Jack Pokrzywa Director Ground Vehicle Standards, SAE International

Slides:



Advertisements
Similar presentations
Proactive Traffic Merging Strategies for Sensor-Enabled Cars
Advertisements

The Fully Networked Car Geneva, 3-4 March 2010 Security risk analysis approach for on-board vehicle networks 1 Alastair Ruddle Consultant, MIRA Limited.
“Automated driving – What comes first: cars or standards?”
BILL WHITE Presents… VEHICULAR NETWORKING: A SURVEY AND TUTORIAL ON REQUIREMENTS, ARCHITECTURES, CHALLENGES, STANDARDS, AND SOLUTIONS GEORGIO KARAGIANNIS.
EPIDEMIC DENSITY ADAPTIVE DATA DISSEMINATION EXPLOITING OPPOSITE LANE IN VANETS Irem Nizamoglu Computer Science & Engineering.
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
overview Motivation Ongoing research on VANETs Introduction Objectives Applications Possible attacks Conclusion.
1Titel oder Name, Abteilung, Datum Communication Principles State of the Art ►Infrastructure based networks are already deployed ►Currently, only safety.
Vehicle-to-Vehicle Wireless Communication Protocols for Enhancing Highway Traffic Safety - A Comparative Study of Data Dissemination Models for VANETs.
Design of Cooperative Vehicle Safety Systems Based on Tight Coupling of Communication, Computing and Physical Vehicle Dynamics Yaser P. Fallah, ChingLing.
VIRTUAL PROTOTYPING of ROBOTS DYNAMICS E. Tarabanov.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
1 Development and Evaluation of Selected Mobility Applications for VII (a.k.a. IntelliDrive) Steven E. Shladover, Sc.D. California PATH Program Institute.
Vehicular Networking An introduction
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
USDOT, RITA RITA: Oversight of USDOT’s R&D programs  University Transportation Centers $100M  UTC Consortia $80M  UTC Multimodal R&D $40M  Intelligent.
Mike Schagrin US Department of Transportation ITS Joint Program Office IntelliDrive Safety Program Overview.
Overview of Research Activities Aylin Yener
Connected Vehicle Program – Dynamic Mobility Applications Highlights for Tech Scan Scrum.
A study of Intelligent Adaptive beaconing approaches on VANET Proposal Presentation Chayanin Thaina Advisor : Dr.Kultida Rojviboonchai.
SMUCSE 8394 BTS – Communication Technologies. SMUCSE 8394 Objectives To establish and maintain a unifying exchange and sharing framework for different.
International Telecommunication Union The Fully Networked Car Geneva, 4-5 March 2009 Safety & Security Bernard Dugerdil Freescale Semiconductor.
IT Controls Global Technology Auditing Guide 1.
International Telecommunication Union The Fully Networked Car Geneva, 3-4 March 2010 Technical session 5: Electric vehicles and Climate Change Enabling.
Real Time Sensor Networks – challenges and solutions Information Prioritization Proposed scheme: Design techniques for priority assignment to an information.
International Telecommunication Union The Fully Networked Car Geneva, 3-4 March 2010 Technical session 8 Wireless systems and technologies II Analysis.
Toward Reliable and Efficient Reporting in Wireless Sensor Networks Authors: Fatma Bouabdallah Nizar Bouabdallah Raouf Boutaba.
MAC Hurdles in Body Sensor Networks Name : Tahani Mohammad Al-lihaibi ID:
Improving System Availability in Distributed Environments Sam Malek with Marija Mikic-Rakic Nels.
Connected and Autonomous Vehicles Supply Chain Security
Eyal Hamo Berry Shnaider בס " ד 1.
Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm.
Wireless sensor networks: a survey
The Fully Networked Car Geneva, 3-4 March STANDARDS ROUNDTABLE Gérard SEGARRA Telematics Expert, Renault ETSI TC ITS WG1 Chairman Member of C2C-CC.
Indian Institute Of Technology, Delhi Page 1 Enhancements in Security, Performance Modeling and Optimization in Vehicular Networks Ashwin Rao 2006SIY7513.
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
Connected Vehicles in the Internet of Things Presenter
In the name of God.
Emerging Technologies in Autonomous Driving
Jamming for good: a fresh approach to authentic communication in WSNs
VANET.
By // Ammar Hussain Aljanabi Dr . Hadi Adineh
VANET.
Effective radiation pattern
ASSET - Automotive Software cyber SEcuriTy
Connected Vehicle Technology
CYBERSECURITY FOR AUTONOMOUS VEHICLES
CONNECTING CARS EVERYWHERE
Adaptable safety and security in v2x systems
IoV standards and Industry Status TIAA,China
Vehicular Communication Technology
Vehicular Communication and Optimal Cooperative Positioning
GNSS opportunities in Road Transportation
Mobile edge computing Report by Weiqing huang.
Feng Lyu, Hongzi Zhu, Minglu Li Date: Jun 13, 2018
Overview of CV2X Requirements
Connected and Autonomous Vehicle Cybersecurity Controller Area Network
SAE C-V2X Technical Committee
Session 4: Standards Roundtable
Environmental Data Exchange in Cooperating Driving Systems
Vehicular Ad-hoc Network Survey
Consideration on applying ICN to Edge Computing
A reflection on Enabling Connected Mobility
The SAFERtec project on V2I security assurance: concept and vision
Developing Vehicular Data Cloud Services in the IoT Environment
Global megatrends (relevant for our business)
Tomorrow’s Mobility…Is Here Today!
Connected Cars: C-V2X to support traffic safety and automated driving C-V2X on the way to 5G November, 2018 The automotive.
Counter APT Counter APT HUNT operations combine best of breed endpoint detection response technology with an experienced cadre of cybersecurity experts.
doc.: IEEE yy/xxxxr0 Date:
Presentation transcript:

