hh.sePublications
Change search
Link to record
Permanent link

Direct link
BETA
Publications (10 of 187) Show all publications
Bocharova, I., Kudryashov, B., Rabi, M., Lyamin, N., Dankers, W., Frick, E. & Vinel, A. (2019). Characterizing Packet Losses in Vehicular Networks. IEEE Transactions on Vehicular Technology
Open this publication in new window or tab >>Characterizing Packet Losses in Vehicular Networks
Show others...
2019 (English)In: IEEE Transactions on Vehicular Technology, ISSN 0018-9545, E-ISSN 1939-9359Article in journal (Refereed) Epub ahead of print
Abstract [en]

To enable testing and performance evaluation of new connected and autonomous driving functions, it is important to characterize packet losses caused by degradation in vehicular (V2X) communication channels. In this paper we suggest an approach to constructing packet loss models based on the socalled Pseudo-Markov chains (PMC). The PMC based model needs only short training sequences, has low computational complexity, and yet provides more precise approximations than known techniques. We show how to learn PMC models from either empirical records of packet receptions, or from analytical models of fluctuations in the received signal strength. In particular, we validate our approach by applying it on (i) V2X packet reception data collected from an active safety test run, which used the LTE network of the AstaZero automotive testing site in Sweden, and (ii) variants of the Rician fading channel models corresponding to two models of correlations of packet losses. We also show that initializing the Baum-Welch algorithm with a second order PMC model leads to a high accuracy model.

Place, publisher, year, edition, pages
Piscataway, NJ: IEEE, 2019
National Category
Communication Systems Telecommunications
Identifiers
urn:nbn:se:hh:diva-40265 (URN)10.1109/TVT.2019.2930689 (DOI)
Projects
AstaMoCA ”Model-based Communication Architecture for the AstaZero Automotive Safety” project (2017–2019)
Funder
Knowledge FoundationSwedish Foundation for Strategic Research ELLIIT - The Linköping‐Lund Initiative on IT and Mobile Communications
Note

A short version of this paper has been presented at 2019 IEEE International Symposium on Information Theory (ISIT) which was held on July 7-12, 2019 in Paris, France.

Funding: the Knowledge Foundation in the framework of AstaMoCA ”Model-based Communication Architecture for the AstaZero Automotive Safety” project (2017–2019), COST Action CA15127 (”Resilient communication services protecting end-user applications from disaster-based failures – RECODIS”) supported by COST (European Cooperation in Science and Technology), Swedish Foundation for Strategic Research (SSF) in the framework of Strategic Mobility Program (2019-2020), from the Estonian Research Council under the grant PRG49 and from the ELLIIT Strategic Research Network.

Available from: 2019-07-25 Created: 2019-07-25 Last updated: 2019-07-30
Hilt, B., Berbineau, M., Vinel, A., Jonsson, M. & Pirovano, A. (Eds.). (2019). Communication Technologies for Vehicles: 14th International Workshop, Nets4Cars/Nets4Trains/Nets4Aircraft 2019, Colmar, France, May 16–17, 2019, Proceedings. Heidelberg: Springer
Open this publication in new window or tab >>Communication Technologies for Vehicles: 14th International Workshop, Nets4Cars/Nets4Trains/Nets4Aircraft 2019, Colmar, France, May 16–17, 2019, Proceedings
Show others...
2019 (English)Conference proceedings (editor) (Refereed)
Place, publisher, year, edition, pages
Heidelberg: Springer, 2019. p. 119
Series
Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349 ; 11461
National Category
Communication Systems Telecommunications
Identifiers
urn:nbn:se:hh:diva-40261 (URN)10.1007/978-3-030-25529-9 (DOI)978-3-030-25529-9 (ISBN)978-3-030-25528-2 (ISBN)
Available from: 2019-07-22 Created: 2019-07-22 Last updated: 2019-07-23Bibliographically approved
Lyamin, N., Vinel, A. & Bellalta, B. (2019). Configuring the Decentralized Congestion Control for ETSI ITS-G5 C-ITS Applications. IEEE Communications Letters
Open this publication in new window or tab >>Configuring the Decentralized Congestion Control for ETSI ITS-G5 C-ITS Applications
2019 (English)In: IEEE Communications Letters, ISSN 1089-7798, E-ISSN 1558-2558Article in journal (Refereed) Submitted
Abstract [en]

