26 research outputs found

    Situational Awareness Enhancement for Connected and Automated Vehicle Systems

    Get PDF
    Recent developments in the area of Connected and Automated Vehicles (CAVs) have boosted the interest in Intelligent Transportation Systems (ITSs). While ITS is intended to resolve and mitigate serious traffic issues such as passenger and pedestrian fatalities, accidents, and traffic congestion; these goals are only achievable by vehicles that are fully aware of their situation and surroundings in real-time. Therefore, connected and automated vehicle systems heavily rely on communication technologies to create a real-time map of their surrounding environment and extend their range of situational awareness. In this dissertation, we propose novel approaches to enhance situational awareness, its applications, and effective sharing of information among vehicles.;The communication technology for CAVs is known as vehicle-to-everything (V2x) communication, in which vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) have been targeted for the first round of deployment based on dedicated short-range communication (DSRC) devices for vehicles and road-side transportation infrastructures. Wireless communication among these entities creates self-organizing networks, known as Vehicular Ad-hoc Networks (VANETs). Due to the mobile, rapidly changing, and intrinsically error-prone nature of VANETs, traditional network architectures are generally unsatisfactory to address VANETs fundamental performance requirements. Therefore, we first investigate imperfections of the vehicular communication channel and propose a new modeling scheme for large-scale and small-scale components of the communication channel in dense vehicular networks. Subsequently, we introduce an innovative method for a joint modeling of the situational awareness and networking components of CAVs in a single framework. Based on these two models, we propose a novel network-aware broadcast protocol for fast broadcasting of information over multiple hops to extend the range of situational awareness. Afterward, motivated by the most common and injury-prone pedestrian crash scenarios, we extend our work by proposing an end-to-end Vehicle-to-Pedestrian (V2P) framework to provide situational awareness and hazard detection for vulnerable road users. Finally, as humans are the most spontaneous and influential entity for transportation systems, we design a learning-based driver behavior model and integrate it into our situational awareness component. Consequently, higher accuracy of situational awareness and overall system performance are achieved by exchange of more useful information

    Predictable Reliability In Inter-Vehicle Communications

    Get PDF
    Predictably reliable communication in wireless networked sensing and control systems (WSC) is a basic enabler for performance guarantee. Yet current research efforts are either focus on maximizing throughput or based on inaccurate interference modelling methods, which yield unsatisfactory results in terms of communication reliability. In this dissertation, we discuss techniques that enable reliable communication in both traditional wireless sensor networks and highly mobile inter-vehicle communication networks. We focus our discussion on traditional wireless sensor networks in Chapter 2 where we discuss mechanisms that enable predictable and reliable communications with no centralized infrastructures. With the promising results in Chapter 2, we extend our methods to inter-vehicle communication networks in Chapter 3. We focus on the broadcast communication paradigm and the unique challenges in applying the PRK interference model into broadcast problems in highly mobile inter-vehicle communication networks. While Chapter 2 and Chapter 3 focus on average reliability, we switch our problem to a more challenging aspect: guaranteeing short-term per-packet reception probability in Chapter 4. Specifically, we describe the PRKS protocol in Chapter 2 which considers unicast transmission paradigm in traditional static wireless sensor networks. PRKS uses the PRK interference model as a basis for interference relation identification that captures characteristics of wireless communications. For communication reliability control, we design a controller that runs at each link receiver and is able to control the average link reliability to be no lower than an application requirement as well as minimizing reliability variation. We further evaluate PRKS with extensive ns-3 simulations. The CPS protocol described in Chapter 3 considers an one-hop broadcast problem in multi-hop inter-vehicle communication networks. We analyze the challenges of applying the PRK model in this particular setting and propose an approximated PRK model, i.e., gPRK model, that addresses the challenges. We further design principles that CPS uses to instantiate the gPRK model in inter-vehicle communications. We implement the CPS scheduling framework in an integrated platform with SUMO and ns-3 to evaluate our design. In Chapter 4, we conservatively estimate the background interference plus noise while nodes are receiving packets. In the meantime, receivers decide minimum power levels their sender should use and feedback their decisions to their senders. Senders fuse feedbacks and choose a power level that guarantees expected packet reception probability at each receivers’ side. We notice in our evaluation that guaranteeing short-term reliability causes extra concurrency loss

