• Title/Summary/Keyword: 차량-인프라 간 통신

Search Result 91, Processing Time 0.032 seconds

Study on Parallel Processing of ECDSA Verification for V2X Communication (V2X 통신을 위한 ECDSA 서명 검증 병렬처리 연구)

  • Lee, Sokjoon;Choi, Joongyong;Chung, Byungho;Kwon, Hyeokchan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.216-217
    • /
    • 2018
  • IEEE 1609.2 표준은 WAVE (Wireless Access in Vehicular Environment) 표준에서 차량간(V2V, Vehicle-to-Vehicle) 혹은 차량과 인프라간(V2I, Vehicle-to-Infrastructure)통신 상의 응용 메시지 보호를 위해 제정되었다. 이 표준은 메시지 이증 및 무결성 검증을 위하여 NIST p256 타원 곡선 커브 기반의 ECDSA 전자서명 기법을 사용한다. 매우 복잡한 도신 상의 출퇴근 환경에서는 수백대의 자동차가 전송하는 메시지를 정상적으로 처리하기 위하여, 차량의 OBU(On-Board Unit) 혹은 노상의 RSU(Road-Side Unit)에서 서명된 메시지의 검증 성능이 매우 중요한 이슈가 될 수 있다. 본 논문에서는 V2X 통신에서 효율적인 ECDSA 서명 검증을 위하여, OBU 혹은 RSU 환경에서 CPU 상의 병렬 처리 성능을 테스트 한 후 시사점을 살펴본다.

Priority Based Clustering Algorithm for VANETs (VANET 환경을 위한 우선순위 기반 클러스터링 알고리즘)

  • Kim, In-hwan
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.8
    • /
    • pp.637-644
    • /
    • 2020
  • VANET (Vehicular Ad Hoc Networks) is a network between vehicles and between vehicles and infrastructure. VANET-specific characteristics such as high mobility, movement limitation, and signal interference by obstacles make it difficult to provide stable VANET services. To solve this problem, this paper proposes a vehicle type-based priority clustering method that improves the existing bus-based clustering. The proposed algorithm constructs a cluster by evaluating the priority, link quality, and connectivity based on the vehicle type, expected communication lifetime, and link degree of neighbor nodes. It tries to simplify the process of selecting a cluster head and increase cluster coverage by utilizing a predetermined priority based on the type of vehicle. The proposed algorithm is expected to become the basis for activating various services by contributing to providing stable services in a connected car environment.

Methodology for Determining RSE Spacing for Vehicle-Infrastructure Integration(VII) Based Traffic Information System (Focused on Uninterrupted Traffic Flow) (차량-인프라 연계(VII) 기반 교통정보시스템의 RSE 설치간격 결정 방법론 (연속류를 중심으로))

  • Park, Jun-Hyeong;O, Cheol;Im, Hui-Seop;Gang, Gyeong-Pyo
    • Journal of Korean Society of Transportation
    • /
    • v.27 no.6
    • /
    • pp.29-44
    • /
    • 2009
  • A variety of research efforts, using advanced wireless communication technologies, have been made to develop more reliable traffic information system. This study presents a novel decentralized traffic information system based on vehicle infrastructure integration (VII). A major objective of this study was also to devise a methodology for determining appropriate spacing of roadside equipment (RSE) to fully exploit the benefits of the proposed VII-based traffic information system. Evaluation of travel time estimation accuracy was conducted with various RSE spacings and the market penetration rates of equipped vehicle. A microscopic traffic simulator, VISSIM, was used to obtain individual vehicle travel information for the evaluation. In addition, the ANOVA tests were conducted to draw statistically significant results of simulation analyses in determining the RSE spacing. It is expected that the proposed methodology will be a valuable precursor to implementing capability-enhanced next generation traffic information systems under the forthcoming ubiquitous transportation environment.

Estimation of Predictive Travel Times Using Ubiquitous Traffic Environment under Incident Conditions (유비쿼터스 환경에서 돌발상황 발생 시 예측적 통행시간 추정기법)

  • Park, Joon-Hyeong;Hong, Seung-Pyo;Oh, Cheol;Kim, Tae-Hyeong;Kim, Won-Kyu
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.2
    • /
    • pp.14-26
    • /
    • 2009
  • This study presented a novel method to estimate travel times under incident conditions. Predictive travel time information was defined and evaluated with the proposed method. The proposed method utilized individual vehicle speeds obtained from global positioning systems (GPS) and inter-vehicle communications(IVC) for more reliable real-time travel times. Individual vehicle trajectory data were extracted from microscopic traffic simulations using AIMSUN. Market penetration rates (MPR) and IVC ranges were explored with the accuracy of travel times. Relationship among travel time accuracy, IVC ranges, and MPR were further identified using regression analyses. The outcomes of this study would be useful to derive functional requirements associated with traffic information systems under forthcoming ubiquitous transportation environment

  • PDF

The Development of a Collision Warning System for Small-Sized Vessels Using WAVE Communication Technology (WAVE 통신을 이용한 소형선박 충돌경보시스템 개발 연구)

  • Kang, Won-Sik;Kim, Young-Du;Lee, Myoung-Ki;Park, Young-Soo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.25 no.2
    • /
    • pp.151-158
    • /
    • 2019
  • Wireless communication technology (WAVE) for vehicles, which is the core technology behind the next-generation intelligent transport system (C-ITS), is used to deliver information about vehicles to prevent traffic accidents and traffic situations that may arise between vehicles and infrastructure. Similar traffic issues often arise in marine scenarios. Currently, AIS is being used as a means of transmitting information such as the status of relative vessels, but research is being carried out to solve problems with AIS such as overloading by applying wireless communication technology for vehicles to the sea. In this study, a collision warning system suitable for small-sized vessels was developed based on the marine application of WAVE for vehicles verified through prior research, and the adequacy of this collision warning system was reviewed through a practical test. It is expected that this system will contribute greatly to future e-Navigation applications or self-driving ships as well as to preventing marine accidents.

