3,004 research outputs found

    Automated Road Traffic Congestion Detection and Alarm Systems: Incorporating V2I communications into ATCSs

    Full text link
    In this position paper, we address the problems of automated road congestion detection and alerting systems and their security properties. We review different theoretical adaptive road traffic control approaches, and three widely deployed adaptive traffic control systems (ATCSs), namely, SCATS, SCOOT and InSync. We then discuss some related research questions, and the corresponding possible approaches, as well as the adversary model and potential attack scenarios. Two theoretical concepts of automated road congestion alarm systems (including system architecture, communication protocol, and algorithms) are proposed on top of ATCSs, such as SCATS, SCOOT and InSync, by incorporating secure wireless vehicle-to-infrastructure (V2I) communications. Finally, the security properties of the proposed system have been discussed and analysed using the ProVerif protocol verification tool.Comment: 31 page

    Vehicle Security: Risk Assessment in Transportation

    Full text link
    Intelligent Transportation Systems (ITS) are critical infrastructure that are not immune to both physical and cyber threats. Vehicles are cyber/physical systems which are a core component of ITS, can be either a target or a launching point for an attack on the ITS network. Unknown vehicle security vulnerabilities trigger a race among adversaries to exploit the weaknesses and security experts to mitigate the vulnerability. In this study, we identified opportunities for adversaries to take control of the in-vehicle network, which can compromise the safety, privacy, reliability, efficiency, and security of the transportation system. This study contributes in three ways to the literature of ITS security and resiliency. First, we aggregate individual risks that are associated with hacking the in-vehicle network to determine system-level risk. Second, we employ a risk-based model to conduct a qualitative vulnerability-oriented risk assessment. Third, we identify the consequences of hacking the in-vehicle network through a risk-based approach, using an impact-likelihood matrix. The qualitative assessment communicates risk outcomes for policy analysis. The outcome of this study would be of interest and usefulness to policymakers and engineers concerned with the potential vulnerabilities of the critical infrastructures.Comment: 9 pages, 1 table, 3 figure

    Intelligent Processing in Vehicular Ad hoc Networks: a Survey

    Full text link
    The intelligent Processing technique is more and more attractive to researchers due to its ability to deal with key problems in Vehicular Ad hoc networks. However, several problems in applying intelligent processing technologies in VANETs remain open. The existing applications are comprehensively reviewed and discussed, and classified into different categories in this paper. Their strategies, advantages/disadvantages, and performances are elaborated. By generalizing different tactics in various applications related to different scenarios of VANETs and evaluating their performances, several promising directions for future research have been suggested.Comment: 11pages, 5 figure

    Millimeter Wave Vehicular Communication to Support Massive Automotive Sensing

    Full text link
    As driving becomes more automated, vehicles are being equipped with more sensors generating even higher data rates. Radars (RAdio Detection and Ranging) are used for object detection, visual cameras as virtual mirrors, and LIDARs (LIght Detection and Ranging) for generating high resolution depth associated range maps, all to enhance the safety and efficiency of driving. Connected vehicles can use wireless communication to exchange sensor data, allowing them to enlarge their sensing range and improve automated driving functions. Unfortunately, conventional technologies, such as dedicated short-range communication (DSRC) and 4G cellular communication, do not support the gigabit-per-second data rates that would be required for raw sensor data exchange between vehicles. This paper makes the case that millimeter wave (mmWave) communication is the only viable approach for high bandwidth connected vehicles. The motivations and challenges associated with using mmWave for vehicle-to-vehicle and vehicle-to-infrastructure applications are highlighted. A high-level solution to one key challenge - the overhead of mmWave beam training - is proposed. The critical feature of this solution is to leverage information derived from the sensors or DSRC as side information for the mmWave communication link configuration. Examples and simulation results show that the beam alignment overhead can be reduced by using position information obtained from DSRC.Comment: 7 pages, 5 figures, 1 table, submitted to IEEE Communications Magazin

    A Survey on High-Speed Railway Communications: A Radio Resource Management Perspective

    Full text link
    High-speed railway (HSR) communications will become a key feature supported by intelligent transportation communication systems. The increasing demand for HSR communications leads to significant attention on the study of radio resource management (RRM), which enables efficient resource utilization and improved system performance. RRM design is a challenging problem due to heterogenous quality of service (QoS) requirements and dynamic characteristics of HSR wireless communications. The objective of this paper is to provide an overview on the key issues that arise in the RRM design for HSR wireless communications. A detailed description of HSR communication systems is first presented, followed by an introduction on HSR channel models and characteristics, which are vital to the cross-layer RRM design. Then we provide a literature survey on state-of-the-art RRM schemes for HSR wireless communications, with an in-depth discussion on various RRM aspects including admission control, mobility management, power control and resource allocation. Finally, this paper outlines the current challenges and open issues in the area of RRM design for HSR wireless communications.Comment: 40 pages, 10 figures. Submitted to Computer Communication

