hh.sePublications
Change search
Link to record
Permanent link

Direct link
BETA
Publications (10 of 181) Show all publications
Lyamin, N., Vinel, A. & Bellalta, B. (2019). Configuring the Decentralized Congestion Control for ETSI ITS-G5 C-ITS Applications. IEEE Communications Letters
Open this publication in new window or tab >>Configuring the Decentralized Congestion Control for ETSI ITS-G5 C-ITS Applications
2019 (English)In: IEEE Communications Letters, ISSN 1089-7798, E-ISSN 1558-2558Article in journal (Refereed) Submitted
Abstract [en]

Decentralized Congestion Control (DCC) is one the central components of inter-vehicular communications protocol stack enabling Cooperative Intelligent Transportation System (C-ITS). In this letter we first present an analytical framework that allows to tune parameters of the DCC algorithm specified by ETSI. Then we suggest two approaches to optimize the DCC configuration using our framework. Finally, we evaluate the performance of the proposed approaches using detailed simulation experiments. We demonstrate that proposed approaches are able to control channel busy ratio stably, while proposed analytical model precisely estimates application level metrics.

Place, publisher, year, edition, pages
Piscataway, NJ: IEEE, 2019
Keywords
C-ITS, VANET, V2X, DCC, ETSI, platooning, congestion control
National Category
Communication Systems Telecommunications
Identifiers
urn:nbn:se:hh:diva-38761 (URN)
Available from: 2019-01-16 Created: 2019-01-16 Last updated: 2019-01-16
Lien, S.-Y., Kuo, Y.-C., Deng, D.-J., Tsai, H.-L., Vinel, A. & Benslimane, A. (2019). Latency-Optimal mmWave Radio Access for V2X Supporting Next Generation Driving Use Cases. IEEE Access, 7, 6782-6795
Open this publication in new window or tab >>Latency-Optimal mmWave Radio Access for V2X Supporting Next Generation Driving Use Cases
Show others...
2019 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 7, p. 6782-6795Article in journal (Refereed) Published
Abstract [en]

With the facilitation of the fifth generation (5G) New Radio (NR), Vehicle-to-Everything (V2X) applications have entered a brand new era to sustain the next generation driving use cases of advanced driving, vehicle platooning, extended sensors and remote driving. To deploy these driving use cases, the service requirements however include low latency, high reliability, and high data rates, which thus render utilizing millimeter wave (mmWave) carriers (spectrum above 6 GHz) as a remedy to empower the next generation driving use cases. However, suffering from severe signal attenuation, transmission range of mmWave carriers may be very limited, which is unfavorable in mobile network deployment to offer seamless services, and compel directional transmission/reception using beamforming mandatory. For this purpose, both a transmitter and a receiver should sweep their beams toward different directions over time, and a communication link can be established only if a transmitter and a receiver arrange their beam directions toward each other at the same time (known as beam alignment). Unfortunately, latency of performing beam sweeping to achieve beam alignment turns out the be a dominating challenge to exploit mmWave, especially for the next generation driving use cases. In this paper, we consequently derive essential principles and designs for beam sweeping at the transmitter side and receivers side, which not only guarantee the occurrence of beam alignment but also optimize the latency to achieve beam alignment. Based on the availabilities of a common geographic reference and the knowledge of beam sweeping scheme at the transmitter side, we derive corresponding performance bounds in terms of latency to achieve beam alignment, and device corresponding latency-optimal beam sweeping schemes. The provided engineering insights therefore pave inevitable foundations to practice the next generation driving use cases using mmWave carriers.

Place, publisher, year, edition, pages
Piscataway, NJ: IEEE, 2019
Keywords
NR V2X, next generation driving use cases, mmWave, low latency, beam sweeping
National Category
Communication Systems Telecommunications
Identifiers
urn:nbn:se:hh:diva-38664 (URN)10.1109/ACCESS.2018.2888868 (DOI)2-s2.0-85058987989 (Scopus ID)
Note

Funding: This research is supported by the Ministry of Science and Technology (MOST) under the contracts MOST 106- 2221-E-194 -065 -MY2 and MOST 107-2218-E-009-046-, and is partially supported by the Advanced Institute of Manufacturing with High-tech Innovation (AIM-HI) from the Featured Area Research Center Program within the framework of the Higher Education Sprout Project by the Ministry of Education (MOE) in Taiwan.

