VANET. Gilles Guette and Bertrand Ducourthial. IEEE MoVeNet 2007, Pisa. Laboratoire Heudiasyc, UMR CNRS 6599 Université de Technologie de Compiègne
|
|
- Milton Ray
- 5 years ago
- Views:
Transcription
1 1 1 out + On the Gilles Guette and Bertrand Ducourthial Laboratoire Heudiasyc, UMR CNRS 6599 Université de Technologie de Compiègne IEEE MoVeNet 2007, Pisa
2 Outlines 2 2 out : hypotheses vs. impact of s 4 5
3 Plan 2 3 out : hypotheses vs. impact of s 4 5
4 out + Network of vehicles mobiles communicating nodes with unstable topology few access to an infrastructure C2C vs. C2I generally highly dynamic ad hoc networks identity preservation Inter-vehicles applications Need for security Solutions 3 4
5 out + Network of vehicles Inter-vehicles applications infrastructure oriented with C2I e.g., gathering information related to traffic conditions vehicle oriented e.g., obstacle detection, position on the road, distance to previous car driver oriented e.g., best way to reach the station, weather forecast, gaz prices... passengers oriented e.g., shared juxe box, touristic informations, games... Need for security Solutions 3 5
6 out + Network of vehicles Inter-vehicles applications Need for security same as in ad hoc networks passive listening routing disturbance specific to depends on the applications traffic jam illusion creation of accidents... easy : just send the right messages Solutions 3 6
7 out + Network of vehicles Inter-vehicles applications Need for security Solutions pessimistic security PKI not easy in sparse connexion to the infrastructure, revocation scheme?... optimistic security combining several sources of information what in case of fake nodes creation? 3 7
8 Plan 3 8 out : hypotheses vs. impact of s 4 5
9 Creation of fake nodes [Douceur et al. 2002] by sending messages with false GPS positions in the transmission area 4 9 out + R F R F R F S F F R F F
10 out + Hypotheses in the litterature Same material or same technical characteristics true if the material comes from a single authority allows to test the resources radio range, delai for several messages... [Newsome et al. 2004] CPU computational puzzles [Douceur et al. 2002] Public key infrastructure available Local checking Continuous propagation model Nodes cooperation Tests and validation scenarios 5 10
11 out + Hypotheses in the litterature Same material or same technical characteristics Public key infrastructure available key unique identifier access to a reliable revocation system several keys for privacy preservation Local checking Continuous propagation model Nodes cooperation Tests and validation scenarios 5 11
12 out + Hypotheses in the litterature Same material or same technical characteristics Public key infrastructure available Local checking there exists a physical mean to associate a sender to a real device (e.g., camera) [Golle et al. 2004] Continuous propagation model Nodes cooperation Tests and validation scenarios 5 12
13 out + Hypotheses in the litterature Same material or same technical characteristics Public key infrastructure available Local checking Continuous propagation model this allows to compute the exact expected reception power depending on the given sender-receiver distance [Xiao et al. 2006] Nodes cooperation Tests and validation scenarios 5 13
14 out + Hypotheses in the litterature Same material or same technical characteristics Public key infrastructure available Local checking Continuous propagation model Nodes cooperation combining local informations [Golle et al. 2004] Tests and validation scenarios 5 14
15 out + Hypotheses in the litterature Same material or same technical characteristics Public key infrastructure available Local checking Continuous propagation model Nodes cooperation Tests and validation scenarios few informations on the scenarios used in a, random positions are not realistic nor representative 5 15
16 Plan 5 16 out : hypotheses vs. impact of s 4 5
17 out + hypotheses vs. impact of s Aim characterize the impact of a number of cheated vehicles characterize the influence of the hypotheses on the impact Method Hypotheses 6 17
18 out + hypotheses vs. impact of s Aim Method computing the geographic area where the succeeds depending on the kind of antenna and the of the sending power P snd Hypotheses 6 18
19 out + Aim Method Hypotheses hypotheses vs. impact of s GPS, coordinates announced in messages measures of the received power sender (er) standard P snd : propagation with tuned P snd : + receiver omnidirectional antenna bidirectional antenna : front/rear 6 19 Sender Receiver omnidirectional antenna bidirectional antenna standard P snd tuned P snd
