Learn More
Under the Connected Vehicles (CV) environment, it is possible to create a Cooperative Vehicle Intersection Control (CVIC) system that enables cooperation between vehicles and infrastructure for effective intersection operations and management when all vehicles are fully automated. Assuming such a CVIC environment, this paper proposed a CVIC algorithm that(More)
Present a suite of new attacks, called Raptor attacks, that can be launched by Autonomous Systems (ASes) to compromise user anonymity over the Tor network. Design and build countermeasures to defend against active routing attacks on Tor. We propose a new relay selection algorithm to proactively protect Tor users from being affected in an active attack, and(More)
This paper investigates the wireless communications performance of Cooperative Vehicle Intersection Control (CVIC) powered by the Connected Vehicle (CV) environment. Considering the CV communication standards defined in IEEE 802.11p, IEEE 1609, and SAE J2735, the performances of CV communications were examined under several external factors including the(More)
The contents of this report reflect the views of the authors, who are responsible for the facts and the accuracy of the data presented herein. The contents do not necessarily reflect the official views or policies of either the Federal Highway Administration, U.S. Department of Transportation, or the Commonwealth of Virginia at the time of publication. This(More)
Traffic congestion has greatly affected not only the nation's economy and environment but also every citizen's quality of life. A recent study shows that every American traveler spent an extra 38 hours and 26 gallons of fuel per year due to traffic congestion during the peak period. Of this congestion, 10% is attributable to improper operations of traffic(More)
  • 1