Sie sind auf Seite 1von 61

Inter Vehicle

Communication

Akhil Parekh
Manan Shah

Outlook
Introduction
Motivation
Overview of Smart Vehicle
Architecture
Types of Communication
Radio Bands
Protocols
Classes of Information and Information Parameters
Types of IVC
Threats, Challenges and Attacks
Security Architecture
Applications
Real Time Examples
Conclusions

Introduction
What is Inter Vehicle Communication?
Communication among drivers and vehicles in Intelligent
Transportation Systems (ITS)
Communication conducted between onboard information
equipment
IVC enables the service of exchange and distribution of data

Motivation
Study shows - About 60% roadway collisions could be avoided if the
operator of the vehicle was provided warning at least one-half second
prior to a collision
(- US. Patent No. 5,613,039)
Approximately 40,000 people are killed each year on the European
Unions roads, with around 1.7 million people incurring critical injuries.
The annual costs associated with traffic accidents total nearly 3 percent
of the worlds gross domestic product (GDP), or roughly US$1 trillion.
Number of vehicles is increasing faster than the number of
roads, leading to frequent traffic jams.
Constraints of human drivers perception

Line-of-sight limitation of brake light


Large processing/forwarding delay for emergency events.

Statistics
Cars

Trucks
(class 7, 8)

On-road population

231 million

3.5 million

Annual New Vehicle Sales

16 million

260, 000

Annual VMT

8,400

63,000

Total Fatalities

37,446

4,390

Total Injuries

2,672,000

116,000

Estimated Total cost of


crashes

$188 billion

$30 billion

Overview of Smart Vehicle


E v e n t d a ta rec o rd er (E D R )
F orw ard rad ar

P o sitio n in g sy s te m
C o m m u n ic a tio n
fa c ility

R ear radar
D is p la y

C o m p u tin g p la tfo r m

Terms
EDR

used in vehicles to register all important parameters such as velocity,


acceleration, etc. especially during abnormal situations, such as
accidents
This data is used for reconstruction.

Forward radar-

Used to detect any forward obstacles as far as 200 meters

Positioning System-

Used to locate vehicles


Accuracy can be improved by knowledge of road topology

Computing platform-

Inputs from various components is used to generate useful information

Pictorial View

Flowchart of IVC

Architecture

Key Components
On-board Equipment (OBE):

human machine interface


vehicle interfaces, (to on-board networks)
Applications, memory and processing
positioning, (GPS and dead-reckoning system)
communications functions (radio, antenna, etc)

Roadside Equipment (RSE):


access nodes positioned along highways, at traffic intersections and

other locations
includes a DSRC radio, GPS, processor, and router to send messages
back through the IVC Network

Network:
The IVC Network interconnects the road-side RSEs, network services,
and the network end-users

General View

The Vehicle
as a part of
the Network
Vehicle to Infrastructure to Vehicle Communication

Center for Information Processing


Vehicle to Vehicle Communication

Types of Communication
Vehicle to Vehicle Communication
It demonstrates properties of both peer-to-peer network and mobile adhoc network.
In Peer-to-peer systems participants rely on another for service rather
than solely relying on a dedicated and centralized infrastructure
A mobile ad hoc network is a collection of mobile hosts with wireless
communication capabilities forming temporary network.

Vehicle to Infrastructure Communication


Information is available from roadside sources
uses 63 GHz band
Ex- Electronic Toll Collection (ETC)
allows for electronic payment of highway tolls
communication is traditionally via microwave or infrared techniques,
more recently through GPS technology
an electronic monetary transaction occurs between a vehicle passing
through a toll station and the toll agency

Radio Bands
Communicating vehicles can use both infrared and radio waves
Radio waves include VHF, micro, and millimeter waves
Bluetooth operates at 2.4 GHz , and is reliable up to a speed of 80 km/h and
range of 80meters.

It can take up to 3 seconds to establish the communication.


requires a master and slave setup
alternative to Bluetooth is a new radio frequency technique called UWB
main advantages of UWB technology are its high data rate, low cost, etc.

