46 research outputs found
Fine-Grained Reliability for V2V Communications around Suburban and Urban Intersections
Safe transportation is a key use-case of the 5G/LTE Rel.15+ communications,
where an end-to-end reliability of 0.99999 is expected for a vehicle-to-vehicle
(V2V) transmission distance of 100-200 m. Since communications reliability is
related to road-safety, it is crucial to verify the fulfillment of the
performance, especially for accident-prone areas such as intersections. We
derive closed-form expressions for the V2V transmission reliability near
suburban corners and urban intersections over finite interference regions. The
analysis is based on plausible street configurations, traffic scenarios, and
empirically-supported channel propagation. We show the means by which the
performance metric can serve as a preliminary design tool to meet a target
reliability. We then apply meta distribution concepts to provide a careful
dissection of V2V communications reliability. Contrary to existing work on
infinite roads, when we consider finite road segments for practical deployment,
fine-grained reliability per realization exhibits bimodal behavior. Either
performance for a certain vehicular traffic scenario is very reliable or
extremely unreliable, but nowhere in relatively proximity to the average
performance. In other words, standard SINR-based average performance metrics
are analytically accurate but can be insufficient from a practical viewpoint.
Investigating other safety-critical point process networks at the meta
distribution-level may reveal similar discrepancies.Comment: 27 pages, 6 figures, submitted to IEEE Transactions on Wireless
Communication
Fine-Grained vs. Average Reliability for V2V Communications around Intersections
Intersections are critical areas of the transportation infrastructure
associated with 47% of all road accidents. Vehicle-to-vehicle (V2V)
communication has the potential of preventing up to 35% of such serious road
collisions. In fact, under the 5G/LTE Rel.15+ standardization, V2V is a
critical use-case not only for the purpose of enhancing road safety, but also
for enabling traffic efficiency in modern smart cities. Under this anticipated
5G definition, high reliability of 0.99999 is expected for semi-autonomous
vehicles (i.e., driver-in-the-loop). As a consequence, there is a need to
assess the reliability, especially for accident-prone areas, such as
intersections. We unpack traditional average V2V reliability in order to
quantify its related fine-grained V2V reliability. Contrary to existing work on
infinitely large roads, when we consider finite road segments of significance
to practical real-world deployment, fine-grained reliability exhibits bimodal
behavior. Performance for a certain vehicular traffic scenario is either very
reliable or extremely unreliable, but nowhere in relative proximity to the
average performance.Comment: 5 pages, 4 figures. arXiv admin note: substantial text overlap with
arXiv:1706.1001
Worm epidemics in vehicular networks
Connected vehicles promise to enable a wide range of new automotive services that will improve road safety, ease traffic management, and make the overall travel experience more enjoyable. However, they also open significant new surfaces for attacks on the electronics that control most of modern vehicle operations. In particular, the emergence of vehicle-to-vehicle (V2V) communication risks to lay fertile ground for self-propagating mobile malware that targets automobile environments. In this work, we perform a first study on the dynamics of vehicular malware epidemics in a large-scale road network, and unveil how a reasonably fast worm can easily infect thousands of vehicles in minutes. We determine how such dynamics are affected by a number of parameters, including the diffusion of the vulnerability, the penetration ratio and range of the V2V communication technology, or the worm self-propagation mechanism. We also propose a simple yet very effective numerical model of the worm spreading process, and prove it to be able to mimic the results of computationally expensive network simulations. Finally, we leverage the model to characterize the dangerousness of the geographical location where the worm is first injected, as well as for efficient containment of the epidemics through the cellular network.Peer ReviewedPostprint (author’s final draft
Inter-Vehicle Communication at Intersections : An Evaluation of Ad-Hoc and Cellular Communication
This book evaluates the ability of ad-hoc and cellular communication to enable cross-traffic assistance at intersections. Potential issues like Non-Line-Of-Sight (NLOS) reception with ad-hoc and limited capacity, higher latency and costs with cellular technology are investigated in two individual evaluations. A method for efficient information delivery via cellular systems and an inter-vehicle NLOS radio propagation model are proposed. Finally, the suitability of both technologies is compared
A Survey on 5G Usage Scenarios and Traffic Models
The fifth-generation mobile initiative, 5G, is a
tremendous and collective effort to specify, standardize, design,
manufacture, and deploy the next cellular network generation.
5G networks will support demanding services such as enhanced
Mobile Broadband, Ultra-Reliable and Low Latency Communications and massive Machine-Type Communications, which will
require data rates of tens of Gbps, latencies of few milliseconds
and connection densities of millions of devices per square kilometer. This survey presents the most significant use cases expected
for 5G including their corresponding scenarios and traffic models.
First, the paper analyzes the characteristics and requirements for
5G communications, considering aspects such as traffic volume,
network deployments, and main performance targets. Secondly,
emphasizing the definition of performance evaluation criteria
for 5G technologies, the paper reviews related proposals from
principal standards development organizations and industry
alliances. Finally, well-defined and significant 5G use cases are
provided. As a result, these guidelines will help and ease the
performance evaluation of current and future 5G innovations, as
well as the dimensioning of 5G future deployments.This work is partially funded by the Spanish Ministry of
Economy and Competitiveness (project TEC2016-76795-C6-4-R)H2020
research and innovation project 5G-CLARITY (Grant No. 871428)Andalusian Knowledge Agency (project A-TIC-241-UGR18)
Information dissemination in mobile networks
This thesis proposes some solutions to relieve, using Wi-Fi wireless networks, the data consumption of cellular networks using cooperation between nodes, studies how to make a good deployment of access points to optimize the dissemination of contents, analyzes some mechanisms to reduce the nodes' power consumption during data dissemination in opportunistic networks, as well as explores some of the risks that arise in these networks.
Among the applications that are being discussed for data off-loading from cellular networks, we can find Information Dissemination in Mobile Networks.
In particular, for this thesis, the Mobile Networks will consist of Vehicular Ad-hoc Networks and Pedestrian Ad-Hoc Networks. In both scenarios we will find applications with the purpose of vehicle-to-vehicle or pedestrian-to-pedestrian Information
dissemination, as well as vehicle-to-infrastructure or pedestrian-to-infrastructure Information dissemination. We will see how both
scenarios (vehicular and pedestrian) share many characteristics, while on the other hand some differences make them unique, and therefore requiring of specific solutions. For example, large car batteries relegate power saving techniques to a second place, while power-saving techniques and its effects to network performance is a really relevant issue in Pedestrian networks.
While Cellular Networks offer geographically full-coverage, in opportunistic Wi-Fi wireless solutions the short-range non-fullcoverage paradigm as well as the high mobility of the nodes requires different network abstractions like opportunistic networking,
Disruptive/Delay Tolerant Networks (DTN) and Network Coding to analyze them.
And as a particular application of Dissemination in Mobile Networks, we will study the malware spread in Mobile Networks.
Even though it relies on similar spreading mechanisms, we will see how it entails a different perspective on Dissemination