Presentation is loading. Please wait.

Presentation is loading. Please wait.

Inter Vehicle Communication

Similar presentations


Presentation on theme: "Inter Vehicle Communication"— Presentation transcript:

1 Inter Vehicle Communication
Akhil Parekh Manan Shah

2 Outlook Introduction Motivation Overview of Smart Vehicle Architecture
Types of Communication Radio Bands Protocols Classes of Information and Information Parameters Types of IVC Threats, Challenges and Attacks Security Architecture Applications Real Time Examples Conclusions

3 Introduction What is Inter Vehicle Communication?
Communication among drivers and vehicles in Intelligent Transportation Systems (ITS) Communication conducted between onboard information equipment IVC enables the service of exchange and distribution of data

4 Motivation Study shows - “About 60% roadway collisions could be avoided if the operator of the vehicle was provided warning at least one-half second prior to a collision” (- US. Patent No. 5,613,039) Approximately 40,000 people are killed each year on the European Union’s roads, with around 1.7 million people incurring critical injuries. The annual costs associated with traffic accidents total nearly 3 percent of the world’s gross domestic product (GDP), or roughly US$1 trillion. Number of vehicles is increasing faster than the number of roads, leading to frequent traffic jams. Constraints of human drivers’ perception Line-of-sight limitation of brake light Large processing/forwarding delay for emergency events.

5 Statistics Cars Trucks (class 7, 8) On-road population 231 million
Annual New Vehicle Sales 16 million 260, 000 Annual VMT 8,400 63,000 Total Fatalities 37,446 4,390 Total Injuries 2,672,000 116,000 Estimated Total cost of crashes $188 billion $30 billion

6 Overview of Smart Vehicle

7 Terms EDR – Forward radar- Positioning System- Computing platform-
used in vehicles to register all important parameters such as velocity, acceleration, etc. especially during abnormal situations, such as accidents This data is used for reconstruction. Forward radar- Used to detect any forward obstacles as far as 200 meters Positioning System- Used to locate vehicles Accuracy can be improved by knowledge of road topology Computing platform- Inputs from various components is used to generate useful information

8 Pictorial View

9 Flowchart of IVC

10 Architecture

11 Key Components On-board Equipment (OBE): human machine interface
vehicle interfaces, (to on-board networks) Applications, memory and processing positioning, (GPS and dead-reckoning system) communications functions (radio, antenna, etc) Roadside Equipment (RSE): access “nodes” positioned along highways, at traffic intersections and other locations includes a DSRC radio, GPS, processor, and router to send messages back through the IVC Network Network: The IVC Network interconnects the road-side RSEs, network services, and the network end-users

12 General View The Vehicle as a part of the Network
Vehicle to Infrastructure to Vehicle Communication Center for Information Processing Vehicle to Vehicle Communication

13 Types of Communication
Vehicle to Vehicle Communication – It demonstrates properties of both peer-to-peer network and mobile ad-hoc network. In Peer-to-peer systems participants rely on another for service rather than solely relying on a dedicated and centralized infrastructure A mobile ad hoc network is a collection of mobile hosts with wireless communication capabilities forming temporary network. Vehicle to Infrastructure Communication – Information is available from roadside sources uses 63 GHz band Ex- Electronic Toll Collection (ETC) allows for electronic payment of highway tolls communication is traditionally via microwave or infrared techniques, more recently through GPS technology an electronic monetary transaction occurs between a vehicle passing through a toll station and the toll agency

14 Radio Bands Communicating vehicles can use both infrared and radio waves Radio waves include VHF, micro, and millimeter waves Bluetooth operates at 2.4 GHz , and is reliable up to a speed of 80 km/h and range of 80meters. It can take up to 3 seconds to establish the communication. requires a master and slave setup alternative to Bluetooth is a new radio frequency technique called UWB main advantages of UWB technology are its high data rate, low cost, etc.

15 Technologies Broadcasting Technologies: Short Range: Long Range:
I2V: RDS/TMC, DAB, DVB, DVB-H, S-DMB, T-DMB Short Range: I2V: DSRC V2V: DSRC, UWB/SRR Long Range: V2I/I2V: GSM, GPRS/EDGE, UMTS, Wi-Fi, WiMAX V2V: GSM, GPRS/EDGE, UMTS, Wi-Fi In-Vehicle Systems: Bluetooth, Zigbee

16 Protocols Medium Access Control (MAC) in IVC
An ad-hoc network between vehicles is better suited for vehicle communications than centralized service. Centralized architecture is not very efficient Wireless connectivity between moving vehicles can be provided by existing compliant devices. Data rates of up to 54 Mbps can be achieved with a hardware. Robust MAC scheme is needed so that channel is shared efficiently between mobile nodes. Types- DMAC and ASDM

17 Protocols (Cont’d) Directional MAC
Ad-hoc network uses Omni-directional antennas (less spatial coverage) Directional antennas can be used to improve network performance by improving spatial reuse of channel DMAC uses physical layer’s directional transmission capabilities It tells the neighbors to delay their transmissions if it is going to harm pending transmission Helps to avoid hidden terminal and deafness problems RTS is send in circular way when node is ready to transmit Circular RTS consist of RTS-CTS-DATA-ACK

18 Adaptive Space Division Multiplexing
Security and scalability are the major issues in wireless communication Need of protocol to scale well as the available bandwidth shrinks ASDM breaks the roadway up into cells and contains a mapping function that maps the cell to time slots Assignment rule - determines a time slot for each vehicle ASDM ensures QoS by maintaining adequate distance between vehicles Vehicle keeps its frequency of transmission constant by maintaining a certain following distance.

