scispace - formally typeset
Search or ask a question

Showing papers on "Vehicular communication systems published in 2018"


Journal ArticleDOI
TL;DR: The proposed model, expressed by the space correlation functions, provides a novel and practical approach to investigate UAV-MIMO channels and design vehicular communication systems.
Abstract: We propose a 3-D elliptic-cylinder unmanned aerial vehicle (UAV) multiple-input-multiple-output (MIMO) channel model for air-to-ground communication environments. The mobility and altitude of UAV transmitters in the elevation plane are studied based on the proposed UAV-MIMO channel model. Furthermore, ground surface and roadside environment reflections are considered to investigate the statistical properties of the proposed UAV-MIMO channel model. Finally, numerical results show that the proposed channel statistics are consistent with previous results for communication channels. Overall, the proposed model, expressed by the space correlation functions, provides a novel and practical approach to investigate UAV-MIMO channels and design vehicular communication systems.

74 citations


Journal ArticleDOI
TL;DR: An SDN-enabled social-aware clustering algorithm in the 5G-VANET system is presented, which exploits a social pattern (i.e., vehicles’ future routes) prediction model in order to enhance the stability of clusters and performs better in terms of cluster lifetime and clustering overhead compared with traditional clustering algorithms.
Abstract: Nowadays, vehicular applications for traffic safety, traffic efficiency, and entertainment have put forward higher requirements to vehicular communication systems. The fifth-generation (5G) cellular networks are potential to provide high-capacity low-latency communications for vehicles in highly mobile environments. In addition, the IEEE 802.11p-based dedicated short-range communication technology is proposed to form vehicular ad hoc networks (VANETs). Integrating cluster-based VANETs with 5G cellular networks is beneficial for saving scarce spectrum resources, preventing network congestion, and reducing packet loss. However, it is a challenging problem to find an effective clustering algorithm that has high stability adapting to dynamic VANETs. Considering the advantages of software-defined networking (SDN), in this paper, we present an SDN-enabled social-aware clustering algorithm in the 5G-VANET system, which exploits a social pattern (i.e., vehicles’ future routes) prediction model in order to enhance the stability of clusters. Each vehicle’s movement is modeled as a discrete time-homogeneous semi-Markov model, where the state transition probability and sojourn time probability distribution are inputs and each vehicle’s social pattern is output. The predicted social patterns are subsequently used to create clusters so that vehicles in the same cluster tend to share the same routes. Cluster heads are selected based on the metrics of inter-vehicle distance, relative speed, and vehicle attributes. We evaluate our algorithm and the results show that it performs better in terms of cluster lifetime and clustering overhead compared with traditional clustering algorithms.

74 citations


Journal ArticleDOI
TL;DR: An overview on wireless technologies and potential challenges to provide vehicle-to-x connectivity; such as the connected vehicles or self-driving cars, that will be the first robots that have a direct effect on the daily lives of millions of people are presented.
Abstract: With the rapid advance of the intelligent transportation system (ITS), the vehicular networks have a potential importance. Currently, these networks are suffering a major challenge due to the widespread demand for services associated with shipping safer, more efficient, cheaper, infotainment, and more sustainable. Researchers and companies are working to generate novel applications. Intelligent Transportation Systems that aim to reorganize the operation of vehicles. With the need for technological convergence in communications, it is necessary to refer of vehicular heterogeneous, autonomous, flexible and programmable networks. New emerging technologies open up interesting gaps for research and development of future networks. In this paper, we present an overview on wireless technologies and potential challenges to provide vehicle-to-x connectivity; such as the connected vehicles or self-driving cars, that will be the first robots that have a direct effect on the daily lives of millions of people. Particularly, we examine the 5G architecture designed with Software Defined Networking and their role in Heterogeneous Networks.

