Amazon cover image
Image from Amazon.com

Communication technologies for vehicles : 15th International Workshop, Nets4Cars/Nets4Trains/Nets4Aircraft 2020, Bordeaux, France, November 16-17, 2020, Proceedings / Francine Krief, Hasnaâ Aniss, Léo Mendiboure, Serge Chaumette, Marion Berbineau (eds.).

By: Contributor(s): Material type: TextTextSeries: Lecture notes in computer science ; 12574. | LNCS sublibrary. SL 5, Computer communication networks and telecommunications.Publication details: Cham : Springer, 2020.Description: 1 online resource (223 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783030660307
  • 3030660303
Other title:
  • Nets4Cars/Nets4Trains/Nets4Aircraft 2020
Subject(s): Genre/Form: Additional physical formats: Print version:: Communication Technologies for Vehicles.DDC classification:
  • 004.6 23
LOC classification:
  • TK5103.2 .N445 2020eb
Online resources:
Contents:
Intro -- Preface -- Organization -- Contents -- Road -- Simulation of Cyberattacks in ITS-G5 Systems -- 1 Introduction -- 2 Related Work -- 2.1 Cyber-Attack Taxonomy -- 2.2 C-ITS Simulation Tools and Platforms -- 3 Simulation Study -- 3.1 Simulation Set-Up -- 3.2 Jamming Attack Case -- 3.3 Replay Attack Case -- 3.4 Falsification Attack Case -- 3.5 Congestion Attack Case -- 4 Difficulties and Limitations -- 5 Conclusion -- References -- Towards an Extensible Security Monitoring Architecture for Vehicular Networks -- 1 Introduction -- 2 Extensible Security Monitoring -- 3 Related Work
4 A Sample Use Case -- 5 Extensible Security Monitoring Architecture -- 5.1 Architecture Overview -- 5.2 Integrating Probes in the Architecture -- 5.3 A CAM/DENM Monitoring Probe -- 6 Implementation and Evaluation -- 7 Conclusion and Outlook -- References -- Anomaly Detection on Roads Using C-ITS Messages -- 1 Introduction -- 2 Related Works -- 2.1 Trajectory-User Linking (TUL) -- 2.2 Trajectory Mining -- 2.3 Anomaly Detection -- 3 Problem Statement and Methodology -- 3.1 Problem Statement -- 3.2 Methodology -- 3.3 Dataset Description -- 4 Performance Evaluation -- 4.1 Obstacle Detection
5 Conclusion -- References -- Leveraging GPS Data for Vehicle Maneuver Detection -- 1 Introduction -- 2 Related Works -- 3 GPS Based Method for Vehicle Maneuver Detection -- 3.1 Creation of the Model Trajectory -- 3.2 Division of the Vehicle Trajectory Data into Segments -- 3.3 Hausdorff Distance Calculation -- 4 Experimental Study -- 4.1 Dataset -- 4.2 Trajectory Model Computation -- 4.3 Choice of the Parameters' Values -- 5 Maneuvers Detection Evaluation -- 5.1 Evaluation Metrics -- 5.2 Results and Discussion -- 6 Conclusion -- References
Analysis and Comparison of IEEE 802.11p and IEEE 802.11bd -- 1 Introduction -- 2 Overview of C-ITS Technologies -- 2.1 Overview of the IEEE 802.11p Standard -- 2.2 Overview of the IEEE 802.11bd Standard -- 3 Implementation and Model Validation -- 3.1 IEEE 802.11bd Implementation -- 3.2 Model Validation -- 3.3 Packet Reception Ratio Comparison -- 4 Conclusions -- References -- An Investigation of the Bits Corruption in the IEEE 802.11p -- 1 Introduction -- 2 Overview of the 802.11p Performance -- 3 Experimental Test-Bed -- 3.1 Materials -- 3.2 Material Modifications -- 3.3 Experiment Settings
4 Data Analysis -- 4.1 Data Set Selection -- 4.2 Impact of Data Length and the Data Rate -- 4.3 The Bits Corruption -- 5 Theoretical Framework for Data Rate Selection Problems -- 5.1 Combinatorial Optimisation Without Restriction -- 5.2 Combinatorial Optimisation with Transmission Restrictions -- 6 Conclusion -- References -- Measurements of Communication Channel in Different Scenarios with the Channel Characterization Tool System -- 1 Introduction -- 2 Measurement Equipment: CCT -- 3 Main Environments and Phenomena in Road Communications -- 3.1 Road Environment: General Scenarios
Summary: This book constitutes the refereed proceedings of the 15th International Workshop on Communication Technologies for Vehicles, Nets4Cars/Nets4Trains/Nets4Aircraft 2020, held in Bordeaux, France, in November 2020. The 18 full papers were carefully reviewed and selected from 22 submissions. The selected papers present orig-inal research results in areas related to the physical layer, communication protocols and standards, mobility and traffic models, experimental and field operational testing, and performance analysis.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library eBook LNCS Available
Total holds: 0

International conference proceedings.

