top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
VANET : proceedings of the Second ACM International Workshop on Vehicular Ad Hoc Networks, held in conjunction with MobiCom 2005, September 2, 2005, Cologne, Germany
VANET : proceedings of the Second ACM International Workshop on Vehicular Ad Hoc Networks, held in conjunction with MobiCom 2005, September 2, 2005, Cologne, Germany
Pubbl/distr/stampa [Place of publication not identified], : ACM Press, 2005
Descrizione fisica 1 online resource (106 p.;)
Disciplina 004.165
Collana ACM Conferences
Soggetto topico Mobile computing
Vehicular ad hoc networks (Computer networks)
Wireless communication systems
Engineering & Applied Sciences
Computer Science
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti VANET '05
Record Nr. UNINA-9910375924003321
[Place of publication not identified], : ACM Press, 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Vehicle-to-vehicle communications : readiness of V2V technology for application
Vehicle-to-vehicle communications : readiness of V2V technology for application
Pubbl/distr/stampa [Washington, DC] : , : U.S. Department of Transportation, National Highway Traffic Safety Administration, , [2014]
Descrizione fisica 1 online resource (xx, 304 pages) : illustrations
Soggetto topico Automobiles - United States - Safety measures
Automobiles - Technological innovations - United States
Vehicular ad hoc networks (Computer networks)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Vehicle-to-vehicle communications
Record Nr. UNINA-9910702544203321
[Washington, DC] : , : U.S. Department of Transportation, National Highway Traffic Safety Administration, , [2014]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Vehicle-to-vehicle communications and connected roadways of the future : hearing before the Subcommittee on Commerce, Manufacturing, and Trade of the Committee on Energy and Commerce, House of Representatives, One Hundred Fourteenth Congress, first session, June 25, 2015
Vehicle-to-vehicle communications and connected roadways of the future : hearing before the Subcommittee on Commerce, Manufacturing, and Trade of the Committee on Energy and Commerce, House of Representatives, One Hundred Fourteenth Congress, first session, June 25, 2015
Pubbl/distr/stampa Washington : , : U.S. Government Publishing Office, , 2016
Descrizione fisica 1 online resource (iii, 68 pages)
Soggetto topico Vehicular ad hoc networks (Computer networks)
Mobile communication systems - United States
Automobiles - Technological innovations - United States
Automobiles - Technological innovations
Intelligent transportation systems
Mobile communication systems
Soggetto genere / forma Legislative hearings.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Vehicle-to-vehicle communications and connected roadways of the future
Record Nr. UNINA-9910707715903321
Washington : , : U.S. Government Publishing Office, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Vehicular ad hoc network security and privacy / / Xiaodong Lin, Rongxing Lu
Vehicular ad hoc network security and privacy / / Xiaodong Lin, Rongxing Lu
Autore Lin Xiaodong
Pubbl/distr/stampa Hoboken [New Jersey] : , : IEEE Press/Wiley, , [2015]
Descrizione fisica 1 online resource (237 p.)
Disciplina 388.312
Collana IEEE press series on information and communication networks security
IEEE Press series on information & communication networks security
Soggetto topico Vehicular ad hoc networks (Computer networks)
ISBN 1-119-08216-1
1-119-08215-3
1-119-08214-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto List of Figures xi -- List of Tables xv -- Acronyms xvii -- Preface xix -- 1 INTRODUCTION 1 -- 1.1 Background 1 -- 1.2 DSRC AND VANET 2 -- 1.2.1 DSRC 2 -- 1.2.2 VANET 3 -- 1.2.3 Characteristics of VANET 6 -- 1.3 Security and Privacy Threats 7 -- 1.4 Security and Privacy Requirements 8 -- 1.5 Challenges and Prospects 9 -- 1.5.1 Conditional Privacy Preservation in VANETs 9 -- 1.5.2 Authentication with Efficient Revocation in VANETs 10 -- 1.6 Standardization and Related Activities 11 -- 1.7 Security Primitives 13 -- 1.8 Outline of the Book 17 -- References 17 -- 2 GSIS: GROUP SIGNATURE AND ID-BASED SIGNATURE-BASED SECURE AND PRIVACY-PRESERVING PROTOCOL 21 -- 2.1 Introduction 21 -- 2.2 Preliminaries and Background 23 -- 2.2.1 Group Signature 23 -- 2.2.2 Bilinear Pairing and ID-Based Cryptography 23 -- 2.2.3 Threat Model 23 -- 2.2.4 Desired Requirements 24 -- 2.3 Proposed Secure and Privacy-Preserving Protocol 25 -- 2.3.1 Problem Formulation 25 -- 2.3.2 System Setup 27 -- 2.3.3 Security Protocol between OBUs 29 -- 2.3.4 Security Protocol between RSUs and OBUs 38 -- 2.4 Performance Evaluation 41 -- 2.4.1 Impact of Traffic Load 43 -- 2.4.2 Impact of Cryptographic Signature Verification Delay 43 -- 2.4.3 Membership Revocation and Tracing Efficiency 45 -- 2.5 Concluding Remarks 47 -- References 47 -- 3 ECPP: EFFICIENT CONDITIONAL PRIVACY PRESERVATION PROTOCOL 51 -- 3.1 Introduction 51 -- 3.2 System Model and Problem Formulation 52 -- 3.2.1 System Model 52 -- 3.2.2 Design Objectives 54 -- 3.3 Proposed ECPP Protocol 55 -- 3.3.1 System Initialization 55 -- 3.3.2 OBU Short-Time Anonymous Key Generation 56 -- 3.3.3 OBU Safety Message Sending 62 -- 3.3.4 OBU Fast Tracking Algorithm 63 -- 3.4 Analysis on Conditional Privacy Preservation 64 -- 3.5 Performance Analysis 66 -- 3.5.1 OBU Storage Overhead 66 -- 3.5.2 OBU Computation Overhead on Verification 66 -- 3.5.3 TA Computation Complexity on OBU Tracking 68 -- 3.6 Concluding Remarks 69 -- References 69 -- 4 PSEUDONYM-CHANGING STRATEGY FOR LOCATION PRIVACY 71.