57 citations


Proceedings ArticleDOI
03 May 2018
TL;DR: An enhanced architectural solution is suggested that could help to guarantee system operation without interference and more physical security in V2V, and focuses on countering the challenges of control systems with more emphasis on security.
Abstract: Vehicle-to-vehicle (V2V) communication is an inter vehicle communication paradigm not yet widely diploid and standardized. The main feature of V2V is that it does not rely on third party networks like cellular networks to communicate. Its ad hoc communication spans up to 1000 m with 360° view of nearby vehicles. Despite the wide range of benefit that V2V offers, it still faces a number of challenges in deployment. Due to high rating by operators of V2V capabilities to solve road traffic critical safety, increase interest in this technology. This student research paper explores technologies, benefits, and challenges of V2V with solutions. It focuses on countering the challenges of control systems with more emphasis on security. In this context, the technology poses security issues with interference. Thus an enhanced architectural solution is suggested that could help to guarantee system operation without interference and more physical security. A standardized space on road vehicle should be created specifically for V2V components and system status application should be added. In this regard V2V is a vehicular ad hoc network designed for automobiles to talk to each other automatically, using a wireless ad hoc network.

56 citations


Journal ArticleDOI
TL;DR: SECMACE facilitates multi-domain operations in the VC systems and enhances user privacy, notably preventing linking pseudonyms based on timing information and offering increased protection even against honest-but-curious VPKI entities.
Abstract: Several years of academic and industrial research efforts have converged to a common understanding on fundamental security building blocks for the upcoming vehicular communication (VC) systems. There is a growing consensus toward deploying a special-purpose identity and credential management infrastructure, i.e., a vehicular public-key infrastructure (VPKI), enabling pseudonymous authentication, with standardization efforts toward that direction. In spite of the progress made by standardization bodies (IEEE 1609.2 and ETSI) and harmonization efforts [Car2Car Communication Consortium (C2C-CC)], significant questions remain unanswered toward deploying a VPKI. Deep understanding of the VPKI, a central building block of secure and privacy-preserving VC systems, is still lacking. This paper contributes to the closing of this gap. We present SECMACE, a VPKI system, which is compatible with the IEEE 1609.2 and ETSI standards specifications. We provide a detailed description of our state-of-the-art VPKI that improves upon existing proposals in terms of security and privacy protection, and efficiency. SECMACE facilitates multi-domain operations in the VC systems and enhances user privacy, notably preventing linking pseudonyms based on timing information and offering increased protection even against honest-but-curious VPKI entities. We propose multiple policies for the vehicle–VPKI interactions and two large-scale mobility trace data sets, based on which we evaluate the full-blown implementation of SECMACE. With very little attention on the VPKI performance thus far, our results reveal that modest computing resources can support a large area of vehicles with very few delays and the most promising policy in terms of privacy protection can be supported with moderate overhead.

55 citations


Journal ArticleDOI
TL;DR: A brief review of most significant position based unicast routing protocols designed for vehicle to vehicle communications in the urban environment and their working features for exchanging information between vehicular nodes is presented.
Abstract: Vehicular Ad-hoc Networks (VANETs) have been gaining significant attention from the research community due to their increasing importance for building an intelligent transportation system. The characteristics of VANETs, such as high mobility, network partitioning, intermittent connectivity and obstacles in city environments, make routing a challenging task. Due to these characteristics of VANETs, the performance of a routing protocol is degraded. The position-based routing is considered to be the most significant approach in VANETs. In this paper, we present a brief review of most significant position based unicast routing protocols designed for vehicle to vehicle communications in the urban environment. We provide them with their working features for exchanging information between vehicular nodes. We describe their pros and cons. This study also provides a comparison of the vehicle to vehicle communication based routing protocols. The comparative study is based on some significant factors such as mobility, traffic density, forwarding techniques and method of junction selection mechanism, and strategy used to handle a local optimum situation. It also provides the simulation based study of existing dynamic junction selection routing protocols and a static junction selection routing protocol. It provides a profound insight into the routing techniques suggested in this area and the most valuable solutions to advance VANETs. More importantly, it can be used as a source of references to other researchers in finding literature that is relevant to routing in VANETs.