20 out + How to detect a fake node At the reception, a node compares the measuring reception power and the computed reception power computed with coordinates announced in the messages out nor of P snd P rcv (S, R) = P snd G SR 1 d 2 (S,R) R detects that F S if P rcv (S, R) P rcv (F, R) 7 20 F d max S R More complex with or
21 Plan 7 21 out : hypotheses vs. impact of s 4 out + 5
22 out + without No exact position lines (instead of area) gives the borders of further areas Standard P snd without and omni-directional antenna cheated nodes are on line segment [A, B] (D) A 8 22 F d max S B
23 out + without Standard P snd without and bi-directional antenna and unknown directions the can be detected from everywhere depends on the direction of the receiver : R 1 is cheated, R 2 not. (D) A R 2 F 9 23 d max S R 1 (D R1 ) (D R2 ) B
24 out + without Standard P snd without and bi-directional antenna and same directions cheated nodes are on [A, C] and [D, B] R is cheated if it sees S and F in the same semi-plan. (D) A C (DS) F (D F) direction of all the vehicles d max S D B
25 with real environment unknown upper bound computed with the free space propagation model (factor α) out + Standard P snd with and omni-directional antenna transmission range reduced ; cheated nodes cannot be close to S. C α (D) A C α max F α d max S O α B
26 (DF) On the Sybil Standard P snd with and bi-directional antenna and same directions with R is cheated if it sees S and F in the same semi-plan out + (D) C A α Cmax α α d max S (DS) F direction of all the vehicles OαO α B
27 out + with + + of the sending power increasing factor β for the sending power γ = α β α : factor Standard P snd with + and omni-directional antenna C γ max (D) A C γ Oγ F γ d max S C γ min B
28 (DF) On the Sybil with + Standard P snd with + and bi-directional antenna and same directions out + C γ max (D) A (DS) C γ F direction of all the vehicles Oγ γ d max S C γ min B
29 Plan out : hypotheses vs. impact of s 4 5
30 Rapport On the Sybil When P snd increases the transmission range increases the area of success decreases Sender : impact of the factor out + (D) the er will be detected more easily while his will cheat less vehicles. A Surface de réussite/surface totale O F O O α d max S alpha B
31 out + Receiver : impact of the bidirectionnal antenna When bidirectional antenna are used when the er does not know the directions of the victims, it will be discover bidirectional antenna very useful in urban environments many vehicles with different directions on roads, the Sybil nodes should be placed near the er less impact of the Sybil node creation when using combination of the information in neighborhood 16 31
32 out + Conclusion Summary Realistic hypotheses GPS, measure of the received power Geometric characterization of the success, metric for comparison (area) Attacker : or not Sender : omni- or bidirectional antenna guide for further tests and scenarii design for studies sending power : limited interest bidirectional antenna : urban environment Future work Cooperation in neighborhood
Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn
Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background
More informationSecure Location Verification with Hidden and Mobile Base Stations
Secure Location Verification with Hidden and Mobile Base Stations S. Capkun, K.B. Rasmussen - Department of Computer Science, ETH Zurich M. Cagalj FESB, University of Split M. Srivastava EE Department,
More informationTransport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks
Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks Yi Sun Department of Electrical Engineering The City College of City University of New York Acknowledgement: supported
More informationExploiting data in dynamic networks
1 Exploiting data in Bertrand Ducourthial Université de Technologie de Compiègne UMR CNRS UTC 753 Heudiasyc April 01 Agenda 1 collect 3 fusion 5 position Summary 1 Dynamic Software Distribution collect
More informationDesigning Secure and Reliable Wireless Sensor Networks
Designing Secure and Reliable Wireless Sensor Networks Osman Yağan" Assistant Research Professor, ECE" Joint work with J. Zhao, V. Gligor, and F. Yavuz Wireless Sensor Networks Ø Distributed collection
More informationCommunication Networks. Braunschweiger Verkehrskolloquium
Simulation of Car-to-X Communication Networks Braunschweiger Verkehrskolloquium DLR, 03.02.2011 02 2011 Henrik Schumacher, IKT Introduction VANET = Vehicular Ad hoc NETwork Originally used to emphasize
More informationThe HHI-Channel-Sounder and Measurements of the Radio Channel for Car-to-Car Communication.