Wireless systems and technologies I Current approaches to wireless vehicle communications Jack Pokrzywa Director Ground Vehicle Standards, SAE International The Fully Networked Car Geneva, 3-4 March 2010

What is cooperative positioning? How does DSRC help? Highlights from Presentation "A Vehicle Communication Scheme to Achieve Optimal Cooperative Positioning" DSRC How does GNSS work? Why is GNSS not enough? What is cooperative positioning? How does DSRC help? Effect of network parameters on positioning performance Precise position and reliable communication The Fully Networked Car Geneva, 3-4 March 2010

Conclusions / Recommendations Cooperative Positioning is needed to improve the positioning accuracy in the vehicular environment Communication constraints affect the level of accuracy that we can get from cooperative positioning The Fully Networked Car Geneva, 3-4 March 2010

Broadcast Protocols in VANETs Highlights from Presentation "Efficient Broadcasting, through Irresponsible Forwarding, in Intelligent Transport Systems" Broadcast Protocols in VANETs Efficient Broadcasting through Irresponsible Forwarding (IF) Numerical Results Improvements Conclusions The Fully Networked Car Geneva, 3-4 March 2010

Conclusions / Recommendations Efficient broadcast transmissions are a key factor in VANETs Tradeoff between reliability, latency and efficiency In safety related applications, latency is a critical issue A correct but too delayed information has no utility IF, with few adjustments, could be a solution The Fully Networked Car Geneva, 3-4 March 2010

Highlights from Presentation "Security Risk Analysis Approach for on-board Vehicle Networks" Future vehicles will become mobile nodes in a dynamic transport network vehicle systems will be under threat from malicious individuals and groups seeking to gain personal or organizational advantage ensuring security will be critical for the successful deployment of V2X technology EU project EVITA aims to prototype a toolkit of techniques and components to ensure the security of in-vehicle systems hardware, software, analysis methods The Fully Networked Car Geneva, 3-4 March 2010

Conclusions / Recommendations A security risk analysis approach has been developed from automotive safety and IT security practices attack trees to identify asset attacks from use cases, attacker type and motivations 4-component security risk vector, potentially including security-related safety issues attack potential and controllability to assess probability of successful attack Level and frequency of risks associated with asset attacks indicate priorities for counter-measures The Fully Networked Car Geneva, 3-4 March 2010

Mobility, Safety, Environmental impacts are reviewed Highlights from Presentation "The Benefits of Enabling a Fully Autonomous Vehicle with Wireless Communications" Automated, Autonomous,Communication-Enabled, and Cooperative – what do they mean Case study presented: Cooperative Sensor Sharing Cooperative Cruise Control Cooperative Convoy System Mobility, Safety, Environmental impacts are reviewed The Fully Networked Car Geneva, 3-4 March 2010

Conclusions / Recommendations The convergence of more aggressive active safety systems with more robust communication strategies will ENABLE the emergence of truly cooperative systems. The more “autonomous” vehicles become, the more they will need to interact cooperatively with their surroundings (V2I and V2V). The Fully Networked Car Geneva, 3-4 March 2010