Pub Date : 2017-11-01DOI: 10.1109/VNC.2017.8275624
Vipin Singh Sehrawat, Yogendra Shah, V. Choyi, A. Brusilovsky, Samir Ferdi
Anonymity is a desirable feature for vehicle-to-vehicle (V2V) communications, but it conflicts with other requirements such as non-repudiation and revocation. Existing, pseudonym-based V2V communications schemes rely on certificate generation and signature verification. These schemes require cumbersome key management, frequent updating of certificate chains and other costly procedures such as cryptographic pairings. In this paper, we present novel V2V communications schemes, that provide authentication, authorization, anonymity, non-repudiation, replay protection, pseudonym revocation, and forward secrecy. Our schemes do not rely on the traditional certificate generation and signature verification.
{"title":"Certificate and signature free anonymity for V2V communications","authors":"Vipin Singh Sehrawat, Yogendra Shah, V. Choyi, A. Brusilovsky, Samir Ferdi","doi":"10.1109/VNC.2017.8275624","DOIUrl":"https://doi.org/10.1109/VNC.2017.8275624","url":null,"abstract":"Anonymity is a desirable feature for vehicle-to-vehicle (V2V) communications, but it conflicts with other requirements such as non-repudiation and revocation. Existing, pseudonym-based V2V communications schemes rely on certificate generation and signature verification. These schemes require cumbersome key management, frequent updating of certificate chains and other costly procedures such as cryptographic pairings. In this paper, we present novel V2V communications schemes, that provide authentication, authorization, anonymity, non-repudiation, replay protection, pseudonym revocation, and forward secrecy. Our schemes do not rely on the traditional certificate generation and signature verification.","PeriodicalId":101592,"journal":{"name":"2017 IEEE Vehicular Networking Conference (VNC)","volume":"361 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125654195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/VNC.2017.8275652
J. Kim, Hyesung Kim, Seong-Lyun Kim
In this paper, we investigate a directional millimeter wave transmission scheme for vehicle-to-vehicle communications in an ad-hoc network when inaccurate location information is given. Considering the location inaccuracy, we propose an algorithm for both beam alignment and transmit probability adjustment. Numerical evaluations verify that the proposed algorithm produces more energy-efficient transmission with lower transmit probability while guaranteeing an SINR requirement.
{"title":"Poster: Millimeter wave V2V communications with inaccurate location information","authors":"J. Kim, Hyesung Kim, Seong-Lyun Kim","doi":"10.1109/VNC.2017.8275652","DOIUrl":"https://doi.org/10.1109/VNC.2017.8275652","url":null,"abstract":"In this paper, we investigate a directional millimeter wave transmission scheme for vehicle-to-vehicle communications in an ad-hoc network when inaccurate location information is given. Considering the location inaccuracy, we propose an algorithm for both beam alignment and transmit probability adjustment. Numerical evaluations verify that the proposed algorithm produces more energy-efficient transmission with lower transmit probability while guaranteeing an SINR requirement.","PeriodicalId":101592,"journal":{"name":"2017 IEEE Vehicular Networking Conference (VNC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125654949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/VNC.2017.8275605
Ayotunde O. Laiyemo, P. Luoto, P. Pirinen, M. Latva-aho
With the increasing popularity of high speed trains (HSTs) and the traffic forecast for future cellular networks, the need to provide very high data rates using higher frequency bands (HFBs) for train passengers is becoming crucial. In this paper, we present a timer-based beamforming selection algorithm for HST, which exploits the prior knowledge of the position and direction of the HST. A sequential and hierarchical codebook is designed based on the array response vectors and linked to the line-of-sight (LOS) angle-of-arrival/departure base station (BS)-HST link. The effect of velocity feedback errors on the throughput performance was analyzed. The antenna deactivation and the sub-array approaches were considered to mitigate the effect of velocity feedback errors. Evaluation of our proposed beamforming scheme indicates a close performance to the optimal singular value decomposition (SVD) scheme when no velocity feedback error occurs and with the occurrence of velocity feedback errors, the sub-array approach proved to be an efficient way to reduce the effect of the errors.