Decentralized Congestion Control (DCC) is one the central components of inter-vehicular communications protocol stack enabling Cooperative Intelligent Transportation System (C-ITS). In this letter we first present an analytical framework that allows to tune parameters of the DCC algorithm specified by ETSI. Then we suggest two approaches to optimize the DCC configuration using our framework. Finally, we evaluate the performance of the proposed approaches using detailed simulation experiments. We demonstrate that proposed approaches are able to control channel busy ratio stably, while proposed analytical model precisely estimates application level metrics.

Place, publisher, year, edition, pages
Piscataway, NJ: IEEE, 2019
Keywords
C-ITS, VANET, V2X, DCC, ETSI, platooning, congestion control
National Category
Communication Systems Telecommunications
Identifiers
urn:nbn:se:hh:diva-38761 (URN)
Available from: 2019-01-16 Created: 2019-01-16 Last updated: 2019-01-16
Zhang, K., Mao, Y., Leng, S., Maharjan, S., Vinel, A. & Zhang, Y. (2019). Contract-theoretic Approach for Delay Constrained Offloading in Vehicular Edge Computing Networks. Journal on spesial topics in mobile networks and applications, 24(3), 1003-1014
Open this publication in new window or tab >>Contract-theoretic Approach for Delay Constrained Offloading in Vehicular Edge Computing Networks
Show others...
2019 (English)In: Journal on spesial topics in mobile networks and applications, ISSN 1383-469X, E-ISSN 1572-8153, Vol. 24, no 3, p. 1003-1014Article in journal (Refereed) Published
Abstract [en]

Mobile Edge Computing (MEC) is a promising solution to improve vehicular services through offloading computation to cloud servers in close proximity to mobile vehicles. However, the self-interested nature together with the high mobility characteristic of the vehicles make the design of the computation offloading scheme a significant challenge. In this paper, we propose a new Vehicular Edge Computing (VEC) framework to model the computation offloading process of the mobile vehicles running on a bidirectional road. Based on this framework, we adopt a contract theoretic approach to design optimal offloading strategies for the VEC service provider, which maximize the revenue of the provider while enhancing the utilities of the vehicles. To further improve the utilization of the computing resources of the VEC servers, we incorporate task priority distinction as well as additional resource providing into the design of the offloading scheme, and propose an efficient VEC server selection and computing resource allocation algorithm. Numerical results indicate that our proposed schemes greatly enhance the revenue of the VEC provider, and concurrently improve the utilization of cloud computing resources. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.

Place, publisher, year, edition, pages
New York, NY: Springer-Verlag New York, 2019
Keywords
Vehicular network, Cloud, Mobile edge computing, Contract theory
National Category
Communication Systems Telecommunications
Identifiers
urn:nbn:se:hh:diva-36337 (URN)10.1007/s11036-018-1032-0 (DOI)2-s2.0-85066246860 (Scopus ID)
Note

Funding: The National Natural Science Foundation of China under Grant No.61374189, the joint fund of the Ministry of Education of P.R. China and China Mobile under Grant MCM20160304.

Available from: 2018-02-22 Created: 2018-02-22 Last updated: 2019-06-12Bibliographically approved
Evdokimova, E., Vinel, A., Lyamin, N. & Fiems, D. (2019). Internet Provisioning in VANETs: Performance Modeling of Drive-Thru Scenarios. IEEE transactions on intelligent transportation systems (Print), 1-15
Open this publication in new window or tab >>Internet Provisioning in VANETs: Performance Modeling of Drive-Thru Scenarios
2019 (English)In: IEEE transactions on intelligent transportation systems (Print), ISSN 1524-9050, E-ISSN 1558-0016, p. 1-15Article in journal (Refereed) Epub ahead of print
Abstract [en]

