• Title/Summary/Keyword: Connected vehicles

Search Result 228, Processing Time 0.031 seconds

Development of Integrated Traffic Control of Dynamic Merge and Lane Change at Freeway Work Zones in a Connected and Automated Vehicle Environment (자율협력주행차 환경의 고속도로 공사구간 동적합류 및 차로변경 통합제어전략 개발)

  • Kim, Yongju;Ka, Dongju;Kim, Sunho;Lee, Chungwon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.19 no.3
    • /
    • pp.38-51
    • /
    • 2020
  • A bottleneck and congestion occur when a freeway is closed due to maintenance and construction activities on the freeway. Although various traffic managements have been developed to improve the traffic efficiency at freeway work zones, such as merge control, there is a limit to those controls with human drivers. On the other hand, the wireless communication of connected and automated vehicles (CAVs) enables the operation of advanced traffic management. This study developed a traffic control strategy that integrates Dynamic Merge Control (DMC) and Lane Change Control (LCC) in a CAV environment. DMC operates as an either early or late merge based on the occupancy rate of upstream of the work zone. The LCC algorithm determines the number of vehicles that need to change their lane to balance the traffic volume on open lanes. The simulation results showed that integrated control improves the cumulative vehicle count, average speed upstream, and average network travel time.

Research on Vehicle Diagnostic and Monitoring technology Using WiBro Portable Device (와이브로 휴대기기를 사용한 차량진단 및 모니터링 기술에 관한 연구)

  • Ryoo, Hee-Soo;Won, Yong-Gwan;Park, Kwon-Chul;Ahn, Yong-Beom
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.10
    • /
    • pp.17-26
    • /
    • 2010
  • This is concerned with the technology to monitor the vehicle operation, failure and disorder by using WiBro portable device. More precisely, the technology makes it possible that the information collection device is connected to both ECU(Electronic Control Unit) which is the device for controlling engine, transmission, brake, air-bag, etc that are connected to in-vehicle network and OBD-II connector that is for data collection from various sensors. In addition, with a WiBro portable device (cell phone, PDA, PMP, UMPC, etc). equipped with a vehicle diagnostic programs, information for operation, failure and malfunction can be obtained and analyzed in real-time, and alarm is alerted when the vehicle is in abnormal status, which makes the early reactions to the status. Furthermore, the collected data can be sent through WiBro network to the server managed by the company specialized in managing the vehicles, thus the technology could help the drivers who have less knowledge about their auto-vehicles have safe and economic driving. There is always a possibility of malfunction due to various types of noise that are caused by wring-harness when the device is wired-connected. In this research, in order to overcome this problem, we propose a system configuration that can do monitoring and diagnosis with a device for collecting data from vehicle and a personal WiBro device. Also, we performed research on data acquisition and interlock for the system defined by the definition for information and data sharing platform.

Cooperative RSU Scheduling for Efficient Data Dissemination in VANET Environments (VANET 환경에서 효과적인 데이터 배포를 위한 RSU 협업 스케쥴링)

  • Bok, Kyoung Soo;Hong, Seung Wan;Cha, Jae Hog;Lim, Jong Tae;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.10
    • /
    • pp.27-36
    • /
    • 2013
  • Recently, as researches on VANET have actively progressed, the convenient and reliable services can be provided to the vehicles. In this paper, we propose the collaborative RSU scheduling scheme using multiple RSUs which are connected through a wired backbone. The proposed scheme efficiently disseminates both unsafety data and safety data, and reduces the deadline miss rate and the average response time. When safety data is occurred, it is send to previous RSU in advance and is scheduled by deadline and reception rate. We provide the prevention technology for unsafety data when the workload is occurred in RSU because it is on-demand data processed by user requests. It is shown through performance evaluation that the proposed scheme outperforms the existing scheme in terms of the deadline miss rate and the average response time according to the number of vehicles and the velocities of vehicles.

