Article

Mitigating wifi interference to improve throughput for in-vehicle infotainment networks

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

In recent years, in-vehicle infotainment networks (IVINs) have rapidly become one of the most valuable features auto makers have used to promote their flagship models as an advanced competitive marketing weapon. IVINs can provide passengers with multimedia services locally as well as Internet connectivity through a gateway known as a mobile hotspot. The in-vehicle mobile hotspot is embedded in the car and supports cellular connection. Utilizing this system, mobile devices can access the in-vehicle unified infotainment framework to comfortably enjoy streaming services, online games, online commerce, social network services, and so on. However, because of wireless access characteristics, if a significant number of Wi-Fi mobile hotspots are densely located, the throughput of the mobile devices will be tremendously diminished due to the interference among the mobile hotspots of IVINs, as well as with existing fixed office or residential APs along the road. In this article, we discuss the interference problems of Wi-Fi access in IVINs, provide effective solutions to these problems, and present the performance of each proposed approach within typical case studies.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... It is desirable for the vehicle to process real-time cumulative information using limited computational resources. To support the vehicle, each RSU can pre-process local information and transmit it to all surrounding vehicles [8]. Furthermore, vehicles can utilize services from the fog server and the cloud data center, thereby reducing their computational overhead. ...
... The IoV vehicles communicated with the nearest RSU-Fog node using the IEEE 802.11p and TCP protocols. The IEEE 802.11p module is installed in the RSU to provide wireless connections to IoV users [8]. Hyperledger Fabric platform supports both TCP and UDP protocols. ...
Article
Full-text available
A fog-enabled intelligent transportation system is constructed using Vehicle-to-Everything (V2X) communications towards the Internet of Vehicles (IoV). In this system, the road side unit (RSU) and vehicle correspond to the fog server and fog device, respectively. In practice, the RSU offers instant infotainment services (e.g., video streaming and traffic assistance) to vehicles. However, the vehicles are considered untrustworthy and could possibly be exploited to attack the system, thereby compromising the service stability and data integrity. To address this problem, this paper proposes truthful service allocation using a Vickrey–Clarke–Groves (VCG) auction mechanism. The RSU leads the proposed auction as a seller who sells their computing resources, and the vehicles participate as buyers who purchase these computing resources for the offered services. Consequently, the RSU generates a transaction whenever a service allocation is assigned. To secure the service transactions, we utilize a distributed blockchain system that implements Hyperledger Fabric framework among RSUs for transaction verification. The simulation results demonstrate that the proposed system provides service stability while ensuring service trustfulness.
... W IRELESS networks are progressively replacing cables in a variety of contexts. In application fields like, e.g., home and car entertainment [1], [2], home automation [3], building automation [4], and sensing [5], their adoption to support wire-free communication (and hence, interaction) among humans and machines, in any combination (H2H, M2M, and H2M), is a popular ongoing trend and one of the main enablers of the so-called Internet of Things (IoT) [6]. ...
Article
Full-text available
One of the aspects that mainly characterize wireless networks is their apparent unpredictability. Although several attempts were made in the past years to define for them deterministic medium access techniques, for instance by having data exchanges scheduled by an access point, as a matter of fact they remain a partial solution and are unable to ensure the same behavior as wired infrastructures, since interference may also come from devices outside the network, which obey different rules. A possible way to cope with disturbance on air, both internal and external to the network, is to obtain some knowledge about it by analyzing what happened in the recent past. This information, usually expressed in terms of suitable metrics, is then employed to optimize network operation, for example by prioritizing time-sensitive traffic when needed. In the simplest approaches such metrics coincide with statistical indices evaluated on transmission outcomes, like the failure rate. In this paper we analyze a more sophisticated solution that relies on machine learning, and in particular on artificial neural networks, to predict the behavior of a Wi-Fi link in terms of its frame delivery ratio. Results confirm that more accurate predictions than simpler methods (e.g., moving average) are possible, even when training is partially independent from the specific conditions experienced on the different channels.
