You are on page 1of 11

review articles

doi:10.1145/2076450.2076470
vehicle safety techniques such as driv-
Vehicle area networks form the backbone of er fatigue detection/warning mecha-
nisms and other driver-assist tools into
future intelligent transportation systems. vehicles may significantly help in pre-
venting accidents and increase crash
By Miad Faezipour, mehrdad nourani, survivability.
adnan saeed, and Sateesh Addepalli This article surveys the main in-
novations in vehicle area networks

Progress and
(VAN) featuring driver safety. We
mainly focus on the recent develop-
ments of intelligent transportation
systems (ITS) for intra-vehicle and

Challenges
inter-vehicle-area-networks to assist
driver safety:
Intra (In-Vehicle) VAN. Intelligent
intra-vehicle systems are becoming

in Intelligent
necessary components of smart ve-
hicle system research. Intra-vehicle
networks deal with the data communi-
cation network of onboard equipment

Vehicle Area
(OBE) for assessing a driver’s behavior
or a vehicle’s performance. Two ve-
hicle safety techniques—passive and
active—are currently being employed

Networks
and devised in vehicles. Passive vehi-
cle safety includes a set of tools or de-
vices such as seatbelts or air bags that
improve safety in the event of an acci-
dent. On the other hand, active vehicle
safety techniques consist of a variety of
techniques such as on-board driver as-
sistance tools (for example, driver fa-
tigue detection), lane-keeping or con-
gestion control tools and many more,

Muc h attentio n h as recently been paid to smart key insights


vehicle research to assist drivers and ultimately  Intelligent transportation systems (ITS)
revolutionize the way vehicles, road sensors, and in general and vehicle area networks
(VAN), in particular, are expected to
drivers communicate in the future. The key objective grow with the ultimate goal of achieving
an accident-free driving environment.
is to improve driver and vehicle safety. The National  The key requirement of VAN is an
Transportation Safety Board reports that U.S. highways efficient wireless intra- and inter-vehicle
communication mechanism to collect
on average experience 43,300 fatalities per year. Every and exchange data among the driver, car,
and road infrastructure.
day, more than 16,000 crashes occur on U.S. highways,
 Analytics play a major role in the future
mainly due to driver error, poor judgment, drowsiness, network of smart vehicles to quickly detect
dangerous situations, alert the driver and/
or distraction.9 The U.S. National Highway Traffic or police, and prevent accidents.
Safety Administration estimates that in the U.S. alone,  Such goals require multidisciplinary
analytics from signal processing (for
approximately 100,000 crashes (about 2% of all) each example, conditioning sensor’s raw data),
year are caused primarily by driver drowsiness or to machine learning (such as a driver’s
behavioral analysis) and data mining
fatigue.9,28 Thus, incorporating automatic active (traffic pattern database).

90 co mm unicat ions of t h e acm | fe bruary 2 0 1 2 | vo l . 5 5 | no. 2


Figure 1. Central vision of VAN.

which altogether proactively try to that not only improves driver safety, project between the California Depart-
minimize the chance of car accidents. but also creates a cooperative environ- ment of Transportation (Caltrans) and
Inter VAN. Inter-vehicle communi- ment where the right information is the Institute of Transportation Studies
cation is another key element of VAN provided at the right time. For exam- (ITS) at the University of California at
that includes vehicle-to-vehicle (V2V), ple, drivers and vehicles can optionally Berkeley along with other public and
vehicle-to-broadband cloud (network) exchange useful information such as private institutions and agencies (www.
communication (V2B), and vehicle-to- weather/road conditions, traffic jam, path.berkeley.edu). It targets intelli-
roadside-infrastructure communica- or business/pleasure information such gent transportation systems develop-
tion (V2I) using roadside units (RSU). as shopping or dining deals as they ment by applying advanced technology
An intelligent VAN is a network of travel along the same road. The ulti- to particularly increase highway capac-
vehicles that interact with one another mate goal is to provide an accident-free ity, enhance public safety, and reduce
and with infrastructure to transmit environment and move toward imple- traffic congestion, air pollution, and
and receive data. Various interactions mentation of the zero-accident car by energy consumption.
Illustration by Ja mes Ga ry

among participating elements are the help of vehicle area networks.12 The SafeTrip-21 (Safe and Efficient
shown in Figure 1 and may include There are several ongoing research Travel through Innovation and Part-
lane-keeping signals, obstacle detec- and projects that aim at enhancing in- nerships for the 21st Century; www.
tion, adaptive cruise control, naviga- telligent transportation systems. Part- rita.dot.gov) initiative is another proj-
tion data, driver status, and so on. This ners for Advanced Transit and High- ect sponsored by the U.S. Department
provides automatic driver assistance ways (PATH), is a collaborative research of Transportation (DOT). It is part of

f e br uary 2 0 1 2 | vo l. 5 5 | n o. 2 | c ommu n i c ati o n s o f the ac m 91


