• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 6
  • 1
  • 1
  • 1
  • Tagged with
  • 9
  • 9
  • 5
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Autonoma fordon – En jämförelse av tekniker för identifiering av utryckningsfordon

Berggren, Filip, Engström, Jakob January 2019 (has links)
Kraven på säkerhet och effektivitet ökar ständigt inom fordonsindustrin. För att uppfylla dessa strävar fordonstillverkare efter att uppnå en högre grad av autonomi, detta innebär dock att många problem måste lösas. Denna rapport behandlar ett av dessa, autonoma fordons möjlighet att identifiera utryckningsfordon. Målet är att presentera ett förslag på vilken teknik som anses mest lämpad för autonoma fordon att kommunicera med utryckningsfordon. Arbetet grundade sig i en förstudie där standarden ITS G5, IEEE 802.11g, ZigBee samt mobilnät analyserades utifrån deras tekniska specifikationer. Utifrån analysen presenterades tre situationer där de olika teknikernas användning ansågs begränsade, i tunnlar, i tät trafik samt på långa avstånd vid höga hastigheter. Dessa situationer ställde krav på teknikerna inom bland annat svarstid, räckvidd, överföringsförmåga samt möjlighet till direktkommunikation mellan fordonen. Utifrån dessa krav ställdes en jämförelsematris upp där de olika teknikernas prestanda jämfördes. Resultatet visar att ITS G5 och ZigBee har bäst prestanda på egen hand medan en kombination av mobilnät och ITS G5 uppnår högst prestanda. / The demand for safety and effectivity continuously increases within the automotive industry. One way to meet these demands is to achieve a higher level of autonomy, but to achieve the highest levels of autonomy there is a few problems to be solved along the way. This report treats one of these, an autonomous vehicle’s ability to identify emergency vehicles. The report, based on a pilot study, analyses the ITS G5 standard, IEEE 802.11g, Zigbee and mobile networks based on their technological specifications. From the analysis three situations are identified where the technologies are considered limited. These limitations are, but not limited to, reach, latency, data rates and ability to communicate vehicle to vehicle (V2V). The four technologies are then compared by these limitations in a matrix. The result shows that ITS G5 and ZigBee has the best performance by its own but the combination of mobile networks and ITS G5 shows the highest possible performance.
2

Wireless Information Transfer in an Indoor Factory or Warehouse Environment / Trådlös Informationsöverföring i en Inomhus Fabriks- eller Lagermiljö

Mustovic, Adam January 2016 (has links)
Wireless technologies and networks are a part of our daily lives and we are surrounded by a constant stream of wireless signals. Unfortunately, there are a lot of limitations. At Toyota Material Handling Europe, future demands and expectations are raising but the technologies available today are not adapting fast enough. Indoor factory environments, moving network nodes and rapidly changing topologies are demanding situations. In this new Internet of Things day and age, transferring information in these challenging environments, the standard master and slave configuration is not enough. This report looks at the specific challenges establishing a wireless communication link between trucks in an indoor factory and warehouse environment. There are many factors to consider. Antennas, noise, frequency bands, different network technologies, propagation and path loss modeling to mention a few. Antennas and on-the-truck antenna positioning require design choices to be made. If we want to benefit from using high gain antennas, positioning is an important factor. Noise, in the highly congested 2.4 GHz band is a problem, especially considering safety critical applications. The license free ISM frequency bands have all different advantages in range, available communication protocols and amount of other technologies sharing the spectrum. The Wi-Fi, Bluetooth, ZigBee and V2X technologies looked at, tailored to the particular case of a warehouse environment like the Toyota factory, and the final selection relates to potential use case scenarios. Prioritizing, scalability, ad hoc network topologies, low latencies and short connection times together with long range, the new V2X technology building upon the IEEE 802.11p standard stands out. This report evaluates the IEEE 802.11p wireless standard running the ETSI ITS G5 V2X protocol in an indoor factory and warehouse environment. Thanks to Kapsch and their EVK-3300 V2X Evaluation Kit it was possible to evaluate transferring information between nodes, the PSR, and looking at how useful different path loss models are for estimating relative distances between trucks.
3

Defending against denial of service attacks in ETSI ITS-G5 networks / Försvar mot överbelastningsattacker hos ETSI ITS-G5 nätverk

