Keywords
V2X, Edge Computing, Review
This article is included in the Software and Hardware Engineering gateway.
This article is included in the Research Synergy Foundation gateway.
V2X, Edge Computing, Review
The automobile industry is changing in various ways, and this provides a chance to address potential transportation-related difficulties. This includes transitioning a traditional independent network to a connected network within and outside the vehicle.1 The evolution of drivers' and passengers' involvement with vehicles has been evolving both in technology and style.2 Figure 1 depicts the evolution of the interaction between drivers and passengers from 1807 to the present.
Almost everyone is connected to the Internet, with around six connected devices per person and hundreds of new connections created each second, resulting in billions of connected ecosystems.3 Furthermore, research has projected that by 2025, connected vehicles will produce over 200 petabytes of data, with at least four terabytes of data generated continuously. This would increase the number of connected vehicles on roads by approximately four hundred million.4 A connected vehicle is one that is equipped with both Internet and wireless LAN connectivity, allowing data to be transmitted between devices both inside and outside of the vehicle. The Internet of Vehicles or Vehicle to Everything (V2X) is a common network for connected vehicles.5,6 However, the most challenging problem is efficiently processing and sending enormous data over communication networks.
The difficulty is not just handling data produced by these connected vehicles that are constantly exposed but also maintaining security, deployment, and performance.7,8 Therefore, the potential of edge computing (EC) for V2X can play a prominent part. EC is a distributed computer system that carries out computational tasks (such as collecting and analysing data) on a device, particularly a vehicle. In turn, this reduces the transmission of data from the cloud back and forth.9,10 This review examines EC, in particular for V2X. We discuss the background of automotive evolution, V2X and EC; prior research on the applicability of EC for V2X; the potential challenges of applying EC to the V2X scenario; and the path for the future.
V2X communication is a crucial component of current intelligent transportation systems (ITS). For example, V2X provides drivers with information about road hazards that they may overlook.11 In addition, V2X allows communication between a vehicle and anything that might impact the environment, including the surrounding infrastructure such as traffic lights (infrastructure) and even smartphones (pedestrian), enabling communication between vehicles and pedestrians holding a smartphone.12 With the technology progressing globally, it is just a matter of time until it is widely adopted and deployed.13
EC refers to a technology that allows network-level processing, downstream data for cloud services, and upstream data for IoT service support.14 The term "edge" refers to any computer device located in the area between data sources and the cloud. EC is more suitable for applications that require rapid and consistent response times.15 V2X is an example, as computing at the edge can reduce data transfer, decreasing reaction times.16 For example, when driving, the vehicle captures data via movement, speed, and other sensors, then analyses them to ensure safety and convenience.
For V2X, real-time situational awareness is crucial, particularly on crucial route segments (e.g., an accident is detected by another vehicle on a particular road). Additionally, a backend server will have to provide high-definition local maps. Leveraging local maps and situational awareness is not just about providing data about road traffic conditions. It should also be extended to occurrences where local data must be aggregated in real-time and distributed to drivers on the road through road side units (RSUs). Road users may build and maintain real-time situational awareness using broadcast information from neighbour vehicles as an alternative to EC. Therefore, EC deployment enables shifting such activities to the network edge by combining data from many sources and efficiently broadcasting a huge amount of data to many drivers locally.
EC applies to a wide range of uses, from sensor applications (e.g., predictive vehicle maintenance) to the end-user experience (e.g., collision prevention warning). EC has been discussed previously from the perspective of V2X communication applicability. In 2020, Moubayed et al. described an Optimum V2X Service Placement (OVSP) as a binary integer issue in a linear edge context.17 The authors approached this problem using a low-complexity greedy heuristic technique (G-VSPA). Extensive simulations showed that the OVSP model provides satisfactory results when sensitive services to delays are on the edge and tolerant services to delays are at the core of the process. Furthermore, the proposed algorithm provides near-optimal performance with minimal complexity.