review articles

the IntelliDrive program in which a vehicles draw energy to start their mo- systems, mainly, onboard equipment
consortium of carmakers conducts tors. Future electric vehicles (for ex- (OBE) collect information from the
demonstrations and operational tests ample, electric trolley bus) will be part driver or vehicle and analyze and clas-
to speed up the deployment of com- of VAN and will not only draw energy sify the data collectively to predict or
munication/navigation technologies from the smart grid, but will also store detect driver fatigue.
that improve transportation safety and back energy to the grid and allow vari- Machine learning techniques are ex-
mobility features. ous data communication. tensively used for such data classifica-
Simultaneously in Europe, several As vehicular networks are expected tion.45 This platform collects standard
institutes and organizations work on to become somewhat ubiquitous by vehicle information such as the speed,
intelligent transportation system de- 2016, security elements for these types pressure on the brake or gas pedal,
velopment and vehicle-network con- of networks would also come into the steering wheel rotation, and global po-
nectivity. The Cooperative Vehicle In- picture. It is clear that false or unau- sitioning system (GPS) routing.44
frastructure Systems (CVIS) that is part thorized data communication or at- In addition to standard vehicle in-
of the European Commission was built tacks leading to denial of service with- formation, driver behavioral informa-
upon the foundation of V2V and V2I in such a VAN could cause devastating tion such as facial expression (for ex-
communications for increasing the results compromising the driver judg- ample, blink rate, yawning, eyebrow
efficiency of road network/transporta- ment and/or safety. raise, chin drop, head movements)
tion (www.cvisproject.org). The Com- VAN calls for collaboration among can be collected and analyzed.43 Even
plex Embedded Automotive Control interdisciplinary areas in electrical, physiological signals such as heart-rate
Systems (CEmACS) is a research collab- computer, biomedical, telecommuni- variability and electroencephalogram
oration among some universities in the cation, and mechanical engineering to (EEG) signal behavior can be sampled
U.K., Germany, Sweden, Norway and address a variety of issues. This article to determine the drowsiness (non-
Ireland that work on complex vehicle provides a comprehensive survey in the alert) level of the driver.8 Researchers
dynamics and control for active vehicle main communication and networking have reported there is a high correla-
safety (www.hamilton.ie/cemacs). components of VAN. We survey the re- tion between the level of alertness and
In Asia, there are several ongo- cent progress and advances in vehicle the power signal in the alpha and theta
ing activities that focus on intelligent area networks and their constructing band of the EEG signal.56
transportation systems. The Tokyo components, particularly in-vehicle Other physiological signals such as
Smartway project aims at developing VAN, V2V, V2B, V2I, standards, and the electrocardiogram (ECG) signal (for ex-
intelligent roads for the 21st century security and privacy of VAN. Addition- ample, using wireless wrist-mounted5
by enabling automated driving using ally, an overview of the top challenges or seat-installed sensors), electroocu-
ITS technologies. The Electronic Road in each element of this emerging net- logram (EOG), electromyogram (EMG),
Pricing (ERP2) project in Singapore work is highlighted and can potentially blood pressure (BP), and sweating on
focuses on constructing a comprehen- inspire researchers in the field. the palm (for example, when driver
sive road network by integrating in- touches the steering wheel) could be
vehicle units for electronic payments In-Vehicle VAN used for fatigue detection and sleep
of various vehicle or road transactions. In-Vehicle Data Collection/Analysis Sys- episode prediction. In such a plat-
Electric vehicles have been proto- tems. Intelligent intra-vehicle com- form, sensors and audio/video (such
typed and some commercialized in munication systems for detecting a as microphone/camera) can be used
the past several years. Next-genera- vehicle’s performance and especially for collecting signals for this purpose.
tion, grid-based electric vehicles are a driver’s fatigue and drowsiness, is This platform itself is an in-vehicle net-
currently under investigation to in- critical for driver and public safety. work that engages potentially a large
crease the power and fuel efficiency This is becoming a major stream of number of sensors in the car to collect
of future vehicles. In this platform, a research in the area of intelligent ve- vehicle or driver information. It may
smart electric grid is formed where hicle systems. Intelligent in-vehicle optionally transmit this data to a moni-
toring data center for further process-
Table 1. Common in-vehicle protocols. ing and receive feedback, for example,
a warning signal, for the driver.
In-Vehicle Communication Network.
CAN LIN FlexRay MOST J1850
A specialized communication network
Application soft low cost hard multimedia diagnostics
with the ability to operate in a harsh
real-time low speed real-time
environment is required to intercon-
Bandwidth 500kpbs 19.6kpbs 10Mbps 24.8Mbps 41.6kpbs
nect all OBEs. Controller Area Network
Control multi-master single-master multi-master timing-master multi-
master (CAN) is the earliest serial commu-
Bus Access CSMA/CA Polling TDMA TDM/CSMA CSMA/NDA nication protocol developed for this
Redundancy No No Yes No No purpose in 1986 that allows data rates
Physical Electrical Electrical Electrical Optical Electrical up to 500kbps and distances less than
Layer Optical 40m (www.can-cia.org). Local Inter-
connect Network (LIN) has been used
since 1999 for ultra low cost and low

92 comm unications of t h e acm | fe bruary 2 0 1 2 | vo l . 5 5 | no. 2


review articles

speed (19.2kbps) communication to safety of driver and vehicle may heavily


units (door locks, power windows, side depend on this analysis.
mirrors) that do not require the com- Vehicle Controller Area Network. The
plexity or higher bandwidth of CAN vehicle controller area network (CAN)
(www.lin-subbus.de).
FlexRay is a recent protocol that pro- The ultimate is a serial bus communications pro-
tocol that allows access to the vehicle
vides deterministic and fault-tolerant
communication up to 10Mbps and is
goal is to provide internal system through an embed-
ded networked control system.20 Other
expected to replace CAN in the future an accident-free OBUs, sensors, and devices should be
(www.flexray.com). For multimedia
application within the vehicle (audio,
environment integrated within vehicle CAN to in-
crease the efficiency of in-vehicle VAN.
video, telephony, navigation) that re- and move toward Wireless sensors planted in the car (for
quire even higher bandwidths, Media
Oriented Systems Transport (MOST)
implementation example, temperature, tire-road fric-
tion, stability control, brake force) and
protocol has been in use since 2001 of the reporting data to the central system is
that can provide 24.8Mbps over optical
fiber (www.mostcooperation.com). zero-accident car one of the challenges in CAN.33
Various aspects of this challenge in-
To monitor vehicle emission and
health of different OBEs, the Envi-
by the help of cludes: potentially having large num-
ber (tens and even perhaps hundreds)
ronmental Protection Agency in the vehicle area of such sensors; low-power circuit de-
U.S. requires every passenger vehicle
sold after 1996 to provide a standard
networks. sign and management to survive sev-
eral years of operation; and reliabil-
16-pin connector (J1962) and a single ity to ensure robust work in the harsh
wire protocol (J1850) for On-Board and/or wireless environments. Other
Diagnostics (OBD). J1850 protocol is challenges of CAN include reliable
part of OBD-II defined by Society of communication with actuators such
Automotive Engineers (SAE) Inter- as cruise control, and alert messages
national (www.sae.org). Table 1 lists to the driver. Another question is what
the main features of most commonly actuators can be automated vs. provid-
used in-vehicle protocols. ing drivers with alert messages while
requiring manual (drivers’) interven-
Top Challenges tion. In addition, wireless extensions
Car-Suited Physiological Sensors. The to the in-vehicle sub-networks have
success of driver behavioral analysis performance degradation in terms
depends on accurate and robust data of reliability of communication com-
collection. While some preliminary pared to the wired networks. The chal-
works were reported in the litera- lenges lie in achieving high commu-
ture,16,43 implementing accurate sen- nication reliability while interacting
sors (for example, EEG, ECG, EMG, with other components of VAN.
EOG, BP, Sweat) and proper mounting, Generic Plug and Play Gateway. As
for example, to be none or minimally the interest for in-vehicle connectivity
visible, requires more attention. Novel is growing, a single preferably wireless
applications may include employing platform is needed to connect all the
off-the-shelf sensors/devices that can in-vehicle and mobile devices. Secu-
communicate with communication rity and connectivity can be handled
gadgets such as cellphones as a gate- by the gateway, thereby extending the
way to send or receive data to and from usable life of equipment and eliminat-
the monitoring data center. ing the need for a dedicated modem
In-Vehicle Data Analysis. Certain for every device.
data processing may be needed in ve-
hicles because of urgency or due to Existing Solutions
lack of connection to the base. This Intel In-Vehicle Devices. In 2008, Intel
challenge deals with identifying such Corporation introduced the Intel Atom
data (for example, related to fatigue) processor to enhance in-vehicle info-
and processing it using a mix of digital tainment (IVI) solutions (www.intel.
signal processing and machine learn- com). This processor is a low-power,
ing techniques that can run on em- small-footprint and cost-efficient de-
bedded processors. Such data analysis sign ideal for in-vehicle operating con-
must go much beyond what has been ditions. In particular, Intel has closely
reported in the literature,26,43 as the collaborated with Volkswagen, BMW,