4.1 Introduction 71 -- 4.2 Problem Definition 73 -- 4.2.1 Network Model 73 -- 4.2.2 Threat Model 74 -- 4.2.3 Location Privacy Requirements 75 -- 4.3 Proposed PCS Strategy for Location Privacy 75 -- 4.3.1 KPSD Model for PCS Strategy 75 -- 4.3.2 Anonymity Set Analysis for Achieved Location Privacy 79 -- 4.3.3 Feasibility Analysis of PCS Strategy 85 -- 4.4 Performance Evaluation 86 -- 4.5 Concluding Remarks 89 -- References 89 -- 5 RSU-AIDED MESSAGE AUTHENTICATION 91 -- 5.1 Introduction 91 -- 5.2 System Model and Preliminaries 93 -- 5.2.1 System Model 93 -- 5.2.2 Assumption 93 -- 5.2.3 Problem Statement 94 -- 5.2.4 Security Objectives 95 -- 5.3 Proposed RSU-Aided Message Authentication Scheme 96 -- 5.3.1 Overview 96 -- 5.3.2 Mutual Authentication and Key Agreement between RSUs and Vehicles 96 -- 5.3.3 Hash Aggregation 98 -- 5.3.4 Verification 99 -- 5.3.5 Privacy Enhancement 100 -- 5.4 Performance Evaluation 101 -- 5.4.1 Message Loss Ratio 102 -- 5.4.2 Message Delay 102 -- 5.4.3 Communication Overhead 104 -- 5.5 Security Analysis 105 -- 5.6 Concluding Remarks 106 -- References 107 -- 6 TESLA-BASED BROADCAST AUTHENTICATION 109 -- 6.1 Introduction 109 -- 6.2 Timed Efficient and Secure Vehicular Communication Scheme 110 -- 6.2.1 Preliminaries 110 -- 6.2.2 System Formulation 112 -- 6.2.3 Proposed TSVC Scheme 113 -- 6.2.4 Enhanced TSVC with Nonrepudiation 118 -- 6.2.5 Discussion 123 -- 6.3 Security Analysis 129 -- 6.4 Performance Evaluation 129 -- 6.4.1 Impact of Vehicle Moving Speed 131 -- 6.4.2 Impact of Vehicle Density 132 -- 6.5 Concluding Remarks 134 -- References 134 -- 7 DISTRIBUTED COOPERATIVE MESSAGE AUTHENTICATION 137 -- 7.1 Introduction 137 -- 7.2 Problem Formulation 138 -- 7.2.1 Network Model 138 -- 7.2.2 Security Model 139 -- 7.3 Basic Cooperative Authentication Scheme 140 -- 7.4 Secure Cooperative Authentication Scheme 141 -- 7.4.1 Evidence and Token for Fairness 142 -- 7.4.2 Authentication Proof 145 -- 7.4.3 Flows of Proposed Scheme 146 -- 7.5 Security Analysis 147.
7.5.1 Linkability Attack 147 -- 7.5.2 Free-Riding Attack without Authentication Efforts 147 -- 7.5.3 Free-Riding Attack with Fake Authentication Efforts 148 -- 7.6 Performance Evaluation 148 -- 7.6.1 Simulation Settings 148 -- 7.6.2 Simulation Results 149 -- 7.7 Concluding Remarks 150 -- References 151 -- 8 CONTEXT-AWARE COOPERATIVE AUTHENTICATION 153 -- 8.1 Introduction 153 -- 8.2 Message Trustworthiness in VANETs 156 -- 8.3 System Model and Design Goal 159 -- 8.3.1 Network Model 159 -- 8.3.2 Attack Model 159 -- 8.3.3 Design Goals 160 -- 8.4 Preliminaries 160 -- 8.4.1 Pairing Technique 160 -- 8.4.2 Aggregate Signature and Batch Verification 160 -- 8.5 Proposed AEMAT Scheme 161 -- 8.5.1 System Setup 161 -- 8.5.2 Registration 162 -- 8.5.3 SER Generation and Broadcasting 162 -- 8.5.4 SER Opportunistic Forwarding 162 -- 8.5.5 SER Aggregated Authentication 163 -- 8.5.6 SER Aggregated Trustworthiness 165 -- 8.6 Security Discussion 168 -- 8.6.1 Collusion Attacks 168 -- 8.6.2 Privacy Protection of Witnesses 168 -- 8.7 Performance Evaluation 169 -- 8.7.1 Transmission Cost 169 -- 8.7.2 Computational Cost 169 -- 8.8 Concluding Remarks 170 -- References 170 -- 9 FAST HANDOVER AUTHENTICATION BASED ON MOBILITY PREDICTION 173 -- 9.1 Introduction 173 -- 9.2 Vehicular Network Architecture 175 -- 9.3 Proposed Fast Handover Authentication Scheme Based on Mobility Prediction 176 -- 9.3.1 Multilayer Perceptron Classifier 176 -- 9.3.2 Proposed Authentication Scheme 178 -- 9.4 Security Analysis 183 -- 9.4.1 Replay Attack 183 -- 9.4.2 Forward Secrecy 183 -- 9.5 Performance Evaluation 184 -- 9.6 Concluding Remarks 185 -- References 186 -- Index 187.
Record Nr. UNINA-9910208814703321
Lin Xiaodong  
Hoboken [New Jersey] : , : IEEE Press/Wiley, , [2015]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Vehicular ad hoc network security and privacy / / Xiaodong Lin, Rongxing Lu
Vehicular ad hoc network security and privacy / / Xiaodong Lin, Rongxing Lu
Autore Lin Xiaodong
Pubbl/distr/stampa Hoboken [New Jersey] : , : IEEE Press/Wiley, , [2015]
Descrizione fisica 1 online resource (237 p.)
Disciplina 388.312
Collana IEEE press series on information and communication networks security
IEEE Press series on information & communication networks security
Soggetto topico Vehicular ad hoc networks (Computer networks)
ISBN 1-119-08216-1
1-119-08215-3
1-119-08214-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto List of Figures xi -- List of Tables xv -- Acronyms xvii -- Preface xix -- 1 INTRODUCTION 1 -- 1.1 Background 1 -- 1.2 DSRC AND VANET 2 -- 1.2.1 DSRC 2 -- 1.2.2 VANET 3 -- 1.2.3 Characteristics of VANET 6 -- 1.3 Security and Privacy Threats 7 -- 1.4 Security and Privacy Requirements 8 -- 1.5 Challenges and Prospects 9 -- 1.5.1 Conditional Privacy Preservation in VANETs 9 -- 1.5.2 Authentication with Efficient Revocation in VANETs 10 -- 1.6 Standardization and Related Activities 11 -- 1.7 Security Primitives 13 -- 1.8 Outline of the Book 17 -- References 17 -- 2 GSIS: GROUP SIGNATURE AND ID-BASED SIGNATURE-BASED SECURE AND PRIVACY-PRESERVING PROTOCOL 21 -- 2.1 Introduction 21 -- 2.2 Preliminaries and Background 23 -- 2.2.1 Group Signature 23 -- 2.2.2 Bilinear Pairing and ID-Based Cryptography 23 -- 2.2.3 Threat Model 23 -- 2.2.4 Desired Requirements 24 -- 2.3 Proposed Secure and Privacy-Preserving Protocol 25 -- 2.3.1 Problem Formulation 25 -- 2.3.2 System Setup 27 -- 2.3.3 Security Protocol between OBUs 29 -- 2.3.4 Security Protocol between RSUs and OBUs 38 -- 2.4 Performance Evaluation 41 -- 2.4.1 Impact of Traffic Load 43 -- 2.4.2 Impact of Cryptographic Signature Verification Delay 43 -- 2.4.3 Membership Revocation and Tracing Efficiency 45 -- 2.5 Concluding Remarks 47 -- References 47 -- 3 ECPP: EFFICIENT CONDITIONAL PRIVACY PRESERVATION PROTOCOL 51 -- 3.1 Introduction 51 -- 3.2 System Model and Problem Formulation 52 -- 3.2.1 System Model 52 -- 3.2.2 Design Objectives 54 -- 3.3 Proposed ECPP Protocol 55 -- 3.3.1 System Initialization 55 -- 3.3.2 OBU Short-Time Anonymous Key Generation 56 -- 3.3.3 OBU Safety Message Sending 62 -- 3.3.4 OBU Fast Tracking Algorithm 63 -- 3.4 Analysis on Conditional Privacy Preservation 64 -- 3.5 Performance Analysis 66 -- 3.5.1 OBU Storage Overhead 66 -- 3.5.2 OBU Computation Overhead on Verification 66 -- 3.5.3 TA Computation Complexity on OBU Tracking 68 -- 3.6 Concluding Remarks 69 -- References 69 -- 4 PSEUDONYM-CHANGING STRATEGY FOR LOCATION PRIVACY 71.
