Overview of Vanets

Preview:

Citation preview

Overview of VehicularNetworking

藍崑展成功大學資工系

Overview Vehicular Network

•Scope•Projects•MANET (Mobile Ad-hoc NETwork)•Protocols•Mobility•Security•Transport•Information Dissemination

Scenario

What are in a vehicular network

•Vehicles (on-board unit)•Road side unit/equipment•Communication protocols

–Vehicle to vehicle–Vehicle to road side–Vehicle to handheld device

•Network infrastructure•GPS (optional?)•Back-end system

Connected car scenario

Difference of communications

Applications of a vehicle network

•Safety–Intersection warning

•Vehicle-based•Infrastructure-based

•Vehicle probe–Travel time estimation–Environmental data collection–Road surface data collection

•Emergency vehicle– preemptive traffic control

•Navigation

Intelligent Traffic control withtelematics

Telematics vs. ITS

•Telematics–The integrated use of telecommunications

and informatics within road vehicles

•ITS (intelligent transportation system)–add information and communications

technology to transport infrastructure andvehicles

Approach

Approach

Approach

Approach

Vehicle

Intersection

TrafficLight

Too long….

Too short….

Traffic control

IntersectionPre-timed Traffic light

50sec

70sec

50sec

70sec

Unfair…..

SCOOT (Split, Cycle and OffsetOptimization Technique)

SCATS (Sydney CoordinatedAdaptive Traffic System)

50sec

70sec

50sec

70sec

: Detector

60sec

30sec

60sec

30sec

Limited!!

Case1: Queue istoo long

Case2: Someproblems in the

intersection

TrafficView

: Controller

: Controller

Green time may beextended

Case1: pedestrianCase2: Vehicles inthe Intersection

Too many vehicles.I must wait

Is this for real?

Overview Vehicular Network

•Scope•Projects•MANET (Mobile Ad-hoc NETwork)•Protocols•Mobility•Security•Transport•Information Dissemination

National initiatives

•US–VII (Vehicle Infrastructure Integration)

•Europe–i2010–ERTICO

VII goal

•Safety–E.g. reduce number of car accidents

•Driving quality–E.g. shorter driving time

•New Market–E.g. applications that run on vehicle OBU

VII business model

•Government–builds network infrastructure (DSRC)–Subsidize auto-maker for OBU & application

development

•Auto-maker–All new cars sold in US are VII-compliant–Allow government to run safety-related

application on OBU

VII vision

VII consortium

•Auto-makers: OBE and applications–Ford–GM–DCX (DaimlerChrysler)–BMW–VW–Nissan–Toyota–Honda

•State DOT (Department of Transportation): networkinfrastructure and RSE–Subcontract to Booz Allen Hamilton (a global consulting firm)

Schedule

$54M $3B

Planned deployment

System architecture

(our focus in this course)

On-board equipment (OBE)

Road-Side equipment (RSE)

End-to-End Communication

Putting all together

Multiple applications on top ofDSRC

Current deployment

Future traffic estimate

•WiMax --- 60%•DSRC --- 10%•WiFi --- 10%•Satellite --- 10%•Cellular (e.g. UMTS) --- 10%

Dual Mode OBE

•OBE can be dual mode–Public application (safety, information)

•DSRC–Mandatory by VII–27Mbps, 1km range–802.11p (PHY, MAC), 1609 (upper layer extension)

–Private application (voice, infotainment,navigation)•WiMax, WiFi, Cellular

–Value differentiator of auto-maker OBE

What are in a vehicular network?

What are in a vehicular network?

Communication protocols

i2010

•A European Information Society for growth andemployment

•the European Commission's strategic policyframework laying out broad policy guidelines forthe information society and the media in theyears up to 2010

•3 flagship initiatives–Intelligent Car–Digital Libraries–Ageing Well in the Information Society

