A V2X Message Evaluation Methodology and Cross- Domain Modeling of Safety Applications in V2Xenabled E/E- Architectures

Similar documents
ENSC 427, Spring 2012

Intelligent Transportation Systems. Wireless Access for Vehicular Environments (WAVE) Engin Karabulut Kocaeli Üniversitesi,2014

The WAVE Communications Stack: IEEE p, and, September, 2007

ITS Standardization. Oyunchimeg Shagdar, Inria Thierry Ernst, Mines Paris Tech

DSRC - WAVE. VITMMA10 Okos város MSc mellékspecializáció. Simon Csaba

Vehicular Networking

Vehicle Networks. V2X communication protocols. Univ.-Prof. Dr. Thomas Strang, Dipl.-Inform. Matthias Röckl

Dedicated Short Range Communication: What, Why and How?

Improving Parallel MPSoC Simulation Performance by Exploiting Dynamic Routing Delay Prediction

UAV Management System

Vehicle Connectivity in Intelligent Transport Systems: Today and Future Prof. Dr. Ece Güran Schmidt - Middle East Technical University

LTE and IEEE802.p for vehicular networking: a performance evaluation

Turbocharging Connectivity Beyond Cellular

A Perspective on V2X in the United States

ETSI G5 technology: the European approach. Date: 13 th June 2013 Name: Lan LIN Position: Senior Researcher Organisation: Hitachi Europe SAS.

VANETs. Marc Torrent-Moreno, Prof. Hannes Hartenstein Decentralized Systems and Network Services Institute for Telematics, University of Karlsruhe

KPIT S Connected Vehicle Practice

VANET Protocols DSRC, WAVE, IEEE 1609, IEEE p, Priority

Smart Highway 를위한차량통신프로토콜 표준화동향

Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur

To realize Connected Vehicle Society. Yosuke NISHIMURO Ministry of Internal Affairs and Communications (MIC), Japan

Giancarlo Vasta, Magneti Marelli, Lucia Lo Bello, University of Catania,

WardsAuto Interiors Conference Creating the Ultimate User Experience

VANETs. When applications drive communications. Institute of Telematics, University of Karlsruhe. Decentralized Systems and Network Services

Vehicle Safety Communications Project Final Overview

V2V and V2I Communication. 건국대학교 MBC Lab

V2X: Beyond the Horizon. IBTTA AET Meeting July 18, 2017

Enhancement of CoAP Packet Delivery Performance for Internet of Things. Hang Liu

CVIS. CVIS Chief Architect Dallas 14. November 2006

Service announcement using IEEE WAVE Service Advertisement as a model

Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs

CAMP VSC3 Model Deployment DSRC Device Minimum Performance Requirements Overview

5G LAB GERMANY. 5G Impact and Challenges for the Future of Transportation

Vehicular Ad Hoc Networking - Overview

Pedestrian Collision Avoidance in Vehicular Networks

Developing deterministic networking technology for railway applications using TTEthernet software-based end systems

Detecting abnormality in vehicle immediately and providing the information surely in vehicle. Control vehicle remotely in real time by operating the v

Assessing Mission-critical Vehicular Safety Applications under Various Network Conditions

Now, Near and Far: The Case For CV2X. Don Butler Executive Director Connected Vehicle Platform and Product Ford Motor Company.

SIP Automated driving systems

C2X Security. Introduction and overview (focus to European standard only) Cryptovision s Mindshare V

Future Implications for the Vehicle When Considering the Internet of Things (IoT)

Hybrid Communication. CODECS Workshop / May 19, 2017 Karsten Roscher, Fraunhofer ESK Enrique Onieva, Deusto

Comparing LIMERIC and DCC approaches for VANET Channel Congestion Control

Operating Systems, Concurrency and Time. real-time communication and CAN. Johan Lukkien

Accelerating solutions for highway safety, renewal, reliability, and capacity. Connected Vehicles and the Future of Transportation

5G Journey: Path Forward

Medium Access Protocols for Cooperative Collision Avoidance in Vehicular Ad-Hoc Networks

Analyzing Routing Protocols Performance in VANET Using p and g

ITS 5C Summit. Operationalizing Connected Vehicle Services

A Performance Study of Cooperative Awareness in ETSI ITS G5 and IEEE WAVE

Intrusion Detection Adapted for Automotive Challenges for Hardware - An Implementation Example

