• Title/Summary/Keyword: V2V communications

Search Result 377, Processing Time 0.027 seconds

Algorithm Design and Implementation for Safe Left Turn at an Intersection Based on Vehicle-to-Vehicle Communications (교차로에서의 안전 좌회전을 위한 차량간 통신 기반 알고리즘 설계 및 구현)

  • Seo, Hyun-Soo;Kim, Hyo-Un;Noh, Dong-Gyu;Lee, Sang-Sun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.2
    • /
    • pp.165-171
    • /
    • 2013
  • WAVE(Wireless Access in Vehicular Environments) is a representative V2V communication protocol and its standards of MAC and PHY parts except for security were published. In order to control traffic flow and ensure driver's safety using V2V communication, various projects are conducting. In particular, safety application has been researched. Therefore, in this paper, we designed the safety application algorithm, which informs a driver of the dangerous status when driver tries to turn left in an intersection and we also implemented the algorithm. Proposed algorithm configures a model for a host vehicle and a vehicle coming in opposite lane and in case that there is collision hazard it provides warning message to driver by using HMI. In order to evaluate the proposed algorithm's performance, we configured the test bed using test vehicles and we tested the algorithm on proving ground with the composed test scenarios. As test results, our system showed excellent performance. If the infrastructures for V2I communications are constructed, we will optimize our system more precisely and stably.

A Study on V2V Communication Environment in K-city (자율주행 실험도시(K-city) 내 V2V 통신 환경에 관한 연구)

  • Jo, Byeongchan;Kim, Donghwan;Shin, Jaekon;Kim, Sungsub;Cho, Seongwoo
    • Journal of Auto-vehicle Safety Association
    • /
    • v.13 no.1
    • /
    • pp.26-30
    • /
    • 2021
  • K-city is an experimental area for developing self-driving cars. V2X communications such as WAVE, C-V2X and 5G are an essential technology for autonomous driving above level 4. In this paper, the research on the V2V communication environment was carried out through BSM receiving level analysis on the driving route in K-city. A stationary vehicle communicated with a test vehicle moving along urban area and suburban road in two different scenarios. The communication range and receiving levels obtained from this study will be used to develop and verify various safety scenarios using V2V communication within K-city in the future.

Optical Vehicle to Vehicle Communications for Autonomous Mirrorless Cars

  • Jin, Sung Yooun;Choi, Dongnyeok;Kim, Byung Wook
    • Journal of Multimedia Information System
    • /
    • v.5 no.2
    • /
    • pp.105-110
    • /
    • 2018
  • Autonomous cars require the integration of multiple communication systems for driving safety. Many carmakers unveil mirrorless concept cars aiming to replace rear and sideview mirrors in vehicles with camera monitoring systems, which eliminate blind spots and reduce risk. This paper presents optical vehicle-to-vehicle (V2V) communications for autonomous mirrorless cars. The flicker-free light emitting diode (LED) light sources, providing illumination and data transmission simultaneously, and a high speed camera are used as transmitters and a receiver in the OCC link, respectively. The rear side vehicle transmits both future action data and vehicle type data using a headlamp or daytime running light, and the front vehicle can receive OCC data from the camera that replaces side mirrors so as not to prevent accidents while driving. Experimental results showed that action and vehicle type information were sent by LED light sources successfully to the front vehicle's camera via the OCC link and proved that OCC-based V2V communications for mirrorless cars can be a viable solution to improve driving safety.

Reduced RSU-dependency Authentication Protocol to Enhance Vehicle Privacy in VANET (VANET에서 RSU의 의존성을 줄이고 차량의 프라이버시를 강화한 인증 프로토콜)

  • Rhim, Won-Woo;Kim, Jong-Sik;Kim, Sang-Jin;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.21-34
    • /
    • 2011
  • VANET offers variety of services to allow safe and comfortable driving through V2V and V2I communications in transportation systems. To use these services, safe and reliable V2V and V2I communications must be guaranteed. In this regards, many RSU-based studies have been carried out to meet certain issues such as: efficiency of frequent communication between RSU and vehicles, security of stored information in RSU, and invasion on vehicle's privacy. In this paper, a scheme is proposed to reduce the dependency on RSU and to enhance the vehicle privacy by using signature-based authentication protocol. The proposed protocol is more efficient than existing protocol with group signature, and satisfies all the requirements of VANET.

New Line Coding of Visible Light Communication System for WPAN (WPAN용 가시광 통신 시스템의 새로운 라인코딩)

  • Kim, Jin-Young;Choi, Jae-Hyuck;Sang, Cha-Jae
    • Journal of Broadcast Engineering
    • /
    • v.14 no.1
    • /
    • pp.70-80
    • /
    • 2009
  • We propose an ideal line coding for high speed data communication in visible light communication system. B4-HBT line coding is defined as follow. The 1 bit is +V at first though 1 encodes +Voltage and -Voltage doing change of shift each other, then -V newly. V that is been mutually contradictory for 1 bit that exist before that if continuous 0 bits exist 4 here same and reduces mistake because has reverse mark V in 4 continuous last 0 bits and gives half bit variation in 1 bit and made effect of noise low. 2${\sim}$3 dB profit is seen comparing with line coding that exist in simulation result.