52 citations


Journal ArticleDOI
TL;DR: A system architecture to enable the road-side unit assisted data scheduling via vehicle-to-infrastructure communication and a clustering mechanism based on the design of a time division policy and the derivation of the optimal cluster length are presented.
Abstract: Efficient data dissemination is critical for enabling emerging applications in vehicular ad hoc networks. As a typical traffic scenario, the bidirectional road scenario of highways bring unique challenges on well exploiting the benefit of vehicle-to-vehicle (V2V) communication for data sharing among vehicles driving in opposite directions. This paper is dedicated to investigating the characteristics of data services in such a scenario and exploring new opportunities for enhancing overall system performance. Specifically, we present a system architecture to enable the road-side unit assisted data scheduling via vehicle-to-infrastructure communication. Then, we give a theoretical analysis on the opportunity of successful data sharing among vehicles driving in opposite directions based on the analysis of signal-to-interference-noise-ratio of V2V communication. On this basis, we propose a clustering mechanism based on the design of a time division policy and the derivation of the optimal cluster length. In addition, a cluster association strategy is designed to enable vehicles to dynamically join or leave a cluster based on their real-time velocities. Furthermore, a two-phase backoff mechanism is designed for distributed data sharing based on V2V communication, and a cooperative scheduling algorithm is proposed for selecting sender vehicles as well as the corresponding data items for broadcasting. Finally, we build the simulation model and give a comprehensive simulation study, which demonstrates that the proposed solutions can effectively improve the overall system performance.

52 citations


Journal ArticleDOI
TL;DR: This paper proposes a cloud-based security and privacy-aware information dissemination environment between vehicular nodes and cloud infrastructure, and takes on ciphertext policy attribute-based encryption (CP-ABE) to implement the access control systems and effective access policies for both cloud and VANETs.

46 citations


Proceedings ArticleDOI
01 Dec 2018
TL;DR: The proposed model is to provide a data-driven approach in solving the security challenges in dynamic networks by modeling trust as a classification process and the extraction of relevant features using a hybrid model like Bayesian Neural Network that combines deep learning with probabilistic modeling for intelligent decision and effective generalization in trust computation of honest and dishonest nodes in the network.
Abstract: Vehicular Ad hoc Networks (VANETs) provide effective vehicular operation for safety as well as greener and more efficient communication of vehicles in the Dedicated Short Range Communication (DRSC). The dynamic nature of the vehicular network topology has posed many security challenges for effective communication among vehicles. Consequently, models have been applied in the literature to checkmate the security issues in the vehicular networks. Existing models lack flexibility and sufficient functionality in capturing the dynamic behaviors of malicious nodes in the highly volatile vehicular communication systems. Given that existing models have failed to meet up with the challenges involved in vehicular network topology, it has become imperative to adopt complementary measures to tackle the security issues in the system. The approach of trust model with respect to Machine/Deep Learning (ML/DL) is proposed in the paper due to the gap in the area of network security by the existing models. The proposed model is to provide a data-driven approach in solving the security challenges in dynamic networks. This model goes beyond the existing works conceptually by modeling trust as a classification process and the extraction of relevant features using a hybrid model like Bayesian Neural Network that combines deep learning with probabilistic modeling for intelligent decision and effective generalization in trust computation of honest and dishonest nodes in the network.

39 citations


Journal ArticleDOI
TL;DR: An overview of the system architecture is given and the communication, signal processing, and decision-making sub-systems are described in detail to demonstrate the system’s performance and operation according to the rules and requirements of the competition.
Abstract: In this paper, we present the cooperative driving system developed by the Chalmers car team for the grand cooperative driving challenge 2016. This paper gives an overview of the system architecture and describes in detail the communication, signal processing, and decision-making sub-systems. Experimental results demonstrate the system’s performance and operation according to the rules and requirements of the competition.

38 citations


Journal ArticleDOI
TL;DR: The results show that the proposed method is capable of correctly identifying various traffic situations and how the trust index is used while manoeuvring in a platoon merge scenario.
Abstract: Vehicle-to-vehicle communication is a key technology for achieving increased perception for automated vehicles, where the communication enables virtual sensing by means of sensors in other vehicles. In addition, this technology also allows detection and recognition of objects that are out-of-sight. This paper presents a trust system that allows a cooperative and automated vehicle to make more reliable and safe decisions. The system evaluates the current situation and generates a trust index indicating the level of trust in the environment, the ego vehicle, and the surrounding vehicles. This research goes beyond secure communication and concerns the verification of the received data on a system level. The results show that the proposed method is capable of correctly identifying various traffic situations and how the trust index is used while manoeuvring in a platoon merge scenario.

