A Survey of Vehicle to Everything (V2X) Testing
Total Page:16
File Type:pdf, Size:1020Kb
sensors Review A Survey of Vehicle to Everything (V2X) Testing Jian Wang 1,2,* , Yameng Shao 1,2, Yuming Ge 3 and Rundong Yu 3 1 College of Computer Science and Technology, Jilin University, Changchun 130012, China; [email protected] 2 Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University, Changchun 130012, China 3 Technology and Standards Research Institute, China Academy of Information and Communications Technology, Bejing 100191, China; [email protected] (Y.G.); [email protected] (R.Y.) * Correspondence: [email protected]; Tel.: +86-431-85159419; Fax: +86-431-85168337 Received: 17 December 2018; Accepted: 11 January 2019; Published: 15 January 2019 Abstract: Vehicle to everything (V2X) is a new generation of information and communication technologies that connect vehicles to everything. It not only creates a more comfortable and safer transportation environment, but also has much significance for improving traffic efficiency, and reducing pollution and accident rates. At present, the technology is still in the exploratory stage, and the problems of traffic safety and information security brought about by V2X applications have not yet been fully evaluated. Prior to marketization, we must ensure the reliability and maturity of the technology, which must be rigorously tested and verified. Therefore, testing is an important part of V2X technology. This article focuses on the V2X application requirements and its challenges, the need of testing. Then we also investigate and summarize the testing methods for V2X in the communication process and describe them in detail from the architectural perspective. In addition, we have proposed an end-to-end testing system combining virtual and real environments which can undertake the test task of the full protocol stack. Keywords: V2X; V2X testing; applications; requirements 1. Introduction The vehicle to everything (V2X) concept uses the latest generation of information and communication technology to realize omnidirectional vehicle to vehicle (V2V), vehicle to infrastructure (V2I), vehicle to pedestrian (V2P), and vehicle to network/cloud(V2N/V2C) network connections [1]. This technology links the various elements of transportation, such as pedestrians, vehicles, roads, and cloud environments. V2X not only can support vehicles to help them obtain more information and promote the innovation and application of automated driving technology, but also can contribute to building an intelligent transport system and promote the development of new modes and new forms of automobiles and transportation services [2]. It is of great significance for improving traffic efficiency, reducing pollution [3], saving resources, reducing the incidence of accidents, and improving traffic management [4]. Currently, there are two main types of communication technologies used for V2X: Dedicated Short Range Communication (DSRC) and Long Term Evolution for V2X (LTE-V2X). The DSRC system consists of a series of IEEE and SAE standards [5]. At the physical layer and the medium access control (MAC) layer, DSRC uses the 802.11p protocol [6], which simplifies authentication, associated processes, and data transmission before sending data, enabling vehicles to broadcast relevant security information directly to neighboring vehicles and pedestrians. The network architecture and security protocols are defined in IEEE 1609 WAVE [7–9]. At the application layer, SAE J2735 [10] defines the message format used for communication, and the J2945/x family of standards defines various scenarios Sensors 2019, 19, 334; doi:10.3390/s19020334 www.mdpi.com/journal/sensors Sensors 2019, 19 ,FOR 334 PEER REVIEW 2 of 202 standards defines various scenarios of V2X communication and its performance requirements. LTE-V2Xof V2X communication is a wireless communication and its performance technology requirements. for V2X with LTE-V2X high data is a wirelessrate and communicationcontrolled QoS [11,12],technology which for is V2X based with on highthe evolution data rate of and LTE controlled mobile communication QoS [11,12], which technology is based defined on the evolutionby 3GPP, includingof LTE mobile two communicationkinds of working technology modes of definedcellular bycommunication 3GPP, including (Uu) two and kinds direct of workingcommunication modes (PC5)of cellular [13–16]. communication The Uu mode (Uu) anduses direct the communicationexisting LTE cellular (PC5) [13network–16]. The to Uuimplement mode uses V2V the communicationexisting LTE cellular by forwarding network to implement(shown in Figure V2V communication 1a), and the PC5 by forwarding mode is similar (shown to in the Figure DSRC,1a), enablingand the PC5 direct mode communication is