GNU Radio Software Defined DSRC Radio
|
|
- Dayna Perkins
- 5 years ago
- Views:
Transcription
1 Institute for Critical Technology and Applied Science GNU Radio Software Defined DSRC Radio Joseph M. Ernst, PhD Research Assistant Professor (540) , 11/2016
2 Motivation Cyber Vulnerabilities Planned DSRC Related Automation Blind spot warnings Forward collision warnings Sudden braking ahead warnings Intersection collision avoidance and movement assistance Approaching emergency vehicle warning Transit or emergency vehicle signal priority Electronic parking and toll payments 11/2016 2
3 Long Term Goals DSRC Radio Implementation DSRC Radio Cyber Security Vehicle Cyber Security 11/2016 3
4 NSHTA Levels of Automation Automation Level Level 0 No-Automation Level 1 Function-specific Automation Level 2 Combined Function Automation Level 3 Limited Self-Driving Automation Level 4 Full Self-Driving Automation Description The driver is in complete and sole control of the primary vehicle controls brake, steering, throttle, and motive power at all times. Automation at this level involves one or more specific control functions. Examples include electronic stability control or pre-charged brakes, where the vehicle automatically assists with braking to enable the driver to regain control of the vehicle or stop faster than possible by acting alone. This level involves automation of at least two primary control functions designed to work in unison to relieve the driver of control of those functions. An example of combined functions enabling a Level 2 system is adaptive cruise control in combination with lane centering. Vehicles at this level of automation enable the driver to cede full control of all safetycritical functions under certain traffic or environmental conditions and in those conditions to rely heavily on the vehicle to monitor for changes in those conditions requiring transition back to driver control. The driver is expected to be available for occasional control, but with sufficiently comfortable transition time. The Google car is an example of limited self-driving automation. The vehicle is designed to perform all safety-critical driving functions and monitor roadway conditions for an entire trip. Such a design anticipates that the driver will provide destination or navigation input, but is not expected to be available for control at any time during the trip. This includes both occupied and unoccupied vehicles. 11/2016 4
5 DSRC Background Category Designated licensed bandwidth Low Latency Fast Network Acquisition High Reliability when Required Description For secure, reliable communications to take place. It is primarily allocated for vehicle safety applications by FCC Report and Order FCC Active safety applications must recognize each other and transmit messages to each other in milliseconds without delay. Active safety applications require the immediate establishment of communication and frequent updates. Active safety applications require a high level of link reliability. DSRC works in high vehicle speed mobility conditions and delivers performance immune to extreme weather conditions (e.g. rain, fog, snow, etc.). Priority for Safety Applications Interoperability Safety applications on DSRC are given priority over non-safety applications. DSRC ensures interoperability, which is the key to successful deployment of active safety applications, using widely accepted standards. It supports both V2V and V2I communications. Security and Privacy DSRC provides safety message authentication and privacy. 11/2016 5
6 DSRC Security Concerns Final Report: Vehicle Infrastructure Integration Proof of Concept Executive Summary (Vehicle) Security Service Number SEC-1 SEC-2 SEC-3 SEC-4 SEC-5 SEC-6 SEC-7 SEC-8 SEC-9 SEC-10 Finding Security system generally works as expected, but testing is difficult since all systems must operate properly. Security system has a tendency to be brittle in that any minor anomaly can cause it to prevent communications; although security system is functioning properly, it cannot always discriminate between other system anomalies or errors and false or malicious messages. WSM verification works properly, but verification performance at higher rates could not be assessed due to operational issues with the OBE. WSA Signing checks effectively ignore WSAs if out of geographic, time or operational scope; however, errors in position can lead to erroneously rejected messages. Messages can be