{"title":"Policy-based network management for generalized vehicle-to-internet connectivity","authors":"Joshua Hare, Lance Hartung, Suman Banerjee","doi":"10.1145/2307888.2307917","DOIUrl":"https://doi.org/10.1145/2307888.2307917","url":null,"abstract":"Over the past year and a half we have operated a vehicle-to-Internet solution that provides WiFi connectivity to passenger buses. While operating this service we have found it difficult to centrally manage network resources despite multiple low level tools being available. For this reason we propose the WiRover Policy Framework which provides a unified, centralized solution to manage and control network resources. Further, we propose a simple syntax with which users and administrators can express their network control preferences. We believe that centralized control of network resources will simplify the management of vehicle-to-Internet connectivity and will enable new forms of connectivity models to develop.","PeriodicalId":360427,"journal":{"name":"Proceedings of the ninth ACM international workshop on Vehicular inter-networking, systems, and applications","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134414701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient charging station scheduling for an autonomous parking and charging system","authors":"J. Timpner, L. Wolf","doi":"10.1145/2307888.2307918","DOIUrl":"https://doi.org/10.1145/2307888.2307918","url":null,"abstract":"With the proliferation of electric vehicles, charging stations are a scarce resource that needs to be managed efficiently. In this paper, we therefore examine requirements for efficient charging station scheduling and propose several algorithms that we have implemented for the V-Charge system, which introduces new concepts for combining public and individual transportation, as well as coordinated recharging strategies for electric vehicles. We evaluate these strategies in different usage scenarios using real-world parking statistics.","PeriodicalId":360427,"journal":{"name":"Proceedings of the ninth ACM international workshop on Vehicular inter-networking, systems, and applications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131322417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Global revocation for the intersection collision warning safety application","authors":"J. Haas","doi":"10.1145/2307888.2307913","DOIUrl":"https://doi.org/10.1145/2307888.2307913","url":null,"abstract":"Identifying and removing malicious insiders from a network is a topic of active research. Vehicular ad hoc networks (VANETs) may suffer from insider attacks; that is, an attacker may use authorized vehicles to attack other vehicles. Specifically, attackers may use their vehicles to broadcast specially formed packets that will trigger warnings in target vehicles. This malicious behavior could have a significant detrimental effect on cooperative safety applications (SAs), one of the driving forces behind VANET deployment. We propose modifications to the intersection collision warning (ICW) SA that enable a certificate authority (CA) to be offline and yet to decide to revoke a vehicle's certificates using retransmitted information that cannot repudiated. Our approach differs from previous proposals in that it is SA specific, and it is immune to Sybil attacks. We simulate and measure the resources an attacker requires to attack a vehicle using the ICW SA without our modifications and demonstrate that our additions reduce the false positive rate arising from errors in estimated vehicle dynamics.","PeriodicalId":360427,"journal":{"name":"Proceedings of the ninth ACM international workshop on Vehicular inter-networking, systems, and applications","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116299966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Central misbehavior evaluation for VANETs based on mobility data plausibility","authors":"N. Bißmeyer, Joël Njeukam, J. Petit, K. Bayarou","doi":"10.1145/2307888.2307902","DOIUrl":"https://doi.org/10.1145/2307888.2307902","url":null,"abstract":"Trustworthy communication in vehicular ad-hoc networks is essential to provide functional and reliable traffic safety and efficiency applications. A Sybil attacker that is simulating \"ghost vehicles\" on the road, by sending messages with faked position statements, must be detected and excluded permanently from the network. Based on misbehavior detection systems, running on vehicles and roadside units, a central evaluation scheme is proposed that aims to identify and exclude attackers from the network. The proposed algorithms of the central scheme are using trust and reputation information provided in misbehavior reports in order to guarantee long-term functionality of the network. A main aspect, the scalability, is given as misbehavior reports are created only if an incident is detected in the VANET. Therefore, the load of the proposed central system is not related to the total number of network nodes. A simulation study is conducted to show the effective and reliable detection of attacker nodes, assuming a majority of benign misbehavior reporters. Extensive simulations show that a few benign nodes (at least three witnesses) are enough to significantly decrease the fake node reputation and thus identify the cause of misbehavior. In case of colluding attackers, simulations show that if 37% of neighbor nodes cooperate, then an attack could be obfuscated.","PeriodicalId":360427,"journal":{"name":"Proceedings of the ninth ACM international workshop on Vehicular inter-networking, systems, and applications","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133989784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Content-centric networking: is that a solution for upcoming vehicular