similar to thebetw DSRC,een vehicles enabling (shown direct communicationin Figure 1b) [17,18]. between Additionally, vehicles (shown the PC5 in interfaceFigure1b) has [ 17 ,18been]. Additionally, enhanced in the many PC5 interfaceaspects hasto accommodate been enhanced exchanges in many aspects of rapidly to accommodate changing dynamicexchanges information of rapidly changing (position, dynamic speed, information driving dire (position,ction, etc.) speed, and driving future direction,advanced etc.) V2X and services future (automaticadvanced V2X driving, services vehicle (automatic platooning, driving, sensor vehicle sharing, platooning, etc.) [19]. sensor sharing, etc.) [19]. E-UTRAN E-UTRAN UL DL SL (a) (b) Figure 1. LTE-V2X Communication Modes. (a) (a) Uu mode for LTE-V2X ((b)b) PC5 mode for LTE-V2X LTE-V2X. The application of V2X involves many aspects, such as intelligent transportation, intelligent connected vehicles,vehicles, andand automatedautomated driving driving [ 20[20].]. Di Difffferenterent applications applications have have di ffdifferenterent requirements requirements for forlatency, latency, reliability, reliability, throughput, throughput, user density, user density, and safety and of safety the V2X of environment the V2X environment [21]. Safety applications[21]. Safety applicationsand automated and driving automated require driving extremely require low latencyextremely and alow secure latency network and environmenta secure network [22,23]. environmentFor example, vehicles[22,23]. For usually example, spend vehicles most of usually their time spend moving most at of high their speed time and moving malicious at high attackers speed andcould malicious cause serious attackers traffi ccould accidents cause by serious broadcasting traffic falseaccidents messages. by broadcasting Malicious attackers false messages. may also Maliciousobtain a vehicle attackers owner’s may identity also obtain information, a vehicle vehicle owner’s location identity information, information, driving trajectory,vehicle location and so information,on by interception driving of datatrajectory, packets and [24 ].so This on by violates interc usereption privacy. of data The packets V2X data [24]. includes This violates information user privacy.about roads The and V2X geography, data includes which information relates to national about roads security. and Therefore, geography, security which is relates the top to priority national for security.V2X [25]. Therefore, security is the top priority for V2X [25]. Testing is an important mean to ensure thethe safetysafety andand securitysecurity ofof aa vehicle.vehicle. The V2X test is conducted toto identifyidentify specificationspecification flaws, flaws, design design flaws, flaws, and and implementation implementation defects defects over over the the entire entire life lifecycle, cycle, and toand determine to determine the root the cause root ofcause the problem of the problem [26]. Modeling, [26]. Modeling, analyzing, analyzing, testing, and testing, evaluating and evaluatingthe security the threats security to V2X threats can helpto V2X to improvecan help theto improve security protectionthe security capabilities protection ofcapabilities vehicles and of vehiclespromote and the constructionpromote the ofconstructi vehicle securityon of vehicle systems. security In addition, systems. by In carrying addition, out by testing carrying forV2X, out testingwe can pavefor V2X, the waywe can for thepave commercialization the way for the ofcommercialization automatic driving of and automatic other applications. driving and other applications.The structure of this paper is as follows: Section2 summarizes the types of V2X applications. SectionThe3 analyzesstructure latencyof this /paperreliability is as challenges follows: Section and security 2 summarizes challenges the and types summarizes of V2X applications. the possible Sectionsecurity threats.3 analyzes Section latency/reliability4 describes why challenges we need to doand V2X security tests and challenges which types and of summarizes tests should wethe possibledo. Section security5 lists andthreats. briefly Section analyzes 4 describes the test why objectives we need and to test do methods V2X tests of and V2X. which Section types6 proposes of tests shouldan end-to-end we do. Section testing system5 lists and combining briefly analyzes virtual and the realtest environmentsobjectives and whichtest methods can undertake of V2X. Section the test 6task proposes of the full an protocolend-to-end stack. testing system combining virtual and real environments which can undertake the test task of the full protocol stack. 2. V2X Applications 2. V2XThe Applications V2X represents a new cross-industry event involving automobiles, transportation, communications,The