Trolli Schmittlauch
9ac9b8145a
- created figure of mapping between ETSI-ITS and OSI layers - struggling with LaTeX figures
252 lines
7.5 KiB
TeX
Executable file
252 lines
7.5 KiB
TeX
Executable file
\documentclass[10pt,conference,onecolumn,final]{IEEEtran}
|
|
|
|
\usepackage{ifxetex}
|
|
\ifxetex
|
|
\usepackage{fontspec}
|
|
\defaultfontfeatures{Ligatures=TeX} % To support LaTeX quoting style
|
|
%\setromanfont{Vollkorn}
|
|
\else
|
|
\usepackage[T1]{fontenc}
|
|
\usepackage[utf8]{inputenc}
|
|
\fi
|
|
|
|
\usepackage{clrscode}
|
|
\usepackage{xcolor}
|
|
\usepackage[]{graphicx}
|
|
|
|
% svg conversion support
|
|
\usepackage{ifluatex}
|
|
\ifluatex
|
|
\usepackage{pdftexcmds}
|
|
\makeatletter
|
|
\let\pdfstrcmp\pdf@strcmp
|
|
\let\pdffilemoddate\pdf@filemoddate
|
|
\makeatother
|
|
\fi
|
|
\usepackage[]{svg}
|
|
|
|
\usepackage{hyperref}
|
|
|
|
\newcommand{\comment}[1]{{\parindent0pt\fbox{\begin{minipage}{0.45\textwidth}{\em #1}\end{minipage}}}}
|
|
\newenvironment{changed}{\red}{\color{black}}
|
|
\newcommand{\todo}[1]{ \color{red} \footnote{ \color{red}[#1] \color{black}} \color{black}}
|
|
\newcommand{\Hide}[1]{%
|
|
{
|
|
\parindent0pt
|
|
\emph{\scriptsize #1}
|
|
}
|
|
}
|
|
%\renewcommand{\Hide}[1]{}
|
|
|
|
\newcommand{\documenttitle}{An ETSI look at the State of the Art of pseudonym scheme in Vehicle-to-Everything (V2X) communication}
|
|
|
|
\begin{document}
|
|
|
|
%----------------------------------------------------------------------
|
|
% Title Information, Abstract and Keywords
|
|
%----------------------------------------------------------------------
|
|
\title{\documenttitle}
|
|
|
|
% % %
|
|
% In case of double blind submissions:
|
|
\author{
|
|
\IEEEauthorblockN{Anonymous}
|
|
\IEEEauthorblockA{Some Research Group\\
|
|
Some Institution\\
|
|
Some Email Addresses%
|
|
}
|
|
}
|
|
|
|
%\author{
|
|
% \IEEEauthorblockN{Oliver Schmidt}
|
|
% \IEEEauthorblockA{TU Dresden\\
|
|
% oliver.schmidt3$[$at$]$mailbox.tu-dresden.de%
|
|
% }
|
|
%}
|
|
|
|
|
|
\maketitle
|
|
|
|
% % %
|
|
% sources on writing papers:
|
|
% look for a /good/ outline at the end of this text, the /why/ is found at this link:
|
|
% http://homepages.inf.ed.ac.uk/bundy/how-tos/writingGuide.html
|
|
% http://www-net.cs.umass.edu/kurose/writing/
|
|
% http://www.cs.columbia.edu/~hgs/etc/writing-style.html
|
|
% Read ``Zen - or the art of motorcycle maintenance'' to understand what science and research is
|
|
% Read ``The craft of research'' to /really/ learn how to conduct research and report about it! :-)
|
|
% some hints on plagiarism: http://www.williamstallings.com/Extras/Writing_Guide.html
|
|
% read the text above again. the most important part (that we all tend to forget) is only 5 paragraphs
|
|
|
|
\begin{abstract}
|
|
|
|
\Hide{
|
|
1) Problem statement: The Problem (one is more than sufficient for each paper!)\\
|
|
2) Relevance: Why ist this problem /really/ a problem?\\
|
|
3) Response: What is our solution to the problem?\\
|
|
4) Confidence: how do we show in this paper, that our solution is good?
|
|
}
|
|
\end{abstract}
|
|
|
|
\begin{IEEEkeywords}
|
|
% Are NOT: Peer-To-Peer, Anonymity, Privacy.
|
|
% BUT TAKEN FROM THIS LIST:
|
|
% http://www.ieee.org/organizations/pubs/ani_prod/keywrd98.txt
|
|
Networks, Intelligent transportation systems, Security, Mesh networks, Privacy
|
|
\end{IEEEkeywords}
|
|
% }
|
|
|
|
%\maketitle
|
|
|
|
\IEEEpeerreviewmaketitle
|
|
|
|
\section{Introduction}
|
|
|
|
% % %
|
|
% Broad Topic
|
|
\Hide{Broad Topic, potentially little broad background}
|
|
|
|
% \IEEEPARstart{F}{irst} word
|
|
|
|
|
|
% % %
|
|
% Thema, special problem we're looking at, motivation
|
|
% pbly more background for our problem (why is it actually hard?)
|
|
% Broad background, general definitions
|
|
\Hide{Topic, some background}
|
|
|
|
% % %
|
|
% our goal and our claims (what are we solving in this work?)
