12 Dec 2015

Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions

http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5948952&tag=1

Abstract. Vehicular networking has significant potential to enable diverse applications associated with traffic safety, traffic efficiency and infotainment ... basic characteristics, applications, requirements, challenges, proposed solutions

Intelligent Transportation Systems (ITS) that aim to streamline the operation of vehicles, manage vehicle traffic, assist drivers with safety and other information, along with provisioning of convenience applications for passengers are no longer confined to laboratories and test facilities of companies.

Prime examples:
automated toll collection systems
driver assist systems
information provisioning systems.
first takes on solutions for communication systems that primarily involve vehicles and users within vehicles.
technical challenges
mobility of vehicles
wide range of relative speeds between nodes
real-time nature of applications
a multitude of system and application related requirements
ITS applications that require information to be relayed multiple hops between cars

vehicular networks are poised to become the most widely distributed and largest scale ad hoc networks

II. Applications And Requirements

the requirements imposed by such applications on the vehicular networking architecture

Applications

1) Active road safety applications

decrease the probability of traffic accidents and the loss of life of the occupants of vehicles

primarily provide information and assistance to drivers to avoid such collisions with other vehicles … by sharing information between vehicles and road side units which is then used to predict collisions.

Such information can represent vehicle position, intersection position, speed and distance heading

information exchanged … moreover … to locate hazardous locations on roads, such as slippery sections or potholes

example applications

2) Traffic efficiency and management applications

focus on improving the vehicle traffic flow, traffic coordination and traffic assistance and provide updated local information, maps and in general, messages of relevance bounded in space and/or time.

two typical groups of this type of applications
Speed management and Co-operative navigation

3) Infotainment Applications

Co-operative local services
focus on infotainment that can be obtained from locally based services such as point of interest notification, local electronic commerce and media downloading
Global Internet services
Focus is on data that can be obtained from global Internet services
example: Communities services, which include insurance and financial services, fleet management and parking zone management
example: ITS station life cycle, which focus on software and data updates

requirements

1) Classification

c) System capabilities requirements
Radio communication, network communication, Vehicle absolute positioning
d) System performance requirements
communication performance, positioning accuracy, reliability and dependability, such as radio coverage, bit error rate, black zones …

III. Projects, Architectures And Protocols

ITS projects, architecture and standards in USA

1) ITS Standardization
In 1991 the United States Congress via ISTEA (Intermodal Surface Transportation Efficiency Act) requested the creation of the IHVS (Intelligent Vehicle High- way Systems) program [23]
The goals: to increase traffic safety and efficiency and reduce pollution
2) US Federal and State ITS Projects
3) ITS architecture and protocol standards
Centers, Field, Vehicles and Travelers. The second ITS architecture introduced in this section has been specified by the VII (now IntelliDrive(sm)) project (Figure 3).

V. Vehicular networking solutions

A. Addressing and Geographical addressing

... fixed infrastructure routing, ... topological prefixes and therefore cannot be adapted to follow geographical routing.
... to integrate the concept of physical location into the current design of Internet that relies on logical addressing

A GPS address
(1) represented by closed polygons
(2) site-name as a geographic access path

1) Application layer solutions to addressing:

DNS (Domain Name System) is extended by including a “geographic” data base, which contains the full directory information down to the level of IP addresses of each base station and its coverage area represented as a polygon of coordinates.

2) GPS-Multicast solution

3) Unicast IP routing extended to deal with GPS addresses.

B. Risk analysis and management

security model … flexible … allowing to integrate previously found attacks

C. Data-centric Trust and Verification

security concepts that can be used to support the data trust and verification are categorized into proactive security and reactive security concepts.

D. Anonymity, privacy and liability

E. Secure Localization

Tamper-proof GPS [123] proposes a system, where each vehicle has a tamper-proof GPS receiver, which can register its location at all times and provides this information to other nodes in the network in an authentic manner.

With verifiable multilateration [123], the verification of the vehicle location is accomplished using the roadside infrastructure and by using multilateration and distance bounding

Another challenge-response system involves the use of logic reception of beacons [125], which involves synchronized acceptor and rejector nodes.

1) Conclusions

Secure localization can be considered as an efficient solution for the DOS attacks associated with localization.

F. Forwarding algorithms

The multi-hop communication between source and destination can be performed in either V2V, V2I, or hybrid fashion. Messages are forwarded to a destination by making use of multiple intermediate vehicles as relay nodes.

