The automation of road vehicles is still developing, moving towards improved technology, safety, energy and fuel efficiency, comfort, economic growth, and real-world applications. Vehicle connectivity and information exchange over the road is an essential requirement for the future of automated driving. This book is intended to help bridge the gap between theory and applications of autonomous vehicles.
Vehicular Ad Hoc Networks and Emerging Technologies for Road Vehicle Automation covers autonomous road vehicles and systems, with a particular focus on vehicular ad-hoc networks (VANETs). VANETs are a key part of the intelligent transport systems framework. They are created by applying the principles of mobile ad-hoc networks to vehicles; that is, the spontaneous creation of a wireless network of mobile devices based on inter-vehicle communication. Coverage also includes further aspects of autonomous road vehicles, including hybrid vehicles, autonomous intelligent vehicles, and autonomous decentralized systems (ADS).
The book is essential reading for researchers and advanced students from academia, industry and government working on the automation of road vehicles. Additionally, it is a helpful resource for students, researchers and newcomers to the field; providing an in-depth understanding of autonomous road vehicles, their internal structure, types, and fundamental principles, helping to inform and direct their research, and identify challenging areas and problems where further investigations are needed.
Inspec keywords: mobile radio; road safety; ad hoc networks; vehicular ad hoc networks; security of data
Other keywords: vehicular ad hoc networks; automobiles; road safety; traffic engineering computing; Internet; transportation; road vehicle automation; ad hoc networks; mobile radio; security of data; wireless LAN
Subjects: General electrical engineering topics; General and management topics; Mobile radio systems; Data security
Vehicular Ad Hoc Networks (VANETs) involve the integration of transportation systems with Internet systems, which constitute the major motive for the increase in passenger safety. The Internet of Things (IoTs) contains a mobile ad hoc network component which in turn includes a part called the Vehicle Ad hoc Network. The Internet of Energy (IoE) is a new realm formed by electric automobiles connected to ad hoc vehicle networks. Because various transport systems are being built and numerous applications designed to manage these networks, there are also increasing attacks in this area. As the energy Internet is connected to ad hoc vehicle networks via electric vehicles, there may be a question of the survival of the ad hoc vehicle networks if safety considerations are not relevant. In this survey, several kinds of car network attacks are covered by existing security solutions to address the attacks intelligent transportation system (ITS), with information and communication technologies and wireless embedded sensor devices in today's vehicles, is a realistic and required component of smart cities. The smart transportation system is intended to improve road safety and traffic efficiency and to provide information services. Notifying drivers of dangerous road conditions and giving them knowledge from past traffic will undoubtedly increase driver security and decrease traffic congestion at the right time. Technically, the smart transport system depends on known ad hoc vehicle networks, self-organized wireless networks. Mobile cars in the VANET can do the job of stationary sensors in infrastructure networks. In real-time, they can gather, identify, and communicate traffic information, driving conditions, and any road hazards. VANETs have become a highly active area of research in recent years. VANETs are very attractive to academics and industry because of their unique properties including extremely dynamic topology and predictable movement.
The rapid advancements of network technology over the past decade have accelerated the development of state-of-the-art software, hardware and transmission technologies. This has led to the promotion of several diverse networks in multiple technological domains that differ based upon their application requirements. A particular network type that has attained the spotlight recently is the Vehicular Ad Hoc Networks or VANETS. The promising potential of VANETS in improving human transportation, by providing digital vehicle infrastructures and customized passenger comfort, has been responsible for the development of vehicular networks as a domain of extensive research and standardization. Routing, broadcasting, Quality of Service (QoS), and security are the areas specified in focus for quite a number of VANET research work. This chapter discusses the role of Medium Access Protocols in VANETS. MAC protocols clearly explain the method by which the nodes share the underlying channel. As there is no VANET standard, earlier used one was IEEE 802.11a and 802.11b for the purpose of MAC layer access technologies. Here in this discussion, we have taken up designing an effective MAC so that timely safety messages can be sent reliably, since it is a serious matter of human lives involvement in VANET. Two major goals of VANETs are to improve road safety and to increase transportation efficiency. An unfailing and effective MAC is the need to achieve the two important goals. Delivery success rate, delay, throughput, bandwidth utilization, fairness, and overhead of the transmitted packets are to be balanced critically by the MAC protocols. A synopsis of development of the development of MAC protocols and its standards have been elucidated in this chapter.