f e br uary 2 0 1 2 | vo l. 5 5 | n o. 2 | c omm u n i c at i o n s o f t he ac m 93
review articles

and Harman/Becker Automotive Sys- the power and bandwidth require-


tems to integrate various communica- ments, such as GPRS used in 3G cellu-
tions and computing technologies to lar communication systems, 4G ultra
support digital media and IVI features. high speed mobile broadband such
Software for Automotives. There is
a non-profit industry alliance called The success of as long-term evolution (LTE) mobile
broadband, and mobile WiFi hotspot
GENIVI (www.genivi.org) to drive
widespread adoption of open source
driver behavioral provide standard connections for mul-
tiple vehicles and their devices.
in-vehicle infotainment software analysis depends on
framework. In addition, commercial
companies like QNX (www.qnx.com)
accurate and robust Top Challenges
Hardware/Software/Firmware. Each
provide software for automotives that data collection. one of applications mentioned here
can be used in a variety of vehicle info- requires different sensors, processing
tainment applications. units, and even actuators. There are
already some products in the market,
Vehicle-to-Vehicle Communication for example, lane-passing alarm in
V2V communication can provide a class W163-M Mercedes Benz, back
data exchange platform, expand driver radars systems (www.tradekey.com/
assistance, and facilitate active safety ks-back-radar), and tire sensors in
vehicle system development. Driver Fiat (see Table 2). However, this field
assistance is provided using coopera- is far from mature. In fact, the sky is
tive communication among vehicles the limit for innovative systems and
to adaptively broadcast and/or share gadgets that fit into consumer’s bud-
information or warning messages for get and need.
the driver. This can be further custom- Cooperative Communication. Coop-
ized for specific groups of people in erative or cognitive communications
the community such as elderly drivers. among vehicles are presently in the
Lane keeping,7 steering control and infancy phase. The goal is to facilitate
parking assistance,11 obstacle detec- data exchange and create a highly in-
tion, inter-vehicle spacing, and driver/ formative network.42 The LTE con-
vehicle exchanging optional or useful nected car initiative and the iDrive
information while traveling along the system with Internet connectivity by
same road,22,43 fall in V2V communica- Toyota, BMW, and other participants
tion category. have been recently introduced. How-
Wireless connectivity, including ever, development of a heterogeneous
wireless LAN localization can be dedi- network architecture that enables wire
cated for this type of VAN communi- speed, robust, seamless and secure
cation. When driving, vehicles can ob- communication is an ongoing effort.
serve various wireless signals such as There are many open questions that
GSM, cell tower signal, AM/FM radio, demand answers including: What one
radar signals, GPS, and wireless LAN vehicle can or cannot broadcast or re-
signals. In particular, differential GPS ceive and how to format the packets
has become prominent to determine for more effective distribution? Such
more accurate coordinates for local- distribution is, in particular, challeng-
ization.49 In wireless LAN, many access ing due to the time limit (order of sev-
points emit beacons periodically. If a eral seconds at most) that vehicles are
vehicle enters a wireless LAN-available within access range of each other.
area, the vehicle can get beacons’ in-
formation such as service-set identifier Existing Solutions
(SSID), MAC address (BSSID), signal Vehicle Telematic. Atheros Communi-
strength and can estimate its position cations Inc. is a developer in vehicu-
in relation to the access point.23 In lar communication technology (www.
addition, a vehicle’s speed can be es- atheros.com). Atheros has imple-
timated by comparing the difference mented the AR5000 chipset, which
in signal strength distribution among is a product specifically designed to
other mobilities.41 target telematic applications such as
In this platform, cellular/WiFi de- vehicle safety, vehicle data exchange,
vices can be used for both short and traffic congestion management, more
long range inter-vehicle communica- innovative electronic/automated toll-
tion. Wireless connections that meet ing (for example, RFID-based tags,

94 comm unications of t h e acm | fe bruary 2 0 1 2 | vo l . 5 5 | no. 2


review articles

mileage-based toll collection), and speed, global positioning, routing, de- set up the network remains an open is-
so on. AR5000-based products have vice functionality, and performance); sue in V2B communication.
been tested in multipath propagation and driver-centric information such as Data Processing. There are sugges-
environments for vehicles traveling driver’s specific behavior (for example, tions for leaving all or most of the data
up to 120mph with V2V distances of drowsiness, length of continuous driv- processing to the data center, as it can
around 400m. The datasheet of these ing), audio/video, and others. All of this have unlimited computational power.
products reported packet error rates data may be optionally forwarded to a Challenges lie in devising such pro-
of less that 0.1%, while consistently central monitoring server for further cessing data centers dedicated for this
maintaining links even under heavy analysis and storage. purpose. In addition, distributed vs.
traffic scenarios. ˲˲ In-coming data that may include centralized data processing, and in-
INRIX is another telematics ser- receiving data from a central office for vehicle vs. in-data-center processing
vice provider that offers real-time various communications with driver or remain open research areas.
traffic information to build up an in- vehicle system. Fleet Management. Fleet manage-
telligent routing engine to aid smart Additional reasons to connect to ment/monitoring includes challeng-
driving (www.inrix.com). There are the cloud may include infotainment, ing applications of V2B communica-
other telematics services such as On- entertainment (for example, multime- tion in which the cloud architecture
Star, GM Mobility Assistance, and GM dia streaming); Internet; automotive should keep track of the activities of
Goodwrench provided by General Mo- as well as location-based services; and each vehicle within its network.
tors (GM), the Hughes Telematics by connecting to the car dealers and auto Security. In V2B, all sorts of security
Hughes, and the telematics services by service centers, among others. and privacy issues may be raised. It is
Cross Country. These service providers Vehicle communication with the essential to integrate data security and
offer various navigation, communica- broadband cloud can, to some extent, privacy features by complying with
tion, and safety devices and services for be considered as a subset of vehicle to certain standards or devising time-
(mostly rental) vehicles. road infrastructure communication, efficient cryptography techniques for
where the broadband cloud (for ex- this purpose.
Vehicle-to-Cloud Communication ample, monitoring data center) is as-
Vehicles communicating with a broad- sumed to be part of the infrastructure. Vehicle-to-Roadside
band cloud, for example, a monitor- Infrastructure Communication
ing data center in a VAN, opens a new Top Challenges Vehicle-to-road communication for
door for many useful applications. Communication Latency. There are environmental sensing and monitor-
Vehicles may communicate via wire- questions such as what information ing is another interesting item in the
less broadband mechanisms such to collect, what to filter, what to pro- menu of smart VAN research. This
as 3G/4G (HSI). Going forward, high- cess in-vehicle, and what to send/re- platform ultimately enables driver
speed 4G mobile broadband tech- ceive to/from the data center, and so safety by providing the right informa-
nologies such as LTE, 802.16m-based on. All these account for the V2B com- tion at the right time, such as speed
WiMAX achieving speed in excess of munication latency that should be ad- limit, and weather condition informa-
100Mbps will be of high interest. Al- dressed to improve the efficiency and tion collected using various roadside
ready, some car companies such as preserve the real-time nature of the sensors. This platform is capable of
Nissan, Ford, and Toyota have taken overall network. automatically informing the driver of
steps toward vehicle-to-cloud con- Gateway. Design of a preferably uni- hazardous road conditions. Sensed
nectivity. In particular, Toyota has an- form intelligent gateway using WiFi, data of road surface and spacing can
nounced partnership with Microsoft cellular, and other broadband net- be transmitted to vehicles over inter-
to offer cloud connectivity.51 With this works for plug-and-play devices and to vehicle communication using the
research investment, Toyota plans to
connect its cars to Microsoft’s Azure Table 2. Driver-assistance systems available in the market.43
cloud platform by 2015 to provide a
telematics cloud solution.
System Maker
This type of communication will
Forward collision warning Nissan
specifically be useful for active driver
Adaptive Cruise Control (ACC) Mitsubishi
assistance and vehicle tracking in net-
Lane-keeping support Nissan
work fleet management. In particular,
the smartphones/gadgets could be Collision mitigation brakes Honda

