Professional Documents
Culture Documents
Textbook Connected Vehicles Intelligent Transportation Systems 1St Edition Radovan Miucic Ebook All Chapter PDF
Textbook Connected Vehicles Intelligent Transportation Systems 1St Edition Radovan Miucic Ebook All Chapter PDF
https://textbookfull.com/product/handbook-of-human-factors-for-
automated-connected-and-intelligent-vehicles-1st-edition-donald-
l-fisher-editor/
https://textbookfull.com/product/intelligent-transportation-
systems-problems-and-perspectives-1st-edition-aleksander-
sladkowski/
https://textbookfull.com/product/data-analytics-for-intelligent-
transportation-systems-mashrur-chowdhury/
Big Data Analytics for Connected Vehicles and Smart
Cities 1st Edition Bob Mcqueen
https://textbookfull.com/product/big-data-analytics-for-
connected-vehicles-and-smart-cities-1st-edition-bob-mcqueen/
https://textbookfull.com/product/intelligent-transportation-
systems-functional-design-for-effective-traffic-management-2nd-
edition-robert-gordon-auth/
https://textbookfull.com/product/exergetic-aspects-of-renewable-
energy-systems-insights-to-transportation-and-energy-sector-for-
intelligent-communities-1st-edition-evanthia-a-nanaki/
https://textbookfull.com/product/toward-connected-cooperative-
and-intelligent-iov-frontier-technologies-and-applications-1st-
edition-kai-liu/
https://textbookfull.com/product/robotic-vehicles-systems-and-
technology-1st-edition-tian-seng-ng/
Wireless Networks
Connected
Vehicles
Intelligent Transportation Systems
Wireless Networks
Series editor
Xuemin Sherman Shen
University of Waterloo, Waterloo, Ontario, Canada
More information about this series at http://www.springer.com/series/14180
Radovan Miucic
Editor
Connected Vehicles
Intelligent Transportation Systems
123
Editor
Radovan Miucic
Department of Electrical and Computer Engineering
Wayne State University
Detroit, MI, USA
This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Contents
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Radovan Miucic
Positioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Zeljko Popovic and Radovan Miucic
Human Machine Interaction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Zeljko Medenica
A Security Credential Management System for V2X Communications . . . . . 83
Benedikt Brecht and Thorsten Hehn
V2V Vehicle Safety Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Shubham Shrivastava
Vehicle to Infrastructure Communications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
Samer Rajab
Cooperative Vehicle to Pedestrian Safety System . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
Radovan Miucic and Sue Bai
5.9 GHz Spectrum Sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
Ehsan Moradi-Pari
Efficient and High Fidelity DSRC Simulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
Yaser P. Fallah and S. M. Osman Gani
Applications of Connectivity in Automated Driving . . . . . . . . . . . . . . . . . . . . . . . . . 245
Ahmed Hamdi Sakr, Gaurav Bansal, Vladimeros Vladimerou,
Kris Kusano, and Miles Johnson
v
Introduction
Radovan Miucic
Introduction
R. Miucic ()
Department of Electrical and Computer Engineering, Wayne State
University, Detroit, MI, USA
e-mail: radovan@wayne.edu
Wi-Fi chipsets for the V2X communication development. More recently dedicated
chipsets for DSRC started to take a foothold. IEEE task force introduced DSRC
physical layer modifications in 802.11 as an 802.11p amendment. The amendment
was fully integrated into 2012 version of the 802.11 standard. Aims of modifications
are to reduce overhead, to limit out of band interference, and make provisions
for outdoor multi-path and higher vehicle speeds. In the US, IEEE standards
define lower layers of DSRC. SAE documents define the application layer. IEEE
802.11 details physical and lower Media Access Control (MAC) layers. IEEE
1609.4 describes upper MAC layer. IEEE 802.4 covers logical link control (LLC)
layer. IEEE 1609.3 defines Network and Transportation layers. IEEE 1609.2
covers security. Finally, SAE J2735 and J2945 specify application layer. Federal
Communications Commission (FCC) allocated 75 MHz for V2X communication in
1999. At that time FCC crafted the usage for manually driven vehicles. The main
usage of V2X indents to improve travelers’ safety. Other approved usages include
decreasing traffic congestion, air pollution, and fuel consumption. In the future, V2X
communication may extend to include the needs of the autonomous vehicles.
