Academia.eduAcademia.edu

Challenge: peers on wheels - a road to new traffic information systems

2007

Challenge: Peers on Wheels – A Road to New Traffic Information Systems Jedrzej Rybicki Björn Scheuermann Wolfgang Kiess Christian Lochert Pezhman Fallahi Martin Mauve Computer Networks Research Group Heinrich Heine University Düsseldorf, Germany {rybicki, scheuermann, kiess, lochert, fallahi, mauve}@cs.uni-duesseldorf.de ABSTRACT General Terms In the context of vehicular ad-hoc networks (VANETs), a number of highly promising convenience applications have been proposed. These include collecting and distributing information on the traffic situation, distributed monitoring of road and weather conditions, and finding available parking places in a distributed, cooperative manner. Unfortunately, all of these applications face major problems when a VANET is used as a means to distribute the required information. In particular a large number of vehicles needs to be equipped with dedicated VANET technology before these applications can provide a useful service. Even if customers were willing to purchase a system which is not immediately useful, it would still take quite some time until the required density of equipped cars is reached. In contrast, affordable always-on mobile Internet access is already mainstream. Such Internet connectivity could be used to build the proposed applications in a different fashion: by using peer-to-peer communication, essentially creating a peer-topeer network of cars sharing traffic information. This allows to overcome the limitations of VANETs, while it preserves their key benefits of decentralization and robustness. In this paper, we describe the technical challenges that arise from such an approach, point out relevant research directions, and outline possible starting points for solutions. Algorithms, Design Keywords Peer-to-peer Networks, Traffic Information Systems, Car-to-car Communication, VANET 1. INTRODUCTION The application of mobile communication technology to support road traffic constitutes a challenging, but at the same time very promising working area for research and development. A whole community has formed around the questions that vehicular communications and, in particular, vehicular ad hoc networks (VANETs) pose. Consisting of public authorities, academia, and car manufacturers [4, 11, 31], this community fosters the use of communication technology to enhance driving security and comfort. Proposed applications reach from the reduction of road casualties by means of brake warning, intersection assistance, or collision avoidance systems [33] to offering guidance to available parking lots [5], discovering the traffic situation on a planned route [32], and coordinating car flow and traffic lights [9, 31]. In this paper, we focus on non-safety related applications that can be subsumed under the term distributed traffic information systems (TIS). In these systems, the participating cars are not only consumers of information but at least some of them also produce information by sharing their observations. Traffic information systems require communication among many participants over relatively large distances that can span some ten kilometers in the case of a city scenario up to some hundred kilometers on highways. Thus, the communication requirements of TIS applications are quite challenging: continuously updated data spread over a high number of network nodes is to be made available to many vehicles in a relatively large area. Undoubtedly, many of the proposed applications are highly useful and very desirable, but market introduction and technological hurdles of VANET-based TIS solutions are high. VANETs, where cars communicate directly with Wi-Fi-like equipment [19], are well suited if local communication is needed. However, when it comes to communication between many partners over longer distances, this kind of networks suffer from very bad connectivity until a significant amount of vehicles is equipped with this technology. This has been demonstrated, e. g., in [21], where upper bounds on the Categories and Subject Descriptors C.2.1 [Computer System Organization]: Computer - Communication Networks—network architecture and design, distributed networks; C.2.4 [Computer Systems Organization]: Computer Communication Networks—distributed systems, distributed applications; H.4.3 [Information Systems]: [Communications Applications] Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. MobiCom’07, September 9–14, 2007, Montréal, Québec, Canada. Copyright 2007 ACM 978-1-59593-681-3/07/0009 ...$5.00. 215 speed and reliability of information dissemination in a VANET city environment with delay tolerant network-like opportunistic data exchange have been studied. The conclusion is that sufficient performance is simply not possible with penetration ratios that are realistic within the near future—at least not without additional infrastructure support. So, the number of necessary network nodes for quick and reliable information distribution exceeds the number of participating cars required to collect enough information for a working service by far. Moreover, even given a sufficiently high equipment ratio, there are also the inherent capacity limits of wireless multihop communication, first formalized by Gupta and Kumar [15]. The limited transport capacity of wireless multihop networks most likely impedes distributing