... In the process of designing and modifying the SIL, an occasional phenomenon attracted our attention as illustrated in Fig. 1, further leading to a suspecion that irregular pulse discharge generated by the nearby SIL has a profound impact on the stable operation of the radio-frequency (RF) wireless module, that is, a ZigBee-based device. Unfortunately, few studies aimed at resolving this kind of interference in IoT [5], not to mention the security solutions in agriculture IoT [6]. To confirm the above suspicion, we designed two groups of experiments, in which our vital findings demonstrated a severe interference from the discharge of SIL to voltage stability of I/O port of ZigBee-based device [7], thereby forcing the change of strategies on both information collection and transmission in SIL-IoTs [8]. ...
Article
In the Solar Insecticidal Lamps Internet of Things (SIL-IoTs), when migratory insects with phototactic feature are attracted by the Solar Insecticidal Lamp (SIL) and collide with its metal mesh, the mesh releases high voltage pulse discharge. However, direct assessment of the interference from the above-generated strong electromagnetic pulse (EMP) to ZigBee-based device has not been feasible until recently. We make a design of a discharge simulation module and a data communication device, and make a modification of the SIL, both of which point to a need for more integrative approaches aimed to qualitatively explore whether the interference is existing or not during the process of discharge. Here, we present and experimentally demonstrate a key parameter, the number of microprocessors' Falling Edge Trigger (FET), for representing the existence of interference. We also use comprehensive analyses to suggest that the installing distance between SIL and ZigBee-based device is at least 25.0cm.
... hardware design, analysis of behaviour on-road, streaming data, etc. Service relaying over infotainment system is also facilitated by using Wi-Fi protocol, however, it suffers from interference problem and can significantly affect the data to be received in infotainment device. Study towards this direction is carried out by Na et al. [19] has discussed various approaches to control interference problems e.g. channel hoping approach, power control policy, infra-structured based cooperation with adjacent nodes, etc. Authors have presented a simulationbased study with two different case studies to solve interference problems. ...
Article
Full-text available
The automotive industry has been incorporating various technological advancement on top-end versions of the vehicle order to improvise the degree of comfortability as well as enhancing the safer driving system. Infotainment system is one such pivotal system which not only makes the vehicle smart but also offers abundance of information as well as entertainment to the driver and passenger. The capability to offer extensive relay of service through infotainment system is highly dependent on vehicular adhoc network as well as back end support of cloud environment. However, it is know that such legacy system of vehicular adhoc network is also characterized by various problems associated with channel capacity, latency, heterogeneous network processing, and many more. Therefore, this paper offers a comprehensive insight to the research work being carried out towards leveraging the infotainment system in order to obtain the true picture of strength, limitation, and open end problems associated with infotainment system.
... The mobile Internet access from moving vehicles has been increasing steadily. Nowadays, many people enjoy various services from a simple news-feed to high rate video streaming, inside moving vehicles [1]. Cellular network, because of its reliability and wide availability, has become a top priority wireless access system for providing such Internet service in vehicular environment. ...
Article
Full-text available
The vehicular networks exploiting WiFi have a great advantage in cost and capacity in comparison with the networks using cellular systems. However, to use WiFi in the vehicular environments, the problem of frequent handover (HO) due to the small coverage of access points (APs) should be resolved. In this paper, we propose a new HO technique which is effective in heterogeneous (WiFi/cellular) networks on a real road topology. Specifically, we propose a HO scheduling scheme running on a server, which determines the AP to which a user will be handed over, considering the road topology. Since a user only needs to decide when to initiate the connection to the next AP, a very fast and efficient HO in the vehicular environment can be realized. The design objective of the proposed HO scheduling is to maximize the connection time on WiFi while minimizing the total HO latency and reducing the number of users which contend for the channel within an AP. We show this objective is well accomplished with the proposed scheme, by using computer simulation.
... Both control applications are based on CAN networks, investigating the possibilities of fault modeling as non-functional requirements related to transient faults that can degrade performance of these systems. Electrical Fast Transients (EFT) and Electromagnetic Interferences (EMI) are important fault types that has been investigated in recent researches (Roque et al 2017) (Na, Dao & Cho (2016) (Juan et al 2016). ...