V2X communication is a set of communication protocols, experiments, and
pilot deployments. As such, V2X communications are addressing the needs of
current and future travelers. It is important that V2X is a direct communication.
For example, V2V communication is the exchange of the information directly
between vehicles without intermediaries such as cell-phone infrastructure or WiFi
hotspot. DSRC-V2V does not require infrastructure to facilitate the communication
between vehicles. Another mode of communication is Vehicle to Infrastructure
(V2I). V2I communication is the exchange of information between vehicles and
roadside infrastructure. For example, a RoadSide Unit (RSU) can be connected
to a signal controller at an intersection. RSU sends out intersection map (MAP)
message and traffic signal status message know as Signal Phase and Timing (SPaT)
message. Next in line is Vehicle to Pedestrian (V2P) communication. V2P involves
exchanging information between vehicles and pedestrians. For example, DSRC
enabled smartphone can serve as a pedestrian communication device. Implemen-
tation of the V2X in a vehicle consists of the several standard components. The
components include localization device, computation platform, HMI interface and
DSRC transceiver. Collection of these components is commonly called On-Board
Equipment (OBE). Fully implemented OEM V2X system may include connections
to the internal vehicle bus. Aftermarket devices may not have access to the internal
vehicle bus.
The most important message in V2V communication is Basic Safety Message
(BSM). A DSRC equipped vehicle broadcasts BSMs to all other vehicles in its
vicinity. BSM consists of crucial information about the vehicle such as position
and vehicle dynamics. Some elements of the BSM are latitude, longitude, elevation,
speed, heading, brake status, accelerations, dimensions, and path history and path
prediction. Once a vehicle receives BSM from a remote vehicle it is able to compute
collision probability and if needed warns the driver.
V2V cooperative safety applications are addressing immediate situations. These
situations include collision avoidance and traffic scene awareness. For example, a
Introduction 3
very typical V2V application is Electronic Emergency Brake Light (EEBL). EEBL
informs the driver when a vehicle in front brakes hard. EEBL helps the driver by
giving an early notification that the leading vehicle is braking hard. EEBL warns
even in the case of limited driver’s visibility (e.g. a large truck is blocking the
driver’s view, heavy fog or rain). Another V2V example is co-operative Forward
Collision Warning (FCW). FCW issues a warning to the driver of the host vehicle
in case of an impending front-end collision. For example, a slow-moving vehicle
ahead in the same lane and direction of travel is a candidate for FCW warning. FCW
helps drivers avoid a collision in the forward path of travel. Blind Spot Warning
(BSW) provides a notification to the driver when a remote vehicle is in its blind
spot. Left Turn Assist (LTA) warns the driver in case it is unsafe to make a left
turn at an intersection. For example, a remote vehicle approaches from the opposite
direction in the adjacent lane. Intersection Movement Assist (IMA) issues a warning
to the driver in case of an impending side collision. A remote vehicle driving in a
perpendicular direction to the ego vehicle is a candidate for IMA warning. This often
happens at an intersection. Control Loss Warning (CLW) issues a warning in case of
a possible collision with a remote vehicle of which the driver has lost control. CLW
helps avoid or mitigate collisions in a variety of traffic scenarios.