The ZigBee Architecture An Introduction

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

A Simulation Framework for V2V Wireless Systems

Cooperative Vehicles Opportunity and Challenges

Delivering Voice over IEEE WLAN Networks

Comparing LIMERIC and DCC Approaches for VANET Channel Congestion Control

An Encapsulated Communication System for Integrated Architectures

Industry 4.0 & Transport for Digital Infrastructure

Multi-hop Data Transportation with WSM Protocol in Vehicular Ad-hoc Network

The Challenges of Robust Inter-Vehicle Communications

DSRC Field Trials Whitepaper

TomTom Innovation. Hans Aerts VP Software Development Business Unit Automotive November 2015

Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network

CANoe.Car2x. Product Information

Analysis and Design of Effective and Low-Overhead Transmission Power Control for VANETs

RAN slicing as enabler for low latency services

Heterogeneous V2X Networks for Connected and Automated Vehicles

Schedule Integration for Time-Triggered Systems

Introduction to Vehicular Wireless Networks Overview

Introduction to Vehicular Wireless Networks

IOT FLAGSHIP PROJECT. Dr. Mario Drobics, AIT

A Low Latency Data Transmission Scheme for Smart Grid Condition Monitoring Applications 28/05/2012

BUILDING A PLAN FOR DEPLOYMENT

Networking for Connected Vehicles : Prospects & Challenges

10 th AUTOSAR Open Conference

Spectrum for Intelligent Transport Systems

IoT CoAP Plugtests & Workshop Nov 27, 2012 Sophia Antipolis

UFTI DSRC and Other Communication Options for Transportation Connectivity Workshop. Overview of DSRC Messages and Performance Requirements

An Integrated Framework for Fog Communications and Computing in Internet of Vehicles

V2X Communications for Autonomous Driving Roadmap for WiF-V2X and Cellular-V2X. Jérôme Härri IEEE Vehicular Networking Conference November 27 th 2017

Introduction to Mobile Ad hoc Networks (MANETs)

AFTER a decade of vehicular networking research [1]

Roberto Brignolo The SAFESPOT Integrated Project: Overview of the architecture, technologies and applications

... 即時控制系統設計 Design of Real-Time Control Systems. Real-Time Control Systems. Lecture 32 Introduction to Networked Control Systems.

Cohda Wireless White Paper DSRC Field Trials

Outline. TWR Module. Different Wireless Protocols. Section 7. Wireless Communication. Wireless Communication with

COOPERATIVE ITS SECURITY STANDARDIZATION AND ACTIVITIES ON EUROPEAN C ITS TRUST MODEL AND POLICY

Functional Safety Architectural Challenges for Autonomous Drive

Sichere Intelligente Mobilität - Testfeld Deutschland. Safe Intelligent Mobility Field Test Germany

Organic Self-organizing Bus-based Communication Systems

Driving virtual Prototyping of Automotive Electronics

Data Dissemination in Ad Hoc Networks Based on Inter-Vehicle Communication

Requirements Analysis of IP and MAC Protocols for Dedicated Short Range Communications (DSRC)

DASH7 ALLIANCE PROTOCOL - WHERE RFID MEETS WSN. public

Accelerating solutions for highway safety, renewal, reliability, and capacity. Future of Transportation

Standards for V2X Communication and Implications for OEMs and ITS

Observations on OMNeT++ Real-Time Behaviour

Connected Car. Dr. Sania Irwin. Head of Systems & Applications May 27, Nokia Solutions and Networks 2014 For internal use

Transcription:

A V2X Message Evaluation Methodology and Cross- Domain Modeling of Safety Applications in V2Xenabled E/E- Architectures Harald Bucher, Marius-Florin Buciuman, Alexander Klimm, Oliver Sander, Jürgen Becker KIT University of the State of Baden-Wuerttemberg and National Research Center of the Helmholtz Association www.kit.edu

Outline Motivation & Challenges Fundamentals Heterogeneous Co-Simulation Tool-Chain V2X Message Evaluation Methodology System Design Cluster-based Message Evaluation Strategy Cost Functions and Acceptance Policies Network Monitoring and Evaluation Case Studies: Cross-Domain CACC Evaluation Scenario I - Plattoon Turnaround: Message Savings Scenario II - CACC Verification 2 26.08.2015 Summary & Outlook H. Bucher A V2X Message Evaluation Methodology and Cross-Domain