{"title":"Higher frequency band beamforming scheme for high speed train","authors":"Ayotunde O. Laiyemo, P. Luoto, P. Pirinen, M. Latva-aho","doi":"10.1109/VNC.2017.8275605","DOIUrl":"https://doi.org/10.1109/VNC.2017.8275605","url":null,"abstract":"With the increasing popularity of high speed trains (HSTs) and the traffic forecast for future cellular networks, the need to provide very high data rates using higher frequency bands (HFBs) for train passengers is becoming crucial. In this paper, we present a timer-based beamforming selection algorithm for HST, which exploits the prior knowledge of the position and direction of the HST. A sequential and hierarchical codebook is designed based on the array response vectors and linked to the line-of-sight (LOS) angle-of-arrival/departure base station (BS)-HST link. The effect of velocity feedback errors on the throughput performance was analyzed. The antenna deactivation and the sub-array approaches were considered to mitigate the effect of velocity feedback errors. Evaluation of our proposed beamforming scheme indicates a close performance to the optimal singular value decomposition (SVD) scheme when no velocity feedback error occurs and with the occurrence of velocity feedback errors, the sub-array approach proved to be an efficient way to reduce the effect of the errors.","PeriodicalId":101592,"journal":{"name":"2017 IEEE Vehicular Networking Conference (VNC)","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131838966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/VNC.2017.8275647
L. F. Abanto-Leon, A. Koppelaar, S. Groot
The 3rd Generation Partnership Project (3GPP) has introduced in Rel. 14 a novel technology referred to as vehicle-to-vehicle (V2V) mode-3. Under this scheme, the eNodeB assists in the resource allocation process allotting sidelink subchannels to vehicles. Thereupon, vehicles transmit their signals in a broadcast manner without the intervention of the former one. eNodeBs will thereby play a determinative role in the assignment of sub-channels as they can effectively manage V2V traffic and prevent allocation conflicts. The latter is a crucial aspect to enforce in order for the signals to be received reliably by other vehicles. To this purpose, we propose two resource allocation schemes namely bipartite graph matching-based successive allocation (BGM-SA) and bipartite graph matching-based parallel allocation (BGM-PA) which are suboptimal approaches with lesser complexity than exhaustive search. Both schemes incorporate additional constraints to prevent allocation conflicts from emerging. In this research, we consider overlapping clusters only, which could be formed at intersections or merging highways. We show through simulations that BGM-SA can attain near-optimal performance whereas BGM-PA is subpar but less complex. Additionally, since BGM-PA is based on inter-cluster vehicle pre-grouping, we explore different metrics that could effectively portray the overall channel conditions of pre-grouped vehicles. This is of course not optimal in terms of maximizing the system capacity — since the allocation process would be based on simplified surrogate information — but it reduces the computational complexity.
{"title":"Parallel and successive resource allocation for V2V communications in overlapping clusters","authors":"L. F. Abanto-Leon, A. Koppelaar, S. Groot","doi":"10.1109/VNC.2017.8275647","DOIUrl":"https://doi.org/10.1109/VNC.2017.8275647","url":null,"abstract":"The 3rd Generation Partnership Project (3GPP) has introduced in Rel. 14 a novel technology referred to as vehicle-to-vehicle (V2V) mode-3. Under this scheme, the eNodeB assists in the resource allocation process allotting sidelink subchannels to vehicles. Thereupon, vehicles transmit their signals in a broadcast manner without the intervention of the former one. eNodeBs will thereby play a determinative role in the assignment of sub-channels as they can effectively manage V2V traffic and prevent allocation conflicts. The latter is a crucial aspect to enforce in order for the signals to be received reliably by other vehicles. To this purpose, we propose two resource allocation schemes namely bipartite graph matching-based successive allocation (BGM-SA) and bipartite graph matching-based parallel allocation (BGM-PA) which are suboptimal approaches with lesser complexity than exhaustive search. Both schemes incorporate additional constraints to prevent allocation conflicts from emerging. In this research, we consider overlapping clusters only, which could be formed at intersections or merging highways. We show through simulations that BGM-SA can attain near-optimal performance whereas BGM-PA is subpar but less complex. Additionally, since BGM-PA is based on inter-cluster vehicle pre-grouping, we explore different metrics that could effectively portray the overall channel conditions of pre-grouped vehicles. This is of course not optimal in terms of maximizing the system capacity — since the allocation process would be based on simplified surrogate information — but it reduces the computational complexity.","PeriodicalId":101592,"journal":{"name":"2017 IEEE Vehicular Networking Conference (VNC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123828886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/VNC.2017.8275621
Takamasa Higuchi, Joshua Joy, F. Dressler, M. Gerla, O. Altintas
This paper investigates the feasibility and the potential of vehicle cloudification, an emerging paradigm to utilize ever-growing computational resources of intelligent vehicles to form small-scale virtual cloud computing facilities. Multiple vehicles in communication range collaboratively form so-called vehicular micro clouds, which serve as virtual edge servers that offer data processing, data storage, communications, and sensing services not only to vehicles but also to any other types of authorized users. Although the conceptual design has been established already in the literature, the feasibility of vehicular micro clouds under practical road conditions has still to be thoroughly investigated. In this paper, we tackle this research question by analyzing vehicle probe datasets, generated by real road traffic models of the city of Luxembourg and a major intercity highway in Japan. The results indicate that connected vehicular micro clouds can be formed at many locations throughout the road networks, especially under heavy road traffic during rush hours.