Drive-thru-Internet is a scenario in cooperative intelligent transportation systems (C-ITSs), where a road-side unit (RSU) provides multimedia services to vehicles that pass by. Performance of the drive-thru-Internet depends on various factors, including data traffic intensity, vehicle traffic density, and radio-link quality within the coverage area of the RSU, and must be evaluated at the stage of system design in order to fulfill the quality-of-service requirements of the customers in C-ITS. In this paper, we present an analytical framework that models downlink traffic in a drive-thru-Internet scenario by means of a multidimensional Markov process: the packet arrivals in the RSU buffer constitute Poisson processes and the transmission times are exponentially distributed. Taking into account the state space explosion problem associated with multidimensional Markov processes, we use iterative perturbation techniques to calculate the stationary distribution of the Markov chain. Our numerical results reveal that the proposed approach yields accurate estimates of various performance metrics, such as the mean queue content and the mean packet delay for a wide range of workloads. © 2019 IEEE.

Place, publisher, year, edition, pages
Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), 2019
Keywords
Wireless networks, vehicular ad hoc networks, queueing analysis
National Category
Telecommunications
Identifiers
urn:nbn:se:hh:diva-39539 (URN)10.1109/TITS.2019.2918075 (DOI)
Funder
Knowledge FoundationEU, Horizon 2020Swedish Foundation for Strategic Research ELLIIT - The Linköping‐Lund Initiative on IT and Mobile Communications
Available from: 2019-06-05 Created: 2019-06-05 Last updated: 2019-08-09
Lien, S.-Y., Kuo, Y.-C., Deng, D.-J., Tsai, H.-L., Vinel, A. & Benslimane, A. (2019). Latency-Optimal mmWave Radio Access for V2X Supporting Next Generation Driving Use Cases. IEEE Access, 7, 6782-6795
Open this publication in new window or tab >>Latency-Optimal mmWave Radio Access for V2X Supporting Next Generation Driving Use Cases
Show others...
2019 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 7, p. 6782-6795Article in journal (Refereed) Published
Abstract [en]

With the facilitation of the fifth generation (5G) New Radio (NR), Vehicle-to-Everything (V2X) applications have entered a brand new era to sustain the next generation driving use cases of advanced driving, vehicle platooning, extended sensors and remote driving. To deploy these driving use cases, the service requirements however include low latency, high reliability, and high data rates, which thus render utilizing millimeter wave (mmWave) carriers (spectrum above 6 GHz) as a remedy to empower the next generation driving use cases. However, suffering from severe signal attenuation, transmission range of mmWave carriers may be very limited, which is unfavorable in mobile network deployment to offer seamless services, and compel directional transmission/reception using beamforming mandatory. For this purpose, both a transmitter and a receiver should sweep their beams toward different directions over time, and a communication link can be established only if a transmitter and a receiver arrange their beam directions toward each other at the same time (known as beam alignment). Unfortunately, latency of performing beam sweeping to achieve beam alignment turns out the be a dominating challenge to exploit mmWave, especially for the next generation driving use cases. In this paper, we consequently derive essential principles and designs for beam sweeping at the transmitter side and receivers side, which not only guarantee the occurrence of beam alignment but also optimize the latency to achieve beam alignment. Based on the availabilities of a common geographic reference and the knowledge of beam sweeping scheme at the transmitter side, we derive corresponding performance bounds in terms of latency to achieve beam alignment, and device corresponding latency-optimal beam sweeping schemes. The provided engineering insights therefore pave inevitable foundations to practice the next generation driving use cases using mmWave carriers.