Design of Driving Record System using Block Chain (블록체인을 이용한 주행 기록 시스템 설계)

  • Seo, Eui-Seong;Jang, Jong-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.205-206
    • /
    • 2018
  • Recently, interest in unmanned vehicles, autonomous vehicles and connected cars has increased, and autonomous driving capability is also increasing. Depending on the autonomous driving ability, the maximum number of steps is divided into 6 steps. The higher the step, the less the involvement of the person in the running, and the person does not need to be involved at the highest stage. Today's autonomous vehicles have been developed in stages 4 to 5, but solutions are not clearly defined in case of an accident, so only the test run is possible. Such an accident occurring during traveling is almost inevitable, and it is judged who has made a mistake in case of an accident, which increases the punishment for the accident. Although a black box is used to clarify such a part, it is easy to delete a photographed image, and it is difficult to solve an accident such as a hit-and-run. In this paper, we design a driving record system using black chain to solve such an accident.

  • PDF

Comparison of RSS Safety Distance for Safe Vehicle Following of Autonomous Vehicles (자율주행자동차의 안전한 차량 추종을 위한 RSS 모형의 안전거리 비교)

  • Park, Sungho;Park, Sangmin;Hong, YunSeog;Ryu, Seungkyu;Yun, Ilsoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.17 no.6
    • /
    • pp.84-95
    • /
    • 2018
  • A mathematical model of responsibility-sensitive safety (RSS) has been proposed as a way to determine whether an autonomous driving accident has occurred. Autonomous vehicles related industry and academia have shown great interest in this model. However, this mathematical model lacks a comprehensive review on whether the model can be used to clarify responsibilities of autonomous vehicles in the event of a traffic accident. In this study, we analyzed the issues that need to be solved in order to apply the RSS model. In conclusion, there is a limit in the equation and the social acceptability of the RSS model. To use the RSS model practically, it is necessary to define the response time of the autonomous vehicle and to measure and control the reaction time value according to the appropriate technology level for each autonomous vehicle.

Cluster Management Scheme for Safety Message Dissemination in a VANET Environment (VANET 환경에서 안전 메시지 배포를 위한 클러스터 관리 기법)

  • Pyun, Do-Woong;Lim, Jongtae;Bok, Kyoung-Soo;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.5
    • /
    • pp.26-36
    • /
    • 2022
  • Recently, studies have been conducted to cluster vehicles and disseminate safety messages in a VANET environment for driver safety and smoothy traffic. This paper proposes cluster management scheme for safety message dissemination through V2V communication and V2I communication in a VANET environment with high vehicle density and mobility. The proposed scheme reduces packet loss by selecting CH considering reception quality, total data owned by vehicles, moving speed, and connected vehicles, and maintaining cluster head candidates, which are the main agents of message dissemination, considering frequent cluster departures and subscriptions. In addition, the proposed scheme reduces duplicate messages by utilizing clusters by collaborating with a Road side unit(RSU). To prove the excellence of the proposed scheme, various performance evaluations are performed in terms of message packet loss and the number of RSU processing requests. As a result of performance evaluation, the cluster management scheme proposed in this paper shows better performance than the existing scheme.

A Flexible Mobile-Geofence to support Connected-Cars Technology (커넥티드 카 기술을 지원하는 가변적 모바일 지오펜스)

  • Eom, Young-Hyun;Choi, Young-Keun;Yoo, HyunMi;Cho, Sungkuk;Jeon, Byungkook
    • Smart Media Journal
    • /
    • v.6 no.3
    • /
    • pp.89-94
    • /
    • 2017
  • The existing geofences provide only context-awareness service for entering or leaving the set region when a user sets a virtual region for his/her PoI(Point of Interest). Applying the mobile-geofence technology to the connected car technology, which is attracting attention as a next generation technology, it is possible to provide application service without additional infrastructure construction cost However, to do this, we need to expand and improve the functions of traditional geofence. In this paper, we propose and implement a flexible mobile-geofence in which the radii of each geofence applied to vehicles is changed according to context-aware in order to support connected cars technology based on the previously studied mobile three-dimensional geofence system. The proposed flexible mobile-geofence shows experimentally that the region of the geofence is changed according to context-aware of itself and its surroundings after applying a flexible decision algorithm by the flexible factor analysis. In the future, we are expected that the flexible mobile-geofence proposed in this paper will be applied not only to connected-cars technology but also to the application technology of V2X(Vehicle to Everything) for safe and efficient vehicle operation.

