Vehicle-To-Everything (V2X) Communication

A special issue of Information (ISSN 2078-2489). This special issue belongs to the section "Information and Communications Technology".

Deadline for manuscript submissions: closed (30 September 2020) | Viewed by 17799

Special Issue Editor


E-Mail Website
Guest Editor
Department of Informatics, Computer Communications and Networks Group, Engineering School, University of Minho, 4700-057 Braga, Portugal
Interests: vehicular networks; intelligent transport system; IoT for connected smart objects; network simulation and emulation; security, privacy, and trust management

Special Issue Information

Dear Colleagues,

The growing number of moving vehicles, motorcyclists, cyclists, and pedestrians, mainly in the urban environment, leads to an increased number of accidents, traffic jams, and to higher levels of energy consumption and pollution. Traffic accidents take thousands of lives each year and cause critical injuries to millions of persons; nevertheless, vehicles, as standalone machines, are getting safer, more efficient, more comfortable, and providing an overall better user experience, with increasing levels of automation.

Vehicles use on-board communication units in order to exchange data with each other and with any infrastructural support, by means of Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I), and Vehicle-to-Pedestrian (V2P) interactions, generically classified as “Vehicle-to-X (V2X) communication”.

V2X communication systems enable information sharing and usage of cooperative approaches in order to increase road safety, avoid accidents and traffic congestions, give priority to emergency vehicles, and also cope with vulnerable road users. New and challenging V2X research issues arise from recent technologic developments, allowing the growth of either assisted or autonomous driving modes.

This Special Issue on “Vehicle-To-Everything Communication” is aimed at recent research findings, coming both from industry and academic R&D, with important contributions to ITS application development, either at safety, efficiency, management, and comfort or infotainment areas. The key areas of this Special Issue include but are not limited to:

V2X for cooperative and autonomous driving; cellular V2X communications; V2X for extended sensing and autonomous awareness; V2X for emergency vehicles; V2X for smart mobility; V2X modeling and testing; safety, security, and privacy in V2X; connected vehicles and vulnerable road users; simulation platforms for V2X; new vehicular network architectures; named data networks for connected vehicles.

Prof. Dr. Alexandre Santos
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Information is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Vehicle-To-Everything
  • ITS applications
  • DSRC
  • C-V2X
  • mobility management
  • ad-hoc networks
  • cooperative and autonomous driving

Published Papers (6 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

20 pages, 2839 KiB  
Article
Evaluation of Push and Pull Communication Models on a VANET with Virtual Traffic Lights
by Oscar Gama, Alexandre Santos, Antonio Costa, Maria João Nicolau, Bruno Dias, Joaquim Macedo, Bruno Ribeiro, Fabio Goncalves and Joao Simoes
Information 2020, 11(11), 510; https://0-doi-org.brum.beds.ac.uk/10.3390/info11110510 - 30 Oct 2020
Cited by 9 | Viewed by 3078
Abstract
It is expected in a near future that safety applications based on vehicle-to-everything communications will be a common reality in the traffic roads. This technology will contribute to improve the safety of vulnerable road users, for example, with the use of virtual traffic [...] Read more.
It is expected in a near future that safety applications based on vehicle-to-everything communications will be a common reality in the traffic roads. This technology will contribute to improve the safety of vulnerable road users, for example, with the use of virtual traffic light systems (VTLS) in the intersections. This work implements and evaluates a VTLS conceived to help the pedestrians pass safely the intersections without real traffic lights. The simulated VTLS scenario used two distinct communication paradigms—the pull and push communication models. The pull model was implemented in named data networking (NDN), because NDN uses natively a pull-based communication model, where consumers send requests to pull the contents from the provider. A distinct approach is followed by the push-based model, where consumers subscribe previously the information, and then the producers distribute the available information to those consumers. Comparing the performance of the push and pull models on a VANET with VTLS, it is observed that the push mode presents lower packet loss and generates fewer packets, and consequently occupies less bandwidth, than the pull mode. In fact, for the considered metrics, the VTLS implemented with the pull mode presents no advantage when compared with the push mode. Full article
(This article belongs to the Special Issue Vehicle-To-Everything (V2X) Communication)
Show Figures

