You are on page 1of 61

Inter Vehicle

Communication

Akhil Parekh
Manan Shah
Outlook
Introduction
Motivation
Overview of Smart Vehicle
Architecture
Types of Communication
Radio Bands
Protocols
Classes of Information and Information Parameters
Types of IVC
Threats, Challenges and Attacks
Security Architecture
Applications
Real Time Examples
Conclusions
Introduction
What is Inter Vehicle Communication?

Communication among drivers and vehicles in Intelligent


Transportation Systems (ITS)

Communication conducted between onboard information


equipment

IVC enables the service of exchange and distribution of data


Motivation

Study shows - About 60% roadway collisions could be avoided if the


operator of the vehicle was provided warning at least one-half second
prior to a collision
(- US. Patent No. 5,613,039)

Approximately 40,000 people are killed each year on the European


Unions roads, with around 1.7 million people incurring critical injuries.

The annual costs associated with traffic accidents total nearly 3 percent
of the worlds gross domestic product (GDP), or roughly US$1 trillion.

Number of vehicles is increasing faster than the number of


roads, leading to frequent traffic jams.
Constraints of human drivers perception
Line-of-sight limitation of brake light
Large processing/forwarding delay for emergency events.
Statistics

Cars Trucks
(class 7, 8)
On-road population 231 million 3.5 million
Annual New Vehicle Sales 16 million 260, 000
Annual VMT 8,400 63,000
Total Fatalities 37,446 4,390
Total Injuries 2,672,000 116,000
Estimated Total cost of $188 billion $30 billion
crashes
Overview of Smart Vehicle

E v e n t d a ta rec o rd er (E D R )
P o sitio n in g sy s te m
F orw ard rad ar

C o m m u n ic a tio n
fa c ility

R ear radar
D is p la y C o m p u tin g p la tfo r m
Terms

EDR
used in vehicles to register all important parameters such as velocity,
acceleration, etc. especially during abnormal situations, such as
accidents
This data is used for reconstruction.

Forward radar-
Used to detect any forward obstacles as far as 200 meters

Positioning System-
Used to locate vehicles
Accuracy can be improved by knowledge of road topology

Computing platform-
Inputs from various components is used to generate useful information
Pictorial View
Flowchart of IVC
Architecture
Key Components
On-board Equipment (OBE):
human machine interface
vehicle interfaces, (to on-board networks)
Applications, memory and processing
positioning, (GPS and dead-reckoning system)
communications functions (radio, antenna, etc)

Roadside Equipment (RSE):


access nodes positioned along highways, at traffic intersections and
other locations
includes a DSRC radio, GPS, processor, and router to send messages
back through the IVC Network

Network:
The IVC Network interconnects the road-side RSEs, network services,
and the network end-users
General View

The Vehicle
as a part of
the Network

Vehicle to Infrastructure to Vehicle Communication

Center for Information Processing


Vehicle to Vehicle Communication
Types of Communication

Vehicle to Vehicle Communication


It demonstrates properties of both peer-to-peer network and mobile ad-
hoc network.
In Peer-to-peer systems participants rely on another for service rather
than solely relying on a dedicated and centralized infrastructure
A mobile ad hoc network is a collection of mobile hosts with wireless
communication capabilities forming temporary network.

Vehicle to Infrastructure Communication


Information is available from roadside sources
uses 63 GHz band
Ex- Electronic Toll Collection (ETC)
allows for electronic payment of highway tolls
communication is traditionally via microwave or infrared techniques,
more recently through GPS technology
an electronic monetary transaction occurs between a vehicle passing
through a toll station and the toll agency
Radio Bands

Communicating vehicles can use both infrared and radio waves

Radio waves include VHF, micro, and millimeter waves

Bluetooth operates at 2.4 GHz , and is reliable up to a speed of 80 km/h and


range of 80meters.