Conference Paper
This paper presents an evaluation of requirements specification for two critical real-time control systems, which depends of industrial communications protocols. It is proposed the use of aspect-oriented modeling (AOM) to map transient fault behaviors in design phases, with RT-FRIDA framework extended for fault modeling capabilities. Requirements specification for an Active suspension control system and for a fault detection control system applied in agricultural implements was made as case study. Faults are specified as non-functional requirements and evaluated applying a quantitative softgoal weight method. Results presented indicates aspect-oriented fault modeling as an important ally to specify faults that have potential to degrade performance of real-time control systems.
... It uses ecu's. Woongsoo Na, Nhu-Ngoc Dao, and Sungrae Cho [5] proposed with the LTE network where a Wi-Fi hotspot is created and from the vehicle the information status is sent to the user through the service provider and the use of mobile phones is also possible. ...
Article
Full-text available
This project is a kind of advanced automatic identification technology, and is more and more widely used in the fields of transportation and logistics. It looks over the main functions with like Vehicle management, Vehicle Speed limit and Control. This system starts with authentication process to keep itself secure. Here we connect sensors to the STM32 board which in turn is connected to the car through Ethernet cable, as Ethernet in capable of sending large amounts of data at high speeds. This technology involved clearly shows how a careful combination of software and hardware can produce an extremely cost-effective solution to a problem.
... Since these two services aim at improving interpersonal relationships, location awareness is vitally important to improve user satisfaction [1], [2]. The applications of mobile social networks and proximity services are characterized by their diversity [3], [4], [5], [6] including infotainment, smart environments, transportation assistance, navigation, monitoring of surroundings, local notifications and alarms, etc., wherein lightweight IoT-enabled devices increasingly introduce its crucial positions. Table I shows prime examples of the IoT-assisted services as reported by IEEE 802.15 TG8 in the technical document of PAC applications [7]. ...
Article
Full-text available
The emergence of social networking and proximity services is driving the Internet-of-Things (IoT) paradigms toward a location-aware connecting society. To prepare for such a booming paradigm, IEEE 802.15.8 standardizes peer-aware communication (PAC) within strict consideration of infrastructureless property and fully distributed coordination features. Since no central entity exists in a PAC network (PACNET) for control and management purposes, every PAC device (PD) plays an equal role in terms of communication. This situation leads to a variety of security challenges, especially in authentication and key agreement for lightweight IoT-enabled PDs. Recently, there are some proposals aimed at the aforementioned problems, such as approaches with personal identification number (PIN), physical (PHY) layer features. However, due to its inconvenience and computational complexity for the lightweight IoT-enabled PDs, authentication and key agreement are still open issues in PAC. From this view, this paper proposes a new approach that utilizes social networking features closely tied to the PAC in order to support authentication and key agreement procedures. A number of trusted PDs are delegated to authenticate the requesting PD on behalf of the requested PD when an association is established between them. Intensive analysis and evaluation show that the proposed protocol provides multiple security levels as well as user convenience with reasonable resource consumption.
... For the second part, the possibilities of fault modeling based on non-functional requirements related to Electrical Fast Transients (EFT) faults and Electromagnetic Interferences – EMI were investigated. This investigation is related to a recent work presented in[17]about EFT and recent research works about electromagnetic interference[18][19][20]. According to these recent researches, it is possible to verify how different transient faults can degrade communication process and generate delays. ...
Conference Paper
Full-text available
Faults in industrial communication protocols represent an important problem for industrial systems as they may lead to severe losses. Observing the need for approaches to deal with this type of problem, this paper studies reliability aspects related to industrial communication protocols and the modeling of possible communication faults. The work proposes a requirements specification based on aspect-oriented concepts to map and model common faults in design phases of embedded systems. A model integrating fault modeling in communication protocols extending the Real-Time From Requirements to Design using Aspects (RT-FRIDA) framework is presented. A case study on vehicular networks was conducted considering the non-functional requirements specification of an Active Suspension System. Then, a sequence of fault requirements based in recent studies is modeled and presented to validate the proposed approach. The main contribution of this work is to enable the use of fault modeling in communication protocols and aspect-oriented modeling techniques to mitigate the fault impact in the timing behavior of critical tasks. This study indicates the use of observers' technique modeled to fault diagnosis, so that they can be aggregated into a real-time control system.
