Advertisement

Automotive virtual edge communicator (AVEC) with vehicular inter-agent service orchestration and resourcing (ViSOR)

  • Rebecca CopelandEmail author
  • Michael Copeland
  • Shohreh Ahvar
  • Noel Crespi
  • Oyunchimeg Shagdar
  • Romain Durand
"CfP: Techniques for Smart & Secure 5G Softwarized Networks”
  • 21 Downloads

Abstract

At time of crisis, relief teams must have assured connectivity, not only just within the team but also across different service agencies in the area. Since emergency agencies and essential services always send service cars to affected zones, advanced technologies and computing resources aboard these vehicles can be pooled together to boost network capacity temporarily, just where it is crucially needed. These vehicles become automotive virtual edge communicators (AVECs). They are managed by a vehicular inter-agency service orchestration and resourcing (ViSOR) system that creates transient proximity-based “trust circles” to manage novel cooperative hosting, opportunistic virtualization, and “car sourcing” of crisis zone data. This study evaluates the feasibility for this challenging but highly rewarding concept and identifies gaps in emerging technologies.

Keywords

MEC NFV PPDR MCS ITS Blockchain 

Notes

References

  1. 1.
    Copeland R, Ahvar S, Crespi N, Copeland M, Durand R, Duquerrois J-M, Paganelli F, Battisti F, Neri A (2018) Technology assessment for mission-critical services on automotive virtual edge communicator (AVEC). Conference on innovations in clouds, Internet and networksGoogle Scholar
  2. 2.
    Wood R (2013) Fixed internet traffic worldwide: forecasts and analysis 2013–2018. Analysys Mason Ltd, LondonGoogle Scholar
  3. 3.
    MEC deployment of mobile edge computing in an NFV environment. ETSI GR MEC 017 V1.1.1 (2018–02), pp 6,7Google Scholar
  4. 4.
    UL Transaction Security (2015) The future of SIM. https://library.ul.com/wp-content/uploads/sites/40/2015/05/The-future-of-SIM.pdf. Accessed 12 June 2019
  5. 5.
  6. 6.
    Copeland R, Copeland M (2017) Independently verifiable identity scheme (IVIS). Conference on Innovations in Clouds, Internet and Networks, pp 196–198Google Scholar
  7. 7.
    Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 3: Specifications of decentralized environmental notification basic service (2010) ETSI TS 102 637–3, V.1.1.1Google Scholar
  8. 8.
    Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 2: Specification of cooperative awareness basic service (2011) ETSI TS 102 637–2, V.1.2.1Google Scholar
  9. 9.
    Mobile edge computing (MEC) framework and reference architecture (2016) ETSI GS MEC 003 V1.1.1Google Scholar
  10. 10.
    Sciancalepore V, Giust F, Samdanis K, Yousaf Z (2016) A double-tier MEC-NFV architecture: design and optimisation. IEEE Conference on Standards for Communications and Networking (CSCN), pp 1–6Google Scholar
  11. 11.
    Gil Herrera J, Botero JF (2016) Resource allocation in NFV: a comprehensive survey. IEEE Trans Netw Serv Manag 13(3):518–532CrossRefGoogle Scholar
  12. 12.
    Mehraghdam S, Keller M, Holger K (2014) Specifying and placing chains of virtual network functions. IEEE 3rd International Conference on Cloud Networking (CloudNet), Luxembourg, pp 7–13Google Scholar
  13. 13.
    Dieye M, Ahvar S, Sahoo J, Ahvar E, Glitho R, Elbiaze H, Crespi N (2018) CPVNF: cost-efficient proactive VNF placement and chaining for value-added services in content delivery networks. IEEE Trans Netw Serv Manag 15:774–786CrossRefGoogle Scholar
  14. 14.
    Sadiq U, Kumar M, Passarella A, Conti M (2015) Service composition in opportunistic networks: a load and mobility aware solution. IEEE Trans Comput 64(8):2308–2322MathSciNetCrossRefzbMATHGoogle Scholar
  15. 15.
    Becchetti C, Frosali F, Lezaack E (2013) Transnational interoperability: a system framework for public protection and disaster relief. IEEE Veh Technol Mag 8(2):46–54CrossRefGoogle Scholar
  16. 16.
    5G Americas (2016) Network slicing for 5G networks and services. https://www.ericsson.com/en/networks/topics/network-slicing. Accessed 12 June 2019
  17. 17.
    Li T, Bai L (2011) Model of wireless telecommunications network infrastructure sharing & benefit-cost analysis. International conference on information management, innovation management and industrial engineering, Shenzhen, pp 102–105Google Scholar
  18. 18.
    Fantacci R, Gei F, Marabissi D, Micciullo L (2016) Public safety networks evolution toward broadband: sharing infrastructures and spectrum with commercial systems. IEEE Commun Mag 54(4):24–30CrossRefGoogle Scholar
  19. 19.
    Meireles R, Steenkiste P, Barros J, Moura DC (2016) LASP: look-ahead spatial protocol for vehicular multi-hop communication. IEEE Vehicular Networking Conference (VNC), Columbus, OH, pp 1–8Google Scholar
  20. 20.
    Copeland R (2015) Automotive context-aware policy system for car connectivity requests. IEEE International conference on intelligence in next generation networks, pp 128–135Google Scholar
  21. 21.
    Qiu H, Chen J, Jain S, Jiang Y, McCartney M, Kar G, Bai F, Grimm DK, Gruteser M, Govindan R (2018) Towards robust vehicular context sensing. IEEE Trans Veh Technol 67(3):1909–1922CrossRefGoogle Scholar
  22. 22.
    Shah SC, Nizamani QUA, Chaudhdary SH, Park MS (2012) An effective and robust two-phase resource allocation scheme for interdependent tasks. Mobile ad hoc computational grids, Journal of Parallel and Distributed Computing 72(12): pp 1664–1679, December 2012Google Scholar
  23. 23.
    Janczukowicz E, Braud A, Tuffin S, Fromentoux G, Bouabdallah A, Bonnin JM (2015) Specialized network services for WebRTC TURN-based architecture proposal. ACM 978-1-4503-3477-8/15/04Google Scholar
  24. 24.
    Punnoose RJ, Tseng RS, Wang S, Nikitin PV, Schlesinger TE, Stancil DD (2001) Communications resources management for advanced telematics applications. IEEE Intelligent Transportation Systems. Proceedings (Cat. No.01TH8585), Oakland, CA, pp 1056–1060Google Scholar
  25. 25.
    Das GK, Das S, Nandy SC, Sinha BP (2006) Efficient algorithm for placing a given number of base stations to cover a convex region. J Parallel Distrib Comput 66:1353–1358CrossRefzbMATHGoogle Scholar
  26. 26.
    Kobayashi K, Shishido H, Kameda Y, Kitahara I (2017) Method to generate disaster-damage map using 3D photometry and crowd sourcing. IEEE international conference on big dataGoogle Scholar

Copyright information

© Institut Mines-Télécom and Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Core Viewpoint LtdKenilworthUK
  2. 2.Institut Mines TelecomParisFrance
  3. 3.VeDeComVersaillesFrance
  4. 4.TransatelParisFrance

Personalised recommendations