signed by system and successfully validated (or not) based on location, and time (message age); however, misalignment of OBE clocks can cause erroneous rejection of messages. System can replace certificates (identified and anonymous) over the air during typical RSE encounters at road speeds. System successfully rejects messages with expired or revoked credentials. Anonymous certificate functionality (system to prevent the ability to track) was not measured (cost and schedule issues). Certificate Revocation List (CRL) capability appears to be acceptable for moderately sized CRLs; the system was able to download CRLs with up to 30K entries at 65 mph past an RSE. End-to-End encryption of IP packets using IEEE 1609 protocol was successful and operated at usable data rates. Overall viability of anonymous authentication system needs to be refined to determine manageability and to refine management policies and processes. 11/2016 6
7 Software Defined Radio Radio Antenna RF Front End Mixer ADC ASIC Demodulator N210 Computer Antenna RF Front End ADC FPGA Mixer Baseband Demodulator E310 Antenna RF Front End ADC FPGA Mixer Baseband Demodulator 11/2016 7
8 USRP E /2016 8
9 Intermediate Goals Provide complete open source GNU Radio solution for DSRC Implement DSRC solution on E310 (ARM) Test RF characteristics of implementation Initial characterization of cyber concerns 11/2016 9
10 Schedule Objectives ) Equipment Procurement 2) Execution of existing receiver functionality 3) Development of transmitter waveforms 4) GNU Radio simulations 5) Over the air testing of Tx/Rx 6) Investigation of cyber vulnerabilities 7) Final Report 11/
11 Severity Risk Assessment , Likelihood Risk Description 1 Open-Source Software will not be as functional as advertised 2 E310 USRP will not be able to process the waveforms in real time 3 Transmit power for E310 does not have sufficient range for in-vehicle tests 4 DSRC standard is abandoned by connected vehicle community 5 USRP hardware is backordered 6 Appropriate GRA is unavailable 11/
12 Questions? Feel free to contact Joseph Ernst at: (540) /
Vehicle Safety Communications Project Final Overview
CAMP IVI Light Vehicle Enabling Research Program Vehicle Safety Communications Project Final Overview Vehicle Safety Communications (VSC) Project 2.5 year program started in May 2002 VSC Consortium Members:
More informationDedicated Short Range Communication: What, Why and How?
Dedicated Short Range Communication: What, Why and How? Imran Hayee EE Department, University of Minnesota Duluth Connected Vehicles Research Lab (http://www.d.umn.edu/ee/cvrl/index.html) Outline Background
More informationCybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute
Cybersecurity Challenges for Connected and Automated Vehicles Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cars are becoming complex (and CAV is only part of it) 1965: No
More informationSecurity for V2X Communications
Security for V2X Communications ITS Canada Annual General Meeting May 1-4, 2016 Brian Romansky VP Strategic Technology Your Connected Car Your Connected Car Security Security Partner Partner TrustPoint
More informationConnected Vehicle Safety Pilot Overview and Infrastructure Readiness
Connected Vehicle Safety Pilot Overview and Infrastructure Readiness Scott Shogan, PE, PTOE Infrastructure Team Lead Engineer March 28, 2013 Agenda Safety Pilot Program overview V2V and V2I communications
More informationVehicle to Vehicle Retrofit Feasibility Analysis
Vehicle to Vehicle Retrofit Feasibility Analysis Gordon Peredo, Mercedes-Benz Research & Development North America, Inc. and Thomas Chan, VW Electronics Research Lab SAE 2011 Government/Industry Meeting
More informationAccelerating solutions for highway safety, renewal, reliability, and capacity. Connected Vehicles and the Future of Transportation
Accelerating solutions for highway safety, renewal, reliability, and capacity Regional Operations Forums Connected Vehicles and the Future of Transportation ti Session Overview What are connected and automated
More informationCONNECTED VEHICLE COMMUNICATIONS IN A RURAL SETTING
www.inl.gov CONNECTED VEHICLE COMMUNICATIONS IN A RURAL SETTING Ira Pray, Fleet Manager Idaho National Laboratory NRITS October 2016 Chattanooga, TN Topics Background Project Needs and Objectives Dedicated
More informationLESSONS LEARNED: SECURITY AND PRIVACY IN SAFETY PILOT MODEL DEPLOYMENT