The HHI-Channel-Sounder and Measurements of the Radio Channel for Car-to-Car Communication. Der HHI-Channel-Sounder und Messungen des Funkkanals für Fahrzeug-zu-Fahrzeug Kommunikation. Outline Introduction
More informationCooperative Transmission Techniques on Ad Hoc, Multi-Hop Wireless Networks
UNIVERSITY OF PADOVA Cooperative Transmission Techniques on Ad Hoc, Multi-Hop Wireless Networks Student: Cristiano Tapparello Master of Science in Computer Engineering Advisor: Michele Rossi Bio Born in
More informationVETRA. VETRA radio communication system for communication between trams and ground devices. Elektroline, Inc. communication
radio system for between trams and ground devices Elektroline, Inc. Prague, Czech Republic www.elektroline.cz Introduction to the system Communication system between trams and ground devices Bidirectional
More informationLocation Estimation in Ad-Hoc Networks with Directional Antennas
Location Estimation in Ad-Hoc Networks with Directional Antennas Nipoon Malhotra, Mark Krasniewski, Chin-Lung Yang, Saurabh Bagchi, William Chappell School of Electrical and Computer Engineering Purdue
More informationEvaluation of Connected Vehicle Technology for Concept Proposal Using V2X Testbed
AUTOMOTIVE Evaluation of Connected Vehicle Technology for Concept Proposal Using V2X Testbed Yoshiaki HAYASHI*, Izumi MEMEZAWA, Takuji KANTOU, Shingo OHASHI, and Koichi TAKAYAMA ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
More informationPerformance Evaluation of a Hybrid Sensor and Vehicular Network to Improve Road Safety
7th ACM PE-WASUN 2010 Performance Evaluation of a Hybrid Sensor and Vehicular Network to Improve Road Safety Carolina Tripp Barba, Karen Ornelas, Mónica Aguilar Igartua Telematic Engineering Dept. Polytechnic
More informationUse of Probe Vehicles to Increase Traffic Estimation Accuracy in Brisbane
Use of Probe Vehicles to Increase Traffic Estimation Accuracy in Brisbane Lee, J. & Rakotonirainy, A. Centre for Accident Research and Road Safety - Queensland (CARRS-Q), Queensland University of Technology
More informationProjekt Sichere Intelligente Mobilität Testfeld Deutschland. Project Safe Intelligent Mobilty Test Field Germany
Projekt Sichere Intelligente Mobilität Testfeld Deutschland Project Safe Intelligent Mobilty Test Field Germany ETSI TC ITS Workshop 4-6 February 2009 ETSI, Sophia Antipolis, France Dr. Christian Weiß,
More informationTechnical and Commercial Challenges of V2V and V2I networks
Technical and Commercial Challenges of V2V and V2I networks Ravi Puvvala Founder & CEO, Savari Silicon Valley Automotive Open Source Meetup Sept 27 th 2012 Savari has developed an automotive grade connected
More informationPhase Transition of Message Propagation Speed in Delay Tolerant Vehicular Networks
Phase Transition of Message Propagation Speed in Delay Tolerant Vehicular Networks A. Agarwal, D. Starobinski, and T.D.C. Little Department of Electrical and Computer Engineering Boston University, Boston,
More informationAd hoc and Sensor Networks Chapter 9: Localization & positioning
Ad hoc and Sensor Networks Chapter 9: Localization & positioning Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Means for a node to determine its physical position (with
More informationQosmotec. Software Solutions GmbH. Technical Overview. QPER C2X - Car-to-X Signal Strength Emulator and HiL Test Bench. Page 1
Qosmotec Software Solutions GmbH Technical Overview QPER C2X - Page 1 TABLE OF CONTENTS 0 DOCUMENT CONTROL...3 0.1 Imprint...3 0.2 Document Description...3 1 SYSTEM DESCRIPTION...4 1.1 General Concept...4
More informationWireless Internet Routing. IEEE s
Wireless Internet Routing IEEE 802.11s 1 Acknowledgments Cigdem Sengul, Deutsche Telekom Laboratories 2 Outline Introduction Interworking Topology discovery Routing 3 IEEE 802.11a/b/g /n /s IEEE 802.11s:
More informationComparison of Collision Avoidance Systems and Applicability to Rail Transport
Comparison of Collision Avoidance Systems and Applicability to Rail Transport Cristina Rico García, Andreas Lehner, Thomas Strang and Matthias Röckl Institute of Communication and Navigation Page 1 Cristina
More informationEffect of Antenna Placement and Diversity on Vehicular Network Communications