Article
Deep learning-based video analytics demands high network bandwidth to ferry the large volume of data when deployed on the cloud. When incorporated at the edge side, only lightweight DNN models are affordable due to computational constraint. In this paper, a cloud-edge collaborative architecture is proposed combining edge-based inference with cloud-assisted continuous learning. Lightweight DNN models are maintained at the edge servers and continuously retrained with a more comprehensive model on the cloud to achieve high video analytics performance while reducing the amount of data transmitted between edge servers and the cloud. The proposed design faces the challenge of constraints of both computation resources at the edge servers and network bandwidth of the edge-cloud links. An accuracy gradient-based resource allocation (AGRA) algorithm is proposed to allocate the limited computation and network resources across different video streams to achieve the maximum overall performance. A prototype system is implemented and experiment results demonstrate the effectiveness of our system with up to 28.6% absolute mAP gain compared with alternative designs.
Article
Intelligent Connected Vehicle (ICV), as the product of the deep integration of automobile, electronics, information, and artificial intelligence in the era of 5G advanced and beyond, has become the pursuit of the automotive industry. To improve ICV security, traditional methods, such as in-vehicle gateway firewall, encryption, and authentication, become the potential choice to protect the communication between vehicles and the outside world. However, traditional methods cannot be directly applied to ICV due to the extremely limited computing and storage resources of intra-vehicle communication and the high real-time requirements of the packets transmitted in the vehicle. Therefore, there is an urgent need for lightweight and real-time solutions for intra-vehicle communication security. In addition, it should be noted that no matter where an attack is launched, the attacker must control the corresponding Electronic Control Unit (ECU) through intra-vehicle communication if he wants to control the ICV's behavior. Therefore, intra-vehicle communications can be regarded as the last line of defense for ICV security. With this in mind, we conduct a comprehensive and new technical investigation about the security issues of the intra-vehicle communications around the pioneering work on the vulnerabilities, attacks, and countermeasures. In addition, we investigate the activities and contributions of standardization organizations and highlight the new challenges for intra-vehicle communication security. Finally, we present some discussions on next-generation intra-vehicle communication technologies and new solutions to protect intra-vehicle communications in the future.
Article
Owing to the heterogeneity and massiveness of data generated by connected vehicles, multitier roadside computing (MRC) plays a key role in an intelligent transportation system (ITS). MRC provides a localized cloudization capability in close proximity to the connected vehicles. Because the massive data correspondingly necessitate a high computing energy consumption, stable workload processing with respect to energy efficiency is a crucial problem of MRC. To address this problem, we propose an energy-efficient workload (E2W) scheduling algorithm for flexibly handling the random offloading traffic from connected vehicles. In our E2W algorithm, an MRC is transformed into a multitier queuing system, where the workload arrived from the vehicles and the computing capability of the roadside units are considered to be arrival and departure processes, respectively. The departure rate that closely impinges on the computing energy consumption is supervised using the Lyapunov drift-plus-penalty policy to achieve efficient energy reduction while maintaining service satisfaction. In addition, the deterministic upper bound of the Lyapunov optimization provides the MRC system with stable operation. Simulation results demonstrate that the E2W algorithm outperforms existing optimization strategies in terms of energy efficiency and system stability.
Article
In vehicular networks, in-vehicle user equipment (UE) with limited battery capacity can achieve opportunistic energy saving by offloading energy-hungry workloads to vehicular edge computing (VEC) nodes via vehicle-to-infrastructure (V2I) links. However, how to determine the optimal portion of workload to be offloaded based on the dynamic states of energy consumption and latency in local computing, data transmission, workload execution and handover, is still an open issue. In this paper, we study the energy-efficient workload offloading problem and propose a low-complexity distributed solution based on consensus alternating direction method of multipliers (ADMM). By incorporating a set of local variables for each UE, the original problem, in which the optimization variables of UEs are coupled together, is transformed into an equivalent general consensus problem with separable objectives and constraints. The consensus problem can be further decomposed into a bunch of subproblems, which are distributed across UEs and solved in parallel simultaneously. Finally, the proposed solution is validated based on a realistic road topology of Beijing, China. Simulation results have demonstrated that significant energy saving gain can be achieved by the proposed algorithm.