Journal ArticleDOI
TL;DR: This paper designs a causality detector to determine whether the information received from distant vehicles is relevant to the motion of the receiving vehicle, and designs a link-length estimator to identify the number of vehicles between the broadcasting vehicle and the receiving vehicles, which is required for appropriately incorporating the received data into the vehicle control system.
Abstract: In this paper, we investigate the identification of the configuration and the dynamics of connected vehicle systems, where wireless vehicle-to-vehicle communication is used to access the motion data of vehicles that are beyond the line of sight. In particular, we first construct a causality detector to determine whether the information received from distant vehicles is relevant to the motion of the receiving vehicle. Then, we design a link-length estimator to identify the number of vehicles between the broadcasting vehicle and the receiving vehicle, which is required for appropriately incorporating the received data into the vehicle control system. Finally, a dynamics identifier is proposed to approximate the nonlinear time-delayed dynamics of vehicle chains, which is needed for the controller design to achieve desired system-level performance. The presented analytical results are validated through numerical simulations using synthetic data and on-road experiments.

Journal ArticleDOI
01 Apr 2018
TL;DR: The results showed that the proposed overtaking safety algorithm effectively provided a warning according to environmental change and the driver’s intention, which assisted the driver to overtake and avoid the occurrence of accidents, which improved the safety performance of the vehicle.
Abstract: Because of the complexity and variability of an intelligent vehicle’s driving environment, it is difficult for the application of the vehicular sensors to meet the needs of the surrounding environment information entirely. Vehicle-to-vehicle (V2V) communication technology is used by target vehicles to exchange information, and obtain the driving condition and driving intention of the front driver. To obtain environmental information outside the range of vehicular sensors in advance, in this paper, a vehicle overtaking assistance system is proposed based on V2V communication. The data, including the speed, position, direction angle and steering angle obtained using V2V communication, were preliminarily processed. Then, combined with an overtaking safety distance model, the vehicle parameters, driver’s driving intention and vehicle status information were entered into an overtaking security assistance system to determine the overtaking conditions. Fuzzy theory was used to control the parameters of the overtaking safety distance model. Finally, the overtaking safety assistance system was established and the proposed algorithm was tested using PreScan/MATLAB cooperative simulation software. The results showed that the proposed overtaking safety algorithm effectively provided a warning according to environmental change and the driver’s intention, which assisted the driver to overtake and avoid the occurrence of accidents, which improved the safety performance of the vehicle.

Journal ArticleDOI
TL;DR: A hybrid beamforming algorithm is proposed in the mmWave communication subsystem, which can overcome the shortage of the analog-only beamforming and reduce the beam search time, and the cell discovery time is improved significantly.
Abstract: In millimeter wave (mmWave) communications, the feature of relatively large signal absorption and directional transmission render new challenges for wireless communications and signal processing. To further improve the performance of mmWave communications, a novel radar-aided mmWave communication (RAMC) approach is proposed, which can be used in vehicular communications. There are two parts in the proposed RAMC system, including the radar subsystem and the mmWave communication subsystem. In the radar subsystem, the bistatic co-prime multi-input and multi-output (MIMO) arrays are considered. With the radar antenna arrays, both the directions of departure (DoD) and the directions of arrival (DoA) are estimated. Additionally, the compressed sensing (CS)-based method is proposed to obtain the target positions. Using the estimated angle and position information, the channel estimation and feedback link of the mmWave communication subsystem can be eliminated. Moreover, a hybrid beamforming algorithm is proposed in the mmWave communication subsystem, which can overcome the shortage of the analog-only beamforming. Simulation results show that the better estimation performance can be achieved by the bistatic co-prime MIMO arrays than that by the traditional uniform linear arrays (ULA), and with the radar aided, the mmWave communication subsystem can reduce the beam search time, and the cell discovery time is improved significantly.