Development of Electronic Opening and Shutting Device for One-Ton Wing-Body Truck

  • Han, Jong-Soo;Seo, Chang-Jun
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.565-569
    • /
    • 2004
  • The wing-body trucks are special vehicles that are designed to provide large carrying space and to protect the freights from outside impacts and bad weather. They are constructed to the structure opening and shutting three-layered aluminum top. In the middle- and large-size(above one-ton) wing-body trucks, wing-body is opened/closed by opening and shutting device of oil pressure type. But one-ton truck is constructed that its wing-body is opened/closed in manual to use helping of stay-dampers. So, we developed an electronic opening and shutting device for one-ton wing-body trucks to improve the inconvenience of usage for manually operated wing-body. The developed device is consisted of two connected links and a dc motor combined with an worm gear. The worm gear changes the rotation axis of the dc motor to a right-angled direction and transfers the torque of dc motor to the links. The two connected links open/shut the wing-body using the torque transferred from the dc motor. When the wing-body starts to be opened, the biggest torque is required from the dc motor for opening the wing-body. And as the wing-body is opened more and more, the required torque is smaller for opening the wing-body. Thus, the structure of two connected links are designed to locate at the center of worm gear so that maximum torque of the dc motor is transferred the links at the initial time starting to open wing-body. The controller of the device with open and closed buttons also is designed to protect the device from over-opening and over shutting operations. The developed device is accomplished for many experiments using actual vehicle. Those experiments show that the device has more excellent performance than the oil pressure type.

  • PDF

Research on Countermeasures of Controller Area Network Vulnerability (Controller Area Network 취약점 분석 및 대응 방안 연구)

  • Hong, Sunghyuck
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.115-120
    • /
    • 2018
  • As the number ofconnected cars grows, the security of the connected cars is becoming more important. There are also increasing warnings about the threat of attacks via the CAN bus used for in-vehicle networks. An attack can attack through a vulnerability in the CAN bus because the attacker can access the CAN bus remotely, or directly to the vehicle, without a security certificate on the vehicle, and send a malicious error message to the devices connected to the CAN bus. A large number of error messages put the devices into a 'Bus-Off' state, causing the device to stop functioning. There is a way to detect the error frame, or to manage the power of the devices related to the bus, but eventually the new standard for the CAN bus will be the fundamental solution to the problem. If new standards are adopted in the future, they will need to be studied.

Development of CAN network intrusion detection algorithm to prevent external hacking (외부 해킹 방지를 위한 CAN 네트워크 침입 검출 알고리즘 개발)

  • Kim, Hyun-Hee;Shin, Eun Hye;Lee, Kyung-Chang;Hwang, Yeong-Yeun
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.20 no.2
    • /
    • pp.177-186
    • /
    • 2017
  • With the latest developments in ICT(Information Communication Technology) technology, research on Intelligent Car, Connected Car that support autonomous driving or services is actively underway. It is true that the number of inputs linked to external connections is likely to be exposed to a malicious intrusion. I studied possible security issues that may occur within the Connected Car. A variety of security issues may arise in the use of CAN, the most typical internal network of vehicles. The data can be encrypted by encrypting the entire data within the CAN network system to resolve the security issues, but can be time-consuming and time-consuming, and can cause the authentication process to be carried out in the event of a certification procedure. To resolve this problem, CAN network system can be used to authenticate nodes in the network to perform a unique authentication of nodes using nodes in the network to authenticate nodes in the nodes and By encoding the ID, identifying the identity of the data, changing the identity of the ID and decryption algorithm, and identifying the cipher and certification techniques of the external invader, the encryption and authentication techniques could be detected by detecting and verifying the external intruder. Add a monitoring node to the CAN network to resolve this. Share a unique ID that can be authenticated using the server that performs the initial certification of nodes within the network and encrypt IDs to secure data. By detecting external invaders, designing encryption and authentication techniques was designed to detect external intrusion and certification techniques, enabling them to detect external intrusions.