194 research outputs found

    A Distributed and Privacy-Aware Speed Advisory System for Optimising Conventional and Electric Vehicles Networks

    Get PDF
    One of the key ideas to make Intelligent Transportation Systems (ITS) work effectively is to deploy advanced communication and cooperative control technologies among the vehicles and road infrastructures. In this spirit, we propose a consensus-based distributed speed advisory system that optimally determines a recommended common speed for a given area in order that the group emissions, or group battery consumptions, are minimised. Our algorithms achieve this in a privacy-aware manner; namely, individual vehicles do not reveal in-vehicle information to other vehicles or to infrastructure. A mobility simulator is used to illustrate the efficacy of the algorithm, and hardware-in-the-loop tests involving a real vehicle are given to illustrate user acceptability and ease of the deployment.Comment: This is a journal paper based on the conference paper "Highway speed limits, optimised consensus, and intelligent speed advisory systems" presented at the 3rd International Conference on Connected Vehicles and Expo (ICCVE 2014) in November 2014. This is the revised version of the paper recently submitted to the IEEE Transactions on Intelligent Transportation Systems for publicatio

    The Impact of Driver Reaction in Cooperative Vehicle Safety Systems

    Get PDF
    Cooperative Vehicular Safety (CVS) has recently been widely studied in the field of automated vehicular systems. CVS systems help decrease the rates of accidents. However, implementing and testing CVS applications in real world is very costly and risky. Hence, most of the related research studies on CVS applications have relied mainly on simulations. In simulated CVS systems, it is important to consider all critical aspects of used models, and how these models affect one another. The movement model is a key component in the simulation study of CVS systems, which controls the mobility of vehicles (nodes) and responses to the continually changing acquiredinformation. However, existing mobility models are not created to take action(s) in response to hazardous situations (identified by situational awareness component). Integrating the reaction(s) to a hazardous alert is a missing element in current CVS system simulations. Hence to rectify this deficiency, this work is to incorporate a Driver’s Reaction Model (DReaM) that react and respond to hazard alerts, and studies the effect of main components of CVS system including the added model. We examined a simulation modeling framework that describes cooperative vehicle safety system as one unified model. The studied framework is powered by cooperation and communication between vehicles. Investigated elements are communication model, movement model, warning generation, and driver response to warning indicating an emergency of near to crash situation

    Towards a Severity Assessment Method for Potential Cyber Attacks to Connected and Autonomous Vehicles

    Get PDF
    CAV (connected and autonomous vehicle) is a crucial part of intelligent transportation systems. CAVs utilize both sensors and communication components to make driving decisions. A large number of companies, research organizations, and governments have researched extensively on the development of CAVs. The increasing number of autonomous and connected functions however means that CAVs are exposed to more cyber security vulnerabilities. Unlike computer cyber security attacks, cyber attacks to CAVs could lead to not only information leakage but also physical damage. According to the UK CAV Cyber Security Principles, preventing CAVs from cyber security attacks need to be considered at the beginning of CAV development. In this paper, a large set of potential cyber attacks are collected and investigated from the aspects of target assets, risks, and consequences. Severity of each type of attacks is then analysed based on clearly defined new set of criteria. The levels of severity for the attacks can be categorized as critical, important, moderate, and minor. Mitigation methods including prevention, reduction, transference, acceptance, and contingency are then suggested. It is found that remote control, fake vision on cameras, hidden objects to LiDAR and Radar, spoofing attack to GNSS, and fake identity in cloud authority are the most dangerous and of the highest vulnerabilities in CAV cyber security

    An Congestion Control Based Cluster Approach for Effective Communication in VANET

    Get PDF
    Clustering in VANET is major controlling method used to make VANET worldwide topology less dynamic. Many of the VANET clustering methods are derived from mobile ad hoc networks (MANET). In any case, VANET hubs are portrayed by their high versatility, and the presence of VANET hubs in the same geographic area does not imply that they show a similar portability designs. Along these lines, VANET grouping plans should contemplate over the level of the speed distinction among neighboring hubs to create moderately stable clustering structure. In this paper, we present another bunching system reasonable for the VANET condition on thruways with the point of upgrading the steadiness of the system topology. This method takes the speed distinction as a parameter to make moderately stable group structure. In this paper proposed to built up another multi-metric calculation for cluster head decisions. A reproduction was directed to assess our strategy and contrast it and the most usually utilized grouping strategies

    Prime Field ECDSA Signature Processing for Reconfigurable Embedded Systems

    Get PDF
    Growing ubiquity and safety relevance of embedded systems strengthen the need to protect their functionality against malicious attacks. Communication and system authentication by digital signature schemes is a major issue in securing such systems. This contribution presents a complete ECDSA signature processing system over prime fields for bit lengths of up to 256 on reconfigurable hardware. By using dedicated hardware implementation, the performance can be improved by up to two orders of magnitude compared to microcontroller implementations. The flexible system is tailored to serve as an autonomous subsystem providing authentication transparent for any application. Integration into a vehicle-to-vehicle communication system is shown as an application example
    • …
    corecore