Motivation Communication between vehicles as well as infrastructure and environment (V2X Communication) Enlargement of information exchange area beyond line of sight by cooperative applications Enhancement of Efficiency Traffic Flow Management Energy Usage Energy Preservation Increasing Vehicle Safety Collision Warning Adaptive Cruise Control Traffic Jam Warning all-electronics.de 3 26.08.2015 H. Bucher A V2X Message Evaluation Methodology and Cross-Domain

Challenges Smart Traffic Internet based Services V2X-Interface Smart City V2X-Interface Sensors ECUs Actuators Sensors ECUs Actuators Challenge I: How to holistically model and simulate V2X processing and communication chain? Challenge II: How to cope with heavy incoming data traffic (up to 2500 Msg/s*) in E/E Architecture and (real-time) safety applications? 4 26.08.2015 * B. Glas et al., Car-to-car communication security on recongurable hardware," in VTC Spring'09, 2009.

Fundamentals V2X Communication Vehicles regularly broadcasting their state as beacons or SAE Basic Safety Message (BSM) at 2-10Hz New Protocol and Message Type with minimized protocol overhead optimized for V2X and safety applications PHY & MAC based on ordinary Wi-Fi with some extensions One Control Channel (CCH) for Safety Messages and Beacons 4-6 Service Channels for non-safety traffic IEEE WAVE Short Message Protocol (WSMP) IEEE WAVE Short Message (WSM) contains Service Identifier (PSID) Priority Channel Number Receiver Address Payload (e.g. BSM) Security Management Plane WME (1609.3) Safety Application Sublayer Message Sublayer (SAE J2735) WSMP (1609.3) Security (1609.2) Data Plane LLC Sublayer (802.2) Application Layer Transport Layer TCP/UPD Network Layer IPv6 MLME Ext. (1609.4) MLME (802.11) MAC Extension Multichannel Coordination (1609.4) MAC Sublayer (802.11p) PLME (802.11) PHY (802.11p) 5 26.08.2015 H. Bucher A V2X Message Evaluation Methodology and Cross-Domain

Solution Challenge I: Heterogeneous Co- Simulation Tool-Chain* Framework based on Ptolemy II as central heterogeneous manager tool and High-Level Architecture (HLA) as simulation backbone Used for Case Studies Traffic Simulation Coop. Adaptive Cruise Control (CACC) App Residual E/E Architecture Simulation C2X Network Simulation 6 26.08.2015 * C. Roth, H. Bucher et al., A Simulation Tool Chain for Investigating Future V2X-based Automotive E/E Architectures," in Embedded Real Time Software and Systems (ERTS²), 7th European Congress on, Feb. 2014, pp. 1739-1748.

Solution Challenge II: Proposed V2X Message Evaluation Methodology for Safety Applications Goal: Reduce internal E/E processing efforts and network traffic by discarding irrelevant V2X messages Idea WAVE compliant methodology Needs only beacon s WSM header and payload data for evaluation Cluster-based evaluation reduces evaluation complexity Adaptive Acceptance Policies based on network and vehicle state monitoring 7 26.08.2015 H. Bucher A V2X Message Evaluation Methodology and Cross-Domain

V2X Message Evaluation System Design Intelligent Gateway inside V2X ECU for evaluation based on incoming beacons as well as local sensor data and network/vehicle state monitoring WAVE 802.11p V2X ECU... from WSM Ch. Monitor 7 Channel/Bus Evaluation from E/E Network Monitor DSRC/WAVE Interface WSM Message Evaluation App Data Sensor/GPS Data E/E Architecture Interface WSM Forwarding WSM WSM Scheduler App Msg 8 26.08.2015 H. Bucher A V2X Message Evaluation Methodology and Cross-Domain