4.1 Introduction 71 -- 4.2 Problem Definition 73 -- 4.2.1 Network Model 73 -- 4.2.2 Threat Model 74 -- 4.2.3 Location Privacy Requirements 75 -- 4.3 Proposed PCS Strategy for Location Privacy 75 -- 4.3.1 KPSD Model for PCS Strategy 75 -- 4.3.2 Anonymity Set Analysis for Achieved Location Privacy 79 -- 4.3.3 Feasibility Analysis of PCS Strategy 85 -- 4.4 Performance Evaluation 86 -- 4.5 Concluding Remarks 89 -- References 89 -- 5 RSU-AIDED MESSAGE AUTHENTICATION 91 -- 5.1 Introduction 91 -- 5.2 System Model and Preliminaries 93 -- 5.2.1 System Model 93 -- 5.2.2 Assumption 93 -- 5.2.3 Problem Statement 94 -- 5.2.4 Security Objectives 95 -- 5.3 Proposed RSU-Aided Message Authentication Scheme 96 -- 5.3.1 Overview 96 -- 5.3.2 Mutual Authentication and Key Agreement between RSUs and Vehicles 96 -- 5.3.3 Hash Aggregation 98 -- 5.3.4 Verification 99 -- 5.3.5 Privacy Enhancement 100 -- 5.4 Performance Evaluation 101 -- 5.4.1 Message Loss Ratio 102 -- 5.4.2 Message Delay 102 -- 5.4.3 Communication Overhead 104 -- 5.5 Security Analysis 105 -- 5.6 Concluding Remarks 106 -- References 107 -- 6 TESLA-BASED BROADCAST AUTHENTICATION 109 -- 6.1 Introduction 109 -- 6.2 Timed Efficient and Secure Vehicular Communication Scheme 110 -- 6.2.1 Preliminaries 110 -- 6.2.2 System Formulation 112 -- 6.2.3 Proposed TSVC Scheme 113 -- 6.2.4 Enhanced TSVC with Nonrepudiation 118 -- 6.2.5 Discussion 123 -- 6.3 Security Analysis 129 -- 6.4 Performance Evaluation 129 -- 6.4.1 Impact of Vehicle Moving Speed 131 -- 6.4.2 Impact of Vehicle Density 132 -- 6.5 Concluding Remarks 134 -- References 134 -- 7 DISTRIBUTED COOPERATIVE MESSAGE AUTHENTICATION 137 -- 7.1 Introduction 137 -- 7.2 Problem Formulation 138 -- 7.2.1 Network Model 138 -- 7.2.2 Security Model 139 -- 7.3 Basic Cooperative Authentication Scheme 140 -- 7.4 Secure Cooperative Authentication Scheme 141 -- 7.4.1 Evidence and Token for Fairness 142 -- 7.4.2 Authentication Proof 145 -- 7.4.3 Flows of Proposed Scheme 146 -- 7.5 Security Analysis 147.
7.5.1 Linkability Attack 147 -- 7.5.2 Free-Riding Attack without Authentication Efforts 147 -- 7.5.3 Free-Riding Attack with Fake Authentication Efforts 148 -- 7.6 Performance Evaluation 148 -- 7.6.1 Simulation Settings 148 -- 7.6.2 Simulation Results 149 -- 7.7 Concluding Remarks 150 -- References 151 -- 8 CONTEXT-AWARE COOPERATIVE AUTHENTICATION 153 -- 8.1 Introduction 153 -- 8.2 Message Trustworthiness in VANETs 156 -- 8.3 System Model and Design Goal 159 -- 8.3.1 Network Model 159 -- 8.3.2 Attack Model 159 -- 8.3.3 Design Goals 160 -- 8.4 Preliminaries 160 -- 8.4.1 Pairing Technique 160 -- 8.4.2 Aggregate Signature and Batch Verification 160 -- 8.5 Proposed AEMAT Scheme 161 -- 8.5.1 System Setup 161 -- 8.5.2 Registration 162 -- 8.5.3 SER Generation and Broadcasting 162 -- 8.5.4 SER Opportunistic Forwarding 162 -- 8.5.5 SER Aggregated Authentication 163 -- 8.5.6 SER Aggregated Trustworthiness 165 -- 8.6 Security Discussion 168 -- 8.6.1 Collusion Attacks 168 -- 8.6.2 Privacy Protection of Witnesses 168 -- 8.7 Performance Evaluation 169 -- 8.7.1 Transmission Cost 169 -- 8.7.2 Computational Cost 169 -- 8.8 Concluding Remarks 170 -- References 170 -- 9 FAST HANDOVER AUTHENTICATION BASED ON MOBILITY PREDICTION 173 -- 9.1 Introduction 173 -- 9.2 Vehicular Network Architecture 175 -- 9.3 Proposed Fast Handover Authentication Scheme Based on Mobility Prediction 176 -- 9.3.1 Multilayer Perceptron Classifier 176 -- 9.3.2 Proposed Authentication Scheme 178 -- 9.4 Security Analysis 183 -- 9.4.1 Replay Attack 183 -- 9.4.2 Forward Secrecy 183 -- 9.5 Performance Evaluation 184 -- 9.6 Concluding Remarks 185 -- References 186 -- Index 187.
Record Nr. UNINA-9910830597903321
Lin Xiaodong  
Hoboken [New Jersey] : , : IEEE Press/Wiley, , [2015]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Vehicular communications and networks : architectures, protocols, operation and deployment / / edited by Wai Chen ; contributors, A. S. Chekkouri [and twenty six others]
Vehicular communications and networks : architectures, protocols, operation and deployment / / edited by Wai Chen ; contributors, A. S. Chekkouri [and twenty six others]
Pubbl/distr/stampa Cambridge, England : , : Woodhead Publishing, , 2015
Descrizione fisica 1 online resource (325 p.)
