Details

Vehicle Safety Communications


Vehicle Safety Communications

Protocols, Security, and Privacy
Information and Communication Technology Series, Band 103 1. Aufl.

from: Tao Zhang, Luca Delgrossi

107,99 €

Publisher: Wiley
Format PDF
Published: 05.09.2012
ISBN/EAN: 9781118452219
Language: englisch
Number of pages: 400

DRM-protected eBook; you will need Adobe Digital Editions and an Adobe ID to read it.

Descriptions

<p><b>Provides an up-to-date, in-depth look at the current research, design, and implementation of cooperative vehicle safety communication protocols and technology</b></p> <p>Improving traffic safety has been a top concern for transportation agencies around the world and the focus of heavy research and development efforts sponsored by both governments and private industries. Cooperative vehicle systems—which use sensors and wireless technologies to reduce traffic accidents—can play a major role in making the world's roads safer.</p> <p><i>Vehicle Safety Communications: Protocols, Security, and Privacy</i> describes fundamental issues in cooperative vehicle safety and recent advances in technologies for enabling cooperative vehicle safety. It gives an overview of traditional vehicle safety issues, the evolution of vehicle safety technologies, and the need for cooperative systems where vehicles work together to reduce the number of crashes or mitigate damage when crashes become unavoidable.</p> <p>Authored by two top industry professionals, the book:</p> <ul> <li>Summarizes the history and current status of 5.9 GHz Dedicated Short Range Communications (DSRC) technology and standardization, discussing key issues in applying DSRC to support cooperative vehicle safety</li> <li>Features an in-depth overview of on-board equipment (OBE) and roadside equipment (RSE) by describing sample designs to illustrate the key issues and potential solutions</li> <li>Takes on security and privacy protection requirements and challenges, including how to design privacy-preserving digital certificate management systems and how to evict misbehaving vehicles</li> <li>Includes coverage of vehicle-to-infrastructure (V2I) communications like intersection collision avoidance applications and vehicle-to-vehicle (V2V) communications like extended electronic brake lights and intersection movement assist</li> </ul> <p><i>Vehicle Safety Communications</i> is ideal for anyone working in the areas of—or studying—cooperative vehicle safety and vehicle communications.</p>
<p>Foreword xv<br /> <i>Ralf G. Herrtwich</i></p> <p>Foreword xvii<br /> <i>Flavio Bonomi</i></p> <p>Foreword xix<br /> <i>Adam Drobot</i></p> <p>Preface xxi</p> <p>Acknowledgments xxv</p> <p><b>1 Traffic Safety 1</b></p> <p>1.1 Traffic Safety Facts 1</p> <p>1.1.1 Fatalities 2</p> <p>1.1.2 Leading Causes of Crashes 3</p> <p>1.1.3 Current Trends 5</p> <p>1.2 European Union 5</p> <p>1.3 Japan 7</p> <p>1.4 Developing Countries 7</p> <p>References 8</p> <p><b>2 Automotive Safety Evolution 10</b></p> <p>2.1 Passive Safety 10</p> <p>2.1.1 Safety Cage and the Birth of Passive Safety 10</p> <p>2.1.2 Seat Belts 11</p> <p>2.1.3 Air Bags 11</p> <p>2.2 Active Safety 12</p> <p>2.2.1 Antilock Braking System 12</p> <p>2.2.2 Electronic Stability Control 13</p> <p>2.2.3 Brake Assist 13</p> <p>2.3 Advanced Driver Assistance Systems 14</p> <p>2.3.1 Adaptive Cruise Control 15</p> <p>2.3.2 Blind Spot Assist 16</p> <p>2.3.3 Attention Assist 16</p> <p>2.3.4 Precrash Systems 16</p> <p>2.4 