detailed data continuously to many interested parties in a large surrounding. This is further aggravated by the fact that a substantial fraction of the bandwidth has to be kept free in order to guarantee working safety applications [34]. Thus, it becomes clear that the bottleneck in terms of connectivity and capacity is the VANET. However, the decentralized character of VANETs for distributing traffic information is very appealing: a cooperative approach where every participant contributes, distributes, and consumes information, where no central institutions and no central infrastructure are necessary, where, consequently, the absence of single points of failure promises a robust service, without recurring fees for the users—all this is obviously highly desirable. But do these features really require VANETs, do they require wireless multihop networks? Cheap mobile Internet access, be it via 3G, GPRS, WiMax, WiFi, or any other technology is already widespread. UMTS flatrates, for instance, are available in many countries and are rapidly getting cheaper. In short: always-on mobile Internet access will soon be common, long before VANET technology in cars will be deployed. In harsh contrast to wireless multihop networks, when using infrastructure-based communication the connectivity, latency, and bandwidth are almost independent from the physical distance. There are no separate network partitions, and differences in bandwidth or latency, if relevant at all, will only depend on the access technologies. In this paper, we discuss how infrastructure-based communication might be leveraged to build a distributed, cooperative TIS— only requiring every participant to maintain an Internet connection, but preserving all the benefits of the proposed VANET solutions: a decentralized, scalable, and cooperative approach. We envision such a solution based on distributed hash tables, i. e., on peer-topeer technology: a huge peer-to-peer network of vehicles. Such a system, implementing well-designed distributed data structures and algorithms allows to build the TIS applications that are discussed for VANETs without being impeded by VANET insufficiencies when it comes to communicating over longer distances. This may result in a radically shorter market introduction time for carto-car distributed traffic information sharing. Using infrastructure-based communication of course also yields the possibility of a centralized system, with all the well-known advantages and drawbacks of such an approach. Compared to a peerto-peer approach, a centralized system poses different technical challenges (see, e. g., [18]). However, we argue that a distributed approach is preferable if it is able to deliver the same service in a comparable quality—not least because it avoids the effort for setting up and maintaining the central components. In this paper, we focus on the peer-to-peer approach. Our approach poses completely new challenges, very different from what has so far been examined in the car-to-car community. Up to now, a central aspect of almost all considerations was the physical position and the movement of the nodes, the resulting network topology, and the implications for the protocols and appli- cations. This is no longer important when an infrastructure-based peer-to-peer network is used. However, the arising requirements of our approach are also very different from the focus of existing research on peer-to-peer systems and the corresponding distributed data structures. Data provided and requested by nodes will typically be structured and highly correlated, such as the traffic situation on a sequence of roads from a starting point to a destination. Furthermore, the update and request frequency is likely to be much higher than in existing peer-to-peer applications. As a consequence it is necessary to tailor the distributed data structures to the unique environment created by traffic information systems. This paper is organized as follows. In Section 2, we give a short introduction to peer-to-peer systems and the underlying data structures. Section 3 sketches a first approach to the problem that already reveals some of the major challenges that come with the proposed change of paradigms. We extend this first system in Section 4. Finally, we outline further possible applications, some of them significantly exceeding the scope of a “classical” traffic information system in Section 5. The paper is concluded in Section 6. 2. PEER-TO-PEER NETWORKS Peer-to-peer overlay networks are virtual communication structures logically established over a physical network such as the Internet. They emerge by self-organization of peers in absence of a central supervising entity. Network nodes cooperate and share resources, like data or computational power. In the following, we will use the terms car, node and peer interchangeably. Peer-to-peer systems distribute the resources among participants, in contrast to a client-server architecture where they are hosted centrally. Thus, the main challenge in such networks is to locate the resources, i. e., to find a file identified by a name or to find a car that knows about the traffic situation on a given road. The first peer-topeer systems used index servers, but this has obvious drawbacks in terms of performance and robustness [29]. Modern systems are so-called structured networks, and are often also referred to as distributed hash tables (DHT). Well-known examples are Chord [30], CAN [27], or Tapestry [35]. In these peer-to-peer systems, resources are mapped to peers by means of a hash function. Each peer knows a subset of the other peers, forming an overlay network along which lookups can be routed. In most of the proposed structured networks, such a lookup has logarithmic complexity. For a more detailed overview of peer-to-peer networks see, e. g., [2, 22]. To make the discussion a little more specific, let us look at the concrete example of Chord [30]. Chord’s basic structure is a circular ID space, the Chord ring, sketched in Figure 1. Nodes and resources are both mapped uniformly to this ID space by means of a hash function. Each node hosts the resources with keys in the range between its predecessor’s and its own ID. Every node knows its successor, so queries can be routed clockwise around the ring. In addition, the nodes maintain further links, the so-called fingers. For one of the nodes, with ID 69105, these are indicated by dashed arrows in the figure. The fingers are shortcuts over 1/2, 1/4, 1/8, etc. of the ID space, pointing to the respective nodes with the next higher ID. This structure allows to reduce the distance to the destination by at least one half in every step, resulting in the above mentioned logarithmic lookup complexity. Assume, for instance, that the peer with ID 69105 in our example figure is looking for a resource identified by key 4004. It uses the nearest known node in anti-clockwise direction from 4004 as the next hop. This is, through the 1/4 finger, 42 in our example. Node 42, following the same principle, will forward the request to node 1138, which in turn knows that its successor, 4711, hosts the sought-after key. 216 Figure 1: A Chord ring. Figure 2: Traffic information sharing system. Some research on enabling peer-to-peer in cellular networks has already been undertaken. E. g., in [16] it has been shown that existing peer-to-peer filesharing systems work in mobile networks (3G, GPRS) and exhibit satisfactory performance. queries and updates on a peer-to-peer TIS would be challenging. In particular it will be necessary that updates and queries are routed in an efficient manner through the DHT. One possible approach to solve this problem is to exploit the specific structure of the data. The road segments are not as independent as, for example, different files in a peer-to-peer file sharing system but are topologically connected. Thus, the lookups and updates that are performed in the system will follow a pattern. If a car’s navigation system is interested in the traffic situation on one road, it is likely that it is interested in adjacent roads as well. Similarly, if a car reports measurements on one road segment, it is very likely that it has previously passed some other, close-by road segment, and reported measurements on it. Simply hashing the road segments’ IDs independently to nodes in the distributed hash table would require a full lookup for each road segment, which is, under the given circumstances, surely not optimal. Ideally, the underlying peer-to-peer system should understand and support the interdependencies to reduce the update and lookup overhead. This could be achieved by maintaining additional pointers in the peer-to-peer system, providing “shortcuts” to nodes responsible for adjacent road segments. Following such pointers, a node can look up close-by road segments with constant effort, when starting from some already known responsible peer. Maintaining the consistency of these pointers, however, might turn out to be an issue. The problem could also be tackled more fundamentally by choosing or designing the distributed hash table in a way that respects the locality of the information and the dependencies between close-by places. This might be challenging since most existing peer-to-peer systems use a one-dimensional key space whereas the road network has essentially a two-dimensional topology. However, one particular distributed hash table already supports the notion of multipledimensions: CAN [27] employs multi-dimensional “universes”, where nodes and keys are mapped into an n-dimensional ID space. Therefore, if close-by road segments are mapped to close-by positions in this space, CAN might provide fast local lookups in a very “natural” way: the respective pointers are already part of the design of this DHT. Thus, CAN could be a good starting point for developing DHTs that are well suited for traffic information systems. 3. A FIRST SYSTEM: TRAFFIC INFORMATION SHARING Let us now sketch a first, naive peer-to-peer based traffic information system that allows cars to exchange information about the current traffic status, e. g., in a city or in a network of highways. Thus, this system is very similar in intention to VANET-based systems like SOTIS [32] or TrafficView [24]. This basic system is schematically outlined in Figure 2. The cars participate in some distributed hash table. Roads are divided into road segments, each with a unique ID. These IDs are used as keys in the DHT. Each node is responsible for a certain part of the ID space. It stores the information about the current traffic status on the respective road segments. When a car passes a certain road section, it shares its observations regarding the local traffic situation by sending a report to the node that hosts this road segment. To acquire information about the roads that lie on a possible route, a car may then query the nodes responsible for the respective roads. Obviously, if built that naively, the system will not work satisfactorily. There are a number of issues involved that require careful consideration and lead to challenging research questions. These algorithmic issues appear in a very similar way in many peer-topeer TIS applications. In the following, we discuss these issues and sketch some potential solutions. 