Effect of Antenna Placement and Diversity on Vehicular Network Communications IAB, 3 rd Dec 2007 Sanjit Kaul {sanjit@winlab.rutgers.edu} Kishore Ramachandran {kishore@winlab.rutgers.edu} Pravin Shankar
More informationCollaborative transmission in wireless sensor networks
Collaborative transmission in wireless sensor networks Cooperative transmission schemes Stephan Sigg Distributed and Ubiquitous Systems Technische Universität Braunschweig November 22, 2010 Stephan Sigg
More informationRealistic Cooperative MIMO Channel Models for (B)4G --Modelling Multilink Spatial Correlation Properties
Realistic Cooperative MIMO Channel Models for (B)4G --Modelling Multilink Spatial Correlation Properties Prof. Cheng-Xiang Wang Heriot-Watt University, Edinburgh, UK School of Engineering & Physical Sciences
More informationSyed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University
Detecting Jamming Attacks in Ubiquitous Sensor Networks Networking Lab Kyung Hee University Date: February 11 th, 2008 Syed Obaid Amin obaid@networking.khu.ac.kr Contents Background Introduction USN (Ubiquitous
More informationCS649 Sensor Networks IP Lecture 9: Synchronization
CS649 Sensor Networks IP Lecture 9: Synchronization I-Jeng Wang http://hinrg.cs.jhu.edu/wsn06/ Spring 2006 CS 649 1 Outline Description of the problem: axes, shortcomings Reference-Broadcast Synchronization
More informationEffects of Beamforming on the Connectivity of Ad Hoc Networks
Effects of Beamforming on the Connectivity of Ad Hoc Networks Xiangyun Zhou, Haley M. Jones, Salman Durrani and Adele Scott Department of Engineering, CECS The Australian National University Canberra ACT,
More informationWireless Network Security Spring 2012
Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #8 Interference and Jamming Announcements Homework #1 is due today Questions? Not everyone has signed up for a Survey These are required,
More informationProbabilistic Link Properties. Octav Chipara
Probabilistic Link Properties Octav Chipara Signal propagation Propagation in free space always like light (straight line) Receiving power proportional to 1/d² in vacuum much more in real environments
More informationSpectrum Sensing Brief Overview of the Research at WINLAB
Spectrum Sensing Brief Overview of the Research at WINLAB P. Spasojevic IAB, December 2008 What to Sense? Occupancy. Measuring spectral, temporal, and spatial occupancy observation bandwidth and observation
More informationLink and Link Impedance 2018/02/13. VECTOR DATA ANALYSIS Network Analysis TYPES OF OPERATIONS
VECTOR DATA ANALYSIS Network Analysis A network is a system of linear features that has the appropriate attributes for the flow of objects. A network is typically topology-based: lines (arcs) meet at intersections
More informationEnergy-Efficient MANET Routing: Ideal vs. Realistic Performance
Energy-Efficient MANET Routing: Ideal vs. Realistic Performance Paper by: Thomas Knuz IEEE IWCMC Conference Aug. 2008 Presented by: Farzana Yasmeen For : CSE 6590 2013.11.12 Contents Introduction Review:
More informationLightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 3 Issue. 3 Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network 1, Vinothkumar.G,
More informationfor Vehicular Ad Hoc Networks
Distributed Fair Transmit Power Adjustment for Vehicular Ad Hoc Networks Third Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 06) Reston, VA,
More informationS-Band: a new space for mobile communication in Europe Orazio Pulvirenti MSS Project Manager Eutelsat Innovation Team
S-Band: a new space for mobile communication in Europe Orazio Pulvirenti MSS Project Manager Eutelsat Innovation Team Evolutions in Satellite Telecommunication Ground Segments Noordwijk, June 5 th 2008
More informationPrinciples of Ad Hoc Networking
Principles of Ad Hoc Networking Michel Barbeau and Evangelos Kranakis November 12, 2007 Wireless security challenges Network type Wireless Mobility Ad hoc Sensor Challenge Open medium Handover implies
More informationIsrael Railways No Fault Liability Renewal The Implementation of New Technological Safety Devices at Level Crossings. Amos Gellert, Nataly Kats
Mr. Amos Gellert Technological aspects of level crossing facilities Israel Railways No Fault Liability Renewal The Implementation of New Technological Safety Devices at Level Crossings Deputy General Manager
