<?xml version="1.0" encoding="US-ASCII"?>
<!-- <?xml version="1.0" encoding="UTF-8"?> -->
<!-- edited with XMLSPY v5 rel. 3 U (http://www.xmlspy.com)
     by Daniel M Kohn (private)
-->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">

<?rfc toc="yes"?>
<?rfc rfcedstyle="yes"?>
<?rfc subcompact="no"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" category="info"
    docName="draft-ietf-ipwave-vehicular-networking-20">

<front>
    <title abbrev="IPWAVE Problem Statement">
    IPv6 Wireless Access in Vehicular Environments (IPWAVE): Problem Statement and Use Cases
    </title>

    <author initials="J." surname="Jeong, Ed."
        fullname="Jaehoon (Paul) Jeong (editor)">		
        <organization abbrev="Sungkyunkwan University">
           Department of Computer Science and Engineering
        </organization>

        <address>
            <postal>
                <street>Sungkyunkwan University</street>
                <street>2066 Seobu-Ro, Jangan-Gu</street>
                <city>Suwon</city> <region>Gyeonggi-Do</region>
                <code>16419</code>
                <country>Republic of Korea</country>
            </postal>
            <phone>+82 31 299 4957</phone>
            <facsimile>+82 31 290 7996</facsimile>
            <email>pauljeong@skku.edu</email>
            <uri>http://iotlab.skku.edu/people-jaehoon-jeong.php
    		</uri>
        </address>
    </author>
 
    <date month="March" day="18" year="2021" />
	
    <area>Internet</area>

    <workgroup>IPWAVE Working Group</workgroup>

<!-- [rfced] Please insert any keywords (beyond those that appear in
     the title) for use on http://www.rfc-editor.org/rfcsearch.html. -->

<keyword>Internet-Draft</keyword>

    <abstract>
    <t>
    This document discusses the problem statement and use cases of 
    IPv6-based vehicular networking for Intelligent Transportation Systems (ITS). 
    The main scenarios of vehicular communications are vehicle-to-vehicle (V2V), 
   	vehicle-to-infrastructure (V2I), and vehicle-to-everything (V2X) communications. 
    First, this document explains use cases using V2V, V2I, and V2X networking.
    Next, for IPv6-based vehicular networks, it makes a gap analysis of current 
    IPv6 protocols (e.g., IPv6 Neighbor Discovery, Mobility Management, and
    Security &amp; Privacy), and then enumerates requirements for the extensions
    of those IPv6 protocols for IPv6-based vehicular networking.	
    </t>
    </abstract>
</front>

<middle>

<section anchor="section:Introduction" title="Introduction"> 
    <t>
    Vehicular networking studies have mainly focused on improving safety and
    efficiency, and also enabling entertainment in vehicular networks. The Federal
    Communications Commission (FCC) in the US allocated wireless channels
    for Dedicated Short-Range Communications (DSRC) <xref target="DSRC"/> 
    in the Intelligent Transportation Systems (ITS) with the frequency band of 
    5.850 - 5.925 GHz (i.e., 5.9 GHz band). DSRC-based wireless communications
    can support vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I),
    and vehicle-to-everything (V2X) networking.
    The European Union (EU) allocated radio spectrum for safety-related and 
    non-safety-related applications of ITS with the frequency band of 
    5.875 - 5.905 GHz, as part of the Commission Decision 2008/671/EC <xref target="EU-2008-671-EC"/>.
    </t>

    <t>
    For direct inter-vehicular wireless connectivity, IEEE has amended  
    standard 802.11 (commonly known as Wi-Fi) to enable safe driving services based on DSRC 
    for the Wireless Access in Vehicular Environments (WAVE) 
    system. The Physical Layer (L1) and Data Link Layer (L2) issues are addressed 
    in IEEE 802.11p  <xref target="IEEE-802.11p" /> 
    for the PHY and MAC of the DSRC, while IEEE 1609.2 <xref target="WAVE-1609.2" /> 
    covers security aspects, IEEE 1609.3 <xref target="WAVE-1609.3" /> 
    defines related services at network and transport layers, and IEEE 1609.4 
    <xref target="WAVE-1609.4" /> specifies the multi-channel operation. 
    IEEE 802.11p was first a separate amendment, but was later rolled into
    the base 802.11 standard (IEEE 802.11-2012) as IEEE 802.11 Outside the Context 
    of a Basic Service Set (OCB) in 2012 <xref target="IEEE-802.11-OCB" />.
	</t>
	