3.1 System load and scalability In existing peer-to-peer systems entries in the DHT are usually added or updated in order to announce the presence of a file on a certain peer. Since this information is rather static, the update rate of the DHT is much lower than in a traffic information system where each peer constantly adds new or updated information to the system. Just in order to illustrate the load that such a system would have to endure it might be helpful to compare it with a well known Internet service. Google USA processed about 3.1 billion queries in November 2006 [25]. A comparable number of queries would be generated by 72,000 cars continuously sending updates or requests once per minute—that is only 0.03 % of the vehicles registered in the U.S. [3]. Even these very rough figures show that the load of 3.2 Fairness and reliability Another main problem is the fairness of the workload distribution. A node that happens to be responsible for, e. g., a highway intersection will not only receive reports at a very high frequency, 217 or not) insert incorrect data into the DHT. With sufficient alternative measurements present in the system and provided resistance against Sybil attacks [10], this seems to be a marginal problem—abnormal data will be easy to notice. Misbehavior of the node hosting the data is harder to cope with. The above mentioned redundancy of stored data is probably not sufficient. To keep the data consistent, the nodes responsible for the same road segment will exchange information. Thus, the malicious node might be able to “poison” all descriptions stored in the DHT. Solutions proposed for VANETs to counter this problem usually take advantage of public key cryptography with central key certification. Since in our proposed approach Internet access is used, such a system may even be simpler to deploy than in VANETs. Note that a central key signing instance is still very different from a centralized traffic information system, especially also with regard to user privacy. A mere key signing authority is comparable to a number plate issuing authority, which does not know about the movements of the registered vehicles. Sending periodical updates to a central instance allows the tracking of all movements and thus requires a whole different level of trust. An interesting feature of our proposed decentralized approach is thus that spreading the data among the users will in fact improve the protection of each single user’s privacy: there is no single instance where all data is available or a history of events could be collected. it will also be constantly queried by a large number of navigation systems. Closely related is the problem of reliability as it is surely not optimal if all the cooperatively collected data on a road segment is lost if the responsible node gets disconnected from the network. To deal with these issues, some form of load balancing and redundancy is necessary [6]. It is conceivable that not one single node, but groups of nodes are responsible for each road segment. Report messages could then be distributed to the members of this group, e. g., in a randomized or round-robin fashion. The size of the groups should be adjusted dynamically, based on the network traffic load associated with the road segment. The group members might periodically exchange aggregated data to share their knowledge. Such a scheme avoids losing valuable information if a node fails or is temporarily not reachable, and it also provides a simple form of load balancing: to learn about the current situation on a road segment, it is sufficient to ask one of the group members. 3.3 Bootstrapping In order to join the network, a new user needs to know at least one peer which is already in. In existing DHTs this is accomplished by providing a list of well-known always-on nodes. This is not as easily possible in a system where all the nodes are cars, and therefore are most likely not “always-on”. But still an approach where the IP addresses of some currently online peers are stored at a well-known location seems viable. The system might of course also include some non-car peers on the Internet. Ideally, the joining procedure takes into account the problem of workload balancing introduced above. New nodes could be integrated in the ID space where their help is most needed. Some work towards a network supporting such functionality is presented in [1]. 3.6 Connectivity Finally, a peer-to-peer system of highly mobile devices over the mobile Internet has to face external adversities. In particular, the underlying distributed data structures must be able to deal well with intermittent connectivity. There are two somewhat different cases. There may be abrupt loss of connectivity which is unforseeable for the device and its neighbors in the overlay. This could, e. g., happen due to varying quality and level of deployment of the access network used. But there is also the case where the disconnection happens voluntarily, or at least in a predictable way. The system should be robust with respect to both. In the first case, this will most likely be a question of the level of required redundancy in the overlay. The information should always be available on currently connected devices, such that queries can be answered within reasonable time. For the latter case, it may be possible to delay the disconnection slightly, in order to trigger restructuring of the respective part of the DHT and to transfer valuable data to other nodes. 