|
|
\Hide{Our goal, research question, motivation and relevance (Why is it a problem the reader should care about? Why is it hard?)}
|
|
% % %
|
|
% Requirements for our solution
|
|
\Hide{Requirements for a good solution}
|
|
% % %
|
|
% Which metrics can we use to show the quality/quantity of our solution?
|
|
% pbly rough definition of metrics
|
|
\Hide{Metrics to measure how good a solution is}
|
|
|
|
\Hide{\{If space missing the related work may be presented in a paragraph here\}}
|
|
|
|
% % %
|
|
% Summary of our solution
|
|
\Hide{Overview of our solution and first confidence (how do we show that it's good?)}
|
|
|
|
\Hide{Our contributions in this paper}
|
|
|
|
% % %
|
|
% outline of the paper / reader's digest
|
|
\Hide{Reader's digest}
|
|
|
|
- I look only at middle layers \\
|
|
- look at ETSI ITS
|
|
|
|
% % %
|
|
% Literature Survey and Background
|
|
\section{Background}
|
|
\label{sec:background}
|
|
|
|
\subsection{ITS Architecture}
|
|
|
|
This section gives a brief overview of the ETSI architecture for Intelligent Transport Systems. It isn't meant to be elaborate but has a focus on identifiers and other message contents allowing linkability of messages.
|
|
|
|
The overall architecture of ITS stations according to the ETSI reference architecture \cite{europeantelecommunicationsstandardsinstituteetsiETSI3026652010} is mostly based on the well-known OSI layer model.
|
|
|
|
\begin{figure}
|
|
% center graphic
|
|
\centering
|
|
\includegraphics[width=0.8\textwidth]{figures/etsi-its-architecture.png}
|
|
\caption{The ETSI ITS-station reference architecture, based on \cite{europeantelecommunicationsstandardsinstituteetsiETSI3026652010}}
|
|
\label{fig:etsi-its-arch}
|
|
\end{figure}
|
|
|
|
OSI layers 1 and 2 are combined into the \textit{Access} layer, OSI layers 3 and 4 into the \textit{Networking \& Transport} layer and OSI layers 5, 6 and 7 are put into the \textit{Facilities} layer (see Fig. \ref{fig:etsi-its-arch} ). \\
|
|
The two vertical \textit{Management} and \textit{Security} layers provide supporting functionality throughout the whole stack. \textit{Applications} make use of the ITS-station services and thus sit on top of it all.
|
|
|
|
Designed for modularity, the ETSI ITS architecture allows for a big number of access protocols. Similarly, a great variety of applications can run on top of the stack. Because of that variety, these two layers are considered out-of-scope of this survey.
|
|
|
|
% \nocite{european_telecommunications_standards_institute_etsi_etsi_2010}
|
|
|
|
\subsection{Identifiers}
|
|
|
|
\section{Pseudonym Schemes}
|
|
|
|
\subsection{Pseudonym Schemes for ETSI ITS Systems}
|
|
|
|
\subsection{Pseudonym Change Strategies}
|
|
|
|
\subsection{Further Pseudonym Techniques}
|
|
|
|
\section{Evaluation}
|
|
|
|
\subsection{Attacker Model}
|
|
|
|
\section{Summary}
|
|
% % %
|
|
% Theory (probably)
|
|
|
|
% % %
|
|
% Specifications
|
|
|
|
% % %
|
|
% Implementation
|
|
|
|
% % %
|
|
% Evaluation
|
|
|
|
% % %
|
|
% Related work (can be done together with literature survey)
|
|
% STATE HOW THE RELATED WORK RELATES TO YOUR WORK!! (how is it similar, how is it different?)
|
|
% Related work is not your enemy, but gives you ``the shoulders of giants'' you can stand on
|
|
% (and besides: some of the authors might review your paper... ;)
|
|
|
|
% % %
|
|
% Further work and conclusion
|
|
|
|
|
|
\section{Glossary}
|
|
|
|
\include{glossary}
|
|
|
|
%\nocite{booth08craft}
|
|
\bibliographystyle{IEEEtran}
|
|
\bibliography{mybib}
|
|
|
|
%----------------------------------------------------------------------
|
|
|
|
\end{document}
|
|
|
|
|
|
% % %
|
|
% A good outline for a computer science paper (according to Al Bundy)
|
|
%
|
|
% Title
|
|
% * - ideally the title should state the hypothesis of the paper
|
|
%
|
|
% Abstract
|
|
% * - state hypothesis and summarise the evidence that supports or refutes it
|
|
%
|
|
% Introduction
|
|
% * - motivate the contribution!
|
|
%
|
|
% Literature Survey
|
|
% * - broad and shallow account of the field, rival approaches, drawbacks of each, major outstanding problems
|
|
%
|
|
% Background
|
|
% * - states previous work in more detail, where this is necessary for understanding
|
|
%
|
|
% Theory
|
|
% * - underlying theory, definitions, theorems etc.
|
|
%
|
|
% Specification
|
|
% * - requirements and specs of implementation
|
|
%
|
|
% Implementation Evaluation Related Work
|
|
% * - narrow but deep comparison with main rivals
|
|
%
|
|
% Further Work Conclusion
|
|
% * - summarise research, discuss significance, restate hypothesis and the evidence for and against it, - recapitulate original motivation, reassess the state of the field in the light of this new contribution
|
|
%
|
|
% Appendices
|
|
%
|