Proceedings ArticleDOI
01 Jan 2018
TL;DR: This paper presents a discussion of current V2X communications cyber security issues and standardisation approaches being considered by standardisation bodies such as the ISO, the ITU, the IEEE, and the ETSI.
Abstract: Significant developments have taken place over the past few years in the area of vehicular communication systems in the ITS environment. It is vital that, in these environments, security is considered in design and implementation since compromised vulnerabilities in one vehicle can be propagated to other vehicles, especially given that V2X communication is through an ad-hoc type network. Recently, many standardisation organisations have been working on creating international standards related to vehicular communication security and the so-called Internet of Vehicles (IoV). This paper presents a discussion of current V2X communications cyber security issues and standardisation approaches being considered by standardisation bodies such as the ISO, the ITU, the IEEE, and the ETSI.

Proceedings ArticleDOI
29 Mar 2018
TL;DR: A new idea of a vehicle to vehicle (v2v) connection using the internet, adding to the existing IoT connected vehicles solution could ensure data transfers between to vehicles as they come in range hereby sharing real time road information as well as ensuring a safer and better driving condition for everyone.
Abstract: The world has witnessed ideas which practically changed the way, one lived on the basis of everyday technology. The interconnection between the things and making and making the system smart is one of them. Vehicles connected to the internet could be a level up in this game. This paper showcases a new idea of a vehicle to vehicle (v2v) connection using the internet, adding to the existing IoT connected vehicles solution. This system could ensure data transfers between to vehicles as they come in range hereby sharing real time road information as well as ensuring a safer and better driving condition for everyone. The communication through IoT has been developed using LabVIEW simulation.

Proceedings ArticleDOI
01 Aug 2018
TL;DR: This contribution studies the performance of the two named technologies in a real-world road traffic scenario through comprehensive simulations and proves that both technologies work stable at moderate road traffic conditions but have significant differences in the quantified communication parameters.
Abstract: In recent years, two candidates for vehicular communications have evolved for the support of road safety and traffic efficiency applications. On the one hand, ad-hoc networks exist based on the ITS-G5/802.11p protocol stack, and on the other hand, there are cellular network infrastructures based on an extended LTE stack, which we refer to as Cellular-based Vehicular Communication Systems (Cellular-VCS). The most important extension of the classical LTE stack is a direct link among vehicles which is also called Device-to-Device (D2D) communication. Both approaches meet the requirements on vehicular communications but show technology-inherent mechanisms that result in different performances. ITS-G5 features a small latency at a small network load whereas Cellular-VCS promises a highly reliable packet transmission. One of the main difference of both approaches lies in the channel access which is random-based for ITS-G5 and centrally scheduled for Cellular-VCS. This contribution studies the performance of the two named technologies in a real-world road traffic scenario through comprehensive simulations. The simulation scenario makes use of real road traffic density measurements for modeling the mobility of the vehicles. Mixed network data traffic of periodically and event-based messages is generated through particular generation rules. The results prove that both technologies work stable at moderate road traffic conditions but have significant differences in the quantified communication parameters.

Journal ArticleDOI
TL;DR: This work designs a distributed mutual exclusion algorithm that does not rely on broadcast, which introduces communication overheads; instead, the algorithm use point-to-point messages sent between the vehicles to keep network traffic load lower.
Abstract: As vehicular networking has recently been developed and commercialized, vehicular cloud computing has received much attention in various research areas, such as intelligent transportation systems and vehicular ad hoc networks. An efficient intersection traffic control using vehicular cloud computing is one of the key research topics in intelligent transportation systems. To efficiently deal with intersection traffic control via vehicle-to-vehicle communications, we design a distributed mutual exclusion algorithm that does not rely on broadcast, which introduces communication overheads; instead, our algorithm use point-to-point messages sent between the vehicles to keep network traffic load lower. In our algorithmic design, to pass an intersection, the lead vehicle on a lane must get permissions from a subset of other vehicles and its following vehicles on the same lane can follow the lead vehicle without permissions unlike the previous research. To evaluate the performance of our distributed mutual exclusion algorithm, we conduct extensive experiments. The results show that our algorithmic design is both effective and efficient.