LESSONS LEARNED: SECURITY AND PRIVACY IN SAFETY PILOT MODEL DEPLOYMENT André Weimerskirch, Scott Bogard, Debby Bezzina University of Michigan Transportation Research Institute 2901 Baxter Road Ann Arbor,
More informationExamining future priorities for cyber security management
Examining future priorities for cyber security management Cybersecurity Focus Day Insurance Telematics 16 Andrew Miller Chief Technical Officer Thatcham Research Owned by the major UK Motor Insurers with
More informationVirginia Connected Corridor
Virginia Connected Corridor NATMEC 2016 Mike Mollenhauer Director, Center for Technology Implementation Virginia Tech Transportation Institute 5/4/2016 Virginia Connected Corridor In 2014, VDOT and VTTI
More informationAccelerating solutions for highway safety, renewal, reliability, and capacity. Future of Transportation
Accelerating solutions for highway safety, renewal, reliability, and capacity Connected Vehicles and the Future of Transportation Session Overview What are connected and automated vehicles? Connected vehicle
More informationCooperative Vehicles Opportunity and Challenges
Cooperative Vehicles Opportunity and Challenges State Smart Transportation Initiative Toyota Motor Engineering & Manufacturing North America (TEMA) Toyota Technical Center (TTC) Hideki Hada 4/24/2012 Presentation
More informationVANET Applications Use-Cases
VANET Applications Use-Cases VANET communications (V2V and V2I) can be used for dozens of potential applications with highly diverse requirements. Below we identify the most representative VANET applications
More informationAgenda. About TRL. What is the issue? Security Analysis. Consequences of a Cyber attack. Concluding remarks. Page 2
Security Insert the Vulnerabilities title of your of the presentation Connected here Car Presented Presented by by Peter Name Vermaat Here Principal Job Title ITS - Date Consultant 24/06/2015 Agenda 1
More informationEmergency Response: How dedicated short range communication will help in the future. Matthew Henchey and Tejswaroop Geetla, University at Buffalo
Emergency Response: How dedicated short range communication will help in the future. 1.0 Introduction Matthew Henchey and Tejswaroop Geetla, University at Buffalo Dedicated short range communication (DSRC)
More informationAutomotive Cyber Security
Automotive Cyber Security Rajeev Shorey (Ph.D.) Principal Scientist TCS Innovation Labs Cincinnati, USA & Bangalore, India Copyright 2013 Tata Consultancy Services Limited Connected Vehicles Chennai, 18
More informationRECOMMENDATION ITU-R M Intelligent transport systems dedicated short range communications at 5.8 GHz
Rec. ITU-R M.1453-2 1 RECOMMENDATION ITU-R M.1453-2 Intelligent transport systems dedicated short range communications at 5.8 GHz (Question ITU-R 205/8) (2000-2002-2005) Scope This Recommendation outlines
More informationIEEE 802 CALM Tutorial 14 November 2006 R. Roy VII/VIIC Program Overview
IEEE 802 CALM Tutorial 14 November 2006 R. Roy (dickroy@alum.mit.edu) VII/VIIC Program Overview VII/VIIC Program Overview VII Program is an ITS Tier-1 Initiative for electronically connecting vehicles
More informationIntroduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur
Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 50 Connected Vehicles II So, now we are going to continue
More informationRoberto Brignolo The SAFESPOT Integrated Project: Overview of the architecture, technologies and applications
Roberto Brignolo The SAFESPOT Integrated Project: Overview of the architecture, technologies and applications General figures 2 Project type: Integrated Project (IP) Co-funded by: the European Commission
More informationDSRC Field Trials Whitepaper
DSRC Field Trials Whitepaper August 19, 2017 www.cohdawireless.com 1 Overview Cohda has performed more than 300 Dedicated Short Range Communications (DSRC) field trials, comparing DSRC radios from multiple
More informationTo realize Connected Vehicle Society. Yosuke NISHIMURO Ministry of Internal Affairs and Communications (MIC), Japan
To realize Connected Vehicle Society Yosuke NISHIMURO Ministry of Internal Affairs and Communications (MIC), Japan Services provided by Connected Vehicle 1 Vehicle 5G V2X Connected Vehicle Big Data AI
More informationCohda Wireless White Paper DSRC Field Trials
Cohda Wireless White Paper DSRC Field Trials Copyright Cohda Wireless Pty Ltd ABN 84 107 936 309 Cohda Wireless Pty Ltd 82-84 Melbourne Street North Adelaide, SA 5006 Australia P +61 8 8364 4719 F +61