Place, publisher, year, edition, pages
Piscataway, NJ: IEEE, 2019
Keywords
NR V2X, next generation driving use cases, mmWave, low latency, beam sweeping
National Category
Communication Systems Telecommunications
Identifiers
urn:nbn:se:hh:diva-38664 (URN)10.1109/ACCESS.2018.2888868 (DOI)2-s2.0-85058987989 (Scopus ID)
Note

Funding: This research is supported by the Ministry of Science and Technology (MOST) under the contracts MOST 106- 2221-E-194 -065 -MY2 and MOST 107-2218-E-009-046-, and is partially supported by the Advanced Institute of Manufacturing with High-tech Innovation (AIM-HI) from the Featured Area Research Center Program within the framework of the Higher Education Sprout Project by the Ministry of Education (MOE) in Taiwan.

Available from: 2018-12-21 Created: 2018-12-21 Last updated: 2019-01-25Bibliographically approved
Campolo, C., Molinaro, A., Berthet, A. & Vinel, A. (2019). On Latency and Reliability of Road Hazard Warnings over the Cellular V2X Sidelink Interface. IEEE Communications Letters
Open this publication in new window or tab >>On Latency and Reliability of Road Hazard Warnings over the Cellular V2X Sidelink Interface
2019 (English)In: IEEE Communications Letters, ISSN 1089-7798, E-ISSN 1558-2558Article in journal (Refereed) Epub ahead of print
Abstract [en]

Decentralized Environmental Notification Messages (DENMs) are generated by a vehicle upon detection of an accident or other hazards on the road, and need to be promptly and reliably transmitted. Delayed or lost messages may have fatal consequences, especially in critical driving situations, such as automated overtake and emergency braking, when vehicles can be very close to each other. In this letter, the DENM latency and reliability performances are characterized over the Cellular Vehicle-to-everything (C-V2X) sidelink (PC5 interface). The conducted study uses analytical tools, among which stochastic geometry, to derive performance results, then validated by simulations. Results are applied to the case of DENMs for emergency electronic brake lights, and helpful insights are provided for this crucial case and for other more general DENM-assisted V2X use cases.

Place, publisher, year, edition, pages
Piscataway, NJ: IEEE, 2019
Keywords
Cellular V2X, PC5, DENM, stochastic geometry
National Category
Communication Systems Telecommunications
Identifiers
urn:nbn:se:hh:diva-40344 (URN)10.1109/LCOMM.2019.2931686 (DOI)
Projects
SafeSmart ”Safety of Connected Intelligent Vehicles in Smart Cities” Synergy project (2019–2023)Strategic Mobility Program (2019-2020)
Funder
Knowledge FoundationSwedish Foundation for Strategic Research
Available from: 2019-07-29 Created: 2019-07-29 Last updated: 2019-07-30
Lyamin, N., Kleyko, D., Delooz, Q. & Vinel, A. (2019). Real-time jamming DoS detection in safety-critical V2V C-ITS using data mining. IEEE Communications Letters, 23(3), 442-445
Open this publication in new window or tab >>Real-time jamming DoS detection in safety-critical V2V C-ITS using data mining
2019 (English)In: IEEE Communications Letters, ISSN 1089-7798, E-ISSN 1558-2558, Vol. 23, no 3, p. 442-445Article in journal (Refereed) Published
Abstract [en]

A data mining-based method for real-time detection of radio jamming Denial-of-Service (DoS) attacks in IEEE 802.11p vehicle-to-vehicle (V2V) communications is proposed. The method aims at understanding the reasons for losses of periodic cooperative awareness messages (CAM) exchanged by vehicles in a platoon. Detection relies on a knowledge of IEEE 802.11p protocols rules as well as on historical observation of events in the V2V channel. In comparison to the state-of-the-art method, the proposed method allows operating under the realistic assumption of random jitter accompanying every CAM transmission. The method is evaluated for two jamming models: random and ON-OFF. 

