Cooperative intelligent transport systems : (Record no. 91978)

000 -LEADER
fixed length control field 13628cam a2200433 i 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250820114746.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu---unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250820t20242024enkm o u000 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781789451801
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1394325827
Qualifying information electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1394325843
Qualifying information electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781394325825
Qualifying information electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781394325849
Qualifying information electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 1789451809
Qualifying information hardcover
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9781789451801
Qualifying information hardcover
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1458442273
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TE228.3
Item number .C66 2024
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 388.3/12
Edition number 23/eng/20241017
245 00 - TITLE STATEMENT
Title Cooperative intelligent transport systems :
Remainder of title control and management /
Statement of responsibility, etc coordinated by L�eo Mendiboure.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc London, UK :
Name of publisher, distributor, etc ISTE Ltd ;
Place of publication, distribution, etc Hoboken, NJ :
Name of publisher, distributor, etc John Wiley & Sons, Inc.,
Date of publication, distribution, etc 2024.
264 #4 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Date of publication, distribution, etc ©2024.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent.
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia.
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier.
340 ## - PHYSICAL MEDIUM
Source rdacc
Authority record control number or standard number http://rdaregistry.info/termList/RDAColourContent/1003.
490 1# - SERIES STATEMENT
Series statement Sciences. Networks and communications. Network management and control.
505 0# - CONTENTS
Formatted contents note Table of Contents<br/>Preface xiii<br/>Léo MENDIBOURE<br/><br/>Part 1 Introduction to Cooperative Intelligent Transport Systems 1<br/><br/>Chapter 1 Local Interactions for Cooperative ITS: Opportunities and Constraints 3<br/>Jean-Marie BONNIN and Christophe COUTURIER<br/><br/>1.1 Introduction 3<br/><br/>1.2 Ephemeral local interactions: concept and examples 5<br/><br/>1.2.1 Examples of services using ephemeral local interactions 5<br/><br/>1.2.2 Characteristics of ephemeral local interactions 6<br/><br/>1.2.3 Advantages of ephemeral local interactions 8<br/><br/>1.2.4 Suitability of communication technologies for this type of interaction 10<br/><br/>1.3 Local interactions serving cooperative ITS 13<br/><br/>1.3.1 Cooperative ITS services 13<br/><br/>1.3.2 Benefit of ephemeral local interactions for cooperative ITS 14<br/><br/>1.3.3 V2X communication technologies 16<br/><br/>1.3.4 Properties of C-ITS services built on local interactions 18<br/><br/>1.3.5 Limitations and constraints of implementing services built on local interactions 22<br/><br/>1.4 Role of infrastructure in cooperative ITS services 26<br/><br/>1.4.1 Infrastructures dedicated to cooperative ITS 26<br/><br/>1.4.2 Towards an active infrastructure 28<br/><br/>1.5 Conclusion and prospects 29<br/><br/>1.6 References 30<br/><br/>Chapter 2 Evolution of Use Cases for Intelligent Transport Systems 33<br/>Sassi MAALOUL, Hasnaâ ANISS, Marion BERBINEAU and Léo MENDIBOURE<br/><br/>2.1 Introduction 33<br/><br/>2.2 Vehicular communication technologies 34<br/><br/>2.2.1 ITS-G5/IEEE 802.11p technology 35<br/><br/>2.2.2 The 3GPP standard: C-V2X 36<br/><br/>2.2.3 Deployment of ITS technologies 37<br/><br/>2.3 Evolution of use cases 37<br/><br/>2.3.1 Classification of use cases 38<br/><br/>2.3.2 Required performance 40<br/><br/>2.3.3 Example of use cases 41<br/><br/>2.4 Challenges and future services