Cooperative Safety 17</p> <p>References 18</p> <p><b>3 Vehicle Architectures 20</b></p> <p>3.1 Electronic Control Units 20</p> <p>3.2 Vehicle Sensors 21</p> <p>3.2.1 Radars 21</p> <p>3.2.2 Cameras 21</p> <p>3.3 Onboard Communication Networks 22</p> <p>3.3.1 Controller Area Network 23</p> <p>3.3.2 Local Interconnect Network 23</p> <p>3.3.3 FlexRay 24</p> <p>3.3.4 Media Oriented Systems Transport 24</p> <p>3.3.5 Onboard Diagnostics 24</p> <p>3.4 Vehicle Data 25</p> <p>3.5 Vehicle Data Security 26</p> <p>3.6 Vehicle Positioning 27</p> <p>3.6.1 Global Positioning System 27</p> <p>3.6.2 Galileo 29</p> <p>3.6.3 Global Navigation Satellite System 29</p> <p>3.6.4 Positioning Accuracy 30</p> <p>References 30</p> <p><b>4 Connected Vehicles 32</b></p> <p>4.1 Connected Vehicle Applications 32</p> <p>4.1.1 Hard Safety Applications 32</p> <p>4.1.2 Soft Safety Applications 33</p> <p>4.1.3 Mobility and Convenience Applications 33</p> <p>4.2 Uniqueness in Consumer Vehicle Networks 34</p> <p>4.3 Vehicle Communication Modes 36</p> <p>4.3.1 Vehicle-to-Vehicle Local Broadcast 36</p> <p>4.3.2 V2V Multihop Message Dissemination 37</p> <p>4.3.3 Infrastructure-to-Vehicle Local Broadcast 38</p> <p>4.3.4 Vehicle-to-Infrastructure Bidirectional Communications 39</p> <p>4.4 Wireless Communications Technology for Vehicles 39</p> <p>References 42</p> <p><b>5 Dedicated Short-Range Communications 44</b></p> <p>5.1 The 5.9 GHz Spectrum 44</p> <p>5.1.1 DSRC Frequency Band Usage 45</p> <p>5.1.2 DSRC Channels 45</p> <p>5.1.3 DSRC Operations 46</p> <p>5.2 DSRC in the European Union 46</p> <p>5.3 DSRC in Japan 47</p> <p>5.4 DSRC Standards 48</p> <p>5.4.1 Wireless Access in Vehicular Environments 48</p> <p>5.4.2 Wireless Access in Vehicular Environments Protocol Stack 48</p> <p>5.4.3 International Harmonization 50</p> <p>References 50</p> <p><b>6 WAVE Physical Layer 52</b></p> <p>6.1 Physical Layer Operations 52</p> <p>6.1.1 Orthogonal Frequency Division Multiplexing 52</p> <p>6.1.2 Modulation and Coding Rates 53</p> <p>6.1.3 Frame Reception 54</p> <p>6.2 PHY Amendments 55</p> <p>6.2.1 Channel Width 56</p> <p>6.2.2 Spectrum Masks 56</p> <p>6.2.3 Improved Receiver Performance 57</p> <p>6.3 PHY Layer Modeling 57</p> <p>6.3.1 Network Simulator Architecture 58</p> <p>6.3.2 RF Model 59</p> <p>6.3.3 Wireless PHY 61</p> <p>References 62</p> <p><b>7 WAVE Media Access Control Layer 64</b></p> <p>7.1 Media Access Control Layer Operations 64</p> <p>7.1.1 Carrier Sensing Multiple Access with Collision Avoidance 64</p> <p>7.1.2 Hidden Terminal Effects 65</p> <p>7.1.3 Basic Service Set 66</p> <p>7.2 MAC Layer Amendments 66</p> <p>7.3 MAC Layer Modeling 67</p> <p>7.3.1 Transmission 68</p> <p>7.3.2 Reception 68</p> <p>7.3.3 Channel State Manager 68</p> <p>7.3.4 Back-Off Manager 69</p> <p>7.3.5 Transmission Coordination 70</p> <p>7.3.6 Reception Coordination 71</p> <p>7.4 Overhauled ns-2 Implementation 72</p> <p>References 74</p> <p><b>8 DSRC Data Rates 75</b></p> <p>8.1 Introduction 75</p> <p>8.2 Communication Density 76</p> <p>8.2.1 Simulation Study 77</p> <p>8.2.2 Broadcast Reception Rates 78</p> <p>8.2.3 Channel Access Delay 81</p> <p>8.2.4 Frames Reception Failures 83</p> <p>8.3 Optimal Data Rate 85</p> <p>8.3.1 Modulation and Coding Rates 85</p> <p>8.3.2 Simulation Study 86</p> <p>8.3.3 Simulation Matrix 87</p> <p>8.3.4 Simulation Results 88</p> <p>References 91</p> <p><b>9 WAVE Upper Layers 93</b></p> <p>9.1 Introduction 93</p> <p>9.2 DSRC Multichannel Operations 