Sie sind auf Seite 1von 364

Automotive Informatics

and Communicative
Systems:
Principles in Vehicular
Networks and Data Exchange

Huaqun Guo
Institute for Infocomm Research, A*STAR, Singapore

Information science reference


Hershey • New York
Director of Editorial Content: Kristin Klinger
Senior Managing Editor: Jamie Snavely
Managing Editor: Jeff Ash
Assistant Managing Editor: Carole Coulson
Typesetter: Michael Brehm
Cover Design: Lisa Tosheff
Printed at: Yurchak Printing Inc.

Published in the United States of America by


Information Science Reference (an imprint of IGI Global)
701 E. Chocolate Avenue, Suite 200
Hershey PA 17033
Tel: 717-533-8845
Fax: 717-533-8661
E-mail: cust@igi-global.com
Web site: http://www.igi-global.com/reference

and in the United Kingdom by


Information Science Reference (an imprint of IGI Global)
3 Henrietta Street
Covent Garden
London WC2E 8LU
Tel: 44 20 7240 0856
Fax: 44 20 7379 0609
Web site: http://www.eurospanbookstore.com

Copyright © 2009 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in any form or by
any means, electronic or mechanical, including photocopying, without written permission from the publisher.
Product or company names used in this set are for identi.cation purposes only. Inclusion of the names of the products or companies does
not indicate a claim of ownership by IGI Global of the trademark or registered trademark.

Library of Congress Cataloging-in-Publication Data

Automotive informatics and communicative systems : principles in vehicular


networks and data exchange / Huaqun Guo, editor.
p. cm.
Includes bibliographical references and index.
Summary: "This book advances the understanding of management methods, information technology, and their joint application in business
processes"--Provided by publisher.
ISBN 978-1-60566-338-8 (hardcover) -- ISBN 978-1-60566-367-8 (ebook) 1. Automobile industry and trade--Management. 2.
Information technology. I. Guo, Huaqun, 1967- HD9710.A2A8725 2009 388.3'12--dc22

200805016

British Cataloguing in Publication Data


A Cataloguing in Publication record for this book is available from the British Library.

All work contributed to this book is new, previously-unpublished material. The views expressed in this book are those of the authors, but not
necessarily of the publisher.
Editorial Advisory Board
Lawrence Wai-Choong Wong, National University of Singapore, Singapore
Weihua Zhuang, University of Waterloo, Canada
Ozan K. Tonguz, Carnegie Mellon University, USA
Javier Ibañez-Guzmán, RENAULT S.A.S., France
Todd Hubing, Clemson University, USA
Nicholas F. Maxemchuk, Columbia University, USA
Farid Naït-Abdesselam, University of Sciences and Technologies of Lille, France
Yul Chu, University of Texas–Pan American, USA

List of Reviewers
Sohel Anwar, Indiana University Purdue University Indianapolis, USA
Raúl Aquino-Santos, Universidad de Colima, México
Teck Yoong Chai, Institute for Infocomm Research, A*STAR, Singapore
Yul Chu, University of Texas–Pan American, USA
Gavin Holland, HRL Laboratories, LLC., USA
Todd Hubing, Clemson University, USA
Javier Ibañez-Guzmán, RENAULT S.A., France
Tie Yan Li, Institute for Infocomm Research, A*STAR, Singapore
Nicholas F. Maxemchuk, Columbia University, USA
Farid Naït-Abdesselam, University of Sciences and Technologies of Lille, France
Lek Heng Ngoh, Institute for Infocomm Research, A*STAR, Singapore
Fabienne Nouvel, Laboratory IETR/INSA, France
Stephan Olariu, Old Dominion University, USA
Vasudha Ramnath, Institute for Infocomm Research, A*STAR, Singapore
Biplab Sikdar, Rensselaer Polytechnic Institute, USA
Joseph Chee Ming Teo, Institute for Infocomm Research, A*STAR, Singapore
Satish Ukkusuri, Rensselaer Polytechnic Institute, USA
Ziyuan Wang, University of Melbourne, Australia
Lawrence Wai-Choong Wong, National University of Singapore, Singapore
Yew Fai Wong, National University of Singapore, Singapore
Zonghua Zhang, National Institute of Information and Communication Technology, Japan
Weihua Zhuang, University of Waterloo, Canada
Table of Contents

Foreword..............................................................................................................................................xiii

Preface................................................................................................................................................... xv

Acknowledgment................................................................................................................................. xxi

Chapter I
Introduction: An Emerging Area of Vehicular Networks and Data Exchange........................................ 1
Huaqun Guo, Institute for Infocomm Research, A*STAR, Singapore

Chapter II
Drive by Wire Systems: Impact on Vehicle Safety and Performance.................................................... 12
Sohel Anwar, Indiana University-Purdue University Indianapolis, USA

Chapter III
Electromagnetic Compatibility Issues in Automotive Communications............................................... 48
Todd H. Hubing, Clemson University International Center for Automotive Research, USA

Chapter IV
Automotive Network Architecture for ECUs Communications............................................................ 69
Fabienne Nouvel, Laboratory IETR-UMR, INSA, France
Wilfried Gouret, Laboratory IETR-UMR, INSA, France
Patrice Mazério, Laboratory IETR-UMR, INSA, France
Ghais El Zein, Laboratory IETR-UMR, INSA, France

Chapter V
Enabling Secure Wireless Real-Time Vehicle Monitoring and Control................................................ 91
Lek Heng Ngoh, Institute for Infocomm Research, A*STAR, Singapore

Chapter VI
MAC and Routing Protocols for Vehicle to Vehicle Communications................................................ 105
Xiaobo Long, Rensselaer Polytechnic Institute, USA
Biplab Sikdar, Rensselaer Polytechnic Institute, USA
Chapter VII
Inter-Vehicular Communications Using Wireless Ad Hoc Networks.................................................. 120
Raúl Aquino-Santos, University of Colima, Mexico
Víctor Rangel-Licea, National Autonomous University of Mexico, Mexico
Miguel A. García-Ruiz, University of Colima, Mexico
Apolinar González-Potes, University of Colima, Mexico
Omar Álvarez-Cardenas, University of Colima, Mexico
Arthur Edwards-Block, University of Colima, Mexico
Margarita G. Mayoral-Baldivia, University of Colima, Mexico
Sara Sandoval-Carrillo, University of Colima, Mexico

Chapter VIII
The Role of Communications in Cyber-Physical Vehicle Applications.............................................. 139
Nicholas F. Maxemchuk, Columbia University, USA & IMDEA Networks, Spain
Patcharinee Tientrakool, Columbia University, USA
Theodore L. Willke, Columbia University, USA & Intel Corporation, USA

Chapter IX
Integrating Traffic Flow Features to Characterize the Interference in Vehicular Ad Hoc
Networks.............................................................................................................................................. 162
Lili Du, Purdue University, USA
Satish Ukkusuri, Rensselaer Polytechnic Institute, USA
Shivkumar Kalyanaraman, Rensselaer Polytechnic Institute, USA

Chapter X
Proactive Traffic Merging Strategies for Sensor-Enabled Cars........................................................... 180
Ziyuan Wang, University of Melbourne, Australia
Lars Kulik, University of Melbourne, Australia
Kotagiri Ramamohanarao, University of Melbourne, Australia

Chapter XI
The Localisation Problem in Cooperative Vehicle Applications......................................................... 200
Javier Ibañez-Guzmán, RENAULT S.A.S., France

Chapter XII
An Overview of Positioning and Data Fusion Techniques Applied to Land Vehicle
Navigation Systems............................................................................................................................. 219
Denis Gingras, Université de Sherbrooke, Canada

Chapter XIII
Efficient and Reliable Pseudonymous Authentication......................................................................... 247
Giorgio Calandriello, Politecnico di Torino, Italy
Antonio Lioy, Politecnico di Torino, Italy
Chapter XIV
Simulation of VANET Applications.................................................................................................... 264
Valentin Cristea, University Politehnica of Bucharest, Romania
Victor Gradinescu, University Politehnica of Bucharest, Romania
Cristian Gorgorin, University Politehnica of Bucharest, Romania
Raluca Diaconescu, University Politehnica of Bucharest, Romania
Liviu Iftode, Rutgers University, USA

Chapter XV
In-Vehicle Network Architecture for the Next-Generation Vehicles................................................... 283
Syed Masud Mahmud, Wayne State University, USA

Compilation of References ............................................................................................................... 303

About the Contributors .................................................................................................................... 330

Index.................................................................................................................................................... 338
Detailed Table of Contents

Foreword..............................................................................................................................................xiii

Preface................................................................................................................................................... xv

Acknowledgment................................................................................................................................. xxi

Chapter I
Introduction: An Emerging Area of Vehicular Networks and Data Exchange........................................ 1
Huaqun Guo, Institute for Infocomm Research, A*STAR, Singapore

This chapter gives an overview of this emerging area of vehicular networks, its potential applications,
its potential wireless technologies for data exchange, and its research activities in the Europe, the United
States (U.S.), Japan, and Singapore.

Chapter II
Drive by Wire Systems: Impact on Vehicle Safety and Performance.................................................... 12
Sohel Anwar, Indiana University-Purdue University Indianapolis, USA

An overview of the drive-by-wire technology is presented along with in-depth coverage of salient drive
by systems such as throttle-by-wire, brake-by-wire, and steer-by-wire systems, and hybrid-electric propul-
sion. A review of drive-by-wire system benefits in performance enhancements and vehicle active safety is
then discussed. This is followed by in-depth coverage of technological challenges that must be overcome
before drive-by-wire systems can be production ready. Current state of the art of possible solutions to
these technological hurdles is then discussed. Future trends in the drive-by-wire systems and economic
and commercialization aspects of these system are presented at the conclusion of the chapter.

Chapter III
Electromagnetic Compatibility Issues in Automotive Communications............................................... 48
Todd H. Hubing, Clemson University International Center for Automotive Research, USA
This chapter reviews automotive EMC requirements and discusses the design of automotive electron-
ics for EMC. The objective of the chapter is to provide non-EMC engineers and engineering managers
with basic information that will help them recognize the importance of designing for electromagnetic
compatibility, rather than addressing electronic noise problems as they arise.

Chapter IV
Automotive Network Architecture for ECUs Communications............................................................ 69
Fabienne Nouvel, Laboratory IETR-UMR, INSA, France
Wilfried Gouret, Laboratory IETR-UMR, INSA, France
Patrice Mazério, Laboratory IETR-UMR, INSA, France
Ghais El Zein, Laboratory IETR-UMR, INSA, France

This chapter introduces the most widely used automotive networks like LIN (Local Interconnect Net-
work), CAN (Controller Area Network), MOST (Media-Oriented Systems Transport), and FlexRay.
To fulfill the increasing demand of intra-vehicle communications, a new technique based on power
line communication (PLC) is then proposed. This allows the transmission of both power and messages
without functional barriers. On the other hand, there are several infotainment applications (like mobile
phones, laptop computers) pushing for the adoption of intra-vehicle wireless communications. Thus,
some potential wireless technologies used in the automotive domain, namely Bluetooth, IEEE 802.11
b/g wireless technology – WiFi, and Zigbee are covered here. Finally, the chapter highlights the chal-
lenges of these wired or wireless alternative solutions in automotive networks.

Chapter V
Enabling Secure Wireless Real-Time Vehicle Monitoring and Control................................................ 91
Lek Heng Ngoh, Institute for Infocomm Research, A*STAR, Singapore

In this chapter, the author extends the use of these embedded vehicular networks by proposing to remotely
monitor and control the vehicles through them, in order to realize safety and driver assistance related
applications. To accomplish this task, additional technologies such as real-time wireless communications
and data security are required, and each of them is introduced and described in this chapter.

Chapter VI
MAC and Routing Protocols for Vehicle to Vehicle Communications................................................ 105
Xiaobo Long, Rensselaer Polytechnic Institute, USA
Biplab Sikdar, Rensselaer Polytechnic Institute, USA

Numerous efforts are currently under progress to enhance the safety and efficiency of vehicular traffic
through intelligent transportation systems. In addition, the growing demand for access to data and infor-
mation from human users on the go has created the need for advanced vehicle-to-vehicle and vehicle-
to-roadside communication systems capable of high data rates and amenable to high degrees of node
mobility. Vehicular communications and networks are expected to be used for a number of purposes such
as for enabling mobile users to transfer data and information from other networks such as the Internet
and also for implementing services such as Intersection Decision Systems (IDS), Automated Highway
Systems (AHS), and Advanced Vehicle Safety Systems (AVS). In this chapter the authors describe me-
dium access control (MAC) and routing protocols for vehicular networks and the various factors that
affect their design and performance.

Chapter VII
Inter-Vehicular Communications Using Wireless Ad Hoc Networks.................................................. 120
Raúl Aquino-Santos, University of Colima, Mexico
Víctor Rangel-Licea, National Autonomous University of Mexico, Mexico
Miguel A. García-Ruiz, University of Colima, Mexico
Apolinar González-Potes, University of Colima, Mexico
Omar Álvarez-Cardenas, University of Colima, Mexico
Arthur Edwards-Block, University of Colima, Mexico
Margarita G. Mayoral-Baldivia, University of Colima, Mexico
Sara Sandoval-Carrillo, University of Colima, Mexico

This chapter proposes a new routing algorithm that allows communication in vehicular ad hoc networks.
In vehicular ad hoc networks, the transmitter node cannot determine the immediate future position of the
receiving node beforehand. Furthermore, rapid topological changes and limited bandwidth compound
the difficulties nodes experience when attempting to exchange position information.

Chapter VIII
The Role of Communications in Cyber-Physical Vehicle Applications.............................................. 139
Nicholas F. Maxemchuk, Columbia University, USA & IMDEA Networks, Spain
Patcharinee Tientrakool, Columbia University, USA
Theodore L. Willke, Columbia University, USA & Intel Corporation, USA

The authors describe applications that improve the operation of automobiles, control traffic lights, and
distribute the load on roadways. The requirements on the communications protocols that implement the ap-
plications are determined and a new communications paradigm, neighborcast, is described. Neighborcast
communicates between nearby entities, and is particularly well suited to transportation applications.

Chapter IX
Integrating Traffic Flow Features to Characterize the Interference in Vehicular Ad Hoc
Networks.............................................................................................................................................. 162
Lili Du, Purdue University, USA
Satish Ukkusuri, Rensselaer Polytechnic Institute, USA
Shivkumar Kalyanaraman, Rensselaer Polytechnic Institute, USA

The research in this chapter investigates several fundamental issues, such as the connectivity, the reach-
ability, the interference, and the capacity, with respect to information propagation in VANETs. The authors’
work is distinguished with previous efforts, since they incorporate the characteristics of traffic into these
issues in the communication layer of VANETs; this mainly address the issue of the interference. Previous
efforts to solve this problem only consider static network topologies. However, high node mobility and
dynamic traffic features make the interference problem in VANETs quite different.
Chapter X
Proactive Traffic Merging Strategies for Sensor-Enabled Cars........................................................... 180
Ziyuan Wang, University of Melbourne, Australia
Lars Kulik, University of Melbourne, Australia
Kotagiri Ramamohanarao, University of Melbourne, Australia

This chapter surveys traffic control strategies for optimizing traffic flow on highways, with a focus on
more adaptive and flexible strategies facilitated by current advancements in sensor-enabled cars and
vehicular ad hoc networks (VANETs). The authors investigate proactive merging strategies assuming
that sensor-enabled cars can detect the distance to neighboring cars and communicate their velocity and
acceleration among each other. Proactive merging strategies can significantly improve traffic flow by
increasing it up to 100% and reduce the overall travel delay by 30%.

Chapter XI
The Localisation Problem in Cooperative Vehicle Applications......................................................... 200
Javier Ibañez-Guzmán, RENAULT S.A.S., France

In this chapter, V2V and V2I applications are considered as a spatio-temporal problem. The tenet is that
sharing information can be made only if this is time stamped and related to a spatial description of the in-
formation sources. The chapter formulates the spatio-temporal problem having as constraint the precision
of the pose estimates of the vehicles involved. It regards the localisation problem and accuracy of digital
road maps as a combined issue that needs to be addressed for the successful deployment of cooperative
vehicle applications. Two case studies, intersection safely and an overtaking manoeuvre are included.
Recommendations on the precision limits of the vehicle pose estimations and the potential uncertainties
that need to be considered when designing V2V and V2I applications complete the chapter.

Chapter XII
An Overview of Positioning and Data Fusion Techniques Applied to Land Vehicle
Navigation Systems............................................................................................................................. 219
Denis Gingras, Université de Sherbrooke, Canada

In this chapter, the authors will review the problem of estimating in real-time the position of a vehicle
for use in land navigation systems. After describing the application context and giving a definition of the
problem, they will look at the mathematical framework and technologies involved to design positioning
systems. The authors will compare the performance of some of the most popular data fusion approaches
and provide some insights on their limitations and capabilities.

Chapter XIII
Efficient and Reliable Pseudonymous Authentication......................................................................... 247
Giorgio Calandriello, Politecnico di Torino, Italy
Antonio Lioy, Politecnico di Torino, Italy

Privacy, security, and reliability are key requirements in deploying vehicular ad-hoc networks (VANET).
Without those the VANET technology will not be suitable for market diffusion. In this chapter, the au-
thors are concerned with how to fulfill these requirements by using pseudonym-based authentication,
designing security schemes that do not endanger transport safety while maintaining low overhead. At
the same time the design improves the system usability by allowing nodes to self-generate their own
pseudonyms.

Chapter XIV
Simulation of VANET Applications.................................................................................................... 264
Valentin Cristea, University Politehnica of Bucharest, Romania
Victor Gradinescu, University Politehnica of Bucharest, Romania
Cristian Gorgorin, University Politehnica of Bucharest, Romania
Raluca Diaconescu, University Politehnica of Bucharest, Romania
Liviu Iftode, Rutgers University, USA

This chapter systematically presents actual issues regarding the simulation of VANET applications.
Some of them refer to challenges in developing VANET simulators. The chapter discusses simulator
architectures, models used for representing the communication among vehicles, vehicles mobility fea-
tures, and simulation tool implementation methods. A critical analysis of the solutions adopted in some
well-known actual simulators is also included.

Chapter XV
In-Vehicle Network Architecture for the Next-Generation Vehicles................................................... 283
Syed Masud Mahmud, Wayne State University, USA

This book chapter describes a number of ways using which the networks of future vehicles could be
designed and implemented in a cost-effective manner. The book chapter also shows how simulation
models can be developed to evaluate the performance of various types of in-vehicle network topologies
and select the most appropriate topology for given requirements and specifications.

Compilation of References ............................................................................................................... 303

About the Contributors .................................................................................................................... 330

Index.................................................................................................................................................... 338
xiii

Foreword

Huaqun Guo has introduced the emerging areas of vehicular networks in the forms of Intra-Vehicle, Vehicle-
to-Vehicle, and Vehicle-to-Infrastructure communications and edited this new book to reflect the advance
information technologies that shape the modern automobiles. These new technologies on automotive infor-
matics and communicative systems will enable a variety of applications for safety, traffic efficiency, driver
assistance, as well as infotainment to be incorporated into modern automobile designs.
Over the last century, the design, manufacture and operation of the automobile have grown into complex
system integration paradigms cutting across applications of traditional disciplines in physical sciences, en-
gineering, social and behavioral sciences and business. Today, this complexity is compounded and acceler-
ated by the advent of enabling technologies in advanced materials, sensing, actuation, computing, controls,
diagnostics, electronics and software, all amid myriad – and often conflicting – policy changes. This creates
new possibilities and challenges in simultaneously providing effective means of transportation - with a high
degree of driver and occupant safety - along with reduced energy use and environmental impact.
Informatics, telematics, electronics and communication systems play an ever increasing role in the ad-
vancement of the automobile and are critical from a number of perspectives. The advances that are most
easily noticed by a consumer are vehicle options such as infotainment systems, navigation systems, and con-
nectivity such as Bluetooth. However, other onboard systems such as active stability control, engine control,
and the several supporting in-vehicle communication networks and protocols are the real technologies that
are propelling the automobile into the 21st Century. Such systems are key elements in achieving the desired
operational characteristics of the vehicle such as performance, emissions, safety and fuel efficiency. To achieve
these ever more stringent desired characteristics in a cost effective manner, the amount of information and
processing that occurs on a typical vehicle is staggering. Most vehicles today have well over 50 processors
on board, and the number continues to grow. Indeed, electronics can account for over 40% of the vehicle’s
cost and this percentage will continue to grow.
Onboard systems are only part of the explosion of automotive informatics and commutations. Infrastruc-
ture -to-vehicle and vehicle-to-vehicle communicants are enabling a host of new frontiers related to safety,
traffic control and maintenance. Onboard navigation systems can now route an individual vehicle through
significant traffic jams or disruptions. However, in the near future, coordinated efforts between the traffic
infrastructure and multiple vehicles may distribute the traffic load to minimize congestion or the effects of
construction or a traffic accident. Furthermore, information from adjacent vehicles may be used to avoid
collisions. For example, vehicles that are rapidly decelerating on a highway might warn subsequent cars of
an impending “stopped traffic hazard.” From a maintenance perspective, connectivity has already enabled
the vehicle to communicate its health status and potential failures to service personnel. Such information is
not only critical to keep a vehicle functioning properly, but also enables fleet manufacturers to track potential
problems, and address them as rapidly as possible. Furthermore, this information can easily and rapidly be
utilized in improving next generation vehicles.
xiv

For both onboard systems and supporting infrastructure systems, the acceleration of technological change
is driving vehicle designers, manufacturers and consumers to rethink how the automobile is developed from
conceptualization to production to service to end of life. The rapidly changing electronics and informatics
sector has pushed vehicle system design and integration to a new level of agility. The consumer desires
state-of-the-art capabilities, and automobile producers no longer have several years to incorporate the latest
technology into their products. This is fostering a change in the way vehicles are designed and perceived.
Indeed, if one looks at the automobile, it is changing rapidly and the pace of change is ever increasing. The
car of today is vastly different from its predecessors of 30 or 40 years ago, and next generation vehicles will
continue to change dramatically driven by multiple issues of which many are related to informatics and com-
munication systems.
This book has provided fundamental principles, as well as practice, and new research/trend for vehicular
networks and advanced information technologies applied in the automotive area. First, this book presents the
impact of drive-by-wire systems on vehicle safety and performance, and electromagnetic compatibility issues
affecting automotive communications. It then introduces Intra-vehicle networks like LIN (Local Interconnect
Network), CAN (Controller Area Network), MOST (Media-Oriented Systems Transport), Flexray, power-
line communication, and so forth. It also describes in-vehicle network architecture for the next-generation
vehicles and elaborates the potential applications and related technical challenges in achieving secure remote
monitoring and control of vehicles via CAN.
Second, this book presents the technologies related to Vehicle-to-Vehicle, and Vehicle-to-Infrastructure
communications by describing the current medium access control (MAC) and routing protocols for vehicular
networks, and the role of communications in cyber-physical vehicle applications. Furthermore, it incorporates
the characteristics of traffic flow into the interference issue in the communication layer of VANETs (Vehicular
Ad Hoc Networks), and presents new research into proactive traffic merging algorithms and the potential
benefits of applying sensor-enabled cars. The book has also captured the state-of-the-art in the area of traffic
control with the assistance of VANETs, and reviewed the problem of estimating in real-time the position of
a vehicle for use in land navigation system.
Last but not least, privacy, security and reliability as key requirements in deploying VANETs are addressed,
as well as simulation architectures and simulation tools implementation methods with the aim to improve the
traffic safety and control. Through all chapters, this book has discussed the future trends for the automotive
informatics and communicative systems in each individual domain.
I highly recommend Dr. Guo’s timely book. I believe it will benefit many readers and be a good refer-
ence.

Thomas R. Kurfess
International Center for Automotive Research, Clemson University, USA

Thomas R. Kurfess received his SB, SM and PhD degrees in mechanical engineering from M.I.T. in 1986, 1987 and 1989,
respectively. He also received an SM degree from MIT in electrical engineering and computer science in 1988. Following graduation,
he joined Carnegie Mellon University where he rose to the rank of associate professor. In 1994 he moved to the Georgia Institute of
Technology where he rose to the rank of Professor in the George W. Woodruff School of Mechanical Engineering. In 2005 he was
named Professor and BMW Chair of Manufacturing in the Department of Mechanical Engineering at Clemson University. He is also
the Director of the Campbell Graduate Engineering Center at Clemson University’s International Center for Automotive Research.
He has served as a special consultant of the United Nations to the Government of Malaysia in the area of applied mechatronics and
manufacturing, and as a participating guest at the Lawrence Livermore National Laboratory in their Precision Engineering
Program. His research focuses on the design and development of advanced systems targeting the automotive sector (OEM
and supplier) including vehicle and production systems. He has signi.cant experience in high precision manufacturing and
metrology systems. He has received numerous awards including a National Science Foundation (NSF) Young Investigator
Award, an NSF Presidential Faculty Fellowship Award, the ASME Pi Tau Sigma Award, SME Young Manufacturing Engineer
of the Year Award, the ASME Blackall Machine Tool and Gage Award, the ASME Gustus L. Larson Award. He is a Fellow of
the SME and of the ASME.
xv

Preface

The automotive industry is undergoing a continuous transformation; vehicles are no longer thermo me-
chanical systems with some electronic components used to start engines and lighting. Today’s vehicles
are complex systems, with networks of computers controlling their most important functions. Increas-
ing fuel costs, as well as increasing awareness of vehicular pollution and noise affecting large human
agglomerations and unacceptable numbers of traffic accidents and road congestion are exerting much
pressure for change on the automotive industry. What kind of change is expected?
Within a short period, mobile communications have changed our lifestyles allowing us to exchange
information, almost anywhere at anytime. The introduction of such mobile communications systems
in motor vehicles should be therefore only a matter of time. This should bring a new paradigm, that of
sharing information amongst vehicles and infrastructure, and lead to numerous applications for safety,
traffic efficiency as well as infotainment.
The main purpose of this book is to provide an overview of the information and communications
technologies that are to be deployed in the new generations of vehicles – to provide valuable insights
into the technologies for vehicular networks and data exchange, from both theoretical and practical
perspectives. We hope that the contents can be used in graduate level courses as a reference and by the
automotive industry as training material. The book should provide a concise background and a good
foundation to students entering the field of automotive information and communications technologies.
We also hope that it would serve as a reference to researchers/scientists and practitioners by enabling
them to offer exciting and novel technologies and applications that would, in the future, transform our
land transportation systems.
Information technology is the driving force behind innovations in the automotive industry. In the
past years, control systems of cars have moved from the analog to the digital domain. In particular, x-
by-wire systems began to appear, and have driven research efforts of the whole automotive industry in
the last decade. Networked Electronic Control Units (ECUs) are increasingly being deployed in cars to
realize diverse functions such as engine management, air-bag deployment, and even in intelligent brake
systems. At the same time, emerging vehicular networks in the forms of intra-vehicle, vehicle-to-vehicle
and vehicle-to-infrastructure communications are fast becoming a reality. They will enable a variety of
applications for safety, traffic efficiency, driver assistance, as well as infotainment to be incorporated
into modern automobile designs.
This book introduces the advanced information technologies that shape the ultra-modern automo-
tive industry today. Contributions to this publication are made by professors, researchers, scientists
and practitioners throughout the world, bringing together their rich expertise and results of their cur-
rent endeavors. The authors have several years of expertise in their respective domains, and have good
publication records.
xvi

As can be seen from the table of contents, the book comprises of 15 chapters. It spreads across many
technical areas with car communications as the central theme. The first chapter is an introductory chap-
ter on the emerging area of vehicular networks in the forms of Intra-Vehicle (InV), Vehicle-to-Vehicle
(V2V), and Vehicle-to-Infrastructure (V2I) communications. Chapters II to III and a large part of Chapter
V cover the technologies related to InV networks. The rest of Chapter V and Chapters VI to XII present
the technologies related to V2V and V2I communications which will enable a variety of applications
for safety, traffic efficiency, driver assistance and infotainment. Privacy, security, and reliability as key
requirements in deploying VANETs (Vehicular Ad Hoc Networks) are addresses in Chapter XIII. Chapter
XIV discusses simulation architectures, models used for representing the communication among vehicles,
vehicle mobility features, and ways to implement simulation tools with the aim to improve traffic safety
and control. Chapter XV describes in-vehicle network architectures for the next-generation vehicles.
Chapter-wise details are presented bellow.
The introductory chapter presents the emerging area of vehicular networks in the forms of Intra-Ve-
hicle (InV), Vehicle-to-Vehicle (V2V), and Vehicle-to-Infrastructure (V2I) communications. This will
enable a variety of applications for safety, traffic efficiency, driver assistance, as well as infotainment, to
be incorporated into modern automotive designs. Critical data is being exchanged within a vehicle and
with outside the vehicle via vehicular networks. Thus, this chapter first introduces car communications,
potential vehicular applications and wireless technologies, as well as specially designed technologies
DSRC (Dedicated Short Range Communications) standards and communication stack for data exchange.
As the emerging area of vehicular networks is attracting widespread interest from research groups around
the world, this chapter next introduces the consortiums and initiatives working on advanced automotive
technologies in Europe, the United States, Japan, and Singapore. Finally, in the future trend, vehicular
networks still plays a vital role in enhancing the automotive industry for safety, security and entertain-
ment.
Chapter II presents the impact of drive by wire systems on vehicle safety and performance. An
overview of the drive-by-wire technology is presented along with in-depth coverage of salient drive by
systems such as throttle-by-wire, brake-by-wire, and steer-by-wire systems, and hybrid-electric propul-
sion. This is followed by in-depth coverage of technological challenges and the current state-of-the-art
solutions to these technological hurdles. For example, an analytical redundancy/model-based fault-
tolerant control can not only reduce the overall system cost by reducing the total number of redundant
components, but also further improve overall reliability of the system through the usage of a diverse
array of sensory information. Future trends in the drive-by-wire systems include various drive-by-wire
systems in the same vehicle sharing a diversity of sensors and actuators via data fusion methodologies,
integrated control of various drive by wire systems and future communication bus for x-by-wire systems,
for example FlexRay,
Chapter III provides a basic overview of the electromagnetic compatibility (EMC) issues affecting
automotive communications. As the number of electronic systems in automobiles rises, the potential
for electromagnetic interference increases. Designing for electromagnetic compatibility is important to
devote proper attention to electromagnetic compatibility at every stage of an automobile’s development.
Problems discovered late in the design cycle can seriously impact development schedules and product
cost. This chapter provides basic information of electromagnetic compatibility issues affecting automo-
tive communications for non-EMC engineers and engineering managers who work with automotive
networks.
Chapter IV introduces the most widely used automotive networks like LIN (Local Interconnect
Network), CAN (Controller Area Network), MOST (Media-Oriented Systems Transport), and FlexRay.
To fulfill the increasing demand of intra-vehicle communications, a new technique based on power
xvii

line communication (PLC) is then proposed. This allows the transmission of both power and messages
without functional barriers. On the other hand, there are several infotainment applications (like mobile
phones, laptop computers) pushing for the adoption of intra-vehicle wireless communications. Thus,
some potential wireless technologies used in the automotive domain, namely Bluetooth, IEEE 802.11
b/g wireless technology – WiFi, and Zigbee are covered here. Finally, the chapter highlights the chal-
lenges of these wired or wireless alternative solutions in automotive networks.
Chapter V elaborates one of the most popular in-vehicle networking technologies called Controller
Area Network (CAN). The chapter begins with an overview of the basis and the general technology of
CAN in automotive industry and the deployment of in-vehicle CAN networks. It then presents the vari-
ous existing and future potential applications that make use of the CAN data, and the related technical
challenges in achieving secure remote monitoring and control of vehicles via CAN. Furthermore, the
chapter elaborates two key components in achieving remote vehicle monitoring and control, namely, the
wireless communication component and data security component. It stresses the importance of secure
data and information flow between vehicles and an application server. Finally, the chapter presents an
overall architecture for secure wireless real-time vehicle monitoring and control environment. In future
rends, the author foresees the area of real-time monitoring and control being a fertile ground for future
automotive innovations and services.
Chapter VI describes the current medium access control (MAC) and routing protocols for vehicular
networks, and the various factors that affect their design and performance. The mobility and speed of the
communicating nodes in vehicular networks add extra dimensions to the challenges faced by the MAC
protocols, in addition to the existing requirements of reliability and efficiency. This chapter reviews
some of the existing MAC protocols for vehicular network. For example, basic MAC protocols, the
IEEE 802.11 MAC Extension for Vehicular Networks, and other MAC Protocols for Vehicular Networks
(ADHOC-MAC, the Directional MAC (D-MAC) protocol). Future Intelligent Transportation Systems
require fast and reliable communication between cars (vehicle-to-vehicle) or between a car and a road
side unit (vehicle-to-infrastructure). Ad hoc unicast routing schemes can be divided into two categories:
topology-based routing and position-based routing. Topology-based schemes use a variety of proac-
tive routing schemes (DSDV ((Destination Sequenced Distance Vector routing), Optimized Link State
Routing (OLSR), Fisheye State Routing (FSR)) or reactive approaches (AODV (Ad Hoc On-Demand
Distance Vector Routing), DSR ((Dynamic Source Routing), Temporally Ordered Routing Algorithm
(TORA), Associativity Based Routing Algorithm (ABR), or hierarchical protocols (Cluster Based
Routing Protocol (CBRP), Core Extraction Distributed Ad-hoc Routing (CEDAR) and Zone Routing
Protocol (ZRP)) to create routes.
Popular location services in position-based routing protocols are Distance Routing Effect Algorithm
for Mobility (DREAM) and Grid Location Service (GLS). Context Assisted Routing (CAR) and Spatially
Aware Routing (SAR) are proposed routing algorithms to overcome the problem of topology holes in
position-based routing. Current multicast protocols that can be used in V2V networks include: Posi-
tion-based Multicast (LBM), GeoGRID, Unicast Routing with Area Delivery and Inter-Vehicle Geocast.
Overall, routing of communications for vehicular safety applications remains a challenging topic.
Chapter VII presents a new reactive algorithm based on location information in the context of
vehicular ad-hoc networks. It proposes a Location Routing Algorithm with Cluster-Based Flooding
(LORA-CBF), which is formed with one cluster head, zero or more members in every cluster, and one
or more gateways to communicate with other cluster heads. It first validates the model at one, two, and
three hops by comparing the results of the test bed with the results of the model developed in OPNET.
For more than three hops, it validates the model by comparing with two non-position-based routing
algorithms (AODV and DSR) and one position-based routing algorithm (GPSR (Greedy Perimeter
xviii

Stateless Routing)). Results show that mobility and network size affects the performance of AODV and
DSR more significantly than LORA_CBF and GPSR. It is also observed that GPSR and LORA-CBF
behave similarly in terms of the end-to-end delay, and LORA_CBF is more robust in terms of delivery
ratio, routing overhead, route discovery time, and routing load compared with GPSR.
Chapter VIII presents the role of communications in cyber-physical vehicle applications. Cyber-physical
systems use sensing, communications and computing to control the operation of physical devices. The
embedded computers and sensors both within the vehicles and in the infrastructure will be networked
into cyber-physical systems to reduce accidents, improve fuel efficiency, increase the capacity of the
transportation infrastructure, and reduce commute time. Communications between nearby vehicles will
enable cooperative control paradigms that reduce accidents more than computing and sensors alone, and
communications between vehicles and the infrastructure will improve the scheduling of traffic signals
and route planning. The chapter describes applications that improve the operation of automobiles, control
traffic lights and distribute the load on roadways. The requirements on the communications protocols
that implement the applications are determined and a new communications paradigm, neighborcast,
is described. Neighborcast communicates between nearby entities, and is particularly well suited to
transportation applications.
Chapter IX incorporates the characteristics of traffic flow into the interference issue at the com-
munication layer of VANETs. There are several fundamental issues, such as connectivity, reachability,
interference and capacity, with respect to information propagation in VANETs. This chapter mainly
addresses the issue of interference, by incorporating the characteristics of traffic into this issue at the
communication layer of VANETs. High node mobility and dynamic traffic features make the interfer-
ence problem in VANETs quite different. As compared with previous efforts to solve this problem
which only considered static network topologies, this work is (to the best of our knowledge), the first to
demonstrate the interference features in VANETs by incorporating realistic traffic flow characteristics
based on a validated simulation model. Analytical expressions are developed to evaluate the interfer-
ence in VANETs taking account of both the macroscopic and the microscopic traffic flow characteristics.
These analytical expressions are validated within the simulation framework. The results show that the
analytical characterization performs very well to capture the interference in VANETs. The results from
this work can facilitate the development of better algorithms for maximizing throughput in VANETs,
and the research efforts bridging the features of both the communication layer and the transportation
layer will help to build more efficient systems.
Chapter X first captures the state-of-the-art in the area of traffic control with the assistance of
VANETs in terms of vehicular traffic models, vehicular traffic theories, flow control strategies, and
performance measurement methodologies. It surveys traffic control strategies for optimizing traffic flow
on highways, with a focus on more adaptive and flexible strategies facilitated by current advancements
in sensor-enabled cars and VANETs. It provides an overview of new ideas and approaches in the area
of traffic flow control with the assistance of VANETs. This chapter then presents new research into
proactive traffic merging strategies and the potential benefits of applying sensor-enabled cars. It shows
how sensor-enabled cars can assist in improving merging algorithms, and compares proactive merg-
ing algorithms against a conventional merging strategy: priority-based merging. Assisted by advanced
sensing and communication technologies, traffic control strategies and merging algorithms will lead
to more efficient use of the current road networks and ultimately help to alleviate traffic congestion. It
has shown that the significant improvement in traffic flow and the decrease in travel time mainly result
from the decoupling of the merging point and the decision point, and multilane optimizations, such as
pre-lane-changing. Proactive merging strategies can significantly improve traffic flow by increasing it
by up to 100% and reduce overall travel delay by 30%.
xix

Chapter XI presents the localization problem in cooperative vehicle applications by focusing on the
constraints imposed by the need for precise vehicle localization estimates. Such accurate estimates are
a pre-requisite to deploying vehicles with adequate communications capabilities in real traffic condi-
tions. V2V and V2I safety applications are complex, and the problem does not limit to communications
capabilities. It involves spatial information with respect to the vehicles’ locations relative to each other
and the infrastructure. Thus, V2V and V2I applications are considered as a spatio-temporal problem. The
tenet is that information can be shared only if this is time stamped and related to a spatial description
of the information sources. The chapter formulates the spatio-temporal problem having as constraint
the precision of the pose estimates of the vehicles involved. It formulates the localization problem and
accuracy of digital road maps as a combined issue that needs to be addressed for the successful deploy-
ment of cooperative vehicle applications. The problem formulation is completed by two case studies,
the use of V2V or V2I communications to traverse safely an intersection and an overtaking manoeuvre.
The chapter concludes by including comments and recommendations on the precision limits of the ve-
hicle pose estimations and the potential uncertainties that need to be considered when designing V2V
and V2I applications.
Chapter XII reviews the problem of estimating (in real-time) the position of a vehicle for use in land
navigation systems. After describing the application context and giving a definition of the problem, it
looks at the mathematical framework and technologies involved in the design of positioning systems.
Through a review of some of the various sensor fusion techniques usually encountered in such sys-
tems, it compares the performance of some of the most popular data fusion approaches, and provides
some insights on their limitations and capabilities. The extended Kalman filter (EKF) in data fusion
centralized architectures remains a design of choice for most applications. The chapter then describes
how to make positioning systems more robust and adaptive by detecting and identifying sensor faults.
Finally, it explores possible architectures for collaborative positioning systems, where many vehicles
are interacting and exchanging data to improve their own position estimate using a collaborative and
geometric data fusion approach. One major trend seen in the field of dense sensor networks is in the use
of multilateration techniques for location accuracy. Despite significant errors in range estimates between
sensors, multilateration is able to render more accurate location estimates, thus making it suitable for use
in vehicle navigation. With the current evolution of automotive technologies, all vehicles are becoming
networked and equipped with wireless communication capabilities, thus allowing the use of distributed
and collaborative techniques for navigation and positioning. Wireless communications networks are
becoming attractive to localize vehicles using various radio-based range technologies such as received
signal strength indicators (RSSI), power signal attenuation or time-of-arrival (TOA) techniques.
Privacy, security, and reliability as key requirements in deploying VANETs are addressed in Chapter
XIII. Without these strengths, the VANET technology will not be suitable for market diffusion. This
chapter concerns with how to fulfill these requirements by using pseudonym-based authentication,
and designing security schemes that do not endanger transport safety while maintaining low overhead.
At the same time, the design improves system usability by allowing nodes to self-generate their own
pseudonyms. It manages security credentials in VANET through self-generation and self-certification
of pseudonyms, which greatly simplifies the security management and makes a step towards a usable
system. It employs group signatures to generate certificates which satisfy the requirements of anonymity
and liability attribution, and results show that the computational cost and the overhead are comparable
to the baseline approach. Next, it analyzes the costs imposed by security on the transportation systems
by analyzing data link performance to obtain packet reception probability curves for the pseudonym-
based security systems, and analyzing the impact of safety messaging, security and privacy-enabling
technologies on transportation safety to show that secure communication schemes achieve safety levels
xx

comparable to those with no security at all. This chapter performs a detailed investigation of pseudonym-
based authentication by analyzing several system issues and showing how these security mechanisms
can be applied in practice.
Chapter XIV systematically presents actual issues faced by developers and engineers in the simulation
of VANET applications, some of which are related to the challenges in developing VANET simulators.
It discusses simulation architectures, models used for representing the communication among vehicles,
vehicles mobility features, and simulation tools implementation methods. The focus is on the new trends
in communication protocols and traffic models, and on new facilities incorporated in simulation tools.
Advances in VANET technology and protocols support the adoption and use of more complex mobil-
ity models and of more flexible and adaptable traffic controls. VANETs’ rapid topology changes or the
changes in the vehicles mobility as reaction to traffic changes are captured by the simulation models,
which become more or less complicated and include more elements that constrain vehicle mobility: maps,
real traffic conditions (congestion), driver behavior, fuel consumption, pollutant emissions, and so forth.
It also includes a critical analysis of the solutions adopted in some well-known actual simulators. Other
issues related to the use of simulation in the evaluation of applications that aim at improving traffic safety
and control are discussed. Representative city and highway application scenarios are analyzed, and results
obtained by simulation, along with ways these results can be exploited by VANET developers and users,
are highlighted. Future trends in the development of simulators that produce more accurate results, and
their use for the evaluation of more sophisticated traffic control solutions, are also included.
Chapter XV takes a more futuristic look at various types of topologies and protocols that could be
used specifically in in-vehicle networks. Varying functionalities of vehicles will require different types
of communication networks and networking protocols. As the size and complexity of the network grows,
integration, maintenance and troubleshooting will become a major challenge. To facilitate integration and
troubleshooting of various nodes and networks, it would be desirable that networks of future vehicles
be partitioned, and the partitions be interconnected by a hierarchical or multi-layer physical network.
These partitions must be appropriately interconnected to handle functional dependencies and for better
diagnostics. A number of network topologies have been presented and analyzed for cost, bandwidth and
message latencies. This chapter describes a number of ways using which the networks of future vehicles
could be designed and implemented in a cost-effective manner. Since future vehicles will also be com-
municating with external entities for various reasons, the chapter also addresses the issues of security,
safety and privacy which should be taken into consideration at the time of designing the in-vehicle net-
work components. Finally, some ideas have been presented in developing simulation models to analyze
various types of networks which will ultimately help in selecting the most appropriate network topology
and various network components for a given set of requirements and specifications.
Thus, we have walked through the world of new information and communication technologies be-
ing developed for vehicular systems. We hope that the book is of interest to academia and industry. We
earnestly hope that the insights provided by this book, on the specific information and communication
technologies used in vehicles, will help inspire and spawn a multitude of novel applications and in-
novations.

This book is dedicated to my parents Lanying Guo and Tianfu Guo.

Huaqun Guo
Singapore,October 2008
xxi

Acknowledgment

I would like to extend my utmost gratitude to the people who have, in one way or other, inspired, aided
and contributed to the successful completion of this book.
First of all, I would like to express my sincere gratitude to Deputy Executive Director (Research)
Professor Lye Kin Mun at the Institute for Infocomm Research (I2R) for his strong encouragement of
my editing works.
I would also like to thank the A*CAR (A*STAR Capabilities for Automotive Research) taskforce,
and the management of Institute for Infocomm Research (I2R) for providing me the opportunity to carry
out research into the exciting area of vehicular networks. In particular, I would like to thank Dr. Feng
Bao and Dr. Yongdong Wu at I2R for their support.
Special thanks to all reviewers for their expertise, time, effort and timely response throughout the
peer evaluation process. In particular, I wish to express my appreciation to the members of the Editorial
Advisory Board for their guidance, support and constant encouragement.
I would also like to take this opportunity to thank Tyler Heath and Heather A. Probst for their as-
sistance with this book.
Last but not least, the heartiest gratitude is given to my family for their love and encouragement.

Huaqun Guo
Institute for Infocomm Research, A*STAR, Singapore


Chapter I
Introduction:
An Emerging Area of Vehicular Networks
and Data Exchange

Huaqun Guo
Institute for Infocomm Research, A*STAR, Singapore

ABSTRtract

Emerging vehicular networks in the forms of Intra-Vehicle (InV), Vehicle-to-Vehicle (V2V), and Vehicle-
to-Infrastructure (V2I) communications will enable a variety of applications for safety, traffic efficiency,
driver assistance, as well as infotainment to be incorporated into modern automobile designs. At the
same time, networked Electronic Control Units (ECUs) are increasingly being deployed in automobiles to
realize functions such as engine management, air-bag deployment, and even in intelligent brake systems.
In addition, users now expect to sit in an automobile and have their brought-in devices, and beamed-in
services harmoniously integrated with the built-in interfaces inside the automobile. Thus, widespread
adoption of vehicular networks is fast becoming a reality and critical data is being exchanged with-inside
and with-outside vehicle via vehicular networks. This chapter gives an overview of this emerging area
of vehicular networks, its potential applications, its potential wireless technologies for data exchange,
and its research activities in the Europe, the United States (U.S.), Japan, and Singapore.

INTRODUCTION increasingly being deployed in automobiles to


realize diverse functions such as engine manage-
In recent years, control systems of automobiles ment, air-bag deployment, and even in intelligent
have moved from the analog to the digital do- brake systems. For example, at least 70 networked
main. In particular, x-by-wire systems are ap- ECUs are employed in a Mercedes S-Class car
pearing and have driven research efforts of the (Heffernan & Leen, 2008; Vasilash, 2005). At the
whole automotive industry for the recent decade. same time, emerging vehicular networks in the
Networked Electronic Control Units (ECUs) are forms of Intra-Vehicle (InV), Vehicle-to-Vehicle

Copyright © 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Introduction

(V2V), and Vehicle-to-Infrastructure (V2I) com- lar networks, and new technologies have been
munications are fast becoming a reality and will developed for vehicular networks. This chapter is
enable a variety of applications for safety, traffic meant to introduce the emerging area of vehicular
efficiency, driver assistance, as well as infotain- networks and data exchange, give an overview of
ment to be incorporated into modern automobile the new technologies for car communications,
designs. and present automotive research activities in the
There are currently a number of study groups Europe, the United States (the U.S.), and Japan
working on car communications and defin- as well as in Singapore.
ing the standards for various applications. InV
Communications, such as CAN (Controller Area
Network, 2008; CiA, 2008), LIN (Local Inter- CAR COMMUNICATIONS
connect Network, 2008), FlexRay (2008), are
used for interconnecting in-car ECUs, sensors, New technologies are being developed for ve-
and so on. V2V Communications, such as IEEE hicular networks and these networks provide an
802.11p (IEEE 802.11p, 2008; Jiang & Delgrossi, efficient method for today’s complex car com-
2008), Dedicated Short Range Communications munications. Figure 1 shows the example of InV,
(DSRC) (Dedicated Short Range Communica- V2V and V2I communications.
tions, 2008), may be used for safety applications. InV provides communication among ECUs/
V2I communications, e.g. IEEE 802.11p and IEEE sensors in a vehicle while V2V and V2I provide
1609 Family of Standards for Wireless Access in communications among nearby vehicles and be-
Vehicular Environments (WAVE, 2008) may be tween vehicles and nearby fixed roadside equip-
used for traffic information. ments. Vehicular networks are a cornerstone of
In addition, users now expect to sit in an au- the envisioned Intelligent Transportation Systems
tomobile and have their brought-in devices and (ITS). By enabling vehicles to communicate with
beamed-in services harmoniously integrated with its function systems via InV communication,
the built-in interfaces inside the automobile. To with other vehicles via V2V communication as
integrate mobile phones and digital music players, well as with roadside base stations via V2I com-
Ford designs Ford Sync that integrates voice-ac- munication, vehicular networks will contribute
tivated in-car communication and entertainment to safer and more efficient roads by providing
system (Ford Sync, 2008). RM MICHAELIDES timely information to drivers and concerned
provides wireless CAN interfaces to transmit authorities.
CAN between different networks using Bluetooth,
RFID (radio-frequency identification), Infrared, Potential Applications
UHF (ultra high frequency), etc (Michaelides,
2008). A Controller Area Network Gateway to The emerging vehicular networks will enable a
ZigBee was described in (Kuban, 2007). There variety of applications for safety, traffic efficiency,
are some wireless CAN products, such as CANRF driver assistance and infotainment:
(Dammeyer, 2008) and CAN Bridge (Matric,
2008). The performance of wireless CAN in terms 1. Safety: Vehicular network technologies will
of latency and throughput was studied in (Dridi, be applied to reduce accidents so as to save
Gouissem, Hasnaoui, & Rezig, 2006). lives and reduce injuries. Examples of such
Thus, with vehicular networks fast becoming applications include vehicle breakdown and
commonplace, critical data is being exchanged obstacle detection, lane departure warn-
with-inside and with-outside vehicle via vehicu- ing, accident warnings, collision warning,


Introduction

Figure 1. Example of InV, V2V, and V2I communications

ECU

ECU
ECU
ECU
ECU

ECU
CAN BUS
ECU

over-height / over-width warning, turnover inside the automobile. Furthermore, users


warning, work zone warnings, black box, can also wirelessly purchase and synchro-
and so on. nize the latest movies and songs when they
2. Traffic Efficiency: Vehicular network top up fuel at the kiosk. Last but not least,
technologies will be applied to improve wide range of applications for entertainment
the flow of traffic and reduce congestion, through Internet will be brought to automo-
for example, cooperative adaptive cruise tive passengers.
control, highway/rail intersection traffic
management, congestion information for Potential Wireless Technologies
traffic control, electronic toll collection,
etc. With the rapid development of information tech-
3. Driver Assistance: Vehicular networks can nologies, there are a number of wireless technolo-
also provide accurate information and data, gies which are potential for wireless InV, V2V and
as well as good communications for drivers V2I communications, and listed in Table 1 and
to improve safety and security, e.g., digital Table 2. These new technologies could be used
road maps downloading, advanced navi- for data exchange between users’ devices and
gation system, parking information, real- vehicles, among vehicles, and between vehicles
time traffic information, various warning and infrastructure. The details of application
information, driver’s daily blog, automatic scenarios of data exchange with each technology
emergency call, etc. are listed in two tables as well.
4. Infotainment: Vehicles in future are fore- DSRC is the recent technological trends to
seen to be dominated with feature-rich au- provide real time traffic information for effective
dio-video infotainment. Users can expect to implementation of ITS. Thus, in the following
sit in an automobile and have their brought-in subsection, we focus on introducing the new
devices and beamed-in services harmoni- technologies of DSRC for vehicular networks.
ously integrated with the built-in interfaces


Introduction

Table 1. Wireless technologies for InV communications


ZigBee UWB Bluetooth Wireless USB Wireless CAN
(ultra-wide band) (Universal Serial Port)
Standard/ Ratified in Decem- Transmitting infor- First launched (1998) Short-range, high- CANRF (CAN over
Technology ber 2004 mation spread over bandwidth based RF)/
a large bandwidth on the WiMedia CAN Bridge
(>500 MHz) Alliance’s UWB
Coverage 10 and 75 meters < 60 cm for a 500 1 meter, 10 meters, 480 Mbit/s at up to 3 /
MHz wide pulse, < 100 meters meters and 110 Mbit/ 500 feet (152.4M)
23 cm for a 1.3 GHz s at up to 10 meters
bandwidth pulse
Bit Rate 20-250 kbit/s per extremely high data 3 Mbit/s (Version 2.0 480 Mbit/s at dis- 20kbps/
channel rates + EDR) tances up to 3 meters 52.8kbps-164.4kbps
1000+ Mbps 53-480 Mbps and 110 Mbit/s at up
(WiMedia Alliance to 10 meters
(proposed)
Applications Entertainment, Used at very low Connect and exchange Game controllers, Communication
smart Lighting energy levels for information between digital cameras, MP3 among sensors and
control, advanced short-range high- devices such as mobile players, hard disks ECUs
temperature control, bandwidth commu- phones, laptops, and flash drives.
safety & security, nications by using a personal computers, Also suitable for
sensors, etc larger portion of the video game consoles, transferring parallel
radio spectrum etc video streams.

Table 2. Wireless Technologies for V2V & V2I communications


GSM/3G WiFi WiMax DSRC
(Wi-Fi Alliance Version of
802.11n)
Standard/ Third generation cellular New Wi-Fi technology with Broadband technology in A short to medium range
Technology technology in 2001 MIMO standard in 2009, 2007 communications
802.11n standard in 2009
Coverage kilometers 500m 5 km 1000m
Bit Rate 2-3 Mbps 600Mbps using MIMO 75Mbps 6 to 27 Mbps
Applications Between Vehicle and Roadside to vehicle and Internet access, Email, VoIP Roadside to vehicle and
mobile phone communi- vehicle to vehicle com- (Voice over IP) vehicle to vehicle com-
cation munication munication

Dedicated Short Range communication zones are important (Armstrong,


Communications 2008). This technology for ITS applications is
working in the 5.9 GHz band (the U.S.) or 5.8
DSRC is a short to medium range wireless pro- GHz band (Japan & Europe). DSRC standards
tocol specifically designed for automotive use. It and communication stack are shown in Figure 2
supports both public safety and private operations (Jiang & Delgrossi, 2008).
for V2V and V2I communication environments.
DSRC is a complement to cellular communica- IEEE 802.11p
tions by providing very high data transfer rates in
circumstances where minimizing latency in the IEEE 802.11p is a draft amendment to the IEEE
communication link and isolating relatively small 802.11 standard to add wireless access in the


Introduction

vehicular environment. It defines enhancements and interfaces that collectively enable secure
to 802.11 required to support ITS applications. V2V and V2I wireless communications. To-
This includes data exchange between high-speed gether these standards provide the foundation
vehicles and between the vehicles and the roadside for a broad range of applications in the trans-
infrastructure in the licensed ITS band of 5.9 GHz portation environment, including vehicle safety,
(5.850-5.925 GHz) (IEEE 802.11p, 2008). IEEE automated tolling, enhanced navigation, traffic
802.11p supports physical layer management management and many others. The IEEE 1609
entity (PLME), lower MAC (Medium Access Family of Standards for Wireless Access in Ve-
Control) layer management entity (L_MLME), hicular Environments (WAVE) consists of IEEE
Wireless Access in Vehicular Environments P1609.1—Standard for Wireless Access in Vehicu-
physical layer (WAVE PHY) as well as WAVE lar Environments (WAVE)—Resource Manager,
lower MAC in DSRC technology. The 802.11p IEEE P1609.2—Standard for Wireless Access in
Task Group is still active, resolving comments Vehicular Environments (WAVE)—Security Ser-
on Draft 3.0, and the final approval is expected vices for Applications and Management Messages,
in March 2009. IEEE P1609.3—Standard for Wireless Access in
Vehicular Environments (WAVE)—Network-
IEEE 1609—Family of Standards for ing Services, and IEEE P1609.4—Standard for
Wireless Access in Vehicular Wireless Access in Vehicular Environments
Environments (WAVE) (WAVE)—Multi-Channel Operations (WAVE,
2008).
The WAVE standards define an architecture and
a complementary, standardized set of services

Figure 2. DSRC standards and communication stack

Safety Applications Non- Safety Applications

WME WSMP UDP TCP


IEEE P1609.3 IEEE 1609.3
IP
IEEE P1609.2

LLC
Security

U_MLME WAVE upper MAC


IEEE P1609.4 IEEE P1609.4

L_MLME WAVE lower MAC


IEEE 802.11p IEEE 802.11p

PLME WAVE PHY


IEEE 802.11p IEEE 802.11p


Introduction

CONonortium and INITIAnitiati initiatives of the 6th Framework Program. The


objective is to understand how intelligent vehicles
Vehicular networks, as an emerging area, attract and intelligent roads can cooperate to produce a
a number of R&D groups in the Europe, the breakthrough for road safety based on V2V and
U.S., Japan and Singapore to work on the new V2I communications.
technologies.
eSafety
Car 2 Car Communication Consortium
eSafety (2008), the first pillar of the Intelligent
The Car 2 Car Communication Consortium (2008) Car Initiative (i2010 Intelligent Car Initiative,
is initiated by European vehicle manufacturers 2008), brings together the European Commission,
and partners include Audi, BMW, Daimler, Fiat, public authorities, industry and other stakehold-
Honda, Opel, Renault, and Volkswagen. Its objec- ers with an aim to accelerate the development,
tive is to further increase road traffic safety and deployment and use of Intelligent Vehicle Safety
efficiency by means of inter-vehicle communica- Systems that use information and communication
tions. The schedule for the official agreements of technologies. The main target is to contribute to
consortium is from July 2005 for the basic concept the European Commission’s 2001 goal of reducing
till December 2010 for frequency allocation. the road fatalities by 50% by 2010 (from 54 000
to 27 000 – between 2001 and 2010) (European
Network on Wheels, Germany Commission, 2008).

Network on Wheels (NoW) (2008) was founded PReVET


in 2004 and the current partners include Daimler
AG, BMW AG, Volkswagen AG, Fraunhofer In-
PReVENT (2008) is a European automotive in-
stitute for Open Communication Systems, NEC
dustry activity co-funded by the European Com-
Deutschland GmbH, IMST GmbH and embedded
mission to contribute to road safety by developing
wireless GmbH. Besides the partners, the Uni-
and demonstrating preventive safety applications
versities of Mannheim, Karlsruhe and Munich
and the Carmeq GmbH also cooperate within and technologies. Membership in its Core Group
NoW. NoW is a German research project which consists of seven vehicle manufacturers (Daim-
is supported by Federal Ministry of Education lerChrysler, BMW, Renault, PSA Peugeot Citroen,
and Research. Its main objectives are to solve Ford, CRF, Volvo Technical Development), four
technical problems on communication protocols automotive suppliers (Siemens VDO, Delphi,
and data security for car-to-car communica- SAGEM and Bosch) and one research institute
tions and to submit the results to the Car 2 Car (INRETS). One goal of PReVENT is also to con-
Communication Consortium. On May 8, 2008, tribute to the European Commission’s 2001 goal
NoW presented its results in a final workshop at of halving the number of fatalities on Europe’s
the Daimler Research & Development Center in roads by 2010 as specified in eSafety for Road
Ulm (Germany). and Air Transport. IP PReVENT Final Report
can be found in PReVENT web site.
SAFESPOT
EASIS
SAFESPOT (2008) integrated research project
was co-funded by the European Commission The EASIS (Electronic Architecture and Sys-
Information Society Technologies under the tem Engineering for Integrated Safety Systems)


Introduction

(2007), which was part of the European Com- vehicles, intelligent infrastructure and the creation
mission’s 6th Framework Programme launched of an intelligent transportation system through
in 2004, is a partnership of 22 European vehicle the integration of these two components. The
manufacturers, automotive suppliers, tool sup- Federal ITS Program Initiatives in 2004 included
pliers and research institutes with the aim to Vehicle Infrastructure Integration, Cooperative
develop technologies for the realization of future Intersection Collision Avoidance Systems, and In-
ISS (Integrated Safety Systems). tegrated Vehicle Based Safety Systems. Through
the Integrated Vehicle-Based Safety Systems
SEVEOM initiative, the USDOT is seeking to establish a
partnership with the automotive and commercial
SEVECOM (Secure Vehicular Communica- vehicle industries to accelerate the introduction
tion) (2008), an EU-funded project launched in of integrated vehicle-based safety systems into
2006, focuses on providing a full definition and the Nation’s vehicle fleet.
implementation of security requirements for ve-
hicular communications. A liaison with security VII Consortium (VIIC)
activities in EASIS supported the activities of
SEVECOM. Its members include TRIALOG, VII (Vehicle and Infrastructure Integration)
Bosch, Budapest University of Technology & Consortium (VIIC) (VIIC and VII Program Over-
Economics, Daimler, EPFL, CRF-Fiat Research view, 2005; Robinson, 2006) was incorporated
Center, Katholieke Universiteit Leuven, and Ulm
in November 2004, and cooperative agreement
University. The SEVECOM project will end by
was signed in December 2005. Current member
January 1, 2009.
participation includes Ford, DCX, Nissan, Honda,
VW and BMW. The objective is to create an
Vehicle Safety Communications
enabling communication infrastructure to save
Consortium
lives using intelligent warning systems, improve
mobility and congestion, enhance driving expe-
The Vehicle Safety Communications (VSC) Proj-
rience with new services and enhance roadway
ect was a 2.5 year program started in May 2002.
maintenance and planning. VIIC provides single
Vehicle Safety Communications Consortium
(2008) members, including BMW, DaimlerChrys- voice to USDOT and joint pre-competitive tech-
ler, Ford, GM, Nissan, Toyota and Volkswagen, nology development environment.
participated with the U.S. Department of Trans-
portation in this cooperative program. The objec- California PATH
tive was to identify vehicle safety applications
enhanced or enabled by external communications, California Partners for Advanced Transit and
determine their respective communication re- Highways (California PATH, 2008) was founded
quirements, evaluate the emerging 5.9 GHz DSRC in 1986 and is administered by the Institute of
vehicle communications technology and align the Transportation Studies, and University of Cali-
proposed DSRC communications protocols to fornia, Berkeley, in collaboration with Caltrans
meet the needs of vehicle safety applications. (California Department of Transportation). PATH
is a multi-disciplinary and cooperative program
US DOT for staffs, faculties and students from universities
statewide to engage in cooperative projects with
The U.S. Department of Transportation’s (US- private industry, state and local agencies, and
DOT, 2008) ITS program focuses on intelligent non-profit institutions. Its mission is to develop


Introduction

solutions to the problems of California’s surface middleware and software platform, and contribute
transportation systems. Current PATH research to development of global standards.
projects are divided into four program areas:
Policy and Behavioral Research, Transportation Internet ITS Consortium (Japan)
Safety Research, Traffic Operations Research,
and Transit Operations Research. Internet ITS Consortium (2008) is developing
a common Internet ITS platform and aims for
CALM Continuous Communications promotion of a standardized global Internet ITS
for Vehicles specification. It is formed by Japanese companies
and has 11 companies as Executive Members, 12
CALM (2008) is under ISO TC 204 Working companies as Regular Members and 69 companies
Group 16 Wide Area Communications-Protocols as Supporting Members.
and Interfaces. The scope of CALM is to provide
a standardized set of air interface protocols and A*CAR in Singapore
parameters for medium and long range, high
speed ITS communication including V2V and With the rapid growth in the global automotive
V2I communications. population, the A*STAR (Agency for Science,
Technology and Research) Capabilities for
AUTOSAR Automotive Research (A*CAR) began as a task-
force with the aim of establishing an initiative
AUTomotive Open System ARchitecture (AU- to address technical challenges in the automo-
TOSAR, 2008) is a partnership of automotive tive area and provide technical leadership to
manufacturers and suppliers working together to the automotive supplier industry in Singapore
develop and establish an open and standard auto- through R&D (Yong, 2008). A*CAR taskforce
motive software architectures. Its core partners has launched an automotive consortium to bring
are BMW, Bosch, Continental, Daimler, Ford, together automotive OEMs, suppliers and R&D
OPEL, GM, PSA Peugeot Citroën, TOYOTA, and community to work hand in hand in addressing
Volkswagen. The AUTOSAR project plan was key research areas in automotive technology.
released in May 2003 and the first AUTOSAR The consortium is driven by 7 A*STAR research
Open Conference held in October 2008. institutes namely, Data Storage Institute (DSI),
Institute for Infocomm Research (I²R), Institute
JasPar of Chemical and Engineering Sciences (ICES),
Institute of High Performance Computing (IHPC),
JasPar (2008) is formed by the Japanese automo- Institute of Materials Research and Engineering
tive companies and its board members include (IMRE), Institute of Microelectronics (IME), and
TOYOTA MOTOR CORPORATION, Nissan Singapore Institute of Manufacturing Technology
Motor Co., Ltd, Toyota Tsusho Electronics, Honda (SIMTech) (A*CAR, 2008).
R&D Co., Ltd and DENSO CORPORATION. The
aim of JasPar is to reduce technology develop-
ment costs and promote technology development FUTURE TRENDS
by encouraging Japanese companies to collab-
oratively develop pre-competitive technologies The global automotive industry is the world’s
such as automotive LAN enabling technology, largest manufacturing industry and most industry


Introduction

analysts predict that there will be a year-on-year hicle-to-Infrastructure (V2I) communications. It


growth till 2012 (PwC Automotive Institute, briefly surveys the car communications, potential
2008). The overall market for automotive network- applications, potential wireless technologies, and
ing will grow at a 10% annual rate through 2011 specially designed technologies DSRC standards
and the components for the automobile networking and communication stack for data exchange. As
market will nearly triple between 2005 and 2011. the emerging area of vehicular networks has at-
Driving this trend is the introduction of more tracted a number of R&D groups in the world,
electronics in every vehicle, and that accounts this chapter then introduces the consortiums and
for the much faster annual growth rate than the initiatives working on advanced automotive tech-
auto industry’s 2 to 3% (Regt, 2007). nologies in Europe, the U.S., Japan and Singapore.
In the future, more and more control modules In the future, vehicular networks certainly play
will be attached into the high-speed data network- a vital role in enhancing the automotive industry
ing backbones embedded in a vehicle. Vehicular for safety, security and entertainment.
networks will simplify the operation of control
systems and allow more features to be deployed
within automobile. For example, information and RE
direction displays will be embedded directly into
windshields. Another example is that instead of Armstrong, L. (2008). What is DSRC? Retrieved
self-parking being a service that is offered only September 2, 2008, from http://www.leearm-
on luxury cars, it will soon become a standard strong.com/DSRC/DSRCHomeset.htm
feature on every car. With the advances in sen-
A*CAR. (2008). Automotive @ A*STAR. Bro-
sors, control, GPS (Global Position System) and
chure from Agency for Science, Technology and
networking technologies, “self-driving cars” will
Research (A*STAR).
become possible in the future (Uldrich, 2008).
Neurotechnology that studies drivers’ brain AUTOSAR. (2008). Retrieved September 2, 2008,
patterns and brain computers that read drivers’ from http://www.autosar.org
intentions from their brainwaves through electro-
California PATH. Retrieved September 2, 2008,
encephalogram (EEG) will help keep them alert
from http://www.path.berkeley.edu
and monitor sleepy driver syndrome.
Vehicular networks still plays a vital role in CALM. (2008). CALM Continuous Communica-
enhancing the automotive industry for safety, tions for Vehicles. Retrieved September 2, 2008,
security and entertainment. In the future, as from http://www.calm.hu/
more and more information is streamed onto
the Internet, vehicular networks will allow driv- Car 2 Car Communication Consortium. (2008).
ers and passengers to enjoy their journey more Retrieved September 2, 2008, from http://
than ever before with entertainment and area www.car-to-car.org
information. CiA. (2008). CAN-based in-vehicle networks.
Retrieved September 2, 2008, from http://www.
can-cia.de/index.php?id=228
CONcLUSION
Controller Area Network. (2008). Retrieved Sep-
This introduction chapter presents the emerging tember 2, 2008, from http://www.can-cia.org/
area of vehicular networks in the forms of Intra- Dammeyer, J. (2008). Wireless Controller Area
Vehicle (InV), Vehicle-to-Vehicle (V2V), and Ve- Network. Retrieved September 2, 2008, from


Introduction

http://www.autoartisans.com/documents/canrf_ IEEE 802.11p. (2008). Retrieved September 2,


prod_announcement.pdf 2008, from http://en.wikipedia.org/wiki/IEEE_
802.11p
Dedicated Short Range Communications. (2008).
Retrieved September 2, 2008, from http://grouper. Internet ITS Consortium. (2008). Retrieved
ieee.org/groups/scc32/dsrc/ September 2, 2008, from http://www.internetits.
org/
Dridi, S., Gouissem, B., Hasnaoui, S., & Rezig, H.
(2006). Coupling Latency Time to the Throughput JasPar. (2008). Retrieved September 2, 2008, from
Performance Analysis on Wireless CAN Net- https://www.jaspar.jp/english/index_e.php
works. In Prof. of the International Multi-Con-
Jiang, D., & Delgrossi, L. (2008). IEEE 802.11p:
ference on Computing in the Global Information
Towards an International Standard for wireless
Technology (ICCGI’06).
Access in Vehicular Environments. Retrieved
EASIS. (2007). Retrieved September 2, 2008, September 2, 2008, from http://ieeexplore.ieee.
from http://www.easis-online.org org/stamp/stamp.jsp?arnumber=04526014
eSafety. (2008). Retrieved September 2, 2008, Kuban, P. A. (2007). A Controller Area Net-
from http://ec.europa.eu/information_society/ac- work Gateway to ZigBee- A Proposition of an
tivities/esafety/index_en.htm Architecture to Extend CAN. VDM Verlag Dr.
Mueller e.K.
European Commission. (2008). European Road
Safety Day on 13 October 2008. Retrieved Local Interconnect Network. (2008). Retrieved
September 2, 2008, from http://ec.europa. September 2, 2008, from http://www.lin-sub-
eu/transport/roadsafety/road_safety_days/in- bus.org/
dex_2008_en.htm
Matric. (2008). The Controller Area Network
FlexRay. (2008). Retrieved September 2, 2008, (CAN) has gone wireless! Retrieved September
from http://www.flexray.com/ 2, 2008, from http://www.matric.com/resources/
Canbridge_brochureV2.pdf
Ford Sync. (2008). Today’s Drivers Demand
Staying Connected. Retrieved September 2, Michaelides, R. (2008). Wireless CAN Interface.
2008, from http://media.ford.com/article_display. Retrieved September 2, 2008, from http://www.
cfm?article_id=25169 rmcan.com/index.php?id=17&L=1
Heffernan, D., & Leen, G. (2008). ICT based Network on Wheels (NoW). (2008). Retrieved
research at Limerick contributes to automotive September 2, 2008, from http://www.network-
‘drive-by-wire’ technology. Retrieved Septem- on-wheels.de/
ber 2, 2008, from http://www.irishscientist.
PReVENT. (2008). Retrieved September 2, 2008,
ie/2002/contents.asp?contentxml=02p237b.
from http://www.prevent-ip.org/
xml&contentxsl=is02pages.xsl
PwC Automotive Institute. (2008). Analyst Note,
i2010 Intelligent Car Initiative. (2008). Retrieved
August 1, 2008.
September 2, 2008, from http://ec.europa.eu/
information_society/activities/intelligentcar/in- Regt, d. H. (2007). Back To Basics & Future
dex_en.htm Trends: Automotive Networking. December
7. 2007. Retrieved September 8, 2008, from

10
Introduction

http://www.automotivedesignline.com/how- Vasilash, G. S. (2005). Hardware-in-the-loop: As-


to/204702733 suring performance & quality by combining the
real & the virtual testing. Automotive Design &
Robinson, R. (2006). The VII Consortium and the
Production. Gardner Publications, Inc. Retrieved
Cooperative Agreement with USDOT. Retrieved
October 14, 2008, from http://findarticles.com/p/
September 2, 2008, from http://www.itsmichigan.
articles/mi_m0KJI/is_/ai_n13784131
org/AnnualConf2006/presentations/Ralph-ITS-
M%20Meeting-%20VIIC%20Overview_a.ppt Vehicle Safety Communications Consortium.
(2008). Retrieved September 2, 2008, from http://
SAFESPOT. (2008). Retrieved September 2,
www-nrd.nhtsa.dot.gov/pdf/nrd-12/CAMP3/
2008, from http://www.safespot-eu.org/pages/
pages/VSCC.htm
page.php
VIIC and VII Program Overview. (2005). Retrieved
SEVECOM. (2008). Retrieved September 2, 2008,
September 2, 2008, from http://www.leearmstrong.
from http://www.sevecom.org/
com/DSRC%20Home/Standards%20Programs/
Uldrich, J. (2008). The Future of the Automobile. North%20American/Previous%20Meetings/
March 10, 2008. Retrieved September 8, 2008, March%2006/VIIC%20Overview.ppt#1
from http://www.jumpthecurve.net/index.php/re-
WAVE. (2008). IEEE 1609—Family of Standards
cent_posts/the_future_of_the_automobile/
for Wireless Access in Vehicular Environments.
USDOT. (2008). Retrieved September 2, 2008, Retrieved September 2, 2008, from http://www.
from http://www.its.dot.gov/its_overview.htm standards.its.dot.gov/fact_sheet.asp?f=80
Yong, M. S. (2008). A*CAR. A*STAR Program
Proposal.

11
12

Chapter II
Drive by Wire Systems:
Impact on Vehicle Safety
and Performance

Sohel Anwar
Indiana University-Purdue University Indianapolis, USA

ABSRACT

An overview of the drive by wire technology is presented along with in-depth coverage of salient drive by
systems such as throttle-by-wire, brake-by-wire, and steer-by-wire systems, and hybrid-electric propul-
sion. A review of drive by wire system benefits in performance enhancements and vehicle active safety is
then discussed. This is followed by in-depth coverage of technological challenges that must be overcome
before drive-by-wire systems can be production ready. Current state of the art of possible solutions to
these technological hurdles is then discussed. Future trends in the drive-by-wire systems and economic
and commercialization aspects of these system are presented at the conclusion of the chapter.

INTRODUCTION are no mechanical or hydraulic connections be-


tween driver’s input interface (e.g. throttle, brake,
Drive by wire (DBW) systems are relatively new steering) and vehicle system (e.g. engine/traction
technology that are increasingly finding their motor, brake/steering actuators) in a drive by wire
place in modern automobiles. A drive by wire equipped vehicle.
system is an automotive system that interprets A broadened definition of drive by wire sys-
driver’s inputs and executes the commands to tems will include other microprocessor based
produce desired vehicle behavior, typically via a automotive control systems such as anti-lock
microprocessor-based control system. A typical braking system (ABS), traction control system
drive-by-wire system comprises of redundant (TCS), yaw stability control (YSC), etc. These
sensors, actuators, microprocessors, and com- systems are designed to enhance the safety of
munication channels for fault tolerance. There the vehicle by continuously monitoring various

Copyright © 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Drive by Wire Systems

vehicle states and taking corrective action and / to generate the correct amount of road wheel
or warning the driver upon detection of an im- angle using electric motors based on the vehicle
pending unsafe vehicle condition. The first such velocity. If a sensor stops functioning properly, the
system came into commercialization is ABS in controller will not be able to actuate the motors to
early 1970’s. It was followed by traction control generate the correct road wheel angle, potentially
system and electronic stability control in the 1980’s causing hazardous situation.
and 1990’s (Margolin, 1997; Stanton & Marsden, Figure 1 shows a brief chronology of the drive
1997; Wagstaff, 1999; Davis, 2001; Higgins & by wire system introduction into the modern
Koucky, 2002; Anon, 2003; Fowler, 2003; Ross, automobile with the broadened definition (Iser-
2003; Lee, 2003; Daniels, 2005; Kendall, 2005). mann et al, 2002). As shown, the steer by wire
The first true drive by wire system to come to system will likely be the last of the drive by wire
the market was Throttle By Wire (TBW) which system to be introduced in the automobile due to
was incorporated in high end vehicles such as Audi its complexity and safety criticality.
A6, Mercedes Benz, Lexus, and BMW models In an even broader definition, hybrid electric
in the late 1990’s and early 2000’s. The TBW vehicles, electric vehicles, and plug-in hybrid
systems were advantageous in stability control electric vehicles can also be classified as drive by
applications where the throttle deactivation may wire equipped automobiles due to the electronic
be needed in order to improve the traction so that control of various subsystems in these vehicles.
sufficient brake torque can be generated. Electric vehicles (EV) by their very nature are
Electro-hydraulic brake (EHB) system, a form drive by wire that is propelled by electronic control
of brake by wire (BBW), was first introduced in of the electric traction motor based on the sensor
Mercedes Benz SL series in 2001-02 (Higgins & information from the throttle pedal. However, the
Koucky, 2002). Although hydraulically actuated, steering and brakes of an EV may still be hydro-
these brakes operate on commands from sensors mechanically operated. In case of hybrid electric
at the brake pedal and generate the necessary vehicle (HEV), a sophisticated microprocessor
brake pressure at the wheel cylinders via a set based control system channels the power flow
of electronically controlled valves and a pump. between the internal combustion (IC) engine,
However, the brake by wire system was decom- the battery, the electric motor / generator, and
missioned and removed from the vehicle due to a the vehicle wheels (Lu & Hedrick, 2005). All of
number of field problems a few years later. Work these functions are done via a central controller
on the electro-mechanical brakes (EMB), another for optimal performance. Plug-in hybrid electric
form of brake by wire system that does not use vehicles are very similar to hybrid electric vehicle,
hydraulic fluid, was done in the late 1990’s by except that a more powerful battery extends the
number of automotive companies such as Bosch, vehicle range in pure electric mode.
Continental, and TRW. However, issues related This chapter is organized as follows: A more
to their reliability and fault tolerance still remain detailed coverage on drive by wire system is
which must be addressed before these system can covered in the next section. The performance and
be used in an automobile. safety benefits of the drive by wire systems are il-
Steer by wire (SBW) system is by far the most lustrated in the following section. This is followed
complex drive by wire system which is also the by the section on technological challenges and
most safety critical by-wire system in an automo- possible solutions associated with DBW system.
bile. In a pure steer by wire system, the steering Future trends for the DBW system is presented in
column is eliminated. Sensors mounted on the the next section. Lastly, some final thought will
steering wheel are interpreted by the controller be presented in the conclusion section.

13
Drive by Wire Systems

Figure 1. Hazard severity of failures in advanced automotive control and drive by wire systems

DRIVE WIRE SYSTEMS: Figure 3 illustrates the first commercialized


CURRET STATE OF THE ART brake by wire system by Daimler Benz (Higgins
& Koucky, 2002). This is an electro-hydraulic
Figure 2 shows a pictorial view of a number of brake (EHB) system with mechanical backup that
drive by wire systems in a concept automobile. In was installed in SL 500 model. The brake pedal
addition to standard drive by wire systems, this displacement sensor output is used to determine
concept vehicle also includes a 42V converter the desired wheel cylinder pressure which is
which is used to power the by-wire systems. With generated via a closed loop control system that
all the drive by wire systems in the vehicle which includes a set of electro-hydraulic valves and an
use electrical power for actuation, the electric electric motor driven pump. This system was
power demand must be met using higher voltage later recalled due to reliability issues. Since then
systems. 42V power source is thought to be a no automakers have incorporated brake by wire
compromise between high voltage requirement systems in any of their vehicles.
and safety. However, the power demand for hy- Figure 4 shows another concept vehicle that
brid electric vehicles is significantly higher due incorporates drive by wire systems on a hybrid
to propulsion need and hence uses a 240-300V electric vehicle. This concept is based on the
DC power bus. An extra layer of safety in the synergy of combining a DBW system with HEV.
design of such systems must be incorporated The DBW systems can easily be powered by the
to eliminate the possibility of electrocution. In HEV battery pack or the high voltage power bus.
addition, for fault tolerant architecture, at least The IC engine along with the motor generator
two or more such power sources are required for will ensure that power is always available for the
a DBW equipped vehicle. DBW systems.

14
Drive by Wire Systems

Figure 2. Concept drive by wire equipped vehicle

Figure 3. Brake by wire equipped Mercedes Benz model SL 500 (source: Daimler Benz)

15
Drive by Wire Systems

Figure 4. A drive by wire equipped hybrid electric concept vehicle

Figure 5. General Motors’ HyWire concept vehicle (source: GM)

16
Drive by Wire Systems

Another concept vehicle that incorporates drive • SBW systems also offer variable steering
by wire system in a Fuel Cell HEV (FCHEV) is ratio at different vehicle speeds for additional
illustrated in Figure 5. The concept vehicle was safety.
designed by General Motors and was codenamed • Automatic line keeping is possible for SBW
“HyWire” (“Hy” for hydrogen fuel cell and “Wire” equipped vehicle on the automated highways
for drive by wire). GM later renamed this vehicle of the future. This feature will further en-
“FX-3” and built a prototype of this vehicle in hance safety and comfort of the driver.
2006. This vehicle has fuel cell propulsion system • Haptic steering for improved ergonomics and
with four wheel electric traction motors. Vehicle operator safety & performance is possible
steering, braking, and suspension are all controlled with SBW vehicles.
electronically (drive by wire). • DBW systems will offer reduced overall
Drive-By-Wire systems offer a number of production cost for steering systems via
benefits when incorporated on a vehicle. Some standardized modules and software.
of the benefits are as follows: • BBW systems offers improved brake noise,
vibration, and harshness (NVH) since there
• DBW systems can easily be configured is no direct mechanical or hydraulic link
(via software updates) for added or tunable from the pedal to the wheels. ABS pulsation
features such as brake pedal feel / enhanced in normal hydraulic brake will disappear in
safety via stability control. a BBW system.
• DBW systems can enhance vehicle perfor- • BBW systems also allows for Better Comfort
mance by prepositioning brake calipers for Level
fast brake actuation or allowing for over- ○ Anti-Dive Algorithm
steering to enhance maneuverability. • Better fuel economy through regenerative
• DBW systems can improve fuel economy via braking
better engine / motor / powertrain control • Easier maintenance
and via regenerative braking. ○ Less wear and tear
• DBW systems can offer better ergonomics ○ No need to turn those rotors
such as adjustable feel at driver’s interface • Extended brake life
(steering wheel, brake / accelerator ped- ○ No need to replace brake shoes, pads,
als). or rotors
• DBW systems offer better fault detection • Better cold performance than wet brake
and warning to the driver which enhances systems
the safety, reliability, and maintenance of • Better braking-in-a-turn performance
the vehicle. • Enhanced safety
• DBW systems are able to incorporate multi- ○ Stability control algorithms
functionality in a single system thereby mak- ○ Reduction of brake fade
ing today’s advanced features (e.g. stability • Enhanced cruise control on a down hill
control systems via active steering) more
cost effective in these automobiles. However, there are a number of challenges that
• SBW systems can not only provide these a DBW system must address before full commer-
additional features, but also can free up cialization. These challenges are discussed in the
premium packaging space by eliminating “Technological Challenges” section.
the steering column thereby enabling easy In this section, the following drive by wire
assembly of the instrument panel. systems are presented in more detail:

17
Drive by Wire Systems

1. Throttle By Wire Systems way to implement engine braking for commercial


2. Brake By Wire Systems vehicle (Jake brake, Exhaust gas brake, etc.). For
3. Steer By wire Systems autonomous vehicles, it is necessary to have a
TBW system for vehicle propulsion.
Throttle B y Wire (TBW) Systems Figure 6a illustrates the basic operation of a
TBW system. The pedal sensor information along
For traction control system based on engine inter- with throttle angle feedback is used to actuate the
vention, it is necessary to control engine torque. TBW motor to maintain the commanded throttle
By electronically controlling the mass air flow rate angle. Figure 6b shows an electronic throttle body
via a throttle by wire (TBW) system, it is possible (ETB) used in a TBW system.
to achieve this functionality. For yaw stability Figure 7 illustrates a possible interface between
control system, it may be necessary to control the ABS / TCS / YSC systems and a TBW system. As
engine torque to the wheels to maximize available indicated earlier, a TBW system is a natural fit in
traction. TBW systems allow this functionality an active safety system or a combination of active
through their very design. For hybrid electric systems (as in this case) where upon the ABS /
vehicle propulsion, it is necessary to mechanically TCS / YSC microprocessors share information
disconnect the pedal from the throttle to allow for with a TBW microprocessor and a supervisory
torque blending between the engine and electric microprocessor. The TBW system microprocessor
motor which can easily be achieved via a TBW gives preference to the active safety throttle com-
system. A TBW system also provides an easier mand over its own pedal command and controls
the throttle angle accordingly.

Figure 6a. Schematic of a throttle by wire (TBW) system

Figure 6b. Schematic of an electronic throttle body in a TBW system

18
Drive by Wire Systems

Figure 7. TBW system interface with ABS / TCS / YSC active safety systems

Brake B y Wire (BBW) Systems microcontroller calculates appropriate pump and


valve commands (via a control algorithm) which
Brake by wire systems can be classified in three are then used to either build or dump the pressure
main categories, based on the type of actuation in order to minimize the pressure error.
system, as stated below: The electromechanical (EM) brake by wire
system is a dry system and no hydraulic fluid
1. Electro-hydraulic (EH) BBW systems is used. It still uses the friction pads or shoes
2. Electromechanical (EM) BBW systems for braking the vehicle as in EH BBW system.
3. Electromagnetic (EMg) BBW systems (Re- However, the actuation mechanism is based on
generative braking via electric generator or an electric motor and a mechanism that applies
Eddy Current braking) force onto the friction pads. Figure 8b illustrates
the operation of this type of brake system (Hose-
The electro-hydraulic brake by wire system is innezhad, 2006). In addition to the brake pedal
composed of an electronically controlled pump/ sensor, a number of other sensory information
motor assembly, a set electronically controlled becomes necessary for such a system (e.g. clamp
valves, pressure transducers, brake pedal sensors, force, actuator position).
driver modules, and microcontrollers. Figure 8a The third type of brake by wire system is based
illustrates the actuation system of an EH brake by on electromagnetic retardation. The principles
wire system. The brake pedal sensor information of electromagnetic retardation are utilized to
is sent to microcontroller which interprets this generate the braking forces which are contact-
in terms of a desired wheel cylinder pressure less. As a result, no friction pad is needed in
command. The microcontroller also receives electromagnetic braking. Two principal types of
the wheel cylinder pressure information from actuators are used: (1) Eddy current brakes, and
the pressure transducer. Based on the desired (2) Regenerative braking via generator.
and actual wheel cylinder pressure values, the

19
Drive by Wire Systems

Figure 8a. Schematic of an electro-hydraulic brake by wire actuation system

Figure 8b. Electromechanical brake by wire actuation system

20
Drive by Wire Systems

Figure 8c. Electromagnetic brake by wire actuation system

Figure 8c shows a picture of an eddy current SBW systems use microcontrollers to actuate
braking actuator which is composed of a wire the road wheel in the lateral direction based
wound stator and solid iron rotor. When the stator on the hand wheel steering angle and vehicle
is energized, an electromagnetic field is generated speed information. Figure 9 illustrates a possible
which gives rise to Lorentz forces according to configuration of a steer by wire system. In this
Maxwell’s equation when the rotor turns within particular configuration, the hand wheel steering
the electromagnetic field. These forces oppose the angle is measured via an appropriate sensor which
motion of the rotor, thereby producing retarding is then communicated to two microcontrollers.
torque. Regenerative braking works in a similar These microcontrollers also receive vehicle speed
fashion. One limitation of electromagnetic brak- information from the vehicle communication bus.
ing systems is their dependency on the rotational Based on the steering wheel angle and vehicle
speed, that is, the retarding torque is a function speed information, the microcontrollers calculated
of the rotor speed. As a result, at lower speed, the the road wheel angle command via suitable algo-
retarding torque diminishes significantly and will rithm. The microcontrollers then tries to maintain
not be able to provide sufficient braking torque. the commanded road wheel angle by actuating
For this reason, electromagnetic brake by wire the rack mounted motors in a closed loop fashion
systems are rarely used as a standalone brake via road wheel angle feedback.
system. They are often used in conjunction with Steer-By-Wire systems are a relatively new
a friction brake system. development compared to the traditional me-
chanical, hydraulic or electric steering systems
Steer B y Wire (SBW) Systems that are currently used for motor vehicles. In the
SBW system, there is no mechanical coupling
Steer by wire systems are in the early stage of between the steering wheel and the steering
development. Major automakers are yet to decide mechanism, i.e. the vehicle’s steering wheel is
if and when such system will be incorporated in detached from the steering mechanism during
a vehicle. Similar to the brake by wire systems, normal operation. Even though the mechanical

21
Drive by Wire Systems

Figure 9. Schematic of an SBW system

linkage between the steering wheel and the road means that any failure of the system may lead
wheels has been eliminated, a SBW steering sys- to catastrophic consequences. As a result, these
tem is expected not only to implement the same systems must be designed to withstand multiple
functions as a conventional mechanically linked faults or failures within the system, before reach-
steering system, but also to provide the advanced ing conditions of catastrophic proportions. A
steering functions. fault in sensor, actuator, or microcontroller must
There are a number of important steering not cause any severe consequences. This fault
functional requirements for a Steer-By-Wire tolerance feature requires multiple redundancy
system: in the hardware architecture which provides fault
tolerant operation.
• Directional control and wheel synchroniza-
tion.
• Adjustable variable steering feel. PERFORMANCE ENHANCEMENTS
• Adjustable steering wheel returns capabil- AND ACTIVE SAFETY VIA DRIVE
ity. BY WIRE SYSTEMS
• Variable end of travel stop for steering
wheel. Drive by wire systems can significantly enhance
• Variable steering ratio. the design and performance of the vehicle active
safety systems such as the collision avoidance
It can be noticed that all of the drive by wire systems, adaptive cruise control, active front
systems described above comprised of multiple steering, stability control, road condition warn-
redundancy in the sensors, actuator, microcon- ing. Figure 10a-b illustrates trend of incorporation
trollers, and communications buses. This is ob- of various active safety systems in automobiles
viously by design which ensures a fault tolerant and driver error mitigation via DBW systems.
operation. Of the three drive by wire systems The more advanced systems (e.g. platooning,
presented above, both BBW and SBW systems highway copilot, autonomous driving) can only
are considered safety critical systems which

22
Drive by Wire Systems

Figure 10a. Trend of active safety systems in automobiles

Max Underfloor Passive Safety


Concept (reducing personal injury
Side Airbag Autonomous in case of an accident)
Side Impact Protection Driving
Airbag
Safety Potential

Highway Copilot
Deformation Platooning Active Safety
Elements Emergency Brake (avoiding an accident)
Compound Environment recognition
Glass Road recognition (LDW)
Seat
Safety Belt Autonomous Cruise Control
Cell
ASRESP
ETC
ABS
Low Modified Source : Auto-Zeitung Nr.  Jan.9

960 90 980 990 000 .....

Figure 10b. Driver errors and possible solution via DBW systems
Error Automated solution
Get into wrong lane Navigation system
Forget which gear Automatic gear shift
Only half an eye on the road Fully automated driving system
Distracted, need to brake hard Anti-lock braking system
Plan route badly Route planning and navigation system
Fail to recollect recent road Navigation system
Wrong exit from roundabout Navigation system
Intended lights, switched wipers Daylight sensor and automatic lights
Forget light on main beam Automatic lighting
Usual route taken by mistake Navigation system
Misjudge speed of oncoming vehicle Collision avoidance system
Queing, nearly hit car in front Collision avoidance system
Driving too fast on dipped lights Vision enhancement system
Turn left into car's path Collision avoidance system
Miss motorway exit Navigation system
Manouver without checking mirror Collision avoidance system
Fail to see pedestrian crossing Collision avoidance system
Brake too quickly Anti-lock braking system
Hit something when reversing Collision avoidance system
Overtake without using mirror Collision avoidance system
Misjudge gap in car park Collision avoidance system
Turning left, nearly hit road user Collision avoidance system
Misjudge interval turning right Collision avoidance system
Try to pass vehicle turning right Collision avoidance system
Fail to see pedestrian stepping out Collision avoidance system
Attempt to drive off in third gear Automatic gear shift
Try to drive off without starting car Automatic start-up

23
Drive by Wire Systems

Figure 11. Possible active safety features via the DBW system in an automobile

be effectively achieved via drive by wire system. Both brake-based Yaw Stability Control (YSC)
Other active safety systems are a natural fit for and Anti-lock Brake System (ABS) have been
drive by wire systems as these systems can eas- demonstrated on BBW systems (Anwar, 2005;
ily be incorporated via the addition of a software Anwar, 2006). Using sliding mode control (SMC)
module in a drive by wire equipped vehicle. As theory, the author provided experimental results
described in (Anwar, 2006), the ABS algorithm for the hybrid BBW system. Here it was empha-
was implemented via only software update to a hy- sized that the ABS system was implemented only
brid brake by wire system. In addition to passenger through the software and no hardware modifica-
vehicles, SBW systems have also been investigated tion was needed.
in the context of large construction machineries YSC algorithm via active front wheel steering
such as wheel loaders with superior performance has also been developed and tested in a SBW
enhancements (Haggag et al, 2005). equipped vehicle (Yih & Gerdes, 2005; Zheng &
Drive by wire systems can also significantly Anwar, 2008). The test results from these studies
enhance the performance of a vehicle by tak- indicate that the steering based YSC system on a
ing proactive actions in a driving scenario. For SBW equipped vehicles has significant safety ad-
example, vehicle handling can be made more vantages in critical situations over a conventional
responsive by adding slight oversteer on high fric- vehicle where the driver has to manually control
tion coefficient surface which can easily be done the vehicle against an unexpected yaw motion.
via a steer by wire system (Hebden et al, 2004;
Yih & Gerdes, 2005; Chang, 2007). Performance
enhancement via SBW system while maintaining TECHNOLOGICAL CHALLENGES
stability has also been investigated by a number FOR DRIVE BY WIRE SYSTEMS
of researchers (Limpibunterng & Fujioka, 2002; AND POSSIBLE SOLUTIONS
Oh et al, 2004; Segawa et al, 2004; Limpibunterng
& Fujioka, 2004). Similarly vehicle suspension The explosion of the usage of the electronic control
can be tuned dynamically via active suspension systems is nowhere more apparent than in the
control system to adapt to road conditions the modern automobiles. During the last two decades,
vehicle is in. Figure 11 illustrates possible sce- advances in electronics have revolutionized many
narios where drive by wire systems are utilized aspects of automotive engineering, especially in
to improve overall vehicle safety via actively the areas of engine combustion management and
monitoring vehicle states and taking corrective vehicle safety systems such as anti-lock brakes
actions or warning the driver.

24
Drive by Wire Systems

(ABS) and yaw stability control (YSC). The ben- niques can be one possible solution, which could
efits of applying electronic technology are clear: lower the overall cost without compromising
improved performance, safety and reliability with reliability.
reduced manufacturing and operational costs.
However, only recently has the electronic revolu- Fault Tolerant Control
tion begun to find its way into automotive chassis
systems in the form of electronically controlled Fault tolerance is a property of a system that con-
variable assist and, within the past few years, tinues operating properly in the event of failure
fully electric power assist. of some of its parts. It provides the ability of a
The complexity of the DBW systems arises system to provide a service complying with the
from the fact that these systems must incorporate specification in spite of faults. If operating qual-
multiple redundant sensors, actuators, control- ity decreases at all, the decrease is proportional
lers, and communications networks to achieve to the severity of the failure, as compared to a
fault tolerance. The fault tolerant control of naively-designed system in which even a small
these systems is accomplished via appropriate failure can cause total breakdown.
fault detection, isolation, and accommodation In order to bring down the cost, the total number
(FDIA) algorithms. However, the total number of redundant components must be reduced without
of redundant components makes the DBW sys- compromising the fault tolerance. One possible
tems prohibitively expensive. Also, in order to solution to this problem is to utilize analytical re-
accurately detect and isolate a component failure dundancy or model based fault detection, isolation,
without raising any false alarms, fast and robust and accommodation. Model-based Fault Detection
detection algorithms are needed. and Isolation (FDI) explicitly use a mathemati-
A number of issues must be resolved before cal model of the system. It is motivated by the
drive by wire system equipped vehicles can be conviction that utilizing deeper knowledge of the
brought to the market. Cost and reliability are system results in more reliable diagnostic deci-
two major challenges facing these systems. While sions. The main idea is “analytical redundancy”
reliability of these systems can be improved via which makes comparison of measurement data
increased redundancy and fault tolerant control with known mathematical model of the physical
algorithms and communication protocols, the process. It is superior to “hardware redundancy”
physical redundancy of components makes these generated by installing multiple sensors for the
systems prohibitively expensive. In this section, same measured variable. They offer simplicity,
we highlight the major challenges facing the drive flexibility in the structure, less hardware, less
by wire systems including cost, reliability, packag- weight, and cost.
ing, control, and communication protocols. Model-based Fault Detection and Isolation is
The numerous benefits of DBW systems out- achieved by implementing a more complex failure
weigh the risks in introducing such systems in detection algorithm that takes careful account of
the future automobiles. The concept vehicles with system dynamics, which may be able to reduce
DBW systems have demonstrated such benefits requirements for costly hardware redundancy.
(Stanton & Marsden, 1997). However, the overall Analytical redundancy based FDI uses a model
cost of highly reliable DBW system is still sev- of the dynamic system to generate the redundancy
eral times higher than the conventional systems; required for failure detection. In many systems,
primarily due to the presence of multitude of all of the states cannot be measured because of
redundant components (sensors, microcontrollers, cost, weight and size considerations, therefore,
actuators etc.). Model-based fault detection tech- FDI schemes for such systems must extract the

25
Drive by Wire Systems

redundant information from dissimilar sensors, ality unless the DBW system has redundancy in
using the differential equations that relate their its components by design. A DBW system with
outputs. In addition to taking hardware issues mechanical backup will allow a “limp home”
into consideration, the designer should consider mode in case of a component or subsystem failure.
the issue of computational complexity. Most However, the mechanical backup is tantamount to
model-based FDI methods rely on analytical having the basic mechanical system (e.g. steering
redundancy. In contrast to physical redundancy, or braking) and hence cannot be justified from a
when measurements from different sensors cost standpoint. Following the example of fly by
are compared, now sensory measurements are wire systems, it is only natural to focus on drive by
compared to analytically obtained values of the wire system without mechanical backup. However,
respective variable and the resulting differences DBW systems are microprocessor-based control
are called residuals. The deviation of residuals system based on sensor inputs and electronically
from the ideal value of zero is the combined result controlled actuation systems (via communica-
of noise, modeling errors and faults. A logical tion bus) which call for fault tolerance in case of
pattern is generated showing which residuals can component failure. Figure 12 shows an example
be considered normal and which ones indicate of the redundancy architecture of a fault tolerant
a fault. Such a pattern is called the signature of drive by wire system.
the fault. The final step of the procedure is the Safety integrity is defined by the probability of
analysis of the logical patterns obtained from the a safety-related system satisfactorily performing
residuals, with the aim of isolating the failures that the required safety functions under all the stated
cause them. Such analysis may be performed by conditions within a stated period of time. Safety
comparison to a set of patterns known to belong and reliability of a DBW system can generally be
to sample failures or by the use of some more achieved by a combination of the following: fault
complex logical procedure. avoidance, fault removal, fault tolerance, fault
One major difference between pure DBW sys- detection and diagnosis, automatic supervision
tems and other electronically controlled vehicle and protection.
systems is that even if these control systems fail, Fault avoidance and removal has to be accom-
the basic functionality of the brake and steering plished mainly during the design and testing phase.
system remains intact. In case of DBW systems, Analytical methods to evaluate the effects of faults
a component failure can result in loss of function- on system reliability and safety exist: reliability

Figure 12. Redundancy architecture of a drive by wire system

26
Drive by Wire Systems

analysis, fault tree analysis (FTA), failure modes Dynamic redundancy requires fewer mod-
and effects analysis (FMEA), hazard analysis ules at the cost of more information processing
(HA), and risk classification. (Figure 13b). In dynamic redundancy, at least
Certain component faults / failures can occur two redundant components are required where
even after designing the hardware based on reli- one component works in default mode while the
ability and safety analysis. These faults must be other works as a standby and takes over the main
tolerated, generally, by adding redundancy in the components if it fails.
components, units, or subsystems. Redundancies The fault in the main component is determined
in sensors, actuators, microprocessors, commu- by consistency checking of its output signal (such
nication buses, power supplies are considered to as range of signal and its rate of change) and
achieve the fault tolerance. Two basic approached comparing with that from the standby component.
to fault tolerance: static redundancy and dynamic For microprocessor, parity checking or watchdog
redundancy. timers may be used to detect the faulty micropro-
Static redundancy uses three or more parallel cessor. After a fault is detected, a reconfiguration
modules that have the same input signal and the module then switches the standby component
fault in any one module is detected by two-out- to take over and removes the faulty component
of-three voting (Figure 13a). A single fault can from operation.
such be tolerated by a triple redundant module. For static redundancy, at least three redundant
The maximum number of failures that can be component output signals are required for accu-
tolerated by an n-redundant system via static rate fault detection via majority voting algorithm.
redundancy is (n-1)/2 (n being odd). In case of dynamic redundancy, model-based

Figure 13. Static and dynamics redundancy architectures

27
Drive by Wire Systems

Figure 14. Fault detection flow diagram

approaches can be utilized to detect fault since In order to obtain specific symptoms, it is neces-
output signals are readily available from various sary to have more than one input and one output
components. Static redundancy can be found signal for parity equations or output observers.
in various mechanical and electrical systems: For parameter estimation, it is necessary to have
spoke-wheel, multiple brushes in DC motor. Only at least one input signal and one output signal.
single point hazardous failures are considered for Figure 14 illustrates the fault detection process that
mitigation upon fault detection. It has been shown utilizes both signal model based fault detection
that consideration of only single point failures is and process model based fault detection.
sufficient for a DBW system as opposed to a Fly Comprehensive overall fault-tolerance design
By Wire (FBW) system. can obtain fault tolerant components and fault
Fault detection is an integral part of a fault tolerant control. This, in turn, can be achieved
tolerant control system. Fault detection methods via fault tolerant lower cost components with
based on measured signals can be classified as built-in fault tolerance. A fault tolerant sensor
follows: configuration should be at least fail-operational
after one fault. This can be obtained via hard-
• Limit value checking (thresholds) and plau- ware-redundancy with same type of sensor or
sibility checks ranges of single signals. by analytical redundancy with difference sensors
• Signal-model-based methods for single and process models.
periodic or stochastic signals. Fault tolerant actuators can be designed by us-
• Process-model-based methods for two or ing multiple actuators in parallel, with either static
more related signals. or dynamic redundancy with cold or hot standby,

28
Drive by Wire Systems

e.g. static redundancy in hydraulic actuators in a Figure 15. Common field bus technologies between
fly-by-wire system. Fault tolerant actuators can microprocessors
also be designed with redundancy in actuator
components that have the lowest reliability, e.g.
two servo valves for hydraulic actuators or three
windings on an electric motor are examples of
static redundancy. The cabin pressure flap actuator
in an aircraft uses dynamic redundancy with cold
standby via two independent DC motors acting
on a single planetary gear.

Fault Tolerant Communication


Unification of bus systems within vehicles:
In-car electronics plays an important role in Controller Area Network (CAN) will remain the
many automotive applications: Throttle-by-wire, selection of choice for event-triggered systems
Steer-by-wire, Brake-by-wire, and many other while a new protocol is needed for applications
systems. The number of electronic components which require high performance, determinism,
in a car has therefore significantly increased. In fault-tolerance, and flexibility. Several differ-
particular, in-car networks used to interconnect ent field buses are used to address these various
electronics equipments becomes a key point. A communication demands. A big issue that the
common practice in the past was the extensive automotive system producers deal with is that
use of wiring. These wires significantly increased too many field bus technologies exist today. To
the complexity and weight of these systems. To- interconnect these systems there is a need for
day, in-car bus networks are largely adopted for high bandwidth together with flexibility and
the sake of reducing the vehicle weight and fuel determinism. It is desirable to move from using
consumption. The requirements of an automotive too many technologies to fewer more general.
communication network are generated from the To reduce the complexity evolving in a modern
applications it has to support. Major automotive automotive system, it would be good to commit
applications that involve networking and the us- on a set of networking protocols that can be used
age of field buses are: in most of the applications typically.
The common field bus technologies intercon-
• Drive by wire necting Electronic Control Units or ECUs today
• Chassis systems are: Controller Area Network (CAN), Local In-
• Powertrain systems terconnect Network (LIN), Byteflight, and Media
• Infotainment or multimedia Oriented Systems Transport (MOST). Figure 15
shows a graphical illustration of the requirements
Multimedia devices require high bandwidth for various communication protocols.
and plug-n-play capabilities. Two most important
requirements for DBW systems are dependability Analytical Redundancy Based Fault
and fault-containment. Distributed control is of- Tolerant Control of DBW Systems
ten used to meet these requirements. Distributed
control algorithms require a coordinated snapshot Physical redundancy based fault tolerant control
of the controlled object. Such coordination can be and communication protocols can significantly
achieved by the provision of a global time base. enhance the reliability. However, this method-

29
Drive by Wire Systems

ology increases the overall system cost expo- with appropriate fault detection, isolation, and
nentially due to the presence of a large number accommodation methodologies can be utilized
of redundant hardware components. One pos- to make the DBW systems fault tolerant (Gadda
sible solution to this problem is to replace the et al, 2007). Through analytical redundancy, the
physical redundancy of the fault tolerant drive vehicle steering angle can be estimated from the
by wire systems by analytical redundancy. Ana- states of other vehicle parameters without using
lytical redundancy methodologies can not only an extra steering position sensor.
reduce the overall system cost by reducing the
total number of redundant components, but also
further improve overall reliability of the system Sn ANALnalytical
through the usage of a diverse array of sensory REDUNDANCY in a STEER BY
information. An up to date in-depth coverage of WIRir
analytical redundancy based fault tolerant control
and communication methodologies will be given In this research, the analytical redundancy based
in this section including predictive and nonlinear fast fault detection algorithms was developed that
methodologies. based on physical models, nonlinear estimator
The concept of analytical redundancy has been and generalized predictive algorithms. In this
investigated in the context of aerospace applica- algorithm, outputs from a number of redundant
tions, primarily utilizing Eigen-structure theory. sensors as well as analytical sensor are checked
However, most of these articles were aimed at against each other for a number of times before
isolated subsystems in an aircraft or a spacecraft. declaring a component to be faulty. The analyti-
Fly-By-Wire (FBW) systems are mostly based on cal sensor output is the combination exertion of
full hardware redundancies (Bajpai et al, 2001). the full vehicle model, nonlinear Sliding Mode
As a result, analytical redundancy methodologies Observer, and the long range prediction algorithm.
have not been utilized to a great extent in FBW sys- The yaw rate signal can be measured with inex-
tems. Nonetheless, the theoretical foundation for pensive sensors. Therefore with the measured
analytical redundancy methodology researched yaw rate and the measured motor current input,
in aerospace applications can be useful in DBW the road wheel steering angles are estimated
system research. Introduction of Drive-By-Wire with the Sliding Mode Observer. Thereafter the
technology is more challenging in the automobile steering angles were predicted by a long range
market, mainly because automobile consumers predictor at variable prediction horizons with
cannot afford the high cost of redundant systems the participation of estimated steer angle and the
the aerospace industry can. Each extra sensor, motor current.
actuator, and Electronic Control Unit (ECU) in- The proposed research concept is utilizes
creases the overall cost and weight of the vehicle. the long range prediction based fault detection,
With the profit margin already low, this approach based on the analytical model of the SBW system
will not be acceptable to the automobile industries. (Figure 16) which would provide added safety to
By employing analytical redundancy techniques the SBW system via fast and robust fault detec-
instead of hardware redundancy, it will be possible tion and isolation of a component failure in such
to bring the overall cost of such system down to a system.
a point that will be attractive to the automak- Since analytical redundancy methods are
ers for mass production without sacrificing the model-based, long-range prediction based
high level of safety and reliability required by Fault Detection, Isolation, and Accommodation
the consumers. Analytical redundancy along (FDIA) algorithms are appropriate in such an

30
Drive by Wire Systems

Figure 16. Electronic architecture of an SBW application since modeling errors are inevitable
system in real-world systems. Furthermore, long-range
prediction based FDIA methods (Figure 17)
provide robustness against external disturbances
which are expected in a DBW vehicle having a
multitude of electric and electronics components.
The fundamental concept in this proposition is
that the sensor outputs are compared against the
analytical counterpart (analytical redundancy)
whose outputs are predicted several time step
ahead via generalized predictive algorithm. In the
event of a component failure, the predicted output
will deviate from the sensor outputs several time
steps ahead, thus reducing the detection latency.
Table 1 lists the notations used in this section.

Observer and Predictor Based


Modeling

An observer can be designed by combining the


steering system model and vehicle model (Hasan
& Anwar, 2008):
Table 1. Notations
x = Ax + Bim + E τ f
θ Road wheel angle T
x = β r θ θ 
β Vehicle body side slip angle
 −Cα , f − Cα , r Cα , r b − Cα , f a Cα , f 
r Vehicle yaw rate … −1 + 0 ⁄
… mV mV 2 mV ⁄
a Distance from the front tire to the vehicle’s CoG … Cα , r b − Cα , f a −Cα , f a − Cα , r b 2
2
Cα , f a ⁄
… 0 ⁄
A=… Iz I zV Iz ⁄
b Distance from the rear tire to the vehicle’s CoG
… 0 0 0 1 ⁄
m Vehicle mass … ⁄
…(t p + tm )Cα , f a (t p + tm )Cα , f −(t p + tm )Cα , f −bw ⁄
V Vehicle longitudinal velocity … Jw J wV Jw ⁄
jw 

T T
Iz Vehicle moment of inertia  km   1 
B=… 0 0 0 ⁄ ;E = … 0 0 0 − ⁄
Jw Moment of inertia of the road wheel  Jw   Jw 

bw Viscous damping coefficient for wheel bearing


C = [0 0 1 0] (4.1)
C α,f and C α,r Front and rear tire cornering coefficients
The motor current is the input to the system
km Motor torque constant
and the torque due to Coulomb friction is treated
tp Pneumatic trail
as a disturbance. The above system is fully ob-
tm Mechanical trail
servable.
τf Friction torque at the road wheel
im Motor current
Sliding Mode Observer (SMO)
Ej and Fj Uniquely defined polynomials in the Diophan-
tine equation
The motivations for using Sliding Mode Observer
are, it is model free and robust respect to bounded

31
Drive by Wire Systems

Figure 17. Road wheel angle estimation and The behavior of the mismatch governed by
fault detection, isolation, and accommodation homogeneous Equation (4.4) is determined by
(FDIA) eigenvalues of matrix (A+LC). For observable
systems, they may be assigned arbitrarily by a
θ des θ proper choice of input matrix, L. It means that
+ any desired rate of convergence of the mismatch
− im θ1 θ2 to zero or estimate x̂(t) to state vector x(t) may be
provided. Then any full-state control algorithms
with vector x̂(t) are applicable.
θ predicted The order of the observer may be reduced due
to the fact that Rank (C) = l and the observed
θ estimated vector may be represented as:

r y = C1x1 + C2 xp
θ FDIA x = [x1 xp]T
x1 ≠ R l, xp ≠ R n–l, det(C1) ≠ 0 (4.5)
uncertainty. It can work under much less con-
servative condition. The idea underlying SMO It is sufficient to design an observer only for
observer design methods can be illustrated for a vector xp, then the components of vector x1 are
linear time-invariant system (Hasan & Anwar, calculated as:
2008):
x1 = C1–1 (y – C2 xp) (4.6)
x = Ax + Bu
y = Cx Write the system Equation (4.2) in space (y, xp)
y ≠ Rl, x ≠ Rn, rank(C) = l (4.2) as:

The pair (C, A) is assumed to be observable and y = A11 y + A12 x p + B1u


n is order of the system. A linear asymptotic ob- x p = A21 y + A22 x p + B2u
server is designed in the same form as the original (4.7)
system (4.2) with an additional input depending
on the mismatch between the real values and the where
estimated values of the output vector:
A A12  B  C C2 
MAM −1 = …11 , MB = …1 ⁄ , M = …1
 A21 A22 ⁄ B 0 I n −1 ⁄
xˆ = Axˆ + Bu + L( y − Cxˆ ) (4.3)  2

where x̂ is an estimate of the system state vector The coordinate transformation M in nonsin-
and L ≠ R n×l is an input matrix. The state vector gular, det(M) ≠ 0. Therefore, applying the simple
of the observer x̂ is available since the auxiliary Sliding Mode Observer (SMO) in the state space
dynamic system is implemented in a controller. system equation,
The motion equation with respect to mismatch
x  = x –  x̂ is of form: xˆ = Axˆ + Bu + L sgn( y − Cxˆ ) (4.8)

x = ( A + LC ) x (4.4)

32
Drive by Wire Systems

where, sgn(z) = col(sgn(z1), ..., sgn(zn) Generalized Prediction Bsed


+1 if , z > 0 Predictor
sgn( z ) = 
−1 if , z < 0
A class of predictive self-tuning controllers,
Under a suitable choice of the gain matrix L in known as generalized predictive controller (GPC)
the observer, sliding occurs on the manifold y – C (Hasan and Anwar, 2008) have shown robust-
x̂ = 0, and it becomes equivalent to the reduced ness against unstable plants, non-minimum-
order observer. The discontinuous vector function phase plants, model over parameterization, and
v = L sgn(y – ŷ). Now from Equation (4.7), uncertain process dead time. These controllers
have also been observed to provide offset free
behavior for the closed loop system since they
yˆ = A11 yˆ + A12 xˆ p + B1u + L1 sgn( y − yˆ )
include an integral action. These set of controllers
xˆ p = A21 yˆ + A22 xˆ p + B2u + L2 sgn( y − yˆ ) (4.9) have been very successful in regulator or track-
ing type observer applications. In the context of
The system for the error y = y – ŷ is of the long range prediction, the prediction horizon, j
form, is a tunable design variable that can be set to any
value according to the desired prediction range.
y = A11 y + A12 x p + B1u + L1 sgn( y ) The predictive nature of the GP (Generalized
x p = A21 y + A22 x p + B2u + L2 sgn( y ) Prediction) based predictor algorithm comes from
(4.10) the use of the Diophantine equation. Through the
use of Diophantine equation, the output of the
The vector function v ≠  R l is chosen such that plant is predicted j-step ahead of present time.
sliding mode is enforced in the manifold y = 0 and This prediction output is then used for future
the mismatch between the output vector y and its fault detection and identification.
estimate ŷ reduced to zero. A vector L2 must be Considering the state space equation (4.2), a
found such that the mismatch x p = xp – x̂p between transfer function can be obtained as follows:
xp and its estimate x̂p decays as the desired rate.
Equivalent value of the discontinuous function: U (s)
G (s) = = C ( sI − A) −1 B (4.14)
Y (s)
L1 sgn(y) = A12 x p (4.11)

For simplicity, L1 is considered as 1 and equation After discretization of the equation (4.14),
a more general form of the dynamic model of
(4.11) becomes:
the dynamic model of the vehicle model can be
sgn(y) = A12 x p (4.12) written as:

Now the equation on the sliding manifold appears A(z–1) Y(z) = B(z–1) U(z) (4.15)
from equation (4.10):
where A(z-1) and B(z-1) are polynomial of order na
and nb respectively in the backward shift operator
x p = ( A22 − L2 A12 ) x p (4.13)
in time, z-1. A(z-1) and B(z-1) have the following
forms:

33
Drive by Wire Systems

A( z −1 ) = d 0 + d1 z −1 + d 2 z −2 + ... + d na z − na Multiplying equation (4.20) with θ(t+j) and


rearranging that equation, we obtain:
B ( z −1 ) = n0 + n1 z −1 + n2 z −2 + ... + nnb z − nb (4.16)
θ(t + j) = Fj(z–1)θ(t) + Ej(z–1)(n0 + n1z–1
In order to make a prediction of the future + n2z–2 + n3z–3 + n4z–4)∆im(t – j + 1)
output of the road wheel angle, the Diophantine where, ∆ = (1 – z–1) (4.21)
identity is used to derive the j-step ahead predic-
tion of ∆U(t+j). Equation (4.21) predicts the value of the pinion
angle θ in the future ( j - time step ahead).
1 = Ej(z–1) A(z–1) + z–j Fj(z–1) (4.17)
θ(t + j) = F × θ(t) + EB × ∆im(t – j + 1) (4.22)
Where Ej and Fj are uniquely defined polynomials
for a given A(z-1) and the prediction interval j. In The matrices F ≠ R N×5 and EB ≠ R N × (N + 5)are
the present work, the recursive technique has been calculated by using the MATLAB script.
used to obtain Ej and Fj (Hasan & Anwar, 2008).
This makes the procedure computationally very
efficient. It has been shown that with increasing Simulation RESULTS
j only the highest order term in Ej+1(z-1) changes
while the rest of the coefficients remain the same
Initialization of Vehicle Model for
in Ej(z-1). Therefore, we can write:
Simulation
Ej+1(z–1) = Ej(z–1) + ej z–j (4.18)
In the full vehicle model, the parameter initializa-
tion (Anwar & Chen, 2007) is set as follows: Fw
where,
= 2 (N-m); Jw = 0.5 (kg-m2); bw = 20; k m = 0.5; I
= 3136 (kg-m2); Cf = 18000 (N/rad); Cr = 47000
Ej(z–1) = e0 + e1z–1 + e2z–2 + ... + ej–1z–( j–1)
(N/rad); m = 1250 kg; V = 8 (m/s); a = 1.05 (m);
b = 1.71 (m); C0 = (Cf + Cr) (N/rad); C1 = (bCr
In the degree of polynomial A(z-1) is na, then the
– aCf) (N-m/rad); C2 = (a2Cf + b2Cr) (N-m2/rad);
degree of Fj(z-1) becomes na. The coefficients of
tp = 0.0381 (m); tm = 0.04572 (m); C3 = (tp + tm)Cf
the polynomial Fj(z-1) may then be denoted as:
(N-m/rad); K = 80; T = 0.005 (sec).
The vehicle model presented in this thesis is
Fj(z–1) = f j,0 + f j,1z–1 + f j,2z–2 + ... + f j,naz–na (4.19)
evaluated on a validated SIMULINK model (An-
war & Chen, 2007). The cornering coefficients
Steering Angle Prediction have been considered for a light weight passenger
Front Wheel Drive (FWD) car. Therefore the mass
GP based prediction supposed to be executed
and dimensions of the vehicle were perceptibly
for the discrete model. Hence the forth order
standard for the small passenger car. The simula-
vehicle model has been discretized to make itself
tion process has been appraised for a slow moving
compliant with the predictor. From the equations
vehicle and the pneumatic and mechanical trails
(4.15)-(4.16), the Diophantine prediction equation
have been carried out from the standard passen-
( j-step ahead predictor) is given by,
ger car tires specification. The driver’s factor is
chosen as nominal driving effect. But the sample
Ej(z–1)(d0 + d1z–1 + d2z–2 + d3z–3 + d4z–4)
time can be deviated according to the dynamic
∆ + z–j Fj(z–1) = 1 (4.20)
requirement of the system.

