A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Cyber Physical Systems Perspective on the Real-time and Reliable Dissemination of Information in Intelligent Transportation Systems
2010
Network Protocols and Algorithms
This paper presents compelling arguments in favor of new research directions in this area that are based on a cyber-physical systems (CPS) perspective. ...
X www.macrothink.org/npa 2 presented in the paper are based on simulations conducted in the OMNeT++/INETMANET simulator framework for IEEE 802.11 networks. ...
Acknowledgment This research was made possible in part by grants from the US Air Force Research Laboratories Visiting Summer Faculty Research Program, US National Science Foundation RAPID Award # 1047792 ...
doi:10.5296/npa.v2i3.480
fatcat:nnq4bqwngvaurljy45iqea4nem
On 5G-V2X Use Cases and Enabling Technologies: A Comprehensive Survey
2021
IEEE Access
ACKNOWLEDGMENT The authors would like to give special thanks to the National program for the urgent aid and reception of scientists in exile (PAUSE program) from Collège de France for its funding of this ...
controlled from one server, improving network efficiency, as well as reducing interference in high-density areas [81] . ...
High-precision dynamic driving maps will be built based on the information that is shared within the platoon. ...
doi:10.1109/access.2021.3100472
fatcat:sbl3ekkiczd5jirvdppv6ey6xe
A Survey of the Connected Vehicle Landscape—Architectures, Enabling Technologies, Applications, and Development Areas
2018
IEEE transactions on intelligent transportation systems (Print)
With improvements in connectivity, sensing, and computation, the future will see vehicles used as development platforms capable of generating rich data, acting based on inference, and effecting great change ...
in transportation, the human-vehicle dynamic, the environment, and the economy. ...
Connected vehicle applications require high density of radio-equipped vehicles, in particular for safety-critical services. ...
doi:10.1109/tits.2017.2749459
fatcat:inix7byy6fa7dmymrd65yad4nu
Security and Privacy Issues in Autonomous Vehicles: A Layer-Based Survey
2022
IEEE Open Journal of the Communications Society
In this work, we investigate security challenges and privacy concerns in AVs. We examine different attacks launched in a layer-based approach. ...
Autonomy has long been a sought-after goal in vehicles, and now more than ever we are very close to that goal. ...
ACKNOWLEDGMENT This research work was financially supported in part by NSF CNS 1852126. ...
doi:10.1109/ojcoms.2022.3169500
fatcat:dfiozub5kfag7gcdygumj7ieuy
D.2.3: Assessment method for each of the use cases defined
2020
Zenodo
This deliverable presents the work done in HEADSTART work package 2: Task 2.4 "Definition of methodology for the targeted use cases", with the 3 selected HEADSTART use cases: Highway pilot, Truck platooning ...
Typical high level manoeuvres for a truck platoon member could be for example, forming or disengaging a platoon, or platooning in steady-state driving. ...
front of the platoon, or cut-in / cut-through of another vehicle at high velocities and (relatively) small gap). ...
doi:10.5281/zenodo.4581336
fatcat:pg7efxeybzhwxk5d4227ik7mvm
Recent Advances and Challenges in Security and Privacy for V2X Communications
2020
IEEE Open Journal of Vehicular Technology
Credential information is stored in each TPD. In general, OBUs are considered to have limited computation and storage capability. ...
GENERIC SYSTEM ARCHITECTURE OF VEHICULAR NETWORKS As depicted in Fig. 2 , a trust authority (TA), RSUs, Base Stations (BSs), and OBUs are major entities in vehicular networks [23] . ...
high-density scenario. ...
doi:10.1109/ojvt.2020.2999885
fatcat:d3ut2edr7jhvvltv6x56snw36u
Automated Discovery of Denial-of-Service Vulnerabilities in Connected Vehicle Protocols
2021
USENIX Security Symposium
Our quantification results show that these attacks can have as high as 99% success rates, and in the worst case can at least double the delay in packet processing, violating the latency requirement in ...
Using CVAnalyzer, we successfully uncovered 4 new DoS (Denial-of-Service) vulnerabilities of the latest CV network protocols and 14 new DoS vulnerabilities of two CV platoon management protocols. ...
This research was supported in part by an award from Mcity at University of Michigan, and by the National Science Foundation under grant CNS-1930041, CNS-1526455, CNS-1850533 and CNS-1929771. ...
dblp:conf/uss/HuCSFML21
fatcat:ny2t5vp6szd3vmxx2xfqtxoxhu
Autonomic Response to Distributed Denial of Service Attacks
[chapter]
2001
Lecture Notes in Computer Science
In the attribute-based view, this credential can be read as B has the attribute A:r, or equivalently, A says that B has the attribute r. ...