94</p> <p>9.2.1 Time Synchronization 94</p> <p>9.2.2 Synchronization Intervals 95</p> <p>9.2.3 Guard Intervals 96</p> <p>9.2.4 Channel Switching 96</p> <p>9.2.5 Channel Switching State Machine 96</p> <p>9.3 Protocol Evaluation 97</p> <p>9.3.1 Simulation Study 98</p> <p>9.3.2 Simulation Scenarios 99</p> <p>9.3.3 Simulation Results 99</p> <p>9.3.4 Protocol Enhancements 102</p> <p>9.4 WAVE Short Message Protocol 103</p> <p>References 104</p> <p><b>10 Vehicle-to-Infrastructure Safety Applications 106</b></p> <p>10.1 Intersection Crashes 106</p> <p>10.2 Cooperative Intersection Collision Avoidance System for Violations 107</p> <p>10.2.1 CICAS-V Design 107</p> <p>10.2.2 CICAS-V Development 110</p> <p>10.2.3 CICAS-V Testing 116</p> <p>10.3 Integrated Safety Demonstration 118</p> <p>10.3.1 Demonstration Concept 118</p> <p>10.3.2 Hardware Components 120</p> <p>10.3.3 Demo Design 121</p> <p>References 124</p> <p><b>11 Vehicle-to-Vehicle Safety Applications 126</b></p> <p>11.1 Cooperation among Vehicles 126</p> <p>11.2 V2V Safety Applications 127</p> <p>11.3 V2V Safety Applications Design 128</p> <p>11.3.1 Basic Safety Messages 129</p> <p>11.3.2 Minimum Performance Requirements 129</p> <p>11.3.3 Target Classifi cation 131</p> <p>11.3.4 Vehicle Representation 132</p> <p>11.3.5 Sample Applications 133</p> <p>11.4 System Implementation 135</p> <p>11.4.1 Onboard Unit Hardware Components 135</p> <p>11.4.2 OBU Software Architecture 135</p> <p>11.4.3 Driver–Vehicle Interface 137</p> <p>11.5 System Testing 138</p> <p>11.5.1 Communications Coverage and Antenna Considerations 138</p> <p>11.5.2 Positioning 139</p> <p>References 140</p> <p><b>12 DSRC Scalability 141</b></p> <p>12.1 Introduction 141</p> <p>12.2 DSRC Data Traffic 142</p> <p>12.2.1 DSRC Safety Messages 142</p> <p>12.2.2 Transmission Parameters 143</p> <p>12.2.3 Channel Load Assessment 144</p> <p>12.3 Congestion Control Algorithms 145</p> <p>12.3.1 Desired Properties 145</p> <p>12.3.2 Transmission Power Adjustment 146</p> <p>12.3.3 Message Rate Adjustment 147</p> <p>12.3.4 Simulation Study 148</p> <p>12.4 Conclusions 148</p> <p>References 149</p> <p><b>13 Security and Privacy Threats and Requirements 151</b></p> <p>13.1 Introduction 151</p> <p>13.2 Adversaries 151</p> <p>13.3 Security Threats 152</p> <p>13.3.1 Send False Safety Messages Using Valid Security Credentials 152</p> <p>13.3.2 Falsely Accuse Innocent Vehicles 153</p> <p>13.3.3 Impersonate Vehicles or Other Network Entities 153</p> <p>13.3.4 Denial-of-Service Attacks Specific to Consumer Vehicle Networks 154</p> <p>13.3.5 Compromise OBU Software or Firmware 155</p> <p>13.4 Privacy Threats 155</p> <p>13.4.1 Privacy in a Vehicle Network 155</p> <p>13.4.2 Privacy Threats in Consumer Vehicle Networks 156</p> <p>13.4.3 How Driver Privacy can be Breached Today 158</p> <p>13.5 Basic Security Capabilities 159</p> <p>13.5.1 Authentication 159</p> <p>13.5.2 Misbehavior Detection and Revocation 160</p> <p>13.5.3 Data Integrity 160</p> <p>13.5.4 Data Confidentiality 160</p> <p>13.6 Privacy Protections Capabilities 161</p> <p>13.7 Design and Performance Considerations 161</p> <p>13.7.1 Scalability 162</p> <p>13.7.2 Balancing Competing Requirements 162</p> <p>13.7.3 Minimal Side Effects 163</p> <p>13.7.4 Quantifi able Levels of Security and Privacy 163</p> <p>13.7.5 Adaptability 163</p> <p>13.7.6 Security and Privacy Protection for V2V Broadcast 163</p> <p>13.7.7 Security and Privacy Protection for Communications with Security Servers 