Lind, Oskar January 2020 (has links)
This thesis explores the combined subjects of keep alive forwarding, denial of service attacks and decentralized congestion control. In a society where the technical requirements on vehicles constantly escalate; inter-vehicle communication has risen as a potential springboard for new technologies. The ETSI ITS-G5 standard is a vehicular ad-hoc network standard that offers manufacturers the possibility to include a feature called keep alive forwarding. This feature lets the nodes forward messages on a pre-defined time interval even if the original broadcaster is no longer present. As this feature might provide exploits for potential people with malicious intent it has been evaluated how resilient the standard might be in such a situation. Also included in this thesis is the decentralized congestion control, a feature required by the standard. To evaluate these features a series of simulations has been performed where vehicles in a highway scenario have been exposed to a denial of service attack where the attacker uses the keep-alive forwarding as an exploit. The findings are that decentralized congestion control does mitigate some of the direct consequences of such an attack. Although it does not eliminate these entirely and new problems are introduced. Finally, alternative methods to perform keep alive forwarding are suggested to enhance this feature.
4

Emulace infrastrukturní jednotky pro systém inteligentní dopravy / Emulation of infrastructure unit for inteligent transport system

Giertl, Juraj January 2018 (has links)
The thesis deals with the study of communication models for cooperative intelligent transport systems and the development of the application used for testing. The ETSI ITS-G5 and IEEE 1609.x DSRC/WAVE comunication stacks were compared to standartizes layered ISO/OSI reference model. The basic principes of comunication in inteligent transport systems are described for each model. Besides that the common messages structures for defining alert messages, the intersection geometry and trafic lights signals are described in further detail. Based on these structures and other requirements, an application is created that allows easy definition of alert messages, intersection geometry and its traffic light states.
5

Performance evaluation of C-ACC/platooning under ITS-G5 communications

Lyamin, Nikita January 2016 (has links)
Intelligent Transport Systems (ITS) are aiming to provide innovative services related to different modes of transport and traffic management, and enable various users to be better informed and make safer, more coordinated and smarter use of transport networks. Cooperative-ITS (C-ITS) support connectivity between vehicles, vehicles and roadside infrastructure, traffic signals as well as with other road users. In order to enable vehicular communications European Telecommunication Standards Institute (ETSI) delivered ITS-G5 -- a of set of C-ITS standards. Considering the goals of C-ITS, inter-vehicle communications should be reliable and efficient. In this thesis we study the performance, efficiency, and dependability of ITS-G5 communications for Cooperative adaptive cruise control (C-ACC) and platooning C-ITS applications. We provide an overview of currently available and ongoing standardization targeting communications in C-ACC/platooning. We study the performance of ITS-G5 beaconing in a C-ACC/platooning scenario, where we show that its performance may deteriorate when implemented in cooperative driving applications due to the kinematic-dependent design of the message triggering mechanism. We explain in detail the cause of this phenomenon and test it for a wide range of parameters. Also, we study the influence of different available ITS-G5 legitimate setups on the C-ACC/platooning fuel efficiency and demonstrate that proper communication setup may enhance fuel savings. This thesis also proposes a jamming denial-of-service attack detection algorithm for platooning. The main advantage of our detector is its short learning phase that not exceed a second and low detection delay of a few hundreds of milliseconds. Under some assumptions, the proposed algorithm demonstrates the ability to detect certain types of attacks with average probability above 0.9. / ACDC
6

Safety of Cooperative Automated Driving : Analysis and Optimization

Sidorenko, Galina January 2022 (has links)
New cooperative intelligent transportation system (C-ITS) applications become enabled thanks to advances in communication technologies between vehicles(V2V) and with the infrastructure (V2I). Communicating vehicles share information with each other and cooperate, which results in improved safety, fuel economy, and traffic efficiency. An example of a C-ITS application is platooning, which comprises a string of vehicles that travel together with short inter-vehicle distances (IVDs). Any solution related to C-ITS must comply with high safety requirements in order to pass standardization and be commercially deployed. Furthermore, trusted safety levels should be assured even for critical scenarios. This thesis studies the conditions that guarantee safety in emergency braking scenarios for heterogeneous platooning, or string-like, formations of vehicles. In such scenarios, the vehicle at the head of the string emergency brakes and all following vehicles have to automatically react in time to avoid rear-end collisions. The reaction time can be significantly decreased with vehicle-to-vehicle (V2V) communication usage since the leader can explicitly inform other platooning members about the critical braking. The safety analysis conducted in the thesis yields computationally efficient methods and algorithms for calculating minimum inter-vehicle distances that allow avoiding rear-end collisions with a predefined high guarantee. These IVDs are theoretically obtained for an open-loop and a closed-loop configurations. The former implies that follower drives with a constant velocity until braking starts, whereas in the latter, an adaptive cruise control (ACC) with a constant-distance policy serves as a controller. In addition, further optimization of inter-vehicle distances in the platoon is carried out under an assumption of centralized control. Such an approach allows achieving better fuel consumption and road utilization. The performed analytical comparison suggests that our proposed V2V communication based solution is superior to classical automated systems, such as automatic emergency braking system (AEBS), which utilizes only onboard sensors and no communication. Wireless communication, enabling to know the intentions of other vehicles almost immediately, allows for smaller IVDs whilst guaranteeing the same level of safety. Overall, the presented thesis highlights the importance of C-ITS and, specifically, V2V in the prevention of rear-end collisions in emergency scenarios. Future work directions include an extension of the obtained results by considering more advanced models of vehicles, environment, and communication settings; and applying the proposed algorithms of safety guaranteeing to other controllers, such as ACC with a constant time headway policy.
7