of V2X 48<br/><br/>2.5 Conclusion 49<br/><br/>2.6 References 49<br/><br/>Part 2 Optimization of Data Transmission for Cooperative Intelligent Transport Systems 51<br/><br/>Chapter 3 Towards an Optimization of Data Transmission in Cooperative Intelligent Transport Systems 53<br/>Mohamed BENZAGOUTA, Ramzi BOUTAHALA, Secil ERCAN, Sassi MAALOUL, Hasnaâ ANISS, Léo MENDIBOURE, Marwane AYAIDA and Hacène FOUCHAL<br/><br/>3.1 Introduction 53<br/><br/>3.2 Context 55<br/><br/>3.2.1 C-ITS Services 55<br/><br/>3.2.2 Communication standards 56<br/><br/>3.3 Experimental evaluation of the performance of the C-ITS message broadcasting system 58<br/><br/>3.3.1 C-Roads France project and COOPITS application 58<br/><br/>3.3.2 Experimental environment and measurements 60<br/><br/>3.3.3 Analysis of results 61<br/><br/>3.4 Discussion of the main causes 65<br/><br/>3.4.1 Absence of adaptation to actual conditions 66<br/><br/>3.4.2 Duplication of non-scalable information 66<br/><br/>3.4.3 Broadcasting of information in wide geographical areas 66<br/><br/>3.4.4 High level of security in relation to the risks involved 67<br/><br/>3.5 Recommendations and research avenues 70<br/><br/>3.5.1 Differentiation by traffic conditions 70<br/><br/>3.5.2 Smart broadcasting of constant messages 70<br/><br/>3.5.3 Smart definition of message broadcast areas 70<br/><br/>3.5.4 Security-level optimization 71<br/><br/>3.6 Conclusion 71<br/><br/>3.7 Acknowledgments 72<br/><br/>3.8 References 72<br/><br/>Chapter 4 Efficient Hybridization of C-ITS Communication Technologies 75<br/>Badreddine Yacine YACHEUR, Toufik AHMED and Mohamed MOSBAH<br/><br/>4.1 Introduction 75<br/><br/>4.2 Related works 77<br/><br/>4.3 Definition of a heterogeneous network architecture and design of a protocol stack 79<br/><br/>4.4 RL for selecting the mode of communication 81<br/><br/>4.4.1 Deep reinforcement learning 82<br/><br/>4.4.2 Correspondence with key elements of reinforcement learning 82<br/><br/>4.5 Performance evaluation 87<br/><br/>4.5.1 Simulation framework and scenario 87<br/><br/>4.5.2 DDQL algorithm parameters 89<br/><br/>4.5.3 Simulation results 90<br/><br/>4.6 Conclusion 93<br/><br/>4.7 References 93<br/><br/>Chapter 5 Using SDN Technology to Control C-ITS: Towards Decentralized Approaches 97<br/>Romain DULOUT, Lylia ALOUACHE, Tidiane SYLLA, Léo MENDIBOURE, Hasnaâ ANISS, Virginie DENIAU and Yannis POUSSET<br/><br/>5.1 Introduction 97<br/><br/>5.2 Context 99<br/><br/>5.2.1 SDN-controlled C-ITS architectures (SDVN) 99<br/><br/>5.2.2 Blockchain technology 101<br/><br/>5.3 Application of Blockchain to SDVN architectures 103<br/><br/>5.4 Optimization of Blockchain technology for SDVN architectures 106<br/><br/>5.4.1 New architectures 107<br/><br/>5.4.2 New mechanisms 108<br/><br/>5.5 Future research avenues 109<br/><br/>5.5.1 Optimal positioning of Blockchain nodes 109<br/><br/>5.5.2 Energy consumption reduction 109<br/><br/>5.5.3 Integration of AI and Blockchain 110<br/><br/>5.5.4 A more complete integration between SDN and Blockchain 110<br/><br/>5.6 Conclusion 111<br/><br/>5.7 References 112<br/><br/>Chapter 6 Application of Network Slicing in C-ITS Systems 115<br/>Abdennour RACHEDI, Toufik AHMED and Mohamed MOSBAH<br/><br/>6.1 Introduction 115<br/><br/>6.2 Vehicle-to-everything (V2X) communications 116<br/><br/>6.3 Presentation of V2X technologies 118<br/><br/>6.3.1 Its-g5 119<br/><br/>6.3.2 Lte-v2x 121<br/><br/>6.3.3 5g-v2x 123<br/><br/>6.4 Network slicing for 5G-V2X 125<br/><br/>6.4.1 Network slicing for C-V2X 126<br/><br/>6.4.2 ITS-G5 network slicing 128<br/><br/>6.5 Conclusion 138<br/><br/>6.6 References 138<br/><br/>Part 3 New Approaches to Data Processing in Cooperative Intelligent Transport Systems 141<br/><br/>Chapter 7 A Novel Cloud Approach for Connected Vehicles 143<br/>Geoffrey WILHEM, Marwane AYAIDA and Hacène FOUCHAL<br/><br/>7.1 Introduction 143<br/><br/>7.2 State of the art 144<br/><br/>7.2.1 ETSI standards for C-ITSs 145<br/><br/>7.2.2 Vehicular cloud computing 146<br/><br/>7.2.3 Information-centric networking 147<br/><br/>7.3 The GeoVCDN approach 150<br/><br/>7.3.1 A centralized