Available from: 2018-12-21 Created: 2018-12-21 Last updated: 2019-01-25Bibliographically approved
Lyamin, N., Kleyko, D., Delooz, Q. & Vinel, A. (2019). Real-time jamming DoS detection in safety-critical V2V C-ITS using data mining. IEEE Communications Letters
Open this publication in new window or tab >>Real-time jamming DoS detection in safety-critical V2V C-ITS using data mining
2019 (English)In: IEEE Communications Letters, ISSN 1089-7798, E-ISSN 1558-2558Article in journal (Refereed) Epub ahead of print
Abstract [en]

A data mining-based method for real-time detection of radio jamming Denial-of-Service (DoS) attacks in IEEE 802.11p vehicle-to-vehicle (V2V) communications is proposed. The method aims at understanding the reasons for losses of periodic cooperative awareness messages (CAM) exchanged by vehicles in a platoon. Detection relies on a knowledge of IEEE 802.11p protocols rules as well as on historical observation of events in the V2V channel. In comparison to the state-of-the-art method, the proposed method allows operating under the realistic assumption of random jitter accompanying every CAM transmission. The method is evaluated for two jamming models: random and ON-OFF. 

Place, publisher, year, edition, pages
Piscataway, NJ: IEEE, 2019
Keywords
C-ITS, VANET, jamming, Denial-of-Service attack, security, platooning, data mining
National Category
Communication Systems Telecommunications
Identifiers
urn:nbn:se:hh:diva-38762 (URN)10.1109/LCOMM.2019.2894767 (DOI)
Available from: 2019-01-16 Created: 2019-01-16 Last updated: 2019-02-05
He, D., Kumar, N., Wang, H., Wang, L., Raymond Choo, K.-K. & Vinel, A. (2018). A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network. IEEE Transactions on Dependable and Secure Computing, 15(4), 633-645
Open this publication in new window or tab >>A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network
Show others...
2018 (English)In: IEEE Transactions on Dependable and Secure Computing, ISSN 1545-5971, E-ISSN 1941-0018, Vol. 15, no 4, p. 633-645Article in journal (Refereed) Published
Abstract [en]

With rapid developments of sensor, wireless and mobile communication technologies, Mobile Healthcare Social Networks (MHSNs) have emerged as a popular means of communication in healthcare services. Within MHSNs, patients can use their mobile devices to securely share their experiences, broaden their understanding of the illness or symptoms, form a supportive network, and transmit information (e.g. state of health and new symptoms) between users and other stake holders (e.g. medical center). Despite the benefits afforded by MHSNs, there are underlying security and privacy issues (e.g. due to the transmission of messages via a wireless channel). The handshake scheme is an important cryptographic mechanism, which can provide secure communication in MHSNs (e.g. anonymity and mutual authentication between users, such as patients). In this paper, we present a new framework for the handshake scheme in MHSNs, which is based on hierarchical identity-based cryptography. We then construct an efficient Cross-Domain HandShake (CDHS) scheme that allows symptoms-matching within MHSNs. For example, using the proposed CDHS scheme, two patients registered with different healthcare centers can achieve mutual authentication and generate a session key for future secure communications. We then prove the security of the scheme, and a comparative summary demonstrates that the proposed CDHS scheme requires fewer computation and lower communication costs. We also implement the proposed CDHS scheme and three related schemes in a proof of concept Android app to demonstrate utility of the scheme. Findings from the evaluations demonstrate that the proposed CDHS scheme achieves a reduction of 18.14% and 5.41% in computation cost and communication cost, in comparison to three other related handshake schemes. © 2016 IEEE. 

