Professional Documents
Culture Documents
Abstract
We define an ad hoc transportation system as one that has no infrastructure
such as roads (and lanes), traffic lights etc. We assume that in such a system
the vehicle are autonomic and can guide and direct themselves without a
human driver. In this paper we investigate how a safe distance can be
maintained between vehicles. A vehicle which has been compromised by an
adversary can cause serious chaos and accidents in such a network. A
simple key management scheme is then introduced to ensure safe
communications between the components of the system.
1. Introduction
In this paper we consider an ad hoc transportation system as a cyber physical system. We
define an ad hoc transportation system as one that has no infrastructure such as roads (and
lanes), traffic lights etc. Such systems may be set up and shut down quickly. For example
rather than build a road on a beach, an ad hoc transportation system may be set up at short
notice. Such a system may also be needed in disaster areas where the infrastructure has
been destroyed. We assume that in such a system the vehicles are autonomic and can guide
and direct themselves without a human driver. This is a difficult problem and in this paper
we look at one particular aspect of such a system. We investigate how a safe distance can
be maintained between vehicles. If the distance is below a critical point, then brakes must
be applied to slow down the vehicles. We consider a simplified scenario in this preliminary
work.
A vehicle which has been compromised by an adversary can cause serious chaos including
accidents in such a network. For example, if false information is sent to neighboring
vehicles, a crash may occur. We propose an approach to maintain safe distances between
vehicles. This requires determining the direction and distance between vehicles. A simple
key management scheme is then introduced to ensure safe communications between the
components of the system. In our model, portable anchors can be installed in the
transportation system at any point. These anchors provide the basis for determining
direction and distance. Secure communication is only between vehicles and anchors.
In our approach anchors are not resource constrained and possess sufficient hardware and
software to do their job. However we assume that vehicles may or may not be resource
constrained. Some vehicles may be very simple with a minimal amount of resources. Any
sensors and processors on these vehicles will therefore be very constrained.
The model for the physical part of the system is first defined. Based on this underlying
model, the algorithmic (or cyber) part is outlined. This is extended to make it secure. This
is very preliminary work and experimental details will be published in a subsequent paper.
2. Physical Model
The physical model is briefly described here. A pair of interacting vehicles may be
described by the following equations:
dx A
= a AA x A + a AB x B
dt
(1)
dx B
= a BA x A + a BB x B
dt
where xA and xB are the speeds of a pair of vehicles A and B and x = {xA, xB} is the speed
vector. If the speed xA of vehicle A goes down, while the speed of vehicle B xB is a
dx
constant, the positivity of aBA will cause the rate B to decrease. That is, in the automated
dt
system vehicle B will slow down or decelerate. This will cause the speed of vehicle B, xB
to decrease. A similar argument can be used to show that the positivity of aAB, aBA means
that an increase in the speed (acceleration) of xA implies an increase of xB and vice-versa.
The elements aij specifies quantitatively the relationship among pairs of vehicles
represented by the states {xi, xj} The modeling of the physical system is essential and
approaches for modeling systems such as in [5] may be applied.
The physical model is as described by eq. (1). To implement this model requires hardware
and software that will achieve the effects described by (1). Eq (1) states that if one vehicle
slows down, then the other one has to. This equation does not capture the directional and
distance relationship between vehicles. There is only a need to slow down if they are both
traveling in the same direction and are close to each other.
3. Implementation of Physical System
From an implementation perspective, the physical system of eq (1) can only be realized if
directional and distance information is available. The proposed approach to derive
direction and distance is briefly outlined here. The details of the proposed algorithm is
beyond the scope of this paper and will be presented in a future paper. Each vehicle is
equipped with a microsecond precision clock and a sound (ultra sound) (US) network
interfaces: R is the range of the US technology. s =342m/s is the speed of sound. Two
vehicles A and B are in physical proximity of each other if they can communicate directly
using US, i.e | AB | < R.
000 Car A
001
α/2
Car B
α/2
010
α Traffic
direction
α 011
α 100
Sensor
101
110
000
Car A
001 Car B
001
010
010
011
011
Each vehicle also has three simple sensors, one at the front, one in the middle and one at
the rear. Anchors are placed in different places within the region of interest. These anchors
carry a number of directional antennas to beam directional signals (fig 1(a)) for a time
period. Figure 1(a) shows three directional beams with an angle α (thin dotted lines). In the
next time slot, the beams are transmitted with a shift of α/2 as shown in figure 1(b) (solid
lines). In the next time slot, teams are shifted back α/2 to their original position. This
process is repeated continuously. Each beam transmits directional information specified
by a code. The code is incremental and shown in figure 1(b). Sensors in the vehicle detect
the directional beams. The beam angle is the same for all beams on all anchors and is
known to each vehicle before it enters the transportation system. For this paper we assume
that each vehicle is aware of the lane is in. This is an imaginary lane as there is no
infrastructure. The term ‘lane’ in this paper is simply an indication of the distance from the
anchor. A simple neighbor discovery protocol can be used by a vehicle to determine the
lane is in. For example, if an anchor is an immediate neighbor, the vehicle is determined to
be in an outer ‘lane’. For this paper, we also assume a two ‘lane’ road. This protocol can be
easily extended for wider areas.