3.4 In-network aggregation In most cases, cars will travel multiple consecutive segments of a road. Typically, they are mainly interested in the traffic situation along a whole possible route. It might thus be a good idea to store an aggregated description of longer parts of roads, or of often-used routes spanning multiple roads. This reduces the effort for all cars interested in these larger building blocks: they would otherwise all have to query each segment separately, finally all ending up with doing the same processing. Such a preprocessed aggregate must of course stay up-to-date. The simplest solution would be to let the nodes responsible for some part of the aggregate update it from time to time. There is obviously a tradeoff involved between traffic and computational effort for proactive preprocessing of aggregates and savings in query and response traffic. A different approach could be a form of distributed caching. If both the query and the response are routed along the DHT, each node can remember routed answers, generate aggregates on its own, and use them to “shortcut” answers to reoccurring queries. The effectiveness of such an approach will mostly depend on the structure of the distributed hash table, in particular on how likely it is that similar queries from different sources go through the same intermediate nodes. Again, there is a tradeoff, now between local storage space for caching and reduced query traffic. 4. PUBLISH/SUBSCRIBE TIS Assuming that the so far discussed issues are solved a peer-topeer system would be able to collect and provide traffic information in a robust and scalable fashion. A participating car’s navigation system is thus able to request information on the current traffic situation along a possible route. What is not easily possible, however, is keeping track of changes of the underlying data. To check whether the currently chosen route is still the best option, a car would have to query the peer-to-peer system periodically. Even with continuous connectivity to the system this seems inappropriate. Although well-designed querying schemes that avoid many unnecessary lookups seem feasible, they do not fundamentally solve the problem. So far, the peer-to-peer system has been used like a distributed database. Measurement data is inserted, stored in the distributed hash table, and subsequently queried by other nodes. This is undoubtedly a viable basis and an important building block for many TIS applications. The additional requirement of keeping track of significant changes, however, motivates substantial extensions. 3.5 Trustworthiness and privacy So far, we have naively assumed that availability and up-to-dateness are the only important properties of the data in the proposed system. In a real-world implementation, the data’s trustworthiness should, however, also be taken into account. This problem has already been recognized and studied in the VANET context [7, 13, 17]. In peer-to-peer networks, there are at least two possible points where trustworthiness might be injured. A node might (on purpose 218 4.2 Managing the subscriptions Generally speaking, a car will be interested in updates concerning its route, and possibly also in significant changes on alternative routes. More specifically, deteriorations on the chosen route are interesting, as well as significant improvements on alternative routes that have not been chosen due to a previously determined adverse traffic situation. To be able to identify interested cars, their routes need to be stored and indexed in the peer-to-peer system. This essentially corresponds to the subscription database of a classic publish/subscribe system. Support for more specific subscriptions, defining more precisely which updates the car is interested in, are not necessary for a working basic system, but might provide additional functionality. The whole range from a simple, purely road ID based subscription management to a sophisticated system like in fully fledged publisher/subscriber systems is conceivable here—similar improvements as for the basic system in the previous section come to mind. Figure 3: Publish/subscribe in a traffic information system. 