Like BSM, a Pedestrian Safety Message (PSM) is being transmitted from a
smartphone. PSM consists of vital pedestrian data. The data include latitude,
longitude, elevation, speed, heading, and dimensions. PSM has similar but less
information than BSM. V2P collision avoidance application works in a similar
fashion to V2V. An aim of V2P cooperative safety applications is an increase
in driver awareness. Candidates for V2P applications are vulnerable road users
(generally pedestrians and cyclists). Pedestrian collision avoidance application
warns the driver of impending pedestrians. For example, a vehicle would warn the
driver in case a pedestrian, crossing the street, jumps in front of the moving vehicle.
V2I applications are usually local in character. An example is Cooperative
Intersection Collision Avoidance Systems (CICAS). CICAS can issue traffic signal
violation warning to the driver if he is about to run the red light. Pothole Detection
is an example collaborative V2I application. Pothole Detection leverage collabo-
ration from many vehicles and the infrastructure. Vehicles share information with
infrastructure about their location and sudden events. One type of events includes
maneuvers the driver is taking to avoid the pothole. Another type of events includes
a sudden change in vertical acceleration of the vehicle going over a pothole. The
infrastructure analyzes many such reports from vehicles. The infrastructure then
sends aggregated data informing the vehicles about the existence of a pothole.
A unique feature of the V2X technology is the ability to detect threats in non-
line of site situations. Many safety applications such as FCW, BSW and pedestrian
collision warning are implemented using a traditional line of sight sensors such
as camera or radars. However, cameras and radars cannot detect vehicles and
pedestrians in non line of sight scenarios such as a blind intersection or obstructed
traffic. V2X is envisioned to fill “the gap” and enhance the sensing ability of
the vehicle. A traditional line-of-sight sensor (e.g. camera or radar) is estimating
information such as relative position, speed, direction and infer the braking status of
4 R. Miucic
the targets whereas V2X is actually getting this information from the best possible
sensors, from the remote vehicle internal bus itself.
List of Chapters
This will book covers the current status and many remaining challenges that face
communication for the Intelligent Transportation Systems. The material covered
in the book is organized as follows. Chapter “Positioning” describes principles
of localization services as a key enabler for V2X technology. Chapter “Human
Machine Interface” focuses on Human Machine Interface for the cooperative
safety applications. Chapter “A Security Credential Management System for V2X
Communications” gives an overview of the Security Credential Management
System (SCMS) for V2X communications system. Chapters “V2V Vehicle Safety
Communication”, “Vehicle to Infrastructure Communications” and “Cooperative
Vehicle to Pedestrian Safety System” identify V2V, V2I, and V2P applications
and requirements. Chapter “5.9 GHz Spectrum Sharing” explains proposals for
sharing the 5.9 GHz spectrum between Intelligent Transportation Systems (ITS)
and Consumers Electronic industries. Chapter “Efficient and High Fidelity DSRC
Simulation” explains the work done in simulating DSRC communication networks.
Finally, Chapter “Applications of Connectivity in Automated Driving” looks into
the potential future usage for the V2X technology by exploring applications of
connectivity in automated driving.
Positioning
The main intention of this chapter is to describe what Human Computer Interaction
(HMI) is, why it is important in the automotive context and how connected vehicles
can benefit from it. Every device that is meant for people to use, cars included,
should provide means that enable successful interaction. This is what HMI is all
about: how to design an interface that enables intuitive, simple and timely interaction
with a machine. Depending on the nature of the task some of these aspects may
have higher priority compared to others. However, all three are extremely important
in vehicles, because driving is a complex hands-busy, eyes-busy activity that poses
both physical and cognitive load on drivers. In a situation like this, it is necessary
for an HMI to provide adequate information to drivers without negatively affecting
their primary task of driving. Information presented to drivers can be roughly
divided in two categories: infotainment and safety. Infotainment is mostly concerned
with convenience features in vehicles, such as navigation, music, climate control,
phone, etc. In this chapter, we are primarily concerned with HMI for safety-related
applications, since this is the area where connected vehicles can contribute the
most. V2X communication enables a completely new horizon of sensing that is
not achievable with any of the currently available vehicle sensors, such as radar,
lidar, camera, etc. This makes it possible to design completely new safety-related
and Advanced Driver Assistance Systems (ADAS) compared to what was possible
before. In any case, the corresponding HMI should effectively explain the situation
on the road and stimulate drivers to perform adequate actions (such as avoiding
an obstacle or preemptive braking). This can be achieved by using any kinds of
modalities (and their combinations) that influence people’s basic senses: sight,
hearing, touch, smell and taste. In this chapter, we will cover some representative
safety-related applications and analyze how different modalities can be used to
create a successful HMI. Finally, we will briefly explore how HMI and connected
vehicles converge in the autonomous driving domain.