Cluster-based V2X Message Evaluation Create virtual traffic view Classification into Farfield and Nearfield Networks (FFN / NFN) Vehicles within NF range are potentially safety-critical Vehicles outside NF range are clustered FF Master/Slave with own NF range (First-Come-First-Serve) inherent prefiltering of slaves Weighting of relations between nodes (vehicles) with costfunctions Generic FF function individual application-specific nearfield functions Farfield (FF)- Cluster 1 4 0 0 3 5 5 6 7 C 1,0 APP 8 1 3 FF Graph C 1,5 FF 1 NF Graph 1 11 2 APP C 1,3 10 C 1,10 FF Nearfield (NF)-Cluster Legend Vehicle with Msg Eval Cluster-Master Cluster-Slave FF-Cluster 2 10 9 C 1,2 APP 2 12 9 26.08.2015 H. Bucher A V2X Message Evaluation Methodology and Cross-Domain

Refined Cluster-based V2X Message Evaluation System NF and FF Stage composed of Static Filter Unit Dynamic Data Fusion Unit Filter Unit Compares current Acceptance Policies with incoming WSM data Data Fusion Unit Determines Acceptance Policies based on network monitoring and vehicle state Forwards incoming event-driven WSMs based on PSID Calculates cost functions C FF and C NF(CACC) Periodic forwarding of most relevant NF data frames to destination application (in this work CACC) WSM Sensor GPS WSM WSM Data Fusion Filter Message Evaluation WSM Forwarding Bus Eval Bus Eval Farfield Evaluation Stage WSM Bus Eval Sensor GPS WSM Sensor/GPS Data WSM Forwarding Data Fusion Filter App Data Sensor/GPS Data Bus Eval Bus Eval Nearfield Evaluation Stage Periodic Data Frame 10 26.08.2015 H. Bucher A V2X Message Evaluation Methodology and Cross-Domain

Hybrid Clustering and Hierarchical Evaluation Strategy Procedure Update FF/NF Node: Updates mobility information between local vehicle v i and remote vehicle v j and calculates cost functions C i, j FF j FFN and C i, j CACC j NFN, j i Update FF/NF Accpetance Policy: Update Acceptance Policies A FF and A NF based on cost function and vehicle state as well as network utilization Farfield Eval Stage Nearfield Eval Stage FF Acceptance Policy OK NF Acceptance Policy OK yes yes yes no yes Discard WSM WSM in NF Area no New Cluster Entry (ID) yes WSM covered by FF Clusters no New Cluster Master Entry no Update Cluster Master Update FF Acceptance Policy New Sensor/GPS Data Polling no Update NF Node Update NF Acceptance Policy New Cluster Entry (ID) yes New NF Node Entry no Discard WSM New WSM 11 26.08.2015 H. Bucher A V2X Message Evaluation Methodology and Cross-Domain

Cost Functions and Acceptance Policy Sets FF cost function detects hot-spots and serves as premature warning C FF i,j = a compdrivedir + b psideval + c normdistance + d comprelpos, a = c = 0.1, b = 0.5, d = 0.3 and a + b + c + d = 1.0 NF cost function for detection of the leading vehicle for CACC app. CACC Frame Rate λ CACC = 10Hz C CACC i,j = compdrivedir normdistance comprelpos, [0.0,1.0] Individual strong and weak Acceptance Policies for FF and NF A FF = {ID, psid, prio, age, range} A NF = {prio, age, range} 12 26.08.2015 H. Bucher A V2X Message Evaluation Methodology and Cross-Domain

Acceptance Policy Adjustments A FF are mainly determined by Driving State FSM highway [speed > (speed th + δ speed )] [speed (speed th - δ speed )] city [C max FF C th NU wsm == restricted] danger [C max FF C th NU wsm == restricted] [C max FF C th NU wsm == restricted] [C max FF < (C th - δ C ) NU wsm!= restricted] relaxation [speed > (speed th + δ speed )] [speed (speed th - δ speed )] A NF must not depend on FSM but mainly on internal network utilization (NU) because of the prefiltering in FF stage High network utilization results in strong policies in order to relax internal network traffic for safety critical applications 13 26.08.2015 H. Bucher A V2X Message Evaluation Methodology and Cross-Domain

Network Monitoring and Evaluation Protocol independent metric for monitoring Based on byte-rate B wsm, B ee measured over time interval T and nominal byte-rate N wsm, N ee Activity relaxed active1 active2 active3 active4 active5 restricted Smoothed linearly* NU x τ = 0.5 NU x τ 1 + 0.5 B x N x, x = {wsm, ee} Discretized into 7 NU activity states* 7 6 5 4 3 2 1 0% NU min =15% 20% 25% 30% 35% 40%=NU max NU 14 26.08.2015 * Intelligent Transport Systems (ITS); De-centralized Congestion Control Mechanisms for Intelligent Transport Systems operating in the 5 GHz range; Access layer part," ETSI TS 102 687 V1.1.1, Jul. 2011.