Technologies
Broadcasting Technologies:
I2V: RDS/TMC, DAB, DVB, DVB-H, S-DMB, T-DMB

Short Range:
I2V: DSRC
V2V: DSRC, UWB/SRR

Long Range:
V2I/I2V: GSM, GPRS/EDGE, UMTS, Wi-Fi, WiMAX
V2V: GSM, GPRS/EDGE, UMTS, Wi-Fi

In-Vehicle Systems:
Bluetooth, Zigbee

Protocols
Medium Access Control (MAC) in IVC
An ad-hoc network between vehicles is better suited for vehicle
communications than centralized service.

Centralized architecture is not very efficient


Wireless connectivity between moving vehicles can be provided by
existing 802.11 compliant devices.

Data rates of up to 54 Mbps can be achieved with 802.11a hardware.


Robust MAC scheme is needed so that channel is shared efficiently
between mobile nodes.

Types- DMAC and ASDM

Protocols (Contd)
Directional MAC

Ad-hoc network uses Omni-directional antennas (less


spatial coverage)
Directional antennas can be used to improve network
performance by improving spatial reuse of channel
DMAC uses physical layers directional transmission
capabilities
It tells the neighbors to delay their transmissions if it is
going to harm
pending transmission
Helps to avoid hidden terminal and deafness problems
RTS is send in circular way when node is ready to transmit

Circular RTS consist of RTS-CTS-DATA-ACK

Adaptive Space Division Multiplexing


Security and scalability are the major issues in wireless
communication

Need of protocol to scale well as the available bandwidth shrinks


ASDM breaks the roadway up into cells and contains a mapping
function that maps the cell to time slots

Assignment rule - determines a time slot for each vehicle


ASDM ensures QoS by maintaining adequate distance between
vehicles

Vehicle keeps its frequency of transmission constant by maintaining


a certain following distance.

Data Packet Format

Network ID: To filter a packet from other network


Destination: Destination ID
Source: Source ID
Type/Seq: Type of packet/Number of sequence
Size: Size of the whole packet
Data: Actual data to transfer
CRC: 16-bit CRC to check the validity of the packet

Active Collision Warning /Avoidance System


By continuing with the passive safety technologies, it will be difficult
to reduce crash costs

Thus people have started developing active safety features in order


to reduce costs

The introduction of automotive collision warning/ avoidance systems


represents the next significant leap in vehicle safety technology

Automotive collision warning systems try to warn drivers of an

impending collision event. Allowing driver little bit extra time to react

If the collision warning systems are built in conjunction with drive by


wire technology, then the system could try to automatically
maneuver the vehicle in order to avoid an impending collision

Contd
An Object Vehicle and its Restricted Boundary Around a Subject
Vehicle

Parameter to Detect an Impending Collision

Vehicles Parameter
There are two types of parameters: Static and Dynamic

Static Parameters:
The static parameter indicates the size of the vehicle and the
location of its GPS receiver within itself.

Dynamic Parameters:
The dynamic parameters are vehicles position (Xn,Yn), speed
acceleration, direction and the status of the brakes, steering
wheel, gas paddle, turn signal etc.

Contd.
The static parameters are to be exchanged only once, when
two vehicles first form a network

But, the dynamic parameters are to be continuously


exchanged after certain interval of time

The successful operation of a Collision Warning/Avoidance

system depends on how accurately the vehicles parameters


can be measured

All parameters, except the vehicles position and direction can


be measured with a very high accuracy

Classes of Information
Movement Related speed, velocity, acceleration, etc

Traffic Related number of vehicles, traffic volume, density,


congestion

Passenger Related weather related information,

Movement Related Wireless Technology

Technologies Used:Magnetic Nails


Magnetic Tape
Live wires
Radar for imaging
Car to car communication
Infrastructure to car communication

Traffic Related Wireless Technology

Infrastructure Based: Adjusting traffic flow


Operation on individual vehicle

Vehicle Based: Automated Collection


Providing Warnings

Passenger Related Wireless Technology

Providing Information to passengers


Weather
Traffic
General News

Interaction with passengers


Web access
Routing, food/hotel/fuel inquiries
Access to special services.

