5 research outputs found

    Making Transport Safer: V2V-Based Automated Emergency Braking System

    Get PDF
    An important goal in the field of intelligent transportation systems (ITS) is to provide driving aids aimed at preventing accidents and reducing the number of traffic victims. The commonest traffic accidents in urban areas are due to sudden braking that demands a very fast response on the part of drivers. Attempts to solve this problem have motivated many ITS advances including the detection of the intention of surrounding cars using lasers, radars or cameras. However, this might not be enough to increase safety when there is a danger of collision. Vehicle to vehicle communications are needed to ensure that the other intentions of cars are also available. The article describes the development of a controller to perform an emergency stop via an electro-hydraulic braking system employed on dry asphalt. An original V2V communication scheme based on WiFi cards has been used for broadcasting positioning information to other vehicles. The reliability of the scheme has been theoretically analyzed to estimate its performance when the number of vehicles involved is much higher. This controller has been incorporated into the AUTOPIA program control for automatic cars. The system has been implemented in Citroën C3 Pluriel, and various tests were performed to evaluate its operation

    Secure Location-Aided Routing Protocols With Wi-Fi Direct For Vehicular Ad Hoc Networks

    Get PDF
    Secure routing protocols are proposed for the vehicular ad hoc networks. The protocolsintegrate the security authentication process with the Location-Aided Routing (LAR) protocol to supportWi-Fi Direct communications between the vehicles. The methods are robust against various security threats.The security authentication process adopts a modified Diffie-Hellman key agreement protocol. The Diffie-Hellman protocol is used with a short authentication string (SAS)-based key agreement over Wi-Fi Directout-of-band communication channels. It protects the communication from any man-in-the-middle securitythreats. In particular, the security process is integrated into two LAR routing schemes, i.e., the request-zoneLAR scheme and the distance-based LAR scheme.We conduct extensive simulations with different networkparameters such as the vehicular node density, the number of the malicious nodes, and the speed of thenodes. Simulation results show that the proposed routing protocols provide superior performance in securedata delivery and average total packet delay. Also, the secure distance-based LAR protocol outperforms thesecure request-zone LAR protocol

    Performance Analysis of Drive-thru Internet Access

    Get PDF
    Drive-thru Internet is considered to be an important solution to provide Internet access for vehicles. By deploying cost-effective and high bandwidth roadside WiFi networks, a vehicle can upload/download considerable data when drive through the coverage area, whereby a myriad of automotive applications can be employed, such as intelligent transportation system, infotainment applications like video/audio streaming, webpage browsing, etc. However, the high mobility of vehicles leads to the intermittent connection between a vehicle and roadside Access Points (APs), which would cause the Internet access delay and throughput degradation. In this thesis, we propose comprehensive modeling and analysis for the drive-thru Internet access performance considering the overhead of the access procedure, which includes the steps of network detection, user authentication and network parameters assignment. We also consider the situation that a vehicle drives through multiple roadside APs' coverage areas and evaluate the performance of traffic offloading from cellular networks to roadside WiFi networks. In specific, firstly, we develop an analytical model to study the dependency of the drive-thru Internet access delay with different factors, i.e., the wireless channel conditions, the number of co-associated WiFi clients, and the employed authentication mechanism, such as the WiFi Protected Access II (WPA2)-Pre-Shared Key (PSK) and the WPA2-802.1X modes. The access procedure is modeled as a discrete Markov chain to calculate the time to exchange all management frames and to evaluate the Internet access delay. The accuracy of the analytical model is studied via computer simulations, as well as experimental testing using Commercial Off-The-Shelf (COTS) WiFi products, together with a channel emulator that emulates the wireless channel conditions in a vehicular environment. Simulation and experiment results validate the accuracy of the proposed analytical model which provides useful guidelines for future selection/development of suitable WiFi network access schemes in a vehicular environment. Secondly, we take a further step to analyze the throughput performance of the drive-thru Internet access. The mobility of the vehicle is modeled as the transition of a series of zones in the coverage area, which is defined based on the relationship between the WiFi link rate and the distance of the AP and the vehicle. A three dimensional (3D) Markov model is proposed to combine the zone transition process and the transmission of the management frames and calculate the average throughput under conditions of different numbers of co-associated WiFi clients, channel qualities and different access protocols. Thirdly, we consider that when the vehicle drives through multiple roadside WiFi networks, and employ the Vehicle-to-Vehicle (V2V) assisted WiFi offloading mechanism, where nearby vehicles that associated to different APs can use their idle WiFi resource to offload part of peer's data traffic. The offloading performance is calculated by modeling the intermittent WiFi transmission as an M/G/1/K queueing process, and the performance gain of the V2V assistance is also analyzed. In summary, the research works in this thesis should provide guidelines for future research and development of drive-thru Internet

    An Empirical Study to Analyze the Feasibility of WIFI for VANETs

    No full text
    corecore