The innovative technology Vehicle Ad Hoc Network (VANET) has received a great amount of interest in recent years. Due to rapid changes in topology and frequent disconnections, the efficient protocol for data routing between automobiles known as vehicle to vehicle (V2V) or vehicle to infrastructure (V2I) is hard to design for roadside infrastructure and automotive communication. The current VANET routing methods cannot deal with all traffic situations. This emphasized the development of an excellent routing mechanism. It is therefore important to determine the advantages and disadvantages of routing protocols that may be utilized to design or construct new routing protocols. In this article, the pros and disadvantages of VANET communication routing methods are addressed. An ad hoc car network that can set up all network devices to act as a host and a network router. Only nodes help each other to deliver information. Ad hoc vehicle networks were mostly temporary and less accessible infrastructure networks. The channel location and network connection instability diminish mobility and resource boundaries in the performance unit. Improve the relevant layering methods in other performance units used to stack communication through information exchange at certain other protocol levels. Everything is good ad hoc protocol routing for AODV. While the VANET is helping to provide efficient logistics and transport solutions, several difficulties must be addressed if an appropriate solution is to be found.
Short-distance communication technology is used by Vehicular Ad Hoc Networks (VANETs) to connect vehicles and infrastructure. As a result of this, new apps can now be made available. Attackers can, however, take advantage of the dynamic network design to compromise the security and privacy of cars and message forwarding. Based on trust evaluation, this study proposes a socially aware security message forwarding mechanism. As a means of protecting vehicle privacy, this pseudonym evaluates the exchange conditions to ensure that the attacker cannot track the vehicle at all times while it's on the road. The road side units deliver the message to numerous relay cars and an application provider via the trust gradient to several different receivers. In light of the data, the suggested method appears to have the potential to improve message forwarding success rates, reduce message leakage risks, and better safeguard the privacy of users on VANETs. As wireless communication and the automotive sector continue to advance, interest in VANETs has risen dramatically in recent years. This advancement in wireless communication is expected to have a positive influence on vehicle safety and efficiency when it is incorporated in intelligent transportation systems (ITS). VANETs standards are being developed through collaboration between many organizations, including the federal government, the automotive industry, and academia. VANETs uses include accident warnings and sharing of traffic information. VANETs, as a result, have turned into an interesting area of study for many persons interested in mobile wireless communication. You will learn about VANETs' current state-of-the-art and the problems and opportunities that lie ahead. You will also learn about recommendations for moving forward towards the long-awaited ITS.
The focus of today's study is on Vehicular Ad Hoc Networks (VANET). Existing VANET security technologies are still being assessed to ensure that the network is protected from attacks and breaches. The security and privacy of VANETs are interwoven with the networks' ability to withstand disasters. This chapter takes a close look into wireless networks, with a particular emphasis on creating research approaches for securing VANETs (virtual area networks). This study, which goes into great detail about the dangers of wireless network jamming, has demonstrated a wireless network jamming attack. The types of jammers used in wireless ad hoc networks, as well as the locations of jammers, are the two most important elements of jamming techniques in these networks. VANETs are a topic that has piqued the interest of many people, who are actively researching them. The development of self-driving and semi-autonomous vehicles will be impossible without the use of VANETs, which increase both safety and comfort. The fact is that, whether or not security concerns are prevalent in VANETs, they provide significant challenges. It is the goal of VANET to create a network of autonomous vehicles to increase driver comfort and safety while also increasing efficiency. The transmission of information in smart vehicles is expanding at a rapid pace, and all of these vehicles currently communicate with one another via internet services. The majority of the functionality of these vehicles is dependent on data control and the environment's cooperative awareness messages. This puts VANETs in danger of a wide range of cyberattacks as a result of their vulnerability.
