Assignments V 2 V
Assignments V 2 V
Assignments V 2 V
Benefits:
V2V technology can also help improve traffic flow management, decrease
congestion, and optimize utilisation of existing infrastructure, thereby minimising
any unnecessary expansion of infrastructure capacity (e.g. more roads and/or
more transit).
V2V provides data on traffic flows, which is processed and used to share traffic
information on variable message signs and variable speed limit signs, and to enable
vehicle platooning if all vehicles are connected.
It is also used for route planning.
Internal
VALUE CREATED
Improving efficiency and reducing costs:
Reduce infrastructure costs and disruption time and costs as vehicle traffic is optimized
with better coordination. Existing infrastructure is fully utilized and less new road
infrastructure expenditure is required.
Reduce costs associated with road traffic accidents, which will result in reduced
expenditure on medical services, police, infrastructure repair etc.
Enhancing economic, social and environmental value:
Reduce congestion and improve connectivity between destinations, as traffic flows are
optimized.
Enable longer-term infrastructure investments through the data collected and the more
efficient demand management removing the need for additional ‘immediate’ capacity
improvement.
Facilitate the use of private vehicles for new-shared models: the usage and availability
of connected vehicles can be managed in an area, thus it is easier for a private vehicle
owner to integrate their vehicle into a shared transport fleet (such as ride sharing).
Internal
There are two primary categories of V2V system functions - system safety and system
security.
The V2V system’s safety functionality (i.e., the safety applications that produce crash
warnings) requires that V2V devices in motor vehicles send and receive a basic safety
message containing information about vehicle position, heading, speed, and other
information relating to vehicle state and predicted path. The BSM, however, contains no
personally identifying information (PII) and is broadcast in a very limited geographical
range, typically less than 1 km. Nearby motor vehicles will use that information to warn
drivers of crash-imminent situations. Except in the case of malfunction, the system will not
collect and motor vehicles will not store the messages sent or received data sent/received
by V2V devices.
The security needs of the V2V system require the exchange of certificates and other
communications between V2V devices and the entity or entities providing security for the
V2V system (i.e., the Security Certificate Management System). These two-way
communications are encrypted and subject to additional security measures designed to
prevent SCMS insiders and others from unauthorized access to information that might enable
linkage of BSM data or security credentials to specific motor vehicles.
Internal
FCW: Warns the driver of an impending rear-end collision with another vehicle ahead in
traffic in the same lane and direction of travel.
EEBL: Warns the driver of another vehicle that is braking hard farther up ahead in the
flow of traffic.
DNPW: Warns the driver of one vehicle during a passing maneuver attempt when a
slower-moving vehicle, ahead and in the same lane, cannot be safely passed using a
passing zone that is occupied by vehicles in the opposite direction of travel. It also
provide an advisory warning that the passing zone is occupied when a passing maneuver
is not being attempted.
LTA: Warns the driver of a vehicle, which is beginning to turn left in front of a vehicle
traveling in the opposite direction, that making a left turn, at this time, would result in a
crash.
IMA: Warns the driver when it is not safe to enter an intersection due to high collision
probability with other vehicles at controlled and uncontrolled intersections.
BSW + LCW: Warns the driver during a lane change if another vehicle traveling in the
same direction occupies the blind spot zone into which the driver intends to switch. The
application also provides the driver with advisory information that another vehicle in an
adjacent lane is positioned in the original vehicle’s “blind spot” zone when a lane change
is not being attempted
Internal
System Limitations –
V2V safety systems use messages broadcast by vehicles to enable Cooperative crash
warning applications. This section discusses system limitations of V2V safety systems by
comparing their characteristics to those of traditional crash warning systems - use
vehiclebased radar, lidar, mono camera, stereo camera or combinations of these sensors
The V2V safety system communications is not impacted by weather (rain, fog, snow, sunlight
or shadows).
Radar and lidar perform reliably under all lighting conditions, while camera systems have some
issues with shadows and lighting transitions, which are typical conditions for tunnels and
under foliage during daylight. Additionally, V2V safety system communications are impaired by
limited sky visibility, as in highly dense urban areas. In contrast, various conventional crash
avoidance sensors perform reliably in urban canyons. In summary, both V2V safety systems
and conventional crash warning systems have system availability limitations.
(1) Other Limitations for Conventional Sensor-based Systems
• Vulnerability to misalignment from impact (lidar and radar)
• Insufficient to react to stopped objects with a single sensor (lidar and radar)
• Limited number of vehicles can be processed (tracked) for threat determination
• Incapable of close range, low speed range-rate estimates (radar, camera)
(2) Other Limitations for V2V Safety Systems
• Requires a significant number of vehicles to be equipped for system effectiveness
• Accuracy is currently only sufficient for collision warning applications.