	<t>
    3GPP has standardized Cellular Vehicle-to-Everything (C-V2X) communications
	to support V2X in LTE mobile networks (called LTE V2X)
    and V2X in 5G mobile networks (called 5G V2X) <xref target="TS-23.285-3GPP" />
	<xref target="TR-22.886-3GPP" /><xref target="TS-23.287-3GPP" />.
	With C-V2X,	vehicles can directly communicate with each other without 
	relay nodes (e.g., eNodeB in LTE and gNodeB in 5G).
    </t>

    <t>
   	Along with these WAVE standards and C-V2X standards, regardless of a wireless 
    access technology under the IP stack of a vehicle, vehicular networks can
    operate IP mobility with IPv6 <xref target="RFC8200" /> and Mobile IPv6
    protocols (e.g., Mobile IPv6 (MIPv6) <xref target="RFC6275" />, Proxy MIPv6
    (PMIPv6) <xref target="RFC5213" />, Distributed Mobility Management (DMM)
    <xref target="RFC7333" />, Locator/ID Separation Protocol (LISP)
    <xref target="RFC6830BIS" />, and Asymmetric Extended Route Optimization (AERO)
    <xref target="RFC6706BIS" />). In addition, ISO has approved a standard specifying the 
    IPv6 network protocols and services to be used for Communications Access 
    for Land Mobiles (CALM) <xref target="ISO-ITS-IPv6" />
	<xref target="ISO-ITS-IPv6-AMD1" />.
    </t>

    <t>
    This document describes use cases and a problem statement about
    IPv6-based vehicular networking for ITS, which is named IPv6 Wireless Access in 
    Vehicular Environments (IPWAVE). 
    First, it introduces the use cases for using V2V, V2I, and V2X networking 
    in ITS.
    Next, for IPv6-based vehicular networks, it makes a gap analysis of 
    current IPv6 protocols (e.g., IPv6 Neighbor Discovery, Mobility 
    Management, and Security &amp; Privacy), and then enumerates requirements
    for the extensions of those IPv6 protocols, which are tailored to
    IPv6-based vehicular networking. Thus, this document is intended to
    motivate development of key protocols for IPWAVE.
    </t>

</section>	<!--  end section "Introduction"  --> 

<section anchor="section:Terminology" title="Terminology">
    <t>
    This document uses the terminology described in <xref target="RFC8691" />.  
    In addition, the following terms are defined below:
    </t>
    
    <t>
    <list style="symbols"> 
    <t>
    Class-Based Safety Plan: A vehicle can make a safety plan by classifying 
    the surrounding vehicles into different groups for safety purposes 
    according to the geometrical relationship among them. The vehicle groups can be classified 
    as Line-of-Sight Unsafe, Non-Line-of-Sight Unsafe, and Safe groups <xref target="CASD" />.
    </t>
	
    <t>
    Context-Awareness: A vehicle can be aware of spatial-temporal mobility 
    information (e.g., position, speed, direction, and acceleration/deceleration) 
    of surrounding vehicles for both safety and non-safety uses through sensing 
    or communication <xref target="CASD" />.
    </t>

    <t>
    DMM: "Distributed Mobility Management" 
	<xref target="RFC7333"/><xref target="RFC7429"/>.
    </t>
	
    <t>
    Edge Computing (EC): It is the local computing near an access network (i.e.,
    edge network) for the sake of vehicles and pedestrians.
    </t>
	   
    <t>
    Edge Computing Device (ECD): It is a computing device (or server) for edge computing 
    for the sake of vehicles and pedestrians.
    </t>
	   