In the past few years, cloud computing (CC) has taken the attention of the scientific community and researchers. CC has been further extended to fog and edge computing (in terms of better efficiency). It can be used in vehicles to store data at a remote server and provide efficient users/passengers. In autonomous cars, cloud-based vehicles or vehicles based on cloud computing can react to users' responses smartly and quickly. Vehicle CC (a hybrid technology of cloud and cars) can help society/governments in traffic management and road safety by instantly using vehicular resources, such as computing, storage, and the Internet, for decision-making. Hence, these services can be provided as an automated and intelligent vehicle to reduce the crowd over the road network. Also, the security and privacy of passengers/users will be protected against any cyber-attacks like a bot, worm, trojan, ransomware, etc. Hence, this chapter briefly details vehicular CC and its scope (including various interesting remarks).
Presented in this chapter is an overview of vehicle-to-everything connections as part of the long-term evolution (LTE) project. Specifically, researchers look at how infrastructure can communicate with vehicles via broadcast/multicast 4G LTE service, as well as how vehicles can communicate with each other using the LTE side connection. Designers also go through the major vehicular services. But in the interim, there is a new platform being built called 5G, which aims to improve existing services while also opening the door to a host of new ones that require ultra-reliable, low-latency connections to be developed. This is a novel radio access technique for increasing network density while simultaneously improving coverage and accessibility on existing platforms [such as 2G, 3G, 4G, and wireless fidelity (Wi-Fi)]. What this means is that the purpose of 5G is for it to meet the communications requirements of numerous different groups. In terms of both technology and application, 5G will have the greatest impact on automobiles. In light of the deployment of 5G, experts and industry insiders are already looking forward to 6G. According to these experts, 6G will be the most important technology for information exchange and social interaction after 2030. Artificial intelligence will fuel 6G's highly autonomous closed-loop network, making up for 5G's communications, processing, and global coverage constraints (Artificial Intelligence of Things). 6G life may require vehicles to replace smartphones, and the ultimate goal of vehicle development is zero-pollution vehicles that are both incredibly safe and self-sufficient. To keep drivers and passengers safe and engaged in future automobiles, more 6G vehicular intelligence research is required. There is an increasing number of people that rely on wireless communication. Mobile has had a major impact on the younger generation. Wi-Fi protocols are being rolled out all over the world to help with this. Wireless phones, like individuals, have free will. The wireless standards for the fourth generation have now been created. A wide range of traffic efficiency and road safety applications are being developed to meet the pressing demand for smarter, greener, and safer mobility.
Autonomous intelligent vehicle (AIV) is no longer a science fiction as it has been realized in today's era of the computing world. The research and development on autonomous vehicles have been going on for decades with constructive outcomes. Autonomous vehicles have expanded their areas of applications apart from the transportation sector. The internal structure and major components of the vehicle play a crucial role in making it autonomous. After the sophisticated hardware and sensors used in them, they are required to be learned and trained to mimic the driving style of a normal human driver. For this purpose, artificial intelligence and its subsets have played a pivotal role, without which the idea of self-driving vehicles would have just remained abstract. Software tools provided by machine learning can help assist an AIV in scene comprehension, decision-making, and planning. Deep learning algorithms like long short-term memory can be implemented to make such vehicles more intelligent and take decisions just like a human brain does. Besides, if not applicable for transporting people, AIVs have been used as robotic vehicles to transport goods and carry out tasks in industries. Computer vision can immensely help AIVs and could potentially help in reaching higher levels of autonomy. Nonetheless, with all the advantages, autonomous vehicles also suffer from various issues and challenges which still remain to be improvized to achieve the far-fetched dream of fully automated driverless vehicles.