Disciplina 388.3124
Collana Woodhead Publishing Series in Electronic and Optical Materials
Soggetto topico Vehicular ad hoc networks (Computer networks)
ISBN 1-78242-216-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910788161703321
Cambridge, England : , : Woodhead Publishing, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Vehicular communications and networks : architectures, protocols, operation and deployment / / edited by Wai Chen ; contributors, A. S. Chekkouri [and twenty six others]
Vehicular communications and networks : architectures, protocols, operation and deployment / / edited by Wai Chen ; contributors, A. S. Chekkouri [and twenty six others]
Pubbl/distr/stampa Cambridge, England : , : Woodhead Publishing, , 2015
Descrizione fisica 1 online resource (325 p.)
Disciplina 388.3124
Collana Woodhead Publishing Series in Electronic and Optical Materials
Soggetto topico Vehicular ad hoc networks (Computer networks)
ISBN 1-78242-216-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910814368503321
Cambridge, England : , : Woodhead Publishing, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Vehicular networking : automotive applications and beyond / / editors, Marc Emmelmann, Bernd Bochow, C. Christopher Kellum
Vehicular networking : automotive applications and beyond / / editors, Marc Emmelmann, Bernd Bochow, C. Christopher Kellum
Pubbl/distr/stampa Chichester, West Sussex, U.K. ; , : Wiley, , 2010
Descrizione fisica 1 online resource (316 p.)
Disciplina 388.3/12
Altri autori (Persone) EmmelmannMarc
BochowBernd
KellumC. Christopher
Collana Intelligent transport systems
Intelligent transportation systems
Soggetto topico Vehicular ad hoc networks (Computer networks)
Highway communications
ISBN 1-282-69117-1
9786612691171
0-470-66131-3
0-470-66130-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- List of Contributors xiii -- Preface xv -- 1 Commercial and Public Use Applications 1 /Dr. Hariharan Krishnan, Dr. Fan Bai and Dr. Gavin Holland -- 1.1 Introduction 2 -- 1.1.1 Motivation 3 -- 1.1.2 Contributions and benefits 3 -- 1.1.3 Chapter organization 4 -- 1.2 V2XApplications from the User Benefits Perspective 4 -- 1.2.1 Application value 5 -- 1.3 Application Characteristics and Network Attributes 8 -- 1.3.1 Application characteristics 8 -- 1.3.2 Network attributes 10 -- 1.4 Application Classification and Categorization 12 -- 1.4.1 Characterization based on application characteristics 12 -- 1.4.2 Characterization based on network attributes 15 -- 1.4.3 Application classification . . . . 18 -- 1.5 Market Perspectives and Challenges for Deployment 21 -- 1.5.1 Fleet penetration 21 -- 1.5.2 System rollout options 21 -- 1.5.3 Market penetration analysis 23 -- 1.5.4 System rollout 25 -- 1.5.5 Role of infrastructure 25 -- 1.6 Summary and Conclusions 26 -- References 27 -- 2 Governmental and Military Applications 29 /Anthony Maida -- 2.1 Introduction 29 -- 2.2 Vehicular Networks for First Responders 30 -- 2.2.1 Public safety communications 30 -- 2.2.2 Vehicular communications 31 -- 2.3 The Need for Public Safety Vehicular Networks 33 -- 2.4 State of Vehicular Network Technology 35 -- 2.4.1 Incident Area Networks 35 -- 2.4.2 Jurisdictional Area Networks 36 -- 2.4.3 Extended Area Networks 38 -- 2.5 Vehicular Networks for Military Use 40 -- 2.6 Conclusions 42 -- References 42 -- 3 Communication Systems for Car-2-X Networks 45 /Daniel D. Stancil, Fan Bai and Lin Cheng -- 3.1 Overview of theV2XEnvironment 46 -- 3.1.1 Vehicle-to-Infrastructure 46 -- 3.1.2 Vehicle-to-Vehicle 46 -- 3.1.3 Antenna requirements 47 -- 3.2 V2XChannel Models 48 -- 3.2.1 Deterministic models 48 -- 3.2.2 Geometry-based statistical models 48 -- 3.2.3 Multi-tap models 50 -- 3.3 V2XChannelProperties 50 -- 3.3.1 Empirical measurement platform 51 -- 3.3.2 Large-scale path loss 51 -- 3.3.3 Fading statistics 53.
3.3.4 Coherence time and Doppler spectrum 53 -- 3.3.5 Coherence bandwidth and delay spread profile 56 -- 3.4 Performance of 802.11p in the V2X Channel 58 -- 3.4.1 Impact of channel properties on OFDM 59 -- 3.4.2 Potential equalization enhancement schemes 61 -- 3.5 Vehicular Ad hoc Network Multichannel Operation 61 -- 3.5.1 Multichannel MAC (IEEE 1609.4) 62 -- 3.5.2 Performance evaluation of the IEEE 1609.4 multichannel MAC 63 -- 3.5.3 Other solutions for multichannel operations 65 -- 3.6 Vehicular Ad hoc Network Single-hop Broadcast and its Reliability Enhancement Schemes 66 -- 3.6.1 Reliability analysis of DSRC single-hop broadcast scheme 66 -- 3.6.2 Reliability analysis of DSRC-based VSC applications 68 -- 3.6.3 Reliability enhancement schemes for single-hop broadcast scheme 69 -- 3.7 Vehicular Ad hoc Network Multi-hop Information Dissemination Protocol Design 71 -- 3.7.1 Multi-hop broadcast protocols in dense VANETs 71 -- 3.7.2 Multi-hop broadcast protocols in sparse VANETs 73 -- 3.8 Mobile IP Solution in VANETs 75 -- 3.8.1 Mobile IP solution 75 -- 3.8.2 Mobile IP solution tailored to VANET scenarios 76 -- 3.9 Future Research Directions and Challenges 77 -- 3.9.1 Physical layer perspective 77 -- 3.9.2 Networking perspective 77 -- References 78 -- 4 Communication Systems for Railway Applications 83 /Benoît Bouchez and Luc de Coen -- 4.1 Evolution of Embedded Computers and Communication Networks in Railway Applications 83 -- 4.2 Train Integration in a Global Communication Framework 84 -- 4.3 Communication Classes and Related Communication Requirements 85 -- 4.3.1 Real-time data 85 -- 4.3.2 Non-real-time message data 86 -- 4.3.3 Streaming data 88 -- 4.4 Expected Services from a Railway Communication System and the Related Requirements 88 -- 4.4.1 Automatic Train Control 88 -- 4.4.2 Passenger Information System 89 -- 4.4.3 Video 90 -- 4.4.4 Maintenance 91 -- 4.4.5 On-board Internet access 91 -- 4.5 Qualitative and Quantitative Approach for Dimensioning Wireless Links 92.
