Professional Documents
Culture Documents
networks
2008/10/1
Examples
2008/10/1 4
Ad Hoc Networks
• Non-infrastructure
• Fixed and Mobile Nodes
• Special Classes of Ad Hoc Networks
Vehicular Ad Hoc Networks
Wireless Mesh Networks
Bluetooth Scatternets…
What is a VANET
(Vehicular Ad hoc NETwork)?
Roadside
base station
Emergency
event
Inter-vehicle
communications
Vehicle-to-roadside
communications
A taxonomy of vehicular
communication systems
Inter-vehicle communication
(IVC) Systems
• IVC systems are completely infrastructure-free; only
onboard units (OBUs) sometimes also called in-
vehicle equipment (IVE) are needed.
IVC systems
• Single-hop and multi-hop IVCs (SIVCs and MIVCs).
• SIVC systems are useful for applications requiring
short-range communications (e.g., lane merging,
automatic cruise control)
• MIVC systems are more complex than SIVCs but
can also support applications that require long-range
communications (e.g., traffic monitoring)
IVC systems
Communication
facility
Rear radar
MEDIUM
DSRC Spectrum Allocation
In 1999, the U.S. Federal Communication Commission
allocated 75MHz of Dedicated Short Range
Communications (DSRC) spectrum at 5.9 GHz to be
used exclusively for vehicle-to-vehicle and
infrastructure-to-vehicle communications.
802.11 WAVE mode
A station in WAVE mode can send and receive data
frames with the wildcard BSSID with “To DS” and “From
DS” fields both set to 0, regardless of whether it is a
member of a WAVE BSS.
A WAVE BSS (WBSS) is a type of BSS consisting of a
set of cooperating stations in WAVE mode that
communicate using a common BSSID. A WBSS is
initialized when a radio in WAVE mode sends a WAVE
beacon, which includes all necessary information for a
receiver to join.
A radio joins a WBSS when it is configured to send and
receive data frames with the BSSID defined for that WBSS.
Conversely, it ceases to belong to a WBSS when its MAC
stops sending and receiving frames that use the BSSID of that
WBSS.
A station shall not be a member of more than one WBSS at
one time. A station in WAVE mode shall not join an
infrastructure BSS or IBSS, and it shall not use active or
passive scanning, and lastly it shall not use MAC
authentication or association procedures.
A WBSS ceases to exist when it has no members. The
initiating radio is no different from any other member after the
establishment of a WBSS. Therefore, a WBSS can continue if
the initiating radio ceases to be a member.
MULTI-CHANNEL OPERATIONS
(P1609.4)
SCOPE
“…describes multi-channel wireless radio
operations, that uses the IEEE 802.11p, WAVE
mode, medium access control and physical
layers, including the operation of control channel
and service channel interval timers, parameters
for priority access, channel switching and routing,
management services, and primitives designed
for multi-channel operations.”
NETWORKING SERVICES (P1609.3)
SCOPE
“…define services, operating at the network and
transport layers, in support of wireless
connectivity among vehicle-based devices, and
between fixed roadside devices and vehicle-
based devices using the 5.9 GHz DSRC/WAVE
mode.”
RESOURCE MANAGER (P1609.1)
SCOPE
“…describe the services and interfaces, including
security and privacy protection mechanisms,
associated with the DSRC Resource Manager
operating at 5.9GHz band authorized by the
Federal Communications Commission (FCC)
and to satisfy the Intelligent Transportation
System (ITS) wireless communications
requirements.”
Security Services for Applications and
Management Messages (P1609.2)
SCOPE
defines secure message formats and
processing of secure messages, within the
DSRC/WAVE system.
defines methods for securing WAVE
management messages and application
messages, with the exception of anonymity-
preserving vehicle safety messages.
describes administrative functions necessary
to support the core security function.