164</p> <p>References 165</p> <p><b>14 Cryptographic Mechanisms 167</b></p> <p>14.1 Introduction 167</p> <p>14.2 Categories of Cryptographic Mechanisms 167</p> <p>14.2.1 Cryptographic Hash Functions 168</p> <p>14.2.2 Symmetric Key Algorithms 169</p> <p>14.2.3 Public Key (Asymmetric Key) Algorithms 170</p> <p>14.3 Digital Signature Algorithms 172</p> <p>14.3.1 The RSA Algorithm 172</p> <p>14.3.2 The DSA Algorithm 178</p> <p>14.3.3 The ECDSA Algorithm 184</p> <p>14.3.4 ECDSA for Vehicle Safety Communications 194</p> <p>14.4 Message Authentication and Message Integrity Verifi cation 196</p> <p>14.4.1 Authentication and Integrity Verifi cation Using Hash Functions 197</p> <p>14.4.2 Authentication and Integrity Verifi cation Using Digital Signatures 198</p> <p>14.5 Diffi e–Hellman Key Establishment Protocol 200</p> <p>14.5.1 The Original Diffie–Hellman Key Establishment Protocol 200</p> <p>14.5.2 Elliptic Curve Diffie–Hellman Key Establishment Protocol 201</p> <p>14.6 Elliptic Curve Integrated Encryption Scheme (ECIES) 202</p> <p>14.6.1 The Basic Idea 202</p> <p>14.6.2 Scheme Setup 202</p> <p>14.6.3 Encrypt a Message 202</p> <p>14.6.4 Decrypt a Message 204</p> <p>14.6.5 Performance 204</p> <p>References 206</p> <p><b>15 Public Key Infrastructure for Vehicle Networks 209</b></p> <p>15.1 Introduction 209</p> <p>15.2 Public Key Certificates 210</p> <p>15.3 Message Authentication with Certificates 211</p> <p>15.4 Certifi cate Revocation List 212</p> <p>15.5 A Baseline Reference Vehicular PKI Model 213</p> <p>15.6 Confi gure Initial Security Parameters and Assign Initial Certificates 215</p> <p>15.6.1 Vehicles Create Their Private and Public Keys 216</p> <p>15.6.2 Certificate Authority Creates Private and Public Keys for Vehicles 217</p> <p>15.7 Acquire New Keys and Certifi cates 217</p> <p>15.8 Distribute Certifi cates to Vehicles for Signature Verifications 220</p> <p>15.9 Detect Misused Certifi cates and Misbehaving Vehicles 222</p> <p>15.9.1 Local Misbehavior Detection 223</p> <p>15.9.2 Global Misbehavior Detection 224</p> <p>15.9.3 Misbehavior Reporting 224</p> <p>15.10 Ways for Vehicles to Acquire CRLs 226</p> <p>15.11 How Often CRLs should be Distributed to Vehicles? 228</p> <p>15.12 PKI Hierarchy 230</p> <p>15.12.1 Certifi cate Chaining to Enable Hierarchical CAs 231</p> <p>15.12.2 Hierarchical CA Architecture Example 231</p> <p>15.13 Privacy-Preserving Vehicular PKI 233</p> <p>15.13.1 Quantitative Measurements of Vehicle Anonymity 234</p> <p>15.13.2 Quantitative Measurement of Message Unlinkability 234</p> <p>References 235</p> <p><b>16 Privacy Protection with Shared Certificates 237</b></p> <p>16.1 Shared Certificates 237</p> <p>16.2 The Combinatorial Certificate Scheme 237</p> <p>16.3 Certificate Revocation Collateral Damage  239</p> <p>16.4 Certified Intervals 242</p> <p>16.4.1 The Concept of Certified Interval 242</p> <p>16.4.2 Certified Interval Produced by the Original Combinatorial Certificate Scheme 242</p> <p>16.5 Reduce Collateral Damage and Improve Certified Interval 244</p> <p>16.5.1 Reduce Collateral Damage Caused by a Single Misused Certificate 245</p> <p>16.5.2 Vehicles Become Statistically Distinguishable When Misusing Multiple Certificates 248</p> <p>16.5.3 The Dynamic Reward Algorithm 250</p> <p>16.6 Privacy in Low Vehicle Density Areas 253</p> <p>16.6.1 The Problem 253</p> <p>16.6.2 The Blend-In Algorithm to Improve Privacy 256</p> <p>References 259</p> <p><b>17 Privacy Protection with Short-Lived