Intelligent Car

•Night vision

•Advanced cruisecontrol–Use radar to maintain

safe distance

Intelligent car

•CyberCars–Driver-less–Run at low speed (30km/hr)–Can avoid obstacles–Park automatically–With a fee, users would have

access right•CyberCars2

–Follow-up project–Focus on V-to-V and V-to-

infrastructure communication

Intelligent Car

•CarTalk project–Focus on vehicle-to-

vehicle communication–Information is

transmitted from onecar to another car

–Vehicles nearby forman ad-hoc network

ERTICO

•Europe-based•ERTICO represents the interests and expertise

of around 100 Partners•provides a platform for its Partners to define

common research & development needs•acquires and manages publicly funded ITS

development & deployment projects on behalf ofits Partners

•Plan the deployment of ITS•Influence decision makers and opinion leaders

Organization• Board members

– Industry• Renault• Volkswagen AG• Siemens• FIAT/IVECO• Navteq• Robert Bosch

– Public Authorities• UK Department for Transport• Slovenian Ministry of Transport• Swedish Road Administration

– Infrastructure Operators• ASFA• Thales• Vodafone

– Users• ADAC• RACC

– Others• TNO

projects• Safety

– ADASIS Forum — advancing map-enhanced driver assistance systems– AIDE — enhancing safety with adaptive driver assistance systems– ERTRAC — contributing to European road transport research priorities– eSafety Forum — making Europe's roads safer for everyone– FeedMAP — enabling quick and inexpensive map updates– GST — creating easy access to dynamic safety services– HeavyRoute — supporting quicker and safer freight transport– IP PReVENT— supporting the driver, preventing accidents– •MAPS&ADAS — using digital maps to improve road safety– •RESPONSE3 — bringing ADAS to market quickly and safely– SAFESPOT — supporting smart vehicles on safe roads– SpeedAlert Forum — keeping drivers informed of speed limits at all times

• Security– EOS — building a European security partnership for the 21st century– EURAM — generating a European risk assessment methodology for critical infrastructures

• Efficiency & Environment– AGILE — making the most of satellite navigation services– CVIS — facilitating vehicle and infrastructure cooperation– •DEPN — dismantling non-technical barriers to CVIS deployment– •FOAM — building a framework for open application management– ETNITE — improving ITS training and education– FRAME Forum — providing continuity and compatibility for European ITS architecture– RCI — contributing to free-flow road charging– SISTER — promoting the integration of satellite and terrestrial communication with Galileo for road transport

E-call•A mandate for all vehicles in EU after 2010/9•Under eSafety Forum

E-call requirement

Overview Vehicular Network

•Scope•Projects•MANET (Mobile Ad-hoc NETwork)•Protocols•Mobility•Security•Transport•Information Dissemination

Mobile Ad Hoc Networks

•Formed by wireless hosts which may bemobile

•Without (necessarily) using a pre-existinginfrastructure

•Routes between nodes may potentiallycontain multiple hops

Mobile Ad Hoc Networks

•May need to traverse multiple links toreach a destination

A

B

Mobile Ad Hoc Networks(MANET)

•Mobility causes route changes

A

B

Why Ad Hoc Networks ?

•Ease of deployment

•Speed of deployment

•Decreased dependence on infrastructure

To summarize

Many Applications

•Personal area networking–cell phone, laptop, ear phone, wrist watch

•Military environments–soldiers, tanks, planes

•Civilian environments–Mesh networks– taxi cab network–meeting rooms–sports stadiums–boats, small aircraft

•Emergency operations–search-and-rescue–policing and fire fighting

Applications: Vehicular Ad-hocnetwork

Applications: Wireless SensorNetwork

Applications: Mesh Network

Many Variations

•Fully Symmetric Environment–all nodes have identical capabilities and responsibilities

•Asymmetric Capabilities– transmission ranges and radios may differ–battery life at different nodes may differ–processing capacity may be different at different nodes–speed of movement

•Asymmetric Responsibilities–only some nodes may route packets–some nodes may act as leaders of nearby nodes (e.g., cluster

head)

Many Variations

•Traffic characteristics may differ in different adhoc networks–bit rate–timeliness constraints–reliability requirements–unicast / multicast / geocast–host-based addressing / content-based addressing /

capability-based addressing

•May co-exist (and co-operate) with aninfrastructure-based network

Many Variations•Mobility patterns may be different

–people sitting at an airport lounge–New York taxi cabs–kids playing–military movements–personal area network

•Mobility characteristics–speed–predictability

•direction of movement•pattern of movement

–uniformity (or lack thereof) of mobility characteristics amongdifferent nodes

Challenges

•Limited wireless transmission range•Broadcast nature of the wireless medium

–Hidden terminal problem (see next slide)•Packet losses due to transmission errors•Mobility-induced route changes•Mobility-induced packet losses•Battery constraints•Potentially frequent network partitions•Ease of snooping on wireless transmissions (security

hazard)

Hidden Terminal Problem

B CA

Nodes A and C cannot hear each other

Transmissions by nodes A and C can collide at node B

Nodes A and C are hidden from each other

Research on Mobile Ad HocNetworks

Variations in capabilities & responsibilitiesX

Variations in traffic characteristics, mobility models, etc.X

Performance criteria (e.g., optimize throughput, reduceenergy consumption)

=Significant research activity

The Holy Grail

•A one-size-fits-all solution–Perhaps using an adaptive/hybrid approach

that can adapt to situation at hand

•Difficult problem

•Many solutions proposed trying to addressa sub-space of the problem domain

VANET vs. MANET

•VANET (Vehicular Ad-hoc Network) canbe considered a subset of MANET (MobileAd-hoc Network)–Nodes do not move in any random direction–Nodes are powered (energy is not an issue)–Node contact time is limited

•Intermittent connectivity might occur

–Node speed is bounded•Mostly high speed, but occasionally stop and slow

moving

Overview Vehicular Network

•Scope•Projects•MANET (Mobile Ad-hoc NETwork)•Protocols•Mobility•Security•Transport•Information Dissemination

802.11p•WAVE (Wireless Access in Vehicular Environment)•Based on .11a•5.9GHz•Data rate: 6-27Mbps•Designed for general Internet access, can be used for

ETC as well•7 licensed channels•Use open off-the-shelf chipset and software•Vehicle-to-roadside and vehicle-to-vehicle•Command-response and peer-to-peer

Ch 172 Ch 174 Ch 176 Ch 178 Ch 180 Ch 184Ch 182

Frequency (GHz)

5.85

0

5.86

0

5.87

0

5.88

0

5.89

0

5.90

0

5.91

0

5.92

0

Control Channel

Service Channels Service Channels

Critical Safetyof Life

High PowerPublic Safety

802.11p

•Target for high speed vehicle•Short latency (<50ms) for MAC•Random MAC address for preserving

privacy•IPv6 for network layer (with header

compression allowed)•Multiple stack options above network layer

Some technical terms•DSRC (dedicated short-range communication)

–Apply to many forms of short-range low-latency radio–5.85 to 5.925GHz in North America

•OBU: a device performs the functions of 802.11 stationwith additional WAVE functions

•RSU: a device performs the functions of 802.11 accesspoint with additional WAVE functions

•WBSS (WAVE basic service set): A set of OBUsoperating in a WAVE mode controller by an RSU

•WIBSS (WAVE independent basic service set): A set ofOBUs operating in a WAVE mode that forms a self-contained network–Do not use beacons–Connection is created/tore-down on-dmand

WAVE

•Differences from 802.11–High reliability–Low latency

•From association to end of data exchange <100ms

Channel access

•Control channel–Broadcast (no reply)

•Service channel–Data transmission

•If an OBU does not hear anything within100ms, it switches back to control channel

Power control

•Pubic safety application are allowed higherpower transmission than privateapplication

•The reference point for RF power is thecenter of front bumper of the vehicle

Safety-related message

•Get higher priority during transmission•Normally sent on control channel•Use EDCA (.11e)

802.16

•aka WiMax–Wireless Metro Internet

•Fast last mile access to network•Target Applications

–Data–Voice–Video–Real time videoconferencing

•Fast cable/fiber to end user is expensive

Usage Scenarios

Comparison of wireless standards

Why WiMax?

•Better spectral efficiency than 3G–Consider multiple antennas right from the start–OFDM is more amenable to MIMO implementation

•Higher peak data rate•Higher average throughput•Support more symmetric linnks•Lower cost

–IP architecture from bottom up

•But 3G has a better mobility support

Why WiMax?

•Better spectral efficiency than 3G–Consider multiple antennas right from the start–OFDM is more amenable to MIMO implementation

•Higher peak data rate•Higher average throughput•Support more symmetric linnks•Lower cost

–IP architecture from bottom up

•But 3G has a better mobility support

802.20

•Target for very high mobility–> 250 kmph–Operate below 3.5GHz–4Mbps downlink and 1.5Mbps uplink–Still under developing

•Lack of consensus•Issues with the standardization process

•802.22–Target for rural and remote area–Define a cognitive radio

•Take advantage of unused TV channels•Operate in VHF and low UHF bands and lead to greater

range

M-Taiwan Project

WiMax Network Usage Model

WiMax Features•Broad bandwidth

–Up to 134.4 Mbit/s in 28 MHz channel (in 2-66 GHz)•32Mb/s -134.4Mb/s•1.25/2.5/5/10/14/20/25/28MHz per channel (3.5/7/8.75/13.5MHz)

•Supports multiple services simultaneously with full QoS–Efficiently transport IPv4, IPv6, ATM, Ethernet, etc.–Wireless transportation system (ferry)

•Bandwidth on demand (frame by frame)–Similar to HIPERLAN Type II (frame-based protocol) and

DOCSIS (Data Over Cable Service Interface Specifications)–Centralized control

•MAC designed for efficient used of spectrum•Comprehensive, modern, and extensible security

•Supports multiple frequency allocations from 2-66 GHzin 802.16 (10-66GHz), 802.16a (2-11GHz)and 802.16e(<6GHz) 700MHz–Single carrier (SC) for line-of-sightsituations–OFDM and OFDMA (MC) for non-line-of-sight situations

•OFDM: orthogonal frequency division multiplexing•OFDMA: orthogonal frequency division multiple access

–OFDMA = 1.25 MHz, 2.5, 5, 10, 14 and 20 MHz channels (and more)

•Access schemes:–TDD (time division duplex) and FDD(frequency division duplex)

•Link adaptation: Adaptive modulation and coding•Point-to-multipoint (star) topology and mesh network

extension•Support for adaptive antennas and space-time coding (in

802.16a)•Extension to mobility

TDM vs. OFDM

802.16 vs. 802.16e

•Downlink data rate: 9.4Mbps vs. 46Mbps•Uplink data rate: 3.3Mbps vs. 7Mbps•Multiplexing: TDM vs. OFDMA•Modulation: both use QPSK, 16QAM, 64QAM•Coverage: 3-5 miles vs. 2 miles•Frequency band: 3.5GHz/5.8GHz vs. 2.3GHz/

2.5GHz/3.5GHz–5.8GHz is license-exempt

802.15.1

• aka Bluetooth

• For the last 10 meters

Target products

•Intelligent devices–PC–Cellular phone–PDA

•Data peripheral–Keyboard–Mouse–Camera–Printers

•Audio peripheral–Headset–Speaker–Stereo receiver

•Embeddedapplications–Cars: power lock

control–Grocery store update–MIDI music instrument

Usage models

•Computer to Computer File Transfer•Synchronization•3 in 1 Phone•Ultimate Headset•Computer Speakerphone•Cordless Computer•Conference Table•…..

characteristics•Unlicensed 2.4GHz radio band

– ISM (industrial, scientific,medical) band -Available worldwide–Also used by Microwave ovens, 802.11, HomeRF…

•Gross data rate of 1 Mbit/s•Basic 10m range extended to 100m with amplifiers•TDMA -TDD -Frequency hopping]

–hopping to a new frequency 1600 times a second•small packet size•Mixed voice / data paths•Encryption•Low power•Low cost•Extremely small

Piconet

•A piconet is characterized by the master–Frequency hopping scheme–Access code–Timing synchronization

• Master determines the bit rate allocated toeach slave

•Slaves do not synchronize to the master–Calculate offsets to master’s Bluetooth clock–Monitor timing drift

•Only one master–Dynamically selected–Roles can be switched •

•Up to 7 active slaves–Active piconet

•Up to 255 parked slaves–Can be reactivated quickly

•No central network structure–“Ad-hoc”network

Scatternet

Scatternet

• Interconnectedpiconets

•One master perpiconet

•Few devices sharedbetween piconets–Master/Slave–Slave/Slave–Need special features

•No central networkstructure–“Ad-hoc”network

Scatternet applications

Data exchange across piconets

802.15.4

•aka ZIGBEE•Also target Personal Area Networks market•Designed for the wide ranging automation

applications•Operates in the

–868MHz band at a data rate of 20Kbps in Europe–914MHz band at 40Kbps in the USA,–2.4GHz ISM bands Worldwide at a maximum data-

rate of 250Kbps.

features

•Standards-based•Interoperability and worldwide usability•Low data-rates•Ultra low power consumption•Very small protocol stack•Support for small to excessively large networks•Simple design•Security•Reliability

Bluetooth vs. Zigbee

•Bluetooth aims to cover more applications–Introduce complexity–increase cost and power consumption

Data rate

•Bluetooth–Higher data rate–audio, graphics and pictures, file transfer over small

networks–performance of a Bluetooth network drops when more

than 8 devices are present•ZigBee

–better suited for transmitting smaller packets overlarge networks

–mostly static networks with many, infrequently useddevices• like home automation, toys, remote controls, etc.

–can handle 65000+ devices.

power

•Bluetooth–Aim as a cable replacement for items like phones,

laptop computers and headsets•expect regular charging and use a power model like a mobile

phone

•ZigBee–limited power requirement

•better for devices where the battery is rarely replaced•designed to optimize slave power requirements (> 2 years)

latency

•Bluetooth–3 seconds to either join a network or to change to

active from sleeping state•though faster in accessing the channel (around 2ms).

•ZigBee–outstanding choice for timing critical, low power

applications•The join time for a new slave is typically 30ms•slave changing from sleeping to active, or accessing the

channel is typically 15ms

Overview Vehicular Network

•Scope•Projects•MANET (Mobile Ad-hoc NETwork)•Protocols•Mobility•Security•Transport•Information Dissemination

Why VANET simulation?

•Real-world experimentation–Currently no test-bed available–Hard to explore scalability–Classical problem with repeatability

•Emulation–Uses real sw/hw in simulated environment to ensure

accuracy–Higher scalability, but still limited

•Network simulation (e.g. NS-2, GloMoSim, SWANS)–Scalable to large number of nodes–Easy to vary system configuration–Repeatability–…

•Desirable simulation characteristics–Scalability - interesting problem instances–Generalizable - should enable a wide range of scenarios–Feedback loop - enable self-steering (e.g., traffic advisory)–Close correspondence with real world

A realistic mobility model is crucial to the evaluationof VANET protocols and applications

The importance of a mobility model

•Mobility –key component of VANETsimulators–Mobility constraints (e.g., streets, buildings)

•Affects velocities and distances between nodes,which affects radio transmission

–Nodes should physically interact with oneanother•E.g., avoid collisions

–Central to “feedback loop”in many scenarios•Cars can change trajectory in response to data

What we want for VANET mobility

Random waypoint consideredharmful

•Random Waypoint (RWP)–Benefits

•Simple•Low overhead•Common

–Disadvantages•NOT representative of

mobility for worst-case orgeneral-case performance

•Nodes cannot interact wrtmobility

•Encourages use of openfield simulation

RWP effects on wirelesscommunication

•Every position on map is a waypoint withequal probability–Artificially high density near center of map

•Nodes generally cannot leave the field–Data does not leave the field

•Arbitrary stopping points and stoppingtimes–Affects links among nodes

•Arbitrary speeds and speed distributions

Mobility traces

•Advantages–Represents real motion–Little overhead in simulation

•Disadvantages–Difficult to obtain–Rarely distributed (legal issues)–Difficult to generalize–Does not allow feedback loop

Vehicular motionCongestion leads to hot

spots at intersections

Vehicles spend more timenear intersections even

when uncongested

Car mobility & wirelesscommunication

•Nodes tend to spend more time at intersections– Increases interference in this region–Can reduce connectivity

•Buildings further reduce connectivity betweennodes on different streets

•Nodes often travel in opposite or orthogonaldirections–Short interaction time window

•Vehicular congestion slows nodes–Can stabilize topology, but can reduce overall connectivity

•A new mobility model for VANETs is needed…

Network Mobility

•IETF NEMO WG–RFC 3963 : Network Mobility (NEMO) Basic

Support Protocol (Jan. 2005)

•Extension of Mobile IPv6

•Mobile Router (MR)–Operates Mobile IPv6–Establishes a bi-directional tunnel to its

corresponding Home Agent (HA)

Network Mobility

114

InternetInternet

HA_MR

CN_MN 2::

4::

BU

4::2->7::2

5::/prefixlen,6::/prefixlenforward to MR

7::

MR

LFRLFN

6::

5::

2

All traffic must passthrough the bi-directional tunnelbetween the MRand itscorresponding HA.=>Triangularrouting

2

Overview Vehicular Network

•Scope•Projects•MANET (Mobile Ad-hoc NETwork)•Protocols•Mobility•Security•Transport•Information Dissemination

Security Issues for VANET

•Nodes may be misbehave or try tocompromise security at all layers of theprotocol stack

MAC Layer

•Disobey protocol specifications for selfishgains

•Denial-of-service attacks

MAC Layer Misbehavior

Wirelesschannel

Wirelesschannel

Access Point

A B

Nodes are required to followMedium Access Control(MAC) rules

Misbehaving nodes mayviolate MAC rules

Wirelesschannel

Wirelesschannel

Access Point

C D

Example

•We will illustrate MAC layer misbehaviorwith example misbehaviors that can occurwith IEEE 802.11 DCF protocol

One Possible Misbehaviors

•Causing collisions with other hosts’RTS orCTS

•Those hosts will exponentially backoff onpacket loss, giving free channel to themisbehaving host

Another possible Misbehaviors:“Impatient”Transmitters

•Smaller backoff intervals

•Shorter Interframe Spacings

“Impatient”Transmitters

•Backoff from biased distribution

–Example: Always select a small backoff value

Transmit

wait

B1 = 1

B2 = 20

Transmit

wait

B2 = 19

B1 = 1Misbehavingnode

Well-behavednode

Network Layer

Misbehaving hosts may create many hazards

•May disrupt route discovery and maintenance:Force use of poor routes (e.g., long routes)

•Delay, drop, corrupt, misroute packets

•May degrade performance by making goodroutes look bad

Watchdog Approach

•Verify whether a node has forwarded apacket or not

B DC EA

B sends packet to C

Watchdog Approach•Verify whether a node has forwarded a packet or not•B can learn whether C has forwarded packet or not•B can also know whether packet is tampered with if no

per-link encryption

B DC EA

C forwards packet to D

B overhears CForwarding the packet

Watchdog Approach:Buffering & Failure Detection

•Forwarding by C may not be immediate: B mustbuffer packets for some time, and compare themwith overheard packets

•Buffered packet can be removed on a match

•If packet stays in buffer at B too long, a “failuretally”for node C is incremented

•If the failure rate is above a threshold, C isdetermined as misbehaving, and source nodeinformed

127

Secure communication andanonymity

•Assume that every node has a unique and staticGlobal ID (GID) and a set of pseudonyms (PID)used as network addresses that can changeduring communication

•Nodes exchange their GID and the GID publickey prior to unicast communications betweenthem

•Despite we can have unicast communicationsusing PIDs we cannot know the other personsidentity

•Applying asymmetric cryptography, apseudonym is associated with a public/privatekey pair.

•A certificate signed by a trusted certificateauthority (CA) binds public key and GID

•A node can change its pseudonym andassociated signature and certificate in order toprevent identity and location tracking

Overview Vehicular Network

•Scope•Projects•MANET (Mobile Ad-hoc NETwork)•Protocols•Mobility•Security•Transport•Information Dissemination

Transport Layer(End-to-End Communication)

•How to secure end-to-end communication?

•Need to know keys to be used for securecommunication

•May want to anonymize thecommunication

131

•Two routes: A-B-D-F (BAD), A-C-D-F(GOOD)

Fig. 1. A link rupture event is more likely to occur betweenvehicles A, B, and D.

Source Destination

Geographical routing

Source Node

Destination Node

Choose node A (theclosest node) for the

next hop

Restricted Greedy Routing

Repair strategy based on real street

Detecting junctions

Beacon message

Correlation coefficient

Intermittent connectivity on theroad

Drive-thru Interent

•Wireless LANs are pervasive•Can we use wireless LANs on the road to

provide Internet access?•WLANs => connectivity islands•How to deal with intermittent connectivy

and exploit short connection period?

Connection splitting

Overview Vehicular Network

•Scope•Projects•MANET (Mobile Ad-hoc NETwork)•Protocols•Mobility•Security•Transport•Information Dissemination

Information DisseminationMotivation & Scenario

• Two cars crash while travelingsouthbound on a highway, nearbyvehicles cooperate to:– inform the closest ambulance and

police stations– alert approaching vehicles telling them

to slow down– notify the highway entrances north of

the accident

• Messages should ideally propagate– towards specific target areas– along the routes where the vehicle

density is higher

Information Dissemination

•How to route messages towards specifictarget areas while considering theunderlying vehicle density

•Assuming each vehicle knows itsgeographical location and communicationrange–How to find the preferred paths to reach the

target areas?