3,004 research outputs found
Automated Road Traffic Congestion Detection and Alarm Systems: Incorporating V2I communications into ATCSs
In this position paper, we address the problems of automated road congestion
detection and alerting systems and their security properties. We review
different theoretical adaptive road traffic control approaches, and three
widely deployed adaptive traffic control systems (ATCSs), namely, SCATS, SCOOT
and InSync. We then discuss some related research questions, and the
corresponding possible approaches, as well as the adversary model and potential
attack scenarios. Two theoretical concepts of automated road congestion alarm
systems (including system architecture, communication protocol, and algorithms)
are proposed on top of ATCSs, such as SCATS, SCOOT and InSync, by incorporating
secure wireless vehicle-to-infrastructure (V2I) communications. Finally, the
security properties of the proposed system have been discussed and analysed
using the ProVerif protocol verification tool.Comment: 31 page
Vehicle Security: Risk Assessment in Transportation
Intelligent Transportation Systems (ITS) are critical infrastructure that are
not immune to both physical and cyber threats. Vehicles are cyber/physical
systems which are a core component of ITS, can be either a target or a
launching point for an attack on the ITS network. Unknown vehicle security
vulnerabilities trigger a race among adversaries to exploit the weaknesses and
security experts to mitigate the vulnerability. In this study, we identified
opportunities for adversaries to take control of the in-vehicle network, which
can compromise the safety, privacy, reliability, efficiency, and security of
the transportation system. This study contributes in three ways to the
literature of ITS security and resiliency. First, we aggregate individual risks
that are associated with hacking the in-vehicle network to determine
system-level risk. Second, we employ a risk-based model to conduct a
qualitative vulnerability-oriented risk assessment. Third, we identify the
consequences of hacking the in-vehicle network through a risk-based approach,
using an impact-likelihood matrix. The qualitative assessment communicates risk
outcomes for policy analysis. The outcome of this study would be of interest
and usefulness to policymakers and engineers concerned with the potential
vulnerabilities of the critical infrastructures.Comment: 9 pages, 1 table, 3 figure
Intelligent Processing in Vehicular Ad hoc Networks: a Survey
The intelligent Processing technique is more and more attractive to
researchers due to its ability to deal with key problems in Vehicular Ad hoc
networks. However, several problems in applying intelligent processing
technologies in VANETs remain open. The existing applications are
comprehensively reviewed and discussed, and classified into different
categories in this paper. Their strategies, advantages/disadvantages, and
performances are elaborated. By generalizing different tactics in various
applications related to different scenarios of VANETs and evaluating their
performances, several promising directions for future research have been
suggested.Comment: 11pages, 5 figure
Millimeter Wave Vehicular Communication to Support Massive Automotive Sensing
As driving becomes more automated, vehicles are being equipped with more
sensors generating even higher data rates. Radars (RAdio Detection and Ranging)
are used for object detection, visual cameras as virtual mirrors, and LIDARs
(LIght Detection and Ranging) for generating high resolution depth associated
range maps, all to enhance the safety and efficiency of driving. Connected
vehicles can use wireless communication to exchange sensor data, allowing them
to enlarge their sensing range and improve automated driving functions.
Unfortunately, conventional technologies, such as dedicated short-range
communication (DSRC) and 4G cellular communication, do not support the
gigabit-per-second data rates that would be required for raw sensor data
exchange between vehicles. This paper makes the case that millimeter wave
(mmWave) communication is the only viable approach for high bandwidth connected
vehicles. The motivations and challenges associated with using mmWave for
vehicle-to-vehicle and vehicle-to-infrastructure applications are highlighted.
A high-level solution to one key challenge - the overhead of mmWave beam
training - is proposed. The critical feature of this solution is to leverage
information derived from the sensors or DSRC as side information for the mmWave
communication link configuration. Examples and simulation results show that the
beam alignment overhead can be reduced by using position information obtained
from DSRC.Comment: 7 pages, 5 figures, 1 table, submitted to IEEE Communications
Magazin
A Survey on High-Speed Railway Communications: A Radio Resource Management Perspective
High-speed railway (HSR) communications will become a key feature supported
by intelligent transportation communication systems. The increasing demand for
HSR communications leads to significant attention on the study of radio
resource management (RRM), which enables efficient resource utilization and
improved system performance. RRM design is a challenging problem due to
heterogenous quality of service (QoS) requirements and dynamic characteristics
of HSR wireless communications. The objective of this paper is to provide an
overview on the key issues that arise in the RRM design for HSR wireless
communications. A detailed description of HSR communication systems is first
presented, followed by an introduction on HSR channel models and
characteristics, which are vital to the cross-layer RRM design. Then we provide
a literature survey on state-of-the-art RRM schemes for HSR wireless
communications, with an in-depth discussion on various RRM aspects including
admission control, mobility management, power control and resource allocation.
