22 research outputs found

    A GRASP-based heuristic for allocating the roadside infrastructure maximizing the number of distinct vehicles experiencing contact opportunities

    Get PDF
    In this work the allocation of Roadside Units (RSUs) in a V2I network is modeled as a Maximum Coverage Problem. The main objective is to maximize the number of distinct vehicles contacting the infrastructure. Two different approaches are presented to solve the problem. The first one is an ILP model that can found optimal solutions or give sharp upper and lower bounds for the problem. The second one is a GRASP-based heuristic that can found close-to-optimal solutions. The GRASP-based heuristic is compared with a previous work achieving better results. Furthermore, a new metric to measure the efficiency of a Deployment strategy is presented

    A Real-time Energy-Saving Mechanism in Internet of Vehicles Systems

    Get PDF
    Emerging technologies, such as self-driving cars and 5G communications, are raising new mobility and transportation possibilities in smart and sustainable cities, bringing to a new echo-system often referred to as Internet of Vehicles (IoV). In order to efficiently operate, an IoV system should take into account more stringent requirements with respect to traditional IoT systems, e.g., ultra-broadband connections, high-speed mobility, high-energy efficiency and requires efficient real-time algorithms. This paper proposes an energy and communication driven model for IoV scenarios, where roadside units (RSUs) need to be frequently assigned and re-assigned to the operating vehicles. The problem has been formulated as an Uncapacitated Facility Location Problem (UFLP) for jointly solving the RSU-to-vehicle allocation problem while managing the RSUs switch-on and -off processes. Differently from traditional UFLP approaches, based on static solutions, we propose here a fast-heuristic approach, based on a dynamic multi-period time scale mapping: the proposed algorithm is able to efficiently manage in real-time the RSUs, selecting at each period those to be activated and those to be switched off. The resulting methodology is tested against a set of benchmark instances, which allows us to illustrate its potential. Results, in terms of overall cost –mapping both energy consumption and transmission delays–, number of active RSUs, and convergence speed, are compared with static approaches, showing the effectiveness of the proposed dynamic solution. It is noticeable a gain of up to 11% in terms of overall cost with respect to the static approaches, with a moderate additional delay for finding the solution, around 0.8 s, while the overall number of RSUs to be switched on is sensibly reduced up to a fraction of 15% of the overall number of deployed RSUs, in the most convenient scenario

    A Real-Time Energy-Saving Mechanism in Internet of Vehicles Systems

    Full text link
    [EN] Emerging technologies, such as self-driving cars and 5G communications, are raising new mobility and transportation possibilities in smart and sustainable cities, bringing to a new echo-system often referred to as Internet of Vehicles (IoV). In order to efficiently operate, an IoV system should take into account more stringent requirements with respect to traditional IoT systems, e.g., ultra-broadband connections, high-speed mobility, high-energy efficiency and requires efficient real-time algorithms. This paper proposes an energy and communication driven model for IoV scenarios, where roadside units (RSUs) need to be frequently assigned and re-assigned to the operating vehicles. The problem has been formulated as an Uncapacitated Facility Location Problem (UFLP) for jointly solving the RSU-to-vehicle allocation problem while managing the RSUs switch-on and -off processes. Differently from traditional UFLP approaches, based on static solutions, we propose here a fast-heuristic approach, based on a dynamic multi-period time scale mapping: the proposed algorithm is able to efficiently manage in real-time the RSUs, selecting at each period those to be activated and those to be switched off. The resulting methodology is tested against a set of benchmark instances, which allows us to illustrate its potential. Results, in terms of overall cost-mapping both energy consumption and transmission delays-, number of active RSUs, and convergence speed, are compared with static approaches, showing the effectiveness of the proposed dynamic solution. It is noticeable a gain of up to 11% in terms of overall cost with respect to the static approaches, with a moderate additional delay for finding the solution, around 0.8 s, while the overall number of RSUs to be switched on is sensibly reduced up to a fraction of 15% of the overall number of deployed RSUs, in the most convenient scenario.The work of Luca Cesarano and Andrea Croce has been done during an abroad study period at Universitat Oberta de Catalunya, Spain, supported by Erasmus+ Study Programme of the European Union.Cesarano, L.; Croce, A.; Martins, LDC.; Tarchi, D.; Juan-Pérez, ÁA. (2021). A Real-Time Energy-Saving Mechanism in Internet of Vehicles Systems. IEEE Access. 9:157842-157858. https://doi.org/10.1109/ACCESS.2021.3130125157842157858

    Optimisation of Mobile Communication Networks - OMCO NET

    Get PDF
    The mini conference “Optimisation of Mobile Communication Networks” focuses on advanced methods for search and optimisation applied to wireless communication networks. It is sponsored by Research & Enterprise Fund Southampton Solent University. The conference strives to widen knowledge on advanced search methods capable of optimisation of wireless communications networks. The aim is to provide a forum for exchange of recent knowledge, new ideas and trends in this progressive and challenging area. The conference will popularise new successful approaches on resolving hard tasks such as minimisation of transmit power, cooperative and optimal routing