4.3 Dissemination service Pull-based information retrieval initiated by the interested car’s navigation system can be complemented by a push-based elements. This is called “continuous queries” in the database context. Here, it can be understood as a publish/subscribe architecture, where the system knows which clients are interested in some incoming information and actively distributes it to them. The main idea of the publish/subscribe paradigm is to provide a message distribution service where subscribers register their interest for certain types of messages without knowing the sources of these messages in advance. The sources on the other hand will only push their messages to the service, which manages the subscription database and is then responsible to deliver the content. A more detailed introduction to the publish/subscribe concept is provided in [12]. A matter of particular interest is that publish/subscribe services can be implemented in a completely distributed way, using peer-topeer networks. Such systems have already been designed, examples are Mirinea [8] or Scribe [28]. Both subscriptions and dissemination are handled in a decentralized manner. This is accomplished by using interest definitions as keys, peer IDs as values in a DHT, and building a multicast-like message distribution tree upon generic overlay routing. In a peer-to-peer TIS, this might be integrated with the DHT used for storing the information. Based upon the publish/subscribe paradigm, such an approach could serve as a basis for a more sophisticated peer-to-peer traffic information system. The general idea is visualized in Figure 3. The responsibilities of such a system boil down to three main tasks: 1) detecting changes that should trigger a notification, 2) managing subscriptions, and 3) distributing the information. Having the data and the list of subscribed users available, the information finally has to be “pushed” towards the group of subscribers. Again, a problem of workload balancing arises. It is certainly not appropriate if the originator of a notification, e. g., the responsible node for a road segment, alone has to bear the burden of sending the notification to each subscriber. Existing peer-to-peer based publish/subscribe systems use a distribution tree to deal with that, essentially they build a multicast overlay based on the peerto-peer system. The publisher sends the message to a number of nodes, and those will forward it further. But distribution along a tree structure like in the above mentioned solutions has a negative property, especially in dynamic networks with frequent restructuring and a relatively high node failure rate: if one node fails, then a whole subtree will not get the information. It seems that redundancy in the dissemination structure might contribute positively to robustness and reliability. Such redundancy is conceivable in the whole range from partly overlapping subtrees to multiple parallel, fully separated distribution trees. The cost of the reliability improvement, namely the multiplication of some messages, does not appear to be too high—in the end, this tradeoff might also be influenced by the importance of the information for the respective receivers. Another aspect that might be worth to consider in this context is the acceptable delay. In many cases, it seems to be smaller than the information age tolerable for route planning: cars need to be informed early enough to be able to react, i. e., to change to an alternative route. One might think about a system that assigns the receivers of a notification a higher priority if they need to react sooner, e. g., because they are closer to the region the notification refers to—or closer to a junction of two alternative routes. 4.1 Detection of changes 4.4 Privacy issues Obviously, only a significant change of the traffic situation is relevant for the drivers. Recognizing that such a change has occurred might belong to the duties of the peers responsible for the respective road segment. Since this is where the updates arrive, these nodes will have the necessary knowledge—the history of observations. After detecting an event important for cars traveling the road, like a rapid change of the reported average speed in some region, the second step would be to bring this information to the corresponding peers. This includes finding out which cars are interested in receiving a notification about the event on the one hand, and distributing the message to these cars on the other. The proposed system requires its users to upload their route planning and IDs to a more or less publicly accessible storage space. The system must also maintain the relation between the specific participant and the intended route. From a privacy perspective, this is much more problematic than sending reports on single traversed road segments to varying peers. Thus, special care should be taken to protect the privacy of users in such a system. Not only is it advisable to store the data no longer than necessary, but also other means of privacy protection might be considered. A respective measure might be to distribute sensitive data over many nodes, such that none of them has all the information on a particular participant 219 So, instead of first collecting and then evaluating all data in the car that performs route planning, the query for the optimal route might travel through the network, being partially processed in the nodes where information of interest is locally available, until it finally returns carrying the answer. Essentially, the query itself could travel along the possible routes in the virtual DHT space and virtually “visit” the places of interest. This can be understood as a specific case of a “mobile agent” system [26]. Again, techniques as they are discussed for in-network data processing in sensor networks might also provide a starting point for research in this direction. available. Obviously, there is a tradeoff between performance of the system and protection of the user’s privacy, which might be of more general interest for distributed publish/subscribe systems, and probably deserves careful investigation. 