|
1
|
|
|
2
|
- Engineering is not merely knowing and being knowledgeable, like a
walking encyclopedia; engineering is not merely analysis; engineering is
not merely the possession of the capacity to get elegant solutions to
non-existent engineering problems; engineering is practicing the art of
the organized forcing of technological change... Engineers operate at
the interface between science and society...
Dean Gordon Brown
- A policy is a temporary creed liable to be changed, but while it holds
good it has got to be pursued with apostolic zeal.
Mohandas Gandhi
|
|
3
|
- Objective Create a crash scenario framework by which to identify
safety applications needs.
- Key Tasks
- Update of the pre-crash scenario statistics.
- Development of pre-crash scenario depictions and ranking by frequency
and severity.
- Determination of requirements and specifications for priority scenario
safety applications.
- Complete a Comparison of the priority safety applications to existing
and emerging safety applications.
- Selection of priority safety applications for prototype development
(Track 4).
|
|
4
|
- Objective To ensure safety applications work across all equipped
vehicles.
- Key Tasks
- Complete relevant communication standards and protocols (SAE J2735
message set, IEEE1609).
- Develop and Demonstrate security protocols that are practical,
scalable, and deployable. This
must include definition of a Certificate Authority (CA) implementation
that is not reliant on the widespread deployment of public
infrastructure.
- Develop procedures for ensuring message integrity and prevent misuse of
communication capability. This
will allow the host vehicle to determine the data received from another
vehicle is valid and accurate.
- Establish data rights and other policies needed to define drivers
privacy rights.
|
|
5
|
- Objective Estimate the safety benefits of V2V safety applications.
- Key Tasks
- Development of safety application measures of performance.
- Development of safety application objective test procedures
- Adaptation of ACAT Safety Impacting Methodology.
- The use of real-world exposure data to estimate benefits.
- The conduct of the safety application system prototype objective tests.
- The estimation of safety application benefits.
- The review and verification of estimated safety benefits.
- Produce information that supports Regulatory Decision
|
|
6
|
- Objective Develop and prototype selected safety applications.
- Key Tasks
- The transfer of safety application prototype development information.
- Design and development of safety application prototypes (includes
positioning requirements).
- The transfer of prototype to task 3 for evaluation.
|
|
7
|
- Objective Develop Framework that can assess the impact of driver
issues on the effectiveness of V2V safety systems.
- Key Tasks
- Development of a safety management concept to ensure proper integration
of interfaces when several warning systems are installed.
- Development of test procedures to determine the effective of various
DVIs to obtain the desired driver response.
- Determine if drivers accept the new systems.
- Determine if the lack of standardization of the DVI among different
vehicle makes and models may increase the likelihood of driver
confusion in responding to the warning information intended to assist
the driver.
|
|
8
|
- Objective Identification of policy issues that are critical but not
always unique to V2V and coordinate how these issues are addressed
- Key Issues
- Security & Privacy Policy
- 5.9 Enforcement
- Aftermarket
- Governance
- Business Models
|
|
9
|
- Current authorities provide a framework for the deployment of traditional aspects of V2V under
existing USDOT authority
- Non-traditional aspects will be covered by augment authority or new
authority as indicate by V2V research
|
|
10
|
|
|
11
|
- Must meet a safety need
- Be practicable (technologically and economically)
- Objectively measurable compliance
- Performance-oriented (not design restrictive)
- Appropriate for each vehicle type
|
|
12
|
- Certification of Equipment
- New vehicles & equipment
- Ensure interoperability
- DSRC safety performance
- Self-Certification
- Enforcement (Traditional)
- Compliance Checks
- Performance Monitoring
- Fraud
- Procedure
|
|
13
|
|
|
14
|
- Security
- Certificate updates
- No user Fees
- Monitoring (ID bad players)
- Privacy/Enforcement balance
- Maintenance/Enforcement (Non-traditional)
- Equipment
- 5.9 GHz
- Malicious behavior
|
|
15
|
- Automotive equipment
- DSRC for safety
- Compliance
- Basic Safety Message
- Safety Applications
- Carry-in devices
- Basic Safety Message
- Compliance
- Security
- Driver Distraction
|
|
16
|
|