6 R. Miucic
V2X communications system requires that users are able to trust information
presented to them. To this end, each receiver must be able to tell whether messages
received over the air interface come from a trustworthy source and have not been
tampered with during transmission. This trust relation needs to be established as
soon as two vehicles receive messages from each other. At the same time, users care
about privacy and will unlikely accept the system if it allows for tracking of singular
devices. Providing both security and privacy to the largest extent reasonable and
possible is the major challenge and design goal of the Security SCMS presented
in this chapter. It has been designed for V2V and V2I communications and has
been developed by the Crash Avoidance Metrics Partnership (CAMP) under a
Cooperative Agreement with the USDOT. It is based on public key infrastructure
(PKI) principles and issues digital certificates to participating vehicles and infras-
tructure nodes for trustworthy communications among them, which is necessary for
safety and mobility applications based on V2X communications. Standard solutions
from literature, such as group signature schemes and management schemes for
symmetric keys, do not meet the requirements of a V2X communications system.
We briefly review these well-known schemes and show where they do not meet
the requirements of V2X. The SCMS supports four main use cases, namely
bootstrapping, certificate provisioning, misbehavior reporting and revocation. To
achieve a reasonable level of privacy, vehicles are issued pseudonym certificates,
and the generation and provisioning of those certificates are divided among multiple
organizations. One of the main challenges is to facilitate efficient revocation of
misbehaving or malfunctioning vehicles, while at the same time preserving privacy
against attacks from insiders. We present a revocation process which actively
informs the fleet about misbehaving devices and is very efficient in terms of revoking
a high number of pseudonym certificates with little amount of data signaled over the
air. Another challenge is to handle certificate authority revocations without requiring
all affected devices to come back to dealerships or some form of secure environment.
We present an approach called Elector-based Root Management to minimize the
impact on devices.
a crash that might happen because of a vehicle which is not very close or not in
the line of sight to the host vehicle. A technology that can “see” through another
vehicle or obstacles like buildings and predict a danger can fill these gaps and
reduce crashes drastically. V2V communications can provide vehicles the ability
to talk to each other and therefore see around corners and through the obstacles over
a longer distance compared to the current on-board sensors. It is estimated that V2X
communications address up to 80% of the unimpaired crashes. By means of Notice
of Proposed Rulemaking (NPRM), NHTSA is working towards standardization of
V2V communications and potentially mandating the broadcast of vehicle data (e.g.
GPS coordinates, speed, acceleration) over DSRC through V2V.A vehicle needs an
On-Board Unit (OBU) to establish the V2V communication with other vehicles
also equipped with OBUs or V2I communication with the traffic infrastructure
equipped with Road-Side Units (RSUs). In general, an OBU has a DSRC radio
for transmission and reception, GNSS receiver, a processor, and several interfaces
(e.g. CAN, Ethernet, GPS) for obtaining the vehicle data. Essential message in
V2V communication is called Basic Safety Messages (BSM). BSM is a broadcast
message typically transmitted frequently up to 10 times a second. Content of BSM
includes vehicle information such as vehicle speed, location, and brake status.
