scheme to mitigate the head-of-line (HOL) blocking problem observed in highly dynamic networks when Wireless LAN (WLAN) unicast (re-)transmissions are used. Focusing on Vehicular Ad Hoc Networks (VANETs) as a prime example, our novel MAC protocol can be used for all IEEE 802.11 based wireless networks having very dynamic topologies. In brief, failing unicast messages create a problem by blocking all remaining frames in the transmit queue until they are successfully acknowledged or the maximum retransmission counter expires. This HOL blocking has been identified as a rare or temporary phenomenon in the late 1990s already. However, it turned out that the problem is both much more frequent and persistent in VANETs due to their very dynamic nature. Here, it may take a substantial amount of time in which no other message can be sent. We present and discuss QQDCA to address this problem, analytically show its benefits, and evaluate the protocol in an extensive simulation study. QQDCA can reduce the delay induced by HOL blocking by up to 95 %.","PeriodicalId":101592,"journal":{"name":"2017 IEEE Vehicular Networking Conference (VNC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126331532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/VNC.2017.8275633
Bastian Bloessl, Florian Klingler, Fabian Missbrenner, C. Sommer
To design, test, and evaluate applications for Vehicular Ad Hoc Networks (VANETs), researchers rely heavily on network simulations. These allow conducting experiments in a fast, cheap, and reproducible manner. In general, the accuracy of simulation results depends to a large degree on the quality of the simulation models. Here, the model of the physical layer is particularly crucial for the realism of the results. Given its relevance, it is unfortunate that there is a dispute within the community on how interference should be modeled. To fill this gap, we conduct a systematic study of the IEEE 802.11p physical layer in which we cross-validate results from simulations, off-the-shelf devices, and lab equipment. The results of these experiments are all coherent and indicate that intra-technology interference, i.e., interference from other IEEE 802.11p devices, has a similar impact than noise. Treating interference like noise is, therefore, not just a simplification that is adopted by many network simulators, but accurately captures reality.
{"title":"A systematic study on the impact of noise and OFDM interference on IEEE 802.11p","authors":"Bastian Bloessl, Florian Klingler, Fabian Missbrenner, C. Sommer","doi":"10.1109/VNC.2017.8275633","DOIUrl":"https://doi.org/10.1109/VNC.2017.8275633","url":null,"abstract":"To design, test, and evaluate applications for Vehicular Ad Hoc Networks (VANETs), researchers rely heavily on network simulations. These allow conducting experiments in a fast, cheap, and reproducible manner. In general, the accuracy of simulation results depends to a large degree on the quality of the simulation models. Here, the model of the physical layer is particularly crucial for the realism of the results. Given its relevance, it is unfortunate that there is a dispute within the community on how interference should be modeled. To fill this gap, we conduct a systematic study of the IEEE 802.11p physical layer in which we cross-validate results from simulations, off-the-shelf devices, and lab equipment. The results of these experiments are all coherent and indicate that intra-technology interference, i.e., interference from other IEEE 802.11p devices, has a similar impact than noise. Treating interference like noise is, therefore, not just a simplification that is adopted by many network simulators, but accurately captures reality.","PeriodicalId":101592,"journal":{"name":"2017 IEEE Vehicular Networking Conference (VNC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128197917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/VNC.2017.8275603
Varun Jain, Stephan Lapoehn, T. Frankiewicz, T. Hesse, M. Gharba, Sandip Gangakhedkar, K. Ganesan, Hanwen Cao, J. Eichinger, A. R. Ali, Yao Zou, Liang Gu
One of the major advantages of V2V communication for vehicle platooning system is the low latency of message transfer between the vehicles as compared to the recognition by the sensor systems. The low latency allows the following vehicles to predict the trajectory of leading vehicle and plan the required control actions in a very short time. In addition, V2V can be effectively used in scenarios where the information from vision sensors in unavailable or limited due to field-of-view or unsuitable weather conditions. In this paper, we present such a vehicle platooning system that relies only on V2V communication, without use of vision sensors. We also evaluate the effect of communication latency and reliability on the performance of the system. Vehicle tests using prototype hardware for 5G-V2X and 802.11p communications show the effectiveness of the approach.