Figure 1

18 pages, 468 KiB  
Article
Energy-Efficient Check-and-Spray Geocast Routing Protocol for Opportunistic Networks
by Khuram Khalid, Isaac Woungang, Sanjay Kumar Dhurandher, Jagdeep Singh and Joel J. P. C. Rodrigues
Information 2020, 11(11), 504; https://0-doi-org.brum.beds.ac.uk/10.3390/info11110504 - 28 Oct 2020
Cited by 13 | Viewed by 2412
Abstract
Opportunistic networks (OppNets) are a type of challenged network where there is no guaranteed of end-to-path between the nodes for data delivery because of intermittent connectivity, node mobility and frequent topology changes. In such an environment, the routing of data is a challenge [...] Read more.
Opportunistic networks (OppNets) are a type of challenged network where there is no guaranteed of end-to-path between the nodes for data delivery because of intermittent connectivity, node mobility and frequent topology changes. In such an environment, the routing of data is a challenge since the battery power of the mobile nodes drains out quickly because of multi-routing activities such as scanning, transmitting, receiving, and computational processing, effecting the overall network performance. In this paper, a novel routing protocol for OppNets called Energy-Efficient Check-and-Spray Geocast Routing (EECSG) is proposed, which introduces an effective way of message distribution in the geocasting region to all residing nodes while saving the energy consumption by restricting the unnecessary packet transmission in that region. A Check-and-Spray technique is also introduced to eliminate the overhead of packets in the geocast region. The proposed EECSG is evaluated by simulations and compared against the Efficient and Flexible Geocasting for Opportunistic Networks (GSAF) and the Centrality- Based Geocasting for Opportunistic networks (CGOPP) routing protocols in terms of average latency, delivery ratio, number of messages forwarded, number of dead nodes, overhead ratio, and hop count, showing superior performance. Full article
(This article belongs to the Special Issue Vehicle-To-Everything (V2X) Communication)
Show Figures

Figure 1

13 pages, 3174 KiB  
Article
Prototype to Increase Crosswalk Safety by Integrating Computer Vision with ITS-G5 Technologies
by Francisco Gaspar, Vitor Guerreiro, Paulo Loureiro, Paulo Costa, Sílvio Mendes and Carlos Rabadão
Information 2020, 11(11), 503; https://0-doi-org.brum.beds.ac.uk/10.3390/info11110503 - 28 Oct 2020
Cited by 1 | Viewed by 2626
Abstract
Human errors are probably the main cause of car accidents, and this type of vehicle is one of the most dangerous forms of transport for people. The danger comes from the fact that on public roads there are simultaneously different types of actors [...] Read more.
Human errors are probably the main cause of car accidents, and this type of vehicle is one of the most dangerous forms of transport for people. The danger comes from the fact that on public roads there are simultaneously different types of actors (drivers, pedestrians or cyclists) and many objects that change their position over time, making difficult to predict their immediate movements. The intelligent transport system (ITS-G5) standard specifies the European communication technologies and protocols to assist public road users, providing them with relevant information. The scientific community is developing ITS-G5 applications for various purposes, among which is the increasing of pedestrian safety. This paper describes the developed work to implement an ITS-G5 prototype that aims at the increasing of pedestrian and driver safety in the vicinity of a pedestrian crosswalk by sending ITS-G5 decentralized environmental notification messages (DENM) to the vehicles. These messages are analyzed, and if they are relevant, they are presented to the driver through a car’s onboard infotainment system. This alert allows the driver to take safety precautions to prevent accidents. The implemented prototype was tested in a controlled environment pedestrian crosswalk. The results showed the capacity of the prototype for detecting pedestrians, suitable message sending, the reception and processing on a vehicle onboard unit (OBU) module and its presentation on the car onboard infotainment system. Full article
(This article belongs to the Special Issue Vehicle-To-Everything (V2X) Communication)
Show Figures