Article
This paper presents an evaluation of requirements specification for two critical real-time control systems, which depends of industrial communications protocols. It is proposed the use of aspect-oriented modeling (AOM) to map transient fault behaviors in design phases, with RT-FRIDA framework extended for fault modeling capabilities. Requirements specification for an Active suspension control system and for a fault detection control system applied in agricultural implements was made as case study. Faults are specified as non-functional requirements and evaluated applying a quantitative softgoal weight method. Results presented indicates aspect-oriented fault modeling as an important ally to specify faults that have potential to degrade performance of real-time control systems.
Chapter
In recent years, vehicle communication is an advanced technology that has attain attention in both industries and academician all over the world. The initiation on vehicular communication is to improve road safety, efficiency and comfort. This paper studies the availability of the wireless communication technologies for vehicular communication and the possible implementation of the suitable wireless communication for vehicle communication in the context of Malaysia.
Chapter
Various WLAN parameters have specific significance with regard to their application domain. Parameters that affect WLAN performance in the indoor environments may be different from those that are important in vehicular communication. Performance of WLAN in a particular application mainly depends on the proper evaluation of the associated parameters. The parameters such as the beacon frame interval, Short Inter Frame Space (SIFS), DCF Inter Frame Space (DIFS), Contention Window size, for example, are specific to the general purpose use of WLANs. While these parameters are also important for R2V communications, there are two PHY layer parameters that are important in any kind of wireless communications, namely signal strength and data rate. It is obvious that R2V communications shall be rendered ineffective without the availability of strong signal strength and high data rates.
Article
Vehicular infotainment systems have attracted great interests from both academia and industry. A vehicular infotainment system includes two parts, the information part and the entertainment part, which are integrated together to provide a unified platform to drivers and passengers. Although some excellent works have been done on vehicular infotainment systems, there are still some significant challenges that need to be addressed. Recently, compressed sensing (CS) has emerged as a new technique, which could be used to tackle the challenges in vehicular infotainment systems. In this paper, we present a comprehensive survey and research challenges on the applications of CS in vehicular infotainment systems, including object tracking for driving safety, privacy protection and security, vehicular crowdsensing, vehicular communications, road traffic estimation, video streaming and object recognition. In addition, we compare the traditional methods and CS methods in solving the main problems in vehicular infotainment systems. Moreover, research challenges of applying CS in vehicular infotainment systems are discussed.
Conference Paper
Full-text available
Vehicular networks will play an important role in future smart cities. Connected vehicles will be able to provide entertainment content to their users in order to make traffic situations more enjoyable. However, the amount of bandwidth available to the vehicles may not be enough to satisfy all of them. In this case, we can say that a conflict of interest occurred and then must the solved as fair as possible. In this work, we propose a solution to solve this kind of collective conflict. Our solution balances users' satisfaction with resources consumption as it is capable of choosing the most adequate resolution algorithm based on the current application's situation. The results showed that with our solution it was possible to achieve adequate satisfaction levels, with low response time and controlled network usage.
Article
Full-text available
Recently, wireless sensor networks (WSNs), enabling the connection between the physical world and the digital world, have become an important component of the Internet of Things (IoT). Several applications in the IoT require the efficient and timely collection of larger amounts of data. Due to the interference and contention over the wireless medium, the limited bandwidth of the radios, the limited resources of the battery-operated sensor nodes, this requirement becomes a challenging task. In this research, we exploit the multi-channel operation capability of the radios to provide the higher network throughput and propose an efficient scheduling algorithm to eliminate collision, idle-listening or over-hearing, which are consequences of non-coordinated transmissions. Our work focuses on scheduling the regular traffic that is periodically transmitted and on adapting the schedule to the additional traffic that can be requested at some point in time. To deploy the schedule-based multi-channel protocol on real applications, we design the complete communication procedure that is necessary for sensor nodes to communicate among them to form a network and to propagate the sensed data to the collection point. We also propose a low-overhead time synchronization scheme that is critical for a schedule-based protocol. The results of extensive simulation experiments show that the proposed scheduling algorithm can achieve collision-free parallel transmissions over different channels to provide high throughput and high delivery ratio while meeting the crucial energy efficiency requirements. Finally, we demonstrate the feasibility of the protocol and the time synchronization scheme on a laboratory-scaled test-bed of real motes.
