1. Field of the Invention
This invention relates generally to a system and method for authenticating a message sent from one vehicle to another vehicle and, more particularly, to a system and method for authenticating a message sent from one vehicle to another vehicle, where the system and method employ real-time kinematic (RTK) positioning in a validation process using raw GPS data received by the one vehicle that is transmitted from the one vehicle to the other vehicle with the message.
2. Discussion of the Related Art
Traffic accidents and roadway congestion are significant problems for vehicle travel. Vehicular ad-hoc network based active safety and driver assistance systems are known that allow a vehicle communications system to transmit messages to other vehicles in a particular area with warning messages about dangerous road conditions, driving events, accidents, etc. In these systems, multi-hop geocast routing protocols, known to those skilled in the art, are commonly used to extend the reachability of the warning messages, i.e., to deliver active messages to vehicles that may be a few kilometers away from the road condition, as a one-time multi-hop transmission process. In other words, an initial message advising drivers of a potential hazardous road condition is transferred from vehicle to vehicle using the geocast routing protocol so that vehicles a significant distance away will receive the messages because one vehicle's transmission distance is typically relatively short.
Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I), collectively known as V2X, communications systems of the type being described herein require a minimum of one entity to send information to another entity. For example, many vehicle-to-vehicle safety applications can be executed on one vehicle by simply receiving broadcast messages from a neighboring vehicle. These messages are not directed to any specific vehicle, but are meant to be shared with a vehicle population to support the safety application. In these types of applications, where collision avoidance is desirable, as two or more vehicles talk to each other and a collision becomes probable, the vehicle systems can warn the vehicle drivers, or possibly take evasive action for the driver, such as applying the brakes. Likewise, traffic control units can observe the broadcast of information and generate statistics on traffic flow through a given intersection or roadway.
It is desirable to ensure the validity of a message sent from a vehicle in a V2X system so that the vehicle receiving the message will know that it is authentic. Particularly, it is generally necessary that the information received from a vehicle in these types of vehicle-o-vehicle communications system is reliable to ensure that a vehicle is not attempting to broadcast malicious information that could result in harmful activity, such as a vehicle collision. One current solution for providing trust of the information broadcasted is by transmitting public keys, referred to as public key infrastructure (PKI), so that a vehicle that transmits a certain key is identified as a trusted source. However, transmitting a key between vehicles for identification purposes has a number of drawbacks particularly in system scalability. For example, the number of vehicles that may participate in a vehicle-to-vehicle communications system could exceed 250,000,000 vehicles in the United States alone. Also, the transmission of the key has limitations as to its timeliness of access to the PKI while on the road, the availability of the PKI from anywhere, the bandwidth to the PKI for simultaneous access and the computations needed for PKI certification, reissuance, etc.
GPS measurements contain errors caused by the satellite clock, orbit errors, environmental errors, such as tropospheric and ionospheric delays, user equipment errors, such as clock errors, etc. In order to correct these errors, RTK positioning, well known to those skilled in the art, is used between receiver and satellite to provide difference measurements for relative positioning. Particularly, when measurements to the same satellite by two users are differenced, all satellite and environmental errors are eliminated depending on how close the users are. When measurements to two satellites by the same user are differenced, all user equipment errors are eliminated. RTK techniques use carrier phase measurements as range measurements are too noisy for differencing where error cancelation benefits are less than noise amplification in differencing.
In accordance with the teachings of the present invention, a system and method are disclosed for authenticating a message transmitted in a vehicle-to-vehicle communications system. The sending vehicle will attach raw GPS data to a transmitted message it receives from GPS satellites that the sending vehicle uses to determine its own position. The transmitted message will also include the position of the sending vehicle that the sending vehicle has determined using the GPS data. The receiving vehicle will use the raw GPS data in the message and an RTK process to determine the position of the sending vehicle. The receiving vehicle will compare the position of the sending vehicle in the message with the position of the sending vehicle determined from the GPS data, and if they match, will authenticate the received message.
Additional features of the present invention will become apparent from the following description and appended claims, taken in conjunction with the accompanying drawings.
The following discussion of the embodiments of the invention directed to a dedicated short range communications system for vehicle communications that employs a technique for using raw GPS measurements to validate a sending vehicles message is merely exemplary in nature, and is in no way intended to limit the invention or its applications or uses.
According to the invention, the message 26 also includes a raw GPS measurement portion 30 that the vehicle 12 received by its GPS receiver 22. As is understood in the art, these GPS signals will typically include a time-marked ranging code, a carrier wave and navigation data containing satellite and environment related information. The GPS receivers 22 and 24 track and measure carrier phase to read the ranging code, and the user-to-satellite range is measured once the code is read. Typical range measurement accuracy with random noise code is 1-2 meters, and a receiver location is estimated using four or more range codes. Typical user accuracy can be achieved of about 2-10 meters.
The raw GPS measurement portion 30 in the message 26 received by the vehicle 16 can then be used to process an RTK solution that includes the position, velocity, acceleration and heading of the vehicle 12 in the same manner that the vehicle 12 used the same raw GPS data to calculate this information. The vehicle 16 can compare the calculated position of the vehicle 12 to the position of the vehicle 12 provided in the V2V data portion 28 that the user has calculated from the GPS raw measurement data to define its position. If these two positions do not match within a certain threshold, then the vehicle 16 will know that the vehicle 12 is not broadcasting its accurate position, whether intentional or not. Therefore, the vehicle 16 can assume that other information in the data portion 28 is invalid, and can take suitable action, such as disregard the message, notify the driver that the message may be inaccurate, etc.
The calculated position of the sending vehicle is sent to an RTK-based security manager 76 along with the data message 74, where the manager 76 compares the calculated position, velocity, acceleration and heading of the sending vehicle by the engine 66 with the stated position, velocity, acceleration and heading of the sending vehicle in the message 74 to determine whether they are within some threshold. The difference between the calculated position of the sending vehicle and the stated position of the sending vehicle is determined by a validation processor 78 that compares the difference to some threshold. The validation processor 78 notifies a V2X applications processor 80 on the receiving vehicle as to whether the data message 74 is authentic. For various applications, the V2X applications processor 80 on the receiving vehicle can use the data message 74 in different manners, assuming the validation processor 78 determines that the message is invalid. These applications can include warning the driver of braking activity or not depending on whether the message is determined to be valid.
V2V applications typically have fast validation response needs generally ranging from 1-3 seconds, as shown by Table 1 below. The proposed method of using the GPS raw measurements, as discussed above, can provide a 50% confidence that the sending vehicle is sending a valid message within 1.5 seconds and a 95% confidence that the sending vehicle is sending a valid message in 4 seconds using current GPS RTK systems. These statistics are presented only to reflect the capabilities of the current state of the art where the time required is expected to considerable shorten with the use of multiple frequency GPS and using other Global navigation Satellite System (GNSS) signals.
The present invention offers a number of advantages for authenticating a message in a vehicle-to-vehicle communications system. For example, raw GPS data is impossible to fabricate and therefore a reliable source of data for security against data alterations and fabrication. Further, raw GPS data is already shared for relative positioning in several OEM collaborative projects and therefore likely will become standard. Raw GPS data is used for two extremely important functions, namely, precise relative position using RTK and sender information validation for security. Because of the dual use, more resources, i.e., processing power and communication bandwidth, can be dedicated for RTK with benefits from better positioning accuracy and reliable security.
The foregoing discussion discloses and describes merely exemplary embodiments of the present invention. One skilled in the art will readily recognize from such discussion and from the accompanying drawings and claims that various changes, modifications and variations can be made therein without departing from the spirit and scope of the invention as defined in the following claims.