More informationMeasurement Driven Deployment of a Two-Tier Urban Mesh Access Network
Measurement Driven Deployment of a Two-Tier Urban Mesh Access Network J. Camp, J. Robinson, C. Steger, E. Knightly Rice Networks Group MobiSys 2006 6/20/06 Two-Tier Mesh Architecture Limited Gateway Nodes
More informationContextual Pedestrian-to-Vehicle DSRC Communication
Contextual Pedestrian-to-Vehicle DSRC Communication Ali Rostami, Bin Cheng, Hongsheng Lu, John B. Kenney, and Marco Gruteser WINLAB, Rutgers University, USA Toyota InfoTechnology Center, USA December 2016
More informationRepelling Sybil-type attacks in wireless ad hoc systems
Outline Repelling Sybil-type attacks in wireless ad hoc systems Marek Klonowski Michał Koza Mirosław Kutyłowski Institute of Mathematics and Computer Science, Wrocław University of Technology ACISP 2,
More informationProviding VANET Security through Position Verification
Providing VANET Security through Position Verification Master s Project Final Report Author: Gyanesh Kumar Choudhary Email: gchoudha@cs.odu.edu Project Advisor: Dr. Michele Weigle Email: mweigle@cs.odu.edu
More informationDesign of 5.9GHz DSRC-based Vehicular Safety Communication
Design of 5.9GHz DSRC-based Vehicular Safety Communication Daniel Jiang 1, Vikas Taliwal 1, Andreas Meier 1, Wieland Holfelder 1, Ralf Herrtwich 2 1 DaimlerChrysler Research and Technology North America,
More informationJoint Relaying and Network Coding in Wireless Networks
Joint Relaying and Network Coding in Wireless Networks Sachin Katti Ivana Marić Andrea Goldsmith Dina Katabi Muriel Médard MIT Stanford Stanford MIT MIT Abstract Relaying is a fundamental building block
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch, David Maltz, David Johnson, Yih-Chun Hu and Jorjeta Jetcheva Computer Science Department Carnegie Mellon University
More informationPhase Transition of Message Propagation Speed in Delay Tolerant Vehicular Networks
Phase Transition of Message Propagation Speed in Delay Tolerant Vehicular Networks Ashish Agarwal, David Starobinski and Thomas D.C. Little Abstract Delay tolerant network (DTN architectures have recently
More informationAODV and GPSR in a realistic VANET context. Jonathan Ledy, Benoît Hilt, Hervé Boeglen, Anne-Marie Poussard, Frédéric Drouhin, Rodolphe Vauzelle
1 AODV and GPSR in a realistic VANET context Jonathan Ledy, Benoît Hilt, Hervé Boeglen, Anne-Marie Poussard, Frédéric Drouhin, Rodolphe Vauzelle 2 Summary The VANETs context AODV & GPSR Performance comparison
More informationWireless Network Security Spring 2011
Wireless Network Security 14-814 Spring 2011 Patrick Tague Mar 22, 2011 Class #19 Cross-layer attacks and defenses Announcements Homework #3 is due March 24 Exam in class March 31 Agenda Cross-layer attacks
More informationSense in Order: Channel Selection for Sensing in Cognitive Radio Networks
Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia, PA 19122 Email: {ying.dai,
More informationReliable and Energy-Efficient Data Delivery in Sparse WSNs with Multiple Mobile Sinks
Reliable and Energy-Efficient Data Delivery in Sparse WSNs with Multiple Mobile Sinks Giuseppe Anastasi Pervasive Computing & Networking Lab () Dept. of Information Engineering, University of Pisa E-mail:
More informationMobile Positioning in Wireless Mobile Networks
Mobile Positioning in Wireless Mobile Networks Peter Brída Department of Telecommunications and Multimedia Faculty of Electrical Engineering University of Žilina SLOVAKIA Outline Why Mobile Positioning?
More informationIN4181 Lecture 2. Ad-hoc and Sensor Networks. Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes
IN4181 Lecture 2 Ad-hoc and Sensor Networks Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes Outline: discuss impact of wireless Ad-hoc networks link layer: medium access control network layer:
More informationTopology Control with Better Radio Models: Implications for Energy and Multi-Hop Interference
Topology Control with Better Radio Models: Implications for Energy and Multi-Hop Interference Douglas M. Blough Mauro Leoncini Giovanni Resta Paolo Santi June 1, 2006 Abstract Topology Control (TC) is