With new discoveries being made every day in the field of technology and new inventions rising among the society, those tasks that once required manual labors have now been hugely replaced with softwares and automation systems that simplifies the tasks with the click of a button. With a huge population across the world and with emerging trends in the industrial sector, the human economy has not only observed huge changes in growth and development but also rising sophisticated demands to meet every day needs of the common man. With India becoming a trillion economy, a huge rise in population and growth in various sectors, have led to drastic changes in the environment. Today, travel has become a necessity for many people in the workforce. With public transports, hugely meeting the demands of a large population, people today prefer to use their own forms of transport for commuting. This practice no only increases the amount of carbon-footprint and consumption of resources such as fuel but also requires a huge demand in infrastructure to store and park vehicles. According to a recent survey made by World Health Organization (WHO), lack of infrastructure for parking the vehicles has resulted in increased waiting time, fuel consumption and high amounts of air pollution. With parking systems mostly being man-handled, today with the help of technologies, we have been able to automate this process of allotting a parking space for vehicles with the help of software and apps. This system gains access to the user information and allots a parking space manually by analyzing user data and the vehicle requirements. But the question of security of user-data is one question that remains unanswered. Since user data is vulnerable to the breach of security attacks and manhandling, we need a solution that can not only satisfy the storage requirements but also meet the security requirements. One such solution that we will be considering is a hybrid technology of blockchain and biometrics that can provide two layers of protection to the user level data, offering storage in the cloud at the same time. Blockchain revolves around distributed computing and architecture that takes care of integrity and authentication of data., whereas biometrics plays the role of authenticating and analyzing the user information for the purpose of verification and control of data. Deploying and studying the use of this hybrid technology can help in providing a secure environment for user data in vehicle transportation systems.
Several changes have occurred in the automobile business over the past decade. Internet of Things (IoT) devices has been employed in a wide range of applications. As automobiles become increasingly automated and sophisticated due to smart devices being used in their technology, however, the term "intelligent automation" refers to automatically responding to user inquiries by taking necessary action to decrease or avoid any casualties in the event of an accident. Here we present a comprehensive discussion of IoT-based vehicles or the importance of IoT-based vehicular technology. Researchers can use this chapter to gain new insights into IoT-based vehicles. Aside from the broad application of machine learning and deep learning, IoT-based vehicles are typically equipped with these concepts so that they can respond quickly to any user queries or increase their efficiency.
It is the purpose of this chapter to discuss the introduction of the smart transportation system (STS) and its working practices, as well as to categorize the STS and its advantages. In addition to its chapter, the literary evaluation examines the motivation and sensitivity of the organization. The automotive and academic sectors have also taken an interest in cyber-attacks on STSs, problems, and problems relating to intelligent transportation systems (ITSs) (including security and privacy issues), future research opportunities in STSs (including ITS Architecture), and security potential for conflict (which includes cyber-attacks on STSs. In addition, the open nature of the STS, which functions as a wireless communication technology, poses a threat to security and privacy in the workplace. Additionally, the security and privacy mechanisms for the ITS are classified, and the vulnerabilities of these systems are highlighted. ITSs are a complicated field at the beginning of their development, requiring sophisticated data models, dynamic behavior, and strict time restrictions. It is a difficult undertaking that is dependent on the safety and efficacy of public transportation systems. One of the most essential aspects in the development of an ITS is the implementation of basic architecture standards as well as unique security requirements for each system.
In the recent years, vehicular technology has been improved to a tremendous level. From driver to driverless, we have converted our vehicle in today era. For example, Tesla and other company is working on providing driverless cars. Here, driverless means autonomous, i.e., ability to react in every situation. To reduce number of accidents, reduce emission of gases, and improving passenger's satisfaction level or completely securing user's information against today's new types of cyber-attacks, etc. Such features need to enabled or inbuilt with vehicles. This chapter discusses about autonomous vehicles (AVs) and also discusses about localization, navigation or tracking or traces mechanisms for the same vehicles. This chapter gives clear description that "How Autonomous Vehicles (AV) can change the future and the public transportation system".