4.5.1 Environmental influence 92 -- 4.5.2 Global propagation model 92 -- 4.5.3 Train motion influence 93 -- 4.5.4 Regulation and licensing 93 -- 4.6 Existing Wireless Systems Applicable to Railway Communication Systems 93 -- 4.6.1 Magnetic coupling technology 93 -- 4.6.2 WLAN/WMAN technologies 94 -- 4.6.3 Cellular technologies 96 -- 4.6.4 Satellite link technologies 99 -- 4.7 Networks for On-board Communication and Coupling with the Wayside 99 -- 4.7.1 Multifunction Vehicle Bus 99 -- 4.7.2 Wire Train Bus 100 -- 4.7.3 Ethernet 100 -- 4.7.4 Coupling on-board communication with wayside communication 100 -- 4.8 Integration of Existing Technologies for Future Train Integration in a Global Communication Framework 101 -- 4.8.1 European Rail Traffic Management System 101 -- 4.8.2 MODURBAN Communication System 102 -- 4.9 Conclusion 103 -- References 103 -- 5 Security and Privacy Mechanisms for Vehicular Networks 105 /Panos Papadimitratos -- 5.1 Introduction 105 -- 5.2 Threats 107 -- 5.3 Security Requirements 108 -- 5.4 Secure VC Architecture Basic Elements 109 -- 5.4.1 Authorities 109 -- 5.4.2 Node identification 110 -- 5.4.3 Trusted components 110 -- 5.4.4 Secure communication 111 -- 5.5 Secure and Privacy-enhancing Vehicular Communication 111 -- 5.5.1 Basic security 111 -- 5.5.2 Secure neighbor discovery 112 -- 5.5.3 Secure position-based routing 113 -- 5.5.4 Additional privacy-enhancing mechanisms 113 -- 5.5.5 Reducing the cost of security and privacy enhancing mechanisms 115 -- 5.6 Revocation 116 -- 5.7 Data Trustworthiness 119 -- 5.7.1 Securing location information 119 -- 5.7.2 Message trustworthiness 121 -- 5.8 Towards Deployment of Security and PET for VC 122 -- 5.8.1 Revisiting basic design choices 122 -- 5.8.2 Future challenges 124 -- 5.9 Conclusions 125 -- References 125 -- 6 Security and Dependability in Train Control Systems 129 /Mark Hartong, Rajni Goel and Duminda Wijesekera -- 6.1 Introduction 130 -- 6.2 Traditional Train Control and Methods of Rail Operation 130.
6.2.1 Verbal authority and mandatory directives 131 -- 6.2.2 Signal indications 131 -- 6.3 Limitations of Current Train Control Technologies 132 -- 6.4 Positive Train Control 132 -- 6.4.1 Functions 133 -- 6.4.2 Architectures 134 -- 6.4.3 US communication-based systems 135 -- 6.5 System Security 138 -- 6.5.1 The security threat 138 -- 6.5.2 Attacks 139 -- 6.5.3 Required security attributes 141 -- 6.5.4 Analysis of requirements 142 -- 6.6 Supplementary Requirements 144 -- 6.6.1 Performance management 144 -- 6.6.2 Configuration management 145 -- 6.6.3 Accounting, fault, and security management 145 -- 6.7 Summary 146 -- References 146 -- 7 Automotive Standardization of Vehicle Networks 149 /Tom Schaffnit -- 7.1 General Concepts 149 -- 7.1.1 Vehicle-to-Vehicle communications 150 -- 7.1.2 Vehicle-to-Infrastructure communications 150 -- 7.2 Interoperability 151 -- 7.2.1 Regional requirements and differences 152 -- 7.2.2 Necessity of standards 153 -- 7.2.3 Insufficiency of standards 154 -- 7.3 Wireless Protocols and Standardization Activities 154 -- 7.3.1 OSI seven-layer protocol model 154 -- 7.3.2 Standards activities relative to protocol layers 155 -- 7.3.3 Cooperation required among different standards 156 -- 7.4 Regional Standards Development Progress 157 -- 7.4.1 North America 157 -- 7.4.2 Europe 160 -- 7.4.3 Japan 162 -- 7.5 Global Standardization 163 -- 7.5.1 Global standards development organizations and mechanisms 164 -- 7.5.2 Allowances for regional differences 167 -- References 168 -- 8 Standardization of Vehicle-to-Infrastructure Communication 171 /Karine Gosse, David Bateman, Christophe Janneteau, Mohamed Kamoun, Mounir Kellil, Pierre Roux, Alexis Olivereau, Jean-Noël Patillon, Alexandru Petrescu, and Sheng Yang -- 8.1 Introduction 172 -- 8.2 Overview of Standards and Consortia Providing Vehicle-to-Infrastructure Communication Solutions 173 -- 8.2.1 Spectrum 173 -- 8.2.2 Standards 174 -- 8.3 Radio Access Standards for V2I Communications 178 -- 8.3.1 IEEE 802.11p 178.
8.3.2 Applicability of generic wide area radio access standards to Vehicle-to-Infrastructure (V2I)communications . . 181 -- 8.4 Networking Standards forV2I Communications 185 -- 8.4.1 Non-IP networking technologies for critical messaging 185 -- 8.4.2 IP-based vehicular networking 186 -- 8.5 Summary 198 -- References 198 -- 9 Simulating Cooperative Vehicle-to-Infrastructure Systems: A Multi-Aspect Assessment Tool Suite 203 /Gerdien Klunder, Isabel Wilmink and Bart van Arem -- 9.1 Introduction on Design and Evaluation of Cooperative Systems 204 -- 9.2 Design Problems for Cooperative Systems 204 -- 9.3 SUMMITS Tool Suite and Multi-Aspect Assessment 205 -- 9.3.1 Multi-aspect assessment 205 -- 9.3.2 The SUMMITS Tool Suite 206 -- 9.3.3 Some practical aspects of the approach 207 -- 9.4 Integrated Full-Range Speed Assistant 208 -- 9.4.1 Modes and functions 208 -- 9.4.2 Scenarios 209 -- 9.4.3 IRSA controllers 209 -- 9.5 System Robustness / Simulations with a Multi-Agent Real-Time Simulator 212 -- 9.5.1 Aims of the simulation 212 -- 9.5.2 Implementation of IRSA in MARS 213 -- 9.5.3 Evaluation of robustness of IRSA CACC controllers 215 -- 9.5.4 Conclusions on the simulations with MARS 217 -- 9.6 Traffic Flow Impacts / Simulations in the ITS Modeller 218 -- 9.6.1 Aims of the simulations 218 -- 9.6.2 Implementation of IRSA in the ITS modeller 219 -- 9.6.3 Results for the 'approaching a traffic jam' scenario 221 -- 9.6.4 Results for the 'approaching a reduced speed limit zone' scenario 222 -- 9.6.5 Results for the 'leaving the head of a queue' scenario 223 -- 9.6.6 Conclusions on the ITS modeller simulation results 224 -- 9.7 Conclusions 224 -- References 225 -- 10 System Design and Proof-of-Concept Implementation of Seamless Handover Support for Communication-Based Train Control 227 /Marc Emmelmann -- 10.1 Introduction 228 -- 10.2 Fast Handover for CBTC using Wi-Fi 229 -- 10.2.1 Requirements of Communications-Based Train Control for fast handover support 229 -- 10.2.2 Taxonomy of handover phases 230.