Finally, this paper outlines the current challenges and open issues in the area
of RRM design for HSR wireless communications.Comment: 40 pages, 10 figures. Submitted to Computer Communication
Intelligent Physical Layer Security Approach for V2X Communication
Intelligent transportation systems (ITS) with advanced sensing and computing
technologies are expected to support a whole new set of services including
pedestrian and vehicular safety, internet access for vehicles, and eventually,
driverless cars. Wireless communication is a major driving factor behind ITS,
enabling reliable communication between vehicles, infrastructure, pedestrians
and network, generally referred to as vehicle to everything (V2X)
communication. However, the broadcast nature of wireless communication renders
it prone to jamming, eavesdropping and spoofing attacks which can adversely
affect ITS. Keeping in view this issue, we suggest the use of an intelligent
security framework for V2X communication security, referred to as intelligent
V2X security (IV2XS), to provide a reliable and robust solution capable of
adapting to different conditions, scenarios and user requirements. We also
identify the conditions that impact the security and describe the open
challenges in achieving a realistic IV2XS system
Machine Learning for Vehicular Networks
The emerging vehicular networks are expected to make everyday vehicular
operation safer, greener, and more efficient, and pave the path to autonomous
driving in the advent of the fifth generation (5G) cellular system. Machine
learning, as a major branch of artificial intelligence, has been recently
applied to wireless networks to provide a data-driven approach to solve
traditionally challenging problems. In this article, we review recent advances
in applying machine learning in vehicular networks and attempt to bring more
attention to this emerging area. After a brief overview of the major concept of
machine learning, we present some application examples of machine learning in
solving problems arising in vehicular networks. We finally discuss and
highlight several open issues that warrant further research.Comment: Accepted by IEEE Vehicular Technology Magazin
A Survey on Software-Defined VANETs: Benefits, Challenges, and Future Directions
The evolving of Fifth Generation (5G) networks isbecoming more readily
available as a major driver of the growthof new applications and business
models. Vehicular Ad hocNetworks (VANETs) and Software Defined Networking
(SDN)represent the key enablers of 5G technology with the developmentof next
generation intelligent vehicular networks and applica-tions. In recent years,
researchers have focused on the integrationof SDN and VANET, and look at
different topics related to thearchitecture, the benefits of software-defined
VANET servicesand the new functionalities to adapt them. However, securityand
robustness of the complete architecture is still questionableand have been
largely negleted. Moreover, the deployment andintegration of novel entities and
several architectural componentsdrive new security threats and
vulnerabilities.In this paper, first we survey the state-of-the-art SDN
basedVehicular ad-hoc Network (SDVN) architectures for their net-working
infrastructure design, functionalities, benefits, and chal-lenges. Then we
discuss these SDVN architectures against majorsecurity threats that violate the
key security services such asavailability, confidentiality, authentication, and
data integrity.We also propose different countermeasures to these
threats.Finally, we discuss the lessons learned with the directions offuture
research work towards provisioning stringent security andprivacy solutions in
future SDVN architectures. To the best of ourknowledge, this is the first
comprehensive work that presents sucha survey and analysis on SDVNs in the era
of future generationnetworks (e.g., 5G, and Information centric networking)
andapplications (e.g., intelligent transportation system, and IoT-enabled
advertising in VANETs).Comment: 17 pages, 2 figure
Cyber-physical Control of Road Freight Transport
Freight transportation is of outmost importance for our society and is
continuously increasing. At the same time, transporting goods on roads accounts
for about 26% of all energy consumption and 18% of all greenhouse gas emissions
in the European Union. Despite the influence the transportation system has on
our energy consumption and the environment, road transportation is mainly done
by individual long-haulage trucks with no real-time coordination or global
optimization. In this paper, we review how modern information and communication
technology supports a cyber-physical transportation system architecture with an
integrated logistic system coordinating fleets of trucks traveling together in
vehicle platoons. From the reduced air drag, platooning trucks traveling close
together can save about 10% of their fuel consumption. Utilizing road grade
information and vehicle-to-vehicle communication, a safe and fuel-optimized
cooperative look-ahead control strategy is implemented on top of the existing
cruise controller. By optimizing the interaction between vehicles and platoons
of vehicles, it is shown that significant improvements can be achieved. An
integrated transport planning and vehicle routing in the fleet management
system allows both small and large fleet owners to benefit from the
collaboration. A realistic case study with 200 heavy-duty vehicles performing
transportation tasks in Sweden is described. Simulations show overall fuel
savings at more than 5% thanks to coordinated platoon planning. It is also
illustrated how well the proposed cooperative look-ahead controller for
heavy-duty vehicle platoons manages to optimize the velocity profiles of the
vehicles over a hilly segment of the considered road network
Beyond the Dolev-Yao Model: Realistic Application-Specific Attacker Models for Applications Using Vehicular Communication
In recent time, the standards for Vehicular Ad-hoc Networks (VANETs) and
Intelligent Transportation Systems (ITSs) matured and scientific and industry
interest is high especially as autonomous driving gets a lot of media
attention. Autonomous driving and other assistance systems for cars make heavy
use of VANETs to exchange information.They may provide more comfort, security
and safety for drivers. However, it is of crucial importance for the user's
trust in these assistance systems that they could not be influenced by
malicious users. VANETs are likely attack vectors for such malicious users,
hence application-specific security requirements must be considered during the
design of applications using VANETs. In literature, many attacks on vehicular
communication have been described but attacks on specific vehicular networking
applications are often missing. This paper fills in this gap by describing
standardized vehicular networking applications, defining and extending previous
attacker models, and using the resulting new models to characterize the
possible attackers interested in the specific vehicular networking application.
The attacker models presented in this paper hopefully provide great benefit for
the scientific community and industry as they allow to compare security
evaluations of different works, characterize attackers, their intentions and
help to plan application-specific security controls for vehicular networking
applications.Comment: The Tenth International Conference on Emerging Security Information,
Systems and Technologies - SECURWARE 2016, Nice, France, 201
- …