used as a gateway in this platform to Low-speed ACC Nissan

send/receive data to and from a cen- Night vision Honda

tral monitoring data centers connect- Lane-passing alarm Benz

ed to the broadband cloud.4 V2B net- Tire sensors Fiat

works can provide useful information Brake Assist with Navigation Link Toyota

in two ways: Blind-spot detection BMW


˲˲ Outgoing data that may include: ve-
hicle-centric information (for example,

f e br uary 2 0 1 2 | vo l. 5 5 | n o. 2 | c omm u n i c at i o n s o f t he ac m 95
review articles

5.9GHz dedicated short-range com- techniques should be devised to main- tersection. The system also includes
munication (DSRC).54 For example, tain a robust and effective data com- tag receivers for pedestrians them-
wet conditions of the road surface can munication link. selves (for example, the elderly and/
be detected based on processing the or the disabled) to be aware of vehicles
polarized light from the road surface Existing Solutions near road intersections. Due to the
with a vision system.43 Anticollision de- Radio-Frequency Identification (RFID) relatively low range of communication
tection systems based on vehicle and tags and receivers can be used to de- in UHF band, repeaters have also been
obstacle spacing using adaptive cruise tect and alert the driver of obstacles or installed at roadside infrastructure
control is another vehicle-to-roadside pedestrians. Authors in Ishida et al.24 to route the RFID tag information to
communication application.18,54 have implemented a system that uses vehicles. This is where V2I communi-
V2I communication enables real- RFID technology to warn drivers of vul- cation takes place. For the V2V com-
time weather/traffic updates for the nerable road users (VRU) such as pe- munication, an inter-vehicle multihop
driver, which ultimately makes the destrians or bicyclists and their exact broadcasting transmission function
transportation systems more infor- locations, especially at road intersec- has also been designed to alert other
mative. As one option, researchers in tions. Vulnerable road user communi- vehicles outside the proximity of the
academia and industry have shown cation is generally performed through RFID readers of the possible pedestri-
that the V2I transmitter can actually be RF-based communication and image ans on nearby intersections.
placed on the vehicle’s tire.27 processing techniques.39 The overall Having explained the main commu-
system is a VAN that includes both V2V nication links in VAN, Figure 2 depicts
Top Challenges and V2I communications. The system the key functions of each. Certain func-
Next Generation of Car Radars. While consists of UHF-band active tags and tions and applications have multiple
there are existing car radar solutions transmits the tag ID as well as the po- faces that need investigation as multi-
(for example, from Benz), the role of sition of the pedestrian to onboard disciplinary research topics.
next-generation car radars is critical equipment. Electromagnetic induc-
and its design and implementation is tion of a coil is used in the design to Communication Standards for VAN
expected to have significant impact on excite the active tag. This system not Basically, vehicular network is a sub-
V2I communication. only alerts the driver of the presence of class of mobile ad hoc networks that
Prioritization. Since data process- pedestrians, but also allows the drivers require certain properties such as con-
ing would be from hundreds of nodes, to locate the pedestrian to take proper nectivity, coverage, broadcasting safety
prioritization, buffering, and queuing action when approaching the road in- messages, or congestion control.55
Communication protocols for VAN,
Figure 2. VAN key components and functions. in general, consist of defining the fre-
quency allocation, physical and link
layers, routing protocols, broadcast-
V2V V2I ing and security algorithms.1 Hence,
vehicular networks should be designed
based upon certain standards that de-
Environment/Weather
Lane-Passing fine the communication architecture,
DSRC protocols, messaging, management,
V2V spacing Obstacle Road surface/condition
hierarchy, and so on throughout the
detection data collection network. The main communication
Advertisement standards for VAN are outlined here.
Entertainment The IEEE 802.11p standard draft,
released in November 2010 and is
Driver
Assistance still actively under development, is
Traffic control an amendment to the IEEE 802.11
Wireless
Cooperative/Cognitive Communication Toll Collection standard. IEEE 802.11p aims to add
Driving
wireless access in vehicular environ-
GPS ments (WAVE) to support Intelligent
Brake/Tire/Steering-Wheel
Routing Transportation Systems (ITS) applica-
Pressure Driver tions.19 This standard defines the V2V
Fatigue
Speed Detection and V2I communication protocols
Vehicle
Power-consuming
for high-speed vehicles and mainly
Audio/Video Condition
data processing addresses design challenges at the
ECG, EEG, EMG, EOG, BP physical (PHY) level. In the U.S., the
Dedicated Short Range Communica-
tions (DSRC) of 5.9GHz, that is, the li-
In-Vehicle V2B censed ITS band of 5.85–5.925GHz, is
used for this purpose. The European
Commission has also recently allocat-