34
Drive by Wire Systems

Faults Types and Their Implications stage of the system operation otherwise according
to their nature; they are gradually increased to a
Two major fault types have been introduced into larger extent that could be difficult to control. The
a steer by wire system, namely: amplitude change type incipient faults are shown
in Figures 19a and 20a.
• Permanent fault These two most available types faults are
• Incipient fault introduced into the vehicle model system to
verify the FDIA methodology as well as provide
The persistent fault type is illustrated in Figure the efficient proposition of SMO and GP based
18a. Amplitude change fault can be either positive predictor for the SBW system.
amplitude change or negative amplitude change In order for the SBW system to be robust, the
types. Incipient fault should be handled at the early sensor measurements must be accurate and reli-

Figure 18a. Persistent zero sensor fault introduced in one of the two physical sensors with the fault state
displayed on the right

30
Analytical Sensor
Physical Sensor-1
20
Physical Sensor-2
Steering Angle (Degree)

10

-10

-20

-30
0 2 4 6 8 10 12 14 16 18 20

Time (Sec)

Figure 18b. FDIA output of sensor data after removing the persistent zero introduce fault in one physi-
cal sensor

25
Desired Road Wheel Angle
20 FDIA Output

15
Steering Angle (Degree)

10

-5

-10

-15

-20

-25
0 2 4 6 8 10 12 14 16 18 20

Time (Sec)

35
Drive by Wire Systems

able. Therefore, any faulty signal must be elimi- of three signals are required for this scheme to
nated to prevent undesirable steering effects. The work. The sensor signals are compared against
Fault Detection, Isolation, and Accommodation each other in real-time to determine the faulty
algorithm (FDIA) (Anwar & Chen, 2007) used signal where majority is assumed to be correct.
in this paper is able to handle single point faults This is based on the assumption that the event of
without interrupting the functionality of the SBW a sensor failure is rare and the event of multiple
system. This algorithm can be easily modified simultaneous sensor failures is extremely rare.
to handle multiple faults if more than three-sen- This algorithm can determine which sensor has
sor signals are compared. The FDIA algorithm failed by comparing its value against other sensors’
implemented in SIMULINK below is based on values. This algorithm can manage hard-failures as
a majority voting scheme in which a minimum well as soft-failures. Hard-failure is characterized

Figure 19a. Negative amplitude change type incipient fault introduced in one of the two physical sensors
with the fault state displayed on the right

30
Analytical Sensor
Physical Sensor-1
20
Physical Sensor-2
Steering Angle (Degree)

10

-10

-20

-30
0 2 4 6 8 10 12 14 16 18 20

Time (Sec)

Figure 19b. FDIA output of sensor data after removing the negative amplitude change type incipient
fault in one physical sensor

25
Desired Road Wheel Angle
20 FDIA Output

15
Steering Angle (Degree)

10

-5

-10

-15

-20

-25
0 2 4 6 8 10 12 14 16 18 20

Time (Sec)

36
Drive by Wire Systems

Figure 20a. Positive amplitude change type incipient fault introduced in one of the two physical sensors
with the fault state displayed on the right

50
Analytical Sensor
40 Physical Sensor-1
Physical Sensor-2
30

Steering Angle (Degree)


20

10

-10

-20

-30

-40

-50
0 2 4 6 8 10 12 14 16 18 20

Time (Sec)

Figure 20b. FDIA output of sensor data after removing the positive amplitude change type incipient
fault in one physical sensor

30
Desired Road Wheel Angle
FDIA Output
20
Steering Angle (Degree)

10

-10

-20

-30
0 2 4 6 8 10 12 14 16 18 20

Time (Sec)

by an abrupt or sudden sensor failure and soft- angle to detect and control them. And some simu-
failure is characterized by biases or drifts in the lations were observed to verify the advantages
signal over time. When a sensor fails, its signal is of higher prediction horizon into the dynamic
no longer used in the road wheel angle calculation. systems. The SBW controller, the yaw angle ob-
In such a situation the driver would be alerted of server, the road wheel angle estimator, the FDIA
the sensor failure, but would also still be able to algorithms, and the Generalized Predictive (GP)
maintain safe control of the vehicle. based predictor are combined with a simplified
A number of simulation runs were performed vehicle model with an SBW actuation system. The
in order to evaluate the developed methodology combined model was given a sinusoidal steering
of estimating and then predicting the road wheel input. Fault was then injected to one of the three
road wheel angle sensors whether one of them

37
Drive by Wire Systems

Figure 21a. Effect of prediction horizon for the amplitude change type incipient fault (lower magnitude)
into the physical sensor

4.5

Fault detection time by FDIA (Sec)


4.48

4.46

4.44

4.42

4.4

4.38
0 1 2 3 4 5 6 7 8 9 10

Prediction Horizon, j

Figure 21b. Effect of prediction horizon for the amplitude change type incipient fault (higher magnitude)
into the physical sensor.
23.25
Fault detection time by FDIA (Sec)

23.2

23.15

23.1
0 1 2 3 4 5 6 7 8 9 10

Prediction Horizon, j

was analytical sensor. Fault flags and the output sensor though m-file. These two figures show
of the road wheel angle from the FDIA block are the nature of incipient fault as gradual increment
then recorded. with time. According to the proposed estimated
Persistent zero introduce fault was injected and predicted fault tolerant control methodology,
by making the sensor out a constant value. It these faulty signals were eliminated and the FDIA
was considered a faulty signal by the FDIA block output signals (Figures 19b and 20b) verify the
and was eliminated from the FDIA block output. efficiency of the GP based prediction.
Figure 19b shows the FDIA block output with the Now to show the effect of GP based prediction
removal of the fault from the system. with the different prediction horizons, it is con-
Figures 19a and 20a show the sensor signals venient to observer the effects with the incipient
of the amplitude change type incipient faults. fault. Because by definition the incipient fault is
These faults are introduced into the 2nd physical gradually increases with time, the consequence

38
Drive by Wire Systems

of prediction horizon is more prominent. Figures faulty signal tracking and noise reduction (Zheng
21a-b show the effect of prediction horizon for et al, 2006). Integrated control of various drive
the various magnitudes of amplitude change type by wire systems (e.g. TBW, BBW, SBW) is also
incipient fault. It illustrates that the fault detection being investigated for future application on DBW
time for incipient faults decreases significantly vehicles (Abe & Mokhiamar, 2007; Sameshima
with increase in the prediction horizon, thereby et al, 2004; Lu & Hedrick, 2005; Setlur et al,
improving the efficiency of fault detection. 2006). Robust sliding mode control of a throttle
This research work has demonstrated that it body for drive by wire operation of automotive
is possible to increase the level of robustness of a engines has been critical in the success of TBW
fault tolerant SBW system via successful imple- systems (Rossi et al, 2000).
mentation of SMO and GP based fault tolerant Future communication bus for DBW systems
control. In the present work, a nonlinear Sliding are also being developed and implemented (Sha-
Mode Observer (SMO) was designed and imple- heen et al, 2003). We will focus on the future trend
mented to estimate the road wheel angle with of this important DBW technology which is very
available sensor output of yaw angle and motor critical to the success of these systems.
input current. Through the proposed predictive Modern automotive system needs both time-
analytical redundancy based fault detection and triggered (e.g. FlexRay) and event-triggered (e.g.
isolation algorithm, an extra level of redundancy CAN) traffic. We analyze the relevant feature of
was possible without any extra hardware. The these communication buses below.
proposed algorithms rendered the SBW system
with a robust fault tolerant system as evidenced Controller Area Network (CAN):
by the simulation results. It was also observed • Very good in handling event-triggered traffic
that the reliability of the proposed methodology • Can be found on many places in a car, rang-
increases with the increase of prediction horizon ing from engine control and ABS-systems
as it reduces the detection time for the faulty to body and comfort systems
sensors. • Has also been extended with a time-trig-
gered session layer, as TT-CAN, to support
time-triggered traffic
FUTURE TRENDS • May provide a smooth transition using CAN
in the first generation “wet” DBW where a
Various drive by wire systems in the same vehicle hydraulic backup is used
may share a diversity of sensors and actuators • However, since it relies on the CAN lower
in order to bring down the overall system cost. layers, it is lacking fault-tolerant mecha-
This poses a unique challenge/opportunity for nisms and bandwidth capabilities
integration of all the sensory information via data
fusion methodologies that will take the analytical Time Triggered Protocol (TTP):
redundancy features of these systems to a new • Highly fault-tolerant network
level. In addition, integration of fault diagnosis • Intended for safety-critical systems such as
and control bring about new challenges since DBW and avionics
the control objectives and diagnosis objectives • Implemented fault tolerant mechanisms,
may have conflicting features. For example, in such as atomic broadcast using membership
an SBW system, the control objectives could be service, distributed clock synchronization
noise/disturbance rejection and command track- and bus guardians
ing whereas the diagnosis objective could be • Ensures that there can be no single point of
failure

39
Drive by Wire Systems

Figure 22. Application of communication bus protocols in a drive by wire vehicle

• Very deterministic at the cost of being less Although FlexRay is developed and mainly
flexible in terms of message transmissions intended for safety-critical communications such
• Weakness: Inflexible message transmis- as DBW, it is possible to use it in several other
sion automotive applications. The possible solution
is the implementation of higher-layer extensions
FlexRay: on top of FlexRay, which will make it suitable
• Allows for both time-triggered and event- for a broader class of automotive applications.
triggered message transmissions The higher-layer extensions could be especially
• Developed with safety-critical applications devised for better supporting dynamic traffic
in mind, just like TTP scenarios. Figure 22 illustrates an in-vehicle
• Hence, using FlexRay it is possible to de- network architecture with FlexRay. As shown,
velop both DBW systems and powertrain other non-time triggered communication buses
systems, reducing the need for several field can be used for non-safety critical applications
bus technologies (e.g. door locks, climate control).
• Has the biggest potential for becoming the Considering the most likely application do-
next generation automotive network for mains, mixed configurations will be dominant.
safety-critical fault-tolerant applications, Minislotting offers FlexRay with dynamic seg-
mainly because it is heavily backed up by ment capability. With FlexRay, the dynamic
industrial partners and pushed by most major segment is scheduled in a cyclic manner using a
industrial automakers minislotting technique similar to Byteflight. As
the dynamic segment is started, the minislotting

40
Drive by Wire Systems

mechanism is used to schedule the messages. In a certain value. Therefore some messages might
order for the minislotting mechanism to work, have to wait one or more communication cycles
all messages must have unique identifiers (IDs), in order to be scheduled. It should be noted here
like in CAN. Moreover, all nodes in the system that the slot-counters always begin with value 0
keep a slot-counter. As a dynamic segment is for all dynamic segments.
started, all slot counters are reset to 0 indicating In summary, FlexRay offers high speed time
the start of the first dynamic slot. Whenever a triggered communication. One of the constraints
node has a message with an ID matching the slot of current automotive electronic communications
counter, the node will send its message. Once systems is the limited bandwidth. For a start, the
the message has been sent, then all the nodes in FlexRay Consortium selected a data transfer rate
the system will detect a new dynamic slot and of 10 MBit/s on each of the two communication
increase their slot counters by one. If there is no channels as a viable trade-off between the need for
message transmitted within a short time D after high performance and the economic constraints.
the initiation of a dynamic slot, a new dynamic slot As the current FlexRay specification is open for
is detected and all the slot-counters are increased higher bit rates, faster physical layers are possible
again, etc. In this way messages are scheduled in the future.
in increasing order based on their IDs, serving FlexRay communication bus can also be
the lower value IDs first. Hence, a low value ID designed for fault-tolerance. Scalable system
gives a high priority to a message and thus a fault-tolerance can be achieved via the support of
higher chance of being transmitted. A dynamic either single or dual channels. Since the needs of
slot can be of varying size depending on the size automotive applications differ quite substantially
of the message transmitted in the dynamic slot. in terms of fault-tolerance, FlexRay can do the
However, the slot-counters might not reach their splits between distributed fault-tolerant and non
maximum value due to the fact that the dynamic fault-tolerant systems:
segment does not fit all possible messages. As
the dynamic segment is of fixed size, depending • Single-channel system (doubling the data
on the number of dynamic slots used and their throughput)
individual lengths, the slot-counter will only reach

Figure 23. (a) Composability based on ECU nodes; (b) Composability of data from different channels

(a) (b)

41
Drive by Wire Systems

Figure 24. Possible configuration of FlexRay bus architecture

• Dual-channel system (full redundancy) network until its shutdown. A time-triggered com-
• Dual-channel system with mixed connectiv- munication system depends upon a common time
ity (some nodes connect to both channels, base, the so-called global time. This time base has
some connect only to one) to be shared by all communication controllers in
the network. In order to synchronize the clock,
For safety-critical systems, communication certain messages are marked as synchronization
reliability cannot be based on probabilistic mea- messages in the static segment. By means of a
sures. A CAN system is not possible to calculate special algorithm, the local clock-time of a com-
the communication delay except for some high pri- ponent, for example, a communication controller,
ority message. FlexRay guarantees the transport is corrected in such a way that all local clocks run
for safety-critical message with known latency. synchronously to a global clock.
FlexRay offers deterministic system design. A bus guardian ensures that the data traffic
FlexRay combines a time-triggered along with moves in a timely fashion. Access to the com-
an event-triggered system. Based on an extended munication bus has to be carefully managed,
TDMA (time-division multiple access) media ac- especially with regard to safety relevant applica-
cess strategy, a so-called communication cycle is tions. An independent component that protects a
set up, consisting of a mandatory static segment, channel from interference is needed. It must limit
an optional dynamic segment and two protocol the times that any communication controller can
segments called symbol window (optional) and transmit to those pre-assigned intervals, in which
network idle time (mandatory). Application cycles it is allowed to do so. This component is the Bus
can be formed by one or more communication Guardian. Basically, FlexRay systems allow to use
cycles, which are executed from start-up of the bus guardians with independent clocks and are

42
Drive by Wire Systems

configured in a way that an error in the controller access and guarantees message latency. It offers
cannot influence the guardian and vice versa. Message oriented addressing via identifiers. Scal-
able system fault-tolerance is achieved via the
Composability support of either single or dual channels. It has
been chosen as the standard by most OEM’s.
As mentioned above, currently used systems are However, the following challenges still lie
event-triggered, which means that whenever a ahead with FlexRay development:
station has data to send it tries to access the bus.
Adding a new message is convenient to realize • New protocol with new hardware & im-
by assigning an identifier to it. The pitfall comes mature software tools
with the testing of such a system since any new • Little experience both internally and exter-
message or change of the application modifies the nally with the development of a FlexRay
behavior of the communication system. FlexRay communication system
puts a high demand on composability of the new • Nevertheless, internal development with
communication system. Both the static and dy- TTP system has provided a good basic
namic segments strictly adhere to the exclusive understanding of a real-time safety-critical
ownership of slots, a key foundation for the com- communication system
posability. As each ECU owns slots exclusively, it • Tedious definition of information transfer
is possible to develop ECUs autonomously and to using the FlexRay protocol
later integrate them without side effects. Figure • Entering into a real-time world where the
23 (a) and (b) illustrate the composability feature design and definition of our system is very
of FlexRay. different from past system designs
The final FlexRay system architecture may • Defining tasks to be executed within our
take the form shown in Figure 24. system
A number of vendors already started marketing • Defining worst-case execution times for
FlexRay systems. Some available hardware are: these tasks
• Defining offsets for the execution of tasks and
• National Instrument and Vector FlexRay deadlines when tasks should be complete
CARDBUS card • Must work closely with other suppliers to
• DeComsys FlexRay Node integrate into the overall FlexRay commu-
• dSPACE MicroAutoBox nication system of the vehicle
• Fujitsu Evaluation Kit
• TI DPS with FlexRay communication in- FlexRay System Design: Two Level
terface Design Approach
• Freescale integrated and stand-alone
FlexRay controllers 1. Cluster level design: At this design level,
the physical cluster layout, the subsystems
FlexRay Communication: Features and the interaction between the subsystems
and Challenges that Lie Ahead are defined. Start with system requirement.
Define the subsystems which are mapped
It offers a fault tolerant communication system to the nodes. Specify the signals provided
for advanced automotive control applications. by the subsystem, which are mapped to the
Fault-tolerant clock synchronization is achieved position of the FlexRay frame. Generate the
via a global time base. It offers Collision-free bus cluster specification.

43
Drive by Wire Systems

2. Component level design: At this level, the to be made between number of tasks and
precise subsystem interaction as specified complexity/switching overhead.
in the cluster design is defined. Start with • Communication cycle: The communication
subsystem requirement specified during cycle needs to meet the real time control
Cluster Level Design. Define the tasks that sampling time requirement. The cycle is
implement the behavior of the subsystem. also restricted by bus speed, the number of
The task specification must be consistent signals to be exchanged within the cycle, and
with the signal specification from the cluster number of tasks to be executed within the
design. Calculate the worst-case execution cycle. Considerable experiments need to be
time. conducted to validate final communication
cycle.
Some Design Considerations • Slot size: The larger the slot size, the fewer
low level buffer reads and writes required.
• Numbers of subsystems (nodes): It needs at With larger slot sizes, the receiver might get
least 4 nodes to make communication system many signals that it does not need, wasting
true fault tolerant. Increasing the number of buffer space. The proper slot size is applica-
nodes will increase the cost. Nodes should tion dependent, and is the judgment of the
be added only when it is necessary. system engineer.
• Numbers of tasks within the subsystem:
Number more available tasks gives the The culmination of a robust fault tolerant
designer more scheduling flexibility. More DBW system can be a drive by wire system that
tasks result in the schedule complexity and is designed based on FlexRay communication
increase switching overhead. Trade off has bus. One such design for steer by wire system is
illustrated in Figure 25.

Figure 25. FlexRay based distributed steer by wire control system

44
Drive by Wire Systems

CONCLUDING REMARKS REFERENCES

In what presented above, it is clear that drive Abe, M., & Mokhiamar, O. (2007). An integration
by wire systems have clear benefits over their of vehicle motion controls for full drive-by-wire
conventional counterpart in the area of safety vehicle. Proc. IMechE Part K: J. Multi-body
and performance. DBW systems can, in fact, Dynamics, 221, 117-127.
enhance the safety and performance of a vehicle
Anon (2003, December). Cutting down on the
equipped without any additional hardware, since
chips. Automotive Engineer, (pp. 48-51).
these enhancements can be achieved through
software upgrades. While drive by wire systems Anwar, S. (2005). Generalized Predictive Control
have made significant progress in fault tolerance of Yaw Dynamics of a Hybrid Brake-By-Wire
and reliability, these systems, particularly the Equipped Vehicle. International Journal of Me-
safety critical BBW and SBW systems, are still chatronics, 15(November), 1089-1108.
some steps away from full commercialization.
Anwar, S. (2006). Anti-Lock Braking Control
One of the main reasons for this is the high cost
of a Hybrid Brake-By-Wire System. Journal of
of these systems due to multiple redundancies in
Automobile Engineering – IMechE Proceedings
sensors, actuators, microcontroller, and commu-
Part D., 220(8), 1101-1117.
nications buses. As demonstrated in this chapter,
analytical redundancy / model based fault tolerant Anwar, S., & Chen, L. (2007). An Analytical
control can reduce the total number of redundant Redundancy Based Fault Detection and Isolation
components to certain extent. However, further Algorithm for a Road-Wheel Control Subsystem
reduction in the overall cost of the DBW system in a Steer-By-Wire System. IEEE Transactions on
may still be warranted so that the automakers Vehicular Technology, 56(5), 2859-2869.
and their suppliers can competitively price these
Bajpai, G., Chang, B.C., & Lau, A. (2001, Sep-
systems when compared with the conventional
tember). Reconfiguration of Flight Control Sys-
systems. The additional cost reduction can be
tems for Actuator Failures. IEEE AESS Systems
achieved via innovative actuator design, manu-
Magazine, (pp. 29-33).
facturing process optimization for microproces-
sors and communications buses, and inexpensive Chang, S. C. (2007). Adoption of state feedback
sensor development with diversity in the sensors. to control dynamics of a vehicle with a steer-by-
Historically the cost of microprocessors and com- wire system. Proc. IMechE Part D: J. Automobile
munication electronics have seen significant drop Engineering, 221, 1-12.
in cost year over year. Therefore, the introduction
Daniels, J. (2005). Practicalities. Automotive
of BBW and SBW systems in passenger vehicles
Engineer, 30(10), 33.
is almost certain. However, the timing of such
commercialization will largely depend on further Davis, B. (2001). Making the right connections.
research and development of these systems in Professional Engineering, February 28, (pp.
order to address the aforementioned challenges 36-39).
and the willingness of the automakers and their
suppliers to take on such a task to mass produce Fowler, D. (2003). Down to the wire. The Engi-
DBW systems. neer, (pp. 29-30).
Gadda, C. D., Laws, S. M., & Gerdes, J. C. (2007).
Generating Diagnostic Residuals for Steer-by-

45
Drive by Wire Systems

Wire Vehicles. IEEE Trans. on Control Sys. Tech., Lu, X-Y., & Hedrick, J. K. (2005). Heavy-duty ve-
15(3), 529-540. hicle modelling and longitudinal control. Vehicle
System Dynamics, 43(9), 653–669.
Haggag, S. Alstrom, D., Cetinkunt, S., & Egelja,
A. (2005). Modeling, Control, and Validation of Margolin, B. (1997). Analog, mixed-signal ICs
an Electro-Hydraulic Steer-by-Wire System for steering drive-by-wire toward reality. Computer
Articulated Vehicle Applications. ASME/IEEE Design, 36(12), 31-34.
Trans. on Mechatronics, 10(6), 688-692.
Oh, S-W., Chae, H-C., Yun, S-C., & Han, C-S.
Hasan, M. S., & Anwar, S. (2008). Sliding Mode (2004). The design of a controller for the steer-by-
Observer Based Predictive Fault Diagnosis of a wire system. JSME International Journal, Series
Steer-By-Wire System. Proceedings of the 17th C, 47(3), 896-907.
Int’l Federation of Automatic Control (IFAC)
Ross, P. (2003, February). Top Ten Techno-Cool
World Congress, Seoul, S. Korea.
Cars. IEEE Spectrum, (pp. 30-35).
Hebden, R. G., Edwards, C., & Spurgeon, S. K.
Rossi, C., Tilli, A., & Tonielli, A. (2000). Robust
(2004). Automotive steering control in a split-mu
Control of a Throttle Body for Drive by Wire Op-
maneuver using an observer based sliding mode
eration of Automotive Engines. IEEE Transactions
controller. Vehicle System Dynamics, 41(3), 181-
on Control System Technology, 8(6), 993-1002.
202.
Sameshima, H., Ogasa, M., & Yamamoto, T.
Higgins, A., & Koucky, S. (2002). Mercedes
(2004). On-Board Characteristics of Lithium Ion
pumps ‘Fly By Wire” brakes into new roadster.
Batteries for improving energy regenerative ef-
Machine Design, (p. 26).
ficiency. Quarterly report of RTRI, 45(2), 45-52.
Hoseinnezhad, R. (2006). Position Sensing in
Segawa, M., Kimura, S., Kada, T., & Nakano,
Brake-By-Wire Calipers Using Resolvers. IEEE
S. (2004). A study of the relationship between
Transactions on Vehicular Technology, 55(3),
vehicle behavior and the steering wheel torque on
924-932.
steer by wire vehicles. Vehicle System Dynamics,
Isermann, R., Schwarz, R., & Stolzl, S. (2002, Suppl. 41, 202-211.
October). Fault tolerant drive-by-wire systems.
Setlur, P. J., Wagner, R., Dawson, D. M., & Bra-
IEEE Control Systems Magazine, (pp. 64-81).
ganza, D. (2006). A Trajectory Tracking Steer-
Kendall, J. (2005). Current Technology. Com- by-Wire Control System for Ground Vehicles.
mercial Motor, 201(5117), 62-64. IEEE Transactions on Vehicular Technology,
55(1), 76-85.
Lee, A. (2003). Driven by wire. The Engineer,
5(8), 28-29. Shaheen, S., Heffernan, D., & Leen, G. (2003).
A comparison of emerging time-triggered proto-
Limpibunterng, T., & Fujioka, T. (2002). A new
cols for automotive X-by-wire control networks.
design approach for steer-by-wire system by dual
Proc. Instn Mech. Engrs Part D: J. Automobile
port system. Vehicle System Dynamics, Suppl.
Engineering, 217, 13-22.
37, 197-208.
Stanton, N., & Marsden, P. (1997). Drive-by-wire
Limpibunterng, T., & Fujioka, T. (2004). Bilateral
systems: some reflections on the trend to automate
driver model for steer-by-wire controller design.
the driver role. Proceeding of Inst. Mech. Engrs.
Vehicle System Dynamics, Suppl. 41, 381-390.
Part D, 211, 267-276.

46
Drive by Wire Systems

Wagstaff, I. (1999, April). Braking new ground. Steer-By-Wire System. International Journal
Automotive Engineer, (pp. 61-62). of Vehicular Technology, Article ID 859571,
doi:10.1155/2008/859571, 1-8.
Yih P., & Gerdes, J.C., Modification of Vehicle
Handling Characteristics via Steer-by-Wire. IEEE Zheng, B., Huang, M., Daugherty, B., & Anwar,
Trans. on Control Sys. Tech., 13(6), 965-976. S. (2006). Integrated Steer-By-Wire control and
diagnostic system. Proceedings of the American
Zheng, B., & Anwar, S. (2008). Fault Toler-
Control Conference, Minneapolis, Minnesota.
ant Control of the Road Wheel Subsystem in a

47
48

Chapter III
Electromagnetic Compatibility
Issues in Automotive
Communications
Todd H. Hubing
Clemson University International Center for Automotive Research, USA

ABSTtract

Engineers and engineering managers involved in the design of automotive electronic systems need to
have a basic familiarity with electronic noise and the electromagnetic compatibility (EMC) issues that
influence the design and the performance of automotive systems. When EMC issues are addressed early
in a product’s design cycle, the resulting designs often meet all EMC requirements without significant
cost or performance problems. EMC problems detected after a product has been built and tested, on the
other hand, can be very difficult and costly to fix. This chapter reviews automotive EMC requirements
and discusses the design of automotive electronics for EMC. The objective of the chapter is to provide
non-EMC engineers and engineering managers with basic information that will help them recognize
the importance of designing for electromagnetic compatibility, rather than addressing electronic noise
problems as they arise.

Introduction and fuel economy. They also navigate, entertain,


communicate and help to keep the driver and
There are more electronic systems in the average passengers safe and comfortable.
car than there are in the average house. Dozens Electromagnetic interference is a significant
of computers, connected to sensors and actuators concern to the automotive system designer.
through kilometers of wiring, control everything Packing all of these electronic systems in close
from the engine to the brakes. Electronic systems proximity and getting them to function reliably
determine the vehicle’s performance, handling, in all possible situations is becoming increas-

Copyright © 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Electromagnetic Compatibility Issues in Automotive Communications

ingly difficult. Microcontroller circuits generally standards are developed and maintained by an-
operate at radio frequencies. They emit radio other international standards organization, the
frequency noise and are susceptible to radio International Electro-Technical Committee (IEC).
frequency fields. In an automotive environment, Various IEC standards describe procedures for
electronic systems must be able to function in evaluating the susceptibility of a vehicle or com-
the presence of intentional radio transmitters ponent to various disturbances such as strong RF
that are mounted on the vehicle, located along (radio frequency) fields, power bus transients, and
the vehicle’s route, or carried into the vehicle by electrostatic discharge.
the driver or passengers.
This chapter provides an overview of the elec- CISPR 12
tromagnetic compatibility requirements that au-
tomobiles must meet. Significant electronic noise According to the introduction in the standard,
sources and coupling paths are described, and “CISPR 12 has been developed to serve the road
aspects of the major automotive communication vehicle and related industries with test methods
buses that affect electromagnetic compatibility are and limits that provide satisfactory protection
reviewed. The chapter concludes with a discussion for radio reception.” It is designed to protect
of design features that affect the electromagnetic broadcast receivers operating at frequencies
compatibility of automotive systems. between 30 MHz and 1 GHz from unintentional
electromagnetic emissions from a vehicle located
10 meters or more away. The standard applies to
AutomotiC REQUuir automobiles, trucks and boats, but not to aircraft
or trains.
In order to help ensure that a vehicle will not The test procedure calls for the vehicle to be
have problems with electromagnetic interference, parked in a flat area free of buildings, trees or
extensive electromagnetic compatibility (EMC) other objects that might reflect electromagnetic
testing of each model is performed as the vehicle fields, as illustrated in Figure 1. Electromagnetic
and its components are being developed. There are emissions from the vehicle are measured with an
a number of EMC test standards for automobiles. antenna located 10 meters away. Measurements
The most widely referenced standards for unin- are made with the vehicle’s engine idling at 1500
tentional electromagnetic emissions from vehicles RPM, and also with the engine off but the rest
are known as CISPR 12 (IEC, 2008) and CISPR of the vehicle powered on. Electric propulsion
25 (IEC, 2002). CISPR, which is an acronym for vehicles are measured on a dynamometer. For
Comité International Spécial des Perturbations hybrid vehicles, a separate test is performed for
Radioélectriques, is an organization that develops each form of propulsion.
and supports a variety of international standards Making electromagnetic measurements in an
governing EMC. CISPR 12 defines test procedures open field presents a few technical challenges
and emission limits for radiated emissions from including weather and ambient noise from local
vehicles. CISPR 25 defines conducted and radiated transmitters such as radio and television stations.
emissions tests for vehicular components. For this reason, the CISPR 12 standard allows
CISPR 12 and CISPR 25 only address elec- these measurements to be made in an absorber
tromagnetic emissions. There are no CISPR stan- lined shielded enclosure (ALSE) provided these
dards for evaluating the susceptibility of vehicles measurements can be shown to correlate to open
or components to electromagnetic disturbances. field measurements. Most large automotive manu-
Electromagnetic susceptibility (or immunity) facturers operate or lease an EMC test facility
with an ALSE.

49
Electromagnetic Compatibility Issues in Automotive Communications

Figure 1. CISPR 12 Radiated emissions test configuration

ANTENNA

10 METERS

EMITEST RECEIVER

CISPR 25 Bench-top tests are done on a 0.9-meter


tall table with a metal top located in a shielded
The CISPR 25 standard is designed to evaluate room as illustrated in Figure 2. The bench top is
the conducted and radiated emissions from indi- bonded to the wall or floor of the shielded room
vidual components and systems within a vehicle. and the equipment under test (EUT) is placed on
It covers frequencies from 150 kHz to 1 GHz and the table. Both the EUT and its wiring harness
includes an in-vehicle test procedure as well as are insulated from the bench top by a 5-cm thick
bench-top tests. sheet of dielectric material. The EUT is powered
For the in-vehicle test, the test receiver is through an artificial network (AN) that provides
connected to an antenna mounted on the vehicle. a stable well-defined power bus impedance at
This antenna is an existing radio antenna when measurement frequencies. Another box attached
measurements are made at frequencies within to the wiring harness emulates all the sensors,
the radio receiver bandwidth. Out-of-band test- actuators and communication devices needed to
ing is done with a monopole antenna mounted operate the EUT.
in the same location. Each electronic system be- CISPR 25 describes four bench-top tests, two
ing evaluated is powered on and operated while that measure conducted emissions from the EUT
monitoring the voltage induced at the antenna and two that measure radiated emissions. The
terminals. If the voltage exceeds the limit speci- EMC test plan for a particular product may call
fied in the standard, the system under evaluation for all or a subset of these tests to be performed. In
is non-compliant. one of the conducted emissions tests, the voltage

Figure 2. CISPR 25 radiated emissions ALSE test configuration

ALSE

ANTENNA

AN EUT
1 METER

EMITEST RECEIVER

50
Electromagnetic Compatibility Issues in Automotive Communications

on each wire in the wiring harness is measured cell and configured in basically the same way
relative to the ground plane. In the other conducted that it would be configured on the bench top.
test, the common-mode (i.e. net) current flowing The test receiver measures the voltage induced
on the wiring harness is measured. at the TEM cell termination and this voltage is
The two radiated emissions tests do not actu- compared to the limit specified in the standard.
ally measure radiated emissions directly. In the CISPR 25 specifies two possible configurations
first test, called “Radiated Emissions – ALSE for the wiring harness, one that emphasizes emis-
Method,” the EUT is set up on the bench top as sions from the harness and one that minimizes
described above and measurements are made with the contribution from the harness.
an antenna located 1 meter away in the shielded Like the ALSE tests, TEM cell measurements
room. Measurements made between 150 kHz and do not directly measure radiated emissions. In-
30 MHz are done with a short monopole antenna stead they measure the electric and magnetic field
mounted in a narrow ground plane that extends coupling to the TEM cell. These measurements
out from the bench top. Between 30 MHz and generally do not correlate with the results of true
200 MHz, a biconical antenna is used. Above radiated emissions tests, but they can provide
200 MHz, a log-periodic dipole array antenna useful information about the nature of the field
is employed. At a 1-meter test distance, none of coupling from the EUT, e.g. (Tippet & Chang,
these antennas is in the radiated far-field of the 1976), (Crawford & Workman, 1980), (Sreeniva-
EUT and its harness; therefore this procedure does siah et. al, 1981), and (Deng et. al., 2007).
not measure the actual radiated field strength.
However, the voltage measured at the antenna Susceptibility (Immunity) Tests
terminals is an indication of the field strength
at the antenna location, which (in many cases) As indicated earlier, there are a number of pub-
correlates to the likelihood that a particular EUT lished test procedures for evaluating the suscepti-
will be the source of a radiated emissions problem bility of electronic components to electromagnetic
in the vehicle. disturbances. The International Standards Organi-
The second radiated emission test defined in zation (ISO) maintains a number of standards for
CISPR 25 employs a device known as a TEM evaluating the performance of vehicles or vehicle
cell. TEM is an acronym for “Transverse Electro- components when subjected to electromagnetic
Magnetic” and a TEM cell is a large waveguide interference. For example, (ISO 11452-2, 2005)
designed to support only TEM mode propagation and (ISO 11452-3, 2001) describe ALSE and TEM
at frequencies below a cut-off frequency deter- cell RF immunity tests with test configurations
mined by the dimensions of the cell. As indicated similar to the CISPR 25 bench-top and TEM cell
in Figure 3, the EUT is placed inside the TEM tests. A transmitter drives the antenna (Figure 4)

Figure 3. CISPR 25 radiated emissions TEM cell test configuration

EUT
EMI TEST RECEIVER

51
Electromagnetic Compatibility Issues in Automotive Communications

Figure 4. ISO 11452-2 radiated immunity test set-up

ALSE

ANTENNA

AN EUT

SIGNAL GENERATOR

AMPLIFIER

or TEM cell to produce a strong EM field in the popular in the automotive industry, because most
vicinity of the EUT. The strength of the applied automotive components are connected to a wir-
field is increased until the limit is reached or a ing harness and most EM susceptibility problems
failure is observed. The limit depends on how result from noise brought into the component
critical the EUT is and what type of failure oc- through the harness.
curs. Minor “annoyance” failures may be allowed The waveforms used for the component-level
at relatively low field strengths, but failures that susceptibility tests described above are continuous
might affect the safety of the vehicle occupants wave (CW) signals that are swept in frequency
must not occur even when the applied field strength with different forms of modulation. (ISO 7637-2,
is relatively high. 2004) and (ISO 7637-3, 2007) describe transient
(ISO 11452-4, 2005) describes a bulk current immunity tests, where the noise coupled to the har-
injection (BCI) test, where common-mode current ness is short pulses. (ISO 10605, 2008) describes
is injected on the wiring harness, as illustrated in an electrostatic discharge (ESD) test, where a
Figure 5. This type of immunity testing is very simulator is used to create very short transients that

Figure 5. ISO 11452-4 bulk current injection test set-up

SIGNAL GENERATOR
EUT

AMPLIFIER

AN

52
Electromagnetic Compatibility Issues in Automotive Communications

Table 1. ISO EM susceptibility test standards


Document Number Title
ISO 11451-2 Road vehicles — Vehicle test methods for electrical disturbances from narrowband radiated electromagnetic
energy — Part 2: Off-vehicle radiation sources
ISO 11451-3 Road vehicles — Electrical disturbances by narrowband radiated electromagnetic energy — Vehicle test methods
— Part 3: On-board transmitter simulation
ISO 11451-4 Road vehicles — Vehicle test methods for electrical disturbances from narrowband radiated electromagnetic
energy — Part 4: Bulk current injection (BCI)
Road vehicles — Component test methods for electrical disturbances from narrowband radiated electromagnetic
ISO 11452-2
energy — Part 2: Absorber-lined shielded enclosure
Road vehicles — Component test methods for electrical disturbances from narrowband radiated electromagnetic
ISO 11452-3
energy — Part 3: Transverse electromagnetic mode (TEM) cell
Road vehicles — Component test methods for electrical disturbances from narrowband radiated electromagnetic
ISO 11452-4
energy — Part 4: Bulk current injection (BCI)
Road vehicles — Component test methods for electrical disturbances from narrowband radiated electromagnetic
ISO 11452-5
energy — Part 5: Stripline
Road vehicles — Component test methods for electrical disturbances from narrowband radiated electromagnetic
ISO 11452-7
energy — Part 7: Direct radio frequency (RF) power injection
Road vehicles — Component test methods for electrical disturbances from narrowband radiated electromagnetic
ISO 11452-8
energy — Part 8: Immunity to magnetic fields
Road vehicles — Electrical disturbances from conduction and coupling — Part 2: Electrical transient conduction
ISO 7637-2
along supply lines only
Road vehicles — Electrical disturbance by conduction and coupling — Part 3: Vehicles with nominal 12 V or 24 V
ISO 7637-3 supply voltage — Electrical transient transmission by capacitive and inductive coupling via lines other than supply
lines
ISO 10605 Road vehicles — Test methods for electrical disturbances from electrostatic discharge

are conductively coupled to all exposed metallic OEM-Specific Requirements


contact points on the EUT. Table 1 lists various
automotive electromagnetic susceptibility test The CISPR, ISO and SAE EMC standards are
standards published by ISO. based on test practices developed by automotive
The Society of Automotive Engineers (SAE) companies to meet specific internal requirements.
also develops and maintains automotive EMC They are the result of many compromises and they
standards. The American National Standards have evolved slowly over the years. Most automo-
Institute (ANSI), which represents the United tive companies adapt or supplement these proce-
States on international standards committees, dures to meet their specific needs. For example, it
has delegated their automotive standards writing is not uncommon for an automotive manufacturer
activity to SAE. Many components of the CISPR to specify different test environments, test limits
and ISO automotive EMC standards were initially or excitation waveforms from those specified in
published as SAE standards. For this reason, there the standards. Because of this, test laboratories
is a great deal of overlap between the SAE stan- that make EMC measurements for one automotive
dards and other international standards. However, company may not be able to make the same type
there are distinct differences that prevent similar of measurements for another company.
standards from being used interchangeably. SAE Many factors affect the electromagnetic cou-
Vehicular EMC Standards are listed in Table 2. pling to and from an electronic system. Small
variations in cable position, load impedance or

53
Electromagnetic Compatibility Issues in Automotive Communications

Table 2. SAE EM susceptibility test standards


Document Number Title
SAE J551-11 Vehicle Electromagnetic Immunity—Off-Vehicle Source
SAE J551-12 Vehicle Electromagnetic Immunity—On-Board Transmitter Simulation
SAE J551-13 Vehicle Electromagnetic Immunity—Bulk Current Injection
SAE J551-15 Vehicle Electromagnetic Immunity—Electrostatic Discharge (ESD)
SAE J551-16 Vehicle Electromagnetic Immunity—Reverberation Chamber Immunity
SAE J551-17 Vehicle Electromagnetic Immunity—Power Line Disturbances
SAE J1113/1 Electromagnetic Compatibility Measurement Procedures and Limits for Components of Vehicles, Boats (Up to 15
M), and Machines (Except Aircraft) (50 Hz to 18 GHz)
SAE J1113/2 Electromagnetic Compatibility Measurement Procedures and Limits for Vehicle Components (Except Aircraft)—
Conducted Immunity, 15 Hz to 250 kHz—All Leads
SAE J1113/3 Conducted Immunity, 250 kHz to 400 MHz, Direct Injection of Radio Frequency (RF) Power
SAE J1113/4 Immunity to Radiated Electromagnetic Fields-Bulk Current Injection (BCI) Method
SAE J1113/11 Immunity to Conducted Transients on Power Leads
SAE J1113/12 Electrical Interference by Conduction and Coupling—Capacitive and Inductive Coupling via Lines Other than
Supply Lines
SAE J1113/13 Electromagnetic Compatibility Measurement Procedure for Vehicle Components—Part 13: Immunity to Electro-
static Discharge
SAE J1113/21 Electromagnetic Compatibility Measurement Procedure for Vehicle Components—Part 21: Immunity to Electro-
magnetic Fields, 30 MHz to 18 GHz, Absorber-Lined Chamber
SAE J1113/24 Immunity to Radiated Electromagnetic Fields; 10 kHz to 200 MHz—Crawford TEM Cell and 10 kHz to 5
GHz—Wideband TEM Cell
SAE J1113/26 Electromagnetic Compatibility Measurement Procedure for Vehicle Components—Immunity to AC Power Line
Electric Fields
SAE J1113/27 Electromagnetic Compatibility Measurements Procedure for Vehicle Components—Part 27: Immunity to Radiated
Electromagnetic Fields—Mode Stir Reverberation Method
SAE J1113/28 Electromagnetic Compatibility Measurements Procedure for Vehicle Components—Part 28—Immunity to Radi-
ated Electromagnetic Fields—Reverberation Method (Mode Tuning)
SAE J1113/42 Electromagnetic Compatibility—Component Test Procedure—Part 42—Conducted Transient Emissions

test environment for example can result in large Sourcof NOISE


changes in the coupled energy at any given fre-
quency. For this reason, it is not uncommon for No other consumer product packs as many inde-
a system tested in one lab to perform much dif- pendently designed sources of electronic noise
ferently than the same system tested in another in such close proximity as the automobile. The
lab. Also, since the laboratory test environment intentional transmitters in a vehicle (e.g. cell
is different from the environment in which the phones, citizen’s band radios and wireless com-
system will ultimately be installed, a system munications equipment) are responsible for their
which does well in a component-level test may share of electromagnetic interference; however
still cause a failure in the vehicle-level test. the electrical noise generated by the engine and
Nevertheless, component level testing helps to the hundreds of communications and control cir-
identify EMC problems early in the design stage cuits in a vehicle can be an even greater source of
when it is still possible to make changes that electromagnetic compatibility problems.
do not significantly impact the product cost or
development schedule.

54
Electromagnetic Compatibility Issues in Automotive Communications

Microprocessors actuator, as illustrated in Figure 6. The primary


advantage of this technique is that relatively little
There are dozens of microcontrollers, digital sig- power is dissipated in the switching device (which
nal processors and other kinds of microprocessors is always full-on or full-off) and therefore it is
in a typical passenger car. Each processor’s speed possible to build relatively efficient controllers.
is determined by a digital clock that typically However, PWM signals are a major source of
switches at a frequency between a few megahertz electromagnetic interference in automobiles. Con-
(106 times per second) and a few gigahertz (109 trolling an actuator with a DC amplitude setting
times per second). Energy at the clock frequency generates very little high-frequency energy. PWM
and harmonics of the clock frequency is coupled signals, on the other hand, generate significant
to virtually every electrical conductor near or amounts of energy at the switching frequency and
connected to the processor. The power gener- at harmonics of the switching frequency. The fast
ated at any given frequency associated with a transition times required for efficient switching
clock is generally on the order of milliwatts (10 -3 of PWM signals can result in significant amounts
watts) and most of this power is delivered to its of energy being created at frequencies that are
intended destination and ultimately dissipated 100 (or more) times higher than the switching
as heat. However, a few nanowatts (10 -9 watts) of frequency. High-frequency energy is much more
radiated power are typically all that is necessary easily coupled from one circuit to another and
to interfere with intentional radio receivers in much more likely to interfere with radio receivers
or near a vehicle. Therefore great care must be and wireless communication.
taken to control or contain the energy generated
by the clocks and signals associated with every Power Bs Noise
microprocessor in the vehicle.
Even when the digital or PWM signals are care-
PWM Signals fully routed and isolated from other circuits, the
active devices that produce these signals must
A common way to transfer continuously variable draw current from the power supply. Switching
levels of power to automotive actuators (e.g. the devices tend to draw power from the supply in
brightness of an LED, the position of a valve, or the short bursts. These bursts of current and the
speed of a motor) is using pulse width modulated corresponding dips in supply voltage can be
(PWM) signals. Instead of varying the amplitude propagated in an automobile’s power distribution
of a DC signal, PWM signals transmit pulses bus, causing the bus to become a major conduit
that switch between 0 and a constant amplitude for electromagnetic interference. CISPR 25
at a fixed frequency. The width of the pulses de- specifies limits on the amount of noise that any
termines the amount of power transferred to the given component is allowed to put on the power

Figure 6. PWM representation of an analog signal

V V

t t

55
Electromagnetic Compatibility Issues in Automotive Communications

bus. Nevertheless, anyone who has ever used an The EMC standards described in the first sec-
oscilloscope to measure the voltage on the power tion of this chapter are designed to emulate as many
bus wiring in a modern automobile knows that types of external sources as possible. However,
spikes, dips, bursts and periodic high-frequency the electromagnetic environment is constantly
noise are common occurrences. changing and it is difficult to anticipate every
situation. Also, automotive manufacturers must
Engine Noise balance the cost of designing for every possible
situation against the impact of specific types of
The electronic ignition circuitry in internal com- EMC-related failures in their market.
bustion engines generates sharp pulses that can
be detected everywhere within and around the
vehicle and can be especially strong in the engine EM COUPLING Path
compartment. Similarly, vehicles with electric
drives employ motor controllers that generate Before discussing the relative advantages and dis-
very fast, high-current PWM signals. This type advantages of one automotive design over another,
of noise can be difficult to deal with because the it is important to have a basic understanding of
total amount of energy and the frequency content how electromagnetic energy is coupled to or from
of these signals depend on many factors including electronic systems. Electromagnetic coupling can
the engine speed and load. be divided into 4 categories:

External Noise Sources • Conducted coupling


• Electric-field coupling
The list of external noise sources that a vehicle • Magnetic-field coupling
might encounter is virtually endless, because cars • Radiated field coupling
and trucks are used for many different purposes
and are driven in a wide variety of environments. The type of coupling most likely to occur
External sources known to have caused automo- depends on the frequency of the source, the
tive EMC problems include: impedances of the source and victim, and the
proximity of the source and victim. Once a circuit
• Radio and TV towers is understood well enough to know which types
• Overhead power transmission lines of EM coupling are likely to be a problem, it is
• Electrostatic discharge generated by the much easier to make design decisions that will
occupants minimize the chances of having an electromag-
• Electrostatic discharge generated by the netic interference problem.
vehicle-road interface
• Amateur radio equipment installed in the Conducted Coupling
vehicle
• CB or fleet communications radios installed Conducted coupling (also called common-imped-
in the vehicle ance coupling) can only occur when there are at
• Police radar least two conductors connecting the source to
• Nearby lightning strikes the victim. Examples of conducted coupling in
• Cell phones in or near the car an automobile include:

56
Electromagnetic Compatibility Issues in Automotive Communications

• Lights dimming or systems resetting when path with a finite impedance (in this case, the
the starter is engaged battery resistance). Conducted coupling can also
• Power bus noise due to a motor controller occur between two systems that both use body
being heard as static in the radio surface metal as their “ground” conductor. Cur-
• Damage to an ECU occurring as a result of rents from one system flowing in the body surface
arc welding on the vehicle metal induce voltages across the metal that can
affect the operation of other circuits that use the
Figure 7 shows an example of how conducted body surface metal as a “zero-volt” reference.
coupling occurs. In this case, two systems in the Conducted coupling tends to dominate at low
automobile share the same current return conduc- frequencies and is the only type of electromag-
tor (the body of the vehicle). When the starter is netic coupling that can occur at DC. Conducted
engaged, it draws 20 amps of current from the interference problems are usually solved by
battery causing the battery voltage at the terminals reducing the current in the “culprit” circuit or
to drop to 6 volts. Other systems powered by the by separating (isolating) the current paths in the
same battery must be able to function with an culprit and victim circuits.
input of only 6 volts for a second or two while the
engine is cranking. Any problems resulting from Electric-Field Coupling
this momentary drop in power supply voltage are
EMC problems. Electric-field coupling (also called capacitive
In the starter motor example, the two conduc- coupling) is most likely to occur between high-
tors are the power and ground conductors. Con- impedance circuits. An example of electric-field
ducted coupling occurs because both the source coupling in an automobile is shown in Figure 8.
and the victim circuits share a conducted circuit A few electric field lines from a high-voltage igni-

Figure 7. Conducted coupling example

OTHER
SYSTEMS OTHER
SYSTEMS
STARTER
BATTERY MOTOR

B ATTE R Y

0 .3 O H M S
IG N ITIO N
S W ITC H
12 V +
-
R > > 0 .3 O H M S
O TH E R S TA R TE R
S Y S TE M S M O TO R
0 .3 O H M S

57
Electromagnetic Compatibility Issues in Automotive Communications

Figure 8. Electric-field coupling example


ANTENNA

RADIO

IGNITION

CM

V (t) V N O IS E

IG N ITIO N E LE C TR IC -FIE LD R A D IO
C IR C U ITR Y C O U P LIN G R E C E IV E R

tion circuit terminate on the AM radio antenna. lines emanating from the culprit circuit. The shield
Schematically, this can be represented by a mutual must be grounded to the culprit circuit’s refer-
capacitance as illustrated in the lower part of ence conductor in order to effectively terminate
Figure 8. The current induced in the AM radio the field lines.
receiver is proportional to C times dV/dt, where We could have protected the AM radio from
C is the mutual capacitance and dV/dt is the time this culprit and others by surrounding the antenna
rate of change of the excitation voltage. with a metal shield and grounding it to the AM
Electric-field coupling problems are gener- radio’s reference conductor. However, this would
ally solved by reducing the mutual capacitance have affected the antenna’s ability to perform its
between the culprit and the victim. This can be intended function. Whether it is better to shield the
accomplished by increasing the distance between culprit or victim depends on many factors includ-
the two circuits or by shielding. It is important to ing cost and convenience, but the shield should
note that electric-field shielding is different from always be grounded to the reference conductor
magnetic-field shielding or enclosure shielding. that most effectively diverts the field lines.
The goal of an electric field shield is to terminate
or redirect electric field lines before they reach Magnetic-Field Coupling
the victim circuit. Figure 9 shows an example of
how a shield might be used to eliminate the AM Magnetic-field coupling (also called inductive
radio interference illustrated in Figure 8. A metal coupling) is most likely to occur when the culprit
shield (in this case a metal hood) is placed in a is a low-impedance (high current) circuit. Figure
position where it can intercept the electric field

58
Electromagnetic Compatibility Issues in Automotive Communications

Figure 9. Electric-field shielding example

ANTENNA

RADIO

IGNITION

C CM
HO O D

V (t) V N O IS E
HOOD

IG N ITIO N E LE C TR IC -FIE LD R A D IO
C IR C U ITR Y C O U P LIN G R E C E IV E R

Figure 10. Magnetic-field coupling example 10 shows an example of magnetic-field coupling


between a motor driver and an audio circuit on
a printed circuit board. Lines of magnetic flux
passing through the circuit loop induce a voltage
in the loop that appears across the input of the
audio amplifier. A schematic representation of this
coupling is shown in the lower part of Figure 10.
In this case, the voltage induced across the ampli-
fier input is proportional to M dI/dt, where M is
the mutual inductance between the culprit circuit
and the victim circuit and dI/dt is the time rate of
change of the current in the culprit circuit.
The mutual inductance can be reduced by
increasing the distance between the culprit and
I(t) V N O IS E victim or by diverting the magnetic flux lines with
a shield. Unlike electric field lines, magnetic flux
lines can’t be terminated on a conductor (or any
M O TO R LO O P A R E A
CURRENT O F C IR C U IT other material). Since they cannot be terminated,
M A G N E TIC -FIE LD
they must be diverted. One of the best ways to
C O U P LIN G divert low-frequency magnetic flux lines is to use
steel (or a similar material with high magnetic
permeability). Lines of magnetic flux prefer to

59
Electromagnetic Compatibility Issues in Automotive Communications

Figure 11. Low-frequency magnetic-field shielding that are induced in these conductors. The eddy
with magnetic material currents produce their own magnetic flux that op-
poses the flux creating the eddy currents. The net
effect is that higher frequency lines of magnetic
flux will flow around plates made of materials that
are good conductors (e.g. aluminum or copper).
Consider, for example, a magnetic interference
problem between a PWM dome light circuit
switching at 200 kHz and a nearby circuit board
as illustrated in Figure 12. At 200 kHz, eddy cur-
rents induced in the copper plane of the circuit
board are sufficient to divert the magnetic flux
lines and prevent an interference problem.

Radiated Field Coupling

Many people confuse radiated field coupling with


electric or magnetic field coupling. In fact, the
Figure 12. High-frequency diversion of magnetic automotive EMC standards divide all tests into two
field lines due to eddy currents categories, conducted and radiated, without any
attempt to describe the specific type of coupling
being measured. However, in order to properly
design and troubleshoot for EMC, it is essential
to distinguish electric and magnetic field coupling
from truly radiated coupling.
Radiated field coupling can only occur when
the victim circuit is not in the near field of the
culprit circuit. This generally means the victim
circuit must be approximately a wavelength
away (or farther) from the culprit. At 100 MHz,
a wavelength in air is 3 meters. This means that
radiated field coupling between circuits in an
automobile is not likely to occur at frequencies
travel through steel rather than air when given below 100 MHz. Low frequency coupling will be
the opportunity. As indicated in Figure 11, shields predominantly electric or magnetic field coupling
made of steel can effectively divert magnetic flux and all circuits and shields should be designed
lines from a victim circuit when properly oriented. to minimize the type of coupling most likely to
Note that simply putting a steel plate above or occur based on the impedance and environment
below the circuit would be relatively ineffective, of the systems involved.
because the magnetic flux lines would simply Radiated field coupling requires an “antenna”
pass through the plate to the other side. of some kind on both the culprit and victim cir-
At higher frequencies (e.g. 100s of kHz to cuits. Relatively efficient antennas may take the
MHz), magnetic flux lines are reluctant to flow form of wires or other metallic objects. They can
through large conductors due to “eddy currents” be made of copper, aluminum, steel or virtually

60
Electromagnetic Compatibility Issues in Automotive Communications

any highly conductive material. They can be are held to the same potential. This generally
bare metal or covered in plastic, but they all have means all wires, shields, heatsinks and enclo-
one thing in common; efficient antennas are not sures should be bonded together, and all power
small relative to the wavelengths they radiate. In and signal wires should have a high-frequency,
fact, an efficient antenna must drive one metallic low-impedance connection to these metal parts.
object with a voltage relative to another metallic The more high-frequency circuitry that is located
object and NEITHER object can be very small between two metal objects, the more well-bonded
relative to a wavelength. This means that good or filtered those objects have to be. It is also a good
antennas at frequencies below a few GHz will be idea to limit the frequency content of your circuits.
large enough to easily spot. Higher frequencies have shorter wavelengths and
Radiated emissions from automotive compo- are therefore efficiently radiated by more of metal
nents are usually the result of common-mode cur- objects in the vehicle.
rents induced on the wiring harnesses. Common- Shielding to prevent radiated emissions or
mode currents can be unintentionally induced on susceptibility can be difficult. It is generally
a wiring harness in two ways; differential signals necessary to completely surround the culprit or
on a harness can be transformed into common- victim circuits with an enclosure that has no large
mode currents by imbalances (asymmetries) in the apertures or seams. All wire penetrations through
harness structure or the signal source; or, electric the enclosure must be carefully filtered. This is
or magnetic fields generated by the source can a common practice in military vehicles, but not
produce a voltage between the harness and the in automobiles. Partial shields or shields with
component that drives common-mode current significant apertures, seams or unfiltered wire
on the cable. At frequencies above 30 MHz, a penetrations can actually increase the radiated
few microamps of common-mode current can be emissions from a circuit board by providing the
sufficient to cause radiated emissions that exceed large metal objects needed to create an efficient
some radiated emissions limits. antenna.
The best way to minimize the chances of pro- Table 3 lists a few design guidelines that can
ducing excessive radiated emissions is to make help to reduce the chances of having a radiated
sure all of the large pieces of metal in your design emissions problem. However, successfully design-

Table 3. EMC design guidelines

Design Guideline #1: Mini- Digital circuit designers like to think of signals in terms of voltage. Signal integrity and EMC engineers
mize the loop areas associated must think of signals in terms of current. Signal currents always flow in loops. Keep these loops as
with high-frequency power small as possible.
and signal currents.
Design Guideline #2: Do not The safest rule-of-thumb is to provide one solid plane for returning all signal currents. In situations
split, gap or cut the signal where it is expected that a particular signal is susceptible or is capable of interfering with the other cir-
return path cuits use a dedicated trace or wire to return that current to its source. Do not try to implement a scheme
that “worked” in someone else’s “similar” design.
Design Guideline #3: Don’t High-speed circuitry located between connectors on a printed circuit board can easily develop potential
Locate high-speed circuitry differences of a few millivolts or greater between the connectors. These voltages can drive currents
between connectors on a onto attached cables causing a product to exceed radiated emissions requirements.
printed circuit board
Design Guideline #4: Control A well-formed digital signal will have a significant amount of power in the lower harmonic frequen-
signal transition times cies, but not so much power in the upper harmonics. Power in the upper harmonic frequencies is best
controlled by controlling the transition times in digital signals.

61
Electromagnetic Compatibility Issues in Automotive Communications

ing and integrating the myriad electronic systems matched resistance at both ends. As a result, CAN
in modern automobiles cannot be accomplished signals are relatively unaffected by noise currents
by simply following a few design guidelines. It flowing in the ground structure. They are also less
is important to hold regular design reviews with likely to produce significant radiated emissions,
engineers who specialize in automotive EMC. since the currents flowing in each signal wire are
equal in amplitude and opposite in sign.
CAN communications employ Cyclic Re-
EMC ISSUES Wwith AUTutomoti dundancy Checks (CRCs) and all messages are
NETtwork acknowledged by the recipient. In the event that
transient electrical noise does couple to the circuit
The dozens of microprocessors in the typical and cause a data error, these features reduce the
automobile must be able to exchange electronic likelihood of a communication failure.
information with various sensors, actuators and Figure 13 shows a basic CAN bus layout. EMC
other microprocessors. This information can problems due to conducted coupling are rare in
be conveyed by an analog signal level, a PWM properly implemented CAN bus systems because
signal, or digitally using one of the many data the bus is isolated from the ground structure. How-
communications network protocols developed for ever individual nodes can be disabled by conducted
automotive applications. There are many factors interference, and improperly designed nodes can
to consider when choosing an appropriate network introduce high-frequency noise on the bus that is
for a given communications task including the ultimately radiated by the bus or by other nodes
amount of data, the importance of the data, and on the bus. CAN bus implementations should be
the cost of hardware necessary to implement the tested to ensure that each side of the bus wiring
network. Electromagnetic compatibility is also has the same high impedance to ground when all
a significant factor in this decision. This section terminations and nodes are connected.
discusses design aspects of each of the major
automotive networks that have an impact on Local Interconnect Network (LIN)
electromagnetic compatibility.
The LIN bus was developed in the late 1990s as
Controller Area Network (CAN) a lower-cost, lower-weight alternative to CAN. It
employs a single-ended (as opposed to differential)
The CAN bus, developed in the mid-1980s, can be signaling scheme, so it only requires one signal
found in virtually every automobile manufactured wire, as illustrated in Figure 14. Signal voltages
today. It is also used in non-automotive applica- are referenced to the ground structure (usually the
tions such as factory automation and aerospace vehicle frame) and signal currents return to the
systems. The need to send and receive digital sig- driver on this structure. LIN signals can also be
nals reliably in an electrically noisy environment transmitted over existing wires, such as a vehicle’s
was a significant factor driving the design of the power distribution wiring.
CAN bus. CAN bus signal drivers and receivers Since LIN bus data rates are less than 20
employ a balanced, differential interface. The Kbps, radiated emissions are not a significant
signals are represented as voltage differences problem. There is simply not enough power in
between two signal carrying wires rather than as LIN bus signals at frequencies high enough to
voltages relative to a reference ground. Both signal radiate efficiently. However, since the LIN bus
carrying conductors have the same impedance uses the vehicle ground as the return conductor
relative to ground and the bus is terminated with a for its signal current, it is more sensitive to noise

62
Electromagnetic Compatibility Issues in Automotive Communications

Figure 13. Basic CAN bus layout

NODE 3

NODE 4

NODE 1

NODE 2

Figure 14. LIN bus layout

NODE 1 NODE 2

currents flowing on the body of the vehicle. To FlexRay


partially compensate for this vulnerability, LIN
buses typically employ a 0-12 volt signaling am- FlexRay was developed in the late 1990s to meet
plitude. Stronger signal amplitudes mean higher the demand for greater bandwidth and guaranteed
levels of noise are required to cause an interference response times. Like CAN, it employs a differ-
problem. Also, the bus termination impedance is ential signaling scheme that can be implemented
high (nominally 1 kΩ), which reduces the levels of on twisted wire pairs with matched terminations.
noise current that flow in the signal conductor. Unlike CAN, it employs a 3-state bus where signal
LIN bus communication takes place one mes- levels can assume 3 different voltage (non-ground)
sage at a time between a master and slave node. levels. In its most robust configuration, all com-
Although it is not required by the LIN specifica- munication is point-to-point with connections to
tion, transceivers typically have built-in ESD and the rest of the network made through bidirectional
overvoltage protection. Many also have risetime repeaters called “active stars”. Passive star and
control and ground-shift protection.

63
Electromagnetic Compatibility Issues in Automotive Communications

linear passive bus configurations are also possible. minimize interference, Bluetooth networks divide
The maximum data rate is 10 Mbps. the band into 79 1-MHz channels and Bluetooth
The FlexRay standard includes a document communication hops between channels. In this
called the “EMC Measurement Specification” way narrowband interference that blocks only a
(FlexRay Consortium, 2005). This document does few channels does not have a significant overall
not specify test limits, but it does define EMC impact on communications. Of course, broadband
test procedures, test configurations, excitation or even out-of-band noise can disrupt Bluetooth
waveforms, and failure criteria for evaluating networks if the power levels are sufficient.
the electromagnetic susceptibility of FlexRay Automobiles must also co-exist with other
networks. The FlexRay standard also specifies wireless transmitters and receivers such as cell
ESD protection levels for network processors. phones, WiMax devices, satellite communica-
tions devices and dedicated short range com-
MOST munications (DSRC) equipment. Unfortunately,
current international EMC test standards do not
Media Oriented Systems Transport (MOST) is a adequately address potential interference prob-
high-speed networking scheme designed to meet lems with these devices. The technology has
the needs of audio and video entertainment sys- advanced faster than the standards organizations
tems in automobiles. Data is conveyed over optical can react. Some manufacturers have developed
fiber at rates as high as 23 Mbps. Optical fiber their own tests and others test the vehicle by
is immune to electromagnetic fields, but MOST simply installing representative equipment and
networks are still susceptible to electromagnetic driving around.
interference. The most vulnerable part of a fiber Fortunately, the transmitted power levels from
optic system is often the optical signal receiver. most of these devices are relatively low. Also,
The high-gain, wide-band amplifiers required to the electromagnetic immunity is enhanced by
convert flashes of light back to electrical signals the fact that the newer wireless communication
can be relatively sensitive to conducted or elec- technologies tend to be either spread spectrum or
tric-field coupled noise. These amplifiers must be very narrow-band. Spread spectrum communica-
carefully laid out, shielded and filtered to prevent tion networks (like Bluetooth) shift in both time
system noise from obscuring the signal. The rest and frequency making them relatively immune
of the circuitry must also be carefully designed to to narrow-band interference, while narrow-band
avoid the electromagnetic interference and signal communication is relatively insensitive to inter-
integrity problems that are commonly associated ference occurring at frequencies other than the
with circuits operating at these frequencies. operating frequency.
Nevertheless, as the number of interference
Bluetooth and other Wireless sources in an automobile rises, the signal-to-noise
Communications ratio (and the range) of spread spectrum devices
degrades and the probability of interfering with
Bluetooth is a wireless network commonly de- a narrow band transmission increases. New test
ployed in automobiles. It is a relatively low-power, procedures and design practices will be required
short range wireless network that operates in the to insure that future automobiles are electromag-
2.40 – 2.48 GHz Industrial-Scientific-Medical netically compatible with an increasingly wide
(ISM) band. This is the same unregulated fre- variety of wireless devices.
quency band occupied by WiFi networks, micro-
wave ovens, and a variety of other ISM devices. To

64
Electromagnetic Compatibility Issues in Automotive Communications

EC DESIign CONSIidration twisted wire pairs or coaxial lines. Twisted wire


pairs should be used for differential signals, and
When automotive components and systems are coaxial lines (with the shield grounded at both
carefully laid out and properly grounded and ends) should be used for single-ended signals.
shielded, the automobile and its components can Low-frequency analog signals can be routed on
usually meet all EMC requirements with very little a single wire using the body as a current return
cost invested in EMC-specific design features. path provided these signals are able to tolerate the
EMC problems with poorly designed components noise currents typically present on body surface
and systems, on the other hand, can be very metal. Low-frequency analog signals that are
difficult to fix without significantly impacting sensitive to conducted noise should use a wire for
costs or development schedules. Therefore, it is the return current that is isolated from ground at
critically important for automotive manufactur- one or both ends.
ers and Tier 1 electronics suppliers to design for
EMC early in the product development cycle and Grounding and Shielding of
to have component and system design reviews on Components
a regular basis.
Automotive components often have two separate
Wiring Harnesses reference grounds; one labeled “chassis” ground
that connects directly to the component enclosure
One aspect of automotive system design that de- and automobile body surface metal, and another
serves special attention is the design and layout of labeled “digital” ground that serves as the cur-
the wiring harnesses. Coupling from one circuit to rent return path for all of the digital circuits on
another in a wiring harness is often referred to as the circuit board. Since both of these ground
crosstalk. It is important to pay careful attention structures are rather large metallic objects (i.e.
to the currents that will flow out and back on each good antenna parts), it is important that they are
of the wires in a wiring harness. High-speed sig- held to the same potential at high frequencies.
nals (with data rates greater than 1 Mbps) should Even a few microvolts of noise between these
always be routed on twisted wire pairs, shielded two grounds at high frequencies can create a

Figure 15. An example of a circuit board with DC-isolated circuit and chassis grounds

W irin g H a rn e ss
C h a ssis co n n e ctio n
to ch a ssis g ro u n d
C h a ssis co n n e ctio n
to ch a ssis g ro u n d

C a p a cito rs co n n e ctin g
ch a ssis g ro u n d to th e
d ig ita l re tu rn p la n e

D ig ita l R e tu rn P la n e
C h a ssis G ro u n d P la n e

65
Electromagnetic Compatibility Issues in Automotive Communications

significant radiated emissions problem. Bonding are used for remote keyless entry; AM, FM and
them together directly in as many places as pos- satellite radio reception; tire pressure monitoring;
sible is the best way to accomplish this, however, GPS Navigation; cell phone communication and
sometimes it is necessary to isolate the chassis and wireless data communication. Fortunately, most
digital grounds at low frequencies in order to keep of these systems employ antennas and receivers
noise currents that flow on the vehicle body from that are relatively insensitive to out-of-band in-
flowing across the circuit board ground. In other terference. However, the performance of each of
words, we want to isolate these grounds to prevent these systems can be severely degraded by in-band
conducted (low-frequency) interference, but we interference, and the high-gain amplifiers in the
want to bond them together at high frequencies front end of these systems can be overwhelmed
to prevent a radiated emissions problem. This by particularly strong transient or out-of-band
can usually be accomplished by routing different continuous wave signals.
grounds on different layers of a multi-layer board Shielding is not usually a practical, cost-effec-
and connecting them with many low-inductance tive solution for protecting antennas and receivers.
capacitors. Figure 15 illustrates the grounding Thus it is important to be familiar with the relative
scheme in a typical multi-layer circuit board in sensitivities of a particular communication system
an automotive application where chassis ground and to locate potential sources of interference far
and digital ground must be DC-isolated. enough from the antenna to minimize the potential
When there is a chassis ground plane on a for an interference problem.
printed circuit board, it is very important to ensure
that this plane has a low inductance connection to EMC Design Reviews
both the chassis and to the digital ground plane,
especially in the vicinity of external cable con- Many EMC problems that are first observed in
nections. Even a small, high-frequency voltage vehicle prototypes are due to relatively obvious
between the chassis and a wiring harness can result design flaws that could have been detected and
in excessive levels of radiated emissions. easily corrected in the early stages of the vehicle
As described earlier, any shields that are ap- design. Correcting problems after the first proto-
plied to the product should be appropriate for the types are built, however, can be relatively difficult
field coupling they are intended to suppress. Low- and expensive. For this reason, it is very important
frequency electric-field shields should intercept to regularly review the design of the automobile
electric flux lines and route the displacement and all electronic components on a regular basis
current harmlessly back to its source. Low-fre- throughout the product development process.
quency magnetic-field shields should divert lines Experienced EMC engineers can identify
of magnetic flux away from the circuit being pro- potential problems and recommend fixes that
tected. High-frequency shielding enclosures must often add nothing to the product cost. No-cost
be carefully designed to eliminate leakage through EMC fixes include measures such as rerouting
seams and apertures, and all wire penetrations traces on a printed circuit board, changes in
through the shield should be filtered. grounding, changes in cable routing, or changes
in connector pin assignments. An EMC engineer
Antennas may also recommend adding fixtures for filters
or shields that are initially unpopulated and only
High-end cars on the market today typically have used in the event that a problem arises later in
about a dozen intentional antennas in them, a num- the development cycle. This type of preparation
ber that continues to rise each year. These antennas costs nothing initially and can save substantial

66
Electromagnetic Compatibility Issues in Automotive Communications

amounts of time and money if EMC problems FlexRay Consortium. (2005). FlexRay Communi-
arise during prototype testing. cations System, Physical Layer, EMC Measure-
ment Specification Version 2.1.
International Electrotechnical Commission – IEC.
ConcluSIion
(2002). CISPR 25—Radio disturbance charac-
teristics for the protection of receivers used on
For the first 60 to 70 years of its existence, the
board vehicles, boats, and on devices—Limits
automobile was primarily a mechanical machine
and methods of measurement.
with few electric components. Automobiles today
have dozens of microprocessors and kilometers IEC. (2008). CISPR 12—Vehicles, boats and in-
of electric wire occupying a volume of a few cu- ternal combustion engines—Radio disturbance
bic meters. As the number of electronic systems characteristics—Limits and methods of measure-
in automobiles rises, the potential for electro- ment for the protection of off-board receivers.
magnetic interference increases. Designing for
International Organization for Standardization—
electromagnetic compatibility is not difficult or
ISO 11452-2. (2005). Road vehicles — Vehicle
expensive, but it is important to devote proper at-
test methods for electrical disturbances from
tention to EMC at every stage of an automobile’s
narrowband radiated electromagnetic energy
development. Problems discovered late in the
— Part 2: Off-vehicle radiation sources.
design cycle can seriously impact development
schedules and product cost. ISO 10605. (2008). Road vehicles — Test methods
This chapter has provided a basic overview of for electrical disturbances from electrostatic
EMC issues affecting automotive communications discharge.
for non-EMC engineers and engineering managers
ISO 11452-3. (2001). Road vehicles — Component
who work with automotive networks. Additional
test methods for electrical disturbances from
information on this topic can be found in (Paul,
narrowband radiated electromagnetic energy
2006), (Kaiser, 2005) or the Clemson Vehicular
— Part 3: Transverse electromagnetic mode
Electronics Laboratory website (http://www.cvel.
(TEM) cell.
clemson.edu).
ISO 11452-4. (200). Road vehicles — Component
test methods for electrical disturbances from
REFERENCES narrowband radiated electromagnetic energy
— Part 4: Bulk current injection (BCI).
Crawford, M., & Workman, J. (1980). Predicting
ISO 7637-2. (2004). Road vehicles — Electri-
free-space radiated emissions from electronic
cal disturbances from conduction and coupling
equipment using TEM cell and open-field site
— Part 2: Electrical transient conduction along
measurements. Proc. IEEE Int. Symp. on Electro-
supply lines only.
magn. Compat., (pp. 80-85). Baltimore, MD.
ISO 7637-3. (2007). Road vehicles — Electrical
Deng, S., Hubing, T., & Beetner, D. (2007).
disturbance by conduction and coupling — Part
Characterizing the electric field coupling from IC
3: Vehicles with nominal 12 V or 24 V supply
heatsink structures to external cables using TEM
voltage — Electrical transient transmission by
cell measurements. IEEE Trans. on Electromagn.
capacitive and inductive coupling via lines other
Compat., 49(4) 785-791.
than supply lines.

67
Electromagnetic Compatibility Issues in Automotive Communications

Kaiser, Kenneth L. (2005). Electromagnetic cell. IEEE Trans. on Electromagn. Compat., (23),
Compatibility Handbook. CRC Press. 113-121.
Paul, C. R. (2006). Introduction to Electromag- Tippet, J. C. & Chang, D. C. (1976). Radiation
netic Compatibility, 2nd. ed. Wiley-Interscience. characteristics of electrically small devices in a
TEM transmission cell, IEEE Trans. on Electro-
Sreenivasiah, I., Chang, D. C., & Ma, M. T.
magn. Compat., 18(4), 134-140.
(1981). Emission characteristics of electrically
small radiating sources from tests inside a TEM

68
69

Chapter IV
Automotive Network
Architecture for ECUs
Communications
Fabienne Nouvel
Laboratory IETR-UMR, INSA, France

Wilfried Gouret
Laboratory IETR-UMR, INSA, France

Patrice Mazério
Laboratory IETR-UMR, INSA, France

Ghais El Zein
Laboratory IETR-UMR, INSA, France

ABSTtract

This chapter deals with automotive networks and the emerging requirements involved by the X-by-wire
and X-tainment applications. The introduction of ECUs (Electronic Control Units) has been driven by
new market (like navigation, multimedia, and safety). Furthermore, the automotive industry has to face a
great challenge in its transition from mechanical engineering towards mechatronical products. Combining
the concepts of networks and mechatronic modules makes it possible to reduce both the cabling and the
number of connectors. To connect the ECUs, a variety of network technologies are already widespread.
A review of the most widely-used automotive networks and emerging ones is given first. To fulfill the
increasing demand of intra-car communications, a new technique based on power line communication
(PLC) is proposed and reviewed in the second section. On the other hand, there are several infotain-
ment applications (like mobile phones, laptop computers) pushing for the adoption of intra-car wireless
communications. Some of the most common wireless technologies that have potential to be used in the
automotive domain are considered and different experimentations are presented. Finally, the challenges
of these wired or wireless alternative solutions to automotive networks are highlighted.

Copyright © 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Automotive Network Architecture for ECUs Communications

Introduction development will replace the steering column


shaft with angle sensors and feedback motors.
Fieldbuses are a family of automotive communi- This removal will improve driver safety in col-
cation networks that have evolved as a response lisions and allow new styling freedom. It will
to the demand to reduce cabling costs in factory also simplify production of left- and right-hand
automation systems. Moving from a situation in models. It is natural to add advanced functions
which every controller has its own cables connect- to such electronic systems. For example, consider
ing the sensors to the controller to ECU sharing systems that reduce steering-wheel feedback to
a bus, costs could be cut and flexibility could be the driver. In mechanical steering systems, the
increased. Pushing for this evolution of technol- driver actually feels the vehicle losing control in
ogy was the fact that the number of cables in the unstable conditions and can react appropriately.
system increased as the number of sensors and These self diagnosing and configurable systems
actuators grew. Furthermore, the ECUs share their adapt easily to different vehicle platforms and
CPU power and knowledge with other control- make the diagnosis easier” (Len & Hefferman,
lers. Several fieldbus technologies, usually very 2001, p.90).
specialised, were developed by different manu- Figure 1 represents the future topology of
facturers to meet the demands of their application. embedded networks inside luxury cars. We can
The standardisation process stabilized not until notice the different multiplexed networks which
the mid 90’s with CAN standardized in1993 by the may need gateways to communicate between
International Standardisation Organisation (ISO) different application domains.
(Johansson, Törngren, & Nielsen, 2005). Considering these large number of distributed
Indeed, today’s vehicle networks are not just ECUs, it makes the automotive system complex in
collections of discrete, point-to-point signal cables. many ways. Several different networks are used
They distribute the electronic systems according to address the different levels of communications
to their domain sharing networks. Replacing requirements, including safety-critical, and fault-
rigid mechanical components with dynamically tolerant. High bandwidth becomes necessary to
configurable and even reconfigurable electronic interconnect these systems with predictability.
elements triggers an almost organic, system wide This last issue is a great challenge for car manu-
level of integration. Furthermore, the amount of facturers. To reduce this complexity, without
cables is drastically reduced by using these field- reducing safety, it is desirable to commit to a
buses. As a result, the cost of advanced systems limited set of networks. However, it is not in the
should plummet. Furthermore, highly reliable near future that the number of networks can be
and fault-tolerant electronic control systems, X- reduced to only one or two as such technology
by-wire systems do not depend on conventional would provide the properties supporting the most
mechanical or hydraulic mechanisms. They make demanding automotive systems. It would probably
vehicles lighter, cheaper, safer, and finally more make it too expensive. Hence, it is more likely that
fuel-efficient. a few network technologies will be used while
In (Len & Hefferman, 2001), the authors providing timeliness and fault tolerance.
demonstrate the advantages of X-by-wire and The next section gives an overview of networks
embedded networks. For example, Leen and Hef- used today in the automotives, identifying their
ferman write “X-by-wire steering systems under strengths and possible drawbacks.

70
Automotive Network Architecture for ECUs Communications

Figure 1. Network vehicle architecture (source: Automotive Systems Research Group, 2008)

EVOolution of automoti tors where bandwidth, speed and versality are not
nETtworking t required (i.e inside mechatronic based subsystems
generally made of an ECU and its set of sensors
The purpose of this section is to give a description and actuators). LIN is commonly used as a sub
of the most representative networks for differ- bus for CAN and Flexray.
ent main domain of application. We will focus A LIN network is based on one master node
on the three most common vehicle networks, and a couple of LIN slaves (up to 16 over 40 meters
namely LIN, CAN and Flexray. These embedded line length). The communication in an active LIN
networks have both increased the functionality network is always initiated by a master task: the
and decreased the amount of wires. However, the master sends out a message header that comprises
usage of different wires for the different networks the synchronisation break and message identifier
still has the disadvantage of heavy, complex and (frame header). Exactly one slave is activated upon
expensive. reception and filtering of the identifier (up to 64),
which starts the transmission of the response, up
The Local Interconnect Network: LIN to eight data bytes. The frame response may be
sent by one LIN slave or LIN master. Each LIN
Conceived in 1998, the LIN consortium comprises frame is composed of a frame header and a frame
many car manufacturers like Audi, Volvo, BMW response. Figure 2 depicts the LIN frame format
(“LIN Consortium”, 2003). LIN is an inexpensive transmitted during its frame slot.
slow and serial bus used for distributed body The master node decides when and which
control electronic systems in vehicle. It enables frame shall be transmitted according to the sched-
effective communication for sensors and actua- ule table containing the transmission order. At the

71
Automotive Network Architecture for ECUs Communications

Figure 2. the LIN frame (source: Navet, Song, Simonot-Lion & Wilvert, 2005).

moment a frame is scheduled for transmission, ing CAN with bit rates up to 1 Mbit/s. However,
the master sends the header inviting a slave node in today’s car, CAN is used as an SAE (Society
to send its data in response. Any node interested of Automotive Engineers) class C (classification
can read a data frame transmitted on the bus. The defined in (“J2056/2 Survey”, 1994)) network for
reliability of LIN is high but it does not have to real time control in the powertrain and chassis
meet the same levels as CAN. The LIN can be domains (at 250 or 500 kb/s). It is also implemented
implemented using just a single wire, while CAN as an SAE class B network for the electronics in
needs two. The physical layer (PHY) supports a the body domain (at 125 kb/s).
data rate equal to 20 kb/s (due to electromagnetic In CAN, data is transmitted in frames contain-
limitations) but other transmission supports en- ing between 0 and 8 bytes of data and a number
abling higher data rates are possible. of control bits. A CAN frame is labelled by an
Another representative of low-cost network is identifier whose numerical value determines the
TTP/A (Kopetz & all, 2002). It implements mas- frame priority. Depending on the CAN format
ter-slaves exchanges where the slave answers the (standard CAN 2.0A or extended CAN 2.0B) the
master’s request with a data frame having a fixed size of the identifier is 11 bits (CAN 2.0A) or 29-
length. However, to the best of our knowledge, bits (CAN 2.0B). Between CAN frames sent on
TTP/A is not currently in use in production cars. the bus, there is also a 3 bit inter-frame space. The
On the other hand, LIN is widely used in middle standard CAN frame format (and the inter-frame
range cars but it can not support high data rate as space) is depicted in Figure 3.
required by devices like portable DVD players or CAN is a collision-avoidance broadcast bus
multimedia applications. (CSMA/CA for carrier sense multiple access with
collision avoidance), which uses deterministic
The Control Area Network: CAN collision resolution to control access to the bus.
It implements a fixed-priority based arbitration
The Basic CAN mechanism that can provide real time guarantees
and that is amenable to timing analysis.
The Controller Area Network (CAN) (“CAN”,2001; As distributed real time systems become
“Road Vehicles”, 2004) is a widely communica- more and more complex, the computing power
tion fieldbus used in automotive and other real is steadily growing, and the number of ECUs
time applications. It is a serial communications attached to CAN buses is growing. Thus CAN’s
protocol which efficiently supports distributed maximum speed of 1 Mbps can lead to perfor-
realtime control with a middle level of security. mance bottlenecks. Hence, methods for increasing
In automotive electronics, engine control units, the achievable utilisation are needed, e.g., novel
sensors, anti-skid-systems, etc. are connected us- analysis methods that allow increased utilisation

72
Automotive Network Architecture for ECUs Communications

Figure 3. The CAN frame (source: Nolte, 2006)

while guaranteeing timing requirements to be ful- the message transactions. The static schedule is
filled, and novel approaches to schedule CAN. based on TDMA where message exchanges may
only occur during specific time slots or in time
Derivative Products and CAN windows. Hence, the master’s view of time is
Optimization referred to as the network’s global time. TT-CAN
appends a set of new features to the original CAN,
In (Nolte, 2003; Nolte, 2006), the author ad- and being standardised, several semiconductor
dresses two issues to increase real time. First, vendors have started manufacturing TTCAN
he investigates a novel way of scheduling the compliant devices. Probably, carmakers might
CAN through a server-based scheduling. This consider the use of TTCAN for some systems
increases the flexibility of CAN, by providing during a transition period as FlexRay technology
efficient handling of sporadic and aperiodic seems to be in a very strong position for becoming
message streams. He also studies the bit stuffing the standard in the industry.
which could degrade the real time and data rate.
The bit-stuffing mechanism of CAN causes the The Flexray Protocol
message frame length to vary, depending on the
original bit-pattern of the CAN frame FlexRay (“Flexray Consortium”, 2004) is a
Currently, time-triggered communication communication system developed by a consor-
systems are being considered for use in X-by- tium founded in 2000, including both car and
Wire applications. In this category, multi-access semiconductors manufacturers. The consortium
protocols based on time division multiple access members realized that despite the numerous
(TDMA) are particularly well suited. Time-Trig- automotive communications protocols out on
gered communication on CAN is specified by the market, none would fulfil future automotive
TT-CAN (“Road Vehicles”, 2004), a standardised control requirements.
session layer extension to original CAN. In TT- FlexRay is a fault-tolerant protocol designed
CAN, the exchange of messages is controlled by for high-data-rate, advanced-control applications,
the temporal progression of time, and all nodes are such as X-by-wire systems. The protocol specifica-
following a pre-defined static schedule. One node, tion promises time-triggered communications, a
the master node, is periodically (or on the occur- synchronized global time base, and real time data
rence of a specific event) transmitting a specific transmission with bounded message latency.
reference message, which acts as a reference in An overview of the FlexRay frame format is
time. All nodes in the system are synchronising given in Figure 4. The frame consists of three
with this message, which gives a reference point segments. These are the header segment, the
in the temporal domain for the static schedule of payload segment containing up to 254 bytes of

73
Automotive Network Architecture for ECUs Communications

Figure 4. Flexray frame (source Flexray Consortium, 2004)

data, and the trailer or CRC segment. A node on the two channels. Nodes that are connected to
shall transmit the frame on the network such that both channels send their frames in the static part
the header segment appears first, followed by the simultaneously on both channels. It is possible to
payload segment, and then followed by the trailer send different data in the same sending slot on
segment, which is transmitted last. The header different channels (Figure 5).
of 5 fields includes the identifier, the cycle count An interesting feature of Flexray is that it can
and the length of the data payload. provide scalable dependability i.e., the “ability
Communication is done in a communication to operate in configurations that provide various
cycle consisting of a static part and a dynamic degrees of fault tolerance.” Indeed, the protocol
part, where each of the parts may be empty. The allows for mixing links with single and dual trans-
sending slots are represented through the identifier mission supports on the same network, or with
(ID) numbers that are the same on both channels. different fault-tolerance capability with regards to
The sending slots are used deterministically (pre- clock synchronization, etc. Proposed applications
defined TDMA strategy) in the static part. In the include chassis control, X-by-wire implementa-
dynamic part there can be differences in the phase tions, and body and powertrain systems. Currently,

Figure 5. Communication cycle ( from (“Flexray Consortium”, 2004))

74
Automotive Network Architecture for ECUs Communications

FlexRay can handle communications at 10 Mbps. used in digital audio and digital video. The inter-
In the automotive context, where critical and face is also known by the brand names of FireWire.
non-critical functions will increasingly coexist In the automotives, IDB-1394 is a digital network
and interoperate, this flexibility can prove to be that runs at speeds of up to 400Mbps carrying
efficient in terms of cost and reuse of existing high quality video, multi-channel sound and high
components. speed data for vehicle applications. Designed for
Flexray is considered by manufacturers as entertainment and communication applications,
the backbone network for the other networks IDB-1394 enables devices to operate digitally car-
like CAN or LIN. It is supposed to be foremost rying multiple programs of up to high definition
used in safety-critical X-by-wire applications. video along with multi-channel audio between
However, this network still uses specific wires, devices on a vehicle. In (“IDB1394”, 2008), an
which do not achieve compatibility with other IDB-1394 demonstrator has been presented and
networks. So, gateways are necessary to transfer focuses on the advantages of such solution.
information from ECUs connected on a domain These two systems answer to the actual au-
network to ECUs connected on other networks. tomotive trends namely multi-media networks,
Those gateways could introduce latency, errors, data storages, multiple users, navigation and
bottlenecks, and so on. entertainment applications. However, these two
Other fault-tolerant networks have been de- high speed solutions need specific wires and allow
veloped, namely TTP and TT-CAN, but it seems only peer to peer communications. They answer
they are not the best choice for automotive manu- specifically to multi-media applications require-
facturers due to limited flexibility, high costs and ments. It doesn’t seem to be a so much flexible
conflicting interests (Nolte, 2006). seamless solution. Some common technologies are
discussed in (Navet, 2008) and (Nolte, 2006).
Some Other Automotive Networks
Conclusion
Two other major networks have been developed
for emerging multimedia applications, namely Table 1 sums the different embedded protocols
MOST (“MOST”, 2006; Nolte, 2006), and IDB used in today vehicles.
1394 (Navet, Song, Simonot-Lion & Wilvert, 2005; Considering these specific domain embedded
“IDB Forum”, 2008). MOST, initiated in 1998, is networks, we can observe that each solution uses
expected to be available with speeds of 150 Mbps. its specific wires and communication system. We
It is using plastic optical fibers as communication can see the wide diversity of the solutions and the
medium (and coax cables) and supports up to 64 necessity to find a limited set of networks which
devices (nodes). It is sharply more expensive than answers to these multiple applications. An at-
other networks. The reader can have more details tractive solution to reduce the wires is the power
at (“MOST Cooperation”, 2008). line communication (PLC) using the power lines
On the other hand, IDB Customer Convenience (12/42V) to transmit both the power and the mes-
Port 1394 (IDB-1394), an automotive version of sages without functional barriers domain. It can
IEEE 1394, supports data rate of 100 Mbps and answer the vehicles requirements namely cost,
supports up to 63 nodes over a specific six-wire decrease of the amount of wires, flexibility and
cable. The IEEE 1394 interface is a serial bus in- bandwidth. First of all, we will describe the power
terface standard, for high-speed communications line channels and the available PLC techniques
and isochronous real time data transfer, frequently in the next section.

75
Automotive Network Architecture for ECUs Communications

Table 1. Embedded automotive networks


Networks LIN CAN Flexray MOST IDB-1394
Data rate 20 Kbps 1Mbps 10 Mbps 25 Mbps -> 150 100 Mbps
Mbps
Medium Access Master/slave CSMA/CA Master/salve Peer to peer Peer to peer
TDMA TDMA
Number of nodes 16 / 40 meters 32 / 40 meters 22/passive star 64 /fiber 63/fiber
Security/fault low /no medium/some high/yes some /no some /no
tolerant
Applications Sub-networks Body domain, X-by-wires Mutli-media Mutli-media
power train

PowER lin communication (Schiffer, 2000) and (Huck, Schirmer & Dostert,
(PLC) ntwork: an altrnati 2005). Recently, different applications have been
olution tested like in (“Valéo”, 2006) which is a video
transmission between a camera at the back of the
Considering the current embedded vehicle net- vehicle and a screen placed on the dashboard up
works, these fieldbuses require different wires to 30 frames/s.
of several kilometres. It leads to increasingly Although high data rate and flexibility obtained
complex network architectures. Thus gateways for indoor domestic PLC are proven, it is not pos-
are necessary to switch from one network to sible to apply them directly to cars because the
another one. This increases the propagation time geometrical characteristics and wires topologies
and does not guarantee real time. One solution to are totally different. Moreover, the PLC channels
reduce the amount of wires would be to use the are affected by the variable activation schedules
PLC technology that is currently being developed of electrical functions, such as brakes, indica-
for indoor networks to transmit information or tors or ABS, which produce sharp modifications
at least some of it, over the 12V power distribu- in the circuit’s load impedances over brief time
tion system found in automobiles (Rubin, 2002). intervals, as presented in (Lienard, Carrion,
This solution would reduce the amount of wires Degardin & Degauque, 2008). To optimize high
as well as simplify the network architecture. The bit-rate communication, the PLC channel transfer
possible applications of automotive PLC are very function must be carefully studied because it is
wide, extending from low-speed data buses for frequency selective.
activating actuators to high-speed multimedia The most promising candidate techniques for
applications. To our knowledge, there are no cars PLC transmission are spread spectrum combined
actually that implement PLC network instead with code division multiple access (CDMA)
of dedicated protocol buses. Different studies and orthogonal frequency division multiplex-
have been carried out to demonstrate the PLC ing (OFDM). The first one has been studied in
feasibility, like the multi-user and low data rate (Nouvel, El Zein & Citerne, 1994), in which the
system in (Nouvel, El Zein & Citerne, 1994). It PLC network offers about 50 kbits/s per user,
is possible to interface PLC with CAN bus, as combined with multiplexing. On the other hand,
described in (Beikirch & Voss, 2000). Other OFDM has been adopted for different wireless
low data PLC solutions have been studied in wide area or personal area networks such as

76
Automotive Network Architecture for ECUs Communications

in IEEE 802.11a/g and IEEE 802.16a (Hara & is labelled “direct” if the shortest connection
Prasad, 1997; Heiskala & Terry, 2002). The main between the modems does not pass through the
advantages of this technique are well known and battery, a path is labelled “indirect” in all other
included robustness, high spectrum efficiency in cases. This distinction is based on the fact that
frequency-selective, flexible spectrum adaptation in the frequency range, the battery acts as a very
and time-variant fading channels and capability low impedance which partially short circuits the
of portable and mobile reception. Furthermore, transmission line. The schematic representation
OFDM allows high data rate and can be com- of the network used in the simulation and mea-
bined with CDMA. The choice of the modulation surements is given in Figure 6.
is driven by the PLC channel and the different Two paths, D1D3 and D2D3 are considered,
parameters are optimised according to the chan- corresponding to a direct and an indirect path,
nel behaviour: the bandwidth, the modulation respectively. In this test bed, the distances D1D3
(number of sub-carriers), the coding, the guard and D2D3 are about 8 meters and 10 meters
interval, and so on. respectively. Furthermore the number of wires
Below the embedded wiring harnesses are inside cable bundles varies from 1 to 30. The
presented in order to point out the variations on scattering matrix was taken on the 12V power
the PLC channels. Then, the OFDM HomePlug line while moving through urban and suburban
standard used in indoor PLC is presented and is traffic. Examples of transfer functions for direct
studied for the embedded vehicle PLC. and indirect connection in the frequency range 500
kHz-30 MHz are shown in Figure 7. The results
Transfer Function and Propagation
Channel
Figure 6. Testbed for power line measurement
Above all, it is very important to investigate both
channel capacity and noise environments on the
power line channel. As such a channel is not ideal,
it is characterised by noise disturbance, loss, in-
terference of impulsive type, and also attenuation.
Otherwise, the goal of the measurements on the
vehicle is to investigate the influence of the state
of the elements connected on the power line.
To determine the capacity of the channel
Figure 7. Power line channel measurements
through the cables for a PLC transmission, many
transfer functions between two nodes have been
measured in the study carried out by (Lienard,
Carrion, Degardin & Degauque, 2008; Degardin,
Laly, Liénard & Degauque, 2006). The authors
describe the aims of the tests and the measure-
ments set up. The most important results are
given here.
In order to analyse the battery effects, two
types of channels must be considered, depending
on the network architecture between a transmit-
ting point TX and a receiving point RX. A path

77
Automotive Network Architecture for ECUs Communications

show the insertion losses over the [0-30] MHz indirect path that have to be compared with the
bandwidth are about -15 dB and -36 dB (influ- OFDM/HomePlug (“Home Plug V1.0”, 2008 )
ence of the battery) for direct and indirect path subcarrier spacing of 195 kHz. The delay spread
respectively. The transmitted signal will be more remains under 380 ns for all the geometrical and
attenuated in indirect path than direct path. electrical configurations. This value is ten times
To carry out the statistical study, measurements smaller than the cyclic prefix duration recom-
were taken while the electronic equipments are mended by the HomePlug standard.
alternatively switched ON and OFF. Figure 8 In (Degardin, Laly, Liénard & Degauque,
represents the variations of the transfer function 2006), the authors have also considered the im-
between these two nodes in the vehicle accord- pulsive noise. The analysis of the background
ing to their state (ON/OFF) and/or other elements noise measured on the vehicle DC line during
present on the same cable. ‘Hi’ refers to different cruising, shows that this noise can be modelled
configurations of electric equipments (ON/OFF). by a white Gaussian noise with a Power Spectral
One can see that the power line is very frequency Density (PSD) of -130 dBm/Hz. Additional narrow
selective and the attenuation depends not only on and wide band noise generated by the electronic
the distance between nodes but also on the states devices will also disturb the transmission. Figure
of each node. The selectivity of the channel is 9 displays impulse noise measurements. A clas-
coupled with attenuation due to the distance be- sification of the pulses into two classes has been
tween the nodes. Deep fading in many frequency proposed: the first type is a single transient or
bands, especially in the PLC band [2 - 30 MHz] pulse, while the second one is a burst character-
used in residential area appears. ized by a succession of elementary pulses.
Liénard, Carrion, Degardin & Degauque To overcome this noisy PLC environment,
(2008) have then focus on the coherence band- the used of OFDM modulation technique can
width and delay spread. The statistical analysis be investigated. Using OFDM has in fact many
shows that the coherence bandwidth is greater benefits as it can cope with deep fading, provides
than 800 kHz for direct path and 400 kHz for good interchannel interference performance and is

Figure 8. a. Testbed setup, b. Channel variation according to loads

a. b.

78
Automotive Network Architecture for ECUs Communications

Figure 9. Typical noise records in a vehicle

good at minimizing the effect of in-band narrow modulation schemes in the same bandwidth.The
interference. Furthermore, one other requirement primary advantage of OFDM over single-carrier
for PLC is the automotive EMC (electromag- schemes is its ability to cope with severe channel
netic compatibility) constraints Ray_CISPR25 conditions, for example attenuation of high fre-
(“CISPR25”, 2002) which allow transmission in quencies in a long wire, narrowband interference
the [0.15-30] MHz bandwidth under 50 dBµV and frequency-selective fading due to multipath,
(-35dBm/Hz). without complex equalization filters. Channel
equalization is simplified because OFDM may
HomePLug V 1.0 Sandard be viewed as using many orthogonal slowly-
modulated narrowband signals rather than one
As OFDM (Hara & Prasad, 1997) is used in dif- rapidly-modulated wideband signal. To eliminate
ferent communication systems we present in this intersymbol interference (ISI), guard interval is
section, a brief overview of this modulation widely inserted between symbols making it possible to
used in both wired and wireless PHY layers is handle time-spreading. OFDM has been adopted
given. OFDM is a frequency-division multiplexing for different wireless wide area or personal area
(FDM) scheme using the fast Fourier transform networks (for example in IEEE 802.11a/g) or over
(FFT) to generate the signal. A large number of copper wires (for example xDSL). It is used in
closely-spaced orthogonal sub-carriers are used new applications such as high definition video
to carry symbols. The incoming stream is divided and audio broadcasting.
into several parallel data streams or channels equal In 2000, a coalition of manufacturers has
to the number of sub-carriers. Each sub-carrier established a new protocol HomePlug 1.0 that
is modulated with a conventional modulation enables the establishment of an Ethernet-IP class
scheme (such as QPSK (quadrature phase-shift network over power line channels (“Home Plug
keying)) at a low symbol rate, maintaining total V1.0”, 2008). The HomePlug process is based on
data rates similar to conventional single-carrier an OFDM technique whose major advantage for

79
Automotive Network Architecture for ECUs Communications

Table 2. Different transmission modes: coding and bit rate


Transmission Mode Modulation Coding Maximum bit rate

1 DBPSK ½ code rate Reed Solomon 4.53 Mb/s


interleaver (t=8)
2 DQPSK 23/29 to 238/254 9.06 Mb/s
and convolutional encoder
3 DQPSK (constraint length = 7) 13.59 Mb/s

Figure 10. HomePlug V1.0 PHY frame format (source: Home Plug V1.0, 2008)

Figure 11. HomePlug spectrum in the [1-25] MHz bandwidth and transmitted signal

128 sub car r ier s


synchr o
84 car r ier s for data

80
Automotive Network Architecture for ECUs Communications

the embedded PLC application is to cope with the Nowadays, the HomePlug Alliance and the
frequency selectivity of the power line channel IEEE (“IEEE 1901”, 2008) are strongly commit-
caused by the multiple reflections of the loads ted to delivering a single mature solution that
connected to the power grid and by the coupling will be endorsed by the IEEE 1901 work group
to the other cables placed in the same bundle. The as the baseline standard. This alliance will pro-
modulation is based on 128 sub-carriers equally pose a standard for high speed (over 100 Mbps
spaced from 4.3 MHz to 25MHz, in conjunction at the physical layer) communication devices via
coding applied before differential encoding. The alternating current electric power lines, so called
differential encoding allows simplifying the Rx Broadband over Power Line (BPL) devices. It
part by suppressing the channel equalization. Only will use transmission frequencies below 100
84 carriers are used in the transmission bandwidth, MHz. This solution could be investigated in an
with DBPSK (differential binary PSK), DQPSK automotive environment.
(differential QPSK) or ROBO modulation ( a Some papers have compared HomePlug V1.0
DBPSK with heavy error correction) on each and HomePlug AV with the indoor wireless system
subcarrier. HomePlug uses CSMA/CA protocol (Lee, Latchman, Newman, Katar & Yong, 2002;
to access to the network. Figure 10 represents the Lin, Latchman, Katar &. Lee, 2003). The results
PHY frame format as Figure 11 represents the show that PLC solution can outperform wireless
frequency response and the transmitted signal over networks in indoor.
a 220 V AC network. All the coding parameters
are summarized in Table 2. HomePLug V1.0 for Vehicle:
Recently, the HomePlug AV has been intro- Experimental Results
duced and will be the second major standard
released by the HomePlug Powerline Alliance In (Gouret, Nouvel, El Zein, 2006; Gouret, Nou-
(Gavette, 2006; Afkhamie, Katar, Yonge, & New- vel, & El Zein, 2007) the authors experiment two
man, 2005). While HomePlug V1.0 was designed HomePlug V1.0 PLC modems inside the cars. The
mainly to distribute broadband internet access at first, designed by LEA uses the standard Home-
home, the HomePlug AV’s objective is to distribute plug v1.0 and the Intellon chip (“LEA”, 2006), and
multi-media content within the house as well as the second from Spidcom uses an owner standard
data. The PHY layer still operates in the frequency (“Spidcom”, 2008). In the Spidcom system, the
range of [2 – 28] MHz and provides a 200 Mbps OFDM modulation is based on 896-carriers from
PHY channel rate (150 Mbps net information rate). 0 to 30 MHz divided into 7 equal sub-bands. For
Long OFDM symbols with 917 usable carriers the data transmission, BPSK up to 256-QPSK
(tones) are used in conjunction with a flexible modulation is used in conjunction with error cor-
guard interval. Modulation densities from BPSK rection (Viterbi & Reed Solomon) and a bit-loading
(binary PSK, 1 bit of information per carrier per scheme. The MAC layer provides a mechanism
symbol) to 1024 QPSK (10 bits of information per based on TDMA (CSMA/CA also available) with
carrier per symbol) are independently applied to a master/slave prioritisation.
each carrier based on the channel characteristics For each modem, coupling and filters have
between the transmitter and the receiver. Ex- been optimized to fulfil the class 4 CISPR 25
perimental systems of HomePlugAV have been with a typical limit of -35 dBm/Hz in the [0-30]
field tested in houses, suggesting that on average MHz bandwidth. The testbed, illustrated in Fig-
HomePlug AV system achieves 10 times the data ure 12, is constituted of a pair of identical PLC
rate of a 1.0 system. modems connected to PCs through Ethernet

81
Automotive Network Architecture for ECUs Communications

Figure 12. PLC Testbed for PLC

LAN and placed in different point of the vehicle way between the engine and the trunk. For the
(near trailer hitch, cockpit, engine and cigarette second, it corresponds also as a direct way, but
lighter). Each one is connected to the electrical between ECUs of the cockpit and the cigarette
12V supply network with the coupler and the lighter. The throughput and transmitted power
filter. A spectrum analyser and an oscilloscope were measured. Only a summary of findings is
are connected to the DC line through a filter that presented here.
behaves as a high-pass filter with a 500 kHz cut-off The first results (Figure 13a and Figure 13b)
frequency. The first path corresponds as a direct show that the levels of broadcast power are differ-

Figure 13. Spectrum Measurement [0-30] MHz: a. HomePlug V1.0 b. Spidcom

a. b.

82
Automotive Network Architecture for ECUs Communications

ent for the two modems while keeping the power improve data and bit error rate, additional work
under EMC/CISPR25 requirements. Concerning is necessary leading to the following questions: 1)
the Spidcom one, its broadcast power is of the order What is about the throughput when more than two
of 5 dB lower than LEA. To be able to compare PLC nodes are transmitting? 2) What is about the
both modems, the bands 6 and 7 were switched off real time performance of such implementation?
to obtain the same used bandwidth. Both modems 3) How does the PLC solution facilitate integra-
transmit TCP or UDP data flow. tion and diagnose? 4) How can it be interfaced
Iperf tool (“Iperf”, 2008) is used for measuring with other wired protocols? To answer the ques-
maximum TCP and UDP bandwidth performance. tions above, the research has to be conducted by
Iperf allows the tuning of various parameters and surveying the research community. We will now
UDP characteristics. Iperf reports bandwidth, focus on wireless solutions and their viability for
delay jitter, and datagram loss. During the data automotives.
rate measurement, the Spidcom modem transmit-
ted up to 9 Mbps against 5.67 Mbps for the LEA.
Spidcom modem integrates a pre-equalization WirELESS Ccommunication in
function which improves the data rate by tak- automo
ing into account the SNR (signal-to-noise ratio)
for modulation on each sub-carrier. When this During the last several years, the interest in wire-
function is involved, we obtain a data rate of 12 less networking has grown significantly due to
Mbps. Such results can be obtained by using up the availability of many wireless products, such
to 256-QPSK modulation on sub-carrier with high as cell phones, wireless enabled mice, keyboards,
signal-to-noise ratio, not available on Homeplug modems, and many other products. The reason
chip which uses the same modulation for all the for the rapid growth of wireless technology is that
sub carriers. The best data rate obtained with it provides the users with additional convenience
the whole spectrum and optimization reaches over the wired technology. In automotive systems,
20 Mbps. both within and between the vehicles, there are
several applications pushing for the adoption of
Discussion wireless communications. Looking at in-vehicle
communications, more and more portable devices,
The results are promising and demonstrate the e.g., mobile phones, laptop computers and DVD
possibility of implementing a PLC inside vehicle player can exploit the possibility of interconnec-
based on a modified OFDM/HomePlug V1.0 while tion with the vehicle. Wireless communication
fulfilling vehicle requirements namely low cost, could be an attractive solution to reduce the
high data rate similar to Flexray and flexibility. As number of cables and disturbances in cars. To the
Spdicom modems can achieve 20Mbps using the best of our knowledge, there are not a lot of wire-
30 MHz bandwidth, it seems it can compete with less experiments in intra-car communications.
Flexray. However, only no critical functions have Below, we review potential wireless solutions
been considered. Redundancy is only available and discuss them. Among them, we specifically
through multiple transmissions as error correction focus on three techniques working in the 2.4
and detection is applied in the receiver. Similar GHz band and allowing data rate from 250 kbps
PLC tests have been carried out in (Degardin, up to 50 Mbps, namely Bluetooth, IEEE 802.11
Liénard, Degauque & Laly, 2007). However, to b/g and ZigBee.

83
Automotive Network Architecture for ECUs Communications

Bluetooth Wireless Technology the Bluetooth wireless technology is not proper to


be used in X-by-wire systems. However, it can be
Bluetooth (“Bluetooth”, 2008) operates in the used in the nonsafety-critical control systems. It
2.4GHz ISM (Industrial Scientific Medical band) is estimated that diagnosis process may become
band. It is a low-power, low-cost, short-range the first practical Bluetooth system level appli-
wireless communication system developed by cation in the vehicles (Leen, Hefferman, 2001).
a consortium of many manufacturers (Ericsson, Other studies have been carried out in order to
IBM, Intel, Nokia and Toshiba, etc). Dividing the build a secure Bluetooth network (Mahmud &
ISM band into 79 channels, the Bluetooth system Shanker, 2006).
uses the Frequency Hopping Spread Spectrum
(FHSS) technology to operate on difference IEEE 802.11 B/G Wireless Technology:
channels with the frequencies changing rate of Wi-Fi
1600 times per second when connected and 3200
times per second when in inquiry and page mode. IEEE 802.11 (Wi-Fi is in current usage) is a set of
Bluetooth topology is made up of the piconets that standards for wireless local area network (WLAN)
contain a single master node and up to seven slave computer communication, developed by the IEEE
nodes. Communication among the slave nodes LAN/MAN Standards Committee (IEEE 802) in
has to be performed from the master node. Low the 2.4 GHz, 5 GHz and public spectrum bands.
power is one of Bluetooth’s main advantages, from It includes IEEE 802.11b/g standards in the 2.4
100mW to 1mW, with a coverage range from 100 GHz band and IEEE 802.11a in the 5 GHz band
meters down to 1 meter. It provides speeds of up (“802.11”; Gast, 2002).
to 3 Mbps (Bluetooth V2.0). IEEE 802.11b is a based on the direct-sequence
General Motors Corporation introduced a spread spectrum modulation technique. Techni-
Bluetooth network in its 2003 Saab 9-3 model car. cally, IEEE 802.11b applies Complementary
If the Bluetooth technology is used to establish code keying (CCK) as its modulation technique.
the wireless connection among the nodes in the As it uses the CSMA/CA media access method,
CAN or LIN bus, the volume of wires may de- the maximum IEEE 802.11b throughput that an
crease. Bluetooth wireless connection can supply application can achieve is about 5.9 Mbit/s using
enough transmission rate for the control network. TCP (7.1 Mbit/s using UDP). Then, the IEEE
Indeed, the asynchronous data transmission rate 802.11g was the third modulation standard for
in the Bluetooth network is up to 723.2Kbps Wireless LAN. The modulation scheme used in
asymmetric (433.9Kbsps symmetric). While in 802.11g is OFDM. Like IEEE 802.11b it works in
CAN, the data transmission rate for the real time the 2.4 GHz band but operates at a maximum raw
control sub network is typically > 250Kbps, and data rate of 54 Mbit/s (19 Mbit/s net throughputs).
about 125Kbps for the information sharing sub 802.11g hardware is fully backwards compatible
network. with 802.11b hardware. For the two standards, two
As demonstrated in (Chen & Chen, 2005), network topologies are available namely ad-hoc
though an in-vehicle wireless network can provide or infrastructure. A wireless ad hoc network is a
the users with many convenient features, it can decentralized wireless network where each node
also make the vehicle system vulnerable to many is willing to forward data for other nodes, and so
types of security attacks and also has to face some the determination of which nodes forward data
problems. As interference and setup delay time is is made dynamically based on the network con-
very dangerous for the vehicle’s safety, right now nectivity. On the other hand, in the infrastructure

84
Automotive Network Architecture for ECUs Communications

network, a wireless access point connects wire- fice network without extra cable installation. The
less communication devices together to form a overall results show that the power line network
wireless network. outperforms the wireless network.
Data rate measurements have been carried It is not possible to directly apply the results
out between two ECU/modems according to the obtained for indoor power lines to automobiles
engine and equipments states using the infrastruc- because the environment and topologies are to-
ture configuration. The test bed is built up of two tally different. Thus, additional measurements
802.11g modems connected to laptop for IP trans- must be carried out to investigate these wireless
fers. They are placed as for PLC cases. The authors network solutions.
observe that the data rate decreases less than in the
PLC configuration according to the engine states ZigBe Wireless Technology
and equipments. We can achieve about 12 Mbps.
The worst configuration is when the transmitter An additional intra-car wireless sensor network
is placed in the trunk and the received antenna is based on ZigBee, which offers lower data rate
is placed near the dash-board. Many reflections but can be used for many embedded applications.
appear and the signal is altered. It can be a good alternative to LIN network.
As for Bluetooth, IEEE 802.11 b/g can be pro- ZigBee is an industry alliance that promotes
posed as a potential wireless solution. However to a set of rules which builds on top of the IEEE
our knowledge there are not a lot of experimen- 802.15.4 standards (“ZigBee”; Tsai, Saraydar,
tations of 802.11 b/g in vehicles. Besides, IEEE Talty, Ames, MacDonald, & Tonguz, 2007).
802.11 b/g devices suffer interference from other ZigBee is a low-cost, low-power, wireless mesh
products operating in the 2.4 GHz. When 802.11b/g networking standard. It operates in three ISM
is used in a point-to-multipoint configuration, radio bands: 868 MHz in Europe, 915 MHz in
the overall bandwidth is dynamically demand countries such as USA and Australia, and 2.4 GHz
shared across all the users on a channel. Thus, (16 channels) in most jurisdictions worldwide. The
real time is no more guaranteed. In (Lin, Haniph, modulation uses direct-sequence spread spectrum
Latcman & Neuman, 2003), the authors have coding, which is managed by the digital stream into
conducted field test in houses in order to compare the modulator. BPSK and QPSK could be used in
the performances of IEEE 802.11 in infrastructure the 2.4 GHz band. The data rate is 250 Kbps per
mode and HomePlug V1.0. Field tests show that channel in the 2.4 GHz band (40 Kbps in the 915
HomePlug had a better coverage than IEEE 802.11. MHz band and 20 Kbps in the 868 MHz band).
However, IEEE 802.11 was nearly always very Transmission range is between 10 and 75 meters,
high (above 4 Mbits/s in 802.11b mode in 70% of although it is heavily dependent on the particular
connections) but decreases more rapidly (less than environment. The maximum output power of the
3 Mbits/s) than HomePlug (above 4Mbits/s in 58% radios is generally 0 dBm (1 mW). CSMA/CA is
of connections) when distances are larger than 20 the usually channel access mode, except three
meters. In fact, the Homeplug performance is not cases (beacons, acknowledgment, messages for
correlated with the line sight distances measured in beacon oriented network devices).
the experiment as the signals have to pass through As ZigBee provides network speeds of up
power lines cables. In (Lee, Latchman, Newman, to 250 Kbps, it is expected to be largely used
Katar & Yonge, 2002) the authors have carried as a sensor network for monitoring and control
out similar experiments. This study compared purposes (air conditioning, heating, ventilation,
two technologies for implementing a small of- lighting control, etc.).

85
Automotive Network Architecture for ECUs Communications

In the article (Tsai, Saraydar, Talty, Ames, digital assistants, DVD players can communicate
MacDonald, & Tonguz, 2007), the channel be- with each other while they could also connect
haviour under various scenarios is observed for with the other nodes already installed in the car
ZigBee nodes placed throughout a midsize sedan. to provide a multifunctional device interface.
Results indicate that the change in link quality Documents from one PC could be displayed on
with respect to locations of nodes in the car is LCD screens installed in different places of the
significant. Engine noise can increase the Packet vehicle (dashboard, back of seat). This solution
Reception Rate throughput received sensitivity can compete with MOST and IDB1394 whose
threshold by 2 to 4 dB. In general, the experiments main disadvantage is their dedication to a specific
and measured results indicate that ZigBee is a vi- application. Another potential use is inter-vehicle
able and promising technology for implementing communications as it consumes high power.
an intra-car wireless sensor network. ZigBee, on the other hand, addresses sensors and
However, the communication between sensor control. ZigBee applications are consisting of lots
nodes and a base station in the car will depend on of devices typically requiring small data packets.
several factors, such as the power loss, coherence It can provide speeds of 250Kbps which is not so
bandwidth, and coherence time of the underly- important for non-critical and safety applications.
ing communication channels between the sensor Nodes can be scattered around in a slightly larger
nodes and the base station. area compared with Bluetooth.
Other high data rate technologies are avail- Bluetooth can claim to replace some CAN’s
able such as IEEE 802.15.3a (UWB) which is a applications as ZigBee replaces some LIN func-
competitor to the other IEEE 802.11 solutions. It tions. But actually, no wireless network can an-
can provide speeds of up to hundred of Mbps/s. swer X-by-wire requirements allowing potential
It can be likely used in multimedia applications. Flexray replacement.
However, UWB components and boards are not If we consider power usage and real time
actually still available. constraints, both ZigBee and Bluetooth require
much less power than IEEE 802.11 b/g whereas
Wireless Technologies Comparison low power is a strong cars manufacturer’s require-
and Design for Automotives ment. From a real time point of view, multi-media
applications do not require strictly real time. On
Todays, several applications push for the adoption the other-hand, safety-systems have real time
of intra-car wireless applications. Considering requirements, e.g., collision detection/avoidance
voice and multimedia applications up to sensor/ systems or active suspension systems that respond
controls applications, the technologies are already to road conditions. Moreover, diagnostics tools can
available. The main differences between the wire- make real time data available during operation of
less technologies we have considered come from the vehicle. Also, wireless networks can operate
the different target applications they are designed as a redundant link between nodes linked with
for. Bluetooth can be suitable for voice and audio wired different networks for real time applications.
applications thus eliminating short distance ca- Furthermore, in order to study these alternative
bling. It can address small file transfer between solutions, wireless channel measurements must
devices in a network range of a few tens of meters be carried out, considering different experimental
and with network speeds of a few (1-3) Mbps. scenarios (engine ON/OFF, driving, passengers
IEEE 802.11 b/g can address audio, multi-media present or not, driver always present, equipment
applications as file transfer with much higher ON/OFF, …).
throughput. Plug and play devices like personal

86
Automotive Network Architecture for ECUs Communications

Conclu process and standardizes the software-architec-


ture for each ECU in such a system. AUTOSAR
The partitioning of automotive applications into also specifies compatible software-interfaces at
several functional domains with their own require- application-level. Applying AUTOSAR will im-
ments can be useful to manage complexity but it prove the interoperability between applications
leads to a great number of several independent and sub-networks. The automotive industry has
networks whereas more and more cross domain recognized that a technological breakthrough is
data exchanges are necessary. Then, gateways required and the development and standardiza-
must be implemented and can impact perfor- tion of AUTOSAR must be handled by many
mances in term of real time. Such example of companies. Today, LIN, CAN and MOST are
cross-domain can be cited as the engine controller AUTOSAR compliant.
(powertrain domain to body domain) or upcoming In its concept, AUTOSAR introduces a
X-by-wire functions. Virtual Functional bus (VFB) which separates
An initial foreseeable solution with PLC has applications from infrastructure (i.e ECU and
been presented to improve interoperability be- networks). An application consists of intercon-
tween applications with different requirements. nected “AUTOSAR Software Components”.
PLC network answers both to cost, flexibility and The VFB provides standardized communication
throughput requirements. Future work should be mechanisms and services for the components.
devoted to optimize power line architectures in It acts independently from the chosen mapping
order to minimize the number of cables, splicing, of these components to the infrastructure of the
etc. This implies rethinking the DC bundles as interconnected ECUs. Taking into account AUTO-
rethinking the implementation of networks as SAR concept, if the proposed networks (PLC or
independent domain. Additionally, the technical wireless) are introduced in vehicles, they must be
solution must be optimized taking into account adapted and must demonstrate their conformance
more channel measurements. to the AUTOSAR standard.
Wireless solutions can be adopted inside au-
tomotive applications as more and more devices
are both used in home and in cars while operating REFERENCES
as non-critical application or as redundant links.
Studies should be devoted to test these wireless 802.11 (1999). Technical Specification. Retrieved
systems in intra-car communications while op- from ref http://standards.ieee.org/getieee802/
timizing them to fulfil flexibility, fault tolerance, download.
security, real time and EMC requirements.
Afkhamie, K. H., Katar, S., Yonge, L., & Newman,
In 2003, AUTOSAR (AUTomotive Open Sys-
R. A. (2005). Overview of the upcoming Home-
tem Architecture) (Fennel & Bunzel, 2006) has
Plug AV Standard. Power Line Communications
been jointly developed by automobile manufac-
and Its Applications, International Symposium,
turers, suppliers and tool developers. It is defined
6-8 April, (pp. 400- 404).
as an open and standardized automotive software
architecture. AUTOSAR aims as minimizing the Automotive Systems Research Group. (2008).
barriers between functional domains while facili- Retrieved from http://www.ttcan.com/ASRG
tating the re-use of soft and hardware components
Beikirch, H., & Voss, M. (2000). CAN-trans-
between different vehicle platforms. To achieve
ceiver for field-bus power line communication.
this, AUTOSAR defines a methodology that sup-
ISPLC Symposium, Limerick, Ireland, April,
ports a distributed, function-driven development
(pp. 257–264).