In the same year, Shaer et al. addressed the efficient deployment of V2X essential services, including various V2X applications in the EC environment.18 The authors devised an optimisation method for minimising E2E latency in multi-component V2V systems under different traffic situations. The findings indicate that the methodology guarantees an adequate level of service and surpasses solutions developed in earlier studies using realistic scenarios. Additionally, Belogaev et al. investigated task offloading that minimises operating costs while adhering to the latency constraints imposed by different V2X applications, given the network architecture and resource allocation.20 The authors designed a new CHAT algorithm based on linear programming and incorporated a greedy algorithm. In terms of total energy usage, the suggested method was compared with previous studies proposed algorithms. The assessment demonstrates that the proposed method considerably decreases energy usage while meeting the varied needs of V2X applications in all evaluated cases.
Lee et al. described an EC approach for minimising trip time at interconnected junctions.19 The authors suggested a paradigm in which each RSU determines junction scheduling while the vehicles select their travel trajectory through dynamic control. Based on simulation results for optimum scheduling of linked junctions, the proposed framework significantly reduced overall travel time by up to 14.3%. Grammarikos and Cottis investigated the benefits of mobile edge computing (MEC) adopting V2X services linked to traffic efficiency and road safety.21 A simulation model that represented a long-term evolution (LTE) system with basic MEC capabilities, such as packet routing, was investigated in this work to evaluate the applicability of their findings. The presented approach evaluated the packet delivery ratio and packet loss for applications, such as telemetry and emergency message delivery, respectively. While LTE can transmit traffic data to vehicles in a short amount of time, the simulation results revealed that severe congestion in the backhaul and core networks could result in unexpected packet losses, which could be prevented by the processing capabilities of a MEC server.
In addition, Napolitano et al. proposed a fully compatible design and implementation of a vulnerable road users (VRU) warning system, as well as an experimental assessment of the system using MEC- and cloud-based architectures.22 The authors developed a strategy that would enable road users to communicate information regarding the existence of neighbouring entities in the event of a difficult circumstance (e.g., road accident). This is accomplished by using an architecture that consists of a user-facing Android application and a MEC-based application [cooperative awareness messages (CAM)]. The E2E latency demonstrated a substantial result when visualising the entities engaged between the VRUs application and the CAM server using a preliminary performance measurement. Additionally, Emara et al. focused on the case of VRU, examining the safe interaction of vehicles with road users such as motorcyclists and pedestrians.23 The authors aimed to describe latency improvements using MEC systems through periodic CAM. Extensive simulation results indicated that installing MEC infrastructure may substantially decrease the communication latency. Additionally, Sabella et al. suggested a hierarchical MEC architecture for adaptive video streaming in V2X applications.25 The authors described the acquisition of real-time channel data by local agents stationed at the evolved NodeB (eNB). This information is then communicated to a MEC platform, which automatically changes the video stream's quality to match the channel's conditions. Within a virtualized network context, the authors tested and evaluated a conceptual demonstration of radio-aware video optimization. The results demonstrated that the proposed architecture enhanced the user experience by boosting downlink and uplink speeds and reducing delay.
Bissmeyer et al. introduced a network framework that ensures V2X information and data exchange in a MEC-based multi-access technology environment.24 The authors designed a framework for the integrity of the message, sender authorisation and authentication, and replay detection. This approach is achieved through digital signatures, an authorisation certificate, and public and private key infrastructure. MEC offers local processing capabilities for the exchange of event-driven V2X encrypted messages within the framework. In addition, Balid et al. demonstrated MEC traffic management methods for real-time traffic monitoring.26 The authors developed and deployed a cost-effective wireless sensor traffic monitoring system for highway and roadside traffic. The sensor achieved an acceptable level of accuracy in terms of detection, speed prediction, and vehicle categorisation.
At the edge of a network, privacy and security protection are critical services to provide.27,28 If the vehicle is equipped with IoT, it can collect sensitive data from sense data.29 Several ITS implementations would need drivers to grant access to sensitive, confidential data to untrusted vehicles attempting to join as edges in the context of smart cities.30 Together with data segregation techniques, effective trust management systems may considerably increase edge security.31 According to El-Sayed & Chaqfeh,31 although minimal research has been conducted on assuring secure collaboration in an EC scenario, the study does not explicitly address V2X issues.
