My Account Log in

2 options

Wireless technologies in intelligent transportation systems / Ming-Tuo Zhou, Yan Zhang, and Laurence T. Yang, editors.

EBSCOhost Academic eBook Collection (North America) Available online

View online

Ebook Central Academic Complete Available online

View online
Format:
Book
Contributor:
Zhou, Ming-Tuo.
Zhang, Yan.
Yang, Laurence Tianruo.
Series:
Transportation Issues, Policies and R&D
Transportation issues, policies and R&D series
Language:
English
Subjects (All):
Intelligent transportation systems.
Wireless communication systems.
Physical Description:
1 online resource (419 pages)
Edition:
1st ed.
Place of Publication:
New York : Nova Science Publishers, c2010.
Language Note:
English
Summary:
Organized into three parts, this book provides readers a thorough technical guide covering various wireless technologies developed in the most recent years for intelligent transportation systems applications.
Contents:
Intro
WIRELESS TECHNOLOGIES IN INTELLIGENT TRANSPORTATION SYSTEMS
CONTENTS
PREFACE
PART 1.HARDWARE, IMPLEMENTATION AND PHYSICALLAYER TECHNOLOGIES
Chapter 1RADAR SENSOR TECHNOLOGY AND TESTREQUIREMENTS IN AUTOMOTIVE APPLICATIONS
Abstract
1. Introduction
2. Automotive Radar Technology
Applications Overview
ACC Radar System Requirements
ACC Radar Antenna Types
Radar Types and Modulation Schemes
FM-CW
FSK
Pulse
3. ACC Radar Test Requirements
Component Level
Sensor Functional Testing
Sensor Alignment on Vehicle
Optical Mechanical Alignement
Using Internal Angle Measurements
RF Alignement
Built-in Testing and Alignment
4. Conclusion
References
Chapter 2RADIO CHANNEL MODELINGFOR VEHICLE-TO-VEHICLE/ROADCOMMUNICATIONS
Abbreviations
1.1. Defining the V2V and V2R Channels
1.2. The V2V Channel
1.3. The V2R Channel
1.4. V2V/V2R Communication Frequency Bands, and the DSRC Standard
1.5. V2V/V2R Channels vs. Traditional Mobile Channels
1.6. Importance of Channel Modeling
2. Statistical Channel Characteristics
2.1. Basics
2.2. Small Scale vs. Large Scale Fading
2.3. The Multipath Channel Impulse Response
2.4. CIR and CTF Correlation Functions, and Doppler
2.5. Uncorrelated Scattering
2.6. Wide-Sense Stationarity
2.7. Wide-Sense Stationarity, Uncorrelated Scattering
2.8. Non-stationary Channels and Correlated Scattering
2.9. Remarks on V2V Channel Statistics
3. Existing Work on V2V/V2R Channels
3.1. Deterministic Models
3.2. Theoretical Statistical Models
3.3. Empirical Statistical Models
4. New Non-stationary V2V Channel Models
4.1. Modeling Multipath Component Persistence.
4.2. Modeling Propagation Region Transitions and Time-Varying DopplerSpectra
4.3. Representative NS V2V Models
Conclusion
Acknowledgments
Chapter 3SMART ANTENNAS IN INTELLIGENTTRANSPORTATION SYSTEMS
Background
Material and Methods
Results
2. Smart Antennas and Their Benefits for IntelligentTransportation Systems
2.a. Types of Smart Antennas
2.b. Benefits of Smart Antennas for ITS
2.b.1. Spatial Filtering for Interference Reduction
2.b.2. Space Division Multiple Access (SDMA)
2.b.3. Location Positioning of Mobile Units
3. Array Data Model and Problem Formulation