More informationRobust Key Establishment in Sensor Networks
Robust Key Establishment in Sensor Networks Yongge Wang Abstract Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research
More informationMedia Independent MAC Enhancements for RF Management of Wireless 802 Networks
Media Independent MAC Enhancements for RF Management of Wireless 802 Networks An Introduction Slide 1 Overview Into to 802 Wireless Networks What is RF Management Why a standard is needed Why a common
More informationConnected Car Networking
Connected Car Networking Teng Yang, Francis Wolff and Christos Papachristou Electrical Engineering and Computer Science Case Western Reserve University Cleveland, Ohio Outline Motivation Connected Car
More informationAn Obstacle Model Implementation for Evaluating Radio Shadowing with ns-3
An Obstacle Model Implementation for Evaluating Radio Shadowing with ns-3 Scott E. Carpenter and Mihail L. Sichitiu Department of Computer Science Department of Electrical and Computer Engineering North
More informationEnergy Efficient MAC Protocol with Localization scheme for Wireless Sensor Networks using Directional Antennas
Energy Efficient MAC Protocol with Localization scheme for Wireless Sensor Networks using Directional Antennas Anique Akhtar Department of Electrical Engineering aakhtar13@ku.edu.tr Buket Yuksel Department
More informationIntroduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1
ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS Xiang Ji and Hongyuan Zha Material taken from Sensor Network Operations by Shashi Phoa, Thomas La Porta and Christopher Griffin, John Wiley,
More informationThe Capability of Error Correction for Burst-noise Channels Using Error Estimating Code
The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code Yaoyu Wang Nanjing University yaoyu.wang.nju@gmail.com June 10, 2016 Yaoyu Wang (NJU) Error correction with EEC June
More informationChapter 9: Localization & Positioning
hapter 9: Localization & Positioning 98/5/25 Goals of this chapter Means for a node to determine its physical position with respect to some coordinate system (5, 27) or symbolic location (in a living room)
More informationComparison of Simulation-Based Dynamic Traffic Assignment Approaches for Planning and Operations Management
Comparison of Simulation-Based Dynamic Traffic Assignment Approaches for Planning and Operations Management Ramachandran Balakrishna Daniel Morgan Qi Yang Howard Slavin Caliper Corporation 4 th TRB Conference
More informationAS EARLY AS 1910, MICHELIN SOME FRENCH ROADS. HENCE THE YOU SIGNS WHICH INDICATE PLACE NAMES, A DESCRIPTION, ROAD NUM-
1 A LITTLE BIT OF HISTORY... AS EARLY AS 1910, MICHELIN INVENTED A SERIES OF SIGNS WHICH ARE STILL FOUND TODAY ON SOME FRENCH ROADS. HENCE THE ORIGIN OF THE TWO-SIDED THANK YOU SIGNS WHICH INDICATE PLACE
More informationInformation flow over wireless networks: a deterministic approach
Information flow over wireless networks: a deterministic approach alman Avestimehr In collaboration with uhas iggavi (EPFL) and avid Tse (UC Berkeley) Overview Point-to-point channel Information theory
More informationDynamic Zonal Broadcasting for Effective Data Dissemination in VANET
Dynamic Zonal Broadcasting for Effective Data Dissemination in VANET Masters Project Final Report Author: Madhukesh Wali Email: mwali@cs.odu.edu Project Advisor: Dr. Michele Weigle Email: mweigle@cs.odu.edu
More informationAn Accurate and Efficient Analysis of a MBSFN Network
An Accurate and Efficient Analysis of a MBSFN Network Matthew C. Valenti West Virginia University Morgantown, WV May 9, 2014 An Accurate (shortinst) and Efficient Analysis of a MBSFN Network May 9, 2014
More informationIndoor Localization in Wireless Sensor Networks
International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 4, Issue 03 (August 2014) PP: 39-44 Indoor Localization in Wireless Sensor Networks Farhat M. A. Zargoun 1, Nesreen
More informationLink Activation with Parallel Interference Cancellation in Multi-hop VANET
Link Activation with Parallel Interference Cancellation in Multi-hop VANET Meysam Azizian, Soumaya Cherkaoui and Abdelhakim Senhaji Hafid Department of Electrical and Computer Engineering, Université de
More informationHonda R&D Americas, Inc.
