1,037 research outputs found

    Internet of Vehicles: Motivation, Layered Architecture, Network Model, Challenges, and Future Aspects

    Get PDF
    © 2013 IEEE. Internet of Things is smartly changing various existing research areas into new themes, including smart health, smart home, smart industry, and smart transport. Relying on the basis of 'smart transport,' Internet of Vehicles (IoV) is evolving as a new theme of research and development from vehicular ad hoc networks (VANETs). This paper presents a comprehensive framework of IoV with emphasis on layered architecture, protocol stack, network model, challenges, and future aspects. Specifically, following the background on the evolution of VANETs and motivation on IoV an overview of IoV is presented as the heterogeneous vehicular networks. The IoV includes five types of vehicular communications, namely, vehicle-to-vehicle, vehicle-to-roadside, vehicle-to-infrastructure of cellular networks, vehicle-to-personal devices, and vehicle-to-sensors. A five layered architecture of IoV is proposed considering functionalities and representations of each layer. A protocol stack for the layered architecture is structured considering management, operational, and security planes. A network model of IoV is proposed based on the three network elements, including cloud, connection, and client. The benefits of the design and development of IoV are highlighted by performing a qualitative comparison between IoV and VANETs. Finally, the challenges ahead for realizing IoV are discussed and future aspects of IoV are envisioned

    Determining the Interruption of Services While Performing V2I Communication Using the SPMD Prototype

    Get PDF
    The use of Vehicle to Vehicle (V2V), Vehicle to Infrastructure (V2I), Vehicle to Roadside Unit (V2R) and Vehicle to Other (V2X) communications are increasingly applied over existing and upcoming transportation means by the United States Department of Transportation (USDOT) and other federal agencies. From previous statistical data, these technologies would primarily avoid or mitigate vehicle crashes and would provide more safety, mobility and various other benefits on the roads (“Traffic Safety Facts 2012,” 2013; “Traffic Safety Facts 2013” 2014). During the communication processes between vehicles, infrastructures and roadside units’ various sensitive data such as positions and speed of the vehicles, are transmitted which are currently highly vulnerable. These facts are generated from this research experiment results performed on the provided data sets from the University of Michigan Transportation Research Institute (UMTRI). An interference to the vehicular communications is possible by intentional or unintentional malicious users or other elements which puts drivers at greater risk with the upcoming vehicular technology. Moreover, different agencies and private companies are utilizing collected data from the USDOT to improve the operational volume of roads and services while avoiding accidents. They are also trying to provide other third-party Internet-based services to the consumers based on the live streaming information. This research paper gives a detailed description of all aspects of the vehicular communications protocol (i.e. DSRC, CA, 802.11p protocol, smart infrastructure, etc.). This research paper will provide details of all identified security features (i.e. encryption methods, certificate management, physical securities, data management lifecycles, etc.) that have been applied to these mechanisms to protect the safety of drivers (Cronin, 2013). The USDOT has currently approved the implementation of a 5.9 GHz band, along with the 802.11p standard wireless protocol for dedicated short-range communications used in vehicular communication (Shankland, 2014). This research paper will also provide details of current standards and regulations which will be in effect for the upcoming vehicular technologies in the future in the US along with the susceptibilities to the interruptions of services. Finally, this research will utilize the actual data sets compiled using the actual safety pilot model deployment (SPMD) provided by the UMRTI researchers. The analysis of these results will validate that this protocol is susceptible to interference during communications. This will be shown by plotting the latitudinal and longitudinal coordinates and thus demonstrating the occurrence of gaps within communication (i.e. interference to the vehicular communication) in the existing SPMD prototype data sets
    • …
    corecore