More informationSecurity of vehicular communications. Vehicular communication (VC) systems
Security of vehicular communications vehicular safety communications design constraints attacker classes desired security services a security architecture Vehicular communication (VC) systems motivations:
More informationContext-Aware Vehicular Cyber-Physical Systems with Cloud Support: Architecture, Challenges, and Solutions
Context-Aware Vehicular Cyber-Physical Systems with Cloud Support: Architecture, Challenges, and Solutions Siran Pavankumar(149344152) siranpavankumar@gmail.com Computer Science Department Seoul National
More informationCAMP. Intelligent Transportation Systems. A Security Credential Management System for Vehicle-to-Vehicle Communications
CAMP Vehicle Safety Communications 3 Intelligent Transportation Systems A Security Credential Management System for Vehicle-to-Vehicle Communications William Whyte (Security Innovation); André Weimerskirch
More informationBUILDING A PLAN FOR DEPLOYMENT
BUILDING A PLAN FOR DEPLOYMENT L. Brooks Patterson State of the County 2014 Advantageoakland.com #OaklandNext Where and Why 70% of Global Research in the future automobile happens in Michigan 75 of the
More informationV2X: Beyond the Horizon. IBTTA AET Meeting July 18, 2017
V2X: Beyond the Horizon IBTTA AET Meeting July 18, 2017 Battle over V2X Technology: DSRC vs 5G 18 July 2017 www.kapsch.net 2 Dedicated Short Range Communication (DSRC) Bi-directional wireless communications
More informationAuthentication with Privacy for Connected Cars - A research perspective -
Authentication with Privacy for Connected Cars - A research perspective - Mark Manulis Surrey Centre for Cyber Security, Deputy-Director Department of Computer Science University of Surrey sccs.surrey.ac.uk
More informationNew Services in Mobility: C-ITS
New Services in Mobility: C-ITS UNECE ITS Workshop, 07th of October 2015, Bordeaux Gerhard Menzel European Commission DG Mobility and Unit C3 - Intelligent Systems President Juncker: a target of at least
More informationFuture Implications for the Vehicle When Considering the Internet of Things (IoT)
Future Implications for the Vehicle When Considering the Internet of Things (IoT) FTF-AUT-F0082 Richard Soja Automotive MCU Systems Engineer A P R. 2 0 1 4 TM External Use Agenda Overview of Existing Automotive
More informationIntroduction to VANET
VANET Introduction to VANET -Vehicles connected to each others through an ad hoc formation form a wireless network called Vehicular Ad Hoc Network. -Vehicular ad hoc networks (VANETs) are a subgroup of
More informationCHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS
130 CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS 5.1 INTRODUCTION The feasibility of direct and wireless multi-hop V2V communication based on WLAN technologies, and the importance of position based
More informationSecurity and Privacy in Car2Car Adhoc Networks
Security and Privacy in Car2Car Adhoc Networks Antonio Kung Trialog www.trialog.com 15/06/2016 1 Introduction French SME Involved since 2002 in security and privacy for connected vehicles 15/06/2016 2
More informationReview of distracted driving factors. George Yannis, Associate Professor, NTUA
Review of distracted driving factors George Yannis, Associate Professor, NTUA www.nrso.ntua.gr/geyannis Research Objectives Presentation Structure Research Objectives To provide a comprehensive picture
More informationA Review on Vehicular Ad-Hoc Network
A Review on Vehicular Ad-Hoc Network Arshdeep Kaur 1, Shilpa Sharma 2 M.Tech Student, Dept. of Computer Science Engineering, Lovely Professional University, Phagwara, Punjab, India 1 Assistant Professor,
More informationAttack Resilient State Estimation for Vehicular Systems
December 15 th 2013. T-SET Final Report Attack Resilient State Estimation for Vehicular Systems Nicola Bezzo (nicbezzo@seas.upenn.edu) Prof. Insup Lee (lee@cis.upenn.edu) PRECISE Center University of Pennsylvania
More informationC-ROADS PORTUGAL. Daniela Carvalho. 11º Congresso do Comité Português da URSI Lisboa, 24/11/
C-ROADS PORTUGAL Daniela Carvalho 11º Congresso do Comité Português da URSI Lisboa, 24/11/2017 24.11.2017 www.c-roads.eu 1 Main Objectives C-Roads Portugal consists in the deployment of 5 C- ITS macro
More informationMobile Computing Systems Lecture on
CPET 565/CPET 499 Mobile Computing Systems Lecture on Mobile Application Data, Data Requirements, Data Modeling, Data Presentation, Business Process Modeling Fall 2014 A Specialty Course for Purdue University
More informationCSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology
CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part II WiFi vs 802.11 IEEE 802.11 Features Hidden Node
More informationWardsAuto Interiors Conference Creating the Ultimate User Experience
Bitte decken Sie die schraffierte Fläche mit einem Bild ab. Please cover the shaded area with a picture. (24,4 x 11,0 cm) WardsAuto Interiors Conference Creating the Ultimate User Experience Scott Beutler,
More information3 ITS Standards Deployment and Testing Strategies
3 ITS Standards Deployment and Testing Strategies In chapter 2, this report reviewed some of the ITS deployments shaping the application of ITS Standards in New York State. These projects, and others,
More informationSecuring V2X communications with Infineon HSM
Infineon Security Partner Network Securing V2X communications with Infineon HSM Savari and Infineon The Sign of Trust for V2X Products SLI 97 www.infineon.com/ispn Use case Application context and security
More informationEfficient Authentication and Congestion Control for Vehicular Ad Hoc Network
Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network Deivanai.P 1, K.Sudha 2, K.Radha 3 Department of CSE, Muthayammal Engineering College, Rasipuram, India 1 Assistant Professor,
More informationCPET 565/CPET 499 Mobile Computing Systems Lecture on
CPET 565/CPET 499 Mobile Computing Systems Lecture on Mobile Application Data, Data Requirements, Data Modeling, Data Presentation, Business Process Modeling Fall 2012 A Specialty Course for Purdue University
More informationCommon transportation user experience through unified fundamental data definition and movement from mobile elements, to roadside, to centers.
Common transportation user experience through unified fundamental data definition and movement from mobile elements, to roadside, to centers. 1 2 The concept is to organize installations in a large region
More informationSPaT Challenge Overview and Lessons Learned
SPaT Challenge Overview and Lessons Learned Blaine Leonard, P.E. Technology & Innovation Engineer, Utah DOT AASHTO CTSO Technology Subcommittee Co-Chair The SPaT Challenge Challenge state and local public
More informationA Perspective on V2X in the United States
A Perspective on V2X in the United States John B. Kenney, Ph.D Director and Principal Researcher Toyota InfoTechnology Center, USA jkenney@us.toyota-itc.com November 14, 2017 SIP-adus Workshop on Connected
More informationPrecision Roadway Feature Mapping Jay A. Farrell, University of California-Riverside James A. Arnold, Department of Transportation
Precision Roadway Feature Mapping Jay A. Farrell, University of California-Riverside James A. Arnold, Department of Transportation February 26, 2013 ESRA Fed. GIS Outline: Big picture: Positioning and
More informationConnected Car. Dr. Sania Irwin. Head of Systems & Applications May 27, Nokia Solutions and Networks 2014 For internal use
Connected Car Dr. Sania Irwin Head of Systems & Applications May 27, 2015 1 Nokia Solutions and Networks 2014 For internal use Agenda Introduction Industry Landscape Industry Architecture & Implications
More informationA. SERVEL. EuCNC Special Sessions 5G connected car 01/07/2015
A. SERVEL EuCNC 2015 - Special Sessions 5G connected car 01/07/2015 Connected cars, a reality since 12 years for our customers! 2003 A Pioneer for emergency 1.6 million of equipped vehicles 2006 One of
More informationAdvanced Transportation Optimization Systems (ATOS)
Advanced Transportation Optimization Systems (ATOS) By Andrew Andrusko Undergraduate Student Student in Civil Engineering, Urban & Regional Studies, Social Studies, Geography, Geology Programs Minnesota
More informationConfiguring SSL. SSL Overview CHAPTER
CHAPTER 8 Date: 4/23/09 This topic describes the steps required to configure your ACE (both the ACE module and the ACE appliance) as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination.
More informationConfiguring SSL. SSL Overview CHAPTER
7 CHAPTER This topic describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section are:
More informationCOOPERATIVE ITS SECURITY STANDARDIZATION AND ACTIVITIES ON EUROPEAN C ITS TRUST MODEL AND POLICY
COOPERATIVE ITS SECURITY STANDARDIZATION AND ACTIVITIES ON EUROPEAN C ITS TRUST MODEL AND POLICY ETSI IoT Security WORKSHOP, 13 15 June 2016 Brigitte LONC, RENAULT ETSI TC ITS WG 5 Chairman ETSI 2016.