Unique Certificates 260</b></p> <p>17.1 Short-Lived Unique Certificates 260</p> <p>17.2 The Basic Short-Lived Certificate Scheme 261</p> <p>17.3 The Problem of Large CRL 263</p> <p>17.4 Anonymously Linked Certificates to Reduce CRL Size 264</p> <p>17.4.1 Certificate Tags 264</p> <p>17.4.2 CRL Processing by Vehicles 265</p> <p>17.4.3 Backward Unlinkability 267</p> <p>17.5 Reduce CRL Search Time 268</p> <p>17.6 Unlinked Short-Lived Certificates 269</p> <p>17.7 Reduce the Volume of Certificate Request and Response Messages 270</p> <p>17.8 Determine the Number of Certificates for Each Vehicle 270</p> <p>References 273</p> <p><b>18 Privacy Protection with Group Signatures 274</b></p> <p>18.1 Group Signatures 274</p> <p>18.2 Zero-Knowledge Proof of Knowledge 275</p> <p>18.3 The ACJT Group Signature Scheme and its Extensions 277</p> <p>18.3.1 The ACJT Group Signature Scheme 277</p> <p>18.3.2 The Challenge of Group Membership Revocation 282</p> <p>18.3.3 ACJT Extensions to Support Membership Revocation 283</p> <p>18.4 The CG Group Signature Scheme with Revocation 286</p> <p>18.5 The Short Group Signatures Scheme 288</p> <p>18.5.1 The Short Group Signatures Scheme 288</p> <p>18.5.2 Membership Revocation 291</p> <p>18.6 Group Signature Schemes with Verifier-Local Revocation 292</p> <p>References 293</p> <p><b>19 Privacy Protection against Certificate Authorities 295</b></p> <p>19.1 Introduction 295</p> <p>19.2 Basic Idea 295</p> <p>19.3 Baseline Split CA Architecture, Protocol, and Message Processing 297</p> <p>19.4 Split CA Architecture for Shared Certifi cates 301</p> <p>19.5 Split CA Architecture for Unlinked Short-Lived Certificates 302</p> <p>19.5.1 Acquire One Unlinked Certifi cate at a Time 302</p> <p>19.5.2 Assign Batches of Unlinked Short-Lived Certifi cates 304</p> <p>19.5.3 Revoke Batches of Unlinked Certifi cates 306</p> <p>19.5.4 Request for Decryption Keys for Certificate Batches 307</p> <p>19.6 Split CA Architecture for Anonymously Linked Short-Lived Certificates 308</p> <p>19.6.1 Assign One Anonymously Linked Short-Lived Certificate at a Time 308</p> <p>19.6.2 Assign Batches of Anonymously Linked Short-Lived Certificates 311</p> <p>19.6.3 Revoke Batches of Anonymously Linked Short-Lived Certificates  312</p> <p>19.6.4 Request for Decryption Keys for Certificate Batches  313</p> <p>References 314</p> <p><b>20 Comparison of Privacy-Preserving Certificate Management Schemes 315</b></p> <p>20.1 Introduction 315</p> <p>20.2 Comparison of Main Characteristics 316</p> <p>20.3 Misbehavior Detection 320</p> <p>20.4 Abilities to Prevent Privacy Abuse by CA and MDS Operators 321</p> <p>20.5 Summary 322</p> <p><b>21 IEEE 1609.2 Security Services 323</b></p> <p>21.1 Introduction 323</p> <p>21.2 The IEEE 1609.2 Standard 323</p> <p>21.3 Certificates and Certificate Authority Hierarchy 325</p> <p>21.4 Formats for Public Key, Signature, Certificate, and CRL 327</p> <p>21.4.1 Public Key Formats 327</p> <p>21.4.2 Signature Formats 328</p> <p>21.4.3 Certificate Format 329</p> <p>21.4.4 CRL Format 332</p> <p>21.5 Message Formats and Processing for Generating Encrypted Messages 333</p> <p>21.6 Sending Messages  335</p> <p>21.7 Request Certifi cates from the CA 336</p> <p>21.8 Request and Processing CRL 343</p> <p>21.9 What the Current IEEE 1609.2 Standard Does Not Cover 344</p> <p>21.9.1 No Support for Anonymous Message Authentication 344</p> <p>21.9.2 Separate Vehicle-CA Communication Protocols Are Required 344</p> <p>21.9.3 