5. FURTHER ADVANCED SYSTEMS In the previous sections we have established a “baseline” of peerto-peer based traffic information systems. Now, we may move the research horizon further and look at different, more speculative applications of peer-to-peer systems for car-to-car information exchange. 6. CONCLUSION 5.1 Processing specific requests In this paper, we have presented a new paradigm to implement traffic information systems, using an infrastructure-based peer-topeer network made up of vehicles. This approach has several advantages over traditional, VANET-based systems. Since the approaches are of course non-exclusive, it might also be possible for both VANET and peer-to-peer based systems to coexist and complement each other. Maybe the most beneficial feature of the peer-to-peer approach is the low penetration rate that is required: starting from two cars in the system communication is possible, and the only bottleneck is the number of data contributors. Thus, the system offers an advantage already for the first buyers, while the usefulness rapidly increases with the number of equipped cars. In all approaches described so far, the cars actively push certain information (e. g., observed traffic density, parking lot occupancy, or congestion warnings) into the distributed database. This is reasonable as long as the information is of general interest. However, each car is able to collect a large number of parameters via its sensors. It is very likely that only a fraction of these meets enough interest to be actively pushed to the system. On the other hand, this does not mean that these parameters are of no interest at all: there may be some peers for which some specific information is relevant. Therefore, one might look into a system that allows to query relevant sensor readings on demand. An example may be a driver of a convertible who has three possible routes and wants to select the most sunny one. Data about the current sunshine intensity is most likely not of general interest, thus it might be better to let the system play the role of a broker that just refers requests to the cars that have the necessary information, or are able to obtain it easily. To provide this functionality, techniques developed for sensor networks and for content addressable networks [14] can be employed and adapted. In some sense, such a service is similar to an “inverse location service”: while location services for geographic routing in mobile ad hoc networks [23] are used to find the position of a node with a given ID, this service is intended to find the ID of a node at or close to a given position. 7. REFERENCES [1] K. Aberer, P. Cudré-Mauroux, A. Datta, Z. Despotovic, M. Hauswirth, M. Punceva, and R. Schmidt. P-Grid: A self-organizing structured P2P system. ACM SIGMOD Record, 32(3):29–33, Sept. 2003. [2] S. Androutsellis-Theotokis and D. Spinellis. A survey of peer-to-peer content distribution technologies. ACM Computing Surveys, 36(4):335–371, 2004. [3] Bureau of Transportation Statistics. Number of U.S. Aircraft, Vehicles, Vessels, and Other Conveyances. http://www.bts.gov/publications/national_transportation_statistics/html/table_01_11.html. [4] Car 2 Car Communication Consortium. http://www.car-2-car.org/. [5] M. Caliskan, D. Graupner, and M. Mauve. Decentralized discovery of free parking places. In VANET ’06: Proceedings of the 3rd ACM International Workshop on Vehicular Ad Hoc Networks, pages 30–39, Sept. 2006. [6] G. Chiola. An empirical study of data redundancy for high availability in large overlay networks. In HotP2P ’05: IEEE 2nd International Workshop on Hot Topics in Mobile Peer-to-Peer Systems, pages 43–50, July 2005. [7] J. Y. Choi, M. Jakobsson, and S. Wetzel. Balancing auditability and privacy in vehicular networks. In Q2SWinet ’05: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, pages 79–87, Oct. 2005. [8] Y. Choi and D. Park. Mirinae: A peer-to-peer overlay network for large-scale content-based publish/subscribe systems. In NOSSDAV ’05: Proceedings of the International Workshop on Network and Operating Systems Support for Digital Audio and Video, pages 105–110, June 2005. [9] F. Doetzer, F. Kohlmayer, T. Kosch, and M. Strassberger. Secure communication for intersection assistance. In 5.2 Traffic coordination One interesting, advanced application envisioned for car-to-car communication is traffic coordination [20, 31]. E. g., during afternoon rush hour, a lot of people will drive from the city to their homes. It seems that in this case providing users only with the current traffic situation is not optimal. Once a majority of traffic participants use advanced communication techniques for route planning and information sharing, a service coordinating the routes to optimize the traffic flow suggests itself. Putting this in the context of the subscription system discussed above, the system might be extended to keep track of the number of vehicles intending to use a specific route in the future. In such a traffic coordination system, cars will likely no longer query and analyze data locally, but rather cooperate for a decentralized analysis. In some sense, they share computational power to optimize the global traffic flow conjointly. 