1,358 research outputs found

    Performance of CAM based Safety Applications using ITS-G5A MAC in High Dense Scenarios

    Get PDF
    ETSI ITS-G5 is the current vehicle-to-vehicle communication technology in Europe, which will be standardized by ETSI TC ITS. It is based on IEEE 802.11p and therefore uses a CSMA/CA scheme for Media Access Control (MAC). In this paper we analyze the performance of CAM based safety applications using the ETSI ITS-G5 MAC technology in a challenging scenario with respect to MAC issues: A suitable freeway segment with 6 lanes in each direction. The freeway scenario is thoroughly modeled and implemented in the well known ns-3 simulation environment. Based on this model, the paper shows the performance of CAM based safety applications under MAC challenging conditions. Therefore we provide a set of simulation results resting upon a particular performance metric which incorporates the key requirements of safety applications. Finally we analyze two concrete example scenarios to make a point how reliable CAM based safety applications are in high dense traffic scenarios

    Towards Scalable Beaconing in VANETs

    Get PDF
    Beaconing is envisioned to build a cooperative awareness in future intelligent vehicles, from which many ITS applications can draw their inputs. The problem of scalability has received ample attention over the past years and is primarily approached using power control methods. We reason power control alone will not be sufficient if we are to meet application requirements; the rate at which beacons are generated must also be controlled. Ultimately, adaptive approaches based on actual channel and traffic state can tune MAC and beaconing properties to optimal values in the dynamic VANET environment

    SDDV: scalable data dissemination in vehicular ad hoc networks

    Get PDF
    An important challenge in the domain of vehicular ad hoc networks (VANET) is the scalability of data dissemination. Under dense traffic conditions, the large number of communicating vehicles can easily result in a congested wireless channel. In that situation, delays and packet losses increase to a level where the VANET cannot be applied for road safety applications anymore. This paper introduces scalable data dissemination in vehicular ad hoc networks (SDDV), a holistic solution to this problem. It is composed of several techniques spread across the different layers of the protocol stack. Simulation results are presented that illustrate the severity of the scalability problem when applying common state-of-the-art techniques and parameters. Starting from such a baseline solution, optimization techniques are gradually added to SDDV until the scalability problem is entirely solved. Besides the performance evaluation based on simulations, the paper ends with an evaluation of the final SDDV configuration on real hardware. Experiments including 110 nodes are performed on the iMinds w-iLab.t wireless lab. The results of these experiments confirm the results obtained in the corresponding simulations

    Intrusion Detection System for Platooning Connected Autonomous Vehicles

    Get PDF
    The deployment of Connected Autonomous Vehicles (CAVs) in Vehicular Ad Hoc Networks (VANETs) requires secure wireless communication in order to ensure reliable connectivity and safety. However, this wireless communication is vulnerable to a variety of cyber atacks such as spoofing or jamming attacks. In this paper, we describe an Intrusion Detection System (IDS) based on Machine Learning (ML) techniques designed to detect both spoofing and jamming attacks in a CAV environment. The IDS would reduce the risk of traffic disruption and accident caused as a result of cyber-attacks. The detection engine of the presented IDS is based on the ML algorithms Random Forest (RF), k-Nearest Neighbour (k-NN) and One-Class Support Vector Machine (OCSVM), as well as data fusion techniques in a cross-layer approach. To the best of the authors’ knowledge, the proposed IDS is the first in literature that uses a cross-layer approach to detect both spoofing and jamming attacks against the communication of connected vehicles platooning. The evaluation results of the implemented IDS present a high accuracy of over 90% using training datasets containing both known and unknown attacks

    Exploiting Map Topology Knowledge for Context-predictive Multi-interface Car-to-cloud Communication

    Full text link
    While the automotive industry is currently facing a contest among different communication technologies and paradigms about predominance in the connected vehicles sector, the diversity of the various application requirements makes it unlikely that a single technology will be able to fulfill all given demands. Instead, the joint usage of multiple communication technologies seems to be a promising candidate that allows benefiting from characteristical strengths (e.g., using low latency direct communication for safety-related messaging). Consequently, dynamic network interface selection has become a field of scientific interest. In this paper, we present a cross-layer approach for context-aware transmission of vehicular sensor data that exploits mobility control knowledge for scheduling the transmission time with respect to the anticipated channel conditions for the corresponding communication technology. The proposed multi-interface transmission scheme is evaluated in a comprehensive simulation study, where it is able to achieve significant improvements in data rate and reliability
    • …
    corecore