Interactions and Interfaces between CA Entities Not Addressed / 346</p> <p>References 346</p> <p><b>22 4G for Vehicle Safety Communications 347</b></p> <p>22.1 Introduction 347</p> <p>22.2 Long-Term Revolution (LTE) 347</p> <p>22.3 LTE for Vehicle Safety Communications/ 353</p> <p>22.3.1 Issues to Be Addressed 353</p> <p>22.3.2 LTE for V2I Safety Communications 353</p> <p>22.3.3 LTE for V2V Safety Communications 356</p> <p>22.3.4 LTE Broadcast and Multicast Services 357</p> <p>References 358</p> <p>Glossary 360</p> <p>Index 367</p>
<p><b>LUCA DELGROSSI, PhD,</b> is Director of Driver Assistance and Chassis Systems U.S. at Mercedes-Benz Research & Development North America, Inc., Chairman of the Board of Directors at the VII Consortium, and coeditor of the <i>IEEE Communications Magazine</i> Automotive Networking Series.</p> <p><b>TAO ZHANG, PhD,</b> is Chief Scientist for Smart Connected Vehicles at Cisco Systems. He is a Fellow of the IEEE and the coauthor of <i>IP-Based Next-Generation Wireless Networks</i>.</p>
<p><b>Provides an up-to-date, in-depth look at the current research, design, and implementation of cooperative vehicle safety communication protocols and technology</b></p> <p>Improving traffic safety has been a top concern for transportation agencies around the world and the focus of heavy research and development efforts sponsored by both governments and private industries. Cooperative vehicle systems—which use sensors and wireless technologies to reduce traffic accidents—can play a major role in making the world's roads safer.</p> <p><i>Vehicle Safety Communications: Protocols, Security, and Privacy</i> describes fundamental issues in cooperative vehicle safety and recent advances in technologies for enabling cooperative vehicle safety. It gives an overview of traditional vehicle safety issues, the evolution of vehicle safety technologies, and the need for cooperative systems where vehicles work together to reduce the number of crashes or mitigate damage when crashes become unavoidable.</p> <p>Authored by two top industry professionals, the book:</p> <ul> <li>Summarizes the history and current status of 5.9 GHz Dedicated Short Range Communications (DSRC) technology and standardization, discussing key issues in applying DSRC to support cooperative vehicle safety</li> <li>Features an in-depth overview of on-board equipment (OBE) and roadside equipment (RSE) by describing sample designs to illustrate the key issues and potential solutions</li> <li>Takes on security and privacy protection requirements and challenges, including how to design privacy-preserving digital certificate management systems and how to evict misbehaving vehicles</li> <li>Includes coverage of vehicle-to-infrastructure (V2I) communications like intersection collision avoidance applications and vehicle-to-vehicle (V2V) communications like extended electronic brake lights and intersection movement assist</li> </ul> <p><i>Vehicle Safety Communications</i> is ideal for anyone working in the areas of—or studying—cooperative vehicle safety and vehicle communications.</p>

These products might also interest you:

Bandwidth Efficient Coding
Bandwidth Efficient Coding
from: John B. Anderson
EPUB ebook
114,99 €
Digital Communications with Emphasis on Data Modems
Digital Communications with Emphasis on Data Modems
from: Richard W. Middlestead
PDF ebook
171,99 €
Bandwidth Efficient Coding
Bandwidth Efficient Coding
from: John B. Anderson
PDF ebook
114,99 €