Figure 1

19 pages, 4298 KiB  
Article
Technological Aspects of Blockchain Application for Vehicle-to-Network
by Vasiliy Elagin, Anastasia Spirkina, Mikhail Buinevich and Andrei Vladyko
Information 2020, 11(10), 465; https://0-doi-org.brum.beds.ac.uk/10.3390/info11100465 - 30 Sep 2020
Cited by 32 | Viewed by 3922
Abstract
Over the past decade, wireless communication technologies have developed significantly for intelligent applications in road transport. This paper provides an overview of telecommunications-based intelligent transport systems with a focus on ensuring system safety and resilience. In vehicle-to-everything, these problems are extremely acute due [...] Read more.
Over the past decade, wireless communication technologies have developed significantly for intelligent applications in road transport. This paper provides an overview of telecommunications-based intelligent transport systems with a focus on ensuring system safety and resilience. In vehicle-to-everything, these problems are extremely acute due to the specifics of the operation of transport networks, which requires the use of special protection mechanisms. In this regard, it was decided to use blockchain as a system platform to support the needs of transport systems for secure information exchange. This paper describes the technological aspects of implementing blockchain technology in vehicle-to-network; the features of such technology are presented, as well as the features of their interaction. The authors considered various network characteristics and identified the parameters that have a primary impact on the operation of the vehicle-to-network (V2N) network when implementing the blockchain. In the paper, an experiment was carried out that showed the numerical characteristics for the allocation of resources on devices involved in organizing V2N communication and conclusions were drawn from the results of the study. Full article
(This article belongs to the Special Issue Vehicle-To-Everything (V2X) Communication)
Show Figures

Figure 1

19 pages, 2705 KiB  
Article
Intelligent Adversary Placements for Privacy Evaluation in VANET
by Ikjot Saini, Benjamin St. Amour and Arunita Jaekel
Information 2020, 11(9), 443; https://0-doi-org.brum.beds.ac.uk/10.3390/info11090443 - 14 Sep 2020
Cited by 8 | Viewed by 2323
Abstract
Safety applications in Vehicular Ad-hoc Networks (VANETs) often require vehicles to share information such as current position, speed, and vehicle status on a regular basis. This information can be collected to obtain private information about vehicles/drivers, such as home or office locations and [...] Read more.
Safety applications in Vehicular Ad-hoc Networks (VANETs) often require vehicles to share information such as current position, speed, and vehicle status on a regular basis. This information can be collected to obtain private information about vehicles/drivers, such as home or office locations and frequently visited places, creating serious privacy vulnerabilities. The use of pseudonyms, rather than actual vehicle IDs, can alleviate this problem and several different Pseudonym Management Techniques (PMTs) have been proposed in the literature. These PMTs are typically evaluated assuming a random placement of attacking stations. However, an adversary can utilize knowledge of traffic patterns and PMTs to place eavesdropping stations in a more targeted manner, leading to an increased tracking success rate. In this paper, we propose two new adversary placement strategies and study the impact of intelligent adversary placement on tracking success using different PMTs. The results indicate that targeted placement of attacking stations, based on traffic patterns, road type, and knowledge of PMT used, can significantly increase tracking success. Therefore, it is important to take this into consideration when developing PMTs that can protect vehicle privacy even in the presence of targeted placement techniques. Full article
(This article belongs to the Special Issue Vehicle-To-Everything (V2X) Communication)
Show Figures

Figure 1

18 pages, 9740 KiB  
Article
Evaluation of Content Dissemination Strategies in Urban Vehicular Networks
by Gonçalo Pessoa, Lucas Guardalben, Miguel Luís, Carlos Senna and Susana Sargento
Information 2020, 11(3), 163; https://0-doi-org.brum.beds.ac.uk/10.3390/info11030163 - 19 Mar 2020
Cited by 4 | Viewed by 2371
Abstract
The main drivers for the continuous development of Vehicular ad-hoc Networks (VANETs) are safety applications and services. However, in recent years, new interests have emerged regarding the introduction of new applications and services for non-urgent content (e.g., videos, ads, sensing and touristic information) [...] Read more.
The main drivers for the continuous development of Vehicular ad-hoc Networks (VANETs) are safety applications and services. However, in recent years, new interests have emerged regarding the introduction of new applications and services for non-urgent content (e.g., videos, ads, sensing and touristic information) dissemination. However, there is a lack of real studies considering content dissemination strategies to understand when and to whom the content should be disseminated using real vehicular traces gathered from real vehicular networks. This work presents a realistic study of strategies for dissemination of non-urgent content with the main goal of improving content delivery as well as minimizing network congestion and resource usage. First, we perform an exhaustive network characterization. Then, several content strategies are specified and evaluated in different scenarios (city center and parking lot). All the obtained results show that there are two content distribution strategies that clearly set themselves apart due to their superior performance: Local Rarest Bundle First and Local Rarest Generation First. Full article
(This article belongs to the Special Issue Vehicle-To-Everything (V2X) Communication)
Show Figures

Figure 1

Back to TopTop