US 12,406,574 B2
Methods for enhancing efficiency of secure vehicle to everything (V2X) stream communication
Mohamed A. Layouni, Fraser, MI (US); Vivek Vijaya Kumar, Shelby Township, MI (US); and Xiaoguang Huang, Richmond Hill (CA)
Assigned to GM GLOBAL TECHNOLOGY OPERATIONS LLC, Detroit, MI (US)
Filed by GM Global Technology Operations LLC, Detroit, MI (US)
Filed on Oct. 27, 2023, as Appl. No. 18/495,908.
Prior Publication US 2025/0140107 A1, May 1, 2025
Int. Cl. G08G 1/01 (2006.01); H04W 4/44 (2018.01); H04W 4/46 (2018.01)
CPC G08G 1/0141 (2013.01) [H04W 4/44 (2018.02); H04W 4/46 (2018.02)] 20 Claims
OG exemplary drawing
 
20. A method for enhancing efficient of vehicle to everything (V2X) stream communication comprises:
capturing, via one or more sensors, vehicle information about one or more transmitting vehicles and one or more receiving vehicles, and capturing environmental information about an environment of the one or more transmitting vehicles and the one or more receiving vehicles, wherein each of the one or more transmitting vehicles and the one or more receiving vehicles have a controller, the controller including a processor, a memory, and one or more input/output (I/O) ports, the I/O ports in communication with the one or more sensors; the memory storing programmatic control logic; the processor executing the programmatic control logic; the programmatic control logic including an application for enhancing V2X stream communication (EVSC), the EVSC comprising control logic for:
obtaining, from the one or more sensors, vehicle telematics information including speed, location, altitude, bandwidth utilization, computational resource utilization from sensors comprising: sensors disposed on the one or more transmitting vehicles and on the one or more receiving vehicles; and
obtaining traffic information, road condition and road surface information, weather information, and position information from sensors comprising: sensors on infrastructure including global positioning system (GPS) satellites, cellular towers, and traffic signaling devices;
engaging a sparse signing approach (SSA) portion of the EVSC, including:
identifying regular V2X messages including: vehicle heading, vehicle speed, vehicle location, and vehicle altitude;
identifying intermediate V2X messages including messages from autonomous applications including advanced driver assistance system (ADAS) communications;
sending and receiving regular V2X messages on a standard message interval that is regular and periodic, and sending and receiving intermediate V2X messages at a higher frequency than the standard message interval;
securely signing regular V2X messages;
selectively securely signing intermediate V2X messages by:
tracking behavior of transmitting vehicles and receiving vehicles by actively and continuously monitoring the intermediate V2X messages; and
upon determining that a dramatic dynamic change is occurring or that a special command has been sent, securely signing the intermediate V2X messages corresponding to the dramatic dynamic change or the special command;
causing receiving vehicles to track and generate predictions of transmitting vehicles since a previous securely signed V2X message was received;
upon receiving an unsecured V2X message, verifying the information contained in the unsecured V2X message by comparing the information in the unsecured V2X message to the predictions;
upon determining that the unsecured V2X message matches the predictions, increasing a confidence level from a first level to a second level greater than the first level, and wherein confidence levels define automotive safety integrity level (ASIL) ratings, and wherein the receiving vehicle signs and secures unsecured V2X messages having ASIL ratings equal to or greater than a threshold ASIL rating, wherein a baseline threshold ASIL rating is ASIL B; and
selectively modifying the threshold ASIL rating based on vehicle information about the transmitting vehicles and the receiving vehicles and environmental information including: traffic information, road condition and road surface information, weather information, and position information;
engaging a chained packet approach (CPA) portion of the EVSC, including:
causing receiving vehicles to buffer unsigned intermediate V2X messages that are received between a signed regular V2X message and a signed subsequent regular V2X message;
causing transmitting vehicles to append a hash of each V2X message to subsequent V2X messages within an interval between the signed regular V2X message and signed subsequent regular V2X message;
verifying unsigned intermediate V2X messages based on a valid signature of the subsequent regular V2X message and a hash of the signed subsequent regular V2X message;
batch authenticating one or more unsigned V2X messages in the interval via the hash of the signed subsequent regular V2X message; and
actively and continuously engaging the EVSC to monitor bandwidth utilization and computational resource utilization and actively and continuously reducing bandwidth and computational resource utilization while ensuring security of V2X communications while the receiving vehicle is in operation by:
selectively running the SSA and CPA portions to actively and continuously reduce bandwidth and computational resource utilization from a first level to the second level less than the first level by:
executing the SSA when a quantity of V2X messages being transmitted and received within a predefined period of time is equal to or below a predetermined threshold quantity;
executing the CPA while the quantity of V2X messages being transmitted and received within the predefined period of time is greater than the predetermined threshold quantity; and
selectively running the SSA and CPA portions to actively and continuously reduce bandwidth and computational resource utilization from the first level to the second level by:
executing the SSA portion to manage V2X messages identified as urgent through the ASIL ratings of the V2X messages being transmitted and received within a predefined period of time; and
executing the CPA portion to manage V2X messages identified as non-urgent via the ASIL ratings of the V2X messages being transmitted and received within the predefined period of time.