{"title":"On the feasibility of vehicular micro clouds","authors":"Takamasa Higuchi, Joshua Joy, F. Dressler, M. Gerla, O. Altintas","doi":"10.1109/VNC.2017.8275621","DOIUrl":"https://doi.org/10.1109/VNC.2017.8275621","url":null,"abstract":"This paper investigates the feasibility and the potential of vehicle cloudification, an emerging paradigm to utilize ever-growing computational resources of intelligent vehicles to form small-scale virtual cloud computing facilities. Multiple vehicles in communication range collaboratively form so-called vehicular micro clouds, which serve as virtual edge servers that offer data processing, data storage, communications, and sensing services not only to vehicles but also to any other types of authorized users. Although the conceptual design has been established already in the literature, the feasibility of vehicular micro clouds under practical road conditions has still to be thoroughly investigated. In this paper, we tackle this research question by analyzing vehicle probe datasets, generated by real road traffic models of the city of Luxembourg and a major intercity highway in Japan. The results indicate that connected vehicular micro clouds can be formed at many locations throughout the road networks, especially under heavy road traffic during rush hours.","PeriodicalId":101592,"journal":{"name":"2017 IEEE Vehicular Networking Conference (VNC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124891878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/VNC.2017.8275657
Steve Loewen, Florian Klingler, C. Sommer, F. Dressler
In the past, research and standardization in the field of Intelligent Transportation Systems (ITS) have focused on motorized vehicles and large car manufacturers are now starting to implement the resulting standards. With bikes gaining more and more popularity and, thus, a share in accidents, it is important to consider the special safety needs of cyclists. We propose a way of extending established ITS standards with new fields meeting cyclists needs while keeping a maximum of backwards compatibility to already deployed ITS vehicles. We demonstrate this approach by presenting examples for extensions of the ETSI ITS-G5 CAM and DENM message formats.
{"title":"Backwards compatible extension of CAMs/DENMs for improved bike safety on the road","authors":"Steve Loewen, Florian Klingler, C. Sommer, F. Dressler","doi":"10.1109/VNC.2017.8275657","DOIUrl":"https://doi.org/10.1109/VNC.2017.8275657","url":null,"abstract":"In the past, research and standardization in the field of Intelligent Transportation Systems (ITS) have focused on motorized vehicles and large car manufacturers are now starting to implement the resulting standards. With bikes gaining more and more popularity and, thus, a share in accidents, it is important to consider the special safety needs of cyclists. We propose a way of extending established ITS standards with new fields meeting cyclists needs while keeping a maximum of backwards compatibility to already deployed ITS vehicles. We demonstrate this approach by presenting examples for extensions of the ETSI ITS-G5 CAM and DENM message formats.","PeriodicalId":101592,"journal":{"name":"2017 IEEE Vehicular Networking Conference (VNC)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115757889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/VNC.2017.8275636
Bin Cheng, Hongsheng Lu, Ali Rostami, M. Gruteser, J. Kenney
To increase the amount of contiguous spectrum available for unlicensed use, there is interest in both the United States and Europe to allow secondary users on the 5.9 GHz band allocated for Intelligent Transportation Services. Under standard spectrum sharing rules, secondary users such as Wi-Fi are required to avoid harmful interference to primary users such as DSRC devices. Compared to conventional spectrum sharing scenarios, such as unlicensed devices sharing TV whitespaces, the safety-critical nature of DSRC transmissions places stricter requirements on the effectiveness of spectrum sharing mechanisms. In this paper, we analyze this spectrum sharing problem to identify its fundamental challenges and derive interesting network sharing scenarios. We also evaluate two recently proposed spectrum sharing mechanisms, Detect & Vacate and Detect & Mitigate, to understand their performance in these challenging scenarios. We identify that both mechanisms suffer from a delayed detection problem, which can be effectively improved by extending interframe idle periods. We further find that due to the unilateral hidden terminal problem, Detect & Mitigate can introduce up to 30% extra packet loss to DSRC transmissions after detecting the presence of DSRC devices. However, Detect & Vacate leaves the band after detecting DSRC, minimizing the impacts on DSRC transmissions.
