scispace - formally typeset
Search or ask a question

Showing papers by "Hannes Hartenstein published in 2009"


Journal ArticleDOI
TL;DR: This paper proposes a distributed transmit power control method based on a strict fairness criterion, i.e., distributed fair power adjustment for vehicular environments (D-FPAV), to control the load of periodic messages on the channel and proves the fairness of the proposed approach.
Abstract: Direct radio-based vehicle-to-vehicle communication can help prevent accidents by providing accurate and up-to-date local status and hazard information to the driver. In this paper, we assume that two types of messages are used for traffic safety-related communication: 1) Periodic messages (ldquobeaconsrdquo) that are sent by all vehicles to inform their neighbors about their current status (i.e., position) and 2) event-driven messages that are sent whenever a hazard has been detected. In IEEE 802.11 distributed-coordination-function-based vehicular networks, interferences and packet collisions can lead to the failure of the reception of safety-critical information, in particular when the beaconing load leads to an almost-saturated channel, as it could easily happen in many critical vehicular traffic conditions. In this paper, we demonstrate the importance of transmit power control to avoid saturated channel conditions and ensure the best use of the channel for safety-related purposes. We propose a distributed transmit power control method based on a strict fairness criterion, i.e., distributed fair power adjustment for vehicular environments (D-FPAV), to control the load of periodic messages on the channel. The benefits are twofold: 1) The bandwidth is made available for higher priority data like dissemination of warnings, and 2) beacons from different vehicles are treated with ldquoequal rights,rdquo and therefore, the best possible reception under the available bandwidth constraints is ensured. We formally prove the fairness of the proposed approach. Then, we make use of the ns-2 simulator that was significantly enhanced by realistic highway mobility patterns, improved radio propagation, receiver models, and the IEEE 802.11p specifications to show the beneficial impact of D-FPAV for safety-related communications. We finally put forward a method, i.e., emergency message dissemination for vehicular environments (EMDV), for fast and effective multihop information dissemination of event-driven messages and show that EMDV benefits of the beaconing load control provided by D-FPAV with respect to both probability of reception and latency.

572 citations


Journal ArticleDOI
TL;DR: A hybrid simulation model is introduced that analytically represents the probability of packet reception in an IEEE 802.11p network based on four inputs: the distance between sender and receiver, transmission power, transmission rate, and vehicular traffic density.
Abstract: Today's advanced simulators facilitate thorough studies on VANETs but are hampered by the computational effort required to consider all of the important influencing factors. In particular, large-scale simulations involving thousands of communicating vehicles cannot be served in reasonable simulation times with typical network simulation frameworks. A solution to this challenge might be found in hybrid simulations that encapsulate parts of a discrete-event simulation in an analytical model while maintaining the simulation's credibility. In this paper, we introduce a hybrid simulation model that analytically represents the probability of packet reception in an IEEE 802.11p network based on four inputs: the distance between sender and receiver, transmission power, transmission rate, and vehicular traffic density. We also describe the process of building our model which utilizes a large set of simulation traces and is based on general linear least squares approximation techniques. The model is then validated via the comparison of simulation results with the model output. In addition, we present a transmission power control problem in order to show the model's suitability for solving parameter optimization problems, which are of fundamental importance to VANETs.

151 citations


Proceedings ArticleDOI
25 Sep 2009
TL;DR: This paper proposes an analytical model and performs a simulative comparison of single- and multi-hop beaconing to evaluate the impact of effects such as packet collisions and channel fading and shows that the possible savings of multi- hop beaconing are difficult to exploit under non-perfect channel conditions and suboptimal relaying decisions.
Abstract: Optimizing vehicular communication strategies is important for an efficient usage of the available wireless bandwidth and also critical for the success of VANETs. In this paper we address the fundamental and practical question whether the load on the wireless channel can be reduced if periodic beacon messages are transmitted over multiple hops with reduced transmit power instead of being transmitted over one hop with high transmit power. In particular, we look at the possible bandwidth savings that can be achieved by piggybacking forwarded messages into the own next beacon transmission. For that matter, we first propose an analytical model to compute a lower bound for the resulting channel load when single- or multi-hop dissemination of beacons is performed. In this model we assume optimal channel conditions and perfect relaying and piggybacking decisions to show that a reduction of the load by multi-hop is possible and closely related to piggybacking. Further, we show that the possible savings depend on the ratio between the size of the header and the payload of a beacon and that a reduction of the load is theoretically possible if the header is larger than the payload - what would be the case in VANETs if security overheads are considered part of the header. We then perform a simulative comparison of single- and multi-hop beaconing to evaluate the impact of effects such as packet collisions and channel fading. We show that the possible savings of multi-hop beaconing are difficult to exploit under non-perfect channel conditions and suboptimal relaying decisions.

105 citations



Book ChapterDOI
10 Jun 2009
TL;DR: A system model and corresponding metrics are proposed to evaluate different IAM system architectures on a quantitative basis and a simulation-based performance evaluation study is presented that shows the suitability of this system model.
Abstract: Identity and access management (IAM) systems are used to assure authorized access to services in distributed environments. The architecture of IAM systems, in particular the arrangement of the involved components, has significant impact on performance and scalability of the overall system. Furthermore, factors like robustness and even privacy that are not related to performance have to be considered. Hence, systematic engineering of IAM systems demands for criteria and metrics to differentiate architectural approaches. The rise of service-oriented architectures and cross-organizational integration efforts in federations will additionally increase the importance of appropriate IAM systems in the future. While previous work focused on qualitative evaluation criteria, we extend these criteria by metrics to gain quantitative measures. The contribution of this paper is twofold: i) We propose a system model and corresponding metrics to evaluate different IAM system architectures on a quantitative basis. ii) We present a simulation-based performance evaluation study that shows the suitability of this system model.

8 citations



Proceedings ArticleDOI
27 Feb 2009
TL;DR: This work describes the efforts to overcome this obstacle in a heterogeneous sensor network consisting out of MICAz Motes and Sun SPOTs, both using an IEEE 802.15.4 radio chip.
Abstract: In a global sensor network different sensor platforms will be deployed. A grave obstacle on the way of building sensor networks out of different sensor nodes are incompatible implementations of network protocol stacks used with different sensor node platforms. We describe our efforts to overcome this obstacle in a heterogeneous sensor network consisting out of MICAz Motes and Sun SPOTs, both using an IEEE 802.15.4 radio chip. We explain the major differences in the respective network stacks and our approach to bridge them. A network stack that bridges the gap between different platforms allows for more flexible and robust networks.