{"title":"Prediction based framework for vehicle platooning using vehicular communications","authors":"Varun Jain, Stephan Lapoehn, T. Frankiewicz, T. Hesse, M. Gharba, Sandip Gangakhedkar, K. Ganesan, Hanwen Cao, J. Eichinger, A. R. Ali, Yao Zou, Liang Gu","doi":"10.1109/VNC.2017.8275603","DOIUrl":"https://doi.org/10.1109/VNC.2017.8275603","url":null,"abstract":"One of the major advantages of V2V communication for vehicle platooning system is the low latency of message transfer between the vehicles as compared to the recognition by the sensor systems. The low latency allows the following vehicles to predict the trajectory of leading vehicle and plan the required control actions in a very short time. In addition, V2V can be effectively used in scenarios where the information from vision sensors in unavailable or limited due to field-of-view or unsuitable weather conditions. In this paper, we present such a vehicle platooning system that relies only on V2V communication, without use of vision sensors. We also evaluate the effect of communication latency and reliability on the performance of the system. Vehicle tests using prototype hardware for 5G-V2X and 802.11p communications show the effectiveness of the approach.","PeriodicalId":101592,"journal":{"name":"2017 IEEE Vehicular Networking Conference (VNC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127070269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/VNC.2017.8275612
E. Grigoreva, Dhruva Shrivastava, C. M. Machuca, W. Kellerer, J. Dittrich, Heinz Wilk, Hans-Martin Zimmermann
State-of-the-art wireless communication networks that enable safety and emergency services are predominantly based on Terrestrial Trunked Radio (TETRA). TETRA guarantees four nines of average end-to-end connection availability, but offers low data rate. Originally low-data rate safety and emergency services evolve from basic as voice and messaging towards video and other applications that require high data rate. Emergency and safety-critical voice and messaging, however, fall under a category of ultra-reliable communications and require an average connection availability of five nines, i.e., an average outage time of 5.25 minutes per year. The challenge that we address in this paper is guaranteeing the average connection availability for the ultra-reliable communications as voice, while providing sufficient data rate for the complimentary services as video. We achieve this by using heterogeneous wireless access network, i.e., WLAN, LTE and TETRA, enhanced with automated switching between the wireless technologies through Dynamic Link Exchange Protocol (DLEP). Based on the testbed measurements and reliability analysis, we show that a heterogeneous access network can achieve the five nines availability, while increasing the available data rate in comparison with single technology access networks.
{"title":"Heterogeneous wireless access network protection for ultra-reliable communications","authors":"E. Grigoreva, Dhruva Shrivastava, C. M. Machuca, W. Kellerer, J. Dittrich, Heinz Wilk, Hans-Martin Zimmermann","doi":"10.1109/VNC.2017.8275612","DOIUrl":"https://doi.org/10.1109/VNC.2017.8275612","url":null,"abstract":"State-of-the-art wireless communication networks that enable safety and emergency services are predominantly based on Terrestrial Trunked Radio (TETRA). TETRA guarantees four nines of average end-to-end connection availability, but offers low data rate. Originally low-data rate safety and emergency services evolve from basic as voice and messaging towards video and other applications that require high data rate. Emergency and safety-critical voice and messaging, however, fall under a category of ultra-reliable communications and require an average connection availability of five nines, i.e., an average outage time of 5.25 minutes per year. The challenge that we address in this paper is guaranteeing the average connection availability for the ultra-reliable communications as voice, while providing sufficient data rate for the complimentary services as video. We achieve this by using heterogeneous wireless access network, i.e., WLAN, LTE and TETRA, enhanced with automated switching between the wireless technologies through Dynamic Link Exchange Protocol (DLEP). Based on the testbed measurements and reliability analysis, we show that a heterogeneous access network can achieve the five nines availability, while increasing the available data rate in comparison with single technology access networks.","PeriodicalId":101592,"journal":{"name":"2017 IEEE Vehicular Networking Conference (VNC)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114855393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/VNC.2017.8275640
F. Sivrikaya, M. A. Khan, C. Bila, S. Albayrak
Autonomous driving is a vision that seems likely to be realized sooner than expected; the industry and research community are actively coordinating on achieving the goals of different levels of automation. One obvious and important aspect of autonomous driving is efficient and reliable connectivity both within and around the vehicle. Autonomous vehicles should be able to communicate with their environment and remote data analysis platforms in real-time, which qualifies the telecommunication industry as an important stakeholder in the autonomous driving ecosystem. In particular, the highly stringent connectivity requirements of an autonomous vehicle, its trajectory planning system, and the resource planning of the communication service provider are highly interdependent on each other. In this paper, we study the relationship between route planning systems in autonomous vehicles and resource management systems of telecom operators, explaining how a bidirectional interface among the two would induce higher efficiency on both ends. We also provide an overview of an urban test field for autonomous and connected driving in Berlin, which will serve as a testbed for experimenting with the concepts presented in this work.