Localisation et transmissions sécurisées pour la communication Véhicule à Infrastructure (V2I) : Application au service de télépéage ITS-G5 / Localization and secure transmissions for Vehicle to Infrastructure communication (V2I) : Application to the electronic toll service using the ITS-G5 technology

Randriamasy, Malalatiana 24 May 2019 (has links)
La localisation précise des véhicules et la sécurité des échanges sont deux grands axes qui font la fiabilité des services fournis dans les systèmes de transport intelligent. Ces dernières années, elles font l’objet de nombreux projets de recherche pour des champs d’application divers. Dans cette thèse, le contexte d’application est la réalisation d’un service de télépéage utilisant la technologie ITS-G5. Cette technologie de communication sans-fil permet dans un premier temps le partage des informations de sécurité routière entre les véhicules (V2V), le véhicule et l’infrastructure (V2I). Dans cette thèse, on propose une architecture permettant d’échanger des transactions de télépéage utilisant les équipements communicants en ITS-G5 embarqués dans les véhicules connectés et les unités bord de route (UBR) de l’infrastructure. Les problématiques de nos travaux de recherche se concentrent sur la méthode de localisation des véhicules ayant effectué la transaction afin de pouvoir la valider et sur la sécurité de l’architecture proposée pour assurer l’échange de cette transaction. Afin de bien localiser les véhicules lors du passage au péage, notre approche propose la compréhension de la cinématique du véhicule par une modélisation adéquate à partir des données recueillies dans les messages coopératifs (CAM : Cooperative Awareness Message) en approche du péage. Cela améliorera les informations de géolocalisation déjà présentes. Notre objectif est d’arriver à une précision de moins d’un mètre pour distinguer 2 véhicules adjacents. D’autre part, le protocole de sécurité proposé permet d’assurer l’authentification des équipements participant à l’échange et à la validation de la transaction, l’intégrité des données échangées ainsi que la confidentialité des échanges compte tenu du contexte de communication sans-fil et de la sensibilité des données échangées. Une preuve de concept de la solution de télépéage utilisant la technologie ITS-G5 est développée et intègre nos deux contributions. / The precise localization of vehicles and the security of communication are requirements that make almost of the services provided in intelligent transport systems (ITS) more reliable. In recent years, they have been the subject of numerous research projects for various fields of application. In this thesis, the context is the development of an electronic toll service using the ITS-G5 technology. This wireless communication technology initially allows the sharing of traffic safety information between vehicles (V2V), vehicle and infrastructure (V2I). In our work, we propose a tolling application using equipment operating in ITS-G5 embedded in the connected vehicles and roadside units. For this, ensuring both precise geolocation of the vehicles and security of communication are required to validate the transaction.In order to properly locate the vehicles during the toll crossing, our approach is based on the understanding of the kinematics of the vehicle through a suitable modeling from the data collected in the cooperative messages (called CAM: Cooperative Awareness Message). This approach aims to improve the geolocation information already present in the message. Our goal is to achieve vehicle localization with an accuracy lower than one meter to distinguish two adjacent vehicles. On the other hand, the proposed tolling protocol ensures the authentication of the equipment or entities involved in the exchange and the validation of the transaction, the integrity of the transmitted data as well as the confidentiality of the communication. In this way, we take into account the context of the wireless communication and the sensitivity of the exchanged data. Our two contributions are integrated in the implemented Proof of Concept of the tolling application using the ITS-G5 technology.
8