96 co mmunications of t h e acm | f ebruary 2 0 1 2 | vo l . 5 5 | no. 2


review articles

ed 5.9GHz for V2V and V2I communi- short messages. This is WAVE-specific, for a potential large number of vehi-
cation for vehicle safety applications and can be used by most applications. cles. The efficiency, performance, and
that is highly compatible with the U.S. Moreover, the Management Informa- throughput decrease as the number of
DSRC WAVE band, allowing the us- tion Base (MIB) for the WAVE protocol vehicles increases.47 Therefore, central-
age of similar antennas and wireless stack is also defined in this standard. ized or distributed techniques that com-
transceivers in the platform. IEEE P1609.4 supports multichan- pute/estimate the number of communi-
The IEEE 802.11p standard was de- nel WAVE operations by providing ex- cating vehicles in a geographical area
signed on top of the ASTM E2213-033 tensions to the existing Media Access should be taken into consideration.
standard, which is a predecessor on ve- Control (MAC) in IEEE 802.11. Furthermore, in the current 802.11p
hicle-based communication networks. ASTM E2213-03 is the standard protocol, the number of collisions dra-
It includes the architecture for VAN to specification for telecommunications matically increases as the number of
enable vehicle safety and non-safety and information exchange between vehicles increases.10 On the other hand,
transactions such as toll collection roadside and vehicle systems.3 This issues such as packet loss come into the
and traffic mapping. The goal in IEEE standard generally specifies MAC and picture as the speed of vehicles increas-
802.11p is providing a framework to in- PHY layers for wireless connectivity es.35 For all these reasons, advanced
corporate VANs throughout a nation’s in the DSRC band of 5.9 GHz. It is an techniques should be integrated within
road infrastructure with sufficient V2V extension to the IEEE 802.11 standard the IEEE 802.11p standard to overcome
and V2I communication features de- for high-speed mobile environments such scalability issues.
ployable as needed. and is based on the MAC and PHY layer
A higher-layer standard, which IEEE specifications of the IEEE 802.11 and Existing Wireless Solutions
802.11p is based upon, is the IEEE IEEE 802.11a technology standards. It Cohda Wireless Ltd, a developer in
1609 standard46 providing ubiquitous describes communication specifica- the area of safe vehicle and connected
vehicular communication among dif- tions among roadside and onboard vehicle designs (www.cohdawireless.
ferent automobile vendors and manu- mobile units in the line-of-sight dis- com), has addressed the mobility and
facturers. IEEE 1609 includes a family tances of up to 1km. Privacy and au- outdoor Non-Line-Of-Sight (NLOS) is-
of standards for WAVE. It defines the thentication procedures have also been sues due to long delay spread and mul-
architecture, organization, manage- incorporated within this standard. tipath propagation by designing a radio
ment structure, communication mod- on Wi-Fi chipsets. Particularly, Cohda
el, security mechanisms and physical Top Challenges wireless has implemented the MK2
access. These features, collectively, User-Defined Protocols. While the IEEE WAVE-DSRC Radio, which is an IEEE
facilitate secure V2V and V2I wireless VAN standard has been recently re- 802.11p-compliant device suitable for
communication in a variety of applica- leased, user-defined protocols are V2V and V2I communication in WAVE.
tions including traffic management, needed to allow researchers and indus- At present, Atheros (www.atheros.
active safety services, or automated try work on various applications, proto- com) and Broadcom (www.broadcom.
tolling. IEEE 1609 includes a subset of types, and products. com) have, at least partial support for
standards, each particularly designed Modified 802.11. Vehicular networks 802.11p. There are other device manu-
to address a specific purpose in WAVE: demand robust wireless connectivity facturers that have developed 802.11p-
IEEE P1609.1 is the resource manag- for high-speed mobile outdoor envi- compliant systems (for example, www.
er that identifies the key components ronments. The original IEEE 802.11 aradasystems.com and www.redpines-
of the WAVE system architecture. It de- standard does not meet these require- ignals.com). All these solutions suggest
fines the communication formats such ments, and thus, there is a pressing that 802.11p is the front-runner for seri-
as command message and data storage need for a modified version of this ous deployment in VAN.
formats and resources used among all standard for VAN applications. The Simultaneously in academia, re-
nodes of the architecture. This stan- problems of 802.11 mainly include searchers have devised smart adaptive
dard also indicates that OBEs and mo- mobility, multi-path propagation due antennas and cooperative/cognitive ra-
bile platforms are supported in WAVE. to reflection in non-line-of-sight con- dios for wireless connectivity in vehicu-
IEEE P1609.2 addresses the secu- ditions, RF Doppler effect, and low lar networks.53
rity issues in WAVE by defining secure network bandwidth of 2Mbps.17 Secu-
message formats. Basically, this stan- rity challenges such as incorporating Security and Privacy of VAN
dard takes care of secure message authentication features and encryp- A number of security mechanisms
management by specifying how secure tion/decryption methods are also of has been integrated within the IEEE
messages are processed once they are concern. The IEEE 802.11p technology P1609.2 standard,46 enabling security
exchanged. should be deployed in VAN as comple- and privacy features for vehicle-area-
IEEE P1609.3 is the network pro- mentary technology to WiFi, 3G, and networks. These issues are of signifi-
tocol layer standard in WAVE that WiMAX to address the issues noted cant importance and should be devised
also supports secure message data here, and enable V2I and V2V for safety before VAN becomes fully operational.
exchange. In addition to defining net- and emergency communications. Imagine how false or stolen data such
work and transport layer services such Scalability of 802.11p. The current as driver behavior, vehicle functional
as routing, this standard also provides MAC parameters of the IEEE 802.11p information, environmental hazards,
a substitute for IPv6 by defining WAVE protocol are not efficiently configured or road condition data could cause

f e br uary 2 0 1 2 | vo l. 5 5 | n o. 2 | c omm u n i c at i o n s o f t he ac m 97
review articles