    <t>
    Edge Network (EN): It is an access network that has an IP-RSU for wireless 
    communication with other vehicles having an IP-OBU and wired communication 
    with other network devices (e.g., routers, IP-RSUs, ECDs, servers, and MA). 
    It may have a Global Positioning System (GPS) radio receiver for its 
    position recognition and the localization service for the sake of vehicles.
    </t>
	
    <t>
    IP-OBU: "Internet Protocol On-Board Unit": An IP-OBU denotes a computer 
    situated in a vehicle (e.g., car, bicycle, autobike, 
    motor cycle, and a similar one) and a device (e.g., smartphone 
    and IoT device).  It has at least one IP interface that runs
    in IEEE 802.11-OCB and has an "OBU" transceiver.
    Also, it may have an IP interface that runs in Cellular V2X
    (C-V2X) <xref target="TS-23.285-3GPP" />
	<xref target="TR-22.886-3GPP" /><xref target="TS-23.287-3GPP" />.
    See the definition of the term "OBU" in <xref target="RFC8691" />.
    </t>
 
    <t>
    IP-RSU: "IP Roadside Unit": An IP-RSU is situated along the road.  It has 
    at least two distinct IP-enabled interfaces.  The wireless PHY/MAC layer of 
    at least one of its IP-enabled interfaces is configured to operate in 
    802.11-OCB mode.  An IP-RSU communicates with the IP-OBU over an 802.11 
    wireless link operating in OCB mode. Also, it may have an IP interface that 
    runs in C-V2X along with an "RSU" transceiver.  An IP-RSU is similar to an 
    Access Network Router (ANR), defined in <xref target="RFC3753" />, and 
    a Wireless Termination Point (WTP), defined in <xref target="RFC5415" />.
    See the definition of the term "RSU" in <xref target="RFC8691" />.
    </t>
	
    <t>
    LiDAR: "Light Detection and Ranging". It is a scanning device 
    to measure a distance to an object by emitting pulsed laser light and 
    measuring the reflected pulsed light.	
    </t>
		
    <t>
    Mobility Anchor (MA): A node that maintains IPv6 addresses and 
    mobility information of vehicles in a road network to support
    their IPv6 address autoconfiguration and mobility management 
    with a binding table. 
    An MA has End-to-End (E2E) connections (e.g., tunnels) with 
    IP-RSUs under its control for the address autoconfiguration 
    and mobility management of the vehicles.  This MA is similar to
    a Local Mobility Anchor (LMA) in PMIPv6 <xref target="RFC5213" />
    for network-based mobility management.
    </t>		
			
    <t>
    OCB: "Outside the Context of a Basic Service Set - BSS". It is a mode
    of operation in which a Station (STA) is not a member of a BSS and does not 
    utilize IEEE Std 802.11 authentication, association, or data 
    confidentiality <xref target="IEEE-802.11-OCB" />.
    </t>
    
    <t>
    802.11-OCB: It refers to the mode specified in IEEE Std 802.11-2016 
    <xref target="IEEE-802.11-OCB" /> when the MIB attribute dot11OCBActivited 
    is 'true'.
    </t>
	
    <t>
    Platooning: Moving vehicles can be grouped together to reduce 
    air-resistance for energy efficiency and reduce the number of drivers such 
    that only the leading vehicle has a driver, and the other vehicles are autonomous 
    vehicles without a driver and closely follow the leading vehicle <xref target="Truck-Platooning" />.
    </t>
		
    <t>
    Traffic Control Center (TCC): A system that manages road
    infrastructure nodes (e.g., IP-RSUs, MAs, traffic signals, and
    loop detectors), and also maintains vehicular traffic statistics 
    (e.g., average vehicle speed and vehicle inter-arrival time per
    road segment) and vehicle information (e.g., a vehicle's identifier,
    position, direction, speed, and trajectory as a navigation path).
    TCC is part of a vehicular cloud for vehicular networks. 
    </t>		
		