It can take up to 3 seconds to establish the communication.

requires a master and slave setup

alternative to Bluetooth is a new radio frequency technique called UWB

main advantages of UWB technology are its high data rate, low cost, etc.
Technologies

Broadcasting Technologies:
I2V: RDS/TMC, DAB, DVB, DVB-H, S-DMB, T-DMB

Short Range:
I2V: DSRC
V2V: DSRC, UWB/SRR

Long Range:
V2I/I2V: GSM, GPRS/EDGE, UMTS, Wi-Fi, WiMAX
V2V: GSM, GPRS/EDGE, UMTS, Wi-Fi

In-Vehicle Systems:
Bluetooth, Zigbee
Protocols
Medium Access Control (MAC) in IVC

An ad-hoc network between vehicles is better suited for vehicle


communications than centralized service.

Centralized architecture is not very efficient

Wireless connectivity between moving vehicles can be provided by


existing 802.11 compliant devices.

Data rates of up to 54 Mbps can be achieved with 802.11a hardware.

Robust MAC scheme is needed so that channel is shared efficiently


between mobile nodes.

Types- DMAC and ASDM


Protocols (Contd)
Directional MAC
Ad-hoc network uses Omni-directional antennas (less
spatial coverage)
Directional antennas can be used to improve network
performance by improving spatial reuse of channel
DMAC uses physical layers directional transmission
capabilities
It tells the neighbors to delay their transmissions if it is
going to harm
pending transmission
Helps to avoid hidden terminal and deafness problems
RTS is send in circular way when node is ready to transmit
Circular RTS consist of RTS-CTS-DATA-ACK
Adaptive Space Division Multiplexing
Security and scalability are the major issues in wireless
communication

Need of protocol to scale well as the available bandwidth shrinks

ASDM breaks the roadway up into cells and contains a mapping


function that maps the cell to time slots

Assignment rule - determines a time slot for each vehicle

ASDM ensures QoS by maintaining adequate distance between


vehicles

Vehicle keeps its frequency of transmission constant by maintaining


a certain following distance.
Data Packet Format

Network ID: To filter a packet from other network


Destination: Destination ID
Source: Source ID
Type/Seq: Type of packet/Number of sequence
Size: Size of the whole packet
Data: Actual data to transfer
CRC: 16-bit CRC to check the validity of the packet
Active Collision Warning /Avoidance System
By continuing with the passive safety technologies, it will be difficult
to reduce crash costs

Thus people have started developing active safety features in order


to reduce costs

The introduction of automotive collision warning/ avoidance systems


represents the next significant leap in vehicle safety technology

Automotive collision warning systems try to warn drivers of an


impending collision event. Allowing driver little bit extra time to react

If the collision warning systems are built in conjunction with drive by


wire technology, then the system could try to automatically
maneuver the vehicle in order to avoid an impending collision
Contd

An Object Vehicle and its Restricted Boundary Around a Subject


Vehicle
Parameter to Detect an Impending Collision
Vehicles Parameter

There are two types of parameters: Static and Dynamic

Static Parameters:
The static parameter indicates the size of the vehicle and the
location of its GPS receiver within itself.

Dynamic Parameters:
The dynamic parameters are vehicles position (Xn,Yn), speed
acceleration, direction and the status of the brakes, steering
wheel, gas paddle, turn signal etc.
Contd.

The static parameters are to be exchanged only once,


when two vehicles first form a network

But, the dynamic parameters are to be continuously


exchanged after certain interval of time

The successful operation of a Collision Warning/Avoidance


system depends on how accurately the vehicles
parameters can be measured

All parameters, except the vehicles position and direction


can be measured with a very high accuracy
Classes of Information

Movement Related speed, velocity, acceleration, etc

Traffic Related number of vehicles, traffic volume, density,


congestion

Passenger Related weather related information,


Movement Related Wireless Technology

Technologies Used:-
Magnetic Nails
Magnetic Tape
Live wires
Radar for imaging
Car to car communication
Infrastructure to car communication
Traffic Related Wireless Technology

Infrastructure Based:-
Adjusting traffic flow
Operation on individual vehicle

Vehicle Based:-
Automated Collection
Providing Warnings
Passenger Related Wireless Technology