{"title":"Reciprocal impact of autonomous vehicles and network resource management","authors":"F. Sivrikaya, M. A. Khan, C. Bila, S. Albayrak","doi":"10.1109/VNC.2017.8275640","DOIUrl":"https://doi.org/10.1109/VNC.2017.8275640","url":null,"abstract":"Autonomous driving is a vision that seems likely to be realized sooner than expected; the industry and research community are actively coordinating on achieving the goals of different levels of automation. One obvious and important aspect of autonomous driving is efficient and reliable connectivity both within and around the vehicle. Autonomous vehicles should be able to communicate with their environment and remote data analysis platforms in real-time, which qualifies the telecommunication industry as an important stakeholder in the autonomous driving ecosystem. In particular, the highly stringent connectivity requirements of an autonomous vehicle, its trajectory planning system, and the resource planning of the communication service provider are highly interdependent on each other. In this paper, we study the relationship between route planning systems in autonomous vehicles and resource management systems of telecom operators, explaining how a bidirectional interface among the two would induce higher efficiency on both ends. We also provide an overview of an urban test field for autonomous and connected driving in Berlin, which will serve as a testbed for experimenting with the concepts presented in this work.","PeriodicalId":101592,"journal":{"name":"2017 IEEE Vehicular Networking Conference (VNC)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117335484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/VNC.2017.8275638
Chao Chen, Sang Woo Lee, T. Watson, C. Maple, Yi Lu
Intelligent transport systems (ITS) facilitate road traffic by periodically exchanging messages with neighbouring vehicles, road side units (RSUs) and ITS stations. For security reasons these messages will be encapsulated with security credentials to form secured messages (SMs) and will be inoperative until the authentication completes. This creates a challenge in a dynamic and dense road network where many SMs are awaiting authentication. To address this problem, we propose CAESAR, a criticality-aware Elliptic Curve Digital Signature Algorithm (ECDSA) signature verification scheme that utilizes multi-level priority queues (MLPQs) and Markov model to dispatch and schedule SMs. Simulation results verify the accuracy of CAESAR and the enhancements in terms of several safety awareness metrics compared with the existing schemes.
{"title":"CAESAR: A criticality-aware ECDSA signature verification scheme with Markov model","authors":"Chao Chen, Sang Woo Lee, T. Watson, C. Maple, Yi Lu","doi":"10.1109/VNC.2017.8275638","DOIUrl":"https://doi.org/10.1109/VNC.2017.8275638","url":null,"abstract":"Intelligent transport systems (ITS) facilitate road traffic by periodically exchanging messages with neighbouring vehicles, road side units (RSUs) and ITS stations. For security reasons these messages will be encapsulated with security credentials to form secured messages (SMs) and will be inoperative until the authentication completes. This creates a challenge in a dynamic and dense road network where many SMs are awaiting authentication. To address this problem, we propose CAESAR, a criticality-aware Elliptic Curve Digital Signature Algorithm (ECDSA) signature verification scheme that utilizes multi-level priority queues (MLPQs) and Markov model to dispatch and schedule SMs. Simulation results verify the accuracy of CAESAR and the enhancements in terms of several safety awareness metrics compared with the existing schemes.","PeriodicalId":101592,"journal":{"name":"2017 IEEE Vehicular Networking Conference (VNC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128947705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/VNC.2017.8275642
M. Khodaei, Andreas Messing, Panos Papadimitratos
Any on-demand pseudonym acquisition strategy is problematic should the connectivity to the credential management infrastructure be intermittent. If a vehicle runs out of pseudonyms with no connectivity to refill its pseudonym pool, one solution is the on-the-fly generation of pseudonyms, e.g., leveraging anonymous authentication. However, such a vehicle would stand out in the crowd: one can simply distinguish pseudonyms, thus signed messages, based on the pseudonym issuer signature, link them and track the vehicle. To address this challenge, we propose a randomized hybrid scheme, RHyTHM, to enable vehicles to remain operational when disconnected without compromising privacy: vehicles with valid pseudonyms help others to enhance their privacy by randomly joining them in using on-the-fly self-certified pseudonyms along with aligned lifetimes. This way, the privacy of disconnected users is enhanced with a reasonable computational overhead.