87
Automotive Network Architecture for ECUs Communications

Bluetooth (2008). Retrieved from http://www. Gouret, W., Nouvel, F., & EL Zein, G. (2006).
bluetooth.org/ Additional Network Using Automotive Powerline
Communication. IEEE International Power line
CAN. (2001). Retrieved from official web site
Communications and Its Applications Conference,
http://www.can-cia.org/
ISPLC 2006, 26-29 March, (pp 1087-1092).
Chen, Y., & Chen, L. (2005). Using Bluetooth
Gouret, W., Nouvel, F., & EL Zein, G. (2007). High
wireless technology in vehicles. IEEE Interna-
Data Rate Network Using Automotive Power Line.
tional Conference Vehicular Electronics and
IEEE International Power line Communications
Safety, 14-16 October, (pp. 344- 347).
and Its Applications Conference, ISPLC 2007,
CISPR25. (2002). Limits and methods of measure- 26-28 March. (pp. 1-4).
ment of radio disturbance characteristics for the
Hara, S., & Prasad, R. (1997). Overview of multi-
protection of receivers used on board vehicles.
carrier CDMA. IEEE Communications Magazine,
Technical report, CISPR-25, 2002.
December, (pp. 126-133).
Degardin, V., Laly, P., Liénard, M., & Degauque,
Heiskala, J., & Terry, J. (2002). OFDM wireless
P. (2006). Impulsive Noise on In-Vehicle Power
LANS: A Theorethical and Practical guide. Sams
Lines: Characterization and Impact on Commu-
Publishing.
nication Performance. IEEE International Power
line Communications and Its Applications Confer- Home Plug V1.0 (2008). HomePlug Powerline
ence, ISPLC 2006, 26-29 March, (pp. 222-226). Alliance. Retrieved from official web site www.
homeplug.org.
Degardin, V., Laly, P., Liénard, M., & Degauque,
P. (2007). Performances of the HomePlug PHY Huck, T., Schirmer, J., & Dostert, K. (2005). Tuto-
layer in the context of in-vehicle powerline com- rial about the implementation of a vehicular high
munications. IEEE International Power line Com- speed communication system. IEEE ISPLC.
munications and Its Applications Conference,
IDB Forum. (2008). Retrieved from web site
ISPLC 2007, 26-28 March, (pp. 93-97).
http://www.idbforum.org.
Fennel, H., & Bunzel, S. (2006). Achievements
IDB1394, (2008). 1394 Automotive Presentation,
and exploitation of the AUTOSAR development
Max Bassler, Shenzen, China, 10 April 2008. Re-
partnership, Copyright © 2006 CTEA. Retrieved
trieved from web site http://www.idbforum.org
from official web site http:www.autosar.org
IEEE 1901 (2008). Retrieved from official web
FlexRay Consortium. (2004). FlexRay Commu-
http://grouper.ieee.org/groups/1901/Scope_Pur-
nication System, Protocol Specification, Version
pose.html
2.0. Retrieved from: http://www.flexray.com
Iperf, (2008). Iperf tool and documentation,
Gast, M. S. (2002). 802.11 Wireless Networks, the
Retrieved from official web http://sourceforge.
definitive guide. O’Reilly Publishing.
net/projects/iperf.
Gavette, S., & other HomePlug members Home-
J2056/2 Survey. (1994). J2056/2 survey of known
Plug Powerline Alliance (2006). HomePlug
protocols. In SAE Handbook. Warrendale, PA:
AV Technology Overview. Technical report.
Soc. Automotive Eng. (SAE), vol. 2.
Sharp Laboratories of America. Retrieved
from download.microsoft.com/download. Johansson, K., Törngren, M., & Nielsen, L. (2005),
Handbook of Networked and Embedded Control

88
Automotive Network Architecture for ECUs Communications

Systems, D. Hristu-Varsakelis and W. S. Levine, MOST (2006). MOST Core Compliance Test
Eds. Boston, MA: Birkhäuser, 2005. Specification V2.00. Technical Report. Retrieved,
from http://www.mostcooperation.com/publica-
Kopetz, H., et al. (2002). Specification of the TTP/A
tions.
Protocol. (Technical Report). Vienna, Austria,
University. Technology. MOST Cooperation (2008). MOST Specification
Revision. Retrieved from http://www.mostnet.
LEA. (2008). LEA Organisation. Retrieved from
de.
official web site http://www.leacom.fr.
Navet (2008). The Automotive Embedded Systems
Lee, M. K., Latchman, H. A., Newman, R. E.,
Handbook. Industrial Information Technology
Katar, S., & Yonge, L. (2002). Field performance
series, CRC Press / Taylor and Francis, ISBN
comparison of IEEE 802.11b and HomePlug
978-0849380266, to appear November 2008.
1.0 . IEEE Conference Conference Local Com-
puter Networks LCN 2002. 27th Annual (pp. Navet, N., Song, Y-Q., Simonot-Lion, F., &
598- 599). Wilvert, C. (2005, June). Trends in Automotive
Communication Systems. Proceedings of the
Leen, G., & Hefferman, D. (2001). Vehicles with-
IEEE, special issue on Industrial Communica-
out wires. Computing & Control Engineering
tions Systems., 93(6), 1204-1223.
Journal, 12(5), 205-21.
Nolte, T. (2003). Reducing Pessimism and Increas-
Lienard, M., Carrion, M., Degardin, V., & De-
ing Flexibility in the Controller Area Network.
gauque, P. (2008). Modeling and Analysis on
Mälardalen University Licentiate Thesis, May
In-vehicle power line communication channels.
2003 Department of Computer Science and
IEEE Transaction Vehicular TEchnologie, 57(2),
Engineering Mälardalen University Västeras,
670-679.
Sweden, Copyright Thomas Nolte, Printed by
Lin, Y., Latchman, H., Katar, S., & Lee, M. K. Arkitektkopia, Västeras, Sweden Distribution .
(2003, May). Theoretical and Field Performance
Nolte, T. (2006). Share-Driven Scheduling of
Comparison between 802.11 Wireless and Power-
Embedded Networks. Mälardalen University,
line HomePlug 1.0 Protocols. IEEE Communica-
Dissertation, May 2006. Department of Computer
tions Magazine with Focus Theme on Powerline
Science and Engineering Mälardalen University
Local Area Networks, (pp. 54-63).
Västeras, Sweden, Printed by Arkitektkopia,
Lin, Y. J., Haniph, A., Latchman, H., Neuman, R. Västeras, Sweden Distribution.
(2003, April). A comparative Performance study
Nouvel, F., El Zein, G., & Citerne, J. (1994, June).
of Wireless and Power Line Network. IEEE Com-
Code division multiple access for an automo-
munications Magazine, (pp. 54-63).
tive area network over power-lines. Proceed-
LIN Consortium. (2003). LIN Specification Pack- ings of IEEE Vehicular Technology Conf., (pp.
age. Revision 2.0.Retrieved from http://www. 525–529).
lin~subbus.org/.
Road Vehicles. (2004). Controller Area Network
Mahmud, S., & Shanker, S. (2006, May). In-Ve- (CAN)—Part 4: Time-Triggered Communication,
hicle Secure Wireless Personal Area Network ISO 11 898-4.
(SWPAN). IEEE Transactions On Vehicular
Rubin, A. (2002). Implementing automotive
Technology, 55(3), 1051-1061.
protocols for communications over noisy battery

89
Automotive Network Architecture for ECUs Communications

power lines. Proceedings of the IEEE Conference Control Area Network (CAN): Protocol
on Conv. Elect Electron. Eng. Israel, December, network
(p. 306).
CSMA/CA: Carrier sense multiple access
Schiffer, A. (2000). Statistical channel and noise with collision avoidance
modelling of vehicular dc-lines for data com-
ECU: Electronic Control Units
munication. Proceedings of IEEE Vehicular
Technology Conf.,Tokyo. Flexray: protocol network
Spdicom (2008). Spdicom Inc., Retrieved from HomePlug: Power line communication net-
official web Official web site http://www.spid- work
com.com.
IDB 1394: Intelligent transportation systems
Tsai, H., Saraydar, C., Talty, T., Ames, M., Mac- data bus using IEEE1394 technology—protocol
donald, A., & Tonguz, O. (2007). ZigBee-based network
Intra-car Wireless Sensor Network, Communi-
Local Interconnect Network(LIN): Protocol
cations. IEEE International Conference ICC’07,
network
24-28 June, (pp. 3965-3971).
Media Oriented Systems Transport
Valéo (2006). Valéo Inc., Electrical and Elec-
(MOST): Protocol network
tronic Distribution Systems: Focus on Power
Line Communication. Retrieved from official OFDM: Orthogonal frequency division mul-
web http://www.valeo.com/ . tiplexing
ZigBee (2000). ZigBee Specification. Version 1.0, PLC: Power line communication
December. Retrieved from http://www.zigbee.
TDMA: Time division multiple access
org;
IEEE 802.11 b/g: Wireless local area network
in the 2.4 GHz band (Wi-Fi)
KEY TERMS
ZigBee: Wireless sensor protocol network in
Bluetooth: Wireless master-slave network in the 2.4 GHz band
the 2.4 GHz band

90
91

Chapter V
Enabling Secure Wireless
Real-Time Vehicle Monitoring
and Control
Lek Heng Ngoh
Institute for Infocomm Research, A*STAR, Singapore

ABSRACT

The use of in-car networked electronic controller units (ECUs) for monitoring and control of various
vehicle subsystems has become a common practice among the automotive manufacturers. In this chapter,
the author surveys one of the most popular in-car networking technologies, the Controller Area Network
(CAN), as well as newer and emerging in-car network technologies called FlexRay and Media-Oriented
System Transport (MOST). Currently, these networks are deployed for in-car applications such as en-
gine diagnostics, and infotainment systems. In this chapter, however, the author extends the use of these
embedded vehicular networks by proposing to remotely monitor and control the vehicles through them,
in order to realize safety and driver assistance related applications. To accomplish this task, additional
technologies such as real-time wireless communications and data security are required, and each of
them is introduced and described in this chapter.

Introduction and send information from and to the on-road ve-


hicles opens up many application opportunities in
In this chapter we present the increasingly im- the effort to make future vehicles safer (both the
portant technological advances in a networked drivers and road users), more economical, more
vehicle and the related technologies in achieving fun (e.g. multimedia entertainment) and last but
secure wireless real-time monitoring and control not least, to simplify the often mammoth tasks of
of these vehicles. As more electronics found their traffic management and road maintenance. How-
way into the vehicle, the ability to remotely gather ever, for this vision to become a reality technology

Copyright © 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Enabling Secure Wireless Real-Time Vehicle Monitoring and Control

development must take place on several fronts. controller, and other nodes in real-time applica-
This chapter attempts to present an overview and tions. Since then, CAN has evolved to become
analysis of these key technical components. the de facto low-cost standard in a large variety
The chapter is organized as follows. We begin of networked embedded control systems. Many
by elaborating the controller area network (CAN) of the early deployments of CAN are found in
standard which is the most widely deployed in- automotive vehicles. To-date, however, CAN has
vehicle network system. Our description includes been used in a variety of application domains such
an overview of the CAN technology (Section III), as transportation (e.g. trains), manufacturing (e.g.
its deployment in a vehicle (Sections IV and V). process automation), construction (e.g. structural
The above is followed by a description of the vari- monitoring), agriculture (e.g. agriculture equip-
ous CAN-base car telematic applications (Section ment), healthcare (e.g. medical devices), enter-
VI). A brief introduction is given in Section VII tainment (e.g. arcade game machine), and even
on other networking standards that are currently in the control of scientific apparatus (e.g. proton
deployed in vehicles. In Sections VIII and IX, accelerators). In this chapter, however, we will
we elaborate two key components in achieving only focus on applications of CAN within the
remote vehicle monitoring and control, namely automotive vehicles (see Figure 1).
the wireless communication component and data In 2007, it is estimated that sale of vehicular
security component. In Section X, we present an CAN nodes has reached more than 600 million
overall architecture of the secure wireless real- each year (Johansson, K.H., Törngren M., &
time vehicle monitoring and control environment. Nielsen L., 2005). Looking ahead, the number
Finally, in Sections XI and XII, we discuss some of CAN nodes deployed in automotive vehicles
possible future trends in this field and conclude is expected to increase substantially as by 2008,
this chapter. all new vehicles sold in the US will be required
to be CAN-compliant, in particular, all new ve-
hicles are to equip with CAN-based diagnostic
II. Background system. Moving forward, the number of automo-
tive manufacturers adopting CAN for in-vehicle
The Controller Area Network (CAN) (CiA, 2008; embedded data communications and control is
Audi CAN-bus, 1998) is a serial bus communica- expected to increase as more Japanese models
tions protocol developed by Bosch in around1983. have started to adopt CAN-based technologies
CAN is a standard suitable for efficient and reli- which are relatively low-cost and a well-estab-
able communication between sensors, actuators, lished standard.

Figure 1. CAN Replaces traditional mesh wiring in a vehicle


device 1 device 1

ECU ECU
device 2 device 2

Without CAN Bus With CAN Bus

92
Enabling Secure Wireless Real-Time Vehicle Monitoring and Control

In the rest of this chapter, we will discuss are in the data field – which can be zero to eight
the various system components involved to ac- bytes long. The data field is followed by the cyclic
complish the goal of monitor and control vehicle redundancy checksum (CRC), which allows the
remotely and securely. We first elaborate the basis receiver to check if the data has been corrupted
and the general technology landscape of CAN during transmission. Next the two-bit acknowl-
deployments in automotive industry; followed edgement (ACK) field is for any of the receiver to
by an overview of the deployment of in-car CAN indicate to the transmitter that it has received a
networks. Next we discuss the various existing and valid frame. Finally, the end of message is signally
future applications that make use of the CAN data. through a seven-bit end-of-frame (EOF). We shall
The two key technologies components needed to describe the transmission process next.
achieve secure remote vehicle monitoring, namely As all CAN nodes are allow to transmit data
data security and wireless communications are onto the CAN bus any time, therefore it belongs
discussed toward the end of the chapter. to the class of protocols known as carrier sense
multiple access/collision avoidance (CSMA/CA).
In order to provide the necessary arbitration among
III. OVEF CAN the conflicting CAN nodes, it uses a non-destruc-
TECHNOLOGIES tive arbitration process. This process requires
the transmitting nodes to listen to the network
An overview of CAN technologies is presented in order to avoid collisions. This is how it works:
in this section. whenever the CAN bus is free, any ECU can start
CAN is a twisted-pair serial lines with real- to transmit a message, any possible conflicts due
time communications protocol particularly suited to more than one ECU transmitting simultane-
for connecting sensors (for monitoring purposes), ously are resolved by bit-wise arbitration using
and actuators (for control purposes) which are the identifier of each message. During arbitra-
commonly found in today’s vehicles – a high-end tion, each ECU transmits its message identifier
passenger car today can have up to hundreds of and compares it with what level it “hears” from
sensors and actuators connected by 80 electron- the network. If it wins in the bit-wise arbitration,
ics control units (ECUs) (Audi CAN-bus, 1998) the transmission process for this ECU continues,
which form the CAN nodes (see Figure 1). Details otherwise it quits transmitting. Using this process,
of the CAN bus operations are described in many CAN bus guarantees that there will be only one
literatures elsewhere. An overview is provided transmitter left transmitting at the end of the
here and interested readers are referred to these arbitration phase, with the rest of the ECU revert
literatures for further information (CiA, 2008). to receiving (or listening) mode.
All CAN nodes are connected to the CAN bus For cost control reasons, CAN bus comes in
in parallel, and communicate with each other via a different speed ratings depending on the functions
data frame which forms part of the CAN standard that it is deployed to control. Currently there are
(see Figure 2 and Figure 3). A data frame begins three classes of CAN bus (Class A to Class C).
with a single start-of-frame (SOF) bit, followed Class A speed rating is the slowest, typically
by eleven bits of identifier (ID) (there is also an around 10 kbps (thousand bits per second). It is
extended data frame with twenty-nine bit identi- typically deployed to control components such
fier), and the remote transmission request (RTR) as power mirror, power windows, door locks and
bit. The ID and RTR bits form the arbitration field lights. Class B CAN, by comparison, may operate
(see Figure 3). The control field consists of six for 10 kbps to 125 kbps. It is fast enough to carry
bits, and indicates how many bytes of data there more complex information and time-sensitive

93
Enabling Secure Wireless Real-Time Vehicle Monitoring and Control

data such as electronic instruments, electronic 7-layer model, in order to meet certain applica-
transmission controls, climate controls. Finally, tion requirements, higher layer protocols have
Class C CAN bus is the fastest with bit rate up to also been developed to be added to the current
1 Mbps. Many of the vehicles that are currently two-layer specification. Many of these higher
using a Class C data bus are operating at speeds layer protocols were developed for applications
of around 500kbps. At this rate, it is fast enough outside of automotive industry (e.g. distributed
for power-train control modules, air bag modules, industrial automation) (Kvaser, 2008; AALCAR,
and fast acting anti-lock break and stability control 2008). However, these protocols have now become
system. The development of CAN continues, and relevant as we explore transmitting of CAN bus
it can be expected that faster versions of CAN bus data remotely (see Section VIII).
will make their way into a shop near you soon. An example of a higher layer protocol is the
The CAN protocol defines the lowest two CANopen (Kvaser, 2008) which is a standardized
layers (i.e. physical and data-link layer) of the layer defined for distributed industrial automation.
Open System Interconnection model i.e. OSI’s It specifies communication profiles and device

Figure 2. Parallel ECU connections to CAN bus

Sensors/Actuators Sensors/Actuators

Electronics Electronics
Control Unit (ECU) Control Unit (ECU)

CAN Bus CAN Bus

Figure 3. Details of CAN message data frame

Arbitration Field
(12 bits/30 bits)

RTR (1 bit)
Start field End field
(1 bit) CRC (16 bits) (7 bits)
Control field
(6 bits) Data field ACK field
Message ID (max 64 bits) (2 bits)
(11 bits/29 bits)

94
Enabling Secure Wireless Real-Time Vehicle Monitoring and Control

profiles, which enable an application-indepen- Figure 4. An example CAN deployment in car


dent use of CAN. In this case device profiles
are defined for most common devices such as Headlamp
Wipers
analogue-to-digital converters. Furthermore,
CANopen also distinguishes real-time data verses
Power train
less time-sensitive data. Other standardized higher CAN ECU
layer protocols include DeviceNet (Kvaser, 2008)
CAN Bus
(adding Internet protocols TCP/IP on top of CAN).
Another higher layer protocol is CAN Kingdom
(Kvaser, 2008). CAN Kingdom was developed door Audio
mainly for maritime industry. Its main feature is speakers
that it allows changing of CAN network behavior
at any time, including whilst in run-time. CAN
Kingdom allows for system troubleshooters to
turn off individual nodes. It will also allow for
dynamic and run-time change of node identifier
Table 1. Examples of CAN ECU for powertrain
and conditions for sending messages.
and chassis subsystems
Finally, new developments have also taken
place for basic CAN protocols. The latest ex- Action Data Speed
tension of CAN includes the capabilities such as Engine control Monitor/Control 500kps
Time-Trigger communication on CAN (TTCAN,
Gearbox control Monitor/Contro 500kps
(TTCAN, 2008)) verses the traditional event-trig-
Gear selector lever Monitor/Contro 500kps
gered CAN. TTCAN allows the nodes to have
Break control unit Monitor/Contro 500kps
guaranteed access to the communication bus with
a fixed periodic interval.

IV. EXAMPLE DEPLOYMENT OF Table 2. Examples of CAN ECU for convenience


CAN NETWORK IN VEHICLES subsystems

Action Data Speed


In the automotive industry, there has been a
remarkable evolution over the last few years in Left turn signal Monitor 125 kbps

which embedded control systems have grown from Right turn signal Monitor 125 kbps

standalone control systems to highly integrated High Beam Monitor 125 kbps

and networked control systems. Many car manu- Wiper Hi Monitor 125 kbps

factures today design their control architectures Wiper Lo Monitor 125 kbps
based on CAN, including BMW, Chevrolet, Fiat, Wiper int. approx 17 seconds
Monitor 125 kbps
interval
Ford, Mazda, Mercedes, Renault, SAAB, Toyota,
Wiper int. approx 15 seconds
Volkswagen, and Volvo. interval
Monitor 125 kbps
Typical CAN-based distributed control archi- Head light “on” Lo Monitor 125 kbps
tecture would consist of multiple CAN networks of
Head light “on” Hi Monitor 125 kbps
ECUs namely power-train and chassis subsystem,
Reverse light “on” Monitor 125 kbps
infotainment subsystem, and body electronics
Brake light “on” Monitor 125 kbps
subsystem (see Figure 4). Tables 1-2 show the
details of these three CAN networks.

95
Enabling Secure Wireless Real-Time Vehicle Monitoring and Control

V. MANUFACTUERE -SPECIFIC CAN the transmission and use of this data externally
AND LoCATION DATA from one or more vehicles are yet to be exploited
for a wide range of applications, some of which
Even though CAN bus is a well-established are even beyond our current imagination. As
standard for intra-car data communications, car described in previous section, CAN bus has been
manufactures have taken the liberty to implement used for not just vehicle’s power-train and chassis,
and deploy the network freely. The reality is that it has also been deployed at both the comfort and
there is no standard of allocating the data bits convenience (e.g. seat, parking aid, door, interior
with respect to the various CAN sub-systems. climate control), as well as infotainment (radio,
Each car manufacturer has therefore assigned and phone, navigation) subsystems. All these mean
defined their own CAN bit pattern for respective that with the aplenty CAN basic data, a host of
CAN node. This vendor-specific information remote applications can be developed to cater for
must therefore be obtained in order for any soft- all aspects of need of the drivers and their vehicles
ware to decode and make use of the CAN data. (Jaman G., 2007). In the rest of this section, some
Furthermore, most vehicles today are equipped of these futuristic applications will be described
with Global Positioning System (GPS) receivers at conceptual level to give readers a sense of the
where the location information of the vehicles emerging applications at the horizon.
is constantly obtained. As we will elaborate in
the next section, location information for each 1. Maintenance and diagnosis: Based on the
vehicle is crucial to many of the vehicle telematic above description of CAN operations thus
applications, as well as future multi-hop car-to-car far, it should not be difficult to conclude that
communications, and should therefore be handled in order to read the data on CAN bus, one
and communicated along with the CAN bus data has to do so through a device mimicking
described in this section. the operations of a “receiver-only” ECU
node. Therefore, CAN-compliant SCAN
tools (AALCAR, 2008) are currently
VI. VEHICLE APPLICATIONS USING available commercially to read the vehicle
CAN BUS DATA CAN data serially. All CAN ECU modules
can send and receive “I’m OK” signals to
Today the adoption of CAN bus is not only inform each other their status. On the other
motivated by saving and simplifying cabling as hand, whenever a problem occurs in one of
was the case in the beginning. A number of ap- the modules, it will not generate the “ok”
plications such as diagnostic and engine control signal and this in turn will be detected
functions have been developed. Beyond these, by the SCAN tool and inform the user. A
some highly integrated and networked control faulty ECU module in this case may not
systems that involve distributed coordination of start a vehicle, and hence the follow-up ac-
many sub-systems are also been developed. In tion is for the vehicle to be checked and the
many exiting and future vehicles, information of a faulty ECU replaced at a workshop nearby.
car’s multiple ECUs will be shared and exchanged Similarly, making the CAN data remotely
over the CAN bus. Examples of use of this data will enable such condition to be detected in
include vehicle diagnostics, dynamics control advance and preventative maintenance can
and even drive-by-wire systems (e.g. brake-by- be carried out regularly.
wire, steer-by-wire etc.). Whilst up to now data 2. Safety: CAN networks have played a
is only available and used within the vehicle, significant role in providing extra safety

96
Enabling Secure Wireless Real-Time Vehicle Monitoring and Control

features to the driver. Case in point is the conditions. Similar to the sensor modalities
electronic stability control (ESC) that is used for providing safety features such as
fast becoming a standard feature in even ESC, ACC and parking assistance systems
mid-range passenger vehicles. Essentially will make use of the information collected
the ESC systems can detect unstable driving through CAN networks, as well as using the
situation by comparing the driver’s intended CAN network to communicate commands
course with the vehicle’s actual moment to both the driver and relevant electronic
using CAN ECU data such as wheel speed, systems
angle, yaw rate and lateral acceleration, and
take necessary control action to stabilize the Next, automatic parking assistance systems
car and keep it on the road. Control actions would probably rely on ultrasonic sensors mounted
of ESC include the use of a combination of on the sides of the vehicle to measure available
anti-lock brake (ABS) and electronic force parking space length and depth. CAN bus would
distribution etc. With more sophisticated be used by the system to communicate commands
sensory technologies (e.g. radar and video), to the subsystems such as steering control and
future ESC systems will be able to detect brakes.
signal such as driver’s physical conditions Similar to the above cases, with remote moni-
(e.g. drowsiness) and take appropriate cor- toring and control, such features can be provided
rective action such as to take-over control cheaper and earlier as many of these systems
of the vehicle and park it somewhere safe! would require large computing resources (e.g.
All the monitoring and actuation are com- CPU power) which may not be readily available
municated to the respective ECU via CAN in a car.
networks.
3. Traf. c telemetric: The use of on-the-road 5. Infotainment-on-the-go: With the prolifer-
vehicles as speed sensors and to rely the ation of personal entertainment devices and
information to a centralized server, where the availability of intelligent multipurpose
information is gathered and learned about the monitor screens and audio devices in passen-
traffic condition, about a stretch of a road, ger cars, it is only a matter of time before the
have proven to be feasible (Johansson, K.H., drivers are able to download infotainment
Törngren M., & Nielsen L., 2005). With CAN content such as popular songs and surf the
bus information made available, collective net on-the-go. CAN bus is already expected
information regarding the road conditions to play a significant role in the control and
and even weather condition (via information configuration of these in-car infotainment
on the use of headlights and wipers) can be devices to facilitate these applications.
obtained. A host of vehicular applications
and services can then be developed to make Clearly business aspects such as market in-
use of this information. troduction and key success factors need to be
4. Driver assistance: Some of the up-and-com- considered together as the related technologies
ing driver assistive functions for automotive are being overcome. It is worth noting that the
are the adaptive cruise control (ACC) and relevant business issues here are no different
parking assistance. ACC’s main function is from any Internet-based applications and ser-
to adapt vehicle speed with respect to the vices which we are familiar. However, one key
information such as distance to the front important difference is that the availability (i.e.
car, obstacles and even weather (e.g. fog) adoption rate) of car communication will greatly

97
Enabling Secure Wireless Real-Time Vehicle Monitoring and Control

influence the kinds of applications that are likely new generation standard that has been designed
to be introduced first. The two key factors are, the to meet these requirements better than CAN. For
different data quality of service (QOS) that each the start, FlexRay is capable of delivering data rate
mode of communication can deliver (e.g. data of 10 Mbits/sec that is almost 10 times more than
timeliness and reliability), and the availability of the fastest CAN available. FlexRay protocols also
cars equipped with each mode of communication. provide better timing requirement by transmitting
Thus for example, car-to-car communications can messages in fixed time slots (verses the asyn-
support low-data latency but it is not expected to chronous CAN), and superior fault-tolerance and
be widely available over-night, and therefore will redundant message transmission on two separate
limit the class of applications (e.g. lane merging) physical channels. Unfortunately, FlexRay had not
that would only work well if large percentage of been designed to inter-work with CAN network
vehicles are equipped with the capability to detect in mind, and therefore a complete replacement of
and transmit data in a car-to-car manner. CAN is unlikely to happen anytime soon.
Finally, an emerging future vehicular network
standard that is gaining acceptance is the Media
VII. OTHER IN-VEHICLE Oriented Systems Transport (MOST) (MOST,
NETWORKING STANDARDS 2008) networking standard. Given the expected
rise in in-car telematics and entertainment systems
Whilst CAN is the most commonly found in-vehi- such as digitized audio, video contents, loca-
cle network today, there are other network systems tion-based applications and broadband Internet
which are being deployed to either inter-work or connections, a much higher data transfer rate of
supersede CAN. An example of the inter-working more than CAN’s maximum 1 Mbits/sec is needed.
network is the Local Interconnect Network (LIN) For example, a transfer rate of at least 6 Mbits/sec
(LIN, 2008). LIN standard precedes CAN and is a is required for the transmission of digital TV
single-wire bus system. A LIN network is typically signals and high-quality audio. For this reason,
made up of a master node and one or more (up to MOST network is defined to handle transfer rate
16) slave nodes connected serially to the master in excess of 20 Mbits/sec. MOST networks make
node. A slave node can typically be a sensor such use of the large available raw bandwidth in opti-
as a tilt sensor or anti-theft alarm sounder. It can cal fibers, with optical transceivers connected to
also be an actuator in the form of an intelligent each MOST node. Nodes are normally connected
electronic or electromechanical assembly which in the form of a ring-bus.
comes under the control of a master node. The Finally, wireless networking standards such
master node controls the speed (normally 1 to as Bluetooth (Bluetooth, 2008), Ultra-wideband
20 kbits/sec), sequence, as well as the frequency (UWB, 2008) and related wireless USB (USB,
of data transfer between itself and slaves nodes. 2008) are expected to play roles in the future
A number of LIN master nodes, in turn, can be in-vehicle data networking solution. Wireless
connected to a CAN ECU node. networks have the key advantages of easy instal-
Next, with increasingly sophisticated electron- lation and zero risk of cable-related damages.
ics being added to the vehicles, a greater demand However, more research is required to ensure that
is placed on the interconnecting network bus in these networking standards can adapt well in a
relation to data speed, time-determination and relatively noise vehicular environment. Another
fault tolerance. FlexRay (FlexRay, 2008) is a key consideration is the protection of data being
transmitted by these means.

98
Enabling Secure Wireless Real-Time Vehicle Monitoring and Control

Figure 5. Multiple modes of remote data communications

(1)Request
Application
(1)Response Server

Wireless Channels
(2)Data
(4)
(3)Request

(3)Response

V III. REMOTE DATE even availability test of the communica-


COMMUNICATIONS tion channel between the server and the
vehicle.
With the proliferation of wireless communication 2. Using the same communication chan-
infrastructure and technologies, plus inter-opera- nels as the above, the second mode of
tor roaming arrangements, sending and receiving communications caters for periodic data
data remotely is already a reality (IEEE 802.11p, sent from the vehicles to the server and
2008; DSRC, 2008; IEEE802.11, 2008). To sup- vice-verse. This mode of communication
port CAN data communications, many of the is also used for the communication of
standardized higher layer CAN protocols such as monitored data including non-real time
CANopen, CAN Kingdom (see Section III) will as well as urgent/emergency data from the
allow for seamless migration to IP-based cellular vehicles to the server and vice verse.
data services (e.g. GPRS, HSDPA, EDGE), and 3. In this mode, again using the same com-
thus realize remote CAN data communications munication channels as the first two, the
easier. However, what is not so certain is the need vehicles are able to query server for infor-
to ensure timeliness and reliable communications mation pertaining to server’s parameters,
of CAN data between the vehicle and say applica- as well as link test the return channel
tion servers. As shown in Figure 5 above, there availability – this is required as there is
are typically few different modes of communica- often the case that wireless channels are
tions between the moving vehicles and data server of asymmetric nature.
(typically housed within a data centre), as well as 4. Finally, data can also be exchanged via
among the vehicles themselves. car-to-car communications (DSRC,
2008); IEEE802.11, 2008). This ad-hoc
1. The first ((1) in Figure 5) is server communication technology is to be
requests and vehicle responses. This implemented in each participating vehicle
mode of communication is achieved by and enable the autonomous exchange of
vehicle communicating via a road-side data between them in a speedily man-
communication infrastructure or cel- ner without going through the road-side
lular phone system. It is typically used infrastructure and server as in previous
by the server to configure, disseminate three cases.
control information to the vehicles, and

99
Enabling Secure Wireless Real-Time Vehicle Monitoring and Control

Indeed, it should be obvious from the above moving vehicles once they come within the cover-
that depending on the mode of server-vehicle com- age range, to hop-by-hop ad hoc vehicle-to-vehicle
munications, and the nature of CAN data, there communications. Whilst these emerging stan-
would be different transmission requirements dards are not expected to substantially change the
(e.g. tolerable delay, loss and bandwidth needed way vehicular data is being remotely monitored,
etc.) for each of the communication modes above. one can expect improvement in cost as well as
Whilst today cellular data services support roam- communication availability once these standards
ing and base-station handover effectively, with are fully adopted and implemented (Kosch, T.,
some schemes even allow for seamlessly transfer 2004; Matheus, K. 2002).
of access to other wireless broadband internet
technologies such as WIFI, EDGE, WIMAX
and vice verse. There are other constraints such IX. DATA SEURITY
as cost, coverage and end-to-end delay of these
basic communication services that need to be taken With the emerging vehicular networks in the forms
into consideration; another word, establishment of of infrastructure-to-car (I2C), car-to-car (C2C),
basic data connectivity is required but it will not car-to-infrastructure (C2I) communications, as
satisfy the quality-of-service (QOS) requirements well as in-car CAN ECU described so far, a va-
for remote CAN data communications. riety of applications for safety, traffic efficiency,
An enhanced solution would include additional driver assistance, as well as infotainment to be
software functions such as a link QOS manager incorporated into future automotive designs. At
and a connection manager to be added at the com- the same time, networked CAN ECUs are increas-
munication infrastructure provider end, as well ingly being deployed in cars to realize functions
as additional software components to be included such as engine management, air-bag deployment,
into the monitoring server ends to facilitate link and even in intelligent brake systems. However,
QOS measurements (latency, bandwidth, cost the availability of these exciting automotive
etc) between the data server and vehicles being applications can also lead to formidable set of
monitored. Constant monitoring and proactive exploits and vulnerable to attacks, as more and
handover and roaming actions will be initiated more data is being exchanged and communicated
by the QOS manager and connection manager to in and out of a car. Therefore, one of the most
ensure that data communication QOS between the important aspects of remote vehicle monitor-
server and vehicles is satisfactory and cost effec- ing is to ensure the integrity of CAN data being
tive. Furthermore, end users should be prompted exchanged between the vehicle and monitoring
in the event where coverage of the network is application server. Unlike other communication
insufficient or the required QOS cannot be met networks, the vehicular network differs in size,
given the available communication channels. speed of the vehicles, as well as relevance of
Finally, standard for future car-to-car (i.e. ad- their geographic position. Most importantly, the
hoc) and car-to-infrastructure (i.e. in the form of sporadic connectivity between them also made
dedicated short-range communications (DSRC) providing data security to vehicles especially
and/or IEEE 802.11p) communications are also challenging.
being developed by the international community. There are some possible security threats and
The deployment of DSRC can take many forms, attacks (Raya M., Hubaux J.P., 2005; Hubaux, J.P.,
ranging from delay-tolerant “data filling” where Capkun, S., & Luo, J. 2004; Zarki M.E., Mehrotra
DSRC nodes are deployed every few kilometers S., Tsudik G., & Venkatasubramanianm N., 2002;
apart (e.g. on lamp posts) to communicate with Eymann T.,2006) due to the limited security:

100
Enabling Secure Wireless Real-Time Vehicle Monitoring and Control

1. Eavesdropping: Eavesdrop and record of a The above solutions should ensure that data
warning message about emergency vehicle, within and without the automotive is protected
or diffuse wrong information in the network from abuse and security attacks. In order to ad-
to affect the behavior of other drivers (e.g., dress this holistically, one begins by identifying
divert traffic from a given road and thus free the various security threats and attacks that vari-
it). ous vehicular applications and communication
2. Denial of service: Accessibility of a service networks are vulnerable to. Next security analysis
is restricted (e.g., channel jamming and ag- on these networks and applications needs to be
gressive injection of dummy messages). carried out in each of these cases. And finally,
3. Bogus information: Faking of a warning proposed solutions and design will include three
message. major aspects: tamper-resistant software in em-
4. Spoofing: Take over of the identity of an bedded devices for intra-car security, security
authorized device. solutions for vehicle ad-hoc network (VANET)
5. ID disclosure of other vehicle: Surveillance and, last but not least, standard compliant.
of the vehicle motions by using the C2C and
C2I infrastructure.
6. Cheating with sensory information: Alter X. An OVEALL ARCHITECTURE
the perceived position, speed, direction, etc.
in order to escape liability notably in the In summary, Figure 6 shows an overall architec-
case of an accident. ture of the secure wireless real-time vehicle moni-
toring and control. The various components of this
What is required is an integrated info-security architecture have been elaborated previously in
solution to manage and protect the critical data this chapter. The in-vehicle node is responsible
for intra-car, car-to-car and car-to-infrastructure for the interfacing and monitoring of vehicle via
communications. Respective key information the in-vehicle networks such as CAN and MOST;
security issues to be addressed can be listed as it is also capable of conveying control data from
follows: the backend applications to the vehicle. Another
key function of this component is to communi-
1. Intra-car communications: Anti-theft and cate securely with the other vehicles via its C2C
confidentiality of real-time sensor and ECU and/or C2I communication protocol stack. In
data; C2C mode of communication, it often involves
2. Car-to-car communications: Messages the exchange of real-time messages either with
exchanged must have stringent constraints one of the vehicle within its range, or broadcast
on confidentiality, integrity, privacy and to all the vehicles within its range. The C2I mode
time-sensitivity; finally on the other hand, is with the stationary service
3. Car-to-infrastructure communications: node where communication can be via ad-hoc
Integrity of traffic-related information, fu- and/or cellular data service such as GPRS.
ture entertainment related data (e.g. songs The main functions of the service node include
and video), and even liability-related mes- communicating with the on-the-road vehicles via
sages must be protected. Other issues include their in-vehicle nodes, as well as facilitating the
the availability of network infrastructures request, access and the delivery of one or more
to provide communications. car-telematic services and applications to the
vehicles. The service node therefore enables the

101
Enabling Secure Wireless Real-Time Vehicle Monitoring and Control

provision and delivery of IT applications to the are available in a feasible (e.g. transferring from
on-the-road vehicles in a secure and transparent smart phone to in-car display terminals), reliable
manner. As shown in Figure 6, with the help of a and secure manner between the backend hosted
service node, services are made available to mobile services and vehicles. The details involved are be-
digital devices such as smart phones and wireless yond the scope of this chapter, but key middleware
laptops, as more and more of these devices are functions here include secure single sign-on for
being carried by drivers and passengers alike. users, user profiles management, accounting and
Finally in Figure 6, the various applications charging, as well as flexible session monitoring
and services are being offered via the backend and control. It is important to note that a number
cloud service middleware to ensure that they of vendor-based de-facto standards have started to

Figure 6. Overall architecture of secure wireless real-time vehicle monitoring and control

v ideo server
Location-
based
server

b ackend
v ehicular
Traffic Mgt
Telematic s ervices
and s ecurity data
Applications portal

s ervice
s ignaling

data

s ervice Node
C2I and Cellular
s ecure Communications

C2C
Mobile devices

In-vehicle Node

102
Enabling Secure Wireless Real-Time Vehicle Monitoring and Control

emerge (GEARS, 2008; LiveMesh, 2008), as well data and information between the vehicle and ap-
as international standard bodies have defined and plication server was also discussed. In conclusion,
are currently working on standards in these areas, the author sees innovation in real-time monitoring
especially those which are related to networks and and control area being the key research platform
communications (WAVE, 2008; C2C, 2008). to kick-start a potentially fertile ground for future
automotive innovations and services.

XI. FUTURE TRENDS


RE
As automotive vehicles continue to play an impor-
tant role from a country’s economy to individual
AALCAR. (2008). Automotive CAN Network
life style, efforts in making a car better in terms
Diagnostics. Retrieved October 13, 2008, from
of comfort, safety, reliable and even fun to drive
http://www.aa1car.com/library/can_systems.
will continue relentlessly. One of the key trends
htm
along this development has been the proliferation
of embedded data monitoring and control network Audi CAN-bus. (2008). Trainer Information.
systems within a vehicle (aka networked vehicle). Edition 1
In this chapter, we elaborated one of the most
Bluetooth. (2008). Bluetooth standard. Retrieved
popular in-car networking technologies called
October 13, 2008, from http://www.bluetooth.
Controller Area Network (CAN). It is also worth
com
noting that newer and emerging in-car network
technologies such as FlexRay and Media-Oriented CiA. (2008). CAN in Automation. Retrieved Oc-
System Transport (MOST) are also being deployed tober 13, 2008, from http://www.can-cia.org/
in higher-end vehicles. The ability to monitor
C2C. (2008). European based Car-to-Car com-
and control a vehicle wirelessly for safety, main-
munication Consortium. Retrieved October 13,
tenance, reliable and entertainment purposes is
2008, from http://www.car-to-car.org
fast becoming a reality in not too distance future.
Indeed, as more digitized contents find their way DSRC. (2008). Dedicated Short Range Com-
to the vehicles in the form of down-loaded and munications. Retrieved October 13, 2008, from
streamed audio and video infotainment-on-the-go http://grouper.ieee.org/groups/scc32/dsrc/
applications and services, the availability of higher
Eymann, T. (2006). The EASIS Security Architec-
speed like MOST will become more urgent.
ture Approach. 1st C2C-CC Security Workshop.
Berlin, November 2006.
XII. CONCLUS FlexRay. (2008). FlexRay In-vehicle Network.
Retrieved October 13, 2008, from http://www.
This chapter began by introducing the basic interfacebus.com
CAN technologies and subsequently focused on
GEARS. (2008). Google GEARS. Retrieved Oc-
elaborating the potential applications and related
tober 13, 2008, from http://gears.google.com
technical challenges in achieving secure remote
monitoring and control of vehicles via CAN. Hubaux, J. P., Capkun, S., & Luo, J. (2004). The
Furthermore, the details of various modes of Security and Privacy of Smart Vehicles. IEEE
wireless communications were presented. Last but Security and Privacy Magazine 2(3) (2004),
certainly not least, the importance of protecting 49-55.

103
Enabling Secure Wireless Real-Time Vehicle Monitoring and Control

IEEE 802.11p. (2008). Retrieved October 13, Matheus, K. (2002). Car-to-Car Communication
2008, from http://en.wikipedia.org/wiki/IEEE_ – Market Introduction and Success factors. Re-
802.11p trieved October 13, 2008, from http://www.car-to-
car.org/fileadmin/dokumente/pdf/C2C-CC_pre-
IEEE802.11. (2008). IEEE 802.11 working group.
sentation_4_VW_Audi_Carmeq.pdf
Retrieved October 13, 2008, from http://grouper.
ieee.org/groups/802/11/ MOST. (2008). Media Oriented System Trans-
port (MOST). Retrieved October 13, 2008, from
Johansson, K. H., Törngren, M., & Nielsen, L.
http://www.interfacebus.com/MOST_Bus_In-
(2005). Vehicle applications of controller area
terface.html
network. In D. Hristu-Varsakelis & W. S. Levine
(Ed.), Handbook of Networked and Embedded Raya, M., Hubaux, J.P. (2005). The Security of
Control Systems, Birkhäuser. Vehicle Ad Hoc Networks. Proceedings of the
ACM Workshop on Security in Ad hoc and Sen-
Jaman, G. (2007). Structural Monitoring Using
sor Networks (SASN’05), pp. 11-21, Alexandria,
Wireless Sensors and Controller Area Network.
Virginia, USA, November 2005.
IEEE 5th Annual Conference on Communication
Networks and Services Research (CNSR’07). TTCAN. (2008). Time Triggered Controller Area
Network (TTCAN). Retrieved October 13, 2008,
Kosch, T. (2004). Technical Concept and Prereq-
from http://www.ttcan.com/
uisites of Car-to-Car Communication. Retrieved
October 13, 2008, from http://www.car-to-car. USB. (2008). Wireless USB. Retrieved October
org/fileadmin/dokumente/pdf/C2C-CC_presen- 13, 2008, from http://www.usb.org/wusb/
tation_3_BMW.pdf
UWB. (2008). Ultra-wideband Technolgy. Re-
Kvaser. (2008). CAN Kingdom. Retrieved October trieved October 13, 2008, from http://www.intel.
13, 2008, from http://www.kvaser.com/index. com/technology/comms/uwb/
htm
WAVE. (2008). IEEE Wireless Access in Vehicu-
LIN. (2008). Local Interconnection Network lar Environment (WAVE), IEEE 1609. Retrieved
(LIN). Retrieved October 13, 2008, from October 13, 2008, from http://standards.ieee.
http://www.interfacebus.com/Design_Connec- org/announcements/pr_P1609.0_new.html
tor_LIN_Bus.html
Zarki, M. E., Mehrotra, S., Tsudik, G., & Ven-
LiveMesh. (2008). Microsoft Live Mesh. Re- katasubramanianm, N. (2002). Security Issues
trieved October 13, 2008, from http://news.cnet. in Future Vehicular Network. Proceedings of
com/8301-10784_3-9926578-7.html European Wireless Conference 2002.

104
105

Chapter VI
MAC and Routing Protocols for
Vehicle to Vehicle
Communications
Xiaobo Long
Rensselaer Polytechnic Institute, USA

Biplab Sikdar
Rensselaer Polytechnic Institute, USA

ABSTRACT

Numerous efforts are currently under progress to enhance the safety and efficiency of vehicular traffic
through intelligent transportation systems. In addition, the growing demand for access to data and in-
formation from human users on the go has created the need for advanced vehicle-to-vehicle and vehicle-
to-roadside communication systems capable of high data rates and amenable to high degrees of node
mobility. Vehicular communications and networks are expected to be used for a number of purposes such
as for enabling mobile users to transfer data and information from other networks such as the Internet
and also for implementing services such as Intersection Decision Systems (IDS), Automated Highway
Systems (AHS), and Advanced Vehicle Safety Systems (AVS). In this chapter the authors describe medium
access control (MAC) and routing protocols for vehicular networks and the various factors that affect
their design and performance.

Introduction and tion between road-side beacons and individual


Background vehicles. A recent standard for vehicle-to-vehicle
communication is the 5.9 GHz Unlicensed Na-
PHY Layer Issues tional Information Infrastructure (UNII) been
developed to support high mobility in IEEE
Vehicle-to-Vehicle (V2V) communication sys- 802.11 protocol. This emerging 802.11 standard
tems, as part of future Intelligent Transportation for 5.9 GHz is generally referred to as Wireless
Systems (ITS), require bidirectional communica- Access in the Vehicular Environment (WAVE),

Copyright © 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
MAC and Routing Protocols for Vehicle to Vehicle Communications

which provides Dedicated Short Range Com- the basic carrier sense mechanisms are used, and
munication (DSRC) for future vehicle-to-vehicle the RTS (request to send)/CTS (clear to send) ac-
communications. The radio link of these commu- cess is prohibited, with the purpose to facilitate
nication systems has a range varying between a fast access to vehicles. In ad-hoc network, each
few meters and hundred meters (Eichler, 2007). mobile vehicle detects other’s position and rout-
Wireless LAN infrastructure is employed to build ing path.
inter-vehicle communication based applications. The other potential candidate of vehicle-to-ve-
WAVE networks consist of seven 10MHz wide hicle communication protocol is the IEEE 802.16e
channels, with Channel 178 being a control chan- Wireless Metropolitan Area Network (WMAN)
nel and the other 6 being service channels. The standard, operating in the 2-6 GHz frequency
channel switching mechanism in IEEE 802.11h is band. In Europe, a microwave frequency of 5.8
adapted to perform the multi-channel operation. GHz is recommended. Two or four channels
The physical (PHY) and Medium Access Control with 5MHz bandwidth each and a maximum
(MAC) layers of 5.9 GHz DSRC are based on IEEE Equivalent Isotropically Radiated Power (EIRP)
802.11a PHY, which uses an OFDM (Orthogonal of 3 db Watt are available (Baranowski, Lienard
Frequency Division Multiplexing) waveform and & Degauque, 1991).
the IEEE 802.11 MAC respectively. However, the In vehicle-to-vehicle communication, multipa-
vehicular environment and the requirements for th fading is a major problem for short range mobile
fast access introduce unique requirement on the microwave links. Multipath fading is caused by
MAC functionality. While IEEE 802.11 is intended reflected waves from the road, vehicles, traffic
for stationary or low mobility environment, com- signs and buildings, which interfere with the direct
munication in mobile WLAN (wireless local area signal. As a result, the received signal strength is
network) must be able to transfer messages to and position dependent and time varying. The interfer-
from vehicles at speed up to 120 miles per hour. ence of reflected waves can be destructive to the
Vehicular traffic scenarios pose greater chal- received radio power and lead to signal outages.
lenges than the indoor WLAN applications, due Usually the reflected waves have less amplitude
to associated driving speed, varying vehicular than direct wave in vehicle communications and
traffic patterns and driving environments. The the wave components can be absorbed, scattered
new standard is expected to establish require- or reflected. The received power is determined
ments for packet error rate performance in these by the radiating characteristics of beacon and
challenging environments. The IEEE is currently the vehicle antenna as well as statistically dis-
working on the IEEE 802.11p Wireless Access in tributed reflectors. To study the link performance
Vehicular Environments (WAVE) standard. There in multipath fading channels, both deterministic
are two types of inter-vehicle communication channel models and statistical channel models are
in WAVE. One is inter-vehicle communication developed in literature. A deterministic channel
using AP (Access Point). Access points may be model was derived in (Pfeiffer & Schrei, 1994)
provided or co-located at street corners, traffic for short range radio link,
lights, emergency phones, parking lots, rest ar-
eas, gas stations or other shops in service areas. λ0 1
Pr = PG
t r Gt ( ) | T |2 (1.1)
This approach requires development of exclusive 4π nt
infrastructure and is cost expensive. The other is
inter-vehicle communication supported by wire- where the subscript t and r denote the transmitter
less ad-hoc network. In this mode, there is no and the receiver antenna, respectively. P indicates
distributed 802.11 beaconing mechanism. Only

106
MAC and Routing Protocols for Vehicle to Vehicle Communications

the signal power, G is the antenna gain and λ0 is 802.11 or WAVE systems, a direct transmission
the wavelength in free space. nt is the number path between receiver and transmission is usually
of transmitter antenna elements. Parameter T is required. Rician fading channel, with a direct line-
determined by many factors, including the number of-sight (LOS) component and a strong ground-
of transmitter and receiver antenna elements, the reflected component, is used to model vehicle to
number of propagation paths and their length, the vehicle channel in many scenarios. The dominant
radio radiating patterns and the reflection factors component in Rician fading channel is likely to be
of the reflecting surface. relatively strong compared to the reflected signal,
In statistical models, the propagation channel which lead to large Rician κ factor. The delay
can be modeled as a time varying linear filter, spread is likely to be relatively small since reflec-
the impulse response given by (Wang, Sen & tions usually occur in the immediate vicinity of the
Matolak, 2007), transmitter and receiver antenna. However, when
the antenna height is low and propagation distance
L −1 L −1
h(τ,t) = ƒ zl (t )α l (t )e jθl ( t ) = ƒ hl (t )δ(τ − τl (t )) is large, the LOS component is not presented in
0 0 the received signal. In this case, Rayleigh fading
(1.2) is a reasonable model.
To achieve reliable communication against
Where αl(t) and θl(t) represents the amplitude multipath fading and the associated Doppler shift
and phase of the lth received wave component, as well as interference from other links using the
which has a time-varying time delay τl(t). The same frequency, diversity techniques, includ-
δ function is the Dirac delta. Compared to con- ing antenna diversity and frequency diversity,
ventional wireless channels, vehicle-to-vehicle are employed to improve the link performance
environments can have frequent and rapid channel (Grabow, & Schrei 1992). In IEEE 802.11e stan-
changes due to mobility and low transmitting and dard, Orthogonal Frequency Division Multiple
receiving antenna heights. Thus multipath com- Access (OFDMA) scheme provides permutation
ponents are modeled as on/off process in (Wang, subcarrier allocations that reduce the probability
Sen & Matolak, 2007). z(t) in Equation (1.2) is the of experiencing bad fading on all subcarriers of
persistence process which is used to account for each subchannel. Other multiple access schemes
the finite lifetime of propagation paths. The on/off such as Time Division Multiple Access (TDMA),
process z(t) is modeled by a Markov chain. The Direct-Sequence Code Division Multiple Access
received signal strength for the empirical channel (DS CDMA) are also investigated. Packet Error
is modeled using Weibull distribution given by Rate (PER) or Bit Error Rate (BER) are often
(Wang, Sen, & Matolak, 2007) for channels in used to measure the performance of the various
802.16e systems where distance between trans- multiple access schemes for a given spectrum
mitter and receiver is large, allocation.

Pw ( x) = β / αβ xβ−1 exp(−( x / α)β ) Environments and Mobility


(1.3)
A vehicle-to-vehicle communication system might
Where β is a shape factor that determines fad-
encounter different propagation environments
ing severity, α = E ( x 2 ) / Γ(2 / β + 1) is a scale
that vary with traffic density and geography.
parameter, and Γ is the gamma function. β = 2
Vehicle-to-vehicle communication scenario can
yields well known Rayleigh distribution, and β < 2
be classified as follows (Wang, Sen, & Matolak,
implies more severe fading. In vehicle-to-vehicle
2007; Singh, Bambos, Srinivasan, & Clawin,

107
MAC and Routing Protocols for Vehicle to Vehicle Communications

2002). The first scenario is urban environment, two. Early and accurate knowledge of rapidly
where vehicular speeds limit at around 40 miles time variant fading channel conditions enables
per hour and driving environment has a few build- adaptive data transmission in vehicle-to-vehicle
ing structures and roadside tree plantations. The communication systems, which in turn improves
vehicles stop at traffic lights but not frequently. the quality of service for end users and reduces
This urban scenario can be further classified into the power consumption for data transmissions. Ef-
urban-antenna inside car (UIC) and urban-antenna ficiency in data transmission in vehicle-to-vehicle
outside car (UOC). The second scenario is city systems can be enhanced through design of MAC,
environment, which has speed limits of 25 miles routing and other application layer protocols that
per hour amidst roadside building constructions. adapt to changing link conditions. For example,
The traffic scenario can be assumed to be the in Mobile Ad-hoc Network (MANET), switch-
rush hour traffic, with vehicles often stopping ing the packet size in certain scenarios can help
at traffic lights and in jams. The third scenario enhance the network performance. An increase in
is freeway, which is an open environment with packet size is observed to increase the throughput
scarce roadside vegetation and driving speed when the vehicle to vehicle distance is small and
limit of 65 miles per hour. There can be vehicles link quality is good (Singh, Bambos, Srinivasan,
traveling between and along the communica- & Clawin, 2002). However, for larger distances
tion test vehicles. This freeway scenario can between transmitter and receiver and poor link
be further classified into open area-low traffic quality, the throughput is better for smaller packet
density (OLT) and open area-high traffic density size. For adverse scenarios with vehicles separated
(OHT). Several analytical and empirical models by a large distance, a larger packet size would lead
have been proposed to model vehicle-to-vehicle to a larger packet error rate and hence a lower
channel under varying conditions. Geographical throughput. It is therefore desirable to switch
conditions, vehicle speed and traffic patterns, the packet size beyond a specific inter-vehicle
such as the distance between moving vehicles separation. Similar work on adaptive frame length
and relative velocity and directions all affect the control for optimizing performance is discussed
network performance. Measurements show that in (Lettieri & Srivastava, 1998).
the quality of the wireless communication channel To model the mobility of vehicles, a set of pa-
degrades with increasingly stressful communica- rameterized mobility models is suggested in (Bai,
tion scenarios, which lead to degrading in network Sadagopan & Helmy, 2003) to capture the mobility
performance including decreasing throughput and characteristics of ah-hoc vehicle-to-vehicle com-
increasing PER or BER. The quality of wireless munication scenarios. Four models are proposed
channel can be indicated using Signal to Noise including Random Waypoint, Group Mobility,
Ratio (SNR) at the receiver or received signal Freeway and Manhattan models. For Random
strength (RSSI). The link quality usually degrades Waypoint model, it does not be able to capture
with increasing distance between transmitter and the mobility characteristics of spatial dependence,
receiver. Also the link quality often deteriorates temporal dependence and geographic restrictions
with increase in relative and average velocities in the mobile network. In Group Mobility model,
of the vehicles. Measurements indicate that for each group has a group leader that determines the
vehicle-to-vehicle ad-hoc WLAN networks, the group motion behavior. Initially, each member of
sub-urban environment is the most favorable and the group is uniformly distributed in the neighbor-
the urban driving conditions are the most hostile hood of the group leader. Then, at each instant,
for inter-vehicle communication. The freeway every node has a random speed and direction
environment link quality lies in between the deviating from that of the group leader. Group

108
MAC and Routing Protocols for Vehicle to Vehicle Communications

Mobility model can be used in military battlefield Basic MAC Protocols


communications where the commander and sol-
diers form a logical group. In Freeway Mobility A number of protocols have been proposed
model, each mobile node is restricted to its lane for mobile ad hoc networks in the recent past,
on the freeway, and the velocity of mobile node some of which may find application in vehicular
is temporally dependent on its previous velocity. networks with varying degrees of success. The
If two mobile nodes on the same freeway lane earliest MAC protocol for wireless networks,
are within the Safety Distance (SD), the velocity ALOHA (Abramson, 1970) is a decentralized,
of the following node cannot exceed the veloc- randomized protocol that can be easily applied
ity of preceding node. In Manhattan Mobility to vehicular networks due to its simplicity. In
model, the mobile node is allowed to move along this protocol, any node with a packet to transmit
the grid of horizontal and vertical streets on the initially goes ahead with the transmission without
map. At an intersection of a horizontal street regard to other ongoing transmissions. In case
and a vertical street, the mobile node can turn of a collision, the node goes into a backoff and
left, right or go straight. The mobility pattern waits for a random duration before attempting a
influences the connectivity of MANET, which in retransmission. While the protocol is simple, its
turn influences the routing protocol performance. throughput is limited to 18.4 percent for fixed
Different mobility models may drastically affect packet lengths. As an improvement over this
the performance of MANET routing protocols basic access mechanism, a slotted version of the
including DSR (Dynamic Source Routing), AODV protocol, S-ALOHA (Roberts, 1975) may be used
(Ad Hoc On-Demand Distance Vector Routing) where time is divided into slots and a node may
and DSDV (Destination Sequenced Distance transmit only at the beginning of a slot. The slot-
Vector routing). It is observed that DSR, DSDV ted operation reduces by half the period during
and AODV achieve the highest throughput and which an ongoing transmission may encounter
the least overhead with Group Mobility model a collision, thereby increasing the maximum
and incur high overhead and low throughput throughput to 36.8 percent.
with both Freeway and Manhattan models (Bai, The primary source of degradation in the
Sadagopan & Helmy, 2003). throughput of MAC protocols is from the col-
lisions that result when the transmissions from
two nodes overlap in time. To further reduce the
MAC Protocol for VEHhicl incidence of collisions as compared to ALOHA
to VEHhicl NETtwork and S-ALOHA, Carrier Sense Multiple Access
(CSMA) has been proposed and widely used by
The fundamental task of MAC protocols is to many MAC protocols (Kleinrock & Tobagi, 1975).
schedule transmissions from stations sharing With CSMA, a node with a packet to send first
a common channel with the primary goal of senses the channel for activity before initiating
preventing collisions, thereby leading to higher its transmission. If the channel is idle, the node
throughput and bandwidth utilization. The mo- proceeds to transmit its packet immediately. On
bility and speed of the communicating nodes in the other hand, if the channel is busy, the node
vehicular networks adds another dimension to the defers its transmission till the current transmis-
challenges faced by the MAC protocols in addition sion ends. At the end of the current transmission
to their requirements of reliability and efficiency. the node may probabilistically decide when to
In this section we review some of the existing attempt its transmission. However, collisions are
MAC protocols for vehicular network. still possible if two nodes decide to transmit at the

109
MAC and Routing Protocols for Vehicle to Vehicle Communications

same time following the end of an ongoing trans- first senses the control channel for activity before
mission. To further improve the MAC protocol’s transmitting its packet. If the control channel is
performance and reduce overhead due to colli- idle, the node proceeds to transmits its packet
sions, CSMA protocols with Collision Detection in the data channel while simultaneously trans-
(CD) mechanisms have also been proposed for mitting a busy tone in the control channel. All
MAC protocols (Metcalfe & Boggs, 1976). While neighbors of the transmitter that sense the busy
effective in wired networks, collision detection is tone also transmit the busy tone. Thus two-hop
difficult to implement in wireless transceivers. neighbors of the transmitter also receive the busy
A major contributor to the MAC layer collisions tone and defer transmitting on the data channel,
in wireless networks is the presence of “hidden” thereby preventing transmissions from hidden
nodes. Hidden terminals occur when a node that terminals. The Dual Busy Tone Multiple Access
is in the neighborhood of the receiver of an on- (DBTMA) protocol extent the BTMA protocol by
going transmission but outside the range of the using two busy tones or control channels (Haas
transmitter, initiates its own transmission thinking & Deng, 2002). With this extension, the sender
that the channel is idle, thereby causing a colli- uses one tone to inform its neighbors about the
sion at the receiver of the ongoing transmission. ongoing transmission while the receiver uses the
The incidence of hidden nodes is expected to be second busy tone to inform its neighbors about
higher in vehicular networks due to node mobil- its reception.
ity. Multiple Access with Collision Avoidance Finally, time division multiple access (TDMA),
(MACA) uses a two-step handshake mechanism frequency division multiple access (FDMA) and
to avoid hidden terminals (Karn, 1990). When a code division multiple access (CDMA) have also
node wants to send a packet, the transmitter initi- been proposed for mobile networks (Jurdak, Lopes
ates the handshake by first sending a RTS packet & Baldi, 2004). In the TDMA based protocols,
to the destination with the intention of reserving time is split into fixed frames which are further
the channel for the transmission of the packet. All divided into slots. Each node transmits in the
nodes in the vicinity of the transmitter overhear slots that it is assigned. In FDMA, the medium
this RTS packet and defer their transmission for is split into non-overlapping frequency bands.
this duration. If the RTS packet is successfully Each user is allocated a separate band and users
received by the destination and it is available for may transmit simultaneously without interfering
receiving the packet, it sends a CTS packet to with each other. In CDMA, each user encodes its
the transmitter node. All nodes in the vicinity messages with one of several orthogonal codes
of the receiver that receive the CTS packet are specified by the system. Since the codes are
thus aware of the impending transmission and orthogonal, nodes may transmit in parallel. The
defer their own transmissions. On receiving the main drawback of these protocols in the context
CTS packet, the transmitter proceeds with the of vehicular networks is that they tend to be
transmission of the data packet while avoiding centralized, making it difficult to adapt easily to
any hidden terminals. changing network conditions.
Hidden terminals may also be suppressed
through the Busy Tone Multiple Access (BTMA) The IEEE 802.11 MAC Extension for
MAC protocols (Haas & Deng, 2002). The solution Vehicular Networks
requires the splitting of the available bandwidth
into two channels, one for data transmissions The IEEE 802.11 standard covers both the physical
and the other for control signals. A node with (PHY) and the MAC layer of wireless networks.
a data to transmit that uses the BTMA protocol The PHY layer can use any of the following

110
MAC and Routing Protocols for Vehicle to Vehicle Communications

modes: (1) Direct sequence spread spectrum; tion polls the nodes for a single pending frame
(2) Frequency hopping spread spectrum; (3) In- transmission according to a list ordering of their
frared pulse modulation. The channel data rate association with the base station, known as the
can either be from 1Mbps to 56Mbps depending polling list. The PC starts CF transmissions at
on the version of the protocol, with higher rates a SIFS (Short Inter-Frame Space) interval after
expected to be supported in future versions. In the beacon frame by sending a CF-Poll (no data),
addition to the physical layer specifications, the Data or Data+CF-Poll frame. If a station receives
IEEE 802.11 standard specifies two methods for a CF-Poll (no data) frame from the PC, the station
medium access: Distributed Coordination Func- can respond to the PC after a SIFS interval with
tion (DCF) and the Point Coordination Function a CF-ACK (no data) or a Data+CF-ACK frame.
(PCF). While the implementation of the DCF is If the PC receives a Data+CF-ACK frame from
mandatory and is based on a distributed, backoff a station, it can send a Data+CF-ACK+CF-Poll
based channel access mechanism, the PCF is frame to a different station where the CF-ACK
optional and in this access method, the nodes part is used to acknowledge receipt of the previ-
are polled by a “master” residing within the base ous data frame. If the PC transmits a CF-Poll (no
station. The channel access mechanism alternates data) frame and the destination station does not
between the DCF and PCF modes when PCF is have any data to transmit, the station sends a Null
implemented. The duration of time that the DCF Function (no data) frame back to the PC. If the
is used for channel access is termed the contention PC fails to receive an ACK for a transmitted data
period (CP) and the polled duration is called the frame, it waits for a SIFS interval and moves on
contention-free period (CFP). The lengths of the to the next station in the polling list.
CP and the CFP are controlled explicitly by the The DCF mode of operation of the IEEE 802.11
contention free period repetition interval (CFPri). protocols is based on CSMA with collision avoid-
In vehicular networks, the DCF may be used for ance (CA). In a network with a CSMA/CA MAC
vehicle-to-vehicle communications while the protocol, each node with a packet to transmit first
PCF may be used for vehicle-to-infrastructure senses the channel to ascertain whether it is in use.
communications. If the channel is sensed to be idle for an interval
Each CFP begins with a beacon frame and greater than the Distributed Inter-Frame Space
the CFPs occur at a defined repetition rate as (DIFS), the node proceeds with its transmission.
determined by the CFPrate parameter. With PCF, If the channel is sensed as busy, the node defers
the access to the channel is determined centrally transmission till the end of the ongoing transmis-
by the base station, usually referred to as the sion. The node then initializes its backoff timer
Point Coordinator (PC) that provides a conten- with a randomly selected backoff interval and
tion free transfer service. The PC gains control decrements this timer every time it senses the
of the medium at the beginning of the CFP, and channel to be idle. The timer has the granularity
maintains control for the entire CFP by waiting of a backoff slot and is stopped in case the channel
for a shorter time between transmissions than the becomes busy and the decrementing is restarted
stations using the DCF access mode. All stations when the channel becomes idle for a DIFS again.
other than the PC set their network allocation The node is allowed to transmit when the backoff
vectors (NAVs) to the CFPMaxDuration at the timer reaches zero. Since the backoff interval
start of each CFP. The PC transmits a CF-End is chosen randomly, the probability that two or
or CF-End+ACK frame at the end of each CFP more stations will choose the same back off value
and on receiving either of these frames a station is expected to be low. Along with the Collision
resets its NAV. During the CFP, the base sta- Avoidance, 802.11 uses a positive acknowledg-

111
MAC and Routing Protocols for Vehicle to Vehicle Communications

ment (ACK) scheme. All the packets received ful in a slot, that particular slot is reserved for
by a node implementing 802.11 MAC must be that user in subsequent frames. Once the node
acknowledged by the receiving MAC. After finishes transmitting all its data, it leaves the
receiving a packet, the receiver waits for a brief slot idle, allowing other nodes to contend for this
period, called the Short Inter-Frame Space (SIFS), slot. The RR-ALOHA protocol extends this basic
before it transmits the ACK. IEEE 802.11 also al- protocol to achieve slot reservation and dynamic
lows the use of the two-step handshake mechanism TDMA in a distributed way while all nodes have
of MACA to avoid hidden terminals. a global view of the transmissions in its two-hop
IEEE 802.11p is an amendment to the IEEE neighborhood, in order to avoid hidden terminals.
802.11 standard to add wireless access in vehicular Again, time is slotted and a number of slots are
environments (WAVE). DSRC is a general pur- grouped together to form frames. To achieve
pose communications link between the vehicle this, each node is required to transmit a vector
and the roadside (or between vehicles) using the that indicates how the node sensed the status of
802.11p protocol. The MAC layer operation of the slots in the previous frame (i.e. information
IEEE 802.11p uses the same CSMA/CA mecha- on which node transmitting in which slot). The
nism as used in the legacy IEEE 802.11 systems. transmission is done in the slot assigned to the
However, IEEE 802.11p allows the use of service node. Each node receiving this message updates its
classes as defined in the IEEE 802.11e standards view of the system state based on the status-vector
to provide service quality differentiation. At the received from each node. When a new node or
PHY layer, the use of an OFDM system is expected vehicle comes into an area, it first listens for the
to allow vehicle-to-vehicle as well as vehicle-to- entire frame to select a free slot in which it may
infrastructure communications for distances of transmit. Once the node attempts a transmission
up to 1000m and relative speeds of 200 km/hr. in a free slot, it observes the channel-state vectors
The protocol may operate either in the 10MHz received from other nodes in the next frame. If all
or the 20MHz channels, allowing data rates from the neighboring nodes mark the slot in which the
3 to 56 Mbps. new node transmits with the ID of the new node, it
implies that this slot is reserved for the new node
Other MAC Protocols for Vhicular in the two-hop neighborhood and may be used by
Networks the new node in subsequent frames.
While the protocols described above consider
The ADHOC-MAC is a slotted MAC protocol omni-directional transmissions, the fact that the
for vehicular networks that is based on the reli- movement of vehicles is restricted by the orienta-
able reservation ALOHA (RR-ALOHA) protocol tion of the roads and driving restrictions may be
(Borgonovo, Capone, Cesana, & Fratta, 2004). used by directional transmissions. The Directional
The RR-ALOHA protocol is an extension of MAC (D-MAC) protocol is based on the IEEE
the reservation ALOHA protocol (Crowther, 802.11 MAC but requires that each node be aware
Rettberg, Walden, Ornstein & Heart, 1973). The of the geographical location of its neighbors as
reservation ALOHA protocol is a combination of well as itself (Ko, Shankarkumar & Vaidya, 2000).
slotted ALOHA and time division multiplexing In this protocol, the RTS packet is sent either
(TDM) where a given number of slots constitute directionally or omni-directionally, based on the
a group or frame. An idle slot in a group or frame ongoing transmissions in the node’s neighborhood.
is considered to be available for all other nodes. Each directional antenna on a node that receives
Thus in subsequent frames, all nodes may contend a RTS or CTS packet updates its NAV accord-
for transmission in the slot. If a node is success- ingly and does not transmit on that antenna for

112
MAC and Routing Protocols for Vehicle to Vehicle Communications

the duration specified in the RTS or CTS packet. Compared to general wireless ad hoc networks,
However, the node may transmit on antennas that the roadway traffic environment in vehicle-to-ve-
do not have any ongoing transmissions in their hicle communication consists of uncoordinated
direction. The use of directional antennas adds vehicles whose neighboring vehicles constantly
complexity to the system but can improve the change and do not have a priori relationships
spatial reuse while reducing collisions. with each other (Chennikara-Varghese, Chen,
Altintas & Cai, 2006). As a result, the network
topology in vehicle-to-vehicle communication
Routing Protocol changes very fast. Dynamic topology maintenance
techniques are needed to adapt routing informa-
Routing Performance Requirements tion in highly mobile topologies. Mobile Ad Hoc
NETworks (MANET) protocols face several
Future Intelligent Transportation Systems re- challenges when applied to vehicle networks.
quire fast and reliable communication between In MANET, nodes usually move together as a
cars (vehicle-to-vehicle) or between a car and a group and have synchronous movement which
road side unit (vehicle-to-infrastructure). In Ad ensures that the nodes have a priori knowledge
hoc vehicle-to-vehicle communication where no of each other. Although these protocols work
supporting infrastructure is required, vehicles well for coordinated nodes, it may not work well
communicate when they are within the radio also for vehicles on a highway where nodes are
range of each other, or when multiple hop relay generally unknown and unrelated. For example,
via other vehicles are available. Messages need MANET protocols can incur high latencies in
to be routed from the source to one or several configuration an operation time with uncoordi-
destinations. Desirable characteristics of routing nated vehicles. As vehicle mobility increases, the
protocols include: available routes will change frequently which lead
to even larger delay in routing algorithms opera-
• Minimal control overhead tion. Furthermore, the collision and contention of
• Loop-free routing paths the underling MAC protocols such as 802.11 may
• Low complexity increase routing convergence time and delay for
• Multicast capabilities neighbor discovery (Chennikara-Varghese, Chen,
Altintas & Cai, 2006). This is because many
Beside the above requirements, the vehicular nodes within radio coverage tend to advertise
environment poses new challenging requirements their routing information at the same instant. In
to vehicle-to-vehicle routing protocol design, an ad hoc vehicle network environment where
including: node density is high, such as traffic congested
area, this is especially true. Beside the above
• Adapting routing information in highly issues, scalability is also a challenging issue in
mobile topologies routing protocol design in vehicle networks where
• Short convergence time of the routing algo- the network can go from scarce to dense in a very
rithms short time. Parameters from other layers, such
• Short delay for neighbor discovery as wireless channel quality, power efficiency or
• Scalability application specific requirements may also affect
the routing decisions and can be considered in
aiding the design of routing protocols.

113
MAC and Routing Protocols for Vehicle to Vehicle Communications

Ad-Hoc Routing Techniques link state behavior protocol and Wireless Rout-
ing Protocol (WRP), a path finding Algorithm.
Ad hoc unicast routing schemes can be divided into However, the existing proactive routing solutions
two categories: topology-based routing and posi- for mobile ad hoc networks are not really suitable
tion-based routing. Topology-based schemes use for inter-vehicle communication because of the
a proactive or reactive approach to create routes. quickly changing topology. In a vehicular ad hoc
Position-based routing schemes do not use routing network, the routes are required to be updated
tables to store route. Instead, they use position very frequently, which adds control overhead and
information about neighboring and destination influences the total throughput over the network.
nodes to determine the next hop forwarding to Besides, the risk of using outdated routes would
destination. The routing techniques can also be be high even with very frequent route updates
categorized as flat routing and hierarchical routing. (Böhm, 2007).
In flat routing algorithm, each node has the same Reactive routing schemes establish routes only
responsibility in the routing process. Flat routing when applications need to send packets to the
techniques suffer from scalability issues but still destination. These routes expire after some time.
are the most popular ad hoc routing techniques. A route discovery phase is needed each time an
In hierarchical routing, responsibility is only as- application wants to send data over the network. In
signed to a certain number of nodes that provide the route discovery phase, route request messages
required routing information to the rest of the are partially or entirely flooded in the network to
nodes (Chennikara-Varghese, Chen, Altintas & find the shortest path to the destination. In reac-
Cai, 2006; Böhm, 2007). tive routing methods, the communication delay
is usually larger than proactive routing, but the
Topology-Based Routing control overhead is smaller. Besides, scalability
in reactive routing is improved since routing
In flat topology-based routing schemes, two information is only exchanged when needed. A
general approaches are used. One is proactive node can be certain to use the most recent routing
routing, which is also called table-driven routing. information, which leads to a higher transmis-
The other is reactive or on-demand routing. In sion success than with proactive routing. Among
proactive routing protocols, route information is various reactive ad hoc routing protocols, AODV
stored in routing tables, and nodes exchange route and DSR are the two that gain most attention.
updates periodically to reflect any changes to the Compared to AODV, DSR has higher through-
network topology. The routing table updates can put and considerably smaller control overhead.
be periodic or event-driven which quickly react DSR handles the quick changes of high mobility
to network changes. The main advantage of pro- better than AODV. On the other hand, this intro-
active routing is that a route can be immediately duces a higher delay due to the route discovery
selected from the routing table when it is needed. phase (Böhm, 2007). Other flat, reactive routing
However, additional control traffic is needed to algorithms for mobile ad hoc networks include
update unused route entries repeatedly. When Temporally Ordered Routing Algorithm (TORA)
the routes need to be updated very frequently, and Associativity Based Routing Algorithm
network traffic congestion may occur, which (ABR), etc. When reactive routing protocols are
in turn triggers off delays, retransmissions and employed in inter-vehicle communication, some
packet losses. Examples of proactive protocols real-time applications require flooding short warn-
include DSDV, Optimized Link State Routing ing messages between vehicles. In these cases,
(OLSR), Fisheye State Routing (FSR) which is a flooding the network with route request messages

114
MAC and Routing Protocols for Vehicle to Vehicle Communications

is only meaningful if the actual data to be sent Position-Based Routing


is considerably larger than the request message.
Otherwise, it is more bandwidth efficient to flood Flooding the whole network with route requests
the data itself (Böhm, 2007). or routing updates is a waste of resources. If
Pure proactive and reactive protocols work the position of the destination node is known,
well for a small number of nodes. As the number integrating this position information in the rout-
of nodes increases in the networks and clusters ing process would enhance the routing protocol
of nodes are formed, hierarchical protocols can performance. A number of position-based (other
be used for better performance. In hierarchical frequently used names are georouting, location-
routing, the network is divided into clusters of based or geographical routing) routing protocols
nodes. Routing decisions are made by certain have been proposed in MANET and for vehicle-
nodes (cluster heads), while the rest of the nodes to-vehicle networks. Vehicles equipped with a
in a cluster receive or relay data via the cluster GPS (Global Positioning System) receiver have
head. Hierarchical protocols attempt to adopt the access to their coordinates in a globally known
advantages of both proactive and reactive proto- reference system. But it is not always possible
cols. Therefore, two different routing protocols to reach a sufficient number of GPS satellites to
are used, one between clusters and another within produce a correct position, for example, in tunnels
each cluster. Information on topology changes will or in urban areas. Other ways of positioning can
only be propagated among the nodes in the same be used such as triangulation or local reference
cluster. Nodes in other clusters only need to know systems. Position-based routing consists of two
the route to the destination cluster. Clusters can be stages. First a location service is responsible for
combined into super clusters, forming a hierarchy providing a source with the position of the desired
of clusters. One or more nodes in a cluster may destination. In a vehicular network, information
serve as a router for traffic passing in and out of about a vehicle’s speed and direction (maybe
that cluster. Examples of hierarchical protocols even in combination with knowledge of speed
include Cluster Based Routing Protocol (CBRP), limits, road type and other map-based informa-
Core Extraction Distributed Ad-hoc Routing tion (Böhm, 2007)) could be included in location
(CEDAR) and Zone Routing Protocol (ZRP). services. Popular location services in position-
In hierarchical routing, both routing table size based routing protocols are Distance Routing
and the size of control packets for route discovery Effect Algorithm for Mobility (DREAM) and Grid
or maintenance are reduced considerably. Better Location Service (GLS). The second stage is the
scalability is achieved as only the cluster heads forwarding phase, where the route from source
need to concern about nodes entering or leaving to destination is determined. There are a number
the network. Hierarchical routing techniques also of position-based forwarding strategies, includ-
lead to shorter response time as the flooding of ing Greedy Packet Forwarding (GPF), Greedy
routing information is restricted to the cluster Parameter Stateless Routing Protocol (GPSR)
heads and routes are discovered more quickly. and Restricted Directional Flooding (RDF). In
On the other hand, in highly mobile vehicular- restricted flooding, the message is flooded to all
to-vehicle networks, the hierarchical partition nodes within a given region. There are different
of the network needs to be frequently updated ways to determine such a region: the DREAM
and renegotiated, which complicates the routing protocol, which is mentioned before as a location
process and adds delay. service, and Location Aided Routing (LAR).
However, none of the strategies scales very well

115
MAC and Routing Protocols for Vehicle to Vehicle Communications

to large networks but is very robust against node can assist the drivers to make efficient route plan-
failure and position inaccuracies. ning decisions and better balance traffic around
Many of the position-based algorithms are ap- highly populated urban areas. It is an extension to
plicable to the requirements of inter-vehicle com- both location services and the greedy forwarding
munication (Böhm, 2007). It is usually sufficient strategy by introducing context-assisted graphs.
for a node to know its own position, the position The method collects, disseminates and stores
of its immediate neighbors and the position of the traffic context data including road conditions,
destination node acquired through the location vehicle density, average vehicle speed and roadside
service. Therefore, no routes have to be established facilities, and uses these information to aid the
or maintained and most of the routing overhead design at the network layer by using a weighted
is avoided. This makes most position-based ap- oriented graph.
proaches scale well and adapt quickly to a highly Spatially Aware Routing (SAR) is another
mobile network. In a vehicular network with very proposed routing algorithm to overcome the
high node mobility, position-based routing can problem of topology holes. As the occurrence of
avoid extensive flooding of routing information, topology holes is often closely related to the road
especially when traffic patterns, speed etc. are infrastructure, relevant spatial information is
known, which can be used to determine the re- extracted from a Geographic Information System
stricted flooding areas. The main disadvantage is (GIS) to build a graph of intersections and road
that the position of the destination node has to be segments. In the graph, vertices represent the road
known and location information has to be spread intersections and edges are the road segments.
through the network. Maintaining location service Only major roads and intersections can be used
adds overhead to the protocols, in compensation depending on the memory capability. But the
that low routing overhead is achieved. The design information can be extended to include additional
of location update schemes is often more difficult data on the length of the road segment, speed
than the routing decisions themselves. Apart from limits, number of lanes etc., which can be used
that, the position offered by a location informa- to assign weights to the edges of the graph. The
tion receiver, such as GPS can be inaccurate or sender uses the graph to find the shortest path to
unavailable due to obstacles. To work properly, the destination and the packet forwarding is done
all position-based algorithms rely on correct posi- via vehicles along the path. In case no suitable
tions. Besides, position-based routing protocols intermediate node can be found, an alternative
have problems handling “topology holes”. In areas graph is computed or the packet is suspended in
with scarce traffic or in a situation where only a buffer until a forwarding vehicles comes along.
few of the vehicles are equipped with communi- The authors compared the SAR protocol and a
cation devices, this might become a problem for version with suspension buffer (called SARB) to
inter-vehicle communication scenarios. In high standard GPSR and showed that SAR gives the
density networks, geographic forwarding works shortest delay and highest packet delivery ratio
well. But when there are frequent topology holes, (Tian, Han & Rothennel, 2003).
the stateless geographic forwarding works poor, Position-based Quality of Service (QoS)
since it will initiate a routing recovery process Routing is another example of real-world routing
for packet reaching, which seriously degrades the algorithm that can be used for vehicle-to-vehicle
packet routing performance. communication. It uses a grid-based hierarchy
To cope with topology holes, a context aware with cluster heads maintaining not only location
protocol, Context Assisted Routing (CAR), is information, but also information on available
proposed by Dumitrescu and Guo (2005). CAR bandwidth and the link state in the network. Up-

116
MAC and Routing Protocols for Vehicle to Vehicle Communications

dates are sent to the cluster head periodically or The Inter-Vehicle Geocast Protocol (IVG) is
on demand within each cell of the grid and then developed for relaying emergency messages in a
forwarded to other cluster heads in the network. highway accident situation. A broken down ve-
Thereby, a global knowledge is achieved and a hicle sends out an alarm to approaching vehicles.
cluster head can provide the sender with infor- The packets are only relayed among the vehicles
mation about both the position of destination and approaching the accident site, not by vehicles
possibility of setting up a QoS link. This routing driving away from the site, so the packets are not
algorithm requires the support from other layers, spread to vehicles that do not need the informa-
such as Medium Access Control layer, to give tion. A node near the accident site waits a given
the QoS guarantees (Erbas, Garcia & Jobmann, amount of time until it broadcasts the message
2004). in its transmission range. If during this time, it
receives the same message from a node behind
Multicast it, it knows that another node has taken over the
role as relay node and thus drops the packet. Oth-
In many applications, the information sent out erwise, the node rebroadcasts the message with
from one source often concerns not only one a certain time interval. There is no time-to-live
destination node but all nodes in a certain alert limit to prevent infinite broadcasting in order to
area, for example, the vehicles alert messages. keep messages alive in sparse network such as a
Multicast is therefore an important feature to highway at night time.
incorporate in routing protocol design. Current
multicast protocols that can be used in vehicle to
vehicle networks include: Position-based Multi- ConcluSIOion
cast (LBM), GeoGRID, Unicast Routing with
Area Delivery and Inter-Vehicle Geocast (Böhm, In this section, we present an overview of routing
2007). techniques in vehicle ad hoc networks. While
LBM is based on the concepts of position-based a number of schemes for handling information
routing and directional flooding. It defines a des- dissemination in vehicle-to-vehicle networks
tination region and a flooding zone and discards exist, only few may be able to handle the require-
packets outside this zone. The flooding zone is ments of safety applications, due to overhead in
a rectangle including at least the sender and the discovering and/or maintaining routes in highly
destination area. Another approach is to only allow mobile networks of uncoordinated vehicles. In a
intermediate nodes that are closer than a certain vehicular ad hoc network, the routes are required
distance threshold from the destination area. A to be updated very frequently, which adds control
node calculates its geographical distance from the overhead and influences the total throughput
center of the destination region and determines if it over the network. Proactive routing solutions for
is to forward the packet or to drop it. The distance mobile ad hoc networks are not really suitable
is decreased with each hop. GeoGRID enhances for inter-vehicle communication because of the
the LBM approach by dividing the forwarding quickly changing topology. In reactive routing
region into grids where only preselected gateway methods, the control overhead is smaller than
nodes are relaying the packets until the destina- proactive routing, but the communication delay
tion region is reached. In Unicast Routing with is usually larger.
Area Delivery protocol, any unicast georouting As the number of nodes increases in the net-
protocol of choice is used to reach the destination works, hierarchical protocols can be used for better
area and simply flood the region. performance, where both routing table size and

117
MAC and Routing Protocols for Vehicle to Vehicle Communications

the size of control packets are reduced consider- Bai, F., Sadagopan, N., & Helmy, A. (2003, April).
ably. Better scalability is achieved as only the Important: A framework to systematically ana-
cluster heads need to concern about nodes enter- lyze the Impact of Mobility on Performance of
ing or leaving the network. Hierarchical routing Routing Protocols for Ad-hoc Networks. IEEE
techniques also lead to shorter response time as INFOCOM, 2, 825-835.
the flooding of routing information is restricted
Baranowski, S., Lienard, M., & Degauque, P.
to the cluster heads. However, in highly mobile
(1991, February). Beacon-vehicle link in the 1-10
vehicular-to-vehicle networks, the hierarchical
GHz frequency range. DRIVE Conference (pp.
partition of the network needs to be frequently
194-217).
updated and renegotiated, which makes the rout-
ing process complicated. Böhm, A. (2007). State of the art on network layer
Position-based algorithms are promising ap- aspects for inter-vehicle communication (Tech.
proaches for routing in vehicular environments. Rep. IDE 0748).
In position-based algorithms, a node only needs
Borgonovo, F., Capone, A., Cesana, M., & Fratta,
to know the position of its own, its immediate
L. (2004, July) ADHOC MAC: A new MAC ar-
neighbors and the destination node. Therefore,
chitecture for ad hoc networks providing efficient
no routes have to be established or maintained
and reliable point-to-point and broadcast services.
and most of the routing overhead is avoided. This
ACM Wireless Networks, 10, 359-366.
makes most position-based routing approaches
adapt quickly to a highly mobile network and scale Chennikara-Varghese, J., Chen, W., Altintas, O.,
well. Also, in a vehicular network with very high & Cai, S. (2006, July). Survey of routing protocols
node mobility, position-based routing can avoid for inter-vehicle communications. IEEE Workshop
extensive flooding of routing information. on Mobile and Ubiquitous Systems Conference
The main disadvantage of position-based (pp. 1-5).
routing is that the destination node’s position in-
Crowther, W., Rettberg, R., Walden, D., Ornstein,
formation has to be spread through the network.
S., & Heart, F. (1973). A system for broadcast
Maintaining a position service adds overhead,
communication: Reservation-ALOHA. Hawaii
which takes away much of the gain from low
International Conference on System Sciences.
routing overhead. The design of location update
schemes is often more difficult than the routing Dumitrescu, V., & Guo, J. (2005, June). Context
decisions themselves. Besides, the position of- assisted routing protocols for inter-vehicle wireless
fered by e.g. a GPS receiver can be inaccurate communication. IEEE Symposium on Intelligent
or unavailable due to obstacles. Position-based Vehicles (pp. 594-600).
routing protocols have problems handling topol-
Eichler, S. (2007, October). Performance Evalua-
ogy holes. CAR and SAR are recently proposed
tion of the IEEE 802.11p WAVE Communication
routing algorithms to overcome the problem of
Standard. IEEE Vehicular Technology Conference
topology holes. Overall, routing for vehicle safety
(pp. 2199-2203).
communications remains a challenging topic.
Erbas, F., Garcia, J.-E., & Jobmann, K. (2004).
Position-based QoS routing in mobile ad-hoc net-
REFERENCES works: problem statement and a novel approach.
IEEE Performance, Computing, and Communica-
Abramson, N. (1970). The ALOHA system – An- tions Conference (pp. 619- 623).
other alternative for computer communications,
AFIPS Conference (pp. 295-298).

118
MAC and Routing Protocols for Vehicle to Vehicle Communications

Grabow, W., & Schrei, A. (1992, October). A study wireless link throughput, range, and energy ef-
on diversity techniques in a 5.8 GHz microwave ficiency. IEEE INFOCOM, 2, 564-571.
link for traffic management systems. IEEE Sym-
Metcalfe, R., & Boggs, R. (1976, July). Ethernet:
posium on Personal, Indoor and Mobile Radio
Distributed packet switching for local computer
Communications (pp. 556-560).
networks, Communication of the ACM, 19, 395-
Haas, Z., & Deng, (2002, June). Dual busy tone 404.
multiple access (DBTMA)-a multiple access con-
Pfeiffer, G., & Schrei, A. (1994, June). Investi-
trol scheme for ad hoc networks. IEEE Transac-
gation on propagation characteristics of a short
tions on communications, 50, 975-985.
range radio link with statistical distributed reflec-
Jurdak, R., Lopes, C., & Baldi, P. (2004). A tors. IEEE Vehicular Technology Conference, 3,
survey, classification and comparative analysis 1728-1732.
of medium access control protocols for wireless
Roberts, L. (1975, April). ALOHA packet systems
networks. IEEE Communication Surveys and
with and without slots and capture, Computer
Tutorials, 6.
Communications Review, 5.
Karn, P. (1990, September). MACA – A new chan-
Singh, J. P., Bambos, N., Srinivasan, B., & Clawin,
nel access method for packet radio, ARRL/CRRL
D. (2002, December). Wireless LAN performance
Amateur Radio Computer Networking Conference
under varied stress conditions in vehicular traffic
(pp. 134-140).
scenarios. IEEE Vehicular Technology Confer-
Kleinrock, L., & Tobagi, F. (1975, December). ence, 2, 743-747.
Packet switching in radio channels: Part I – Carrier
Tian, J., Han, L., & Rothennel, K, (2003, Octo-
sense multiple-access modes and their through-
ber). Spatially aware packet routing for mobile
put-delay characteristics. IEEE Transactions on
Ad Hoc inter-vehicle radio networks. IEEE
Communications, 23, 1400-1416.
Intelligent Transportation Systems Conference,
Ko, Y., Shankarkumar, V., & Vaidya, N. (2000). 2, 1546- 1551.
Medium access control protocols using directional
Wang, B., Sen, I., & Matolak, D. (2007, October).
antennas in ad hoc networks. IEEE INFOCOM
Performance evaluation of 802.16e in vehicle to
(pp. 13-21).
vehicle channels. IEEE Vehicular Technology
Lettieri, P., & Srivastava, M. B. (1998, April). Conference (pp. 1406-1410).
Adaptive frame length control for improving

119
120

Chapter VII
Inter-Vehicular
Communications Using Wireless
Ad Hoc Networks

Raúl Aquino-Santos Omar Álvarez-Cardenas


University of Colima, Mexico University of Colima, Mexico

Víctor Rangel-Licea Arthur Edwards-Block


National Autonomous University of Mexico, University of Colima, Mexico
Mexico
Margarita G. Mayoral-Baldivia
Miguel A. García-Ruiz University of Colima, Mexico
University of Colima, Mexico
Sara Sandoval-Carrillo
Apolinar González-Potes University of Colima, Mexico
University of Colima, Mexico

ABSTtract

This chapter proposes a new routing algorithm that allows communication in vehicular ad hoc networks.
In vehicular ad hoc networks, the transmitter node cannot determine the immediate future position of the
receiving node beforehand. Furthermore, rapid topological changes and limited bandwidth compound
the difficulties nodes experience when attempting to exchange position information. The authors first
validate their algorithm in a small-scale network with test bed results. Then, for large-scale networks,
they compare their protocol with the models of two prominent reactive routing algorithms: Ad-Hoc
On-Demand Distance Vector and Dynamic Source Routing on a multi-lane circular dual motorway,
representative of motorway driving. Then the authors compare their algorithm with motorway vehicu-
lar mobility, a location-based routing algorithm, on a multi-lane circular motorway. This chapter then
provides motorway vehicular mobility results of a microscopic traffic model developed in OPNET, which
the authors use to evaluate the performance of each protocol in terms of: Route Discovery Time, End
to End Delay, Routing Overhead, Overhead, Routing Load, and Delivery Ratio.

Copyright © 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Inter-Vehicular Communications Using Wireless Ad Hoc Networks

INTRODUCTION administer traffic flow, which, in turn, can have


important safety, ecological, and economic
How to best optimize traffic flow is one of the ramifications.
primary challenges of specialists studying con- Active vehicular systems employ wireless
gestion and safety on streets and motorways ad hoc networks and Global Positioning System
because of the economic, health, and safety issues (GPS) to determine and maintain inter-vehicular
related to inefficient traffic circulation. Propos- distances to insure the one-hop and multi-hop
als to mitigate traffic congestion, caused in part communications network needed to maintain ve-
by inefficient traffic flow, have often included hicle spacing. Location-based routing algorithms
expensive construction projects. These projects, may help in the development of Vehicular Ad Hoc
however, have had only limited success. In the Networks (VANETs) because their flexibility and
United States, for highway travel congestion of efficiency provide the ad hoc architecture neces-
personal vehicles, the Transportation Statistics sary for inter-vehicular communication. Although
Annual Report (2006) states that “highway travel several location-based algorithms already exist,
times increased between 1993 and 2003 in all but including Grid Location Service (GLS), Location
3 of the 85 urban areas (98 percent)”, and “it took Aided Routing (LAR), Greedy Perimeter Stateless
37 percent longer, on average, in 2003 to make a Routing (GPSR), and Distance Routing Effect
peak period trip (from 6 to 9 a.m. and 4 to 7 p.m.)”. Algorithm for Mobility (DREAM), to name just a
Additionally, this same report reveals that “there few, we propose a Location-Based Routing Algo-
were nearly 45,000 fatalities in transportation rithm with Cluster-Based Flooding (LORA-CBF)
accidents in the United States in 2004, of which as an option for present and future automotive
95 percent involved highway motor vehicles”. applications (Santos et al., 2005).
Furthermore, although the number of fatalities Ad Hoc routing protocols have the design goals
slightly decreased, “in 2005, 43,443 motorists and of network optimality, simplicity, low overhead,
non-motorists were killed in crashes involving robustness, stability, rapid convergence, and
motor vehicles, up 1% compared with 2004, and flexibility. However, since mobile nodes suffer
about 2.7 million people were injured”. Finally, from significantly less available power, process-
the report mentions that “there were 1.47 fatalities ing speed, and memory, low overhead becomes
per 100 million vehicle-miles of highway travel even more important than in conventional fixed
in 2005”. networks. The high mobility present in vehicle-
Although passive safety systems such as seat to-vehicle communication also places great
belts and air bags have been used to significantly importance on rapid convergence. Therefore,
reduce the total number of major injuries and it is imperative that ad hoc routing protocols
deaths due to motor vehicle accidents, they do effectively compensate for any inherent delays
nothing to actually improve traffic flow or lower in the underlying technology, adapt to varying
the actual number of automobile collisions. In degrees of mobility, and be sufficiently robust to
order to reduce the number of vehicular accidents, deal with potential transmission loss due to drop
computer and network experts propose active safe- out. Additionally, such protocols must more ef-
ty systems, including Intelligent Transportation fectively route packets than traditional network
Systems (ITS) that are based on Inter-vehicular algorithms in order to effectively compensate for
Communication (IVC) and Vehicle-to-Roadside limited bandwidth resources.
Communication (VRC). Presently, technologies Several routing algorithms for ad hoc networks
related to these architectures and their related have emerged recently to address difficulties
technologies may, in the future, more efficiently related to unicast routing. Such algorithms can

121
Inter-Vehicular Communications Using Wireless Ad Hoc Networks

be categorized as either proactive or reactive, these scenarios, source nodes broadcast a route
depending on their route discovery mechanism. request message to all immediate neighbors, and
This chapter presents a set of performance predica- these in turn, re-broadcast the route request to
tions for ad hoc routing protocols used in highly their neighbors. When the route request reaches
mobile vehicle-to-vehicle multi-hop networks as either the destination or a node that has a valid
part of the extensive research and development route to the destination, a route reply message
effort which will be undertaken in the next decade is generated and transmitted back to the source.
to incorporate wireless ad hoc networks in the Therefore, as soon as the source receives the route
automobile industry. reply, a route is created from the source to the
In proactive algorithms, each node continu- destination. The advantage of reactive algorithms
ously updates the routes to all other nodes in the is that there are no control messages for non-ac-
network by periodically exchanging control mes- tive routes. The major drawback is the latency
sages. Consequently, the route is immediately in establishing transmission routes. Examples
available when a node needs to send a packet to of reactive algorithms include AODV (Perkins,
any other node in the network. The main advan- Belding-Royer & Das, 2003) and DSR (Johnson,
tage of proactive algorithms is that they have a Maltz, & Hu, 2007).
shorter delay. Examples of proactive algorithms Previously, proactive algorithms were not con-
include Optimized Link State Routing Protocol sidered suitable for highly mobile environments
(OLSR) and Topology Dissemination Based on because they tend to have poor route convergence
Reverse-Path Forwarding (TBRPF). and low communication throughput (Royer &
The disadvantage of the OLSR and TBRPF Toh, 1999).
protocols, however, is their link state routing Some Cluster-Based Flooding strategies for
dissemination strategy. Recognized link changes routing in wireless ad hoc networks have been
cause nodes to flood control packets across the reported in literature (Boris and Arkady, 1999;
entire network, which taxes network resources Krishna et al., 1997; Bevas et al., 1997; Raghu-
(Zou, Ramamurthy, Magliveras, 2002). Vehicular pathy et al., 1998; Ching-Chuan et al., 1997). The
ad hoc networks consist of many highly mobile main contribution of this work is the re-broadcast
nodes whose mobility is defined, in part, by the and gateway selection mechanisms. The cluster
physical limitations of the motorway and the formation in Boris and Arkady (1999) is based on
actual relative positions of the vehicles circulat- the Link Cluster Algorithm (LCA) (Baker et al.,
ing on it, as well as the significant number of 1984) and the algorithm is based on Link State
vehicles simultaneously entering and exiting the Routing protocol, where all nodes in the cluster
motorway. As a consequence of these factors, the are expected to acknowledge the Link State Up-
dissemination of routing information increases date (LSU). If one of the nodes does not send an
the demand for often limited bandwidth resources acknowledgement, the cluster head retransmits
and computation time. the LSU to that particular node. Flooding is
Conversely, reactive algorithm nodes dis- transmitted from the source to a destination via
cover routes on demand and maintain smaller cluster heads and gateways. In (Krishna et al.,
active route tables. Thus, a route is discovered 1997) and (Bevas et al., 1997), the re-broadcast
whenever a source node needs to communicate is handled by the boundary nodes. Nodes other
with a destination node for which a route has not than boundary nodes just listen and update their
already been established. Discovery is based on tables. In (Raghupathy et al., 1998), there are two
flooding, which can be total, as in AODV and types of routing strategies: Optimal Spine Rout-
DSR, or limited, as in OLSR and TBRPF. In ing (OSR) and Partial-knowledge Spine Routing

122
Inter-Vehicular Communications Using Wireless Ad Hoc Networks

(PSR). OSR uses full and up-to-date knowledge A typical communication process between
of the network topology, permitting the source a beacon and a vehicle can be divided into two
to determine the route to the destination. On the phases: the connection establishment phase and
other hand, PSR uses partial knowledge of the the transaction phase. When a vehicle enters the
network topology and takes a greedy approach beacon communication zone, the vehicle address
to compute the shortest path from the source to is not known to the beacon, so the beacon periodi-
the destination. In (Ching-Chuan et al., 1997), cally broadcasts a request for identification and
the authors use a cluster head controlled token offers a public up-link window before establishing
protocol (like polling) to allocate the channel the actual connection. When a specific vehicle
among competing nodes. We have implemented responds to an identification request, it records
a re-broadcast strategy where only gateways the address in the transmitter node’s table and
belonging to different cluster heads re-broadcast individual addressing becomes possible. The
the location request packets, resulting in improved beacon then opens a private uplink window to
routing overhead. a specific vehicle for data exchange during the
transaction phase.
Inter-Vhicular and Other mechanisms to communicate vehicles
Vehicle-to-Roadside Communications in vehicle-to-roadside communication have
been proposed by (Kwak & Jae, 2004), (Dobias
The interest in inter-vehicular and vehicle- & Grabow, 1994), (Zandbergen & Van der Ree,
to-roadside communication has significantly 1992), (Abdulhamid, Abdel-Raheem & Tepe,
increased over the last decade, in part, because 2007), (Matthaiou, Laurenson, & Cheng-Xiang,
of the proliferation of wireless networks. Most 2008), (Cottingham, Wassell & Harle, 2007),
research in this area has concentrated on vehicle- (Mussa & Upchurch, 2000), (Bantli, Ring & Goff,
to-roadside communication, also called beacon- 1997), and (Dickey, Huang & Guan, 2007).
vehicle communication (Rokitansky & Wietfeld, Some applications for vehicle-to-roadside
1993), (Brasche, Rokitansky & Wietfeld, 1994), communication, including Automatic Payment,
(Wietfeld & Rokitansky, 1994), (Rokitansky & Route Guidance, Cooperative Driving, and Park-
Wietfeld, 1995), (Wietfeld & Rokitansky, 1995), ing Management have been developed to function
in which vehicles share the medium by accessing in limited communication zones of less than 60
different time slots (Time Division Multiple Ac- meters. However, the IEEE 802.11 Standard has
cess, TDMA), the beacon (down-link direction), led to increased research in the areas of wireless
and the vehicles (up-link direction). The beacon ad hoc networks and location-based routing algo-
arranges up-link time slots (so called windows rithms, (Morris et. al., 2000), (Da Chen, Kung, &
allocations) for the vehicles; the vehicles are not Vlah, 2001), (Füßler, et. al., 2003), (Lochert, et.
allowed to access the medium without a window al., 2003), (Kosh, Schwingenschlögl, & Ai, 2002).
allocation sent to them by the beacon. The beacon, Applications for inter-vehicular communication
as the primary station, offers two different types include Intelligent Cruise Control, Intelligent
of windows to the vehicles: public and private Maneuvering Control, Lane Access, and Emer-
windows. A public window is a time slot that gency Warning, among others. In (Morris et. al.,
can be accessed by any vehicle within the com- 2000), the authors propose using Grid (Li, et.
munication zone. A private window allocation al., 2000), a geographic forwarding and scalable
reserves a time slot for one specific vehicle, thus distributed location service, to route packets from
protecting it against data collisions. car to car without flooding the network. The au-

123
Inter-Vehicular Communications Using Wireless Ad Hoc Networks

thors in (Da Chen, Kung, & Vlah, 2001) propose Figure 1. Inter-vehicular communication system
relaying messages in low traffic densities, based using wireless ad hoc networks
on a microscopic traffic simulator that produces
accurate movement traces of vehicles traveling
on a highway, and a network simulator to model
the exchange of messages among the vehicles.
Da Chen et. al., employ a straight bidirectional
highway segment of one or more lanes. The mes-
sages are propagated greedily each time step by
hopping to the neighbor closest to the destination.
The authors in (Füßler, et. al., 2003), compare a
topology-based approach and a location-based
routing scheme. The authors chose GPSR (Karp &
Kung, 2000) as the location-based routing scheme
and DSR (Johnson, Maltz, & Hu, 2007) as the
topology-based approach. The simulator used in
(Füßler, et. al., 2003) is called FARSI, which is
nologies. The major goals are to provide increased
a macroscopic traffic model. In (Lochert, et. al.,
automotive safety, achieve smoother traffic flow,
2003), the authors compare two topology-based
and improve passenger convenience by provid-
routing approaches, DSR and AODV (Perkins,
ing information and entertainment. In order to
Belding-Royer & Das, 2003), versus one position-
avoid communication costs and guarantee the
based routing scheme, GPSR, in an urban envi-
low delays required to exchange safety-related
ronment. Finally, in (Kosh, Schwingenschlögl, &
data between cars, inter-vehicular communica-
Ai, 2002), the authors employ a geocast routing
tion (IVC) systems, based on wireless ad hoc
protocol that is based on AODV.
networks, represent a promising solution for fu-
In inter-vehicular communication, vehicles are
equipped with on-board computers that function ture road communication scenarios. IVC allows
as nodes in a wireless network, allowing them to vehicles to organize themselves locally in ad hoc
contact other similarity equipped vehicles in their networks without any pre-installed infrastructure.
vicinity. By exchanging information, vehicles Communication in future IVC systems will not
can obtain information about local traffic condi- be restricted to neighboring vehicles traveling
tions, which improves traffic control and provides within a specific radio transmission range. As in
greater driver safety and comfort. typical wireless scenarios, the IVC system will
In this chapter, we will focus on inter-vehicu- provide multi-hop communication capabilities by
lar communication because vehicle-to-roadside using “relay” vehicles that are traveling between
communication has been already proposed for the sender and receiver. Figure 1 illustrates this
standardization in Europe (CEN TC 278 WG 9) basic idea. In this particular example, the source
and North America (IVHS). vehicle is still able to communicate with the desti-
nation vehicle, although the destination vehicle is
Issues Concerning Inter-Vhicular not in source vehicle’s immediate communication
Communication Using Wireless Ad range. Vehicles between the source-destination
Hoc Networks act as intermediate vehicles, relaying data to the
receiver. As a result, the multi-hop capability of
Future developments in automobile manufactur- the IVC system significantly increases the virtual
ing will also include new communication tech-

124
Inter-Vehicular Communications Using Wireless Ad Hoc Networks

communication range, as it enables communica- tion. If it does, it sends the packet to the closest
tion with more distant vehicles. neighbor to the destination (Figure 2). Otherwise,
the source stores the data packet in its buffer,
starts a timer, and broadcasts Location Request
LOCATION ROUTING ALGORITHM (LREQ) packets. Only gateways and cluster heads
WITH CLUSTER-BASED FLOODING can retransmit the LREQ packet. Gateways only
(LORA-CBF) retransmit a packet from one gateway to another
in order to minimize unnecessary retransmissions,
In this section, we present a Location Routing and only if the gateway belongs to a different
Algorithm with Cluster-Based Flooding (LORA- cluster head.
CBF), which is formed with one cluster head, zero Upon receiving a location request, each cluster
or more members in every cluster, and one or head confirms that the destination is a member
more gateways to communicate with other cluster of its cluster. Success triggers a Location Reply
heads. Each cluster head maintains a “Cluster (LREP) packet that is returned to the sender us-
Table”. A “Cluster Table” is defined as a table that ing geographic routing. This is possible because
contains the addresses and geographic position each node knows the position of the source and
of the member and gateway nodes. the closest neighbor, based on the information
When a source attempts to send data to a received from the LREQ and the Simple Location
destination, it first checks its routing table to Service (SLS). Failure triggers retransmissions by
determine if it knows the location of the destina- the cluster head to adjacent cluster-heads (Reac-

Figure 2. Flow diagram for LORA-CBF

125
Inter-Vehicular Communications Using Wireless Ad Hoc Networks

tive Location Service, RLS) and the destination a different cluster head, it must first register it, but
address is recorded in the packet. Cluster heads the member does not actually modify its cluster-
and gateways, therefore, discard request packets head ID until the expiration time for the field has
they have previously seen. expired. Before the member rebroadcasts the new
Once the source receives the destination’s information, it must change its status to a gateway.
location, it retrieves the data packet from its buf- After receiving the Hello packet, the cluster heads
fer and forwards it to the neighbor closest to the update their cluster tables with the new gateway
destination. information.
Basically, the algorithm consists of five If the source broadcasts a message to the
stages: destination, it must first check its routing table to
determine if it has a “fresh” route to the destination.
1. Cluster formation If it does, it first seeks its cluster table to identify
2. Location discovery (LREQ and LREP) the closest neighbor to the destination. Otherwise,
3. Routing of data packets it starts the location discovery process.
4. Maintenance of location information
5. Short-term geographic positioning predictive Location Discovery Process
algorithm
When the source of the data packet transmits to
Cluster Formation a destination that is not included in its routing
table or if its route has expired, it first places the
All nodes maintain neighbor information in their data packet in its buffer and broadcasts a Loca-
respective tables to enable cluster formation and tion Request (LREQ) packet (Reactive Location
maintenance. Service, RLS).
Let t be the period of time between the Hello When a cluster head receives a LREQ packet,
broadcasts. When a node first switches on, it first it checks the packet identification field to deter-
listens to Hello packets on the broadcast chan- mine if it has previously seen the LREQ packet.
nel. If any other node on the broadcast channel is Previously seen packets are discarded, but if the
already advertising itself as a cluster head (status destination node is a member of the cluster head,
of node = cluster-head), the new node saves the it unicasts the Location Reply (LREP) packet to
heard cluster-head ID in its cluster-head ID field the source node.
and changes its status to member. At any point in If the destination node, however, is not a member
time, a node in the mobile network can associate of the cluster head, it first records the LREQ packet
itself with a cluster head. The cluster heads are address in its routing table and rebroadcasts the
identified by the cluster-head ID. Otherwise, the LREQ packet to neighboring cluster heads.
new node becomes a cluster head. Cluster heads Each cluster head node forwards the packet
are responsible for their clusters and periodically once. The packets are broadcasted only to the
send Hello Messages. neighboring cluster head by means of an omni-di-
When a member of a cluster receives a Hello rectional antenna that routes them via the gateway
message, it registers the cluster head and responds nodes. Gateways only retransmit a packet from
with a reply Hello message. The cluster head then one gateway to another to minimize unnecessary
updates the cluster table with the address and retransmissions, and only if the gateway belongs
position (longitude and latitude) of every cluster to a different cluster head. When the cluster head
member. destination receives the LREQ packet, it records
When a member receives a Hello packet from the source address and location. From this, the

126
Inter-Vehicular Communications Using Wireless Ad Hoc Networks

destination cluster head locates the source node. forwarding strategy is that it decreases the prob-
The destination then sends a LREP message back ability of collision and end-to-end delay between
to the source via its closest neighbor. the source and the destination.
Finally, the packet reaches the source node that
originated the request packet. If the source node Maintenance of Location Information
does not receive a LREP after transmitting a LREQ
for a set period of time, it goes into an exponential The LORA-CBF algorithm is suitable for networks
back off before re-transmitting the LREQ. Hence, with very fast, mobile nodes because it maintains
only one packet is transmitted back to the source and updates the location information of the source
node. The reply packet does not have to maintain and destination every time the pairs send or receive
a source/destination routing path, and the path is data and acknowledgment packets. The source up-
determined from the location information given dates its location information before sending each
by the source node. Importantly, the path followed data packet. When the destination receives the data
by the LREQ may be different from that traversed packet, its location information is updated and an
by the LREP. acknowledgment packet is sent to the source.

Routing of Data Packets Sort-Term Geographic Positioning


Predictive Algorithm
The actual data packet routing is then based on
source, destination, and neighbor location. In highly mobile environments, precise knowledge
Since the protocol is not based on source rout- of neighbor positions, to a great degree, determines
ing, packets travel the path from the source to the the routing efficiency of any algorithm. LORA-CBF
destination, based on their relative locations. The predicts the immediate future location of every
packets find paths to their destinations individually neighbor node, based on its short-term geographic
each time they transmit data between the source and positioning predictive algorithm. After predicting
the destination. Packets are transmitted between the position of all neighbor nodes, LORA-CBF
nodes based on their knowledge of the position sends the packet to the neighbor node with shorter
information in their tables. Moreover, since the distance to the destination node (MFR).
transmission is in the direction of the destination Mobility and contention of wireless media may
node, the path found will be shorter than other rout- cause packet loss during transmission, which is
ing mechanisms (non-positional-based). In non-po- a very important phenomenon to consider when
sitional-based routing strategies, the shortest path is developing predictive algorithms. Our algorithm
measured in hops, meaning the path discovered may also predicts the future probable location of a
not be the shortest. However, the path found using node, despite data stream time gaps caused by
location information will be significantly shorter. collisions.
If the source of the data packet does not receive the Assuming the data follows a linear trend,
acknowledgement packet before its timer expires, our short-term geographic positioning predictive
it will retransmit the data packet again. This might algorithm attempts to extrapolate the position of
occur particularly during packet loss because of the next hop k ahead in time, according to the fol-
drop-out or network disconnection. lowing equation:
LORA-CBF uses the Most Forward within
Radius (MFR) forwarding strategy. In MFR, the Pj + k = Pj + ∆P * ℮ (1)
packet is routed via the neighbors that most reduce
the distance to the destination. The advantage of this

127
Inter-Vehicular Communications Using Wireless Ad Hoc Networks

Where: driver behavior and the interaction among drivers.