Proceedings ArticleDOI
01 Sep 2018
TL;DR: This paper points out several security concerns toward Vehicular Ad hoc Network (VANET) system, vehicle to vehicle and vehicle to infrastructure communication.
Abstract: In the near future, drivers will be supported with an intelligent traffic system everywhere by the early warning signals. Moreover, this system can help to minimize vehicle collisions; increase the safe road; decrease the fatal injury for the pedestrians, passengers, and drivers; and inter-vehicle communication. These are some benefits of vehicle to vehicle communication (V2V). With the development of this technology, these vehicles can communicate together and with infrastructure or Road Side Units (RSU). In this article, the authors explored the basic concepts and the benefits of vehicle to vehicle communication. Furthermore, this paper points out several security concerns toward Vehicular Ad hoc Network (VANET) system, vehicle to vehicle and vehicle to infrastructure communication.

Journal ArticleDOI
TL;DR: The obtained results show that the ADAS Adaptive Cruise Control requires combination with V2V communication in order to increase safety, especially in certain scenarios with side and rear-end collisions.
Abstract: In recent years, significant attention has been paid to the implementation of cooperative driving by means of the integration of Advanced Driver Assistance Systems (ADAS) and Vehicle-to-Vehicle (V2V) communication, which has led to a wide range of applications with the potential to enhance road safety and prevent traffic accidents Prior to the implementation of these systems in vehicles, comprehensive analysis through exhaustive and realistic simulations is vital Accordingly, this paper presents the effects on road safety of a variety of penetration rates of vehicles equipped with ADAS and V2V, either separately or combined, using the simulation platforms Scene Suite and Simulation of Urban Mobility (SUMO) A total of six simulation scenarios were developed, three for intersections and three for urban cases The obtained results show that the ADAS Adaptive Cruise Control (ACC) requires combination with V2V communication in order to increase safety, especially in certain scenarios with side and rear-end collisions However, V2V alone at the lowest penetration rate already provided a level of safety similar to the one reached by combining it with ADAS-ACC

Proceedings ArticleDOI
01 Dec 2018
TL;DR: By introducing fictive vehicles, traffic flow variations can be smoothed and privacy protection can be enhanced up to 76%, which greatly improves privacy protection in situations with inherently low traffic density, e.g., suburban areas, and during low traffic periods.
Abstract: In vehicular communication systems, cooperative awareness messages provide contextual information required for transportation safety and efficiency applications. However, without the appropriate design, these messages introduce a new attack vector to compromise passenger privacy. The use of ephemeral credentials – pseudonyms – was therefore proposed, essentially to split a journey into unlinkable segments. To protect segment transitions, encrypted mix-zones provide regions where vehicles can covertly change their pseudonyms. While previous work focused on the placement, shape, and protocols for mix-zones, attacks that correlate vehicles entering and existing these zones still remain a problem. Furthermore, existing schemes have only considered homogeneous traffic, disregarding variations in vehicle density due to differences in driver population, road layout, and time of day. Without realistic experimental results, any conclusion on real-world applicability is precarious. In this paper, we address this challenge and present a novel scheme that works independent of vehicles’ mobility patterns. More precisely, our system generates fictive chaff vehicles when needed and broadcasts their traces, while it remains unobtrusive if sufficiently many vehicles are present. This greatly improves privacy protection in situations with inherently low traffic density, e.g., suburban areas, and during low traffic periods. Our scheme ensure that an external attacker cannot distinguish between real and chaff vehicles, while legitimate vehicles can recognize chaff messages; this is important, because chaff vehicles (and messages) must not affect the operation of safety applications. In our evaluation, we compare our chaff-based approach with an existing cryptographic mix-zone scheme. Our results under realistic traffic conditions show that by introducing fictive vehicles, traffic flow variations can be smoothed and privacy protection can be enhanced up to 76%.

Journal ArticleDOI
TL;DR: In this paper, the authors proposed a cooperative adaptive cruise control (CACC) to regulate the longitudinal motion of connected and automated vehicles (CAVs) in mixed traffic that is composed of human-driven vehicles and CAVs.
Abstract: This study is focused on the design of cooperative adaptive cruise control (CACC) to regulate the longitudinal motion of connected and automated vehicles (CAVs) in mixed traffic that is composed of human-driven vehicles and CAVs. Wireless vehicle-to-vehicle communication is exploited to monitor the motion of multiple broadcasting vehicles, and a strategy is designed to determine whether the received data of other vehicles are incorporated into CACC. A condition is derived for choosing control gains that ensure the internal stability of CAVs in the presence of time delays and switching connectivity topologies of information flow. Moreover, because the switching connectivity topologies may change the dynamics of the whole vehicle chain, the authors apply a data-driven approach for online optimisation of control gains such that CACC adapts to the variations of connectivity topologies. The proposed selective CACC is validated through numerical simulations. To enhance the fidelity of simulations, they use the data collected through on-road experiments to simulate the motion of human-driven vehicles and apply the physics-based vehicle dynamic model to simulate the motion of CAVs. Simulation results demonstrate the advantages of the proposed selective CACC in improving vehicle safety and in mitigating perturbations in mixed traffic.

