Collision avoidance in 5G using MEC and NFV: The vulnerable road user safety use case

被引:19
|
作者
Barmpounakis, Sokratis [1 ]
Tsiatsios, George [1 ]
Papadakis, Michael [1 ]
Mitsianis, Evangelos [1 ]
Koursioumpas, Nikolaos [1 ]
Alonistioti, Nancy [1 ]
机构
[1] Natl & Kapodistrian Univ Athens, Dept Informat & Telecommun, Athens, Greece
基金
欧盟地平线“2020”;
关键词
5G; Collision avoidance; Multiple access edge computing; Mobile edge computing; Network function virtualization; Trajectory prediction; NETWORKS;
D O I
10.1016/j.comnet.2020.107150
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Automotive is considered one of the driving use cases for the 5th Generation (5G) systems, which currently formulates numerous scenarios and Key Performance Indicators (KPIs), via advanced Vehicle-to-everything (V2X) services and applications. Minimum end-to-end delay, as well as advanced contextual awareness requirements, pose novel architectural and functional challenges. This paper exploits two key enablers, namely Multiple Access/Mobile Edge Computing (MEC) and Network Function Virtualization (NFV), and acts in a two-fold manner: Firstly, it proposes a hybrid architecture for 5G systems, which exploits the afore-mentioned technologies, and performs computing resources' selection among MEC and/or centralized, cloud-based resources (as VNFs), towards efficient service orchestration. The second contribution of this paper is a novel V2X service and algorithm, namely VRU-safe, that operates on top of the proposed architecture. VRU-Safe is an efficient, lightweight, low time complexity scheme, capable of identifying and predicting potential imminent road hazards between moving vehicles and Vulnerable Road Users (VRUs). The performance and viability of the proposed solutions are evaluated in a real-world 5G testbed in Europe.
引用
收藏
页数:14
相关论文
共 12 条
  • [1] Deep Learning based Vulnerable Road User Detection and Collision Avoidance
    Maurya, Swadesh Kumar
    Choudhary, Ayesha
    2018 IEEE INTERNATIONAL CONFERENCE ON VEHICULAR ELECTRONICS AND SAFETY (ICVES 2018), 2018,
  • [2] Deep-Reinforcement-Learning-Based Collision Avoidance of Autonomous Driving System for Vulnerable Road User Safety
    Chen, Haochong
    Cao, Xincheng
    Guvenc, Levent
    Aksun-Guvenc, Bilin
    ELECTRONICS, 2024, 13 (10)
  • [3] Dynamic resource allocation for URLLC and eMBB in MEC-NFV 5G networks
    Souza, Caio
    Falcao, Marcos
    Balieiro, Andson
    Alves, Elton
    Taleb, Tarik
    COMPUTER NETWORKS, 2025, 260
  • [4] 5G Based Collision Avoidance - Benefit from Unobtrusive Activities
    Jahn, Andreas
    Morold, Michel
    David, Klaus
    2018 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC), 2018, : 352 - 356
  • [5] Verticals in 5G MEC-Use Cases and Security Challenges
    Nowak, Tomasz W.
    Sepczuk, Mariusz
    Kotulski, Zbigniew
    Niewolski, Wojciech
    Artych, Rafal
    Bocianiak, Krzysztof
    Osko, Tomasz
    Wary, Jean-Philippe
    IEEE ACCESS, 2021, 9 : 87251 - 87298
  • [6] DPM-NFV: Dynamic Power Management Framework for 5G User Plane Function using Bayesian Optimization
    Sydir, Jaroslaw
    Li, Bin
    Mercati, Pietro
    Tai, Charlie
    Iyer, Ravi
    Kishinevsky, Michael
    Serafimov, Boris
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 4099 - 4105
  • [7] Ultra-Reliable NFV-based 5G Networks using Diversity and Network Coding
    Siasi, Nazli
    Sulieman, Nabeel I.
    Gitlin, Richard D.
    2018 IEEE 19TH WIRELESS AND MICROWAVE TECHNOLOGY CONFERENCE (WAMICON), 2018,
  • [8] Detection Collision Flows in SDN Based 5G Using Machine Learning Algorithms
    Aqdus, Aqsa
    Amin, Rashid
    Ramzan, Sadia
    Alshamrani, Sultan S.
    Alshehri, Abdullah
    El-kenawy, El-Sayed M.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (01): : 1413 - 1435
  • [9] 5G-enabled V2X communications for vulnerable road users safety applications: a review
    Zoghlami, Chaima
    Kacimi, Rahim
    Dhaou, Riadh
    WIRELESS NETWORKS, 2023, 29 (03) : 1237 - 1267
  • [10] Benchmarking and Profiling 5G Verticals' Applications: an Industrial IoT Use Case
    Zafeiropoulos, Anastasios
    Fotopoulou, Eleni
    Peuster, Manuel
    Schneider, Stefan
    Gouvas, Panagiotis
    Behnke, Daniel
    Mueller, Marcel
    Boek, Patrick-Benjamin
    Trakadas, Panagiotis
    Karkazis, Panagiotis
    Karl, Holger
    PROCEEDINGS OF THE 2020 6TH IEEE CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2020): BRIDGING THE GAP BETWEEN AI AND NETWORK SOFTWARIZATION, 2020, : 310 - 318