421 research outputs found

    Vehicle to vehicle (V2V) wireless communications

    Get PDF
    This work focuses on the vehicle-to-vehicle (V2V) communication, its current challenges, future perspective and possible improvement.V2V communication is characterized by the dynamic environment, high mobility, nonpredective scenario, propagation effects, and also communicating antenna's positions. This peculiarity of V2V wireless communication makes channel modelling and the vehicular propagation quite challenging. In this work, firstly we studied the present context of V2V communication also known as Vehicular Ad-hoc Netwok (VANET) including ongoing researches and studies particularly related to Dedicated Short Range Communication (DSRC), specifically designed for automotive uses with corresponding set of protocols and standards. Secondly, we focused on communication models and improvement of these models to make them more suitable, reliable and efficient for the V2V environment. As specifies the standard, OFDM is used in V2V communication, Adaptable OFDM transceiver was designed. Some parameters as performance analytics are used to compare the improvement with the actual situation. For the enhancement of physical layer of V2V communication, this work is focused in the study of MIMO channel instead of SISO. In the designed transceiver both SISO and MIMO were implemented and studied successfully

    EKF/UKF-based channel estimation for robust and reliable communications in V2V and IIoT

    Get PDF
    Cyber-physical systems (CPSs) are characterized by integrating computation, communication, and physical system. In typical CPS application scenarios, vehicle-to-vehicle (V2V) and Industry Internet of Things (IIoT), due to doubly selective fading and non-stationary channel characteristics, the robust and reliable end-to-end communication is extremely important. Channel estimation is a major signal processing technology to ensure robust and reliable communication. However, the existing channel estimation methods for V2V and IIoT cannot effectively reduce intercarrier interference (ICI) and lower the computation complexity, thus leading to poor robustness. Aiming at this challenge, according to the channel characteristics of V2V and IIoT, we design two channel estimation methods based on the Bayesian filter to promote the robustness and reliability of end-to-end communication. For the channels with doubly selective fading and non-stationary characteristics of V2V and IIoT scenarios, in the one hand, basis extended model (BEM) is used to further reduce the complexity of the channel estimation algorithm under the premise that ICI can be eliminated in the channel estimation. On the other hand, aiming at the non-stationary channel, a channel estimation and interpolation method based on extended Kalman filter (EKF) and unscented Kalman filter (UKF) Bayesian filters to jointly estimate the channel impulse response (CIR) and time-varying time domain autocorrelation coefficient is adopted. Through the MATLAB simulation, the robustness and reliability of end-to-end communication for V2V and IIoT are promoted by the proposed algorithms

    Intrusion Detection System for Platooning Connected Autonomous Vehicles

    Get PDF
    The deployment of Connected Autonomous Vehicles (CAVs) in Vehicular Ad Hoc Networks (VANETs) requires secure wireless communication in order to ensure reliable connectivity and safety. However, this wireless communication is vulnerable to a variety of cyber atacks such as spoofing or jamming attacks. In this paper, we describe an Intrusion Detection System (IDS) based on Machine Learning (ML) techniques designed to detect both spoofing and jamming attacks in a CAV environment. The IDS would reduce the risk of traffic disruption and accident caused as a result of cyber-attacks. The detection engine of the presented IDS is based on the ML algorithms Random Forest (RF), k-Nearest Neighbour (k-NN) and One-Class Support Vector Machine (OCSVM), as well as data fusion techniques in a cross-layer approach. To the best of the authors’ knowledge, the proposed IDS is the first in literature that uses a cross-layer approach to detect both spoofing and jamming attacks against the communication of connected vehicles platooning. The evaluation results of the implemented IDS present a high accuracy of over 90% using training datasets containing both known and unknown attacks

    Millimetre wave frequency band as a candidate spectrum for 5G network architecture : a survey

    Get PDF
    In order to meet the huge growth in global mobile data traffic in 2020 and beyond, the development of the 5th Generation (5G) system is required as the current 4G system is expected to fall short of the provision needed for such growth. 5G is anticipated to use a higher carrier frequency in the millimetre wave (mm-wave) band, within the 20 to 90 GHz, due to the availability of a vast amount of unexploited bandwidth. It is a revolutionary step to use these bands because of their different propagation characteristics, severe atmospheric attenuation, and hardware constraints. In this paper, we carry out a survey of 5G research contributions and proposed design architectures based on mm-wave communications. We present and discuss the use of mm-wave as indoor and outdoor mobile access, as a wireless backhaul solution, and as a key enabler for higher order sectorisation. Wireless standards such as IEE802.11ad, which are operating in mm-wave band have been presented. These standards have been designed for short range, ultra high data throughput systems in the 60 GHz band. Furthermore, this survey provides new insights regarding relevant and open issues in adopting mm-wave for 5G networks. This includes increased handoff rate and interference in Ultra-Dense Network (UDN), waveform consideration with higher spectral efficiency, and supporting spatial multiplexing in mm-wave line of sight. This survey also introduces a distributed base station architecture in mm-wave as an approach to address increased handoff rate in UDN, and to provide an alternative way for network densification in a time and cost effective manner