Conference Paper
Full-text available
This paper presents a solution to resolve the interference problems between the Wi-FiTM and BluetoothTM wireless technologies. A new channel selecting approach is being used to select the frequency channel. The signal strength in a channel is assessed, and that value is used to select the channels to send data without interference. Thus we are trying to establish true "Coexistence without Compromise" between BluetoothTM and Wi-Fi TM.
Article
Full-text available
Intervehicle communication (IVC) is emerging in research prominence for the interest that it is generating in all major car manufacturers and for the benefits that its inception will produce. The specific features of IVC will allow the deployment of a wide set of possible applications, which span from road safety to entertainment. Even if, on the one hand, these applications share the common need for fast multihop message propagation, on the other hand, they possess distinct characteristics in terms of generated network traffic. The state of the art of current research only proposes solutions specifically designed for a single application (or class) that is not directly extendable to a general IVC context. Instead, we claim that a privileged architecture exists, which is able to support the whole spectrum of application classes. To this aim, we propose a novel IVC architecture that adapts its functionalities to efficiently serve applications by quickly propagating their messages over a vehicular network. We conducted an extensive set of experiments that demonstrate the efficacy of our approach. As representative case studies, we considered two application classes that, for their network traffic characteristics, are at the opposite boundaries of the application spectrum: safety and entertainment.
Article
Full-text available
Wireless mesh networks (WMN) typically employ mesh routers that are equipped with multiple radio interfaces to improve network capacity. The key aspect is to cleverly assign different channels (i.e., frequency bands) to each radio interface to form a WMN with minimum interference. The channel assignment must obey the constraints that the number of different channels assigned to a mesh router is at most the number of interfaces on the router, and the resultant mesh network is connected. This problem is known to be NP-hard. In this paper we propose a hybrid, interference and traffic aware channel assignment (ITACA) scheme that achieves good multi-hop path performance between every node and the designated gateway nodes in a multi-radio WMN network. ITACA addresses the scalability issue by routing traffic over low-interference, high-capacity links and by assigning operating channels in such a way to reduce both intra-flow and inter-flow interference. The proposed solution has been evaluated by means of both simulations and by implementing it over a real-world WMN testbed. Results demonstrate the validity of the proposed approach with performance increase as high as 111%.
Article
Wireless Sensor Networks (WSNs) have been developed for collecting and monitoring environmental data over the years. Recently, based on the idea of WSN, researchers have begun to monitor the human or animal body by placing sensor nodes on the skin or inside the body. The wearable relay nodes then collect biosignals from the sensor nodes and send the collected data to a sink node for data storage. However, the coverage is a typical problem in WSNs, which may not only generate interference but also affect system reliability. While dealing with very important bioinformation, supposing the system reliability is decreased due to high delay or packet loss, important bioinformation might be lost and could be life-threatening when, for example, a patient's heart stops beating but medical personnel are not warned. Therefore, this paper proposes a non-zero-sum cooperative game model to control the transmission power of the system for reducing the interference level between simultaneous transmissions and solving contention between different messages. © 2014 Springer International Publishing Switzerland. All rights reserved.
Conference Paper
The performance of wireless sensor networks (WSN) is prone to adverse influences from a number of factors such as the interference from co-located wireless systems utilising the same spectral space. Channel hopping technique was proposed to mitigate the problem via periodic change of the operating frequency, and has been adopted in the form of time slotted channel hopping (TSCH) by IEEE 802.15.4e standard. This paper proposes adaptive slotted channel hopping (A-TSCH), an enhanced version of the TSCH aided by blacklisting technique. Complete design and implementation specifics are provided; and the results of experiments are analysed to show its advantages over existing TSCH. The main finding of this work is that A-TSCH can significantly improve the reliability of channel hopping scheme and thus provide better protection from interference for wireless sensor networks.