5.3 Distributed computation Distributed calculations and cooperative data analysis are also possible in a different context: even the calculation of the optimal route to be used by some specific vehicle can possibly be turned into a problem that can be solved efficiently in a distributed way. In order to gain the full knowledge about the road conditions along possible route alternatives, one has to query sequences of nodes, each providing information on part of the intended route. 220 [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] M. Mauve, J. Widmer, and H. Hartenstein. A survey on position-based routing in mobile ad-hoc networks. IEEE Network Magazine, 15(6):30–39, Nov. 2001. [24] T. Nadeem, S. Dashtinezhad, C. Liao, and L. Iftode. TrafficView: Traffic data dissemination using car-to-car communication. ACM SIGMOBILE Mobile Computing and Communications Review, 8(3):6–19, 2004. [25] Nielsen//Netratings. U.S. search share rankings, press release. http://www.nielsennetratings.com/pr/pr_061219.pdf, Dec. 2006. [26] V. A. Pham and A. Karmouch. Mobile software agents: An overview. IEEE Communications Magazine, 36:26–37, July 1998. [27] S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker. A scalable content-addressable network. In SIGCOMM ’01: Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pages 161–172, Aug. 2001. [28] A. I. T. Rowstron, A.-M. Kermarrec, M. Castro, and P. Druschel. SCRIBE: The design of a large-scale event notification infrastructure. In NGC ’01: Proceedings of the 3rd International Workshop on Networked Group Communication, pages 30–43, Nov. 2001. [29] S. Saroiu, P. K. Gummadi, and S. D. Gribble. A measurement study of peer-to-peer file sharing systems. In MMCN ’02: Proceedings of Multimedia Computing and Networking, pages 156–170, Jan. 2002. [30] I. Stoica, R. Morris, D. Liben-Nowell, D. R. Karger, M. F. Kaashoek, F. Dabek, and H. Balakrishnan. Chord: a scalable peer-to-peer lookup protocol for Internet applications. IEEE/ACM Transactions on Networking, 11(1):17–32, 2003. [31] U.S. Department of Transportation. ITS: Federal intelligent transportation systems. http://www.itsoverview.its.dot.gov. [32] L. Wischhof, A. Ebner, H. Rohling, M. Lott, and R. Halfmann. SOTIS – a self-organizing traffic information system. In VTC ’03-Spring: Proceedings of the 57th IEEE Vehicular Technology Conference, pages 2442–2446, Apr. 2003. [33] Q. Xu, T. Mak, J. Ko, and R. Sengupta. Vehicle-to-vehicle safety messaging in DSRC. In VANET ’04: Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks, pages 19–28, New York, NY, USA, 2004. [34] J. Yin, T. ElBatt, G. Yeung, B. Ryu, S. Habermas, H. Krishnan, and T. Talty. Performance evaluation of safety applications over DSRC vehicular ad hoc networks. In VANET ’04: Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks, pages 1–9, Oct. 2004. [35] B. Y. Zhao, L. Huang, J. Stribling, S. C. Rhea, A. D. Joseph, and J. D. Kubiatowicz. Tapestry: A resilient global-scale overlay for service deployment. IEEE Journal on Selected Areas in Communications, 22(1):41–53, Jan. 2004. WIT ’05: Proceedings of the 2nd International Workshop on Intelligent Transportation, May 2005. J. R. Douceur. The sybil attack. In IPTPS ’01: Proceedings of the 1st International Workshop on Peer-to-Peer Systems, pages 251–260, Feb. 2002. W. Enkelmann. FleetNet – Applications for Inter-Vehicle Communication. In IV ’03: Proceedings of the IEEE Intelligent Vehicles Symposium, pages 162–167, June 2003. P. T. Eugster, P. A. Felber, R. Guerraoui, and A.-M. Kermarrec. The many faces of publish/subscribe. ACM Computing Surveys, 35(2):114–131, June 2003. P. Golle, D. Greene, and J. Staddon. Detecting and correcting malicious data in VANETs. In VANET ’04: Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks, pages 29–37, Oct. 2004. R. Govindan. Data-centric routing and storage in sensor networks. In C. S. Raghavendra, K. M. Sivalingam, and T. Znati, editors, Wireless sensor networks, pages 185–205. Kluwer Academic Publishers, Norwell, MA, USA, 2004. P. Gupta and P. Kumar. The capacity of wireless networks. IEEE Transactions on Information Theory, 46(2):388–404, Mar. 2000. T. Hossfeld, K. Tutschku, F.-U. A. de Meer, and J. Oberender. Simulative performance evaluation of a mobile peer-to-peer file-sharing system. IEEE Next Generation Internet Networks, pages 281–287, Apr. 2005. J.-P. Hubaux, S. Capkun, and J. Luo. The security and privacy of smart vehicles. IEEE Security and Privacy, 2(3):49–55, 2004. B. Hull, V. Bychkovsky, Y. Zhang, K. Chen, M. Goraczko, A. Miu, E. Shih, H. Balakrishnan, and S. Madden. Cartel: A distributed mobile sensor computing system. In SenSys ’06: Proceedings of the 4th International Conference on Embedded Networked Sensor Systems, pages 125–138, Oct. 2006. IEEE P802.11, Task Group p. WAVE: Wireless access for the vehicular environment. http://grouper.ieee.org/groups/802/11/Reports/tgp_update.htm. J. LeBrun, J. Anda, C.-N. Chuah, M. Zhang, and D. Ghosal. VGrid: Vehicular ad hoc networking and computing grid for intelligent traffic control. In VTC ’05-Spring: Proceedings of the 61st IEEE Vehicular Technology Conference, pages 2905–2909, May 2005. C. Lochert, B. Scheuermann, M. Caliskan, and M. Mauve. The feasibility of information dissemination in vehicular ad-hoc networks. In WONS ’07: Proceedings of the 4th Annual Conference on Wireless On-demand Network Systems and Services, pages 92–99, Jan. 2007. E. K. Lua, J. Crowcroft, M. Pias, R. Sharma, and S. Lim. A survey and comparison of peer-to-peer overlay network schemes. IEEE Communications Surveys and Tutorials, 7(2):72–93, Mar. 2005. 221