Place, publisher, year, edition, pages
Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), 2018
Keywords
Mobile healthcare social networks, cross-domain handshake, secure handshake, authentication, elliptic curve, security
National Category
Communication Systems Telecommunications
Identifiers
urn:nbn:se:hh:diva-32115 (URN)10.1109/TDSC.2016.2596286 (DOI)
Note

Funding: National Natural Science Foundation of China; Natural Science Foundation of Hubei Province of China; National Natural Science Foundation of China; National Natural Science Foundation of China; National High-Tech Research and Development Program of China (863 Program)

Available from: 2016-10-01 Created: 2016-10-01 Last updated: 2018-07-10Bibliographically approved
Lyamin, N., Kleyko, D., Delooz, Q. & Vinel, A. (2018). AI-Based Malicious Network Traffic Detection in VANETs. IEEE Network, 32(6), 15-21
Open this publication in new window or tab >>AI-Based Malicious Network Traffic Detection in VANETs
2018 (English)In: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 32, no 6, p. 15-21Article in journal (Refereed) Published
Abstract [en]

Inherent unreliability of wireless communications may have crucial consequences when safety-critical C-ITS applications enabled by VANETs are concerned. Although natural sources of packet losses in VANETs such as network traffic congestion are handled by decentralized congestion control (DCC), losses caused by malicious interference need to be controlled too. For example, jamming DoS attacks on CAMs may endanger vehicular safety, and first and foremost are to be detected in real time. Our first goal is to discuss key literature on jamming modeling in VANETs and revisit some existing detection methods. Our second goal is to present and evaluate our own recent results on how to address the real-time jamming detection problem in V2X safety-critical scenarios with the use of AI. We conclude that our hybrid jamming detector, which combines statistical network traffic analysis with data mining methods, allows the achievement of acceptable performance even when random jitter accompanies the generation of CAMs, which complicates the analysis of the reasons for their losses in VANETs. The use case of the study is a challenging platooning C-ITS application, where V2X-enabled vehicles move together at highway speeds with short inter-vehicle gaps.

Place, publisher, year, edition, pages
Piscataway, NJ: IEEE, 2018
Keywords
Vehicle safety, Telecommunication traffic, Road traffic, Wireless communication, Networked control systems, Real-time systems, Vehicular ad hoc networks, Intelligent vehicles, Artificial intelligence, Cams, Jamming
National Category
Communication Systems Telecommunications
Identifiers
urn:nbn:se:hh:diva-38456 (URN)10.1109/MNET.2018.1800074 (DOI)
Projects
AstaMoCA “Model-Based Communication Architecture for the AstaZero Automotive Safety”
Funder
Knowledge FoundationELLIIT - The Linköping‐Lund Initiative on IT and Mobile Communications
Available from: 2018-11-30 Created: 2018-11-30 Last updated: 2019-01-16Bibliographically approved
Díez Rodríguez, V., Detournay, J., Vinel, A. & Lyamin, N. (2018). An Approach for Receiver-Side Awareness Control in Vehicular Ad Hoc Networks. IEEE transactions on intelligent transportation systems (Print), 19(4), 1227-1236
Open this publication in new window or tab >>An Approach for Receiver-Side Awareness Control in Vehicular Ad Hoc Networks
2018 (English)In: IEEE transactions on intelligent transportation systems (Print), ISSN 1524-9050, E-ISSN 1558-0016, Vol. 19, no 4, p. 1227-1236Article in journal (Refereed) Published
Abstract [en]

Vehicular Ad hoc networks (VANET) are a key element of cooperative intelligent transport systems. One of the challenges in VANETs is dealing with awareness and congestion due to the high amount of messages received from the vehicles in communication range. As VANETs are used in critical applications, congestion on the receiver side caused by the buffering of the packets is a safety hazard. In this paper, we propose a streamwise queuing system on the receiver side and show how it improves the timeliness of the messages received and maintains the awareness of the system in a congestion situation. © Copyright 2017 IEEE