10.2.3 IEEE 802.11 fast handover support 231 -- 10.2.4 Challenges of CBTC for Wi-Fi-based fast handover support 239 -- 10.3 System Concept and Design 239 -- 10.3.1 System architecture 240 -- 10.3.2 MAC scheme 241 -- 10.3.3 Predictive fast handover 242 -- 10.4 Implementation 243 -- 10.4.1 Methodology 243 -- 10.4.2 Proof-of-concept demonstrator 244 -- 10.5 Performance Evaluation 245 -- 10.5.1 Metric design 245 -- 10.5.2 Empirical evaluation 247 -- 10.6 Conclusion 253 -- References . . . . 253 -- 11 New Technological Paradigms 257 /Bernd Bochow -- 11.1 Evolution and Convergence of Vehicular Networks 258 -- 11.2 Future Challenges 259 -- 11.2.1 Handling network growth 259 -- 11.2.2 Managing resources in adhoc scenarios 260 -- 11.2.3 Enabling interworking, integration and convergence 261 -- 11.2.4 Providing integrated on-board and vicinity communications 261 -- 11.3 New Paradigms 262 -- 11.3.1 RF LoS obstruction due to other vehicles in close vicinity 263 -- 11.3.2 Increased demand for accuracy of positioning and time synchronization 263 -- 11.3.3 Optimization of message RTT 263 -- 11.3.4 Gaining and distributing knowledge on topology and resource availability in temporal, spatial and spectral dimensions 264 -- 11.3.5 Efficient collaboration and cooperation in resource utilization 264 -- 11.4 Outlook: the Role of Vehicular Networks in the Future Internet 265 -- References 267 -- Further Reading 271 -- Acronyms and Abbreviations 275 -- Subject Index 285.
Record Nr. UNINA-9910140613303321
Chichester, West Sussex, U.K. ; , : Wiley, , 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Vehicular networking : automotive applications and beyond / / editors, Marc Emmelmann, Bernd Bochow, C. Christopher Kellum
Vehicular networking : automotive applications and beyond / / editors, Marc Emmelmann, Bernd Bochow, C. Christopher Kellum
Pubbl/distr/stampa Chichester, West Sussex, U.K. ; , : Wiley, , 2010
Descrizione fisica 1 online resource (316 p.)
Disciplina 388.3/12
Altri autori (Persone) EmmelmannMarc
BochowBernd
KellumC. Christopher
Collana Intelligent transport systems
Intelligent transportation systems
Soggetto topico Vehicular ad hoc networks (Computer networks)
Highway communications
ISBN 1-282-69117-1
9786612691171
0-470-66131-3
0-470-66130-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- List of Contributors xiii -- Preface xv -- 1 Commercial and Public Use Applications 1 /Dr. Hariharan Krishnan, Dr. Fan Bai and Dr. Gavin Holland -- 1.1 Introduction 2 -- 1.1.1 Motivation 3 -- 1.1.2 Contributions and benefits 3 -- 1.1.3 Chapter organization 4 -- 1.2 V2XApplications from the User Benefits Perspective 4 -- 1.2.1 Application value 5 -- 1.3 Application Characteristics and Network Attributes 8 -- 1.3.1 Application characteristics 8 -- 1.3.2 Network attributes 10 -- 1.4 Application Classification and Categorization 12 -- 1.4.1 Characterization based on application characteristics 12 -- 1.4.2 Characterization based on network attributes 15 -- 1.4.3 Application classification . . . . 18 -- 1.5 Market Perspectives and Challenges for Deployment 21 -- 1.5.1 Fleet penetration 21 -- 1.5.2 System rollout options 21 -- 1.5.3 Market penetration analysis 23 -- 1.5.4 System rollout 25 -- 1.5.5 Role of infrastructure 25 -- 1.6 Summary and Conclusions 26 -- References 27 -- 2 Governmental and Military Applications 29 /Anthony Maida -- 2.1 Introduction 29 -- 2.2 Vehicular Networks for First Responders 30 -- 2.2.1 Public safety communications 30 -- 2.2.2 Vehicular communications 31 -- 2.3 The Need for Public Safety Vehicular Networks 33 -- 2.4 State of Vehicular Network Technology 35 -- 2.4.1 Incident Area Networks 35 -- 2.4.2 Jurisdictional Area Networks 36 -- 2.4.3 Extended Area Networks 38 -- 2.5 Vehicular Networks for Military Use 40 -- 2.6 Conclusions 42 -- References 42 -- 3 Communication Systems for Car-2-X Networks 45 /Daniel D. Stancil, Fan Bai and Lin Cheng -- 3.1 Overview of theV2XEnvironment 46 -- 3.1.1 Vehicle-to-Infrastructure 46 -- 3.1.2 Vehicle-to-Vehicle 46 -- 3.1.3 Antenna requirements 47 -- 3.2 V2XChannel Models 48 -- 3.2.1 Deterministic models 48 -- 3.2.2 Geometry-based statistical models 48 -- 3.2.3 Multi-tap models 50 -- 3.3 V2XChannelProperties 50 -- 3.3.1 Empirical measurement platform 51 -- 3.3.2 Large-scale path loss 51 -- 3.3.3 Fading statistics 53.
3.3.4 Coherence time and Doppler spectrum 53 -- 3.3.5 Coherence bandwidth and delay spread profile 56 -- 3.4 Performance of 802.11p in the V2X Channel 58 -- 3.4.1 Impact of channel properties on OFDM 59 -- 3.4.2 Potential equalization enhancement schemes 61 -- 3.5 Vehicular Ad hoc Network Multichannel Operation 61 -- 3.5.1 Multichannel MAC (IEEE 1609.4) 62 -- 3.5.2 Performance evaluation of the IEEE 1609.4 multichannel MAC 63 -- 3.5.3 Other solutions for multichannel operations 65 -- 3.6 Vehicular Ad hoc Network Single-hop Broadcast and its Reliability Enhancement Schemes 66 -- 3.6.1 Reliability analysis of DSRC single-hop broadcast scheme 66 -- 3.6.2 Reliability analysis of DSRC-based VSC applications 68 -- 3.6.3 Reliability enhancement schemes for single-hop broadcast scheme 69 -- 3.7 Vehicular Ad hoc Network Multi-hop Information Dissemination Protocol Design 71 -- 3.7.1 Multi-hop broadcast protocols in dense VANETs 71 -- 3.7.2 Multi-hop broadcast protocols in sparse VANETs 73 -- 3.8 Mobile IP Solution in VANETs 75 -- 3.8.1 Mobile IP solution 75 -- 3.8.2 Mobile IP solution tailored to VANET scenarios 76 -- 3.9 Future Research Directions and Challenges 77 -- 3.9.1 Physical layer perspective 77 -- 3.9.2 Networking perspective 77 -- References 78 -- 4 Communication Systems for Railway Applications 83 /Benoît Bouchez and Luc de Coen -- 4.1 Evolution of Embedded Computers and Communication Networks in Railway Applications 83 -- 4.2 Train Integration in a Global Communication Framework 84 -- 4.3 Communication Classes and Related Communication Requirements 85 -- 4.3.1 Real-time data 85 -- 4.3.2 Non-real-time message data 86 -- 4.3.3 Streaming data 88 -- 4.4 Expected Services from a Railway Communication System and the Related Requirements 88 -- 4.4.1 Automatic Train Control 88 -- 4.4.2 Passenger Information System 89 -- 4.4.3 Video 90 -- 4.4.4 Maintenance 91 -- 4.4.5 On-board Internet access 91 -- 4.5 Qualitative and Quantitative Approach for Dimensioning Wireless Links 92.