This type of model is very detailed and explicitly
Pj + k future position of the next hop tracks the space-time trajectory of each vehicle
Pj current position of the next hop (Festa et. al., 2001). Mesoscopic models represent
∆P interval between current position and transportation systems and analyze groups of driv-
previous position of the next hop ers who display homogeneous behaviors. Finally,
℮ factor indicating the gap between packets macroscopic models describe traffic at a high level
received of aggregation as a flow, without distinguishing
its basic parts (Cvetkovski & Gavrilovska, 1998).
Short-term geographic positioning predictive Because we are interested in the space-time
algorithms are useful in highly mobile conten- trajectory of each vehicle governed by the lead
tion-based networks. LORA-CBF periodically vehicle, our attention will focus on microscopic
broadcasts Hello messages to locate nodes en- traffic models.
tering or leaving the ad hoc network. Location A large number of microscopic traffic simu-
information received from a Hello message helps lation models have been developed. Basically,
neighbor nodes calculate the future nodal position these models describe the time-space behavior
of the sending node throughout the transmis- of vehicles in the traffic system.
sion range by calculating its immediate future The microscopic traffic simulation model
position. When a node receives a packet, before used in this work to evaluate the performance
forwarding it to a particular destination, it first of the three algorithms is based on Simone 2000
checks its routing table to determine if it possesses (Minderhoud, 2002). The Simone 2000 model is
the location information of the destination node. a sophisticated microscopic traffic flow model
If it does, it triggers the short-term geographic that simulates a wide range of user-classes. The
positioning predictive algorithm to calculate the model distinguishes longitudinal (car-following)
future position of the destination. If the sender and lateral (lane-changing) driver behaviors. The
node can directly reach the destination node, it longitudinal distance controller is one of the main
forwards it directly. However, if the sender node elements of a microscopic simulation model for
cannot forward the packet itself, it must predict traffic flow. It describes how a vehicle progresses
the locations of the receiving node’s neighbors, in a single lane, focusing on the car immediately
and send the packet to the closest neighbor node in front of it. We have implemented this model in
to the predicted destination. OPNET to simulate the mobility of the vehicles
on a motorway.
Basically, the simulation model is divided into
MICROSCOPIC TRAFFIC two functions:
STION MODEL
Desired Gap Function
Vehicular traffic models may be categorized into
four classifications according to their level of With this function, the longitudinal controller
detail: sub-microscopic, microscopic, mesoscopic determines the acceleration (positive or negative)
and macroscopic (Hoogendoorn & Bovy, 2001). needed to obtain a desired minimum distance
Sub-microscopic models describe the characteris- from the leader.
tics of individual vehicles in the traffic stream and
the operation of specific parts (sub-units) of the si (t ) = li + ηi (t ) ∂( z 0i + z1i ∂vi (t ) + z 2i ∂vi (t ) 2 )
vehicle. Microscopic models simulate individual

128
Inter-Vehicular Communications Using Wireless Ad Hoc Networks

Where: VALIDATION OF THE MODE L

S (t) = desired gap distance (from rear follower Validating LORA-CB F with One, Two
I to rear leader) (m), i = index vehicle, l = length and Three Hops
of vehicle i, η = congestion factor, z0 = margin
parameter (m), z1 = linear headway parameter Wireless ad hoc networks basically employ multi-
(s), z2 = quadratic headway parameter (s2), v (t) hop communications, where packets are transmit-
= speed at time t (m/s). ted from source to destination. Therefore, the basic
communication mechanism is peer-to-peer, with
Longitudinal Controller packets retransmitted several times.
The first task of our study is to validate our
Once the position of a vehicle immediately in model at one, two, and three hops, comparing the
front of a following vehicle has been calculated, results of the test bed with the results of the model
the longitudinal controller moves the following we developed in OPNET. Finally, for more than
vehicle to its new position, using standard kinemat- 3 hops, we will validate our model comparing it
ics equations for vehicle speed and distance. with the AODV, DSR and GPSR algorithms.
Table 1 compares test-bed and OPNET simu-
ai (t + τ) = α i ∂(xi −1 (t ) − xi (t ) − si (t ) ) + βi± ∂(vi −1 (t ) − vlation
i ) ) results, which validates LORA_CBF in a
(t
small-scale network.
i −1 (t ) − xi (t ) − si (t ) ) + βi ∂(vi −1 (t ) − vi (t ) )
±

Validating LORA-CB F with More


With: Than Three Hops
a(t + τ) = acceleration applied after delay time We have compared our model with the AODV,
(m/s2), x(t) = x-coordinate vehicle rear bumper at DSR, and GPSR algorithms. The comparison is
time t (m), v(t) = speed at time t (m/s), i = index reasonable because we have improved the data
subject vehicle (follower), i-1 = index subjects’ reception mechanism by using an acknowledge-
leader, α = distance error sensitivity (1/s), β+ = ment packet in the AODV and DSR protocols.
speed difference sensitivity (for positive differ- When the timer for an acknowledgement data
ence) (1/s2), β- = speed difference sensitivity (for packet expires, AODV and DSR start new Route
negative difference) (1/s2). Requests (RREQ). Additionally, we have im-
proved GPSR with our short-term geographic
Table 1. Results validating LORA_CBF for one, positioning predictive algorithm.
two and three hops

EED (ms) One Hop Two Hops Three Hops


S IMULATION ME TRICS
Test Bed (C-K
10.4 19.7 29.2
Toh)
In comparing the performance of the algorithms,
OPNET model 9.1 18.854 28.591
we chose to evaluate them according to the fol-
Throughput
One Hop Two Hops Three Hops lowing five parameters:
(Kbps)
Test Bed (C-K
Toh)
769.23 406.091 273.972 • Average end-to-end delay of data packets:
OPNET model 878.93 424.313 279.808 all of the possible delays caused by buffer-

129
Inter-Vehicular Communications Using Wireless Ad Hoc Networks

ing during route discovery, queuing at the by the sender. Data packets, however, may
interface queue, retransmission delays at the be dropped if the link is broken when the
MAC, and propagation and transfer times. data packet is ready to be transmitted.
• Routing load: the number of routing packets
sent divided by the number of data packets The OPNET simulator was used to evaluate the
transmitted. The latter includes only the data three routing protocols. The simulation models a
packets finally delivered at the destination network of 250 mobile nodes traveling on a 6283m
and not the ones that are dropped. The trans- circular road (Figure 3).
mission of each hop is counted once for both This configuration is reasonable for motor-
routing and data packets. This provides an way traffic in the United Kingdom because the
estimation of network bandwidth consumed low curvature rate of its roads permits vehicle
by routing packets with respect to “useful” circulation at a more constant velocity. The IEEE
data packets. 802.11b Distributed Coordination Function (DCF)
• Routing overhead: the total number of rout- is used as the medium access control protocol. We
ing packets transmitted during the simula- also developed a microscopic traffic simulation
tion. For packets sent over multiple hops, model in OPNET to simulate vehicular mobility
each packet transmission (each hop) counts on a motorway. A 300m transmission range was
as one transmission. chosen, which is consistent with current 802.11b
• Overhead (packets): the number of rout- Wireless LAN standards and 5 dBi gain car-
ing packets generated divided by the total mounted antennas. An experiment was carried
number of data packets transmitted, plus out to validate the transmission range between
the total number of routing packets. two vehicles driving in opposite directions.
• Packet delivery ratio: the ratio of data packets
delivered to the number of data packets sent
SIMULATION RESULTS

Figure 3. Simulated scenario Figure 4.a shows routing overhead. In this simula-
tion, DSR performs better because it lacks a neigh-
 lanes bor sensing mechanism, and AODV increases
clockwise its routing overhead according to the distance
between nodes. LORA_CBF maintains its rout-
ing overhead at an almost constant level because
routing overhead is proportional to the frequency
of Hello messages, which is independent of the
maximum distance between communication part-
ners. AODV requires about 3 times the routing
overhead of DSR (also reported in Broch et. al.,
1998). Figure 4.b shows overhead, which is higher
for AODV. Generally, highly mobile environments
suffer from a greater frequency of broken links,
resulting in the retransmission of RERR messages.
In the case of AODV, overhead increases propor-
 lanes counter tionally to the number of Hello messages. Figure
clockwise 4.c represents the routing load. AODV shows a
Maximum transmission
range = 00 m

130
Inter-Vehicular Communications Using Wireless Ad Hoc Networks

Figure 4.a. Routing overhead Figure 4.b. Overhead


00
Routing Overhead (K packets)

6
99

Overhead (packets)
 98

9
6

96

9
6
9

 9
       
Hop Count Hop Count
LORA_CBF Motorway (1 Mbps - 1448 Bytes) LORA_CBF Motorway (11 Mbps - 1448 Bytes)
LORA_CBF Motorway (1 Mbps - 1448 Bytes) LORA_CBF Motorway (11 Mbps - 1448 Bytes)
AODV Motorway (1 Mbps - 1448 Bytes) AODV Motorway (11 Mbps - 1448 Bytes)
AODV Motorway (1 Mbps - 1448 Bytes) AODV Motorway (11 Mbps - 1448 Bytes)
DSR Motorway (1 Mbps - 1448 Bytes) DSR Motorway (11 Mbps - 1448 Bytes)
DSR Motorway (1 Mbps - 1448 Bytes) DSR Motorway (11 Mbps - 1448 Bytes)

Figure 4.c. Routing load Figure 4.d. End-to-End delay (EED)


00 60
000 0
900
e nd-to-e nd Delay (ms)
Routing Load (packets)

0
800
00
00
600 80

00 60
00
0
00
0
00
00 0
       

Hop Count Hop Count


LORA_CBF Motorway (1 Mbps - 1448 Bytes) LORA_CBF Motorway (11 Mbps - 1448 Bytes) LORA_CBF Motorway (1 Mbps - 1448 Bytes) LORA_CBF Motorway (11 Mbps - 1448 Bytes)
AODV Motorway (1 Mbps - 1448 Bytes) AODV Motorway (11 Mbps - 1448 Bytes) AODV Motorway (1 Mbps - 1448 Bytes) AODV Motorway (11 Mbps - 1448 Bytes)
DSR Motorway (1 Mbps - 1448 Bytes) DSR Motorway (11 Mbps - 1448 Bytes) DSR Motorway (1 Mbps - 1448 Bytes) DSR Motorway (11 Mbps - 1448 Bytes)

Figure 4.e. Delivery ratio

9
Delivery Ratio (packets)

8



6






   
Hop Count

LORA_CBF Motorway (1 Mbps - 1448 Bytes) LORA_CBF Motorway (11 Mbps - 1448 Bytes)
AODV Motorway (1 Mbps - 1448 Bytes) AODV Motorway (11 Mbps - 1448 Bytes)
DSR Motorway (1 Mbps - 1448 Bytes) DSR Motorway (11 Mbps - 1448 Bytes)

131
Inter-Vehicular Communications Using Wireless Ad Hoc Networks

higher routing load than LORA_CBF and DSR. CBF, AODV, and DSR to compare the relative
The routing load also increases with distance and performance of LORA-CBF and GPSR.
depends on the amount of data delivered. End-to- Figure 5.a represents the delivery ratio of GPSR
End delay (EED), presented in Figure 4.d, shows and LORA-CBF. The short-term geographic
that all of the algorithms have lower delays at a data positioning predictive algorithm improved the
rate of 1 Mbps. In general, AODV has the greatest communication of GPSR by 90 percent. Both
delay because of its frequent retransmissions. DSR algorithms perform similarly at data rates of 11
performs the best because of its packet control Mbps; however, GPSR has a slightly lower de-
strategy. LORA_CBF has a slightly greater EED livery ratio at data rates of 1 Mbps. In general,
when compared with DSR. Figure 4.e compares these two algorithms perform similarly because
the packet delivery ratio of all of the algorithms they both use the same forwarding mechanism
considered in this study. LORA_CBF shows (greedy forwarding).
good results at both data rates, and AODV has Each hop is equivalent to approximately 300m
a slightly worse packet delivery ratio than DSR. and the delivery ratio is the percent of 100 packets
Both AODV and DSR have their worst delivery sent at 100-second intervals. Importantly, the
ratios at a data rate of 11 Mbps. distance between the transmitter and the receiver
We observe that the AODV and DSR algo- is measured in hop counts. End-to-End Delay is
rithms suffer from sub-optimal routes and low shown in Figure 5.b. Because they employ the
delivery ratios. On the other hand, algorithms same forwarding mechanism, GPSR and LORA-
that employ GPS do not satisfy the requirements CBF behave similarly in terms of EED. The
of multi-hop vehicular ad hoc networks. In this End-to-End Delay represents the average time
section, we will compare our Location-Based required to send one hundred packets at 100
Routing Algorithm with Cluster-Based Flooding second intervals. Also, the distance between the
(LORA-CBF), with a very popular position-based transmitter and the receiver is measured in hop
routing algorithm called GPSR, (Greedy Perim- counts.
eter Stateless Routing) and demonstrate that at Figure 5.c describes routing overhead. Here,
an average speed of 42 m/s (~150 km/h), the lack LORA-CBF has a slightly higher routing overhead
of a predictive algorithm in GPSR diminishes its at a data rate of 11 Mbps compared with GPSR. On
performance. the other hand, at a data rate of 1 Mbps, LORA-
We implemented the GPSR algorithm on the CBF begins with a slightly higher routing overhead
same circular dual carriageway scenario with the at a distance of less than 5 hops. Both algorithms
same number of vehicles and a relative speed of have exactly the same routing overhead at a dis-
84 m/s (~300 km/h). Results show that without tance of 5 hops. At more than five hops, however,
a predictive algorithm, it is not possible to com- LORA-CBF has a lower routing overhead than
municate a source-destination pair located further GPSR. Routing overhead represents the total
than two hops. Our intention here is to show that number of routing packets transmitted during the
employing a predictive algorithm will improve simulation. For packets sent over multiple hops,
communication on a motorway. each packet transmission (at each hop) represents
Using GPSR, we applied the same short-term one transmission. Figure 5.d presents the route
geographic positioning predictive algorithm used discovery time. Both algorithms show similar
in LORA-CBF and the same physical and MAC behavior at a data rate of 11 Mbps, however, at a
layer. In addition, the same metrics were previ- data rate of 1 Mbps, GPSR’s route discovery time
ously employed to analyze the behavior of LORA- is greater. Importantly, GPSR suffers from more

132
Inter-Vehicular Communications Using Wireless Ad Hoc Networks

Figure 5.a. Delivery ratio Figure 5.b. End-to-End delay

00 0
Delivery Ratio (percent of packets)

99.8 0
99.6
00
99.

e e D (ms)
99. 80
99
60
98.8
0
98.6
98. 0
98.
0
98
   
   
Hop Count
Hop Count

LORA_CBF Motorway ( Mbps) LORA_CBF Motorway ( Mbps)


LORA_CBF Motorway ( Mbps) LORA_CBF Motorway ( Mbps)
GPSR Motorway ( Mbps) GPSR Motorway ( Mbps) GPSR Motorway ( Mbps) GPSR Motorway ( Mbps)

Figure 5.c. Routing overhead Figure 5.d. Route discovery time


90
00
80
Routing Overhead (number of

Route Discovery Time (ms)


00
0
6900 60
packets)

600 0
600 0

600 0
0
600
0
900
0
00    
   
Hop Count
Hop Count

LORA_CBF Motorway ( Mbps) LORA_CBF Motorway ( Mbps)


LORA_CBF Motorway ( Mbps) LORA_CBF Motorway ( Mbps)

GPSR Motorway ( Mbps) GPSR Motorway ( Mbps) GPSR Motorway ( Mbps) GPSR Motorway ( Mbps)

Figure 5.e. Overhead Figure 5.f. Routing load

00 
Overhead (percent of packets)

Routing Load (number of

99. 0

68
99
packets)

66
98.
6
98
6

9. 60

9 8
       

Hop Count Hop Count

LORA_CBF Motorway ( Mbps) LORA_CBF Motorway ( Mbps)


LORA_CBF Motorway ( Mbps) LORA_CBF Motorway ( Mbps)

GPSR Motorway ( Mbps) GPSR Motorway ( Mbps)


GPSR Motorway ( Mbps) GPSR Motorway ( Mbps)

133
Inter-Vehicular Communications Using Wireless Ad Hoc Networks

packet collisions because the spatial separation IMPLEMENTATION OF THE


of its packets is more limited. On the other hand, LORA-CB ALGORITHM ON A
LORA-CBF reduces the route discovery time due TESTBED
to its cluster-based flooding mechanism. Route
Discovery Time is the time required for the source We deployed LORA-CBF on a test bed using Linux
to send the first data packet. and equipped each node with an Enterasys wire-
Figure 5.e shows the overhead. Here, GPSR less card, employing sockets to allow internodal
has a slightly lower overhead compared to LORA- communication. Five laptops with ad hoc routing
CBF at data rates of 1 Mbps. At data rates of capability were deployed in an outdoor environ-
11 Mbps, however, both algorithms perform ment representing a small-scale ad hoc network.
similarly. Overhead is the total number of routing To validate LORA-CBF statically, we compared
packets generated divided by the total number of LORA-CBF to the results of another wireless ad
data packets transmitted, plus the total number of hoc network test bed (Toh, 2002). In (Toh, 2002),
routing packets. Overhead represents the percent each node ran the Associativity-Based Routing
of 100 packets transmitted during 100 second (ABR) protocol. The ABR and LORA-CBF al-
intervals. The routing load is shown in Figure gorithms employ a periodic beaconing strategy
5.f. again, at a data rate of 11 Mbps, LORA-CBF to inform neighbor nodes of their presence, using
has a slightly higher routing load than GPSR, both source-initiated on-demand ad hoc routing
however, at a data rate of 1 Mbps, LORA-CBF protocols to discover routes. The main difference
has a slightly higher routing load when it initi- between LORA_CBF and ABR is that the latter
ates data transmission. However, at five hops selects its route based on its longevity. On the
(=1500m), both algorithms have the same routing other hand, LORA-CBF uses a predictive algo-
load. At greater distances, LORA-CBF exhibits rithm to select the single best route based on the
a lower routing load than GPSR. Again, due to geographic locations of neighbor nodes.
its spatial separation, GPSR packet collisions are Figures 6.a and 6.b show 1, 2, and 3 hop results
more frequent, resulting in an increased routing for LORA-CBF and ABR. Results show similar
load. Routing Load is measured in terms of the behavior for the different packet sizes selected
number of routing packets transmitted divided by for the study. Each value on the graphs represents
the number of data packets transmitted. results for 100 packets sent, and the margin of er-

Figure 6.b. End-to-End Delay for two and three


Figure 6.a. End-to-End Delay for one hop hops

00 
ABR -hop ABR -hops
LORA-CBF -hop 0 ABR -hops
0
LORA-CBF -hops
00
 LORA-CBF -hops

0
0
e e D (ms)

e e D (ms)


00
0
0


00
0

0 

0 0
6 000 886 6 000 8
s ize of packets (bytes) s ize of packets (bytes)

134
Inter-Vehicular Communications Using Wireless Ad Hoc Networks

ror is <15%. Discovery time for the first hop is 0 In this chapter, we have discussed the mobility
seconds due to the Hello mechanism. For 2 hops, involved in typical motorway traffic scenarios and
the discovery time is 1.6 seconds and for three have provided simulated results of a very large
hops, discovery time increases to 1.74 seconds 250 node network. We validate our simulation,
because of the route discovery mechanism of the where possible, with measurements and analy-
two algorithms. sis. We also consider six lanes of moving traffic
(three in each direction) in all our simulations at
theoretical data rates.
CONCLUSON AND FUTURE WORK We have considered two non-positional-based
routing algorithms (AODV and DSR) and two posi-
In the near future, automobile manufacturers may tional-based routing algorithms (LORA_CBF and
use wireless ad hoc networks to improve traffic GPSR). Results show that mobility and network
flow and safety, in part, because it may be more size affects the performance of AODV and DSR
cost effective than continually undertaking mas- more significantly than LORA_CBF and GPSR.
sive construction projects, which are proving to Link failures are significantly more common in
have only limited success. Consequently, future highly mobile, dynamic networks. Link failures
developments in automobile manufacturing will trigger a new route discovery phase in all of the
include new communication technologies that algorithms; however, in AODV and DSR, this
offer more effective spacing and collision avoid- occurs more frequently because of their routing
ance systems, greater gas mileage (less brak- mechanisms. Thus, the frequency of route discov-
ing), less pollution (cars are in movement), more ery packets is directly proportional to the number
information and entertainment, etc. In order to of route breaks. We observe that positional-based
reduce communication costs and guarantee the routing protocols provide excellent performance
low delays required to exchange data between in terms of end-to-end delay and packet delivery
cars, inter-vehicle communication (IVC) systems, ratio. Their disadvantage, however, is that posi-
based on wireless ad-hoc networks, represent a tion-based protocols must transmit additional
promising alternative for future road communica- information, thus increasing network congestion.
tion scenarios, as they permit vehicles to organize Non-positional-based routing algorithms suffer
themselves locally in ad hoc networks without from sub-optimal routes and have a lower packet
any pre-installed infrastructure. delivery ratio because of dropped packets. In
LORA-CBF is an algorithm that can possibly be addition, our Location Routing Algorithm with
used in future wireless ad hoc networks because Cluster-Based Flooding (LORA_CBF) is robust
its reactive geographic routing algorithm employs in terms of delivery ratio, routing overhead, route
GPS in tandem with its predictive algorithm, discovery time, and routing load.
which is necessary for mobile networks to func- Future work related to the development of LORA-
tion optimally. Furthermore, LORA-CBF uses a CBF will include integrating GPS, a predictive
gateway selection mechanism to reduce conten- algorithm, and dynamic geographical maps into
tion in dense networks, which is predictable in a sole architecture to be deployed in a test bed.
highly congested traffic conditions. Finally, the
hierarchical structure of LORA-CBF facilitates
its deployment as part of vehicular ad hoc net- RE
works because it requires minimal deployed
infrastructure. Abdulhamid, H., Abdel-Raheem, E., & Tepe, K. E.
(2007). Channel estimation for 5.9 Ghz dedicated

135
Inter-Vehicular Communications Using Wireless Ad Hoc Networks

shortrange communications receiver in wireless of the IEEE Vehicular Technology Conference,


access vehicular environments. IET Communica- 2, 1429-1433.
tions Journal, 1(6), 1274-1279.
Da Chen, Z., Kung, H.-T., & Vlah, D. (2001). Ad
Bantli, H., Ring, E., & Goff, E. (1997). Require- Hoc Relay Wireless Networks over Moving Ve-
ments for direct short range vehicle to roadside hicles on Highways. Proceedings in International
communications. Proceedings of the IEEE Aero- Conference on Mobile Computing and Networking,
space Conference, 1, 41-61. (pp. 247-250).
Bevas, R., & Bevas, V. (1997). Routing in ad hoc Dickey, S. R., Huang, C., & Guan, X. (2007). Field
networks using a spine. Proceedings in the Sixth Measurements of Vehicle to Roadside Communica-
International Conference in Computer and Com- tion Performance. 66th IEEE Vehicular Technology
munication Networks, (pp.34–39). Conference, (pp. 2179-2183).
Boris & Arkady (1999). Link state routing protocol Dobias, F., & Grabow, W., (1994). Adaptive array
with cluster based flooding for mobile ad-hoc com- antenna for 5.8 Ghz vehicle to roadside communica-
puter networks. Proceedings of the Workshop on tion. 44th IEEE Vehicular Technology Conference,
Computer Science and Information Technologies 3, 1512-1516.
CSIT’99, (pp.28–36).
Festa, D. C., Longo, G., Mazzulla, G., & Muso-
Brasche, G., Rokitansky, C.-H., & Wietfeld, C. lino, G. (2001). Experimental analysis of differ-
(1994). Communication Architecture and Perfor- ent simulation models for motorway traffic flow.
mance Analysis of Protocols for RTT Infrastructure Proceedings of the IEEE Intelligent Transportation
Networks and Vehicle-Roadside Communications. Systems Conference, (pp. 675-680).
Proceedings of the IEEE 44th Vehicular Technology
Füßler, H., Mauve, M., Hartenstein, H., Käse-
Conference, 1, 384-390.
mann, M., & Vollmer, D. (2003). MobiCom Poster:
Broch, J., Maltz, D., Johnson, D., Hu, Y.-C., & Location-Based Routing for Vehicular Ad-Hoc
Jetcheva J. (1998). A performance comparison Networks. Proceedings in ACM SIGMOBILE
of multi-hop wireless ad hoc networks routing Mobile Computing and Communication Review,
protocols. In Proceedings of the 4th ACM/IEEE 7(1), 47-49.
International Conference on Mobile Computing
Hoogendoorn, S. P., & Bovy, P. H.-L. (2001).
and Networking (MOBICOM), (pp. 85-97).
State-of-the-art of Vehicular Traffic Flow Mod-
Ching-Chuan, Hsiao-Kuang, W., & Mario, G. elling. Special Issue on Road Traffic Modelling
(1997). Routing in clustered multihop, mobile and Control of the Journal of System and Control
wireless networks with fading channel. IEEE Engineering, 215(4), 283-303.
Singapore International Conference on Networks,
Johnson, D., Maltz, D., & Hu, Y.–C. (2007). The
(pp. 197–211).
Dynamic Source Routing Protocol (DSR) for
Cottingham, D. N., Wassell, I. J., & Harle, R. K. Mobile Ad Hoc Networks for IPv4. http://www.
(2007). Performance of IEEE 802.11a vehicular ietf.org/rfc/rfc4728.txt. Request for Comments
context. 65th IEEE Vehicular Technology Confer- (Work in Progress).
ence, (pp. 854-858).
Karp, B., & Kung, H.-T. (2000). Greedy Perim-
Cvetkovski, B., & Gavrilovska, L. (1998). A simu- eter Stateless Routing for Wireless Networks.
lation of a mobile Highway traffic. Proceedings Proceedings of the 6th ACM International Con-

136
Inter-Vehicular Communications Using Wireless Ad Hoc Networks

ference on Mobile Computing and Networking, the PC: New challenges for the operating system,
(pp. 243-254). (pp. 61-65).
Kosh, T., Schwingenschlögl, C., & Ai, L. (2002). Mussa, R., Upchurch, J. (2000). Simulator evalu-
Information Dissemination in Multihop Inter- ation of incident detection using VRC system.
vehicle Networks – Adapting the Ad-hoc On-de- Proceeding of the IEEE Intelligent Vehicles Sym-
mand Distance Vector Routing Protocol (AODV). posium, (pp. 442-450).
Proceedings in the 5th IEEE International Confer-
Perkins, C., Belding-Royer, E., & Das, S. (2003).
ence on Intelligent Transportation Systems, (pp.
Ad hoc On-Demand Distance Vector (AODV) Rout-
685-690).
ing. http://www.ietf.org/rfc/rfc3561.txt. Request for
Krishna, V., Chatterjee, & Pradhan (1997). A Comments (Work in Progress).
cluster-based approach for routing in dynamic
Raghupathy, Bevas, & Vaduvur (1998). Spine
networks. ACM SIGCOMM, Computer Commu-
routing in ad hoc networks. ACM/Baltzer Cluster
nication Review, (pp. 49–65).
Computing Journal, 1(2), 237–248.
Kwak, J. S., & Jae, H. L. (2004). Infrared trans-
Rokitansky, C.-H., & Wietfeld, C. (1993). Compari-
mission for intervehicle ranging and vehicle-to-
son of Adaptive Medium Access Control Schemes
roadside communications systems using spread
for Beacon-Vehicle Communications. Proceedings
spectrum technique. IEEE Transactions on Intel-
of the IEEE-IEE Vehicle Navigation and Informa-
ligent Transportation Systems, 5(1), 12-19.
tion Systems Conference, (pp. 295-299).
Li, J., Jannotti, J., De Couto, D., Karger, D., &
Rokitansky, C.-H., & Wietfeld, C. (1995). Methods
Morris, R. (2000). A Scalable Location Service
and Tools for Performance Evaluation and Valida-
for Geographic Ad Hoc Routing. Proceedings of
tion of Vehicle-Roadside Communication Proposed
the 6th ACM International Conference on Mobile
for Standardization. Proceedings in Vehicular
Computing and Networking, (pp. 120-130).
Technology Conference, 2, 964-970.
Lochert, C., Füßler, H., Hartenstein, H., Hermann,
Royer, E., & Toh, C. (1999). A Review of current
D., Tian, J., & Mauve, M. (2003). A Routing
routing protocols for ad hoc wireless networks.
Strategy for Vehicular Ad Hoc Networks in City
IEEE Personal Communications, (pp. 46-55).
Environments. Proceedings of the IEEE Intelligent
Vehicles Symposium, (pp. 156-161). Santos, R. A., Edwards, A., Edwards, R. M., &
Seed, N. L. (2005). Performance evaluation of
Matthaiou, M., Laurenson, D. I., Cheng-Xiang,
routing protocols in vehicular ad-hoc networks.
W. (2008). PHY 30-3 – Capacity Study of vehicle-
International Journal Ad Hoc and Ubiquitous
to-roadside MIMO channels with a line-of-sight
Computing, 1(1/2), 80-91.
component. IEEE Wireless Communications and
Networking Conference, (pp. 775-779). Toh, C.-K. (2002). Ad Hoc Mobile Wireless Net-
works: Protocols and Systems. Prentice-Hall
Minderhoud, M. M. (2002). Simulation model of
International.
motorways with next generation vehicles, techni-
cal specification. Traffic Safety Facts. (2004). NHTSA´s National
Center for Statistics Analysis.
Morris, R., Jannotti, J., Kaashock, F., Li, J., &
Decouto, D. (2000). A Scalable Ad Hoc Wireless Transportation Statistics Annual Report. (2006).
Network System. Proceedings of the 9th workshop U.S. Department of Transportation Bureau of
on ACM SIGOPS European Workshop: beyond Transportation Statistics.

137
Inter-Vehicular Communications Using Wireless Ad Hoc Networks

Wietfeld, C., & Rokitansky, C.-H. (1994). Per- Zandbergen, A., & Van der Ree, A. (1992). Experi-
formance of Vehicle-Roadside Communication ments on vehicle to roadside microwave commu-
Systems supporting Multiple RTI-Applications. nication. IEEE MTT-S International Microwave
Proceedings in Vehicle Navigation & Information Symposium Digest, 2, 617-620.
Systems Conference, (pp. 133-138).
Zou, X., Ramamurthy, B., & Magliveras, S. (2002).
Wietfeld, C., & Rokitansky, C.-H. (1995). Markov Routing Techniques in Wireless Ad Hoc Networks
Chain Analysis of Alternative Medium Access Classification and Comparison. Proceedings of
Control Protocol for Vehicle-Roadside Commu- the Sixth World Multiconference on Systemics,
nications. Proceedings in Vehicular Technology Cybernetics and Informatics, SCI.
Conference, 2, 958-963.

138
139

Chapter VIII
The Role of Communications
in Cyber-Physical Vehicle
Applications
Nicholas F. Maxemchuk
Columbia University, USA & IMDEA Networks, Spain

Patcharinee Tientrakool
Columbia University, USA

Theodore L. Willke
Columbia University, USA & Intel Corporation, USA

ABSRACT

Cyber-physical systems use sensing, communications, and computing to control the operation of physical
devices. Sensing and computing devices have been embedded in automobiles and in the transportation
infrastructure. Communications adds a new dimension to the capabilities of these systems. The embed-
ded computers and sensors in both vehicles and the infrastructure will be networked into cyber-physi-
cal systems that reduce accidents, improve fuel efficiency, increase the capacity of the transportation
infrastructure, and reduce commute times. The authors describe applications that improve the opera-
tion of automobiles, control traffic lights, and distribute the load on roadways. The requirements on the
communications protocols that implement the applications are determined and a new communications
paradigm, neighborcast, is described. Neighborcast communicates between nearby entities, and is par-
ticularly well suited to transportation applications.

Copyright © 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
The Role of Communications in Cyber-Physical Vehicle Applications

INTRODUCTION cyber-physical systems will change the way we


use transportation.
Cyber-physical systems use sensing, communica- Communications between nearby vehicles will
tions and computing to control the operation of enable cooperative control paradigms that reduce
physical devices. Sensing and computing devices accidents more than computing and sensors alone.
have been embedded in automobiles to improve For instance, a distributed anti-lock brake system
their fuel efficiency and safety. For instance, will not only allow a car to brake more quickly
automobiles have several computers that are by preventing skids, but will negotiate with sur-
embedded in engines to improve gas mileage and rounding vehicles to avoid collisions while stop-
detect faults; cruise control is used to maintain ping (Liu & Ozguner, 2003). In instances where
a constant velocity; antilock brakes use sensing accidents cannot be avoided, the system will select
and computing to prevent skids and stop cars as a stopping speed that minimizes the damage. Side
quickly as possible; and computing is combined sensors can provide a warning when there are
with GPS systems to plan routes. Sensing and cars in adjacent lanes, while communications can
computing are also used in traffic lights to reduce negotiate with those cars to safely change lanes.
travel times and fuel consumption by changing Vehicle control systems will increase the capac-
signals only when traffic is waiting and by tim- ity of highways by allowing cars on congested
ing signals to permit traffic to flow in a dominant roadways to safely travel faster and with less
direction unimpeded. space between vehicles. The communications
New applications of sensors are being intro- procedures that are used in automotive applica-
duced in automobiles. Sensors detect obstacles tions are described in the sections Centralized
behind a car that is backing up and warn the Control and Distributed Control.
driver when there is a car in a blind spot or when Communications between vehicles and the
he is following too close to the car in front. The infrastructure will improve the scheduling of
front, back and side sensors are also used to as- traffic signals and route planning. Instead of rely-
sist drivers when parallel parking. Sensors will ing on sensors to detect cars that are waiting at a
transform cruise control from a simple device that light, communications will notify the computers
maintains a constant speed to a more intelligent that control the lights before the vehicles arrive.
system that controls the maximum speed, but On congested roadways, traffic lights at adjacent
reduces the target speed as a function of nearby intersections will be coordinated to minimize the
automobiles (Heddebaut et al., 2005; Vahidi stopping time for cars traveling in all directions.
& Eskandarian, 2003; Zhang et al., 1999). The The use of communications for controlling traffic
speed will be decreased when the preceding car signals is described in the section, Interaction of
is traveling at less than the target speed to avoid Automobiles with Traffic Signals. Route planning
a rear end collision, or when cars in adjacent computers will communicate with a traffic control
lanes are traveling at much lower speeds to give center to determine congested regions and may
a driver sufficient time to respond to vehicles that also cooperate with other route planning com-
change lanes. puters to avoid creating new congested regions,
Communications adds a new dimension as described in the section, Cooperative Route
to systems and applications. The embedded Planning. Recently, sensors have been installed
computers and sensors in both vehicles and the in parking spots in San Francisco and commu-
infrastructure will be networked together to im- nications with drivers reduces the time and fuel
prove the operation of existing applications and to consumed to search for parking spots.
make new classes of applications possible. These

140
The Role of Communications in Cyber-Physical Vehicle Applications

Communications can be implemented with the identity of each recipient and send a separate
existing wireless technologies that are part of transmission to each. In such a case, a broadcast
the communications infrastructure, but will also or multicast protocol that permits a message to
take advantage of evolving infrastructureless be reliably received simultaneously by a group
networks. For example, vehicle ad hoc networks of vehicles qualified, for example, by location is
(VANETs) can provide wireless connections much more effective. A number of these protocols
directly between vehicles. These networks are are surveyed in (Willke et al., 2008) and (Sichitiu
ad hoc in the sense that they are self-organized et al., 2008). Many were specifically designed to
and self-managed by the participants. VANETs address the real-time, high reliability requirements
provide inter-vehicle communications without of inter-vehicle communications applications.
requiring an investment in a new communications Vehicular applications have very diverse
infrastructure, and will permit new applications to communication requirements with respect to
be deployed more quickly and less expensively. latency, throughput, reliability and other metrics.
The applications may be generally classified into
three areas based on how they utilize information,
BACKGROUND which is a significant factor in determining sensor
and communication performance requirements
The field of cyber-physical systems (CPS) has (Willke et al., 2008):
only recently emerged. The United States National
Science Foundation (NSF) and other bodies have 1. Information services
sponsored a number of workshops on the topic a. General
since 2006 (NSF, 2006; NITRD, 2008). The NSF b. Vehicle safety
has identified CPS as a key research area, in part 2. Autonomous control
because it tackles the difficult problem of per- a. Front-back peer braking and intersec-
forming distributed control within a distributed tion collision avoidance
computing environment (Wolf, 2007). There is b. Automated cruise control
a keen focus on transportation systems, where 3. Cooperative control systems (Centralized
CPS may improve safety, efficiency and comfort. and Decentralized)
However, the highly mobile and lossy nature of a. Platooning and coordinated braking
vehicular networks further challenges the design, b. Coordinated maneuvering
verification, and performance of CPS. c. Traffic flow control
Whether the system uses a distributed or cen- d. Route planning
tralized control design, the computing resources
are distributed and the system’s performance may Application examples are listed for each area.
be largely a reflection of the network’s ability to Information services include mobile Internet and
deliver data quickly, efficiently, and guarantee other data dissemination that may be related to
other characteristics. Within VANETs, the wire- safety but is not directly involved in vehicle con-
less medium is inherently broadcast-friendly and trol. Autonomous control includes applications for
many of the applications involve transmitters that which vehicles collect data from nearby peers to
are interested in sending the same message to more individually optimize their own braking, accel-
than one receiver. This is true, for example, when eration, or steering. Cooperative control includes
a vehicle would like to inform others nearby of applications that involve coordination and joint
a road hazard. The message could be sent using planning amongst vehicles to optimize their col-
unicast but it would require the sender to know lective safety, efficiency, or comfort.

141
The Role of Communications in Cyber-Physical Vehicle Applications

A number of consortia, companies, and gov- such as highways and urban streets, and across
ernments are working to improve transportation a variety of communications systems, including
by investigating applications, communication vehicle-to-vehicle and vehicle-to-infrastructure
protocols, and integrated vehicle systems. The networks. The California Partners for Advanced
CarTALK 2000 project (Reichardt et al., 2002) is Transit and Highways proposed an Automated
focused on three applications for road safety: 1) a Highway System (Horowitz & Varaiya, 2000) that
driver warning system to distribute information improves safety and capacity through automated
on road conditions, 2) adaptive cruise control and control of vehicles, traffic admission control, and
automated braking, and 3) cooperative systems for route planning. The ISO TC 204 Working Group
lane merges and collision avoidance in intersec- 16 (2007) is developing CALM (Continuous
tions. The Intelligent Vehicle Initiative (U.S. DOT, Communications for Vehicles). CALM’s archi-
2008) is studying how drivers should interact with tecture enables data collection, such as traffic
in-vehicle safety systems, performance criteria flow measurements, distribution of delay sensitive
for applications, and deployment issues, includ- information, such as emergency alerts, and access
ing driver acceptance. The PReVENT project to general Internet data from moving vehicles.
(ERTICO-ITS Europe, 2008) has looked at the CALM integrates many sensor and communi-
fusion of GPS, infrared, radar and other sensors cations technologies, including infrared, radar,
with communications to improve the effectiveness DSRC, 3G cellular, and others.
of road safety applications. Vehicle warning and control systems place
There are a number of initiatives focusing on unique demands on VANETs. Safety and motion
wireless technologies for VANETs. The IEEE is control applications typically have a real-time
standardizing a random access protocol for Wire- requirement for information delivery between
less in Vehicular Environments (WAVE) (IEEE, vehicles. Some of the control mechanisms may fail
2006). WAVE is the foundation of the U.S. DOT’s when delays exceed tens of milliseconds (Willke
Dedicated Short Range Communication (DSRC) et al., 2008), and the maximum delay must be
project (IEEE, 2007), and the Vehicle Safety bounded with a very small loss probability (Li
Communications Consortium (VSCC, 2008) is & Wang, 2007). Because of the relatively high
developing the requirements on DSRC when it is message loss rates in wireless networks, rapid
used in safety applications. The European Com- recovery mechanisms are required to provide a
mission and car industry is developing a CDMA high probability that a message is delivered in
protocol for multi-hop ad-hoc networks in the a short time. Many vehicle applications require
CarTALK 2000 project (CarTALK, 2002). The one-to-many or many-to-many broadcast, and
Car-2-Car Communication Consortium (C2C-CC, some applications require the additional ability to
2008) is looking at wireless protocols for intel- determine when broadcast information is received
ligent transportation systems. The Network on by all of the receivers. For example, a vehicle that
Wheels program (BMBF, 2008) is investigating negotiates a lane change may require that all of
the security issues for the protocols developed the vehicles that are cooperating receive the in-
in the C2C-CC, including, false data, jamming, structions and know that all of the other vehicles
corruption, and denial-of-service attacks. have also received the instructions. If the vehicles
Other groups are integrating communications, cannot confirm reception, it may be necessary to
protocols and applications into complete Intel- abort the maneuver.
ligent Transportation Systems. One objective is VANET architectures also face a number of
to provide vehicles with seamless and continuous significant challenges not present in other types
communication in a variety of environments, of ad hoc networks (Li & Wang, 2007; Willke et
al., 2008):

142
The Role of Communications in Cyber-Physical Vehicle Applications

• As vehicles move with respect to one an- gies that can improve automotive safety. These
other, the connectivity and routing change mechanisms assist in the autonomous operation
more frequently than in slower moving of individual vehicles. Additional improvements
networks. can be attained by enabling groups of vehicles to
• On sparsely populated highways network share their sensor readings and coordinate their
partitions occur, causing groups of vehicles actions. The coordination can be performed in a
to lose connectivity. centralized manner, obeying the instructions of a
• In many applications vehicles communi- leader, or in a distributed manner, by negotiating
cate with one another based on position, with nearby vehicles.
rather than identity, making it necessary In this section we consider centralized con-
to integrate communications and location trol mechanisms to coordinate vehicles. We
services. will start by describing an application called
platooning. The requirements of the application
Protocol verification and conformance testing dictate the characteristics of the communications
are particularly important in vehicle control sys- protocols. We will describe the Wireless Token
tems. In safety applications it is necessary to verify Ring Protocol, WTRP (Lee et al., 2001), that
that the protocol performs the required services was originally used in platooning applications
and that there are no unexpected or infrequently and a recent addition to the vehicle protocols,
occurring states that cause dangerous conditions. the Mobile Reliable Broadcast Protocol, MRBP
The primary objective in vehicle control must be (Willke & Maxemchuk, 2005). MRBP is specifi-
to do no harm. We must make certain that the cally designed to operate in the high error rate
systems never cause an accident or make an un- environment of wireless networks and to respond
avoidable accident more severe. In addition, many to the frequently changing groups encountered in
of the applications require peer level cooperation vehicle coordination.
between different vehicles. It is expected that there
will be many providers of these systems and that Platooning
they will have to interact with one another. It is
particularly important that the implementations Platooning occurs at present when a string of
are tested to make certain that they conform to trucks on a highway is organized in a convoy,
the verified protocols. Designing protocols that as depicted in Figure 1. The front vehicle is the
can be verified and tested places constraints on leader and sets the average speed for the group.
the protocols as noted in (Lee, 2008). Each driver accelerates and applies his brakes
to closely follow the preceding vehicle. This im-
proves the aerodynamics of the group, leading to
CETRALIZED CONTROL increased fuel efficiency. Convoys also increase
the capacity of roadways by having vehicles travel
Today drivers operate their vehicles autonomously. closer together at highway speeds.
They determine their speed based on traffic and Fuel efficiency and highway capacity increase
road conditions, traffic rules, and their own time as inter-vehicle spacing is decreased. Sensors and
pressure. They judge the need for lane changes communications can be used to assist drivers and
and other maneuvers, navigate, and are respon- safely decrease the spacing. Lasers, radar, and
sible for their own safety and the safety of those sonar can be used to measure the distance between
with whom they share the road. Intelligent cruise vehicles and the vehicle velocities (Gehring &
control and sensor warning systems are technolo- Fritz, 1997). An onboard computer can use these

143
The Role of Communications in Cyber-Physical Vehicle Applications

Figure 1. Lane of vehicles with platooning parameters

inputs to control acceleration and braking with fect of hw selection on platoon control stability is
greater precision and responsiveness than human studied in (Swaroop, 1995). The second strategy,
drivers. These techniques are currently used to which requires communication, is constant spac-
implement anti-lock brakes. ing. In it, hw is set to zero, making L0 the constant
Inter-vehicle communications can augment vehicle spacing. L0 may be set as low as a few
sensor information by announcing changes in meters without causing vehicles to collide, as
the speed of the group before vehicles can sense even heavy vehicles may be controlled to within
the change in the preceding vehicle. Vehicles two meters (Song, 2004).
broadcast the sensor information to the rest of the The effect of the two vehicle control policies on
group so that vehicles can control their operation traffic capacity is shown in Figure 2. The capacities
in response to vehicles that they cannot directly are plotted against vehicle velocity, with 88 feet/sec
observe. For instance, a truck may apply its brakes corresponding to a highway speed of 60 mph. All
when a vehicle one, five, or ten vehicles ahead of it capacities are reduced by 20% to account for lane
starts to decelerate, rather than waiting for each of changes, merges and other disturbances. The time
the vehicles in between to detect braking. Drivers headway policy with hw = 2 seconds represents a
typically respond to vehicles that are two or three safe manual following distance. The policy with
vehicles in front of themselves. Automated control hw = 0.5 seconds represents an automated policy,
systems that are restricted to sensor information where sensors are used to reduce the safe distance.
from immediately adjacent vehicles use less in- The policy with hw = 0 represents a system that
formation than humans, but make up for the lack uses communications to simultaneously control
of information by responding more quickly. With all of the vehicles. The figure shows the increase
communications, automated control systems can in capacity when we use technology to reduce
use more information than humans in addition to spacing and the further increase when we use
responding more quickly. communications. In a centralized control system,
The effect of centralized control on highway the increased capacity due to communications
capacity is demonstrated by considering two only occurs within a platoon. The distributed
control strategies for platoons. In the first strat- control procedures, described in the next section
egy, vehicles maintain a distance consisting of a permit the increased capacity to occur over the
constant L0, that is the minimum distance between entire congested region of a highway.
vehicles at rest, plus a distance that is proportional The leader in a convoy issues instructions for
to velocity. This proportion is called the time all vehicles to change speed or brake simultane-
headway, hw. This strategy can be implemented ously, controls maneuvers such as lane merges and
with or without sensors to assist drivers. The ef- lane changes, and manages group membership.

144
The Role of Communications in Cyber-Physical Vehicle Applications

Figure 2. Traffic capacity for various vehicle headway policies

14000
C onstant Spac ing (10 feet)
12000 Time Headway (0.5 sec )
[vehicles/lane/hour]
[vehicles/lane/hour]

Time Headway (2 sec )


10000

8000

6000
Capacity
Capacity

4000

2000

0
0 20 40 60 80 100 120
velocity [feet/sec]

The leader must ensure that the platoon operates individual vehicles as well as the platoon leader. As
within the performance limits of the least capable a result, the spacing between adjacent vehicles in
vehicle and can deny membership to vehicles that different platoons must be greater than the spacing
may limit the performance of the convoy. The between adjacent vehicles in the same platoon. On
communication protocol should provide reliable a congested highway, distributed control strate-
message delivery between all of the vehicles and gies allow all vehicles to communicate with their
should manage the group membership. neighbors and reduce the communications delays
On a congested highway, groups of vehicles that occur on platoon boundaries.
will interact with one another. For example, the
leaders in two platoons in adjacent lanes may need WTRP
to coordinate a lane merger; or platoons may be
split or merged depending on the capabilities of WTRP is a token passing protocol that gives
the vehicles. In a centralized system, the com- each source in a network the right to transmit in
munication between platoons may be organized order. In platooning applications, WTRP is used
hierarchically, with a division leader coordinating to periodically update the state of each vehicle
the operation of a group or nearby platoons and a each time it receives the token. The token pass-
highway general controlling multiple divisions on ing mechanism guarantees that sources do not
the same roadway. Communications follows the transmit simultaneously and collide. Scheduled
hierarchical structure. A general communicates protocols are well suited for periodic updates.
with his division leaders and the division leaders This type of token passing protocol was
communicate with platoon leaders. Communica- initially used on wired loop topologies, where
tion delays prevent the general from controlling the the transmission order is dictated by the wiring,

145
The Role of Communications in Cyber-Physical Vehicle Applications

but it has also been used on bus networks where MRB


the order is specified by a token list. In wireless
networks, the probability of transmission error MRBP uses a token to give receivers the right to
is higher than in wired networks; and in vehicle acknowledge transmitted messages rather than
networks mobility causes the members of the giving the sources the right to transmit messages.
token group to change frequently. Source messages are broadcast to the entire group
In token networks, the token must be recovered using a contention resolution broadcast protocol,
and restarted when it is lost. With high packet such as the IEEE 802.11 protocol, as depicted in
loss, the token must be acknowledged when it is Figure 3. MRBP is based on the Reliable Broadcast
passed and retransmitted when it isn’t acknowl- Protocol, RBP (Chang & Maxemchuk, 1984), and
edged to reduce the probability that the token is the Timed Reliable Multicast Protocol (Maxem-
lost. After a number of attempts to forward the chuk & Shur, 2001).
token, the token site must assume that the next In MRBP the token is forwarded to each re-
station has left the group and reconfigure the to- ceiver in the list. The token site holds the token
ken group to exclude that station. The maximum for a fixed time and then transmits a token passing
time for the token to circulate around the group message that acknowledges all of the source mes-
is proportional to the number of vehicles in the sages received while it held the token. The token
convoy times the time to make the maximum passing/acknowledgement message is broadcast
number of retries and a reconfiguration at each to all of the sources and receivers that take part
of the stations. When a vehicle wants to transmit in the protocol.
an emergency message, it may have to wait up to MRBP uses an aggressive token passing
the maximum token cycle time. procedure. A token site forwards the acknowl-
An acknowledgement message guarantees that edgement/token at its scheduled time, whether
the source message is received by the next node or not the token site has received the preceding
in the token list but does not guarantee that it is tokens. When a scheduled acknowledgement isn’t
received by all of the nodes in the token group. received, recovery attempts begin shortly after its
In a wireless network a node’s state information scheduled transmission and end after the maxi-
may have to be transmitted several times before mum allowed recovery period, as in Figure 4.
all of the other nodes receive the message with A voting procedure is used to decide which
high probability. acknowledgements all of the receivers include in
When new vehicles join a platoon, or when a their acknowledgment list. Each station votes on
vehicle leaves a platoon, the token list must be the preceding acknowledgements when it passes
modified. WTRP uses a separate protocol that the token by listing its missing acknowledgements.
can add or delete one vehicle at a time. The vote on an acknowledgement message, Ai,
WTRP is well suited for control strategies starts with the acknowledgement message that is
that use periodic updates for all vehicles, rather scheduled to be transmitted after Ai’s scheduled
than procedures that require rapid, reliable dis- transmission plus the maximum allowed time to
semination of emergency messages. It is most recover a missing message, as shown in Figure
useful in small, infrequently changing convoys 4. The vote ends after the token circulates around
in a transmission environment with a low mes- the group, returning to the site that transmitted
sage loss rate. the first vote, plus the maximum time to recover
the acknowledgement from the last site to vote.

146
The Role of Communications in Cyber-Physical Vehicle Applications

Figure 3. Token passing mechanism in MRBP

Figure 4. Acknowledgement and message commitment timeline for MRBP

147
The Role of Communications in Cyber-Physical Vehicle Applications

An acknowledgement is included in the list when message is only acknowledged by one of the re-
a majority of the stations in the group, at the ceivers, independent of the number of receivers
time that the vote starts, received or recovered in the group. The voting protocol guarantees that
the message. A similar vote occurs for each of every receiver recovers the same set of source
the source messages that Ai acknowledges. The messages.
vote on the acknowledged messages starts after In addition to guaranteeing that all of the re-
each receiver has an opportunity to first recover ceivers have all of the source messages, MRBP
the acknowledgement message and then recover places the messages in the same order at each of
the acknowledged source messages. the receivers. Acknowledgements are sequentially
Acknowledgements and acknowledged mes- numbered and each receiver recovers all of the
sages are included in the common list at each of acknowledgements and the messages that they
the receivers only when a majority of the receivers
acknowledge. The numbered acknowledgements
have the message. The majority is determined by
allow all of the receivers to place the source mes-
counting “yes” votes, “no” votes, and abstentions.
sages in the same sequence, which guarantees
Abstentions occur when voting receivers have left
that copies of the same control program running
the group. If the “yes” votes at a receiver exceed
on different vehicles reach the same conclusion.
the majority threshold, a message is included in
the list. If the “no” votes at the receiver exceeds The aggressive token passing protocol may cause
the majority threshold, the message is excluded multiple receivers to acknowledge the same source
from the list. Neither a majority of “yes” or “no” message, but the earliest acknowledgement takes
votes may be caused by abstentions or by votes precedence when sequencing the messages.
that the receiver has failed to recover. Forcing a MRBP rapidly distributes critical source mes-
decision may cause this receiver to reach a differ- sages with two levels of guarantees. In a relatively
ent decision than other receivers in the group. To short time, proportional to the maximum allowable
prevent having different data sets at the different number of retransmission attempts to recover a
receivers, a receiver that reaches an anomalous message, MRBP guarantees that all vehicles that
decision leaves the group. are part of the group have received the source
The vote procedure is used to continuously message, and in a longer time, proportional to
add and delete stations from the group. When the number of vehicles in the token group, each
a station’s acknowledgement is not included in vehicle learns which other vehicles received the
the list, the station is removed from the token message. The first level of guarantee is adequate
group. A station joins the group by transmitting for vehicles to respond to an emergency message,
a source message that must be acknowledged and such as a rapid stop, and the second level of guar-
voted into the group. The joining station, as well antee is needed for coordinated maneuvers, such
as each receiver in the group, tallies the vote on as a negotiated lane change.
the joining station. The distributed vote tallying The time for MRBP to deliver emergency
procedure guarantees that all receivers in the message broadcasts with a verified level of reli-
group reach the same membership decisions, or ability is much less than WTRP. WTRP does
leave the group themselves, so that all stations in not inherently provide acknowledgements for
the group have the same membership list.
transmissions, but it may be used in conjunction
with a higher layer that does (Lee, 2001). As-
MRB Characteristics sume that the group has M receivers and that a
message must be transmitted N times before the
MRBP is an efficient acknowledgement protocol.
probability that it is received and acknowledged
When there are no transmission losses each source
by all receivers reaches an acceptable level for the

148
The Role of Communications in Cyber-Physical Vehicle Applications

application. In this scenario, the source transmits In this section we discuss distributed tech-
the message when it receives the token, waits for niques in which vehicles collaborate on their
each receiver to transmit an acknowledgement, control without the direct involvement of a leader
and, if needed, retransmits the message upon or central authority. We first describe the evolu-
regaining the token. WTRP requires (N+1)·M·∆T tion of an anti-lock braking application that uses
to attain the acceptable level, where ∆T is the distributed techniques.
average time to transfer the token. ∆T includes The distributed control procedures take into
the time to transmit the source message and other account the actions of nearby vehicles and are
control messages, including acknowledgements. performed individually at each vehicle. Driv-
A similar nominal ∆T may used for both MRBP ers currently control their vehicles based on the
and WTRP; but ∆T increases for WTRP if a token actions of several vehicles immediately ahead,
is lost and ring reformation is required. In MRBP, adjacent, and possibly behind them. Automated
a source retransmits a message each ∆T if it does systems improve on human performance by re-
not receive the acknowledgement. It takes at most sponding more quickly, and use communications
N·∆T for a token site to receive the source message to take into account vehicles that are farther away
with the required reliability, at most N·∆T for each or which are obstructed from view by other traffic.
receiver to recover the acknowledgement message, We define a vehicle’s neighborhood as the vehicles
and at most N·∆T for the receivers to recover the it considers when performing an operation. We
acknowledged message, for a total of 3·N·∆T, also describe the Reliable Neighborcast Protocol
which is much less than (N+1)·M·∆T. (RNP), which provides delivery and sequencing
MRBP is the first reliable broadcast protocol guarantees in each neighborhood that are similar
that operates with continuously changing groups. to the guarantees provided by reliable broadcast
It adds and deletes members to the group without protocols within a broadcast group.
stopping the protocol. Earlier token passing proto- The neighborhoods of adjacent vehicles
cols are quasi-stationary. They operate on a fixed overlap. On a congested highway, the actions
group until the group changes, then reconfigure performed by one vehicle may indirectly affect
the group and continue. MRBP is better suited for many others. The distributed control procedures
vehicle applications where vehicles continuously that we develop must not allow the actions taken
move with respect to one another. by a vehicle to propagate undamped. As an ex-
ample of how control procedures can malfunc-
tion we discuss “rolling traffic jams,” in which
DISTRIBUTED CONTROL vehicles that have not entered a highway are
affected by vehicles that have slowed down and
When highways are congested, platoons must left the area.
coordinate their actions, and the algorithms that On congested roadways and in densely
control the interaction between platoons have an populated areas with many roadway entrances,
effect on safety and fuel economy that may rival exits, and intersections, a vehicle’s neighborhood
that of the protocols used within platoons. Central- changes frequently. We describe how RNP’s self-
ized control procedures are not adequate to con- organizing architecture can continuously modify
trol all of the interacting vehicles on a congested the neighborhoods on a highway.
roadway. The number of vehicles is too large to In summary we compare the characteristics
be processed quickly and the distances covered of WTRP, MRBP, and RNP.
increase the time to collect information.

149
The Role of Communications in Cyber-Physical Vehicle Applications

Distributed Anti-Lock Brakes Drivers are reluctant to relinquish control of


their vehicles to automated systems. However,
Distributed protocols will be used for a number the current generation of anti-lock brakes, which
of assisted driving applications. Most applications uses sensors and computers to prevent vehicles
will initially provide warnings, then provide lo- from skidding or braking unevenly, have gained
cal control functions, and eventually coordinate acceptance because drivers realize that the ability
maneuvers with adjacent vehicles. of these systems to respond more quickly than
For example, consider a distributed anti-lock humans avoids accidents. A properly designed
braking application. Currently sensors can de- distributed anti-lock braking system can also
tect adjacent vehicles. These sensors are used to gain acceptance by only providing functions that
provide a warning when a collision may occur. reduce the likelihood and severity of accidents,
Communications can improve the performance rather than assuming complete control of the
of local sensors by sharing sensor readings be- vehicle.
tween nearby vehicles to provide warnings about
vehicles that are farther away or obstructed from Rolling Traffic Jams
view. For instance, communications can provide
a driver following a truck with a warning that a Many drivers have experienced rolling traffic
car several ahead is braking hard. Communica- jams on congested highways. Traffic waves are
tions can also provide warnings before sensors created when a vehicle on a congested roadway
can detect physical changes. Like virtual tail- changes speed suddenly. After a reaction delay,
lights, vehicles nearby may receive a message the followers decrease their speed more quickly
that a vehicle is braking before they can sense to maintain the separation. Eventually the high-
its change in velocity. way may come to a complete stop. Drivers that
In addition to providing a warning, a distrib- are caught in these jams arrive at a point where
uted anti-lock braking system can help control the traffic resumes its normal speed, without any
a vehicle. When a vehicle senses or receives a apparent cause for the delay. These waves actu-
message that vehicle it is following is stopping, ally move in the opposite direction of the traffic
the vehicle may automatically begin to brake. flow so that the point where they are encountered
The separation between vehicles can also be may not even be the point where the slow down
transmitted to automatically control braking and originally occurred. Rolling traffic jams can
prevent tailgating. persist for long periods of time and can even af-
Beyond local control, communications can be fect vehicles that are not on the highway when
used to negotiate a maximum safe rate of decel- they first occurred. This makes it very difficult to
eration based on the braking distance of the least control the entire group of vehicles that encounter
capable vehicle in a string. In a negotiated stop, the these phenomena.
communications protocol should ensure that all of Sensors and automated control systems can
the cooperating vehicles successfully receive the reduce rolling traffic jams by reducing driver
message so that they react consistently. A braking reaction times and over-reaction. This, in turn,
vehicle can be notified when the vehicles following will reduce the amplification of the wave. Com-
it have not received a message. Sequenced mes- munications can further reduce the size of the wave
sage delivery is a useful protocol guarantee for by allowing vehicles to respond to the slow down
distributed control of vehicles. Software systems before it can be detected. This mode of operation
that receive the same sequence of messages in each can attenuate, rather than amplify, the wave as it
vehicle are better able to predict the operation of moves away from the initial source of the distur-
the other vehicles.

150
The Role of Communications in Cyber-Physical Vehicle Applications

bance (Seiler et al., 2004). Distributed anti-lock tion time of one second, Vehicle 50 cannot begin
brakes can further reduce the phenomenon by accelerating until the 49 vehicles before it do,
having vehicles decelerate less quickly than the which takes 49 seconds. There is additional delay
vehicles they are following. The safe distance be- then for Vehicle 50 to accelerate towards cruising
tween vehicles is a function of their speed. When speed and reach the point of the disturbance. The
the vehicle in front is slowing down, the vehicle reaction time may be reduced using automated
following it can slow down less quickly and reduce cruise control, shown with a 0.2 second lag, or
the spacing based on the new speed. further reduced by communications that permits
Communications and control technology can all vehicles to track their preceding vehicle’s ac-
also reduce rolling traffic jams by accelerating celeration, thereby avoiding a cumulative delay.
a vehicle toward its target speed as soon as the
preceding vehicle starts to accelerate, instead of Neighborcast
waiting for the driver to respond to the change in
speed. Figure 5 depicts what happens after a lane In order to implement distributed procedures,
of traffic comes to a complete stop. The vehicles each vehicle communicates with a set of vehicles
are three meters in length and come to rest two that are within a specified distance. The section
meters apart. The amount of time it takes for of the roadway within the specified distance
vehicles in the lane to get beyond the point of the from a vehicle is a vehicle’s neighborhood, and
disturbance after the first vehicle (i.e., Vehicle 1) the vehicles within the neighborhood are the
begins a 15 second acceleration back to 60 mph vehicle’s neighbors, as shown in Figure 6. The
is plotted for three cases. The main determinant neighborhoods of adjacent vehicles may over-
of waiting time is how long it takes each vehicle lap. A protocol that implements communication
to start accelerating after the vehicle in front of between a vehicle and its neighbors, rather than
it does. For example, using a typical human reac- within a specific set of vehicles, is called a neigh-

Figure 5. Waiting time in a traffic backup

140
Manual (t= 1 sec )
120 Automated (t= 0.2 sec )
Automated (Ideal)
100
Delay [sec]

80

60

40

20

0
0 10 20 30 40 50 60 70 80 90 100
vehicle Position

151
The Role of Communications in Cyber-Physical Vehicle Applications

Figure 6. Neighbors

borcast protocol (Maxemchuk et al., 2007). On cations uses a token passing protocol that only
a congested highway, vehicles travel at similar, allows a vehicle to transmit once each second, the
but different, speeds and the set of neighbors that distance a vehicle travels in one second should
interact continuously changes. be added to the separation between vehicles. In
The size of a vehicle’s neighborhood depends addition, if some vehicles cannot participate in
on the application, the road conditions, the speed the cooperative protocol, the average separation
of the vehicles, the type of vehicles participat- will increase. The automated braking application
ing, the fraction of the vehicles that have similar may use information from a neighborhood that
sensing and communications abilities, and the extends a certain distance in front of and behind
communications procedures that are used. For the vehicle, depending on the conditions.
instance, consider a distributed anti-lock braking
application. On a dry road it is recommended that RNP
manually controlled cars maintain a minimum
separation equal to the distance that they travel Reliable neighborcast protocols, such as RNP
in 2 seconds. At 60 mph, drivers should maintain described in (Maxemchuk et al., 2007), provide
a separation of 180 feet. If the roads are icy or delivery guarantees to all neighbors. They are
wet the minimum spacing between cars should similar to reliable broadcast protocols that pro-
increase; and the separation from a heavily loaded vide delivery guarantees to all of the members
truck to a car should be greater than between of a broadcast group. The difference between
cars, since the truck cannot stop as quickly. In the two is that each member of the neighborhood
an automated braking system that uses sensors has its own neighborhood, so that there isn’t a
to detect the distance to the preceding car, the single group.
response time is faster than that of a driver, and RNP is an overlay on overlapping reliable
the safe separation may be reduced from 180 feet broadcast protocols, as shown in Figure 7. Each
to, say, 90 feet. In a system that uses communica- vehicle participates in all of the reliable broadcast
tions to announce changes in speed, rather than groups that cover its location. The overlap guar-
waiting for the change to be detected, the safe antees that each vehicle can communicate with
distance may be further reduced by at least half every other vehicle in its neighborhood in at least
again. However, if, for example, the communi- one of the broadcast groups covering its location.

152
The Role of Communications in Cyber-Physical Vehicle Applications

Therefore, vehicles can communicate with their This mode of operation cannot be supported on
neighbors without forwarding messages through long, heavily populated highways by the limited
multiple broadcast groups. RNP combines the bandwidth of current wireless communications
messages from the various broadcast groups, and networks. At the other extreme, a broadcast group
extends the guarantees provided by the underlying equal in size to the neighborhood may be created
reliable broadcast groups to the neighborhood. about each vehicle. With this architecture, a vehicle
When RNP is implemented on top of the MRBP belongs to one broadcast group for each neighbor
protocol, it provides guaranteed, sequenced and in addition to one for itself. Each message from
confirmed message delivery to every vehicle in a vehicle must be acknowledged in each of these
the neighborhood. Sequenced message delivery groups.
guarantees that any two vehicles that receive the The efficiency of overlay architectures is de-
same two messages from vehicles in their neigh- fined as the fraction of unique received messages
borhood will use those messages in the same order. from neighbors over the total number of received
RNP filters out messages from other vehicles that messages in (Maxemchuk et al., 2007). In the
are in the broadcast groups but not in a vehicle’s most efficient architecture that has been found
neighborhood and eliminates duplicate messages for the linear highway applications, the size of the
when the same message is received in multiple broadcast group is approximately equal to the size
broadcast groups. of a neighborhood, each broadcast group overlaps
There are many ways to architect the under- the adjacent broadcast groups by half the size of
lying broadcast groups. At one extreme, a single the neighborhood, and each vehicle belongs to at
broadcast group may cover the entire highway: most two underlying broadcast groups, so that
Every vehicle is in the same broadcast group, each source message is transmitted in at most two
and is therefore in the same group as all of its broadcast groups. By definition, the efficiency of
neighbors. With this architecture, each source using a single broadcast group for a highway will
message is transmitted in a single broadcast group. approach zero, the efficiency of using one group
However, every message transmitted by every per vehicle is approximately 1/(k+1), where k is
vehicle on the highway must be received at every the average number of neighbors, and the most
other vehicle, even though most messages are not efficient architecture has an efficiency of ½.
from neighbors and will be discarded by RNP.

Figure 7. Overlapping broadcast groups

153
The Role of Communications in Cyber-Physical Vehicle Applications

In a practical system the overlap should be Self-Organizing Groups


larger than minimum overlap so that a moving
vehicle can join the underlying broadcast group of The underlying broadcast groups can be defined
other vehicles before entering their neighborhood. to be stationary, be fixed at regular intervals on
In this way, all of the vehicles in a neighborhood highways, or move with the average speed of
can communicate safely, even as vehicles change vehicles in each broadcast group. The overlap is
neighborhoods and broadcast groups. The addi- larger if the broadcast group is fixed. For instance,
tional overlap must be large enough that the time if it takes 10 seconds for the MRBP protocol to
it takes a vehicle to cross the additional overlap add a new vehicle to a stationary broadcast group
is greater than the time it takes the underlying and the vehicles move at 50 mph, the size of the
broadcast protocol to add the vehicle to the additional overlap must exceed 730 feet. However,
broadcast group. Thus, its size is a function of if the broadcast group moves at 50 mph, and all of
the vehicle speed and the underlying broadcast the vehicles travel between 45 and 55 mph, then
protocol. In the case of MRBP, the time it takes the overlap is only 73 feet. Since the time to add
to add a node equals the time it takes the token a vehicle to an MRBP group is proportional to the
to cycle through all of the nodes in the group plus number of vehicles in the group, moving groups
several multiples of the maximum time allowed that require less overlap, and therefore cover fewer
to request and retransmit lost messages. vehicles, require less time to add new ones.

Table 1. Protocol comparison


Characteristics WTRP MRBP RNP (implemented with MRBP)
Target receivers all vehicles in the token ring all vehicles in the broadcast all vehicles in the neighborhood
group
Medium access scheme collision-free message transmis- CSMA for source message CSMA for source message
sion transmission and scheduled transmission and scheduled
token for acknowledgement token for acknowledgement
transmission transmission
Reliability highly probable broadcast by guarantee of message delivery guarantee of message delivery
using repetitions to all vehicles in the broadcast to all vehicles in the neighbor-
group (commit process) hood (commit process from
MRBP and overlapping groups)
Time until the target receivers (N+1)·M·∆T 3·N·∆T (excludes commit 3·N·∆T (excludes commit
have successfully received a agreement policy) agreement policy)
source message
Overhead (typical control mes- token (excludes acknowledge- token including votes and adds vehicle and group infor-
sages) ment process) message acknowledgements; mation to MRBP token; some
retransmission requests additional messages for adjust-
ing group size
Suitable vehicular applications communication within small, communication within small, communication with frequently
infrequently changing groups frequently changing groups of changing nearby vehicles on
of vehicles on uncongested vehicles on congested roadways congested roadways and in high
roadways and in low message and in high message loss message loss environments.
loss environments. Also well environments. Also suited for Example applications are dis-
suited for transmitting periodic transmitting infrequently occur- tributed anti-lock braking and
updates. ring emergency messages. lane change negotiation

154
The Role of Communications in Cyber-Physical Vehicle Applications

Moving the underlying groups at the average Controlling Individual Traffic Lights
speed of the vehicles in the group requires a self-
organizing protocol, as described in (Maxemchuk At present, sensors are used at intersections to de-
et al., 2007). In this protocol, when a vehicle tect the presence of waiting cars so that the traffic
passes the token it also passes its location. If the lights do not change unnecessarily. Communica-
vehicle is at the edge of the group, the edge moves tions can improve on local sensors by having the
with the vehicle (to the extent possible) while automobiles, or distant sensors, notify the traffic
maintaining the target overlap between adjacent signals before vehicles arrive at the intersection.
groups. When a group exceeds a maximum size, A traffic signal may change in anticipation of
it is split into two smaller groups with the proper approaching vehicles or may delay a change in
overlap between them. When non-adjacent groups the signal to allow vehicles that are approaching
overlap, vehicles are covered by more than two to proceed without stopping.
broadcast groups and two or more groups may Consider a lightly used roadway in which all
be combined into a single group. of the cars travel at 30 mph, accelerate uniformly
A comparison of the characteristics of WTRP, from 0 to 30 mph or decelerate uniformly from 30
MRBP, and RNP implemented with MRBP is to 0 mph in 5 seconds, and arrive at the intersec-
shown in Table 1. tion according to a Poisson process. On a lightly
used roadway, there is little interaction between
successive automobiles on the same roadway.
INTERACTION OF AUTOMOBILE Define the intersection to extend from the point
WITH TRAFFIC SIGNALS where a car must start decelerating to stop at
the traffic light, to the point where it reaches 30
Communications between automobiles and traffic mph after stopping at the traffic signal. A car that
signals can (1) reduce the time spent waiting at stops at the light spends 10 seconds plus the time
intersections, thereby reducing fuel consump- waiting at the light to traverse the intersection. A
tion, (2) decrease the probability of collisions by car that does not stop traverses the intersection
informing cars when vehicles on a cross street in 5 seconds.
will share an intersection and (3) give precedence Consider an intersection where the major
to emergency vehicles entering an intersection. roadway has four times as much traffic as the
The technology may progress from the use of minor roadway, and the traffic light has a fixed
sensors to control a single traffic light and timers timing. The timer allows traffic on the major road
to maintain the flow of traffic on an avenue, to to proceed four times as long as on the minor
the use of communications and sensing to first road. If the light on the minor road is green or
provide better control of individual lights and amber for 10 seconds, then the light on the major
then to coordinate nearby lights. Eventually com- road will be green or amber for 40 seconds. The
munications and control will be extended to the light is amber for 5 seconds to allow vehicles that
automobiles approaching an intersection. Vehicles enter the intersection to stop before the light on
will be organized into platoons and their arrival the intersecting road turns green. To simplify the
at intersections will be scheduled to minimize calculation, assume that cars that approach the
waiting times. In this section we will describe the intersection while the light is red do not slow down
use of communications to control individual lights if the light will turn green before they arrive at
and to coordinate nearby traffic signals. the traffic signal. On the major road (4/5)ths of the
cars take 5 seconds to get through the intersec-
tion, because they do not stop, while (1/5) th of the

155
The Role of Communications in Cyber-Physical Vehicle Applications

cars take an average of 15 seconds: 10 seconds becomes heavier, cars arrive at the intersection
to come to a stop and accelerate, and an average in groups and cars stopped at the light must wait
of 5 seconds waiting at a red light. On the minor for the cars in front of them to leave. The opera-
roadway, (1/5)th of the cars don’t stop and take tion of the signals must consider the interaction
5 seconds to get through the intersection, while between the cars on the same roadway. The objec-
(4/5)ths of the cars take 30 seconds, 10 seconds to tive is control the right-of-way so as to minimize
stop and an average of 20 seconds waiting. Since the waiting time for cars entering from all four
(4/5)ths of the cars are on the major road and (1/5)th directions. This scheduling problem is called the
are on the minor road, the average time to traverse 4-way stop problem (O’Gorman, 2002).
the intersection is 10.6 seconds. In addition to controlling the right-of-way,
Now consider a very lightly loaded road, with we can control the arrival times of cars at an
the same traffic ratio, where the traffic light on intersection. Cars are formed into platoons that
the major road is green unless a sensor detects pass through the intersection. The platoon leaders
a car waiting on the minor road. When a car communicate with one another to agree on when,
on the minor road arrives, it stops, waits for 5 and in what order, they will use an intersection
seconds while the traffic light on the major road (Li & Wang, 2006). The scheduling objective
turns from amber to red, and then accelerates. can change from minimizing the time in the
At very low traffic levels, most of the cars on intersection to never stopping at an intersection.
the major road arrive when the signal is green In addition, when multiple vehicles are entering
and take 5 seconds to traverse the intersection, an intersection and are at risk of collision, com-
while most of the cars on the minor road arrive munications can be used to force the cars to brake
when the signal is red and take 15 seconds to get to prevent the collision, or at least to reduce the
through the intersection. The average time in severity of an accident by forcing the collision to
the intersection is 7 seconds. There is almost a occur at a lower speed.
65% reduction in the time spent slowing down,
accelerating and stopped at the intersection. As
the traffic levels increase, cars on the major road Coordination of Traffic Lights
arrive at red signals and cars on the minor road
arrive when the signal is not red. Controlling individual traffic signals is beneficial
In a system that uses communications, the in low traffic conditions or in rural areas with
traffic on the minor roadway will notify the a small number of traffic signals. In congested
traffic light when the vehicle is 5 seconds away: cities, changing the schedule of a traffic signal at
The light on the major road will turn amber, and an intersection also affects the traffic at nearby
the light on the minor road will turn green as intersections. The operation of signals must be
the vehicle arrives at the intersection. On a very coordinated. At present, signals are scheduled to
lightly used road, all of the vehicles will travel allow traffic in the dominant traffic direction to
through the intersection in 5 seconds, and the time flow unimpeded. For instance, on Riverside drive
spent decelerating, stopping and accelerating is in the Manhattan borough of New York City, the
completely eliminated. signals are coordinated so that traffic traveling
downtown at 30 mph during the morning rush
The 4-Way Stop Problem hour never stops for a red light, and traffic travel-
ing uptown during the evening rush hour has a
On a lightly used road, cars arrive at and leave similar advantage.
the intersection independently, but as the traffic

156
The Role of Communications in Cyber-Physical Vehicle Applications

This strategy works well sometimes. Unfor- In general, in any congested, developed area,
tunately, it is not always possible to maintain 30 the operation of a traffic signal will affect nearby
mph: Buses pick up and discharge passengers and signals. The group of signals that affect one an-
cars enter and leave parking spots, which reduces other can cover the entire city. It is not reasonable
the average speed. When there are travel disrup- to coordinate all of the traffic signals in a city
tions, the sequenced traffic lights may not provide based on the instantaneous traffic. Instead, we
any advantage. Communications can be used to must develop distributed processing techniques
determine the actual vehicle arrival times at traffic that control a signal based on the traffic in the
signals, rather than using expected travel speeds to area and communications with nearby signals.
estimate the arrival times, and adjust the schedule The control of traffic signals is similar to the
of the lights to accommodate the traffic. control of vehicles in the neighborcast protocol.
In addition, there are busy cross streets that Each signal should cooperate with signals within
prevent this simple scheduling strategy from a certain distance. As the distance increases, the
working properly. For instance, on Riverside need for cooperation decreases. However, the
Drive there are frequent traffic jams at 165th Street signals that a signal cooperates with will have
during the evening rush hour. This street is par- their own neighbors with whom they cooperate.
ticularly busy because a hospital is located at the Since the neighborhoods of adjacent traffic sig-
intersection and it is also a major merge for traffic nals overlap, the effects of a change in a traffic
destined for the George Washington Bridge and light can propagate over an area that is much
Yankee Stadium. A well attended evening game larger than its own neighborhood. Recent work
at the stadium causes a several mile long traffic on coordinating traffic signals uses the signals to
jam around this intersection. The schedule of the organize cars into platoons and uses the arrival of
traffic light at the intersection can be improved platoons to communicate between adjacent lights
by the sensing and communications techniques (Gershenson, 2005).
that have been described because the traffic jam
does not spread equally in all directions. By
detecting the traffic, the timing of the signal can COOPEATIVE ROUTE PLANNING
be adjusted to drain the traffic experiencing the
longest delays. Global positioning systems (GPS) with mapping
However, independently controlling this light software are currently used to plan routes in au-
is not adequate. The traffic from this intersection tomobiles. Most of these systems perform all of
affects all nearby intersections. In addition to im- the calculations locally and do not require com-
proving the flow of traffic at this intersection, we munications. A number of services are becoming
should use communications to improve the flow available that use publicly available reports on road
of traffic at adjacent intersections. For instance, construction and accidents to avoid roadways that
when traffic cannot proceed on 165th Street, traffic are likely to become congested. These services
on the nearby streets that cross 165th Street should require communications between the mapping
be given precedence as long as the vehicles are software in the automobile and a repository that
not turning into the congested street. This would maintains and distributes information collected
allow some traffic to leave the area and reduce the from the public sources.
congestion. By using the traffic signals to control Communications can be used to develop data
turns, we can create an orderly queue of vehicles on congestion by having automobiles report their
that wraps around several blocks before entering speed on the roadways that they traverse. Most
the congested intersection. GPS units calculate speed as well as location. The

157
The Role of Communications in Cyber-Physical Vehicle Applications

data can be used by mapping services to calculate 1992, p. 433). There are centralized procedures
routes that follow the shortest distance, take the that quickly converge to optimal solutions and
least time, or use a metric that is a combination distributed procedures based on the first deriva-
of these and other factors to calculate the best tives of the delay. The distributed calculations
route. can scale to arbitrarily large networks and can
The types of calculations that mapping ser- be used for our system of roadways. Proportional
vices perform will depend on the success of the routing can be implemented by assigning prob-
service. Initially, when a small number of drivers abilities to the alternate paths, then using a random
use the service, the routes can be determined us- procedure to select one of the paths according to
ing conventional shortest path algorithms, with the probabilities.
each link on the path weighted with the selected The routing problem on highways is more
metric. There are many shortest path algorithms complicated than the routing problem in com-
and the calculations can be performed locally if munications networks. In a communications
the mapping service distributes the metrics for network all of the traffic uses the same data and
the nearby roadways. obeys the routing decisions. In the automotive
As the services become more successful, the application not all of the automobiles may have
routing software will have to take into account access to the data, and we can expect competition
the change in traffic that is caused by distribut- between several mapping services that use differ-
ing congestion information. For instance, as- ent path selection algorithms. Mapping services
sume that all of the automobiles have access to can recommend routes to the drivers, but cannot
the same mapping service, there are two equal force a driver to follow the recommendation. If
distance highways between points A and B, and the software recommends that a driver follow a
the service reports more congestion and longer route that will save a few minutes but the driver
delays on one of the highways. If all of the auto- is more comfortable driving the other route, the
mobiles change their route and take the highway driver may elect to follow the longer route. Finally,
with less reported congestion, that highway will the delay as a function of the link utilization in
become more congested. At the next report, all networks is approximated by a simple mathemati-
of the traffic will be encouraged to move back to cal form. In most instances, the delay is calculated
the first highway, and the highway system will using Kleinrock’s independence approximation
become poorly used, with all of the traffic first (Kleinrock, 1964). The first derivative of the delay
on one highway and then on the other. with respect to the utilization in networks can be
This type of instability occurred in the ARPA- calculated. The relationship between traffic and
net when reported delays were used to select paths delay on a roadway is more complicated.
using a distributed version of the Bellman-Ford In any case, the same proportional routing
algorithm. An example of this problem is presented procedures that can be used in networks can
in (Bertsekas & Gallager, 1992, p. 374). One way be used on highways. The mapping service can
to prevent this type of instability is by sending a recommend that a fraction of its customers follow
portion of the traffic on each of the paths and only alternate routes and modify the proportions by
moving a small fraction of the traffic from one small amounts to determine if the change improves
path to the other during a time interval, rather than the operation of the roadways. If increasing the
moving all of the traffic. The procedure is formal- fraction of the traffic that is directed to a road-
ized for general networks in the optimal routing way improves the operation, another increase is
protocol described in (Bertsekas & Gallager, suggested. Otherwise, the fraction is decreased.

158
The Role of Communications in Cyber-Physical Vehicle Applications

CONCLUSON Gehring, O., & Fritz, H. (1997). Practical results


of a longitudinal control concept for truck pla-
The price of computing and communications has tooning with vehicle to vehicle communication.
decreased to the point where several computers IEEE Conference on Intelligent Transportation
and wireless devices are present in many consumer Systems (pp. 117-122).
products. Sensor technology, although not as
Gershenson, C. (2005). Self-Organizing Traffic
advanced, is starting to appear in more products.
Lights. Complex Systems, 16(1), 29-53.
Increasingly these technologies will be used to
control physical devices in new ways, in what are Halle, S., Laumonier, J., & Chaib-Draa, B. (2004).
being called cyber-physical systems. Nowhere A decentralized approach to collaborative driving
are cyber-physical systems more important than coordination. Proceedings of the 7th International
in our transportation networks. These applica- IEEE Conference on Intelligent Transportation
tions will address the grand challenges to reduce Systems, Washington, DC (pp. 453-458).
highway fatalities, decrease energy consumption,
Heddebaut, M., Rioult, J., Ghys, J. P., Gransart,
and extend the lifetime and usefulness of the
Ch., & Ambellouis, S. (2005). Broadband vehicle-
transportation infrastructure.
to-vehicle communication using an extended
In this chapter we have shown how these
autonomous cruise control sensor. Measurement
objectives are being addressed for automobiles.
Science and Technology, 16, 1363-1373.
The techniques are equally useful to increase the
safety and capacity of airports, and to increase Horowitz, R., & Varaiya, P. (2000). Control design
the capacity and reduce the commute times for of an automated highway system, Proceedings of
buses and trains. the IEEE, 88(7), 913-925.
ISO TC 204 Working Group 16. (2007). CALM
Continuous Communications for Vehicles. Re-
REFERENCES
trieved June 8, 2008 from: http://www.calm.hu
Bertsekas, D., & Gallager, R. (1992). Data net- IEEE. DSRC Home. Retrieved June 8, 2008 from:
works. Englewood Cliffs, NJ: Prentice Hall. http://grouper.ieee.org/groups/scc32/dsrc/index.
html
C2C-CC. Retrieved June 8, 2008, from: http://
www.car-to-car.org IEEE. (2006). IEEE Trial-Use Standard for
Wireless Access in Vehicular Environments
CarTALK 2000. Communication Architecture.
(WAVE) - Multi-channel Operation. IEEE Std
Retrieved June 8, 2008, from: http://www.car-
1609.4-2006.
talk2000.net
Kleinrock, L. (1964). Communication nets: Sto-
Chang, J.-M., & Maxemchuk, N. F. (1984). Reli-
chastic message flow and delay. New York, New
able Broadcast Protocols. ACM Transactions on
York: McGraw-Hill.
Computer Systems, 2, 251-273.
Lee, D., Attias, R., Puri, A., Sengupta, R., Tripakis,
ERTICO-ITS Europe. PReVENT Project. Re-
S., & Varaiya, P. (2001). A wireless token ring
trieved June 8, 2008, from: http://www.prevent-
protocol for intelligent transportation systems.
ip.org
Proceedings of IEEE Intelligent Transportation
BMBF. Network on Wheels. Retrieved June 8, Systems Conference (pp. 1152-1157).
2008, from: http://www.network-on-wheels.de

159
The Role of Communications in Cyber-Physical Vehicle Applications

Lee, E. A. (2008). Cyber-Physical Systems: Design Seiler, P., Pant, A., & Hedrick, K. (2004). Distur-
Challenges. 11th IEEE International Symposium on bance propagation in vehicle strings. IEEE Trans-
Object Oriented Real-Time Distributed Comput- actions on Automatic Control, 49, 1835–1842.
ing (pp. 363–369).
Sichitiu, M. L., & Kihl, M. (2008). Inter-Vehicle
Li, F., & Wang, Y. (2007). Routing in vehicular ad Communication Systems: A Survey. IEEE Com-
hoc networks: A survey. IEEE Vehicular Technol- munications Surveys & Tutorials, 10(2), 88-105.
ogy Magazine, 2(2), 12-22.
Song, B., & and Hedrick, J. K. (2004). Design
Li, L., & Wang, F.-Y. (2006). Cooperative Driv- and experimental implementation of longitudinal
ing at Blind Crossings Using Intervehicle Com- control for automated transit buses. Proceedings
munication. IEEE Transactions on Vehicular of the American Control Conference (pp. 2751-
Technology, 55, 1712-1724. 2756).
Liu, Y., & Ozguner, U. (2003). Effect of inter- Swaroop, D. (1995). String stability of intercon-
vehicle communication on rear-end collision nected systems: An application to platooning
avoidance. Intelligent Vehicles Symposium (pp. in automated highway systems. Unpublished
168-173). doctoral dissertation, University of California,
Berkeley, CA.
Maxemchuk, N. F., & Shur, D. (2001). An Internet
multicast system for the stock market. ACM Trans- Tokuda, K., Akiyama, M., & Fujii, H. (2000).
actions on Computer Systems, 19, 384-412. DOLPHIN for inter-vehicle communications sys-
tem. Proceedings of the IEEE Intelligent Vehicles
Maxemchuk, N. F., Tientrakool, P., & Willke, T. L.
Symposium (pp. 504-509).
(2007). Reliable Neighborcast. IEEE Transactions
on Vehicular Technology, 56, 3278-3288. U.S. DOT. Intelligent Vehicle Initiative. Retrieved
July 4, 2008, from http://www.its.dot.gov/ivi/ivi.
NITRD. National Workshop on High-Confidence
htm
Automotive Cyber-Physical Systems (2008). Re-
trieved September 12, 2008, from http://varma. Vahidi, A., & Eskandarian, A. (2003). Research
ece.cmu.edu/Auto-CPS/ advances in intelligent collision avoidance and
adaptive cruise control. IEEE Transactions on In-
National Science Foundation (2006). NSF Work-
telligent Transportation Systems, 4(3), 143-153.
shop on Cyber-Physical Systems. Retrieved
September 12, 2008, from http://varma.ece.cmu. VSCC. VSC Project Overview. Retrieved June
edu/cps/ 8, 2008, from http://www-nrd.nhtsa.dot.gov/pdf/
nrd-12/CAMP3/pages/VSCC.htm
O’Gorman, E. (2002). Using group communica-
tion to support inter-vehicle coordination. Un- Willke, T. L., & Maxemchuk, N. F. (2005). Co-
published master’s thesis, University of Dublin, ordinated interaction using reliable broadcast in
Ireland. mobile wireless networks. Proceedings of the 4th
International IFIP-TC6 Networking Conference,
Reichardt, D., Miglietta, M., Moretti, L., Morsink,
NETWORKING 2005, Waterloo, Canada (pp.
P., & Schulz, W. (2002). CarTALK 2000: Safe and
1168-1179).
comfortable driving based upon inter-vehicle-
communication. Proceedings of the IEEE Intel- Willke, T. L., Tientrakool, P., & Maxemchuk, N. F.
ligent Vehicles Symposium (pp. 545-550). (2008). A Survey of Inter-Vehicle Communication

160
The Role of Communications in Cyber-Physical Vehicle Applications

Protocols and Their Applications. IEEE Commu- Zhang, Y., Kosmatopoulos, E. B., Ioannou, P. A., &
nications Surveys and Tutorials. To appear. Chen, C. C. (1999). Autonomous intelligent cruise
control using front and back information for tight
Wolf, W. (2007). The Good News and the Bad
vehicle following maneuvers. IEEE Transactions
News. Computer, 40(11), 104-105.
on Vehicular Technology, 48, 319-328.

161
162

Chapter IX
Integrating TrafILc Flow
Features to Characterize the
Interference in Vehicular
Ad Hoc Networks
Lili Du
Purdue University, USA

Satish Ukkusuri
Rensselaer Polytechnic Institute, USA

Shivkumar Kalyanaraman
Rensselaer Polytechnic Institute, USA

ABSTtract

Vehicular Ad Hoc Networks (VANETs) are composed of vehicles equipped with advanced wireless commu-
nication devices. As a paradigm of decentralized advanced traveler information systems (ATIS), VANETs
have obtained interests of researchers in both communication and transportation fields. The research
in this chapter investigates several fundamental issues, such as the connectivity, the reachability, the
interference, and the capacity, with respect to information propagation in VANETs. The authors’ work is
distinguished with previous efforts, since they incorporate the characteristics of traffic into these issues in
the communication layer of VANETs; this mainly addresses the issue of the interference. Previous efforts
to solve this problem only consider static network topologies. However, high node mobility and dynamic
traffic features make the interference problem in VANETs quite different. To investigate this problem,
this chapter first demonstrates the interference features in VANETs incorporating realistic traffic flow
features based on a validated simulation model. Then, analytical expressions are developed to evalu-
ate the interference under different traffic flow conditions. These analytical expressions are validated
within the simulation framework. The results show that the analytical expressions perform very well to
capture the interference in VANETs. The results from this work can facilitate the development of better
algorithms for maximizing throughput in the VANETs.

Copyright © 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Integrating Traf.c Flow Features to Characterize the Interference in V ehicular Ad Hoc Networks

Introduction advantages: (i) they are infrastructure-light in


that they do not rely on roadside sensors and traf-
With increased urbanization, there are increasing fic management centers. Instead, they exchange
concerns about congestion and severity of surface and collect traffic information by inter-vehicular
transportation incidents. It is no longer possible to communication; (ii) the decentralized system is
address the issue of congestion management by robust in emergency and disaster related situations
adding new transportation infrastructure due to because it is self-organized and independent of
the significant costs involved and the impacts on fixed-infrastructures. (iii) Information exchange
land use. Transportation agencies in the United in the decentralized system can be used for other
States and in other parts of the world are explor- applications and file sharing such as 511.
ing innovative technology oriented methodolo- Our study investigates vehicular ad hoc
gies which can alleviate congestion and safety networks, in which vehicles serve as data col-
problems. Recent years, Intelligent Transportation lectors and anonymously transmit traffic and
Systems (ITS) incorporated advanced informa- road condition information from every major
tion technologies have been claimed to perform road within the transportation network. Such
efficiently. Among such systems, ATIS is consid- information will provide transportation agen-
ered to be a promising technology for improving cies with the information needed to implement
traffic conditions by helping travelers use existing active strategies to relieve traffic congestion and
transportation facilities efficiently, and interpret improve safety. Several fundamental problems
the real-time traffic information correctly (Dia such as the connectivity, the reachability, the
& Purchase, 1999; Jin & Recker, 2006; Lo & capacity, and the interference in VANETs are
Szeto, 2004; Mouskos et al., 1996; Srinivasan & explored in the related study before. These is-
Mahmassani, 2003; Wang, 2007). sues demonstrate the information propagation in
Some systems are already in place, such as VANETs from different views. Connectivity and
Copilot in the U.S. and TomTom in Europe. All reachability address the information propagation
of these systems rely on a centralized system, opportunities between any node pairs in VANETs
such as the Traffic Management Center (TMC) at any time snapshot and in a short time interval
to gather traffic information from probe ve- respectively. The capacity defined in this study
hicles or roadside sensors, generate route choice demonstrates the information dissemination
messages and disseminate route suggestions to capability in VANETs, which is limited by the
drivers. However, the structure and mechanisms interference between concurrent transmissions.
of these existing centralized approaches suffer Here, we briefly introduce the first three topics and
from significant disadvantages, such as heavy then emphasize on the interference in VANETs,
infrastructure requirements, large computational which is the main contribution of the proposed
needs, and high initial investment cost and so on. work in this chapter.
Hence, the current centralized ATIS is not fully The rest of this chapter is organized as fol-
satisfactory. lows: section 2 introduces VANETs. Section 3
At the same time, the rapid advances in wire- presents our research scope. Section 4 reviews
less communication technology make the tasks the previous work about the interference in wire-
of collecting, interpreting, and disseminating less network. Section 5 provides the background
information among vehicles feasible. ATIS and assumptions for the study of the interference
based on the inter-vehicular communication is here. Section 6 describes our methodology and
referred as to decentralized ATIS. Compared main results. Section 7 summarizes the results
with the current centralized ATIS, it has several of this study.

163
Integrating Traffic Flow Features to Characterize the Interference in Vehicular Ad Hoc Networks

VEHhicular AD HOC NETtwork quently, information dissemination becomes


even difficult in VANETs as many informa-
Vehicular Ad Hoc Networks (VANETs), which tion routing paths become disconnected
are composed of vehicles equipped with advanced before they are utilized. Therefore, building
wireless communication instruments, such as a stable connected VANET is a difficult but
Global Position Systems (GPS) receivers and Per- critical task.
sonal Digital Assistant (PDA) based cell phones, is 2. The varying traffic flow characteristics in
a promising paradigm of the decentralized ATIS. the transportation network could possibly
This infrastructure-light and decentralized system lead each vehicle to experiencing different
is expected to provide tremendous benefits for VANETs in a single trip. Hence, an adaptive
alleviating traffic congestion, improving traffic and distributed topology control strategy
safety, and further enhancing many other aspects should be developed for individual vehicles
of our life. so that the inter-vehicle communications of
Nowadays, worldwide academia, industry, and VANETs perform well.
governments are investing significant amounts of 3. The poor quality of data associated with
time and resources on studying, deploying, and link/edge latencies and possibility of varia-
testing the performance of VANETs. Several tion between the data obtained from different
academic activities for VANETs were initiated vehicles make developing a traffic routing
such as ACM International Workshop on Ve- algorithm even harder. This online traffic
hicular Ad Hoc Networks with MOBICOM and routing algorithm is necessary to build an
Vehicle-to-Vehicle Communications Workshop advanced framework for the decentralized
(V2VCOM) with MobiQuitous. Many on-going ATIS (Gao & Chabini, 2006; Jaillet & Wag-
national/international projects included consor- ner, 2006; Shavitt & Sha, 2005; Waller &
tia such as the Vehicle Safety Consortium (US), Ziliaskopoulos, 2002).
Car-2-Car Communication Consortium (Europe) 4. The possibility of malicious messages and
and Advanced Safety Vehicle Program (Japan); the accessibility of any traveler’s origin
standardization efforts like the Dedicated Short destination information can pose a serious
Range Communications (DSRC) and IEEE security and privacy problem. New ap-
802.11p (WAVE), and field trials like the large- proaches for communication security have
scale Vehicle Infrastructure Integration Program to be designed to guarantee the reliable and
(VII) in the US. secure services in VANETs.
These initial works found that VANETs pos- 5. All nodes sharing the same medium access
sess unique characteristics as compared to general channel leads to congestion in very dense
mobile ad hoc networks (MANETs). For instance, networks. Moreover, unstable link connec-
high vehicular speed and unexpected driver ac- tions only provide limited bandwidth. Both
celeration or deceleration makes the topology of these unfavorable conditions in VANETs
of VANETs change much faster. The number result in low information transmission ef-
of vehicles in VANETs cannot be scheduled or ficiency. Consequently, advanced medium
controlled in real-time because drivers will enter access protocols are needed to improve the
or exit at any time. These features further bring level of information transmission efficiency
forth challenges in VANETs as below: in VANETs.
6. Neither the simulation tools in transporta-
1. The high vehicular mobility makes VANETs tion, such as PARAMICS, CORSIM and
subject to frequent fragmentation. Conse- VISSIM, nor the simulation platforms in

164
Integrating Traffic Flow Features to Characterize the Interference in Vehicular Ad Hoc Networks

communication networking such as ns2, cifically, we considered a VANET as a nominal


OPNET and Qualnet can test and evalu- system with uncertain disturbance. The nominal
ate network protocols in VANETs. A new system was represented by a free traffic flow, in
simulation platform, which integrates which space headway was assumed to obey an
communication techniques and realistic exponential distribution. The unexpected driver
transportation simulation, is desirable. behavior such as acceleration, deceleration, and
lane changing were modeled as uncertain dis-
These application potential and research turbance, which was further characterized by a
challenges aroused many interests of scholars robustness factor in our analytical model. Our
in both the transportation area and the wireless regression results showed that the robustness
communication area. Previous simulation works factor is a function of the traffic flow parameters
(Artimy et al., 2005a, 2004, 2005b, 2006) present including average traffic speed, average space
the following points: VANETs are usually mod- headway and its variance. The simulation vali-
eled as one-dimensional networks; a dynamic dation demonstrated that our analytical expres-
transmission range is expected to provide better sion can evaluate the geometric connectivity of
connectivity; the connectivity of a VANET on VANETs more accurately than previous efforts in
the road with one lane is more sensitive to vehicle literature. The readers are referred to the complete
velocity than a VANET on the multi-lane road- analytical characterization of connectivity which
way and so on. Note that the interaction between is discussed in (Ukkusuri & Du, 2008).
vehicular mobility and information propagation Due to the observation that the relative
is usually studied by simulation methods, but movement between individual vehicles can cre-
analytical work is less present (Jin & Recker, 2006; ate opportunistic connections between vehicles
Wang, 2007); most of the models for VANETs during a short time interval, connectivity, which
are built on stable traffic flow, but the unstable demonstrates the opportunities that the infor-
feature of traffic flow is not considered. Encour- mation can go through the whole network at a
aged by the above points, we conduct analytical given time instant, is sometimes not sufficient
study on the information propagation in VANETs to fully understand the information propagation
incorporating the traffic flow features, which will performance. We dealt with this problem in the
be discussed next. second part of our research. We first defined an
“information flow network” and then introduced
“reachability” to characterize information propa-
Our STUDY SCOPE gation performance in a short time period. An
information flow network is a time expanded
In an effort to address some of the limitations graph composed of asynchronous communication
of the previous work, this research investigates links (based on geometric distance) and nodes
several properties of VANETs in consideration of (vehicles). The reachability is the probability
the traffic flow characteristics. In particular, we that every two vehicles in the information flow
address the geometric connectivity, reachability, network are connected in a given time interval.
capacity, and interference respectively. To capture various driver behaviors, we separated
The first topic regards the analytical expres- the drivers into three clusters which were aggres-
sions to characterize the connectivity of VANETs sive, defensive, and slow drivers respectively.
on freeway segments, which represents the prob- Correspondingly, we approximated the relative
ability that any two vehicles are connected at a movement between individual vehicles by the
given time instant (Ni & Chandler, 1994). Spe- relative movement between different driver clus-

165
Integrating Traffic Flow Features to Characterize the Interference in Vehicular Ad Hoc Networks

ters. Based on this approximation, we developed man, 2002). Along the line of the above model,
analytical formula to evaluate the reachability this study defines the interference as the number
during a short time period. Our results showed that of reachable vehicles around each individual ve-
the relative movement between vehicles enables hicle (two vehicles are in the transmission range
individual vehicles to communicate with more to each other).
neighbors and therefore improves the opportu- To understand interference clearly, we need to
nity that the traffic information is transmitted introduce two terms, hidden and exposed nodes,
forward. Simulations were setup to validate our which are shown in Figure 1. Hidden nodes are
assumptions and analytical results. The reader two nodes that share the set of nodes within the
is suggested to reach our completed work by Du transmission ranges of both, but they are not in the
and Ukkusuri (2008b). transmission range of one another. For example,
While the first two topics focused on informa- in Figure 1 left, node A and node C are not in
tion propagation opportunities, the third topic the transmission range of each other, but node B
considered the information dissemination among is in the intersection of node A transmission and
vehicles. Specifically, we studied the maximum node C transmission. Therefore, node A and node
concurrent transmissions in VANETs, which is C cannot transmit information to node B at the
referred to as the capacity of VANETs in this same time, otherwise collisions will happen on
study. We first explored the capacity of VANETs B. Exposed nodes are two nodes which are within
using an integer programming (IP) formulation. the transmission range of one another, thus, they
Since the IP model is computationally hard to cannot transmit information at the same time, and
solve, we further developed a statistical model otherwise information collisions happen to both of
to characterize the capacity of VANETs in terms them. As the example shown in Figure 1 right, if
of some significant parameters in the traffic flow node A and node C transmit information to node
networks as well as the communication networks. B and node D respectively at the same time, then
To improve the prediction accuracy of the statis- the collisions will not happen on B and D, but node
tical model, the central composite experiment A and node C are within the transmission range
design method was applied. The interested reader of each other, they will interfere with each other.
can also reach the completed work by Du and Hence, only one of node A and node C can be ac-
Ukkusuri (2008a). tive at a given time (Blum et al., 2004). Based on
The next problem that we are interested in is the description above, it is clear that interference
the interference in VANETs considering the rela- is closely related to the node distribution and the
tive movement between individual vehicles. This transmission range.
problem will be discussed deeply in the following Two direct reasons encourage us to investigate
paragraphs in this chapter. the interference of VANETs. First, interference is
closely related to the trade-off between through-
put11 and connectivity. (They together influence
IntERrfinANETS the performance of VANETs significantly). On the
one hand, in order to reduce the interference (i.e.
Informally speaking, interference can be modeled increase throughput), the small transmission range
to a limited extent under the following assumption: is preferred. On the other hand, there is surely a
a transmission from node u to node v is success- limit of decreasing the transmission range, while
ful only if there is no other node w which has a maintaining network connectivity. This trade-
connection to node v and transmitting to node v off makes the interference very important to the
simultaneously (Burkhart et al., 2004; Rajara- topology controlling in VANETs.

166
Integrating Traffic Flow Features to Characterize the Interference in Vehicular Ad Hoc Networks

Figure 1. Hidden nodes and exposed nodes

A B C D A C B

Second, vehicular mobility, unexpected driver by constructing topologies satisfying the features
behavior, and variable traffic flow condition make of sparseness or low node degree, such as (Hou
the interference that individual vehicle experi- & Li, 2006; Li et al., 2003; Ramanathan & Ro-
ences in VANETs quite different with nodes sales-Hain, 2000). However, recent work revealed
in static networks. Specifically, the topology of that the previous implicit notion of interference
VANETs changes quite rapidly from time to time, is not sufficient to reduce the actual interference
hence the number of neighbors which interferes (Burkhart et al., 2004). The following review the
the transmission of one vehicle is not constant. efforts on the explicit interference reduction in
Moreover, the topology change depends on the wireless network.
macroscopic traffic condition, such as congestion Heide et al. (2002) introduced an explicit
level, as well as the microscopic traffic behavior, definition of interference based on the current
such as driver’s acceleration, deceleration and network traffic. The weakness of this definition
lane changing behavior. Hence, measuring the is the requirement of a priori network traffic in-
dynamic interference of VANETs in view of formation, which is usually not available. With
vehicular mobility as well as traffic flow features the assumption that each node can adapt their
is a challenging and important work. To the best transmission power, they explore the trade-off
of our knowledge, very little work has been done between the congestion, power consumption, and
on this topic. dilation in a wireless network.
In view of above points, the following study Burkhart et al. (2004) proposed another explicit
is dedicated to addressing the interference of definition: the interference of a link (u, v) is the
VANETs on a freeway segment from the trans- number of nodes covered by two disks centered
portation point of views. Our main contributions at node u and node v with transmission range r.
are in two folds: (1) based on simulation data, we Formally, the definition is shown below:
explore the interference that individual vehicles
experience under different traffic flow condi- con(uv) = {w | w is covered by D(u | uv) or D(v | uv)}
tions; (2) incorporating both microscopic and (1)
macroscopic traffic features, we develop closed
form stochastic expressions to characterize the where, cov(uv) denotes the set of nodes that can
interference in VANETs. be affected by node u and node v when they
communicate to each other with exactly the
minimum power needed to reach one another.
RELlatd WORK |uv| is the distance between node u and node v.
D(u; r) denotes the disk centered at node u with
Extensive work has been done for the interference transmission range r. This interference definition
in static wireless network. Most of the previous is also called interference based on the coverage
work addressed the interference issues implicitly model. Using this definition, the authors disprove

167
Integrating Traffic Flow Features to Characterize the Interference in Vehicular Ad Hoc Networks

the widely advocated assumption that sparse quently. This leads to the results and algorithms
topologies imply low interference. Furthermore, of previous works possibly not applicable any
they propose a centralized algorithm to compute more, but there are few efforts on investigating
an interference-minimal connectivity preserving the dynamic interference in VANETs. Therefore,
topology. Nejad and Li (2005) adopt this definition exploring new interference models for VANETs
and further develop another algorithm to construct is necessary.
the network topology so that the maximum inter-
ference is minimized.
Inspired by Fussen et al. (2004), Rickenbach et Sy Mod
al. (2005) questioned the definition in (Burkhart et
al., 2004) from two aspects: (i) It is sender-centric, We begin our study with some assumptions. We
i.e., the interference is considered to be an issue at consider VANETs with n vehicles equipped with
senders instead of at receivers. Hence, this defini- wireless communication instruments moving on
tion hardly reflects the real-world interference. a freeway segment. Vehicles are homogenously
(ii) It is of more technical nature and not robust distributed with traffic density λ. The commu-
enough to withstand the addition or removal of an nication radio is with the directional antenna,
individual node in the network. In contrast to this and referring the traffic density, its transmission
sender-centric interference definition, the authors range r can be adjusted adaptively so that certain
present a receiver-centric interference model: the number neighbors can be covered (Blough et al.,
interference of a node u demonstrates the number 2006; Xue & Kumar, 2004). Let ni denote the
of nodes covering node u with their disks induced vehicles i, then the distance between vehicles
by their transmission range reachable to node u. ni and nj is denoted by xij. When xij < r, we call
Furthermore, an algorithm with approximation node j is the neighbor of node i, vice versa. For
ratio 4√∆(∆ is the maximum node degree) to find the consecutive vehicles, xij is also referred to as
the optimal connectivity-preserving topology is space headway.
proposed. Medium access control. Due to the time vary-
Since the coverage area of omni-directional ing network topology and the lack of centralized
antenna does not have a clear-cut boundary, control in VANETs, we assume medium access
Moscibroda and Wattenhofer (2005) studies the control applies the spirit of a random access
average interference problem, where the nodes are scheme. Once the distance between two vehicles
grouped into active nodes (A) and passive nodes is less than their transmission range, the com-
(P). The interference of a node p ≠  P is the number munication between them is triggered, but only
of nodes a ≠  A whose transmission ranges cover successes if there is no interference. Additionally,
p. Correspondingly, the average interference of a we suppose a node may not send and receive mes-
topology is the sum over all interference divided by sages at the same time but can transmit to more
the number of passive nodes. A greedy algorithm than one other node at the same time. Specifi-
is proposed to compute an O(logn) approxima- cally, a transmission is successful if both of the
tion to the connectivity-preserving interference following conditions are satisfied: (1) xij ≤ ri, (2)
problem, where n is the number of nodes in the any other node nk, such that xik ≤ rk or xjk ≤ rk is
network. not transmitting (Jain et al., 2003).
So far, the studies for the interference reduc- Preliminary interference calculation. We as-
tion in wireless networks are based on the static sume that each vehicle has the same numbers of
network topology. Due to the high vehicular reachable-neighbors2 (Blough et al., 2006; Xue &
mobility, the topology of VANETs changes fre- Kumar, 2004), and Kc = λr. With these assump-

168
Integrating Traffic Flow Features to Characterize the Interference in Vehicular Ad Hoc Networks

tions, we immediately find that under the static the models. Finally, we validate our stochastic
situation, the expected interference is equal to models of interference in VANETs using a well
3Kc. From Figure 2, we observe that there are Kc - calibrated simulation model.
neighbors in the forward and backward direction
which will interfere the transmission of vehicle A. A Smulation-Based Study
Additionally, vehicle A itself will averagely cover
Kc, therefore, there is one more Kc -neighbors will To investigate how the influence of relative
interfere the transmission of vehicle A. However, movement and the traffic flow congestion level
due to the high mobility of vehicles in VANETs, impact the interference of VANETs, we first per-
the network topology will change very quickly. form a simulation-based study based on an open
Consequently, there is a high probability that source dynamic traffic simulation framework-
other vehicles will move in or out the transmis- MITSIMLab (Ben-Akiva et al., 2002), which
sion range of the vehicles. This results in more is developed by MIT Intelligent Transportation
than Kc neighbors to interfere the transmission System Program. We setup a one-way freeway
of an individual vehicle in a short time interval. segment, which is about 10000 ft long and has
This critical characteristic of the interference in three lanes. Vehicles have different speed at
VANETs has not been considered in the past ef- each time instant but their speed limit is 65mph.
forts. The goal of this study is to further explore Each simulation is conducted from 8:00am to
the interference of one successful transmission 8:25am under constant traffic demand. The first
in a short time period, T, incorporating traffic 15 minutes is redeemed as warm-up time and
flow conditions and relative movements between data is collected from 8:15am to 8:25am. In order
vehicles. to obtain traffic flow under different congestion
level, simulations with demand rates changing
from 50vph (vehicle per hour) (very light traffic
Expct INTERFERENCEnc condition) to 8000vph (heavy congestion traffic
undr DYNAMIC Traffic condition) are conducted. Simulation outputs
Condition provide us individual vehicle position, speed and
traffic density, λ per second.
We now present our framework for modeling the In order to demonstrate the effect of relative ve-
interference in VANETs. We first do a simulation- hicular movement on the interference of VANETs,
based study, and then we present our method to we study the interference of individual vehicles
measure the interference incorporating traffic flow in a short time interval, say 30s. In addition, our
characteristics. Both the macroscopic vehicle dis- preliminary interference analysis shows that the
tribution and the microscopic relative movement number of reachable neighbors for individual
between vehicles are considered in developing vehicles is the key influencing variable to measure

Figure 2. The example of Kc = 3

Kc=3

9 7 5 3 A 1 2 4 6 8 10 12
  
  
Kc Kc Kc

169
Integrating Traffic Flow Features to Characterize the Interference in Vehicular Ad Hoc Networks

the interference (equal to 3Kc). Therefore, the fol- dividual vehicles in a short time interval
lowing work focuses on exploring the reachable 2. 500vph < Traffic Demand < 3700vph: Fig-
neighbors of individual vehicles. ure 4 shows traffic is still in the free flow
We name the average number of reachable regime; Figure 3 shows TVD is close to 4,
neighbors for an individual vehicle under a static which is slightly higher than SVD. This
VANET topology as Static Vehicular Degree phenomenon shows the relative movement
(SVD), but the average number of reachable between vehicles increases the opportunity
neighbors for an individual vehicle in a time that vehicles are in the transmission range
interval is referred to as Time-period Vehicular of each other. Since the traffic is still light,
Degree (TVD). Without loss of generality, assum- SVD is only a little higher than the SVD.
ing SVD=3, and vehicular transmission range, 3. 4000vph < Traffic Demand < 6200vph:
r = SVD/λ at each time interval, we check SVD Figure 4 shows traffic is light congested;
during the interval T (=30s)3. Figure 3 shows TVD reaches to the highest
The results reported in Figure 3 show that value. This results from higher traffic density
when we increase the traffic demand step by and relative vehicular movement together.
step, vehicles become more and more crowded. 4. Traffic Demand > 6600vph: Figure 4 shows
Consequently, the reachable neighbors of indi- traffic becomes very congested; Figure 3
vidual vehicles in 30s increase. This means that shows that TVD degrades. The reason is that
the probability of the interference will impact the when the traffic becomes heavy congestion,
transmission of individual vehicles. Moreover, the relative movement between vehicles is
carefully studying the curves in Figure 3, we limited. Consequently, fewer vehicles will
obtain more insights: show up around an individual vehicle close
enough to interfere its transmission.
1. Traffic Demand <500vph: Figure 4 shows
traffic is sparse; Figure 3 shows SVD is The above observations clearly demonstrate the
smaller than SVD. This is reasonable since interaction between the interference of VANETs
there are not enough neighbors around in- and the features of traffic flow, such as the mi-

Figure 3. The number of reachable neighbors of individual vehicles in a time interval T = 30s under
different traffic flow

8
7
6
Simulation Degree

5
4 DVD
3 SVD
2
1
0
0

0
50

00

00

00

00

00

00

00
10

90
17

19

37

46

52

60

68

80

De ma nd

170
Integrating Traffic Flow Features to Characterize the Interference in Vehicular Ad Hoc Networks

croscopic vehicular relative movement and the δij = δL + εij, εij ~ N(0,σ2), (2)
macroscopic traffic flow state. In the next section,
we further explore the relationship between the where, σ2 is equal to the variance of the rela-
interference of VANETs and traffic flow features tive speed between any two vehicles which
by analytical methods. are approaching. Note that εij may not be a
normal distribution. The accurate distribu-
Investigating Time-Period tion of εij can be obtained from microscopic
Vehicular Degree Analytically traffic data in a transportation system. This
work is beyond the scope of this study.
Our analytical work first investigates the TVD 5. We numbered the vehicles from entry to exit
of VANETs incorporating the microscopic traf- at time zero, and then drew all communica-
fic flow features, such as the relative movement tion link happened in the time interval on
between vehicles. The VANETs of interests are the topology of VANETs at time zero. This
further modeled by the method used in (Du & time expanded graph is referred to as Infor-
Ukkusuri, 2008b). For completeness, we briefly in- mation Flow Networks (IFN). Based on the
troduce the main idea by the following points: IFN, we develop the analytical expressions
to measure the reachable neighbors for in-
1. The VANETs are composed of the vehicles dividual vehicles in a given time interval.
running on the road during the time inter-
val, T. Vehicular velocity is assumed to be To facilitate the further discussion we need
constant during the short time interval. the following notations:
2. Based on the velocity of vehicles, we group
the drivers into three categories: aggressive • xtij: The distance between vehicle i and
drivers (A), defensive drivers (D), and slow vehicle j at time t.
drivers (S). α, β, and γ are used to denote their • p t ij: The probability of the event that
proportions on the road, α + β + γ = 1. xtij < r, 0 < t ≤ T.
3. Define pij as the probability that vehicle i • sij: A random variable which denotes the
and j, j > i are approaching to each other, event that xij ≤ r at time zero.
and p(δij ≥ 0) = pij , then, we find there are
three possible cases for node i and j, ( j > i) 1, x ij0 ≤ r|i < j;
sij = 
approaching each other. The corresponding 0, o.w.
probabilities are described below:
• Vehicle i is an aggressive driver and ve-
hicle j is a defensive driver, pij = αβ; • wij: A random variable which denotes the
• Vehicle i is a defensive driver and event that xij ≤ r after a time period t, if xij > r
vehicle j is a slow driver, pij = βγ; at time zero. when
• Vehicle i is an aggresive driver and
vehicle j is a slow driver, pij = αγ. 1, x ijt ≤ r,and x ij0 ≥ r|i < j,0 < t ≤ T;
w ij = 
4. The relative velocity of any node i and j ap- 0, o.w.

proaching each other, δij is assumed to be
represented by the relative speed between • zij: A random variable which denotes the
adjacent lanes with a white noise: event that a node has chance to exchange
message with its forward nodes during the
whole time interval (See Box 1).

171
Integrating Traffic Flow Features to Characterize the Interference in Vehicular Ad Hoc Networks

Box 1.

1, node i exchanges messages with node j in the time interval [0, T ], i < j;
zij = 
0, o.w.

Here, the SVD of individual vehicles represents ≈  n 


 n   n ÷
the average number of vehicles in the transmis- E …ƒ z ij ⁄ = p(i ≠ A) ∆E …ƒ sij ⁄ + E …ƒ w ij ⁄ ◊
∆ ◊
sion rang of an individual vehicle during the time  j=i +1    j=i +1   j=i +1  
period. Therefore, it is composed of two compo- ≈  n   n ÷
nents. The first one is the neighbors which exist + p(i ≠ D) ∆E …ƒ sij ⁄ + E …ƒ w ij ⁄ ◊
∆ j=i +1 ◊
at time zero and the other part is the neighbors     j=i +1  
which occur in (0, T]. Correspondingly, the fol- ≈  n   n ÷
+ p(i ≠ S) ∆E …ƒ sij ⁄ + E …ƒ w ij ⁄ ◊
lowing equations hold: ∆ j=i +1 ◊
    j=i +1  
(4)
z ij = sij + w ij
n n n
Note that sij is only related to the traffic den-
ƒ
j= i +1
z ij = ƒ
j= i +1
sij + ƒ
j= i +1
w ij
sity and the vehicle’s transmission range, and
 
n  n   n  the mobility of vehicle has no effect on it. Thus,
E …ƒ zij ⁄ = E …ƒ sij ⁄ + E …ƒ w ij ⁄ (3) we have
 j=i +1   j=i +1   j=i +1 
 n 
Since vehicle i can be aggressive (A), defen- E …ƒ sij ⁄ = λr (5)
sive (D), or slow driver(S), we can express the  j=i +1 
expected number of neighbors of an individual However, the value of wij is closely related to
vehicle as below: the relative movement between vehicles, so the
value of E(wij)can be derived as below:

Figure 4. Traffic state

Tr avel Ti me
1200
1150
1100
Average travel time

1050
1000
950
900
850
10000
50
400
750
1100
1450
1800
2150
2500
2850
3200
3550
3900
5000
6400

Demand

172
Integrating Traffic Flow Features to Characterize the Interference in Vehicular Ad Hoc Networks

E ƒ

n
j = i +1
wij  = ƒ

n
j = i +1
E ( wi j ) = ƒ
n
j = i +1
(p
∂1 + (1 − pijT ) ∂0 )n= ƒ j =i +1 p (r < xij0 < T δij− )
T
ij
n

E …ƒ zij ⁄ = 3λr
 j =i +1 
n
E ( wi j ) = ƒ
n
( p T
∂1 + (1 − p T
) ∂0 ) = ƒ j =i +1
n
p ( r < x 0
< T δ − 
)
j = i +1 j = i +1 ij

ij ij ij
(6)
n
{
+3 αλ ƒ j =i +1 p (r < xij0 < r + 2T (δ L + εij ))

+β(α + γ )ƒ
n
}
p (r < xij0 < r + T (δ L + εij )) .
When vehicle i is driven by an aggressive,
defensive or slow driver in time interval T, the j = i +1
(11)
probability that it is approaching the forward
vehicles is different. Only considering the relative Equation (11) measures the interference of
movement between different driver groups and VANETs with a view to the relative movement
referring to result of δij and pij at the beginning ofbetween vehicles. Additionally, it shows that no
this section, E(wij) is calculated below: matter under which kinds of traffic flow condi-
tions, the relative movement between adjacent
• Node i is an aggressive driver. lanes will increase the interference of VANETs.
In the next step, we calculate the distribution of


0
( ) (
0 vehicles on the road under different traffic flow
E ( wij ) = βp r < xij < r + T (δ L + εij ) + γp r < xij < r + 2T (δ L + εij ) ;
conditions. This will allow us to obtain better
)
( 0
) ( 0
p r < xij < r + T (δ L + εij ) + γp r < xij < r + 2T (δ L + εij ) ; (7) )
insights into the expected interference in view
of macroscopic traffic flow states.
• Node i is a defensive driver.
E xpected Interference Under
E ( wij ) = γp (r < xij0 < r + 2T (δ L + εij )) Different Traffic Conditions
(8)
Our analytical expression in (11) has shown
• Node i is a slow driver. that the interference of VANETs depends on
space headway distributions under different
E(wij) = 0. (9) traffic congestion levels. We therefore specify
the macroscopic traffic feature (space headway
Inserting Equation (5), (7), (8), and (9) to distribution) and integrate it into the study of the
Equation (4), the expected neighbors of node i is VANET interference.
equal to: ( see Box 2). The immediate difficulty is that even though
Therefore, during a short time period, the inter- traffic time headway has been well studied un-
ference of a successful transmission (EI (T)) is der different traffic congestion levels, there are
no well-developed stochastic models for space
headway distribution. Usually, corresponding to

Box 2.

E ƒ z  = αγ ƒ
n n
p (r < xij0 < r + 2T (δ L + εij ))
 
j = i +1 ij j = i +1
(10)
+ β(α + γ )ƒ
n
j = i +1
p (r < xij0 < r + T (δ L + εij )) + λr.

173
Integrating Traffic Flow Features to Characterize the Interference in Vehicular Ad Hoc Networks

free flow, light congestion and heavy congestion SchÄonhof et al., 2006). Similarly, we use ex-
traffic condition, time headway is classified into ponential distribution to present the distribution
three states: random headway state, intermedi- of the space headway under free flow. The cor-
ate headway state, and constant headway state. responding interference in a short time period
Exponential distribution, Erlang distribution, can be written as shown in Box 3.
and Normal distribution have been proved to be Under the intermediate headway state, the
reasonable stochastic models for the three head- distribution of the time headway is approximated
way states (May, 1990). To apply these well-built by Erlang distribution (May, 1990). Consequently,
time headway models to space headway, we make the space headway distribution can be modeled
more assumptions: (i) the space head- ways be- as Erlang:
tween consecutive vehicles are independent and
b −1 x
identically distributed; (ii) the vehicular speed is 1 x −
f ( x) = e θ (14)
supposed to be uniform (Tsugawa & Kato, 2003) θΓ(b) … ⁄
θ
with mean. Thus, the relationship between space
where,
headway (Hs) and time headway (Ht) is
• x is the space headway.
Hs = Htδ, (12)
H s2
• b is the shape parameter. b =
where δ, is the average speed of vehicles. If δ is a σ 2s
constant, the space headway will have the same 1
• is the scale parameter.
distribution with the time headway. With above θ
assumptions we explore the interference of one
The mean of the space headway is bθ = Hs,
successful transmission under different space
H σ2
headway states. so the estimated scale parameter θ = s = s
Under random headway state (free flow con- 1 b Hs
and traffic density λ = , Furthermore, xij,
dition), vehicles can be thought of as traveling bθ
independently. Except for the minimum headway j = i + 1, …, n obeys Erlang distribution, so let
specification, the time headway is considered as p(xij ≤ r) = Er(r,|j = i|b,) The interference can be
written as shown in Box 4.
random headway. The random time headway is
Under the constant headway state, the distribu-
usually described by exponential distribution
tion of the time headway is described by normal
in analytical models (May, 1990; Saito, 2006;
distribution (May, 1990). We additionally use

Box 3.

 n 
E …ƒ zij ⁄ = 3K c
 j =i +1 
 ≈ ≈ 1÷ 1 ÷÷
 
( ) λ

+3 αγ ƒ j =i +1 ∆E ∆ r + 2T (δ L + εij ) ,| j − i |, ◊ − E ∆r ,| j − i |, ◊◊
n

 λ 
(13)

≈ ≈ 1÷ 1 ÷÷
+β (α + γ )ƒ
n
j = i +1 ( ) ≈
∆E ∆ r + T (δ L + εij ) ,| j − i |, ◊ − E ∆r ,| j − i |, ◊◊ .
  λ  λ 

174
Integrating Traffic Flow Features to Characterize the Interference in Vehicular Ad Hoc Networks

Box 4.

≈ n ÷
E ∆ ƒ zij ◊ = 3K c
 j =i +1 

{
+ αγ ƒ (Er ((r + 2T (δ + ε ),| j − i | b, θ))− Er (r,| j − i | b, θ)) (15)
n
j = i +1 L ij

+β(α + γ )ƒ (Er ((r + T (δ + ε )),| j − i | b, θ)− Er (r,| j − i | b, θ))}.


n
j = i +1 L ij

Box 5.

 n 
E …ƒ zij ⁄ = 3K c
 j =i +1 

{
+3 αγ ƒ
n
(N ((r + 2T (δ + ε )),| j − i | H ,| j − i | σ )− N (r,| j − i | H ,| j − i | σ )) (16)
j = i +1 L ij s
2
s s
2
s

+β(α + γ )ƒ (N ((r + T (δ + ε )),| j − i | H ,| j − i | σ )− N (r,| j − i | H ,| j − i | σ ))}.


n
j = i +1 L ij s
2
s s
2
s

normal distribution to describe the space headway Validating the Expected Degree
with mean Hs and variance σs2. Moreover, for xij, Under Different Traffic Flow
j > i + 1, the distance between nonadjacent ve- Conditions
hicles also obeys normal distribution with mean
|j – i|Hs and variance |j – i|2σ2s. Let p(xij < r) = We have examined the expected vehicular degree
N(r, |j – i|Hs , |j – i|2σ2s ), then the interference of under different traffic flow states by simulations,
a successful transmission can be measured by the where Kc = 3, T = 30s, and demand changes from
equation shown in Box 5. 50vph to 8000vph. Based on our VANET models
In Equations (13), (16), and (15), the composi- and well-build time headway distribution mod-
tion of drivers and relative movement between els, we further developed the stochastic models
adjacent lanes roughly present the relative move- to approximate the interference under different
ment between vehicles. Different space headway traffic headway states. Now, based on the simula-
distribution characterizes the dynamic traffic flow tion models we validate our stochastic models in
state. Hence, we conclude Equations (13), (16), and Equation (13), Equation (15), and Equation (16).
(15) together analytically measure the interference We consider the drivers as aggressive drivers, if
of VANETs on account of both macroscopic and their velocity is fifteen percent higher than the
microscopic traffic flow features. To validate average velocity of all vehicles. Correspondingly,
our analytical results, we perform the following a driver is a slow driver if his/her velocity is 15%
experiments based on simulation. lower than the average speed. All other drivers are

175
Integrating Traffic Flow Features to Characterize the Interference in Vehicular Ad Hoc Networks

Figure 5. The relative difference between adegree and sdegree under free flow (abs(.): absolute value.
adegree: the expected vehicular degree calculated by our analytical expression; sdgree: the expected
vehicular degree measured by simulation)
0. 25

0. 2
sDegree)/sDegree
abs(aDegree-

0. 15
T=30
0. 1

0. 05

0
100 200 800 900 1000
De ma nd

Figure 6. The relative difference between adegree and sdegree under light congestion flow
0. 16
0. 14
0. 12
sDegree)/sDegree
abs(aDegree-

0. 1
0. 08 T=30
0. 06
0. 04
0. 02
0
00

00

00

00

00

00

00

00

00

00
42

44

46

48

50

52

54

56

58

60

demand

Figure 7. The relative difference between adegree and sdegree under heavy congestion flow

0. 16
0. 14
0. 12
sDegree)/sDegree
abs(aDegree-

0. 1
0. 08 T=30
0. 06
0. 04
0. 02
0
6200 6400 6600 6800 7000 7500 8000
demand

176
Integrating Traffic Flow Features to Characterize the Interference in Vehicular Ad Hoc Networks

treated as defensive drivers. The relative move- models to explore the interference under different
ment between individual vehicles is substituted by traffic flow conditions. The results demonstrate:
the average relative speed between driver groups. When each vehicle adjusts its transmission range
The validation results are reported in Figure 5, to reach the same number of neighbors on aver-
Figure 6, and Figure 7 respectively. When time age according to the traffic density, the interfer-
headway is under random state (free flow), the dif- ence of individual transmission in a short time
ference between simulation counts and analytical interval, such as T = 30s, is much higher than the
calculation on TVD is around 15%. While time corresponding interference under static vehicle
headway under intermediate state (light conges- distribution; Relative movement between vehicles
tion), or constant state (heavy congestion), the and traffic congestion level impact the interfer-
difference is about 10%. Clearly, our stochastic ence of VANETs significantly; Under free and
models perform reasonably good to evaluate the light congestion traffic condition, the interference
TVD in the time intervals. increases with demand. However, under heavy
Our simulation experiments also demonstrate congestion, the interference will decrease the
that the accuracy of our models can be improved traffic as demand increases.
with cost of adding more numerical computations Furthermore, under our assumptions, we
to cluster drivers more accurately. For example, in develop the stochastic models to estimate the
our simulations, if we consider drivers as aggres- expected interference of VANETs. Our closed
sive drivers by its velocity 13% higher than the form expressions approximate the interference in
average value, the performance of the analytical VANETs taking accounting of both the macro-
interference evaluation might become better. scopic and the microscopic traffic flow characteris-
tics. The validation results based on the simulation
data demonstrate that our analytical expressions
ConcluSION perform well under various traffic conditions. In
summary, our research efforts try to investigate
There are two interweaved layers within VANETs, the information propagation in VANETs bridg-
namely, the communication layer and the trans- ing the features in both the communication layer
portation application layer. Most of the previous and the transportation layer and therefore help to
research about the communication layer treated build more efficient systems.
VANETs as a special class of Mobile Ad Hoc
Networks (MANETs) and ignored the traffic flow
features. To overcome this deficiency, our research REFERENCES
incorporated both macroscopic and microscopic
traffic flow characteristics into the study of several Artimy, M., Robertson, W., & Phillips, W. (2005b).
fundamental issues in the communication layer Assignment of dynamic transmission range based
of VANETs such as the connectivity, the reach- on estimation of vehicle density. In VANET’05,
ability, and the capacity of VANETs. Cologne, Germany, Sep., 2.
Along the line of our completed work, the study
Artimy, M., Robertson, W., & Phillips, W. (2006).
presented here investigates another fundamental
Minimum transmission range in Vehicular Ad
issue in VANETs: interference. Due to the high
Hoc Networks over uninterrupted highways. In
vehicular mobility and the dynamic traffic flow
The 9th International IEEE Conference on Intel-
features, the interference in VANETs presents
ligent Transportation Systems, Toronto, Canada,
distinguishing features. To characterize the inter-
Sep., 17-20.
ference in VANETs, we first set up the simulation

177
Integrating Traffic Flow Features to Characterize the Interference in Vehicular Ad Hoc Networks

Ben-Akiva, M., Davol, A., Toledo, T., Koutso- Gao, S., & Chabini, I. (2006). Optimal routing
poulos, H. N., Burghout, W., Andréasson, I., policy problems in stochastic time-dependent
Johansson, T., & Lundin, C. (2002). Calibration networks. Transportation Research Part B, 40.
and evaluation of mitsimlab in stockholm. In
Heide, F. M. A. D., Schindelhauer, C., Volbert,
Procedings of 81st Transportation Research Board
K., & Gruenewald, M. (2002). Energy, conges-
Meeting, Washington, DC, USA, Jan. 13-17.
tion and dilation in radio networks. Proceedings
Blough, D. M., Leoncini, M., Resta, G., & Santi, of the 14th Annual ACM Symposium on Parallel
P. (2006). The k-neighbors approach to interfer- Algorithms and Architectures (SPAA), Winnipeg,
ence bounded and symmetric topology control in Manitoba, Canada, Aug. 11-13.
ad hoc networks. IEEE Transactions on Mobile
Hou, T., & Li, V. (2006). Transmission range
Computing, 5(9), 1267-1282.
control in multihop packet radio network. IEEE
Blum, J., Eskandarian, A., & Hoffman, L. (2004). transactions on wireless communications, 5(1),
Challenges of intervehicle ad hoc networks. IEEE 38-44.
Transactions on Intelligent Transprotation Sys-
Jaillet, P., & Wagner, M. (2006). Online rout-
tems, 5(4), 347-351.
ing problems: Value of advanced information
Burkhart, M., Rickenbach, P. von, Wattenhofer, as improved competitive ratios. Transportation
R., & Zollinger, A. (2004). Does topology control Science, 40(2).
reduce interference. In MobiHoc’04, Roppongi,
Jain, K., Padhye, J., Padmanabhan, V., & Qiu, L.
Japan, May 24-26.
(2003). Impact of interference on multi-hop wire-
Dia, H., & Purchase, H. (1999). Modeling the less network performance. In MobiCom 2003, San
impacts of advanced traveler information systems Diego, California, USA, Sep. 14-19.
using intelligent agents. Road and Transport
Jin, W., & Recker, W. (2006). Instantaneous in-
Research, 8.
formation propagation in a traffic stream through
Du, L., & Ukkusuri, S. (2008a). Optimization inter-vehicle communication. Transportation
models to characterize the broadcast capacity Research Part B, 40(3), 230-250.
of vehicular ad hoc networks. Transportation
Li, N., Hou, C., & Sha, L. (2003). Design and
Resaerch Part C.
analysis of an mst-based topology control algo-
Du, L., & Ukkusuri, S. (2008b). The relative rithm. In Proc. of the 22nd Annual Joint Confer-
mobility of vehicles improves the performance ence of the IEEE Computer and Communications
of information flow in vehicle ad hoc networks. Societies (INFOCOM), San Franciso, CA, USA,
Networks and Spatial Economics. Mar. 30-Apr. 3.
Du, L., Ukkusuri, S., & Kalyanaraman, S. (2007). Lo, H., & Szeto, W. (2004). Modeling advanced
Geometric connectivity of vehicular ad hoc net- traveler information services: static versus dy-
works: Analytical characterization. In The Fourth namic paradigms. Transportation Research Part
ACM Workshop on Vehicular Ad Hoc Networks B: Methodological, 38(6), 495-515.
(VANET), Montreal, Canada, Sep. 10.
May, A. D. (1990). Traffic flow fundamentals.
Fussen, M., Wattenhofer, R., & Zollinger, A. Englewood Cliffs, NJ: Prentice-Hall, Inc., A
(2004). Sensor Networks: interference reduction Division of Simon and Schuster.
and possible application. Diploma Thesis, ETH
Zurich, Dept. of Computer Science.