More informationDSRC Interchange Details
DSRC Interchange Details P. Roka, May 1, 2011 This document explains data exchange between DSRC modules. DSRC modules are herein referred to as hardware and software enabled with wireless connectivity
More informationApplying Lessons Learned to V2X Communications for China
Jim Misener Director, Technical Standards Qualcomm Technologies, Inc. Applying Lessons Learned to V2X Communications for China 2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All
More informationThe following Jefferson Telephone Company disclosures are in reference to the FCC Open Internet Rules.
The following Jefferson Telephone Company disclosures are in reference to the FCC Open Internet Rules. Service Offerings Jefferson Telephone Company via the Jefferson Telephone Company brand directly offers
More informationElectrification of Mobility
Electrification of Mobility Moderator: Andreas Schafer, Cambridge University and Stanford University Panelists: Mary Nickerson, Toyota Ed Kjaer, Southern California Edition Flavio Bonomi, Cisco Systems
More informationSimulation, prototyping and verification of standards-based wireless communications
Simulation, prototyping and verification of standards-based wireless communications Colin McGuire, Neil MacEwen 2015 The MathWorks, Inc. 1 Real Time LTE Cell Scanner with MATLAB and Simulink 2 Real time
More informationGarmin DriveAssist 50. Owner s Manual
Garmin DriveAssist 50 Owner s Manual 2015 Garmin Ltd. or its subsidiaries All rights reserved. Under the copyright laws, this manual may not be copied, in whole or in part, without the written consent
More informationDistracted Driving: Avoid Becoming A Statistic
Distracted Driving: Avoid Becoming A Statistic Distracted Driving Statistics In 2015 3,477 people killed in crashes involving driver distraction (10% of total fatalities). (NHTSA) 391,000 injuries in crashes
More informationUpdating NTCIP 1202 (Actuated Signal Controllers) to Support a Connected Vehicle Environment. Authors
Updating NTCIP 1202 (Actuated Signal Controllers) to Support a Connected Vehicle Environment Jean Johnson NEMA 1300 North 17 th Street, Suite 900 Rosslyn, VA 22209 (703) 841-3226 jean.johnson@nema.org
More informationSmartway Project. Hiroshi MAKINO. SS26, 12 th ITS World Congress in San Francisco. National Institute for Land and Infrastructure Management, Japan
Smartway Project SS26, 12 th ITS World Congress in San Francisco National Institute for Land and Infrastructure Management, Japan Hiroshi MAKINO 0 1. Smartway Project 1) ITS Enter the Second Stage August
More informationCohda Wireless White Paper Mobility and Multipath: Challenges for DSRC
Cohda Wireless White Paper Mobility and Multipath: Challenges for DSRC Copyright Cohda Wireless Pty Ltd ABN 84 107 936 309 Cohda Wireless Pty Ltd 82-84 Melbourne Street North Adelaide, SA 5006 Australia
More informationOut of the Fog: Use Case Scenarios. Industry. Smart Cities. Visual Security & Surveillance. Application
Out of the Fog: Use Case Scenarios Industry Application Smart Cities Visual Security & Surveillance 0 Executive Summary Surveillance and security cameras are being deployed worldwide in record numbers
More informationVANETs. Marc Torrent-Moreno, Prof. Hannes Hartenstein Decentralized Systems and Network Services Institute for Telematics, University of Karlsruhe
VANETs Marc Torrent-Moreno, Prof. Hannes Hartenstein Decentralized Systems and Network Services Institute for Telematics, University of Karlsruhe April 15 th 2005 Marc Torrent Moreno 1 Main Motivation
More informationConfiguring SSL CHAPTER
7 CHAPTER This chapter describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section
More informationIntelligent Transportation Systems (ITS) for Critical Infrastructure Protection
Intelligent Transportation Systems (ITS) for Critical Infrastructure Protection Presented at the Transportation Research Board January 2002 Annual Meeting Washington DC, USA HAMED BENOUAR Executive Director
More informationVEHICLE INFRASTRUCTURE INTEGRATION (VII) VII Architecture and Functional Requirements. Version 1.0
VEHICLE INFRASTRUCTURE INTEGRATION () Architecture and Functional Requirements Version 1.0 April 12, 2005 ITS Joint Program Office US Department of Transportation VEHICLE INFRASTRUCTURE INTEGRATION ()
More informationSichere Intelligente Mobilität - Testfeld Deutschland. Safe Intelligent Mobility Field Test Germany
Sichere Intelligente Mobilität Testfeld Deutschland Safe Intelligent Mobility Field Test Germany The German Approach to Field Testing of Cooperative Systems Dr. Christian Weiß Daimler AG Group Research
More informationIntroduction to Cyber Security Issues for Transportation