Intro -- Preface -- Organization -- Contents -- Road -- Simulation of Cyberattacks in ITS-G5 Systems -- 1 Introduction -- 2 Related Work -- 2.1 Cyber-Attack Taxonomy -- 2.2 C-ITS Simulation Tools and Platforms -- 3 Simulation Study -- 3.1 Simulation Set-Up -- 3.2 Jamming Attack Case -- 3.3 Replay Attack Case -- 3.4 Falsification Attack Case -- 3.5 Congestion Attack Case -- 4 Difficulties and Limitations -- 5 Conclusion -- References -- Towards an Extensible Security Monitoring Architecture for Vehicular Networks -- 1 Introduction -- 2 Extensible Security Monitoring -- 3 Related Work

4 A Sample Use Case -- 5 Extensible Security Monitoring Architecture -- 5.1 Architecture Overview -- 5.2 Integrating Probes in the Architecture -- 5.3 A CAM/DENM Monitoring Probe -- 6 Implementation and Evaluation -- 7 Conclusion and Outlook -- References -- Anomaly Detection on Roads Using C-ITS Messages -- 1 Introduction -- 2 Related Works -- 2.1 Trajectory-User Linking (TUL) -- 2.2 Trajectory Mining -- 2.3 Anomaly Detection -- 3 Problem Statement and Methodology -- 3.1 Problem Statement -- 3.2 Methodology -- 3.3 Dataset Description -- 4 Performance Evaluation -- 4.1 Obstacle Detection

5 Conclusion -- References -- Leveraging GPS Data for Vehicle Maneuver Detection -- 1 Introduction -- 2 Related Works -- 3 GPS Based Method for Vehicle Maneuver Detection -- 3.1 Creation of the Model Trajectory -- 3.2 Division of the Vehicle Trajectory Data into Segments -- 3.3 Hausdorff Distance Calculation -- 4 Experimental Study -- 4.1 Dataset -- 4.2 Trajectory Model Computation -- 4.3 Choice of the Parameters' Values -- 5 Maneuvers Detection Evaluation -- 5.1 Evaluation Metrics -- 5.2 Results and Discussion -- 6 Conclusion -- References

Analysis and Comparison of IEEE 802.11p and IEEE 802.11bd -- 1 Introduction -- 2 Overview of C-ITS Technologies -- 2.1 Overview of the IEEE 802.11p Standard -- 2.2 Overview of the IEEE 802.11bd Standard -- 3 Implementation and Model Validation -- 3.1 IEEE 802.11bd Implementation -- 3.2 Model Validation -- 3.3 Packet Reception Ratio Comparison -- 4 Conclusions -- References -- An Investigation of the Bits Corruption in the IEEE 802.11p -- 1 Introduction -- 2 Overview of the 802.11p Performance -- 3 Experimental Test-Bed -- 3.1 Materials -- 3.2 Material Modifications -- 3.3 Experiment Settings

4 Data Analysis -- 4.1 Data Set Selection -- 4.2 Impact of Data Length and the Data Rate -- 4.3 The Bits Corruption -- 5 Theoretical Framework for Data Rate Selection Problems -- 5.1 Combinatorial Optimisation Without Restriction -- 5.2 Combinatorial Optimisation with Transmission Restrictions -- 6 Conclusion -- References -- Measurements of Communication Channel in Different Scenarios with the Channel Characterization Tool System -- 1 Introduction -- 2 Measurement Equipment: CCT -- 3 Main Environments and Phenomena in Road Communications -- 3.1 Road Environment: General Scenarios

3.2 Weather Conditions.

Includes author index.

This book constitutes the refereed proceedings of the 15th International Workshop on Communication Technologies for Vehicles, Nets4Cars/Nets4Trains/Nets4Aircraft 2020, held in Bordeaux, France, in November 2020. The 18 full papers were carefully reviewed and selected from 22 submissions. The selected papers present orig-inal research results in areas related to the physical layer, communication protocols and standards, mobility and traffic models, experimental and field operational testing, and performance analysis.

Online resource; title from PDF title page (SpringerLink, viewed February 17, 2021).

Powered by Koha