Types of IVC

Stop And Go Adaptive Cruise Control

Taking over automatic braking and driving when vehicles are in traffic jam

Co-operative Driving

Co-operative driving exchanges respective data such as position velocity etc

Hazard Warning

includes obstacle warning, stopped vehicle warning and slowing down warning

Merging and Lane Changing Warning

Safe and smooth lane change and merging with communication

Inter/Intra Platoon Communication

Ad-hoc communication between vehicles

Mobile Ad-hoc Network


MANET is an autonomous system composed of mobile
nodes which communicates with each other in wireless
environment where there is no infrastructure support

Every mobile node is self organized and relies on the other


nodes to forward information

IVC networks are regarded as new type of MANET


systems

One of the key characteristics is the mobility of mobile


node which produces dynamic topology than wired
networks

Challenges in IVC
Liability Vs Privacy:- Accountability and liability of the vehicles is
required and context specific information such as coordinates, time
intervals should be possible to extract but such requirements raise
privacy concerns

Real Time Communication:- Driver assistance applications are time


sensitive therefore security protocols should impose low processing
overhead

Vehicular Network Scale:- With roughly billion vehicles,


the design of a facility that provides cryptographic keys is big
challenge

Vulnerabilities in IVC

In Transit Traffic Tempering:- Nodes acting as a relay can disrupt


communication of other nodes

Impersonation:- An attacker masquerading an emergency vehicle to


mislead other vehicles

Jamming:- The Jammer deliberately generates interfering


transmissions that prevents communication

Forgery:- Fast contamination of large portions of the


vehicular network coverage area with false information

Privacy:-With Vehicular networks deployed, the collection


of vehicle specific information from overhead
vehicular communications will become particularly easy

Attacks on IVC
Attack 1: Bogus Traffic Information
Traffic
jam
ahead

Attack 2:Disruption of Network Operation

SLOW
DOWN

The way
is clear

Attack 3: Cheating with Identity, Position or Speed


I was not
there!

Open Problems
Data Verification:- can be achieved by data correlation
mechanism but such mechanisms are in design stage

Secure Routing:- In vehicular networking messages


need to be delivered to specific areas for example:- in
the case of traffic jam queue, this can be achieved by
position based routing protocols but none of the solution
is secure

DoS Resillience:- DoS and jamming problems can not


be completely solve by frequency hopping

Public Key Infrastructure

Security services
Positioning
Confidentiality
Privacy
...

Shared session key


PKI

CA

PA

PB

Security Architecture of IVC

Components of Security Architecture


Event Data Recorder:- The EDR will be responsible for recording the vehicles critical
data such as position, time, speed etc. EDR will also record
all the received safety messages

Tamper Proof Device:- The TPD will store all the cryptographic materials and perform
cryptographic operations like signing and verifying safety
messages

Vehicular Public Key Infrastructure:- In VPKI infrastructure Certificate Authorities will


issue certified public/private key pairs to vehicles

Authentication:- Vehicles will sign each message with their private key and attach
corresponding certificate. Thus when another vehicle receives the
message it verifies key used to sign the message and then it
verifies the message.

Privacy:- To conceal vehicles identity , set of anonymous keys that changes


frequently can be used. This keys are preloaded into vehicles Tamper Proof
Device for long duration

Application of IVC
Information and Warning Functions:Dissemination of road information to vehicles distant from the subjected site

Communication based longitudinal control:Exploiting the look through capacity to avoid accidents, platooning vehicles
etc.