Case Study: Cross-Domain CACC Evaluation Simulation Setup Plattoon following scenario Approaching intersections every 200m OMNeT++ Transmit Power: 20 dbm WSM Channel: CCH WSM Bitrate N wsm = 6 Mbps Beacon Rate: 10Hz SUMO Vehicles: 30 Max. Speed: ~50 km/h Mobility Update Rate: 10Hz Message Evaluation (Ptolemy) Sensor Update Rate: 10Hz N ee = 500kbps CACC Frame Rate λ CACC = 10Hz Acceptance Policies: cp. Table 1 Table 1: Acceptance Policy Specification A FF weak strong PSID all safety related prio all prio(bsm) range (x,y,z) 300m 150m age 1.0s 0.5s A NF weak strong prio all prio(bsm) range (x,y,z) 300m 100m age 0.5s 0.2s 15 26.08.2015 H. Bucher A V2X Message Evaluation Methodology and Cross-Domain Modelling of Safety Applications in V2X-enabled E/E-Architectures

speed [m/s] position (x) [m] Results Scenario I: Plattoon Turnaround 14 speed leader speed local 450 400 posx leader posx local 12 10 350 300 250 8 200 6 150 4 100 2 50 0 10 20 30 40 50 60 70 Time [s] 0 10 20 30 40 50 60 70 Time [s] 16 26.08.2015 H. Bucher A V2X Message Evaluation Methodology and Cross-Domain

# Messages Results Scenario I: Plattoon Turnaround 600 # Total Received Messages # Messages after FF Eval # Messages after NF Eval 500 400 300 200 100 0 12 16 20 24 28 32 36 40 44 48 52 56 60 64 68 Time [s] Message Saving after FF Eval: Max. 69,3% and 37,0% in average Overall Message Saving after NF Eval: Max. 96,6% and 92,7% in average 17 26.08.2015 H. Bucher A V2X Message Evaluation Methodology and Cross-Domain

speed [m/s] Results Scenario II: CACC Verification Broke down leading vehicle after 30s Event-Driven warning with PSID 0x8005 sent out strong A FF Modeled worst case reception latency per beacon inside E/E architecture model: 10ms* Comparison of CACC behavior w/ and w/o Message Evaluation 14 speed leader speed local w/o msg eval speed local with msg eval 12 10 8 6 4 2 0 10 15 20 25 30 35 40 45 50 Time [s] 18 26.08.2015 * SAE Standard for Dedicated Short Range Communications (DSRC) Message Set Dictionary, SAE Std J2735, Nov. 2009.

Example Simulation Snapshot 9 6 3 2 1 0 19 26.08.2015 H. Bucher A V2X Message Evaluation Methodology and Cross-Domain

Summary Presentation of a WAVE compliant V2X Message Evaluation Methodology Hierarchical vehicle clustering strategy Vehicle and network (internal/external) state monitoring (Cost Functions) Adaptive Acceptance Policies Modeled inside V2X ECU together with abstract E/E architecture components reducing internal network traffic and message processing efforts Model-based cross-domain evaluation of CACC application with co-simulation framework Taking into account internal processing and communication latencies Enables early and deterministic exploration and evaluation of (abstract) E/E architectures in V2X scenarios Significant reduction of V2X messages need to be processed during run-time 92.7% in average in reverse traffic scenario Accident-free CACC behavior in case of worst-case WSM latencies and broke down leading vehicle 20 26.08.2015 H. Bucher A V2X Message Evaluation Methodology and Cross-Domain

Outlook Investigation of more complex traffic scenarios Deeper analysis of acceptance policies Analysis of power/energy consumption reduction of signature verification modules by the approach Implementing the approach on real target platforms Validation of the approach and CACC scenario by means of robot prototypes 21 26.08.2015 H. Bucher A V2X Message Evaluation Methodology and Cross-Domain

Thank you very much for your attention! 22 26.08.2015 H. Bucher A V2X Message Evaluation Methodology and Cross-Domain