Figure 1 - available via license: Creative Commons Attribution 4.0 International
Content may be subject to copyright.
Anticipated cooperative collision avoidance (ACCA) service architecture with two connected vehicle original equipment manufacturers (OEMs). Vehicle OEM A communicates over the UDP/IP and HTTP protocols, and vehicle OEM B communicates over the TCP/IP with MQTT protocol.
Source publication
Vehicle-to-everything (V2X) communications enable real-time information exchange between vehicles and infrastructure, which extends the perception range of vehicles beyond the limits of on-board sensors and, thus, facilitating the realisation of cooperative, connected, and automated mobility (CCAM) services that will improve road safety and traffic...
Contexts in source publication
Context 1
... is important noting that this work focuses on the ACCA service architecture designed and implemented in the context of the 5GCroCo project [14]. Figure 1 shows the high-level architecture of the ACCA service, illustrating the communication interfaces between vehicles and the applications that are deployed outside of the vehicles. For the sake of brevity, we shall refer these applications as backend services hereafter. ...
Context 2
... achieve the low-latency benefits, the backend services are deployed close to end-users, i.e., at the edge clouds configured on the MEC infrastructure. Moreover, for the sake of simplicity, two edge cloud instances are depicted in Figure 1, where each edge cloud instance is operated by a different mobile network operator (MNO), e.g., MNO1 and MNO2, and these two edge cloud instances are connected to a centralised cloud deployment. There are two types of vehicles, i.e., OEM A and OEM B, which indicate two different automakers. ...
Context 3
... are two types of vehicles, i.e., OEM A and OEM B, which indicate two different automakers. A vehicle can communicate with the backend service at the edge cloud through an MNO using the preferred V2X communication protocol, i.e., either UDP/HTTP for vehicle OEM A or MQTT for vehicle OEM B, as can be seen in Figure 1. It is obvious that the use of MQTT for V2X communication is a natural choice when the backend services are also based on MQTT. ...
Context 4
... client may subscribe to topics specifying part of such path as well as using wildcards. In the ACCA service architecture that is depicted in Figure 1, the messages exchanged between different clients are belonging to either inQueue topic or outQueue topic roots. The inQueue topics (e.g., inQueue/v2x/denm/source_id/roi) are used to publish messages from OBUs towards the Edge Geoservers, and from the Edge Geoservers towards the TMS. ...
Context 5
... have considered three different test cases to validate the functionalities and V2X communication interfaces of the OBU. For each test case, we have used a different combination of V2X communication protocols between the OBUs connected with one edge cloud, which consists of an Edge Geoserver and an Edge MQTT broker, as depicted in Figure 1. The schematic representation of the test cases is shown in Figure 7 and the operation of the OBUs in each test case is described below. ...
Context 6
... have measured the application-level latency in two different scenarios based on the ACCA service architecture that is presented in Figure 1. In the first scenario, a road hazard is detected by one vehicle, and its OBU transmits a DENM message to the edge cloud application. ...
Context 7
... the first campaign, OBU 1 and OBU 2 were connected to the same edge cloud and the V2X information exchange between both OBUs did not traverse through the TMS. In the second campaign, the OBUs were connected to two different edge clouds, with OBU 1 and OBU 2 being connected to edge cloud 1 and 2, respectively, establishing the communication between both edge clouds through the TMS, as shown in Figure 1. ...
Similar publications
Cooperative intelligent transport systems (C-ITS) are expected to considerably influence road safety, traffic efficiency and comfort. Nevertheless, their market penetration is still limited, on the one hand due to the high costs of installation and maintenance of the infrastructures and, on the other hand, due to the price of support automated driv...
Citations
... This has been reflected in many studies on the acquisition rate of expressway road instruction [41,46]. While connected autonomous vehicles are frequently equipped with on-board units (OBUs) that can be integrated into any car or used as a vehicle simulator in the absence of actual traffic, allowing real-time information exchange between the vehicle and the infrastructure [47] and ensuring full access to road indication. Therefore, in the subsequent work, we assumed that CAVs can obtain all road information indicated by variable message signs (VMSs). ...
With the development of vehicle-road network technologies, the future traffic flow will appear in the form of hybrid network traffic flow for a long time. Due to the change in traffic characteristics, the current hard shoulder running strategy based on traditional traffic characteristics cannot effectively serve the hybrid network traffic flow scenario, and will even lead to the further deterioration of traffic congestion. In order to propose a hard shoulder running strategy suitable for a hybrid network environment, a traffic breakdown prediction method based on a hidden Markov model was established. Secondly, the characteristics of traffic breakdown in a hybrid network environment were analyzed. Finally, based on the traffic breakdown characteristics in a hybrid network environment, a dynamic hard shoulder running method based on the hidden Markov model was proposed. The effectiveness of HMMD-HSR was verified by simulation and comparison with HMM-HSR, LMD-HSR, and N-HSR. The simulation results show that the HMMD-HSR proposed in this paper can improve operation efficiency and reduce travel time in a congested expressway.
... Security in multi-vendor environments: ITS often incorporates components and technologies from multiple vendors, leading to heterogeneous environments [242]- [245]. Research is needed to address security challenges in multivendor environments, including secure integration, patch management, and coordination between different security solutions. ...