19 Data Packet Format Network ID: To filter a packet from other network
Destination: Destination ID Source: Source ID Type/Seq: Type of packet/Number of sequence Size: Size of the whole packet Data: Actual data to transfer CRC: 16-bit CRC to check the validity of the packet

20 Active Collision Warning /Avoidance System
By continuing with the passive safety technologies, it will be difficult to reduce crash costs Thus people have started developing active safety features in order to reduce costs The introduction of automotive collision warning/ avoidance systems represents the next significant leap in vehicle safety technology Automotive collision warning systems try to warn drivers of an impending collision event. Allowing driver little bit extra time to react If the collision warning systems are built in conjunction with drive by wire technology, then the system could try to automatically maneuver the vehicle in order to avoid an impending collision

21 Contd… An Object Vehicle and its Restricted Boundary Around a Subject Vehicle

22

23

24 Parameter to Detect an Impending Collision

25 Vehicles Parameter There are two types of parameters: Static and Dynamic Static Parameters: The static parameter indicates the size of the vehicle and the location of its GPS receiver within itself. Dynamic Parameters: The dynamic parameters are vehicle’s position (Xn,Yn), speed acceleration, direction and the status of the brakes, steering wheel, gas paddle, turn signal etc.

26 Contd…. The static parameters are to be exchanged only once, when two vehicles first form a network But, the dynamic parameters are to be continuously exchanged after certain interval of time The successful operation of a Collision Warning/Avoidance system depends on how accurately the vehicle’s parameters can be measured All parameters, except the vehicle’s position and direction can be measured with a very high accuracy

27 Classes of Information
Movement Related – speed, velocity, acceleration, etc Traffic Related – number of vehicles, traffic volume, density, congestion Passenger Related – weather related information,

28 Movement Related Wireless Technology
Technologies Used:- Magnetic Nails Magnetic Tape Live wires Radar for imaging Car to car communication Infrastructure to car communication

29 Traffic Related Wireless Technology
Infrastructure Based:- Adjusting traffic flow Operation on individual vehicle Vehicle Based:- Automated Collection Providing Warnings

30 Passenger Related Wireless Technology
Providing Information to passengers Weather Traffic General News Interaction with passengers Web access Routing, food/hotel/fuel inquiries Access to special services.

31 Types of IVC

32 Stop And Go Adaptive Cruise Control
Taking over automatic braking and driving when vehicles are in traffic jam

33 Co-operative Driving Co-operative driving exchanges respective data such as position velocity etc

34 Hazard Warning includes obstacle warning, stopped vehicle warning and slowing down warning

35 Merging and Lane Changing Warning
Safe and smooth lane change and merging with communication

36 Inter/Intra Platoon Communication
Ad-hoc communication between vehicles

37 Mobile Ad-hoc Network MANET is an autonomous system composed of mobile nodes which communicates with each other in wireless environment where there is no infrastructure support Every mobile node is self organized and relies on the other nodes to forward information IVC networks are regarded as new type of MANET systems One of the key characteristics is the mobility of mobile node which produces dynamic topology than wired networks

38 Challenges in IVC Liability Vs Privacy:- Accountability and liability of the vehicles is required and context specific information such as coordinates, time intervals should be possible to extract but such requirements raise privacy concerns Real Time Communication:- Driver assistance applications are time sensitive therefore security protocols should impose low processing overhead Vehicular Network Scale:- With roughly billion vehicles, the design of a facility that provides cryptographic keys is big challenge

39 Vulnerabilities in IVC
In Transit Traffic Tempering:- Nodes acting as a relay can disrupt communication of other nodes Impersonation:- An attacker masquerading an emergency vehicle to mislead other vehicles

40 Jamming:- The Jammer deliberately generates interfering transmissions that prevents communication

41 Forgery:- Fast contamination of large portions of the vehicular network coverage area with false information

42 Privacy:-With Vehicular networks deployed, the collection of vehicle specific information from overhead vehicular communications will become particularly easy

