1,872 research outputs found
Robust, Resilient and Reliable Architecture for V2X Communication
The new developments in mobile edge computing (MEC) and vehicle-to-everything (V2X) communications has positioned 5G and beyond in a strong position to answer the market need towards future emerging intelligent transportation systems and smart city applications. The major attractive features of V2X communication is the inherent ability to adapt to any type of network, device, or data, and to ensure robustness, resilience and reliability of the network, which is challenging to realize. In this work, we propose to drive these further these features by proposing a novel robust, resilient and reliable architecture for V2X communication based on harnessing MEC and blockchain technology. A three stage computing service is proposed. Firstly, a hierarchcial computing architecture is deployed spanning over the vehicular network that constitutes cloud computing (CC), edge computing (EC), fog computing (FC) nodes. The resources and data bases can migrate from the high capacity cloud services (furthest away from the individual node of the network) to the edge (medium) and low level fog node, according to computing service requirements. Secondly, the resource allocation filters the data according to its significance, and rank the nodes according to their usability, and selects the network technology according to their physical channel characteristics. Thirdly, we propose a blockchain-based transaction service that ensures reliability. We discussed two use cases for experimental analysis, plug- in electric vehicles in smart grid scenarios, and massive IoT data services for autonomous cars. The results show that car connectivity prediction is accurate 98% of the times, where 92% more data blocks are added using micro-blockchain solution compared to the public blockchain, where it is able to reduce the time to sign and compute the proof-of-work (PoW), and deliver a low-overhead Proof-of-Stake (PoS) consensus mechanism. This approach can be considered a strong candidate architecture for future V2X, and with more general application for everything- to-everything (X2X) communications
Vehicular Fog Computing Enabled Real-time Collision Warning via Trajectory Calibration
Vehicular fog computing (VFC) has been envisioned as a promising paradigm for
enabling a variety of emerging intelligent transportation systems (ITS).
However, due to inevitable as well as non-negligible issues in wireless
communication, including transmission latency and packet loss, it is still
challenging in implementing safety-critical applications, such as real-time
collision warning in vehicular networks. In this paper, we present a vehicular
fog computing architecture, aiming at supporting effective and real-time
collision warning by offloading computation and communication overheads to
distributed fog nodes. With the system architecture, we further propose a
trajectory calibration based collision warning (TCCW) algorithm along with
tailored communication protocols. Specifically, an application-layer
vehicular-to-infrastructure (V2I) communication delay is fitted by the Stable
distribution with real-world field testing data. Then, a packet loss detection
mechanism is designed. Finally, TCCW calibrates real-time vehicle trajectories
based on received vehicle status including GPS coordinates, velocity,
acceleration, heading direction, as well as the estimation of communication
delay and the detection of packet loss. For performance evaluation, we build
the simulation model and implement conventional solutions including cloud-based
warning and fog-based warning without calibration for comparison. Real-vehicle
trajectories are extracted as the input, and the simulation results demonstrate
that the effectiveness of TCCW in terms of the highest precision and recall in
a wide range of scenarios
A Threat Model for Vehicular Fog Computing
Vehicular Fog Computing (VFC) facilitates the deployment of distributed, latency-aware services, residing between smart vehicles and cloud services. However, VFC systems are exposed to manifold security threats, putting human life at risk. Knowledge on such threats is scattered and lacks empirical validation. We performed an extensive threat assessment by reviewing literature and conducting expert interviews, leading to a comprehensive threat model with 33 attacks and example security mitigation strategies, among others. We thereby synthesize and extend prior research; provide rich descriptions for threats; and raise awareness of physical attacks that underline importance of the cyber-physical manifestation of VFC
- …