Safety applications use the remote vehicles (RVs) data from BSM and Host Vehicle
(HV) data from the OBU interfaces like CAN and GNSS to predict a potential
crash and alert the driver. V2V messages could also potentially be fused with on-
board sensors like Radar, LiDAR, and Camera to improve the confidence level of
vehicle detection for safety applications or even for autonomous driving to some
extent. Majority of the crash scenarios can be addressed by the following safety
applications: (1) Forward Collision Warning (FCW), (2) Electronic Emergency
Brake Light (EEBL), (3) Intersection Move Assist (IMA), (4) Left Turn Assist
(LTA), (5) Do Not Pass Warning (DNPW), and (6) Blind Spot Warning/Lane
Change Warning (BSW/LCW). These applications showed promise to mitigate and
prevent potential crashes in recent the Connected Vehicle Safety Pilot Deployment
Program conducted by University of Michigan Transportation Research Institute
(UMTRI) which was launched in August 2012.This chapter will describe six
primary safety applications, their requirements from the implementation point of
view, and will explain how each of these applications can alert the driver of a
forthcoming crash threat to help reduce the crash.
maturity level. An overview of these deployment efforts will be given in this chapter.
Several aspects make V2I technology attractive to the ITS industry including early
deployment benefits, extended information sharing ranges and sensing capabilities
afar from what a vehicle on-board sensors can offer in real-time. Such aspects may
provide substantial safety, mobility and environmental value as will be discussed
in this chapter. This chapter deliberates on V2I communications technology and
examines additional benefits it offers beyond V2V technology. Details of V2I Over
The Air (OTA) messages developed by research and standardization organizations
will be provided and discussed. Such messages enable wide variety of V2I safety,
mobility and environmental applications. Examples of these applications will be
detailed in the chapter.
are introduced as candidates for spectrum sharing solution: (1) Detect and Avoid
(DAA) and (2) modified DSRC channelization (re-channelization). This chapter
explains current spectrum allocation as well as the impact the two proposals would
have on the DSRC.
Vehicles in the near future will be equipped with DSRC transceiver which holds
great promise of significantly reducing vehicle collisions by enabling V2V and V2I
communications. In addition, modern vehicles will be equipped with different on-
board sensors such as GPS receivers, cameras, radars, LiDARs, etc. Using these
technologies, we propose two applications to improve the driving experience and
enable future advanced driver assistance systems (ADAS). In the first application,
10 R. Miucic
Introduction
Motivation
Ubiquity of devices with satellite location technology, and their usefulness, has
made the location technology familiar to the masses. There is almost a dependence
on it for achieving efficient everyday mobility. However, it is the promise of
sharing the location data among traffic participants that elevates its significance
from providing universal navigation convenience to helping bring provide traffic
safety for all.
V2X communication technology, that is, the communication technology that
allows vehicles to communicate with all other traffic participants (vehicle, V2V;
pedestrians, V2P), as well as to traffic control infrastructure (V2I), promises a
new, cost-effective, layer of safety. The primary mechanism for this is sharing
of location data. Location shared among surrounding traffic and infrastructure
allows all to be aware of all others, even when other forms of sensing fail due
to sight-line obstructions. On-board computers could even use this awareness to
automatically initiate defensive actions to reduce the risk of collisions. Furthermore,
the communication and positioning technologies that are required to support this are
less expensive to add than sensors used so far in avoiding collisions—such as lidars,
radars, and cameras—thus allowing V2X technology to bring automatic collision
avoidance, and conveniences, beyond luxury vehicles to all road users.
Z. Popovic ()
San Francisco, CA, USA
R. Miucic
Department of Electrical and Computer Engineering, Wayne State University, Detroit, MI, USA
e-mail: radovan@wayne.edu
and High-Accuracy Methods”), and ways of combing GNSS data with other
sensing for achieving a robust position solution (Section “Multi-Sensor Fusion
for Robust and Accurate Positioning”). The goal of covering this broad scope
in a single introductory chapter does not allow room for getting into the depth
of theoretical derivations and implementation details, but those are already well
covered in existing dedicated publications and the value of this chapter instead lies
in enabling those new to these fields to quickly become familiar with numerous
key concepts through an intuitively developed understanding. This serves to allow
effective initial consideration of the technologies involved and can efficiently direct
further independent study.