43 Attacks on IVC Attack 1: Bogus Traffic Information
Traffic jam ahead

44 Attack 2:Disruption of Network Operation
SLOW DOWN The way is clear

45 Attack 3: Cheating with Identity, Position or Speed
I was not there!

46 Open Problems Data Verification:- can be achieved by data correlation mechanism but such mechanisms are in design stage Secure Routing:- In vehicular networking messages need to be delivered to specific areas for example:- in the case of traffic jam queue, this can be achieved by position based routing protocols but none of the solution is secure DoS Resillience:- DoS and jamming problems can not be completely solve by frequency hopping

47 Public Key Infrastructure
Security services Positioning Confidentiality Privacy Shared session key ... PKI CA P P A B

48 Security Architecture of IVC

49 Components of Security Architecture
Event Data Recorder:- The EDR will be responsible for recording the vehicles critical data such as position, time, speed etc. EDR will also record all the received safety messages Tamper Proof Device:- The TPD will store all the cryptographic materials and perform cryptographic operations like signing and verifying safety messages Vehicular Public Key Infrastructure:- In VPKI infrastructure Certificate Authorities will issue certified public/private key pairs to vehicles Authentication:- Vehicles will sign each message with their private key and attach corresponding certificate. Thus when another vehicle receives the message it verifies key used to sign the message and then it verifies the message. Privacy:- To conceal vehicles identity , set of anonymous keys that changes frequently can be used. This keys are preloaded into vehicles Tamper Proof Device for long duration

50 Application of IVC Information and Warning Functions:-
Dissemination of road information to vehicles distant from the subjected site Communication based longitudinal control:- Exploiting the look through capacity to avoid accidents, platooning vehicles etc. Co-operative Assistant Systems:- Coordinating vehicles at critical points Added Value Applications:- Internet Access, Location based services, Multiplayer games

51 Differences Between Different Standards

52 Real Time Applications
FleetNet:- The Internet on the road project was set up by six companies and three universities in order to promote the development of inter vehicular communication CarTALK:- Focused on developing new driver assistance systems which are based on inter vehicle communication for safe and comfortable driving Network On Wheels (NOW):- The main objectives of NOW are to solve technical key questions on the communication protocols and data security for car to car communication Advance Driver Assistant System In Europe (ADASE):- ADASE project has a mission to increase the road and traffic safety in Europe by avoiding collisions before they occur

53 FleetNet Objectives Key Features
To develop a communication platform for inter vehicle communication To implement demonstrator applications To develop promising introduction strategies Standardize the solution found Key Features Wireless multi hop ad hoc networking Allows for low cost data transmission Very low data transmission delay Extends the range of awareness Vehicles are addressed according to their position

54 FleetNet Applications
Co-operative Driver Assistance:- Emergency Notification Overtaking Assistance Obstacle Warning Decentralized floating car data:- Traffic jam monitor Dynamic Navigation User Communications:- Inter vehicle chat Mobile advertising

55 Standardization Is necessary so that vehicles from different car manufacturers can communicate with each other NEC which is Japanese technology company is the member of C2CC consortium and is working in close collaboration with BMW, Daimler Chrysler Objective – open industrial standard for internet vehicle communication with wireless components to ensure interoperability First product to be expected between 2009 to 2012

56 Conclusion Design of communication protocols in IVC is extremely challenging Protocols have potential to support many new innovative applications These technologies can greatly enhance the infotainment, safety, comfort, communication and convenience value of new vehicles. As vehicles become “smarter”, security and privacy gain importance

57 Questions Vehicle to Vehicle Communication –
What are two types of communication in IVC? Vehicle to Vehicle Communication – It demonstrates properties of both peer-to-peer network and mobile ad-hoc network. In Peer-to-peer systems participants rely on another for service rather than solely relying on a dedicated and centralized infrastructure A mobile ad hoc network is a collection of mobile hosts with wireless communication capabilities forming temporary network. Vehicle to Infrastructure Communication – Information is available from roadside sources uses 63 GHz band Ex- Electronic Toll Collection (ETC) allows for electronic payment of highway tolls communication is traditionally via microwave or infrared techniques, more recently through GPS technology an electronic monetary transaction occurs between a vehicle passing through a toll station and the toll agency

58 What are the challenges in IVC?
Liability Vs Privacy:- Accountability and liability of the vehicles is required and context specific information such as coordinates, time intervals should be possible to extract but such requirements raise privacy concerns Real Time Communication:- Driver assistance applications are time sensitive therefore security protocols should impose low processing overhead Vehicular Network Scale:- With roughly billion vehicles, the design of a facility that provides cryptographic keys is big challenge

59 What are the main Components in Security Architecture of IVC?
Event Data Recorder:- The EDR will be responsible for recording the vehicles critical data such as position, time, speed etc. EDR will also record all the received safety messages Tamper Proof Device:- The TPD will store all the cryptographic materials and perform cryptographic operations like signing and verifying safety messages Vehicular Public Key Infrastructure:- In VPKI infrastructure Certificate Authorities will issue certified public/private key pairs to vehicles

60 References

61 References


Download ppt "Inter Vehicle Communication"

Similar presentations


Ads by Google