Issues of VANET
Security
DSRC and collision warning
Broadcast and routing
Information dissemination
Data access
Address configuration
Suk-Bok Lee, Gabriel Pan, J.S Park, Mario Gerla and
Songwu Lu,
ACM MobiHoc, 2007
Secure Dissemination Framework
SSD: Signature-Seeking Drive
Secure incentives for cooperative nodes
No tamper-proof h/w assumptions
No game theoretic approaches
Leverages a PKI (public key infrastructure)
A set of ad dissemination designs
SSD: Overview
Vehicular Authority
(VA)
Ad Distribution Point
(ADP)
ADI
ADI
Rv
u
Vehicle-Vehicle Communication
While driving its way, u may collect as many receipts as it forwards ADI.
SSD: Overview
Vehicular Authority (VA)
Transaction
Record
Charge
Colleted
receipts
ADI
Rw
Rv
.
.
.
Receipts are exchangeable with virtual cash at Virtual Cashier (e.g. gas station)
;predefined amount of cash is reserved for each receipt-providing node, too.
VA charges the restaurantsuch virtual cash induced by ADI’s
Uncooperative Model
Selfish nodes
Seek to maximize their own profit
Malicious nodes
Try to intentionally disrupt the system
We may encourage selfish nodes to participate in the
network with an incentive model, yet malicious nodes
try to
attack the weak point of the model.
Secure incentive !
Ad Dissemination Models
Tradeoff !!!
Naive Scheduling Policies
First Come First Serve
(FCFS): the request with the
earliest arrival time will be
served first.
First Deadline First (FDF):
the request with the most
urgency will be served first.
Smallest Datasize First
(SDF): the data with a
smallest size will be served
first.
workload
D*S Scheduling
Intuition
Given two requests with the same deadline, the one
asking for a small size data should be served first.
Given two requests asking for the data items with
same size, the one with an earlier deadline should be
served first.
Basic Idea
Assign each arrival request a service value based on
its deadline and data size, called DS_value as its
service priority weight.
DS_value=(Deadline − CurrentClock)*DataSize
Implementation of D*S
Dual-List
Search from the top of
D_list
Set MinS and MinD
Search D_List and
S_list alternatively
Stops when the
checked entry goes
across MinD or MinS,
or when the search
reaches the halfway of
both lists.
Download Optimization: Broadcasting
Observation
several requests may ask for downloading the same data
item.
wireless communication is broadcast in nature.
Basic Idea
delay some requested data and broadcast it before the
deadlines, then several requests may be served via a
single broadcast.
the data with more pending requests should be served
first.
DSN_value=(Deadline − CurrentClock)*DataSize/Number
D*S/N: Selection of Representative
Deadline
When calculating their
DSN value, we need to
assign each pending
request group a single
deadline to estimate the
urgency of the whole
group.
The Problem of D*S/N
Data Quality !!!
DSN_value=(Deadline − CurrentClock)*DataSize/Number
For upload request, it is not necessary to maintain several
update requests for one data item since only the last update
is useful.
Number value of update requests is always 1, which makes
it not fair for update requests to compete for the
bandwidth.
D*S/N can improve the system service ratio but sacrifice
the service opportunity of update requests, which degrades
the data quality for downloading.
Upload Optimization: 2-Step Scheduling
Basic Idea
two priority queues: one for the update requests and
the other for the download requests.
the data server provides two queues with different
bandwidth (i.e., service probability).
Benefits of Using Two Separate Priority Queues
only need to compare the download queue and update
queue instead of individual updates and downloads.
update and download queues can have their own
priority scheduling schemes.
Reference
Chien-Chung Shen, “Vehicular Ad hoc Networks (VANET),” 「車載資通
訊」短期課程, 國立台北大學三峽校區, 2007.
陳宗禧教授, “Data Dissemination, Service Discovery, and Applications
in Vehicle Ad Hoc Networks ,“「車載隨意行動網路」學界短期課程推廣
暨產學座談會, 私立淡江大學, 2008.
Daniel Jiang and Luca Delgrossi, “IEEE 802.11p: Towards an
International Standard for Wireless Access in Vehicular Environments,”
Vehicular Technology Conference, 2008. VTC Spring 2008. IEEE
11-14 May 2008 Page(s):2036 – 2040.
Tom Kurihara, “IEEE DSRC Application Services (P1609),” doc:IEEE
802.11-07-2134-00-000p, 2007.