networks?","authors":"M. Amadeo, C. Campolo, A. Molinaro","doi":"10.1145/2307888.2307906","DOIUrl":"https://doi.org/10.1145/2307888.2307906","url":null,"abstract":"In this paper we propose an innovative networking architecture for content retrieval and distribution in Vehicular Ad hoc NETworks (VANETs), that leverages the recently proposed Content-Centric Networking (CCN) paradigm. It is based on named contents instead of IP addresses, and seems an attractive opportunity to handle the dynamic, short-lived and intermittent connectivity typical of VANETs. Achieved results show that the proposed architecture significantly outperforms the legacy TCP/IP protocol suite, thus confirming the potentialities of content-centric as a promising networking solution for upcoming VANETs.","PeriodicalId":360427,"journal":{"name":"Proceedings of the ninth ACM international workshop on Vehicular inter-networking, systems, and applications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127169643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Security and physical-layer issues","authors":"Jérôme Härri","doi":"10.1145/3253526","DOIUrl":"https://doi.org/10.1145/3253526","url":null,"abstract":"","PeriodicalId":360427,"journal":{"name":"Proceedings of the ninth ACM international workshop on Vehicular inter-networking, systems, and applications","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127209975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experiences using a miniature vehicular network testbed","authors":"A. Petz, Chien-Liang Fok, C. Julien","doi":"10.1145/2307888.2307894","DOIUrl":"https://doi.org/10.1145/2307888.2307894","url":null,"abstract":"Despite increasingly realistic vehicular network simulations, the effects of real-world mobility on network and application performance in vehicular networks are still not well understood. We present Pharos, a small-scale vehicular network testbed with \"push-button\" experiment repeatability and develop a framework for analyzing network performance of vehicular networks simultaneously in simulation and in the real world. We empirically study the differences between real-world and simulated connectivity. Early experiment results using our vehicular testbed show significant differences between simulated and actual movements resulting in differences in wireless connectivity. Because of this, we implement a trace mobility model that allows the OMNeT++ simulator replay actual GPS-based movement traces collected by the testbed and scale to larger networks.","PeriodicalId":360427,"journal":{"name":"Proceedings of the ninth ACM international workshop on Vehicular inter-networking, systems, and applications","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125797308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Congestion-based certificate omission in VANETs","authors":"M. Feiri, J. Petit, F. Kargl","doi":"10.1145/2307888.2307915","DOIUrl":"https://doi.org/10.1145/2307888.2307915","url":null,"abstract":"Telematic awareness of nearby vehicles is a basic foundation of electronic safety applications in Vehicular Ad hoc Networks (VANETs). This awareness is achieved by frequently broadcasting beacon messages to nearby vehicles that announce a vehicle's location and other data like heading and speed. Such safety-related beacons require strong integrity protection and high availability, two properties that are hard to combine because the communication and computation overhead introduced by security mechanisms affects reliability. This applies especially to the signatures and certificates needed for authentication. We propose a mechanism to reduce the communication overhead of secure safety beacons by adaptively omitting the inclusion of certificates in messages. In contrast to similar earlier proposals, we control the omission rate based on channel congestion. A simulation study underlines the advantages of the congestion-based certificate omission scheme compared to earlier approaches. Moreover, we show that the benefits of certificate omission outweigh the negative effect of cryptographically unverifiable beacons.","PeriodicalId":360427,"journal":{"name":"Proceedings of the ninth ACM international workshop on Vehicular inter-networking, systems, and applications","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116114139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chao Song, Ming Liu, Yonggang Wen, Guihai Chen, Jiannong Cao
{"title":"Towards the traffic hole problem in VANETs","authors":"Chao Song, Ming Liu, Yonggang Wen, Guihai Chen, Jiannong Cao","doi":"10.1145/2307888.2307916","DOIUrl":"https://doi.org/10.1145/2307888.2307916","url":null,"abstract":"The data delivery in Vehicular Ad-hoc Networks which is based on the infrastructure-less vehicle-to-vehicle (V2V) communications, is sensitive to the traffic flows along the roads. However, the traffic flow may be interrupted by the traffic control system, and a gap appears to block the data delivery along the traffic flow. We term it as a traffic hole problem, which will drastically affect the data delivery along each road. For mitigating the problem, we investigate the signal operations at the intersections to adjust the traffic flows moving into the roads.","PeriodicalId":360427,"journal":{"name":"Proceedings of the ninth ACM international workshop on Vehicular inter-networking, systems, and applications","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127160040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Keynote address","authors":"M. Gruteser","doi":"10.1145/3253523","DOIUrl":"https://doi.org/10.1145/3253523","url":null,"abstract":"","PeriodicalId":360427,"journal":{"name":"Proceedings of the ninth ACM international workshop on Vehicular inter-networking, systems, and applications","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124250592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}