harm if the network is not secured and or malicious attempts.52 Here, we list a Secure Communication
if the privacy of each individual is not few cases where anomaly detection can According to Williamson,52 security
protected. Consider a node (for exam- be effectively deployed to enhance VAN and privacy in VAN communication
ple, a driver or vehicle) that can insert security or safety: should account for features such as
false information about other drivers Driver Profiling: Machine learning message authentication, integrity,
and traffic, or the one that can eaves- and classification techniques are re- accountability and privacy protec-
drop private information and use this quired to profile the driver’s behav- tion. Current research on security in
information against other users in his ior.5,43 A driver profile could be generat- vehicular communication protocols
or her own favor (for example, to stop ed based on the driver’s physiological mostly focuses on periodic beacon-
or mislead a flow of vehicles). signals (for example, ECG, EEG, EOG) ing, flooding, Geocast and position-
Another issue in security of VAN is or vehicle information (speed, GPS based mechanisms.21,37,48
the mobility feature of vehicles, which routing, tire traction and stability) col- Geocast refers to multi-hop broad-
could easily result in rapid changes in lected from various sensors. For in- cast information dissemination in a
the VAN topology. Thus, security and stance, a profiling curve can be con- large geographically restricted des-
privacy protocols should be carefully structed based on the frequencies of tination region. It is important to
designed to avoid overwhelming the certain metrics where abnormalities secure VAN’s geocast against denial-
radio link bandwidth with sudden are reflected by any distortions from of-service attacks caused by overload-
node density fluctuations. In addi- the normal curve. ing. According to Schoch et al.,37 se-
tion, due to having so many partici- Fatigue Detection: In driver fatigue cure Geocast (where a large number
pating elements, we open the door for detection systems, a driver behavioral of nodes forward a message), can be
unintentional network congestion, or analysis platform can be devised to achieved by employing probabilistic
intentional flooding of the network analyze and differentiate normal vs. protocols such as advanced adaptive
with junk data that would result in abnormal regions representing the gossiping techniques along with adap-
denial of service.6 This is critical, par- alert vs. non-alert status of a driver.43 tive load control mechanisms. These
ticularly for VAN, as attackers may This platform requires an innovative techniques probabilistically choose a
completely bring down vehicular net- classifier for detecting driver fatigue by subset of nodes for message forward-
works this way. providing a novel profiling curve of the ing and dynamically control the load
While all the cases here are anti- collected driver (or vehicle) behavior. on each node to prevent congestion
social behaviors, they are real-life pos- VAN Communication: All three types and overloading. On the other hand,
sibilities with devastating results in of communication in VAN can benefit security of VAN can be compromised
terms of public safety. Papadimitratos from devising an anomaly detection by attacks that cause jamming where
et al.14 explain how the sweet dream of system: the reception of messages is blocked.
deploying VANs may turn into a night- ˲˲ V2V: For security in V2V com- Jamming attacks can be overcome by
mare if security and privacy elements munication, the network side as well using message loss avoidance tech-
are not carefully embedded. In that as the client (vehicle) side should be niques such as the one introduced in
case, the disadvantages of deploying equipped with content inspection or Schoch.37 In this technique the unre-
vehicular communications in VANs anomaly detection engines to combat ceived messages are detected, stored,
would be more than the benefits. intrusions, phishing, spam, and deni- and queued for retransmission.
Many researchers in academia and al-of-service attacks. The Secure Vehicular Communi-
industry have investigated secure ve- ˲˲ V2B: A profiling and classification cation (SeVeCom) project,38 funded
hicular communications in ITS-VAN.32 system can be integrated within V2B and carried out by European organi-
Among those are cryptography, public communications effectively. For exam- zations, focused on the design and
or private keys, and digital signature ple, a central monitoring station can practical implementation aspects of
verification approaches for security assess normalcy of a driver’s behavior security and privacy in VAN. Digital
and privacy as well as redundant pack- and diagnose a vehicle’s malfunction signatures are known as the under-
ets delivery for a more reliable com- occurrences. Behavioral analysis can lying basis to support security and
munication.31 Others have worked on be used to identify a normal region for anonymity in VAN. SeVeCom made
schemes that can be used on top of the any subset of parameters of interest. use of customized hardware security
IEEE 1609.2 standard for secure mes- ˲˲ V2I: In V2I communications, ve- modules (HSM), implemented as ap-
saging protocols in WAVE.50 hicles receive a large volume of data plication-specific integrated circuits
Anomaly detection systems can be from route environment (sensor nodes (ASIC) both onboard and at the road-
employed to minimize the effect of ma- planted on roads, other vehicles, or side infrastructure to support crypto-
licious breaches on VAN.2,13,43 The main roadside units). graphic operations. HSM stores and
idea is to employ data/packet process- Thus, the security against undesired protects private keys for digital signa-
ing techniques (for example, packet or malicious incoming data becomes a ture generation, and handles the key
content inspection such as worm de- challenge. Anomaly detection schemes and device management. SeVeCom
tection,13,29,40 or machine learning5) for can analyze data, identify suspicious relies on multiple short-term certified
such behavioral analysis. Other tech- strings (or even situations), raise alarm private-private key pairs, known as
niques include continuous monitoring and overall protect the vehicle network pseudonyms, rather than traditional
of network flow to identify anomalies from possible attacks and failures. long-term private and public keys for

98 comm unications of t h e acm | f ebruary 2 0 1 2 | vo l . 5 5 | no. 2


review articles

each vehicle. Pseudonym authentica- tween pseudonym changes, challeng-


tion, credential/identity management es lie in devising new mechanisms that
and revocation of compromised mod- support privacy in VAN. Some tech-
ules are assumed to take place at certi- niques rely on group signatures where
fication authorities instantiated at the
roadside infrastructure. Integration of a number of vehicles in near proxim-
ity that are traveling with almost the

Top Challenges and


security and same velocity can be grouped together.

privacy features
In the case of grouping, only one sig-
Existing Solutions nature will be generated for the whole
Adapting to Future Platforms. Accord-
ing to Kargl et al.,21 in order to have
should be based group, thus enhancing the group
member vehicles’ anonymity and pri-
a compatible architecture that can on the hooking vacy.36 However, such techniques may
adapt to the ever-growing future vehic-
ular technologies, integration of the
concept where not be efficient for actual deployment,
and hence other techniques such as
security and privacy features should interlayer proxies hybrid solutions to VAN privacy are re-
be based on the hooking concept
where interlayer proxies are placed at are placed quired and remain as current ongoing
research efforts.
several points of the communication at several Real-world Simulation. Many works
stack. This way, only these intermedi-
ate layers must be configured if the points of the have simulated the performance and
security features of VAN by syntheti-
security features are to be migrated to
new platforms. The SeVeCom project
communication cally forming a VAN network topology.
Real-world scenarios of a potentially
implemented in-vehicle security by in- stack. large network of vehicles consisting
troducing a firewall that controls the of hundreds of vehicles in large geo-
data flow to and from the vehicle, and graphical areas need to be emulated
is also devising an intrusion detection to capture the actual performance
system (IDS) that constantly moni- of VAN, especially under certain at-
tors the data flow and detects attacks/ tacks (for example, overloading or
anomalies or denies system access in jamming), and/or other type of con-
real time. gestions. The work in Haas et al.15
Secure Beaconing. Safety/Secure simulated a relatively large and dense
beaconing in which periodic beacon network of vehicles under accident-
messages are digitally signed and cer- like scenarios, and reported how VAN
tified may become a challenge as the would perform in terms of speed of
security communication will infer an the vehicles, message reception, and
overhead due to signature generation so on. Other real-life scenarios should
and certificates attached to each packet. be integrated within the simulations
The performance of VAN security can to reflect the actual advantages or dis-
be enhanced by utilizing compact cer- advantages of various VAN techniques.
tificates, in which not all messages Securing Vehicle Access Control and
get certificate attachments.21 Instead, Theft Prevention. Security and privacy
signatures and certificates are cached, of VAN deals with secure and private
removed in certain cases, or only gen- communication such as preventing
erated after every few successive bea- unauthorized vehicle access, attacks
cons. However, context-adaptive mes- against in-vehicle control systems,
sage dissemination, gossiping, and and attacks over diagnostic onboard
data aggregation are also interesting units and sensors (for example, ex-
techniques that can be considered for ploiting tire pressure monitoring). It
vehicular systems. should also provide anti-theft features
Privacy Issues. Privacy protection in for vehicles. Though techniques such
VAN mostly deals with providing ano- as a remote kill switch (that remotely
nymity for vehicle message transmis- shuts off the engine in case of ve-
sions such that vehicle/user’s private hicle theft) have been implemented
information, especially location may (www.3built.com), vehicle theft pre-
not be easily traced. SeVeCom has inte- vention still remains as a security
grated privacy features in VAN by mak- challenge of VAN. Additionally, as
ing use of pseudonyms and frequently there are techniques to duplicate real
changing these pseudonyms, making keys from only an image,25 it is clear
vehicle tracking nontrivial.21 Since that security concerns should be tak-
vehicles may be fully tracked even be- en more seriously into consideration.