178
Integrating Traffic Flow Features to Characterize the Interference in Vehicular Ad Hoc Networks

Moscibroda, T., & Wattenhofer, R. (2005). Srinivasan, K. K., & Mahmassani, H. S. (2003).
Minimizing interference in ad hoc and sensor Analyzing heterogeneity and unobserved struc-
networks. In DIALMPOMC’05, Cologne, Ger- tural effects in route-switching behavior under
many, Sep., 2. ATIS: a dynamic kernel logit formulation.
Transportation Research Part B: Methodologi-
Mouskos, K. C., Greenfeld, J., & Pignataro, L. J.
cal, 37(9), 793-814.
(1996). Toward a multi-modal advanced traveler
information system. NJIT Research, 4. Tsugawa, S., & Kato, S. (2003). Evaluation of
incident information transmission on highways
Nejad, K., & Li, X. (2005). Low- interference
over inter-vehicle communications. In Intelligent
topology control for wireless ad-hoc networks.
Vehicles Symposium, 2003. Proceedings. IEEE,
Ad Hoc Sensor Wireless Networks, 1, 41-64.
Columbus, Ohio, USA, Jun. 9-11.
Ni, J., & Chandler, S. (1994). Connectivity prop-
Ukkusuri, S., & Du, L. (2008). Geometric con-
erties of a random radio network. IEE Proc.
nectivity of vehicular ad hoc networks: Analytical
Commun., 141(4), 289-296.
characterization. Transportation Research Part
Rajaraman, R. (2002). Topology control and rout- C, 16(5), 615-634.
ing in ad hoc network: A survey. ACM SIGACT
Waller, S., & Ziliaskopoulos, A. (2002). On the
News, 33(2), 60-73.
online shortest path problem with limited arc cost
Ramanathan, R., & Rosales-Hain, R. (2000). dependencies. Networks, 40(4).
Topology control of multihop wireless networks
Wang, X. (2007). Modeling the process of infor-
using transmit power adjustment. In Proc. of
mation relay through inter-vehicle communica-
the 19th Annual Joint Conference of the IEEE
tion. Transportation Research Part B, 41(6),
Computer and Communications Societies (IN-
684-700.
FOCOM), Tel-Aviv, Israel, Mar. 26-30.
Xue, F., & Kumar, P. (2004). The number of
Rickenbach, P., Schmid, S., Wattenhofer, R.,
neighbors needed for connectivity of wireless
& Zollinger, A. (2005). A robust interference
network. Wireless Networks, 10, 169-181.
model for wireless ad hoc networks. In Proc. 5th
IEEE International Workshop on Algorithms for
Wireless, Mobile, Ad-Hoc and Sensor Networks
(WMAN), Denver, Colorado, USA, April 4-8. Endnot
Saito, H. (2006). Performance analysis of com- 1
Throughput of an ad hoc network is usually
bined vehicular communication. IEICE Transac-
defined as the maximum bits per second that
tions on Communications, E89B(5),. 1486-1494.
is achievable by all source-destination pairs
SchÄonhof, M., Kesting, A., Treiber, M., & of nodes.
Helbing, D. (2006). Coupled vehicle and infor- 2
The vehicles which are in the transmission
mation flows: Message transport on a dynamic range of an individual vehicle.
vehicle network. Physica A-Statistical Mechanics 3
To check TVD by simulation, the reader is
and ITS Applications, 363(1), 73-81. referred to the algorithm described in Du et
al. (2008b).
Shavitt, Y., & Sha, A. (2005). Optimal routing in
gossip networks. IEEE Transactions on Vehicular
Technology, 54(4).

179
180

Chapter X
Proactive Traffic Merging
Strategies for Sensor-Enabled
Cars
Ziyuan Wang
University of Melbourne, Australia

Lars Kulik
University of Melbourne, Australia

Kotagiri Ramamohanarao
University of Melbourne, Australia

ABSTtract

Congestion is a major challenge in today’s road traffic. The primary cause is bottlenecks such as ramps
leading onto highways, or lane blockage due to obstacles. In these situations, the road capacity reduces
because several traffic streams merge to fewer streams. Another important factor is the non-coordinated
driving behavior resulting from the lack of information or the intention to minimize the travel time of a
single car. This chapter surveys traffic control strategies for optimizing traffic flow on highways, with
a focus on more adaptive and flexible strategies facilitated by current advancements in sensor-enabled
cars and vehicular ad hoc networks (VANETs). The authors investigate proactive merging strategies
assuming that sensor-enabled cars can detect the distance to neighboring cars and communicate their
velocity and acceleration among each other. Proactive merging strategies can significantly improve
traffic flow by increasing it up to 100% and reduce the overall travel delay by 30%.

Copyright © 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Proactive Traffic Merging Strategies for Sensor-Enabled Cars

Introduction and examine merging strategies. Then we present


the criteria to evaluate merging strategies. Finally,
Road traffic congestion is a major challenge we outline future trends and challenges for traffic
nowadays. The integration of sensing, communi- control research and conclude the chapter.
cating and local computing within cars facilitates
new opportunities to optimize road capacity, and
thereby reducing traffic congestion. Currently, a Background
variety of automotive sensors are available to col-
lect data related to a vehicle and its surroundings. In this section, we first review current research
Communication techniques, such as Dedicated on traffic models. These models provide the
Short Range Communications (DSRC) support foundation to explore the effects of implementing
the information exchange between cars. Recent new traffic control strategies. We argue that the
research primarily focuses on: safety by reducing mobility models commonly used in the study of
traffic accidents based on, for example, collision communication ranges and information dissemi-
warnings (ElBatt et al., 2006); traffic flow con- nations in VANETs are not sufficient for investi-
trol to reduce traffic congestion and to increase gating traffic control strategies. Then, we review
road efficiency by adapting traffic lights and automotive sensors that can be implemented in
speed limits (Papageorgiou & Kotsialos, 2002); the sensor-enabled cars. Those sensors collect
and automation to reduce a driver’s burden, e.g., traffic information as the input for the traffic
using Adaptive Cruise Controls (ACC) (Kesting model applied in traffic control strategies. Finally,
et al., 2008). we highlight some basic vehicular traffic theory
One important cause of congestion is bottle- concepts, with a focus on the traffic congestion
necks at merging areas where a ramp leads onto on highways to provide a better understanding of
the highway. There is a considerable amount of traffic flow and design the flow control strategy.
research to address merging strategies, in particu-
lar approaches from queuing theory or statistics. Vehicular Traffic Models
This chapter explores the benefits of applying
simple traffic control rules at the merging sections Traffic models and simulations provide an under-
assuming all cars are sensor-enabled. standing of traffic phenomena to manage traffic
The goal of merging strategies is to mitigate in such a way that traffic flow is optimized and
traffic congestion by optimizing the utilization congestion is alleviated. From a computational
of roads, ensuring road safety. We believe that perspective, various tools and techniques such
a promising approach is achieved by sensor- as car-following theories and cellular automata
enabled cars using well-informed decisions and have been applied to traffic modeling.
cooperating driving. Traditional traffic control By far the most widely used mobility model is
approaches such as traffic signal timing, ramp the Random WayPoint model (RWP). This model
metering, and real-time information can benefit was first used by Johnson and Maltz (1996), and
from the sensor-enabled cars and Vehicular Ad it has become the de facto standard in mobile
hoc NETworks (VANETs). computing research, including VANETs.
The rest of the chapter is structured as fol- RWP has several limitations as a model for
lows: we first review foundations of strategies to VANETs. First, it describes the movement pattern
control traffic flow, factors that affect traffic flow, of independent nodes, however, the movement of
desirable and undesirable characteristics of traffic vehicles is not independent as vehicles interact
flow. Next we overview traffic control strategies with other vehicles in their vicinity. Second,

181
Proactive Traffic Merging Strategies for Sensor-Enabled Cars

RWP assumes that node movement occurs in an describe the collective characteristics of traffic,
open field, whereas the movement of vehicles is such as average speed and traffic density. Re-
constrained by the roads. Third, the node chooses searchers often build such models by adapting
a random velocity from the uniformly distributed physical models similar to the behavior of fluid
velocity range in RWP. In contrast, a vehicle’s and gases. Recognizing that unlike molecules,
velocity is constrained by many factors, such as cars move under the control of people, drivers’
the road conditions, traffic lights, the number behaviours have been taken into account. Macro-
and type of intersections, and the existence of scopic models are sufficient to predict the general
obstacles. Therefore, mobility models based on patterns of cumulative number of vehicles. In
real street maps have been proposed for VANETs. general, they are suitable to describe large-scale
In Saha and Johnson’s model (SJM) (Saha & traffic networks such as an entire traffic of a city.
Johnson, 2004), street map data is converted to However, they fail to represent the interactions
(x, y) coordinates. The road segments are repre- among vehicles. These models cannot describe
sented as the edges in an undirected graph and the variations in velocities, as velocities vary in
intersections are represented by the nodes in an overtaking situations or within platoons. Thus,
undirected graph. The STRAW approach (Choff- macroscopic models are not adequate to evaluate
nes & Bustamante, 2005) includes intersection the performance of local merging algorithms.
management, such as the coordination of traffic In contrast, microscopic models overcome
lights and stop signs. Saha and Johnson point out these limitations by describing the individual
that RWP is a good approximation of car move- behavior of vehicles. Microscopic approaches
ment in many cases. While it is often sufficient include car-following models (Bando et al., 1995)
for evaluating the communication performance and CA models (Chowdhury et al., 2000). We
of a VANET, it is not a good approximation to detail microscopic models from the longitudinal
evaluate a flow control strategy for a real road. and the lane-changing aspect in the following
Although Saha and Johnson (2004) applied real two sections.
street maps for simulating vehicle movement,
some assumptions restrict its application to flow Longitudinal Models
control strategies, which rely on realistic vehicular
traffic characteristics. In this regard, models with Longitudinal models describe the acceleration and
varying velocity are highly needed. As a result, deceleration of vehicles. In car-following models,
vehicular traffic models have attracted extensive the assumption is that the behavior of a driver
research. depends only on its predecessor. Several models
Traffic models can be classified according to have been developed such as the optimal velocity
two criteria. First, according to the use of space, model (Bando et al., 1995), the intelligent driver
time and state variables, traffic models can be model (Treiber et al., 2000), and the human driver
categorized as continuous or discrete. Earlier model (Treiber et al., 2006), to name a few.
theoretical approaches, in particular, fluid dy- In the Intelligent Driver Model (IDM), a vehicle
namic theory, kinetic theory, and car-following tends to approach the maximum permitted velocity
theories are based on continuous models. Cellu- and maintains at least the safety distance to the
lar Automata (CA) models are discrete. Second, front vehicle. The safety distance depends on the
depending to the level of detail of the simulation, following car’s velocity and velocity difference
there are macroscopic and microscopic models. to its front car. The acceleration and deceleration
Macroscopic models are based on equations to depend on its own velocity, safety distance and

182
Proactive Traffic Merging Strategies for Sensor-Enabled Cars

actual distance to the front car. It has the follow- capable of reproducing important properties of real
ing advantages (Treiber & Helbing, 2002): the traffic flow, like the density-flow relation and the
model is a realistic description of both the indi- spatio-temporal evolution of traffic jams.
vidual driving behavior and collective patterns of
the traffic flow, such as stop-and-go waves; and Lane-Changing Models
many aspects of traffic control strategies can be
simulated by representing different driving styles, Besides longitudinal models, realistic models of
which are easy to implement. lane changing behaviors are critical for investi-
Nevertheless, the computational cost of such gating traffic patterns at merging sections. Based
detailed models is very high and it is hardly pos- on car-following models, several lane-changing
sible to apply them to very large networks. Since models are proposed. Ahmed et al. (1996) identify
cellular automata are by design ideal for large- three types of lane changing operations, namely
scale computer simulations, they can be efficiently discretionary, mandatory and forced lane chang-
used to describe traffic flow. In the CA models ing. A discretionary lane change is desired when
(Chowdhury et al., 2000), the position, speed, ac- a driver wants to improve his driving condition by
celeration as well as time are treated as discrete changing a lane (for example, to gain speed). A
variables. In this approach, a lane is represented mandatory lane change occurs when a driver has
by one-dimensional cells. Each cell can be either to change a lane in order to maintain his path to
empty or occupied by at most one vehicle at a given the destination (for example, changing lane from
instant of time. At each discrete time step, the state a closed lane or changing a lane to take an exit).
of the system is updated following a well defined The execution of discretionary and mandatory
prescription. The computational efficiency of the lane changing is based on the critical gap ac-
discrete CA models is the main advantage of this ceptance behavior, i.e., drivers seek a minimum
approach over the car-following approach. Nagel acceptable gap, called critical gap. Traditional
and Schreckenberg (1992) introduce a very simple gap acceptance models fail to capture a driver’s
CA model that provides a microscopic description lane changing behavior in a congested network,
of the vehicular motion using a set of update rules. because there is no space for acceptable gaps.
The rules include 1) acceleration, 2) deceleration, In such situations, drivers force other drivers to
3) randomization, and 4) vehicle movement. create an acceptable gap. Merging operations in a
The first two rules describe an optimal driving heavily congested freeway is one of the examples
strategy; the driver accelerates if the vehicle has of such behavior.
not reached the maximum speed vmax and brakes Kesting et al. (2007) propose to minimize
to avoid accidents. Such a cellular automaton is the overall braking induced by a lane change
deterministic and the stationary state depends to derive lane-changing rules for discretionary
only on the initial conditions. However, drivers and mandatory lane changes for a wide class of
do not always exhibit this optimal behavior. They car-following models. Both the utility of a given
vary their driving behavior without any obvious lane and the risk associated with lane changes
reasons. Therefore, it is necessary to introduce are determined in terms of longitudinal ac-
the parameter “slowdown probability” p, which celerations calculated with microscopic traffic
is essential for a realistic description of traffic models. The minimum safety distance prevents
flow. It mimics the complex interactions between critical lane changes and collisions, the incentive
the vehicles and is also responsible for the spon- criterion takes into account the advantages and
taneous formation of jams. Although it is one of disadvantages of other drivers associated with
the simplest traffic flow models, it is nonetheless a lane change via the “politeness factor”. This

183
Proactive Traffic Merging Strategies for Sensor-Enabled Cars

Table 1. Traffic models overview


Movement
Unconstrained Road Map
Scale
Local CA (Nagel & Schrecken-
(Microscopic)  berg, 1992), IDM (Treiber
et al., 2000)
Global RWP (Johnson & Maltz, SJM (Saha & Johnson,
(Macroscopic) 1996) 2004), STRAW (Choffnes
& Bustamante, 2005)

parameter allows one to vary the motivation for nology. Among different types of sensors, such
lane changing from a purely selfish to a more as position, velocity, or acceleration sensors, we
cooperative driving behavior. identify what is the most critical type of sensor.
Based on the Nagel-Schreckenberg cellular We also investigate how different levels of sensors’
automata model, Pedersen and Ruhoff (2002) accuracy influence their applications.
describe a model to include ramps. The idea is to Automotive sensors have been developed
place “shadow cars” on a highway next to cars on since the early 1970s. Recent advances in Micro-
ramps, which enables drivers to take ramp cars Electro-Mechanical Systems (MEMS) technology
into account. and wireless communications have enabled the
The mobility model is a bridge between the development of low-cost, multifunctional sensor
communication and the traffic control algorithms. nodes that are small in size and with short-range
It should reflect vehicle movement as well as the wireless communication capabilities (Akyildiz et
impact of communication on the traffic flow. al., 2002). These tiny sensor nodes, which consist
Table 1 summarizes the discussed models. of sensing, data processing, and communicating
We categorize them into four classes. Other than components, can be installed to modern cars to
classifying as microscopic and macroscopic we facilitate transport applications. This new type of
further identify unconstrained and road map sensor-enabled cars is able to sense information
movement. All the models come from physical about its own position and local traffic conditions,
research belong to road map movement group. process the information, and communicate the in-
We distinguish the restrictions on movement in formation to other vehicles in its neighborhood.
order to keep accordance with the mobility models There are two kinds of automotive sensing:
applied in VANET research. out-vehicle environment sensing and vehicle-
state sensing, summarized in (Li et al., 2005).
Snsors Out-vehicle environment sensing collects in-
formation about the driving environment. For
Traffic dynamics measured by sensors are input example, this includes sensors for extracting lane
variables to the car-following models underly- boundaries, especially when not clearly marked
ing traffic control strategies. For example, IDM or in bad weather conditions; detecting nearby
requires the following input variables: velocity, vehicles and estimating their position, speed, and
distance to the front vehicle, and velocity differ- acceleration; and detecting the unexpected traffic
ence. We survey major automotive sensors and participants (such as pedestrians) and obstacles.
techniques. We have found that the assumed Vehicle-state sensing focuses on measuring a ve-
sensor-enabled cars are realistic for current tech- hicles movement and monitoring its actuators. For

184
Proactive Traffic Merging Strategies for Sensor-Enabled Cars

example, researchers have studied how to detect A number of localization techniques have been
a vehicle’s position, velocity, and acceleration; an proposed for computing the position of mobile
engine’s pressure and temperature; and a tire’s nodes. Most localization techniques can be ap-
pressure, temperature, and friction coefficients. plied easily to VANETs. GPS receivers have a
The accuracy of the information obtained by position error in the range of 1–10 m (Hightower
sensors impacts parameter settings in the traffic & Barriello, 2001). Unfortunately, GPS receivers
model. For example, if the position or distance are not the best solution in some cases since they
information is provided with an accuracy of 20 cannot work in the parking or in dense urban areas
m, the safety distance calculated by the merg- where there is no direct visibility to satellites. As
ing algorithm would be of little value. Besides a result, GPS information is likely to be combined
distance and velocity, there are several factors with other localization techniques such as dead
that impact the minimum safety distance, such reckoning, cellular localization, and image/video
as a tire’s pressure, temperature, and the friction localization, to cite a few.
coefficient for braking. Currently, most work on
traffic control neglect these factors and focus Velocity and Acceleration
on position and velocity. To envision a complete
model that integrates these factors will lead to Conventional methods measure the speed of a
significant improvement in road safety and ef- vehicle by wheel speed sensors. The drawbacks
ficiency of control strategies. of wheel speed sensors are inaccuracy and low
resolution. Radar speed measurement systems are
Position commonly used due to their reasonable cost and
acceptable accuracy. A GPS based velocity sensor
Most VANETs applications consider the avail- (Bevly, 2004) has been recently developed that
ability of real-time updated position information. can be used instead of radar sensors and wheel
They differ, however, on the position accuracy speed sensors.
required in order to be able to function properly. The acceleration and deceleration is measured
For instance, some applications can work with by accelerometers and gyroscopes. Currently, ac-
position information with errors in the range of celeration sensors are used in applications such
10–20 m, while other applications, especially as safety systems, vehicle stability systems and
critical safety applications, require more accurate electronic suspension. Recent trends of automo-
and reliable positioning systems with sub-meter tive acceleration sensors are to employ MEMS
precision. technology. Their advantages over traditional
In cooperative driving applications, vehicles sensors are low cost, robustness, self diagnostics,
in a VANET exchange messages among them to and multiplex network connectivity (Fleming,
drive and share the available space on the road 2001).
cooperatively. In these applications, the vehicles The IDM traffic model relies on the availabil-
can assume partial control over driving. In order ity of the following sensed information: velocity,
to deal with safety, position information reliability acceleration, forward distance and backward
and accuracy are crucial. Accurate positioning distance. To increase the reliability of sensed
ensures localization with a meter or sub-meter data, communication is used to check the sensed
precision in order to estimate accurately the data, thus each car also has a transceiver to com-
distances between vehicles, while a reliable lo- municate with cars in its vicinity. We use sensor
calization will ensure that updated information fusion (Nakamura, Loureiro, & Frery, 2007) to
will always be available. increase the accuracy of information. In Table 2,

185
Proactive Traffic Merging Strategies for Sensor-Enabled Cars

Table 2. Automotive sensors


Sensor Range Accuracy
Position Laser Range Finder (Bonanno et al., 2003) 50 m 5 cm
GPS (Hightower & Barriello, 2001) 24 satellites worldwide 1–10 m
Velocity Speckle Velocimeter (Bonanno et al., 2003)  0.1%
Velocimeter (Vlacic et al., 2001) 0.4–400 km/h 1%
Dickey-John radar (DICKEY-John, n.d.) 0.53–96.6 km/h 1–3%
Acceleration PASCO CI-6558 (CI-6558, n.d.) -5 to +5 g 0.01 g

we summarize three types of automotive sensors, erage separation between them. Because of this
and report their range and accuracy. variation of V with D, the flow Q = DV exhibits a
maximum at D = Dc. Then, an increased D results
Vehicular Traffic Theory into an actual decrease of the flow, and finally in
a completely congested phase where no car can
Road efficiency is measured by the traffic flow. move and the flow is zero.
The number of cars or velocity is not sufficient to Classical theories based on the fundamen-
describe efficiency separately. The density-flow tal diagram of traffic flow consider only two
relation forms the basis of the so-called funda- phases--free flow and congestion. In contrast,
mental diagram. The fundamental diagram is of Kerner (2004) proposes three-phase traffic theory
major importance for the design of road systems considering freely flowing cars, full-scale traffic
and traffic management systems. It can be used jam, and synchronized traffic flow. If a transition
to predict the capability of a road, or its behaviour from free flow to congested flow takes place it
when applying ramp metering or speed limits. The sometimes yields a sudden drop in speed but the
origin of the generic shape of the fundamental flow remains nearly constant. The new phase in
diagrams (see Figure 1) can be understood as the jammed region is called synchronized flow.
follows. When the density D is sufficiently small, However, its nature as well as its reasons are still
the average speed V is almost independent of D under discussion.
because the vehicles are too far apart to interact. Kesting et al. (2008) identify five traffic situa-
However, for larger values of D, V decreases more tions: free traffic, congested traffic, upstream jam
rapidly with increasing D because the forward front, downstream jam front, and bottleneck sec-
movement of the vehicles is strongly hindered tions. They associate those traffic situations with
by others on account of the reduction in the av- a specific set of IDM parameters. Therefore, their
ACC strategy adapts the driving characteristics
(that is, the parameters of the ACC controller) to
Figure 1. Fundamental diagram of traffic flow
the traffic conditions.
A better understanding of the cause of con-
gestion assists in developing strategies to reduce
congestion. A 2005 US study (Federal Highway
Administration, 2005) states that there are seven
major causes of congestion. They are bottlenecks
(40%), traffic incidents (25%), bad weather (15%),
work zones (10%), poor signal timing (5%), and
special events/other (5%). Chen et al. (2001) believe

186
Proactive Traffic Merging Strategies for Sensor-Enabled Cars

that congestion does not occur because demand whereas within platoons cars are decentralized.
exceeds capacity rather because of the inefficient Estrin et al. (1999) propose that in sensor net-
operation of highways. works localized algorithms, where sensors only
interact with other sensors in a restricted vicinity,
collectively achieve a desired global objective.
Flow Control Strat Localized algorithms have three advantages. First,
the communication scales well as the number of
In this section, we discuss different techniques vehicles grows. Second, the algorithms are robust
to improve traffic flow control, in particular, we to network partitions and node failures. Third, un-
focus on the context of freeways. The main aim like the centralized systems, localized algorithms
of the flow control is to improve the efficiency of provide much greater local details.
road usage. Optimization of freeways is based on a Lygeros et al. (1996) introduce a methodol-
homogenization of vehicle traffic (Helbing, 2001). ogy for designing hybrid controllers for large
Stop-and-go traffic, jams, and congested traffic scale, multiagent systems. The system is initially
are associated with reduced efficiency due to a designed fully decentralized where each vehicle
capacity drop, often triggered by perturbations has only access to local information obtained
in the traffic flow. For example, if a car pushes by sensors. If the level of performance is unsat-
into a small gap to change lane, the impact may isfactory, some centralization is introduced by
appear small locally but is globally significant as communication of information between vehicles.
the following cars may need to slow down sharply. Moreover, they suggest what the most important
This is known as “slinky-type effect” (Bose & pieces of information are. The effect of this more
Ioannou, 2003), which can lead to traffic conges- global knowledge is to reduce the disturbance
tions and car accidents. Therefore, perturbations generated by other vehicles. The optimum strat-
should be suppressed by control strategies such egy for each vehicle does not coincide with the
as variable speed limits, dynamic route guidance, global optimum. Ideally, to achieve the global
driver assistance systems, and ramp metering. optimum a centralized control scheme computes
the global optimum and commands the vehicles
Centralized and Decentralized accordingly. A centralized controller may be
Systems undesirable, however, as the design process will
probably be very complicated, it is likely to be
In theory, traffic control systems can be catego- computationally intensive, may be less reliable and
rized into centralized and decentralized systems. the information that needs to be exchanged may be
In practice, there are no pure centralized systems. too large for the available communication capabili-
The present research mainly adopts a hybrid sys- ties. In their opinion, a completely decentralized
tem architecture, i.e., a combination of a central- solution is too inefficient and a completely cen-
ized and decentralized approach (Varaiya, 1993; tralized solution is prohibitively complex and/or
Anda et al., 2005). Varaiya (1993) discusses pure expensive. Therefore, a compromise will feature
centralized and decentralized designs. A central- semi-autonomous vehicle operation. In (Lygeros
ized approach has a tremendous computation et al., 1998), a method is proposed to deal with
and communication cost. On the other hand, a multiple control requirements. To achieve the goal
decentralized approach requires local computa- of improving the throughput of the highway system
tion, which is expensive. In his approach, cars are while maintaining the safety, their method is to
grouped into tightly spaced train-like platoons and prioritize the multiple requirements, i.e., safety
the first car of the platoon is controlled centrally is more important than throughput.

187
Proactive Traffic Merging Strategies for Sensor-Enabled Cars

Researchers have agreed that the traffic control • Autonomous: Automation is concerned
problem on a global network level is practically within individual vehicles and no commu-
unsolvable by traditional optimization techniques nication between vehicles;
(see, e.g., Lammer et al., 2006; Lammer et al., • Cooperative: Vehicles cooperate by com-
2006) because of the exponential complexity municating selected information; and
of the underlying algorithms. Hence, a number • Platooning: Vehicles form tightly spaced
of decentralized optimal strategies whose ac- groups by communicating detailed informa-
tions are coordinated heuristically by a superior tion at a high frequency.
control layer have been proposed (Gartner et al.,
2001). Lammer et al. (2006) present a self-orga- Merging control algorithms for automated
nizing, decentralized control method for global vehicles focus on calculating the required speed
coordination of traffic signal control. They map and time to arrive at the merging point (Kato &
the problem to phase-oscillator models. By syn- Tsugawa, 2001; Lu et al., 2004), as well as the
chronizing these oscillators, the desired global minimum safety distance (Kanaris et al., 2001).
coordination is achieved. The concept applies Hall and Tsao (1997) examine the impact of
to networks where time sharing mechanisms merging strategies on the capacity of AHS. They
between conflicting flows in nodes are required present three merging strategies integrated with
and where a coordination of these local switches ramp metering for cooperative and/or platooning
on a network level can improve the performance. vehicles:
Gershenson (2004) proposes self-organizing
methods using simple rules to coordinate traffic • Release-to-gap: When the ramp vehicle
lights to improve traffic flow. reaches the merge point, the intended gap
also reaches the merge point so that the ramp
Automation Control vehicle and the gap are properly aligned at
the merge point;
Automated Highway Systems (AHS) have been • Preplatooning:Ramp vehicles into platoons
proposed based on automated vehicles. Fully before merging; and
automated vehicle control (Varaiya, 1993) is able • Release-to-tag: When the ramp vehicle or
to increase the capacity dramatically. Varaiya platoon reaches the merge point, the tail of
proposes a four-layer control architecture to the mainline platoon reaches the merge point
handle the control problems. Starting at the top, so that the ramp vehicle or platoon tag along
the layers are called the network, link, planning, the mainline platoon.
and regulation layers. The network layer assigns
a route to each vehicle entering the system. The Their simulation results show that the release-
link layer assigns a section to each vehicle and a to-tag strategy is the most efficient merging
target speed for each section in order to increase strategy, with 20% reduction from the theoretical
traffic flow. The planning layer coordinates the maximum capacity. Other strategies lead to as
movement of neighboring vehicles. The regula- much as 70% reduction. They point out that the
tion layer executes feedback control laws to finish main cause of the capacity reduction is the first-
certain tasks. in last-out phenomenon, where an available gap
Different traffic automation strategies are clas- for merging may be taken by a following vehicle
sified according to the level of communication: rather than the vehicle that arrived first. However,
their merging strategies and simulations assume

188
Proactive Traffic Merging Strategies for Sensor-Enabled Cars

that automated vehicles must stop at a check-in reports that with 20% ACC vehicles no jams are
facility and then proceed to the merging area. formed in single-lane simulations. Furthermore,
In contrast, Lu et al. (2004) show that ramp Davis identifies a potential problem with merging.
vehicles merging into the middle of a platoon ACC vehicles maintain desired headways and
provides higher efficiency in high-density traf- do not “give way” when a vehicle enters from a
fic conditions. They propose merging control ramp. The ability to merge may be hindered by
algorithm with the concept of virtual platooning, the lack of minimum safety gaps. In another work,
which forms a platoon of the ramp vehicle and Davis (2007) focuses on the merging problem
main road vehicles before the ramp vehicle arrives and proposes cooperative merging strategy to
at the merging point. This idea emphasizes four increase throughput and reduce travel times. In
factors that must be considered simultaneously: Davis’ strategy, an ACC equipped car adjusts its
vehicle relative positions, timing, speed and ac- position according to the front car on the other
celeration. road to create a safety gap without slowing down
At present no approach has proven itself supe- sharply. However, it only considers the nearest
rior to all its competitors in every respect. Since front car and thus the benefit is limited.
there are many different criteria to define perfor-
mance, and so many parameters that determine Ramp Metering
performance, one approach may be the winner
in several respects but inferior in other respects. Ramp metering has been successfully imple-
Although the concept of AHS improves safety, mented since the mid-1960s as an efficient freeway
road utility, and driver comfort, the requirement of management strategy. All ramp metering strate-
major changes to the existing highway infrastruc- gies calculate suitable ramp flow that is allowed
ture such as dedicated lanes, and a high percentage to the freeway. The ramp flow is converted to a
of automated vehicles, makes AHS unlikely to green-phase duration of the traffic light.
come to reality in the foreseeable future. Ramp metering strategies are typically clas-
sified as follows:
Driver Assistance Systems
• Fixed-time strategies are based on constant
The partial automation ACC systems are already historical demands and static models to
available on the market. ACC systems only control derive optimized settings. One example of
longitudinal driving with the aim of improving fixed-time strategies is Ideal Ramp Metering
safety and driver comfort. Merging, overtaking, (IMP) (Chen et al., 2001). To find out when a
or lane-changing still need the intervention of freeway section is most efficient, i.e., when
drivers. there is maximum flow on the highway
In the literature, there is research on how the section, Chen et al. analyze Los Angeles
ACC systems impact traffic flow, especially in highways data from Performance Measure-
relation to congestion. There is an agreement that ment System (PeMS) database (Chen et al.,
ACC systems can achieve a smoother traffic flow, 2001). They show that the maximum flow
which leads to an increase of the road capacity occurs near 60 mph (≈ 100 km/h), which is
and reduction in congestion (Davis, 2004; Kesting also the velocity under free flow conditions.
et al., 2008; Liang & Peng, 2000). Kesting et al. They assume that the pattern of demand is
(2008) show that traffic congestion is eliminated, unchanged. Therefore, to maintain the ve-
if there are 25% ACC vehicles in the simulation locity of 60 mph, IMP stops the ramp flow
based on the IDM model. Similarly, Davis (2004) whenever the occupancy exceeds the critical

189
Proactive Traffic Merging Strategies for Sensor-Enabled Cars

occupancy (at which the freeway flow is • Ramp metering may increase the waiting
maximal). The main drawback of fixed-time time for vehicles on the ramp, create ramp
strategies is the absence of real-time data. queues and transfer the congestion problem
Fixed-time strategies are oversimplified, be- to the ramp and local street networks.
cause demands are not constant and further • Ramp metering including those reactive
disturbances such as accidents may occur. strategies still have the limitation of adap-
• Reactive strategies are based on real-time tive to the highly variable and unpredictable
measurements of the freeway flow up-stream traffic conditions.
of the ramp and the freeway occupancy
downstream of the ramp. They aim to keep ProactiVE MERrging
the freeway traffic conditions close to pre- Algorithm
specified set (desired) values. Reactive
strategies can be performed independently This section presents our research into proactive
for each ramp or extended to several ramps. traffic merging algorithms. We show how sen-
The ALINEA strategy outperforms other sor-enabled cars can assist in improving merging
strategies in field trials (Papageorgiou et algorithms. We compare proactive merging algo-
al., 2003) ALINEA can typically achieve a rithms against a conventional merging strategy:
20% decrease of the total travel time. The priority-based merging.
limitations of reactive strategies are: 1) ap- In a priority-based strategy, the cars from one
propriate set values are hard to get; and 2) stream always have the right of way, for example,
the scope of their control is local. cars from the ramp must give way to the cars on
• Nonlinear optimal strategies are based on the main road. The ramp car only merges when
macroscopic dynamic models to coordinate the safety gap between two cars on the main
ramp metering in freeway networks. The road is large enough. Meanwhile, the cars on the
total time spent by the vehicles in a free- main road completely ignore the ramp cars and
way network can be reduced by up to 50% do not create gaps for the ramp car to merge.
in simulations (Papageorgiou et al., 2003). The shortcoming of this strategy is the lack of
This type of strategies has not been imple- coordination between the two traffic streams,
mented in the field. According to (Chu et al., which results in unnecessary delays for one traffic
2004) two area-wide coordinated algorithms stream. We explore proactive merging algorithms
BOTTLENECK and ZONE can outperform with the aim of using the current road facilities
the local reactive algorithm ALINEA. more efficiently, including the improvement of
overall traffic flow, decrease of the travel time
In summary, ramp metering is an efficient and economic fuel consumption.
control approach. On the other hand, it presents
several drawbacks: Single Lane Scenario

• Ramp metering is a sensitive technique. If We investigate three proactive merging algorithms


ramp metering is not accurate enough, then for a main road consisting of a single lane. All
it can lead to traffic congestion by weak me- algorithms assume that there is a decision start
tering that overloads the mainstream flow, point S before the merging start point O (see Figure
or prevent fully utilize of the mainstream 2). S indicates the point where a car decides where
capacity by overly strong metering. and when to merge between O and E based on
different types of spatial information. The con-

190
Proactive Traffic Merging Strategies for Sensor-Enabled Cars

cept of sliding decision point makes a proactive Table 3. Traffic merging algorithms overview
merging algorithm more adaptive. The position
Knowledge Right of Way Assumption
of decision point can be changed according to dif-
ferent traffic conditions. For frequently changing The car
Distance- Velocity does
Position closest to the
traffic conditions it is better to choose a decision based
merging point
not vary much

point closer to the actual merging point because The car first Acceleration
Velocity- Position
it is difficult to predict changes. based Velocity
arrives at the does not vary
All algorithms are initiated by the ramp car merging point much

once it arrives at the decision start point S. Proac-


tive algorithms essentially determine which car (referred to as V) that also takes the velocity into
has the right of way by using either the shortest account. It calculates the time for a car to arrive
distance to O or the shortest arrival time at O. The at the merging point and compares the time for
first strategy is a distance-based merging algo- cars from the two traffic streams. The car with
rithm (referred to as D) that measures the distance shortest time merges first. The third strategy is
from the main road car to the merging point O platoon-velocity-based merging algorithm (re-
and compares it with the distance between S and ferred to as PV). It is a more refined version of
O (denoted as SO). If the main road car’s distance the velocity-based merging algorithm V. Instead
is greater than SO, then the ramp car merges first of comparing the ramp car against one main road
(because the ramp car’s distance is less than SO). car as in V, PV compares the ramp car with a
Otherwise, we recursively compare the distance δ group of main road cars on the segment SO and
of the subsequent main road car and the distance assigns a slot between two main road cars for the
δ’ of the ramp car to O. We continue until δ > ramp car. The slot is chosen based on the arrival
δ’ in order to find the slot for the ramp car. The time calculated at S.
second strategy is a velocity-based algorithm In Table 3, we summarize distance-based
and velocity-based merging algorithms.

Figure 2. Notations of proactive merging algorithms

Figure 3. Illustration of lane switch in CPV




191
Proactive Traffic Merging Strategies for Sensor-Enabled Cars

Each algorithm performs better than others un- different merging algorithms. These approaches
der certain traffic condition. A refined adaptive have different underlying microscopic traffic
algorithm switches to the strategy that is best fit models and use different criteria to determine
for the current traffic situation. More details of whether or not a car should change its lane. In
single lane merging algorithms can be found in addition, all approaches use different simulations.
(Wang et al., 2007). Most studies (Hidas, 2002; Hidas, 2005; Sarvi
& Kuwahara, 2007) simulate an open boundary
Multiple Lane Scenario road section, whereas in our simulation the main
road is designed to be a loop. The loop provides
For main roads with multiple lanes cars are able a feedback to show the impact of merging algo-
to change lanes to overtake other cars or to make rithms. In summary, future research is required
space for new arriving ramp cars. Our experiments to explain the different findings.
will show that PV is the most effective proactive
merging algorithm for main road with a single
lane. Thus, we extend it to roads with multiple EVAaluation
lanes. In addition, we develop a refined version
of PV, which we call Cascading PV (referred to This section shows how to assess merging al-
as CPV). gorithms by identifying a range of performance
CPV assumes two lanes but can be general- criteria, such as delay, flow, and fuel efficiency.
ized to roads with more lanes. Cars on the outer It will also discuss how and why sensor-enabled
lane and the inner lane of the main road can cars can improve merging algorithms.
change lanes prior to the merging area to create
a larger gap for the merging ramp cars as shown Performance Metrics
in Figure 3. CPV aims to maximize the minimum
safety distance on both lanes which might result Merging algorithms can be evaluated from two
in a lane switch between two cars. perspectives: safety and efficiency. Although all
Multi-lane merging is an open research area merging algorithms have to ensure road safety
with contradictory reports. The simulation results our major research aim is to optimize the traffic
we show in the Discussion section demonstrate throughput. In addition, we also consider other
that appropriate lane changing on the main traf- factors than efficiency such as fuel consumption.
fic stream before the merging area calculated by In this section, we introduce criteria for traffic
CPV results in better performance than PV. Hidas control algorithms and show how to measure
(2002; 2005) proposes a lane changing model the performance. We identify which criteria de-
for merging scenarios. This model distinguishes pend on each other and illustrate how optimized
forced and cooperative lane change from free throughput implies higher speeds of cars coupled
lane change, which helps modelling the merging with tighter gaps, while safety requirements imply
behaviours under congested traffic conditions. lower speed and larger gaps.
Sarvi and Kuwahara (2007) model the ramp car
behaviour and the main road back car behaviour. Safety
They report that lane changing on the main road
before and/or after merging area can cause capac- To evaluate the safety characteristics of a merging
ity reduction. There may be a number of reasons strategy we consider two types of events.
why lane changing can lead to different results for

192
Proactive Traffic Merging Strategies for Sensor-Enabled Cars

• Collision: There is more than one car at ing. We expect that a merging strategy has
the same position of the road at the same a significant impact on the real capacity of
time. a road. Therefore, the observed reduction of
• Near-collision: The gap between two suc- the real capacity from the theoretical capac-
cessive cars is smaller than the minimum ity is an important criterion for merging
safety gap but if the front car does not brake strategies.
a collision does not occur. • Stability: The ability to adapt to a new traf-
fic situation. It impacts the capacity and the
We distinguish those two events and count total number of merged cars. We expect that
the number of collisions and the number of near- a stable merging strategy achieves higher
collisions relative to the total number of cars in capacity by accommodating more merged
a time frame. cars. A merging car impacts the stability of
two traffic streams because in one traffic
Efficiency stream a new car is added and in the other
stream this car is removed. As a result, the
A good merging strategy utilizes the road re- cars of both streams adjust their speeds and
sources more efficiently. We use the following gaps to achieve approximate equilibrium
criteria to evaluate efficiency. conditions. As the density of one stream
increases the gaps between the cars of this
• Flow: The average number of cars passing stream decrease until no farther cars can
a certain position over a period of time. We merge without violating the safety distance.
evaluate the flow as the product of density The gaps between the cars distribute more
and velocity over the entire main road. The evenly in the stable traffic flow than the
largest flow would occur if cars are bumper dynamic traffic flow. Thus, some larger gaps
to bumper (maximum density) and move at exist in the dynamically changing traffic
the speed limit (maximum velocity). Clearly, flow and can accommodate more cars to
this is not achievable in reality for safety merge.
reasons. If the density is maximal then cars • Delay: The total required time for a strategy
are not moving, yielding a minimum traffic to fill the target lane with a desired number
flow of zero. Therefore, the maximum of of merging cars. It describes how quickly
traffic flow occurs at a certain density with the system absorbs merging cars. In both
a corresponding velocity. merging scenarios, the car (on the ramp
• Capacity: The maximum number of cars or on the blocked lane) locates a gap from
passing a certain position over a period of the adjacent lane and adjusts its speed to fit
time, i.e., the maximum traffic flow. Traffic in the gap in order to merge. A bad merg-
congestion occurs when the demand exceeds ing strategy may cause more delay for the
the capacity, thus achieving higher capac- merging stream because the car has to wait
ity can effectively avoid traffic congestion. if it cannot adjust its speed appropriately to
However, the real capacity is typically lower merge.
than the theoretical maximum capacity be- • Fuel consumption: Varies as much as 45%
cause it is not only determined by the road (Victoria, n.d.) between different drivers
configuration (e.g., the number of lanes, the using identical cars. Multiple studies show
lane width) but also by disturbances in the that accelerating slower will dramatically
traffic flow, such as lane changing or merg- improve fuel efficiency: the author in (Reed,

193
Proactive Traffic Merging Strategies for Sensor-Enabled Cars

2005) found fuel savings up to 37% with algorithm in a variety of simulation settings.
an average of 31% simply by accelerating Our work shows the following three parameters
a car slowly. Similar findings (Parker & are most important to measure the efficiency of
Stedman, 1994) show slower acceleration a merging algorithm: the ramp length, the initial
saving between 14% and 21% of fuel use over density of the main road, and the rate of incom-
aggressive acceleration. Different merging ing ramp cars. In the simulations, we initially
strategies have a significant impact on the study uniformly distributed traffic flow and then
acceleration. we study arrival ramp traffic following Poisson
distribution.
Simulation
Discussion
We developed a Java-based controlled simulation
environment to test various traffic merging strate- In the proactive merging strategies, the actual
gies. It is based on an existing microscopic traffic merging point is dissociated from the decision
model IDM (Treiber et al., 2000), which we pre- point where to merge. This decoupling results in
sented in the Longitudinal Models section. IDM a significant reduction of traffic merging delay at
specifies the following parameters: maximum the expense of a lower overall average velocity
velocity, safe time headway, maximum accel- on the main road. A lower velocity is expected
eration, comfortable deceleration, and minimum because higher traffic load on a road requires a
distance. Certain values guarantee collision-free smaller minimum safety distance, which is only
driving. We compare the performance of proac- achievable by a lower velocity. Figure 4 shows the
tive merging algorithms against a priority-based performance of different merging algorithms. The

Figure 4. The performance of merging algorithms with a short ramp of 100 m and high ramp flow rate

R PV CPV R PV CPV
400
Total Number of Cars

30
Delay (min)

300
20

200
10

100
0 1 5 10 15 20 25
110 150 190 230 270 310
Time (min)
Total Number of Cars

(a) (b)
R PV CPV
30
R PV CPV Max
velocity (m/s)

65
Flow (cars/min)

55
25
45
35
25
20
15 1 5 10 15 20 25
1 5 10 15 20 25 Time (min)
Time (min)

(c) (d)

194
Proactive Traffic Merging Strategies for Sensor-Enabled Cars

dashed line in Figure 4.c illustrates the maximal velocity. The traffic flow increases at the begin-
flow in equilibrium condition. R refers to the ning as the ramp cars merge, peaks before the
priority-based merging algorithm. The strategy main road is saturated, and then decreases as the
R performs less well because once a high load average velocity decreases. In order to maintain
is achieved R simply breaks, i.e., no farther cars a high traffic flow as well as to accommodate
can merge. CPV is a well performing strategy. a large number of ramp cars, we need to find a
It approaches the theoretical maximum flow. balance between the velocity and the number of
As expected, CPV has a smaller overall average cars that merge into the main road.
velocity because it is the only way to achieve a Overall, CPV leads to remarkable results in
higher traffic load. terms of delay and flow. It assigns a slot for a ramp
In general, the advantages of proactive merg- car among a group of main road cars in the seg-
ing algorithms over the priority-based algorithm ment between the decision point and the merging
are the following: point, and creates a larger gap for the ramp car by
switching lanes of the cars on the main road prior
• The delay in proactive merging algorithms to the merging area. In summary, CPV optimizes
decreases by a third compared to the priority- the delay and flow at the expense of the average
based algorithm before the loop is saturated. velocity on the main road. On the other hand, the
Cars on the ramp can merge into the main lower average velocity enables CPV to achieve a
road more quickly. significant increase for the total number of cars
• The capacity of the main road increases by on the main road.
up to 67%.
• The traffic flow in proactive merging al-
gorithms is higher. Since the traffic flow is Futurrnd
defined by the product of the average velocity
and the density, there are more cars on the There are two research directions that we believe
main road in proactive merging algorithms will draw future attention:
than the priority-based algorithm due to the
smaller delay. At first, the larger number of • Robustness. Proactive merging strategies
cars overcomes the slightly smaller average rely on two assumptions. First, the spatial in-
velocity; then as more cars merge in, the main formation monitored by sensor-enabled cars
road starts getting saturated, the average ve- is accurate and precise. Although automotive
locity drops to ensure the safety distance. sensors are typically required to have a total
error less than 3% over their entire measured
A disadvantage is the slightly lower average range (Fleming, 2001), Hernandez (2005)
velocity in proactive merging algorithms. This is also reports that for car speed lower than 5
a side-effect of a larger number of cars merging km/h sensors give skewed and misleading
into the main road. The distance between cars information. Consequently, future research
gets smaller, which leads to a lower velocity will need to focus on the impact of imper-
because the velocity depends on the minimum fect information. Second, we envision that
safety distance between cars. However, this navigation systems not only provide route
lower overall velocity is simply a byproduct of guidance but also provide recommenda-
the higher traffic flow. tions of how to drive cooperatively with the
We must manage complex tradeoffs among vehicles in the vicinity. Therefore, a merg-
several factors, in particular the delay, flow, and ing algorithm must accommodate various

195
Proactive Traffic Merging Strategies for Sensor-Enabled Cars

human factors, such as reaction times, and such as pre-lane-changing. We have identified
be prepared to handle drivers who do not potential research directions in the robustness
follow the system’s recommendations. and scalability of merging algorithms. Assisted
• Scalability. Currently, proactive merging by advanced sensing and communication tech-
algorithms are localized and provide only nologies, traffic control strategies and merging
recommendations for a single intersection. algorithms will lead to more efficient use of the
Highly scalable algorithms are required to current road networks and ultimately help to al-
optimize traffic flows at a network level that leviate traffic congestions.
involves a large number of intersections as
well as multiple on-ramps and exit-ramps
at freeway networks. Scalability can be REFERENCES
achieved through locality in both time
and space. Sensor-enabled cars will detect Federal Highway Administration. (2005). Traffic
information in their spatial vicinity only congestion and reliability: Trends and advanced
use it for decisions in the near future as strategies for congestion mitigation. (http://ops.
long-term estimations occur high compu- fhwa.dot.gov/congestion report/, last accessed:
tational complexity. As a result, we expect April 2008)
that control strategies will be distributed
Ahmed, K., Moshe, E., Koutsopoulos, H., &
consisting of local decisions according to the
Mishalani, R. (1996). Models of freeway lane
neighborhood conditions, instead of having
changing and gap acceptance behavior. In Proc.
a single centralized system managing the
ISTTT ’96 (pp. 501–515).
entire traffic network. We expect that such
a strategy will scale well. Novel models with Akyildiz, I. F., Su, W., Sankarasubramaniam, Y.,
a sufficiently fine level of granularity will & Cayirci, E. (2002). Wireless sensor networks: a
attract further research. survey. Computer Networks, 38 (4), 393–422.
Anda, J., LeBrun, J., Chuah, C.-N., Ghosal, D.,
& Zhang, H. M. (2005). VGrid: Vehicular ad hoc
ConcluSION
networking and computing grid for intelligent
traffic control. In Proc. IEEE VTC 2005-spring,
This chapter provides an overview of new ideas
5, 2905–2909.
and approaches in the area of traffic flow control
with the assistance of VANETs. We report on the Bando, M., Hasebe, K., Nakayama, A., Shibata,
state-of-the-art in this area in terms of vehicular A., & Sugiyama, Y. (1995). Phys. Rev. E, 51(2),
traffic theories, traffic models, merging strategies, 1035–1042.
and performance measurement methodologies.
Bevly, D. M. (2004). Global positioning system
In this chapter, we have highlighted proactive
(GPS): A low-cost velocity sensor for correcting
merging strategies and the potential benefits of
inertial sensor errors on ground vehicles. J. Dyn.
applying sensor-enabled cars. We have shown in
Syst. Meas. Contr., 126(2), 255–264.
our research the significant improvement in traf-
fic flow and decrease in travel time mainly result Bonanno, G., Fantoni, R., Fichera, A., Fornetti, G.,
from the decoupling of the merging point and Moriconi, C., Poggi, C., et al. (2003). The sensing
the decision point, and multilane optimizations, subsystem of RAS.

196
Proactive Traffic Merging Strategies for Sensor-Enabled Cars

Bose, A., & Ioannou, P. A. (2003). Analysis of ElBatt, T., Goel, S. K., Holland, G., Krishnan, H.,
traffic flow with mixed manual and semi-auto- & Parikh, J. (2006). Safety: Cooperative collision
mated vehicles. IEEE Trans. Intell. Transport. warning using dedicated short range wireless
Syst., 4(4), 173–188. communications. In Proc. VANET ’06 (pp. 30–39).
New York, NY, USA: ACM.
Chen, C., Jia, Z., & Varaiya, P. (2001). Causes
and cures of highway congestion. IEEE Control Estrin, D., Govindan, R., Heidemann, J., & Ku-
Syst. Mag., 21(6), 26–32. mar, S. (1999). Next century challenges: scalable
coordination in sensor networks. In MobiCom ’99
Chen, C., Petty, K., Skabardonis, A., Varaiya, P.,
(pp. 263–270). New York, NY, USA: ACM.
& Jia, Z. (2001). Freeway performance measure-
ment system: Mining loop detector data. Transp. Fleming, W. J. (2001). Overview of automotive
Res. Rec., 1748, 96–102. sensors. IEEE Sens. J., 1(4), 296–308.
Choffnes, D. R., & Bustamante, F. E. (2005). An Gartner, N. H., Pooran, F. J., & Andrews, C. M.
integrated mobility and traffic model for vehicu- (2001). Implementation of the OPAC adaptive
lar wireless networks. In Proc. VANET ’05 (pp. control strategy in a traffic signal network. In
69–78). New York, NY, USA: ACM. Proc. IEEE ITSC ’01 (pp. 195–200).
Chowdhury, D., Santen, L., & Schadschneider, Gershenson, C. (2004). Self-organizing traffic
A. (2000). Statistical physics of vehicular traf- lights. Complex Systems, 16, 29.
fic and some related systems. Physics Reports,
Hall, R. W., & Tsao, H.-S. J. (1997). Capacity of
329, 199.
automated highway systems: merging efficiency.
Chu, L., Liu, H. X., Recker, W., & Zhang, H. In Proc. ACC ’97, 3, 2046–2050.
M. (2004). Performance evaluation of adaptive
Helbing, D. (2001). Traffic and related self-driven
rampmetering algorithms using microscopic traf-
many-particle systems. Rev. Mod. Phys., 73(4),
fic simulation model. J. Transp. Engrg., 130(3),
1067–1141.
330–338.
Hernandez, W. (2005). Robust multivariable
CI-6558, P. (n.d.). Acceleration sensor. (http://
estimation of the relevant information coming
hug.phys.huji.ac.il/PHYS HUG/MAABADA/
from a wheel speed sensor and an accelerometer
MABADA A/Pasco/ci/ci-6558/012-06361b/012-
embedded in a car under performance tests. Sen-
06361b.pdf, last accessed: April 2008).
sors, 5, 488–508.
Davis, L. C. (2004). Effect of adaptive cruise
Hidas, P. (2002). Modelling lane changing and
control systems on traffic flow. Physical Review
merging in microscopic traffic simulation. Trans-
E, 69(066110).
port. Res. Part C, 10 (5-6), 351–371.
Davis, L. C. (2007). Effect of adaptive cruise
Hidas, P. (2005). Modelling vehicle interactions in
control systems on mixed traffic flow near an
microscopic simulation of merging and weaving.
on-ramp. Physica A, 379(274–290).
Transport. Res. Part C, 13(1), 37–62.
DICKEY-John Products. (n.d.). Radar II. (http://
Hightower, J., & Barriello, G. (2001). Location
www.dickey-john.com/products/public-works/
systems for ubiquitous computing. IEEE Com-
ground-speed-sensors/radar-ii, last accessed:
puter, 34(8), 57–66.
April 2008)

197
Proactive Traffic Merging Strategies for Sensor-Enabled Cars

Johnson, D. B., & Maltz, D. A. (1996). Dynamic theory and optimal control. In Proc. IEEE CDC
source routing in ad hoc wireless networks. In ’96 (pp. 1190–1195).
Imielinski & Korth (Eds.), Mobile computing,
Lygeros, J., Godbole, D. N., & Sastry, S. (1998).
353. Kluwer Academic Publishers.
Verified hybrid controller for automated vehicles.
Kanaris, A., Kosmatopoulos, E. B., & Loannou, IEEE Trans. Autom. Control, 43(4), 522–539.
P. A. (2001). Strategies and spacing requirements
Nagel, K., & Schreckenberg, M. (1992). A cellular
for lane changing and merging in automated
automaton model for freeway traffic. J. Phys. I
highway systems. IEEE Trans. Veh. Technol.,
France, 2(12), 2221–2229.
50(6), 1568–1581.
Nakamura, E. F., Loureiro, A. A. F., & Frery, A.
Kato, S., & Tsugawa, S. (2001). Cooperative driv-
C. (2007). Information fusion for wireless sensor
ing of autonomous vehicles based on localization,
networks: Methods, models, and classifications.
inter-vehicle communications and vision systems.
ACM Comput. Surv., 39(3), A9/1–A9/55.
JSAE Rev., 22(4), 503–509.
Papageorgiou, M., Diakaki, C., Dinopoulou, V.,
Kerner, B. S. (2004). Three-phase traffic theory and
Kotsialos, A., & Wang, Y. (2003). Review of
highway capacity. Physica A, 333, 379–440.
road traffic control strategies. Proc. of the IEEE,
Kesting, A., Treiber, M., & Helbing, D. (2007). 91(12), 2043–2067.
General lane-changing model MOBIL for car-fol-
Papageorgiou, M., & Kotsialos, A. (2002). Freeway
lowing models. Transp. Res. Rec., 1999, 86–94.
ramp metering: an overview. IEEE Trans. Intell.
Kesting, A., Treiber, M., Schönhof, M., & Helbing, Transport. Syst., 3(4), 271–281.
D. (2008). Adaptive cruise control design for ac-
Parker, D. S., & Stedman, T. C. (1994). Energy
tive congestion avoidance. Transport. Res. Part
efficient transportation for Florida. (http://www.
C, doi:10.1016/j.trc.2007.12.004.
p2pays.org/ref/12/11355.pdf, last accessed: Nov.
Lammer, S., Kori, H., Peters, K., & Helbing, D. 2007)
(2006). Decentralised control of material or traffic
Pedersen, M. M., & Ruhoff, P. T. (2002). Entry
flows in networks using phase-synchronisation.
ramps in the Nagel-Schreckenberg model. Phys.
Physica A, 363(1), 39–47.
Rev. E, 65(5), 056705.
Li, L., Song, J., Wang, F. Y., Niehsen, W., &
Reed, P. (2005). We test the tips: What really
Zheng, N. N. (2005). IVS 05: New developments
saves gas? and how much? (http://www.edmunds.
and research trends for intelligent vehicles. IEEE
com/ownership/driving/articles/106842/article.
Intell. Syst., 20(4), 10–14.
html, last accessed: Nov. 2007).
Liang, C., & Peng, H. (2000). String stability
Saha, A. K., & Johnson, D. B. (2004). Model-
analysis of adaptive cruise controlled vehicles.
ing mobility for vehicular ad-hoc networks. In
JSME Intl. J., Series C, 43(3), 671–677.
Proc. VANET ’04 (pp. 91–92). New York, NY,
Lu, X. Y., Tan, H. S., Shladover, S. E., & Hedrick, USA: ACM.
J. K. (2004). Automated vehicle merging maneu-
Sarvi, M., & Kuwahara, M. (2007). Microsimu-
ver implementation for AHS. Vehicle Syst. Dyn.,
lation of freeway ramp merging processes under
41(2), 85–107.
congested traffic conditions. IEEE Trans. Intell.
Lygeros, J., Godbole, D. N., & Sastry, S. (1996). Transport. Syst., 8(3), 470–479.
Multiagent hybrid system design using game

198
Proactive Traffic Merging Strategies for Sensor-Enabled Cars

Treiber, M., & Helbing, D. (2002). Microsimula- Victoria, E. (n.d.). How you can save on fuel costs.
tions of freeway traffic including control mea- (http://www.epa.vic.gov.au/air/savefuel/savefuel.
sures. (http://arxiv.org/abs/cond-mat/0210096) asp, last accessed: Nov. 2007)
Treiber, M., Hennecke, A., & Helbing, D. (2000). Vlacic, L., Parent, M., & Harashima, F. (2001).
Congested traffic states in empirical observations Intelligent vehicle technologies: Theory and ap-
and microscopic simulations. Phys. Rev. E, 62(2), plications. London: Butterworth-Heinemann.
1805–1824.
Wang, Z., Kulik, L., & Ramamohanarao, K.
Treiber, M., Kesting, A., & Helbing, D. (2006). (2007). Proactive traffic merging strategies for
Delays, inaccuracies and anticipation in micro- sensor-enabled cars. In Proc. VANET ’07 (pp.
scopic traffic models. Physica A, 360(1), 71–88. 39–48). New York, NY, USA: ACM.
Varaiya, P. (1993). Smart cars on smart roads:
Problems of control. IEEE Trans. Autom. Control,
38(2), 195–207.

199
200

Chapter XI
The Localisation Problem in
Cooperative Vehicle
Applications
Javier Ibañez-Guzmán
RENAULT S.A.S., France

ABSTRACT

The next paradigm towards enhancing vehicle safety and road transportation represent cooperative
systems. Advances in computer and communications technologies are facilitating the establishment of
vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) wireless communications links. This enables
the sharing and aggregation of information which results in an extension of the driver awareness horizon
in an electronic manner. In this chapter, V2V and V2I applications are considered as a spatio-temporal
problem. The tenet is that sharing information can be made only if this is time stamped and related to
a spatial description of the information sources. The chapter formulates the spatio-temporal problem
having as constraint the precision of the pose estimates of the vehicles involved. It regards the localisa-
tion problem and accuracy of digital road maps as a combined issue that needs to be addressed for the
successful deployment of cooperative vehicle applications. Two case studies, intersection safely and
an overtaking manoeuvre are included. Recommendations on the precision limits of the vehicle pose
estimations and the potential uncertainties that need to be considered when designing V2V and V2I
applications complete the chapter.

Introduction simple thermo mechanical devices to complex


mechatronics systems where networks of micro-
Over the years motor vehicles have provided a computers plus a plethora of proprioceptive and
rapid means of transportation, they are today exteroceptive sensors control multiple functions.
part of our daily lives. These have evolved from The dependency on motor transport has resulted in

Copyright © 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
The Localisation Problem in Cooperative Vehicle Applications

traffic congestions, pollution and an unacceptable limited safety; Cost: prices are high and only a
level of accidents (Broughton & Walter, 2007). limited number of vehicles would be equipped
Whilst in countries with advanced economies, the with full safety features. Further, vehicle onboard
number of accidents has decreased, in countries sensors due to their physics and the limits in their
with emerging economies accident tendencies layout on the vehicles, means that the perception
are on the increase, in most cases with disastrous horizons are limited which reduces the effective-
consequences. ness of several active safety applications.
Since the late seventies, the number of safety Advances in computer and communications
features in all types of vehicles has increased. technologies are facilitating the establishment of
These are known as passive safety systems like vehicle to vehicle (V2V) and vehicle to infrastruc-
seat belts, deformable chassis, etc. At the same time ture (V2I) wireless communications links (Cook
legislation has hardened and road infrastructure J.A., Kolmanovsky I.V., McNamara D., & Prasad
has improved. Currently the number of accidents K.V., 2007, Srini V.P., 2006) . This enables the
and road fatalities has decreased particularly in sharing and aggregation of information and hence
Europe, Japan and the USA; however over the to extend the driver awareness horizon. Within
past years a plateau is being reached and further this context, it is feasible to share information
reductions are difficult. At the same time conges- between vehicles and infrastructure, to combine
tion and pollution continues to increase whilst this information and allow for a better machine
society is becoming more concerned on the costs and driver understanding of its situation and
of pollution to global warming and health under thus to extend electronically the driving horizon
an uncontrollable raise in fuel costs. In the past (Cook J.A., Kolmanovsky I.V., McNamara D., &
years, the trend has been to develop active safety Prasad K.V., 2007, Srini V.P., 2006) . A typical
systems as part of advanced driving assistance example could be cooperative adaptive cruise
systems (ADAS) like the use of video cameras control (CACC), an extension of ACC, where in
for obstacle detection, Radar or Ladars (Laser addition to measuring the distance to the leader,
detection and ranging sensors) for vehicle fol- a vehicle can exchange information with the
lowing, etc. In other words, through the use of leader by wireless communications to improve
exteroceptive and proprioceptive sensors, it is performance (Arem B.van., Driel C. van., and
feasible to estimate the vehicle ego-state and Visser R., 2006). At present multiple worldwide
perceive its immediate surrounding environment. efforts exist in this domain like the SKY project
The combination of the captured data results in on intersection safety by NISSAN Corp., which is
digital models that represent the vehicle immedi- already in its field operational test phase involv-
ate surrounding environment and is enabling the ing hundreds of passenger cars. In Europe there
development of advanced safety systems as it is are two major large scale demonstrators’ projects
possible to inform and warn drivers of potential under the 6th research framework of the European
risks or even act on the subject vehicle in the Community, namely the co-operative vehicle in-
case of pre-crash braking systems (Laugier C., frastructure systems (CVIS) and the Cooperative
Vasquez D., Yguel M., Fraichard Th. & Aycard vehicles and road infrastructure for road safety
O., 2008, Wang H., Xu Jian, Ibañez-Guzmán, J, (SAFESPOT) projects, (CVIS Project Partners,
Jarvis, R., Goh, T. & Chang C.W., 2000),. Whilst 2008 & SAFESPOT Project Partners, 2008).
this represents a major progress and should yield V2V and V2I applications result from the
to better safety, there are two major constraints: sharing of information between the various enti-
Sensors: these have limited capabilities and only ties involved. The purpose is to extend the driver
a combination of several of them could warrant awareness horizon by associating the information

201
The Localisation Problem in Cooperative Vehicle Applications

generated in one vehicle, transmitting it to the CoopERratihicl


relevant vehicles within its immediate environ- application a SSpatio-TEMmporal
ment so as to share information. The association pro
is based in two important parameters, time and
space. In this chapter, V2V and V2I applications All types of vehicles travel on networks of roads
are considered as a spatio-temporal problem. The provided by the infrastructure, and the control
tenet is that the sharing of information can be of this network is through road and traffic signs
made only if this is time stamped and related to to various levels of complexity. Within these
a spatial description of the information sources. networks, sets of vehicles travel guided inde-
That is, all applications need to have a spatial pendently but whose response is constrained by
description with respect to something and for the state of the road network. Communications
this to be usable they need to be referred not between the vehicles and infrastructure provides
only with respect to an absolute reference frame a different network that allows for the dynamic
but also to a spatial description of the environ- sharing of information amongst all the entities in
ment like for example the position on a road, the road network.
the position of the vehicles with respect to an Independent of the wireless communications
intersection and so on. The scope of this chapter technologies and protocols deployed, two types
does not include the study of techniques used to of links can be established: Between vehicles,
enhance the vehicles pose (position and attitude) that is Vehicle to Vehicle (V2V) communications,
estimates as these are addressed in much detail and between vehicles and the infrastructure or
by work elsewhere (Schlingelhof M., Betaille D., road side units (RSU), also known as Vehicle to
Bonnifait P. & Demaseure K., 2008, Lee K.W., Infrastructure (V2I).
Wijesoma S. & Ibanez-Guzman J., 2007 & Cui The main feature is that the information ac-
Y.J. & Ge S.S. 2002). quired by the vehicles or infrastructure via their
This chapter is organised as follows, Section own sensors is shared with other vehicles or with
2 states that cooperative vehicle applications are another part of the infrastructure via wireless
governed by the solution of a spatio-temporal communications links. This inherent property of
problem where the main constraint is the precision Intelligent Transportation Systems (ITS) provides
of the pose estimates of the vehicles involved in opportunities for developing new applications. In
the application. Section 3 formulates the localisa- order to define the need for a Spatio-Temporal
tion problem and accuracy of digital road maps formulation and to focus on the localisation prob-
as a combined issue that needs to be addressed lem, in this section a succinct list of applications
for the successful deployment of cooperative is introduced. For this purpose, applications have
vehicle applications. Section 4 completes the been classified into four families: Safety, Mobility,
problem formulation by studying in a simple Efficiency and Telematics. Details of each family
manner the case of the use of V2V or V2I com- are given along the following structure: definition,
munications to traverse safely a road intersection case study, illustrative examples, technological
and an overtaking manoeuvre. Finally, Section challenges, and Localisation Information. The
5 presents a summary of the chapter including classification follows the one defined by the Re-
recommendations and comments on the implica- search and Innovative Technology Administra-
tions on the precision limits of the vehicle pose tion (RITA), U.S. Department of Transportation
estimations and the potential uncertainties that (Department of Transport, 2008). The emphasis
need to be considered when designing V2V and is according to the level of position accuracy
V2I applications. required by the applications, with those related
to Safety addressed first.

202
The Localisation Problem in Cooperative Vehicle Applications

Safety In order to illustrate this problem, the following


use case is defined: Intersection Safety.
A fundamental function for a driver is to be aware
of the relationships between its vehicle (subject Use Case Generic Intersection Safety
vehicle-SV), the other vehicles (principal other
vehicles-POV), and other entities within its sur- Figure 1. presents a schematic view of a typical
rounding environment. Today, this awareness is intersection. For description purposes and to
assisted through the use of a series of onboard ensure the consistency of the descriptions, the
perception systems that detect obstacles, track vehicles have been classified as follows: Subject
vehicles, assist in the vehicle control process, etc. vehicle (SV) is the centre of interest and with
These are known as driving assistance systems respect to which the application or function is de-
whose details are found in the literature (Gharavi rived. Intruder Vehicle (IV) represents the vehicle
H., Prasad K. V. & Ioannou P.A. (Eds.), 2007). that is to cross the path of the SV representing a
These systems are designed to reduce risk during direct risk and thus the likelihood of a collision.
travel by providing means to avoid collisions/ The Distracter Vehicle (DV) represents vehicle
crashes. For this purpose, a series of sensors are not directly involved in the use case, but rather it
embarked onto the vehicles to different levels of acts as an occlusion or is within the neighbour-
complexity. hood of the SV. There are other special vehicles
Experience has shown that there is no ideal as listed in Figure 1, which are used to complete
sensor, as all types of sensors have limitations and the scenarios.
hence there is the need to use multiple sources of For the case of the generic intersection safety
information by combining their outputs. For this use case, the subject vehicle (SV) arrives to it thus
purpose, sensor fusion methods are used to build the driver needs to be aware of the presence of all
models of the environment that are then used for the vehicles or vulnerable road users that represent
decision making and hence informing or warn- a risk. It is assumed that the SV is equipped with
ing the driver, or even acting on the vehicle. As front looking perception sensors (e.g. Ladars,
demonstrated by the landmark event on vehicle Vision Cameras) that are able to detect objects
navigation, the DARPA Urban Grand Challenge, obstructing its path. Making an abstraction of
today it is possible to generate enriched infor- reliability and costs of these systems, it can be
mation with a good degree of certainty so as to observed that the physics of the process limit
guide autonomously ground vehicles in urban the driver awareness horizon. Although addi-
like environments (Defense Advanced Research tional sensors could be included occlusion, their
Projects Agency, 2008). These technologies can limited field of view and layout on the vehicle
be transferred to passenger vehicles and are today are major concerns (Gharavi H., Prasad K. V. &
part of the technological roadmaps of vehicle Ioannou P.A. (Eds.), 2007). If speeds increase or
OEMs. A major constraint is that for this purpose, the environment is more cluttered, the problem
a combination of sensors is needed operating at is compounded.
fast sampling rates and having a high resolution. Observing the scenario in Figure 1 from the
Further, due to the geometrical characteristics driver or sensor point of view, it is clear that
of passenger vehicles, the layout of these sensors the presence of the Distracter Vehicle (DV) and
are such that they will always have a limited field that of the Two-Wheel vehicle is ignored; both
of view (Kelly, A. & Stentz, A., 1998), limiting are occluded and thus constitute a risk. Further,
their capabilities. supposing that there is only the Intrusion Vehicle
(IV) and that this arrives at a prohibited speed, it

203
The Localisation Problem in Cooperative Vehicle Applications

Figure 1. Schematic of a typical intersection in an urban setting

Figure 2. Schematic view of the SV environment using V2V communications


esv

SV
SV
POV

204
The Localisation Problem in Cooperative Vehicle Applications

is impossible for the driver of the SV to know that Project Partners, 2008). Sample applications
the IV will not have sufficient space to brake at include:
the stop line due to the speed that it is travelling, Road Hazard Warning. The SV has detected
presenting a risk to the SV. Multiple situations a hazard along its trajectory; this could be an
exist like for example if the High Tonnage Vehicle accident, a broken vehicle, road works, etc. This
(HTV) or truck is at a stop, the SV or the Power information is geolocalised and broadcasted
Two-Wheel vehicle (PTW) are at a risk as they through the VANET (Vehicular Ad-Hoc Network)
are not aware of such situation. If each of the ve- to the immediate vehicles.
hicles can transmit its position, speed and other Lane Change Assistance. Changing lanes
status data, by associating this information onto could create risk situations, due to the presence of
digital representation of the context (intersection), vehicles in the driver blind zone. By knowing what
an extended awareness can be created, as shown occurs within the vicinity of the SV, such as the
in Figure 2. An application running in the SV distribution of vehicles on the appropriate lanes,
then can analyse and identify the possible risks their relative speeds and inferring the intentions
informing consequently the driver beyond what of the driver, the system could generate an advice
current sensors could provide. For example the to the driver on whether or not to concretise the
DV and the two-wheeler are highlighted in red as manoeuvre. The use of a blind spot detector will
potential risks as shown in Figure 2. The vehicle be unnecessary.
at the rear of the SV could also be warned that it Overtaking Assistance. The overtaking ma-
is driving too close, and warning information is noeuvre involves a degree of risk. Drivers need
sent via a wireless link. to have a clear line of sight of what is in front or
From this simplistic diagram, it can be ob- behind the vehicle, and the relative speeds of all
served that by knowing the spatio-temporal rela- the observed vehicles, with respect to their own
tionships between all the actors, a full awareness speed as well as the shape of the road. When
model can be created beyond the capabilities of drivers’ cognitive and perception capabilities are
current sensor technologies and ideally avoiding reduced as they become older, or when visibility
their need altogether, which results in the interest is poor, overtaking becomes potentially more dan-
in V2V and V2I technologies. gerous. By knowing the position/direction/speed
of the various intervening vehicles, with relation
Applications to the SV plus context (road), it will be possible
to infer whether there is a high risk involved and
There are a plethora of applications related to consequently warn the driver.
vehicle safety, which involve knowing the location
of the entities of interest at a given time and their Technical Challenges
relative situations (e.g. speeds, inter-distances,
etc.). In general, these are known relative to the For safety applications, it is necessary to know
environment or context which provides informa- precisely and on time the location of the SV and
tion that leads to the establishment of relationships its relationships with other road entities within
between all objects, that is the complete perceived its immediate manoeuvring area. There is little
model of the area of interest (Madhavan R., Mes- room for uncertainty or malfunctioning of the
sina E.R. & Albus J.S., 2007 & Papp Z., Brown system. That is no detection/location mistakes are
C.L., & Bartels C. 2008). acceptable and such systems have to prove their
A good panorama of safety related applications field reliability. Knowing the vehicle ego-state is
can be found at the SAFESPOT site (SAFESPOT something achievable, however, determining the

205
The Localisation Problem in Cooperative Vehicle Applications

vehicle position and projecting it onto a digital road Use Case: Geolocalised Broadcasting
representation is much more difficult (Schlingel- of Information
hof M., Betaille D., Bonnifait P. & Demaseure K.,
2008, Lee K.W., Wijesoma S. & Ibanez-Guzman Over a road segment it is necessary to control
J., 2007 & Cui Y.J. & Ge S.S. 2002). virtually the flow of traffic. For example the infra-
If data from on board exteroceptive sensors structure could broadcast an event over an area,
is to be shared, this poses different challenges in such as the need for a free corridor to facilitate the
particular on the integrity of this data, in terms crossing of an Emergency Service Vehicle (ESV).
of the degree of confidence on the detection ef- For this purpose, the information is broadcasted
fected, and its location with respect to the sensing from the infrastructure or through multi-hoping
vehicle. between the relevant vehicles, as shown in Figure
Other issues to take into account are for ex- 3. The relevant vehicles will then form a blue cor-
ample information latency, capacity of the com- ridor for the save crossing of the ESV.
munication channels and sampling rates. The schematic in Figure 3 shows the manner
in which the information broadcasted can be
Mobility directed to a target area, so that the informa-
tion can be used to control the flow of vehicles
Improving mobility by reducing delay and travel within that area. In this case, drivers within the
times is a major objective of many ITS (Intelligent neighbourhood receive information on the arrival
Transportation Systems) components (Depart- of an ESV associated to a lane, and accordingly
ment of Transport, 2008). Increases in traffic the implicated drivers will leave the lane open
density over the years have become problematic; for the traversal of the ESV.
e.g. costly, increasing pollution, etc. By being
able to collect information from vehicles travel- Applications
ling over a wide area, from networks of sensors
distributed strategically and from public service Controlling vehicle mobility in a geolocalised
organisations/road operators/public authorities, manner is a group of applications that can be
it is possible to centralise this data to fuse it implemented using ITS technologies. These as-
and infer relevant information that leads to the sociate information on other vehicles or events to
regulation of traffic, the broadcasting of location the road network in a precise manner. For example
dependent dynamic information and to address in Figure 3, if there was a parallel road next to
traffic disturbances like accidents. In this case the one where the ESV is travelling and thus the
there is observability of the traffic conditions in information might be associated to the wrong road,
an instantaneous manner and thus controllabil- the result could be catastrophic, hence there is a
ity of the road network could be attained. Each need for precise location information.
communicating vehicle could be considered as Most of the applications addressed in projects
a sensor, and the aggregation of the information like CVIS include this type of applications (CVIS
results in a distributed centralised data fusion Project Partners, 2008). Sample applications
problem where statistics will be generated, and include:
control actions will be broadcasted to vehicles and Navigation and Traffic alerts. Information
infrastructure. The sharing of information from broadcasts extend the situation awareness hori-
the infrastructure to all vehicles on an area through zon of drivers that should allow for vehicle speed
the VANET to extend the driving awareness of optimisation, and best trajectory recommenda-
the drivers is an important characteristic. tions based on up to date traffic information. To

206
The Localisation Problem in Cooperative Vehicle Applications

Figure 3. Traffic control broadcast information


Visualisation within the vehicles

Subject Vehicles

improve traffic flow, the usage of lanes will be Efficiency


organised and speed recommendations will also The sharing of information over wide areas al-
be issued, etc. lows for the optimisation of resources, with the
Presence of a Slow Moving Vehicle. Drivers transmission of relevant information on time in a
will be notified of the presence of a slow moving geolocalised manner. This results in an intelligent
vehicle on a given lane. Upon detection of such infrastructure leading to intelligent environments
vehicle the information is broadcasted including where it will be possible to deploy a collection
geolocalisation data. This will be transmitted of vehicles with limited sensing and intelligent
to vehicles in the neighborhood. These vehicles capabilities, that is, the efficiency of existing
will then re-broadcast the information to other facilities is optimised so that mobility and com-
vehicles, and those heading in the same direction as merce needs can be met while reducing the needs
the slow vehicle will warn drivers of this issue. to construct or expand new facilities (Department
Monitoring of traffic conditions. In a way of Transport, 2008). The capacity of the road
all vehicles could be regarded as a collection network is increased whilst at the same time by
of wireless sensors that share their information optimising the travelling speeds of an ensemble
locally and globally. Locally detailed models of of vehicles so that it is possible to optimise their
the environment could be built using distributed own efficiency i.e. fuel consumption. Applications
decentralized fusion techniques whilst globally that lie within the efficiency domain augment the
all data is collected by a server. Relevant infor- throughput of the road network that is the number
mation will be generated using centralized data of persons, goods, or vehicles traversing under
fusion and data mining techniques. This will be safety constraints.
broadcasted to the relevant areas with its integrity
ensured via statistical techniques.

207
The Localisation Problem in Cooperative Vehicle Applications

Use Case Traffic Jam: Speed Regulation Applications

Over a road segment, compared to the theoretical Communications and position information of all
speed on that segment the actual speed of vehicles vehicles in the road network enable its overall
on it is much slower. Ego state data from these dynamic observability. Therefore, as in any
vehicles is transmitted automatically to the nearest control problem, it could be possible to control
road side unit (RSU). This is compared statisti- the flow and hence optimise its capacity. Sample
cally and as a result the RSU starts to transmit to applications include:
the vehicles travelling along the same direction Synchronisation of Vehicle Speeds to Traffic
and within the neighbourhood of the segment Lights. The traversal of long roads controlled by
that there is a traffic jam. At the same time data traffic lights could be optimised by synchronis-
is uploaded to a central server in order to adapt ing the speed of the vehicles as they reach the
the speeds of the vehicles leading to that area or traffic lights so as to reduce the brusque speed
proposing alternative routes. Figure 4 shows a reductions and thus optimise flow and reduce
schematic representation of this situation. fuel consumption.
A major question resides on the number of Dynamic Platoons. Ensembles of vehicles hav-
vehicles necessary for such an application to be ing cruise control functions could be located in
viable. Floating car data could be available from platooning configurations so that they can travel
a limited number of vehicles (SV) as in Figure at faster speeds and uniformly. For this purpose,
4, which could transmit the relevant information the precise inter vehicle distances and speed in-
to other vehicles. In the figure it is possible to formation is important as well as certitude of the
observe that some SV vehicles establish links lane in which the vehicles are travelling.
with other vehicles, those traveling too close to Customised Lane Assignment. Vehicles of a
let them know the risk exists. certain class can be restricted or assigned to a
If more precise information is available with lane and their behaviour can also be monitored
respect to a lane in this section of the road, then if necessary. Long haul trucks will be kept on re-
only vehicles along this lane will be informed, stricted lanes at certain times of the year. Vehicles
however errors in the estimation of the alloca- participating in car pool schemes will be given
tion of the vehicles to a given lane could result priority on the use of fast lanes, etc.
on an increase of risk as the information will be
transmitted to the wrong vehicles resulting in Telematics
more congestion or even accidents.
Within the framework of this chapter, Telematics
applications comprise the conveying essentially
vast information over networks where nodes are
static and mobile, that is, information is provided
Figure 4. Traffic jam notification via service and content providers. The points of
interaction are infrastructure providers and to
IV IV SV SV
some extent Vehicle manufacturers. Figure 5
SV POV IV SV
shows a classical infrastructure for the provi-
sion of Telematics services where the consumer
POV SV SV POV POV POV

is centre on which the vehicle user will accept.


Traffic Jam
The interaction with the vehicle could be made
RSU
either with the vehicle in steady state conditions

208
The Localisation Problem in Cooperative Vehicle Applications

Figure 5. A sample structure for telematics ap- the proximity can be made. The transaction is peer
plications to peer and should reduce deployment costs.
Downloading of Multimedia Information.
Infrastructure points allow for the reception of
large amounts of information. This can be in the
form of music files, films or specific documents.
For this purpose due to the volume involved, it is
preferred to be implemented next to road infra-
structure elements and perhaps through different
RF (Radio Frequency) channels to those used in
ITS applications.
Updating of Navigation Information. The
provision of digital representations of the road
or in motion within the transmission range of network is a fundamental component in ITS appli-
road side units. cations. It allows for the use of a priori information
In a typical application, there are transactions that is not only used for car navigation purposes
either service or content which is communicated but also associated to information captured by
to the vehicle driver; for this it is sufficient to the vehicle onboard sensors so as to build models
know that the vehicle is within communication’s for situation understanding purposes. A major
reach during the transaction period. At the same problem today is the relevance and integrity of
time information from the vehicle could be up- this stored digital map information, that is, map
loaded. updating is a major issue and hence is a major
Telematics application.
Applications

The focus of the applications is transactions of all LocaliSAation CONSTtraint in


types where there is the exchange of information raltrafficENVIironm
and services. It can be triggered at the request of
the driver or proposed as the vehicle traverses next From the panorama of applications presented in
to a point of exchange in the infrastructure. In Section 2, it can be observed that it is not suf-
general Telematics related applications operate on ficient to know the position of the vehicles (with
transactions or information exchange and do not respect to a global navigation reference frame
include data linked to the immediate manoeuvr- like the WGS 84 geodetic datum) but expressed
ing of the subject vehicle. The degree of position relative to the road segment travelled by the ve-
information accuracy is low, as transactions are hicles. Current car navigation systems function
mainly done on a per zone basis, unlike safety in that manner that is the absolute position of
related applications where precise information of the vehicle estimated by a combination of data
the vehicle whereabouts is required. In this section from a GPS receiver, odometry, and a gyroscope
sample applications are only included: is related to the spatial representation of digital
Location Based Electronic Commerce. As roadmaps (nodes and links) via a process known
the vehicle enters a zone a series of services are as map-matching (Ardeshiri T. et al. 2006). This
provided e.g. the purchase of the local tourist allows the representation of the location of the
guide. This is downloaded upon payment via an vehicle with respect to the context, such as the
electronic wallet. The booking of an event within digital maps.

209
The Localisation Problem in Cooperative Vehicle Applications

In cooperative vehicle applications, this is like GPS. GNSS based location estimates are
fundamental as all information shared from other calculated by carefully timing the signals sent
vehicles or infrastructure will be fused in the by the constellation of satellites orbiting around
subject vehicle. That is the common denominator the Earth, which transmit messages based on a
is the spatial representation of the road geometry common time plus the satellite orbit. In prin-
and its attributes with respect to which any ad- ciple, four satellites are used in order to take
ditional information is enriched so as to create a into account time differences. The accuracy is
model of the environment that is used for machine dependent on the satellite position and signal
interpretable situation awareness for driving delay, the latter occurs due to inconsistencies in
conditions. atmospheric conditions (ionosphere). There are
Currently there are two major constraints on also ephemeris errors, satellite distortion and so
the deployment of cooperative applications: on, which will result in errors of the order of 10
to 15m. In urban conditions, as show in Figure
Map Accuracy 6, considerable errors could exist, which are the
results of multipaths (the bouncing of signals from
Maps are networks of nodes connected by links, neighboring buildings) or occlusion, that is, there
to which a series of attributes are assigned. Nodes is an insufficient number of visible satellites like
are described spatially with respect to an absolute in urban canyons. Since the errors can be large
reference frame to facilitate association with the as shown in Figure 6, an application might not
location estimates. Maps are mainly provided by work normally in such conditions.
two companies, namely TeleAtlas and Navteq. Figure 6 shows the trajectory of a vehicle
In these maps, all types of public traversable recorded using a high-end Inertial Measurement
roads should be detailed, which are built through Unit (IMU) coupled to a surveyor level GPS plus
several means including terrain surveys, the vehicle odometry in a loosely coupled manner.
purchase of existing maps and satellite data. It The quality of the IMU gyroscopes and acceler-
should be pointed that: Nodes are represented
within an accuracy of 15m/48ft for detailed City
and Connector Roads and within 100m/328ft
for Inter-Town. Only roads known as Advanced
Figure 6. Response of Automotive type GPS re-
Driving Assistance Systems (ADAS) compliant
ceivers in an Urban Canyon
have a spatial description of equal or less than 5m.
Further, changes to the road infrastructure have to
be reflected in the digital maps. Currently this is
difficult and map updates are long to take effect,
for example, a year could have transpired before
this information could be available to the user.
If the map is no longer relevant, the applications
relying on it will collapse.

Localisation Estimates

The location of a vehicle is estimated based on


the sole sources of absolute location information,
the Global Navigation Satellite Systems (GNSS),

210
The Localisation Problem in Cooperative Vehicle Applications

ometers allow for the estimation of the vehicle Localisation: A Combined Problem
trajectory with high precision, which is referred for Cooperative Vhicles Applications
to the ground truth, the continuous trajectory
in Figure 6. The other trajectories represent the In the previous sections it has been shown that
estimates of several COTS low cost GPS receiv- the localisation problem for cooperative vehicle
ers recorded at the same time. The response of applications is a combined problem as both map
each is very different and jumps up to 36 m were and location accuracy introduces constraints. An
recorded. The source of errors is mainly due to interpretation of these constraints on the applica-
multipaths and occlusion of GPS signals. To re- tions can be represented in the study by Guilleron
duce for the lack of GPS signals and compensate and Konnen and shown in Figure 7 (Gillièron P.Y.
errors, the fusion with the vehicle odometers plus & Konnen J. 2003).
gyroscope is made. However when large errors There is interdependency between the require-
occur or masking is over long periods, this type ments in terms of vehicle location estimations
of fusion is not sufficient, hence, the interest in and accuracy of the digital maps, that is, both
academia and industry to solve the localisation requirements need to be complied with. Safety:
problem (Lee K. W. 2007 & Toledo-Moreo R. et applications dealing with safety depend on the
al. 2007). precise localisation of the vehicle relative to the
However, GPS alone is insufficient because digital map. In this case, map-matching errors
estimation errors exists due to position The with longitudinal and lateral positioning errors
position calculated by a GPS receiver requires being inferior to 5 m are not allowed, particularly
the current time, the position of the satellite and in lane level accuracy where sub-meter level ac-
the measured delay of the received signal. The curacy is needed. Mobility: the requirements are
position accuracy is primarily dependent on the less stringent, and tolerated errors are less than
satellite position and signal delay. 8 m. The main constraint is to ensure that the
correct roads are identified and the correspond-

Figure 7. Distribution of localisation accuracy requirements per application domain. (Adapted from
Gillièron P.Y. & Konnen J. 2003)

211
The Localisation Problem in Cooperative Vehicle Applications

ing vehicles are associated to them. Efficiency: and the position. Considerations of latencies in the
accuracy in this case should be around the 10 m whole process are important as timing is crucial
mark, and the dynamic sharing of information for the relevance of the information. Further, most
between vehicles should reduce the need for information is spatial like the relative position of
higher accuracy levels. Contrary to the Safety the vehicles between each other or with respect to
related applications, Mobility and Efficiency ap- a road feature like an intersection. Errors in both
plications are concerned with larger numbers of time and location would render any application
vehicles distributed over large areas and thus the of sharing this information across the vehicles
requirements on knowledge of their presence in and infrastructure, which is no longer possible
these areas should be at times sufficient. Telemat- as uncertainty introduces potential liabilities or
ics: the requirements are different. They should safety hazards.
operate within a zone basis and also rely very To illustrate this section two sample cases
much on the identification of the vehicle within are considered: The first addresses the reaction
the application zone. The accuracy should be time and the vehicle location as applied to a road
around 15m. Most applications at the transaction intersection assistance application. In this case the
level are mainly large volumes of data. dependency of the relative position of the vehicles
related to their ability to stop in time is examined.
The purpose is to ensure that relevant vehicle(s)
Analyof SPSpatial n on stops to allow the respective vehicle to cross
rntati the intersection safely. The second case relates
to the vehicle location to its trajectory change
The spatial and temporal relationships between capabilities. The purpose is to demonstrate the
vehicles and their environment provide indications importance of location information with regard to
on whether or not a potential safety risk (collision) the vehicle context in terms of time and space. In
might exist. They are used as part of machine this case, the relevant information has to be sent
inferred situational analysis to trigger different to the vehicles concerned only in time so as to
driving assistance functions. Within this context become applicable. The scenario used is that of a
two important parameters could be considered: sudden blockage at a motorway exit that implies
Reaction time and Manoeuvre constraints. The that the pertinent vehicles within the immediate
first takes into account the vehicle overall response environment are made aware of the situation so
time including the driver and vehicle reaction they can take the most appropriate measures, like
times; it is specific to the time taken by a vehicle changing their trajectories.
to brake. The second considers the ability of the
vehicle to change its trajectory by including the Road Intersection Assistance
vehicle kinematic and dynamic constraints. Most
safety related driving assistance functions are The drawing in Figure 8 shows a typical situa-
based on the ability to warn drivers on time so tion that could occur as several vehicles converge
they can reduce their speed or move to a halt in towards an intersection. The vehicle running
time. That is to inform drivers of potential haz- the application is labelled as the Subject Vehicle
ards with sufficient time that eventually they are (SV), while the vehicles involved in the study
able to stop on time or reduce the vehicle speed are the Intruder Vehicle (IV), and the Power Two
so as to avoid any safety hazard situation. The Wheeler-motor bicycle (PTW). In the scenario,
same applies to the timely trajectory control that the SV has the right of way and the IV and PTW
is drivers need to manoeuvre at the correct time should respect the stop sign and reach a zero speed

212
The Localisation Problem in Cooperative Vehicle Applications

before the stop line. If the SV knows the position are two contextual parameters: One is the Time to
of the IV, PTW and other vehicles, as well as its Intersection (T2I), which is the interval that the
own with respect to the intersection, plus their SV or IV or PTW will need to arrive (stop) to the
corresponding speeds, it will be possible to know intersection after a given event. The T2I depends
if the vehicles could stop on time before entering on the vehicle initial speed, the environment and
the intersection. For this purpose it is possible the action that the driver will take. The other is
to estimate the braking distance of the relevant the Response time that governs the T2I. That is
vehicles (IV and PTW) and infer whether or not the timely response to external stimuli from the
the vehicles could stop on time. driver and vehicle. It shows whether it is necessary
It is assumed that the vehicles’ positions and to look ahead for a given speed and response time
the digital road map are accurate so it is possible (Myopia), and whether the response time is too
to estimate the vehicle speed and position with large for a given speed and look ahead (Latency
respect to the intersection whether or not the Problem). A complementary issue is throughput
vehicles could stop on time when required as in that is guaranteeing adequate sensory and pro-
the case of the IV and the PTW. cessing throughput. In a stand-alone perception
For a V2V or V2I application, a major consid- system, this refers to the processing needed in
eration is the time allocated to interact with the terms of resolution, stabilisation and occlusion
driver so a warning can be sent to the SV drivers compensation (Kelly, A. & Stentz, A., 1998).
on time as they arrive to the intersection. There Within a cooperative vehicle context, it should
include delays in the communication process.

Figure 8. Scenario depicting the arrival of several vehicles to an Intersection


DV

VRU

VRU

DV

PTW

POV IV HTv

S V = su b je ct ve h icle
IV = in tru sio n ve h icle
D V = d istra cte r ve h icle
H T V = h ig h to n n a g e ve h icle
V R U = vu ln e ra b le ro a d u se r
SV

P T W = p o w e r tw o w h e e l ve h icle
POV

213
The Localisation Problem in Cooperative Vehicle Applications

The distance to the intersection (D2I) for a whilst the latter is the manoeuvre time, indicated
stand-alone vehicle relates to the computational in equations (2) and (3), respectively.
reaction time and mechanical manoeuvrability.
It is the distance needed to arrive safely (stop or Tmanoeuvre = Tveh (3)
under a controllable speed) to the intersection, as
a reaction to observations on the environment. The distance travelled during the reaction time
For this purpose, the vehicle dynamics and the is calculated by the cruising speed and thus linear
spatial extent of both vehicle and the intersection in initial velocity, whilst the distance travelled
are considered. during the manoeuvre time will be quadratic, most
The response time governs most of the deci- likely, as the vehicle reaches a zero speed.
sions/actions; it can be defined as a perceive-think- For cooperative vehicles, if information is
act loop that models the overall vehicle control received from distributed sources (vehicles and
and planning system. The system response time, infrastructure), the cooperative system time Tcoop
is the time period between the instant an object should be added to the response time Tresp.
(entity) appears in the field of view (FOV) of the The actuation space of a vehicle is covered by
perception sensor and the instant the vehicle has a command vector (wrench) in terms of propulsive
completed the execution of the associate avoidance rotational effort (heading), propulsive linear effort
trajectory. In a cooperative system the FOV will (speed) and resistive linear effort (deceleration).
be the electronic horizon (EH) which is larger For the purposes of this analysis, the vehicle is
than the FOV. This time comprises: considered as a point object under the assumption
that there is an instantaneous response of actua-
• Tperc: perception time, includes detection/sens- tors to their commands.
ing the environment, location of the detected The total travelled distance (Sawo) is defined
object, recognition and understanding from the moment an event has been detected,
• Tplan: deciding what to do, which is the action the awareness that an event has occurred (e.g.
time allocated to the driver a warning message received, an object appears
• Tcom: commanding the actuators, e.g. brakes, within the horizon, an intersection is detected,
throttle, steering wheel etc.) to the time the vehicle moves to a halt. It is
• Tact: actuator response time, i.e. any time proportional to the vehicle cruising speed, stop-
lag between the input command and the ping distance, and driver reaction time. It is the
actuator response distance travelled by the vehicle during the reac-
• Tveh: vehicle response, associated to the tion time Treact times the vehicle cruising speed Vac
vehicle dynamics. plus the vehicle braking distance Sbrake.
To estimate the braking distance, it is assumed
Tresp = Tperc + Tplan + Tcom + Tact + Tveh (1)
that a full brake command is issued, when the
vehicle is travelling at a constant speed Vac in a
The total system response time is defined by
straight line. The sliding friction coefficient (µ)
equation (1):
between the vehicle and ground is taken as equal
to 0.65 when the road surface is wet, and equal
Treact = Tperc + Tplan + Tcom + Tact (2)
to 1 when it is dry. If there is a positive slope, the
vehicle will stop earlier and if this is negative, the
It is possible to distinguish the time before the
stopping distance will be longer. The road gradient
driver response including the actuator response,
(f) is incorporated and expressed in m/100m, as
from the time after. The former is the reaction time
this affects the braking distance when driving in

214
The Localisation Problem in Cooperative Vehicle Applications

irregular terrain (this might not be as important communicated to the driver. A similar analysis
when considering intersections). The expression can be made for a rural setting.
for the Braking Distance will be: The simple analysis has shown that even as-
suming ideal conditions there is a certain degree
Vac2 of uncertainty with respect to the vehicle response
Sbrake = (4)
2g( ± f ) and stopping times. However, when applications
are safety related, assumptions should be minimal
Vac2 or non existent.
S AWO = TreactVac + (5)
2g( ± f ) On an urban setting where road separation
Therefore, the response or travelled distance could be as little as, say 20 m, through intelligent
is: equation (5). map matching and assuming the availability of
The first term is the reaction distance, and the digital maps with an ADAS type accuracy (5m),
second the manoeuvre distance. The distances it will be possible to discriminate roads travelling
increase in a quadratic manner as a function of parallel to each other if the location estimation
the vehicle speed. Therefore, the separation in is under 5m.
stopping distances increases at higher Vac , further The longitudinal error once map matching ex-
the effects of Tresp can become predominant. For ists is a different problem. Latencies should exist
example, at a velocity of ~40 km/h the difference on the transmitted information. If the vehicle is
of 2 s in reaction time implies a brake distance dif- travelling at 40 km/h and the latency on the re-
ference of ~22 m; whilst at ~60 km/h the difference ceiver data at another vehicle is 200 ms, then the
is ~33 m. This has implications for cooperative travelled distance will be 2.2m. So if the vehicle
systems as the reaction time is dominated by the needs information at approximately 30 m before
whole perception process, communications and the intersection, the latency effects need to be
human response. A cooperative vehicle solution taken into account. If the error on the estimation
should not only optimise the communications and is 5m longitudinally, the total uncertainty will be
sensing component but also the driver reaction, 7m. On an urban setting an intersection would
this is a systems problem. could be as small as 10m, thus if a positive error
A preliminary analysis indicates that the of 7m exist, the vehicle might stop not at the entry
driver should be notified, by considering its point of the intersection but rather in the middle
reaction times say 2s for any individual and of it. The application based on these assumptions
3s for the elderly. Urban Vehicle speeds are 40 can result in a hazard rather than a driving aid.
Km/h ±20% and at secondary country roads (the Localisation has to be resolved locally, that is
equivalent of the D-type roads in France) are 70 to associate relative positions to a local model of
Km/h ±20%. the environment based on the digital road map,
When the vehicle is running in an Urban Set- where features are used to improve the vehicle
ting, the minimum Information distance is IUmin position as landmarks, a kind of assisted simulta-
= 28m and the maximum distance is IUmax = 55m. neous localisation and map building, as developed
The former occurs when the vehicle is approach- in (Lee K. W. 2007).
ing the intersection at a low speed and assumes a
fast driver reaction time, whilst the latter assumes Lane Change Manoeuvre
that the vehicle is moving at a higher speed and
the driver has a slower reaction time. This limits The drawing in Figure 9 shows a lane change
the distances at which information has to be manoeuvre of the SV as it approaches motorway
exit junction. The driver could choose to change

215
The Localisation Problem in Cooperative Vehicle Applications

Figure 9. Lane change manoeuvres

IV POV

SV DV

HTv

DV
to a slow lane and then take the exit junction. An matched on to the intermediate lane as shown in
alternative is for the SV to turn left and travel Figure 9 will be high. Therefore there might be
along the fast lane. Both situations are examined the wrong lane association of the IV vehicle in the
next with regard to a V2V driving assistance digital map and thus for the blind detection/lane
function. assistant application, it will be possible to give
First Case. The SV wants to take the exit the go ahead for the lane change manoeuvre; with
junction, thus moves from the middle lane to unexpected results.
the slowest lane and then takes the exit junction This case study shows the importance of
(blue trajectory in Figure 9). In the SV electronic good vehicle position estimates. In order to have
horizon or digital map, the presence of the motor a good lane discrimination, this needs position
bicycle (PTW), the IV, the POV, and DVs will errors under 0.5m if safety related estimates are
be represented as in the drawing assuming that needed. The combination of data from GNSS
there is a perfect estimation of the positions of receivers and proprioceptive sensors alone will
the vehicles and the representation of the road not suffice, as this provides mainly an absolute
geometry. Assuming that the position of the PTW position estimation with errors reaching with
could be estimated with an accuracy of 5m and much difficulty under 5m in all conditions par-
it is riding close to the middle lane. The width ticularly in urban areas. A different approach
of each of the lanes will be 4m. The PTW posi- is needed that measures relative position of the
tion uncertainty is shown in Figure 9, its current vehicle and provides sufficient data for a better
position marked using a green link which was discrimination like, for example, lane detection
matched to the second lane. In this case the elec- that will narrow very much lateral positioning
tronic horizon will represent wrongly the PTW errors and avoid for example the risks associated
and thus authorise the SV vehicle change lanes to the given examples.
with disastrous consequences.
Second Case. The SV wants so move onto
the fast lane, A correct representation of all the CONCLUS ION and DIS CUSS ION
components in the EH horizon will only be pos-
sible if the precision of the location estimates This chapter has focused on the constraints im-
and digital road map are accurate. A critical posed by the needs for precise vehicle localisation
entity for this manoeuvre is the lane position of estimates to be able to deploy vehicles with com-
the IV vehicle. Again if the position uncertainty munications capabilities in real traffic conditions.
is say 5m, the likelihood for the IV vehicle to be It has been written from a practical perspective

216
The Localisation Problem in Cooperative Vehicle Applications

based on the analysis of use cases to infer some Despite the referred constraints there is a strong
results. These reflect the interest on them by major potential on the use of communications technolo-
stakeholders in the domain. gies for vehicle safety applications. Constraints
V2V and V2I safety applications are complex, will be overcome through the use of embedded
and the problem does not limit to communications machine intelligence as well as complementary
capabilities. It involves spatial information with exteroceptive and proprioceptive sensors onboard
respect to the vehicles’ locations relative to each passenger vehicles, bringing opportunities not
other and the infrastructure, and their representa- only for safety applications but also to optimise
tion on the only source of common data across traffic flow, reduce fuel consumption and pol-
the system, feature-rich digital road maps. Time lution.
is a very important parameter, it imposes the It is likely that within the next future links
relevance of the information shared, as scenarios between infrastructure and vehicles should led
are very dynamic, that is information corresponds to the creation of intelligent spaces, where the
to specific instances of time. Information needs sharing of information amongst all actors should
to be associated in a spatial manner, for example be widespread. Each actor has the potential of be-
the location of a vehicle, an obstacle or road works coming a sensor providing sufficient information
to a lane or road segment. to build digital representations of the world to be
The deployment of advanced functions in the used to enhance the drivers’ situational awareness
automotive domain is constrained by cost, a major and lead to the deployment of advanced driving
issue for automotive OEMs. The estimation of a assistance functions that may even lead to the
vehicle position using low-cost components results autonomous functions.
on estimates with errors reaching more 10 m in
urban conditions. Applications that require that
the estimated position should be less than one RE
metre (e.g. need for lane discrimination), implies
that their deployment will be difficult using cur- Ardeshiri, T. et al. (2006). Offset Eliminative
rent solutions. Localisation estimates should be Map Matching Algorithm for Intersection Ac-
relative to the area being traversed by the vehicle tive Safety Applications. Proceedings Intelligent
and/or with respect to the other vehicles. For Vehicles Symposium IV2006, Tokyo.
this purpose, features on the environment in the
Arem, B. van, Driel, C. van., & Visser, R. (2006).
form of landmarks need to be used to increase
The Impact of Cooperative Adaptive Cruise
the localisation of the subject vehicle. The avail-
Control on Traffic-Flow Characteristics. IEEE
ability of beacons like those provided by UWB
Transactions On Intelligent Transportation Sys-
communications should also contribute to solve
tems, 7(4).
this problem. Another constraint resides on ac-
curacy of the digital road maps and their constant Broughton, J., & Walter, L. (2007). Trends in fatal
update, as all positions are expressed with respect car accidents: Analysis of CCIS Data (Published
to these maps. Currently only major roads have project report PPR 172). TRL Limiter.
accuracies less or equal to 5m, because it is eco-
Cook, J. A., Kolmanovsky, I. V., McNamara,
nomically difficult to extend them to all roads as
D., & Prasad, K. V. (2007). Control, Comput-
well as to make them more accurate. Therefore
ing, and Communications: Technology for the
this constraint has to be also included as part of
twenty-first century Model T. Proceedings of
the design of V2V and V2I applications.

217
The Localisation Problem in Cooperative Vehicle Applications

the IEEE Special Issue Advanced Automobile Lee, K.W., Wijesoma, S., & Ibanez-Guzman, J.
Technologies, 95(2). (2007). A constrained SLAM approach to robust
and accurate localisation of autonomous ground
Cui, Y. J., & Ge, S. S. (2002). Autonomous ve-
vehicles. Robotics Autonomous Systems, 55.
hicle positioning with GPS in Urban Canyon
environments, IEEE Transactions in Robotics Madhavan, R., Messina, E. R., & Albus, J. S.
and Automation, 19. (2007). Intelligent Vehicle Systems: A 4D/RCS
Approach. New York: Nova Science Publishers.
CVIS Project Partners. (2008). Retrieved June
2008, from http://www.cvisproject.org Papp, Z., Brown, C. L., & Bartels, C. (2008). World
Modeling for Cooperative Intelligent Vehicles.
Defense Advanced Research Projects Agency
Proceedings 2008 IEEE Intelligent Vehicles
(2008). Retrieved June 2008, from http://www.
Symposium, IV2008, Eindhoven.
darpa.mil/grandchallenge/index.asp
SAFESPOT Project Partners. (2008). Retrieved
Department of Transport. (2008). Retrieved June
June 2008, from http://www.safespot-eu.org
2008, from http://www.itslessons.its.dot.gov/
Schlingelhof, M., Betaille, D., Bonnifait, P., &
Gharavi H., Prasad K. V., & Ioannou P.A. (Eds.),
Demaseure, K. (2008). Advanced positioning
(2007). Special issue Advanced Automobile Tech-
technologies for co-operative systems. IET Intel-
nologies. Proceedings IEEE , 95(2).
ligent Transportation Systems, 2(2).
Gillièron, P. Y., & Konnen, J. (2003). Enhanced
Srini, V. P. (2006, December). A vision for sup-
Navigation System for Road Telematics. In Pro-
porting Autonomous Navigation in Urban Envi-
ceedings the Third Swiss Transport Research
ronments, IEEE Computer.
Conference, (STR 03), Ascona/Ticino.
Toledo-Moreo, R. et al. (2007). High-Integrity
Kelly, A., & Stentz, A. (1998). Rough Terrain
IMM-EKF-Based Road Vehicle Navigation With
Autonomous Mobility - Part 1: A Theoretical
Low-Cost GPS/SBAS/INS. IEEE Transactions on
Analysis of Requirements. Autonomous Robots,
Intelligent Transportation Systems, 8(3).
5.
Wang, H., Xu, J., Ibañez-Guzmán, J, Jarvis,
Laugier, C., Vasquez, D., Yguel M., Fraichard Th.
R., Goh, T., & Chang, C. W. (2000). Real Time
& Aycard O., (2008). Geometric and Bayesian
Obstacle Detection for AGV Navigation Using
Models for Safe Navigation in Dynamic Environ-
Multi-baseline Stereo. In D. Rus & S. Singh
ments. Intelligent Service Robotics 1(1).
(Eds.), International Symposium on Experimental
Lee, K. W. (2007). Autonomous vehicle navigation Robotics Lecture Notes in Control and Informa-
in neighbourhood environments: A map assisted tion Sciences, 271. Springer.
and a feature-based approach. Unpublished
doctoral dissertation, Nanyang Technological
University.

218
219

Chapter XII
An Overview of Positioning and
Data Fusion Techniques Applied
to Land Vehicle Navigation
Systems
Denis Gingras
Université de Sherbrooke, Canada

ABSTRACT

In this chapter, the authors will review the problem of estimating in real-time the position of a vehicle
for use in land navigation systems. After describing the application context and giving a definition of the
problem, they will look at the mathematical framework and technologies involved to design positioning
systems. The authors will compare the performance of some of the most popular data fusion approaches
and provide some insights on their limitations and capabilities. They will then look at the case of ro-
bustness of the positioning system when one or some of the sensors are faulty and will describe how the
positioning system can be made more robust and adaptive in order to take into account the occurrence
of faulty or degraded sensors. Finally, they will go one step further and explore possible architectures
for collaborative positioning systems, whereas many vehicles are interacting and exchanging data to
improve their own position estimate. The chapter is concluded with some remarks on the future evolu-
tion of the field.

