631 research outputs found

    An Efficient V2X Based Vehicle Localization Using Single RSU and Single Receiver

    Get PDF
    High accuracy vehicle localization information is critical for intelligent transportation systems and future autonomous vehicles. It is challenging to achieve the required centimeter-level localization accuracy, especially in urban or global navigation satellite system denied environments. Here we propose a vehicle-to-infrastructure (V2I)-based vehicle localization algorithm. First, it is low-cost and hardware requirements are simplified, the minimum requirement is a single roadside unit and single on-board receiver. Second, it is computationally efficient, the available V2I information is formulated as an over-determined system. Then, the vehicle position is estimated in a closed-form manner via the widely used weighted linear least squares (WLLS) method and meter level accuracy is achievable. Furthermore, the numerical performance of WLLS is consistent with the theoretical results in larger signal-to-noise ratio region

    Development of an Emergency Radio Beacon for Small Unmanned Aerial Vehicles

    Get PDF
    Emergency locator transmitters (ELTs) used to locate manned aircrafts are not well suited to find and recover small crashed unmanned aerial vehicles (UAVs). ELTs utilize an international satellite system for search and rescue (Cospas-Sarsat System), which should leverage its expensive resources to save lives as a priority. Besides, ELTs are too big and heavy to be used within small UAVs. Some of the existing solutions for this problem are based on receivers that detect signal strength, which may be a long and tedious process not suitable for user needs. Others do not have enough range or require radio license and expensive amateur radio receivers. This paper presents an emergency radio beacon specifically designed to locate small UAVs. It is triggered automatically in the event of a crash and allows finding and recovering a crashed UAV in a fast and simple way. It meets not only the required specifications of user-friendliness, size and weight of this kind of application, but also it is a high precision and low cost device. Besides, it has enough range and endurance. The experiments carried out show the operation of the proposed system

    Towards Secure, Power-Efficient and Location-Aware Mobile Computing

    Get PDF
    In the post-PC era, mobile devices will replace desktops and become the main personal computer for many people. People rely on mobile devices such as smartphones and tablets for everything in their daily lives. A common requirement for mobile computing is wireless communication. It allows mobile devices to fetch remote resources easily. Unfortunately, the increasing demand of the mobility brings many new wireless management challenges such as security, energy-saving and location-awareness. These challenges have already impeded the advancement of mobile systems. In this dissertation we attempt to discover the guidelines of how to mitigate these problems through three general communication patterns in 802.11 wireless networks. We propose a cross-section of a few interesting and important enhancements to manage wireless connectivity. These enhancements provide useful primitives for the design of next-generation mobile systems in the future.;Specifically, we improve the association mechanism for wireless clients to defend against rogue wireless Access Points (APs) in Wireless LANs (WLANs) and vehicular networks. Real-world prototype systems confirm that our scheme can achieve high accuracy to detect even sophisticated rogue APs under various network conditions. We also develop a power-efficient system to reduce the energy consumption for mobile devices working as software-defined APs. Experimental results show that our system allows the Wi-Fi interface to sleep for up to 88% of the total time in several different applications and reduce the system energy by up to 33%. We achieve this while retaining comparable user experiences. Finally, we design a fine-grained scalable group localization algorithm to enable location-aware wireless communication. Our prototype implemented on commercial smartphones proves that our algorithm can quickly locate a group of mobile devices with centimeter-level accuracy

    A Survey and Comparison of Low-Cost Sensing Technologies for Road Traffic Monitoring

    Get PDF
    Abstract This paper reviews low-cost vehicle and pedestrian detection methods and compares their accuracy. The main goal of this survey is to summarize the progress achieved to date and to help identify the sensing technologies that provide high detection accuracy and meet requirements related to cost and ease of installation. Special attention is paid to wireless battery-powered detectors of small dimensions that can be quickly and effortlessly installed alongside traffic lanes (on the side of a road or on a curb) without any additional supporting structures. The comparison of detection methods presented in this paper is based on results of experiments that were conducted with a variety of sensors in a wide range of configurations. During experiments various sensor sets were analyzed. It was shown that the detection accuracy can be significantly improved by fusing data from appropriately selected set of sensors. The experimental results reveal that accurate vehicle detection can be achieved by using sets of passive sensors. Application of active sensors was necessary to obtain satisfactory results in case of pedestrian detection