The front sensor of vehicle A reports directional codes 010 and 001 (fig 1(b)). The middle
sensor gives the same readings. The sensor at the rear reports directional codes 010 and
011. The front sensor of vehicle B reports directional codes 000 and 001. The middle
sensor gives 001 and 010. The sensor at the rear reports directional codes 010 and 011.
See figure 1(c). It can be shown that under certain conditions, the number of directional
codes detected by a vehicle that is further from the anchor will be less than the number of
number of directional codes detected by a vehicle that is closer to the anchor.
Property 2: Vehicles in front will have a lower directional code than vehicles behind.
For example a vehicle receiving directional code 000 is in front of a vehicle receiving code
100.
3.1 Protocol
The anchor beams the direction code at regular intervals as outlined above. A vehicle on
getting the beam from the anchor broadcasts the Car Id (car or vehicle identification
number), and the directional beam code received by anchor.
Anchor: Directional Beam 〈D_code 〉 where D_code is the directional code.
Vehicle: Broadcast 〈D_code, Car_id〉
Any vehicle that receives a signal from another vehicle has to decide whether to slow
down or not. Distance alone is not a sufficient indicator. For example, although a vehicle
may be physically close to an a vehicle in the next lane, there is no need to brake. On the
other hand, a communication from a vehicle that is physically close and directly in front
requires brakes to be applied. Both distance and direction therefore need to be determined.
000 Car A
001
010
101
Car B
110
car
4.2 Analysis
We assume that communications with the anchor is secure. However in phase three,
communication between vehicles is not secured and a car may send the wrong code or the
wrong timestamps with malicious intent. For example, if the code suggests the car is on the
side, when it is in fact in the front, this may cause a crash as the vehicle will not slow down.
On the other hand, if the vehicle is on the side, whereas the code indicates it is in front, the
car may slow down unnecessarily.
Assume a compromised car A sends a code indicating that it is in a different lane, when in
fact it is directly in front of vehicle B. The clocks are all synchronized in phase I. In outline,
vehicle B checks for a correspondence between the code and the timestamp sent by A.
From phase II of the protocol, B is aware of the expected timestamp sent by A. The code
sent by A indicates that A is in a different ‘lane’ (see section 3.1) and B is able obtain a
fairly accurate measure of the distance between A and B. B captures the time that the
message from A was received. B next calculates the time taken for the message from the
anchor to get to B via A (allowing for a fixed processing time at A which is fixed for all
cars). If the code and timestamp do not match, the message is deemed to be incorrect and
foul play is suspected. In phase II, B receives a secure timestamp from the anchor. A
therefore cannot manipulate the timestamp to its advantage.
Similarly it can be shown that even if the messages between vehicles are intercepted by
other vehicles and replayed, the receiver is able to detect foul play. A more substantial
analysis will be performed in a subsequent paper.
5. Conclusions
In this paper we have introduced the concept of an ad hoc transportation system. The first
step in modeling the system is to describe the physical component. The corresponding
cyber component is described and a secure protocol for the cyber component is outlined.
Ongoing work is investigating the performance of the proposed system. A substantial
security analysis is also being undertaken and both of these works will be reported in a
subsequent paper. The work is also being extended to cater for wider areas and vehicles of
different sizes.
References
[1] Iris F.A. Vis, “Survey of research in the design and control of automated guided
vehicle systems”, European Journal of Operational Research, Volume 170, Issue 3,
Pages 677-709, May 2006
[2] Fuyi Xu, Hendrik Van Brussel, Marnix Nuttin, Ronny Moreas, “Concepts for dynamic
obstacle avoidance and their extended application in underground navigation”,
Robotics and Autonomous Systems, Volume 42, Issue 1, Pages 1-15, January 2003
[3] S S Wang, K P Shih, C Y Chang, “ Distributed Direction-based Localization in
Wireless Sensor Networks, Computer Communications, Vol. 30, Pages 1424-1439,
2007
[4] R Shokri, M Poturalski, G Ravot, P Papadimitratos, J-P Hubaux, “A Practical Secure
Neighbor Verification Protocol for Wireless Sensor”, Proceedings of 2nd ACM
Conference on Wireless Network Security (WiSec 2009), Pages 193-200, 2009
[5] D D Siljak, Large-Scale Dynamic Systems: Stability and Structure, North-Holland,
1978