INTRODUCTION are (vehicle position) and we also need to locate


obstacles and other objects/vehicles in the vicinity
The field of automotive positioning systems has and nearby environment of our own vehicle. So an
become a research topic in full rise these last few approach able to precisely localize our vehicle and
years. Generally speaking, positioning informa- evaluate its environment on the road is required
tion in road transportation is of prime importance to increase safety (Drane & Rizos, 1997). Apart
for safety reasons. We need to know where we from safety issues, the next generation of vehicles

Copyright © 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
An Overview of Positioning and Data Fusion Techniques Applied to Land Vehicle Navigation Systems

will allow the driver and passengers to have access and 2 or 3 axis inertial measurement units (IMU).
to a broad range of services, such as path plan- Two or more of these complementary positioning
ning, navigation, guidance and tracking, which sensing methods must be integrated together to
are based on information technologies, telecom- achieve the required performance at low cost.
munications and telematics. Future vehicles are The data integration, which implies the fusion of
likely to be as well mobile offices, information noisy signals provided by each sensor, must be
centers on wheel, or e-nodes connected to the performed in some optimal manner. Basically the
web and other networks (Kim, Lee, Choi & al., goal of data fusion in positioning systems is 1) to
2003). To supply those services and to provide the fill in the time gaps whenever we face a loss of
adequate information contents to the driver and position estimate and 2) to improve the position
passengers, it is required to determine in real-time estimate by ensemble averaging and exploiting
the vehicle’s position as accurately and efficiently information redundancy. Historically, data fusion
as possible. This function is an essential part of an for positioning has been applied in robotics (Rou-
integrated navigation information system (INIS). meliotis & Bekey, 2000, Durant-Whyte, 1994) as
An INIS embedded in a vehicle is basically com- well as in military, space and avionic applications
posed of a geographic information system (GIS), (Suresh & Sivan, 2004). Multi-sensor data fusion
a database composed of roadmaps, cartographic system design based on rapid prototyping software
and geo-referenced data, a positioning module, platform and Kalman filtering for land navigation
a human-machine interface (HMI) as well as has also been proposed (Abuhadrous, Nashashibi,
computing and telecommunication capabilities. Laurgeau & Chinchole, 2004, Redmill, Martin &
It provides useful functionalities to the driver like Özgüner, 2000). Hence, with the advent of more
path planning, guidance, digital map and points powerful, accessible and cheaper technologies
of interest directory (Farrell & Barth, 1999). The embedded in vehicles for road transportation, on-
guidance module uses a planned trip to indicate board navigation systems are becoming feasible
the driver which route to take. To avoid giving and standard in the automotive industry.
wrong indications and impair driving safety, The chapter is constructed as follow. After the
the navigation system relies upon a positioning present introduction, we will look at the specific
module to know precisely and continuously the problem of vehicular positioning and localization,
localization of the vehicle. In this chapter, we will what are the systems and sensors available to
focus on the positioning module of INISs. do it and what are the problems to be solved. In
Nowadays, the most popular sensor used for the following section, we will consider the most
positioning is a global positioning system (GPS), common data fusion architectures when multiple
also called a GPS receiver. However, GPS alone positioning sensors are used. Positioning system
based systems suffer from various problems such designers usually choose the Kalman filter or a
as poor data latency, signal multipath errors and variation thereof as the data fusion method. We
occlusions of satellite signals. To alleviate these will then look at the various implementations
problems and obtain the required performance of possible, such as the extended Kalman filter
the positioning module, we usually use a com- (EKF), the unscented Kalman filter (UKF) (St-
bination of heterogeneous and complementary Pierre & Gingras, 2005) and particle filters (PFs)
sensors whose measurements are integrated or (Arulampalam, Maskell & al., 2002), which are
fused in real time (Cannon, Nayak & al., 2001, generalizations or variations of the Kalman filter
Grewal, Weill & Andrews, 2001). Among the other used to cope with nonlinearities of the sensors or
types of sensors, we have Distance Measurement with non-gaussianity of the signals. To complete
Indicators (DMI), such as differential odometers, the survey, we will also present an interesting

220
An Overview of Positioning and Data Fusion Techniques Applied to Land Vehicle Navigation Systems

alternative to classical Kalman filtering based lenges ahead and what can be expected for future
on the use of artificial neural networks (NNs) positioning systems. Some general comments are
(St-Pierre & Gingras, 2004). provided along with proper references.
After having surveyed those various data
fusion approaches and their respective perfor-
mances, we will then focus our discussion on the CONTEXT AND PROBLEM
reliability and robustness requirements for a real SATEMENT
time positioning system. In positioning naviga-
tion systems, at any time, any of the sensors can Modern automotive navigation applications
break down or stop sending information properly, require position estimates with a precision of 1
temporarily or permanently. To ensure a practical meters or less and at a frequency of 1 Hertz or more.
solution for use in guidance and navigation sys- Basically three types of positioning architecture
tems, faulty sensors must be detected and isolated can be used to locate a vehicle in its environment
such that their erroneous data will not corrupt the (Laneurit, Blanc & al., 2003)
global position estimates. As we just mentioned, The first type involves absolute localization,
Kalman filter is usually popular for data fusion that is, a global position of the vehicle is given in
applications. However, an interesting idea is to the world reference by some exteroceptive sensors
use it for fault detection architecture as well. We such as a GPS receiver. The performance obtained
will then evaluate the potential of combining fault often depends on satellites visibility and actual
detection and data fusion into a single architecture satellites configuration at the time of measure-
to make a robust positioning navigation system ment. Good satellites configuration are one which
(Guopei & Gingras, 2007). present a sufficient elevation angle, a good signal
In the subsequent section, we will then con- to noise ratio and a good geometrical configuration
sider the possibility to achieve a distributed col- of the satellites. A differential GPS receiver alone
laborative architecture. Proliferation of real time could in principle estimate the position with the
inter-vehicular communications provides new required performance. However, it is still much
sources of exploitable positioning data. Vehicles too expensive for automotive applications and
can, under numerous situations, have GPS satel- the fixed references are not always available. On
lite shortages but there will always be vehicles the other hand, a low cost GPS receiver cannot
in their vicinity, viewing different GPS satellites always achieve the required precision and reli-
line of sights (LOS), to provide them with useful ability as it suffers multipath signal propagation
navigation information. We will thus look at a and frequent signal outages, most specifically in
cooperative positioning technique making use urban areas.
of reliable positions of some vehicles to enhance The second type involves relative localiza-
positioning estimates of some others (Abdessa- tion, that is, when the position and orientation
mie & Gingras, 2008). The approach, based on of the vehicle are determined from its previous
a simple idea, exploits inter-vehicle data flow to position. Integrative sensors, like odometers and
extract good position measurements from vehicles inertial systems, are commonly used in relative
with good GPS satellite LOS, in order to enhance positioning. This type of measurement, however,
low positioning accuracy of other vehicles, in the involves time derivation. We therefore observe a
neighborhood. The integration of such information rapid divergence of the localization when distance
is done using geometric data fusion approach. increases due to cumulative errors in the estimate.
Finally, we conclude the chapter with a discus- This is the main drawback of this family of sen-
sion on future trends in the field, what are the chal- sors. Two popular sensors used are the differential

221
An Overview of Positioning and Data Fusion Techniques Applied to Land Vehicle Navigation Systems

odometer and the inertial measurement unit (IMU) Figure 1. Centralized data fusion architecture
(Abbott & Powell, 1999). A differential odometer
GPS
measures the distance traveled by a vehicle and
the current azimuth during a sampling period. IMU Fusion Estimated
An inertial measurement unit (IMU) measures Odometer Method Position
the vehicle’s inertia characterized by its accelera-
Inclinometer
tion and its angular velocity. An IMU measures
the acceleration and the angular velocity along
the axis of a Cartesian coordinate system. With
these two sensors, the position of the vehicle is One important issue is data registration and
reckoned by applying basic kinematics’ equations latency correction. Odometer and INS signals
and using an initial position obtained from another are received with a nearly constant latency (this
information source. By means of integration, the error is usually far less than lms). However, GPS
traveled distance and the azimuth variation can positioning calculation time and reception delay
be computed and therefore a new position can may vary largely. Fortunately, it is possible to
be obtained with these measurements and the calculate those delays using the Pulse Per Second
last known position by dead reckoning. The esti- GPS signal and introduce them in the data fusion
mated position will eventually drift from the real algorithms. When the latency of the GPS data is
position because of the accumulation of errors. low, the position information can be propagated
Indeed, the recursive nature of the positioning forward using the velocity data and a constant
computation with the IMU causes the positioning vehicle velocity model. This is usually adequate for
error to grow proportionally with time. Typically, slow moving vehicles. Problems occur, however,
DMIs (odometer/IMU) can cumulate a drift in when the latency of the GPS data is high and the
the position estimate of the order of 10m to 15m vehicle’s dynamic is fast. For example, if the GPS
after ten minutes of integration. A periodic reset latency is 0.2s and the vehicle is travelling at 30
of those relative localization systems is therefore m/s (110 km/hr), then the vehicle will move six
needed. meters ahead while storing the IMU data. If the
The third type of positioning architecture vehicle is moving at constant speed following
consists of a hybrid form of localization, that is, a straight path, then the position estimate can
this method combines the two previous ones in simply be adjusted forward accordingly. However,
order to cumulate their advantages and to allevi- any curve or any deviation from a straight line
ate their drawbacks. The third type, which we will lead to incorrect position estimates. Simple
will consider from now on, implies data fusion straight GPS correction is not sufficient in that
from the various sensors. A trivial way to fuse case and a more sophisticated latency correction
the data from these two sensors is therefore to algorithm is required before applying and fusing
reset periodically the IMU position estimate with the GPS data with the current inertial state.
an absolute position estimate from the GPS. A The sensors’ measurements are also distorted
more complex fusion method than reckon/reset by deterministic and random errors. Those sources
positioning system described above is required of random errors are usually described using
to improve the precision of the estimation. These stochastic models in a statistical framework. The
methods fuse continuously the available measure- estimate ideally maximizes the a posteriori prob-
ments in some optimal sense, as depicted in figure ability of the random variable position, resulting
1 in a centralized architecture. from the mathematical transformation of the

222
An Overview of Positioning and Data Fusion Techniques Applied to Land Vehicle Navigation Systems

stochastic processes, which model the sensors’ navigation information using dead reckoning.
imperfect measurements. The fusion method then Detailed relationships between the position and
defines the mathematical transformation. The typical sensors are shown in Table 1.
architecture of data fusion system for positioning
can be decentralized or centralized. In the central- GPS Model
ized architecture, all the sensor measurements are
fused by one fusion method only. So it is easy to The GPS model can be described by equation (1)
compare the performance of two different fusion (Farrell & Barth, 1999).
methods when the cluster of sensors is the same.
Before looking into the details of data fusion
architectures, we will now look at the different ρ̂[t] = ρ[t] + δtrop[t] + δiono[t] + δwhite[t] + δmult[t] (1)
sensors available for localization.
where ρ̂[t] is the pseudo-range measured by the
emulated receiver, ρ[t] is the real pseudo-range,
SENSORS MODELS δtrop[t] is the tropospheric delay, δiono[t] is the iono-
spheric delay, δwhite[t] is the white noise generated
In a positioning navigation system, various sen- by the receiver’s electronic components and δmult[t]
sors are used. Generally speaking, a sensor is is the multipath problem.
a device that responds to or detects a physical
quantity and transmits the resulting signal to a IMU Model
controller. Positioning sensors can be designed to
detect various parameters (coordinate, distance, The 3-axis inertial measurement unit has a single
direction, or angular velocity) of the position of model for every gyroscope and accelerometer
vehicular mechanical systems. Sensors can pro- described by equation (2), (Grewal, Weill &
vide absolute or relative navigation information. Andrews, 2001).
GPS and magnetic compass provide absolute
position and angular direction (azimuth) respec- dˆi [t ] = di [t ] + si (di [t ] + d j [t ]*sin(δij )
tively, whereas all other sensors provide relative t
+ d k [t ]*sin(δik )) + bi [0] + ƒ wbi [n]
n =1

+ d j [t ]*sin(δij ) + d k [t ]*sin(δik )
Table 1. Relationship of vehicle position and
sensor outputs +ci (di [t ] + d j [t ]*sin(δij ) + d k [t ]*sin(δik )) 2
+ wi [t ],
Sensor Output Relation to position
(2)
Directly output posi-
GPS Rover position
tion coordinates
Outputs can be where dˆi [t ] is the measurement, di[t]is the real
IMU
Accelerations and integrated by an INS value, si is the scale factor error, dj[t] is the real
angular rate to obtain the vehicle
position value relative to the axis j, dk[t] is the real value
relative to the axis k, δij is the misalignment angle
Distance or incre- Position coordinates
Odometer
ment of distance are determined by between the axis i and j, δik is the misalignment
dead reckoning from angle between the axis i and k, bi[0] is the turn-
Inclinometer Inclination the distance and
direction relative to on bias, wbi[n] is the random walk white noise
Magnetic
compass
Azimuth a known location characterizing the bias drift, ci is the non-linear

223
An Overview of Positioning and Data Fusion Techniques Applied to Land Vehicle Navigation Systems

scale factor and wi[t] is the additive white noise characterizing the tire dilatation, sd and sg are
component. the scale factors for the right and the left wheel
The scale factor error, the bias parameters, respectively, cd[t] and cg[t] are the numbers of
the non-linear scale factor and the additive white rotations measured within the interval [t-1,t]
noise component have different values depending for the right and left wheel respectively, r[t] is a
on the sensor type. uniform random variable describing the resolu-
tion error, θ̂[t] is the azimuth estimated at time t,
Differential Odometer Model θ̂[t – 1] is the azimuth estimated at time t-1 and l
is the axle length.
DMIs consist of wheel rotation sensors, such as
differential odometers and ABS (anti-breaking
systems) sensors (Bonnifait, Bouron, Meizel, & Data fuSIion TECHNIQUES
Crubille, 2003). Those are the one usually used
in automotive localization systems. The wheel The Kalman Filter
revolutions are integrated from them to measure
the total distance traveled by the vehicle. Given The most basic data fusion method for localization
time information traveled, a forward velocity is is based on the Kalman filter (Kalman, 1960). It
determined. As opposed to GPS receivers, DMIs is a set of mathematical equations that provides
are not subject to signal masking or outages. an efficient computational means to estimate the
However the positioning errors cumulate with state of a process, in a way that minimizes the
time, as is the case for the IMUs. A differential mean square error. This filter is very powerful
odometer is constituted of two sensors measuring in several aspects: it supports estimations of
the number of rotation of each wheel situated on past, present, and even future states, and it can
the same axle. The total traveled distance and the do so even when the precise nature of the mod-
azimuth of the vehicle can be computed with the eled system is unknown. The Kalman filter is an
equations (3) and (4) respectively. optimal linear estimator, which uses the a priori
information on the sensor noise sources, the ve-
dˆ[t ] = dˆ[t − 1] + hicle dynamic and the kinematics equations to
(1 + vd * v[t ] + sd ) * cd [t ] + r [t ] compute recursively an optimal position, while
+ minimizing the mean square error (Gelb, 1974).
2
(1 + vg * v[t ] + sg ) * cg [t ] + r[t ] The filter is optimal when the process noise and
(3) the measurement noise can be modeled by white
2
Gaussian process. The recursive implementation
of Kalman filters is well suited to the fusion of
θˆ [t ] = θˆ [t − 1] +
data from different sources at different times in
(1 + vg * v[t ] + sg ) * cg [t ] + r [t ] a statistically optimal manner.

l Many other filter designs can be shown to
(1 + vd * v[t ] + sd ) * cd [t ] + r[t ] (4) be equivalent to the Kalman filter, given several
,
l constraints. The recursive sequence involves pre-
diction and update steps. The prediction step used
where d̂[t] is the total traveled distance at time t, a dynamics model that describes the relationship
d̂[t – 1] is the total traveled distance at time t-1, between variables over time. A statistical model of
v[t] is the car’s velocity, vd and vg are the gains this dynamic process is also necessary. A predic-
tion is usually done to estimate the variables at the

224
An Overview of Positioning and Data Fusion Techniques Applied to Land Vehicle Navigation Systems

time of each measurement, as well as in between a Kalman filter requires a great deal of work in
measurements when an estimate is required. The understanding the physics and electronics involved
measurement update combines the historical data in each sensor to understand what the error sources
passed through the dynamics model with the new will be. A comprehensive model of all of the nec-
information in an optimal fashion. The Kalman essary variables to match as closely as possible
filter addresses the general problem of trying the real world phenomenon is needed. Given the
to estimate the state x ≠  R n of a discrete-time specifications of the project, a sensitivity analysis
controlled process that is governed by the linear would then be done to decide which variables
stochastic difference equation We then have, may be ignored or lumped together. This often
involves Monte Carlo simulations with several
xk + 1|k = Φk + 1|k[xk|k] + wk (5) likely candidate filters and repeated tuning of the
statistics. The filter must be able to operate with
zk + 1 = Hk + 1|k[xk + 1|k] + vk + 1, (6) the allowed throughput and processing restric-
tions. Finally, blunder detection, adaptive filter
where xk + 1|k is the predicted process state vector, gains, and practical limits to covariance must be
xk|k is the estimated process state vector, Φk + 1|k is set to achieve optimum performance.
the discrete state transition matrix from k to k+1, The Centralized Kalman Filter (CKF) is the
wk is the process noise vector, vk + 1 is the measure- most common filter design implemented in inte-
ment vector, Hk + 1|k is the observation matrix and grated navigation systems. However, it behaves
vk + 1 is the measurement noise vector. Supplied poorly in the presence of nonlinearities. In the
with initial conditions PO and xO, the prediction following sections, we will look into more details
equations can be given by of the use of the various improvements possible
over the basic Kalman filter for an integrated
xˆk−+1 = φk xˆk (7) navigation information system.

Pk−+1 = φk Pk φTk + Q k (8)


The Extended Kalman Filter
and the update equations are given by
Improvement of the basic Kalman filter architec-
ture can be achieved in nonlinear situations with
K k = Pk− H kT (H k Pk− H kT + Rk )
−1
(9) the extended Kalman filter (EKF) (Anderson B.
& Moore J.,1979, Brown R. G. & Hwang P. C.,
xˆk = xˆk− + K (zk − H k xˆk− ) (10) 1997). This filter is based upon the principle of
linearizing the state transition matrix and the
Pk = (I − K k H k )Pk− , (11) observation matrix with Taylor series expansions.
The extended Kalman filter has been very popular
Where x̂ is the vector of estimated states, P is the for land navigation system (Abbott & Powell,
covariance of estimated states, Q is the dynam- 1999, Wu, Gao & Wan, 2002, Redmill, Kitajima
ics noise matrix, K is the Kalman gain matrix, & Özgüner, 2001). The equations of a centralized
R is the covariance matrix and z is the vector of data fusion architecture based on an extended
observations. Kalman filter for land navigation positioning
Although an error state Kalman filter is desir- system are described in (Abbott & Powell, 1999).
able in some applications, a state space model will As with the Kalman filter, the extended Kalman
be preferred here as it most clearly illustrates the filter predicts the states of the random process us-
operation of the filter. Rigorous development of ing equation (5). The predicted states are updated
with the measurements in equation (6).

225
An Overview of Positioning and Data Fusion Techniques Applied to Land Vehicle Navigation Systems

Box 1.

 aR   cos(Φ y )*cos(Φ p ) − sin(Φ y ) cos(Φ y ) *sin(Φ p )   aN 


… … ⁄
… aP ⁄⁄ = … sin(Φ y ) *cos(Φ p ) cos(Φ y ) sin(Φ y ) *sin(Φ p ) ⁄ * …
aE ⁄⁄ (12)

 aY ⁄ …
…  − sin(Φ p ) 0 cos(Φ p ) ⁄ …
  aD ⁄

In our study presented in (St-Pierre & Gingras, tion of the extended filter can be quite laborious
2005), we have 13 states to describe the random depending on the number of states required to
process. A position-velocity-acceleration model is model the system. For all these reasons, a recent
used for each component of the position (Brown improvement to the EKF, named the “unscented”
& Hwang, 1997). The last four states include the Kalman filter (UKF) has been proposed (Julier
slope, the pitch, the azimuth and the yaw velocities. & Uhlmann, 1997).
The state transition matrix Φk + 1|k is linear. Only
the observation matrix Hk + 1|k contains nonlinear The Unscented Kalman Filter
equations, the most relevant for horizontal posi-
tioning is described by equation (12). (See Box The UKF approximates the posterior probability
1), where aR, aP, aY are the acceleration vector density resulting from the nonlinear transforma-
components along the roll, the pitch and the yaw tion of a random variable instead of approximat-
axis respectively, Φp and Φy are the Euler angles for ing the nonlinear functions with a Taylor series
the pitch and the yaw axis respectively, aN, aE, aD expansion. The approximation is done by evaluat-
are the acceleration along the north axis, the east ing the nonlinear function with a minimal set of
axis and the down axis respectively. The extended carefully chosen sample points using a determin-
Kalman filter approximates the nonlinear matrix istic sampling approach. The posterior mean and
H based on the Taylor series expanded about the covariance estimated from the sample points are
estimated state vector with: accurate to the second order for any nonlinearity
(Merwe, Freitas & Wan, 2000). If the priori ran-
∂H [ xˆk k ] dom variable is Gaussian, the posterior mean and
H [ xˆk +1 k ] ≈ H [ xˆk k ] + ( xˆk +1 k − xˆk k ) covariance are accurate to the third order for any
∂xˆk k
nonlinearity (Wan & Merwe, 2000). The first use
(13) of an unscented Kalman filter for land navigation
positioning system is described in (Julier, 1997).
The linear approximation often introduces large Apart from our work (St-Pierre & Gingras, 2005),
errors in the estimated state vector and can lead one paper has been recently written on the use of
to the divergence of the filter. As expected, the the unscented Kalman filter as the fusion method
linearization can lead to poor performance and in an integrated navigation information system
divergence of the filter for highly non-linear (Li & Leung, 2003). An unscented Kalman filter
problems. In addition, the performance analysis has also been used for GPS positioning (Mao,
of the extended Kalman filter presents some Wada & al., 2003).
difficulties due to the recurrence of the measure The unscented Kalman filter is based on the
sequence into the states of the filter (Grewal, unscented transformation, which is a method
Weill & Andrews, 2001). Finally, implementa- for reckoning the statistics of a random variable

226
An Overview of Positioning and Data Fusion Techniques Applied to Land Vehicle Navigation Systems

undergoing a nonlinear transformation. A set of real vehicle position whose coordinates are given
2*nx+ 1 weighted samples are deterministically by the latitude and the longitude.
chosen to capture the true mean and variance of In (St-Pierre & Gingras, 2005) we gave detailed
the prior random variable. results showing that the unscented Kalman filter
has slightly better results for horizontal positioning
nχ = nx + nw + nv (14) than the extended Kalman filter. The estimated
position is less biased for the unscented Kalman
where nx is the number of process states, nw is filter than for the extended Kalman filter. It shows
the dimension of wk and nv is the dimension of also that the unscented Kalman filter is more pre-
vk. The unscented Kalman filter approximates the cise than the extended Kalman filter. However,
nonlinear observation matrix by contrary to the claim in (Merwe, Freitas & Wan,
2000), (Wan & Merwe, 2000), we found that the
2*nχ
computational cost of the unscented Kalman
H [ xˆk +1 k ] ≈ ƒ Wi * H [χix,k +1 k ] + χiv,k +1 (15)
i =0
filter is significantly greater, by a factor larger
2*nχ than 20, than the one of the extended Kalman
Where, ˆk +1are
H [ xW i k ƒ
] ≈the weights,
i =0
x
Wi * H [χi ,k +1 k ]are v
+ χthe
i , k +1sigma
filter. The significant execution time difference is
related to the number of times equations (5) and
2*nχ points describing the prior predicted states and
ƒi =0
Wi * H [χix,k +1 k ] + χiv,k +1 are the sigma points describing the mea- (6) are evaluated for each fusion algorithm. With
the unscented Kalman filter, these equations are
surement noise.
In order to obtain statistically reliable data on evaluated 75 times, once for each sigma point.
the performance of both algorithms, one hundred With the extended Kalman filter, the Taylor series
Monte Carlo simulations have been run for each expansion of these equations is evaluated only
sensor fusion method (St-Pierre & Gingras, 2005). once at each iteration. Furthermore, the Jacobian
For each sampling time, the estimated positions of the matrix H used in the Taylor series expansion
from the Monte Carlo simulations form the sam- is calculated only once because the observation
pling distribution. There were 26639 measurement equations are static. Thus the multiple computa-
vectors for each Monte Carlo simulation. These tions of equations (5) and (6) by the unscented
sampling distributions approximate the truth Kalman filter at each iteration is responsible for
continuous distributions of the posteriori random the larger computational cost.
variables describing the estimated positions. The Surprisingly, we found that the unscented Kal-
first moment of each sampling distribution has man filter is less performing than the extended Kal-
been computed and used for the computation of man filter when there is no GPS solution available
the performance metrics. The two performance (St-Pierre & Gingras, 2005). In that situation, the
metrics usually encountered in data fusion systems acceleration of the vehicle measured by the IMU
analysis are the accuracy/precision of the fusion is used to estimate the vehicle’s position described
and the computational time to perform the fusion. by equation (12). This equation represents the
The accuracy is evaluated by taking the Euclidian nonlinear transformation of the estimated states
distance between the estimated position and the which are assumed to be Gaussian random vari-
true position. The mean and the variance of the able in order to predict the IMU measurement.
Euclidian distances for the whole simulation are The performance of both filters depends on their
reckoned. The variance describes the precision capacity to estimate the mean of the resulting
of the fusion method. The horizontal position is random variable. An empirical analysis has been
described by the tangential plane located at the made to evaluate this capacity. In this experiment,
each state has been modeled by a discrete Gaussian

227
An Overview of Positioning and Data Fusion Techniques Applied to Land Vehicle Navigation Systems

random variable with 100 realizations distributed important. However, due to the low dynamics of
uniformly in the range of possible values with a the vehicle, most of this variation is not important
99% probability of realization. Each realization enough to generate a significant linearization er-
is present a number of times proportional to its ror for the EKF.
probability of realization in the statistical data
representing the probability function. Thus, The Particle Filter
24060 samples modeled each random variable.
The nonlinear function described by equation More recently, a new class of sequential stochastic
(12) is then applied to these random variables and methods (Monte Carlo) for Bayesian filtering,
the means of the resulting random variables are called particle filters (PF), has been proposed
computed. The same discrete random variables to solve the multi-sensor fusion problem in land
have been used with the Taylor series expansion navigation, tracking and positioning systems
of equations (12) and (13). In the extended Kal- (Caron F, Davy M. & al. in press, Arulampalam
man filter, the linearization occurs around the M. S., Maskell S. & al., 2002). Generally speaking,
states estimated at the previous iteration. The Kalman filters are special cases of Bayesian filters
linearized equation is applied to the predicted suitable to estimate posterior probability distribu-
states at the current time. The linearization error tions when linearity or gaussianity are assumed.
is directly proportional to the difference between However, this is not always a valid hypothesis.
the estimated states and the predicted states. For The usual standard approach consists of making
the empirical analysis, the mean variation between model simplifications or crude analytic approxi-
the estimated value and the predicted value ob- mations to obtain algorithms that can be easily
tained with the extended Kalman filter for one implemented. However these simplifications bring
Monte Carlo simulation has been taken. Table 2 undesired behaviour of the systems as we have
shows the percentage variation between the real seen with the Kalman filter in real situation. With
mean of the a posteriori probability density and the recent availability of high-powered comput-
the estimated mean of the a posteriori probability ers, numerical-simulation based approaches can
density obtained with the Taylor series expansion now be considered and the full complexity of
and the unscented Kalman filter respectively. As real problems can be addressed. Although these
can be seen, the unscented Kalman filter provides integration and/or optimization problems can be
no significant improvement over the extended tackled using analytic approximation techniques
Kalman filter and even brings some degradation (ex. EKF) or deterministic numerical integration/
in performance for two acceleration components optimization methods (ex. UKF) these classical
(roll and pitch). methods are often not sufficiently precise or
The superiority of the unscented Kalman robust, or they are simply too complex to imple-
filter happens only when the variation between ment. In these situations, Monte Carlo algorithms
the predicted states and the estimated states is become an attractive alternative. These algorithms
are remarkably flexible and extremely powerful
Table 2. Difference between the real mean and the (Doucet A. & Wang X. 2005). The basic idea is to
estimated mean of the a posteriori density draw a large number of samples (named particles
here) distributed according to some probability
Estimated state EKF UKF distributions of interest so as to obtain consistent
Roll acceleration 0.0064 % 0.8070 % simulation based estimates.
Pitch acceleration 0.0218 % 1.2876 % As opposed to the Kalman filter based algo-
Yaw acceleration 0.2482 % 0.0754 % rithms, those particle filters are more general and

228
An Overview of Positioning and Data Fusion Techniques Applied to Land Vehicle Navigation Systems

do not assume Gaussian posterior probability price to pay is a loss of precision compared with
distributions (Andrieu & Doucet 2002). In general, a centralized architecture (Knight, 1997). An
those distributions have a very complex shape, interesting alternative is to use a neural network
and cannot be calculated in closed-form as it re- (NN) for the data fusion. Indeed, a centralized
quires integration and optimization of complex NN is no more difficult to realize than a decentral-
multidimensional functions. They can be arbitrary ized one. NNs have already been applied to data
multimodal or highly skewed posterior probability fusion related to positioning problem in robotic
distributions. This kind of distributions may arise with success (Kobayashi & Arai, 1998, Beattie,
in positioning systems when faced with nonlinear 1998, Hagan and Menhaj, 1994). The major ad-
observations, evolution models or non-Gaussian vantage of an NN compared to a standard Kalman
noise sources. This occur for instance in the filter resides in the fact that it does not need any a
presence of sensor failures or abrupt changes in priori statistical and mathematical model to find
sensors’ functioning conditions. Particle filters a function, which maps optimally the inputs with
or sequential Monte Carlo methods for Bayesian the outputs, in our case the absolute position of
filtering provide a numerical approximation of the vehicle. The most difficult task however, is to
those posterior and marginal posterior probabil- gather sufficient training sensor data, which can
ity distributions using a set of weighted random cover adequately the different manoeuvres to be
samples, called particles. encountered by a road vehicle and its dynamic. The
Particle filters can deal with hybrid (both manoeuvres are a function of the road geometry
continuous and discrete). state vectors. In most and the vehicle’s performance. For example, a NN
cases, the trade-off between estimation accuracy trained with measured data coming only from a
and computational burden comes down to adjust- straight road segment may not be able to give a
ing the number of particles used. The standard good position when the vehicle meets a curve.
particle filter algorithm is based on sequential As an example, we will consider the archi-
importance sampling, with weight normaliza- tecture described in more details in (St-Pierre &
tion. A detailed mathematical description, of the Gingras, 2004). We used a feed-forward back-
standard particle filter algorithm can be found in propagation neural network that was trained with
(Caron, Davy. & al., 2007) and (Doucet & Wang, 14939 training data set for 2000 epochs. The
2005). Results and performances reported in the NN has 4 layers composed of 20, 20, 20 and 3
literature (see references above) so far show that neurons respectively. The corresponding transfer
significant improvements can be achieved in functions are linear, log-sigmoid, tan-sigmoid and
general dynamic systems, where non Gaussian linear. This architecture was the most promising
posterior distribution and nonlinearities have to of the 12 architectures investigated with various
be dealt with (Crisan & Doucet, 2002). numbers of layers, transfer functions and number
of neurons trained initially for 100 epochs. Batch
Data Fusion Using Neural Networks training was preferred over iterative training for
its computation efficiency. The mean square er-
A centralized fusion usually implied the use of ror gave the training performance at each epoch.
only one algorithm, which fuses all the measure- The second order training method was the scaled
ments provided by the sensors. The engineering conjugate gradient. This method requires only
labour required to construct a centralized Kalman O(N) operations per epoch compared to others
or particle filter can be very high. For this reason, methods like Gauss-Newton O(N3) and Leven-
most of the GPS/INS systems have decentralized berg-Marquardt O(N3) (LeCunn & Bottou, 2001,
filters, which gain in simplicity. However, the Hagan & Menhaj, 1994). When considering the

229
An Overview of Positioning and Data Fusion Techniques Applied to Land Vehicle Navigation Systems

Table 3. contains the NN’s inputs Table 4. Mean of the positioning errors by the
Kalman Filter and the NN
Data Sensor
Latitude GPS Position Kalman (m) ANN (m) Improvement
Longitude GPS (%)

Altitude GPS Latitude 2.73 9.34 -242.90

Percent Dilution Of Precision GPS Longitude 12.44 3.56 71.38


(PDOP) Altitude 49.21 0.38 100.78
Linear acceleration INS
Horizontal centripetal ac- INS Table 5. Variance of the positioning errors by the
celeration
Kalman filter and the NN
Vertical centripetal accelera- INS
tion
Position Kalman ANN Improvement
Yaw angular velocity INS (%)
Pitch angular velocity INS Latitude 1073.2 606.1 43.52
Total traveled distance Differential odometer Longitude 994.8 1029.7 -3.51
Azimuth Differential odometer Altitude 12952.0 2.4 99.98
GPS solution availability GPS
Sampling time IMU

of the longitude errors is 5 percent more for the NN


than for the Kalman filter. In our particular case,
network size, the other training methods were the performance of the NN is generally better than
impractical. the performance of the Kalman filter in a mean
The GPS receiver sampling frequency is usu- square error sense. The important improvement
ally lower than those of the inertial measurement for the altitude is caused by the NNs ability to
unit or the differential odometer. For synchroniza- estimate the bias of the GPS altitude.
tion purpose, a Boolean entry specifies to the NN It can be seen here that NNs can be used as a
if a GPS solution is available or not. A centralized centralized fusion method. The results show that
Kalman filter has also been realized as a refer- neural networks may be an attractive alternative to
ence for the comparative evaluation of the NNs the Kalman filter as a centralized fusion method. In
performances. The centralized Kalman filter has (St-Pierre & Gingras, 2004), we showed also how
13 states and 10 measurements. The simulation NNs can also be used prior to fusion as nonlinear
generated 26430 data samples. pre-processing filters for the land navigation posi-
The mean and variance of the positioning er- tioning problem. Similar use of NNs was applied
ror during the simulation was computed. Table 4 successfully to telecommunications problems
indicates that the positions estimated by the NN (Chuah & Sharif, 2001). In our paper, we showed
are less biased for the longitude and altitude but the NNs capability to successfully learn nonlinear
more biased for the latitude than the same posi- functions when applied to GPS and differential
tions estimated by the Kalman filter. The NNs odometer measurements. The major difficulty
estimation biases do not exceed 10 meters. So with an NN is to have access to sufficient ground
even if the NN is a biased estimator, it still meets truth data for the supervised training. Usually, the
the required performance. only solution is to have access to some data coming
As shown in Table 5, the variances of the lati- from a reference, usually given by high precision
tude errors and the altitude errors for the NN are and high cost sensors. Some further research on
less than those of the Kalman filter. The variance this topic would include the evaluation of vari-

230
An Overview of Positioning and Data Fusion Techniques Applied to Land Vehicle Navigation Systems

ous NNs with real sensors and the replacement previous section, several other fruitful research
of the feed-forward back-propagation NN with efforts in the field of fault detection and filter based
other types of NN such as recurrent NNs. More adaptive architectures, combining fault detection
exhaustive comparisons with other data fusion and data fusion, have been proposed to improve
techniques are also required. the reliability and adaptability of various control
systems (Patton, Frank & Clark, 1989, Pouliezos
& Stavrakakis, 1994, Isermann, 2005). However,
ROB AND ADAPTIVE POS ITION little has been published so far in the area of au-
ESIMATE IN PRESENCE OF tomotive navigation systems.
SERS FAULTS
Fault Detection Architecture
So far, we considered mainly the case of continu-
ously operating noisy sensors. But what happen to A fault is usually defined as an undesired change
the data fusion process and the position estimate in system estimated parameters that degrade par-
if one of the sensors fails? Either from a user’s tial or overall performance. Fault detection is a
safety point of view or a designer’s perspective, binary decision making process. Either the system
all automotive navigation systems should be fully is functioning properly, or there is a fault present.
reliable and prevent faults or failures. In all but the Generally speaking, fault detection consists of two
most trivial cases the existence of a fault may lead processes: residual generation and decision mak-
to situations with safety, health, environmental, ing, as shown in Figure 2 (Hashimoto, Kawashima
financial or legal implications. Although good & al. 2001, Magrabi & Gibbens, 2000).
design practice tries to minimize the occurrence
of faults and failures, it is recognized that such Residual Generation
events do occur. In such cases, faulty sensors
must be detected and the system must be able to Residuals are defined as the resulting differences
reconfigure itself so as to overcome the deficiency between analytically redundant quantities in the
caused by the fault. In brief, a navigation system system model. These are similar to innovations
must be robust and adaptive. generated by a Kalman filter, which are the dif-
Faults can cause the loss of the overall perfor- ferences between the measured and estimated
mance of a system, which may present hazards to outputs. Under normal conditions, residuals are
personnel or lead to unacceptable economic loss. small or zero mean; while the occurrence of a
In order to minimize the impact, fault detection fault causes the residuals to go to non-zero or
schemes must be developed. In addition to the unusually large values.
potential use of particle filters described in the

Figure 2. Fault detection architecture


S ens or Outputs

no fault
R es idual Decis ion
G eneration Making fault

231
An Overview of Positioning and Data Fusion Techniques Applied to Land Vehicle Navigation Systems

Decision Making Typical Error Budget


The main error sources in GPS are listed in Table
The decision making process, which acts as an 6. These errors can be divided into two catego-
arbitrator, involves assessing the residuals and ries (Farrell &Barth, 1999, Kronander, 2004):
identifying when and where any abnormalities common and non-common. Common errors are
occur. This is done through threshold testing approximately the same for receivers operating
both static and dynamic residual behaviors, and within a limited geographic region. Non-common
various statistical tests, where the thresholds are errors are unique to each receiver and depend
typically based on signal/residual variance. on the receiver type and multipath mitigation
technique being used (if any). The point of this
S classification is that DGPS can effectively remove
the common errors.
So far, although the precision and reliability
of sensors are improved significantly with the Environmental Interferences
development of the technology, various sensor GPS satellite signals, as with any other radio sig-
faults driven by different situations do exist. In nals, are subject to some forms of interference and
the following, several faulty scenarios of sensors jamming. It is known that GPS satellite currently
are investigated and discussed. transmit position information in the 1,500-MHz
frequency band with a typical accuracy under 100
Global Positioning System (GPS) meters to anyone in the world who has a simple
Faulty Model receiver costing as little as $100. Any electronic
systems generating radio signals in this frequency
A low-cost GPS receiver can output the vehicle band, main lobe or side lobe, will tend to be a
position and driving speed. However, the measure- source of inference to the GPS receiver. With the
ment is likely to be corrupted by time-correlated popularization of personal radio and Wi-Fi de-
noise and the GPS signal is susceptible to jamming. vices, electromagnetic interferences, intentional
However, the position and velocity measurements or unintentional, are more and more serious. As
do not drift over long periods of time. A GPS an example, the proliferation of ultra-wideband
faulty model can be based on four particular parts: (UWB) devices intended to be mass-marketed
typical error budget, environmental interferences, to the public could cause harmful interference
signal loss, and hardware malfunction. to GPS.

Signal Loss
Table 6. GPS Error sources and their approximate GPS is a line-of-sight sensor, and therefore GPS
Deviation [27] measurements are subject to signal outages. If it
cannot “see” four satellites, then it will not produce
Source of errors Standard deviation (m)
the expected output. This case is called signal loss.
Common
It may include the following scenarios:
Ionosphere 7.0
Clock and ephemeris 3.6 • Urban environments with all buildings (the
Troposphere 0.7 so-called urban canyons).
Non-common • Inside parking structures.
Receiver noise 0.1~0.7 • In a long tunnel without any relay station.
Multipath 0.1~5.0

232
An Overview of Positioning and Data Fusion Techniques Applied to Land Vehicle Navigation Systems

Figure 3. GPS faulty model


Random
noise

Real Environmental Typical Signal Position


world interference error loss information
source GPS
receiver

• Under heavy foliage. modulated by the Earth’s spin rate are neglected
• Under bridges. because of short-range nature of our present ap-
plication. In this paper, the error or faulty model
Hardware Malfunction used is presented in figure 4 and the scenarios
A GPS receiver hardware malfunction can be driving the IMU to a faulty state are discussed
caused by any abnormality of its components, below:
such as antenna, amplifier, reference oscillator,
frequency synthesizer, wire disconnection, and IMU Error Sources and Faulty Scenarios
power lost, resulting to no output, or provide an For this sensor, we find the following sources:
unstable or incorrect signal. Compared to the
other sources of GPS faults, the probability of a • Bias due to bearing torques (for momentum
hardware malfunction of the GPS receiver is rather wheel types), drive excitation feedthrough,
low and can be considered negligible. Taking all electronics offsets and environmental tem-
the above into account, the GPS faulty model can perature fluctuations. Intuitively, bias is
be described as in Figure 3. any nonzero sensor output when the input
is zero.
Inertial Measurement Unit (IMU) Faulty • Scale factor error, often resulting from aging
Model or manufacturing tolerances.
• Alignment errors: Most stand-alone IMU
A low-cost IMU can output the vehicle accelera- implementations include an initial transient
tions and angular rate which can then be integrated period for alignment of the gimbals (for gim-
by an Inertial Navigation System (INS) to obtain baled systems) or attitude direction cosines
the vehicle position, velocity, and attitude. The (for strapdown systems) with respect to the
advantage of an INS is low sensitivity to high- navigation axes. Errors remaining at the end
frequency noise and external conditions. But the of this period are the alignment errors. These
measurement error of INS will accumulate if it is include tilts and azimuth reference errors.
not calibrated on-line. Several IMU error models Tilt errors introduce acceleration errors
have been derived (Kim, Lee, Choi & al., 2003), through the miscalculation of gravitational
which are all equivalent in the Kalman filtering acceleration, and these propagate primarily
context. Error state vectors consist of navigation as Schuler oscillations plus a non-zero-mean
parameters, and accelerometer and gyroscope er- position error approximately equal to the tilt
ror states (Jekeli, 2001). In this model, the errors

233
An Overview of Positioning and Data Fusion Techniques Applied to Land Vehicle Navigation Systems

Figure 4. IMU faulty model diagram

Alignment Scale factor Quantization


Real
error error error
world

Nonlinearity
error
IMU

error in radians times the radius from the Tire Radius Change
earth center. Initial azimuth errors primarily The detailed sources of tire radius variation are
rotate the system trajectory about the starting listed in the following reference (Lezniak, Lewis
point, but there are secondary effects due & McMillen, 1977). Mainly:
to coriolis accelerations and excitation of
Schuler oscillations. • Tire radius tends to increase as vehicle
• Cross coupling error (non-linearity). velocity increases because of increasing
• Quantization error, which is inherent in all centrifugal force on the tire.
digitized systems. • Tire radius tends to increase as air pressure
• Fault due to one or multiple of the moving within the tire increases due to increase tire
parts wear out or jam, or gimbals lock. temperature or other factors.
• Tire radius tends to increase as tread is worn
The IMU faulty model can be illustrated as off during the lifetime of the tire.
in Figure 4.
Road Situation
Odometer Faulty Model These kinds of error sources depend on the road
situation, including:
An odometer is one of the most common devices
used for tracking and to provide relative position- • Running over objects on the road, slips or
ing information of vehicles. In the transmission- skids involving one or more wheels when
based odometer, the distance to be determined is the vehicle accelerates or decelerates too
based on the number of counts for the wheel and rapidly or travels on a snowy, icy, or wet
calibration constants which are proportional to the road.
radius of the tire. Thus any potential trends that • In sharp turns, the contact point between
change the radius and the number of counts can each wheel and the road can change, so that
drive the odometer to a faulty output. Hence, in the actual distance between the left and right
term of calibrating the odometer, the scale factor wheels will be different from the one used
error is the most critical element, as it affects the to derive the heading.
total distance traveled and the forward speed of
the vehicle. Hence, adequate modeling for this Gears Tooth Lost
error state could be either a random constant or An odometer can operate by counting the pass of
a first order Gauss-Markov process. teeth or tabs of the ferrous wheel mounted on the

234
An Overview of Positioning and Data Fusion Techniques Applied to Land Vehicle Navigation Systems

rotating shaft of the vehicle. If one or more teeth Compass operations include the following
are lost, then the value will abate n/t, where n is error sources (Zhao, 1997):
the number of the lost teeth, t is the total teeth of
the wheel. In the real situation, the occurrences • Hilly road error: When the vehicle is
of losing three or more teeth are so puny that they traveling over a hilly road, the compass plan
can be omitted. will not be parallel to the plane of the Earth
In brief, the wear out of the tire, the pressure of surface. The compass measures only the
the tire, the velocity of the vehicle, the slippage of projection of the vector components. This
the tire, and the gear teeth lost will all contribute is a short-term magnetic anomaly.
to the imperfect operation of the odometer. • Random noise error: a) In the situation of
traveling nearby power lines, big trucks, steel
Inclinometer Faulty Model structures (such as freeway underpasses and
tunnels), reinforced concrete buildings, or
The error sources of the inclinometer may con- bridges (short-term magnetic anomalies); b)
sist of: In an environment of electrical or magnetic
noise, or magnetization of the vehicle body
• Error caused by thermal expansion or tem- (long-term magnetic anomalies).
perature changes. A normally distribution • Calibration error: Misalignment of the
band-limited white noise is used to demon- compass with respect to the vehicle frame
strate the thermal noise. simply results in a constant error. This type of
• Drift, calibration error or quantization error error can also be attributed to an inaccurate
due to analog to digital converter resolu- estimation of the current declination.
tion. • Permanent fault: power lost or interface
• Electromagnetic interference (the major cable disconnected (very low possibility,
component of the inclinometer faulty model). they are being omitted in the simulation).
It can be a uniform or a Gaussian distribution,
or a combination of both. The variance and Adaptive and Robust Data Fusion
amplitude depend on the traveling environ- Architecture
ment.
• Power lost or hardware malfunction: A per- In positioning navigation systems, high precision
manent fault, but since it is only in a very low and reliability with low cost are always pursued.
possibility, it is omitted in this simulation. Actually, for road navigation, the benefits of the
information obtained by the fusion process make
Magnetic Compass Faulty Model (Fluxgate it possible to use multiple less powerful, lower
Compass) cost sensors to achieve as good a performance
as those much more expensive ones.
A magnetic compass is an inexpensive absolute Kalman filter and its derivatives, the most
direction sensor. The main drawback with this popular data fusion methods, have been used
device is that the quantity measured, i.e. the extensively in autonomous or assisted navigation
intensity and direction of the magnetic field, can system for several years. But almost all of these
be distorted in the presence of metals and other applications are based on the assumption that all
electrical or magnetic fields, such as power lines, sensed data are complete and reliable. If anyone
transformers and cars’ powertrain systems. or more sensors are faulty, then the fusion filters

235
An Overview of Positioning and Data Fusion Techniques Applied to Land Vehicle Navigation Systems

Figure 5. Adaptive sensor fusion system

Fault residuals Residual


Gaussian Detection
Generator
noise Process

Fusion output
Sensors
measurements Process estimates

will tend to malfunction as well. In order to en- Then the faultiness can be detected by con-
sure a reliable positioning estimate in the case of sidering the residual properties against some
faulty sensors, an adaptive approach is proposed threshold. If any information from the sensors
as in Figure 5. is detected to be faulty (residual properties go
As most of the navigation systems, the objec- over a given threshold), then the corresponding
tive of the above system is to make the position measurements are discarded. In that case, the
estimate of the vehicle as accurate and reliable position estimate needs to be re-updated. In this
as possible. Sensors (GPS, IMU, odometer, in- approach, fault detection and data fusion are
clinometer and compass) data which are used to combined into a single Kalman architecture to
compute the position and attitude of the vehicle, construct a fault tolerance, robust and adaptable
often involve sources of uncertainties. Meanwhile, vehicle positioning system.
a state space model can be constructed from the The detailed flow chart is shown in Figure 6.
vehicle dynamic to perform the function of sen- Note that the shaded blocks are part of the fault
sor fusion. Both their outputs (measurements and detection process. Detailed tests results presented
estimates) can be combined together through a in (Guopei & Gingras, 2007) show that the pro-
particular function so as to generate a residual posed Kalman filter based state estimation scheme
signal. Passing this signal through a detection ensures that the position estimate is always optimal
process, a decision is made: either the system is and brings significant benefit to the data fusion
running properly or there is a fault occurring, system compare with the conventional fusion
which leads to the fusion process rerunning to architecture without fault detection, in particular
optimize the position estimates. for the frequent GPS signal loss case. Performance
From the diagram above, we can see how analysis and more details on this architecture can
a residual signal generator and a fault detector be found in (Guopei & Gingras, 2007).
are embedded into the conventional data fusion
architecture. A Kalman filter approach is used,
since it is simpler and more effective to attain the COLLABORATIVE DATA FUSION
residual signal via state estimation. The key idea S
is to reconstruct the outputs of the process with
the aid of a Kalman filter and to use the estimation So far we have considered the case of a single
error, or some particular statistical functions of vehicle only. In real life however, cars are not
them to assess the residual signal. alone on the road. We may therefore ask ourselves

236
An Overview of Positioning and Data Fusion Techniques Applied to Land Vehicle Navigation Systems

Figure 6. Adaptive sensor fusion architecture flow chart

Initialize x̂k− and Pk−

Compute the Kalman gain


K k = Pk− H kT ( H k Pk− H kT + Rk ) −1

Update estimate with measurement zk


xˆk = xˆk− + K(zk − Hk xˆk− )

Residual generation
z k − H k xˆ k
r=
z k2 + ( z k − H k xˆ k )
2

Decision making Y Discard ith


measurement
ri > Threshold ?
Ki = 0

Update the error covariance


Pk = (I − K k H k )Pk−

Project the error covariance ahead


Pk−+1 = φ k Pk φ kT + Qk

Project the state ahead


xˆ k−+1 = φ k xˆ k

Next iteration

the following questions: can we take advantage mobile ad hoc networks called (MANET) that
of the other vehicles proximity and positioning give access to valuable real time data, especially
data to improve our own position and, if yes, how? high precision positioning information. However,
The intelligent vehicle systems (IVS) envisioned in terms of global navigation systems (GNS),
here would be able to communicate their position individual vehicles in a given MANET would
and navigation information through inter-vehicle not have access to the same constellation of satel-
communications (IVC). IVS will be evolving in lites. And certainly vehicles with good lines of

237
An Overview of Positioning and Data Fusion Techniques Applied to Land Vehicle Navigation Systems

Figure 7. Collaborative positioning architecture: In this simplified example, the vehicle at far right and
at far left have a good line of sight (LOS) and can share and provide their good GPS position estimate
to the vehicle in the center who has a bad LOS and therefore a poor GPS position estimate. All vehicles
are assumed equipped with GPS receivers

sight (LOS) have more precise position estimates a good introduction to IVS research and develop-
than vehicles with a poor LOS. Moreover, some ment. For a little more technical reference on the
vehicles may possess high precision DGPS or subject and still worth reading, see (Jurgen, 1998).
beacon-based positioning information to share Designing a collaborative system for accurate
in the network. estimation of relative positions of neighboring
In this section, we briefly present a collabora- vehicles based on real-time exchange of individual
tive positioning concept that uses some of the GPS coordinates, while using vehicle-to-vehicle
above IVC features, along with additional range radio communications is a challenging task (Kuk-
measurement capabilities, to ameliorate position- shya, Krishnan & Kellum, 2005). Research in the
ing estimates of neighboring vehicles in a MANET domain of collaborative navigation was usually
(Abdessamie & Gingras, 2008). Two vehicles at aimed for collaborative driving systems (CDS),
different locations can have different sets of visible where car platoons or mobile robots are involved
satellites and by mean of inter-vehicle commu- (Gaubert, Beauregard & al, 2003, Crawford &
nications, the satellite information can be shared Cannon, 2005). However, most CDS previously
between vehicles (Berefelt, Boberg & al., 2004). reported require either costly vehicle-to-vehicle
Many research activities are being conducted in relative dependence or vehicle-to-infrastructure
IVS collaborations. We ref to (Nirupama, 2005) for dependence.

238
An Overview of Positioning and Data Fusion Techniques Applied to Land Vehicle Navigation Systems

Figure 8. Principle of geometric data fusion approach in collaborative positioning of vehicles using
GPS as shown in Figure 7. The far right and far left vehicles are sharing their good GPS position es-
timates using appropriate fusion in order to reduce the uncertainty ellipse of the vehicle in the center
of the platoon

In a recent paper (Abdessamie & Gingras, Millimeter wave radars MMW for automo-
2008) we have proposed a less expensive navi- tive, studied in [3], would be appropriate
gation approach, exploiting existing positioning solution to our application for they have a
resources embedded in vehicles and independent high Doppler sensitivity and a 200 meters
of road infrastructures. To illustrate the concept range with a good precision which is very
here, we will treat only the case of three vehicles, suitable for our case.
as shown in figure 7, which, although limited, is • No vehicle dynamics are considered in
sufficient to understand the underlying principle the CPA, we instead used a simple motion
in a more general case. In order to consider the model.
design of collaborative localization architectures, • Error covariance matrix on position, head-
such as the one we present in (Abdessamie & Gin- ing, and inter-vehicle distance contains the
gras, 2008), we need to consider a set of various global errors of vehicle systems.
assumptions in order to simplify the model. In • No special vehicle frame is considered
our case, we supposed the following conditions • Coordinate reference system is geodetic
to be valid: altitude, latitude and azimuth.
• No altitude difference is considered, this
• All vehicles in the MANET are equipped corresponds to the case where all three ve-
with necessary navigation items (GPS, DR, hicles are located on a relatively flat plane
IVC sensors…etc.) with a constant altitude.
• All vehicles have range measurement radars, • Inter-vehicle communications are real time
to provide precise inter-vehicle distance. and safe.

239
An Overview of Positioning and Data Fusion Techniques Applied to Land Vehicle Navigation Systems

Collaborative Uncertainty performance and limitations. The extended


Minimization Kalman filter (EKF) in data fusion centralized
architectures remains a design of choice for most
In a distributive, collaborative approach, each applications. We have explained how to make such
vehicle has its own set of position estimates as systems more robust by detecting and identifying
well as other information such as range informa- sensor faults. Finally we looked at the possibility
tion from other neighboring vehicles. to exploit the presence of several vehicles in the
To achieve a collective improvement of position vicinity, in order to improve one’s own position
estimates, we have considered a geometric data estimate using a collaborative and geometric data
fusion approach (Abdessamie & Gingras, 2008). fusion approach.
This method is based on the geometric analysis of A main trend can be seen in the field of dense
the sensing uncertainty and is motivated by the sensor networks, where multilateration can render
geometric idea that the volume of the uncertainty good location accuracy despite significant errors in
ellipsoid should be minimized, as illustrated in range estimates between sensors. It can therefore
figure 8. The resulting fusion equations coincide be useful for vehicle navigation. This has launched
with those obtained by Bayesian inference, Kal- a research area known as sensor location using
man filter theory, and by weighted least-squares wireless telecommunication techniques, which
estimation (Abidi & Gonzales, 1992). When seeks to process potentially enormous quantities
systematic error or bias is made small, the uncer- of data collectively to achieve optimal positioning
tainty ellipsoid encloses a region in space where results. Some papers (Biswas & Ye 2004, High-
the true value most likely exists. The center of the tower & Boriello, 2001) provide good surveys of
ellipsoid is the mean of the measurement and the available techniques for sensor location. Usually,
ellipsoid boundary represents a distance of one the techniques achieving the best performance
standard deviation from the mean. process the input data in a centralized fashion;
Geometric data fusion has been used in many however distributed versions are also available.
research applications (Elliott, Langlois & Croft, Savvides, Park & Srivastava (2002) solve a global
2001, Lee & Ha, 2001). It had proven to be a nonlinear optimization problem for localizing
powerful uncertainty management data fusion sensors through Kalman filtering, which yields
technique. In (Abdessamie & Gingras, 2008), we good results, but requires a high number of anchor
showed that a collaborative approach can be used nodes. The multi-dimensional scaling technique
in navigation systems and further improve the employed by (Shang, Rumi & al., 2003) for sensor
position estimate over a conventional data fusion location achieves good results with few anchor
approach. More mathematical details and perfor- nodes, but requires high radio connectivity. In
mance analysis can be found in the paper. (Savarese, Rabaey & Beutel, 2001) good results
are presented, based on an architecture employing
a two-phase initiation and refinement approach,
Concluding rmark and and, as opposed to the aforementioned papers,
futurtr nd deals with relatively high levels of noise.
According to results previously reported, the
In this paper, we have surveyed the positioning algorithms achieving the best performance in
estimation problem applied to land navigation sensor location techniques use quadratic con-
systems and reviewed some of the various sen- straints to minimize a linear objective function
sor fusion techniques usually encountered in (Biswas & Ye, 2004, Doherty, Pister & Ghaoui,
such systems. We have discussed their relative 2001, Hightower & Boriello, 2001). Since some of

240
An Overview of Positioning and Data Fusion Techniques Applied to Land Vehicle Navigation Systems

the constraints are non-convex, the papers above network to establish localization of the remaining
differ primarily in their relaxation approaches to nodes. It works fine only if a rough estimate of
render the problem convex. According to those a node’s position is sufficient (Doherty, Ghaoui,
publications, the solution provided by Biswas et & Pister, 2001). Conversely, fine grain localiza-
al. (2004) has greater applicability and yields bet- tion requires more resources and radio traffic,
ter results than the one by Doherty & al. (2001). but provides a relatively accurate node position
The paper by Gentile, (2005) follows their same estimates. Fine grain localization may operate in
centralized approach, maintaining the efficiency either a distributed or centralized approach. The
of convex optimization. However by applying main challenges in using these techniques for
linear triangle inequality constraints as opposed vehicular applications, originally developed for
to quadratic ones, the problem is automatically fixed sensor networks, are related to the continu-
convex. As a result, a tighter solution is guaranteed ous high mobility of the nodes.
since no relaxation of the constraints is needed. In a more theoretical context, extensions of
With the current evolution of automotive the Bayesian framework, which copes with the
technologies, embedded positioning systems different types of imperfections of the various
will become more and more easily available at sensors and sources of information, such as
a lower cost, thus allowing all vehicles to be imprecision, uncertainty, incompleteness, and
equipped with such technologies. In addition, all ignorance, have also been proposed for the data
vehicles are becoming networked and equipped fusion problem in vehicle localization. For ex-
with wireless communication capabilities, thus ample, Fisher’s fiducial probability, fuzzy logic,
allowing the use of distributed and collabora- credal inference, Demster’s belief functions and
tive techniques for navigation and positioning. transferable belief model (TBM) are being used
Wireless communications networks are becom- and described in various papers, such as (Caron
ing attractive to localize vehicles using various & Smets, 2005, Caron, Duflos & al., 2006, Smets
radio-based range technologies such as received & Ristic, 2004) to name a few.
signal strength indicators (RSSI), power signal Finally, in a more global context, the advent of
attenuation or time-of-arrival (TOA) techniques new satellite networks for navigation in the years
(Parker & Shahrokh, 2006, Kukshya, Krishnan to come, such as GALILEO in Europe, are likely to
& Kellum, 2005, Chan, Tsui, So & Ching, 2006, boost vehicle localization worldwide capabilities
Tsukamoto, Fujii, Itami. & Itoh, 2001, Qi, Ko- and provide more flexibility in the design of future
bayashi & Suda, 2006). Originally, most existing positioning systems for automotive applications
radio-based ranging technologies for position es- (Vejrazka, 2007). Clearly, more robust, networked
timation has been applied to fixed wireless sensor and distributed intelligent positioning systems are
networks, because it is not possible, for practical likely to be encountered in future positioning and
and economic reasons, to equip all sensor nodes navigation systems.
in a network with GPS receivers. Previously
proposed radio-based ranging approaches have
been either distributed or centralized, providing AcknowlEDdgmnt
a more or less precise location estimate of the
nodes, depending on the scheme used (also called I would like to thank the Canadian NCE AUTO21
course grain and fine grain schemes). Course grain for funding this research project, the University
localization, usually configured in a centralized of Calgary for providing the acceleration data,
fashion, requires less radio connectivity between Geomatic Canada for the topographical informa-
nodes but needs a central processing node in the tion and E. A. Wan, A. D. R. Merwe and OGI

241
An Overview of Positioning and Data Fusion Techniques Applied to Land Vehicle Navigation Systems

School of Sciences for the Rebel Toolkit. I would Berefelt, F., Boberg, B., Nygards, J., Stromback,
like also to thank my former students Mathieu P., & Wirkander, S.-L. (2004). Collaborative GPS/
St-Pierre, Guopei Liu and Rabah Abdessamie for INS Navigation in Urban Environment. Swedish
their original contributions in this area. Defence Research Agency ION-NTM FOI, (pp.
1114-1125). Sweden.
Biswas, P., & Ye Y. (2004, April). Semidefinite
REFERENCESnc
Programming for Ad Hoc Wireless Sensor Net-
work Localization. Presented at the IPSN-04
Abbott, E., & Powell, D. (1999). Land-Vehicle
Conference on Information Processing in Sensor
Navigation Using GPS. IEEE Proceedings of the
Networks, Berkeley, CA, USA, (pp. 46-54).
Institute of Electrical and Electronics Engineer,
1(87), 145-162. Bonnifait, P., Bouron, P., Meizel, D., & Crubille, P.
(2003). Dynamic Localization of Car-like Vehicles
Abuhadrous, I., Nashashibi, F., Laurgeau, C., &
using Data Fusion of Redundant ABS Sensors. The
Chinchole, M. (2004, June). Multi-Sensor Data
Journal of Navigation, 3(56), 429–441. UK.
Fusion for Land Vehicle Localization Using MAPS
TM
. Paper presented at the IEEE Intelligent Vehicle Brown, R. G., & Hwang, P. C. (1997). Introduction
Conference, Columbus, Ohio, USA. to Random Signals and Applied Kalman Filtering.
New York, NY, USA: John Wiley and Sons.
Abdessamie, R., & Gingras, D. (2008). A col-
laborative navigation approach in intelligent Caron, F., Smets, P., Duflos, E., & Vanheeghe, P.
vehicles. Paper presented at the Society of Au- (2005, July). Multisensor data fusion in the frame
tomotive Engineering (SAE) Conference, paper of the TBM on reals. Application to land vehicle
no 1249 Detroit USA. positioning. Paper presented at the International
Conference on Information Fusion (FUSION’05),
Abidi, M. A., & Gonzalez, R. C. (1992). Data
Philadelphia, PA, USA.
Fusion In Robotics And Machine Intelligence.
NY, USA: Academic Press. Caron, F., Duflos, E., Pomorski, D., & Vanheeghe,
P. (2006). GPS/IMU Data Fusion using Multisen-
Anderson, B., & Moore, J. (1979). Optimal Filter-
sor Kalman Filtering: Introduction of Contextual
ing. Englewood, NJ: Prentice Hall.
Aspects. Information Fusion, 7(2), 221-230. Hol-
Andrieu, C., & Doucet, A. (2002). Particle filter- land: Elsevier.
ing for partially observed Gaussian state space
Caron, F., Davy, M., Duflos, E., & Vanheeghe,
models. Journal Royal Statistical Society B.,
P. (2007). Particle Filtering for Multisensor Data
4(64), 827–836.
Fusion with Switching Observation Models:
Arulampalam, S., Maskell, S., Gordon N., & Application to Land Vehicle Positioning. IEEE
Clapp T. (2002). A Tutorial on Particle Filters Transactions on Signal Processing, 6(55), 2703-
for Online Nonlinear/Non-Gaussian Bayesian 2719.
Tracking. IEEE Transactions on Signal process-
Cannon, M. E., Nayak, R., Lachapelle, G., Saly-
ing, 50(2), 174-188.
chev, O. S., &Voronov, V. V. (2001) Low-cost
Beattie, J. B. (1998). Self-localisation in the senario INS/GPS Integration: Concepts and Testings,
autonomous wheelchair. Journal of Intelligent and Journal of Navigation, 54(1), 119-134.
Robotic Systems, 22, 255-267.
Chan, Y-T, Tsui, W-Y., So, H-C. & Ching, P-C.
(2006), Time-of-Arrival Based Localization

242
An Overview of Positioning and Data Fusion Techniques Applied to Land Vehicle Navigation Systems

Under NLOS Conditions. IEEE Transactions on I. American Control Conference, Arlington, USA,
Vehicular Technology, 1(55), 17-24. Proceedings (pp. 4282-4387).
Chuah, T. C., & Sharif, B. S. (2001). Robust adap- Farrell, J., & Barth, M. (1999). The Global Po-
tive spread-spectrum receiver with neural-net sitioning System and Inertial Navigation. NY,
preprocessing in non-gaussian noise. IEEE Trans- USA: McGraw-Hill.
action on Neural Networks, 3(12), 546-558.
Gaubert, N., Beauregard, M., Michaud, F., & de
Crawford, S., & Cannon, M. E. (2005). Perfor- Lafontaine, J. (2003, October). Emulation of Col-
mance Evaluation of Sensor Combinations for laborative Driving Systems Using Mobile Robots.
Mobile Platoon Control; Positioning, Location, Presented at the IEEE International Conference
and Navigation (PLAN) Group, (Tech. Rep.) Uni- on Systems, Man and Cybernetics, 1, 856-861.
versity of Calgary, Calgary Alberta, Canada Washington DC, USA.
Crisan, D., & Doucet, A. (2002). A survey of Gelb, A. (1974). Applied Optimal Estimation.
theoretical results on particle filtering for practi- Cambridge, MA: The MIT Press.
tioners,” IEEE Transaction on. Signal Processing,
Gentile, C. (2005, May). Sensor Location through
3(50), 736–746.
Linear Programming with Triangle Inequality
Doherty, L., Pister, K. S. J., & El Ghaoui, L. (2001, Constraints. Paper presented at the ICC-IEEE
April). Convex Position Estimation in Wireless International Conference on Communications,
Sensor Networks. Paper presented at the INFO- Proceedings, 5, 3192-3196.
COM 2001. 20TH Annual Joint Conference of the
Grewal, M. S., Weill, L. R., & Andrews, A. P.
IEEE Computer and Communications Societies.
(2001). Global Positioning Systems, Inertial
Proceedings (pp. 1655-1663).
Navigation, and Integration. New York, NY,
Doherty, L., Ghaoui, L. E., & Pister, K. (2001). USA: John Wiley & Sons.
Convex position estimation in wireless sensor
Guopei, L., & Gingras, D. (2007, April). Adaptive
networks. Paper presented at the INFOCOMM
and Reconfigurable Data Fusion Architectures
Conference., (3), 1655-1663. Anchorage, Alaska,
in Vehicle Positioning Navigation Systems.
USA
Paper presented at the Society of Automotive
Doucet, A., & Wang, X. (2005). Monte Carlo Engineering (SAE) conference. Paper no. 1108,
methods for signal processing: A review in the Detroit, USA.
statistical signal processing context. IEEE Signal
Hagan, M. T., & Menhaj, M. (1994). Training
Processing Magazine, 6(22), 152-170.
feedforward networks with the Marquardt algo-
Drane, C., & Rizos, C. (1997). Positionng systems rithm. IEEE Transactions on Neural Networks,
in intelligent transportation systems. Artech 6(5), 989-993.
House, Boston, Ma., USA.
Hashimoto, M., Kawashima, H., Nakagami, T.,
Durant-Whyte, H. (1994). Where am I? Industrial & Oba F. (2001, October). Sensor Fault detection
Robot, 21(2), 11-16. MCB University Press and Identification in Dead-Reckoning System
of Mobile Robot: Interacting Multiple Model
Elliott, J. D., Langlois, D., & Croft, E. A. (2001,
Approach. Paper presented at the IEEE/RSJ In-
June). Sensor Uncertainty Management for an
ternational Conference on Intelligent Robot and
Encapsulated Logical Device Architecture: Part
Systems, Mani, Hawaii, USA.

243
An Overview of Positioning and Data Fusion Techniques Applied to Land Vehicle Navigation Systems

Hightower, J., & Borriello, G. (2001, August). Motion Sensors. PhD Dissertation, Linköping,
Location Systems for Ubiquitous Computing. Sweden.
IEEE Computer, 8(34), 57-66.
Kukshya, V., Krishnan, H., & Kellum, C. (2005,
Isermann, R. (2005). Fault-Diagnosis Systems: June). Design of a System Solution for Relative
An Introduction-From Fault Detection To Fault Positioning of Vehicles Using Vehicle-to-Vehicle
Tolerance. Springer Verlag, NY, USA. Radio Communications During GPS Outages.
Paper presented at the IEEE Vehicular technology
Jekeli, C. (2001). Inertial Navigation Systems with
Conference, 2, 1313-1317. Dallas, Tx, USA.
Geodetic Applications, De Gruyter, (pp. 308-318).
New York, USA Laneurit, J., Blanc, C., Chapuis, R., & Trassou-
daine L. (2003, June). Multisensorial data fusion
Julier, S. (1997). Process Models for the Navi-
for global vehicle and obstacles absolute position-
gation of High-Speed Land Vehicles. Wadham
ing. Paper presented at the IEEE Intelligent Vehicle
College, Oxford, UK (p. 184).
Conference, San Francisco, USA.
Julier, S. J., & Uhlmann, J. K. (1997). A New Ex-
LeCunn, Y., & Bottou, L. (2001). Gradient-Based
tension of the Kalman Filter to Nonlinear Systems.
Learning Applied to Document Recognition. IEEE
Paper presented at the 11th International Sympo-
Press, NY, USA.
sium on Aerospace/Defense Sensing, Simulation
and Controls. Orlando, FL, USA Lee, J., & Ha, I. (2001). Real-Time Motion Capture
for a Human Body using Accelerometers. Ro-
Jurgen, R. K. (1998). Navigation and Intelligent
botica, 19, 601–610. Cambridge, UK: Cambridge
Transportation Systems. Progress In Technology,
University Press.
Automotive Electronics Series. SAE International,
Detroit, USA. Lezniak, T. W., Lewis, R. W., & McMillen, R.
A. (1977). A Dead Reckoning/Map Correlation
Kalman, R. E. (1960). A new approach to linear
System for Automatic Vehicle Tracking. IEEE
filtering and prediction problems. Transactions of
Transactions on Vehicular Technology, 1(VT-
the American Society of Mechanical Engineering
26), 47-60.
(ASME). (82) (Series D), (pp. 35-45).
Li, W., & Leung, H. (2003). Constrained Unscented
Kim, S.-B., Lee, S.-Y., Choi J., & et al. (2003).
Kalman Filter Based Fusion of GPS/INS/Digital
Multi-Sensor data fusion for future telematics
Map for Vehicle Localization. Paper presented at
applications. Journal Astronomical Space Sci-
the IEEE International Conference on Intelligent
ences, 20(4), 359–364.
Transportation Systems, Shangai, China.
Knight, D. T. (1997). Rapid development of
Magrabi, S. M. & Gibbens, P. W. (2000, June).
tightly-coupled GPS/INS systems. IEEE Aero-
Decentralized Fault Detection and Diagnosis
space and Electronic Systems (AES) Magazine,
in Navigation Systems for Unmanned Aerial
12(2), 14-18.
Vehicles. Paper presented at the IEEE Posi-
Kobayashi, F., & Arai, F. (1998). Sensor fusion tion Location and Navigation Symposium, San
system using recurrent fuzzy inference. Journal of Diego,USA.
Intelligent and Robotic Systems, (23), 201-216.
Mao, X., Wada, M., Hashimoto, H., Saito, M.
Kronander, J. (2004, December). Robust Automo- & Suzuki, I. (2003, November). EM/Unscented
tive Positioning: Integration of GPS and Relative Smoothing Based Parameter Learning for Nonlin-

244
An Overview of Positioning and Data Fusion Techniques Applied to Land Vehicle Navigation Systems

ear Models for GPS Positioning. Paper presented presented at the IEEE International Conference
at the 10th World Congress on Intelligent Transport on Robotics & Automation, San Francisco, CA,
Systems, Madrid, Spain. USA.
Merwe, A. D. R., Freitas, N., & Wan, E. (2000, Savarese, C., Rabaey, J. M., & Beutel, J. (2001,
August). The Unscented Particle Filter, Tech May). Location in Distributed Ad-Hoc Wireless
report CUED/F-INFENG/TR-380. Cambridge Networks. Paper presented at the IEEE Confer-
University Engineering Department, Cambridge, ence on Acoustics, Speech, and Signal Process-
England. ing, Salt Lake City, Utah, USA, Proceedings (pp.
2037-2040).
Nirupama, B. (2005). Wireless Sensor Networks,
A Systems Perspective, 2005 Artech House, Savvides, A., Park, H., & Srivastava, M. B. (2002,
Boston, USA September). The Bits and Flops of the N-hop
Multilateration Primitive For Node Localization
Parker R., & Shahrokh V. (2006, September). Ve-
Problems. Paper presented at the ACM conference
hicle Localization in Vehicular Networks. Paper
on Wireless Sensor Networks and Applications.
presented at the IEEE 64th Vehicular Technology
WSNA’02, Atlanta, Georgia, USA Proceedings
Conference VTC-2006, Melbourne, Australia.
(pp. 112-121).
Patton, R., Frank, P., & Clark, R. (1989). Fault
Shang, Y., Rumi, W., Zhang, Y., & Fromherz, M.
Diagnosis in Dynamic System: Theory and Ap-
P. J. (2003, June). Localization from Mere Con-
plications. Prentice Hall, USA.
nectivity. Paper presented at the ACM conference
Pouliezos, A. D., & Stavrakakis, G. S. (1994). Real on Mobile Ad Hoc Networking and Computing.
Time Fault Monitoring of Industrial Processes. Annapolis, Maryland, USA, Proceedings (pp.
NY, USA: Kluwer Academic Publishers. 201-212).
Qi, Y., Kobayashi, H., & Suda, H. (2006). On Smets, P., & Ristic, B. (2004, April). Kalman
Time-of-arrival Positioning in a Multipath En- filters and joint tracking and classification in
vironment. IEEE Transactions on Vehicular the transferable belief model framework. Paper
Technology, 5(55), 1516-1526. presented at the 7th International Conference on
Information Fusion, (pp. IF04–0046), Stockholm,
Redmill, K. A., Martin, J. I., & Özgüner, U. (2000,
Sweden.
October). Sensor and data fusion design and
evaluation with a virtual environment simulator. St-Pierre, M., & Gingras, D. (2005, June). Com-
Paper presented at the IEEE Intelligent Vehicles parison between the unscented Kalman filter
Symposium. Dearborn, Mi, USA, Proceedings and the extended Kalman filter for the position
(pp. 668-674). estimation module of an integrated navigation in-
formation system. Paper presented at the Institute
Redmill, K. A., Kitajima, T., & Özgüner, U.
of Electrical and Electronics Engineering (IEEE)
(2001, June). DGPS/INS Integrated Positioning
Intelligent Vehicles Conference, Parma, Italy.
for Control of Automated Vehicle. Paper presented
at the IEEE Intelligent Transportation Systems, St-Pierre, M., & Gingras, D. (2004, March). Neural
Oakland, USA. network based data fusion for vehicle position-
ing in land navigation system. Paper presented
Roumeliotis, S., & Bekey, G. (2000, April). Bayes-
at the Society of Automotive Engineering (SAE)
ian estimation and Kalman filtering: A unified
conference. Paper no. 345, Detroit, USA.
framework for mobile robot localization. Paper

245
An Overview of Positioning and Data Fusion Techniques Applied to Land Vehicle Navigation Systems

Suresh, B., & Sivan, K. (2004, April). Perfor- Wan, E. A., & Merwe, R. V. D. (2000). The Un-
mance evaluation of multi-sensor data-fusion scented Kalman Filter for Nonlinear Estimation.
systems in launch vehicles. Sadhana , 29(2), Paper presented at the Symposium on Adaptive
175–188. India Systems for Signal Processing, Communication
and Control (AS-SPCC-2000), Lake Louise,
Tsukamoto, K., Fujii, M., Itami, M., & Itoh K.
Alberta, Canada.
(2001, May). Study on acquisition and tracking
of vehicle location using IVC and RVC dynamic Wu, Q., Gao, Z., & Wan, D. (2002, April). An
networks. Paper presented at the IEEE Intelli- adaptive information fusion method to vehicle.
gent Vehicle Symposium, (pp. 467-470), Tokyo, Paper presented at the IEEE Position location
Japan. and navigation symposium. Proceedings (pp.
248-253).
Vejrazka, F. (2007, April). Galileo and the Other
Satellite Navigation Systems. Paper presented at Zhao, Y. (1997). Vehicle Location and Navigation
the IEEE 17th Radioelektronika International Systems. Artech House, Norwood, USA
Conference.

246
247

Chapter XIII
Efficient and Reliable
Pseudonymous Authentication
Giorgio Calandriello
Politecnico di Torino, Italy

Antonio Lioy
Politecnico di Torino, Italy

ABSTRACT

Privacy, security, and reliability are key requirements in deploying vehicular ad-hoc networks (VANET).
Without those the VANET technology won’t be suitable for market diffusion. In this chapter, the authors
are concerned with how to fulfill these requirements by using pseudonym-based authentication, designing
security schemes that don’t endanger transport safety while maintaining low overhead. At the same time
our design improves the system usability by allowing nodes to self-generate their own pseudonyms.

INTRODUCTION Such applications are sensible to attacks, for


example by injecting false beacons into the net-
Vehicular ad-hoc networks (VANET) are com- work, and can disclose users’ personal information
posed by mobile nodes, that is, vehicles, and or track vehicles, as an attacker collecting VANET
road-side units (RSU) equipped with sensing, data could do. Thus there’s the need of security
processing and communication capabilities, mechanisms and privacy-enabling technologies,
and are deployed to increase road safety and the which actually are a prerequisite for deployment.
efficiency of transportation systems through a Three recent research efforts, the IEEE 1609.2
number of applications, most of which will be working group (IEEE1609.2, 2006), the NoW
based on beacons, that is, vehicles disseminat- project (Gerlach et al., 2007), and the SeVeCom
ing frequently their position, state and eventual project (Papadimitratos, Buttyan, Hubaux, Kargl,
situation-dependent warnings (for example, ice Kung & Raya, 2007), are currently working on
on the road). VANET security architectures, whose common

Copyright © 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Efficient and Reliable Pseudonymous Authentication

mechanism is the use of public key cryptography BACKGROUND


to protect V2V and V2I messages.
Message authentication, integrity, and non-re- We present the idea of self-generation of pseud-
pudiation, as well as protection of private user in- onyms in our previous work (Calandriello et al.,
formation are identified as primary requirements. 2007). Zeng (2006) presents the same approach
On one hand, traditional public key cryptography independent of our work, and Armknecht et al.
in combination with periodic key changing is (2007) apply it to VANET. Calandriello et al.
known as pseudonymous authentication, in which (2007) show that the proposed optimizations can
nodes are equipped with multiple credentials, also be applied to the cryptosystem presented by
termed pseudonyms that do not reveal the node Zeng (2006).
real identity, e.g., as those proposed by Chaum The work of Raya & Hubaux (2005) presents
(1985). This prevents messages signed under dif- the main problems and challenges of VANET
ferent pseudonyms to be linked (Armknecht et security, and outlines in detail the Baseline
al., 2007; Raya & Hubaux, 2005; Gerlach, 2005; scheme which we summarize in the following.
Raya & Papadimitratos, 2006). On the other Papadimitratos, Gligor & Hubaux (2006) survey
hand, group signatures, that is, cryptographic the security requirements of VANET and pro-
primitives for anonymous authentication, are also vide models for the system and the adversaries.
applicable to VANET (Ateniese & Tsudik, 1999; We invite the non-specialized reader to refer to
Brickell et al., 2004; Chaum & van Heyst, 1991; the above works for an in-depth introduction to
Syverson & Stubblebine, 1999). This guarantees VANET security.
a stronger level of anonymity as an eavesdropper Chaum (1985) presents the original idea of
cannot link any two signatures from any node. using pseudonyms, while their applicability to
This property comes at a higher security overhead VANET has been explored by other studies in the
as it will be explained in the rest of the chapter, context of the SeVeCom and NoW projects: (Ger-
while pseudonym-based authentication gathered lach, 2005; Gerlach et al., 2007; Papadimitratos,
a warmer and wider acceptance by the research Buttyan, Hubaux, Kargl, Kung & Raya, 2007;
community (Gerlach et al., 2007; IEEE1609.2, Raya & Hubaux, 2005). Papadimitratos, Kung,
2006; Papadimitratos, Buttyan, Hubaux, Kargl, Hubaux & Kargl (2006) discuss in general the
Kung & Raya, 2007), reason for which our focus issue of privacy in vehicular communications.
in this chapter is on pseudonym-based systems. A number of works are concerned with differ-
In this chapter we investigate technical issues ent aspects of security and privacy of vehicular
related to the use of pseudonyms in vehicular networks, either outlining challenges (El Zarki
communications. et al., 2002; Parno & Perrig, 2005), describing
First, we ask ourselves how the security over- particular attacks (Blum & Eskandarian, 2004;
head can be reduced while maintaining acceptable Jakobsson et al., 2004) or more general attack
levels of security and application robustness. overviews (Aijaz et al., 2005), offering general
Second, do safety applications remain reliable suggestions towards solutions (Gerlach, 2005;
in presence of security mechanisms? Finally, Raya, Papadimitratos & Hubaux, 2006), or propos-
can self-generation of pseudonyms still meet the ing mechanisms (Golle et al., 2004; IEEE1609.2,
security and privacy mechanisms? In this chapter, 2006; Li et al., 2005; Raya & Hubaux, 2005).
we provide answers to these questions. First we The work of Laberteaux & Hu (2006) proposes
define more precisely the problem at hand and to authenticate messages through the combined
we outline our approach to solve it. Then we use of public and symmetric key cryptography.
analyze the costs of the proposed solutions and Freudiger et al. (2007) approach the problem
their impact on transportation safety.

248
Efficient and Reliable Pseudonymous Authentication

privacy in vehicular networks from another Applications for transportation safety are
perspective, proposing the use of mix-zones to real-time: they require low delay in message
change pseudonyms, and analyze the privacy transmission and processing as emergencies
level achieved. happen suddenly and drivers have to react fast
Many recent works propose the use of bilinear in order to avoid troubles. Human reflexes are in
pairings to provide privacy in VANET. Lin et al., the order of magnitude of 1 s. Safety applications
(2007) use group signatures directly on VANET should be much faster (e.g. one order of magni-
messages, as we survey in the Group Signature tude), both on communication and processing
approach below. We discuss the advantages and sides, in order to allow the driver to take quick
disadvantages of this scheme later in the paper. The response to an emergency event. Their goal is
approach from Lu et al., (2008) is similar to ours to disseminate alerts fast, in order for the driver
(Hybrid) but heavily relies on the infrastructure to be warned much earlier than he is nowadays,
to generate pseudonym, which is a requirement without such applications. Current envisioned
hardly achievable in practice. safety protocols (Biswas et al., 2006; ElBatt et
Torrent-Moreno, Jiang & Hartenstein (2004), al., 2006; Xu et al., 2004; Yang et al., 2004) rely
Torrent-Moreno, Corroy, Schmidt-Eisenlohr & on consecutive broadcast retransmissions of the
Hartenstein (2006), Chen et al. (2007) extensively emergency warning, and are essentially based
analyze the VANET channel conditions, provid- on redundancy, with optimizations designed to
ing metrics to measure the channel performance. reduce the channel load and to extend the message
Chen et al. (2007) provide extensions to the ns-2 dissemination area beyond the range of a given
simulator to use realistic propagation models and transmitter. It’s important that the communica-
to reliable assess the channel conditions. Torrent- tions overhead is kept low: in a scenario with
Moreno, Santi & Hartenstein (2006) provide a high node density every vehicle will contribute
distributed algorithm to fairly share the available to saturate the channel, and this will affect the
bandwidth by effectively adjusting the beacon performance of safety applications, for example
power level. by increasing the transmission delay. Each vehicle
On the safety application side, Xu et al. (2004), will contribute regardless of the content of the
Yang et al. (2004), Biswas et al. (2006), ElBatt messages it send; essentially, the offered load
et al. (2006) propose schemes for safety mes- depends on the beaconing rate, on the payload
saging and analyze their impact with respect to size and on the security overhead. While the
delay and transportation safety, although they do former depends on the specific application, the
not consider the costs of security. Our previous latter is directly affected by the security design;
work (Papadimitratos, Calandriello, Hubaux & given its relevance, it’s then critical that it’s kept
Lioy, 2008) analyzes the impact of security on to a minimum.
transportation safety. As these are life-critical applications they must
be reliable, both in terms of fault-tolerance and
security, otherwise the system becomes useless.
SAFETY AND SECURITY Safety applications must be trusted as they can
REQIREMENTS endanger drivers’ life, and in general the system
must be secured to guarantee its efficiency and
Vehicular communications primarily aim at en- avoid a formidable set of possible abuses. On the
forcing transportation safety. This means saving networking side, this means that a vehicle must
thousands of lives otherwise lost in accidents and trust the messages it receives. Consider, for ex-
saving pollution, time and fuel waste due to traffic ample, nodes that “contaminate” large portions
jams and unorganized traffic.

249
Efficient and Reliable Pseudonymous Authentication

of the network with false information: a single In particular we require anonymity for the ac-
vehicle can transmit false hazard warnings (e.g. tions (e.g. messages or transactions) of the network
ice formation on the pavement), which can then nodes with respect to a set of observers. At best
be taken up by all vehicles in both traffic streams. we require full anonymity: an action performed
Or, similarly, a vehicle that meaningfully modi- by a given node could have been performed by
fies messages of other vehicles, or even a vehicle any other node in the system. Full anonymity can
that forges messages in order to masquerade as be however a drawback in some circumstances as
an emergency vehicle to mislead other vehicles to well, for example during an emergency where it
slow down and yield. These simple examples of would be desirable to track a sender of emergency
exploits indicate that vehicular communications messages in order to facilitate the management
must be secured: otherwise these systems could of alerts. As full anonymity is extremely costly
make anti-social and criminal behavior easier, in to achieve, as it will be explained in the follow-
ways that would actually jeopardize the benefits ing of the chapter, we soften this requirement
of their deployment. to limited traceability: a node can be tracked
Thus, a comprehensive set of security mecha- and its messages linked, but only for a limited
nisms integrated into the VC system is critical amount of time. We emphasize that this does not
for their deployment (Papadimitratos, Gligor & automatically mean that the node is identified,
Hubaux, 2006). We outline here a subset of re- that is, its long-term identity disclosed. This lat-
quirements which apply to safety messaging: ter requirement allows for a node to be tracked
Message authentication and integrity. Mes- during an emergency and thus to better manage
sages must be protected from any alteration and the stream of alerts.
the receiver of a message must be able to verify Liability identification. Users of vehicles are
that the sender of the message is a legitimate node liable for their deliberate or accidental actions
of the network. that disrupt the operation of the network, and the
Message non-repudiation. The sender of the latter should help in the attribution of liability, for
message cannot deny having sent a message example by providing meaningful information.
Privacy and anonymity. Vehicle communica- This is a requirement that implies that anonym-
tion systems should not disclose or allow interfer- ity could be removed and the node identified if
ence on the personal and private information of necessary. It’s a matter of policy to specify the
their users. This requirement is becoming increas- observer with the legal power to do so.
ingly important as is the sensitivity of personal
information. In VANET, examples of “personal
information” are the most frequent areas where EXAMPLE SCENARIO
a car is parked, or the most used paths between
two different points. If no privacy protection We outline an example scenario to show why the
mechanism is in place, any (passive) eavesdropper above security requirements are important. Let’s
could obtain such information and connect them assume a vehicle V moving from two locations A
to the driver’s real identity, becoming thus able and B. As V moves, it receives beacons and alerts
to track her at any given point in time and space. from other vehicles. V needs some mechanism
This Big Brother scenario is easier to achieve to trust the content of the received messages,
than one could imagine, as it only needs a series otherwise the system would not be usable at all.
of receivers placed in key locations and enough Without security, any pedestrian, car, base station
time to collect the needed information; in fact, enabled with the DSRC protocol can send mes-
without privacy protection, any single message sages, and there would be absolutely no way to
from a given vehicle will reveal its identity.

250
Efficient and Reliable Pseudonymous Authentication

tell true warnings to false ones. Without security, for example “car crash ahead, slow down”, when
V could be for example forced to change route such event did not occur. If such information is
because it receives fake alerts of “traffic jam picked up by the nearby vehicles the attacker
ahead”. As explained above, messages need to take over the functionality of the VANET safety
be authenticated, and their integrity ensured, in system and cause accidents or traffic jams. To
order to avoid false messages and alerts. continue the previous example, nearby vehicles
Let’s now imagine that two other vehicles in will most likely abruptly slow down, starting a
the radio range of V have an accident. As they are potential dangerous situation.
VC-enabled, they would send messages up to the Both types of adversaries do not have access
moment of crash, which V can store and reveal to legitimate credentials or, in other words, we
during later investigation. Some other mechanism choose not to consider internal adversaries. Such
is then needed to tell which message was sent by choice implies that vehicles are physically pro-
which vehicle, otherwise the investigation would tected against tampering, and that such protection
be useless. This mechanism would guarantee the is adequate, at least against the high majority of
property of non-repudiation. users.
Let’s now imagine that someone is eavesdrop-
ping on the network. Without security, it can learn
that V is on the street at a given moment, match SYSTEM MODEL
it with the owner data, learn for example that A
is the V’s home and B its workplace, and when VANET employ the Dedicated Short Range
the house is empty. Communications (DSRC) data link technology
(DSRC, 2006), according to which nodes use one
common channel to transmit beacons, that is,
ADVERSARY MODEL periodic updates about their state. Beacons enable
safety applications, and their rate ρ range from
We characterize the adversary with 2 dimensions: 3 to 10 per second, with the latter value deemed
geographic extension and method, with the former mandatory; this is also the value we assume in
being local or global and the latter active or pas- the following of the chapter. Beacon payload
sive. We note that we do not attempt to define all includes at minimum the position and the speed
possible adversaries and attacks against VANET, of the vehicle, as well as a timestamp and eventu-
but we limit ourselves to a subset which targets ally different warnings. Safety applications run
the security requirements specified above. on each vehicle and identify dangerous situations
The first adversary to consider is the global from the beacon content. Their response is to send
passive, thus an eavesdropper with the ability to warnings to other vehicles and alerts to the driver,
overhear messages on a “significant” portion of but they will not override the latter.
the network, that is, on a geographic area wide We assume that alerts, when transmitted,
enough for the eavesdropper to collect meaning- are part of the beacon payload. The timestamp
ful information, and attempting of recovering the combined with digital signatures also gives pro-
drivers’ personal data. tection from replay attacks. For the scope of this
The second model is the active adversary, either chapter, we don’t consider multi-hop routing and
local or global, which controls a radio transceiver focus on broadcast transmissions only. Finally
and can thus inject messages on the network. This we consider vehicle-initiated transmissions only,
adversary is a threat for safety applications as it as fixed infrastructure nodes don’t require their
disseminates bogus information on the network, privacy to be protected.

251
Efficient and Reliable Pseudonymous Authentication

We assume that each vehicle has a long-term, Self-generation of pseudonyms imposes higher
unique identity that combines a number of attri- transmission and processing costs, due to the use
butes (Papadimitratos, Gligor & Hubaux, 2006) of Group Signatures. Our second contribution
and a set of cryptographic keys. We assume for consists in a number of optimizations to signifi-
simplicity one global and unique Certification cantly reduce the overhead without compromising
Authority (CA) managing credentials with which security, that is, by keeping signing and verifying
all legitimate nodes are registered, and with the each message. Finally, we identify the problem
legal power to revoke credentials and disclose of changing pseudonyms during an emergency
identities of the nodes, if deemed necessary for situation, and solve it by proposing an additional
liability attribution. scheme.
Our goal in this chapter is to analyze the ef-
fectiveness of pseudonymous authentication, and
PROB AND APPROACH how it could be used in practice. We do not aim at
OVERVIEW formal definitions of privacy, nor to demonstrate
that the proposed schemes are provably secure.
We want to secure VANET by fulfilling the re- We refer the reader to the “Background” section
quirements described above. Regarding message for related work in the field with in-depth security
unlinkability, we require that any two messages analysis.
m1, m2, generated at times t1, t2 respectively cannot
be linked if t2 > t1 + τ, where τ is a user-specified
parameter. This means in practice switching to SCHEME OUTLINE
a new set of keys every τ seconds, and that only
signatures generated with the same key can be We describe here our proposal for pseudonymous
linked to each other. This is the basic idea behind authentication and compare it with pre-existing
pseudonymous authentication, and τ is termed the schemes, the first of which is termed Baseline
pseudonym lifetime. Pseudonym (BP) and also relies on pseudonyms,
Our first proposal, in order to simplify the while the Group Signatures (GS) relies on a dif-
credentials management, is to allow vehicles ferent type of cryptosystem. Our scheme, named
to self-generate their own pseudonyms and the Hybrid, essentially combines the two and allows
corresponding private keys. This eliminates the the on-the-fly generation of own pseudonyms
need of pre-loading, storing, refilling, as well as with self-certification through the use of bilinear
obtaining pseudonyms over an “out-of-band” pairings.
channel, and improves the system usability, as Baseline Pseudonyms. Each vehicle V is
vehicle’s privacy is not compromised if no new equipped with a set of anonymous public keys,
pseudonyms are available (e.g., the initial supply is termed pseudonyms, that is, keys certified by
exhausted) and it’s not necessary to over-provision the CA and not holding any information about V
a vehicle with pseudonyms. Self-generated pseud- itself. The CA generates a certificate CertCA(KiV )
onyms must be certified: in the baseline scheme on the pseudonym KiV , i-th pseudonym for node
presented below the certification is provided by V, which uses the corresponding private key kiV
means of digital certificates created by the CA to digitally sign its messages and attaches KiV
and installed on the vehicle. We introduce the use and CertCA(KiV ) to them to allow their verifica-
of Group Signatures as a mean to self-certify the tion by other vehicles. The message format is as
self-generated pseudonyms while achieving the follows:
same level of trust.

252
Efficient and Reliable Pseudonymous Authentication

m, σiV(m), KiV, CertCA(KiV ) (1) signatures from a group member. The message
format is as follows:
with σiV () denoting V ‘s signature generated with
its i-th private key kiV and m the message payload. m, ΣCA,V (m) (2)
To identify the sender from Msg. (1) when needed,
the CA needs to maintain a mapping between the The concept of group signatures was originally
set of pseudonyms { KiV } provided to V and V’s introduced by Chaum and van Heyst (1991) and
long-term identity. revisited in subsequent works, e.g., (Ateniese &
Assuming the public key of the CA available, a Tsudik, 1999; Brickell et al. 2004; CVIS; Syverson
node receiving Msg. (1) first validates CertCA(KiV & Stubblebine, 1999). See (Bellare, Miccinaccio
), then if the validation is successful it verifies σiV & Warinschi, 2003; Bellare, Shi & Zhang, 2004)
(m). The validation of CertCA(KiV ) requires to check for formal definitions and security analysis. For
if KiV is not revoked, and this check is performed the rest of the discussion, we assume and utilize
through a Certificate Revocation List (CRL) dis- the group signature scheme proposed by Boneh
tributed to vehicles via the fixed infrastructure & Shacham (2004), including the revocation
(Raya, Papadimitratos & Hubaux, 2006). method they propose, which is again based on
This scheme meets all the above security re- the concept of Revocation List (RL). To allow li-
quirements: messages are authenticated and their ability attribution, the scheme allows for an Open
integrity protected, and digital signatures ensure operation (Bellare, Miccinaccio & Warinschi,
non-repudiation. As explained above, the CA can 2003; Bellare, Shi & Zhang, 2004), that the CA
perform an inverse mapping and disclose V’s only can perform in order to disclose the signer’s
identity when needed. A global eavesdropper can identity if presented with Msg. (2)
follow V for the lifetime of a given pseudonym, A node receiving Msg. (2) verifies ΣCA,V (m),
but cannot link the set of pseudonyms used by V which tells that a legitimate member generated
to each other, while an active adversary cannot m. The node itself cannot determine the identity
forge m as it does not have access to the needed of the node. Being the group signature a digital
credentials. signature, the integrity of m is also protected and
This scheme however requires periodic pseud- non repudiation ensured.
onym refilling, which essentially is a burden for This scheme meets all the above requirements,
the driver, and an index of poor system design: and guarantees full anonymity as well, at the
the driver should not care about the details of cost of high channel and processing overhead.
vehicular communications security. The scheme cannot “scale down” the provided
Group Signatures. This cryptosystem relies anonymity level: nodes are always fully anony-
on the concept of group, whose members are all mous.
the legitimate vehicles registered with the group Hybrid Scheme. The scheme we propose here
manager (whose role is played by the CA), which is a combination of the two previous ones. Each
installs a secret group signing key gskV and a public node is equipped with group keys as in the GS
group public key gpkCA. The key property of the scheme, and generates a set of pseudonyms { KiV }
cryptosystem is that any member V can issue a and corresponding private keys. It then generates
group signature ΣCA,V on a message on behalf of a group signature ΣCA,V () on each pseudonym KiV,
the group, and any receiver with the gpkCA can which essentially is a self-certification CertH (KiV)
verify that a legitimate group member signed of the pseudonym, with the superscript H indi-
the message but cannot tell which one. Another cating that it’s a different type of certificate if
property is that it’s impossible to link any two compared to the one in BP. V signs the message

253
Efficient and Reliable Pseudonymous Authentication

m with the self-generated private key kiV, and then Optimization 2


attaches the corresponding pseudonym and self-
certificate CertH (KiV ) as shown below: The signature σiV (m) is appended to every mes-
sage, but the pseudonym and the certificate only
m, σiV (m), KiV, CertH (KiV ) (3) to every α messages. We term the messages like
Msg. (3) as LONG, and the remaining α – 1, car-
Any node with the gpkCA can verify the rying only the σiV (m), as SHORT, and as Cer-
CertH (KiV ). This validates the pseudonym KiV, tificate period. To bind a SHORT message to the
which enables verification of the σiV (m). The corresponding pseudonym, a 4-byte keyID field
properties of group signatures guarantee that the (a random number) is added to all messages.
receiver can only verify that a legitimate group This Optimization is designed to reduce the
member signed Msg. (3), but can neither identify packet overhead. However it can harm proto-
V nor can link this message to any previous other col robustness, if the message carrying Ki+1V,
CertH (KiV ) sent by V. Messages signed under the CertHCA(Ki+1V ) is not received. Then, nodes in
same kiV can be linked, but as in the Baseline the range of V must wait for α messages before
scheme this can be done only during the lifetime the next LONG message, while being unable to
of the pseudonym in use. validate any message from V. The danger arises
The σiV (m) provides message integrity, authen- especially if the vehicles are close to each other
tication and non-repudiation. As in GS, the Open and/or move at high relative speeds. Thus, we
operation on the CertH (KiV ) allows to disclose the propose the following scheme to mitigate this
identity of the signer. problem:

Optimization 3
OPTIMIZATIONS
V repeats the transmission of the new Ki+1V,
Optimization 1 CertHCA(Ki+1V ) when the pseudonym is changed,
for β times. β is named the Push period.
The CertH (KiV ) is computed only once at the
sender side, as it’s a digital signature computed
on a piece of information (the KiV) that doesn’t CRYPTOGRAPHIC OVERHEAD
change (during its lifetime τ). For the same reason
it’s validated only once at the receiver’s side and In the following of the chapter we’ll use ECDSA
then stored, even if it’s sent in principle with every (IEEE 1363a, 2004) as signature algorithm for
message. As per the group signature properties, σiV (m), and the Group Signatures algorithm as
two signatures computed on the same informa- proposed by Boneh and Shacham (2004), with
tion would look different, but both of them will security levels of t=80 bits for σiV (m) and t=128
be accepted as valid at the receiver. Since the KiV for CertH(KiV ) and CertCA(KiV ). In fact, high se-
is sent in the clear, it’s sufficient to use one single curity is needed only for the long-lived GS keys.
valid CertH (KiV ). This optimization is effective A comparison of the chosen algorithms is made
because τ >> ρ-1. in Table 1, with figures for GS derived from an
estimate of the needed number of scalar multipli-
cations (Brown et al. (2001); Koblitz & Menezes,
2005) and a benchmark of the same operation

254
Efficient and Reliable Pseudonymous Authentication

Table 1. Computation costs and communication overhead for different signing algorithms
Algorithm Security level Signature Sign (ms) Verify
(bits) (bytes) (ms)
GS 80 151 17.8 15.6
GS 128 225 53.7 49.3
ECDSA- 80 48 0.5 3
192
ECDSA- 128 64 0.8 4.2
256

on a 1.5GHz Centrino PC, on which we ran the 52.3 ms/msg for verification. Table 2 summarizes
OpenSSL speed benchmarks for ECDSA. the costs per message.

Computation Overhead
Without considering Optimization 2, the security
Table 1 compares the performances of the dif- overhead sums to 137 bytes for BP, given by one
ferent algorithms in terms of computation time, KiV, one CertCA(KiV ) and one σiV (m). In GS the
signature and key sizes. overhead is given by one ΣCA,V (m), that is, 225
To compute the processing delays for indi- bytes per message. For Hybrid, the overhead is
vidual messages it suffices to sum the individual σiV (m), KiV, CertHCA(KiV ), in total 298 bytes per
delays of the corresponding primitives. In the BP message. The keyID field adds 4 bytes to these
scheme V computes one ECDSA signature per figures. For the α - 1 SHORT messages the over-
message, and the receiver validates one ECDSA- head is the sum of one σiV (m) plus the keyID,
192 (the σiV (m)) per message and one ECDSA-256 that is, 52 bytes.
(the CertCA(KiV )) for each KiV. The overall costs
are thus 0.5 ms/msg for signing, and 7.2 ms/msg Revocation
for verification.
In the GS scheme the costs are given by one Revocation is an important side of any public key
signature/verification of ΣCA,V (m), thus 53.7 ms/ cryptosystem. Traditional approaches are based
msg for signing and 49.3 ms/msg for verification. either on the offline verification of the public key
In the Hybrid scheme the costs are given by the against a revocation list (RL) or the online verifi-
generation and verification of one σiV (m) plus one cation of the key status (OCSP). In VANET, the
CertH (KiV ), totaling 54.2 ms/msg for signing, and second approach requires constant connection to
a central server and is thus not feasible in prac-
tice, while a revocation list can be periodically
disseminated through the RSU. We assume such
Table 2. Processing costs and overhead for different an approach in the rest of the chapter.
packet types. © 2008 IEEE, used with permission We note that the size of the CRL is much
higher in BP than in the other approaches, as it
Sign (ms) Verify (ms) Overhead
(bytes) includes revoked pseudonyms, not nodes. For BP,
BP LONG 1.3 7.2 141 each KiV must be checked against a CRL through
Hybrid LONG 54.2 52.3 302 a number of string comparisons linear to the size
SHORT 0.5 3 48 of the CRL. For GS, the revocation is performed

255
Efficient and Reliable Pseudonymous Authentication

for each ΣCA,V (m) and involves two pairing calcu- bytes. Table 2 provides the cryptographic com-
lations plus one string comparison, with the RL munication overhead per message. We implement
linear in the number of revoked group members. the physical layer and a realistic radio propagation
In the Hybrid scheme the revocation requires model (Nakagami, 1960), as in Torrent-Moreno,
two pairing calculations (as in GS), per KiV (as Jiang & Hartenstein (2004) and Chen et al., (2007)
in BP); the RL is again linear in the number of with an intended (nominal) transmission range of
revoked group members. Assuming that a string d = 200 meters (DSRC, 2006; Xu et al., 2004)
comparison takes 1e-6 s. and a pairing calculation We simulate scenarios of four- and eight-lane
5e-3 s., if RLCheck is the cost of comparing one highways, with vehicles moving in two opposing
entry in the RL for GS, for BP the same operation two- and four-lane flows. Vehicles are randomly
costs 1e-4* RLCheck. The cost in Hybrid is again placed along each lane with an average inter-ve-
RLCheck as the revocation check in the scheme hicle spacing of s meters, and a random-drawn v.
requires pairing computation. We set s = 20 meters and v = 80km/h. We model
As said before, the CRL for BP includes all wet road conditions by setting the friction coef-
the not yet used pseudonyms, with a cost in the ficient μk to 0.41, which corresponds to vehicle
order of 1e5 per node. The performances depend braking capabilities of 4 m/s2. We consider an
on the data structure and search algorithm used to “emergency braking alarm” application, with
handle the revocation data in memory. Assuming such messages transmitted along with beacons,
a hash map, the cost is an O(1) search time, with and we investigate how many vehicle collisions
a prior hash map construction needed each time occur when safety messaging is used with and
a new RL is received, bearing a O(n) cost. The without security.
cost would then be 1e-4 * RLCheck. In the GS
scheme, the revocation will take τ * ρ * RLCheck Transportation Safety Simulation
(e.g. for the assumed values of τ = 60 s. and ρ = 10 Stup
msg/s. the expression becomes 600 * RLCheck).
The comparison is made by considering the total We focus on a platoon of one hundred cars in
number of signatures that have to be verified the highway scenario described above. Vehicles
against the RL during one pseudonym lifetime: in the platoon, denoted as V1 to V100, are placed
each message requires such verification in GS, along a single lane, with V1 at the head and V100
while it suffices to do it once per pseudonym in at the back. At a given point in time the leading
BP and Hybrid. vehicle V1 performs an emergency brake and starts
sending warning messages. Once some Vi, with i
> 1 receives the warning, it warns its driver and
OPTIMIZATION EVLUATION starts sending warnings itself. We recall that Vj,
with j ≠ i, can accept the warning as valid if and
Simulation Environment only if it already validated Vi’s pseudonym. As
proposed by Xu et al., (2004), Yang et al. (2004),
Our simulator is partly custom-built in C and Biswas et al. (2006), ElBatt et al. (2006) when
partly relies on ns-2, and implements the Dedi- Vi receives a warning from a Vj with j > i (e.g. a
cated Short Range Communications (DSRC) data vehicle behind itself), it stops transmitting warn-
link technology (DSRC, 2006). Vehicles transmit ings. The rationale is that at least one vehicle Vj
beacons, which include vehicle’s direction and behind Vi has already been warned, thus it’s in a
location, on a common channel at a rate ρ = 10 better position to keep warning Vk, for k > j. We
beacons/sec. The beacon’s payload is set to 200 consider here all braking actions as “emergency”.

256
Efficient and Reliable Pseudonymous Authentication

Braking has two effects: (i) it turns on the ve- hicles in the platoon are immobile, as V1 does not
hicle rear red lights that visually warn vehicles resume any motion after its emergency braking,
within line of sight (as we assume a platoon on and any Vi cannot physically go beyond Vi-1.
a single lane, Vi will only warn Vi+1 with its rear These simulated conditions are particularly
red lights), and (ii) it triggers the transmission of challenging, with high vehicle density and high
own warning messages. Besides warning other average velocities for the given vehicle spacing.
vehicles, a warned Vi clearly warns its driver High density results in high network load, given
who starts braking according to how fast are his the assumed beaconing rates, and thus increased
reflexes. Driver reactions, modeled as a random packet loss rates. We do not consider any other op-
reaction delay between 0.75 and 1.5 seconds, are timization to reduce processing overhead beyond
triggered by both VC-enabled and visual (red considering messages from vehicles with the same
light) warnings. heading. This is reasonable for shoulder-separated
We choose the pseudonym lifetime τ to be 60 highways, but we acknowledge that it’s hard to
s., and we consider the first 60 s. of the simulated achieve in an urban or rural setting. Finally, we
time as a warm-up period, during which no emer- remark that we do not simulate lane-changing
gency conditions arise. By the end of the warm up as a means to avoid collisions, but leave it as an
period, this allows for one pseudonym change and item for future work.
discovery of neighbors by validating their corre- Our results are shown in Figures 1 and 2
sponding certificates. This is a realistic situation: respectively: the y axis is the probability of suc-
at any given point in time, when an emergency cessful reception of a packet, as a function of the
arises, vehicles have already discovered some of distance between the packet sender and receiver
their neighbors and can immediately validate their (the x-axis).
warnings. The simulation concludes when all ve-

Figure 1. Probability of successful packet reception, Highway scenario, Baseline scheme, 8 lanes. ©
2008 IEEE, used with permission

257
Efficient and Reliable Pseudonymous Authentication

Figure 2. Probability of successful packet reception, Highway scenario, Hybrid scheme, 8 lanes. © 2008
IEEE, used with permission

Although the message processing load may transmission overhead: “No Security” employs
be reduced, e.g., by using the node mobility a constant packet size of 200 bytes, while each
dynamics, this is not the case for the channel of the different α settings leads to a different per-
load, because any transmission “contributes” in packet average overhead, as Table 3 shows. Op-
generating interference and increases the number timization 2 improves communication reliability
of packet collisions. This is why the probability as α increases (and the corresponding overhead
of message reception is overall lower in Figure is reduced), and the effect is more evident for
2 than in Figure 1. Looking at each plot indi- Hybrid, which employs larger certificates. Table
vidually, safety messaging with “No Security” 3 shows the average communication overhead
achieves the highest reliability consistently as the due to cryptography as a function of α. for both
distance changes, while the setting α = 1 achieves the Hybrid and BP schemes. We observe that
the lowest reliability in both schemes, due to “over-optimizing” does not significantly improve
channel reliability.

Transportation Safety
Table 3. Average packet overhead, in bytes per
packet, given different security schemes and We compare the impact of safety messaging on
different α settings. © 2008 IEEE, used with transportation safety when used without (the “No
permission Security” plot) and with security protocols. In the
latter case we set two values of Optimization 3,
α 1 5 10 15 30 50
β=0 (no use of such optimization) and β=5. With
Hybrid 502 299 273 265 257 253
the underlying assumption that nodes are able to
process all messages they receive, Figures 3, 4
BP 341 266 257 254 251 250

258
Efficient and Reliable Pseudonymous Authentication

Figure 3. Collisions in a platoon of 100 cars, 8-lane highway scenario, baseline pseudonym scheme. ©
2008 IEEE, used with permission

Figure 4. Collisions in a platoon of 100 cars, 8-lane highway scenario, hybrid scheme. © 2008 IEEE,
used with permission

259
Efficient and Reliable Pseudonymous Authentication

show the percentage of crashes in the platoon as CONCLUSON AND FUTUREWORK


a function of α.
We note that safety messaging reduces crashes In this chapter we propose to manage security
to around 10% of the platoon vehicles: this is a credentials in VANET through self-generation
significant result as in the absence of vehicle and self-certification of pseudonyms. This greatly
communications, for exactly the same scenarios, simplifies the security management and makes
80%-100% of the vehicles crash (we performed a step towards a usable system. We propose to
the simulations but we do not show it to keep the employ group signatures to generate certificates
figures readable). Safety messaging with no se- which satisfy the requirements of anonymity and
curity achieves the lowest percentage of crashes, liability attribution, and we show that the compu-
confirming the intuition. We use this case as a tational cost and the overhead are comparable to
benchmark; α is not a relevant parameter and the baseline approach thanks to the optimizations
curves in Figures 3, 4 are flat with minor vari- we propose. We identify a potential problem in
ability due to the randomly seeded simulations. the case of a pseudonym change when vehicles
The reasons of its efficiency are the lowest network are close, and we propose a mechanism that ad-
overhead and no restrictions on which alert mes- dresses it.
sage can be validated. In contrast, the tuning of Next, we analyze the costs imposed by security
the secure VC protocols affects the effectiveness on the transportation systems. First we analyze
of the safety application. Figures 3 and 4 show data link performance, obtaining packet recep-
that fewer crashes happen as α increases, but then tion probability curves for the pseudonym-based
a more accidents for high α values. One reason security systems, then we analyze the impact
is that the increase of α reduces the channel load of safety messaging and security and privacy-
and thus increases the per-packet reception prob- enabling technologies on transportation safety,
ability; another reason is that when α is high (e.g. showing that secure communication schemes
30 or 50), the authentication delay for a receiver achieve safety levels comparable to those with
missing a LONG message increases: for example, no security at all.
for α=50 the authentication delay after the loss of Overall, we perform a detailed investigation
one LONG message is 5 seconds, and even more on pseudonym-based authentication, analyzing
if more LONG messages (and not just one) are several system issues and showing how these
missed. Optimization 3 is effective in reducing security mechanisms can be applied in practice.
the number of crashes for a given α compared to Future research directions are the dynamic ad-
the non-optimized case (β=0), by significantly aptation of the security parameters α and β to the
reducing authentication delays at the cost of a traffic conditions, an effective management of
slightly higher overhead. Figures 3 and 4 show certificates, multiple CA and CRL, and a detailed
that β=5 yields an improvement exactly for high analysis on the computation overhead. Regarding
α values, where the authentication delay is higher. the latter, we performed the initial steps towards
In the end, Optimization 3 brings the effectiveness this direction in our previous work (Papadimitra-
of the application close to the unsecured protocol tos, Calandriello, Hubaux & Lioy, 2008).
and overall, the investigated safety application,
if tuned appropriately, is equally effective on top
of both Hybrid and BP schemes. RE

Aijaz, A., Bochow, B., Dötzer, F., Festag, A.,


Gerlach, M., Kroh, R., & Leinmüuller, T. (2006).

260
Efficient and Reliable Pseudonymous Authentication

Attacks on intervehicle communication systems Brickell, E., Camenisch, J., & Chen, L. (2004).
- an analysis.In 3nd International Workshop on Direct anonymous attestation. In CCS ‘04, (pp.
Intelligent Transportation, Hamburg. 132-145), New York, NY, USA, 2004. ACM
Press.
Armknecht, F., Festag, A., Westhoff, D., & Zeng,
K. (2007). Cross-layer privacy enhancement and Brown, M., Hankerson, D., Lopez, J., & Menezes,
non-repudiation in vehicular communication. In A. (2001). Software implementation of the NIST
WMAN 2007, Bern. elliptic curves over prime fields. In CT-RSA 2001,
(pp. 250-265), London, UK. Springer-Verlag.
Ateniese, G., & Tsudik, G. (1999). Group sig-
natures à-la-carte. In SODA ‘99: Proceedings Calandriello, G., Papadimitratos, P., Hubaux, J.-P.,
of the tenth annual ACM-SIAM symposium on & Lioy, A. (2007). Efficient and robust pseudony-
Discrete algorithms, (pp. 848-849), Philadelphia, mous authentication in VANET. In Proceedings
PA, USA, Society for Industrial and Applied of the Fourth ACM international Workshop on
Mathematics. Vehicular Ad Hoc Networks (Montreal, Quebec,
Canada, September 10th, 2007). VANET ‘07.
Bellare, M., Micciancio, D., & Warinschi, B.
ACM, New York, NY, (pp. 19-28).
(2003). Foundations of group signatures: for-
mal definition, simplified requirements and a Chaum, D. (1985). Security without identification:
construction based on trapdoor permutations. Transaction systems to make big brother obsolete.
In Eli Biham, (Ed.), Advances in cryptology - Commun. ACM, 28(10), 1030-1044.
EUROCRYPT 2003, vol. 2656 of Lecture Notes
Chaum, D., & van Heyst, E. (1991). Group signa-
in Computer Science, (pp. 614-629), Warsaw,
tures. In EUROCRYPT, (pp 257-265).
Poland, Springer-Verlag.
Chen, Q., Schmidt-Eisenlohr, F., Jiang, D., Tor-
Bellare, M., Shi, H., & Zhang, C. (2004). Founda-
rent-Moreno, M., Delgrossi, L., & Hartenstein,
tions of group signatures: The case of dynamic
H. (2007). Overhaul of IEEE 802.11 modeling
groups. In CT-RSA’05, Lecture Notes in Computer
and simulation in ns-2. In Proceedings of the
Science, Springer-Verlag.
10th ACM Symposium on Modeling, analysis,
Biswas, S., Tatchikou, R., & Dion, F. (2006). and simulation of wireless and mobile systems
Vehicle-to-vehicle wireless communication proto- (Chania, Crete Island, Greece, October 22-26,
cols for enhancing highway traffic safety. In IEEE (pp 159-168).
Communications magazine, 44 , 74-82).
CVIS: The CVIS project, Retrieved September,
Blum, J., & Eskandarian, A. (2004) The threat of 2008, from http://www.cvisproject.org/.
intelligent collisions. IT Professional, 6, 24-29.
DSRC (2006). Dedicated Short Range Com-
Boneh, D., Boyen, X., & Shacham, H. (2004). munications. Retrieved September, 2008, from
Short group signatures, In Crypto ‘04, LNCS http://grouper.ieee.org/groups/scc32/dsrc/index.
3152 (pp. 41-55). html.
Boneh, D., & Shacham, H. (2004). Group sig- ElBatt, T., Goel, S., Holland, G., & Krishnan, H.
natures with verifier-local revocation. In CCS (2006). Cooperative collision warning using dedi-
‘04, (pp. 168–177), New York, NY, USA, ACM cated short range communications. In Proceed-
Press. ings of the Third ACM International Workshop
on Vehicular Ad Hoc Networks (Los Angeles,

261
Efficient and Reliable Pseudonymous Authentication

CA, USA, September 29th, 2007). VANET ‘06. privacy for VANET. In ESCAR 2005, Cologne,
ACM, New York, NY, (pp. 1-9). Germany.
Freudiger, J., Raya, M., Feleghhazi, M., Papad- Lin, X., Sun, X., Ho, P., & Shen, X. (2007). GSIS:
imitratos, P., & Hubaux, J.-P. (2007). Mix Zones A Secure and Privacy-Preserving Protocol for
for Location Privacy in Vehicular Networks. In Vehicular Communications. In IEEE Transactions
Proceedings of the First International Workshop on Vehicular Technology 56, 3442-3456.
on Wireless Networking for Intelligent Transpor-
Lu, R., Lin, X., Zhu, H., Ho, P., & Shen, X. (2008).
tation Systems (WiN-ITS 2007)
ECPP: Efficient Conditional Privacy Preservation
Gerlach, M. (2005). VaneSe - an approach to Protocol for Secure Vehicular Communications.
VANET security. In V2VCOM 2005, San Diego, In The 27th IEEE International Conference on
California, USA. Computer Communications (INFOCOM 2008),
Phoenix, Arizona.
Gerlach, M., Festag, A., Leinmüller, T., Goldacker,
C., & Harsch, C. (2007). Security architecture Nakagami, M. (1960). The m-distribution, a
for vehicular communication. In 2nd Interna- general formula of intensity distribution of the
tional Workshop on Intelligent Transportation, rapid fading. In W. G. Hoffman (Ed.), Statistical
Hamburg. methods in radio wave propagation, (pp. 3-36),
Oxford, UK. Pergamon.
Golle, P., Greene, D., & Staddon, J. (2004). De-
tecting and correcting malicious data in VANETs. OpenSSL. Retrieved September, 2008, from
In VANET ‘04, (pp. 29-37). New York, NY, USA: http://www.openssl.org.
ACM Press.
Papadimitratos, P., Buttyan, L., Hubaux, J.-P., Kar-
IEEE 1363a (2004). IEEE standard specifications gl, F., Kung, A., & Raya, M. (2007). Architecture
for public-key cryptography- amendment 1: Ad- for secure and private vehicular communications.
ditional techniques. In ITST’07, Sophia Antipolis, France.
IEEE1609.2 (2006). IEEE trial-use standard for Papadimitratos, P., Calandriello, G., Hubaux, J.-
wireless access in vehicular environments - se- P., & Lioy, A. (2008). Impact of Vehicular Com-
curity services for applications and management munication Security on Transportation Safety.
messages. In IEEE MOVE 2008, Phoenix, (AZ), US, April
17, 2008.
Jakobsson, M., Wang, X., & Wetzel, S. (2004).
Stealth attacks in vehicular technologies. In Papadimitratos, P., Gligor, V., & Hubaux, J.-P.
VTC-Fall 2004. (2006). Securing Vehicular Communications -
Assumptions, Requirements, and Principles. In
Koblitz, N., & Menezes, A. (2005). Pairing-based
ESCAR 2006, Berlin, Germany.
cryptography at high security levels. Cryptology
ePrint Archive, Report 2005/076. Papadimitratos, P., Kung, A., Hubaux, J.-P., &
Kargl, F. (2006). Privacy and Identity Manage-
Laberteaux, K., & Hu, Y.-C. (2006). Strong
ment for Vehicular Communication Systems: A
VANET security on a budget. In ESCAR 2006,
Position Paper. In Workshop on Standards for
Berlin, Germany.
Privacy in User-Centric Identity Management,
Li, M., Poovendran, R., Sampigethaya, K., & Zurich, Switzerland, July 2006.
Huang, L. (2005). CARAVAN: Providing location

262
Efficient and Reliable Pseudonymous Authentication

Parno, B., & Perrig, A. (2005). Challenges in networks. In VANET’04, (pp. 10-18), New York,
securing vehicular networks. In HotNets-IV, Col- NY, USA. ACM Press.
lege Park, MA, USA.
Torrent-Moreno, M., Santi, P., & Hartenstein, H.
Raya, M., & Hubaux, J.-P. (2005). The security (2006). Distributed fair transmit power adjust-
of vehicular ad hoc networks. In SASN ‘05, (pp. ment for vehicular ad hoc networks. In SECON
11-21), New York, NY, USA: ACM Press. ‘06, (pp. 479-488).
Raya, M., Papadimitratos, P., & Hubaux, J.-P. Xu, Q., Mak, T., Ko, J., & Sengupta, R. (2004).
(2006). Securing vehicular communications. IEEE Vehicle-to-vehicle safety messaging in DSRC.
Wireless Communications magazine, 13(5). In VANET ‘04, (pp. 19-28), New York, NY, USA.
ACM Press.
Syverson, P. F., & Stubblebine, S. G. (1999).
Group principals and the formalization of ano- Yang, X., Liu, J., Zhao, F., & Vaidya, N. H. (2004).
nymity. In World Congress on Formal Methods, A vehicle-to-vehicle communication protocol for
(pp. 814-833) cooperative collision warning. In First Annual
International Conference on Mobile and Ubiqiot-
Torrent-Moreno, M., Corroy, S., Schmidt-
ous Systems: Networking and Services.
Eisenlohr, F., & Hartenstein, H. (2006). IEEE
802.11-based one-hop broadcast communications: El Zarki, M., Mehrotra, S., Tsudik, G., & Ven-
understanding transmission success and failure katasubramanian, N. (2002). Security issues in
under different radio propagation environments. a future vehicular network. In Proceedings of
In MSWiM ‘06, (pp. 68-77), New York, NY, USA, EuroWireless 2002
ACM Press.
Zeng, K. (2006). Pseudonymous pki for ubiq-
Torrent-Moreno, M., Jiang, D., & Hartenstein, H. uitous computing. In Atzeni A. & Lioy, A.
(2004). Broadcast reception rates and effects of (Ed.) EuroPKI 2006, (pp.207-222), Turin, Italy,
priority access in 802.11-based vehicular ad-hoc Springer-Verlag.

263
264

Chapter XIV
Simulation of VANET
Applications
Valentin Cristea
University Politehnica of Bucharest, Romania

Victor Gradinescu
University Politehnica of Bucharest, Romania

Cristian Gorgorin
University Politehnica of Bucharest, Romania

Raluca Diaconescu
University Politehnica of Bucharest, Romania

Liviu Iftode
Rutgers University, USA

ABSTtract

This chapter systematically presents actual issues regarding the simulation of VANET applications.
Some of them refer to challenges in developing VANET simulators. The chapter discusses simulator
architectures, models used for representing the communication among vehicles, vehicles mobility
features, and simulation tool implementation methods. A critical analysis of the solutions adopted in
some well-known actual simulators is also included. Other issues relate to the use of simulation in the
evaluation of applications that aim at improving the traffic safety and control. Representative city and
highway application scenarios are discussed, and results that can be obtained by simulation, along with
ways these results can be exploited by VANET developers and users are highlighted. Future trends in the
development of simulators that produce more accurate results and their use for the evaluation of more
sophisticated traffic control solutions are also included.