The positioning of edge devices in an urban environment is based on static and dynamic features.32 Edge nodes may need MEC servers with fixed RSUs or unmanned aerial vehicles (UAV).33 Many possible ITS applications may be facilitated by autonomous UAVs, improving traffic safety and transportation quality of life.34 Nevertheless, specific issues must be addressed, such as limited energy, processing ability, and signal transmission range.35 Given the technological developments such as sensor-based street lights or smart toll booths over the past few decades, the limitations on UAV usage will likely be overcome eventually.
Each second counts when you're behind the wheel of a vehicle. As a result, vehicles would continuously upload the data collected by their local sensors to the closest edge device.36,37 Hence, energy and power consumption at the edge should be considered to avoid service disruptions and quality of service (QoS) loss.38,39 Furthermore, various situations need substantial QoS improvement to cope with occasional high traffic loads like severe traffic congestion, unpredicted weather conditions, or unexpected road construction works.40 Therefore, further research is necessary to enhance and manage QoS in the V2X context considering a heterogeneous edge-based environment.
EC adoption is growing in the automotive industry, and ITS, particularly V2X, will certainly change various economic sectors and significantly influence our everyday lives. Despite this, multiple different challenges are limiting its wide implementation. The increasing number of sensors in connected vehicles and roads creates a large data processing and storage issue. This requires new service platforms with strong processing, reliable storage, and real-time communication. EC is indeed a promising way to decrease latency and bring data closer to vehicles and resources. In the future, we will work on a comprehensive middleware solution for V2X communication. In many V2X scenarios, data transmitted between users and network infrastructure is localised and does not need remote access to centralised data centres. Using EC may substantially improve the performance of supporting various applications of V2X. The availability of network resources, storage, and computation near the network edge make EC an ideal option for V2X delay-sensitive applications.
Views | Downloads | |
---|---|---|
F1000Research | - | - |
PubMed Central
Data from PMC are received and updated monthly.
|
- | - |
Is the topic of the review discussed comprehensively in the context of the current literature?
Yes
Are all factual statements correct and adequately supported by citations?
Yes
Is the review written in accessible language?
Yes
Are the conclusions drawn appropriate in the context of the current research literature?
Yes
Competing Interests: No competing interests were disclosed.
Reviewer Expertise: Edge computing, vehicle network, V2X, Internet of things
Is the topic of the review discussed comprehensively in the context of the current literature?
Yes
Are all factual statements correct and adequately supported by citations?
Yes
Is the review written in accessible language?
Yes
Are the conclusions drawn appropriate in the context of the current research literature?
Partly
References
1. Cordeschi N, Amendola D, Baccarelli E: Reliable Adaptive Resource Management for Cognitive Cloud Vehicular Networks. IEEE Transactions on Vehicular Technology. 2015; 64 (6): 2528-2537 Publisher Full TextCompeting Interests: No competing interests were disclosed.
Alongside their report, reviewers assign a status to the article:
Invited Reviewers | ||||||
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | 6 | |
Version 4 (revision) 10 Nov 23 |
read | read | read | |||
Version 3 (revision) 11 May 23 |
read | |||||
Version 2 (revision) 07 Jul 22 |
read | read | ||||
Version 1 01 Nov 21 |
read | read |
Provide sufficient details of any financial or non-financial competing interests to enable users to assess whether your comments might lead a reasonable person to question your impartiality. Consider the following examples, but note that this is not an exhaustive list:
Sign up for content alerts and receive a weekly or monthly email with all newly published articles
Already registered? Sign in
The email address should be the one you originally registered with F1000.
You registered with F1000 via Google, so we cannot reset your password.
To sign in, please click here.
If you still need help with your Google account password, please click here.
You registered with F1000 via Facebook, so we cannot reset your password.
To sign in, please click here.
If you still need help with your Facebook account password, please click here.
If your email address is registered with us, we will email you instructions to reset your password.
If you think you should have received this email but it has not arrived, please check your spam filters and/or contact for further assistance.
Comments on this article Comments (0)