1) Forwarding for Unicast Routing

Geographic
Most algorithms in this category are inspired from the popular Greedy Perimeter Stateless Routing (GPSR) [130]. All forwarding decisions are taken mainly using the location information of vehicle’s immediate neighbors.
The vehicles are assumed to be equipped with GPS or other location services so that they can determine their own location without incurring any overhead. The set of all neighbors and their respective locations are discovered using periodic beacon messages that are exchanged among nearby nodes.
often locally optimal
The minimum delay estimation
in these protocols is mainly based on vehicle-level information such as average speed and density. Such information alone, however, is not sufficient to find delay-optimal paths.
one must also consider amount of data traffic along different streets.
Link Stability-based
Topology-based routing protocols (e.g., reactive and proactive routing), which are popular in MANETs can be applied to vehicular networks.
path discovery and path maintenance can be significantly high due to high mobility
mainly deployed in highway environments and small scale networks where number of hops between source and destination is small
Trajectory-based
a novel combination of source routing and Cartesian (position) forwarding for ad hoc networks.

2) Forwarding for Broadcast Routing

Driver safety related applications are the most important motivating applications for VANETs.

flooding seriously suffer from broadcast storm problem where large amount of bandwidth is consumed by excess number of retransmissions. When node density is high, this leads to large number of collisions and high channel contention overhead.

to address the broadcast storm problem in MANETs
probabilistic, counter-based, distance-based, location-based, and cluster-based.

3) Probabilistic

4) Distance-based

5) Conclusions

The main challenge in designing forwarding algorithms for VANETs is to provide reliable packet transmission with minimum delay, maximum throughput, and low communication overhead.

Most existing algorithms target only subset of these requirements within specific environment setups.

G. Delay constraints

categorize all delay-aware protocols based on the layer in which the appropriate steps are being taken

1) Application Layer Solutions

Delay constraints at the level of application layer are necessary due to the requirements to support emergency warning messages.

The QoS support for multimedia applications in VANETS is studied in [164] by considering three different types of packet flows: audio, video, and data packets.

A mobile peer-to-peera (P2P) file sharing system that targets VANETs is introduced in CodeTorrent [165].

P2P systems are designed for IP address-based network, and they are not readily applicable for VANETs. The challenges here include high node mobility, error-prone wireless channel, and security-risk of information sharing.

2) Network Layer

Designing routing protocols with delay-bound and delay-guarantee characteristics is challenging due to high vehicular mobility.

4) Physical Layer

The Incident Warning System (IWS) [172] utilizes direct wireless communication to transfer a variety of packets including traffic incidence reports, text messages, JPEG images etc. … requirements are handled by using two different frequencies: long range frequency to reserve the channel; and short range frequency to transmit the packets.

5) Conclusions

The primary challenge in designing protocols is to provide good delay performance under the constraints of high vehicular speeds, unreliable connectivity, and fast topological changes.

individual solutions may lead to conflict between layers and among other nodes.

H. Prioritization of data packets

When an emergency event occurs, the channel utilization is likely to degrade due to massive broadcast of emergency messages.

A vehicle collision warning communication (VCWC) [183] ... of cooperative collision warning system that is enabled by vehicle-to-vehicle communication. It aims to give low latency warning message transmission at the initial state of an emergency event.

Whenever a node has a backlogged emergency message, it raises an out-of-band busy tone signal, which can be sensed by vehicles located within two hops. Vehicles with lower priority messages defer their channel access whenever the busy tone signal is sensed.

In [186], a novel pulse-based control mechanism has been proposed to provide strict priority for emergency messages.

1) Conclusions

cross-layer protocols that operate in multiple layers to provide priorities among different flows and different applications.

I. Reliability and cross-layering between transport and net- work layers

The motivation behind such a cross-layer design is to support real-time and multimedia applications which require a reliable end-to-end connectivity with QoS requirements. Cross-layer designs also help in congestion avoidance.

VI. CONCLUSIONS AND FUTURE WORK

Geographical addressing
extends IP routing and IP addressing in order to cope with GPS addresses.
Anonymity and privacy
anonymity and adaptive privacy, where users are allowed to select the privacy that they wish to have.
Forwarding algorithms
reliable packet transmission with minimum delay, maximum throughput, and low communication overhead.
targeted at heterogeneous systems to handle applications with diverse QoS requirements
Delay constraints
good delay performance under the constraints of high vehicular speeds, unreliable connectivity, and fast topological changes.