Place, publisher, year, edition, pages
Piscataway: Institute of Electrical and Electronics Engineers (IEEE), 2018
Keywords
GCDC 2016, ETSI ITS-G5, vehicular communication, awareness control, priority queue
National Category
Communication Systems Telecommunications
Identifiers
urn:nbn:se:hh:diva-35188 (URN)10.1109/TITS.2017.2749966 (DOI)2-s2.0-85030764383 (Scopus ID)
Available from: 2017-10-12 Created: 2017-10-12 Last updated: 2018-04-03Bibliographically approved
Fiems, D. & Vinel, A. (2018). Connectivity Times in Vehicular Networks. IEEE Communications Letters, 22(11), 2270-2273, Article ID 8444968.
Open this publication in new window or tab >>Connectivity Times in Vehicular Networks
2018 (English)In: IEEE Communications Letters, ISSN 1089-7798, E-ISSN 1558-2558, Vol. 22, no 11, p. 2270-2273, article id 8444968Article in journal (Refereed) Published
Abstract [en]

We propose an analytical model that accurately captures the service advertisement and access mechanisms in IEEE 1609.4/IEEE 802.11p multi-channel vehicular networks where road-side units announce non-safety services to passing vehicles on a dedicated channel. For a drive-thru scenario, we calculate various performance measures including the service discovery probability, the mean time till discovery and the channel utilization. © 1997-2012 IEEE.

Place, publisher, year, edition, pages
Piscataway, NJ: IEEE, 2018
Keywords
Vehicular ad hoc networks (VANET), roadside unit (RSU), cellular coverage, stochastic processes
National Category
Communication Systems Telecommunications
Identifiers
urn:nbn:se:hh:diva-37869 (URN)10.1109/LCOMM.2018.2866558 (DOI)2-s2.0-85052684175 (Scopus ID)
Available from: 2018-08-30 Created: 2018-08-30 Last updated: 2018-11-26Bibliographically approved
Zhang, K., Mao, Y., Leng, S., Maharjan, S., Vinel, A. & Zhang, Y. (2018). Contract-theoretic Approach for Delay Constrained Offloading in Vehicular Edge Computing Networks. Journal on spesial topics in mobile networks and applications
Open this publication in new window or tab >>Contract-theoretic Approach for Delay Constrained Offloading in Vehicular Edge Computing Networks
Show others...
2018 (English)In: Journal on spesial topics in mobile networks and applications, ISSN 1383-469X, E-ISSN 1572-8153Article in journal (Refereed) Epub ahead of print
Abstract [en]

Mobile Edge Computing (MEC) is a promising solution to improve vehicular services through offloading computation to cloud servers in close proximity to mobile vehicles. However, the self-interested nature together with the high mobility characteristic of the vehicles make the design of the computation offloading scheme a significant challenge. In this paper, we propose a new Vehicular Edge Computing (VEC) framework to model the computation offloading process of the mobile vehicles running on a bidirectional road. Based on this framework, we adopt a contract theoretic approach to design optimal offloading strategies for the VEC service provider, which maximize the revenue of the provider while enhancing the utilities of the vehicles. To further improve the utilization of the computing resources of the VEC servers, we incorporate task priority distinction as well as additional resource providing into the design of the offloading scheme, and propose an efficient VEC server selection and computing resource allocation algorithm. Numerical results indicate that our proposed schemes greatly enhance the revenue of the VEC provider, and concurrently improve the utilization of cloud computing resources.

Place, publisher, year, edition, pages
New York, NY: Springer-Verlag New York, 2018
Keywords
Vehicular network, Cloud, Mobile edge computing, Contract theory
National Category
Communication Systems Telecommunications
Identifiers
urn:nbn:se:hh:diva-36337 (URN)10.1007/s11036-018-1032-0 (DOI)
Note

Funding: The National Natural Science Foundation of China under Grant No.61374189, the joint fund of the Ministry of Education of P.R. China and China Mobile under Grant MCM20160304.