Providing Information to passengers


Weather
Traffic
General News

Interaction with passengers


Web access
Routing, food/hotel/fuel inquiries
Access to special services.
Types of IVC
Stop And Go Adaptive Cruise Control

Taking over automatic braking and driving when vehicles are in traffic jam
Co-operative Driving

Co-operative driving exchanges respective data such as position velocity etc


Hazard Warning

includes obstacle warning, stopped vehicle warning and slowing down warning
Merging and Lane Changing Warning

Safe and smooth lane change and merging with communication


Inter/Intra Platoon Communication

Ad-hoc communication between vehicles


Mobile Ad-hoc Network
MANET is an autonomous system composed of mobile
nodes which communicates with each other in wireless
environment where there is no infrastructure support

Every mobile node is self organized and relies on the


other nodes to forward information

IVC networks are regarded as new type of MANET


systems

One of the key characteristics is the mobility of mobile


node which produces dynamic topology than wired
networks
Challenges in IVC
Liability Vs Privacy:- Accountability and liability of the vehicles is
required and context specific information such as coordinates, time
intervals should be possible to extract but such requirements raise
privacy concerns

Real Time Communication:- Driver assistance applications are time


sensitive therefore security protocols should impose low processing
overhead

Vehicular Network Scale:- With roughly billion vehicles,


the design of a facility that provides cryptographic keys is big
challenge
Vulnerabilities in IVC

In Transit Traffic Tempering:- Nodes acting as a relay can disrupt


communication of other nodes

Impersonation:- An attacker masquerading an emergency vehicle to


mislead other vehicles
Jamming:- The Jammer deliberately generates interfering

transmissions that prevents communication


Forgery:- Fast contamination of large portions of the
vehicular network coverage area with false information
Privacy:-With Vehicular networks deployed, the collection
of vehicle specific information from overhead
vehicular communications will become particularly easy
Attacks on IVC
Attack 1: Bogus Traffic Information

Traffic
jam
ahead
Attack 2:Disruption of Network Operation

SLOW
DOWN

The way
is clear
Attack 3: Cheating with Identity, Position or Speed

I was not
there!
Open Problems

Data Verification:- can be achieved by data correlation


mechanism but such mechanisms are in design stage

Secure Routing:- In vehicular networking messages


need to be delivered to specific areas for example:- in
the case of traffic jam queue, this can be achieved by
position based routing protocols but none of the solution
is secure

DoS Resillience:- DoS and jamming problems can not


be completely solve by frequency hopping
Public Key Infrastructure

Security services
Positioning
Confidentiality
Privacy
Shared session key ...

PKI
CA

PA PB
Security Architecture of IVC
Components of Security Architecture
Event Data Recorder:- The EDR will be responsible for recording the vehicles critical
data such as position, time, speed etc. EDR will also record
all the received safety messages

Tamper Proof Device:- The TPD will store all the cryptographic materials and perform
cryptographic operations like signing and verifying safety
messages

Vehicular Public Key Infrastructure:- In VPKI infrastructure Certificate Authorities will


issue certified public/private key pairs to vehicles

Authentication:- Vehicles will sign each message with their private key and attach
corresponding certificate. Thus when another vehicle receives the
message it verifies key used to sign the message and then it
verifies the message.

Privacy:- To conceal vehicles identity , set of anonymous keys that changes


frequently can be used. This keys are preloaded into vehicles Tamper Proof
Device for long duration
Application of IVC

Information and Warning Functions:-


Dissemination of road information to vehicles distant from the subjected site

Communication based longitudinal control:-


Exploiting the look through capacity to avoid accidents, platooning vehicles
etc.

