Difference between revisions of "Pi Car Comm"

From ESE205 Wiki
Jump to navigation Jump to search
Line 27: Line 27:
 
<h3>Data Transfer Rate</h3>
 
<h3>Data Transfer Rate</h3>
 
<p>As the cars will be moving quickly, one of the main challenges will be ensuring that each car can establish and modify its network extremely quickly. Thus, not just data transfer, but also network establishment speed will be important.</p>
 
<p>As the cars will be moving quickly, one of the main challenges will be ensuring that each car can establish and modify its network extremely quickly. Thus, not just data transfer, but also network establishment speed will be important.</p>
 +
<p>Additionally, simultaneously addressing all valid addresses will be difficult to do efficiently.</p>
 
<h3>Security</h3>
 
<h3>Security</h3>
 
<p>Since we're using Wi-Fi, there is a potential for a malicious actor to transmit faulty messages that could trick a car.</p>
 
<p>Since we're using Wi-Fi, there is a potential for a malicious actor to transmit faulty messages that could trick a car.</p>

Revision as of 21:34, 2 February 2018

https://classes.engineering.wustl.edu/ese205/core/index.php?title=Pi_Car_Comm_Log

Introduction

Overview

The goal of this project is to establish vehicular communication between a group of PiCars. The end goal is to demonstrate this capability, specifically as it applies to collision avoidance between two or more vehicles.

Members

  • Patrick Naughton
  • Yak Fishman
  • Jacob Cytron
  • TA: Sam Hoff
  • Instructor:

Objectives

  • Establish an ad hoc network between many (potentially up to 10, at least 2) Pi Cars
  • Use this communication capability to avoid collisions in a demonstration involving at least 2 Pi Cars

Challenges

Data Transfer Rate

As the cars will be moving quickly, one of the main challenges will be ensuring that each car can establish and modify its network extremely quickly. Thus, not just data transfer, but also network establishment speed will be important.

Additionally, simultaneously addressing all valid addresses will be difficult to do efficiently.

Security

Since we're using Wi-Fi, there is a potential for a malicious actor to transmit faulty messages that could trick a car.

Fortunately, since the Pi's and/or cars will not be connected to the internet, a malicious actor would have to be physically close to the car (within the range of the Wi-Fi), substantially limiting the number of potential attackers.

Gantt Chart