Available from: 2018-02-22 Created: 2018-02-22 Last updated: 2018-12-17Bibliographically approved
Lyamin, N., Vinel, A., Jonsson, M. & Bellalta, B. (2018). Cooperative awareness in VANETs: On ETSI EN 302 637-2 performance. IEEE Transactions on Vehicular Technology, 67(1), 17-28
Open this publication in new window or tab >>Cooperative awareness in VANETs: On ETSI EN 302 637-2 performance
2018 (English)In: IEEE Transactions on Vehicular Technology, ISSN 0018-9545, E-ISSN 1939-9359, Vol. 67, no 1, p. 17-28Article in journal (Refereed) Published
Abstract [en]

Cooperative Awareness on the road is aiming to support the road users with knowledge about the surroundings relying on the information exchange enabled by vehicular com- munications. To achieve this goal European Telecommunication Standard Institute (ETSI) delivered the standard EN 302 637-2 for Cooperative Awareness Messages (CAM). The CAM trig- gering conditions are based on the dynamics of the originating vehicle, which is checked periodically. In this paper, we show that standardized ETSI protocol may demonstrate a decrease in communication performance under several realistic mobility patterns. The potential influence of the discovered phenomena on two typical mobility scenarios is studied.

Place, publisher, year, edition, pages
Piscataway, NJ: IEEE Press, 2018
Keywords
VANET, Cooperative Awareness, Platooning, ETSI, ITS-G5
National Category
Communication Systems Telecommunications
Identifiers
urn:nbn:se:hh:diva-35466 (URN)10.1109/TVT.2017.2754584 (DOI)2-s2.0-85035747459 (Scopus ID)
Projects
ELLIITACDC: Autonomous Cooperative Driving: Communications Issues
Funder
Knowledge Foundation
Note

Partially supported by the Excellence Center at Linköping-Lund in Information Technology (ELLIIT) strategic research environment, NFITS - National ITS Postgraduate School (Sweden) and the ”ACDC: Autonomous Cooperative Driving: Communications Issues” project (2014- 2016) funded by the Knowledge Foundation (Sweden) in cooperation with Volvo GTT, Volvo Cars, Scania, Kapsch TrafficCom and Qamcom Research & Technology.

Available from: 2017-11-24 Created: 2017-11-24 Last updated: 2019-01-16Bibliographically approved
Lyamin, N., Vinel, A., Smely, D. & Bellalta, B. (2018). ETSI DCC: Decentralized Congestion Control in C-ITS. IEEE Communications Magazine, 56(12), 112-118
Open this publication in new window or tab >>ETSI DCC: Decentralized Congestion Control in C-ITS
2018 (English)In: IEEE Communications Magazine, ISSN 0163-6804, E-ISSN 1558-1896, Vol. 56, no 12, p. 112-118Article in journal (Refereed) Published
Abstract [en]

ETSI DCC: Decentralized Congestion Control in C-ITS is a mandatory component of the 5.9 GHz ITS-G5 vehicular communication protocol stack that reduces radio channel overload, range degradation, and self interference. In this tutorial article we explain its principle, describe related ongoing standardization activities, evaluate its performance for emerging cooperative driving applications, and identify ways for improvement. We show that failure to use a proper DCC parameterization can impact negatively on the performance of cooperative vehicular applications.

Place, publisher, year, edition, pages
Piscataway: IEEE, 2018
Keywords
Standards, Probes, Switches, Protocols, Degradation, Roads
National Category
Telecommunications Communication Systems
Identifiers
urn:nbn:se:hh:diva-38342 (URN)10.1109/MCOM.2017.1700173 (DOI)2-s2.0-85056588784 (Scopus ID)
Funder
Knowledge FoundationELLIIT - The Linköping‐Lund Initiative on IT and Mobile Communications
Available from: 2018-11-15 Created: 2018-11-15 Last updated: 2019-01-16Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0003-4894-4134

Search in DiVA

Show all publications