Co-operative Assistant Systems:-


Coordinating vehicles at critical points

Added Value Applications:-


Internet Access, Location based services, Multiplayer games
Differences Between Different Standards
Real Time Applications
FleetNet:- The Internet on the road project was set up by
six companies and three universities in order to promote

the development of inter vehicular communication

CarTALK:- Focused on developing new driver assistance systems


which are based on inter vehicle communication for safe
and comfortable driving

Network On Wheels (NOW):- The main objectives of NOW are to


solve technical key questions on the communication
protocols and data security for car to car communication

Advance Driver Assistant System In Europe (ADASE):- ADASE


project has a mission to increase the road and traffic safety in
Europe by avoiding collisions before they occur
FleetNet

Objectives
To develop a communication platform for inter vehicle communication
To implement demonstrator applications
To develop promising introduction strategies
Standardize the solution found

Key Features
Wireless multi hop ad hoc networking
Allows for low cost data transmission
Very low data transmission delay
Extends the range of awareness
Vehicles are addressed according to their
position
FleetNet Applications

Co-operative Driver Assistance:-


Emergency Notification
Overtaking Assistance
Obstacle Warning

Decentralized floating car data:-


Traffic jam monitor
Dynamic Navigation

User Communications:-
Inter vehicle chat
Mobile advertising
Standardization

Is necessary so that vehicles from different car manufacturers can


communicate with each other

NEC which is Japanese technology company is the member of


C2CC consortium and is working in close collaboration with BMW,
Daimler Chrysler

Objective open industrial standard for internet vehicle


communication with wireless components to ensure interoperability

First product to be expected between 2009 to 2012


Conclusion

Design of communication protocols in IVC is extremely challenging

Protocols have potential to support many new innovative


applications

These technologies can greatly enhance the infotainment, safety,


comfort, communication and convenience value of new vehicles.

As vehicles become smarter, security and privacy gain importance


Questions
What are two types of communication in IVC?

Vehicle to Vehicle Communication


It demonstrates properties of both peer-to-peer network and mobile ad-hoc
network.
In Peer-to-peer systems participants rely on another for service rather than solely
relying on a dedicated and centralized infrastructure
A mobile ad hoc network is a collection of mobile hosts with wireless
communication capabilities forming temporary network.

Vehicle to Infrastructure Communication


Information is available from roadside sources
uses 63 GHz band
Ex- Electronic Toll Collection (ETC)
allows for electronic payment of highway tolls
communication is traditionally via microwave or infrared techniques, more
recently through GPS technology
an electronic monetary transaction occurs between a vehicle passing through a
toll station and the toll agency
What are the challenges in IVC?

Liability Vs Privacy:- Accountability and liability of the


vehicles is required and context specific information such
as coordinates, time intervals should be possible to
extract but such requirements raise privacy concerns

Real Time Communication:- Driver assistance


applications are time sensitive therefore security
protocols should impose low processing overhead

Vehicular Network Scale:- With roughly billion vehicles,


the design of a facility that provides cryptographic keys is
big challenge
What are the main Components in Security Architecture
of IVC?

Event Data Recorder:- The EDR will be responsible for


recording the vehicles critical data such as position,
time, speed etc. EDR will also record all the received
safety messages

Tamper Proof Device:- The TPD will store all the


cryptographic materials and perform cryptographic
operations like signing and verifying safety messages

Vehicular Public Key Infrastructure:- In VPKI


infrastructure Certificate Authorities will
issue certified public/private key pairs to
vehicles
References
http://www.cs.wustl.edu/~jain/cse574-06/ftp/vehicular_wireless/index
.html

http://www.comms.scitech.susx.ac.uk/research/bluetooth.php

http://www.et2.tu-harburg.de/fleetnet/english/documents.html

http://www.de.nec.de/textpage.php/id/1304

http://icwww.epfl.ch/publications/documents/IC_TECH_REPORT_20
0424.pdf

www.//ivc.epfl.theocracymanan/page2959.html
References
http://ec.europa.eu/transport/roadsafety/road_safety_observatory/c
are_en.htm

http://ieeexplore.ieee.org/iel5/8061/22289/01041242.pdf?tp=&ar
number=1041242&isnumber=22289

http://www.cartalk2000.net/

http://www.adase2.net/

http://www.comcar.de/

http://ivc.epfl.ch/page2959.html

You might also like