Article
Entertainment systems can transform a tedious trip to an enjoyable experience. In this article, we present a new business model and a complete architecture for vehicular entertainment networks that allow users to transfer applications from their mobile terminals to infrastructure elements, such as seat screens, while maintaining control from their terminals. Our approach is compatible with highly successful business models such as application markets, where users download content and services to their devices for future use. This simplifies the process of managing, providing, and updating content services, resulting in reduced maintenance costs and placing the responsibility of content updates and licensing costs on the users. It also reduces infrastructure hardware costs because the use of mobile terminals such as cell phones as control devices eliminates the need for mechanical joysticks or touchscreens in the infrastructures.
Article
The recent strides made in vehicular networks have enabled a new class of in-car entertainment systems and enhanced the ability of emergency responders using opportunistic spectrum usage enabled by cognitive radio (CR) technology. These CR-enabled vehicles (CRVs) have the ability to use additional spectrum opportunities outside the IEEE 802.11p-specified standard 5.9-GHz band. The aim of this article is to provide a taxonomy of the existing literature on this fast-emerging application area of CRV networks, highlight the key research that has already been undertaken, and point toward the open problems. We explore different architectures [i.e., completely decentralized as well as base station (BS) supported], the sensing schemes suited for highly mobile scenarios with emphasis on cooperation, and spectrum access methods that assure the availability of the required quality of service (QoS). Moreover, we describe the design of a new simulator tool that is able to merge information from real-world street maps with licensed user activity patterns, thereby resulting in a powerful platform for testing and analysis of protocols for CRVs. Finally, the article lists several open research challenges aimed at drawing the attention of the reader toward the important issues that need to be addressed to realize the vision of completely autonomous CRVs.
Conference Paper
In Vehicle-to-Vehicle (V2V) communication networks, vehicles will broadcast their safety-critical information, such as speed, position and direction, to alert nearby vehicles of possible collisions. The use of a standard public key certificate to secure the broadcast of the safety-critical information will allow unauthorized entities to identify and trace movements and locations a driver visits using the driver's unique public key in the certificate. In this paper, we propose a self-certified public key implicit certificate scheme for use in V2V communication networks to preserve the anonymity of drivers. In our proposed scheme, recipients of a broadcasted message in V2V communication networks can authenticate and validate the integrity of the message without identifying the transmitter. In case of a dispute and malicious activities, the identity of the vehicle which broadcasted the disputed message can be revealed only by a trusted authority. Using an elliptic-curve key-length of 256 bits, we show that our proposed scheme adds 238 bytes to the vehicle's safety-critical information in the broadcasted message.
Conference Paper
Cognitive radio networks (CRNs) have emerged as advanced and promising paradigm to exploit the existing wireless spectrum opportunistically. It is crucial for users in CRNs to search for neighbors via rendezvous process and thereby establish the communication links to exchange the information necessary for spectrum management and channel contention etc. This paper focuses on the design of algorithms for blind rendezvous, i.e., rendezvous without using any central controller and common control channel (CCC). We propose a jump-stay based channel-hopping (CH) algorithm for blind rendezvous. The basic idea is to generate CH sequence in rounds and each round consists of a jump-pattern and a stay-pattern. Users "jump" on available channels in the jump-pattern while "stay" on a specific channel in the stay-pattern. Compared with the existing CH algorithms, our algorithm achieves the following advances: i) guaranteed rendezvous without the need of time- synchronization; ii) applicability to rendezvous of multi-user and multi-hop scenarios. We derive the maximum time-to- rendezvous (TTR) and the upper-bound of expected TTR of our algorithm for both 2-user and multi-user scenarios (shown in Table I). Extensive simulations are further conducted to evaluate performance of our algorithm.
Conference Paper
A fast warning response to an impending crash based on vision/GPS sensing together with V2V communication has been realized to achieve line marking recognition, neighboring vehicles detection, and headway estimation, where a distributed embedded dual-platform DaVinci+XScale-NAV270 was built to improve system effectiveness as well as a data fusion QT-BPNN/ANFIS was applied to dissolving the heterogeneous data. GPS information for each car was exchanged and disseminated each other via dedicated short range communication (DSRC). It performs at the least response time 0.5972 seconds and gets reduced accident rate about 70~82%, superior to two alternative collision warning systems.
How Connected Cars Have Established A New Ecosystem Powered By loT
  • mohammed