Introduction to Cyber Security Issues for Transportation T3 Webinar December 7, 2011 Michael G. Dinning Cyber Security is One of the Most Serious Potential Risks in Transportation Increasing dependence
More informationSichere Intelligente Mobilität - Testfeld Deutschland. Safe Intelligent Mobility Field Test Germany
1 Sichere Intelligente Mobilität Testfeld Deutschland Safe Intelligent Mobility Field Test Germany The German Approach to Field Testing of Cooperative Systems Matthias Schulze Daimler AG Group Research
More informationSecure Product Design Lifecycle for Connected Vehicles
Secure Product Design Lifecycle for Connected Vehicles Lisa Boran Vehicle Cybersecurity Manager, Ford Motor Company SAE J3061 Chair SAE/ISO Cybersecurity Engineering Chair AGENDA Cybersecurity Standards
More informationThird public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy
Third public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy 14 February 2017 Amsterdam Gerhard Menzel European Commission - DG MOVE Scope:
More informationUSDOT CONNECTED VEHICLE PILOT. ITS Midwest 2017 September 19, 2017
USDOT CONNECTED VEHICLE PILOT ITS Midwest 2017 September 19, 2017 LESSONS LEARNED FROM PILOTS 2007 USDOT Test Bed, Oakland Co. MI 2008 Telegraph Road, Oakland Co. MI 2011 World Congress, Orlando FL 2011
More informationUFTI DSRC and Other Communication Options for Transportation Connectivity Workshop. Overview of DSRC Messages and Performance Requirements
UFTI DSRC and Other Communication Options for Transportation Connectivity Workshop Overview of DSRC Messages and Performance Requirements Frank Perry Sr. Connected and Autonomous Vehicle Program Manager
More informationDocument Cloud (including Adobe Sign) Additional Terms of Use. Last updated June 5, Replaces all prior versions.
Document Cloud (including Adobe Sign) Additional Terms of Use Last updated June 5, 2018. Replaces all prior versions. These Additional Terms govern your use of Document Cloud (including Adobe Sign) and
More informationDevice-to-device Communication
COMP9336/4336 Mobile Data Networking www.cse.unsw.edu.au/~cs9336 or ~cs4336 Device-to-device Communication 1 Lecture overview There is a growing need and motivation for devices to communicate with other
More informationNCHRP Project Impacts of Connected Vehicles and Automated Vehicles on State and Local Transportation Agencies
NCHRP Project 20-102 Impacts of Connected Vehicles and Automated Vehicles on State and Local Transportation Agencies Announcement of New Tasks, August 2016 The National Cooperative Highway Research Program
More informationIntroduction to Vehicular Networks
CS 795/895 Vehicular Networks Introduction to Vehicular Networks Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/courses/cs795-s07/
More informationCreate Decryption Policies to Control HTTPS Traffic
Create Decryption Policies to Control HTTPS Traffic This chapter contains the following sections: Overview of Create Decryption Policies to Control HTTPS Traffic, page 1 Managing HTTPS Traffic through
More informationEmerging Connected Vehicle based
Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control Qi Alfred Chen, Yucheng Yin, Yiheng Feng, Z. Morley Mao, Henry X. Liu Presented by Sezana Fahmida Outline Introduction
More informationRF and Antenna Consideration
RF and Antenna Consideration for Connected Cars in 5G ecosystem Seungpyo Hong Network R&D Center, SK Telecom 28 June 2016 Contents Introduction Vehicle Communication Services and use cases Roadmap 5G technology
More informationTurbocharging Connectivity Beyond Cellular
Bitte decken Sie die schraffierte Fläche mit einem Bild ab. Please cover the shaded area with a picture. (24,4 x 11,0 cm) Turbocharging Connectivity Beyond Cellular Scott Beutler, Head of Interior Division
More information7th ICG Meeting, Beijing
Location Assurance Service Provider 06/11/2012 itrust consulting s.à r.l. Tel: +352 26 176 212 6 Z.I. Bombicht Fax: +352 26 710 978 L-6947 Niederanven Web: www.itrust.lu 7th ICG Meeting, Beijing Introduction
More informationTesting for ITS Communications
Testing for ITS Communications Document HTG3-2 Version: 2012-11-12 EU-US ITS Task Force Standards Harmonization Working Group Harmonization Task Group 3 Testing for ITS Communications page 2 Table of Contents
More informationReducing Message Loss in DSRC Networks using Dynamic Distribution of Safety Messages over EDCA Access Categories
, October 21-23, 215, San Francisco, USA Reducing Message Loss in DSRC Networks using Dynamic Distribution of Safety Messages over EDCA Access Categories Mohammad A. Alsmirat, Saleh Yousef Al-Rifai, and
More informationTap this button on your iphone to start the TomTom app.