The Simplified V2V Communication Authentication Service for Privacy Protection (프라이버시 보호를 위한 V2V 통신 인증 서비스의 간략화)

  • Park, Sung-Su;Han, Keun-hee;Kim, Keecheon
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.1
    • /
    • pp.35-40
    • /
    • 2016
  • One of the next generation of automotive V2V communication technology is a core technology for next-generation ITS as a technique used for communications between the vehicle. Looking at the existing V2V communication using the pseudonym certificate authentication service structure to meet the security requirements for privacy protection. Since the issuance of multiple certificates when needed authority in issuing and managing to use the pseudonym certificate issued once and it takes a lot of time. In this paper, we present the method utilizing a vehicle ID to meet the security requirements for the privacy protection without the use of a pseudonym certificate.

실행시간 V2X 안전 서비스 통신 성능 평가를 위한 가상 환경 기반 시뮬레이션 플랫폼 설계

  • O, Jun-Ho;Park, Pyeong-Seon;Mun, Hui-Seok;Jeong, Jae-Il
    • Information and Communications Magazine
    • /
    • v.29 no.2
    • /
    • pp.39-45
    • /
    • 2012
  • V2X 차량 안전 시스템은 ITS 환경에서 주행하는 모든 차량들이 V2V 혹은 V2I 기반의 협력통신을 통해 안전 서비스를 제공하는 기술이다. 이는 실제 도로환경에서의 실험, 즉 Field Operational Tests(FOTs)를 통한 검증과 평가 수행이 요구된다. 그러나, 일반적으로 실 도로환경에서 시스템 및 서비스에 대한 검증과 평가는 많은 시간과 비용을 필요로 한다. 따라서 실제 도로 주행 테스트 전에 V2X 안전 서비스의 기본적인 성능을 검증할 V2X 시뮬레이션 방안이 필요하다. 본 논문에서는 국외의 V2X 시뮬레이터 기술 개발 동향과 함께 차량 간 통신 시뮬레이션 분야에서 연구되고 있는 주요 이슈들을 알아보고 이를 극복하기 위한 연구 방호별 제시한다.

Analysis of V2V Broadcast Performance Limit for WAVE Communication Systems Using Two-Ray Path Loss Model

  • Song, Yoo-Seung;Choi, Hyun-Kyun
    • ETRI Journal
    • /
    • v.39 no.2
    • /
    • pp.213-221
    • /
    • 2017
  • The advent of wireless access in vehicular environments (WAVE) technology has improved the intelligence of transportation systems and enabled generic traffic problems to be solved automatically. Based on the IEEE 802.11p standard for vehicle-to-anything (V2X) communications, WAVE provides wireless links with latencies less than 100 ms to vehicles operating at speeds up to 200 km/h. To date, most research has been based on field test results. In contrast, this paper presents a numerical analysis of the V2X broadcast throughput limit using a path loss model. First, the maximum throughput and minimum delay limit were obtained from the MAC frame format of IEEE 802.11p. Second, the packet error probability was derived for additive white Gaussian noise and fading channel conditions. Finally, the maximum throughput limit of the system was derived from the packet error rate using a two-ray path loss model for a typical highway topology. The throughput was analyzed for each data rate, which allowed the performance at the different data rates to be compared. The analysis method can be easily applied to different topologies by substituting an appropriate target path loss model.

Software Implementation of WAVE Security Algorithms (WAVE 보안 알고리즘의 소프트웨어 구현)

  • Kang, Jung-Ha;Ok, Sung-Jin;Kim, Jae Young;Kim, Eun-Gi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.3
    • /
    • pp.1691-1699
    • /
    • 2014
  • IEEE developing WAVE specifications are able to support V2V and V2I wireless communications, and these functionalities can be used to enhance vehicle operational safety. To overcome any security weaknesses that are inherent in wireless communications, WAVE specification should support message encryption and authentication functions. In this study, we have implemented WAVE security algorithms in IEEE P1609.2 with openssl library and C language. We have verified the normal operation of implemented software, using the test vectors of related specifications, and measured their performance. Our software is platform independent, and can be used for the full implementation of WAVE specification.

EXTENDED DIRECTED TRIPLE SYSTEMS WITH A GIVEN AUTOMORPHISM

  • Cho, Chung-Je;Han, Yong-Hyeon
    • Communications of the Korean Mathematical Society
    • /
    • v.19 no.2
    • /
    • pp.355-373
    • /
    • 2004
  • An extended directed triple system of order v, denoted by EDTS(v), is a pair (V, (equation omitted)) where V is a v-set and (equation omitted) is a set of transitive triples of elements of V such that every ordered pair of elements of V is contained in exactly one member of (equation omitted). We obtain a necessary and sufficient condition for the existence of cyclic EDTS(v)s, and when k=1 or 2, we also obtain a necessary and sufficient condition for the existence of k-rotational EDTS(v)s.