Among the characteristics of vehicular communication include a dynamic environment, high mobility, and the comparatively modest antenna heights of the communicating entities (vehicles and roadside units). Because of these properties, vehicle propagation and channel modeling are particularly difficult to accomplish. With an emphasis on the applicability of vehicle propagation and channel utilization models for evaluating protocols and applications, this chapter analyses vehicle propagation and channel utilization models. Understanding the transmission methods and execution methodology adopted by each model is the first step toward categorizing them properly. Models can be categorized in several different ways. One method is through the use of channel characteristics that have been implemented. Another technique is to assess how feasible certain options are (e.g., geographical data input). In addition to modeling unusual surroundings (such as tunnels, overpasses, and parking lots), other topics covered include novel forms of communication vehicles that have not previously been examined in vehicular channel modeling, etc. (e.g., scooters, public vehicles). The incorporation of information and communication technologies into road transportation systems has tremendous potential. The construction of V2V (vehicle-to-vehicle) communication lines is required to accomplish this vehicle to infrastructure (V2I). To facilitate this form of connection, the IEEE 802.11p and LTE-V (long-term evolution for vehicle communications) protocols have been proposed as two choices. It is the purpose of this chapter to study the physical and medium access control layers about the features of the communication channel between vehicles. It begins by discussing the most significant influences on V2V and V2I channels, as well as some of their most notable characteristics, before moving on to other topics. In addition to offering instances of roadway conditions, the literature also includes a description of the channel parameters, which is particularly useful. Illustrative following that, modeling methodologies are evaluated, and two of the most commonly used ones are described in greater detail.
The provision of "free tone" or "toll-free" services, for example, is also available on fixed networks through the use of intelligent network (IN) techniques that are peculiar to mobile networks. They will, on the other hand, welcome the ability of an IN architecture (INA) to give tailored services to mobile customers to help them better manage incoming calls. Additionally, the use of IN methods makes it feasible to develop a diverse range of new services. Second-generation cellular systems, like Global System for Mobile Communications (GSM), have architectures that are already capable of supporting IN-type applications. The HLR function, in particular, has a close relationship with the In-Service Control Point (ISP). Mobile customers and service providers will both receive the benefits of technology advancements shortly, which will benefit both parties equally. With the advancement of telecommunication technology and the increasing need for increasingly sophisticated services, attempts to standardize International Intelligent Networks have sprung up to address these issues (IN). Because IN are denigrated by the INs standards, service providers must make their own implementation decisions. These opponents also object to a design that is flexible enough to allow for future expansion to include other IN capability sets (CSs). International IN services provided by standardization organizations such as CCITT/ ITU-T and European Telecommunications Standards Institute (ETSI) enable service providers to implement them INA by providing international IN services. When deploying an intelligent network, the global intelligent network architecture (GINA) should be the starting point, not the endpoint (IN).
With recent advancements in wireless communications, new computer networking research topics have sprung up to provide data network access to regions where wired solutions are impractical or impossible to implement. Vehicle traffic is receiving more academic and industry attention as a result of the sheer variety and significance of related applications, which include everything from road safety to traffic control to mobile entertainment. Autonomous Vehicular Ad Hoc Networks (VANETs) are self-organizing networks made up of autos that are on the go (mobile ad hoc networks). Specialized networking solutions must be designed and tested using computer simulations to determine whether or not they are feasible for the creation of VANETs. It is extremely difficult to create realistic non-uniform vehicle and velocity distributions and unique connection dynamics in VANET simulations, which pose substantial obstacles. However, although the efficient use of other service channels has gotten less attention, resource allocations for safety-related applications on the common control channel have attracted a great deal of attention. Platooning of trucks, autonomous driving, and other intelligent transportation system (ITS) safety applications are all expected to exist side by side with non-ITS mobility technologies in the future, necessitating the usage of various communication channels and sharing of the ITS spectrum. Through the redirection of traffic to alternate paths, multi-channel operations seek to reduce the communication stress placed on individual channels and networks. It is discussed here how ITS legislation and procedures in the United States and Europe deal with coexistence and multi-channel communication. ITS frequency allocations and access restrictions are discussed first, followed by explanations of the protocols that are currently available in standards and research and development.