f e br uary 2 0 1 2 | vo l. 5 5 | n o. 2 | c ommu n i c ati o n s o f the ac m 99


review articles

Conclusion for crash avoidance. In Proceedings of the 7th ACM and secure geocast in vehicular networks. ACM VANET
International Workshop on Vehicular Ad Hoc Networks Workshop, 2010.
This article provided an insight into (Sept. 2010). 38. SeVeCom. Secure Vehicular Communications: Security
future intelligent vehicle area net- 16. Healey, J.A. and Picard, R.W. Detecting stress during Architecture and Mechanisms for V2V/V2I, Deliverable
real-world driving tasks using physiological sensors. 2.1 (2007−2008); http://www.sevecom.org/
works. The key elements of VAN were IEEE Transactions on Intelligent Transportation 39. Sikora, A. Communication and localization for a
explained and the main challenges as Systems 6, 2 (June 2005), 156−166. cooperative esafety-system. In Proceedings of the
17. IEEE 802.11: Wireless LAN Medium Access Control IEEE International Workshop on Intelligent Data
well as ongoing research have been dis- (MAC) and Physical Layer (PHY) Specifications (2007); Acquisition and Advanced Computing Systems:
cussed. In particular, intelligent in-ve- http://standards.ieee.org/ Technology and Applications, (Sept. 2007), 682−685.
18. Ishida, S. et al. The method of a driver assistance 40. Singh, S., Estan, C., Varghese, G. and Savage, S.
hicle systems, and the main inter-vehi- system and analysis of a driver’s behavior. In Automated worm fingerprinting. In Proceedings of
cle communication elements, that is, Proceedings of the 10th World Congress of ITS, 2003. the ACM Symposium on Operating System Design and
19. Jiang, D., Delgrossi, L., Gerla, M. and Jiang, Y. IEEE Implementation (Dec. 2004), 45−60.
V2V, V2B, and V2I, along with three key 802.11p: Towards an international standard for 41. Sohn, T., Varshavsky, A., LaMarca, A., Chen, M.Y.,
wireless access in vehicular environments. In Choudhury, T., Consolvo, S., Hightower, J., Grisword,
IEEE/ASTM standards, was discussed. W.G. and de Lara, E. Mobility detection using everyday
Proceedings of the 67th IEEE Vehicular Technology
Research work addressing VAN secu- Conference, (May 2008), 2036−2040. GSM traces. In Proceedings of the 8th Conference on
20. Johansson, K.H., Torngren, M. and Nielsen, L. Vehicle Ubiquitous Computing (2006).
rity and privacy were briefly addressed. applications of controller area network. Technical 42. Sun, Q. and Garcia-Molina, H. Using Ad-hoc Inter-
We envision future VAN combining Report, Department of Signals, Sensors and Systems, Vehicle Networks for Regional Alerts. Technical
Royal Institute of Technology, Stockholm, Sweden, Report, InfoLab, Stanford University, 2005.
wireless local and wide area network and Department of Electrical Engineering, Linkoping 43. Takeda, K., Hansen, J.H.L., Erdogan, H. and Abut, H.
technologies using portable IP-centric University, Sweden, 2003. In-Vehicle Corpus and Signal Processing for Driver
21. Kargl, F., Papadimitratos, P., Buttyan, L., Mter, M., Behavior. Springer Press, 2009.
devices, sensors, signal processing, and Schoch, E., Wiedersheim, B., Thong, T-V, Calandriello, 44. Takei, Y. and Furukawa, Y. Estimate of driver’s fatigue
driver behavior analysis techniques. G., Held, A., Kung, A. and Hubaux, J.P. Secure through steering motion. In Proceedings of the IEEE
vehicular communication systems: Implementation, Man and Cybernetics International Conference 2
This would ensure reliable and informa- performance, and research challenges. IEEE (2005), 1765−1770.
tive communication while vehicles are Communications Magazine 46, 11 (Nov. 2008), 110−118. 45. Tipping, M.E. Sparse Bayesian learning and the
22. Kato, S. Driver assistance with cooperative driving. In relevance vector machine. Journal of Machine
in motion. Ultimately, the future vehicle Proceedings of AVEC, 2004. Learning Research 1 (2001), 211−244.
area networks would collect driver/car/ 23. Kitasuka, T., Nakanishi, T. and Fukuda, A. Wireless 46. U.S. Department of Transportation. IEEE 1609—
LAN-based indoor positioning system WiPS and its Family of Standards for Wireless Access in Vehicular
road data, quickly analyze and share the simulation. In Proceedings of the IEEE Pacific Rim Environments (WAVE), Jan. 2006; http://www.
information to provide a safe, secure, Conference on Communications, Computers and standards.its.dot.gov/fact sheet.asp?f=80/
Signal Processing (2003), 271−275. 47. Wang, Y., Ahmed, A., Krishnamachari, B. and Psounis,
and pleasant driving environment in fu- 24. Kubota, S., Okamoto, Y. and Oda, H. Safety driving K. IEEE 802.11p Performance Evaluation and
Protocol Enhancement. In Proceedings of the IEEE
ture networks of smart vehicles. support system using RFID for prevention of
International Conference on Vehicular Electronics and
pedestrian-involved accidents. In Proceedings
of the 6th International IEEE Conference on ITS Safety, (Sept. 2008), 317−322.
Telecommunication (June 2006), 226−229. 48. Weimerskirch, A. Haas, J. J., Hu, Y.-C. and Laberteaux,
References
25. Laxton, B., Wang, K. and Savage, S. Reconsidering phys- K.P. Data security in vehicular communication
1. Abdalla, G.M.T., Abu-Rgheff, M.A. and Senouci,
ical key secrecy: Teleduplication via optical decoding. networks. In VANET Vehicular Applications and Inter-
S.M. Current trends in vehicular ad-hoc networks.
In Proceedings of the ACM Conference on Computer Networking Technologies. H. Hartenstein and K.P.
In Proceedings of the IEEE Global Information
and Communications Security (Oct. 2008), 469−478. Laberteaux, Eds. John Wiley & Sons, Ltd., Mar. 2010.
Infrastructure Symposium, (2007), 1−7.
26. Lotan, T. and Toledo, T. An in-vehicle data recorder for 49. Weng, T.L. and Gupta, R. ENLS—A Framework for
2. Androulidakis, G., Chatzigiannakis, V. and Papavassiliou,
evaluation of driving behavior and safety. TRB 2006 Localization Services for Mobile Computing. University
S. Network anomaly detection and classification via
Annual Meeting. of California, San Diego, Jacobs School of Engineering