4. Beamforming Algorithms
4.a. Conventional Beamformer
4.b. Null-steering Beamformer
4.c. Optimal Beamformer
4.d. Minimum Mean Square Error (MMSE) Beamformer
4.e. Adaptive Beamforming Algorithms
4.e.1. Sample Matrix Inversion (SMI) Algorithm
4.e.2. Least Mean Square (LMS) Algorithm
5. Direction of Arrival Estimation
5.a. MVDR Estimator
5.b. MUltiple SIgnal Classification (MUSIC) Estimator
5.c. Estimation of Signal Parameters via Rotational Invariance Technique(ESPRIT)
5.d. Maximum Likelihood (ML) Estimator
5.d.1. Conditional Maximum Likelihood (CML) Estimator
5.d.2. Unconditional Maximum Likelihood (UML) Estimator
5.e. Performance Evaluation and Comparison
6. Conclusion
PART 2.PROTOCOLS
Chapter 4COGNITIVE ROUTING PROTOCOLFOR SENSOR-BASED INTELLIGENTTRANSPORTATION SYSTEM
2. Distributed and De-Centralized Based ITS Approach
2.a. Sensor Nodes
2.b. Network Architecture
2.c. Data Communication and Processing
2.d. Nondeterministic Polynomial Problem
2.e. Optimization
3. Classical ITS Routing Approach
3.a. Topology Based Protocols.
3.b. Location Based Protocols
3.c. Performance Based Protocols
4. Background: Ant Colony Optimization
4.a. Evolution of ANT System
4.b. Characeristics of Ant Colony Optimization
Pheromone Deposition
State Transition Probability
Tabu List
5. Proposed Approach: Cognitive Routing Protocol
5.a. Wireless Channel Constraint
5.b. Quality of Service Constraint
5.c. Energy Efficiency
5.d. Cross-Layer Approach
Salient Features
POSets
Mathematical Approach
5.f. Experimental Simulations and Results
Chapter 5TDMA MAC PROTOCOLS FOR DSRC-BASEDINTELLIGENT TRANSPORTATION SYSTEMS
1.A. Background and Motivation
1.b. Related Work
2. Vesomac Protocol Details
2.a. Frame and Slot Structures
2.B. Synchronous and Asynchronous Operation
2.c. Protocol Logic
2.c.1. Slot Allocation
2.c.2. In-band Header Bitmap
2.c.3. Transmission Slot Feasibility
2.c.4. Protocol Overview
2.c.5. Collision Detection and Resolution
2.c.6. Protocol Logic Pseudo Code
3. Performance Evaluation
3.a. Experimental Parameters
3.b. VeSOMAC Protocol Convergence
3.c. Inter-vehicle Data Transfer Applications Performance
3.c.1. UDP based Applications
3.c.2. TCP based Applications
3.c.3. Application Level Impacts of VeSOMAC Slot Reorganization
Chapter 6SECURITY OF VEHICULAR AD HOC NETWORKS
1.1. MANETs vs. VANETs
1.2. Organization of This Chapter
2. Security Requirements and Threat Model
2.1. Security Requirements of VANETs
2.2. Threat Model
3. Vanet Security Provisioning Framework
3.1. Framework Overview
3.1.1. Security Model
3.1.2. Application Model
3.1.3. Network Model
3.1.4. Threat Model
3.1.5. Trust Model
3.2. Highlighted Topics.
3.2.1. Information Security
3.2.2. Data Security
3.2.3. Network Performance
3.2.4. Trust Model and Management
4. Information Security
4.1. General Communication and Group Communication
4.2. Message Security
4.2.1. Scope of Message Authenticity
4.2.2. Existing Schemes
4.2.3. Open Issues
4.3. Node Accountability and Node Privacy
4.3.1. Scopes of the Concepts
4.3.2. Node Localization and Location Privacy
Node Localization
Location Privacy
Reconciling Node Localization and Location Privacy