Place, publisher, year, edition, pages
Piscataway, NJ: IEEE, 2019
Keywords
C-ITS, VANET, jamming, Denial-of-Service attack, security, platooning, data mining
National Category
Communication Systems Telecommunications
Identifiers
urn:nbn:se:hh:diva-38762 (URN)10.1109/LCOMM.2019.2894767 (DOI)
Available from: 2019-01-16 Created: 2019-01-16 Last updated: 2019-03-20Bibliographically approved
Thunberg, J., Lyamin, N., Sjöberg, K. & Vinel, A. (2019). Vehicle-to-Vehicle Communications for Platooning: Safety Analysis. IEEE Networking Letters
Open this publication in new window or tab >>Vehicle-to-Vehicle Communications for Platooning: Safety Analysis
2019 (English)In: IEEE Networking Letters, ISSN 2576-3156Article in journal (Refereed) Epub ahead of print
Abstract [en]

Vehicle-to-vehicle (V2V) communication is the key technology enabling platooning. This paper proposes an analytical framework that combines the characteristics of V2V communication (packet loss probabilities and packet transmission delays) with the physical mobility characteristics of vehicles (speed, distance between vehicles and their brake capacities). First, we present the feasible region of communications delays which guarantees safe emergency braking in platooning scenarios. Second, we derive a bound on the probability of safe braking. The presented framework is applied to understand the performance of the state-of-the-art V2V communication protocol for platooning.

Place, publisher, year, edition, pages
Piscataway: Institute of Electrical and Electronics Engineers (IEEE), 2019
National Category
Communication Systems Control Engineering
Identifiers
urn:nbn:se:hh:diva-40251 (URN)10.1109/LNET.2019.2929026 (DOI)
Available from: 2019-07-18 Created: 2019-07-18 Last updated: 2019-07-19
He, D., Kumar, N., Wang, H., Wang, L., Raymond Choo, K.-K. & Vinel, A. (2018). A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network. IEEE Transactions on Dependable and Secure Computing, 15(4), 633-645
Open this publication in new window or tab >>A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network
Show others...
2018 (English)In: IEEE Transactions on Dependable and Secure Computing, ISSN 1545-5971, E-ISSN 1941-0018, Vol. 15, no 4, p. 633-645Article in journal (Refereed) Published
Abstract [en]

With rapid developments of sensor, wireless and mobile communication technologies, Mobile Healthcare Social Networks (MHSNs) have emerged as a popular means of communication in healthcare services. Within MHSNs, patients can use their mobile devices to securely share their experiences, broaden their understanding of the illness or symptoms, form a supportive network, and transmit information (e.g. state of health and new symptoms) between users and other stake holders (e.g. medical center). Despite the benefits afforded by MHSNs, there are underlying security and privacy issues (e.g. due to the transmission of messages via a wireless channel). The handshake scheme is an important cryptographic mechanism, which can provide secure communication in MHSNs (e.g. anonymity and mutual authentication between users, such as patients). In this paper, we present a new framework for the handshake scheme in MHSNs, which is based on hierarchical identity-based cryptography. We then construct an efficient Cross-Domain HandShake (CDHS) scheme that allows symptoms-matching within MHSNs. For example, using the proposed CDHS scheme, two patients registered with different healthcare centers can achieve mutual authentication and generate a session key for future secure communications. We then prove the security of the scheme, and a comparative summary demonstrates that the proposed CDHS scheme requires fewer computation and lower communication costs. We also implement the proposed CDHS scheme and three related schemes in a proof of concept Android app to demonstrate utility of the scheme. Findings from the evaluations demonstrate that the proposed CDHS scheme achieves a reduction of 18.14% and 5.41% in computation cost and communication cost, in comparison to three other related handshake schemes. © 2016 IEEE. 

Place, publisher, year, edition, pages
Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), 2018
Keywords
Mobile healthcare social networks, cross-domain handshake, secure handshake, authentication, elliptic curve, security
National Category
Communication Systems Telecommunications
Identifiers
urn:nbn:se:hh:diva-32115 (URN)10.1109/TDSC.2016.2596286 (DOI)
Note

Funding: National Natural Science Foundation of China; Natural Science Foundation of Hubei Province of China; National Natural Science Foundation of China; National Natural Science Foundation of China; National High-Tech Research and Development Program of China (863 Program)

Available from: 2016-10-01 Created: 2016-10-01 Last updated: 2018-07-10Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0003-4894-4134

Search in DiVA

Show all publications