Additional testing and field experience needed to establish level of trust of V2V messages
sufficient to activate vehicle control applications.
Public Acceptance
Internal
In general, two sets of components are needed for V2V communications to operate.
A device to transmit an accurate and trusted basic safety message and the second are
the components needed for a device to receive and interpret a BSM transmitted from
another entity.
To generate and send a BSM, a device needs to know its own position (such as via a GPS
antenna and receiver). Once its position is known, the device needs a computer processing
unit that can take its location and combine this with other onboard sensors (e.g., speed,
heading, acceleration) to generate the required BSM data string. Once the BSM is generated, a
device is needed to transmit this message wirelessly to another vehicle. As the onboard
processor is generating the BSM, a security module is processing and preparing the security
information and certificates for transmission to provide the receiving vehicle assurance that
the message is valid. This security information needs to be transmitted wirelessly as well. To
receive and interpret a BSM, a device must be capable of receiving the BSM that is transmitted
from a nearby device and it must match the method of BSM transmission (i.e., if the message
is transmitted via DSRC, the receiving device must have a DSRC receiver). It also must have a
computer-processing unit that can decode the BSM properly. A GPS antenna and receiver are
needed to verify the relative distance between the sending device and the receiving device.
Lastly, the device that is receiving the BSM must also have a security module that is capable of
receiving and processing the security credential information as well. Lastly, to operate the
safety applications adequately to warn drivers, a driver-vehicle interface is needed to display
critical advisories and imminent alerts.
A V2V communication system requires components located in vehicles and along roadways to
enable complete system operation. For a V2V system, this includes both the vehicle based
components and roadside equipment (RSE) units to provide security updates and
communication to the security management system. A V2I system would expand capabilities
by embedding additional RSEs, potentially, in traffic signals, signs, and other infrastructure-
related components. The following sections provide details on vehicle and non-vehicle based
components.
Vehicle-based hardware:
At a minimum, V2V devices would require two DSRC radios and a GPS receiver with a
processor to derive information such as vehicle speed and predicted path from the device’s
GPS data. To improve the quality of the data that vehicle-based components could use to issue
warnings, an inertial measurement unit to detect acceleration forces would be needed. In
addition, a driver-vehicle interface would be essential for issuing warnings to the driver. Such
warnings could be audial or visual or for devices fully integrated into the vehicle at the time of
manufacture, the warnings could potentially be haptic warnings (e.g., tightening of the seat
belt, vibrating the driver’s seat). Figure V-1 illustrates the vehicle-based components needed
for an integrated V2V system that uses integrated vehicle devices.
Internal
Non-vehicle-based hardware
In addition to the vehicle-based V2V components, a V2V system also requires equipment to
be located along roadsides and, if expanded V2I capabilities are sought, to be embedded in
other infrastructure support equipment such as traffic signals or stop signs. Roadside
equipment is the term used to refer to the physical wireless communications infrastructure
that supports communication between the vehicle and the SCMS, and between the vehicle
and V2I applications. There are two types of RSEs with which a vehicle can communicate: RSEs
that serve as a wireless communications link between the vehicle and the SCMS so that the
vehicle can receive new security certificates, report misbehavior, and receive CRL updates, and
RSEs that broadcast messages needed to support V2I applications. The equipment necessary
to support both functions can be located within one RSE device. RSEs could employ DSRC, or
could potentially use some other communications medium such as existing 3G/4G cellular
networks or Wi-Fi.
Internal
Interoperability
Interoperability and its importance
In order for the information in a V2V communication to be useful, it must be received timely,
it must be reliable, and it must be transmitted in a standard format. Vehicles participating in
the V2V communications network communicate with other connected vehicles using
standardized DSRC message types broadcast on a standardized network, IEEE 1609.4, over a
standardized wireless layer, IEEE 802.11p.126 DSRC provides local-area, low-latency127
network connectivity, and is generally intended to support broadcast messaging between
vehicles and between vehicles and roadside access points. It is a variant of Wi-Fi that allows
nearly instantaneous network connections, as well as broadcast messaging that requires no
network connection. It uses 75 MHz of spectrum located in the 5.85 to 5.925 GHz frequency
band.128 Vehicles currently use channel 172 to transmit messages that support safety of life
applications. Interoperability, in short, is the ability for different devices using V2V systems
sourced, manufactured, and installed by various OEMs and aftermarket retailers to
communicate with each other in a reliable and timely manner. If devices from different
sources fail to “speak the same language,” then the system as a whole will not be
“interoperable,” and will consequently degrade and break down.
Internal