    Visible Light Communication Cyber Security Vulnerabilities For Indoor And Outdoor Vehicle-To-Vehicle Communication

    Get PDF
    Light fidelity (Li-Fi), developed from the approach of Visible Light Communication (VLC), is a great replacement or complement to existing radio frequency-based (RF) networks. Li-Fi is expected to be deployed in various environments were, due to Wi-Fi congestion and health limitations, RF should not be used. Moreover, VLC can provide the future fifth generation (5G) wireless technology with higher data rates for device connectivity which will alleviate the traffic demand. 5G is playing a vital role in encouraging the modern applications. In 2023, the deployment of all the cellular networks will reach more than 5 billion users globally. As a result, the security and privacy of 5G wireless networks is an essential problem as those modern applications are in people\u27s life everywhere. VLC security is as one of the core physical-layer security (PLS) solutions for 5G networks. Due to the fact that light does not penetrate through solid objects or walls, VLC naturally has higher security and privacy for indoor wireless networks compared to RF networks. However, the broadcasting nature of VLC caused concerns, e.g., eavesdropping, have created serious attention as it is a crucial step to validate the success of VLC in wild. The aim of this thesis is to properly address the security issues of VLC and further enhance the VLC nature security. We analyzed the secrecy performance of a VLC model by studying the characteristics of the transmitter, receiver and the visible light channel. Moreover, we mitigated the security threats in the VLC model for the legitimate user, by 1) implementing more access points (APs) in a multiuser VLC network that are cooperated, 2) reducing the semi-angle of LED to help improve the directivity and secrecy and, 3) using the protected zone strategy around the AP where eavesdroppers are restricted. According to the model\u27s parameters, the results showed that the secrecy performance in the proposed indoor VLC model and the vehicle-to-vehicle (V2V) VLC outdoor model using a combination of multiple PLS techniques as beamforming, secure communication zones, and friendly jamming is enhanced. The proposed model security performance was measured with respect to the signal to noise ratio (SNR), received optical power, and bit error rate (BER) Matlab simulation results

    Characterization, Avoidance and Repair of Packet Collisions in Inter-Vehicle Communication Networks

    Get PDF
    This work proposes a combined and accurate simulation of wireless channel, physical layer and networking aspects in order to bridge the gaps between the corresponding research communities. The resulting high fidelity simulations enable performance optimizations across multiple layers, and are used in the second part of this thesis to evaluate the impact of fast-fading channel characteristics on Carrier-Sense Multiple Access, and to quantify the benefit of successive interference cancellation

    NR Sidelink Performance Evaluation for Enhanced 5G-V2X Services

    Get PDF
    The Third Generation Partnership Project (3GPP) has specified Cellular Vehicle-to-Everything (C-V2X) radio access technology in Releases 15–17, with an emphasis on facilitating direct communication between vehicles through the interface, sidelink PC5. This interface provides end-to-end network slicing functionality together with a stable cloud-native core network. The performance of direct vehicle-to-vehicle (V2V) communications has been improved by using the sidelink interface, which allows for a network infrastructure bypass. Sidelink transmissions make use of orthogonal resources that are either centrally allocated (Mode 1, Release 14) or chosen by the vehicles themselves (Mode 2, Release 14). With growing interest in connected and autonomous vehicles, the advancement in radio access technologies that facilitate dependable and low-latency vehicular communications is becoming more significant. This is especially necessary when there are heavy traffic conditions and patterns. We thoroughly examined the New Radio (NR) sidelink’s performance based on 3GPP Releases 15–17 under various vehicle densities, speeds, and distance settings. Thus, by evaluating sidelink’s strengths and drawbacks, we are able to optimize resource allocation to obtain maximum coverage in urban areas. The performance evaluation was conducted on Network Simulator 3 (NS3.34/5G-LENA) utilizing various network metrics such as average packet reception rate, throughput, and latency

    Characterization, Avoidance and Repair of Packet Collisions in Inter-Vehicle Communication Networks

    Get PDF
    This work proposes a combined and accurate simulation of wireless channel, physical layer and networking aspects in order to bridge the gaps between the corresponding research communities. The resulting high fidelity simulations enable performance optimizations across multiple layers, and are used in the second part of this thesis to evaluate the impact of fast-fading channel characteristics on Carrier-Sense Multiple Access, and to quantify the benefit of successive interference cancellation
    • …
    corecore