1,218 research outputs found
Toward a Standard-Compliant Implementation for Consensus Algorithms in Vehicular Networks
Cooperative Intelligent Transport System (C-ITS) applications require a continuous exchange of information between road users and roadside infrastructures. In this regard, distributed consensus algorithms can play an essential role in the definition of the information exchange rules between an ITS station and its neighbors. Although the consensus approach for networked systems is well-established, the efficiency of consensus methods under real-world vehicular communication constraints is largely unknown. This paper provides an ITS standard-compliant framework for analysis of consensus algorithms in vehicular networks with an emphasis on the role of robustness to changes in network topology in highly dynamic and dense environments. Our simulations reveal that in regular traffic conditions, the implemented consensus algorithm is able to achieve good performances in terms of both convergence time and needed consensus iterations. However, numerical results demonstrate that under dense and high-mobility traffic conditions the frequent exchange of large amounts of range information increases the Channel Busy Ratio (CBR) of the vehicular network and reduces the effectiveness of the algorithm as well
LiDAR aided simulation pipeline for wireless communication in vehicular traffic scenarios
Abstract. Integrated Sensing and Communication (ISAC) is a modern technology under development for Sixth Generation (6G) systems. This thesis focuses on creating a simulation pipeline for dynamic vehicular traffic scenarios and a novel approach to reducing wireless communication overhead with a Light Detection and Ranging (LiDAR) based system. The simulation pipeline can be used to generate data sets for numerous problems. Additionally, the developed error model for vehicle detection algorithms can be used to identify LiDAR performance with respect to different parameters like LiDAR height, range, and laser point density. LiDAR behavior on traffic environment is provided as part of the results in this study. A periodic beam index map is developed by capturing antenna azimuth and elevation angles, which denote maximum Reference Signal Receive Power (RSRP) for a simulated receiver grid on the road and classifying areas using Support Vector Machine (SVM) algorithm to reduce the number of Synchronization Signal Blocks (SSBs) that are needed to be sent in Vehicle to Infrastructure (V2I) communication. This approach effectively reduces the wireless communication overhead in V2I communication
The “Wireless Sensor Networks for City-Wide Ambient Intelligence (WISE-WAI)” Project
This paper gives a detailed technical overview of some of the activities carried out in the context of the “Wireless Sensor networks for city-Wide Ambient Intelligence (WISE-WAI)” project, funded by the Cassa di Risparmio di Padova e Rovigo Foundation, Italy. The main aim of the project is to demonstrate the feasibility of large-scale wireless sensor network deployments, whereby tiny objects integrating one or more environmental sensors (humidity, temperature, light intensity), a microcontroller and a wireless transceiver are deployed over a large area, which in this case involves the buildings of the Department of Information Engineering at the University of Padova. We will describe how the network is organized to provide full-scale automated functions, and which services and applications it is configured to provide. These applications include long-term environmental monitoring, alarm event detection and propagation, single-sensor interrogation, localization and tracking of objects, assisted navigation, as well as fast data dissemination services to be used, e.g., to rapidly re-program all sensors over-the-air. The organization of such a large testbed requires notable efforts in terms of communication protocols and strategies, whose design must pursue scalability, energy efficiency (while sensors are connected through USB cables for logging and debugging purposes, most of them will be battery-operated), as well as the capability to support applications with diverse requirements. These efforts, the description of a subset of the results obtained so far, and of the final objectives to be met are the scope of the present paper
Fabric-GC: A Blockchain-based Gantt Chart System for Cross-organizational Project Management
Large-scale production is always associated with more and more development
and interaction among peers, and many fields achieve higher economic benefits
through project cooperation. However, project managers in the traditional
centralized approach cannot rearrange their activities to cross-organizational
project management. Thanks to its characteristics, the Blockchain can represent
a valid solution to the problems mentioned above. In this article, we propose
Fabric-GC, a Blockchain-based Gantt chart system. Fabric-GC enables to realize
secure and effective cross-organizational cooperation for project management,
providing access control to multiple parties for project visualization.