{"title":"Impact of 5.9 GHz spectrum sharing on DSRC performance","authors":"Bin Cheng, Hongsheng Lu, Ali Rostami, M. Gruteser, J. Kenney","doi":"10.1109/VNC.2017.8275636","DOIUrl":"https://doi.org/10.1109/VNC.2017.8275636","url":null,"abstract":"To increase the amount of contiguous spectrum available for unlicensed use, there is interest in both the United States and Europe to allow secondary users on the 5.9 GHz band allocated for Intelligent Transportation Services. Under standard spectrum sharing rules, secondary users such as Wi-Fi are required to avoid harmful interference to primary users such as DSRC devices. Compared to conventional spectrum sharing scenarios, such as unlicensed devices sharing TV whitespaces, the safety-critical nature of DSRC transmissions places stricter requirements on the effectiveness of spectrum sharing mechanisms. In this paper, we analyze this spectrum sharing problem to identify its fundamental challenges and derive interesting network sharing scenarios. We also evaluate two recently proposed spectrum sharing mechanisms, Detect & Vacate and Detect & Mitigate, to understand their performance in these challenging scenarios. We identify that both mechanisms suffer from a delayed detection problem, which can be effectively improved by extending interframe idle periods. We further find that due to the unilateral hidden terminal problem, Detect & Mitigate can introduce up to 30% extra packet loss to DSRC transmissions after detecting the presence of DSRC devices. However, Detect & Vacate leaves the band after detecting DSRC, minimizing the impacts on DSRC transmissions.","PeriodicalId":101592,"journal":{"name":"2017 IEEE Vehicular Networking Conference (VNC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114722606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/VNC.2017.8275627
Lara Codecà, Jérôme Härri
The information that we are collecting in the cities is enhancing our understanding of their dynamics. Cooperative Intelligent Transportation Systems (C-ITS) are using mobility information from vehicles and vulnerable road users to improve road traffic and safety in urban and extra-urban environments. In this field, optimizations are usually done through simulations. An interactive mobility scenario has to fully integrate different means of traffic to achieve this goal; nonetheless, a scenario able to integrate vulnerable users such as pedestrians, bicycles, and motorbikes, is not yet available. In this paper, we present the analysis of the requirements and preliminary work to create a realistic scenario for urban mobility able to integrate vulnerable users. Based on the Principality of Monaco, the Monaco SUMO Traffic (MoST) Scenario presents a perfect playground to study advanced parking management solutions, and alternative transport modes applications, while keeping into account realistic telecommunication models.