4.5.1 Environmental influence 92 -- 4.5.2 Global propagation model 92 -- 4.5.3 Train motion influence 93 -- 4.5.4 Regulation and licensing 93 -- 4.6 Existing Wireless Systems Applicable to Railway Communication Systems 93 -- 4.6.1 Magnetic coupling technology 93 -- 4.6.2 WLAN/WMAN technologies 94 -- 4.6.3 Cellular technologies 96 -- 4.6.4 Satellite link technologies 99 -- 4.7 Networks for On-board Communication and Coupling with the Wayside 99 -- 4.7.1 Multifunction Vehicle Bus 99 -- 4.7.2 Wire Train Bus 100 -- 4.7.3 Ethernet 100 -- 4.7.4 Coupling on-board communication with wayside communication 100 -- 4.8 Integration of Existing Technologies for Future Train Integration in a Global Communication Framework 101 -- 4.8.1 European Rail Traffic Management System 101 -- 4.8.2 MODURBAN Communication System 102 -- 4.9 Conclusion 103 -- References 103 -- 5 Security and Privacy Mechanisms for Vehicular Networks 105 /Panos Papadimitratos -- 5.1 Introduction 105 -- 5.2 Threats 107 -- 5.3 Security Requirements 108 -- 5.4 Secure VC Architecture Basic Elements 109 -- 5.4.1 Authorities 109 -- 5.4.2 Node identification 110 -- 5.4.3 Trusted components 110 -- 5.4.4 Secure communication 111 -- 5.5 Secure and Privacy-enhancing Vehicular Communication 111 -- 5.5.1 Basic security 111 -- 5.5.2 Secure neighbor discovery 112 -- 5.5.3 Secure position-based routing 113 -- 5.5.4 Additional privacy-enhancing mechanisms 113 -- 5.5.5 Reducing the cost of security and privacy enhancing mechanisms 115 -- 5.6 Revocation 116 -- 5.7 Data Trustworthiness 119 -- 5.7.1 Securing location information 119 -- 5.7.2 Message trustworthiness 121 -- 5.8 Towards Deployment of Security and PET for VC 122 -- 5.8.1 Revisiting basic design choices 122 -- 5.8.2 Future challenges 124 -- 5.9 Conclusions 125 -- References 125 -- 6 Security and Dependability in Train Control Systems 129 /Mark Hartong, Rajni Goel and Duminda Wijesekera -- 6.1 Introduction 130 -- 6.2 Traditional Train Control and Methods of Rail Operation 130.
6.2.1 Verbal authority and mandatory directives 131 -- 6.2.2 Signal indications 131 -- 6.3 Limitations of Current Train Control Technologies 132 -- 6.4 Positive Train Control 132 -- 6.4.1 Functions 133 -- 6.4.2 Architectures 134 -- 6.4.3 US communication-based systems 135 -- 6.5 System Security 138 -- 6.5.1 The security threat 138 -- 6.5.2 Attacks 139 -- 6.5.3 Required security attributes 141 -- 6.5.4 Analysis of requirements 142 -- 6.6 Supplementary Requirements 144 -- 6.6.1 Performance management 144 -- 6.6.2 Configuration management 145 -- 6.6.3 Accounting, fault, and security management 145 -- 6.7 Summary 146 -- References 146 -- 7 Automotive Standardization of Vehicle Networks 149 /Tom Schaffnit -- 7.1 General Concepts 149 -- 7.1.1 Vehicle-to-Vehicle communications 150 -- 7.1.2 Vehicle-to-Infrastructure communications 150 -- 7.2 Interoperability 151 -- 7.2.1 Regional requirements and differences 152 -- 7.2.2 Necessity of standards 153 -- 7.2.3 Insufficiency of standards 154 -- 7.3 Wireless Protocols and Standardization Activities 154 -- 7.3.1 OSI seven-layer protocol model 154 -- 7.3.2 Standards activities relative to protocol layers 155 -- 7.3.3 Cooperation required among different standards 156 -- 7.4 Regional Standards Development Progress 157 -- 7.4.1 North America 157 -- 7.4.2 Europe 160 -- 7.4.3 Japan 162 -- 7.5 Global Standardization 163 -- 7.5.1 Global standards development organizations and mechanisms 164 -- 7.5.2 Allowances for regional differences 167 -- References 168 -- 8 Standardization of Vehicle-to-Infrastructure Communication 171 /Karine Gosse, David Bateman, Christophe Janneteau, Mohamed Kamoun, Mounir Kellil, Pierre Roux, Alexis Olivereau, Jean-Noël Patillon, Alexandru Petrescu, and Sheng Yang -- 8.1 Introduction 172 -- 8.2 Overview of Standards and Consortia Providing Vehicle-to-Infrastructure Communication Solutions 173 -- 8.2.1 Spectrum 173 -- 8.2.2 Standards 174 -- 8.3 Radio Access Standards for V2I Communications 178 -- 8.3.1 IEEE 802.11p 178.
8.3.2 Applicability of generic wide area radio access standards to Vehicle-to-Infrastructure (V2I)communications . . 181 -- 8.4 Networking Standards forV2I Communications 185 -- 8.4.1 Non-IP networking technologies for critical messaging 185 -- 8.4.2 IP-based vehicular networking 186 -- 8.5 Summary 198 -- References 198 -- 9 Simulating Cooperative Vehicle-to-Infrastructure Systems: A Multi-Aspect Assessment Tool Suite 203 /Gerdien Klunder, Isabel Wilmink and Bart van Arem -- 9.1 Introduction on Design and Evaluation of Cooperative Systems 204 -- 9.2 Design Problems for Cooperative Systems 204 -- 9.3 SUMMITS Tool Suite and Multi-Aspect Assessment 205 -- 9.3.1 Multi-aspect assessment 205 -- 9.3.2 The SUMMITS Tool Suite 206 -- 9.3.3 Some practical aspects of the approach 207 -- 9.4 Integrated Full-Range Speed Assistant 208 -- 9.4.1 Modes and functions 208 -- 9.4.2 Scenarios 209 -- 9.4.3 IRSA controllers 209 -- 9.5 System Robustness / Simulations with a Multi-Agent Real-Time Simulator 212 -- 9.5.1 Aims of the simulation 212 -- 9.5.2 Implementation of IRSA in MARS 213 -- 9.5.3 Evaluation of robustness of IRSA CACC controllers 215 -- 9.5.4 Conclusions on the simulations with MARS 217 -- 9.6 Traffic Flow Impacts / Simulations in the ITS Modeller 218 -- 9.6.1 Aims of the simulations 218 -- 9.6.2 Implementation of IRSA in the ITS modeller 219 -- 9.6.3 Results for the 'approaching a traffic jam' scenario 221 -- 9.6.4 Results for the 'approaching a reduced speed limit zone' scenario 222 -- 9.6.5 Results for the 'leaving the head of a queue' scenario 223 -- 9.6.6 Conclusions on the ITS modeller simulation results 224 -- 9.7 Conclusions 224 -- References 225 -- 10 System Design and Proof-of-Concept Implementation of Seamless Handover Support for Communication-Based Train Control 227 /Marc Emmelmann -- 10.1 Introduction 228 -- 10.2 Fast Handover for CBTC using Wi-Fi 229 -- 10.2.1 Requirements of Communications-Based Train Control for fast handover support 229 -- 10.2.2 Taxonomy of handover phases 230.
