46 research outputs found

    Fine-Grained Reliability for V2V Communications around Suburban and Urban Intersections

    Full text link
    Safe transportation is a key use-case of the 5G/LTE Rel.15+ communications, where an end-to-end reliability of 0.99999 is expected for a vehicle-to-vehicle (V2V) transmission distance of 100-200 m. Since communications reliability is related to road-safety, it is crucial to verify the fulfillment of the performance, especially for accident-prone areas such as intersections. We derive closed-form expressions for the V2V transmission reliability near suburban corners and urban intersections over finite interference regions. The analysis is based on plausible street configurations, traffic scenarios, and empirically-supported channel propagation. We show the means by which the performance metric can serve as a preliminary design tool to meet a target reliability. We then apply meta distribution concepts to provide a careful dissection of V2V communications reliability. Contrary to existing work on infinite roads, when we consider finite road segments for practical deployment, fine-grained reliability per realization exhibits bimodal behavior. Either performance for a certain vehicular traffic scenario is very reliable or extremely unreliable, but nowhere in relatively proximity to the average performance. In other words, standard SINR-based average performance metrics are analytically accurate but can be insufficient from a practical viewpoint. Investigating other safety-critical point process networks at the meta distribution-level may reveal similar discrepancies.Comment: 27 pages, 6 figures, submitted to IEEE Transactions on Wireless Communication

    Fine-Grained vs. Average Reliability for V2V Communications around Intersections

    Full text link
    Intersections are critical areas of the transportation infrastructure associated with 47% of all road accidents. Vehicle-to-vehicle (V2V) communication has the potential of preventing up to 35% of such serious road collisions. In fact, under the 5G/LTE Rel.15+ standardization, V2V is a critical use-case not only for the purpose of enhancing road safety, but also for enabling traffic efficiency in modern smart cities. Under this anticipated 5G definition, high reliability of 0.99999 is expected for semi-autonomous vehicles (i.e., driver-in-the-loop). As a consequence, there is a need to assess the reliability, especially for accident-prone areas, such as intersections. We unpack traditional average V2V reliability in order to quantify its related fine-grained V2V reliability. Contrary to existing work on infinitely large roads, when we consider finite road segments of significance to practical real-world deployment, fine-grained reliability exhibits bimodal behavior. Performance for a certain vehicular traffic scenario is either very reliable or extremely unreliable, but nowhere in relative proximity to the average performance.Comment: 5 pages, 4 figures. arXiv admin note: substantial text overlap with arXiv:1706.1001

    Worm epidemics in vehicular networks

    Get PDF
    Connected vehicles promise to enable a wide range of new automotive services that will improve road safety, ease traffic management, and make the overall travel experience more enjoyable. However, they also open significant new surfaces for attacks on the electronics that control most of modern vehicle operations. In particular, the emergence of vehicle-to-vehicle (V2V) communication risks to lay fertile ground for self-propagating mobile malware that targets automobile environments. In this work, we perform a first study on the dynamics of vehicular malware epidemics in a large-scale road network, and unveil how a reasonably fast worm can easily infect thousands of vehicles in minutes. We determine how such dynamics are affected by a number of parameters, including the diffusion of the vulnerability, the penetration ratio and range of the V2V communication technology, or the worm self-propagation mechanism. We also propose a simple yet very effective numerical model of the worm spreading process, and prove it to be able to mimic the results of computationally expensive network simulations. Finally, we leverage the model to characterize the dangerousness of the geographical location where the worm is first injected, as well as for efficient containment of the epidemics through the cellular network.Peer ReviewedPostprint (author’s final draft

    Inter-Vehicle Communication at Intersections : An Evaluation of Ad-Hoc and Cellular Communication

    Get PDF
    This book evaluates the ability of ad-hoc and cellular communication to enable cross-traffic assistance at intersections. Potential issues like Non-Line-Of-Sight (NLOS) reception with ad-hoc and limited capacity, higher latency and costs with cellular technology are investigated in two individual evaluations. A method for efficient information delivery via cellular systems and an inter-vehicle NLOS radio propagation model are proposed. Finally, the suitability of both technologies is compared

    A Survey on 5G Usage Scenarios and Traffic Models

    Get PDF
    The fifth-generation mobile initiative, 5G, is a tremendous and collective effort to specify, standardize, design, manufacture, and deploy the next cellular network generation. 5G networks will support demanding services such as enhanced Mobile Broadband, Ultra-Reliable and Low Latency Communications and massive Machine-Type Communications, which will require data rates of tens of Gbps, latencies of few milliseconds and connection densities of millions of devices per square kilometer. This survey presents the most significant use cases expected for 5G including their corresponding scenarios and traffic models. First, the paper analyzes the characteristics and requirements for 5G communications, considering aspects such as traffic volume, network deployments, and main performance targets. Secondly, emphasizing the definition of performance evaluation criteria for 5G technologies, the paper reviews related proposals from principal standards development organizations and industry alliances. Finally, well-defined and significant 5G use cases are provided. As a result, these guidelines will help and ease the performance evaluation of current and future 5G innovations, as well as the dimensioning of 5G future deployments.This work is partially funded by the Spanish Ministry of Economy and Competitiveness (project TEC2016-76795-C6-4-R)H2020 research and innovation project 5G-CLARITY (Grant No. 871428)Andalusian Knowledge Agency (project A-TIC-241-UGR18)

    Information dissemination in mobile networks

    Get PDF
    This thesis proposes some solutions to relieve, using Wi-Fi wireless networks, the data consumption of cellular networks using cooperation between nodes, studies how to make a good deployment of access points to optimize the dissemination of contents, analyzes some mechanisms to reduce the nodes' power consumption during data dissemination in opportunistic networks, as well as explores some of the risks that arise in these networks. Among the applications that are being discussed for data off-loading from cellular networks, we can find Information Dissemination in Mobile Networks. In particular, for this thesis, the Mobile Networks will consist of Vehicular Ad-hoc Networks and Pedestrian Ad-Hoc Networks. In both scenarios we will find applications with the purpose of vehicle-to-vehicle or pedestrian-to-pedestrian Information dissemination, as well as vehicle-to-infrastructure or pedestrian-to-infrastructure Information dissemination. We will see how both scenarios (vehicular and pedestrian) share many characteristics, while on the other hand some differences make them unique, and therefore requiring of specific solutions. For example, large car batteries relegate power saving techniques to a second place, while power-saving techniques and its effects to network performance is a really relevant issue in Pedestrian networks. While Cellular Networks offer geographically full-coverage, in opportunistic Wi-Fi wireless solutions the short-range non-fullcoverage paradigm as well as the high mobility of the nodes requires different network abstractions like opportunistic networking, Disruptive/Delay Tolerant Networks (DTN) and Network Coding to analyze them. And as a particular application of Dissemination in Mobile Networks, we will study the malware spread in Mobile Networks. Even though it relies on similar spreading mechanisms, we will see how it entails a different perspective on Dissemination
    corecore