A Design of Vehicle Management System Apply Most Network And Sensor (MOST 네트워크와 센서를 활용한 차량 관리 시스템 설계)

  • Lee, Hyoun-Sup;Kim, Jin-Deog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.08a
    • /
    • pp.95-98
    • /
    • 2008
  • The vehicle has many technique change from The requirement of the safety the energy environment and convenience dimension is an enlargement toe. This is keeping changing the paradigm of the vehicle industry rapidly. The change to be technical such brought the intelligence of the former control device. And this organizes a sensor network among each systems and makes new traffic system. This paper a standard framework based on Sensor. We call it Vehicle Management System. The VMS used MOST network and It is able to make the stability of the component swap time or vehicle order the greatest.

  • PDF

A Research on V2I-based Accident Prevention System for the Prevention of Unexpected Accident of Autonomous Vehicle (자율주행 차량의 돌발사고 방지를 위한 V2I 기반의 사고 방지체계 연구)

  • Han, SangYong;Kim, Myeong-jun;Kang, Dongwan;Baek, Sunwoo;Shin, Hee-seok;Kim, Jungha
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.3
    • /
    • pp.86-99
    • /
    • 2021
  • This research proposes the Accident Prevention System to prevent collision accident that can occur due to blind spots such as crossway or school zone using V2I communication. Vision sensor and LiDAR sensor located in the infrastructure of crossway somewhere like that recognize objects and warn vehicles at risk of accidents to prevent accidents in advance. Using deep learning-based YOLOv4 to recognize the object entering the intersection and using the Manhattan Distance value with LiDAR sensors to calculate the expected collision time and the weight of braking distance and secure safe distance. V2I communication used ROS (Robot Operating System) communication to prevent accidents in advance by conveying various information to the vehicle, including class, distance, and speed of entry objects, in addition to collision warning.

Development of Traffic Safety Monitoring Technique by Detection and Analysis of Hazardous Driving Events in V2X Environment (V2X 환경에서 위험운전이벤트 검지 및 분석을 통한 교통안전 모니터링기법 개발)

  • Jeong, Eunbi;Oh, Cheol;Kang, Kyeongpyo;Kang, Younsoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.6
    • /
    • pp.1-14
    • /
    • 2012
  • Traffic management centers (TMC) collect real-time traffic data from the field and have powerful databases for analysing, recording, and archiving the data. Recent advanced sensor and communication technologies have been widely applied to intelligent transportation systems (ITS). Regarding sensors, various in-vehicle sensors, in addition to global positioning system (GPS) receiver, are capable of providing high resolution data representing vehicle maneuverings. Regarding communication technologies, advanced wireless communication technologies including vehicle-to-vehicle (V2V) and vehicle-to-vehicle infrastructure (V2I), which are generally referred to as V2X, have been widely used for traffic information and operations (references). The V2X environment considers the transportation system as a network in which each element, such as the vehicles, infrastructure, and drivers, communicates and reacts systematically to acquire information without any time and/or place restrictions. This study is motivated by needs of exploiting aforementioned cutting-edge technologies for developing smarter transportation services. The proposed system has been implemented in the field and discussed in this study. The proposed system is expected to be used effectively to support the development of various traffic information control strategies for the purpose of enhancing traffic safety on highways.

VANET Privacy Assurance Architecture Design (VANET 프라이버시 보장 아키텍처 설계)

  • Park, Su-min;Hong, Man-pyo;Shon, Tae-shik;Kwak, Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.81-91
    • /
    • 2016
  • VANET is one of the most developed technologies many people have considered a technology for the next generation. It basically utilizes the wireless technology and it can be used for measuring the speed of the vehicle, the location and even traffic control. With sharing those information, VANET can offer Cooperative ITS which can make a solution for a variety of traffic issues. In this way, safety for drivers, efficiency and mobility can be increased with VANET but data between vehicles or between vehicle and infrastructure are included with private information. Therefore alternatives are necessary to secure privacy. If there is no alternative for privacy, it can not only cause some problems about identification information but also it allows attackers to get location tracking and makes a target. Besides, people's lives or property can be dangerous because of sending wrong information or forgery. In addition to this, it is possible to be information stealing by attacker's impersonation or private information exposure through eavesdropping in communication environment. Therefore, in this paper we propose Privacy Assurance Architecture for VANET to ensure privacy from these threats.

Design and Implementation of CRL download protocol for supporting of WAVE systems (WAVE 시스템 지원을 위한 CRL 다운로드 프로토콜의 설계 및 구현)

  • Yoo, Kwon-Jeong;Seon, Seol-Hee;Choi, Beom-Jin;Kim, Eun-Gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.4
    • /
    • pp.800-806
    • /
    • 2015
  • WAVE(Wireless Access in Vehicular Environments) system is wireless communication technology that vehicle sends and receives packets between vehicles or between vehicles and infrastructure in a high-speed mobile environment. In this study, we have designed and implemented a CRL(Certificate Revocation List) download protocol that is used to verify certificate revocation status of the other party when the vehicles communicate with WAVE system. This protocol operates over UDP. And to support security features, also, ECDSA(Elliptic Curve Digital Signature Algorithm) is used for mutual authentication and ECIES(Elliptic Curve Integrated Encryption Scheme) is used to ensure the confidentiality. Moreover, this protocol ensures the integrity of data by adding MAC(Message Authentication Code) to the end of packet and support the error and flow control mechanisms.