{"title":"RHyTHM: A randomized hybrid scheme to hide in the mobile crowd","authors":"M. Khodaei, Andreas Messing, Panos Papadimitratos","doi":"10.1109/VNC.2017.8275642","DOIUrl":"https://doi.org/10.1109/VNC.2017.8275642","url":null,"abstract":"Any on-demand pseudonym acquisition strategy is problematic should the connectivity to the credential management infrastructure be intermittent. If a vehicle runs out of pseudonyms with no connectivity to refill its pseudonym pool, one solution is the on-the-fly generation of pseudonyms, e.g., leveraging anonymous authentication. However, such a vehicle would stand out in the crowd: one can simply distinguish pseudonyms, thus signed messages, based on the pseudonym issuer signature, link them and track the vehicle. To address this challenge, we propose a randomized hybrid scheme, RHyTHM, to enable vehicles to remain operational when disconnected without compromising privacy: vehicles with valid pseudonyms help others to enhance their privacy by randomly joining them in using on-the-fly self-certified pseudonyms along with aligned lifetimes. This way, the privacy of disconnected users is enhanced with a reasonable computational overhead.","PeriodicalId":101592,"journal":{"name":"2017 IEEE Vehicular Networking Conference (VNC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129013969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/VNC.2017.8275649
R. Patel, Jérôme Härri, C. Bonnet
Coordinated vehicle control strategies aim at optimizing driving dynamics to increase traffic flow without impacting safety. These control strategies are based on the knowledge of the vehicles' state information like position and velocity obtained through Vehicle-to-everything (V2X) communications. Literature on control strategies yet assumes perfect positions, whereas position errors are in fact present and non negligible (e.g. GPS). As a consequence, these localization errors impact the control strategies by introducing uncertainty, which must be accounted for to minimize the probability of accidents. This paper qualifies and quantifies such uncertainty and proposes strategies to reduce it in a collision avoidance scenario. We notably relate these strategies to their impacts on traffic flow. More specifically, we model coordinated automated vehicles as a Model Predictive Control (MPC), integrate localization errors and evaluate its impact of the output to avoid accident. We then propose possibilities to mitigate accident-prone controls and quantify them on traffic flow. Our study illustrates that localization errors impact traffic flow by forcing future automated vehicles to increase gaps or reduce speed.
{"title":"Impact of localization errors on automated vehicle control strategies","authors":"R. Patel, Jérôme Härri, C. Bonnet","doi":"10.1109/VNC.2017.8275649","DOIUrl":"https://doi.org/10.1109/VNC.2017.8275649","url":null,"abstract":"Coordinated vehicle control strategies aim at optimizing driving dynamics to increase traffic flow without impacting safety. These control strategies are based on the knowledge of the vehicles' state information like position and velocity obtained through Vehicle-to-everything (V2X) communications. Literature on control strategies yet assumes perfect positions, whereas position errors are in fact present and non negligible (e.g. GPS). As a consequence, these localization errors impact the control strategies by introducing uncertainty, which must be accounted for to minimize the probability of accidents. This paper qualifies and quantifies such uncertainty and proposes strategies to reduce it in a collision avoidance scenario. We notably relate these strategies to their impacts on traffic flow. More specifically, we model coordinated automated vehicles as a Model Predictive Control (MPC), integrate localization errors and evaluate its impact of the output to avoid accident. We then propose possibilities to mitigate accident-prone controls and quantify them on traffic flow. Our study illustrates that localization errors impact traffic flow by forcing future automated vehicles to increase gaps or reduce speed.","PeriodicalId":101592,"journal":{"name":"2017 IEEE Vehicular Networking Conference (VNC)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125456116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/VNC.2017.8275646
Mohammad Hamad, Marcus Nolte, V. Prevelakis
Over the past two decades, significant developments were introduced within the vehicular domain, evolving the modern vehicle into a network of dozens of embedded systems each hosting one or more applications. Communications within this distributed environment while adhering to safety-critical and secure systems guidelines implies the formulation of a comprehensive and consistent communications policy. Creating this policy is a complex, error-prone and labor-intensive task, requiring detailed knowledge of possible communication paths between all possible components of the system. For this reason, it is often skipped, trusting that each task will behave as intended and interact only with its peers. Traditional testing provides sufficient confidence to allow certification. Nevertheless, the existing process ignores malicious interference, whereby an adversary compromises a low-criticality process or subsystem and uses that to attack other subsystems, effectively taking over the vehicle. In this paper, we propose a framework to build a secure communications policy gradually by integrating it through the design and life cycle of vehicle's software components. We also propose a security module which acts as a connection policy checker vetting the incoming and outgoing communications and enforcing the distributed security policy.