10.2.3 IEEE 802.11 fast handover support 231 -- 10.2.4 Challenges of CBTC for Wi-Fi-based fast handover support 239 -- 10.3 System Concept and Design 239 -- 10.3.1 System architecture 240 -- 10.3.2 MAC scheme 241 -- 10.3.3 Predictive fast handover 242 -- 10.4 Implementation 243 -- 10.4.1 Methodology 243 -- 10.4.2 Proof-of-concept demonstrator 244 -- 10.5 Performance Evaluation 245 -- 10.5.1 Metric design 245 -- 10.5.2 Empirical evaluation 247 -- 10.6 Conclusion 253 -- References . . . . 253 -- 11 New Technological Paradigms 257 /Bernd Bochow -- 11.1 Evolution and Convergence of Vehicular Networks 258 -- 11.2 Future Challenges 259 -- 11.2.1 Handling network growth 259 -- 11.2.2 Managing resources in adhoc scenarios 260 -- 11.2.3 Enabling interworking, integration and convergence 261 -- 11.2.4 Providing integrated on-board and vicinity communications 261 -- 11.3 New Paradigms 262 -- 11.3.1 RF LoS obstruction due to other vehicles in close vicinity 263 -- 11.3.2 Increased demand for accuracy of positioning and time synchronization 263 -- 11.3.3 Optimization of message RTT 263 -- 11.3.4 Gaining and distributing knowledge on topology and resource availability in temporal, spatial and spectral dimensions 264 -- 11.3.5 Efficient collaboration and cooperation in resource utilization 264 -- 11.4 Outlook: the Role of Vehicular Networks in the Future Internet 265 -- References 267 -- Further Reading 271 -- Acronyms and Abbreviations 275 -- Subject Index 285.
Record Nr. UNINA-9910821091903321
Chichester, West Sussex, U.K. ; , : Wiley, , 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Vehicular networks : models and algorithms / / edited by André-Luc Beylot, Houda Labiod ; series editor, Guy Pujolle
Vehicular networks : models and algorithms / / edited by André-Luc Beylot, Houda Labiod ; series editor, Guy Pujolle
Pubbl/distr/stampa London, : ISTE, [2013]
Descrizione fisica 1 online resource (284 pages)
Altri autori (Persone) BeylotAndre-Luc
LabiodHouda
Collana Networks and telecommunications series
Soggetto topico Vehicular ad hoc networks (Computer networks)
ISBN 9781118648759 (electronic book)
1-118-64875-7
1-118-64873-0
1-118-64874-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Contents; Introduction; Chapter 1. Congestion Control for Safety Vehicular Ad Hoc Networks; 1.1. Introduction; 1.2. Beaconing frequency; 1.3. Data rate; 1.4. Transmission power; 1.5. Minimum contention window; 1.6. Physical carrier sense; 1.7. Conclusion; 1.8. Bibliography; Chapter 2. Inter-Vehicle Communication for the Next Generation of Intelligent Transport Systems: Trends in Geographic Ad HocRouting Techniques; 2.1. Introduction; 2.2. IVC-relating ITS projects; 2.3. Wireless sublayer techniques; 2.3.1. WLAN and WPAN (up to 300 m)
2.3.2. Dedicated short-range communication (up to 1 km)2.3.3. Cellular networks (more than 1 km); 2.3.4. Comparison; 2.4. Geographic routing techniques for VANET; 2.4.1. Features of VANET; 2.4.2. Localization; 2.4.3. Unicast greedy routing; 2.4.4. Geocast (multicast) routing; 2.4.5. Delay tolerant network-based routing; 2.4.6. Map-based routing; 2.5. Conclusion and open issues; 2.6. Acknowledgments; 2.7. Bibliography; Chapter 3. CONVOY: A New Cluster-Based Routing Protocol for Vehicular Networks; 3.1. Introduction; 3.2. Clustering or network partitioning
3.2.1. General remarks on the partitioning of mobile ad hoc networks 3.2.2. Controlling the number of hops; 3.2.3. Controlling the number of nodes; 3.2.4. Role of the clusterhead; 3.3. Mobility-based clustering in ad hoc vehicular networks; 3.3.1. The dynamics of vehicular traffic in VANETs; 3.3.2. Clustering according to the lane; 3.3.3. Clustering depending on the relative speed between the vehicles; 3.3.4. Clustering depending on the direction of the movement (movement-based); 3.3.5. Clustering depending on the radio link quality; 3.3.6. Clustering depending on speed and relative speed
3.3.7. Clustering depending on the position,speed and direction 3.4. Clustering of VANETs for MAC and transport applications; 3.4.1. Cluster-based MAC protocol; 3.4.2. Clustering for transport applications; 3.5. CONVOY: a vehicle convoy formation protocol; 3.5.1. Intra-convoy communication protocol; 3.5.2. Convoy formation algorithm; 3.6. Assessment of the convoy formation protocol; 3.6.1. Optimal parameters of the algorithm; 3.6.2. Distribution of the length of convoys; 3.6.3. Convoy stability; 3.7. Conclusion; 3.8. Bibliography
Chapter 4. Complementarity between Vehicular Networks and LTE Networks 4.1. Introduction; 4.2. State of the art; 4.3. General description of the proposed architecture; 4.3.1. Network organization mechanisms for areas completely covered by LTE; 4.3.2. Network organization mechanisms forareas that are not completely covered by LTE; 4.3.3. Information collection application: LTE4V2X-C; 4.3.4. Information dissemination application:LTE4V2X-D; 4.4. Detailed description of the LTE4V2X-C protocol; 4.4.1. Initialization phase; 4.4.2. Maintenance; 4.4.3. Extension for the areas not covered by the LTE
4.5. A detailed description of the LTE4V2X-D protocol
Record Nr. UNINA-9910139246203321
London, : ISTE, [2013]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui