000 -LEADER |
fixed length control field |
13628cam a2200433 i 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250820114746.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION |
fixed length control field |
m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr cnu---unuuu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
250820t20242024enkm o u000 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781789451801 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
1394325827 |
Qualifying information |
electronic book |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
1394325843 |
Qualifying information |
electronic book |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781394325825 |
Qualifying information |
electronic book |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781394325849 |
Qualifying information |
electronic book |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Cancelled/invalid ISBN |
1789451809 |
Qualifying information |
hardcover |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Cancelled/invalid ISBN |
9781789451801 |
Qualifying information |
hardcover |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)1458442273 |
041 ## - LANGUAGE CODE |
Language code of text/sound track or separate title |
eng |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TE228.3 |
Item number |
.C66 2024 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
388.3/12 |
Edition number |
23/eng/20241017 |
245 00 - TITLE STATEMENT |
Title |
Cooperative intelligent transport systems : |
Remainder of title |
control and management / |
Statement of responsibility, etc |
coordinated by L�eo Mendiboure. |
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
London, UK : |
Name of publisher, distributor, etc |
ISTE Ltd ; |
Place of publication, distribution, etc |
Hoboken, NJ : |
Name of publisher, distributor, etc |
John Wiley & Sons, Inc., |
Date of publication, distribution, etc |
2024. |
264 #4 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Date of publication, distribution, etc |
©2024. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 online resource. |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent. |
337 ## - MEDIA TYPE |
Media type term |
computer |
Media type code |
c |
Source |
rdamedia. |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Carrier type code |
cr |
Source |
rdacarrier. |
340 ## - PHYSICAL MEDIUM |
Source |
rdacc |
Authority record control number or standard number |
http://rdaregistry.info/termList/RDAColourContent/1003. |
490 1# - SERIES STATEMENT |
Series statement |
Sciences. Networks and communications. Network management and control. |
505 0# - CONTENTS |
Formatted contents note |
Table of Contents<br/>Preface xiii<br/>Léo MENDIBOURE<br/><br/>Part 1 Introduction to Cooperative Intelligent Transport Systems 1<br/><br/>Chapter 1 Local Interactions for Cooperative ITS: Opportunities and Constraints 3<br/>Jean-Marie BONNIN and Christophe COUTURIER<br/><br/>1.1 Introduction 3<br/><br/>1.2 Ephemeral local interactions: concept and examples 5<br/><br/>1.2.1 Examples of services using ephemeral local interactions 5<br/><br/>1.2.2 Characteristics of ephemeral local interactions 6<br/><br/>1.2.3 Advantages of ephemeral local interactions 8<br/><br/>1.2.4 Suitability of communication technologies for this type of interaction 10<br/><br/>1.3 Local interactions serving cooperative ITS 13<br/><br/>1.3.1 Cooperative ITS services 13<br/><br/>1.3.2 Benefit of ephemeral local interactions for cooperative ITS 14<br/><br/>1.3.3 V2X communication technologies 16<br/><br/>1.3.4 Properties of C-ITS services built on local interactions 18<br/><br/>1.3.5 Limitations and constraints of implementing services built on local interactions 22<br/><br/>1.4 Role of infrastructure in cooperative ITS services 26<br/><br/>1.4.1 Infrastructures dedicated to cooperative ITS 26<br/><br/>1.4.2 Towards an active infrastructure 28<br/><br/>1.5 Conclusion and prospects 29<br/><br/>1.6 References 30<br/><br/>Chapter 2 Evolution of Use Cases for Intelligent Transport Systems 33<br/>Sassi MAALOUL, Hasnaâ ANISS, Marion BERBINEAU and Léo MENDIBOURE<br/><br/>2.1 Introduction 33<br/><br/>2.2 Vehicular communication technologies 34<br/><br/>2.2.1 ITS-G5/IEEE 802.11p technology 35<br/><br/>2.2.2 The 3GPP standard: C-V2X 36<br/><br/>2.2.3 Deployment of ITS technologies 37<br/><br/>2.3 Evolution of use cases 37<br/><br/>2.3.1 Classification of use cases 38<br/><br/>2.3.2 Required performance 40<br/><br/>2.3.3 Example of use cases 41<br/><br/>2.4 Challenges and future services of V2X 48<br/><br/>2.5 Conclusion 49<br/><br/>2.6 References 49<br/><br/>Part 2 Optimization of Data Transmission for Cooperative Intelligent Transport Systems 51<br/><br/>Chapter 3 Towards an Optimization of Data Transmission in Cooperative Intelligent Transport Systems 53<br/>Mohamed BENZAGOUTA, Ramzi BOUTAHALA, Secil ERCAN, Sassi MAALOUL, Hasnaâ ANISS, Léo MENDIBOURE, Marwane AYAIDA and Hacène FOUCHAL<br/><br/>3.1 Introduction 53<br/><br/>3.2 Context 55<br/><br/>3.2.1 C-ITS Services 55<br/><br/>3.2.2 Communication standards 56<br/><br/>3.3 Experimental evaluation of the performance of the C-ITS message broadcasting system 58<br/><br/>3.3.1 C-Roads France project and COOPITS application 58<br/><br/>3.3.2 Experimental environment and measurements 60<br/><br/>3.3.3 Analysis of results 61<br/><br/>3.4 Discussion of the main causes 65<br/><br/>3.4.1 Absence of adaptation to actual conditions 66<br/><br/>3.4.2 Duplication of non-scalable information 66<br/><br/>3.4.3 Broadcasting of information in wide geographical areas 66<br/><br/>3.4.4 High level of security in relation to the risks involved 67<br/><br/>3.5 Recommendations and research avenues 70<br/><br/>3.5.1 Differentiation by traffic conditions 70<br/><br/>3.5.2 Smart broadcasting of constant messages 70<br/><br/>3.5.3 Smart definition of message broadcast areas 70<br/><br/>3.5.4 Security-level optimization 71<br/><br/>3.6 Conclusion 71<br/><br/>3.7 Acknowledgments 72<br/><br/>3.8 References 72<br/><br/>Chapter 4 Efficient Hybridization of C-ITS Communication Technologies 75<br/>Badreddine Yacine YACHEUR, Toufik AHMED and Mohamed MOSBAH<br/><br/>4.1 Introduction 75<br/><br/>4.2 Related works 77<br/><br/>4.3 Definition of a heterogeneous network architecture and design of a protocol stack 79<br/><br/>4.4 RL for selecting the mode of communication 81<br/><br/>4.4.1 Deep reinforcement learning 82<br/><br/>4.4.2 Correspondence with key elements of reinforcement learning 82<br/><br/>4.5 Performance evaluation 87<br/><br/>4.5.1 Simulation framework and scenario 87<br/><br/>4.5.2 DDQL algorithm parameters 89<br/><br/>4.5.3 Simulation results 90<br/><br/>4.6 Conclusion 93<br/><br/>4.7 References 93<br/><br/>Chapter 5 Using SDN Technology to Control C-ITS: Towards Decentralized Approaches 97<br/>Romain DULOUT, Lylia ALOUACHE, Tidiane SYLLA, Léo MENDIBOURE, Hasnaâ ANISS, Virginie DENIAU and Yannis POUSSET<br/><br/>5.1 Introduction 97<br/><br/>5.2 Context 99<br/><br/>5.2.1 SDN-controlled C-ITS architectures (SDVN) 99<br/><br/>5.2.2 Blockchain technology 101<br/><br/>5.3 Application of Blockchain to SDVN architectures 103<br/><br/>5.4 Optimization of Blockchain technology for SDVN architectures 106<br/><br/>5.4.1 New architectures 107<br/><br/>5.4.2 New mechanisms 108<br/><br/>5.5 Future research avenues 109<br/><br/>5.5.1 Optimal positioning of Blockchain nodes 109<br/><br/>5.5.2 Energy consumption reduction 109<br/><br/>5.5.3 Integration of AI and Blockchain 110<br/><br/>5.5.4 A more complete integration between SDN and Blockchain 110<br/><br/>5.6 Conclusion 111<br/><br/>5.7 References 112<br/><br/>Chapter 6 Application of Network Slicing in C-ITS Systems 115<br/>Abdennour RACHEDI, Toufik AHMED and Mohamed MOSBAH<br/><br/>6.1 Introduction 115<br/><br/>6.2 Vehicle-to-everything (V2X) communications 116<br/><br/>6.3 Presentation of V2X technologies 118<br/><br/>6.3.1 Its-g5 119<br/><br/>6.3.2 Lte-v2x 121<br/><br/>6.3.3 5g-v2x 123<br/><br/>6.4 Network slicing for 5G-V2X 125<br/><br/>6.4.1 Network slicing for C-V2X 126<br/><br/>6.4.2 ITS-G5 network slicing 128<br/><br/>6.5 Conclusion 138<br/><br/>6.6 References 138<br/><br/>Part 3 New Approaches to Data Processing in Cooperative Intelligent Transport Systems 141<br/><br/>Chapter 7 A Novel Cloud Approach for Connected Vehicles 143<br/>Geoffrey WILHEM, Marwane AYAIDA and Hacène FOUCHAL<br/><br/>7.1 Introduction 143<br/><br/>7.2 State of the art 144<br/><br/>7.2.1 ETSI standards for C-ITSs 145<br/><br/>7.2.2 Vehicular cloud computing 146<br/><br/>7.2.3 Information-centric networking 147<br/><br/>7.3 The GeoVCDN approach 150<br/><br/>7.3.1 A centralized context-cloud architecture 150<br/><br/>7.3.2 Geographic routing ICN protocol 153<br/><br/>7.3.3 Discussion 160<br/><br/>7.4 Analytical model 160<br/><br/>7.4.1 Description of the model 161<br/><br/>7.4.2 Network modeling 161<br/><br/>7.4.3 Communication environment modeling 164<br/><br/>7.4.4 Message dissemination modeling 165<br/><br/>7.4.5 Approaches 173<br/><br/>7.4.6 Discussion 179<br/><br/>7.5 Evaluation 180<br/><br/>7.5.1 Simulator description 180<br/><br/>7.5.2 Simulation results for network load 182<br/><br/>7.6 Simulation results for data utility 186<br/><br/>7.6.1 Simulation results for data validity 186<br/><br/>7.6.2 Simulation results for data freshness 187<br/><br/>7.6.3 Discussion of the simulation 191<br/><br/>7.7 Use case study 191<br/><br/>7.7.1 Scenario 192<br/><br/>7.7.2 Discussion 194<br/><br/>7.8 Conclusion 195<br/><br/>7.9 Acknowledgment 196<br/><br/>7.10 References 196<br/><br/>Chapter 8 Optimal Placement of Edge Servers in C-ITS Systems 199<br/>Sabri KHAMARI, Toufik AHMED and Mohamed MOSBAH<br/><br/>8.1 Introduction 199<br/><br/>8.2 Context 201<br/><br/>8.2.1 Vehicular applications 201<br/><br/>8.2.2 Multi-access edge computing (MEC) 201<br/><br/>8.2.3 Deployment of MEC systems 201<br/><br/>8.3 State of the art 202<br/><br/>8.4 OptPlacement: efficient edge server placement 203<br/><br/>8.4.1 System modeling 204<br/><br/>8.4.2 Methodology and simulation 208<br/><br/>8.4.3 Performance evaluation 213<br/><br/>8.5 Conclusion 218<br/><br/>8.6 References 219<br/><br/>Chapter 9 Risk Estimation: A Necessity for the Connected Autonomous Vehicle 223<br/>Dominique GRUYER, Sio-Song IENG, Sébastien GLASER,Sébastien DEMMEL, Charles TATKEU and Sabrine BELMEKKI<br/><br/>9.1 Context and objectives 223<br/><br/>9.2 Estimation of risk local to the ego-vehicle: some existing metrics 226<br/><br/>9.3. Development of communication strategy to extend risk: CBL and CBL-G 232<br/><br/>9.4 Computation of cooperative risks: extended local risk and global risk 234<br/><br/>9.5 Impact of global risk and anticipation of risky situations 236<br/><br/>9.6 Discussion 242<br/><br/>9.7 Conclusion and prospects 246<br/><br/>9.8 References 247<br/><br/>Chapter 10 Resilience of Collective Perception in C-ITS – Deep Multi-Agent Reinforcement Learning 251<br/>Imed GHNAYA, Hasnaâ ANISS, Marion BERBINEAU,Mohamed MOSBAH and Toufik AHMED<br/><br/>10.1 Introduction 252<br/><br/>10.1.1 Background and issue 252<br/><br/>10.1.2 Motivation and contribution 253<br/><br/>10.2 State of the art 255<br/><br/>10.2.1 Standardization of collective perception by ETSI 256<br/><br/>10.2.2 Perception data selection and exchange techniques 257<br/><br/>10.3 Mathematical modeling of the cooperative driving environment 258<br/><br/>10.3.1 Awareness and perception data exchange 259<br/><br/>10.3.2 Utility of perception data in the driving environment 260<br/><br/>10.4 Multi-agent learning with DRL for selection and exchange of perception data 261<br/><br/>10.4.1 System design 262<br/><br/>10.4.2 Learning algorithm 263<br/><br/>10.5 Simulations, results and evaluations 265<br/><br/>10.5.1 Simulation tools, scenarios and parameters 265<br/><br/>10.5.2 Results and evaluations 266<br/><br/>10.6 Conclusion 269<br/><br/>10.7 References 270<br/><br/>Part 4 Securing Cooperative Intelligent Transport Systems 273<br/><br/>Chapter 11 Distance-Bounding Protocols 275<br/>David GÉRAULT, Pascal LAFOURCADE and Léo ROBERT<br/><br/>11.1 Introduction 276<br/><br/>11.2 Relations between threats for DB protocols 278<br/><br/>11.2.1 Threat models 278<br/><br/>11.2.2 Relation between different threat models 281<br/><br/>11.3 Overview of existing protocols 283<br/><br/>11.3.1 Improvement of attacks 284<br/><br/>11.3.2 Comparison of DB protocols 287<br/><br/>11.4 References 288<br/><br/>Chapter 12 Context-Aware Security and Privacy as a Service for the Connected and Autonomous Vehicle 295<br/>Tidiane SYLLA, Mohamed Aymen CHALOUF,Léo MENDIBOURE and Francine KRIEF<br/><br/>12.1 Introduction 295<br/><br/>12.2 Security, privacy and trust of connected and autonomous vehicle applications 297<br/><br/>12.2.1 Main applications of the connected and autonomous vehicle 297<br/><br/>12.2.2 Security, privacy and trust services for the connected and autonomous vehicle 300<br/><br/>12.3 Security and privacy architecture 303<br/><br/>12.3.1 Context-aware security and privacy 303<br/><br/>12.3.2 Gaps in existing solutions 305<br/><br/>12.3.3 Proposed solution 306<br/><br/>12.4 Self-adaptive selection of network access technologies 312<br/><br/>12.4.1 Infrastructure edge computing 313<br/><br/>12.4.2 Orchestration and placement of services 315<br/><br/>12.5 Main research works to be conducted 317<br/><br/>12.6 Conclusion 318<br/><br/>12.7 References 319<br/><br/>Chapter 13 Vehicular Wireless Communications: Risks and Detection of Attacks 321<br/>Jonathan VILLAIN, Virginie DENIAU and Christophe GRANSART<br/><br/>13.1 Introduction 321<br/><br/>13.2 General characteristics of wireless communications for connected vehicles 322<br/><br/>13.2.1 Challenges related to the connected vehicle 322<br/><br/>13.2.2 V2V communications 323<br/><br/>13.2.3 V2I communications 324<br/><br/>13.3 Characteristics of wireless communications 325<br/><br/>13.3.1 Principle of wireless communications 325<br/><br/>13.3.2 Long-range communications 325<br/><br/>13.3.3 Short-range communications 326<br/><br/>13.3.4 Advent of 5G 326<br/><br/>13.4 Susceptibility of communications and risks incurred 327<br/><br/>13.4.1 Principle of attacks targeting layers 1 and 2 of communication systems 327<br/><br/>13.4.2 Sybil attack 328<br/><br/>13.4.3 Deauthentication frame attack 328<br/><br/>13.4.4 Black-hole attack 329<br/><br/>13.4.5 Jamming attack 330<br/><br/>13.4.6 Flooding attack 331<br/><br/>13.4.7 Risks and performance indicators 331<br/><br/>13.5 Attack detection 332<br/><br/>13.5.1 Need for a detection system 332<br/><br/>13.5.2 Detection method 333<br/><br/>13.5.3 AI for detection 335<br/><br/>13.6 Conclusion 338<br/><br/>13.7 References 338<br/><br/>List of Authors 341<br/><br/>Index 345 |
520 ## - SUMMARY, ETC. |
Summary, etc |
The advent of the automated and connected vehicle will require the implementation of high-performance communication systems: Cooperative Intelligent Transport Systems (C-ITS). However, controlling and managing these C-ITS is complex. A number of points need to be jointly considered: 1) a high level of performance to guarantee the Quality of Service requirements of vehicular applications (latency, bandwidth, etc.); 2) a sufficient level of security to guarantee the correct operation of applications; and 3) the implementation of an architecture that guarantees interoperability between different communication systems. In response to these issues, this book presents new solutions for the management and control of Intelligent and Cooperative Transport Systems. The proposed solutions have different objectives, ranging from increased safety to higher levels of performance and the implementation of new, more energyefficient mechanisms. |
545 0# - BIOGRAPHICAL OR HISTORICAL DATA |
Biographical or historical note |
About the Author<br/>Léo Mendiboure is a Research Fellow in Computer Science at the Université Gustave Eiffel (COSYS-ERENA team), France. His research interests include future-generation networks, automated and connected vehicles, and data processing architectures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Intelligent transportation systems. |
Authority record control number |
https://id.loc.gov/authorities/subjects/sh93002804. |
655 #4 - INDEX TERM--GENRE/FORM |
Genre/form data or focus term |
Electronic books. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Sciences. Networks and communications. Network management and control. |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
https://onlinelibrary.wiley.com/doi/book/10.1002/9781394325849 |
Link text |
Full text is available at Wiley Online Library Click here to view |
942 ## - ADDED ENTRY ELEMENTS |
Source of classification or shelving scheme |
|
Item type |
EBOOK |