TomTom app 1. Getting started Getting started Tap this button on your iphone to start the TomTom app. The language used for buttons and menus in the TomTom app is the same as the language you selected
More informationPlanning for Connectivity in a Maturing Connected Environment
Planning for Connectivity in a Maturing Connected Environment Presented by Tom Timcho OTEC 2017 10/11/17 What is Connectivity? Vehicles talking to Vehicles (V2V) Vehicles talking to Infrastructure (V2I)
More informationPioneer Communications Internet Services Disclosure
Pioneer Communications Internet Services Disclosure Pioneer Communications ( Pioneer ) is the leading Internet service provider for Southwest Kansas communities with a reputation for excellence that goes
More informationISSN: [Garade* et al., 6(1): January, 2017] Impact Factor: 4.116
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY FULLY REUSED VLSI ARCHITECTURE OF DSRC ENCODERS USING SOLS TECHNIQUE Supriya Shivaji Garade*, Prof. P. R. Badadapure * Department
More informationSatGuide Symbian User Manual. SatGuide Symbian OS USER MANUAL
SatGuide Symbian User Manual SatGuide Symbian OS USER MANUAL CONTENTS 1 - INTRODUCTION...1 WHAT IS SATGUIDE?...1 SATGUIDE FEATURES...1 2 - SMART PRACTICES WHILE DRIVING...2 DRIVE SAFE, CALL SMART SM...2
More informationcongestion energy & environment accessibility aging infrastructure
Living with and loving transportation technologies Dan Work Assistant Professor, Civil and Environmental Engineering, Coordinated Science Laboratory, and Electrical and Computer Engineering (courtesy)
More informationHybrid Communication in Cooperative ITS
Hybrid Communication in Cooperative ITS Our approach to connected vehicles From vehicles & roads to cross-domain operations Friedhelm Ramme Principal Consultant Ericsson Global Competence Hub Content Ericsson
More informationNetwork Connectivity and Mobility
Network Connectivity and Mobility BSAD 141 Dave Novak Topics Covered Lecture is structured based on the five elements of creating a connected world from the text book (with additional content) 1. Network
More informationMobile Communications for Transit
Mobile Communications for Transit Barry Einsig Chair APTA Wireless Communications Subcommittee Chair Joint Council on Transit Wireless Communications and Market Director Harris Corporation, Washington,
More informationProtection Against DDOS Using Secure Code Propagation In The VANETs
Protection Against DDOS Using Secure Code Propagation In The VANETs Mandeep Kaur, Manish Mahajan Mandeepcheema6@gmail.com,cgccoe.hodcse@gmail.com ABSTRACT--VANETs are the vehicular networks used to connect
More informationChapter 9. Vehicle to Infrastructure interaction (V2I)
Prev Chapter 9. Vehicle to Infrastructure interaction (V2I) Next Chapter 9. Vehicle to Infrastructure interaction (V2I) Table of Contents 9.1. Architecture 9.2. Wireless Technologies 9.2.1. DSRC 9.2.2.
More information