    Reputation systems and secure communication in vehicular networks

    Get PDF
    A thorough review of the state of the art will reveal that most VANET applications rely on Public Key Infrastructure (PKI), which uses user certificates managed by a Certification Authority (CA) to handle security. By doing so, they constrain the ad-hoc nature of the VANET imposing a frequent connection to the CA to retrieve the Certificate Revocation List (CRL) and requiring some degree of roadside infrastructure to achieve that connection. Other solutions propose the usage of group signatures where users organize in groups and elect a group manager. The group manager will need to ensure that group members do not misbehave, i.e., do not spread false information, and if they do punish them, evict them from the group and report them to the CA; thus suffering from the same CRL retrieval problem. In this thesis we present a fourfold contribution to improve security in VANETs. First and foremost, Chains of Trust describes a reputation system where users disseminate Points of Interest (POIs) information over the network while their privacy remains protected. It uses asymmetric cryptography and users are responsible for the generation of their own pair of public and private keys. There is no central entity which stores the information users input into the system; instead, that information is kept distributed among the vehicles that make up the network. On top of that, this system requires no roadside infrastructure. Precisely, our main objective with Chains of Trust was to show that just by relying on people¿s driving habits and the sporadic nature of their encounters with other drivers a successful reputation system could be built. The second contribution of this thesis is the application simulator poiSim. Many¿s the time a new VANET application is presented and its authors back their findings using simulation results from renowned networks simulators like ns-2. The major issue with network simulators is that they were not designed with that purpose in mind and handling simulations with hundreds of nodes requires a massive processing power. As a result, authors run small simulations (between 50 and 100 nodes) with vehicles that move randomly in a squared area instead of using real maps, which rend unrealistic results. We show that by building tailored application simulators we can obtain more realistic results. The application simulator poiSim processes a realistic mobility trace produced by a Multi-agent Microscopic Traffic Simulator developed at ETH Zurich, which accurately describes the mobility patterns of 259,977 vehicles over regional maps of Switzerland for 24 hours. This simulation runs on a desktop PC and lasts approximately 120 minutes. In our third contribution we took Chains of Trust one step further in the protection of user privacy to develop Anonymous Chains of Trust. In this system users can temporarily exchange their identity with other users they trust, thus making it impossible for an attacker to know in all certainty who input a particular piece of information into the system. To the best of our knowledge, this is the first time this technique has been used in a reputation system. Finally, in our last contribution we explore a different form of communication for VANETs. The vast majority of VANET applications rely on the IEEE 802.11p/Wireless Access in Vehicular Environments (WAVE) standard or some other form of radio communication. This poses a security risk if we consider how vulnerable radio transmission is to intentional jamming and natural interferences: an attacker could easily block all radio communication in a certain area if his transmitter is powerful enough. Visual Light Communication (VLC), on the other hand, is resilient to jamming over a wide area because it relies on visible light to transmit information and ,unlike WAVE, it has no scalability problems. In this thesis we show that VLC is a secure and valuable form of communication in VANETs

    SDN-based VANET routing: A comprehensive survey on architectures, protocols, analysis, and future challenges

    Get PDF
    As the automotive and telecommunication industries advance, more vehicles are becoming connected, leading to the realization of intelligent transportation systems (ITS). Vehicular ad-hoc network (VANET) supports various ITS services, including safety, convenience, and infotainment services for drivers and passengers. Generally, such services are realized through data sharing among vehicles and nearby infrastructures or vehicles over multi-hop data routing mechanisms. Vehicular data routing faces many challenges caused by vehicle dynamicity, intermittent connectivity, and diverse application requirements. Consequently, the software-defined networking (SDN) paradigm offers unique features such as programmability and flexibility to enhance vehicular network performance and management and meet the quality of services (QoS) requirements of various VANET services. Recently, VANET routing protocols have been improved using the multilevel knowledge and an up-to-date global view of traffic conditions offered by SDN technology. The primary objective of this study is to furnish comprehensive information regarding the current SDN-based VANET routing protocols, encompassing intricate details of their underlying mechanisms, forwarding algorithms, and architectural considerations. Each protocol will be thoroughly examined individually, elucidating its strengths, weaknesses, and proposed enhancements. Also, the software-defined vehicular network (SDVN) architectures are presented according to their operation modes and controlling degree. Then, the potential of SDN-based VANET is explored from the aspect of routing and the design requirements of routing protocols in SDVNs. SDVN routing algorithms are uniquely classified according to various criteria. In addition, a complete comparative analysis will be achieved to analyze the protocols regarding performance, optimization, and simulation results. Finally, the challenges and upcoming research directions for developing such protocols are widely stated here. By presenting such insights, this paper provides a comprehensive overview and inspires researchers to enhance existing protocols and explore novel solutions, thereby paving the way for innovation in this field