Journal ArticleDOI
TL;DR: An obstacle-based radio propagation model that considers the effect caused due to the presence of obstructing vehicle in line of sight and is efficient considering varied speed and density is presented.
Abstract: Developing a secure and smart intelligent transport system for both safety and non-safety application services requires a certain guarantee of network performance, especially in terms of throughput...

Journal ArticleDOI
TL;DR: The experimental results confirmed that the proposed cooperative VLC architecture is suitable for the intended applications.
Abstract: The use of visible light communication (VLC) in vehicular communication systems for vehicle safety applications is proposed. The system aims to ensure the communication between a LED-based VLC emitter and an on-vehicle VLC receiver. A traffic scenario is established. Vehicle-to-vehicle (V2V) and infrastructure-to-vehicle (I2V) communications are analyzed. For the V2V communication study, the emitter was developed based on the vehicle headlights, whereas for the study of I2V communication system, the emitter was built based on streetlights. The VLC receiver is based on amorphous SiC technology and enhances the conditioning of the signal enabling to decode the transmitted information. Receivers are located at the rooftop of the vehicle, for I2V communications, and at the tails for V2V reception. Clusters of emitters, in a square topology, are used in the I2V transmission. The information and the ID code of each emitter in the network are sent simultaneously by modulating the individual chips of the trichromatic white LED. Free space is the transmission medium. An on–off code is used to transmit data. An algorithm to decode the information at the receivers is set. The proposed system was tested. The experimental results confirmed that the proposed cooperative VLC architecture is suitable for the intended applications.

Journal ArticleDOI
TL;DR: A novel scalable traveling route selection algorithm determining the route according to a traveling time and available throughput of both cellular and vehicular networks that is able to offload cellular network and time spent without required quality of connection can be reduced.
Abstract: Increasing demands of mobile users on communication and new types of devices, such as sensors, machines, and vehicles, impose high load on cellular networks. Since requirements are expected to rise in a near future, new ways for cellular network offloading are needed. A promising solution for vehicles and vehicular users is to offload data to vehicular networks. To maximize offloading of the cellular networks, the vehicles can be navigated through areas characterized with more available communication capacity. Hence, we propose a novel scalable traveling route selection algorithm determining the route according to a traveling time and available throughput of both cellular and vehicular networks. While the maximum tolerated traveling time is defined by the vehicular users, an estimation of available throughput is based on a vehicular movement prediction. The proposed route selection algorithm is able to offload cellular network by up to 17% and time spent without required quality of connection can be reduced by 65%. At the same time, the traveling time is prolonged only negligibly in comparison with state-of-the-art algorithms.

Proceedings ArticleDOI
20 May 2018
TL;DR: Theoretical and simulation results demonstrate the validity and effectiveness of the proposed technique and show that high secrecy throughput can be achieved when compared to directional array transmission techniques.
Abstract: This paper presents a low-complexity physical layer security technique for millimeter wave (mmWave) vehicular communication systems. The proposed technique exploits the large dimensional antenna arrays available in mmWave systems and the road reflected path to generate location dependent transmission. This results in coherent transmission to the legitimate receiver and interference that jams eavesdroppers with sensitive receivers along the same lane of travel. Theoretical and simulation results demonstrate the validity and effectiveness of the proposed technique and show that high secrecy throughput can be achieved when compared to directional array transmission techniques.