Honda R&D Americas, Inc. Topics Honda s view on ITS and V2X Activity Honda-lead V2I Message Set Development Status Challenges Topics Honda s view on ITS and V2X Activity Honda-lead V2I Message Set Standard
More informationVehicle speed and volume measurement using V2I communication
Vehicle speed and volume measurement using VI communication Quoc Chuyen DOAN IRSEEM-ESIGELEC ITS division Saint Etienne du Rouvray 76801 - FRANCE doan@esigelec.fr Tahar BERRADIA IRSEEM-ESIGELEC ITS division
More informationADJACENT BAND COMPATIBILITY OF TETRA AND TETRAPOL IN THE MHZ FREQUENCY RANGE, AN ANALYSIS COMPLETED USING A MONTE CARLO BASED SIMULATION TOOL
European Radiocommunications Committee (ERC) within the European Conference of Postal and Telecommunications Administrations (CEPT) ADJACENT BAND COMPATIBILITY OF TETRA AND TETRAPOL IN THE 380-400 MHZ
More informationA Decentralized Network in Vehicle Platoons for Collision Avoidance
A Decentralized Network in Vehicle Platoons for Collision Avoidance Ankur Sarker*, Chenxi Qiu, and Haiying Shen* *Dept. of Computer Science, University of Virginia, USA College of Information Science and
More informationMethod, algorithm and implementation of vehicles GNSS information protection with help of anti-jamming and anti-spoofing
Method, algorithm and implementation of vehicles GNSS information protection with help of anti-jamming and anti-spoofing Larisa Dobryakova 1, Lukasz Lemieszewski 2 and Evgeny Ochin 3 1 West Pomeranian
More informationWireless Networked Systems
Wireless Networked Systems CS 795/895 - Spring 2013 Lec #4: Medium Access Control Power/CarrierSense Control, Multi-Channel, Directional Antenna Tamer Nadeem Dept. of Computer Science Power & Carrier Sense
More informationLink-based MILP Formulation for Routing and. Spectrum Assignment in Elastic Optical Networks
Link-based MILP Formulation for Routing and 1 Spectrum Assignment in Elastic Optical Networks Xu Wang and Maite Brandt-Pearce Charles L. Brown Dept. of Electrical and Computer Engineering University of
More informationOn the problem of energy efficiency of multi-hop vs one-hop routing in Wireless Sensor Networks
On the problem of energy efficiency of multi-hop vs one-hop routing in Wireless Sensor Networks Symon Fedor and Martin Collier Research Institute for Networks and Communications Engineering (RINCE), Dublin
More informationIntelligent Vehicles and ADAS (Advanced Driving Assistance Systems) Ph. Bonnifait Lab Heudiasyc CNRS, Université de Technologie de Compiègne FRANCE
Intelligent Vehicles and ADAS (Advanced Driving Assistance Systems) Ph. Bonnifait Lab Heudiasyc CNRS, Université de Technologie de Compiègne FRANCE 1 Outline 1. Intelligent Vehicles 2. Pedestrian detection,
More informationPerformance Evaluation of a Mixed Vehicular Network with CAM-DCC and LIMERIC Vehicles
Performance Evaluation of a Mixed Vehicular Network with CAM-DCC and LIMERIC Vehicles Bin Cheng, Ali Rostami, Marco Gruteser John B. Kenney Gaurav Bansal and Katrin Sjoberg Winlab, Rutgers University,
More informationGPS-Based Navigation & Positioning Challenges in Communications- Enabled Driver Assistance Systems
GPS-Based Navigation & Positioning Challenges in Communications- Enabled Driver Assistance Systems Chaminda Basnayake, Ph.D. Senior Research Engineer General Motors Research & Development and Planning
More informationM Y R E V E A L - C E L L U L A R
M Y R E V E A L - C E L L U L A R The hexagon cell shape If we have two BTSs with omniantennas and we require that the border between the coverage area of each BTS is the set of points where the signal
More informationA Hybrid and Flexible Discovery Algorithm for Wireless Sensor Networks with Mobile Elements
A Hybrid and Flexible Discovery Algorithm for Wireless Sensor Networks with Mobile Elements Koteswararao Kondepu 1, Francesco Restuccia 2,3, Giuseppe Anastasi 2, Marco Conti 3 1 Dept. of Computer Science
More informationRandom access on graphs: Capture-or tree evaluation
Random access on graphs: Capture-or tree evaluation Čedomir Stefanović, cs@es.aau.dk joint work with Petar Popovski, AAU 1 Preliminaries N users Each user wants to send a packet over shared medium Eual
More informationCase Study: Land and Sea Demo v2.0 April 4 th, 2018 San Diego, CA
Case Study: Land and Sea Demo v2.0 April 4 th, 2018 San Diego, CA Background In October 2016, Silvus conducted a demonstration of its StreamCaster 4200 2x2 MIMO MANET radios at the behest of the US NAVY.