    Predictable Reliability In Inter-Vehicle Communications

    Get PDF
    Predictably reliable communication in wireless networked sensing and control systems (WSC) is a basic enabler for performance guarantee. Yet current research efforts are either focus on maximizing throughput or based on inaccurate interference modelling methods, which yield unsatisfactory results in terms of communication reliability. In this dissertation, we discuss techniques that enable reliable communication in both traditional wireless sensor networks and highly mobile inter-vehicle communication networks. We focus our discussion on traditional wireless sensor networks in Chapter 2 where we discuss mechanisms that enable predictable and reliable communications with no centralized infrastructures. With the promising results in Chapter 2, we extend our methods to inter-vehicle communication networks in Chapter 3. We focus on the broadcast communication paradigm and the unique challenges in applying the PRK interference model into broadcast problems in highly mobile inter-vehicle communication networks. While Chapter 2 and Chapter 3 focus on average reliability, we switch our problem to a more challenging aspect: guaranteeing short-term per-packet reception probability in Chapter 4. Specifically, we describe the PRKS protocol in Chapter 2 which considers unicast transmission paradigm in traditional static wireless sensor networks. PRKS uses the PRK interference model as a basis for interference relation identification that captures characteristics of wireless communications. For communication reliability control, we design a controller that runs at each link receiver and is able to control the average link reliability to be no lower than an application requirement as well as minimizing reliability variation. We further evaluate PRKS with extensive ns-3 simulations. The CPS protocol described in Chapter 3 considers an one-hop broadcast problem in multi-hop inter-vehicle communication networks. We analyze the challenges of applying the PRK model in this particular setting and propose an approximated PRK model, i.e., gPRK model, that addresses the challenges. We further design principles that CPS uses to instantiate the gPRK model in inter-vehicle communications. We implement the CPS scheduling framework in an integrated platform with SUMO and ns-3 to evaluate our design. In Chapter 4, we conservatively estimate the background interference plus noise while nodes are receiving packets. In the meantime, receivers decide minimum power levels their sender should use and feedback their decisions to their senders. Senders fuse feedbacks and choose a power level that guarantees expected packet reception probability at each receivers’ side. We notice in our evaluation that guaranteeing short-term reliability causes extra concurrency loss

    Machine learning methods for future-generation wireless networks

    Get PDF

    Wireless communication, sensing, and REM: A security perspective

    Get PDF
    The diverse requirements of next-generation communication systems necessitate awareness, flexibility, and intelligence as essential building blocks of future wireless networks. The awareness can be obtained from the radio signals in the environment using wireless sensing and radio environment mapping (REM) methods. This is, however, accompanied by threats such as eavesdropping, manipulation, and disruption posed by malicious attackers. To this end, this work analyzes the wireless sensing and radio environment awareness mechanisms, highlighting their vulnerabilities and provides solutions for mitigating them. As an example, the different threats to REM and its consequences in a vehicular communication scenario are described. Furthermore, the use of REM for securing communications is discussed and future directions regarding sensing/REM security are highlighted

    A comprehensive survey of V2X cybersecurity mechanisms and future research paths

    Get PDF
    Recent advancements in vehicle-to-everything (V2X) communication have notably improved existing transport systems by enabling increased connectivity and driving autonomy levels. The remarkable benefits of V2X connectivity come inadvertently with challenges which involve security vulnerabilities and breaches. Addressing security concerns is essential for seamless and safe operation of mission-critical V2X use cases. This paper surveys current literature on V2X security and provides a systematic and comprehensive review of the most relevant security enhancements to date. An in-depth classification of V2X attacks is first performed according to key security and privacy requirements. Our methodology resumes with a taxonomy of security mechanisms based on their proactive/reactive defensive approach, which helps identify strengths and limitations of state-of-the-art countermeasures for V2X attacks. In addition, this paper delves into the potential of emerging security approaches leveraging artificial intelligence tools to meet security objectives. Promising data-driven solutions tailored to tackle security, privacy and trust issues are thoroughly discussed along with new threat vectors introduced inevitably by these enablers. The lessons learned from the detailed review of existing works are also compiled and highlighted. We conclude this survey with a structured synthesis of open challenges and future research directions to foster contributions in this prominent field.This work is supported by the H2020-INSPIRE-5Gplus project (under Grant agreement No. 871808), the ”Ministerio de Asuntos Económicos y Transformacion Digital” and the European Union-NextGenerationEU in the frameworks of the ”Plan de Recuperación, Transformación y Resiliencia” and of the ”Mecanismo de Recuperación y Resiliencia” under references TSI-063000-2021-39/40/41, and the CHIST-ERA-17-BDSI-003 FIREMAN project funded by the Spanish National Foundation (Grant PCI2019-103780).Peer ReviewedPostprint (published version
    corecore