Title: Kohei OHTA
1Monitoring vehicles The potential and the
challenge
2Introduction
- Connect CARs with Internet
- Seamless connectivity
- Connect to World
- Connect to various personal equipments
- Many new technologies available
- MIPv6
- Auto configuration
- Ad-hoc networking
- Many NEW mobile applications for CARs
- Road service
- On-line customer service
3Probe Car project
- Develop new applications with car related
information like - Velocity, Acceleration
- GPS information
- Winker status
- Wiper status
- Etc
How to collect these information?
4Requirements for information collection from Cars
- Security
- Protect privacy information
- Standardization
- Naming
- Common scheme and methods the various types of
information - Transport protocol
- Tough transport protocol under wireless
environment - Efficiency
- High resolution and row bandwidth transport
5Security
- There are many privacy sensitive information in
cars - Geographical location
- Velocity
- Passengers
- Etc
- Strong security mechanism is required
- Encryption
- Authentication
- Access control
6Standardization
- Naming
- To support multi vendor environment, common
scheme to specify a information item. - For example, we have to be able to access vehicle
velocity from any vendors car with SAME method. - Transport
- Simple and tough transport protocol is suitable
for mobile wireless environment
7Efficiency
- Mobile wireless environment is worse than wired
network - Connectivity is NOT guaranteed at all
- There is less chance of stable connectivity
- The bandwidth is often narrow
- It is difficult to collect high resolution
information in such environment - UDP is preferable to TCP
- Effective aggregation for high resolution with
less bandwidth under unreliable line
8Applicability of SNMPv3 1
- Information collection in TCP/IP is
- Basic issue for network management
- That is already existing
- There are many management information for various
networked devices and applications, router,
switch, server, printer, and so on - Well standardized
9SNMPv3 has
- For Privacy
- DES/AES encryption support
- For authentication
- Multiple user support
- MD5/SHA1 digital signature
- Key management
- Different key management with single pass phrase
- For access control
- Allow access to iitsVehicleVelocity from center
ADeny access to iitsLongitude from service
center BDeny access to iitsLatude from service
center B - Strandardization
- Well standardized consistent naming scheme
- .1.3.6.1.4.1.282.16.108.1.3.3.3 iitsVehicleVelocit
y - Transport
- Connectionless UDP
- Per packet authentication/encryption
10Current configurations
Information collection center
Encrypted
A
IPv6
Information collection center
Velocity
B
Logitude
Latitude
Defined as MIB in ASN.1
Winker
Wiper status
11Polling and Trap
- There are two modes in SNMP to collect
information - Polling is good to collect periodic data
- Trap is good to notify a event
12For effectivenessSNMP Packet Payload
13Polling at small intervals
time
PDU SIZE 60 (length (Name) length(Value))
Length(Name) 12
length (Value) 6
60 (12 6 ) 1.08K bytes !!
14Time-based (History) Aggregation MO
MO n values of ifInOctets.1 interval I
PDU SIZE 60 length(Value))
length (Value) 6
60 6 360 bytes !!
15Evaluation - Data Retrieval Time
16Evaluation Management Traffic
17Evaluation - CPU Usage
18For reliable information collection
- Data collection with SNMP has been based on
Polling - Mobile node is often disappeared from data
collector because of the physical condition and
occasional shadowing. - Data collector can not know and control the
connectivity to mobile node. - Conventional polling based data collection no
longer work well.