Proceedings ArticleDOI
01 Dec 2018
TL;DR: The data set created and the measurements taken for considered parameters presented in this paper are first of their kinds and would be helpful in future research works in the relevant area.
Abstract: This paper present: (i) an experimental study for performance evaluation of IEEE 802.11p vehicular communications and (ii) creation of dataset for IEEE 802.11p vehicular communications, while transmitting Basic Safety Messages. Two relevant metrics Latency and Received Signal Strength Indicator have been used for both performance evaluation and creation of dataset. However, the dataset also contains other information like position of the vehicle, packet receiving time, transmitting power etc., while transmitting each such packet. The physical experiments were performed using IEEE 802.11p compliant communication devices. The conducted experiments disclosed many important insights related to the performance of IEEE 802.11p. To the best of knowledge, the data set created and the measurements taken for considered parameters presented in this paper are first of their kinds. These results and dataset would be helpful in future research works in the relevant area.

Book ChapterDOI
01 Jan 2018
TL;DR: This chapter describes techniques and a protocol that can be used to perform data dissemination and transmit a data route in a vehicular network to allow that information to reach its destination.
Abstract: Intervehicle communication has spurred an increase in the application of intelligent transportation systems. The related services and applications use vehicles to sense a particular region of a city or even monitor traffic conditions in a given urban area. These applications use the communication between vehicles to disseminate information and propagate data quickly and efficiently. Thus, the dissemination of data in a vehicle network becomes an important tool because certain regional content or information may be relevant to a certain set of vehicles. However, due to variations in road density, the high mobility of vehicles, the short time of vehicle residence, and frequent changes in network topology, the development of an efficient routing or data dissemination protocol for this type of network poses a challenge. This chapter describes techniques and a protocol that can be used to perform data dissemination and transmit a data route in a vehicular network to allow that information to reach its destination.

Proceedings ArticleDOI
03 Jun 2018
TL;DR: This paper uses the concept of queuing theory in order to conduct the performance bound analysis of bumblebee-inspired distributed optimization operation in vehicle-to-vehicle (V2V) environments and establishes the maximum switching costs associated with urban and highway environment.
Abstract: The bumblebee has recently been proposed as a model to optimize channel allocation in connected vehicle networks where the quality of each channel varies unpredictably over time and space. A fundamental mathematical challenge that must be overcome before implementing the bumblebee model is determining the theoretical upper bound of spectrum optimization that can be achieved under such stochastic channel conditions. In this paper, we leverage the concept of queuing theory in order to conduct the performance bound analysis of bumblebee-inspired distributed optimization operation in vehicle-to-vehicle (V2V) environments. We initially established the maximum switching costs associated with urban and highway environment, and then used GEMV 2 and SUMO to compute the performance bounds for several metrics in a time-variant urban environment, including Pm (the probability of all channels being busy) and mean response time. We discuss the implications of these results for future development of bumblebee-inspired vehicular communication systems.

Posted Content
TL;DR: Different conventional and artificial intelligence based interference mitigation and resource allocation schemes developed in D2D enabled heterogeneous networks are surveyed and the strengths of AI based techniques are determined and open research challenges deduced from the recent research are presented.
Abstract: 5th generation networks are envisioned to provide seamless and ubiquitous connection to 1000-fold more devices and is believed to provide ultra-low latency and higher data rates up to tens of Gbps. Different technologies enabling these requirements are being developed including mmWave communications, Massive MIMO and beamforming, Device to Device (D2D) communications and Heterogeneous Networks. D2D communication is a promising technology to enable applications requiring high bandwidth such as online streaming and online gaming etc. It can also provide ultra- low latencies required for applications like vehicle to vehicle communication for autonomous driving. D2D communication can provide higher data rates with high energy efficiency and spectral efficiency compared to conventional communication. The performance benefits of D2D communication can be best achieved when D2D users reuses the spectrum being utilized by the conventional cellular users. This spectrum sharing in a multi-tier heterogeneous network will introduce complex interference among D2D users and cellular users which needs to be resolved. Motivated by limited number of surveys for interference mitigation and resource allocation in D2D enabled heterogeneous networks, we have surveyed different conventional and artificial intelligence based interference mitigation and resource allocation schemes developed in recent years. Our contribution lies in the analysis of conventional interference mitigation techniques and their shortcomings. Finally, the strengths of AI based techniques are determined and open research challenges deduced from the recent research are presented.