Copyright © 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Simulation of VANET Applications

Introduction in the initial phases of the VANET application


engineering process.
Vehicle-to-vehicle communication is a very This chapter aims to present the features
actual and challenging topic. Vehicles equipped and trends in VANET applications simulation,
with devices capable of short-range wireless to explain the sources of its complexity and to
connectivity can form a particular mobile ad-hoc describe actual solutions. The main challenges
network, VANET—Vehicular Ad-hoc NETwork. are presented in the next section, which intro-
The existence of such networks opens the way duces the three models involved in VANET
for a wide range of applications. Two of the most simulations: the network and traffic models are
important classes of such applications are those determined by the currently used technology;
related to route planning and traffic safety. Route the third model corresponds to the application
planning aims to provide drivers with real-time itself. Then, general features of VANET simula-
traffic information, which, in the absence of a tors are presented. We describe an architecture
VANET, would require an expensive infrastruc- that integrates the first two models and allows
ture. By contrast, the VANET approach is scal- an easy interfacing with the third model. Details
able and has low maintenance costs. Moreover, about the network / communication model are
short-range wireless communication technologies also given, and several components of the traf-
(such as 802.11) have no associated cost, other than fic / mobility model are then discussed. Current
the communication devices. Safety applications challenges in developing VANET simulators,
involve disseminating urgent information, which and the description of solutions adopted so far
is not present in the driver’s field of view, or it is are subjects of a separate section, in which issues
difficult to notice for reasons such as fog or other regarding the performance of different simulation
vehicles obstructing the line of sight. For instance, tools are presented. Another section is dedicated
a lot of accidents occur in foggy conditions be- to application scenarios, the results that can be
cause drivers notice too late that some kind of obtained by simulation, and the ways these results
incident has occurred in front of them. Safety at can be exploited by VANET developers and users
intersections could also be enhanced, since the to improve the car-to-car communication and the
risk of collisions could be detected in advance and traffic control. The chapter ends with conclusions
the driver could be warned seconds before what and future trends.
would otherwise be an imminent accident.
The evaluation of VANET protocols and ap-
plications could be made through real outdoor Background
experiments, which are time-costly and claim
for a large number of resources in order to obtain Simulating a VANET involves two different
significant results. Instead, simulation is a much aspects. First, there are issues related to the com-
cheaper and easier to use method. Obviously, this munication among vehicles. Network simulators,
leads network and application developers to use like The Network Simulator—ns-2 (2008) and Jist/
simulation in order to evaluate different simple SWANS (2008) cope with communication issues
or complicated and innovative solutions before and focus on network protocol characteristics.
implementing them. In turn, this stimulated the The second very important aspect is related
interest for the development of simulators that to the mobility of the VANET nodes. Traffic
easily integrate the models and respond to the simulators take into account the traffic model,
requirements of VANET applications. Simula- not necessarily in conjunction with VANETs. For
tors have become indispensable tools at least example, TRANS—Traffic Network Simulator

265
Simulation of VANET Applications

(Katz, 1963) was used to optimize the timing simulator, VNSim (Gorgorin, 2006), which in-
of traffic lights in the absence of inter-vehicular cludes a complex model for vehicles mobility, a
communication. wireless network simulator, and an interface for
In the majority of VANET applications, ve- the emulation of vehicular applications. The simu-
hicles react to messages. For instance, if a driver lator can be used to analyze networks of several
receives a message saying that the road ahead thousands of nodes in complex city scenarios as
is congested, that driver will probably change well as in highway scenarios. The simulator al-
her/his route. In order to study such reactions, an lows the evaluation of a large range of vehicular
integrated simulator is needed, one in which the computing applications, which cannot be studied
relationship between the vehicle mobility module by using other simulators, and can be used to
and the network communication module is bidirec- improve both car-to-car communication protocols
tional. Choffnes and Bustamante (2005) showed and traffic control applications (Gradinescu, 2007;
that the vehicular mobility (traffic) model is very Diaconescu, 2007).
important, and its integration with the wireless
network model could produce more significant re-
sults. The authors present an integrated simulator GENERral FEAatur of VANET
that uses an original vehicular traffic model called Simulator
Street Random Waypoint (STRAW) implemented
on top of JiST/SWANS (2008). The authors have VANET simulators can be classified as microscop-
used the simulator to show that studying routing ic or macroscopic. Microscopic traffic simulators
protocols for a vehicular network without an ac- emphasize local behavior of individual vehicles
curate vehicular traffic model is a wrong approach. by representing the velocity and position of each
In this respect, they compared their own results vehicle at a given moment. This type of simula-
with those obtained with the Random Waypoint tion is especially helpful for studying localized
model (Broch, 1998), which is a very inaccurate traffic interactions, but it comes with the price
representation of a vehicular network. of reduced scalability. Macroscopic simulators
The mobility model implemented in some capture traffic conditions in a global manner and
simulators is not a sufficiently accurate repre- may use concepts from wave theory. Usually, the
sentation of actual vehicle mobility. For example, traffic is represented in terms of flows (vehicle/
in the model of Saha and Johnson (2004), each hour), density (vehicles/km) or average speed.
vehicle moves completely independent of other Similarly, microscopic network simulators take
vehicles, with a constant speed randomly chosen. into account the transmission of each individual
Multi-lane roads or traffic control systems are not packet (or message), while the macroscopic net-
taken into consideration. Other authors (Mang- work simulators consider transmission statistical
haram et al., 2005) make similar simplifying as- properties.
sumptions and do not consider multi-lane roads Most authors agree that a macroscopic mobil-
or car following models. The mobility model of ity model is not sufficient to allow the study of a
Choffnes and Bustamante (2005) is more com- vehicular network, therefore microscopic simula-
plex: the motion of a vehicle is influenced by the tion, although more complex, is required.
preceding vehicle, and traffic control systems are The evaluation of vehicular applications for
considered. However, multi-lane roads are not online traffic control (that produce real time
taken into consideration. feedback to the driver), such as safety applica-
A more accurate model has been used in the tions, also requires a model of driver behavior.
development of an integrated vehicular networks Models for lane changing or car-following are

266
Simulation of VANET Applications

some of the features that a microscopic VANET time. The simulation time is quantified in fixed
simulator has to implement to allow the analysis pieces so that each event can be associated to a
of such applications. specific timestamp with an acceptable resolution.
At every moment of the simulation time, the Event
Simulator Architecture Engine pulls the current events from the queue,
and handles them in a random order by calling
A VANET simulator has two main components: the event processing modules. The vehicular
a network component, capable of simulating the traffic component is represented by the Mobility
behavior of a wireless network, and a vehicular Module, while the wireless network component
traffic component, able to provide an accurate is incorporated into the Network Module and
mobility model for the nodes of a VANET. De- Scheduler.
pending on the simulation type, the simulator can The Event Queue can hold three types of
contain other components as well. To describe events: send, receive or GPS. A send event for
them, we refer to the VNSim presented in (Gor- a specified node triggers the call to the node’s
gorin, 2006). procedure responsible for preparing a message. It
Figure 1 shows the general view of VNSim. also schedules the corresponding receive event(s)
This is a microscopic discrete-event simulator. for the message receiver(s) that are determined by
Consequently, it includes components for event the simulator according to the wireless network
management: an Event Queue, where the events model. The receive event is associated with a
are registered in the order of their occurrence node (group of nodes) to which the message is
times, the modules for events processing, and a transmitted (broadcasted). Its action is to call
logical clock for the management of the simulation the appropriate handler in each of the receiving

Figure 1. General VNSim architecture

Vehicle 1

Receive Event
Receive Receive Handler Vehicle 2 Vehicle n
Message
Own Data

Send Event Send Handler


Send Prepare message
Engine
Event

Message
GPS data
GPS Event

Vehicular Mobility Model

Network Module and Mobility Module


Scheduler
Event Queue

New Events

3.2s 4 3.3 s .0s VANET SIMULATOR

267
Simulation of VANET Applications

nodes. The GPS event is scheduled at a regular trying to develop a general framework for con-
time interval, for each node, in order to simulate trolling the mobility, without being limited to a
the way an actual VANET application periodically specific traffic simulator or to a specific network
collects GPS data. The mobility module repeatedly simulator. This architecture promises to offer new
updates the position of each node representing a possibilities for simulating VANET applications,
vehicle, according to the vehicular mobility model. but the framework has not yet been released.
This model takes into account vehicle interactions A slightly different architectural approach is
(passing by, car following patterns, etc.), traffic the hybrid simulation (Killat, 2007). The simula-
rules, and the behavior of different drivers. tor architecture incorporates a previously imple-
The main advantage of this architecture is mented vehicular traffic simulator VISSIM and
the possibility to execute (or emulate) the actual two new components: VCOM, used to simulate
code of a vehicular application without signifi- the inter-vehicle communication on the basis of a
cant changes, by using appropriate simulator statistical model proposed by the authors, and an
interfaces. application module. The simulator has to respond
In other cases, the vehicular mobility and to specific user requirements regarding the func-
wireless network models can be incorporated tionality (it was aimed to investigate the impact of
in different simulation tools. For example, car-to-x communications on transport efficiency)
MOVE—MObility model generator for VEhicu- and the performance (scalability, short response
lar networks (2008) uses SUMO—Simulation time, and easy of use). The relevant character-
of Urban MObility (2008) for simulating a traf- istics of a VANET simulator are the simulation
fic scenario and generating an output file with efficiency and accuracy for large scale VANETs,
vehicular mobility traces. This file is offered as which we will address in a separate section.
an input to a network simulator, such as ns-2 or
Qualnet (2008), to obtain the final simulation Communication Models
results. A similar solution is adopted in (Eichler,
2005), where the authors propose the coupling of Communication models highlight the information
the CARISMA Traffic simulator with ns-2 and flows between vehicles and are of special interest
with the application module, in order to study the when vehicles move with high relative speeds.
vehicle-to-vehicle warning-message distribution. VANET applications are affected by wireless
Synchronization data is exchanged periodically networking aspects such as transmission delay,
between the two simulators. The challenge is to packet loss or network access scheme. However,
ensure the “coupling of simulators”, i.e. the con- accurate network simulation introduces additional
sistency of vehicle positions in both simulators, complexity and makes several large scale VANET
at synchronization points. applications unsuitable for simulation. In this
The simple architecture mentioned above section, we discuss the network characteristics
that are mostly relevant for VANET simulation,
makes use of existing traffic and network simu-
as well as the accuracy that can be reached with
lators. The drawback is that it does not support
their implementation.
the simulation of complex VANET applications
At the physical layer, the reliability of the wire-
in which the driver behavior would be influenced
less network, in terms of packet loss and trans-
by the application itself, as already discussed be-
mission delays, is relevant to simulation. Several
fore. An innovative architecture aiming at solving models are used for the radio waves propagation,
this problem is currently under evaluation by the which consider estimates of the power of a received
authors of TraNS (Piorkowski, 2008). They are signal. This signal can be received by an antenna

268
Simulation of VANET Applications

only if the Signal-To-Noise (SNR) ratio is over a is mainly the need for a more tightly controlled
specific SNR Threshold (SNRT). spectrum for maximized reliability. The use of
Wave propagation models have been studied hand-held and hands-free devices on the 2.4 and 5
extensively for decades in telecommunication GHz bands along with the increase of WiFi could
and recently have been correlated with vehicular cause intolerable and uncontrollable levels of
short range communication. The radio signal can interference, which would significantly decrease
be degraded by fading. This is caused by signal the reliability and effectiveness of vehicular safety
propagation over multiple paths (with different applications. But, even with a licensed band, some
values for the attenuation, delay and phase shift), issues arise, such as fair access to all applications,
which produces interferences at the receiving including priority scheduling of traffic between
antenna. different application classes (safety over non-
There are several examples of such propagation safety). Unlike 802.11, multi-channel coordination
models that were implemented in wireless simula- is a fundamental capability of DSRC.
tors. Free Space Model is the simplest one, which Consistent effort has been put into matching
considers ideal conditions: a single radio signal simulation results to real outdoor experiments.
that attenuates with distance. Two Ray Ground Yin et al. (2004) observe significant degradation
propagation model considers two rays between of the network performance under the high node
the source and the destination: the direct line mobility. The study evaluated the DSRC Physi-
and the ground reflection. It gives more accurate cal Layer and the MAC Layer, in the context of a
estimates than the free space model, especially traffic safety application, on top of a customized
for long distances. VNSim (Gorgorin, 2006) simulator combining the CORSIM (2008) traffic
implements this model and includes the signal simulator and the Qualnet (2001) network simula-
attenuation with distance in order to test different tor. It showed a long term average throughput of
ways to optimize the network traffic. Rayleigh 50-60%. Using the Nakagami m-distribution fad-
fading (Sklar, 1997) models multiple indirect paths ing model implemented in ns-2, Killat et al. (2007)
between the sender and the receiver, while the estimated the probability of successful reception
Ricean fading model considers only one dominant at a given distance depending on vehicle density
line of sight and multiple indirect signals. Reports and data load. Their idea is to combine discrete-
from real experiments have shown that vehicular event simulation and mathematical modeling,
short-range wireless networks can be modeled starting from the observation that the data trans-
using the Nakagami fading model (Sklar, 1997), mission that is actually interesting and relevant
which considers fast fading to characterize the for a VANET application represents only a small
wireless channel. percentage of the total data exchanged during a
Concerning the protocols, DSRC—Dedicated traffic scenario. There is a lot of “background
Short-Range Communications Protocol (Taliwal, traffic”, which can be much more efficiently
2004) is a multi-channel wireless protocol, which simulated with statistical methods, while keep-
is based on the IEEE 802.11a Physical Layer and ing the more accurate discrete-event simulation
the IEEE 802.11 MAC Layer. It operates over a 75 techniques only for “interesting” data. Their work
MHz licensed spectrum in the 5.9 GHz band al- is based on the concept of “hybrid simulation”
located by the Federal Communications Commis- and offers much better performance compared
sion, and supports low latency vehicle-to-vehicle to purely discrete-event approaches. Although
and vehicle-to-infrastructure communications. actual outdoor experiments have been made,
The motivation behind the development of DSRC the behavior of the wireless network (the DSRC

269
Simulation of VANET Applications

protocol) under stressed city-like scenarios with VANET simulation. In this section, we review
high node density is still an open issue. This is vehicular mobility models, from the perspective
why simulation frameworks now focus on large of a VANET simulator architect.
scale VANET simulations. Generally, when choosing a mobility model
A lot of work has been done to study the for a VANET simulator, the complexity and the
routing layer protocols in mobile ad-hoc net- accuracy are the most important issues need to be
works, MANETs. They can be grouped in two considered. The benefit of using a very complex
categories. The first category includes protocols and accurate mobility model, together with the
that use the IP addresses to locate nodes, such performance penalty, should be carefully evalu-
as: DSDV—Destination-Sequence Distance ated, keeping in mind the purpose of the VANET
Vector Routing (Perkin, 1994), DSR—Dynamic simulator and the type of applications for which
Source Routing (Johnson, 2001), AODV—Ad it is designed.
hoc on demand distance vector (rfc3561, 2008), In the Random Waypoint mobility model
and MPR—Mobile Relay Protocol (Nain, 2004). (Broch 1998), each mobile node has a position and a
Protocols in the second category are based on lo- velocity, and moves towards a random destination
cation information. Some examples are: DREAM in a predictable way that can be calculated as a
(Basagni, 1998), GPSR—Greedy Perimeter State- function of time. This model was used originally
less Routing (Karp, 2000), and ABRP—Anchor in ns-2 (2008). It was designed for general-purpose
Based Routing Protocol (Huaizhi, 2005). mobile networks and does not accurately represent
Classical MANET protocols have been proven vehicular motion.
to perform poorly (Blum, 2004) due to specific Jardosh et al. (2003) define a more complicated
characteristics of vehicular ad-hoc networks, model that corresponds to urban settings, in which
namely: rapid topology changes, small network obstacles are introduced to constrain vehicles’
diameter, and limited redundancy. This is why mobility and the wireless transmission. Two other
other position-based forwarding solutions have models have been defined by Potnis and Mahajan
been proposed (Festag, 2004) for vehicular en- (2006). The Stop Sign Model (SSM) introduces
vironments, which take into account some ele- stop signs at every intersection. Every vehicle
ments of the vehicle mobility model such as the arriving at the intersection would wait for a fixed
distance between communicating partners and period of time before proceeding to its destination.
the available paths towards destination. This led The Traffic Sign Model (TSM) introduces traffic
to a combined position-based and map-based ad lights at every intersection. A vehicle arriving at
hoc routing. an intersection waits for a random period. Both
models introduce queues at intersections and inter-
Mobility Models dependencies among vehicles on the same street.
Mobility models emphasize local “behavior” of A thorough analysis of these models is described
individual vehicles by representing the velocity in (Mahajan et al., 2007). The authors studied the
and position of each vehicle at a given moment. dependency of the packet delivery ratio and delay
This type of simulation is especially helpful for on the characteristics of the urban settings such
studying localized traffic interactions. as street layout, traffic rules, etc. In some studies
Vehicular traffic mobility models have been (Baumann et al., 2008), specific models such as
studied for a long time. However, until recently, the Manhattan model and GIS models, are used
the purpose of developing and studying accurate to establish the street layouts.
mobility models has not been to use them for

270
Simulation of VANET Applications

In the model of Saha and Johnson (2004), each distance between the two vehicles, their speeds, as
vehicle starts at some randomly selected point well as other parameters. In the following mode,
on a road and moves until a destination point there is a current and a preceding vehicle, but the
on another randomly selected road. Several new speeds of the two vehicles are practically equal.
elements are added to the model and to its use. In this situation, the driver will seek to keep the
First, the path between the starting and destination speed constant. In the braking mode, there is a
points is calculated by using the Dijkstra’s shortest slower preceding vehicle, very close in front. In
path algorithm. Second, the vehicle speed is also this mode, due to the immediate danger, the driver
randomly calculated using a uniform distribution will apply high deceleration rates.
within a specified interval. Third, the authors use This model was implemented in VNSim, to-
the TIGER map database to create a more realistic gether with a lane-changing model for multilane
environment of the simulation study. roads, based on lane-usage rules valid for several
The mobility model of Choffnes and Busta- European countries. According to these rules, the
mante (2005) is more complex: the motion of a use of the first lane is required, unless it is oc-
vehicle is influenced by the preceding vehicle (car cupied. It means that a driver will always try to
following model), and traffic control systems are stay on the lower lanes, except when overtaking
considered to introduce some actual traffic condi- another slower vehicle. Overtaking on the right
tions such as traffic congestion. In addition, the side is not allowed. Whenever a driver is in a dif-
model includes communication details, such as ferent mode than free driving, she/he will always
the percentage of cars actively communicating, check if the higher lane can provide a superior
and road maps details, such as characteristics mode. If this is the case, the driver will switch to
of street segments and number of lanes in each a higher lane. Similarly, whenever a driver is in a
direction. different mode than braking, she/he will always
The study of safety and traffic control ap- check if the lower lane provides at least equal
plications requires an accurate model of driver conditions. In this case, the driver will switch to
behavior. One example is the model developed a lower lane.
by Wiedemann (1974, 1991) and further studied Different driver profiles (aggressive, regular,
by Fellendorf and Vortisch (2001). This psycho- calm) can easily be modeled by using several
physical model is used in the commercial traffic parameters: distance between vehicles, maximum
simulator VISSIM (2008). The basic assumption is speed, desired speed, driver reaction time, criti-
that a driver can be in one of four modes, which are cal distance for driver reaction, etc. Each driver
classified according to the driver’s convenience: class is represented by a specific set of values for
free driving (superior convenience), approaching, these parameters. In order to further differentiate
following, and braking (lowest convenience). In the drivers, the model allows small deviations
the free driving mode there is no influence from from the specified values, which are randomly
preceding vehicles on the same lane. In this situ- computed for each individual driver. Fellendorf
ation, the driver will seek to obtain and maintain and Vortisch (2001) showed that the model is ac-
a “desired” speed. The desired speed and the ac- curate, by comparing simulated traces with actual
celeration depend on driver’s personality, and on measurement data taken from a German freeway
road’s characteristics. In the approaching mode, and from a US freeway. To further calibrate the
there is a slower preceding vehicle that influences model, the authors of VNSim performed an ex-
the driver. In this situation, the driver decelerates tra validation, by measuring real-time traffic in
in order to obtain the same speed as the preced- intersections and comparing the results to those
ing vehicle. The deceleration is a function of the obtained by simulation (Gradinescu, 2007).

271
Simulation of VANET Applications

Estimating fuel consumption and pollutant Implntation i


emissions is an increasingly important issue when
studying vehicular traffic. The model of Akcelik Approaches to Simulator
and Besley (2003) considers the estimation of the Development
relation between fuel consumption and emissions,
on one side, and the speed and acceleration of the The development of VANET simulators follows
vehicle, on the other. A simplified version of this two different approaches. One is to implement
was used in VNSim to take into account only light the mobility model from scratch. In this situa-
vehicles. Statistics and global measures have been tion, the integration between the mobility model
easily obtained. and the network communication model is ensured
in the design phase. The integration is implicitly
Maps achieved since the developers start with this
integration in mind. On the other hand, the com-
A digital map is required in almost any VANET plexity of realistic models for communication and
application. Each vehicle that is part of the system mobility makes this approach a very challenging
should have access to such a digital map. A very one. There is a huge amount of work required to
popular option for digital maps used by VANET implement complex models.
simulators is TIGER—Topologically Integrated A typical example of this approach is
Geographic Encoding and Referencing (2008), GrooveSim (Mangharam, 2005), which is a
which is freely-available, actual digital maps for simulator for geographic routing in VANETs.
the USA. Most of the VANET simulators use It has several modes of operation that allow the
TIGER files as the source for their digital maps. evaluation of network protocols, extraction of
TIGER files contain detailed geographical infor- mobile wireless propagation models in real time,
mation about the roads in a region, from large the generation of test scenarios for simulation,
highways to small streets. For each road, the hybrid simulation with real and virtual vehicles,
TIGER files specify its end points, along with as and others. The most important limitation of
many intermediate points as needed, depending GrooveSim is the simplistic mobility model, which
on the road’s shape. Furthermore, for each road, a does not consider car-following or lane-changing
“class” information is given (whether it is a small models. The authors acknowledge this limitation
street, a local road, a State Route, or an Interstate and mention that the focus of their work is to
Highway). Unfortunately, the TIGER database provide basic models and evaluate their impact
lacks more detailed traffic-specific information, on key performance metrics.
like the number of lanes, or traffic control sys- STRAW—STreet RAndom Waypoint (Choff-
tems, like traffic lights, yield or stop signs. In nes, 2005) builds a mobility model that constrains
more realistic simulations, such information is vehicles’ movement according to the map of a city,
required. The authors of VNSim have chosen to different traffic profiles (for example vehicular
add the extra information, based on simple heu- congestion) and specific control mechanisms.
ristics and on the road class information included It is implemented as an extension to a wireless
in the TIGER files. For example, more lanes are network simulator developed by Barr (2004)
considered for higher class roads, yield or stop at Cornell University. The mobility model of
signs are introduced for lower class roads, traffic STRAW is also simplistic, and does not consider
lights are used at intersections between equally multi-lane roads.
important roads, etc. Saha and Johnson (2004) based their simula-
tion on building a realistic mobility model com-

272
Simulation of VANET Applications

patible with the ns-2 network simulator. Their simulation of low level layers (physical, MAC).
development makes use of the TIGER database. The framework offers several advantages to its
The mobility model which they implement is users: it allows the execution of real applications
very simple, without considering car-following in a simulated network environment; it integrates
or lane-changing models. However, their simula- realistic mobility traces and deployment data; it
tions are among the first ones which prove that uses evaluation metrics related to the applica-
using a different mobility model than the well- tion.
known random waypoint model will generate A similar approach is described in (Rehuna-
significantly different results, thus proving that than et al., 2007), where a microscopic traffic
the mobility model is an important component of simulator, MITSIMLab is used to generate vehicle
a VANET simulator movement traces to be used in ns-2. This approach,
The other approach is to use an existing however, does not allow for an accurate evaluation
mobility model implementation and integrate of a VANET application or protocol, because the
it with a network simulator. This approach takes mobility pattern cannot be modified as a reaction
advantage from existing vehicular traffic simula- to the VANET application.
tors, which already implement complex, validated Using an existing traffic simulator, which
mobility models. The challenge of this approach is based on already validated complex traffic
is to achieve an online integration, in which the models, has the important advantage of avoiding
movement of vehicles is directly influenced by “re-inventing the wheel”. Among the most recent
the VANET applications running on some of attempts to implement a VANET simulator by
the vehicles. using this approach are MOVE (Karnadi et al.,
The easier way for integration is to generate 2007) and TraNS—Traffic and Network Simulator
traffic patterns offline, and then use these results (Piorkowski et al., 2008). Both use the open-source
as an input to a network simulator. VanetMobiSim microscopic traffic simulator SUMO (2008),
(Harri et al., 2006) is a generator of realistic ve- which implements complex validated vehicular
hicular movement traces for network simulators. traffic mobility models. And both use two steps
It considers macro-mobility features, such as road for the VANET simulation. In the first step, traf-
topology, number of lanes, speed limits, etc., and fic traces are generated offline using the traffic
micro-mobility characteristics, like crossroads simulator. In the second step, a network simula-
regulated by traffic signs or lane change capabil- tor processes the traffic traces and evaluates the
ity for vehicles. Similarly, the Generic Mobility network communication between the nodes. The
Simulation Framework—GMSF (Baumann et al., authors of both simulators agree that the approach
2008), which models and simulates node mobil- does not allow the simulation of complex VANET
ity, is designed to work together with a network applications, in which the driver behavior would
simulator. GMSF has some important distinctive be changed by the application itself. However,
features: it implements new GIS-based models both developer teams mention that this is a goal
with detailed road maps, and includes microscopic for future work that will achieve a real integration
features such as traffic lights management. between the traffic mobility model and the network
An example of using mobility traces is given communication model. Furthermore, the authors
in (Yang et al., 2007). The authors propose an of TraNS claim that their simulator is “the first
evaluation framework for VANET applications. open source project that attempts to realize this
It utilizes a hybrid emulation testbed TWINE, highly pursued coupling for application-centric
which combines real implementation of high level VANET evaluation” (Piorkowski et al., 2008).
network layers (closer to the application) with the

273
Simulation of VANET Applications

Sommer et al. (2008) describe the simulation simulator with a complex node mobility model,
framework Veins (Vehicles in Network Simula- which is responsible for accurately computing the
tion) that is based on the bidirectional coupling motion of all nodes, in each time quantum.
of OMNeT++, a network simulator capable of The graph in Figure 2 shows the evolution of
modeling realistic communication patterns of the simulator’s performance with the increase
VANET nodes, and of SUMO, the microscopic of the number of nodes. The results are based
traffic simulator. The bidirectional coupling is on simulations performed in a highway traffic
able to support the analysis of more realistic traf- scenario, with all the nodes running a neighbor-
fic models that reflect the impact of inter vehicle discovery and update protocol, with a 1 second
communication on the road traffic. period for the beacon messages.
VNSim is able to simulate motion of 1000
S vehicles, in a complex city-scenario in real-time
(1 second of simulation in 1 second of real time).
Accurate simulation of vehicles’ mobility and Experiments have been done by the authors with a
wireless transmission is time-costly. Also, for an squared region of 1km by 1km in Manhattan down-
application designer, the study of many applica- town, which has a high number of intersections
tion scenarios requires experiments with large and traffic lights (see Figure 3). VNSim was also
maps and with large numbers of vehicles. This used to perform the simulation of more complex
is why the scalability of VANET simulators is a scenarios, involving up to 10.000 vehicles.
main performance metric for which we present NCTuns (Wang, 2008), a highly-integrated
some guiding figures. simulator, cannot be used for large-scale simula-
Experiments performed with VNSim on a tions. Thus, for the simulation of a scenario with
1.6GHz uni-processor showed that it can support 100 vehicles, 22 minutes are required. For the
around 10.000 network events per second. This same scenario, if the number of vehicles doubles
value is lower than the throughput of the widely- then the amount of time required for the simula-
used network simulator ns-2, which can simulate tion grows approximately 4 times, to 84 minutes.
over 60.000 events per second, on a 2GHz uni- These results, obtained on a 1.8 GHz uniprocessor,
processor. This is explained by the of the network show that the simulation of large-scale vehicular

Figure 2 VNSim performance evolution with the Figure 3 Squared region in Manhattan down-
increase of the number of nodes town

500

450
sIMULATe A 300 seCONDs sCeNARIO
NUMbeR OF seCONDs NeCessARY TO

400

350

300

250

200

150

100

50

0
250 500 750 1000 1250 1500 1750 2000
NUMb eR OF NODes

274
Simulation of VANET Applications

networks (with tens of thousands of vehicles) can good results when simulating massive wireless
be achieved. vehicular networks.
Some performance results are presented in Higher performance can also be achieved by
(Choffnes, 2005) for the STRAW simulator. Here, the use of hybrid simulators (Killat, 2007). The
STRAW’s overhead has been evaluated for two authors present the results obtained for 2.500
models: a simple one in which vehicle movement to 3.000 vehicles in a scenario dedicated to the
is determined randomly at each intersection, and a analysis of the impact of the penetration rate of
more complicated one in which the movements are radio-equipped vehicles on the average speed.
determined according to pre-computed shortest The speedup factor was 500 as compared to the
paths. The evaluation was done by disabling the NS-2 simulation. The result is due to the use of
wireless communication simulator. The experi- the hybrid simulation concept, which combines
ments were performed on a Pentium 4 at 2.4GHz the discrete-event simulation with analytical
computer with HyperThreading enabled. When traffic modeling.
the number of nodes considered in the experi- As a general conclusion, developing a highly-
ment increased from 100 to 1600, the runtime integrated simulator, with complex models for both
increased four times for the simple model and the vehicular mobility and the wireless commu-
6.5 times for the more complicated model. The nication has the advantage of higher accuracy but
highest overhead of 10% of the simulation time has a severe impact on performance. Integrating
has been registered for the complex model with existing vehicular traffic simulators and network
1600 vehicles. simulators can lead to better performance but it
One solution to improve simulators’ perfor- is not able to support more complex scenarios
mance is parallelization. Fujimoto et al (2003) involved in safety and traffic control applications.
report experiments performed on packet level Improvements can be achieved by parallelization,
network simulators. Parallelization is achieved by which distributes the simulation task to different
federating several copies of the same simulator or computing resources, or by selecting a model that
of different simulators. This approach was used to reduces the computation load.
produce two parallel simulators, PDNS—Parallel
/ Distributed Network Simulator (PDNS) based
on ns-2 and GTNetS developed at Georgia Tech. Simulation of rntati
The results showed a very good performance city and highway application
measured in number of transmissions per second, SCENnario
PTS—Packet Transmissions that can be simulated
per Second. More specific, for the best case of This section presents several simulation use
parallel simulations, the number of PTS was 50 cases together with results obtained in realistic
times higher than the number of PTS obtained in simulation experiments performed with the VN-
the best sequential case. Sim simulator. The way these results could be
MoVES, a Mobile Wireless Vehicular Envi- exploited by VANET developers and users are
ronment Simulator (Bononi et al., 2006) is also also highlighted.
parallel and distributed. Its idea is to distribute An important class of applications that can be
subsets of the model entities to different proces- deployed over VANETs is concerned with traffic
sors that communicate via message passing. operations and maintenance: dynamic route plan-
The authors find that the parallel approach gives ning, weather conditions publishing and adaptive
signal control in intersections.

275
Simulation of VANET Applications

Traffic Coordination in Intersections The simulation of this propagation scheme


in VNSim demonstrated that a lot of redundant
Traffic coordination in intersections is a very data is transmitted and a high data charge is
challenging and not enough studied topic. As put on the network. Moreover, for large packet
an example of a VANET application, we pres- size, the probability of the successful transmis-
ent an adaptive traffic light system based on sions decreases due to wireless interferences. A
wireless communication between vehicles and solution is the use of aggregation mechanisms.
fixed controller nodes deployed in intersections A possible method is the use of a probabilistic
(Gradinescu et al., 2007). We describe the steps scheme in which only some “leader” vehicle,
required to deploy such an application in VNSim. chosen randomly with a probability depending
Furthermore, we present the results showing sig- on the traffic density, transmit the information.
nificant improve of traffic fluency in intersections, The simulation experiments highlighted the great
and the advantages over other architectures in decrease in the network load while preserving the
terms of cost and performance. functionality of the solution.
The goal of the VNSim project was to reduce The data dissemination algorithm supports
congestion and the number of accidents in inter- the implementation of the traffic light control
sections by enabling wireless communication that establishes a signaling plan well suited for
between traffic lights and vehicles. In this way, the intersection. Considering the traffic light is a
the traffic lights can get a real-time “image” of node participating in the dissemination process, it
the traffic, and make an informed decision on how can gather traffic metric values (flows, delays) on
to set signal plans. As a secondary benefit, the all the concurrent roads. Optimum cycle length
traffic lights can also detect dangerous situations and green split phases are computed using traffic
and alert drivers about the intersection status to engineering methods, such as Webster’s formula
increase their awareness. (Gradinescu et. al 2007).
The following aspects need to be taken into One of the simulation scenarios that were used
consideration when such an application is simu- to analyze the efficiency of the algorithm was a
lated. First, there must be a data dissemination 4-way intersection in Bucharest during rush hour.
system that supports the information flow from As shown in Figure 5, the intersection recovered
vehicle to vehicle and to the traffic light. Based sooner from congestion when using the adap-
on the TrafficView system (Dashtinezhad et. al tive strategy described above, compared to the
2004), data dissemination was designed so that pre-timed system deployed in the intersection.
vehicles forward information about other vehicles The total delay measured for all vehicles was
they know about (position, speed, direction) to decreased by 28%.
all the other vehicles in their range.

Figure 4. Traffic lights and vehicles communicate Figure 5. Average control delay in intersection
to improve traffic efficiency
Average Control Delay (s)

500

400

300

200

100

0
5
15

25

35

45
55

65

75

85
95

5
5

5
10

11
12

13

14

s imulation Time (min)

P re-tim ed A daptive - Ideal A daptive - Real

276
Simulation of VANET Applications

An additional component of the VNSim computation is based on distance, on the roads’


simulator is the module for estimating the pol- types, and on the assumption that drivers tend to
lutant emissions and fuel consumption, which prefer the main roads. After this initial computa-
considers the particular behavior of each vehicle tion, the driver starts the journey. Along the way,
speed and acceleration. This feature was used in periodically, queries about the traffic conditions
this application to demonstrate the benefits of the ahead are sent via the ad-hoc network. Depend-
adaptive solution due to increased traffic fluency: ing on the replies (for example, the reception of
6.5 % improvements in fuel consumption and CO2 information about traffic jams ahead), re-calcula-
emissions were measured. tions of the route occur.
The simulation experiments showed that global
Collaborative Route Computation improvements in travel times occur when only a
percentage of the vehicles use the algorithm, not all
Finding the best route to destination in congested of them. When all vehicles change their route, the
roads traffic is a major challenge in the attempt traffic jam “moves” to another road. Starting from
to improve traffic conditions. Collaborative route this observation, the authors suggested the use of
planning is the second VANET application we fixed-nodes placed in intersections, which are able
use to show how ad-hoc communications can to communicate with vehicles and, at the same
improve the driving experience. time, are inter-connected through a separate high-
The simulation of a collaborative, dynamic speed network. Of course, this solution requires
routing application requires several features a more extensive infrastructure. In large cities, a
from the simulation tool. First, in order to study large part of this infrastructure might already be
a congested roads network, a large number of present. The fixed-nodes gather information about
vehicles, moving on a large map, should be sup- the actual traffic (number of vehicles traveling)
ported. Therefore, the simulator’s performance on each road and execute a collaborative route
and scalability are crucial. Furthermore, this kind planning with the other fixed nodes. The results
of application supposes that the mobility of the are sent to the vehicles in proximity informing
vehicles is influenced by the application itself: them about the best routes.
if drivers find out, by using the VANET route
planning application, that a road is less congested, Highway Lane Reservation
then they might change their initial path in order
to take advantage of this information. A simulator An innovative VANET application was proposed
which does not integrate the vehicular mobility in (Ravi et al., 2007). The authors argue that
module with the application module will not be time guarantees of other means of transportation
able to represent dynamic route changes. (like train or plane) can be incorporated into the
Diaconescu et al. (2007) used VNSim in order highway system. The idea is to allow drivers to
to study the dynamic route computation problem. reserve an “entry slot” onto dedicated lanes of a
The authors discuss two different approaches. The highway by paying a premium price. Reservations
first is to exclusively use the ad-hoc network for will be allowed for these lanes up to their carrying
all the information exchanges. The second ap- capacity, so that the dedicated lanes will never
proach is based on the existence of fixed nodes, become jammed and the system can guarantee
placed in intersections, which also participate to, the trip duration between any two highway points,
and facilitate the communication. in the absence of accidents.
In the first approach, each driver first com- The general architecture of the system is shown
putes a route towards its destination. This initial in Figure 6. The proposed system is complex and is

277
Simulation of VANET Applications

Figure 6. Lane reservation general architecture Concluion

This chapter discussed the simulation of VANET


applications. The focus was on the new trends
in communication protocols and traffic models,
and on new facilities incorporated in simulation
tools. The advances in the VANET technology and
protocols support the adoption and use of more
complex mobility models and of more flexible and
adaptable traffic controls. VANETs have specific
characteristics such as the rapid topology changes
or the changes in the vehicles mobility as reac-
tion to traffic changes. Obviously, these changes
must be captured by the simulation models, which
become more or less complicated and include
more elements that constrain the vehicle mobility:
maps, real traffic conditions (congestion), driver
behavior, fuel consumption, pollutant emissions,
made up of several subsystems. First, a reservation etc. Recent research referenced in this chapter
system is required to allow users make advance targeted the validation of these models and the
reservations of time-slots on the dedicated lanes. exploitation of their facilities in different applica-
Then, an enforcement system is needed to ensure tions. Realistic models, such as those used in lane
that only drivers with valid reservations travel on reservation, were proposed and will eventually
the dedicated lanes. This could be achieved by constitute the subject of further research.
using RFID tags located on vehicles, and RFID In order to more accurately evaluate the traffic
readers placed on the highway. control applications, more powerful microscopic
The lane entrance must be assisted by a simulator tools have been developed. The tools
VANET. More specific, since the dedicated lane integrate the network communication model and
will often be used at near-to-maximum capacity, the traffic / mobility model, and facilitate the
it is important that vehicles that enter or leave the interfacing with the core application modules.
lane do not create disruptions in the traffic flow One drawback is the high time consumption re-
on this lane. In order to allow smooth entering quired by simulation experiments besides other
and leaving, a VANET protocol can be designed. aspects like usability and flexibility. Since micro-
For example, the car that wants to enter the lane scopic simulators demonstrated their utility in the
will send a request to a vehicle already on the VANET applications design process, the increase
lane, asking for permission to enter. of tool performance, scalability, and flexibility
In order to evaluate such a large-scale system, will be subjects to future research work.
a proper simulation tool is needed. It should be The technological progress will stimulate
scalable enough to be able to simulate a large-scale new applications aiming to improve the traffic
highway traffic scenario. Furthermore, emulating safety and control strategies. More vehicles will
the application code run by each node would also be equipped with GPS receivers, communication
be required. The authors plan to investigate the devices compatible with different protocols (for
possibility of using VNSim in order to study and example DSRC), radars for identifying neighbors’
validate a lane reservation system. positions, equipment for storing digital maps,

278
Simulation of VANET Applications

etc. These and other similar components will Choffnes D. R., & Bustamante F. E. (2005).
facilitate the development of more complex safety An Integrated Mobility and Traffic Model for
applications (like imminent collision warning, Vehicular Wireless Networks. In Proceedings
obstacle detection, collision avoidance, etc.) and of the 2nd ACM International Workshop on Ve-
traffic control applications (like traffic congestion hicular Ad Hoc Networks (pp. 69—78). Cologne,
avoidance, traffic lights control, route computa- Germany.
tion, etc.). Obviously, the role of simulation in
CORSIM (2008). Microscopic Traffic Simulation
the evaluation of different solutions will become
Model. Retrieved March 19, 2008, from http://mc-
even more important.
trans.ce.ufl.edu/featured/tsis/version5/corsim50.
htm
REFERENCES Dashtinezhad, S., Nadeem, T., Dorohonceanu,
B., Borcea, C., Kang, P., & Iftode L. (2004).
Akcelik, R., & Besley, M. (2003, December). TrafficView: A driver assistant device for traffic
Operating cost, fuel consumption, and emission monitoring based on car-to-car communication,
models in aaSIDRA and aaMOTION. Paper In Proceedings of IEEE Semiannual Vehicular
presented at the 25th Conference of Australian Technology Conference. Milan, Italy.
Institute of Transport Research. Univ of South
Diaconescu, R., Gorgorin, C., Gradinescu, V.,
Australia, Adelaide.
Cristea, V., & Iftode, L. (2007). Collaborative
Barr, R. (2004). An efficient, unifying approach Route Planning in Vehicular Ad-hoc Networks.
to simulation using virtual machines. PhD thesis, In Proceedings of the CSCS-16 (pp. 267-274).
Cornell University, US. Bucharest, Romania.
Basagni, S., Chlamtac, I., Syrotiuk, V. R., & Eichler, S., Ostermaier, B., & Schroth, C. (2005)
Woodward., B. A. (1998). A distance routing effect Simulation of Car-to-Car Messaging: Analyzing
algorithm for mobility (DREAM). In Proceedings the Impact on Road Traffic. In Proceedings of the
of MobiCom ‘98 (pp. 76-84). Dallas, TX. 13th IEEE International Symposium on Model-
ing, Analysis, and Simulation of Computer and
Baumann, R., Legendre, F., & Sommer, P. (2008).
Telecommunication Systems (pp. 507-510). IEEE
Generic Mobility Simulation Framework (GMSF).
Computer Society  Washington, DC, USA
In Proceeding of the 1st ACM SIGMOBILE
workshop on Mobility models (pp 49-56). Hong Fellendorf, M., & Vortisch, P. (2001, January).
Kong, China Validation of the Microscopic Traffic Flow Model
VISSIM in Different Real-World Situations. Paper
Bononi, L., Di Felice, M., Bertini, M., & Croci,
presented at the 80th Meeting of the Transporta-
E. (2006). Parallel and Distributed Simulation of
tion Research Board. Washington, D.C.
Wireless Vehicular Ad Hoc Networks. In Proceed-
ings of the 9th ACM international symposium on Fujimoto, R. M., Perumalla, K., Park, A., Wu, H.,
Modeling analysis and simulation of wireless and Ammar, M. H., & Riley, G. F. (2003) Large-Scale
mobile systems (pp 28-35). Terromolinos, Spain Network Simulation: How Big? How Fast? In
Proceedings of the 11TH IEEE/ACM International
Broch, J., Maltz, D. A., Johnson, D. B., Hu, Y. C., &
Symposium on Modeling, Analysis and Simulation
Jetcheva, J. G. (1998). A Performance Comparison
of Computer Telecommunications Systems (pp.
of Multi-HopWireless Ad Hoc Network Routing
116-123). IEEE Computer Society Washington,
Protocols. In Proceedings of MobiCom’98 (pp.
DC, USA
85-97). Dallas, TX.

279
Simulation of VANET Applications

Gorgorin, C., Gradinescu, V., Diaconescu, R., and Networking Conference, WCNC 2007. IEEE
Cristea, V. & Iftode, L. (2006). An Integrated (pp. 2506-2511). Kowloon, Hong Kong.
Vehicular and Network Simulator for Vehicular
Karp, B., & Kung, H. T. (2000). GPSR: Greedy
Ad-hoc Networks. In Proceedings of the Eurosis
perimeter stateless routing for wireless networks.
European Simulation and Modeling Conference
In Proceedings of the 6th annual international
2006 (pp. 142-149). Toulouse, France.
conference on Mobile computing and network-
Gradinescu, V., Gorgorin, C., Diaconescu, R., ing (pp. 243-254). Boston, Massachusetts, United
Cristea, V., & Iftode, L. (2007). Adaptive Traf- States.
fic Lights Using Car-to-Car Communication. In
Katz, J. H. (1963). Simulation of a Traffic Network.
Proceedings IEEE 65th Vehicular Technology
Communications of the ACM, 6(8), 480-486
Conference (pp. 21-25). Dublin, Ireland.
Killat, M., Schmidt-Eisenlohr, F., Hartenstein,
Haerri, J., Filali, F., Bonnet, C., & Fiore, M. (2006).
H., Rössel, C., Vortisch, P., Assenmacher, S., &
VanetMobiSim: Generating Realistic Mobility
Busch, F. (2007). Enabling efficient and accurate
Patterns for VANETs. In Proceedings of the 3rd
large-scale simulations of VANETs for vehicular
international workshop on Vehicular ad hoc net-
traffic management. In Proceedings of the Fourth
works (pp 96—97). Los Angeles, CA, USA
ACM international Workshop on Vehicular Ad
Huaizhi, Li, & Singhal, M. (2005) A scalable Hoc Networks, VANET ‘07 (pp. 29-38). Montreal,
routing protocol for ad hoc networks. In Pro- Canada.
ceedings of the Vehicular Technology Confer-
Krajzewicz, D., Bonert, M., & Wagner, P. (2006).
ence 2005 Spring. 2005 IEEE 61st Volume 4 (pp.
The Open Source Traffic Simulation Package
2498—2503). Stockholm, Sweden
SUMO. Presented at RoboCup 2006 Infrastructure
Jardosh, A., Belding-Royer, Elizabeth M., Alm- Simulation Competition. Bremen, Germany.
eroth, K. C., & Suri, S. (2003). Towards realistic
Mahajan, A., Potnis, N., Gopalan, K., & Wang,
mobility models for mobile ad hoc networks. In
A. (2007). Modeling VANET Deployment in
MobiCom ’03: Proceedings of the 9th annual
Urban Settings. In Proceedings of the 10th ACM
international conference on Mobile computing
Symposium on Modeling, analysis, and simula-
and networking, (pp. 217—229). ACM Press,
tion of wireless and mobile systems (pp 151-158).
New York, USA.
Chania, Crete Island, Greece.
Jist/SWANS (2008). Java in Simulation Time /
Mangharam, R., Weller, D. S., Stancil, D. D., Ra-
Scalable Wireless Ad hoc Network Simulator.
jkumar & R., Parikh, J. S. (2005). GrooveSim: A
Retrieved March 19, 2008, from http://jist.ece.
Topography-Accurate Simulator for Geographical
cornell.edu/index.html
Routing in Vehicular Networks. In Proceedings
Johnson, D. B., Maltz, D. A. & Broch, J. (2001). of the 2nd ACM International Workshop on Ve-
DSR: The Dynamic Source Routing Protocol for hicular Ad Hoc Networks (pp. 59-68). Cologne,
Multi-Hop Wireless Ad Hoc Networks. In C. E. Germany
Perkins (Ed.), Ad Hoc Networking (pp. 139-172).
MOVE (2008). MObility model generator for
Addison-Wesley, 2001
VEhicular networks. Retrieved March 19, 2008,
Karnadi, F. K., Zhi, H. M., & Kun-chan, L. from http://www.csie.ncku.edu.tw/~klan/move/
(2007). Rapid Generation of Realistic Mobility index.htm
Models for VANET. Wireless Communications

280
Simulation of VANET Applications

ns-2 (2008). The ns-2 wiki. Retrieved March 18, Saha, A., & Johnson, D. (2004). Modeling Mobil-
2008 at http://www.isi.edu/nsnam/ns/doc/ ity for Vehicular Ad-hoc Networks. In Proceed-
ings of the 1st ACM International Workshop on
Petigara, N. D., & Balakrishnan, H. (2004).
Vehicular Ad Hoc Networks (VANET) (pp. 91-92).
Integrated routing and storage for messaging
Philadelphia PA, USA.
applications in mobile ad hoc networks. Mobile
Networks and Applications, 9(6), 595-604. Sklar, B. (1997). Rayleigh Fading Channels in
Mobile Digital Communication Systems Part I:
Perkins, C., & Bhagwat, P. (1994). Highly Dy-
Characterization. IEEE Communications Maga-
namic Destination-Sequence DistanceVector
zine, 35(7), 90-100
Routing (DSDV) for Mobile Computers. ACM
SIGCOMM Computer Communication Review, Sommer, C., Yao, Z., German R., & Dressler, F.
24(4), 234-244. (2008) On the Need for Bidirectional Coupling
of Road Traffic Microsimulation and Network
Piorkowski M., Raya M., Lugo A., Papadimitra-
Simulation. In Proceedings of the Computer
tos P., Grossglauser M., & Hubaux J. P. (2007,
Communications Workshops. INFOCOM (pp
September). TraNS: Realistic Joint Traffic and
1-6).Phoenix, AZ.
Network Simulator for VANETs. Short paper
presented at the Fourth ACM international Work- SUMO (2008). Simulation of Urban MObility.
shop on Vehicular Ad Hoc Networks, VANET ‘07. Retrieved March 19, 2008 from http://sumo.
Montreal, Canada. sourceforge.net/docs/bibliography.shtml
Potnis, N., & Mahajan, A. (2006). Mobility Models Taliwal, V., Jiang, D., Mangold, H., Chen, C., &
for Vehicular Ad Hoc Network Simulations. In Sengupta, R. (2004). Empirical determination
Proceedings of the 44th ACM Southeast regional of channel characteristics for DSRC vehicle-to-
conference (pp 746-747). Melbourne, Florida. vehicle communication. In Proc. 1st ACM Int.
Workshop on Vehicular Ad Hoc Networks (p. 88).
Qualnet (2001). Version 3.1 User’s Manual. Re-
Philadelphia PA, USA.
trieved March 19, 2008 from http://linux.ucla.
edu/~gavin/papers/SimulatorManual-3.1.pdf TIGER (2008). Topologically Integrated Geo-
graphic Encoding and Referencing system. Re-
Ravi, N., Smaldone, S., Iftode, L., & Gerla, M.
trieved March 19, 2008 from http://www.census.
(2007). Lane Reservation for Highways (Position
gov/geo/www/tiger/
Paper). Retrieved March 19, 2008 from www.
cs.rutgers.edu/~iftode/ILR-ITSC07.pdf VISSIM (2008). VISSIM Micro-Simulation Soft-
ware. Retrieved March 19, 2008 from http://www.
Rehunathan, D. B., Seet, B. C., & Luong, T. T.
english.ptv.de/cgi-bin/traffic/traf_vissim.pl
(2007). Federating of MITSIMLab and ns-2 for
realistic vehicular network simulation. In Pro- Wang, S. Y., Chou, C. L., Chiu, Y. H., Tseng, Y.
ceedings of the 4th international conference on S., Hsu, M. S., Cheng, Y. W., Liu, W. L., & Ho,
mobile technology, applications, and systems and T. W. (2007, September). NCTUns 4.0: An Inte-
the 1st international symposium on Computer grated Simulation Platform for Vehicular Traffic,
human interaction in mobile technology (pp 62- Communication, and Network Researches. Paper
67). Singapore presented at the 1st IEEE International Sympo-
sium on Wireless Vehicular Communications.
rfc3561 (2008). Ad hoc On-Demand Distance Vec-
Baltimore, MD, USA
tor (AODV) Routing. Retrieved March 19, 2008
from http://www.ietf.org/rfc/rfc3561.txt

281
Simulation of VANET Applications

Wiedemann, R. (1974) Simulation des Stras- workshop on Vehicular ad hoc networks (pp 49-
senverkehrsflusses. Schriftenreihe des Instituts 58). Montreal, Quebec, Canada
für Verkehrswesen der Universität Karlsruhe,
Yin, J., ElBatt, T., Yeung, G., Ryu, B., Habermas,
Heft 8
S., Krishnan, H., & Talty, T. (2004). Performance
Yang, Yi, Varshney, M., Mohan, S., & Bagrodia, evaluation of safety applications over DSRC ve-
R. (2007). High-Fidelity Application-Centric hicular ad hoc networks. In Proceedings of the
Evaluation Framework for Vehicular Networks. 1st ACM international Workshop on Vehicular Ad
In Proceedings of the fourth ACM international Hoc Networks (pp. 1-9). Philadelphia PA, USA

282
283

Chapter XV
In-Vehicle Network Architecture
for the Next-Generation
Vehicles
Syed Masud Mahmud
Wayne State University, USA

ABSTRACT

New types of communication networks will be necessary to meet various consumer and regulatory
demands as well as satisfy requirements of safety and fuel efficiency. Various functionalities of vehicles
will require various types of communication networks and networking protocols. For example, drive-
by-wire and active safety features will require fault tolerant networks with time-triggered protocols
to guarantee deterministic latencies. Multimedia systems will require high-bandwidth networks for
video transfer, and body electronics need low-bandwidth networks to keep the cost down. As the size
and complexity of the network grows, the ease of integration, maintenance and troubleshooting has
become a major challenge. To facilitate integration and troubleshooting of various nodes and networks,
it would be desirable that networks of future vehicles should be partitioned, and the partitions should
be interconnected by a hierarchical or multi-layer physical network. This book chapter describes a
number of ways using which the networks of future vehicles could be designed and implemented in a
cost-effective manner. The book chapter also shows how simulation models can be developed to evalu-
ate the performance of various types of in-vehicle network topologies and select the most appropriate
topology for given requirements and specifications.

Copyright © 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
In-Vehicle Network Architecture for the Next-Generation Vehicles

INTRODUCTION body electronics. This is the reason why currently


most vehicles have at least two serial buses: one for
Early vehicles used dedicated point-to-point con- power-train and the other for body electronics, as
nections for inter-module communications. As shown in Figure 1. Since there are some mutually
the number of modules and features increased required data between the two partitions of the in-
in vehicles, the wiring system became bulky, vehicle network, the partitions are interconnected
complex, expensive and difficult to install and by a gateway device as shown in Figure 1. The
maintain. As a result, over the years, evolution of two partitions need not use the same type of bus
in-vehicle communications via a serial bus took though they can. Since the LIN (Local Intercon-
place. A serial bus can replace all the dedicated nection Network) bus is less expensive and LIN
point-to-point wiring between modules. Thus, it protocol (Uplap, 2004) is less complex than the
significantly reduces wiring complexity as well corresponding CAN (Controller Area Network)
as weight of the vehicle making the vehicle more bus and CAN protocol (Motorola,1998), nowadays
fuel efficient. A serial bus system is also scalable, many vehicles are considering using a low-speed
meaning that more modules can be connected to LIN bus for body electronics and a high-speed
the bus at any time without requiring any changes CAN bus for power-train. The gateway device
at other modules. Since different functions of a which interconnects a CAN bus and a LIN bus
vehicle need different data rates, such as power- converts messages from one protocol to another
train needs higher data rate than body electronics, protocol when the messages need to go from one
the use of a single serial bus for the entire vehicle partition to another partition.
may not be the best choice to design the in-vehicle As the government and consumer demands
communication network. As high-speed electronic are increasing for many features such as safety,
components are more expensive than low-speed fuel efficiency, comfort, navigation, entertain-
electronic components, it would be desirable and ment, telematics, multimedia and many more,
cost effective to partition the serial bus into two future vehicles will have many more partitions.
buses: a high-speed serial bus and a low-speed Each partition will take care of a particular
serial bus. The high-speed bus can be used for type of application. All the partitions will need
power-train and the low-speed bus can be used for to be interconnected for exchanging mutually

Figure 1. An in-vehicle networking system with two partitions

Partition-1: Power-Train

Anti-Lock Brakes Module Engine Module High-Speed


CAN bus

Transmission Module Accident Avoidance Module

Gateway
Partition-2: Body Electronics Module

Instrument Module Door Module

Low-Speed CAN
Climate Control Module Lights Module or LIN Bus

284
In-Vehicle Network Architecture for the Next-Generation Vehicles

required information as well as for diagnostic mechanisms using the current technology are also
purposes. Like early vehicles, dedicated point- explained in this book chapter.
to-point connections among various partitions
will increase the complexity of connectivity, as
shown in Figure 2. Figure 2 shows an in-vehicle BACKGROUND
networking system with four partitions. Each
has its own bus system. Each pair of partitions is There is little doubt that the automobile is the
interconnected by a gateway device. For example, most revolutionary invention in the history of
Partition-1 and Partition-2 are connected by the transportation since the wheel. Over the last 100
gateway device G12. Similarly, Partition-1 and years, automobiles have gone through numer-
Partition-4 are connected by the gateway device ous phases of improvements. At the dawn of the
G14. The number of gateway devices increases twentieth century, transportation of people and
exponentially with the increase in the number of goods in timely and cost effective manner was the
partitions. For N partitions, the number of gate- main motivation behind developing automobiles.
way devices required for dedicated connections Safety, fuel efficiency, comfort, entertainment,
N! green house effect, etc. were not the major issues
among the various partitions is . Thus,
2 * ( N − 2)! for those early automobiles. Thus, the first genera-
dedicated connections among the partitions will tion automobiles were mostly mechanical devices,
be very complex and cost prohibitive. and they had very few electrical and electronic
As the number of partitions in a vehicle is components. As a result, interconnecting those
going to increase, the automakers must come up few electrical and electronic components was not
with less complex and less expensive techniques a major problem. After that, various new features
for interconnecting the partitions. were being added to automobiles out of necessity.
The main objective of this book chapter is Initially, the necessity of safety and fuel efficiency
to show various cost-effective interconnection was the main driving force behind improvements
mechanisms among the partitions of an in-vehicle of automobiles.
networking system. The advantages, disadvan- Since the 1960’s, there have been significant
tages and the feasibility of various interconnection improvements in vehicle safety. The introduction

Figure 2. Dedicated connections among four partitions of an in-vehicle networking system.

Partition-1 Partition-2
G12

G14 G23
G13 G24

G34

Partition-3 Partition-4

285
In-Vehicle Network Architecture for the Next-Generation Vehicles

of safety features such as seat belts, air bags, are created by transmitting microcontrollers and
crash zone, lighting system and new vehicle decoded by receiving microcontrollers based on
structures has dramatically reduced the rate of a particular communication protocol used by
crashes, injuries and fatalities. However, in spite vehicles. In the 1980’s, automotive companies
of these impressive improvements, according to were developing their own protocols and there
U.S. Department of Transportation there were was no standardization in networking protocols
nearly 45,000 fatalities in transportation accidents among various companies. As a result, jobs of
in the United States in 2004, of which 95 percent chip manufacturers, suppliers and mechanics
involved highway motor vehicles (USDOT, 2006). were becoming difficult because chip manufac-
By continuing with the passive safety technolo- turers had to make different chips for different
gies, it is difficult to achieve significant further protocols, suppliers had to make different parts
gains in reducing crash costs. Thus, engineers to make them compatible with different protocols
and researchers have started developing active and the mechanics had to use different diagnostic
safety technologies to further reduce the costs computers for different protocols. Recently almost
involved with vehicle crashes. As a result, more all automotive companies both in US and Europe
electrical and electronic components are being have started using Controller Area Network
added to vehicles. (CAN) protocol for in-vehicle networking. Thus,
The energy crisis pushed the automotive nowadays almost every high end vehicle has at
industries to make their vehicles more fuel ef- least one CAN network.
ficient. Fuel efficiency requires efficient burning The Society of Automotive Engineers (SAE)
of fuel inside engine cylinders which eventually has defined three basic categories of in-vehicle
requires optimal air-fuel ratio, optimal spark networks based on network speed and functions:
timing and optimal control of valves. As a result, Class A, Class B and Class C networks.
carburetors were replaced by computer controlled
electronic fuel injection systems; spark timing is • Class A is a low-speed network with a bit
controlled by computers; mechanical valves are rate of 10 Kbits/sec or less. Class A network
being replaced by electrical valves; and many is to be used for convenience features such
more, which eventually added more electrical as entertainment, audio, trip computer, etc.
and electronic components in vehicles. Class A functions require inexpensive and
As the electrical and electronic components low-speed communication, and typically
grew in vehicles, the dedicated point-to-point utilize generic UARTs (Universal Asyn-
interconnection among these components became chronous Receiver/Transmitter).
very bulky, complex and expensive. As a result, • Class B is a medium-speed network. Data
the concept of multiplexing or in-vehicle network- rate for Class B network is between 10
ing evolved since early 1980’s. In fact, one of the Kbits/sec and 125 Kbits/sec. The intended
first automotive papers that addressed the need application for Class B network is general
for vehicle multiplexing was published as early as information transfer such as instrument
1976 (Bell, 1976). Multiplexing uses a serial bus, cluster, vehicle speed, legislated emissions
and all electrical and electronic components are data, etc. In the US, the SAE adopted J1850
connected to this bus via microcontrollers. The as the standard protocol for Class B net-
microcontrollers take active role in exchanging in- works. SAE J1850 has two basic versions.
formation among various electrical and electronic The first is a 10.4 Kbits/sec VPW (Variable
components of the vehicles. The microcontrollers Pulse Width) type which uses a single bus
send information using messages. The messages wire. The second is a 41.6 Kbits/sec PWM

286
In-Vehicle Network Architecture for the Next-Generation Vehicles

(Pulse Width Modulation) type which uses airbag systems there are various protocols, such
a two-wire differential bus. as Safe-by-Wire (Lupini, 2004), Bosch Siemens
• Class C is a high-speed network, and it is Temic (BST), DSI and Byteflight (Lupini, 2004),
to be used for real-time control applications which are being investigated. Multimedia systems
such as power-train, vehicle dynamics, anti- need high-bandwidth networks such as MOST and
lock brakes, etc. The data rate for Class C IntelliBus (Lupini, 2004; Firlit, 2004), to transfer
network is 125 Kbits/sec to 1 Mbits/sec. video files. Wireless personal area networks with
CAN protocol has been selected for Class voice activated control are necessary for conve-
C applications. nience such as turning on/off lights, wipers, radio,
heat and air conditioner without taking hands off
Continuous regulatory demands for fuel ef- the steering wheel (Mahmud, 2006). Bluetooth
ficiency, safety and emission control are forcing or Wi-Fi protocol could be used for wireless per-
the automakers to implement advanced safety and sonal area network. Telematic systems need tech-
engine management systems. These advanced nologies such as Wi-Fi or Ultrawideband (UWB).
systems will require new types of networks and Thus, it is apparent that future vehicles will have
networking protocols. The demands for improved various types of networks with many partitions.
fuel efficiency require drive-by-wire systems that Interconnecting these partitions is necessary for
eliminate camshafts, power-sapping belt drives distributed control across various partitions and
and pumps, and a great deal of unnecessary weight. ease of diagnosis. Since automotive industry is
The goal of drive-by-wire is to replace as many very cost sensitive, interconnecting these parti-
mechanical systems as possible by equivalent elec- tions will be a challenging task especially when
tronic and electrical systems. Electric brakes will the number of partitions is large. Major studies
replace hydraulics, increasing safety, decreasing and in-depth analysis are necessary to determine
weight, lowering operating cost and eliminating optimal topology for interconnecting all the in-
the use of environmentally hazardous fluids. Steer- vehicle network partitions, to figure out optimal
ing columns will disappear and will be replaced bandwidth required from different types of net-
by electric steering, improving driver safety and work partitions for keeping latencies under certain
making it easy to provide left-hand and right-hand bounds, and to select appropriate communication
drive models. Similarly, as the demand for other protocols for different network partitions. Various
new features such as telematics, entertainment, topologies for interconnecting different in-vehicle
multimedia, pre-crash warning, driver assistance network partitions are investigated and presented
systems, remote diagnostic, software update, etc. in the next section of this book chapter.
increases, the complexity of in-vehicle commu-
nication networks increases as well. Depending
upon the new functionality of vehicle electronic INTERCONNECTION OF NETWORK
modules, different sets of modules will require PARTITIONS
different types of new networks. For example,
drive-by-wire and active collision avoidance Issues, Controversies and Problems
systems need fault tolerant networks with time-
triggered protocols such as TTP/C (TTTech, Multiplexing or in-vehicle networking evolved
2002), TTCAN (Fuehrer, 2001) and FlexRay due to the need for reducing wiring harness,
(FlexRay, 2004), to guarantee critical services ease of integration, ease of diagnosis and cost
with deterministic latencies. Airbag systems savings. Most of the today’s vehicles have only
need a protocol that can react very quickly. For two network partitions as mentioned earlier in

287
In-Vehicle Network Architecture for the Next-Generation Vehicles

this book chapter and also shown in Figure 1. A hierarchical bus-based network provides a
Interconnecting two partitions is a trivial problem. cost-effective interconnection solution technique
We need only one gateway device to connect the for partition-based systems (Mahmud, 1994).
two partitions. The gateway device must support Since interconnection using a hierarchical bus
protocols of both partitions. The gateway device requires less number of gateway devices, one
will do protocol conversions when messages need logical approach for interconnecting four parti-
to go from one partition to the other partition. tions of a vehicular network will be the use of a
Nowadays, microcontrollers are available that second level bus or an Level 2 bus (L2 bus), as
support various types of interfaces. For example, shown in Figure 3 (Mahmud, 2005). Figure 3
PIC18F4685 microcontroller supports SPI, I2C, shows that each partition has its own bus called
RS-485, RS-232, LIN and CAN interfaces. Simi- the Level 1 bus or L1 bus. Different partitions
larly, PIC18F97J60 microcontroller supports SPI, have different types of L1 buses. For example,
I2C, RS-485, RS-232, LIN and Ethernet interfaces. one partition may have a CAN bus as its L1 bus,
Thus, a microcontroller that supports both inter- and another partition may have a LIN bus as its
faces of the two partitions, shown in Figure 1, L1 bus. An L1 bus of a partition is connected to
can be used as the gateway device between the the L2 bus by a gateway device. For example,
two partitions. the L1 bus of Partition-1 is connected to the L2
As the number of partitions grows, dedicated bus using the gateway device G1, as shown in
point-to-point connections among various parti- Figure 3. Thus, the number of gateway devices
tions will require many gateway devices, and required to connect N partitions to the L2 bus
beyond a certain point it would be cumbersome is N. Whereas for dedicated point-to-point con-
and cost prohibitive. One of the challenging issues nections among various partitions, the number
will be the selection of an appropriate topology to N!
of required gateway devices is .
interconnect various partitions of the in-vehicle 2 * ( N − 2)!
network. Hence, the complexity of connections shown in
Figure 3 is much less than that shown in Figure
S 2. Figure 3 shows an additional unit called the
Diagnostic Gateway. Dealer will connect its
There are various existing network topologies such diagnostic computer (diagnostic module) to the
as bus, ring, mesh, crossbar, star, etc. Bus-based vehicle via this diagnostic gateway. Thus, for N
systems have many advantages over other inter- partitions in a system, total number of connections
connection systems (Das, 1985; Chen, 1999). Some to the L2 bus including the diagnostic gateway is
of the advantages of bus-based systems are low (N + 1). For a dedicated point-to-point connection
cost, lower complexity, greater reliability, better system, there has to be a gateway device between
scalability, simpler communication protocols and the diagnostic module and each partition. Thus
ease of diagnostics. Thus, in order to interconnect for a system with N partitions and a diagnostic
all partitions, one logical approach would be to module, dedicated point-to-point connections will
( N + 1)!
use another bus such as a hierarchical bus. require gateway devices. It is clear
2 * ( N − 1)!
that a two-level bus system, which contains an L1
Selection of a Topology bus for each partition and only one L2 bus for the
entire system, is a cost-effective way of intercon-
In this subsection, a number of multi-level necting all the partitions. The bit rate of the L2
bus-based network topologies are discussed bus should be at least equal to the total bit rate
and suggested for future in-vehicle networks.

288
In-Vehicle Network Architecture for the Next-Generation Vehicles

necessary for inter-partition communications for Mi


li , j
all partitions. Normally not too much inter-parti- di = ƒ (1)
t
j =1 i , j
tion data needs to be exchanged among various
partitions. Thus, a Class B or even a Class A bus
may be good enough. However, the final selection Let f i be the fraction of Partition-i’s messages
decision must be made after an extensive analysis that will go to the L2 bus. Then the total traffic
and simulation of the system. density on the L2 bus is
Required Bandwidth for the L2 bus: An ap-
N ≈ Mi l ÷
proximate analysis of the required bandwidth for N
d L 2 = ƒ di f i = ƒ ∆ƒ
i, j
∆ ◊◊f i (2)
the L2 bus can be determined as follows. Assume t
i =1  j =1 i , j
i =1 
that the system has N partitions. Let di be the traf-
fic density (bits/sec) on the L1 bus of Partition-i.
Nowadays, most messages for a vehicular system As the traffic density on a bus increases, the
are periodic. We would like to make it clear that queuing delay for the messages to get the bus
periodic messages are not to be confused with increases as well. If u is the utilization of a par-
time-triggered messages. Time slots are reserved ticular bus, then the probability that a message
for time-triggered messages but not for periodic will get the bus during its first trial is (1 – u). The
messages. Periodic messages need to go through probability that the message will not get the bus
an arbitration process to get the bus. If all peri- during its first trial but will get the bus during
odic messages and their periods for a particular its second trial is u(1 – u). In general, it can be
partition are known, then the value of di can be shown that the probability that the message will
estimated. Let Mi be the number of messages in not get the bus during the first (i – 1) trials but it
Partition-i, and li,j be the length of Message-j of will get the bus during the ith trial is ui–1(1 – u).
Partition-i with period ti,j. The value of di can Hence, the average number of trials necessary for

1
then be written as: the message to get the bus is ƒ iu i −1 (1 − u ) = .
i =1 1− u

Figure 3. An in-vehicle network with four L1 buses and one L2 bus

Partition-1 Partition-2

L1 Bus L1 Bus

G1 Diagnostic Gateway G2

L2 Bus
G3 G4

L1 Bus L1 Bus

Partition-3 Partition-4

289
In-Vehicle Network Architecture for the Next-Generation Vehicles

The average message transmission delay through End-to-End Message Latency for a 2-Level Bus
the bus, including the queuing delay for the bus, is System: In a 2-level bus system, an inter-partition
lavg message will first go through the L1 bus of the
. Where, lavg is the average length of a source partition, then it will go through the L2
(1 − u ) BW
message and BW is the bandwidth of the bus. For bus, and finally it will go through the L1 bus of
example, if u = 30%, lavg = 120 bits and BW = 500 the destination partition. Thus, various bus delays
kbits/sec, then the average message transmission and protocol conversion delays will contribute
delay including the queuing delay for the bus is to the total end-to-end message latency from
ulavg the source node to the destination node. For a
343 μsec. The average queuing delay is
(1 − u ) BW particular message, the end-to-end latency due to
and it increases very rapidly with the increase in network components, such as buses and gateway
bus utilization u. For example, for lavg = 120 bits devices, can be expressed as:
and BW = 500 kbits/sec, the average queuing
delay is 103 μsec for 30% bus utilization, and it is T = TSL1 + TSG +TL2 + TDG + TDL1 (4)
360 μsec for 60% bus utilization.
In vehicular networks, normally the bus where, TSL1 is the delay due to the L1 bus of the
utilization is kept around 30% or less to reduce source partition; TSG is time required by the source
contention on the bus so that a message is not gateway device (the gateway device which con-
significantly delayed to get the bus. Let uL2 be the nects the source L1 bus to the L2 bus) to convert
maximum allowable stead-state utilization of the messages from one protocol to another protocol;
L2 bus. The required bandwidth for the L2 bus TL2 is the delay due to the L2 bus; TDG is time
can then be expressed as required by the destination gateway device (the
gateway device which connects the destination L1
N ≈ M i li , j ÷ bus to the L2 bus) to convert messages from one
dL2
ƒ ∆∆ƒ ◊◊f i
i =1  j =1 ti , j 
protocol to another protocol; and TDL1 is the delay
BWL 2 = = (3) due to the L1 bus of the destination partition. TSG
u L2 uL 2
and TDG can also be called as protocol conversion
time. Substituting the values of bus delays in
Since, for a given system, the values of li,j and Equation (4), the end-to-end message delay can
ti,j are accurately known, and the value of f i can also be expressed as (see Box 1), where, lavg – SL1,
also be accurately determined by investigating uSL1 and BWSL1 respectively indicate the average
all the messages of a partition, the value of the message length, utilization and bandwidth of the
required bandwidth, BWL2, for the L2 bus can be source L1 bus; lavg – L2 , uL2 and BWL2 respectively
determined for a given value of uL2. However, the indicate the average message length, utilization
actual selection of the L2 bus needs to be made and bandwidth of the L2 bus; and lavg – DL1 , uDL1
after extensive simulation and analysis of the and BWDL1 respectively indicate the average
entire system. message length, utilization and bandwidth of the

Box 1.

lavg − SL1 lavg − L 2 lavg − DL1


T= + TSG + + TDG + (5)
(1 − uSL1 )BWSL1 (1 − uL 2 )BWL 2 (1 − uDL1 )BWDL1

290
In-Vehicle Network Architecture for the Next-Generation Vehicles

destination L1 bus. The message delay basically the bus. Hence, the maximum bit/rate capacity
has two components: the sum of the delays due to of the bus decreases.
all buses and the sum of the protocol conversion Future vehicles many require many partitions,
times for the gateway devices. Thus, the message one for each subsystem of the vehicle. For example,
delay for a two-level bus system can be expressed the airbag system will need a partition for itself
as, (see Box 2). because there could be as many as 64 nodes for
Since the number of gateway devices in a two- the airbag system (Lupini, 2004). In future, as the
level bus system increases linearly, as opposed to number of partitions will grow, various inter-parti-
exponential increase for dedicated point-to-point tion connection topologies should be investigated
connections, a two-level bus system is scalable in order to select an appropriate topology for
meaning that the system is easily expandable. interconnecting partitions. The remaining parts
Although the system shown in Figure 3 is scalable, of this book chapter present various topologies
the number of connections on the L2 bus will be for interconnecting partitions.
too many if there are too many partitions in the Figure 4 shows another design where, for
in-vehicle network. A bus with a given speed can the same number of partitions in the system,
support up to a certain number of nodes and up to a the number of connections to the L2 bus is less
certain length due to various reasons as explained than that shown in Figure 3. Figure 4 shows that
in the next few sentences. As the number of nodes six partitions (P1, P2, . . , P6) are connected to
increases, the capacitive loading effective on the the L2-bus using three gateway devices (G1, G2,
bus increases due to connections which eventu- and G3). Each gateway device has three ports:
ally increases the rise-time and fall-time of the two for connecting to two partitions and one for
electrical signals. As a result, the maximum bit connecting to the L2-bus. As mentioned ear-
rate capacity of the bus decreases. When more lier, nowadays commercial microcontrollers are
nodes are added to a bus, the total bandwidth available that support many different interfaces.
demand from all the nodes increases as well. Thus, for the gateway devices, G1, G2 and G3,
Thus, for a certain allowable bus utilization, the microcontrollers must be selected in such a way
bus will be able to support up to a certain number that they support necessary interfaces for the L1
of nodes. For example, if the bandwidth of a bus and L2 buses. The system shown in Figure 4 also
is 500kbits/sec and the allowable bus utilization has a diagnostic gateway (DG) connected to the
is 30%, then total bandwidth demand from all L2 bus. For the design shown in Figure 4, total
the nodes can’t exceed 150kbits/sec. If each node number of connections to the L2 bus including
needs a bus bandwidth of 10kbits/sec, then the bus the diagnostic gateway isN/2+1, where N is the
can support only up to 15 nodes. Lastly, when the number of partitions and the notation n means
length of the bus increases, the capacitive loading ceiling of n. Moreover, for the same number of
effective on the bus also increases. As a result, partitions in the system, the data rate required
the rise-time and fall-time of the signals increase, for the L2 bus of Figure 4 is less than that for the
especially for the end-to-end communication on L2 bus of Figure 3. The reason is that the data

Box 2.

≈ lavg −bus ÷
T= ƒ ∆

over − two − L1− buses  (1 − ubus ) BWbus
◊◊ + ƒ TPr otocolConversion (6)
and − one − L 2 − bus
 over − two − gateway
devices

291
In-Vehicle Network Architecture for the Next-Generation Vehicles

transfer between the pairs of partitions (P1, P2), these protocols are TTCAN, FlexRay and TTP/C.
(P3, P4) and (P5, P6) can go directly through the FlexRay and TTP/C support a dual-bus system.
gateway devices rather than through the L2 bus. In these systems, safety critical messages are
As a result, for the same L2 bus technology, the sent through both buses at the same time. Thus,
design shown in Figure 4 can support more parti- safety critical messages can still be delivered if
tions than that shown in Figure 3. only one bus is at fault at the time of delivery.
In order to design a system like the one shown in If the TTCAN protocol is ever going to be used
Figure 4, a partition, say Pi, should be paired with for drive-by-wire applications, then it must also
another partition, say Pj, such that inter-partition support two buses for tolerating single-bus faults.
traffic between the pair (Pi, Pj) will be more than Figure 5 shows another network architecture
that between any other pair (Pi, Pk) for all j ≠ k. where Partition P1 contains a network with a time-
In other words two partitions can be paired to- triggered protocol for drive-by-wire applications.
gether if they have more functional dependencies. P1 uses two buses to tolerate single-bus faults. As
Moreover, the two partitions which are going to a result, the gateway device G1 has four ports: two
be paired together should be physically close to for two L1 buses of P1, one for one L1 bus of P2
each other. Otherwise, very long wires will be and another one for the L2 bus.
necessary to connect them to the corresponding As mentioned earlier, pairing of partitions will
gateway device which will reduce the benefits of be feasible if the two partitions of a pair are close
multiplexing. to each other, and they have significant functional
In the recent past, drive-by-wire or x-by-wire dependencies. Otherwise, pairing will not provide
concepts have drawn significant attentions within any additional benefits to vehicle multiplexing.
the automotive industries. As drive-by-wire may If pairing is not possible due to functional
become a standard sometimes in the future, vari- or physical limitations, and if one L2 bus is not
ous safety critical messages may go through one enough to connect all partitions of a vehicular net-
for more L1 buses. To guarantee on-time delivery work, then two or more interconnected L2 buses
of safety critical messages, future in-vehicle net- can be used. The architecture shown in Figure 6
works should be designed such that the system has two L2 buses. Each L2 bus connects a number
will tolerate bus faults. Otherwise, the safety of of partitions to form a cluster of partitions. One
vehicles and passengers will be compromised. L2 bus connects Partitions P1 through Pi to form
There are various existing time-triggered pro- one cluster, and another L2 bus connects Parti-
tocols for drive-by-wire applications. Some of tions Pi+1 through Pj to form another cluster. The

Figure 4. An in-vehicle network with six partitions (P1, P2, . . , P6), three gateways/switches (G1, G2
and G3) and one diagnostic gateway (DG)

P1 P2 P3 P4 P5 P6

G1 G2 G3

L2 Bus
DG

292
In-Vehicle Network Architecture for the Next-Generation Vehicles

Figure 5. An in-vehicle network with six partitions, three gateways/switches and one diagnostic gateway.
Partition P1 has two L1 buses

P1 P2 P3 P4 P5 P6

G1 G2 G3

L2 Bus
DG

Figure 6. An in-vehicle network with two clusters of partitions. A gateway device G connects the two
clusters and a diagnostic gateway device DG

P1 P2 Pi Pi+1 Pi+2 Pj

G1 G2 Gi Gi+1 Gi+2 Gj
G
L2 Bus L2 Bus
DG
A Cluster of Partitions A Cluster of Partitions

two clusters are connected to a 3-port gateway with four clusters connected in a cascade manner.
device G. The third port of G is connected to the The four L2 buses of four clusters are connected
diagnostic gateway DG. In this type of systems, in a cascade manner using three gateway devices:
inter-cluster messages will have more end-to-end GW1, GW2, and GW3. The end-to-end message
latencies than inter-partition messages within the delay will be maximum when messages need to
same cluster because the inter-cluster messages go from Cluster 1 to Cluster 4 and vice versa.
will have to go through one more L2 bus and one The maximum delay can be expressed as, (see
more gateway device G. Since clustering has to be Box 3).
done in such a way that inter-cluster messages are The total number of gateway devices, including
not going to control vehicle dynamics in real-time, the diagnostic gateway, in an in-vehicle network
some additional latency for inter-cluster messages with cascaded clusters is m + c, where m is the
could be tolerated by the system. number of partitions, and c is the number of
If the in-vehicle networking system is going to clusters in the system.
have more than two clusters, then the additional If the inter-cluster message delay between
clusters can be connected in a cascade manner. Cluster 1 and Cluster 4 is too high and not accept-
Figure 7, shows an in-vehicle networking system able, then another way of interconnecting those

293
In-Vehicle Network Architecture for the Next-Generation Vehicles

Box 3.

≈ lavg −bus ÷
TCascade = ƒ ∆

over − two − L1− buses  (1 − ubus ) BWbus
◊◊ + ƒ− gateway TPr otocolConversion (7)
and − four − L 2 − buses
 devices
over − five

Box 4.

≈ lavg −bus ÷
THierarchical = ƒ ∆

over − two − L1− buses ,  (1 − ubus ) BWbus
◊◊ + ƒ TPr otocolConversion
(8)
two − L 2 − buses
 over − four − gateway
devices
and − one − L 3− buses

clusters would be the use of a third level bus or an cal in-vehicle network is m + c + 1, where m is
L3 bus. Figure 8 shows a system with four clusters the number of partitions, and c is the number of
interconnected by an L3 bus. The four clusters clusters in the system.
are connected to the L3 bus using four gateway From Equations (7) and (8), it is seen that the
devices: GW1, GW2, GW3 and GW4. The topology maximum end-to-end message delay for the hier-
shown in Figure 8 is in fact a hierarchical network archical network is less than that for the cascaded
topology with three levels. For the network shown network because for the cascaded network with
in Figure 8, the inter-cluster message delay can four clusters, in the worst case the messages have
be expressed as, (see Box 4). to go through six buses, and five gateway devices
The total number of gateway devices, including will have to run protocol conversion algorithms.
the diagnostic gateway, for a 3-level hierarchi- Whereas, for the hierarchical network with four

Figure 7. An in-vehicle network with four clusters connected in a cascade manner using gateway de-
vices: GW1, GW2, and GW3

Cluster 1 Cluster 2
P1 P2 Pi Pi+1 Pi+2 Pj

G1 G2 Gi Gi+1 Gi+2 Gj
GW1
L2 Bus L2 Bus
DG GW2
L2 Bus L2 Bus
GW3
Gk+1 Gk+2 Gm Gj+1 Gj+2 Gk

Pk+1 Pk+2 Pm Pj+1 Pj+2 Pk


Cluster 4 Cluster 3

294
In-Vehicle Network Architecture for the Next-Generation Vehicles

Figure 8. A hierarchical in-vehicle network with four clusters interconnected using an L3 bus
Cluster 1 Cluster 2
P1 P2 Pi Pi+1 Pi+2 Pj

G1 G2 Gi Gi+1 Gi+2 Gj

L2 Bus L2 Bus
GW1 DG GW2

L3 Bus
GW3 GW4
L2 Bus L2 Bus

Gk+1 Gk+2 Gm Gj+1 Gj+2 Gk

Pk+1 Pk+2 Pm Pj+1 Pj+2 Pk


Cluster 4 Cluster 3

Figure 9. An in-vehicle ring network with four will be a cost-effective choice than a hierarchical
clusters in-vehicle network.
If Clusters 1 and 4 are physically close to
Cluster 1 Cluster 2 each other, then another better way of forming
the network will be to connect the L2 buses of
GW1
L2 Bus L2 Bus Clusters 1 and 4 by a gateway device as shown
in Figure 9. As a result, a ring network is formed
GW4 DG GW2 at the level of L2 buses.
For the ring network, in the worst-case an
L2 Bus L2 Bus inter-cluster message will have to go through
GW3
two L1 buses, three L2 buses and four gateway
Cluster 4 Cluster 3 devices. Thus, the worst-case message delay can
be written as, (see Box 5).
From Equations (7), (8) and (9), it is seen that
the worst-case inter-cluster message delay for the
clusters, the messages have to go through five
ring network of Figure 9 is less than that for the
buses, and four gateway devices will have to run
cascaded network of Figure 7 but comparable
protocol conversion algorithms. For the hierarchi-
to that for the hierarchical network of Figure 8.
cal network, the price that we have to pay to get
However, the ring network will be less expensive
lower message delay compared to the cascaded
than the hierarchical network because it does not
network, is the cost of an extra gateway device
need the L3 bus. There is one minor disadvantage
and the cost of an extra bus (the L3 bus). Thus, if
of the ring network compared to the hierarchical
little bit longer inter-cluster message delay is not
network. In the hierarchical network, the messages
a major issue, then cascaded in-vehicle network

295
In-Vehicle Network Architecture for the Next-Generation Vehicles

Box 5.

≈ lavg −bus ÷
TRing = ƒ ∆

over − two − L1− buses  (1 − ubus ) BWbus
◊◊ + ƒ− gateway TPr otocolConversion (9)
and − three − L 2 − buses
 devices
over − four

from the diagnostic gateway to a network node generation vehicles. Types of simulations and
will have to go through three buses: the L3 bus, an techniques of developing simulation models for
L2 bus and an L1 bus, and two gateway devices. vehicular networks are described in the following
Whereas, in the ring network, for the worst-case, subsections of this book chapter.
the messages from the diagnostic gateway to a Types of Simulations: Computer simulations
network node will have to go through three buses: can be divided into two types (Molloy, 1989):
two L2 buses and an L1 bus, and three gateway i) time-based simulation and ii) event-based
devices. Since a slight increase in latency during simulation. In a time-based simulation, the
a diagnostic procedure is not a problem, a ring program control loop is associated with time.
network will be the choice among the all three For each execution of the main control loop, the
choices: cascade, hierarchical and ring, provided simulation clock advances by a fixed time unit.
the physical locations of the clusters enable a ring In the case of an event-based simulation, the
network to be formed. execution of the main loop represents a single
event. The simulation clock is simply advanced
by the amount of time since the last event. For
SMULATION MODELS FOR asynchronous systems, the event-based simula-
ANALYSF VARIOUS tion is computationally more expensive and ac-
IN-VEHICLE NETWORK curate than the time-based simulation. But, for
TOPOLOGIES synchronous systems, the time-based simulation
is as good as the event-based simulation, and it is
Extensive simulation and analysis should be computationally less expensive than event-based
done before a particular topology is selected for simulation. CAN protocol is an event-based
a particular type of vehicle. The performance protocol. Thus, an event-based simulation tool
of various partitions of the in-vehicle network will be the most appropriate tool for analyzing
as well as the entire network can be determined various performance parameters of a CAN bus.
by developing simulation models. After execut- Buses that use time-triggered protocols, such as
ing the simulation models on computers, one TTCAN, and FlexRay, carry both time-triggered
can determine the minimum requirements for and event-triggered messages. The time-based
different partitions of the network architecture. simulation can be used to simulate time-triggered
Some of these requirements will include mini- messages and the event-based simulation can be
mum processing powers needed from various used to simulate event-triggered messages. Thus,
electronic modules, minimum bandwidth needed a combination of both time- and event-based
from various buses, minimum computation power simulations is necessary to simulate a bus like
and minimum size of buffers needed in various TTCAN or FlexRay.
gateways, etc. Computer simulations will also Developing an Event-Based Simulation Tool:
allow us to select the optimal network topology Here we explain how to develop an event-based
needed to meet the requirements of the next simulation tool to meet the requirements of specific

296
In-Vehicle Network Architecture for the Next-Generation Vehicles

needs for the next generation vehicles. In a vehicle Components of the latency of an event: There
system, an event is triggered by a sensor or by the is a delay (latency) between the time an event
driver’s action such as pressing the brake or the occurs at a sensor or due to a driver’s action, and
gas paddle. The event then goes to a processor the time an actuator takes an action. The latency
queue, as shown in Figure 10. If the processor is has several components as shown in the follow-
busy or other events are waiting in the proces- ing equation.
sor queue, then the event stays in the processor
queue. Otherwise, the processor starts working on latency = tpq + tps + ttb + tbus + tpropagation + trb + tpd
the event immediately. The event, queued in the (10)
processor queue, will stay in the queue until the
previous events are taken care of by the proces- where,
sor. The processor spends some time (processing
time) on an event. After that, the processor tries • tpq = delay at the processor queue
to send a message through the bus (say CAN bus) • tps = processing time at the source node
connected to the processor. If the bus is available, • ttb = delay at the transmit buffer of the source
then the message is immediately sent to the bus. node
Otherwise, the message is queued in the transmit • tbus = transmit time through the bus
buffer of the node. The message will go through • tpropagation = propagation delay through the
the bus after the previous messages have been bus
transmitted. After a certain time (transmit time), • trb = delay at the receive buffer of the desti-
the message is queued to the receive buffer of the nation node
destination node. If the processor at the receiving • tpd = processing time at the destination
node is free, then it will immediately process the node
message. Otherwise, the processor will first take
care of other queued messages and then it will In the simulation model, the value of the delay,
process this new message. Figure 10 shows the tpq, at the queue of the source processor can be de-
entire process of information flow from a sensor termined by monitoring the arrival and exit times
to an actuator for a single-bus system. of the event in the processor queue. The value of

Figure 10. Information flow from a sensor to an actuator

Transmit Buffer
Processor Queue of CAN node
Sensor Processor

CAN Bus

Receive Buffer
of CAN node
Processor Actuator

297
In-Vehicle Network Architecture for the Next-Generation Vehicles

the processing time, tps, depends on the type of The value of tpropagation should be negligible
the processor. This time can be expressed as compared to other components of the delay. It
depends on the speed of electrical signals through
tps = k1s + k2sN (11) the bus. In free space, electromagnetic signals
take approximately one nanosecond to move a
Where k1s is a constant time, which represents the foot. Thus, the propagation delay through a bus
constant overhead of the processor at the source should be little over one nanosecond per foot. As a
node in order to prepare a message. This constant result, the value of tpropagation should be in the order
overhead may include: of few tens of nanoseconds which is very small
compared to other components of Equation (10).
• The time needed by the processor to get out Thus, the propagation delay through the bus can
of the main program, be ignored for performance analysis.
• The time needed by the processor to go to The value of trb can be determined by monitor-
the interrupt service routine (assuming that ing the arrival and exit times of the message in
the transmission of a message is interrupt the receive buffer of the destination node. Like
driven), tps, the value of tpd can be expressed as
• The time needed by the processor to check
some status bits and set/clear some control tpd = k1d + k2dN (13)
bits of the CAN controller,
• The time needed by the processor for some Where k1d is a constant time, which represents the
other house keeping operations. constant overhead of the processor at the destina-
tion node in order to decode a message, and k2d
Thus, for a given processor, the value of k1s is the additional overhead, per byte of data, in
can be calculated based on its clock frequency decoding the message.
and the number of instructions the processor For a system with multiple partitions, the
needs to execute the abovementioned operations. latency of an event can be expressed as, (see
The parameter k2s, shown in Equation (11), is Box 6).
another constant, per byte of data in coding the The term tgateway indicates the delay at each
message, and N is the number of data bytes in gateway device on the path of the signal. There
the message. are three components of tgateway: queuing delays at
The value of ttb can be determined by monitor- both the input and output queues of the gateway
ing the arrival and exit times of the message in and the time required for protocol conversion by
the transmit buffer of the source node. The value the gateway device.
of tbus can be expressed as Simulation Model: Figure 11 shows the block
diagram of an event-based simulation model. In
L
tbus = (12) an event-based simulation model, an event is
S generated by a scheduler. The scheduler gener-
Where, L is the total number of bits in the mes- ates this event based on some kind of realistic
sage, and S is the speed of the bus in bits/sec. For stochastic process. We can develop a stochastic
example, if the message is a CAN message, then model for a particular event by collecting a large
L will include the start bit, arbitration bits, RTR set of real data for that event. For example, the
bit, control bits, data bits, stuff bits, CRC bits, all stochastic model of the brake event (pressing the
delimiter bits and the end of frame bits. brake paddle by the driver), can be developed by

298
In-Vehicle Network Architecture for the Next-Generation Vehicles

Box 6.

latency = t pq + t ps + ttb + ƒ (t bus + t propagation )+ ƒ t gateway + trb + t pd (14)


over − all − buses − on − the over − all − gateways − on
path − of − the − signal the − path − of − the − signal

logging the driver’s brake activity over a long parameters that define the characteristics of the
period of time and collecting similar data from Poisson process of the event. As mentioned earlier,
many vehicles. these parameters of the stochastic model for an
After generating an event, the scheduler keeps event can be determined by collecting a large set
that event in the event queue, as shown in Figure of field data for that particular event. The model
11. When an event is dispatched from the event shown in Figure 11 can be used to simulate an
queue, another event is generated. This new event event-triggered system with an event-triggered
is then sent to the event queue. When a new event bus (say CAN bus).
enters into the event queue, it is sorted within the Since both TTCAN and FlexRay support time-
event queue using the event-time as the sorting and event-triggered messages, we can develop
key. The new event is then placed at an appropri- the simulation models of these buses by building
ate point in the event queue. After dispatching an another layer on the top of the event-based simula-
event from the event queue, the event is then sent tion model. Figure 12 shows a simulation model
to the event processing unit. The event processing of a combined time- and event-based system.
unit then simulates the event in exactly the same Here, the event scheduler is a deterministic as
way as a real system would process it. well as a stochastic process. In this case, a global
The stochastic model of an event determines simulation clock is maintained to keep the time-
the inter-arrival time of the event, based on the triggered events in sync. The frequency of this
behavior of the device that generates the event. global simulation clock (software clock) should
A synchronous device, such as a time-triggered be at least equal to the highest frequency clock
device, generates events after fixed interval of used in the in-vehicle network architecture. This
time. Hence, for a time-triggered system, the requirement on the software clock will allow us
inter-arrival time is fixed. But, an asynchronous to determine the latency and other performance
device doesn’t generate events after fixed interval parameters at a very high resolution (within a
of time. Most physical asynchronous systems clock cycle of the highest frequency clock of the
behave like a Poisson process. Thus, we can as- real system). At every global simulation clock
sume that a non time-triggered device will behave pulse, the event queue must be checked. If the
like a Poisson process. The stochastic model of event-time of the event at the head of the event
an event will have the appropriate values of the queue is less than or equal to the current value of

Figure 11. Model for an event-based simulation

Queue for events


Event Scheduler
(an asynchronous Event Event
process) Dispatcher Processor

299
In-Vehicle Network Architecture for the Next-Generation Vehicles

Figure 12. Model for an event- and time-based simulation

Global Simulation
Clock

Event Scheduler Queue for events


(asynchronous and Event Event
synchronous Dispatcher Processor
processes)

the global simulation clock, then the event will be dissemination, software upgrade in electronic
dispatched from the event queue. The dispatched modules, receiving data from content providers,
event will then be checked to determine whether sharing files, etc. Some researchers have pro-
it is a deterministic event or a non-determinis- posed architecture for Next Generation Vehicle
tic event. If it is a deterministic event, then the Network and presented a dynamic discovery ser-
deterministic scheduling process will be used to vice protocol for internet access (Baroody, 2005;
schedule the next deterministic event. Otherwise, Baroody, 2006). If future in-vehicle networks
stochastic scheduling process will be used to are not properly designed, then vehicles’ safety
schedule the next non-deterministic event. The could be compromised or its operation could be
scheduled event, whether deterministic or non- degraded due to various types of cyber attacks
deterministic, will then be sent to the event queue. from external entities. The in-vehicle network
The event will be placed in the event queue after that is mainly responsible for controlling vehicle
sorting it with other events in the event queue. dynamics, must be well protected from outside
The event-time will be used as the key to sort the cyber attacks. Good security software and fire-
events in the event queue. walls must be installed in all gateway devices
By developing a simulation model, one can de- that exchange vehicle’s dynamic information. The
termine various performance parameters of the gateway device that connects the telematic unit
in-vehicle network. These parameters will include, to the internal network of the vehicle must have
but not limited to, the latency of different types of a good firewall so that it can filter out all suspi-
message, busload, bandwidth, and throughput. cious information that is coming from outside.
After extensive research, if it is not possible to
come up with a good security solution to protect
FUTURE TRENDS vehicles’ safety-critical modules, then no external
traffic should be allowed to enter the safety-criti-
There is no doubt that future trends are going to cal modules.
be in the direction of drive-by-wire, active-safety, For collision avoidance applications, a vehicle
inter-vehicle communications and vehicle-to- will disseminate its dynamic information. How-
infrastructure communications. Future vehicles ever, current in-vehicle networks are not secure.
will access internet and exchange information This means that when receiving nodes are pick-
with other vehicles and road-side units for vari- ing up CAN messages from a CAN bus, they
ous reasons such as collision avoidance, message are not verifying whether or not the messages

300
In-Vehicle Network Architecture for the Next-Generation Vehicles

are authentic. The receiving nodes automatically must be interconnected together for functional
assume that the messages are valid as long as the dependencies and better diagnostic purposes.
messages are free from various types of errors A number of network topologies has been pre-
such as CRC error, bit error, stuff error and frame sented and analyzed for cost, bandwidth and
error. Thus, if a person with malicious intent message latencies. Since future vehicles will be
connects a device to the vehicle’s CAN bus and communicating with external entities for various
sends messages with wrong information, other reasons, the book chapter also addressed the issues
nodes will still accept them as valid messages. of security, safety and privacy which should be
The problem will occur when these messages with taken into consideration at the time of designing
wrong information are picked up by a gateway the in-vehicle network components. Finally, some
device and then routed to the vehicle’s telematic ideas have been presented in developing simula-
unit. The telematic unit will then broadcast these tion models to analyze various types of networks
messages with wrong information to other ve- which will ultimately help in selecting a network
hicles. As a result, there could be disruption of topology and various network components for a
traffic leading to accidents. given set of requirements and specifications.
Since vehicle-to-vehicle communication is a
peer-to-peer communication, protection of driv-
ers’ or owners’ privacy from peers is going to REFERENCES
be another challenging task. Privacy protected
secure communication is not an easy task. Good Baroody, R., Al-Holou, N., & Mohammad, U.
Cyber-Physical Systems at the network level are (2006). Reliable Dynamic Discovery Service-
necessary so that future vehicles will be able Based JINI for the Next Generation Vehicle
to communicate with external entities without Network. Proceedings of the 2006 SAE World
getting involved in safety, security and privacy Congress, Detroit, Michigan, Paper Number
problems. 2006-01-1329.
The issues related to vehicular network secu-
Baroody, R., Al-Holou, N., & Rashid, A. (2005).
rity are still at the research stage. The purpose of
Next Generation Vehicle Network (NGVN): Per-
this book chapter is not to provide any security
formance Analysis of Dynamic Discovery Service
solutions but to explain the significance of this
Protocol utilized for Internet Access. Proceedings
topic and what needs to be done to safely oper-
of the 2005 SAE World Congress, Detroit, Michi-
ate future intelligent vehicles. Many researchers
gan, Paper Number 2005-05AE-237.
have already started looking into these issues and
are trying to propose solutions (Hossain, 2007; Bell, R. (1976). Multiplexing – Past, Present, and
Rabadi, 2007; Rabadi, 2008). Future. SAE Paper Number 760178, Society of
Automotive Engineers, Warrendale, PA, 1976.
Chen, C-H., & Lin, F-F. (1999). An Easy-to-Use
CONCLUSON
Approach for Practical Bus-Based System De-
sign. IEEE Transactions on Computer, 48(8),
In this paper, we discussed various types of to- 780-793.
pologies and protocols that could be used in the
future in-vehicle networks. Due to the complexity Das, C. R., & Bhuyan, L. (1985, October). Band-
of the future in-vehicle networks, many partitions width availability of multiple-bus multiproces-
of the network will be required. These partitions sors. IEEE Transactions on Computers, 34(7),
918-926.

301
In-Vehicle Network Architecture for the Next-Generation Vehicles

Firlit, T., Sandoval, J., & Ellerbrock, P. (2004). Congress, Detroit, Michigan, Paper Number
IntelliBusTM Protocol:Flexible and Cost-Effec- 2005-01-1531.
tive Automotive Bus. Techincal Report, Aeroflex
Mahmud, S. M., & Shanker, S. (2006, May). An
Colorado Springs.
In-Vehicle Secure Wireless Personal Area Net-
FlexRay Consortium (2004). FlexRay Commu- work (SWPAN). IEEE Transactions on Vehicular
nications System Protocol Specification. Version Technology, 55(3), 1051-1061.
2.0.
Molloy, M. K. (1989). Fundamentals of Per-
Fuehrer, T., Mueller, B., Hartwich, F., & Hugel, R. formance Modeling. Macmillan Publishing
(2001). Time-Triggered CAN (TTCAN). Proceed- Company.
ings of the 2001 SAE World Congress, Detroit,
Motorola (1998). Bosch Controller Area Network
Michigan, Paper Number 2001-01-0073.
Version 2.0 Protocol Standard.
Hossain, I., & Mahmud, S. M. (2007). Analysis
Rabadi, N. M., & Mahmud, S. M. (2008). Driv-
of Group Key Management Protocols for Secure
ers’ Anonymity with a Short Message Length for
Multicasting in Vehicular Software Distribution
Vehicle-to-Vehicle Communications Network.
Network. Proceedings of the Third IEEE Inter-
Proceedings of the 5th IEEE Consumer Com-
national Conference on Wireless and Mobile
munications and Networking Conference, Las
Computing, Networking and Communications
Vegas, NV, January 10-12, 2008.
(WiMob 2007), Crowne Plaza Hotel, White Plains,
New York, USA, October 8-10, 2007. Rabadi, N. M., & Mahmud, S. M. (2007). Privacy
Protection Among Drivers in Vehicle-to-Vehicle
Hossain, I., & Mahmud, S. M. (2007). Analysis of
Communication Networks. Proceedings of the
a Secure Software Upload Technique in Advanced
4th IEEE Consumer Communications and Net-
Vehicles using Wireless Links. Proceedings of
working Conference, Las Vegas, NV, January
the 2007 IEEE Intelligent Transportation Systems
11-13, 2007.
Conference, Seattle, WA, USA, Sept. 30 - Oct. 3,
2007, pp. 1010-1015. TTTech (2002). Time-Triggered Protocol TTP/C
High-Level Specification Document Specification,
Lupini, C. A. (2004). Vehicle Multiplex Com-
Document number D-032-S-10-028.
munication: Serial Data Networking Applied to
Vehicular Engineering. Warrendale, Pensylvania: Uplap, R., Okhade, M., Ghanekar, P., Panse,
SAE. ISBN 0-7680-1218-X. O., Narayan, S., & Sable, A. (2004). LIN Pro-
tocol –Technology Review and Demonstration
Mahmud. S. M. (1994, July). Performance Analy-
in Power Window Application. Proceedings of
sis of Multilevel Bus Networks for Hierarchical
the 2004 SAE World Congress, Paper Number
Multiprocessors. IEEE Transactions on Comput-
2004-28-0019.
ers, 43(7), 789-805.
USDOT (2006, December). Transportation Sta-
Mahmud, S. M., & Alles, S. (2005). In-Vehicle
tistics Annual Report, U.S. Department of Trans-
Network Architecture for the Next-Generation
portation, Bureau of Transportation Statistics.
Vehicles. Proceedings of the 2005 SAE World

302
303

Compilation of References

802.11 (1999). Technical Specification. Retrieved from Abuhadrous, I., Nashashibi, F., Laurgeau, C., & Chin-
ref http://standards.ieee.org/getieee802/download. chole, M. (2004, June). Multi-Sensor Data Fusion
for Land Vehicle Localization Using MAPS TM. Paper
A*CAR. (2008). Automotive @ A*STAR. Brochure
presented at the IEEE Intelligent Vehicle Conference,
from Agency for Science, Technology and Research
Columbus, Ohio, USA.
(A*STAR).
Afkhamie, K. H., Katar, S., Yonge, L., & Newman, R. A.
AALCAR. (2008). Automotive CAN Network Diagnos-
(2005). Overview of the upcoming HomePlug AV Stan-
tics. Retrieved October 13, 2008, from http://www.aa1car.
dard. Power Line Communications and Its Applications,
com/library/can_systems.htm
International Symposium, 6-8 April, (pp. 400- 404).
Abbott, E., & Powell, D. (1999). Land-Vehicle Navigation
Ahmed, K., Moshe, E., Koutsopoulos, H., & Mishalani,
Using GPS. IEEE Proceedings of the Institute of Electri-
R. (1996). Models of freeway lane changing and gap ac-
cal and Electronics Engineer, 1(87), 145-162.
ceptance behavior. In Proc. ISTTT ’96 (pp. 501–515).
Abdessamie, R., & Gingras, D. (2008). A collaborative
Aijaz, A., Bochow, B., Dötzer, F., Festag, A., Gerlach,
navigation approach in intelligent vehicles. Paper pre-
M., Kroh, R., & Leinmüuller, T. (2006). Attacks on in-
sented at the Society of Automotive Engineering (SAE)
tervehicle communication systems - an analysis.In 3nd
Conference, paper no 1249 Detroit USA.
International Workshop on Intelligent Transportation,
Abdulhamid, H., Abdel-Raheem, E., & Tepe, K. E. (2007). Hamburg.
Channel estimation for 5.9 Ghz dedicated shortrange com-
Akcelik, R., & Besley, M. (2003, December). Operating
munications receiver in wireless access vehicular environ-
cost, fuel consumption, and emission models in aaSIDRA
ments. IET Communications Journal, 1(6), 1274-1279.
and aaMOTION. Paper presented at the 25th Conference
Abe, M., & Mokhiamar, O. (2007). An integration of of Australian Institute of Transport Research. Univ of
vehicle motion controls for full drive-by-wire vehicle. South Australia, Adelaide.
Proc. IMechE Part K: J. Multi-body Dynamics, 221,
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., &
117-127.
Cayirci, E. (2002). Wireless sensor networks: a survey.
Abidi, M. A., & Gonzalez, R. C. (1992). Data Fusion Computer Networks, 38 (4), 393–422.
In Robotics And Machine Intelligence. NY, USA: Aca-
Anda, J., LeBrun, J., Chuah, C.-N., Ghosal, D., & Zhang,
demic Press.
H. M. (2005). VGrid: Vehicular ad hoc networking and
Abramson, N. (1970). The ALOHA system – Another computing grid for intelligent traffic control. In Proc.
alternative for computer communications, AFIPS Con- IEEE VTC 2005-spring, 5, 2905–2909.
ference (pp. 295-298).

Copyright © 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Compilation of References

Anderson, B., & Moore, J. (1979). Optimal Filtering. Artimy, M., Robertson, W., & Phillips, W. (2006). Mini-
Englewood, NJ: Prentice Hall. mum transmission range in Vehicular Ad Hoc Networks
over uninterrupted highways. In The 9th International
Andrieu, C., & Doucet, A. (2002). Particle filtering for
IEEE Conference on Intelligent Transportation Systems,
partially observed Gaussian state space models. Journal
Toronto, Canada, Sep., 17-20.
Royal Statistical Society B., 4(64), 827–836.
Arulampalam, S., Maskell, S., Gordon N., & Clapp T.
Anon (2003, December). Cutting down on the chips.
(2002). A Tutorial on Particle Filters for Online Nonlin-
Automotive Engineer, (pp. 48-51).
ear/Non-Gaussian Bayesian Tracking. IEEE Transactions
Anwar, S. (2005). Generalized Predictive Control of Yaw on Signal processing, 50(2), 174-188.
Dynamics of a Hybrid Brake-By-Wire Equipped Vehicle.
Ateniese, G., & Tsudik, G. (1999). Group signatures à-
International Journal of Mechatronics, 15(November),
la-carte. In SODA ‘99: Proceedings of the tenth annual
1089-1108.
ACM-SIAM symposium on Discrete algorithms, (pp.
Anwar, S. (2006). Anti-Lock Braking Control of a Hybrid 848-849), Philadelphia, PA, USA, Society for Industrial
Brake-By-Wire System. Journal of Automobile Engineer- and Applied Mathematics.
ing – IMechE Proceedings Part D., 220(8), 1101-1117.
Audi CAN-bus. (2008). Trainer Information. Edition 1
Anwar, S., & Chen, L. (2007). An Analytical Redun-
Automotive Systems Research Group. (2008). Retrieved
dancy Based Fault Detection and Isolation Algorithm
from http://www.ttcan.com/ASRG
for a Road-Wheel Control Subsystem in a Steer-By-Wire
System. IEEE Transactions on Vehicular Technology, AUTOSAR. (2008). Retrieved September 2, 2008, from
56(5), 2859-2869. http://www.autosar.org

Ardeshiri, T. et al. (2006). Offset Eliminative Map Bai, F., Sadagopan, N., & Helmy, A. (2003, April).
Matching Algorithm for Intersection Active Safety Ap- Important: A framework to systematically analyze the
plications. Proceedings Intelligent Vehicles Symposium Impact of Mobility on Performance of Routing Protocols
IV2006, Tokyo. for Ad-hoc Networks. IEEE INFOCOM, 2, 825-835.

Arem, B. van, Driel, C. van., & Visser, R. (2006). The Bajpai, G., Chang, B.C., & Lau, A. (2001, September).
Impact of Cooperative Adaptive Cruise Control on Reconfiguration of Flight Control Systems for Actuator
Traffic-Flow Characteristics. IEEE Transactions On Failures. IEEE AESS Systems Magazine, (pp. 29-33).
Intelligent Transportation Systems, 7(4).
Bando, M., Hasebe, K., Nakayama, A., Shibata, A., &
Armknecht, F., Festag, A., Westhoff, D., & Zeng, K. Sugiyama, Y. (1995). Phys. Rev. E, 51(2), 1035–1042.
(2007). Cross-layer privacy enhancement and non-
Bantli, H., Ring, E., & Goff, E. (1997). Requirements
repudiation in vehicular communication. In WMAN
for direct short range vehicle to roadside communica-
2007, Bern.
tions. Proceedings of the IEEE Aerospace Conference,
Armstrong, L. (2008). What is DSRC? Retrieved 1, 41-61.
September 2, 2008, from http://www.leearmstrong.
Baranowski, S., Lienard, M., & Degauque, P. (1991, Feb-
com/DSRC/DSRCHomeset.htm
ruary). Beacon-vehicle link in the 1-10 GHz frequency
Artimy, M., Robertson, W., & Phillips, W. (2005b). range. DRIVE Conference (pp. 194-217).
Assignment of dynamic transmission range based on
Baroody, R., Al-Holou, N., & Mohammad, U. (2006).
estimation of vehicle density. In VANET’05, Cologne,
Reliable Dynamic Discovery Service-Based JINI for
Germany, Sep., 2.
the Next Generation Vehicle Network. Proceedings of

304
Compilation of References

the 2006 SAE World Congress, Detroit, Michigan, Paper Ben-Akiva, M., Davol, A., Toledo, T., Koutsopoulos, H.
Number 2006-01-1329. N., Burghout, W., Andréasson, I., Johansson, T., & Lun-
din, C. (2002). Calibration and evaluation of mitsimlab in
Baroody, R., Al-Holou, N., & Rashid, A. (2005). Next
stockholm. In Procedings of 81st Transportation Research
Generation Vehicle Network (NGVN): Performance
Board Meeting, Washington, DC, USA, Jan. 13-17.
Analysis of Dynamic Discovery Service Protocol uti-
lized for Internet Access. Proceedings of the 2005 SAE Berefelt, F., Boberg, B., Nygards, J., Stromback, P., &
World Congress, Detroit, Michigan, Paper Number Wirkander, S.-L. (2004). Collaborative GPS/INS Naviga-
2005-05AE-237. tion in Urban Environment. Swedish Defence Research
Agency ION-NTM FOI, (pp. 1114-1125). Sweden.
Barr, R. (2004). An efficient, unifying approach to
simulation using virtual machines. PhD thesis, Cornell Bertsekas, D., & Gallager, R. (1992). Data networks.
University, US. Englewood Cliffs, NJ: Prentice Hall.

Basagni, S., Chlamtac, I., Syrotiuk, V. R., & Woodward., Bevas, R., & Bevas, V. (1997). Routing in ad hoc networks
B. A. (1998). A distance routing effect algorithm for using a spine. Proceedings in the Sixth International
mobility (DREAM). In Proceedings of MobiCom ‘98 Conference in Computer and Communication Networks,
(pp. 76-84). Dallas, TX. (pp.34–39).

Baumann, R., Legendre, F., & Sommer, P. (2008). Generic Bevly, D. M. (2004). Global positioning system (GPS):
Mobility Simulation Framework (GMSF). In Proceed- A low-cost velocity sensor for correcting inertial sensor
ing of the 1st ACM SIGMOBILE workshop on Mobility errors on ground vehicles. J. Dyn. Syst. Meas. Contr.,
models (pp 49-56). Hong Kong, China 126(2), 255–264.

Beattie, J. B. (1998). Self-localisation in the senario au- Biswas, P., & Ye Y. (2004, April). Semidefinite Program-
tonomous wheelchair. Journal of Intelligent and Robotic ming for Ad Hoc Wireless Sensor Network Localization.
Systems, 22, 255-267. Presented at the IPSN-04 Conference on Information
Processing in Sensor Networks, Berkeley, CA, USA,
Beikirch, H., & Voss, M. (2000). CAN-transceiver for
(pp. 46-54).
field-bus power line communication. ISPLC Symposium,
Limerick, Ireland, April, (pp. 257–264). Biswas, S., Tatchikou, R., & Dion, F. (2006). Vehicle-to-
vehicle wireless communication protocols for enhanc-
Bell, R. (1976). Multiplexing – Past, Present, and Fu-
ing highway traffic safety. In IEEE Communications
ture. SAE Paper Number 760178, Society of Automotive
magazine, 44 , 74-82).
Engineers, Warrendale, PA, 1976.
Blough, D. M., Leoncini, M., Resta, G., & Santi, P. (2006).
Bellare, M., Micciancio, D., & Warinschi, B. (2003).
The k-neighbors approach to interference bounded and
Foundations of group signatures: formal definition,
symmetric topology control in ad hoc networks. IEEE
simplified requirements and a construction based on
Transactions on Mobile Computing, 5(9), 1267-1282.
trapdoor permutations. In Eli Biham, (Ed.), Advances
in cryptology - EUROCRYPT 2003, vol. 2656 of Lecture Bluetooth (2008). Retrieved from http://www.bluetooth.
Notes in Computer Science, (pp. 614-629), Warsaw, org/
Poland, Springer-Verlag.
Bluetooth. (2008). Bluetooth standard. Retrieved October
Bellare, M., Shi, H., & Zhang, C. (2004). Foundations 13, 2008, from http://www.bluetooth.com
of group signatures: The case of dynamic groups.
Blum, J., & Eskandarian, A. (2004) The threat of intel-
In CT-RSA’05, Lecture Notes in Computer Science,
ligent collisions. IT Professional, 6, 24-29.
Springer-Verlag.

305
Compilation of References

Blum, J., Eskandarian, A., & Hoffman, L. (2004). Chal- Brasche, G., Rokitansky, C.-H., & Wietfeld, C. (1994).
lenges of intervehicle ad hoc networks. IEEE Transactions Communication Architecture and Performance Analysis
on Intelligent Transprotation Systems, 5(4), 347-351. of Protocols for RTT Infrastructure Networks and Vehicle-
Roadside Communications. Proceedings of the IEEE 44th
BMBF. Network on Wheels. Retrieved June 8, 2008,
Vehicular Technology Conference, 1, 384-390.
from: http://www.network-on-wheels.de
Brickell, E., Camenisch, J., & Chen, L. (2004). Direct
Böhm, A. (2007). State of the art on network layer
anonymous attestation. In CCS ‘04, (pp. 132-145), New
aspects for inter-vehicle communication (Tech. Rep.
York, NY, USA, 2004. ACM Press.
IDE 0748).
Broch, J., Maltz, D. A., Johnson, D. B., Hu, Y. C., &
Bonanno, G., Fantoni, R., Fichera, A., Fornetti, G.,
Jetcheva, J. G. (1998). A Performance Comparison of
Moriconi, C., Poggi, C., et al. (2003). The sensing sub-
Multi-HopWireless Ad Hoc Network Routing Protocols.
system of RAS.
In Proceedings of MobiCom’98 (pp. 85-97). Dallas,
Boneh, D., & Shacham, H. (2004). Group signatures with TX.
verifier-local revocation. In CCS ‘04, (pp. 168–177), New
Broch, J., Maltz, D., Johnson, D., Hu, Y.-C., & Jetcheva J.
York, NY, USA, ACM Press.
(1998). A performance comparison of multi-hop wireless
Boneh, D., Boyen, X., & Shacham, H. (2004). Short group ad hoc networks routing protocols. In Proceedings of the
signatures, In Crypto ‘04, LNCS 3152 (pp. 41-55). 4th ACM/IEEE International Conference on Mobile Com-
puting and Networking (MOBICOM), (pp. 85-97).
Bonnifait, P., Bouron, P., Meizel, D., & Crubille, P.
(2003). Dynamic Localization of Car-like Vehicles using Broughton, J., & Walter, L. (2007). Trends in fatal car
Data Fusion of Redundant ABS Sensors. The Journal of accidents: Analysis of CCIS Data (Published project
Navigation, 3(56), 429–441. UK. report PPR 172). TRL Limiter.

Bononi, L., Di Felice, M., Bertini, M., & Croci, E. Brown, M., Hankerson, D., Lopez, J., & Menezes, A.
(2006). Parallel and Distributed Simulation of Wireless (2001). Software implementation of the NIST elliptic
Vehicular Ad Hoc Networks. In Proceedings of the 9th curves over prime fields. In CT-RSA 2001, (pp. 250-265),
ACM international symposium on Modeling analysis and London, UK. Springer-Verlag.
simulation of wireless and mobile systems (pp 28-35).
Brown, R. G., & Hwang, P. C. (1997). Introduction to
Terromolinos, Spain
Random Signals and Applied Kalman Filtering. New
Borgonovo, F., Capone, A., Cesana, M., & Fratta, L. York, NY, USA: John Wiley and Sons.
(2004, July) ADHOC MAC: A new MAC architecture
Burkhart, M., Rickenbach, P. von, Wattenhofer, R., &
for ad hoc networks providing efficient and reliable
Zollinger, A. (2004). Does topology control reduce inter-
point-to-point and broadcast services. ACM Wireless
ference. In MobiHoc’04, Roppongi, Japan, May 24-26.
Networks, 10, 359-366.
C2C. (2008). European based Car-to-Car communica-
Boris & Arkady (1999). Link state routing protocol with
tion Consortium. Retrieved October 13, 2008, from
cluster based flooding for mobile ad-hoc computer net-
http://www.car-to-car.org
works. Proceedings of the Workshop on Computer Science
and Information Technologies CSIT’99, (pp.28–36). C2C-CC. Retrieved June 8, 2008, from: http://www.car-
to-car.org
Bose, A., & Ioannou, P. A. (2003). Analysis of traffic flow
with mixed manual and semi-automated vehicles. IEEE Calandriello, G., Papadimitratos, P., Hubaux, J.-P., & Lioy,
Trans. Intell. Transport. Syst., 4(4), 173–188. A. (2007). Efficient and robust pseudonymous authen-
tication in VANET. In Proceedings of the Fourth ACM

306
Compilation of References

international Workshop on Vehicular Ad Hoc Networks Chang, S. C. (2007). Adoption of state feedback to control
(Montreal, Quebec, Canada, September 10th, 2007). dynamics of a vehicle with a steer-by-wire system. Proc.
VANET ‘07. ACM, New York, NY, (pp. 19-28). IMechE Part D: J. Automobile Engineering, 221, 1-12.

California PATH. Retrieved September 2, 2008, from Chaum, D. (1985). Security without identification: Trans-
http://www.path.berkeley.edu action systems to make big brother obsolete. Commun.
ACM, 28(10), 1030-1044.
CALM. (2008). CALM Continuous Communications for
Vehicles. Retrieved September 2, 2008, from http://www. Chaum, D., & van Heyst, E. (1991). Group signatures.
calm.hu/ In EUROCRYPT, (pp 257-265).

CAN. (2001). Retrieved from official web site http://www. Chen, C., Jia, Z., & Varaiya, P. (2001). Causes and cures
can-cia.org/ of highway congestion. IEEE Control Syst. Mag., 21(6),
26–32.
Cannon, M. E., Nayak, R., Lachapelle, G., Salychev, O.
S., &Voronov, V. V. (2001) Low-cost INS/GPS Integra- Chen, C., Petty, K., Skabardonis, A., Varaiya, P., & Jia,
tion: Concepts and Testings, Journal of Navigation, Z. (2001). Freeway performance measurement system:
54(1), 119-134. Mining loop detector data. Transp. Res. Rec., 1748,
96–102.
Car 2 Car Communication Consortium. (2008). Retrieved
September 2, 2008, from http://www.car-to-car.org Chen, C-H., & Lin, F-F. (1999). An Easy-to-Use Ap-
proach for Practical Bus-Based System Design. IEEE
Caron, F., Davy, M., Duflos, E., & Vanheeghe, P. (2007).
Transactions on Computer, 48(8), 780-793.
Particle Filtering for Multisensor Data Fusion with
Switching Observation Models: Application to Land Chen, Q., Schmidt-Eisenlohr, F., Jiang, D., Torrent-
Vehicle Positioning. IEEE Transactions on Signal Pro- Moreno, M., Delgrossi, L., & Hartenstein, H. (2007).
cessing, 6(55), 2703-2719. Overhaul of IEEE 802.11 modeling and simulation in
ns-2. In Proceedings of the 10th ACM Symposium on
Caron, F., Duflos, E., Pomorski, D., & Vanheeghe, P.
Modeling, analysis, and simulation of wireless and
(2006). GPS/IMU Data Fusion using Multisensor Kalman
mobile systems (Chania, Crete Island, Greece, October
Filtering: Introduction of Contextual Aspects. Informa-
22-26, (pp 159-168).
tion Fusion, 7(2), 221-230. Holland: Elsevier.
Chen, Y., & Chen, L. (2005). Using Bluetooth wireless
Caron, F., Smets, P., Duflos, E., & Vanheeghe, P. (2005,
technology in vehicles. IEEE International Conference
July). Multisensor data fusion in the frame of the TBM
Vehicular Electronics and Safety, 14-16 October, (pp.
on reals. Application to land vehicle positioning. Paper
344- 347).
presented at the International Conference on Information
Fusion (FUSION’05), Philadelphia, PA, USA. Chennikara-Varghese, J., Chen, W., Altintas, O., & Cai,
S. (2006, July). Survey of routing protocols for inter-ve-
CarTALK 2000. Communication Architecture. Retrieved
hicle communications. IEEE Workshop on Mobile and
June 8, 2008, from: http://www.cartalk2000.net
Ubiquitous Systems Conference (pp. 1-5).
Chan, Y-T, Tsui, W-Y., So, H-C. & Ching, P-C. (2006),
Ching-Chuan, Hsiao-Kuang, W., & Mario, G. (1997). Rout-
Time-of-Arrival Based Localization Under NLOS Con-
ing in clustered multihop, mobile wireless networks with
ditions. IEEE Transactions on Vehicular Technology,
fading channel. IEEE Singapore International Conference
1(55), 17-24.
on Networks, (pp. 197–211).
Chang, J.-M., & Maxemchuk, N. F. (1984). Reliable
Choffnes D. R., & Bustamante F. E. (2005). An Inte-
Broadcast Protocols. ACM Transactions on Computer
grated Mobility and Traffic Model for Vehicular Wireless
Systems, 2, 251-273.