Co-operative Assistant Systems:Coordinating vehicles at critical points

Added Value Applications:Internet Access, Location based services, Multiplayer games

Differences Between Different Standards

Real Time Applications


FleetNet:- The Internet on the road project was set up by
six companies and three universities in order to promote
the development of inter vehicular communication

CarTALK:- Focused on developing new driver assistance systems


which are based on inter vehicle communication for safe
and comfortable driving

Network On Wheels (NOW):- The main objectives of NOW are to


solve technical key questions on the communication
protocols and data security for car to car communication

Advance Driver Assistant System In Europe (ADASE):- ADASE


project has a mission to increase the road and traffic safety in
Europe by avoiding collisions before they occur

FleetNet
Objectives

To develop a communication platform for inter vehicle communication


To implement demonstrator applications
To develop promising introduction strategies
Standardize the solution found

Key Features

Wireless multi hop ad hoc networking


Allows for low cost data transmission
Very low data transmission delay
Extends the range of awareness
Vehicles are addressed according to their
position

FleetNet Applications
Co-operative Driver Assistance: Emergency Notification
Overtaking Assistance
Obstacle Warning

Decentralized floating car data: Traffic jam monitor


Dynamic Navigation

User Communications:

Inter vehicle chat


Mobile advertising

Standardization
Is necessary so that vehicles from different car manufacturers can
communicate with each other

NEC which is Japanese technology company is the member of


C2CC consortium and is working in close collaboration with BMW,
Daimler Chrysler

Objective open industrial standard for internet vehicle


communication with wireless components to ensure interoperability

First product to be expected between 2009 to 2012

Conclusion

Design of communication protocols in IVC is extremely challenging


Protocols have potential to support many new innovative
applications

These technologies can greatly enhance the infotainment, safety,


comfort, communication and convenience value of new vehicles.

As vehicles become smarter, security and privacy gain importance

Questions
What are two types of communication in IVC?

Vehicle to Vehicle Communication


It demonstrates properties of both peer-to-peer network and mobile ad-hoc
network.
In Peer-to-peer systems participants rely on another for service rather than solely
relying on a dedicated and centralized infrastructure
A mobile ad hoc network is a collection of mobile hosts with wireless
communication capabilities forming temporary network.

Vehicle to Infrastructure Communication

Information is available from roadside sources


uses 63 GHz band
Ex- Electronic Toll Collection (ETC)
allows for electronic payment of highway tolls
communication is traditionally via microwave or infrared techniques, more
recently through GPS technology
an electronic monetary transaction occurs between a vehicle passing through a
toll station and the toll agency

What are the challenges in IVC?


Liability Vs Privacy:- Accountability and liability of the

vehicles is required and context specific information such


as coordinates, time intervals should be possible to
extract but such requirements raise privacy concerns

Real Time Communication:- Driver assistance

applications are time sensitive therefore security


protocols should impose low processing overhead

Vehicular Network Scale:- With roughly billion vehicles,


the design of a facility that provides cryptographic keys is
big challenge

What are the main Components in Security Architecture


of IVC?

Event Data Recorder:- The EDR will be responsible for


recording the vehicles critical data such as position,
time, speed etc. EDR will also record all the received
safety messages

Tamper Proof Device:- The TPD will store all the

cryptographic materials and perform cryptographic


operations like signing and verifying safety messages

Vehicular Public Key Infrastructure:- In VPKI

infrastructure Certificate Authorities will


issue certified public/private key pairs to
vehicles

References
http://www.cs.wustl.edu/~jain/cse574-06/ftp/vehicular_wireless/index
.html

http://www.comms.scitech.susx.ac.uk/research/bluetooth.php
http://www.et2.tu-harburg.de/fleetnet/english/documents.html
http://www.de.nec.de/textpage.php/id/1304
http://icwww.epfl.ch/publications/documents/IC_TECH_REPORT_20
0424.pdf

www.//ivc.epfl.theocracymanan/page2959.html

References
http://ec.europa.eu/transport/roadsafety/road_safety_observatory/c
are_en.htm

http://ieeexplore.ieee.org/iel5/8061/22289/01041242.pdf?tp=&ar
number=1041242&isnumber=22289

http://www.cartalk2000.net/
http://www.adase2.net/
http://www.comcar.de/
http://ivc.epfl.ch/page2959.html

Das könnte Ihnen auch gefallen