    Intelligent Physical Layer Security Approach for V2X Communication

    Full text link
    Intelligent transportation systems (ITS) with advanced sensing and computing technologies are expected to support a whole new set of services including pedestrian and vehicular safety, internet access for vehicles, and eventually, driverless cars. Wireless communication is a major driving factor behind ITS, enabling reliable communication between vehicles, infrastructure, pedestrians and network, generally referred to as vehicle to everything (V2X) communication. However, the broadcast nature of wireless communication renders it prone to jamming, eavesdropping and spoofing attacks which can adversely affect ITS. Keeping in view this issue, we suggest the use of an intelligent security framework for V2X communication security, referred to as intelligent V2X security (IV2XS), to provide a reliable and robust solution capable of adapting to different conditions, scenarios and user requirements. We also identify the conditions that impact the security and describe the open challenges in achieving a realistic IV2XS system

    Machine Learning for Vehicular Networks

    Full text link
    The emerging vehicular networks are expected to make everyday vehicular operation safer, greener, and more efficient, and pave the path to autonomous driving in the advent of the fifth generation (5G) cellular system. Machine learning, as a major branch of artificial intelligence, has been recently applied to wireless networks to provide a data-driven approach to solve traditionally challenging problems. In this article, we review recent advances in applying machine learning in vehicular networks and attempt to bring more attention to this emerging area. After a brief overview of the major concept of machine learning, we present some application examples of machine learning in solving problems arising in vehicular networks. We finally discuss and highlight several open issues that warrant further research.Comment: Accepted by IEEE Vehicular Technology Magazin

    A Survey on Software-Defined VANETs: Benefits, Challenges, and Future Directions

    Full text link
    The evolving of Fifth Generation (5G) networks isbecoming more readily available as a major driver of the growthof new applications and business models. Vehicular Ad hocNetworks (VANETs) and Software Defined Networking (SDN)represent the key enablers of 5G technology with the developmentof next generation intelligent vehicular networks and applica-tions. In recent years, researchers have focused on the integrationof SDN and VANET, and look at different topics related to thearchitecture, the benefits of software-defined VANET servicesand the new functionalities to adapt them. However, securityand robustness of the complete architecture is still questionableand have been largely negleted. Moreover, the deployment andintegration of novel entities and several architectural componentsdrive new security threats and vulnerabilities.In this paper, first we survey the state-of-the-art SDN basedVehicular ad-hoc Network (SDVN) architectures for their net-working infrastructure design, functionalities, benefits, and chal-lenges. Then we discuss these SDVN architectures against majorsecurity threats that violate the key security services such asavailability, confidentiality, authentication, and data integrity.We also propose different countermeasures to these threats.Finally, we discuss the lessons learned with the directions offuture research work towards provisioning stringent security andprivacy solutions in future SDVN architectures. To the best of ourknowledge, this is the first comprehensive work that presents sucha survey and analysis on SDVNs in the era of future generationnetworks (e.g., 5G, and Information centric networking) andapplications (e.g., intelligent transportation system, and IoT-enabled advertising in VANETs).Comment: 17 pages, 2 figure

    Cyber-physical Control of Road Freight Transport

    Full text link
    Freight transportation is of outmost importance for our society and is continuously increasing. At the same time, transporting goods on roads accounts for about 26% of all energy consumption and 18% of all greenhouse gas emissions in the European Union. Despite the influence the transportation system has on our energy consumption and the environment, road transportation is mainly done by individual long-haulage trucks with no real-time coordination or global optimization. In this paper, we review how modern information and communication technology supports a cyber-physical transportation system architecture with an integrated logistic system coordinating fleets of trucks traveling together in vehicle platoons. From the reduced air drag, platooning trucks traveling close together can save about 10% of their fuel consumption. Utilizing road grade information and vehicle-to-vehicle communication, a safe and fuel-optimized cooperative look-ahead control strategy is implemented on top of the existing cruise controller. By optimizing the interaction between vehicles and platoons of vehicles, it is shown that significant improvements can be achieved. An integrated transport planning and vehicle routing in the fleet management system allows both small and large fleet owners to benefit from the collaboration. A realistic case study with 200 heavy-duty vehicles performing transportation tasks in Sweden is described. Simulations show overall fuel savings at more than 5% thanks to coordinated platoon planning. It is also illustrated how well the proposed cooperative look-ahead controller for heavy-duty vehicle platoons manages to optimize the velocity profiles of the vehicles over a hilly segment of the considered road network

    Beyond the Dolev-Yao Model: Realistic Application-Specific Attacker Models for Applications Using Vehicular Communication

    Full text link
    In recent time, the standards for Vehicular Ad-hoc Networks (VANETs) and Intelligent Transportation Systems (ITSs) matured and scientific and industry interest is high especially as autonomous driving gets a lot of media attention. Autonomous driving and other assistance systems for cars make heavy use of VANETs to exchange information.They may provide more comfort, security and safety for drivers. However, it is of crucial importance for the user's trust in these assistance systems that they could not be influenced by malicious users. VANETs are likely attack vectors for such malicious users, hence application-specific security requirements must be considered during the design of applications using VANETs. In literature, many attacks on vehicular communication have been described but attacks on specific vehicular networking applications are often missing. This paper fills in this gap by describing standardized vehicular networking applications, defining and extending previous attacker models, and using the resulting new models to characterize the possible attackers interested in the specific vehicular networking application. The attacker models presented in this paper hopefully provide great benefit for the scientific community and industry as they allow to compare security evaluations of different works, characterize attackers, their intentions and help to plan application-specific security controls for vehicular networking applications.Comment: The Tenth International Conference on Emerging Security Information, Systems and Technologies - SECURWARE 2016, Nice, France, 201
    • …
    corecore