307
Compilation of References

Networks. In Proceedings of the 2nd ACM International CORSIM (2008). Microscopic Traffic Simulation Model.
Workshop on Vehicular Ad Hoc Networks (pp. 69-78). Retrieved March 19, 2008, from http://mctrans.ce.ufl.
Cologne, Germany. edu/featured/tsis/version5/corsim50.htm

Choffnes, D. R., & Bustamante, F. E. (2005). An inte- Cottingham, D. N., Wassell, I. J., & Harle, R. K. (2007).
grated mobility and traffic model for vehicular wireless Performance of IEEE 802.11a vehicular context. 65th IEEE
networks. In Proc. VANET ’05 (pp. 69–78). New York, Vehicular Technology Conference, (pp. 854-858).
NY, USA: ACM.
Crawford, M., & Workman, J. (1980). Predicting free-
Chowdhury, D., Santen, L., & Schadschneider, A. (2000). space radiated emissions from electronic equipment
Statistical physics of vehicular traffic and some related using TEM cell and open-field site measurements. Proc.
systems. Physics Reports, 329, 199. IEEE Int. Symp. on Electromagn. Compat., (pp. 80-85).
Baltimore, MD.
Chu, L., Liu, H. X., Recker, W., & Zhang, H. M. (2004).
Performance evaluation of adaptive rampmetering Crawford, S., & Cannon, M. E. (2005). Performance
algorithms using microscopic traffic simulation model. Evaluation of Sensor Combinations for Mobile Platoon
J. Transp. Engrg., 130(3), 330–338. Control; Positioning, Location, and Navigation (PLAN)
Group, (Tech. Rep.) University of Calgary, Calgary
Chuah, T. C., & Sharif, B. S. (2001). Robust adaptive
Alberta, Canada
spread-spectrum receiver with neural-net preprocess-
ing in non-gaussian noise. IEEE Transaction on Neural Crisan, D., & Doucet, A. (2002). A survey of theoreti-
Networks, 3(12), 546-558. cal results on particle filtering for practitioners,” IEEE
Transaction on. Signal Processing, 3(50), 736-746.
CI-6558, P. (n.d.). Acceleration sensor. (http://hug.
phys.huji.ac.il/PHYS HUG/MAABADA/MABADA Crowther, W., Rettberg, R., Walden, D., Ornstein, S., &
A/Pasco/ci/ci-6558/012-06361b/012-06361b.pdf, last Heart, F. (1973). A system for broadcast communication:
accessed: April 2008). Reservation-ALOHA. Hawaii International Conference
on System Sciences.
CiA. (2008). CAN in Automation. Retrieved October 13,
2008, from http://www.can-cia.org/ Cui, Y. J., & Ge, S. S. (2002). Autonomous vehicle posi-
tioning with GPS in Urban Canyon environments, IEEE
CiA. (2008). CAN-based in-vehicle networks. Retrieved
Transactions in Robotics and Automation, 19.
September 2, 2008, from http://www.can-cia.de/index.
php?id=228 Cvetkovski, B., & Gavrilovska, L. (1998). A simulation
of a mobile Highway traffic. Proceedings of the IEEE
CISPR25. (2002). Limits and methods of measurement
Vehicular Technology Conference, 2, 1429-1433.
of radio disturbance characteristics for the protection
of receivers used on board vehicles. Technical report, CVIS Project Partners. (2008). Retrieved June 2008,
CISPR-25, 2002. from http://www.cvisproject.org

Controller Area Network. (2008). Retrieved September Da Chen, Z., Kung, H.-T., & Vlah, D. (2001). Ad Hoc Relay
2, 2008, from http://www.can-cia.org/ Wireless Networks over Moving Vehicles on Highways.
Proceedings in International Conference on Mobile
Cook, J. A., Kolmanovsky, I. V., McNamara, D., & Prasad,
Computing and Networking, (pp. 247-250).
K. V. (2007). Control, Computing, and Communications:
Technology for the twenty-first century Model T. Pro- Dammeyer, J. (2008). Wireless Controller Area Network.
ceedings of the IEEE Special Issue Advanced Automobile Retrieved September 2, 2008, from http://www.autoarti-
Technologies, 95(2). sans.com/documents/canrf_prod_announcement.pdf

308
Compilation of References

Daniels, J. (2005). Practicalities. Automotive Engineer, Department of Transport. (2008). Retrieved June 2008,
30(10), 33. from http://www.itslessons.its.dot.gov/

Das, C. R., & Bhuyan, L. (1985, October). Bandwidth Dia, H., & Purchase, H. (1999). Modeling the impacts of
availability of multiple-bus multiprocessors. IEEE advanced traveler information systems using intelligent
Transactions on Computers, 34(7), 918-926. agents. Road and Transport Research, 8.

Dashtinezhad, S., Nadeem, T., Dorohonceanu, B., Borcea, Diaconescu, R., Gorgorin, C., Gradinescu, V., Cristea,
C., Kang, P., & Iftode L. (2004). TrafficView: A driver V., & Iftode, L. (2007). Collaborative Route Planning
assistant device for traffic monitoring based on car-to- in Vehicular Ad-hoc Networks. In Proceedings of the
car communication, In Proceedings of IEEE Semiannual CSCS-16 (pp. 267-274). Bucharest, Romania.
Vehicular Technology Conference. Milan, Italy.
Dickey, S. R., Huang, C., & Guan, X. (2007). Field
Davis, B. (2001). Making the right connections. Profes- Measurements of Vehicle to Roadside Communication
sional Engineering, February 28, (pp. 36-39). Performance. 66th IEEE Vehicular Technology Confer-
ence, (pp. 2179-2183).
Davis, L. C. (2004). Effect of adaptive cruise control sys-
tems on traffic flow. Physical Review E, 69(066110). DICKEY-John Products. (n.d.). Radar II. (http://www.
dickey-john.com/products/public-works/ground-speed-
Davis, L. C. (2007). Effect of adaptive cruise control
sensors/radar-ii, last accessed: April 2008)
systems on mixed traffic flow near an on-ramp. Physica
A, 379(274–290). Dobias, F., & Grabow, W., (1994). Adaptive array antenna
for 5.8 Ghz vehicle to roadside communication. 44th IEEE
Dedicated Short Range Communications. (2008). Re-
Vehicular Technology Conference, 3, 1512-1516.
trieved September 2, 2008, from http://grouper.ieee.
org/groups/scc32/dsrc/ Doherty, L., Ghaoui, L. E., & Pister, K. (2001). Convex
position estimation in wireless sensor networks. Paper
Defense Advanced Research Projects Agency (2008).
presented at the INFOCOMM Conference., (3), 1655-
Retrieved June 2008, from http://www.darpa.mil/grand-
1663. Anchorage, Alaska, USA
challenge/index.asp
Doherty, L., Pister, K. S. J., & El Ghaoui, L. (2001, April).
Degardin, V., Laly, P., Liénard, M., & Degauque, P.
Convex Position Estimation in Wireless Sensor Networks.
(2006). Impulsive Noise on In-Vehicle Power Lines:
Paper presented at the INFOCOM 2001. 20TH Annual Joint
Characterization and Impact on Communication Perfor-
Conference of the IEEE Computer and Communications
mance. IEEE International Power line Communications
Societies. Proceedings (pp. 1655-1663).
and Its Applications Conference, ISPLC 2006, 26-29
March, (pp. 222-226). Doucet, A., & Wang, X. (2005). Monte Carlo methods
for signal processing: A review in the statistical signal
Degardin, V., Laly, P., Liénard, M., & Degauque, P.
processing context. IEEE Signal Processing Magazine,
(2007). Performances of the HomePlug PHY layer in
6(22), 152-170.
the context of in-vehicle powerline communications.
IEEE International Power line Communications and Drane, C., & Rizos, C. (1997). Positionng systems in
Its Applications Conference, ISPLC 2007, 26-28 March, intelligent transportation systems. Artech House, Bos-
(pp. 93-97). ton, Ma., USA.

Deng, S., Hubing, T., & Beetner, D. (2007). Characterizing Dridi, S., Gouissem, B., Hasnaoui, S., & Rezig, H. (2006).
the electric field coupling from IC heatsink structures Coupling Latency Time to the Throughput Performance
to external cables using TEM cell measurements. IEEE Analysis on Wireless CAN Networks. In Prof. of the
Trans. on Electromagn. Compat., 49(4) 785-791. International Multi-Conference on Computing in the
Global Information Technology (ICCGI’06).

309
Compilation of References

DSRC (2006). Dedicated Short Range Communications. ElBatt, T., Goel, S. K., Holland, G., Krishnan, H., &
Retrieved September, 2008, from http://grouper.ieee. Parikh, J. (2006). Safety: Cooperative collision warning
org/groups/scc32/dsrc/index.html. using dedicated short range wireless communications.
In Proc. VANET ’06 (pp. 30-39). New York, NY, USA:
DSRC. (2008). Dedicated Short Range Communications.
ACM.
Retrieved October 13, 2008, from http://grouper.ieee.
org/groups/scc32/dsrc/ ElBatt, T., Goel, S., Holland, G., & Krishnan, H. (2006).
Cooperative collision warning using dedicated short
Du, L., & Ukkusuri, S. (2008). Optimization models to
range communications. In Proceedings of the Third ACM
characterize the broadcast capacity of vehicular ad hoc
International Workshop on Vehicular Ad Hoc Networks
networks. Transportation Resaerch Part C.
(Los Angeles, CA, USA, September 29th, 2007). VANET
Du, L., & Ukkusuri, S. (2008). The relative mobility ‘06. ACM, New York, NY, (pp. 1-9).
of vehicles improves the performance of information
Elliott, J. D., Langlois, D., & Croft, E. A. (2001, June).
flow in vehicle ad hoc networks. Networks and Spatial
Sensor Uncertainty Management for an Encapsulated
Economics.
Logical Device Architecture: Part I. American Control
Du, L., Ukkusuri, S., & Kalyanaraman, S. (2007). Conference, Arlington, USA, Proceedings (pp. 4282-
Geometric connectivity of vehicular ad hoc networks: 4387).
Analytical characterization. In The Fourth ACM Work-
Erbas, F., Garcia, J.-E., & Jobmann, K. (2004). Position-
shop on Vehicular Ad Hoc Networks (VANET), Montreal,
based QoS routing in mobile ad-hoc networks: problem
Canada, Sep. 10.
statement and a novel approach. IEEE Performance,
Dumitrescu, V., & Guo, J. (2005, June). Context assisted Computing, and Communications Conference (pp.
routing protocols for inter-vehicle wireless communi- 619-623).
cation. IEEE Symposium on Intelligent Vehicles (pp.
ERTICO-ITS Europe. PReVENT Project. Retrieved June
594-600).
8, 2008, from: http://www.prevent-ip.org
Durant-Whyte, H. (1994). Where am I? Industrial Robot,
eSafety. (2008). Retrieved September 2, 2008, from
21(2), 11-16. MCB University Press
http://ec.europa.eu/information_society/activities/es-
EASIS. (2007). Retrieved September 2, 2008, from afety/index_en.htm
http://www.easis-online.org
Estrin, D., Govindan, R., Heidemann, J., & Kumar, S.
Eichler, S. (2007, October). Performance Evaluation of (1999). Next century challenges: scalable coordination
the IEEE 802.11p WAVE Communication Standard. IEEE in sensor networks. In MobiCom ’99 (pp. 263–270). New
Vehicular Technology Conference (pp. 2199-2203). York, NY, USA: ACM.

Eichler, S., Ostermaier, B., & Schroth, C. (2005) Simula- European Commission. (2008). European Road Safety
tion of Car-to-Car Messaging: Analyzing the Impact on Day on 13 October 2008. Retrieved September 2, 2008,
Road Traffic. In Proceedings of the 13th IEEE Interna- from http://ec.europa.eu/transport/roadsafety/road_safe-
tional Symposium on Modeling, Analysis, and Simulation ty_days/index_2008_en.htm
of Computer and Telecommunication Systems (pp. 507-
Eymann, T. (2006). The EASIS Security Architecture
510). IEEE Computer Society  Washington, DC, USA
Approach. 1st C2C-CC Security Workshop. Berlin,
El Zarki, M., Mehrotra, S., Tsudik, G., & Venkatasubra- November 2006.
manian, N. (2002). Security issues in a future vehicular
Farrell, J., & Barth, M. (1999). The Global Positioning
network. In Proceedings of EuroWireless 2002
System and Inertial Navigation. NY, USA: McGraw-
Hill.

310
Compilation of References

Federal Highway Administration. (2005). Traffic conges- Freudiger, J., Raya, M., Feleghhazi, M., Papadimitratos,
tion and reliability: Trends and advanced strategies for P., & Hubaux, J.-P. (2007). Mix Zones for Location
congestion mitigation. (http://ops.fhwa.dot.gov/conges- Privacy in Vehicular Networks. In Proceedings of the
tion report/, last accessed: April 2008) First International Workshop on Wireless Networking for
Intelligent Transportation Systems (WiN-ITS 2007)
Fellendorf, M., & Vortisch, P. (2001, January). Valida-
tion of the Microscopic Traffic Flow Model VISSIM in Fuehrer, T., Mueller, B., Hartwich, F., & Hugel, R. (2001).
Different Real-World Situations. Paper presented at the Time-Triggered CAN (TTCAN). Proceedings of the 2001
80th Meeting of the Transportation Research Board. SAE World Congress, Detroit, Michigan, Paper Number
Washington, D.C. 2001-01-0073.

Fennel, H., & Bunzel, S. (2006). Achievements and ex- Fujimoto, R. M., Perumalla, K., Park, A., Wu, H., Am-
ploitation of the AUTOSAR development partnership, mar, M. H., & Riley, G. F. (2003) Large-Scale Network
Copyright © 2006 CTEA. Retrieved from official web Simulation: How Big? How Fast? In Proceedings of the
site http:www.autosar.org 11TH IEEE/ACM International Symposium on Modeling,
Analysis and Simulation of Computer Telecommunica-
Festa, D. C., Longo, G., Mazzulla, G., & Musolino, G.
tions Systems (pp. 116-123). IEEE Computer Society
(2001). Experimental analysis of different simulation
Washington, DC, USA
models for motorway traffic flow. Proceedings of the
IEEE Intelligent Transportation Systems Conference, Fussen, M., Wattenhofer, R., & Zollinger, A. (2004).
(pp. 675-680). Sensor Networks: interference reduction and possible
application. Diploma Thesis, ETH Zurich, Dept. of
Firlit, T., Sandoval, J., & Ellerbrock, P. (2004). Intelli-
Computer Science.
BusTM Protocol:Flexible and Cost-Effective Automotive
Bus. Techincal Report, Aeroflex Colorado Springs. Füßler, H., Mauve, M., Hartenstein, H., Käsemann, M.,
& Vollmer, D. (2003). MobiCom Poster: Location-Based
Fleming, W. J. (2001). Overview of automotive sensors.
Routing for Vehicular Ad-Hoc Networks. Proceedings in
IEEE Sens. J., 1(4), 296–308.
ACM SIGMOBILE Mobile Computing and Communica-
FlexRay Consortium (2004). FlexRay Communications tion Review, 7(1), 47-49.
System Protocol Specification. Version 2.0.
Gadda, C. D., Laws, S. M., & Gerdes, J. C. (2007). Gen-
FlexRay Consortium. (2005). FlexRay Communications erating Diagnostic Residuals for Steer-by-Wire Vehicles.
System, Physical Layer, EMC Measurement Specifica- IEEE Trans. on Control Sys. Tech., 15(3), 529-540.
tion Version 2.1.
Gao, S., & Chabini, I. (2006). Optimal routing policy
FlexRay. (2008). FlexRay In-vehicle Network. Retrieved problems in stochastic time-dependent networks. Trans-
October 13, 2008, from http://www.interfacebus.com portation Research Part B, 40.

FlexRay. (2008). Retrieved September 2, 2008, from Gartner, N. H., Pooran, F. J., & Andrews, C. M. (2001).
http://www.flexray.com/ Implementation of the OPAC adaptive control strategy
in a traffic signal network. In Proc. IEEE ITSC ’01 (pp.
Ford Sync. (2008). Today’s Drivers Demand Staying Con-
195–200).
nected. Retrieved September 2, 2008, from http://media.
ford.com/article_display.cfm?article_id=25169 Gast, M. S. (2002). 802.11 Wireless Networks, the defini-
tive guide. O’Reilly Publishing.
Fowler, D. (2003). Down to the wire. The Engineer,
(pp. 29-30).

311
Compilation of References

Gaubert, N., Beauregard, M., Michaud, F., & de Lafon- Gillièron, P. Y., & Konnen, J. (2003). Enhanced Navi-
taine, J. (2003, October). Emulation of Collaborative gation System for Road Telematics. In Proceedings the
Driving Systems Using Mobile Robots. Presented at the Third Swiss Transport Research Conference, (STR 03),
IEEE International Conference on Systems, Man and Ascona/Ticino.
Cybernetics, 1, 856-861. Washington DC, USA.
Golle, P., Greene, D., & Staddon, J. (2004). Detecting and
Gavette, S., & other HomePlug members HomePlug correcting malicious data in VANETs. In VANET ‘04,
Powerline Alliance (2006). HomePlug AV Technology (pp. 29-37). New York, NY, USA: ACM Press.
Overview. Technical report. Sharp Laboratories of Amer-
Gorgorin, C., Gradinescu, V., Diaconescu, R., Cristea, V.
ica. Retrieved from download.microsoft.com/download.
& Iftode, L. (2006). An Integrated Vehicular and Network
Gouret, W., Nouvel, F., & EL Zein, G. (2006). Additional
Simulator for Vehicular Ad-hoc Networks. In Proceed-
Network Using Automotive Powerline Communication.
ings of the Eurosis European Simulation and Modeling
IEEE International Power line Communications and Its
Conference 2006 (pp. 142-149). Toulouse, France.
Applications Conference, ISPLC 2006, 26-29 March,
(pp 1087-1092). Gouret, W., Nouvel, F., & EL Zein, G. (2007). High Data
Rate Network Using Automotive Power Line. IEEE Inter-
GEARS. (2008). Google GEARS. Retrieved October 13,
national Power line Communications and Its Applications
2008, from http://gears.google.com
Conference, ISPLC 2007, 26-28 March. (pp. 1-4).
Gehring, O., & Fritz, H. (1997). Practical results of a
Grabow, W., & Schrei, A. (1992, October). A study
longitudinal control concept for truck platooning with
on diversity techniques in a 5.8 GHz microwave link
vehicle to vehicle communication. IEEE Conference on
for traffic management systems. IEEE Symposium on
Intelligent Transportation Systems (pp. 117-122).
Personal, Indoor and Mobile Radio Communications
Gelb, A. (1974). Applied Optimal Estimation. Cambridge, (pp. 556-560).
MA: The MIT Press.
Gradinescu, V., Gorgorin, C., Diaconescu, R., Cristea,
Gentile, C. (2005, May). Sensor Location through Linear V., & Iftode, L. (2007). Adaptive Traffic Lights Using
Programming with Triangle Inequality Constraints. Pa- Car-to-Car Communication. In Proceedings IEEE 65th
per presented at the ICC-IEEE International Conference Vehicular Technology Conference (pp. 21-25). Dublin,
on Communications, Proceedings, 5, 3192-3196. Ireland.

Gerlach, M. (2005). VaneSe - an approach to VANET se- Grewal, M. S., Weill, L. R., & Andrews, A. P. (2001).
curity. In V2VCOM 2005, San Diego, California, USA. Global Positioning Systems, Inertial Navigation, and
Integration. New York, NY, USA: John Wiley & Sons.
Gerlach, M., Festag, A., Leinmüller, T., Goldacker, C.,
& Harsch, C. (2007). Security architecture for vehicular Guopei, L., & Gingras, D. (2007, April). Adaptive and
communication. In 2nd International Workshop on Intel- Reconfigurable Data Fusion Architectures in Vehicle
ligent Transportation, Hamburg. Positioning Navigation Systems. Paper presented at the
Society of Automotive Engineering (SAE) conference.
Gershenson, C. (2004). Self-organizing traffic lights.
Paper no. 1108, Detroit, USA.
Complex Systems, 16, 29.
Haas, Z., & Deng, (2002, June). Dual busy tone multiple
Gershenson, C. (2005). Self-Organizing Traffic Lights.
access (DBTMA)-a multiple access control scheme for
Complex Systems, 16(1), 29-53.
ad hoc networks. IEEE Transactions on communica-
Gharavi H., Prasad K. V., & Ioannou P.A. (Eds.), (2007). tions, 50, 975-985.
Special issue Advanced Automobile Technologies. Pro-
ceedings IEEE , 95(2).

312
Compilation of References

Haerri, J., Filali, F., Bonnet, C., & Fiore, M. (2006). Heddebaut, M., Rioult, J., Ghys, J. P., Gransart, Ch., &
VanetMobiSim: Generating Realistic Mobility Patterns Ambellouis, S. (2005). Broadband vehicle-to-vehicle
for VANETs. In Proceedings of the 3rd international communication using an extended autonomous cruise
workshop on Vehicular ad hoc networks (pp 96—97). control sensor. Measurement Science and Technology,
Los Angeles, CA, USA 16, 1363-1373.

Hagan, M. T., & Menhaj, M. (1994). Training feedforward Heffernan, D., & Leen, G. (2008). ICT based re-
networks with the Marquardt algorithm. IEEE Transac- search at Limerick contributes to automotive ‘drive-
tions on Neural Networks, 6(5), 989-993. by-wire’ technology. Retrieved September 2, 2008,
from http://www.irishscientist.ie/2002/contents.
Haggag, S. Alstrom, D., Cetinkunt, S., & Egelja, A.
asp?contentxml=02p237b.xml&contentxsl=is02pages.
(2005). Modeling, Control, and Validation of an Electro-
xsl
Hydraulic Steer-by-Wire System for Articulated Vehicle
Applications. ASME/IEEE Trans. on Mechatronics, Heide, F. M. A. D., Schindelhauer, C., Volbert, K., &
10(6), 688-692. Gruenewald, M. (2002). Energy, congestion and dilation
in radio networks. Proceedings of the 14th Annual ACM
Hall, R. W., & Tsao, H.-S. J. (1997). Capacity of auto-
Symposium on Parallel Algorithms and Architectures
mated highway systems: merging efficiency. In Proc.
(SPAA), Winnipeg, Manitoba, Canada, Aug. 11-13.
ACC ’97, 3, 2046–2050.
Heiskala, J., & Terry, J. (2002). OFDM wireless LANS: A
Halle, S., Laumonier, J., & Chaib-Draa, B. (2004). A
Theorethical and Practical guide. Sams Publishing.
decentralized approach to collaborative driving coordina-
tion. Proceedings of the 7th International IEEE Confer- Helbing, D. (2001). Traffic and related self-driven many-
ence on Intelligent Transportation Systems, Washington, particle systems. Rev. Mod. Phys., 73(4), 1067–1141.
DC (pp. 453-458).
Hernandez, W. (2005). Robust multivariable estimation
Hara, S., & Prasad, R. (1997). Overview of multicarrier of the relevant information coming from a wheel speed
CDMA. IEEE Communications Magazine, December, sensor and an accelerometer embedded in a car under
(pp. 126-133). performance tests. Sensors, 5, 488–508.

Hasan, M. S., & Anwar, S. (2008). Sliding Mode Observer Hidas, P. (2005). Modelling vehicle interactions in mi-
Based Predictive Fault Diagnosis of a Steer-By-Wire Sys- croscopic simulation of merging and weaving. Transport.
tem. Proceedings of the 17th Int’l Federation of Automatic Res. Part C, 13(1), 37–62.
Control (IFAC) World Congress, Seoul, S. Korea.
Higgins, A., & Koucky, S. (2002). Mercedes pumps ‘Fly
Hashimoto, M., Kawashima, H., Nakagami, T., & Oba By Wire” brakes into new roadster. Machine Design,
F. (2001, October). Sensor Fault detection and Identi- (p. 26).
fication in Dead-Reckoning System of Mobile Robot:
Hightower, J., & Barriello, G. (2001). Location systems for
Interacting Multiple Model Approach. Paper presented
ubiquitous computing. IEEE Computer, 34(8), 57–66.
at the IEEE/RSJ International Conference on Intelligent
Robot and Systems, Mani, Hawaii, USA. Home Plug V1.0 (2008). HomePlug Powerline Alliance.
Retrieved from official web site www.homeplug.org.
Hebden, R. G., Edwards, C., & Spurgeon, S. K. (2004).
Automotive steering control in a split-mu maneuver us- Hoogendoorn, S. P., & Bovy, P. H.-L. (2001). State-of-the-
ing an observer based sliding mode controller. Vehicle art of Vehicular Traffic Flow Modelling. Special Issue
System Dynamics, 41(3), 181-202. on Road Traffic Modelling and Control of the Journal of
System and Control Engineering, 215(4), 283-303.

313
Compilation of References

Horowitz, R., & Varaiya, P. (2000). Control design of an IEC. (2008). CISPR 12—Vehicles, boats and internal
automated highway system, Proceedings of the IEEE, combustion engines—Radio disturbance character-
88(7), 913-925. istics—Limits and methods of measurement for the
protection of off-board receivers.
Hoseinnezhad, R. (2006). Position Sensing in Brake-By-
Wire Calipers Using Resolvers. IEEE Transactions on IEEE 1363a (2004). IEEE standard specifications for
Vehicular Technology, 55(3), 924-932. public-key cryptography- amendment 1: Additional
techniques.
Hossain, I., & Mahmud, S. M. (2007). Analysis of a Secure
Software Upload Technique in Advanced Vehicles using IEEE 1901 (2008). Retrieved from official web http://
Wireless Links. Proceedings of the 2007 IEEE Intelligent grouper.ieee.org/groups/1901/Scope_Purpose.html
Transportation Systems Conference, Seattle, WA, USA,
IEEE 802.11p. (2008). Retrieved October 13, 2008, from
Sept. 30 - Oct. 3, 2007, pp. 1010-1015.
http://en.wikipedia.org/wiki/IEEE_802.11p
Hossain, I., & Mahmud, S. M. (2007). Analysis of Group
IEEE 802.11p. (2008). Retrieved September 2, 2008, from
Key Management Protocols for Secure Multicasting in
http://en.wikipedia.org/wiki/IEEE_802.11p
Vehicular Software Distribution Network. Proceedings
of the Third IEEE International Conference on Wireless IEEE. (2006). IEEE Trial-Use Standard for Wireless Ac-
and Mobile Computing, Networking and Communica- cess in Vehicular Environments (WAVE) - Multi-channel
tions (WiMob 2007), Crowne Plaza Hotel, White Plains, Operation. IEEE Std 1609.4-2006.
New York, USA, October 8-10, 2007.
IEEE. DSRC Home. Retrieved June 8, 2008 from: http://
Hou, T., & Li, V. (2006). Transmission range control in grouper.ieee.org/groups/scc32/dsrc/index.html
multihop packet radio network. IEEE transactions on
IEEE1609.2 (2006). IEEE trial-use standard for wireless
wireless communications, 5(1), 38-44.
access in vehicular environments - security services for
Huaizhi, Li, & Singhal, M. (2005) A scalable routing applications and management messages.
protocol for ad hoc networks. In Proceedings of the Ve-
IEEE802.11. (2008). IEEE 802.11 working group.
hicular Technology Conference 2005 Spring. 2005 IEEE
Retrieved October 13, 2008, from http://grouper.ieee.
61st Volume 4 (pp. 2498—2503). Stockholm, Sweden
org/groups/802/11/
Hubaux, J. P., Capkun, S., & Luo, J. (2004). The Secu-
International Electrotechnical Commission – IEC. (2002).
rity and Privacy of Smart Vehicles. IEEE Security and
CISPR 25—Radio disturbance characteristics for the
Privacy Magazine 2(3) (2004), 49-55.
protection of receivers used on board vehicles, boats,
Huck, T., Schirmer, J., & Dostert, K. (2005). Tutorial and on devices—Limits and methods of measurement.
about the implementation of a vehicular high speed
International Organization for Standardization—ISO
communication system. IEEE ISPLC.
11452-2. (2005). Road vehicles — Vehicle test methods
i2010 Intelligent Car Initiative. (2008). Retrieved Sep- for electrical disturbances from narrowband radiated
tember 2, 2008, from http://ec.europa.eu/information_so- electromagnetic energy — Part 2: Off-vehicle radiation
ciety/activities/intelligentcar/index_en.htm sources.

IDB Forum. (2008). Retrieved from web site http://www. Internet ITS Consortium. (2008). Retrieved September
idbforum.org. 2, 2008, from http://www.internetits.org/

IDB1394, (2008). 1394 Automotive Presentation, Max Iperf, (2008). Iperf tool and documentation, Retrieved
Bassler, Shenzen, China, 10 April 2008. Retrieved from from official web http://sourceforge.net/projects/iperf.
web site http://www.idbforum.org

314
Compilation of References

Isermann, R. (2005). Fault-Diagnosis Systems: An In- Jardosh, A., Belding-Royer, Elizabeth M., Almeroth,
troduction-From Fault Detection To Fault Tolerance. K. C., & Suri, S. (2003). Towards realistic mobility
Springer Verlag, NY, USA. models for mobile ad hoc networks. In MobiCom ’03:
Proceedings of the 9th annual international conference
Isermann, R., Schwarz, R., & Stolzl, S. (2002, October).
on Mobile computing and networking, (pp. 217—229).
Fault tolerant drive-by-wire systems. IEEE Control
ACM Press, New York, USA.
Systems Magazine, (pp. 64-81).
JasPar. (2008). Retrieved September 2, 2008, from
ISO 10605. (2008). Road vehicles — Test methods for
https://www.jaspar.jp/english/index_e.php
electrical disturbances from electrostatic discharge.
Jekeli, C. (2001). Inertial Navigation Systems with
ISO 11452-3. (2001). Road vehicles — Component test
Geodetic Applications, De Gruyter, (pp. 308-318). New
methods for electrical disturbances from narrowband
York, USA
radiated electromagnetic energy — Part 3: Transverse
electromagnetic mode (TEM) cell. Jiang, D., & Delgrossi, L. (2008). IEEE 802.11p: To-
wards an International Standard for wireless Access
ISO 7637-2. (2004). Road vehicles — Electrical distur-
in Vehicular Environments. Retrieved September 2,
bances from conduction and coupling — Part 2: Electrical
2008, from http://ieeexplore.ieee.org/stamp/stamp.
transient conduction along supply lines only.
jsp?arnumber=04526014
ISO 7637-3. (2007). Road vehicles — Electrical distur-
Jin, W., & Recker, W. (2006). Instantaneous information
bance by conduction and coupling — Part 3: Vehicles
propagation in a traffic stream through inter-vehicle
with nominal 12 V or 24 V supply voltage — Electrical
communication. Transportation Research Part B, 40(3),
transient transmission by capacitive and inductive
230-250.
coupling via lines other than supply lines.
Jist/SWANS (2008). Java in Simulation Time / Scalable
ISO TC 204 Working Group 16. (2007). CALM Continu-
Wireless Ad hoc Network Simulator. Retrieved March
ous Communications for Vehicles. Retrieved June 8, 2008
19, 2008, from http://jist.ece.cornell.edu/index.html
from: http://www.calm.hu
Johansson, K. H., Törngren, M., & Nielsen, L. (2005).
J2056/2 Survey. (1994). J2056/2 survey of known proto-
Vehicle applications of controller area network. In D.
cols. In SAE Handbook. Warrendale, PA: Soc. Automotive
Hristu-Varsakelis & W. S. Levine (Ed.), Handbook of Net-
Eng. (SAE), vol. 2.
worked and Embedded Control Systems, Birkhäuser.
Jaillet, P., & Wagner, M. (2006). Online routing problems:
Johansson, K., Törngren, M., & Nielsen, L. (2005), Hand-
Value of advanced information as improved competitive
book of Networked and Embedded Control Systems, D.
ratios. Transportation Science, 40(2).
Hristu-Varsakelis and W. S. Levine, Eds. Boston, MA:
Jain, K., Padhye, J., Padmanabhan, V., & Qiu, L. (2003). Birkhäuser, 2005.
Impact of interference on multi-hop wireless network
Johnson, D. B., & Maltz, D. A. (1996). Dynamic source
performance. In MobiCom 2003, San Diego, California,
routing in ad hoc wireless networks. In Imielinski &
USA, Sep. 14-19.
Korth (Eds.), Mobile computing, 353. Kluwer Academic
Jakobsson, M., Wang, X., & Wetzel, S. (2004). Stealth Publishers.
attacks in vehicular technologies. In VTC-Fall 2004.
Johnson, D. B., Maltz, D. A. & Broch, J. (2001). DSR:
Jaman, G. (2007). Structural Monitoring Using Wireless The Dynamic Source Routing Protocol for Multi-Hop
Sensors and Controller Area Network. IEEE 5th Annual Wireless Ad Hoc Networks. In C. E. Perkins (Ed.), Ad
Conference on Communication Networks and Services Hoc Networking (pp. 139-172). Addison-Wesley, 2001
Research (CNSR’07).

315
Compilation of References

Julier, S. (1997). Process Models for the Navigation of Karp, B., & Kung, H.-T. (2000). Greedy Perimeter State-
High-Speed Land Vehicles. Wadham College, Oxford, less Routing for Wireless Networks. Proceedings of the
UK (p. 184). 6th ACM International Conference on Mobile Computing
and Networking, (pp. 243-254).
Julier, S. J., & Uhlmann, J. K. (1997). A New Exten-
sion of the Kalman Filter to Nonlinear Systems. Paper Kato, S., & Tsugawa, S. (2001). Cooperative driving of
presented at the 11th International Symposium on autonomous vehicles based on localization, inter-vehicle
Aerospace/Defense Sensing, Simulation and Controls. communications and vision systems. JSAE Rev., 22(4),
Orlando, FL, USA 503–509.

Jurdak, R., Lopes, C., & Baldi, P. (2004). A survey, Katz, J. H. (1963). Simulation of a Traffic Network.
classification and comparative analysis of medium Communications of the ACM, 6(8), 480-486
access control protocols for wireless networks. IEEE
Kelly, A., & Stentz, A. (1998). Rough Terrain Autonomous
Communication Surveys and Tutorials, 6.
Mobility - Part 1: A Theoretical Analysis of Require-
Jurgen, R. K. (1998). Navigation and Intelligent Trans- ments. Autonomous Robots, 5.
portation Systems. Progress In Technology, Automotive
Kendall, J. (2005). Current Technology. Commercial
Electronics Series. SAE International, Detroit, USA.
Motor, 201(5117), 62-64.
Kaiser, Kenneth L. (2005). Electromagnetic Compat-
Kerner, B. S. (2004). Three-phase traffic theory and
ibility Handbook. CRC Press.
highway capacity. Physica A, 333, 379–440.
Kalman, R. E. (1960). A new approach to linear filtering
Kesting, A., Treiber, M., & Helbing, D. (2007). General
and prediction problems. Transactions of the American
lane-changing model MOBIL for car-following models.
Society of Mechanical Engineering (ASME). (82) (Series
Transp. Res. Rec., 1999, 86–94.
D), (pp. 35-45).
Kesting, A., Treiber, M., Schönhof, M., & Helbing, D.
Kanaris, A., Kosmatopoulos, E. B., & Loannou, P. A.
(2008). Adaptive cruise control design for active con-
(2001). Strategies and spacing requirements for lane
gestion avoidance. Transport. Res. Part C, doi:10.1016/
changing and merging in automated highway systems.
j.trc.2007.12.004.
IEEE Trans. Veh. Technol., 50(6), 1568–1581.
Killat, M., Schmidt-Eisenlohr, F., Hartenstein, H., Rössel,
Karn, P. (1990, September). MACA – A new channel
C., Vortisch, P., Assenmacher, S., & Busch, F. (2007).
access method for packet radio, ARRL/CRRL Amateur Ra-
Enabling efficient and accurate large-scale simulations
dio Computer Networking Conference (pp. 134-140).
of VANETs for vehicular traffic management. In Pro-
Karnadi, F. K., Zhi, H. M., & Kun-chan, L. (2007). Rapid ceedings of the Fourth ACM international Workshop
Generation of Realistic Mobility Models for VANET. on Vehicular Ad Hoc Networks, VANET ‘07 (pp. 29-38).
Wireless Communications and Networking Confer- Montreal, Canada.
ence, WCNC 2007. IEEE (pp. 2506-2511). Kowloon,
Kim, S.-B., Lee, S.-Y., Choi J., & et al. (2003). Multi-Sen-
Hong Kong.
sor data fusion for future telematics applications. Journal
Karp, B., & Kung, H. T. (2000). GPSR: Greedy perimeter Astronomical Space Sciences, 20(4), 359–364.
stateless routing for wireless networks. In Proceedings
Kleinrock, L. (1964). Communication nets: Stochastic
of the 6th annual international conference on Mobile
message flow and delay. New York, New York: Mc-
computing and networking (pp. 243-254). Boston, Mas-
Graw-Hill.
sachusetts, United States.

316
Compilation of References

Kleinrock, L., & Tobagi, F. (1975, December). Packet Kronander, J. (2004, December). Robust Automotive
switching in radio channels: Part I – Carrier sense Positioning: Integration of GPS and Relative Motion
multiple-access modes and their throughput-delay Sensors. PhD Dissertation, Linköping, Sweden.
characteristics. IEEE Transactions on Communications,
Kuban, P. A. (2007). A Controller Area Network Gateway
23, 1400-1416.
to ZigBee- A Proposition of an Architecture to Extend
Knight, D. T. (1997). Rapid development of tightly-cou- CAN. VDM Verlag Dr. Mueller e.K.
pled GPS/INS systems. IEEE Aerospace and Electronic
Kukshya, V., Krishnan, H., & Kellum, C. (2005, June).
Systems (AES) Magazine, 12(2), 14-18.
Design of a System Solution for Relative Positioning of
Ko, Y., Shankarkumar, V., & Vaidya, N. (2000). Medium Vehicles Using Vehicle-to-Vehicle Radio Communica-
access control protocols using directional antennas in ad tions During GPS Outages. Paper presented at the IEEE
hoc networks. IEEE INFOCOM (pp. 13-21). Vehicular technology Conference, 2, 1313-1317. Dallas,
Tx, USA.
Kobayashi, F., & Arai, F. (1998). Sensor fusion system
using recurrent fuzzy inference. Journal of Intelligent Kvaser. (2008). CAN Kingdom. Retrieved October 13,
and Robotic Systems, (23), 201-216. 2008, from http://www.kvaser.com/index.htm

Koblitz, N., & Menezes, A. (2005). Pairing-based Kwak, J. S., & Jae, H. L. (2004). Infrared transmission
cryptography at high security levels. Cryptology ePrint for intervehicle ranging and vehicle-to-roadside com-
Archive, Report 2005/076. munications systems using spread spectrum technique.
IEEE Transactions on Intelligent Transportation Systems,
Kopetz, H., et al. (2002). Specification of the TTP/A Pro-
5(1), 12-19.
tocol. (Technical Report). Vienna, Austria, University.
Technology. Laberteaux, K., & Hu, Y.-C. (2006). Strong VANET se-
curity on a budget. In ESCAR 2006, Berlin, Germany.
Kosch, T. (2004). Technical Concept and Prerequisites
of Car-to-Car Communication. Retrieved October 13, Lammer, S., Kori, H., Peters, K., & Helbing, D. (2006).
2008, from http://www.car-to-car.org/fileadmin/doku- Decentralised control of material or traffic flows in net-
mente/pdf/C2C-CC_presentation_3_BMW.pdf works using phase-synchronisation. Physica A, 363(1),
39–47.
Kosh, T., Schwingenschlögl, C., & Ai, L. (2002). Informa-
tion Dissemination in Multihop Inter-vehicle Networks Laneurit, J., Blanc, C., Chapuis, R., & Trassoudaine
– Adapting the Ad-hoc On-demand Distance Vector L. (2003, June). Multisensorial data fusion for global
Routing Protocol (AODV). Proceedings in the 5th IEEE vehicle and obstacles absolute positioning. Paper pre-
International Conference on Intelligent Transportation sented at the IEEE Intelligent Vehicle Conference, San
Systems, (pp. 685-690). Francisco, USA.

Krajzewicz, D., Bonert, M., & Wagner, P. (2006). Laugier, C., Vasquez, D., Yguel M., Fraichard Th. &
The Open Source Traffic Simulation Package SUMO. Aycard O., (2008). Geometric and Bayesian Models for
Presented at RoboCup 2006 Infrastructure Simulation Safe Navigation in Dynamic Environments. Intelligent
Competition. Bremen, Germany. Service Robotics 1(1).

Krishna, V., Chatterjee, & Pradhan (1997). A cluster- LEA. (2008). LEA Organisation. Retrieved from official
based approach for routing in dynamic networks. ACM web site http://www.leacom.fr.
SIGCOMM, Computer Communication Review, (pp.
LeCunn, Y., & Bottou, L. (2001). Gradient-Based Learn-
49–65).
ing Applied to Document Recognition. IEEE Press, NY,
USA.

317
Compilation of References

Lee, A. (2003). Driven by wire. The Engineer, 5(8), Li, F., & Wang, Y. (2007). Routing in vehicular ad hoc
28-29. networks: A survey. IEEE Vehicular Technology Maga-
zine, 2(2), 12-22.
Lee, D., Attias, R., Puri, A., Sengupta, R., Tripakis, S.,
& Varaiya, P. (2001). A wireless token ring protocol Li, J., Jannotti, J., De Couto, D., Karger, D., & Morris, R.
for intelligent transportation systems. Proceedings of (2000). A Scalable Location Service for Geographic Ad
IEEE Intelligent Transportation Systems Conference Hoc Routing. Proceedings of the 6th ACM International
(pp. 1152-1157). Conference on Mobile Computing and Networking, (pp.
120-130).
Lee, E. A. (2008). Cyber-Physical Systems: Design
Challenges. 11th IEEE International Symposium on Li, L., & Wang, F.-Y. (2006). Cooperative Driving at Blind
Object Oriented Real-Time Distributed Computing (pp. Crossings Using Intervehicle Communication. IEEE
363–369). Transactions on Vehicular Technology, 55, 1712-1724.

Lee, J., & Ha, I. (2001). Real-Time Motion Capture for a Li, L., Song, J., Wang, F. Y., Niehsen, W., & Zheng, N. N.
Human Body using Accelerometers. Robotica, 19, 601– (2005). IVS 05: New developments and research trends
610. Cambridge, UK: Cambridge University Press. for intelligent vehicles. IEEE Intell. Syst., 20(4), 10–14.

Lee, K. W. (2007). Autonomous vehicle navigation in Li, M., Poovendran, R., Sampigethaya, K., & Huang,
neighbourhood environments: A map assisted and a L. (2005). CARAVAN: Providing location privacy for
feature-based approach. Unpublished doctoral disserta- VANET. In ESCAR 2005, Cologne, Germany.
tion, Nanyang Technological University.
Li, N., Hou, C., & Sha, L. (2003). Design and analysis of
Lee, K.W., Wijesoma, S., & Ibanez-Guzman, J. (2007). an mst-based topology control algorithm. In Proc. of the
A constrained SLAM approach to robust and accurate 22nd Annual Joint Conference of the IEEE Computer and
localisation of autonomous ground vehicles. Robotics Communications Societies (INFOCOM), San Franciso,
Autonomous Systems, 55. CA, USA, Mar. 30-Apr. 3.

Lee, M. K., Latchman, H. A., Newman, R. E., Katar, Li, W., & Leung, H. (2003). Constrained Unscented
S., & Yonge, L. (2002). Field performance comparison Kalman Filter Based Fusion of GPS/INS/Digital Map
of IEEE 802.11b and HomePlug 1.0 . IEEE Conference for Vehicle Localization. Paper presented at the IEEE
Conference Local Computer Networks LCN 2002. 27th International Conference on Intelligent Transportation
Annual (pp. 598- 599). Systems, Shangai, China.

Leen, G., & Hefferman, D. (2001). Vehicles without Liang, C., & Peng, H. (2000). String stability analysis of
wires. Computing & Control Engineering Journal, adaptive cruise controlled vehicles. JSME Intl. J., Series
12(5), 205-21. C, 43(3), 671–677.

Lettieri, P., & Srivastava, M. B. (1998, April). Adap- Lienard, M., Carrion, M., Degardin, V., & Degauque, P.
tive frame length control for improving wireless link (2008). Modeling and Analysis on In-vehicle power line
throughput, range, and energy efficiency. IEEE INFO- communication channels. IEEE Transaction Vehicular
COM, 2, 564-571. TEchnologie, 57(2), 670-679.

Lezniak, T. W., Lewis, R. W., & McMillen, R. A. (1977). Limpibunterng, T., & Fujioka, T. (2002). A new design
A Dead Reckoning/Map Correlation System for Auto- approach for steer-by-wire system by dual port system.
matic Vehicle Tracking. IEEE Transactions on Vehicular Vehicle System Dynamics, Suppl. 37, 197-208.
Technology, 1(VT-26), 47-60.

318
Compilation of References

Limpibunterng, T., & Fujioka, T. (2004). Bilateral driver Lu, R., Lin, X., Zhu, H., Ho, P., & Shen, X. (2008). ECPP:
model for steer-by-wire controller design. Vehicle System Efficient Conditional Privacy Preservation Protocol for
Dynamics, Suppl. 41, 381-390. Secure Vehicular Communications. In The 27th IEEE
International Conference on Computer Communications
LIN Consortium. (2003). LIN Specification Package. Re-
(INFOCOM 2008), Phoenix, Arizona.
vision 2.0.Retrieved from http://www.lin~subbus.org/.
Lu, X. Y., Tan, H. S., Shladover, S. E., & Hedrick, J. K.
Lin, X., Sun, X., Ho, P., & Shen, X. (2007). GSIS: A
(2004). Automated vehicle merging maneuver implemen-
Secure and Privacy-Preserving Protocol for Vehicular
tation for AHS. Vehicle Syst. Dyn., 41(2), 85–107.
Communications. In IEEE Transactions on Vehicular
Technology 56, 3442-3456. Lu, X-Y., & Hedrick, J. K. (2005). Heavy-duty vehicle
modelling and longitudinal control. Vehicle System
Lin, Y. J., Haniph, A., Latchman, H., Neuman, R. (2003,
Dynamics, 43(9), 653–669.
April). A comparative Performance study of Wireless and
Power Line Network. IEEE Communications Magazine, Lupini, C. A. (2004). Vehicle Multiplex Communica-
(pp. 54-63). tion: Serial Data Networking Applied to Vehicular
Engineering. Warrendale, Pensylvania: SAE. ISBN
Lin, Y., Latchman, H., Katar, S., & Lee, M. K. (2003, May).
0-7680-1218-X.
Theoretical and Field Performance Comparison between
802.11 Wireless and Powerline HomePlug 1.0 Protocols. Lygeros, J., Godbole, D. N., & Sastry, S. (1996). Multia-
IEEE Communications Magazine with Focus Theme on gent hybrid system design using game theory and optimal
Powerline Local Area Networks, (pp. 54-63). control. In Proc. IEEE CDC ’96 (pp. 1190–1195).

LIN. (2008). Local Interconnection Network (LIN). Re- Lygeros, J., Godbole, D. N., & Sastry, S. (1998). Verified
trieved October 13, 2008, from http://www.interfacebus. hybrid controller for automated vehicles. IEEE Trans.
com/Design_Connector_LIN_Bus.html Autom. Control, 43(4), 522–539.

Liu, Y., & Ozguner, U. (2003). Effect of inter-vehicle Madhavan, R., Messina, E. R., & Albus, J. S. (2007).
communication on rear-end collision avoidance. Intel- Intelligent Vehicle Systems: A 4D/RCS Approach. New
ligent Vehicles Symposium (pp. 168-173). York: Nova Science Publishers.

LiveMesh. (2008). Microsoft Live Mesh. Retrieved Octo- Magrabi, S. M. & Gibbens, P. W. (2000, June). Decen-
ber 13, 2008, from http://news.cnet.com/8301-10784_3- tralized Fault Detection and Diagnosis in Navigation
9926578-7.html Systems for Unmanned Aerial Vehicles. Paper presented at
the IEEE Position Location and Navigation Symposium,
Lo, H., & Szeto, W. (2004). Modeling advanced traveler
San Diego,USA.
information services: static versus dynamic paradigms.
Transportation Research Part B: Methodological, 38(6), Mahajan, A., Potnis, N., Gopalan, K., & Wang, A. (2007).
495-515. Modeling VANET Deployment in Urban Settings. In
Proceedings of the 10th ACM Symposium on Modeling,
Local Interconnect Network. (2008). Retrieved Septem-
analysis, and simulation of wireless and mobile systems
ber 2, 2008, from http://www.lin-subbus.org/
(pp 151-158). Chania, Crete Island, Greece.
Lochert, C., Füßler, H., Hartenstein, H., Hermann, D., Tian,
Mahmud, S. M., & Alles, S. (2005). In-Vehicle Network
J., & Mauve, M. (2003). A Routing Strategy for Vehicular
Architecture for the Next-Generation Vehicles. Proceed-
Ad Hoc Networks in City Environments. Proceedings of
ings of the 2005 SAE World Congress, Detroit, Michigan,
the IEEE Intelligent Vehicles Symposium, (pp. 156-161).
Paper Number 2005-01-1531.

319
Compilation of References

Mahmud, S. M., & Shanker, S. (2006, May). An In-Ve- Maxemchuk, N. F., Tientrakool, P., & Willke, T. L. (2007).
hicle Secure Wireless Personal Area Network (SWPAN). Reliable Neighborcast. IEEE Transactions on Vehicular
IEEE Transactions on Vehicular Technology, 55(3), Technology, 56, 3278-3288.
1051-1061.
May, A. D. (1990). Traffic flow fundamentals. Englewood
Mahmud. S. M. (1994, July). Performance Analysis Cliffs, NJ: Prentice-Hall, Inc., A Division of Simon and
of Multilevel Bus Networks for Hierarchical Multi- Schuster.
processors. IEEE Transactions on Computers, 43(7),
Merwe, A. D. R., Freitas, N., & Wan, E. (2000, August).
789-805.
The Unscented Particle Filter, Tech report CUED/F-
Mangharam, R., Weller, D. S., Stancil, D. D., Rajkumar INFENG/TR-380. Cambridge University Engineering
& R., Parikh, J. S. (2005). GrooveSim: A Topography-Ac- Department, Cambridge, England.
curate Simulator for Geographical Routing in Vehicular
Metcalfe, R., & Boggs, R. (1976, July). Ethernet: Dis-
Networks. In Proceedings of the 2nd ACM International
tributed packet switching for local computer networks,
Workshop on Vehicular Ad Hoc Networks (pp. 59-68).
Communication of the ACM, 19, 395-404.
Cologne, Germany
Michaelides, R. (2008). Wireless CAN Interface. Re-
Mao, X., Wada, M., Hashimoto, H., Saito, M. & Suzuki,
trieved September 2, 2008, from http://www.rmcan.
I. (2003, November). EM/Unscented Smoothing Based
com/index.php?id=17&L=1
Parameter Learning for Nonlinear Models for GPS Po-
sitioning. Paper presented at the 10th World Congress on Minderhoud, M. M. (2002). Simulation model of motor-
Intelligent Transport Systems, Madrid, Spain. ways with next generation vehicles, technical specifica-
tion.
Margolin, B. (1997). Analog, mixed-signal ICs steering
drive-by-wire toward reality. Computer Design, 36(12), Molloy, M. K. (1989). Fundamentals of Performance
31-34. Modeling. Macmillan Publishing Company.

Matheus, K. (2002). Car-to-Car Communication – Mar- Morris, R., Jannotti, J., Kaashock, F., Li, J., & Decouto,
ket Introduction and Success factors. Retrieved October D. (2000). A Scalable Ad Hoc Wireless Network System.
13, 2008, from http://www.car-to-car.org/fileadmin/do- Proceedings of the 9th workshop on ACM SIGOPS Euro-
kumente/pdf/C2C-CC_presentation_4_VW_Audi_Car- pean Workshop: beyond the PC: New challenges for the
meq.pdf operating system, (pp. 61-65).

Matric. (2008). The Controller Area Network (CAN) Moscibroda, T., & Wattenhofer, R. (2005). Minimizing
has gone wireless! Retrieved September 2, 2008, from interference in ad hoc and sensor networks. In DIALM-
http://www.matric.com/resources/Canbridge_bro- POMC’05, Cologne, Germany, Sep., 2.
chureV2.pdf
MOST (2006). MOST Core Compliance Test Specification
Matthaiou, M., Laurenson, D. I., Cheng-Xiang, W. (2008). V2.00. Technical Report. Retrieved, from http://www.
PHY 30-3 – Capacity Study of vehicle-to-roadside mostcooperation.com/publications.
MIMO channels with a line-of-sight component. IEEE
MOST Cooperation (2008). MOST Specification Revi-
Wireless Communications and Networking Conference,
sion. Retrieved from http://www.mostnet.de.
(pp. 775-779).
MOST. (2008). Media Oriented System Transport
Maxemchuk, N. F., & Shur, D. (2001). An Internet mul-
(MOST). Retrieved October 13, 2008, from http://www.
ticast system for the stock market. ACM Transactions
interfacebus.com/MOST_Bus_Interface.html
on Computer Systems, 19, 384-412.

320
Compilation of References

Motorola (1998). Bosch Controller Area Network Version Ni, J., & Chandler, S. (1994). Connectivity properties
2.0 Protocol Standard. of a random radio network. IEE Proc. Commun., 141(4),
289-296.
Mouskos, K. C., Greenfeld, J., & Pignataro, L. J. (1996).
Toward a multi-modal advanced traveler information Nirupama, B. (2005). Wireless Sensor Networks, A Sys-
system. NJIT Research, 4. tems Perspective, 2005 Artech House, Boston, USA

MOVE (2008). MObility model generator for VEhicular NITRD. National Workshop on High-Confidence Au-
networks. Retrieved March 19, 2008, from http://www. tomotive Cyber-Physical Systems (2008). Retrieved
csie.ncku.edu.tw/~klan/move/index.htm September 12, 2008, from http://varma.ece.cmu.edu/
Auto-CPS/
Mussa, R., Upchurch, J. (2000). Simulator evaluation of
incident detection using VRC system. Proceeding of the Nolte, T. (2003). Reducing Pessimism and Increasing
IEEE Intelligent Vehicles Symposium, (pp. 442-450). Flexibility in the Controller Area Network. Mälardalen
University Licentiate Thesis, May 2003 Department of
Nagel, K., & Schreckenberg, M. (1992). A cellular
Computer Science and Engineering Mälardalen Univer-
automaton model for freeway traffic. J. Phys. I France,
sity Västeras, Sweden, Copyright Thomas Nolte, Printed
2(12), 2221–2229.
by Arkitektkopia, Västeras, Sweden Distribution .
Nakagami, M. (1960). The m-distribution, a general
Nolte, T. (2006). Share-Driven Scheduling of Embedded
formula of intensity distribution of the rapid fading. In
Networks. Mälardalen University, Dissertation, May
W. G. Hoffman (Ed.), Statistical methods in radio wave
2006. Department of Computer Science and Engineer-
propagation, (pp. 3-36), Oxford, UK. Pergamon.
ing Mälardalen University Västeras, Sweden, Printed by
Nakamura, E. F., Loureiro, A. A. F., & Frery, A. C. Arkitektkopia, Västeras, Sweden Distribution.
(2007). Information fusion for wireless sensor networks:
Nouvel, F., El Zein, G., & Citerne, J. (1994, June). Code
Methods, models, and classifications. ACM Comput.
division multiple access for an automotive area network
Surv., 39(3), A9/1–A9/55.
over power-lines. Proceedings of IEEE Vehicular Tech-
National Science Foundation (2006). NSF Workshop on nology Conf., (pp. 525–529).
Cyber-Physical Systems. Retrieved September 12, 2008,
ns-2 (2008). The ns-2 wiki. Retrieved March 18, 2008 at
from http://varma.ece.cmu.edu/cps/
http://www.isi.edu/nsnam/ns/doc/
Navet (2008). The Automotive Embedded Systems Hand-
O’Gorman, E. (2002). Using group communication to
book. Industrial Information Technology series, CRC
support inter-vehicle coordination. Unpublished master’s
Press / Taylor and Francis, ISBN 978-0849380266, to
thesis, University of Dublin, Ireland.
appear November 2008.
Oh, S-W., Chae, H-C., Yun, S-C., & Han, C-S. (2004).
Navet, N., Song, Y-Q., Simonot-Lion, F., & Wilvert, C.
The design of a controller for the steer-by-wire system.
(2005, June). Trends in Automotive Communication Sys-
JSME International Journal, Series C, 47(3), 896-907.
tems. Proceedings of the IEEE, special issue on Industrial
Communications Systems., 93(6), 1204-1223. OpenSSL. Retrieved September, 2008, from http://www.
openssl.org.
Nejad, K., & Li, X. (2005). Low- interference topology
control for wireless ad-hoc networks. Ad Hoc Sensor Papadimitratos, P., Buttyan, L., Hubaux, J.-P., Kargl, F.,
Wireless Networks, 1, 41-64. Kung, A., & Raya, M. (2007). Architecture for secure and
private vehicular communications. In ITST’07, Sophia
Network on Wheels (NoW). (2008). Retrieved September
Antipolis, France.
2, 2008, from http://www.network-on-wheels.de/

321
Compilation of References

Papadimitratos, P., Calandriello, G., Hubaux, J.-P., & Pedersen, M. M., & Ruhoff, P. T. (2002). Entry ramps
Lioy, A. (2008). Impact of Vehicular Communication in the Nagel-Schreckenberg model. Phys. Rev. E, 65(5),
Security on Transportation Safety. In IEEE MOVE 2008, 056705.
Phoenix, (AZ), US, April 17, 2008.
Perkins, C., & Bhagwat, P. (1994). Highly Dynamic
Papadimitratos, P., Gligor, V., & Hubaux, J.-P. (2006). Destination-Sequence DistanceVector Routing (DSDV)
Securing Vehicular Communications - Assumptions, for Mobile Computers. ACM SIGCOMM Computer Com-
Requirements, and Principles. In ESCAR 2006, Berlin, munication Review, 24(4), 234-244.
Germany.
Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc
Papadimitratos, P., Kung, A., Hubaux, J.-P., & Kargl, F. On-Demand Distance Vector (AODV) Routing. http://
(2006). Privacy and Identity Management for Vehicular www.ietf.org/rfc/rfc3561.txt. Request for Comments
Communication Systems: A Position Paper. In Workshop (Work in Progress).
on Standards for Privacy in User-Centric Identity Man-
Petigara, N. D., & Balakrishnan, H. (2004). Integrated
agement, Zurich, Switzerland, July 2006.
routing and storage for messaging applications in mobile
Papageorgiou, M., & Kotsialos, A. (2002). Freeway ramp ad hoc networks. Mobile Networks and Applications,
metering: an overview. IEEE Trans. Intell. Transport. 9(6), 595-604.
Syst., 3(4), 271–281.
Pfeiffer, G., & Schrei, A. (1994, June). Investigation on
Papageorgiou, M., Diakaki, C., Dinopoulou, V., Kotsialos, propagation characteristics of a short range radio link
A., & Wang, Y. (2003). Review of road traffic control with statistical distributed reflectors. IEEE Vehicular
strategies. Proc. of the IEEE, 91(12), 2043–2067. Technology Conference, 3, 1728-1732.

Papp, Z., Brown, C. L., & Bartels, C. (2008). World Piorkowski M., Raya M., Lugo A., Papadimitratos P.,
Modeling for Cooperative Intelligent Vehicles. Pro- Grossglauser M., & Hubaux J. P. (2007, September).
ceedings 2008 IEEE Intelligent Vehicles Symposium, TraNS: Realistic Joint Traffic and Network Simulator
IV2008, Eindhoven. for VANETs. Short paper presented at the Fourth ACM
international Workshop on Vehicular Ad Hoc Networks,
Parker R., & Shahrokh V. (2006, September). Vehicle
VANET ‘07. Montreal, Canada.
Localization in Vehicular Networks. Paper presented at
the IEEE 64th Vehicular Technology Conference VTC- Potnis, N., & Mahajan, A. (2006). Mobility Models for
2006, Melbourne, Australia. Vehicular Ad Hoc Network Simulations. In Proceedings
of the 44th ACM Southeast regional conference (pp 746-
Parker, D. S., & Stedman, T. C. (1994). Energy efficient
747). Melbourne, Florida.
transportation for Florida. (http://www.p2pays.org/
ref/12/11355.pdf, last accessed: Nov. 2007) Pouliezos, A. D., & Stavrakakis, G. S. (1994). Real Time
Fault Monitoring of Industrial Processes. NY, USA:
Parno, B., & Perrig, A. (2005). Challenges in securing
Kluwer Academic Publishers.
vehicular networks. In HotNets-IV, College Park, MA,
USA. PReVENT. (2008). Retrieved September 2, 2008, from
http://www.prevent-ip.org/
Patton, R., Frank, P., & Clark, R. (1989). Fault Diagnosis
in Dynamic System: Theory and Applications. Prentice PwC Automotive Institute. (2008). Analyst Note, August
Hall, USA. 1, 2008.

Paul, C. R. (2006). Introduction to Electromagnetic Qi, Y., Kobayashi, H., & Suda, H. (2006). On Time-
Compatibility, 2nd. ed. Wiley-Interscience. of-arrival Positioning in a Multipath Environment.
IEEE Transactions on Vehicular Technology, 5(55),
1516-1526.

322
Compilation of References

Qualnet (2001). Version 3.1 User’s Manual. Retrieved Redmill, K. A., Kitajima, T., & Özgüner, U. (2001, June).
March 19, 2008 from http://linux.ucla.edu/~gavin/pa- DGPS/INS Integrated Positioning for Control of Auto-
pers/SimulatorManual-3.1.pdf mated Vehicle. Paper presented at the IEEE Intelligent
Transportation Systems, Oakland, USA.
Rabadi, N. M., & Mahmud, S. M. (2007). Privacy
Protection Among Drivers in Vehicle-to-Vehicle Com- Redmill, K. A., Martin, J. I., & Özgüner, U. (2000,
munication Networks. Proceedings of the 4th IEEE October). Sensor and data fusion design and evaluation
Consumer Communications and Networking Conference, with a virtual environment simulator. Paper presented
Las Vegas, NV, January 11-13, 2007. at the IEEE Intelligent Vehicles Symposium. Dearborn,
Mi, USA, Proceedings (pp. 668-674).
Rabadi, N. M., & Mahmud, S. M. (2008). Drivers’
Anonymity with a Short Message Length for Vehicle-to- Reed, P. (2005). We test the tips: What really saves
Vehicle Communications Network. Proceedings of the gas? and how much? (http://www.edmunds.com/owner-
5th IEEE Consumer Communications and Networking ship/driving/articles/106842/article.html, last accessed:
Conference, Las Vegas, NV, January 10-12, 2008. Nov. 2007).

Raghupathy, Bevas, & Vaduvur (1998). Spine routing Regt, d. H. (2007). Back To Basics & Future Trends:
in ad hoc networks. ACM/Baltzer Cluster Computing Automotive Networking. December 7. 2007. Retrieved
Journal, 1(2), 237–248. September 8, 2008, from http://www.automotivedesign-
line.com/howto/204702733
Rajaraman, R. (2002). Topology control and routing in
ad hoc network: A survey. ACM SIGACT News, 33(2), Rehunathan, D. B., Seet, B. C., & Luong, T. T. (2007).
60-73. Federating of MITSIMLab and ns-2 for realistic vehicular
network simulation. In Proceedings of the 4th interna-
Ramanathan, R., & Rosales-Hain, R. (2000). Topology
tional conference on mobile technology, applications,
control of multihop wireless networks using transmit
and systems and the 1st international symposium on
power adjustment. In Proc. of the 19th Annual Joint
Computer human interaction in mobile technology (pp
Conference of the IEEE Computer and Communications
62-67). Singapore
Societies (INFOCOM), Tel-Aviv, Israel, Mar. 26-30.
Reichardt, D., Miglietta, M., Moretti, L., Morsink, P., &
Ravi, N., Smaldone, S., Iftode, L., & Gerla, M. (2007).
Schulz, W. (2002). CarTALK 2000: Safe and comfort-
Lane Reservation for Highways (Position Paper). Re-
able driving based upon inter-vehicle-communication.
trieved March 19, 2008 from www.cs.rutgers.edu/~iftode/
Proceedings of the IEEE Intelligent Vehicles Symposium
ILR-ITSC07.pdf
(pp. 545-550).
Raya, M., & Hubaux, J.-P. (2005). The security of ve-
rfc3561 (2008). Ad hoc On-Demand Distance Vector
hicular ad hoc networks. In SASN ‘05, (pp. 11-21), New
(AODV) Routing. Retrieved March 19, 2008 from http://
York, NY, USA: ACM Press.
www.ietf.org/rfc/rfc3561.txt
Raya, M., Hubaux, J.P. (2005). The Security of Vehicle
Rickenbach, P., Schmid, S., Wattenhofer, R., & Zollinger,
Ad Hoc Networks. Proceedings of the ACM Workshop on
A. (2005). A robust interference model for wireless ad
Security in Ad hoc and Sensor Networks (SASN’05), pp.
hoc networks. In Proc. 5th IEEE International Work-
11-21, Alexandria, Virginia, USA, November 2005.
shop on Algorithms for Wireless, Mobile, Ad-Hoc and
Raya, M., Papadimitratos, P., & Hubaux, J.-P. (2006). Sensor Networks (WMAN), Denver, Colorado, USA,
Securing vehicular communications. IEEE Wireless April 4-8.
Communications magazine, 13(5).
Road Vehicles. (2004). Controller Area Network
(CAN)—Part 4: Time-Triggered Communication, ISO
11 898-4.

323
Compilation of References

Roberts, L. (1975, April). ALOHA packet systems with SAFESPOT. (2008). Retrieved September 2, 2008, from
and without slots and capture, Computer Communica- http://www.safespot-eu.org/pages/page.php
tions Review, 5.
Saha, A. K., & Johnson, D. B. (2004). Modeling mobility
Robinson, R. (2006). The VII Consortium and the for vehicular ad-hoc networks. In Proc. VANET ’04 (pp.
Cooperative Agreement with USDOT. Retrieved Sep- 91–92). New York, NY, USA: ACM.
tember 2, 2008, from http://www.itsmichigan.org/An-
Saha, A., & Johnson, D. (2004). Modeling Mobility for
nualConf2006/presentations/Ralph-ITS-M%20Meeting-
Vehicular Ad-hoc Networks. In Proceedings of the 1st
%20VIIC%20Overview_a.ppt
ACM International Workshop on Vehicular Ad Hoc Net-
Rokitansky, C.-H., & Wietfeld, C. (1993). Comparison of works (VANET) (pp. 91-92). Philadelphia PA, USA.
Adaptive Medium Access Control Schemes for Beacon-
Saito, H. (2006). Performance analysis of combined
Vehicle Communications. Proceedings of the IEEE-IEE
vehicular communication. IEICE Transactions on Com-
Vehicle Navigation and Information Systems Conference,
munications, E89B(5),. 1486-1494.
(pp. 295-299).
Sameshima, H., Ogasa, M., & Yamamoto, T. (2004).
Rokitansky, C.-H., & Wietfeld, C. (1995). Methods and
On-Board Characteristics of Lithium Ion Batteries for
Tools for Performance Evaluation and Validation of Ve-
improving energy regenerative efficiency. Quarterly
hicle-Roadside Communication Proposed for Standardiza-
report of RTRI, 45(2), 45-52.
tion. Proceedings in Vehicular Technology Conference,
2, 964-970. Santos, R. A., Edwards, A., Edwards, R. M., & Seed, N.
L. (2005). Performance evaluation of routing protocols in
Ross, P. (2003, February). Top Ten Techno-Cool Cars.
vehicular ad-hoc networks. International Journal Ad Hoc
IEEE Spectrum, (pp. 30-35).
and Ubiquitous Computing, 1(1/2), 80-91.
Rossi, C., Tilli, A., & Tonielli, A. (2000). Robust Control
Sarvi, M., & Kuwahara, M. (2007). Microsimulation
of a Throttle Body for Drive by Wire Operation of Auto-
of freeway ramp merging processes under congested
motive Engines. IEEE Transactions on Control System
traffic conditions. IEEE Trans. Intell. Transport. Syst.,
Technology, 8(6), 993-1002.
8(3), 470–479.
Roumeliotis, S., & Bekey, G. (2000, April). Bayesian
Savarese, C., Rabaey, J. M., & Beutel, J. (2001, May).
estimation and Kalman filtering: A unified framework for
Location in Distributed Ad-Hoc Wireless Networks.
mobile robot localization. Paper presented at the IEEE
Paper presented at the IEEE Conference on Acoustics,
International Conference on Robotics & Automation,
Speech, and Signal Processing, Salt Lake City, Utah,
San Francisco, CA, USA.
USA, Proceedings (pp. 2037-2040).
Royer, E., & Toh, C. (1999). A Review of current routing
Savvides, A., Park, H., & Srivastava, M. B. (2002, Sep-
protocols for ad hoc wireless networks. IEEE Personal
tember). The Bits and Flops of the N-hop Multilatera-
Communications, (pp. 46-55).
tion Primitive For Node Localization Problems. Paper
Rubin, A. (2002). Implementing automotive protocols presented at the ACM conference on Wireless Sensor
for communications over noisy battery power lines. Networks and Applications. WSNA’02, Atlanta, Georgia,
Proceedings of the IEEE Conference on Conv. Elect USA Proceedings (pp. 112-121).
Electron. Eng. Israel, December, (p. 306).
Schäonhof, M., Kesting, A., Treiber, M., & Helbing, D.
SAFESPOT Project Partners. (2008). Retrieved June (2006). Coupled vehicle and information flows: Mes-
2008, from http://www.safespot-eu.org sage transport on a dynamic vehicle network. Physica
A-Statistical Mechanics and ITS Applications, 363(1),
73-81.

324
Compilation of References

Schiffer, A. (2000). Statistical channel and noise model- Sklar, B. (1997). Rayleigh Fading Channels in Mobile
ling of vehicular dc-lines for data communication. Pro- Digital Communication Systems Part I: Characterization.
ceedings of IEEE Vehicular Technology Conf.,Tokyo. IEEE Communications Magazine, 35(7), 90-100

Schlingelhof, M., Betaille, D., Bonnifait, P., & Demas- Smets, P., & Ristic, B. (2004, April). Kalman filters and
eure, K. (2008). Advanced positioning technologies for joint tracking and classification in the transferable belief
co-operative systems. IET Intelligent Transportation model framework. Paper presented at the 7th International
Systems, 2(2). Conference on Information Fusion, (pp. IF04–0046),
Stockholm, Sweden.
Segawa, M., Kimura, S., Kada, T., & Nakano, S. (2004).
A study of the relationship between vehicle behavior Sommer, C., Yao, Z., German R., & Dressler, F. (2008)
and the steering wheel torque on steer by wire vehicles. On the Need for Bidirectional Coupling of Road Traffic
Vehicle System Dynamics, Suppl. 41, 202-211. Microsimulation and Network Simulation. In Proceed-
ings of the Computer Communications Workshops.
Seiler, P., Pant, A., & Hedrick, K. (2004). Disturbance
INFOCOM (pp 1-6).Phoenix, AZ.
propagation in vehicle strings. IEEE Transactions on
Automatic Control, 49, 1835–1842. Song, B., & and Hedrick, J. K. (2004). Design and ex-
perimental implementation of longitudinal control for
Setlur, P. J., Wagner, R., Dawson, D. M., & Braganza,
automated transit buses. Proceedings of the American
D. (2006). A Trajectory Tracking Steer-by-Wire Control
Control Conference (pp. 2751-2756).
System for Ground Vehicles. IEEE Transactions on
Vehicular Technology, 55(1), 76-85. Spdicom (2008). Spdicom Inc., Retrieved from official
web Official web site http://www.spidcom.com.
SEVECOM. (2008). Retrieved September 2, 2008, from
http://www.sevecom.org/ Sreenivasiah, I., Chang, D. C., & Ma, M. T. (1981).
Emission characteristics of electrically small radiating
Shaheen, S., Heffernan, D., & Leen, G. (2003). A compari-
sources from tests inside a TEM cell. IEEE Trans. on
son of emerging time-triggered protocols for automotive
Electromagn. Compat., (23), 113-121.
X-by-wire control networks. Proc. Instn Mech. Engrs
Part D: J. Automobile Engineering, 217, 13-22. Srini, V. P. (2006, December). A vision for supporting
Autonomous Navigation in Urban Environments, IEEE
Shang, Y., Rumi, W., Zhang, Y., & Fromherz, M. P.
Computer.
J. (2003, June). Localization from Mere Connectivity.
Paper presented at the ACM conference on Mobile Ad Srinivasan, K. K., & Mahmassani, H. S. (2003). Ana-
Hoc Networking and Computing. Annapolis, Maryland, lyzing heterogeneity and unobserved structural effects
USA, Proceedings (pp. 201-212). in route-switching behavior under ATIS: a dynamic
kernel logit formulation. Transportation Research Part
Shavitt, Y., & Sha, A. (2005). Optimal routing in gossip
B: Methodological, 37(9), 793-814.
networks. IEEE Transactions on Vehicular Technology,
54(4). Stanton, N., & Marsden, P. (1997). Drive-by-wire systems:
some reflections on the trend to automate the driver role.
Sichitiu, M. L., & Kihl, M. (2008). Inter-Vehicle Com-
Proceeding of Inst. Mech. Engrs. Part D, 211, 267-276.
munication Systems: A Survey. IEEE Communications
Surveys & Tutorials, 10(2), 88-105. St-Pierre, M., & Gingras, D. (2004, March). Neural
network based data fusion for vehicle positioning in
Singh, J. P., Bambos, N., Srinivasan, B., & Clawin, D.
land navigation system. Paper presented at the Society
(2002, December). Wireless LAN performance under
of Automotive Engineering (SAE) conference. Paper no.
varied stress conditions in vehicular traffic scenarios.
345, Detroit, USA.
IEEE Vehicular Technology Conference, 2, 743-747.

325
Compilation of References

St-Pierre, M., & Gingras, D. (2005, June). Comparison Tokuda, K., Akiyama, M., & Fujii, H. (2000). DOLPHIN
between the unscented Kalman filter and the extended for inter-vehicle communications system. Proceedings
Kalman filter for the position estimation module of of the IEEE Intelligent Vehicles Symposium (pp. 504-
an integrated navigation information system. Paper 509).
presented at the Institute of Electrical and Electronics
Toledo-Moreo, R. et al. (2007). High-Integrity IMM-
Engineering (IEEE) Intelligent Vehicles Conference,
EKF-Based Road Vehicle Navigation With Low-Cost
Parma, Italy.
GPS/SBAS/INS. IEEE Transactions on Intelligent
SUMO (2008). Simulation of Urban MObility. Retrieved Transportation Systems, 8(3).
March 19, 2008 from http://sumo.sourceforge.net/docs/
Torrent-Moreno, M., Corroy, S., Schmidt-Eisenlohr, F.,
bibliography.shtml
& Hartenstein, H. (2006). IEEE 802.11-based one-hop
Suresh, B., & Sivan, K. (2004, April). Performance broadcast communications: understanding transmission
evaluation of multi-sensor data-fusion systems in launch success and failure under different radio propagation
vehicles. Sadhana , 29(2), 175–188. India environments. In MSWiM ‘06, (pp. 68-77), New York,
NY, USA, ACM Press.
Swaroop, D. (1995). String stability of interconnected
systems: An application to platooning in automated Torrent-Moreno, M., Jiang, D., & Hartenstein, H. (2004).
highway systems. Unpublished doctoral dissertation, Broadcast reception rates and effects of priority access in
University of California, Berkeley, CA. 802.11-based vehicular ad-hoc networks. In VANET’04,
(pp. 10-18), New York, NY, USA. ACM Press.
Syverson, P. F., & Stubblebine, S. G. (1999). Group
principals and the formalization of anonymity. In World Torrent-Moreno, M., Santi, P., & Hartenstein, H. (2006).
Congress on Formal Methods, (pp. 814-833) Distributed fair transmit power adjustment for vehicular
ad hoc networks. In SECON ‘06, (pp. 479-488).
Taliwal, V., Jiang, D., Mangold, H., Chen, C., & Sengupta,
R. (2004). Empirical determination of channel charac- Traffic Safety Facts. (2004). NHTSA´s National Center
teristics for DSRC vehicle-to-vehicle communication. for Statistics Analysis.
In Proc. 1st ACM Int. Workshop on Vehicular Ad Hoc
Transportation Statistics Annual Report. (2006). U.S.
Networks (p. 88). Philadelphia PA, USA.
Department of Transportation Bureau of Transportation
Tian, J., Han, L., & Rothennel, K, (2003, October). Statistics.
Spatially aware packet routing for mobile Ad Hoc inter-
Treiber, M., & Helbing, D. (2002). Microsimulations of
vehicle radio networks. IEEE Intelligent Transportation
freeway traffic including control measures. (http://arxiv.
Systems Conference, 2, 1546- 1551.
org/abs/cond-mat/0210096)
TIGER (2008). Topologically Integrated Geographic
Treiber, M., Hennecke, A., & Helbing, D. (2000). Con-
Encoding and Referencing system. Retrieved March 19,
gested traffic states in empirical observations and micro-
2008 from http://www.census.gov/geo/www/tiger/
scopic simulations. Phys. Rev. E, 62(2), 1805–1824.
Tippet, J. C. & Chang, D. C. (1976). Radiation charac-
Treiber, M., Kesting, A., & Helbing, D. (2006). Delays,
teristics of electrically small devices in a TEM trans-
inaccuracies and anticipation in microscopic traffic
mission cell, IEEE Trans. on Electromagn. Compat.,
models. Physica A, 360(1), 71–88.
18(4), 134-140.
Tsai, H., Saraydar, C., Talty, T., Ames, M., Macdonald,
Toh, C.-K. (2002). Ad Hoc Mobile Wireless Networks:
A., & Tonguz, O. (2007). ZigBee-based Intra-car Wireless
Protocols and Systems. Prentice-Hall International.
Sensor Network, Communications. IEEE International
Conference ICC’07, 24-28 June, (pp. 3965-3971).

326
Compilation of References

Tsugawa, S., & Kato, S. (2003). Evaluation of incident UWB. (2008). Ultra-wideband Technolgy. Retrieved
information transmission on highways over inter-vehicle October 13, 2008, from http://www.intel.com/technol-
communications. In Intelligent Vehicles Symposium, ogy/comms/uwb/
2003. Proceedings. IEEE, Columbus, Ohio, USA, Jun.
Vahidi, A., & Eskandarian, A. (2003). Research advances
9-11.
in intelligent collision avoidance and adaptive cruise
Tsukamoto, K., Fujii, M., Itami, M., & Itoh K. (2001, control. IEEE Transactions on Intelligent Transportation
May). Study on acquisition and tracking of vehicle Systems, 4(3), 143-153.
location using IVC and RVC dynamic networks. Paper
Valéo (2006). Valéo Inc., Electrical and Electronic Dis-
presented at the IEEE Intelligent Vehicle Symposium,
tribution Systems: Focus on Power Line Communication.
(pp. 467-470), Tokyo, Japan.
Retrieved from official web http://www.valeo.com/ .
TTCAN. (2008). Time Triggered Controller Area Network
Varaiya, P. (1993). Smart cars on smart roads: Problems of
(TTCAN). Retrieved October 13, 2008, from http://www.
control. IEEE Trans. Autom. Control, 38(2), 195–207.
ttcan.com/
Vasilash, G. S. (2005). Hardware-in-the-loop: Assur-
TTTech (2002). Time-Triggered Protocol TTP/C High-
ing performance & quality by combining the real &
Level Specification Document Specification, Document
the virtual testing. Automotive Design & Production.
number D-032-S-10-028.
Gardner Publications, Inc. Retrieved October 14, 2008,
U.S. DOT. Intelligent Vehicle Initiative. Retrieved July from http://findarticles.com/p/articles/mi_m0KJI/is_/
4, 2008, from http://www.its.dot.gov/ivi/ivi.htm ai_n13784131

Ukkusuri, S., & Du, L. (2008). Geometric connectivity of Vehicle Safety Communications Consortium. (2008).
vehicular ad hoc networks: Analytical characterization. Retrieved September 2, 2008, from http://www-nrd.
Transportation Research Part C, 16(5), 615-634. nhtsa.dot.gov/pdf/nrd-12/CAMP3/pages/VSCC.htm

Uldrich, J. (2008). The Future of the Automobile. March Vejrazka, F. (2007, April). Galileo and the Other Satellite
10, 2008. Retrieved September 8, 2008, from http://www. Navigation Systems. Paper presented at the IEEE 17th
jumpthecurve.net/index.php/recent_posts/the_future_ Radioelektronika International Conference.
of_the_automobile/
Victoria, E. (n.d.). How you can save on fuel costs.
Uplap, R., Okhade, M., Ghanekar, P., Panse, O., Narayan, (http://www.epa.vic.gov.au/air/savefuel/savefuel.asp,
S., & Sable, A. (2004). LIN Protocol –Technology Re- last accessed: Nov. 2007)
view and Demonstration in Power Window Application.
VIIC and VII Program Overview. (2005). Retrieved
Proceedings of the 2004 SAE World Congress, Paper
September 2, 2008, from http://www.leearmstrong.
Number 2004-28-0019.
com / DSRC%20Home/St a nd a rd s%20P rog r a ms/
USB. (2008). Wireless USB. Retrieved October 13, 2008, N o r t h% 2 0A m e r i c a n / P r e v i o u s % 2 0 M e e t i n g s /
from http://www.usb.org/wusb/ March%2006/VIIC%20Overview.ppt#1

USDOT (2006, December). Transportation Statistics VISSIM (2008). VISSIM Micro-Simulation Software.
Annual Report, U.S. Department of Transportation, Retrieved March 19, 2008 from http://www.english.ptv.
Bureau of Transportation Statistics. de/cgi-bin/traffic/traf_vissim.pl

USDOT. (2008). Retrieved September 2, 2008, from Vlacic, L., Parent, M., & Harashima, F. (2001). Intelligent
http://www.its.dot.gov/its_overview.htm vehicle technologies: Theory and applications. London:
Butterworth-Heinemann.

327
Compilation of References

VSCC. VSC Project Overview. Retrieved June 8, 2008, 13, 2008, from http://standards.ieee.org/announcements/
from http://www-nrd.nhtsa.dot.gov/pdf/nrd-12/CAMP3/ pr_P1609.0_new.html
pages/VSCC.htm
Wiedemann, R. (1974) Simulation des Strassenverkeh-
Wagstaff, I. (1999, April). Braking new ground. Automo- rsflusses. Schriftenreihe des Instituts für Verkehrswesen
tive Engineer, (pp. 61-62). der Universität Karlsruhe, Heft 8

Waller, S., & Ziliaskopoulos, A. (2002). On the online Wietfeld, C., & Rokitansky, C.-H. (1994). Performance
shortest path problem with limited arc cost dependen- of Vehicle-Roadside Communication Systems support-
cies. Networks, 40(4). ing Multiple RTI-Applications. Proceedings in Vehicle
Navigation & Information Systems Conference, (pp.
Wan, E. A., & Merwe, R. V. D. (2000). The Unscented
133-138).
Kalman Filter for Nonlinear Estimation. Paper presented
at the Symposium on Adaptive Systems for Signal Pro- Wietfeld, C., & Rokitansky, C.-H. (1995). Markov Chain
cessing, Communication and Control (AS-SPCC-2000), Analysis of Alternative Medium Access Control Protocol
Lake Louise, Alberta, Canada. for Vehicle-Roadside Communications. Proceedings in
Vehicular Technology Conference, 2, 958-963.
Wang, B., Sen, I., & Matolak, D. (2007, October). Per-
formance evaluation of 802.16e in vehicle to vehicle Willke, T. L., & Maxemchuk, N. F. (2005). Coordinated
channels. IEEE Vehicular Technology Conference (pp. interaction using reliable broadcast in mobile wireless
1406-1410). networks. Proceedings of the 4th International IFIP-TC6
Networking Conference, NETWORKING 2005, Waterloo,
Wang, H., Xu, J., Ibañez-Guzmán, J, Jarvis, R., Goh, T.,
Canada (pp. 1168-1179).
& Chang, C. W. (2000). Real Time Obstacle Detection
for AGV Navigation Using Multi-baseline Stereo. In Willke, T. L., Tientrakool, P., & Maxemchuk, N. F. (2008).
D. Rus & S. Singh (Eds.), International Symposium on A Survey of Inter-Vehicle Communication Protocols and
Experimental Robotics Lecture Notes in Control and Their Applications. IEEE Communications Surveys and
Information Sciences, 271. Springer. Tutorials. To appear.

Wang, S. Y., Chou, C. L., Chiu, Y. H., Tseng, Y. S., Hsu, Wolf, W. (2007). The Good News and the Bad News.
M. S., Cheng, Y. W., Liu, W. L., & Ho, T. W. (2007, Computer, 40(11), 104-105.
September). NCTUns 4.0: An Integrated Simulation
Wu, Q., Gao, Z., & Wan, D. (2002, April). An adaptive
Platform for Vehicular Traffic, Communication, and
information fusion method to vehicle. Paper presented at
Network Researches. Paper presented at the 1st IEEE
the IEEE Position location and navigation symposium.
International Symposium on Wireless Vehicular Com-
Proceedings (pp. 248-253).
munications. Baltimore, MD, USA
Xu, Q., Mak, T., Ko, J., & Sengupta, R. (2004). Vehicle-
Wang, X. (2007). Modeling the process of information
to-vehicle safety messaging in DSRC. In VANET ‘04, (pp.
relay through inter-vehicle communication. Transporta-
19-28), New York, NY, USA. ACM Press.
tion Research Part B, 41(6), 684-700.
Xue, F., & Kumar, P. (2004). The number of neighbors
Wang, Z., Kulik, L., & Ramamohanarao, K. (2007).
needed for connectivity of wireless network. Wireless
Proactive traffic merging strategies for sensor-enabled
Networks, 10, 169-181.
cars. In Proc. VANET ’07 (pp. 39–48). New York, NY,
USA: ACM. Yang, X., Liu, J., Zhao, F., & Vaidya, N. H. (2004). A ve-
hicle-to-vehicle communication protocol for cooperative
WAVE. (2008). IEEE Wireless Access in Vehicular
collision warning. In First Annual International Confer-
Environment (WAVE), IEEE 1609. Retrieved October
ence on Mobile and Ubiqiotous Systems: Networking
and Services.

328
Compilation of References

Yang, Yi, Varshney, M., Mohan, S., & Bagrodia, R. Zeng, K. (2006). Pseudonymous pki for ubiquitous
(2007). High-Fidelity Application-Centric Evaluation computing. In Atzeni A. & Lioy, A. (Ed.) EuroPKI 2006,
Framework for Vehicular Networks. In Proceedings of (pp.207-222), Turin, Italy, Springer-Verlag.
the fourth ACM international workshop on Vehicular ad
Zhang, Y., Kosmatopoulos, E. B., Ioannou, P. A., &
hoc networks (pp 49-58). Montreal, Quebec, Canada
Chen, C. C. (1999). Autonomous intelligent cruise con-
Yih P., & Gerdes, J.C., Modification of Vehicle Handling trol using front and back information for tight vehicle
Characteristics via Steer-by-Wire. IEEE Trans. on Control following maneuvers. IEEE Transactions on Vehicular
Sys. Tech., 13(6), 965-976. Technology, 48, 319-328.

Yin, J., ElBatt, T., Yeung, G., Ryu, B., Habermas, S., Zhao, Y. (1997). Vehicle Location and Navigation Sys-
Krishnan, H., & Talty, T. (2004). Performance evalua- tems. Artech House, Norwood, USA
tion of safety applications over DSRC vehicular ad hoc
Zheng, B., & Anwar, S. (2008). Fault Tolerant Control of
networks. In Proceedings of the 1st ACM international
the Road Wheel Subsystem in a Steer-By-Wire System.
Workshop on Vehicular Ad Hoc Networks (pp. 1-9).
International Journal of Vehicular Technology, Article
Philadelphia PA, USA
ID 859571, doi:10.1155/2008/859571, 1-8.
Yong, M. S. (2008). A*CAR. A*STAR Program Pro-
Zheng, B., Huang, M., Daugherty, B., & Anwar, S. (2006).
posal.
Integrated Steer-By-Wire control and diagnostic system.
Zandbergen, A., & Van der Ree, A. (1992). Experiments Proceedings of the American Control Conference, Min-
on vehicle to roadside microwave communication. IEEE neapolis, Minnesota.
MTT-S International Microwave Symposium Digest, 2,
ZigBee (2000). ZigBee Specification. Version 1.0, De-
617-620.
cember. Retrieved from http://www.zigbee.org;
Zarki, M. E., Mehrotra, S., Tsudik, G., & Venkata-
Zou, X., Ramamurthy, B., & Magliveras, S. (2002).
subramanianm, N. (2002). Security Issues in Future
Routing Techniques in Wireless Ad Hoc Networks
Vehicular Network. Proceedings of European Wireless
Classification and Comparison. Proceedings of the Sixth
Conference 2002.
World Multiconference on Systemics, Cybernetics and
Informatics, SCI.

329
330

About the Contributors

Huaqun Guo obtained BEng and MEng from Tianjin University in 1989 and 1991 respectively, and
obtained M.Eng and PhD from the National University of Singapore (NUS) in 2001 and 2007 respectively.
She was a senior engineer, Kent Ridge Digital Labs (KRDL), Singapore from 2000 to May 2001. She was
a senior research staff, NUS from June 2001 to March 2003. She was an Ordinary Member of Singapore
Computer Society from 2000 to 2005. She is an IEEE member from 2007, a committee member of IEEE
SG WIE AG 2008, and a member of SingAREN (Singapore Advance Research and Education Network)
from 2000. Dr. Guo is currently a research fellow at the Institute for Infocomm Research (I2R), Agency
for Science Technology and Research (A*STAR) in Singapore. She has published number of papers in
the international journals and conferences. Her research areas include multicast, vehicular network, P2P
computing, security, networked middleware, and multimedia communication system.

***

Omar Álvarez-Cardenas received the MSc degree in telematics at the University of Colima in
1999. He is finishing the PhD in telecommunications at the Jose Antonio Echeverria Institute from La
Havana. Since 1998 he has been teaching networking at the School of Telematics where he is a reseach-
professor in telecommunications. His research focuses on network simulations, QoS in metropolitan
ethernet networks, mobile computing and bandwidth efficiency.

Sohel Anwar is an assistant professor in the Department of Mechanical Engineering at School of


Engineering and Technology, Purdue University Indianapolis, Indianapolis, Indiana, USA. He received
his PhD in mechanical engineering in 1995 from the University of Arizona, Tucson, Arizona, USA. Dr.
Anwar worked for Caterpillar, Inc. from 1995 to 1999 where he was involved in developing novel X-by-
wire control algorithms for wheel loaders. In 1999, he joined Ford Motor Company / Visteon Corporation
where he focused on developing advanced fault tolerant control algorithms for drive by wire systems.
Dr. Anwar holds 12 US patents and several foreign patents. He has published over 40 papers in refereed
journals and conference proceedings. He is an associate editor for IEEE Transactions on Vehicular
Technology. His research interests include fault tolerant drive by wire systems, hybrid electric vehicle
control, automotive control systems, and mechatronics. He may be contacted at: soanwar@iupui.edu.

Raúl Aquino-Santos graduated from the University of Colima with a BE in electrical engineering,
received his MS degree in telecommunications from the Centre for Scientific Research and Higher Edu-
cation in Ensenada, Mexico in 1990. He holds a PhD from the Department of Electrical and Electronic

Copyright © 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
About the Contributors

Engineering of the University of Sheffield, England. Since 2005, he has been with the College of Tele-
matics, at the University of Colima, where he is currently a research-professor in telecommunications
networks. His current research interests include wireless and sensor networks.

Giorgio Calandriello holds a MSc degree in informatics and system engineering and a PhD in
computer engineering. Currently he’s research assistant at Politecnico di Torino in the TORSEC group,
mainly working on security of vehicular communication. His research interests include wireless systems
security, denial-of-service attacks and vehicular networks security and safety.

Valentin Cristea is a professor of the Computer Science and Engineering Department of University
Politehnica of Bucharest, Romania. The main fields of expertise include distributed systems, vehicular
networks, high performance computing, and collaborative environments. He has a teaching experience
of over 30 years in these domains and published more than 25 books, 130 specialist articles, and 40
scientific reports. Cristea coordinated several projects in mobile and vehicular computing, simulation of
large scale distributed systems, and VANETs simulation. He co-authored several papers on designing
and simulating VANET applications. He is a member of IEEE and ACM Society.

Raluca Diaconescu is a software engineer working for IBM in Bucharest, Romania. She obtained
an MSc degree in 2008 and a BSc degree in 2006 from “Politehnica” University Bucharest, computer
science faculty. She studied VANET applications for her graduation thesis and co-authored several
research papers in the field of VANETs. Her research topics include VANET simulators and collabora-
tive route planning.

Lili Du was born in Luoyang, China, in 1975. She received the BS degree in mechanical engineer-
ing from Xi’an Jiaotong University, Xi’an, China, in 1998, and the MS in industrial engineering from
Tsing Hua University, Beijing, China, in 2003. And then she received the MS in operation research and
statistics and PhD degree in decision sciences and engineering systems from Rensselaer Polytechnic
Institute (RPI), Troy, NY, in 2008. In September 2008, she joined NEXTRANS in Purdue University
as a research associate. Her main research interests are vehicular ad hoc networks (VANETs), on-line
routing, network design under disasters condition, and transportation network modeling.

Arthur Edwards-Block received his masters degree in Education from the University of Hous-
ton in 1985. He has been a researcher-professor at the University of Colima since 1985, where he has
served in various capacities. He has been with the School of Telematics since 1998. His primary areas
of research are computer assisted language learning (CALL), distance learning, collaborative learning,
multimodal leaning and mobile learning. The primary focus of his research is presently in the area of
mobile collaborative learning.

Miguel A. Garcia-Ruiz graduated in computer systems engineering and obtained his MSc in Computer
Science from the University of Colima, Mexico. He received his PhD in Computer Science and Artificial
Intelligence from the School of Cognitive and Computing Sciences, University of Sussex, England. He
took a virtual reality course at Salford University, England and a graphics techniques internship at the
Madrid Polytechnic University, Spain. Miguel has been a visiting professor at the University Of Ontario
Institute Of Technology, Canada. He has been teaching computer science courses, and doing research

331
About the Contributors

mainly on virtual reality and multimodal interfaces at the University of Colima. Miguel has published
various scientific papers in major journals and a book, and has directed a video documentary about an
introduction to virtual reality.

Denis Gingras received his BS and MS degrees from Université Laval in 1980 and 1984 respec-
tively, and his Dr. Eng degree, in 1989, from Ruhr-Universität Bochum, Germany, all in electrical
engineering. Awarded a STA fellowship in Japan, he was invited researcher at CRL, Tokyo, from 1989
to 1990. From 1990 to 1998, he directed the digital and optical systems department at INO, in Canada.
In 1999, he was invited professor at INRIA in Sophia-Antipolis, France. Since 2000, he is professor
at Université de Sherbrooke, where he has also been director of the Intelligent Materials and Systems
Institute from 2000 to 2008. Dr. Gingras has published two books and more than eighty publications.
His research interests cover intelligent systems and information processing. Dr. Gingras was leader of
the Intelligent Vehicles & Intelligent Vehicle-Highway Systems Working Group within the ATLANTIC
Canada International Network and is leading the Intelligent Systems and Sensors research program in
the Canadian AUTO21 NCE.

Apolinar Gonzalez-Potes holds a PhD from Polytechnic University of Valencia, Spain. Since
2004, he has been with the Faculty of Mechanical Electrical Engineering of the University of Colima,
where he is currently a research-professor in informatics. His current research interest includes mobile
computing and embedded software.

Cristian Gorgorin is a software engineer working for S&T in Bucharest, Romania. He obtained
an MSc degree in 2008 and a BSc degree in 2006 from “Politehnica” University Bucharest, Computer
Science Faculty. He studied VANET routing protocols for his graduation thesis and co-authored several
research papers in the field of VANETs. His research topics include VANET simulators and algorithms
for intelligent traffic lights.

Wilfried Gouret received the MSc degree in electrical engineering from University of Rennes,
France in 2004 and and the PhD degrees from National Institute of Applied science (INSA), Rennes,
France in 2007. From 2004 to 2007, he was with the research laboratory IETR (Institute of Electronics
and Telecommunications of Rennes) where he worked on the optimization of power line communica-
tions for automotive application. A demonstrator has been realized and demonstrates the feasibility
of such system. Currently, he is research engineer and his current research focuses on high data rate
wireless communications

Victor Gradinescu is a software developer for S&T Romania. He has received a BSc degree and
MSc degree in computer science from Politehnica University of Bucharest. His research interests have
focused on the design and simulation of VANET applications, such as intersection cooperation and
adaptive traffic lights, with a particular emphasis on mobile wireless networks simulation, analysis and
optimization.

Todd Hubing is the Michelin Professor of Vehicular Electronics at Clemson University. He holds a
BSEE from MIT, an MSEE from Purdue, and a PhD from North Carolina State University. He began
his career as an EMC engineer for IBM in 1982, where he did EMC testing and troubleshooting on a

332
About the Contributors

variety of computer and network communications products. In 1989, he became a faculty member at the
University of Missouri-Rolla (UMR) where he worked with other faculty and students to analyze and
develop solutions for a wide range of EMC problems affecting the electronics industry. Since coming
to Clemson in 2006, he has continued his work in electromagnetic compatibility and computational
electromagnetic modeling, particularly as it is applied to automotive and aerospace electronics. Dr.
Hubing is a fellow of the Institute of Electrical and Electronics Engineers (IEEE) and a past president
of the IEEE Electromagnetic Compatibility Society.

Javier Ibañez-Guzmán obtained his PhD at the University of Reading on a SERC-UK assistantship
and his MSEE at the University of Pennsylvania (USA) as a Fulbright scholar. He is currently working
for Renault S.A where he is responsible for localisation technologies used in advanced driving assistance
systems. Dr Ibañez-Guzmán has worked as senior scientist at SimTECH, a national research institute
in Singapore, where he spearheaded research on autonomous ground vehicles for unstructured envi-
ronments. He was responsible for several projects sponsored by the ministry of defence. Concurrently,
he was adjunct associate professor at Nanyang Technological University. His research interests are in
localisation and perception for intelligent vehicles. He has worked in manufacturing robotics in France
and was Maître de Conferences at the engineering school ESA IGELEC (part of the Ecole Polytechnique
de l’Université de Nantes). Dr. Ibañez-Guzmán is Fellow of the Institute of Engineering Technology
and a Chartered Electrical Engineer (C. Eng.) of the Engineering Council of the U.K. He is member of
several societies within the IEEE.

Liviu Iftode is an associate professor of computer science at Rutgers University, New Jersey. He
received his PhD in computer science from Princeton University in 1998. His research interests in-
clude distributed systems, operating systems, vehicular networks, mobile and pervasive computing.
He is a senior member of the IEEE Computer Society and a member of the ACM. Liviu Iftode is the
vice-chair of IEEE Technical Committee on Operating Systems and a member of the editorial board of
IEEE Pervasive Computing. In the area of vehicular computing, Dr. Iftode led the TrafficView research
project, one of the first traffic monitoring and warning system based on cat-to-car communication, and
is a co-author of VITP (Vehicular Information Transfer Protocol). More information can be found at
http://www.cs.rutgers.edu/~iftode/.

Shivkumar Kalyanaram is a professor in the Department of Electrical and Communications Sys-


tems Engineering at Rensselaer Polytechnic Institute. His research interests are in the area of computer
networking, concentrated around the theme of traffic management and high performance wireless net-
working. In particular, he works on topics of congestion control, reliability, connectionless traffic engi-
neering, quality of service (QoS), last-mile community wireless networks, low-cost free-space-optical
networks, automated network management using online simulation, multicast, multimedia networking
(including peer-to-peer multimedia systems), and performance analysis.

Lars Kulik is a senior lecturer at the Department of Computer Science and Software Engineering
at the University of Melbourne. Until June 2004, he was a postdoctoral researcher at the Department
of Spatial Information Science and Engineering, University of Maine. In 2002, he completed his PhD
at the University of Hamburg. His overall research goal is to develop a theory of spatial information
for building pervasive computing systems that anticipate, adapt and respond to the needs of users, and

333
About the Contributors

provide services based on the user’s location and context. Specifically, he focuses on efficient algorithms
for moving objects, optimization of traffic throughput using sensor-enabled cars in VANETs, informa-
tion dissemination algorithms in sensor networks, location privacy, and more generally, efficient spatial
algorithms in pervasive computing environments.

Antonio Lioy holds a MSc degree in electronic engineering (summa cum laude) and a PhD in com-
puter engineering. Currently he is full professor at the Politecnico di Torino where leads the TORSEC
research group that investigates information systems security. This group has taken part to several inter-
national security projects, the most recent ones being the European projects Positif, Deserec, Open-TC,
and Stork. Since September 2007 Prof. Lioy is a member of the PSG (Permanent Stakeholders’ Group)
of ENISA (the European Network and Information Security Agency) and often acts as a consultant and
reviewer for public and private bodies on several security issues. His current research interests are in
the fields of network security, PKI, and policy-based system protection.

Xiaobo Long is a PhD student in the Department of Electrical, Computer and System Engineering
at Rensselear Polytechnic Institute, Troy, NY, USA. She got her bachelor's degree (2001) and master's
degree (2004) both from University of Electronic Science and Technology of China. Currently, she
is working with Professor Biplab Sikdar in Networking Lab. Her research is focused on link level
characteristics of wireless communications and computer networks, such as link failures detection in
computer networks, wireless channel quality prediction, shadow region detection and intrusion detec-
tion at PHY layer in wireless networks. She is also interested in automatic detection and decision and
pattern recognition.

Syed Masud Mahmud is an associate professor of electrical and computer engineering. He has been
long recognized for his teaching excellence in the University. He has been instrumental in educational
innovation, such as developing and teaching the first distance-learning course for Wayne State University.
In 2002 Dr. Mahmud received the University’s Presidential Award in Excellence in Teaching. In 1994
and also in 2001, he was the recipient of the College of Engineering’s Teaching Excellence Award and
received a number of Outstanding Faculty Awards from his College. During the last eighteen years, Dr.
Mahmud supervised ten research and development projects funded by local industries. These projects
involved developing embedded hardware and software, and simulation models for embedded systems.
He also served as a Co-PI of an NSF funded project to develop an undergraduate laboratory for teaching
Real-Time Embedded System Networking. He has published over 100 peer reviewed technical journal
and conference papers. He also published two editions of a book entitled “Lecture Notes On 16- And
32-Bit Microprocessors” through Simon & Schuster Custom Publishing.

Nicholas F. Maxemchuk, received the BSEE degree from the City College of New York, and the
MSEE and PhD degrees from the University of Pennsylvania. For the past 7 years he has been a pro-
fessor in the electical engineering department at Columbia University in New York City. He has a dual
appointment as a chief researcher in IMDEA Networks in Madrid. Prior to joining Columbia he spent
25 years at Bell Labs and AT&T Labs, as a member of the technical staff, department head, and techni-
cal leader. Prior to joining Bell Labs, he spent 8 years at the RCA David Sarnoff Research Center, as a
member of the technical staff. He has been the editor-in-chief of the IEEE Journal on Selected Areas
in Communications, an editor for the IEEE Transactions on Communications, and the JACM, was on

334
About the Contributors

the founding committee of the IEEE/ACM Transactions on Networking, and served on their steering
committee for 11 years. In 2006 he received the Koji Kobayashi Award for his work in computer com-
munications. He has also been awarded the IEEE’s Leonard G. Abraham Prize Paper Award in 1985
and 1987, for his papers on data and voice on CATV networks and the Manhattan Street networks, and
the William R. Bennett Prize Paper Award in 1997, for his paper on an anonymous credit card.

Margarita G. Mayoral-Baldivia received the MSc degree in telematics at the University of Colima
in 1999. Since 1996, she has been working in the networking area and actually she is a research-professor
in telecommunications networks and CCNA Cisco Networking Academy instructor. Her main research
focuses in security, wired and wireless networks and bandwidth efficiency.

Patrice Maziero was born in Toulouse, France, on December 18, 1984. He received the electronic
engineer degree from Ecole Nationale d’Ingénieur (ENIB) of Brest, France in 2007. From 2006 to
2007 he worked on VHDL school project and at TE2M on the creation of a magnetic sensor for crack
and corrosion detection on metallic surface covered by thick paint layer. Since 2008, he is a research
engineer at the Electronic and Telecommunication Laboratory of Rennes, France (IETR). He works on
the automotive network architecture for ECU’s Communication project, especially on PLC and wireless
intra-car communication medias. He is involves on the French project ANR CIFAER.

Lek Heng Ngoh obtained BSc (Honors) in computer systems engineering from University of Kent
at Canterbury, UK in 1986 and obtained MSc and PhD degrees in computer science from University of
Manchester, UK in 1987 and 1989 respectively. He has organized numerous international networking
conferences, and a review board member of several international journals. He is a founding member of
the Singapore Advance Research and Education Network (SingAREN) — an advanced Internet Initia-
tive. He is currently a senior research scientist at the Institute for Infocomm Research (I2R), Agency for
Science Technology and Research (A*STAR) in Singapore. Dr. Ngoh is also an adjunct associate profes-
sor with the Nanyang Technological University in Singapore. His research interests include: multimedia
network protocols, advanced internet technology, P2P mobile computing & wireless sensor networks.

Fabienne Nouvel received the MSc and PhD degrees in electrical engineering from National In-
stitute of Applied science (INSA), Rennes, France in 1984 and 1994 respectively. From 1984 to 1990,
she was an engineer and worked on DAB, networks and embedded application. In 1990, she joined the
research laboratory IETR (Institute of Electronics and Telecommunications of Rennes) and worked on
automotive application and the optimization of high data rate networks. In 1995, she joined INSA and
currently she is professor in the Department of Telecommunications and Electronic Engineering. She
is involved in several European and national research projects in the field of hardware implementation
on heterogeneous embedded plate-form and power line transmissions. Her research interests lie both in
digital implementation and multicarrier modulation, spread spectrum and multi-user communication.
Current research focuses on power line for automotive combined with wireless system, implemented
on a reconfigurable plate-form.

Kotagiri Ramamohanarao (Rao) received PhD from Monash University. He was awarded the
Alexander von Humboldt Fellowship in 1983. He has been at the University Melbourne since 1980 and
was appointed a professor in computer science in 1989. Rao held several senior positions including

335
About the Contributors

Head of Computer Science and Software Engineering, Head of the School of Electrical Engineering and
Computer Science at the University of Melbourne and Research Director for the Cooperative Research
Centre for Intelligent Decision Systems. He served on the editorial boards of the Computer Journal. At
present he is on the editorial boards for Universal Computer Science, the Journal of Knowledge and
Information Systems, IEEE Transactions on Knowledge and Data Engineering (TKDE), Journal of
Statistical Analysis and Data Mining and Very Large Data Bases (VLDB) Journal. He was the program
Co-Chair for VLDB, PAKDD, DASFAA and DOOD conferences. He is a steering committee member
of IEEE ICDM, PAKDD and DASFAA. He received distinguished contribution award for data mining.
Rao is a fellow of the Institute of Engineers Australia, a fellow of Australian Academy Technological
Sciences and Engineering and a fellow of Australian Academy of Science.

Víctor Rangel-Licea received the B.Eng (Hons) degree in computer engineering in the engineering
faculty from the National Autonomous University of Mexico (UNAM) in 1996, the MSc in Telemat-
ics at from the University of Sheffield, U.K. in 1998, and the PhD in performance analysis and traffic
scheduling in cable networks in 2002, from the University of Sheffield. Since 2002, he has been with
the School of Engineering, UNAM, where he is currently a Research-Professor in telecommunications
networks. His research focuses on fixed, mesh and mobile broadband wireless access networks, QoS
over IP, traffic shaping and scheduling.

Sara Sandoval-Carrillo graduated from the Technological Institute of Colima with a BE in infor-
matics, received his MS degree in telematics from the University of Colima, in 1998. Since then, she
has been with the College of Telematics, at the University of Colima, where she is currently a research-
professor in information system.

Biplab Sikdar received the B. Tech degree in electronics and communication engineering from
North Eastern Hill University, Shillong, India, the M. Tech degree in electrical engineering from In-
dian Institute of Technology, Kanpur and PhD in electrical engineering from Rensselaer Polytechnic
Institute, Troy, NY, USA in 1996, 1998 and 2001, respectively. He is currently an associate professor in
the Department of Electrical, Computer and Systems Engineering of Rensselaer Polytechnic Institute,
Troy, NY, USA. His research interests include computer networking protocols, network security and
queueing theory. Dr. Sikdar is a member of IEEE, Eta Kappa Nu and Tau Beta Pi and currently serves
as an associate editor of the IEEE Transactions on Communications.

Patcharinee Tientrakool is a PhD student at the department of Electrical Engineering, Columbia


University, New York, NY. She received the BS degree in telecommunication engineering from King
Mongkut’s Institute of Technology Ladkrabang, Bangkok, Thailand in 2000 and the MS degree in
electrical engineering from Columbia University in 2006. Currently she is an engineer at CAT Telecom
Public Company Limited, Thailand. Her research interests include vehicular networks and mobile ad
hoc networks.

Satish Ukkusuri is an assistant professor in the Department of Civil and Environmental Engineer-
ing at Rensselaer Polytechnic Institute. Professor Ukkusuri’s expertise is in transportation network
modeling with applications to planning and operations. Ukkusuri received the SWUTC Robert Herman
Award for outstanding research on transportation network modeling and leadership in transportation

336
About the Contributors

during the year 2005. He also holds the Blitman Career Development Chair at RPI which facilitates to
conduct research on transportation systems. Professor Ukkusuri is research centers around large scale
transportation network modeling and its applications to practice. Apart from his active research, he has
been involved in various educational and outreach activities. He presently serves as a faculty advisor
for ITE with an overall interest in contributing to the community.

Ziyuan Wang received her BEng degree in electric and information engineering from Dalian Jiao-
tong University in 2005. Currently, she is a PhD student at the Department of Computer Science and
Software Engineering at the University of Melbourne. She is working on vehicular ad hoc networks
(VANETs), in particular, how to optimize traffic throughput when there are conflicting traffic streams.
Her research goal is to develop proactive traffic control strategies for sensor-enabled cars to mitigate
traffic congestion and reduce fuel consumption in a decentralized manner.

Theodore L. Willke received the BS and MS degrees in electrical engineering and computer science
from the University of Illinois, Chicago, in 1993 and 1995, respectively, and the MS degree in electrical
engineering from the University of Wisconsin, Madison, in 1998. He is currently working toward the
EngScD degree in electrical engineering at Columbia University, New York, NY. In 1998, he joined
Intel Corporation, DuPont, WA, where he is currently a principal engineer with the digital enterprise
group, where he focuses on I/O technologies and standards. His research interests include wireless
communication networks, I/O protocols, and computer system architectures.

Ghais El Zein received the PhD and Habilitation a Diriger des Recherches (HDR) degrees in tele-
communications signal processing and electronics from Rennes 1 University, France, in 1988 and 1998,
respectively. From 1985 to 1987, he was a lecturer and he worked on the first communication systems
using spread spectrum in different applications: wireless, power line, multiplexing. In 1988, he joined
INSA and currently he is professor in the Department of Telecommunications and Electronic Engineer-
ing. Since 2001 he is the assistant director of the Institute of Electronics and Telecommunications of
Rennes (IETR) which depends on the French National Center for Scientific Research (CNRS). He is a
member of Commissions C and F of CNFRS-URSI. He is involved in several European and national
research projects in the field of radiowave propagation, combined with mimo applications and their ef-
fects on communication systems performance. His research interests lie in spread spectrum modulation,
multi-user communication, space time coding.

337
338

Index

A co-operative vehicle infrastructure systems


(CVIS) 201,  206,  218,  253,  261,  308
ad hoc networks 109,  113,  114,  117,  118,  communications, car-to-car 6,  9,  96,  98,  99, 
119,  121,  122,  123,  124,  129,  132,  100,  101,  103,  104,  159,  265,  266, 
135,  136,  141,  142,  160,  164,  163,  279,  306,  307,  309,  317,  320
178,  120,  178,  137,  178,  179,  180,  communications, intra-vehicle (InV)
237,  263,  280,  281,  282,  305,  306,  1,  2,  3,  9,  1,  3,  4
310,  312,  313,  314,  315,  317,  318,  communications, vehicle-to-infrastructure
322,  323,  326,  327,  329 (V2I) 1,  2,  3,  4,  5,  6,  8,  9,  3,  4, 
advanced driving assistance systems (ADAS) 200,  201,  202,  205,  213,  217,  248
201,  210,  215 communications, vehicle-to-vehicle (V2V)
advanced vehicle safety systems (AVS) 105 1,  2,  3,  4,  5,  6,  8,  9,  3,  4,  105, 
anti-lock braking system (ABS) 12,  13,  17,  200,  201,  202,  204,  205,  213,  216, 
18,  19,  24,  25,  39,  76,  97,  224,  217,  248
242,  306 consortia, LIN (Local Interconnect Network)
ATIS (advanced traveler information systems) 2,  29,  62,  63,  71,  72,  75,  76,  84,  85,
162,  163,  164,  179,  325   86,  87,  89,  90,  98,  104,  284,  288, 
ATIS, decentralized 163,  164 302,  319,  327
automated highway systems (AHS) constant headway state 174
105,  188,  189,  198,  319 controller area network (CAN) 2,  4,  9,  10, 
automotive consortia 8 29,  39,  40,  42,  62,  63,  70,  71,  72, 
B 73,  75,  76,  84,  86,  87,  88,  89,  90, 
91,  92,  93,  94,  95,  96,  97,  98,  99, 
bottlenecks 72,  75,  180,  181,  186 100,  101,  103,  104,  284,  286,  287, 
brake by wire (BBW) systems 13,  17,  19,  22, 288,  296,  297,  298,  299,  300,  301, 
  24,  39,  45 302,  303,  304,  305,  307,  308,  309, 
311,  317,  320,  323
C cooperative adaptive cruise control (CACC)
car communications 2,  6,  9,  69,  83,  87,  96, 201
  98,  99,  101 crosstalk 65
CISPR 12 standard 49,  67,  314 cyber-physical systems 139,  140,  141,  159
CISPR 25 standard 49,  50,  51,  55,  81

Copyright © 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Index

D G
data exchange 1,  2,  3,  5,  9,  123 generalized prediction (GP)
dedicated short range communication (DSRC) 33,  34,  35,  37,  38,  39
2,  3,  4,  5,  7,  9,  11,  64,  99,  100,  geographic information system (GIS)
103,  106,  112,  142,  159,  164,  181,  116,  220,  270,  273
250,  251,  256,  261,  263,  269,  278,  greedy perimeter stateless routing (GPSR)
281,  282,  304,  310,  314,  326,  327,  115,  116,  121,  124,  129,  132,  134, 
328,  329 135,  270,  280,  316
distance routing effect algorithm for mobility grid location service (GLS) 115,  121
(DREAM) 115,  121,  270,  279,  305
drive-by-wire system 12 H
drive by wire (DBW) 12 headway state, constant 174
drive by wire (DBW) systems 12,  13,  14,  17, headway state, intermediate 174
  22,  23,  24,  25,  26,  28,  29,  30,  31,  headway state, random 174
39,  40,  44,  45 human-machine interface (HMI) 220
hybrid-electric propulsion 12
E
hybrid electric vehicles (HEV) 13,  14,  17
electric vehicles (EV) 13
electro-hydraulic brake (EHB) system 13,  14 I
electro-mechanical brakes (EMB) 13 infotainment applications 69
electromagnetic compatibility (EMC) 48,  49,  intelligent cruise control 161,  329
50,  53,  54,  56,  57,  60,  61,  62,  67,  intelligent transportation systems (ITS) 2,  3, 
61,  64,  79,  83,  87,  311,  54,  62,  65,  4,  5,  7,  8,  10,  11,  105,  121,  142, 
67,  66,  67,  64 159,  163,  179,  202,  206,  209,  262, 
electromagnetic interference (EMI) 49,  51,  310,  311,  314,  324
54,  55,  56,  64,  67 interference 42,  48,  49,  51,  54,  55,  56, 
electronic control units (ECUs) 1,  2,  1,  4,  57,  58,  60,  62,  63,  64,  66,  67,  77, 
29,  43,  69,  70,  72,  75,  82,  87,  91,  78,  79,  84,  85,  106,  107,  162,  163, 
93,  95,  96,  100 165,  166,  167,  168,  167,  168,  169, 
electronic noise 17,  26,  39,  49,  52,  54,  170,  171,  173,  174,  175,  177,  178, 
55,  56,  57,  62,  63,  64,  65,  77,  78,  179,  232,  235,  250,  258,  269,  305, 
48,  78,  66,  78,  79,  83,  86,  90,  98,  306,  311,  315,  320,  321,  323
171,  221,  223,  224,  225,  227,  229,  internal combustion (IC) engine
232,  233,  235,  240,  243,  308,  325 13,  14,  67,  309
electrostatic discharge (ESD) 52,  63,  64,  54 intersection decision systems (IDS) 105
Intra-Vehicle (InV) 1,  9
F
fault tolerant communication 43 K
fault tolerant control 25,  28,  29,  30,  38,  Kalman filter 220,  221,  224,  225,  226,  227,
39,  45   228,  229,  230,  231,  235,  236,  240, 
FlexRay 2,  10,  39,  40,  41,  42,  43,  44,  63,  245,  326
64,  67,  73,  75,  88,  91,  98,  103,  287,
  292,  296,  299,  302,  311 L
4-way stop problem 156
Ladars (Laser detection and ranging sensors)
201,  203

339
Index

location-based routing algorithm with cluster- Steer by wire (SBW) 13


based flooding (LORA-CBF) 121,  125, steer by wire (SBW) systems 13,  17,  21,  22, 
  127,  128,  129,  132,  134,  135 24,  30,  31,  35,  36,  37,  39,  45
location aided routing (LAR) 115,  121
T
M
throttle by wire (TBW) systems
medium access control (MAC) 5,  81,  105,  13,  18,  19,  39
106,  108,  109,  110,  109,  130,  132,  time-period vehicular degree (TPVD) 170
269,  273,  306,  111,  112,  113,  118,  traction control system (TCS) 12,  18,  19
110 traffic flow control 181,  187,  196
merging algorithms 182,  190,  191,  192,  194, traffic light control 276
  195,  196,  191,  194 traffic network simulator (TRANS) 265

N U
neighborcast 139,  151,  152,  157 unlicensed national information infrastructure
nodes, exposed 166,  167 (UNII) 105
nodes, hidden 110
nodes, mobile 109,  121,  122,  127,  130,  V
185,  247 vehicular ad hoc networks (VANETs) 120, 
121,  132,  141,  142,  160,  162,  163, 
P
166,  167,  168,  169,  170,  171,  173, 
particle filter 229 135,  165,  164,  177,  166,  175,  178, 
platooning 22,  143,  145,  159,  160,  144,  179,  180,  181,  182,  185,  196,  262, 
188,  189,  208,  312,  326 263,  264,  265,  266,  267,  268,  269, 
power line communication (PLC) 69,  75,  270,  272,  273,  274,  275,  276,  277, 
76,  77,  78,  79,  81,  82,  83,  85,  87,  278,  280,  281,  282
90 VANET applications 264,  265,  266,  268, 
273,  278
R Vehicle-to-Vehicle (V2V) 1,  9
Radar 185,  197,  201,  309 vehicular ad hoc networks (VANETs) 142, 
random waypoint model (RWP) 164,  165,  170,  173,  175,  177,  182, 
181,  182,  184 184,  185,  197,  198,  205,  206,  247, 
redundancy, analytical 25,  26,  28,  30,  31,  248,  249,  250,  251,  101,  178,  199, 
39,  45 252,  251,  255,  260,  261,  262,  263, 
redundancy, dynamic 27,  28,  29 304,  306,  307,  308,  310,  312,  313, 
redundancy, static 27,  29 316,  317,  318,  319,  322,  323,  324, 
road side units (RSU) 202,  208,  247,  255 326,  327,  328,  329
route planning 116,  140,  142,  265,  275,  277 vehicular degree, static (SVD) 170
vehicular degree, time-period (TVD) 170
S vehicular networks 1,  2,  3,  9,  91,  98,  105, 
109,  100,  110,  111,  112,  115,  116, 
sliding mode observer
118,  141,  248,  249,  263,  266,  274, 
30,  31,  32,  39,  46,  313
275,  281,  288,  290,  292,  296,  301, 
static vehicular degree (SVD)
310,  322,  323
170,  171,  172,  177

340
341

W X
wireless access in the vehicular environment X-by-wire systems 46,  69,  70,  73,  74,  75, 
(WAVE) 2,  5,  11,  103,  104,  105,  84,  86,  87,  325
106,  107,  112,  118,  142,  159,  164,  X-tainment applications 69
310,  314,  328
wireless networks 81,  86,  109,  110,  119,  Y
123,  136,  137,  142,  143,  146,  160,  yaw stability control (YSC)
168,  179,  197,  198,  269,  280,  307,  12,  18,  19,  24,  25
308,  315,  316,  323,  324,  328
wireless technologies 1,  3,  9,  69,  86,  141, 
142

Das könnte Ihnen auch gefallen