opportunistic sampling. IEEE Network 23, 1 (Jan.-Feb.
27. Motsinger, C. and Hubing, T. A Review of Vehicle-to- Research Expo Poster, Feb. 2008.
2009), 6−12.
Vehicle and Vehicle-to-Infrastructure Initiatives. 50. Whyte, W. Vehicle security in VII. Secure Vehicular
3. ASTM International. E2213-03 Standard Specification for
Technical Report, Clemson University, CVEL-07-003, Communications Workshop: Results and Challenges
Telecommunications and Information Exchange between
Oct. 2007. Ahead, Feb. 2008.
Roadside and Vehicle Systems; http://www.astm.org.
28. National Highway Safety Administration. USDOT 51. Wilcox, J. Microsoft will take Toyota cars to the cloud
4. Barth, A. and Franke, U. Where will the oncoming
NHTSA Press, (June 2007). (Apr. 2011); www.betanews.com/
vehicle be the next second? IEEE Intelligent Vehicles
29. Nourani, M. and Katta, P. Bloom filter accelerator 52. Williamson, M.M. Throttling viruses: Restricting
Symposium (June 2008), 1068−1073.
for string matching, In Proceedings of the propagation to defeat malicious mobile code. In
5. Bishop, C.M. Pattern Recognition and Machine Learning.
16th International Conference on Computer Proceedings of the 18th Annual IEEE Computer
Springer, Berlin, 2006.
Communications and Networks (Aug. 2007), 185−190. Security Applications Conference (Dec. 2002), 61−68.
6. Blum, J.J., Neiswender, A. and Eskandarian, A. Denial of
30. Papadimitratos, P., Buttyan, L., Holczer, T., Schoch, 53. Xiang, W. A vehicular ultra-wideband channel model
service attacks on inter-vehicle communication networks.
E., Freudiger, J., Raya, M., Ma, Z., Kargl, F., Kung, A. for future wireless intra-vehicle communications
In 11th IEEE International Conference on Intelligent
and Hubaux, J-P. Secure vehicular communications: systems. In Proceedings of IEEE Vehicular Technology
Transportation Systems (Oct. 2008), 797−802.
Design and architecture. IEEE Communications 46, Conference (Sept.-Oct. 2007), 2159−2163.
7. Chiku, N. et al. A study of lane keep support system
11, (Nov. 2008), 100−109. 54. Yamada, M. et al. Study of a road surface condition
based on human driving characteristics. In Proceedings
31. Papadimitratos, P., Buttyan, L., Hubaux, J-P., Kargl, technique in the human centered ITS view aid system.
of the JSAE Annual Spring Congress19-01 (2001), 1-4.
F., Kung, A. and Raya, M. Architecture for secure and In Proceedings of the 9th World Congress of ITS, 2002.
8. Cobb, W. Recommendation for the Practice of Clinical
private vehicular communications. In Proceedings 55. Yousefi, S., Mousavi, M.S. and Fathy, M. Vehicular ad-hoc
Neurophysiology. Elsevier, Amsterdam, 1983.
of the 7th International Conference on ITS networks (VANETs): Challenges and perspectives. In
9. Department of Transportation. Saving Lives through
Telecommunications (June 2007),1−6. Proceedings of the 6th IEEE International Conference
Advanced Vehicle Safety Technology; www.its.dot.gov/
on ITS Telecommunication, (2006), 761−766.
ivi/docs/AR2001.pdf. 32. Papadimitratos, P., Gligor, V. and Hubaux, J-P. Securing
56. Zhang, Z. and Zhang, J.S. Driver fatigue detection
10. Eichler, S. Performance evaluation of the IEEE vehicular communications—assumptions, requirements,
based intelligent vehicle control. In Proceedings of
802.11p WAVE communication standard. In and principles. In Proceedings of the 4th Workshop on
the 18th IEEE International Conference on Pattern
Proceedings of the IEEE Vehicular Technology Embedded Security in Cars (Nov. 2006), 5−14.
Recognition (Washington, DC, 2006), 1262−1265.
Conference, (Oct. 2007), 2199−2203. 33. Pottie, G.J. and Kaiser, W.J. Wireless integrated network
11. Endo, T. et al. Development of reverse parking assist sensors. Commun. ACM 43, 5 (May 2000), 51−58.
with automatic steering. In Proceedings of the 10th 34. Saeed, A., Faezipour, M., Nourani, M. and Tamil, L.S. Miad Faezipour (mfaezipo@bridgeport.edu) is an
ITS World Congress, Nov. 2003. Plug-and-play sensor node for body area networks. In assistant professor of computer science and engineering
12. Ergen, S.C., Sangiovanni-Vincentelli, A., Sun, X., Proceedings of the IEEENIH Life Science Systems and at the University of Bridgeport, CT.
Tebano, R. Alalusi, S., Audisio, G. and Sabatini, M. The Applications Workshop, (Apr. 2009), 104−107.
tire as an intelligent sensor. IEEE Transactions on 35. Saeed, R.A., Hj Naemat, A.B., Aris, A.B., Khamis, I.M. Mehrdad Nourani (nourani@utdallas.edu) is a professor
Computer-Aided Design of Integrated Circuitsand and Awang, K.B. Evaluation of the IEEE 802.11p-based in the Department of Electrical Engineering at the
Systems 28. 7 (July 2009), 941−955. TDMA MAC method for road side-to-vehicle University of Texas at Dallas.
13. Faezipour, M., Nourani, M. and Panigrahy, R. A communications. International Journal of Network and Adnan Saeed (axs055200@utdallas.edu) is a Ph.D.
hardware platform for efficient worm outbreak Mobile Technologies 1, 2 (Nov. 2010), 81−87. candidate in the Department of Electrical Engineering at
detection. ACM Transactions on Design Automation of 36. Sampigethaya, K., Huang, L., Li, M., Poovendran, R., the University of Texas at Dallas.
Electronic Systems 14, 4 (Aug. 2009), 49−67. Matsuura, K. and Sezaki, K. CARAVAN: Providing
14. Gansen, T., Wischhof, L., Ebner, A. and Paulus, I. location privacy for VANET. Embedded Security in Sateesh Addepalli (sateeshk@cisco.com) is Director of
Car-2-X challenges—Dreams and nightmares. Secure Cars, Nov. 2005; also in IEEE Journal on Selected the Advanced Research and Innovation Group at Cisco
Vehicular Communications Workshop: Results and Areas in Communications, Special Issue on Vehicular Systems Inc., San Jose, CA.
Challenges Ahead, Feb. 2008. Networks 25, 8 (Oct. 2007), 1569−1589.
15. Haas, J.J. and Hu, Y.-C. Communication requirements 37. Schoch, E., Bako, B., Dietzel, S. and Kargl, F. Dependable © 2012 ACM 0001-0782/12/02 $10.00

100 communications of t h e ac m | f e b r ua ry 2 0 1 2 | vo l . 5 5 | n o. 2

You might also like