GNSS Principles
What Is GPS?
GPS, strictly speaking, stands for Global Positioning System. It is the United States
maintained system that consists of a set of Earth-orbiting satellites. The satellites
continually broadcast signals that allow an Earth-based user with a suitable device
(a GPS receiver) to determine the user location coordinates on Earth typically
to an accuracy in the order of meters, and down to centimeters when locally-
specific corrective data is available. In this proper sense, which will be used in
this chapter, a GPS receiver that does not contain maps and does not provide
navigation direction. In popular use however, in particular in the United States, the
meaning of “GPS” has been extended to refer to any device that provides displays of
user’s global location on a map and that might also provide turn-by-turn directions,
which elsewhere in the world is more tellingly referred to as “satellite navigation”
or “sat-nav”.
There are similar systems maintained, or in process of development, by other
countries. Such a system is generically referred to as a Global Navigation Satellite
System (GNSS). Characteristics of other GNSS systems are presented in Section
“Other GNSS Systems”.
The discussion that follows is presented as GPS specific, but in most cases, it
applies to all other GNSS systems. Any important differences will be specifically
noted.
The method that underlies GPS (and GNSS) location determination is trilateration,
which is an estimation of user position based on user measurements of distances
to objects with known locations. Sometimes this estimation is mistakenly referred
14 Z. Popovic and R. Miucic
The signal sending time is encoded in the message, while the determination of
the signal arrival time will be explained in the next section.
Given the satellite locations and distances to at least four satellites, the user
location estimate can be visualized as the intersection of spheres (circles in 2D). The
spheres are centered at the satellites locations and with radii equal to the distances
to the satellites (Fig. 1).
Spheres from three satellites are needed to narrow down their intersection to a
point (in the case of perfect measurements). The fourth satellite is needed because
there is drift between the receiver and satellite clocks that converts into position
uncertainty and thus also needs to be estimated. Using more than four satellites
reduces the estimate error, as further discussed in Section “Calculation of Position
and Time” on position, velocity, and time calculations.
Keeping the concept of trilateration in mind, here is a more extended, but still
simplified, outline of how various quantities are extracted from GPS signals and
combined into a position estimate (Fig. 2).
The actual specification of GPS signals and data described below is given by the
Interface Control Document IS-GPS-200. Is latest version is H-003 [2].
1. Each satellite sends a unique but known signal which is received by the receiver.
(Signals from all satellites arrive combined to the receiver, but can be separated
using signal processing techniques to be discussed later.)
2. The parameters of orbits of all satellites (and thus their locations at any time) are
known and transmitted in the message from each satellite. This data is known
as ephemeris. The GPS receiver decodes the ephemeris to know which satellites
are visible to it (that is, which are above the horizon, so that their signals are
expected to reach the receiver when there are no obstructions).
3. There are GPS time timestamps periodically embedded in a message carried by
the signal that is known as the navigation message. The GPS receiver uses these
timestamps to internally generate the expected signal (unique for each satellite)
at the expected time for each visible satellite. (Synchronization of the receiver to
the globally maintained GPS time is a challenge that will be addressed later.)
4. There is a difference between the receiver-generated signal and the receiver-
received signal, for each satellite, because of the time it takes the signal to arrive
from the satellite to the receiver. The receiver can measure this time difference,
Fig. 2 Approach to
measuring the pseudorange to
a GPS satellite
16 Z. Popovic and R. Miucic
t, by delay-shifting the generated signal until it lines up in time with the
received signal.
5. This time difference is converted to a distance (known as the pseudorange, ρ,
because it is corrupted by errors) by multiplying the time difference with the
speed of the signal, which is the speed of light, c.