4.3.3. Node Authenticity, Node Non-repudiation and Identity Privacy
Node Authentication
Node Privacy and Node Non-repudiation
4.3.4. Putting Pseudonyms into Practice
4.3.5. Open Issues
5. Data Security and Network Performance
5.1. Data Security
5.2. Cooperation-Promotion Approach
5.2.1. Existing Schemes
5.2.2. Open Issues
5.3. Detection-and-Reaction Approach
5.3.1. Existing Schemes
5.3.2. Open Issues
5.4. Security Provisioning vs. Network Performance
6. Trust
6.1. Trust: Concept and Scope
6.2. Trust Modeling and Metrics
6.3. Authorization in Trust Model
6.4. Trust in VANETs
7. Open Issues and Future Work
7.1. Privacy vs. Accountability
7.2. Data Security
7.2.1. Cooperation Enhancement
7.2.2. Detection and Reaction
7.2.3. Comprehensive Cooperation Schemes
7.3. Trust Management
7.4. Threat Model
8. Conclusion
Chapter 7HANDOFF MECHANISMS IN IEEE 802.16 NETWORKSSUPPORTING INTELLIGENT TRANSPORTATIONSYSTEMS
2. Background: IEEE 802.16 and Its Basic Handoff Scheme
2.1. IEEE 802.16 (the WiMAX Standard)
2.2. IEEE 802.16e (the WiMAX Mobility)
2.3. The Basic IEEE 802.16e Handoff Scheme
3. Handoff in ITS: Issues, Examples, and Classification
3.1. ITS Handoff Issues.
3.2. ITS VANET Handoff Examples
3.2.1. Handoff Decisions Based on Pattern Recognition
3.2.2. Handoff Decisions Based on Mobility Estimation
3.2.3. Handoff Scheme Based on IEEE 802.11p MAC Protocol
3.3. Classification of Handoff Schemes
4. IEEE 802.16 Layer-2 Handoff Schemes
4.1. Fast Handover Scheme for Real-Time Downlink Services in IEEE802.16e BWA System [11]
4.1.1. Scheme Description
4.1.2. Feasibility of Supporting IVN
4.2. Fast Handover Algorithm for IEEE 802.16e Broadband Wireless AccessSystem [14]
4.2.1. Scheme Description
4.2.2. Feasibility of Supporting IVN
4.3. Adaptive Channel Scanning for IEEE 802.16e [8]
4.3.1. Scheme Description
4.3.2. Feasibility of Supporting IVN
4.4. Hard Handoff Scheme Exploiting Uplink and Downlink Signals in IEEE802.16e Systems[15]
4.4.1. Scheme Description
4.4.2. Feasibility of Supporting IVN
4.5. Summary of 802.16 Layer-2 Handoff Mechanisms
5. IEEE 802.16 Layer-3 Handoff Schemes
5.1. Mobile Ipv6 Fast Handovers Over IEEE 802.16e Networks [16]
5.1.1. Scheme Description
5.1.2. Feasibility of Supporting IVN
5.2. A Seamless Handover Mechanism for IEEE 802.16e Broadband WirelessAccess [12]
5.2.1. Scheme Description
5.2.2. Feasibility of supporting IVN
5.3. System Aspects and Handover Management for IEEE 802.16e [18]
5.3.1. Scheme Description
5.3.2. Feasibility of Supporting IVN
5.4 Pre-coordination Mechanism for Fast Handover in Wimax Networks [19]
5.4.1. Scheme Description
5.4.2. Feasibility of Supporting IVN
5.5. Fast Handover Scheme for Supporting Network Mobility in IEEE802.16e BWA System [21]
5.5.1. Scheme Description
5.5.2. Feasibility to Support IVN
5.6. Summary of 802.16 Layer-3 Handoff Mechanisms
Chapter8BROADCASTTECHNIQUESFORVEHICULARADHOCNETWORKS
Abstract.
1.Introduction.
Notes:
Includes bibliographical references and index.
Description based on print version record.
ISBN:
1-61122-571-X
OCLC:
670429843

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account