{"title":"A framework for policy based secure intra vehicle communication","authors":"Mohammad Hamad, Marcus Nolte, V. Prevelakis","doi":"10.1109/VNC.2017.8275646","DOIUrl":"https://doi.org/10.1109/VNC.2017.8275646","url":null,"abstract":"Over the past two decades, significant developments were introduced within the vehicular domain, evolving the modern vehicle into a network of dozens of embedded systems each hosting one or more applications. Communications within this distributed environment while adhering to safety-critical and secure systems guidelines implies the formulation of a comprehensive and consistent communications policy. Creating this policy is a complex, error-prone and labor-intensive task, requiring detailed knowledge of possible communication paths between all possible components of the system. For this reason, it is often skipped, trusting that each task will behave as intended and interact only with its peers. Traditional testing provides sufficient confidence to allow certification. Nevertheless, the existing process ignores malicious interference, whereby an adversary compromises a low-criticality process or subsystem and uses that to attack other subsystems, effectively taking over the vehicle. In this paper, we propose a framework to build a secure communications policy gradually by integrating it through the design and life cycle of vehicle's software components. We also propose a security module which acts as a connection policy checker vetting the incoming and outgoing communications and enforcing the distributed security policy.","PeriodicalId":101592,"journal":{"name":"2017 IEEE Vehicular Networking Conference (VNC)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126208324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/VNC.2017.8275637
Giammarco Cecchini, A. Bazzi, B. Masini, A. Zanella
Cooperative awareness, consisting in the periodic broadcasting of messages, called beacons, to inform neighboring vehicles about maneuvers, changes of direction and other relevant mobility information, represents the core requirement to enable applications that may increase road safety and transportation efficiency. Up to few months ago, when latest 3GPP Release added to long term evolution (LTE) the support of vehicle-to-vehicle (V2V) communications, the only suitable standard was IEEE 802.11p in the U.S. and the corresponding ITS-G5 in Europe. The choice regarding the worldwide adoption of one of the two technologies is still under discussion, since both show advantages and drawbacks. In this work, we analyze IEEE 802.11p and LTE-V2V and evaluate their performance for the cooperative awareness service through simulations in a realistic highway scenario. Both in-coverage and out-of-coverage conditions are considered for LTE-V2V. Results reveal that LTE-V2V incoverage is the best solution in terms of packet reception ratio for all the considered values of beacon size and communication range. As far as the beacon update delay is concerned, we observe that LTE-V2V in-coverage still provides the best performance when small packets are transmitted, while IEEE 802.11p gives the best results for values of the communication range higher than 100 m when the packet size is increased.
{"title":"Performance comparison between IEEE 802.11p and LTE-V2V in-coverage and out-of-coverage for cooperative awareness","authors":"Giammarco Cecchini, A. Bazzi, B. Masini, A. Zanella","doi":"10.1109/VNC.2017.8275637","DOIUrl":"https://doi.org/10.1109/VNC.2017.8275637","url":null,"abstract":"Cooperative awareness, consisting in the periodic broadcasting of messages, called beacons, to inform neighboring vehicles about maneuvers, changes of direction and other relevant mobility information, represents the core requirement to enable applications that may increase road safety and transportation efficiency. Up to few months ago, when latest 3GPP Release added to long term evolution (LTE) the support of vehicle-to-vehicle (V2V) communications, the only suitable standard was IEEE 802.11p in the U.S. and the corresponding ITS-G5 in Europe. The choice regarding the worldwide adoption of one of the two technologies is still under discussion, since both show advantages and drawbacks. In this work, we analyze IEEE 802.11p and LTE-V2V and evaluate their performance for the cooperative awareness service through simulations in a realistic highway scenario. Both in-coverage and out-of-coverage conditions are considered for LTE-V2V. Results reveal that LTE-V2V incoverage is the best solution in terms of packet reception ratio for all the considered values of beacon size and communication range. As far as the beacon update delay is concerned, we observe that LTE-V2V in-coverage still provides the best performance when small packets are transmitted, while IEEE 802.11p gives the best results for values of the communication range higher than 100 m when the packet size is increased.","PeriodicalId":101592,"journal":{"name":"2017 IEEE Vehicular Networking Conference (VNC)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125169857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}