6. The pseudorange to a satellite, the location of which is known, constrains the
receiver location to a sphere. The intersection of such spheres based on signals
from multiple satellites is the receiver location. This intersection can be found by
solving a simultaneous set of equations, as discussed in Section “Calculation of
Position and Time”.
GPS Architecture
Fig. 3 GPS satellite, an illustration in space and a close-up photograph on the ground
Orbital z
plane
Equatorial
plane
x
Fig. 4 GPS orbital plane
The MCS maintains GPS time that is used to synchronize time across the entire
GPS system. It also monitors and predicts orbits. Based on the orbit predictions, it
updates the messages from satellites containing the orbit parameters. Another key
role of the MCS is to generate commands to satellites to perform corrective moves
in order to stay in the desired orbit.
The unmanned ground antennas upload to satellites the motion commands and
the messages to be sent by the satellites.
18 Z. Popovic and R. Miucic
The user segment consists of all devices capable of receiving the GPS signals
and using them to determine position, velocity, and time (GPS receivers) (Figs. 8
and 9).
Besides GPS, there are other GNSS systems, which are currently either partially or
fully operational. Nations develop their own systems in order to be able to control
their location service in a time of war where other nations might deny the use of their
systems. From the user point of view, having access to multiple systems provides
benefits in terms of increased satellite visibility, which is particularly important in
20 Z. Popovic and R. Miucic
Performance
The achievable GNSS accuracy is subject to a number of error sources but there
are methods for constraining the errors. Section “GNSS Performance and High-
Accuracy Methods” will address those topics after the immediately following
Section “Basic GNSS Positioning in Cooperative Vehicles” with introduction to how
basic GNSS position data is used in V2X.
Further Resources
For more in-depth coverage of the topics in Section “GNSS Principles”, and for
other related topics, consult the excellent introductory but comprehensive texts
[3, 4].
Computing
GPS Receiver Unit
To
HMI
DSRC
Transceiver Vehicle CAN
In the most typical configuration, a DSRC equipped vehicle will have one or two
channel configuration setup. At least one channel will be tuned to Channel 172
Positioning 23
(CH172). CH172 will mainly be used for sending V2V messages (BSMs), SPaT
and MAP, and security service messages. V2V traffic will occupy the majority of
the channel load. There will be limited opportunity to exchange large content such as
regional maps, with the exception of MAP messages. MAP message is transmitted
from RSE. The MAP contains detailed lane and available approaches information
of the intersection the RSE is placed to.
The most common implementation of Traffic Sign Violation application is
described in CICAS-V project [22]. A vehicle, using its ego position information,
locates itself in a particular approach. The system then listens for a SPaT message
that contains the state of the traffic light for that approach. If the system determines
the speed is not adequate for the vehicle to safely stop at the red light, it will warn
the driver of impending traffic light violation.
Most common wired communication links between GPS receiver and Computing
Unit in a typical embedded solution include I2C, SPI, USB and UART [9, 12, 21].
Another important physical signal from GPS receiver is Pulse per Second (PPS).
PPS signal is used for synchronizing OBEs between vehicles. To communicate
actual positioning information GPS receiver is using NMEA messages. NMEA 0183
is a combined electrical and data specification for communication standards over a
serial connection.
Most useful NMEA messages for V2X/OBE are GPGGA and GPRMC [10].
Figure 11 shows a sample of NMEA stream with GPGGA and GPRMC messages
highlighted.
GGA message contains essential fix data which provide 3D location and accuracy
data. The following NMEA string: “$GPGGA,171546.0,4228.594269,N,08306.
957771,W,1,09,0.7,186.1,M,-34.0,M,*6A” is dissected and explained in Table 1.
RMC (Recommended Minimum C) message contains essential GPS (position,
velocity, time) data.
The following NMEA string: “$GPRMC,171546.0,A,4228.594269,N,08306.
957771,W,44.7,255.9,290315,0.0,E,A*29” is dissected and explained in Table 2.
A.H. XL.-L.