Predictable and Scalable Medium Access Control for Vehicular Ad Hoc Networks

Sjöberg Bilstrup, Katrin January 2009 (has links)
<p>This licentiate thesis work investigates two medium access control (MAC) methods, when used in traffic safety applications over vehicular <em>ad hoc</em> networks (VANETs). The MAC methods are carrier sense multiple access (CSMA), as specified by the leading standard for VANETs IEEE 802.11p, and self-organizing time-division multiple access (STDMA) as used by the leading standard for transponders on ships. All vehicles in traffic safety applications periodically broadcast cooperative awareness messages (CAMs). The CAM based data traffic implies requirements on a predictable, fair and scalable medium access mechanism. The investigated performance measures are <em>channel access delay</em>, <em>number of consecutive packet drops</em> and the <em>distance between concurrently transmitting nodes</em>. Performance is evaluated by computer simulations of a highway scenario in which all vehicles broadcast CAMs with different update rates and packet lengths. The obtained results show that nodes in a CSMA system can experience <em>unbounded channel access delays</em> and further that there is a significant difference between the best case and worst case channel access delay that a node could experience. In addition, with CSMA there is a very high probability that several <em>concurrently transmitting nodes are located close to each other</em>. This occurs when nodes start their listening periods at the same time or when nodes choose the same backoff value, which results in nodes starting to transmit at the same time instant. The CSMA algorithm is therefore both <em>unpredictable</em> and <em>unfair</em> besides the fact that it <em>scales badly</em> for broadcasted CAMs. STDMA, on the other hand, will always grant channel access for all packets before a predetermined time, regardless of the number of competing nodes. Therefore, the STDMA algorithm is <em>predictable</em> and <em>fair</em>. STDMA, using parameter settings that have been adapted to the vehicular environment, is shown to outperform CSMA when considering the performance measure <em>distance between concurrently transmitting nodes</em>. In CSMA the distance between concurrent transmissions is random, whereas STDMA uses the side information from the CAMs to properly schedule concurrent transmissions in space. The price paid for the superior performance of STDMA is the required network synchronization through a global navigation satellite system, e.g., GPS. That aside since STDMA was shown to be scalable, predictable and fair; it is an excellent candidate for use in VANETs when complex communication requirements from traffic safety applications should be met.</p>
9

Predictable and Scalable Medium Access Control for Vehicular Ad Hoc Networks

Sjöberg Bilstrup, Katrin January 2009 (has links)
This licentiate thesis work investigates two medium access control (MAC) methods, when used in traffic safety applications over vehicular ad hoc networks (VANETs). The MAC methods are carrier sense multiple access (CSMA), as specified by the leading standard for VANETs IEEE 802.11p, and self-organizing time-division multiple access (STDMA) as used by the leading standard for transponders on ships. All vehicles in traffic safety applications periodically broadcast cooperative awareness messages (CAMs). The CAM based data traffic implies requirements on a predictable, fair and scalable medium access mechanism. The investigated performance measures are channel access delay, number of consecutive packet drops and the distance between concurrently transmitting nodes. Performance is evaluated by computer simulations of a highway scenario in which all vehicles broadcast CAMs with different update rates and packet lengths. The obtained results show that nodes in a CSMA system can experience unbounded channel access delays and further that there is a significant difference between the best case and worst case channel access delay that a node could experience. In addition, with CSMA there is a very high probability that several concurrently transmitting nodes are located close to each other. This occurs when nodes start their listening periods at the same time or when nodes choose the same backoff value, which results in nodes starting to transmit at the same time instant. The CSMA algorithm is therefore both unpredictable and unfair besides the fact that it scales badly for broadcasted CAMs. STDMA, on the other hand, will always grant channel access for all packets before a predetermined time, regardless of the number of competing nodes. Therefore, the STDMA algorithm is predictable and fair. STDMA, using parameter settings that have been adapted to the vehicular environment, is shown to outperform CSMA when considering the performance measure distance between concurrently transmitting nodes. In CSMA the distance between concurrent transmissions is random, whereas STDMA uses the side information from the CAMs to properly schedule concurrent transmissions in space. The price paid for the superior performance of STDMA is the required network synchronization through a global navigation satellite system, e.g., GPS. That aside since STDMA was shown to be scalable, predictable and fair; it is an excellent candidate for use in VANETs when complex communication requirements from traffic safety applications should be met.

Page generated in 0.0449 seconds