Compared with other solutions, the proposed system is versatile, as it can be
applied to project management in different fields and achieve effective and
agile scheduling. Experimental results show that Fabric-GC achieves stable
performance in large-scale request and processing distributed environments,
where the data synchronization speed of the consortium chain reached four times
faster than a public chain, achieving faster data consistency
Sl-EDGE: Network Slicing at the Edge
Network slicing of multi-access edge computing (MEC) resources is expected to
be a pivotal technology to the success of 5G networks and beyond. The key
challenge that sets MEC slicing apart from traditional resource allocation
problems is that edge nodes depend on tightly-intertwined and
strictly-constrained networking, computation and storage resources. Therefore,
instantiating MEC slices without incurring in resource over-provisioning is
hardly addressable with existing slicing algorithms. The main innovation of
this paper is Sl-EDGE, a unified MEC slicing framework that allows network
operators to instantiate heterogeneous slice services (e.g., video streaming,
caching, 5G network access) on edge devices. We first describe the architecture
and operations of Sl-EDGE, and then show that the problem of optimally
instantiating joint network-MEC slices is NP-hard. Thus, we propose
near-optimal algorithms that leverage key similarities among edge nodes and
resource virtualization to instantiate heterogeneous slices 7.5x faster and
within 0.25 of the optimum. We first assess the performance of our algorithms
through extensive numerical analysis, and show that Sl-EDGE instantiates slices
6x more efficiently then state-of-the-art MEC slicing algorithms. Furthermore,
experimental results on a 24-radio testbed with 9 smartphones demonstrate that
Sl-EDGE provides at once highly-efficient slicing of joint LTE connectivity,
video streaming over WiFi, and ffmpeg video transcoding
Cryptography Engine Design for IEEE 1609.2 WAVE Secure Vehicle Communication using FPGA
Department Of Electrical EngineeringIn this paper, we implement the IEEE 1609.2 secure vehicle communication (VC) standard using FPGA by fast and efficient ways. Nowadays, smart vehicle get nearer to our everyday life. Therefore, design of safety smart vehicle is critical issue in this field. For this reason, secure VC is must implemented into the smart vehicle to support safety service. However, secure process in VC has significant overhead to communication between objectives. Because of this overhead, if circumjacent vehicles are increased, communication overhead of VC is exponentially increased along the number of adjacent vehicles.
To remove this kind of overhead, we design fast and efficient IEEE 1609.2 cryptography engine using FPGA. This engine consists of AES-CCM encryption, SHA-256 hash function, Hash_DRBG random bit generator, and ECDSA digital signature algorithm and each algorithm is analyzed carefully and optimized with specific technics.
For the AES-CCM, we optimized AES encryption engine. First, we use 32-bit S-box structure to remove 8-bit operation of AES. Second, we employ the key save register file architecture to reduce frequently key expansion operation when input of key value is always same for AES encryption engine. Third, to protect external attacks, we use internal register files to save processed data. Finally, we design parallel architecture for both CBC-MAC and counter in AES-CCM algorithm.
SHA-256 hash function is frequently used in ECDSA algorithm that is significant reason of optimization. So, we use parallel architecture for the preprocessing block and the hash computation block. And, we design latest schedule block to reduce usage of register and combinational logics.
In ECDSA, Hash-DRBG is used to generate key value and signature for vehicle message. To make Hash-DRBG, we use our SHA-256 design much fast generation of random value.
ECDSA is most critical and complex module in our cryptography engine. For this module, we use affine representation of elliptic curve in ECDSA. So, we can replace the prime arithmetic operation by right shift operation and bit operation. And, we implement scalar multiplier to optimize arithmetic operation of ECDSA. This kind of replacement is hardware kindly, so we can reduce complexity of ECDSA hardware design.
To implement all of algorithm in IEEE 1609.2 standard, we use Xilinx Virtex-5 FPGA chip with ISE 14.6 synthesis tool and Verilog-HDL.ope
- …