context-cloud architecture 150<br/><br/>7.3.2 Geographic routing ICN protocol 153<br/><br/>7.3.3 Discussion 160<br/><br/>7.4 Analytical model 160<br/><br/>7.4.1 Description of the model 161<br/><br/>7.4.2 Network modeling 161<br/><br/>7.4.3 Communication environment modeling 164<br/><br/>7.4.4 Message dissemination modeling 165<br/><br/>7.4.5 Approaches 173<br/><br/>7.4.6 Discussion 179<br/><br/>7.5 Evaluation 180<br/><br/>7.5.1 Simulator description 180<br/><br/>7.5.2 Simulation results for network load 182<br/><br/>7.6 Simulation results for data utility 186<br/><br/>7.6.1 Simulation results for data validity 186<br/><br/>7.6.2 Simulation results for data freshness 187<br/><br/>7.6.3 Discussion of the simulation 191<br/><br/>7.7 Use case study 191<br/><br/>7.7.1 Scenario 192<br/><br/>7.7.2 Discussion 194<br/><br/>7.8 Conclusion 195<br/><br/>7.9 Acknowledgment 196<br/><br/>7.10 References 196<br/><br/>Chapter 8 Optimal Placement of Edge Servers in C-ITS Systems 199<br/>Sabri KHAMARI, Toufik AHMED and Mohamed MOSBAH<br/><br/>8.1 Introduction 199<br/><br/>8.2 Context 201<br/><br/>8.2.1 Vehicular applications 201<br/><br/>8.2.2 Multi-access edge computing (MEC) 201<br/><br/>8.2.3 Deployment of MEC systems 201<br/><br/>8.3 State of the art 202<br/><br/>8.4 OptPlacement: efficient edge server placement 203<br/><br/>8.4.1 System modeling 204<br/><br/>8.4.2 Methodology and simulation 208<br/><br/>8.4.3 Performance evaluation 213<br/><br/>8.5 Conclusion 218<br/><br/>8.6 References 219<br/><br/>Chapter 9 Risk Estimation: A Necessity for the Connected Autonomous Vehicle 223<br/>Dominique GRUYER, Sio-Song IENG, Sébastien GLASER,Sébastien DEMMEL, Charles TATKEU and Sabrine BELMEKKI<br/><br/>9.1 Context and objectives 223<br/><br/>9.2 Estimation of risk local to the ego-vehicle: some existing metrics 226<br/><br/>9.3. Development of communication strategy to extend risk: CBL and CBL-G 232<br/><br/>9.4 Computation of cooperative risks: extended local risk and global risk 234<br/><br/>9.5 Impact of global risk and anticipation of risky situations 236<br/><br/>9.6 Discussion 242<br/><br/>9.7 Conclusion and prospects 246<br/><br/>9.8 References 247<br/><br/>Chapter 10 Resilience of Collective Perception in C-ITS – Deep Multi-Agent Reinforcement Learning 251<br/>Imed GHNAYA, Hasnaâ ANISS, Marion BERBINEAU,Mohamed MOSBAH and Toufik AHMED<br/><br/>10.1 Introduction 252<br/><br/>10.1.1 Background and issue 252<br/><br/>10.1.2 Motivation and contribution 253<br/><br/>10.2 State of the art 255<br/><br/>10.2.1 Standardization of collective perception by ETSI 256<br/><br/>10.2.2 Perception data selection and exchange techniques 257<br/><br/>10.3 Mathematical modeling of the cooperative driving environment 258<br/><br/>10.3.1 Awareness and perception data exchange 259<br/><br/>10.3.2 Utility of perception data in the driving environment 260<br/><br/>10.4 Multi-agent learning with DRL for selection and exchange of perception data 261<br/><br/>10.4.1 System design 262<br/><br/>10.4.2 Learning algorithm 263<br/><br/>10.5 Simulations, results and evaluations 265<br/><br/>10.5.1 Simulation tools, scenarios and parameters 265<br/><br/>10.5.2 Results and evaluations 266<br/><br/>10.6 Conclusion 269<br/><br/>10.7 References 270<br/><br/>Part 4 Securing Cooperative Intelligent Transport Systems 273<br/><br/>Chapter 11 Distance-Bounding Protocols 275<br/>David GÉRAULT, Pascal LAFOURCADE and Léo ROBERT<br/><br/>11.1 Introduction 276<br/><br/>11.2 Relations between threats for DB protocols 278<br/><br/>11.2.1 Threat models 278<br/><br/>11.2.2 Relation between different threat models 281<br/><br/>11.3 Overview of existing protocols 283<br/><br/>11.3.1 Improvement of attacks 284<br/><br/>11.3.2 Comparison of DB protocols 287<br/><br/>11.4 References 288<br/><br/>Chapter 12 Context-Aware Security and Privacy as a Service for the Connected and Autonomous Vehicle 295<br/>Tidiane SYLLA, Mohamed Aymen CHALOUF,Léo MENDIBOURE and Francine KRIEF<br/><br/>12.1 Introduction 295<br/><br/>12.2 Security, privacy and trust of connected and autonomous vehicle applications 297<br/><br/>12.2.1 Main