Intelligent Transport Systems (ITS) have revolutionized transportation by integrating advanced technologies to enhance efficiency, safety, and convenience. However, the widespread adoption of ITS also raises significant concerns regarding security and privacy. This paper explores the key security and privacy issues in ITS and highlights their potential impact on individuals, organizations, and the overall transportation ecosystem. It is noted that security vulnerabilities in ITS can have severe consequences, ranging from the compromise of personal data to the disruption of critical transportation infrastructure. Cyber-attacks targeting ITS systems can lead to unauthorized access, manipulation of traffic data, vehicle hijacking, and even accidents. Such attacks may be motivated by various factors, including financial gain, sabotage, or simply malicious intent. Consequently, ensuring the security of ITS systems is crucial to prevent potential harm and maintain public trust. Moreover, privacy concerns arise due to the extensive collection, storage, and analysis of data within ITS. The interconnectedness of various components, including vehicles, infrastructure, and mobile applications, generates vast amounts of sensitive information. This includes location data, personal identifiers, travel patterns, and behavioral profiles, which, if mishandled, can result in privacy breaches and misuse. Protecting the privacy of individuals while harnessing the benefits of ITS poses a complex challenge that requires robust privacy frameworks and data protection mechanisms. It was noted that addressing security and privacy issues in ITS demands a multi-faceted approach. It involves implementing secure communication protocols, developing resilient architectures, conducting rigorous security assessments, and establishing proactive incident response mechanisms. Additionally, privacy-enhancing technologies such as data anonymization, encryption, and access controls must be integrated into ITS systems to safeguard personal information and minimize privacy risks. Furthermore, collaboration between stakeholders, including government bodies, transportation authorities, technology providers, and end-users, is essential to foster a comprehensive security and privacy framework for ITS. Regulatory frameworks and industry standards should be established to ensure compliance, encourage best practices, and promote transparency in data handling practices. Educational initiatives and awareness campaigns can also empower users to make informed decisions and understand the potential risks associated with ITS.
... As these messages can be sent either by vehicles or road infrastructure, we refer to the parties of this communication as C-ITS stations. In practice, On-Board Unit (OBU), a particular device manufactured for communication purposes, carries out this communication [39]. Several commercial producers manufacture and sell OBU devices, which often are based on ARM architecture [6,11,15]. ...
In this work, we integrated three quantum-safe digital signature algorithms, CRYSTALS-Dilithium, FALCON and Rainbow, into notification messages used in intelligent transport systems. We evaluated the performance of the algorithms by measuring the time required to sign and verify messages, as well as the size of the signed messages, and compared the quantum-safe options to the elliptic curves currently accepted by the standards. Our results show that quantum-safe digital signature algorithms could be used for signing notification messages in intelligent transport systems, with only moderate changes to performance. The results also provide an evaluation of three quantum-safe digital signature algorithms’ suitability for this purpose, thus helping to choose suitable algorithms when migrating intelligent transport systems towards quantum resistance.KeywordsPost-quantum cryptographyDigital signatureIntelligent transport systems
The notion of pseudonym certificates is used for anonymity and privacy of vehicles in Cooperative Intelligent Transport Systems. Due to attacks where an adversary can link a certain vehicle to a geographical bounded area or usage of services, there is a need to protect the vehicle’s real identity, but at the same time being able to prove its existence at a later stage due to auditing. We propose a pseudonym swapping protocol aligned with a new security architecture where signature keys are stored in both a typical secure hardware module and in a secure accumulator that provides proof for key validity. We propose minor adjustments to the current ETSI standard to include such secure setup and provide a comparative proof of concept implementation between two variants of secure accumulators.KeywordsCryptographic AccumulatorPseudonym SwappingC-ITSPrivacy
div class="section abstract"> With the proliferation of ADAS and autonomous systems, the quality and quantity of the data to be used by vehicles has become crucial. In-vehicle sensors are evolving, but their usability is limited to their field of view and detection distance. V2X communication systems solve these issues by creating a cooperative perception domain amongst road users and the infrastructure by communicating accurate, real-time information.
In this paper, we propose a novel Consolidated Object Data Service (CODS) for multi-Radio Access Technology (RAT) V2X communication. This service collects information using BSM packets from the vehicular network and perception information from infrastructure-based sensors. The service then fuses the collected data, offering the communication participants with a consolidated, deduplicated, and accurate object database. Since fusing the objects is resource intensive, this service can save in-vehicle computation costs. The combination of diverse input sources improves the object detection accuracy, which can benefit the vehicle's ADAS or autonomous driving functions.
A testbed was developed to evaluate the performance of the system under three network architectures – local RSU, Edge and the Cloud. The CODS resided in virtual machines in the corresponding three locations. The OBUs and RSU used had multi-RAT (C-V2X PC5 and 5G Uu) connectivity. A connected thermal camera was used as the infrastructure sensor in our setup.
The paper presents the performance evaluation of various CODS realizations, deployment details of the testbed on a live network and introduces our promising experimental results, explaining the trade-offs of the different deployment schemes and their effects on system fidelity and communication characteristics.
</div