More informationunderstanding real-time traffic information
understanding real-time traffic information Welcome Congratulations on choosing navigation with SUNA Traffic Channel. SUNA Traffic Channel is a service that broadcasts real-time traffic information directly
More informationHype, Myths, Fundamental Limits and New Directions in Wireless Systems
Hype, Myths, Fundamental Limits and New Directions in Wireless Systems Reinaldo A. Valenzuela, Director, Wireless Communications Research Dept., Bell Laboratories Rutgers, December, 2007 Need to greatly
More informationDeployment scenarios and interference analysis using V-band beam-steering antennas
Deployment scenarios and interference analysis using V-band beam-steering antennas 07/2017 Siklu 2017 Table of Contents 1. V-band P2P/P2MP beam-steering motivation and use-case... 2 2. Beam-steering antenna
More informationVEHICULAR ad hoc networks (VANETs) are becoming
Repetition-based Broadcast in Vehicular Ad Hoc Networks in Rician Channel with Capture Farzad Farnoud, Shahrokh Valaee Abstract In this paper we study the performance of different vehicular wireless broadcast
More informationLOCALIZATION WITH GPS UNAVAILABLE
LOCALIZATION WITH GPS UNAVAILABLE ARES SWIEE MEETING - ROME, SEPT. 26 2014 TOR VERGATA UNIVERSITY Summary Introduction Technology State of art Application Scenarios vs. Technology Advanced Research in
More informationEstimation of System Operating Margin for Different Modulation Schemes in Vehicular Ad-Hoc Networks
Estimation of System Operating Margin for Different Modulation Schemes in Vehicular Ad-Hoc Networks TilotmaYadav 1, Partha Pratim Bhattacharya 2 Department of Electronics and Communication Engineering,
More informationAdvanced Modeling and Simulation of Mobile Ad-Hoc Networks
Advanced Modeling and Simulation of Mobile Ad-Hoc Networks Prepared For: UMIACS/LTS Seminar March 3, 2004 Telcordia Contact: Stephanie Demers Robert A. Ziegler ziegler@research.telcordia.com 732.758.5494
More informationChannel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service
Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service Wenyuan Xu, Timothy Wood, Wade Trappe, Yanyong Zhang WINLAB, Rutgers University IAB 2004 Roadmap Motivation and Introduction
More informationGuy FREMONT Innovative Solutions Manager
1 Cooperative Systems: how can community networks improve road safety? Guy FREMONT Innovative Solutions Manager The Sanef Group o Concessionaire of 2 toll networks, representing 1757 km in operation: Sanef:
More informationThe impact of different radio propagation models for Mobile Ad-hoc NETworks (MANET) in urban area environment
ISSN 1 746-7233, England, UK World Journal of Modelling and Simulation Vol. 5 (2009) No. 1, pp. 45-52 The impact of different radio propagation models for Mobile Ad-hoc NETworks (MANET) in urban area environment
More informationUltra-Low Duty Cycle MAC with Scheduled Channel Polling
Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye and John Heidemann CS577 Brett Levasseur 12/3/2013 Outline Introduction Scheduled Channel Polling (SCP-MAC) Energy Performance Analysis Implementation
More informationLOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.955
More informationReal-time Adaptive Robot Motion Planning in Unknown and Unpredictable Environments
Real-time Adaptive Robot Motion Planning in Unknown and Unpredictable Environments IMI Lab, Dept. of Computer Science University of North Carolina Charlotte Outline Problem and Context Basic RAMP Framework
More informationOpportunistic cooperation in wireless ad hoc networks with interference correlation
Noname manuscript No. (will be inserted by the editor) Opportunistic cooperation in wireless ad hoc networks with interference correlation Yong Zhou Weihua Zhuang Received: date / Accepted: date Abstract
More informationIVHW : an Inter-Vehicle Hazard Warning system
: an Inter-Vehicle Hazard Warning system Benoît MAÏSSEU Project characteristics : a two years DEUFRAKO project - France/Germany co-operation (2001-2002) Partners: RENAULT, COFIROUTE, ESTAR, INRETS, ISIS,
More informationNAV CAR Lane-sensitive positioning and navigation for innovative ITS services AMAA, May 31 st, 2012 E. Schoitsch, E. Althammer, R.
NAV CAR Lane-sensitive positioning and navigation for innovative ITS services AMAA, May 31 st, 2012 E. Schoitsch, E. Althammer, R. Kloibhofer (AIT), R. Spielhofer, M. Reinthaler, P. Nitsche (ÖFPZ), H.
More informationSecuring Wireless Localization: Living with Bad Guys. Zang Li, Yanyong Zhang, Wade Trappe Badri Nath
Securing Wireless Localization: Living with Bad Guys Zang Li, Yanyong Zhang, Wade Trappe Badri Nath Talk Overview Wireless Localization Background Attacks on Wireless Localization Time of Flight Signal
More informationA New Analysis of the DS-CDMA Cellular Uplink Under Spatial Constraints
A New Analysis of the DS-CDMA Cellular Uplink Under Spatial Constraints D. Torrieri M. C. Valenti S. Talarico U.S. Army Research Laboratory Adelphi, MD West Virginia University Morgantown, WV June, 3 the
More informationEfficiency and detectability of random reactive jamming in wireless networks
Efficiency and detectability of random reactive jamming in wireless networks Ni An, Steven Weber Modeling & Analysis of Networks Laboratory Drexel University Department of Electrical and Computer Engineering
More information