The attribute-based reading of this credential is: anyone who has all the attributes f 1 : : : f k also has the attribute A:r. ...
doi:10.1007/3-540-45474-8_9
fatcat:gzimnj7tqvd5zg2zl7pjxkhtzm
Enabling automated driving by ICT infrastructure: A reference architecture
[article]
2020
arXiv
pre-print
This paper presents a reference architecture for such an infrastructure-based support of AVs. ...
Being the basis for the EU-funded project ICT4CART, exemplary implementations of this architecture will show its power for a variety of use cases on highways and in urban areas in test sites in Austria ...
The CONCORDA [14] project contributes to the preparation of European motorways for automated driving and high density truck platooning with adequate connected services and technologies, whereas the C-ROADS ...
arXiv:2003.05229v1
fatcat:ww4d5t3rcrgjtpjuwq4psqrsju
Connected Vehicles: Technology Review, State of the Art, Challenges and Opportunities
2021
Sensors
Different challenges in terms of cooperative computation, privacy/security, and over-the-air updates are discussed. ...
In the CV paradigm, vehicles become smarter by communicating with nearby vehicles, connected infrastructure, and the surroundings. ...
The authors in [93] propose platooning as a service framework that adopts a centralized mobile edge computing (MEC)-based approach to control the speed/acceleration of follower vehicles in the platoon ...
doi:10.3390/s21227712
pmid:34833782
pmcid:PMC8622391
fatcat:rigbsfmpzbdbxmityfcosrzlfm
STAGE DEFINITION FOR AHS DEPLOYMENT AND AN AHS EVOLUTIONARY SCENARIO
1995
I V H S Journal
However. such discussions are nothing but intellectual exercises unless the issue of how to evolve. in a planned and managed fashion, the current highway systems towards these mature AHS is also addressed ...
Since issues reg•rding deploying AHS in the rea/11·or/d actually dictate AHS technological requirements. deployment research should be an integral part of AHS concept definition/evaluation and system design ...
Segregation is moti vated by safety, higher-speed automated driving, high density and hence high capac ity, and a driverless transit vehicle operation on the automated lane. ...
doi:10.1080/10248079508903839
fatcat:36badjmjbjechfoktcgqebj7ca
A beamforming signal-based verification scheme for data sharing in 5G vehicular networks
2020
IEEE Access
Besides the theoretical analysis of basic limits, we perform extensive evaluations of the work in cases of both sparse and heavy traffic densities. ...
Simultaneously, they also build another trajectory of the vehicle by independently fusing real-time measurement metrics from signal-based positioning. ...
Our verification system also performs well in the case of both high density and sparse traffic. ...
doi:10.1109/access.2020.3040000
fatcat:fmwy6jbcxnebjmv6kzogdp4uuy
Artificial Intelligence for Vehicle-to-Everything: A Survey
2019
IEEE Access
INDEX TERMS Artificial intelligence, machine learning, VANETs, V2X, predictions, platoon, VEC. ...
Artificial intelligence (AI) has been widely used to optimize traditional data-driven approaches in different areas of the scientific research. ...
This technique is suitable for attacks with stolen credentials in a privacy-friendly approach. ...
doi:10.1109/access.2019.2891073
fatcat:kpojxobitvd7fdinkvqnchvtdm
A Survey of Trust Management in the Internet of Vehicles
2021
Electronics
The significance of these contributing parameters is typically represented by associating a weighting factor to each contributing attribute. ...
Over the past decade, the groundbreaking technological advancements in the Internet of Vehicles (IoV) coupled with the notion of trust have attracted increasing attention from researchers and experts in ...
., vehicles launching man-in-the-middle attacks, and cancel their credentials. ...
doi:10.3390/electronics10182223
fatcat:jqghqqcdv5f4xgbc3mibc2riby
UAVouch: A Secure Identity and Location Validation Scheme for UAV-networks
2021
IEEE Access
ACKNOWLEDGMENT The research leading to the results reported in this work has received funding from the Knowledge Foundation (KKS) in the framework of "Safety of Connected Intelligent Vehicles in Smart ...
Cities -SafeSmart" project (2019-2023), Swedish Innovation Agency (VINNOVA) in the framework of "Emergency Vehicle Traffic Light Pre-emption in Cities -EPIC" project (2020-2022) and the ELLIIT Strategic ...
Although the results were promising, both solutions are highly dependent on a high density of witnesses, which is not ideal for FANETs since they can potentially have a low density of nodes [26] . ...
doi:10.1109/access.2021.3087084
fatcat:u3zlghuivrfhbbee4jocwreh5y
« Previous
Showing results 1 — 15 out of 118 results