    Robust and secure resource management for automotive cyber-physical systems

    Get PDF
    2022 Spring.Includes bibliographical references.Modern vehicles are examples of complex cyber-physical systems with tens to hundreds of interconnected Electronic Control Units (ECUs) that manage various vehicular subsystems. With the shift towards autonomous driving, emerging vehicles are being characterized by an increase in the number of hardware ECUs, greater complexity of applications (software), and more sophisticated in-vehicle networks. These advances have resulted in numerous challenges that impact the reliability, security, and real-time performance of these emerging automotive systems. Some of the challenges include coping with computation and communication uncertainties (e.g., jitter), developing robust control software, detecting cyber-attacks, ensuring data integrity, and enabling confidentiality during communication. However, solutions to overcome these challenges incur additional overhead, which can catastrophically delay the execution of real-time automotive tasks and message transfers. Hence, there is a need for a holistic approach to a system-level solution for resource management in automotive cyber-physical systems that enables robust and secure automotive system design while satisfying a diverse set of system-wide constraints. ECUs in vehicles today run a variety of automotive applications ranging from simple vehicle window control to highly complex Advanced Driver Assistance System (ADAS) applications. The aggressive attempts of automakers to make vehicles fully autonomous have increased the complexity and data rate requirements of applications and further led to the adoption of advanced artificial intelligence (AI) based techniques for improved perception and control. Additionally, modern vehicles are becoming increasingly connected with various external systems to realize more robust vehicle autonomy. These paradigm shifts have resulted in significant overheads in resource constrained ECUs and increased the complexity of the overall automotive system (including heterogeneous ECUs, network architectures, communication protocols, and applications), which has severe performance and safety implications on modern vehicles. The increased complexity of automotive systems introduces several computation and communication uncertainties in automotive subsystems that can cause delays in applications and messages, resulting in missed real-time deadlines. Missing deadlines for safety-critical automotive applications can be catastrophic, and this problem will be further aggravated in the case of future autonomous vehicles. Additionally, due to the harsh operating conditions (such as high temperatures, vibrations, and electromagnetic interference (EMI)) of automotive embedded systems, there is a significant risk to the integrity of the data that is exchanged between ECUs which can lead to faulty vehicle control. These challenges demand a more reliable design of automotive systems that is resilient to uncertainties and supports data integrity goals. Additionally, the increased connectivity of modern vehicles has made them highly vulnerable to various kinds of sophisticated security attacks. Hence, it is also vital to ensure the security of automotive systems, and it will become crucial as connected and autonomous vehicles become more ubiquitous. However, imposing security mechanisms on the resource constrained automotive systems can result in additional computation and communication overhead, potentially leading to further missed deadlines. Therefore, it is crucial to design techniques that incur very minimal overhead (lightweight) when trying to achieve the above-mentioned goals and ensure the real-time performance of the system. We address these issues by designing a holistic resource management framework called ROSETTA that enables robust and secure automotive cyber-physical system design while satisfying a diverse set of constraints related to reliability, security, real-time performance, and energy consumption. To achieve reliability goals, we have developed several techniques for reliability-aware scheduling and multi-level monitoring of signal integrity. To achieve security objectives, we have proposed a lightweight security framework that provides confidentiality and authenticity while meeting both security and real-time constraints. We have also introduced multiple deep learning based intrusion detection systems (IDS) to monitor and detect cyber-attacks in the in-vehicle network. Lastly, we have introduced novel techniques for jitter management and security management and deployed lightweight IDSs on resource constrained automotive ECUs while ensuring the real-time performance of the automotive systems

    Electric Vehicle Charging Modes, Technologies and Applications of Smart Charging

    Get PDF
    The rise of the intelligent, local charging facilitation and environmentally friendly aspects of electric vehicles (EVs) has grabbed the attention of many end-users. However, there are still numerous challenges faced by researchers trying to put EVs into competition with internal combustion engine vehicles (ICEVs). The major challenge in EVs is quick recharging and the selection of an optimal charging station. In this paper, we present the most recent research on EV charging management systems and their role in smart cities. EV charging can be done either in parking mode or on-the-move mode. This review work is novel due to many factors, such as that it focuses on discussing centralized and distributed charging management techniques supported by a communication framework for the selection of an appropriate charging station (CS). Similarly, the selection of CS is evaluated on the basis of battery charging as well as battery swapping services. This review also covered plug-in charging technologies including residential, public and ultra-fast charging technologies and also discusses the major components and architecture of EVs involved in charging. In a comprehensive and detailed manner, the applications and challenges in different charging modes, CS selection, and future work have been discussed. This is the first attempt of its kind, we did not find a survey on the charging hierarchy of EVs, their architecture, or their applications in smart cities
    corecore