applications of the connected and autonomous vehicle 297<br/><br/>12.2.2 Security, privacy and trust services for the connected and autonomous vehicle 300<br/><br/>12.3 Security and privacy architecture 303<br/><br/>12.3.1 Context-aware security and privacy 303<br/><br/>12.3.2 Gaps in existing solutions 305<br/><br/>12.3.3 Proposed solution 306<br/><br/>12.4 Self-adaptive selection of network access technologies 312<br/><br/>12.4.1 Infrastructure edge computing 313<br/><br/>12.4.2 Orchestration and placement of services 315<br/><br/>12.5 Main research works to be conducted 317<br/><br/>12.6 Conclusion 318<br/><br/>12.7 References 319<br/><br/>Chapter 13 Vehicular Wireless Communications: Risks and Detection of Attacks 321<br/>Jonathan VILLAIN, Virginie DENIAU and Christophe GRANSART<br/><br/>13.1 Introduction 321<br/><br/>13.2 General characteristics of wireless communications for connected vehicles 322<br/><br/>13.2.1 Challenges related to the connected vehicle 322<br/><br/>13.2.2 V2V communications 323<br/><br/>13.2.3 V2I communications 324<br/><br/>13.3 Characteristics of wireless communications 325<br/><br/>13.3.1 Principle of wireless communications 325<br/><br/>13.3.2 Long-range communications 325<br/><br/>13.3.3 Short-range communications 326<br/><br/>13.3.4 Advent of 5G 326<br/><br/>13.4 Susceptibility of communications and risks incurred 327<br/><br/>13.4.1 Principle of attacks targeting layers 1 and 2 of communication systems 327<br/><br/>13.4.2 Sybil attack 328<br/><br/>13.4.3 Deauthentication frame attack 328<br/><br/>13.4.4 Black-hole attack 329<br/><br/>13.4.5 Jamming attack 330<br/><br/>13.4.6 Flooding attack 331<br/><br/>13.4.7 Risks and performance indicators 331<br/><br/>13.5 Attack detection 332<br/><br/>13.5.1 Need for a detection system 332<br/><br/>13.5.2 Detection method 333<br/><br/>13.5.3 AI for detection 335<br/><br/>13.6 Conclusion 338<br/><br/>13.7 References 338<br/><br/>List of Authors 341<br/><br/>Index 345
520 ## - SUMMARY, ETC.
Summary, etc The advent of the automated and connected vehicle will require the implementation of high-performance communication systems: Cooperative Intelligent Transport Systems (C-ITS). However, controlling and managing these C-ITS is complex. A number of points need to be jointly considered: 1) a high level of performance to guarantee the Quality of Service requirements of vehicular applications (latency, bandwidth, etc.); 2) a sufficient level of security to guarantee the correct operation of applications; and 3) the implementation of an architecture that guarantees interoperability between different communication systems. In response to these issues, this book presents new solutions for the management and control of Intelligent and Cooperative Transport Systems. The proposed solutions have different objectives, ranging from increased safety to higher levels of performance and the implementation of new, more energyefficient mechanisms.
545 0# - BIOGRAPHICAL OR HISTORICAL DATA
Biographical or historical note About the Author<br/>Léo Mendiboure is a Research Fellow in Computer Science at the Université Gustave Eiffel (COSYS-ERENA team), France. His research interests include future-generation networks, automated and connected vehicles, and data processing architectures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Intelligent transportation systems.
Authority record control number https://id.loc.gov/authorities/subjects/sh93002804.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Sciences. Networks and communications. Network management and control.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://onlinelibrary.wiley.com/doi/book/10.1002/9781394325849
Link text Full text is available at Wiley Online Library Click here to view
942 ## - ADDED ENTRY ELEMENTS
Source of classification or shelving scheme
Item type EBOOK
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Date acquired Source of acquisition Full call number Date last seen Price effective from Item type
          COLLEGE LIBRARY COLLEGE LIBRARY 2025-08-20 ALBASA Consortium 388.3/12 2025-08-20 2025-08-20 EBOOK