{"title":"Towards multimodal mobility simulation of C-ITS: The Monaco SUMO traffic scenario","authors":"Lara Codecà, Jérôme Härri","doi":"10.1109/VNC.2017.8275627","DOIUrl":"https://doi.org/10.1109/VNC.2017.8275627","url":null,"abstract":"The information that we are collecting in the cities is enhancing our understanding of their dynamics. Cooperative Intelligent Transportation Systems (C-ITS) are using mobility information from vehicles and vulnerable road users to improve road traffic and safety in urban and extra-urban environments. In this field, optimizations are usually done through simulations. An interactive mobility scenario has to fully integrate different means of traffic to achieve this goal; nonetheless, a scenario able to integrate vulnerable users such as pedestrians, bicycles, and motorbikes, is not yet available. In this paper, we present the analysis of the requirements and preliminary work to create a realistic scenario for urban mobility able to integrate vulnerable users. Based on the Principality of Monaco, the Monaco SUMO Traffic (MoST) Scenario presents a perfect playground to study advanced parking management solutions, and alternative transport modes applications, while keeping into account realistic telecommunication models.","PeriodicalId":101592,"journal":{"name":"2017 IEEE Vehicular Networking Conference (VNC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123334414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/VNC.2017.8275597
C. Stadler, Xenia Flamm, T. Gruber, Anatoli Djanatliev, R. German, D. Eckhoff
Many of the envisioned applications based on Vehicle-to-Vehicle (V2V) communication require a certain amount of information received from other road users. Urban scenarios pose a particular challenge to the communication quality for Vehicular Ad-Hoc Networks (VANETs) as obstacles such as buildings, foliage, and infrastructure attenuate the signal. These challenges have to be taken into account already at the development stage of applications. In this paper we introduce a wall-clock time test approach which is capable of emulating the availability of information depending on the topology of an urban scenario. To this end, we make use of a neural network to predict LOS/NLOS probabilities which can then in turn be used to predict packet success rates. Our method achieves a high prediction accuracy that enables the realistic testing of a device-under-test in terms of communication and computational load.
{"title":"A stochastic V2V LOS/NLOS model using neural networks for hardware-in-the-loop testing","authors":"C. Stadler, Xenia Flamm, T. Gruber, Anatoli Djanatliev, R. German, D. Eckhoff","doi":"10.1109/VNC.2017.8275597","DOIUrl":"https://doi.org/10.1109/VNC.2017.8275597","url":null,"abstract":"Many of the envisioned applications based on Vehicle-to-Vehicle (V2V) communication require a certain amount of information received from other road users. Urban scenarios pose a particular challenge to the communication quality for Vehicular Ad-Hoc Networks (VANETs) as obstacles such as buildings, foliage, and infrastructure attenuate the signal. These challenges have to be taken into account already at the development stage of applications. In this paper we introduce a wall-clock time test approach which is capable of emulating the availability of information depending on the topology of an urban scenario. To this end, we make use of a neural network to predict LOS/NLOS probabilities which can then in turn be used to predict packet success rates. Our method achieves a high prediction accuracy that enables the realistic testing of a device-under-test in terms of communication and computational load.","PeriodicalId":101592,"journal":{"name":"2017 IEEE Vehicular Networking Conference (VNC)","volume":"70 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120912157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/VNC.2017.8275644
Seyhan Uçar, S. Ergen, Öznur Özkasap
Autonomous platoon is a technique where co-operative adaptive cruise control (CACC) enabled vehicles are organized into groups of close following vehicles through communication. It is envisioned that with the increased demand for autonomous vehicles, platoons would be a part of our life in near future. Although many efforts have been devoted to implement the vehicle platooning, ensuring the security remains challenging. Due to lack of security, platoons would be subject to modified packets which can mislead the platoon and result in platoon instability. Therefore, identifying malicious vehicles has become an important requirement. In this paper, we investigate a data-driven abnormal behavior detection approach for an autonomous platoon. We propose a novel statistical learning based technique to detect data anomalies. We demonstrate that shared speed value among platoon members would be sufficient to detect the misbehaving vehicles.
{"title":"Data-driven abnormal behavior detection for autonomous platoon","authors":"Seyhan Uçar, S. Ergen, Öznur Özkasap","doi":"10.1109/VNC.2017.8275644","DOIUrl":"https://doi.org/10.1109/VNC.2017.8275644","url":null,"abstract":"Autonomous platoon is a technique where co-operative adaptive cruise control (CACC) enabled vehicles are organized into groups of close following vehicles through communication. It is envisioned that with the increased demand for autonomous vehicles, platoons would be a part of our life in near future. Although many efforts have been devoted to implement the vehicle platooning, ensuring the security remains challenging. Due to lack of security, platoons would be subject to modified packets which can mislead the platoon and result in platoon instability. Therefore, identifying malicious vehicles has become an important requirement. In this paper, we investigate a data-driven abnormal behavior detection approach for an autonomous platoon. We propose a novel statistical learning based technique to detect data anomalies. We demonstrate that shared speed value among platoon members would be sufficient to detect the misbehaving vehicles.","PeriodicalId":101592,"journal":{"name":"2017 IEEE Vehicular Networking Conference (VNC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126790175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}