35,385 research outputs found
A New Movement Authority Based on Vehicle-Centric Communication
The communication system that is presently applied in the European Train Control System can only support data exchange between vehicles and ground, but the direct vehicle-to-vehicle communication is not available. The details of interlocking information and other vehicles’ movements are invisible to drivers who are the last defense to prevent unsafe scenarios. As connected vehicles have been envisioned to enhance transportation efficiency and improve safety, the direct vehicle-to-vehicle communication network is involved in this paper to increase the safety of railway transport. In this paper, a new train movement authority (MA+) is proposed. Apart from a wireless communication unit, this system does not require any other infrastructure. With the assistance of vehicle-centric communication technology, MA+ can detect the condition of switches and trains within a certain scope. In this paper, the system structure of MA+ is proposed. Additionally, different implementation scenarios are also discussed. The detection range is estimated and validated based on mathematical calculation and experimental equations. An application demo of MA+ is presented on the Driver Machine Interface of the onboard equipment. The results indicate that MA+ can be a flexible and scalable system for furthering the improvement of railway safety
Data-centric Misbehavior Detection in VANETs
Detecting misbehavior (such as transmissions of false information) in
vehicular ad hoc networks (VANETs) is very important problem with wide range of
implications including safety related and congestion avoidance applications. We
discuss several limitations of existing misbehavior detection schemes (MDS)
designed for VANETs. Most MDS are concerned with detection of malicious nodes.
In most situations, vehicles would send wrong information because of selfish
reasons of their owners, e.g. for gaining access to a particular lane. Because
of this (\emph{rational behavior}), it is more important to detect false
information than to identify misbehaving nodes. We introduce the concept of
data-centric misbehavior detection and propose algorithms which detect false
alert messages and misbehaving nodes by observing their actions after sending
out the alert messages. With the data-centric MDS, each node can independently
decide whether an information received is correct or false. The decision is
based on the consistency of recent messages and new alert with reported and
estimated vehicle positions. No voting or majority decisions is needed, making
our MDS resilient to Sybil attacks. Instead of revoking all the secret
credentials of misbehaving nodes, as done in most schemes, we impose fines on
misbehaving nodes (administered by the certification authority), discouraging
them to act selfishly. This reduces the computation and communication costs
involved in revoking all the secret credentials of misbehaving nodes.Comment: 12 page
Development and Performance Evaluation of a Connected Vehicle Application Development Platform (CVDeP)
Connected vehicle (CV) application developers need a development platform to build,
test and debug real-world CV applications, such as safety, mobility, and environmental
applications, in edge-centric cyber-physical systems. Our study objective is to develop
and evaluate a scalable and secure CV application development platform (CVDeP)
that enables application developers to build, test and debug CV applications in realtime.
CVDeP ensures that the functional requirements of the CV applications meet the
corresponding requirements imposed by the specific applications. We evaluated the
efficacy of CVDeP using two CV applications (one safety and one mobility application)
and validated them through a field experiment at the Clemson University Connected
Vehicle Testbed (CU-CVT). Analyses prove the efficacy of CVDeP, which satisfies the
functional requirements (i.e., latency and throughput) of a CV application while
maintaining scalability and security of the platform and applications
Etude de Faisabilité des Mécanismes de Détection de Mauvais Comportement dans les systèmes de transport intelligents coopératifs (C-ITS)
International audience—Cooperative Intelligent Transport Systems (C–ITS) is an emerging technology that aims at improving road safety, traffic efficiency and drivers experience. To this end, vehicles cooperate with each others and the infrastructure by exchanging Vehicle–to–X communication (V2X) messages. In such communicating systems message authentication and privacy are of paramount importance. The commonly adopted solution to cope with these issues relies on the use of a Public Key Infrastructure (PKI) that provides digital certificates to entities of the system. Even if the use of pseudonym certificates mitigate the privacy issues, the PKI cannot address all cyber threats. That is why we need a mechanism that enable each entity of the system to detect and report misbehaving neighbors. In this paper, we provide a state-of-the-art of misbehavior detection methods. We then discuss their feasibility with respect to current standards and law compliance as well as hardware/software requirements
Recommended from our members
Soft power and its audiences: Tweeting the Olympics from London 2012 to Sochi 2014
The ‘Tweeting the Olympics’ project (the subject of this special section of Participations) must be understood in the context of efforts by host states, the International Olympic Committee (IOC) and other actors involved in the Games to cultivate and communicate a set of meanings to audiences about both the Olympics events and the nations taking part. Olympic Games are not only sporting competitions; they are also exercises in the management of relations between states and publics, at home and overseas, in order to augment the attractiveness and influence or the soft power of the states involved. Soft power is most successful when it goes unnoticed according to its chief proponent Joseph Nye. If so, how can we possibly know whether soft power works? This article reviews the state of the field in thinking about public diplomacy, cultural diplomacy and soft power in the period of this project (2012-14), focusing particularly on how the audiences of soft power projects, like the London and Sochi Games, were conceived and addressed. One of the key questions this project addresses is whether international broadcasters such as the BBCWS and RT used social media during the Games to promote a cosmopolitan dialogue with global audiences and/or merely to integrate social media so as to project and shape national soft power. We argue first that the contested nature of the Olympic Games calls into question received theories of soft power, public and cultural diplomacy. Second, strategic national narratives during the Olympics faced additional challenges, particularly due to the tensions between the national and the international character of the Games. Third, the new media ecology and shift to a network paradigm further threatens the asymmetric power relations of the broadcasting paradigm forcing broadcasters to reassess their engagement with what was formerly known as ‘the audience’ and the targets of soft power
- …