    Cooperative inter-vehicle communication protocol with low cost differential GPS

    Get PDF
    This paper describes a cooperative MANET protocol dedicated to intelligent transport systems, named CIVIC (Communication Inter Véhicule Intelligente et Coopérative). The CIVIC protocol is an auto-configuration inter-vehicle communication protocol, which supports adhoc and infrastructure networks, contains reactive and proactive routing components, and adapts different wireless standards. It is a context-aware protocol reacting to vehicle status, road traffic, and geographic environment. It supports location-based communication. To improve the accuracy of GPS, it integrates a localization solution called LCD-GPS (Low Cost Differential GPS). It has been implemented and experimented on the LiveNode sensor developed by our lab. At the end of this paper, an application project MobiPlus is introduced

    Analysis, simulation and testing of ITS applications based on wireless communication technologies

    Get PDF
    Intelligent Transportation Systems (ITS) aim to improve road transport safety and efficiency, to manage road networks in the interest of the society and to provide real time responses to events. In order to reach these goals, real time feedback to the drivers is expected through the integration of telecommunications, sensing and information technologies with transport engineering. Wireless communication technologies, that have been used in industrial applications for more than 30 years, play a crucial role in ITS, as based on the concept of multiple devices (on both vehicle and infrastructure side) interconnected in different ways. Connectivity, in tandem with sensing technologies, is fuelling the innovations that will inevitably lead to the next big opportunity for road transport: autonomous vehicles. Therefore, this study has investigated - through analysis, simulation and field testing – on applications based on wireless communication technologies meant to support both Data acquisition and Data diffusion as fundamental aspects/ phases in ITS, where data is widely individuated as being the key element

    A Review of Radio Frequency Based Localization for Aerial and Ground Robots with 5G Future Perspectives

    Full text link
    Efficient localization plays a vital role in many modern applications of Unmanned Ground Vehicles (UGV) and Unmanned aerial vehicles (UAVs), which would contribute to improved control, safety, power economy, etc. The ubiquitous 5G NR (New Radio) cellular network will provide new opportunities for enhancing localization of UAVs and UGVs. In this paper, we review the radio frequency (RF) based approaches for localization. We review the RF features that can be utilized for localization and investigate the current methods suitable for Unmanned vehicles under two general categories: range-based and fingerprinting. The existing state-of-the-art literature on RF-based localization for both UAVs and UGVs is examined, and the envisioned 5G NR for localization enhancement, and the future research direction are explored

    Defense against Sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support

    Get PDF
    In this paper, we propose two certificate mechanisms for preventing the Sybil attack in a vehicular ad hoc network (VANET): the timestamp series approach and the temporary certificate approach. We focus on an early-stage VANET when the number of smart vehicles is only a small fraction of the vehicles on the road and the only infrastructure components available are the roadside units (RSUs). Our approach does not require a dedicated vehicular public key infrastructure to certify individual vehicles but RSUs are the only components issuing certificates. The vehicles can obtain certificates by simply driving by RSUs, without the need to pre-register at a certificate authority. The timestamp series approach exploits the fact that because of the variance of the movement patterns of the vehicles, it is extremely rare that the two vehicles pass by a series of RSUs at exactly the same time points. The vehicles obtain a series of certificates signed by the RSUs, which certify their passing by at the RSU at a certain time point. By exploiting the spatial and temporal correlation between vehicles and RSUs, we can detect the Sybil attack by checking the similarity of timestamp series. In the temporary certificate-based approach, an RSU issues temporary certificates valid only in a particular area for a limited time. To guarantee that each vehicle is assigned only a single certificate, at the issuance of the first certificate, it is required that the RSU physically authenticate the vehicle. When driving by the subsequent RSUs, however, the certificate can be updated in a chained manner. By guaranteeing that each vehicle is issued a single certificate in a single area, the Sybil attack is prevented. We provide mathematical analysis and simulation for the timestamp series approach. The simulation shows that it works with a small false-positive rate in simple roadway architecture
    • …
    corecore