A wide range of technologies have been adopted to improve transportation by making it more convenient and efficient for passengers. However, recent academic-industry collaborations demonstrate that the paradigm for intelligent transportation systems is on the verge of shifting. Vehicles will be outfitted with computing, communication, and sensor systems, among other things. It is because of them that new and more diversified transportation systems that increase safety and efficiency while also providing entertainment will be made feasible in the future. An examination of a variety of concepts, methods, and technology connected to vehicle communication systems is the focus of this article. The use of simulation trials to evaluate system performance continues to be the most common method of evaluating inter-vehicle communication (IVC) system performance, even though field operational testing has already commenced. The strategy, tactics, and models that they use will be distinct from those used by other professions if they are to be effective. This chapter addresses how to prioritize scalability and applicability when selecting models, as well as the interactions that occur between the models themselves. When it comes to IVC simulations, the trade-off between scalability and applicability is extensively addressed in the models as the granularity of the simulation rises. Now we will speak about some of the most widely used simulation frameworks in IVC, and we will examine how they compare to the technique we'll be utilizing in the future. Vehicles in network simulation (Veins), iTETRIS, and VSimRTI are three well-known free IVC simulation systems, and they are all available online. Specifically, we address the appropriate selection of models and the granularity of their granularity about IVC application requirements to provide recommendations for effective and scalable simulations of IVC applications and to provide an overview of their relevant support in each toolkit.
The world has been evolving at lightning speed with new technologies being invented every other day and the transportation sector is surely one of the fields taking the fast track towards innovation, advanced technology and inventions. Intelligent transport system (ITS) is one of the enhanced applications of the transportation sector which provides intelligent and smart network/framework services by holistically addressing the various aspects of the sector like safety, traffic control, interconnected networks, etc. Autonomous intelligent vehicles (AIV) are majorly considered as the crucial components of any ITS framework. This chapter addresses one of the most sought-after challenges of the field which is linked to the security, privacy, and trust/reliability aspects of an intelligent and smart framework. The fact that such systems extract large amounts of data from the users and nodes within the system is one of the major highlights which may lead to various consequences and external attacks if due importance is not given. Furthermore, exposing the data acquired to other organizations or data breaches which leads to confidential data of the users reaching malicious users puts the privacy and safety of the users at stake. This chapter will elucidate and elaborate on the various safety and security aspects of ITS/AIV and will also give insights on the perspective or trust and reliability of the users being important factors that drive the successful implementation of the system.
The transportation sector has been undergoing revolutionary changes over the last few years with so many technically advanced integrations including those of smart vehicles, automation, connected vehicle networks, and so on. This Chapter gives insights and analyses on the evolution of the transportation industry with respect to the incorporation of various tech formulas. Such evolving concepts prove to be a relief to the numerous curbs and challenges that are encountered like traffic- related problems and safety and reliability concerns in connected vehicular networks. Off late, one of the highly improvising domains in the transportation domain is the Internet of Vehicles (IoV) which deals with interconnection and communication of vehicular nodes in the framework and Vehicular Ad Hoc Networks (VANETs). In order to ensure that such frameworks can work robustly, a variety ofous routing protocols which are involved in data transmission exist. Another important factor to be assessed when dwelling into such fields is to monitor the performance metrics rigorously and constantly analyze the improvisational components for further growth and improvement. In order to curb traffic management- related issues, real- time information extraction systems are often implemented so as to extract wanted details and values from the vehicles of the connected framework to ensure that the control station can manage the traffic accordingly. Further, with the evolution of wireless network connections, technologies like 5G on integrating with IoV can break barriers and enhance the efficiency to a great extendsextent. This chapter provides a holistic perspective of emerging vehicle technologies along with their trends, applications, and standards.
This book has been written to learn more about Vehicular Ad Hoc Networks (VANETs) and their related emerging technologies for road vehicle automation. Toward this, we have discussed many chapters in this book.