    <t>
    Vehicle: A Vehicle in this document is a node that has an IP-OBU 
    for wireless communication with other vehicles and IP-RSUs. 
    It has a GPS radio navigation receiver for efficient navigation.
    Any device having an IP-OBU and a GPS receiver (e.g., smartphone and
    tablet PC) can be regarded as a vehicle in this document.
    </t>
		
    <t>
    Vehicular Ad Hoc Network (VANET): A network that consists of vehicles
    interconnected by wireless communication. 
    Two vehicles in a VANET can communicate with each other using
    other vehicles as relays even where they are out of one-hop 
    wireless communication range.
    </t>
		
    <t>
    Vehicular Cloud: A cloud infrastructure for vehicular networks, having
    compute nodes, storage nodes, and network forwarding elements 
    (e.g., switch and router).
    </t>

    <t>
    V2D: "Vehicle to Device". It is the wireless communication between 
    a vehicle and a device (e.g., smartphone and IoT device).
    </t>
	
    <t>
    V2I2D: "Vehicle to Infrastructure to Device". It is the wireless 
    communication between a vehicle and a device (e.g., smartphone and
    IoT device) via an infrastructure node (e.g., IP-RSU).
    </t>

    <t>
    V2I2V: "Vehicle to Infrastructure to Vehicle". It is the wireless 
    communication between a vehicle and another vehicle via an 
    infrastructure node (e.g., IP-RSU).
    </t>

    <t>
    V2I2X: "Vehicle to Infrastructure to Everything". It is the wireless 
    communication between a vehicle and another entity (e.g., vehicle,
    smartphone, and IoT device) via an infrastructure node (e.g., IP-RSU).
    </t>

    <t>
    V2X: "Vehicle to Everything". It is the wireless communication between 
    a vehicle and any entity (e.g., vehicle, infrastructure node, 
    smartphone, and IoT device), including V2V, V2I, and V2D.
    </t>
		
    <t>
    VIP: "Vehicular Internet Protocol". It is an IPv6 extension for
    vehicular networks including V2V, V2I, and V2X.
    </t>

    <t>
    VMM: "Vehicular Mobility Management". It is an IPv6-based mobility 
    management for vehicular networks.
    </t>

    <t>
    VND: "Vehicular Neighbor Discovery". It is an IPv6 ND extension for 
    vehicular networks.
    </t>

    <t>
    VSP: "Vehicular Security and Privacy". It is an IPv6-based security and
    privacy for vehicular networks.
    </t>

    <t>
    WAVE: "Wireless Access in Vehicular Environments" <xref target="WAVE-1609.0" />.
    </t>

    </list>
    </t>
</section>	<!--  end section "Terminology"  --> 

<section anchor="section:Use-Cases" title="Use Cases">
    <t>
    This section explains use cases of V2V, V2I, and V2X networking. 
    The use cases of the V2X networking exclude the ones of the V2V 
    and V2I networking, but include Vehicle-to-Pedestrian (V2P) and 
    Vehicle-to-Device (V2D).
    </t>

    <t>
    IP is widely used among popular end-user devices (e.g., 
    smartphone and tablet) in the Internet. Applications 
    (e.g., navigator application) for those devices can be extended
    such that the V2V use cases in this section can work with IPv6
    as a network layer protocol and IEEE 802.11-OCB as a link layer
    protocol.  In addition, IPv6 security needs to be extended to
    support those V2V use cases in a safe, secure, privacy-preserving
    way.
    </t>

    <t>	
    The use cases presented in this section serve as the description
    and motivation for the need to extend IPv6 and its protocols to
    facilitate "Vehicular IPv6". <xref target="section:Problem-Statement" />
    summarizes the overall problem statement and IPv6 requirements.
    Note that the adjective "Vehicular" in this document is used to 
    represent extensions of existing protocols such as IPv6 Neighbor 
    Discovery, IPv6 Mobility Management (e.g., PMIPv6 
    <xref target="RFC5213" /> and DMM <xref target="RFC7429" />), and 
    IPv6 Security and Privacy Mechanisms rather than new 
    "vehicular-specific" functions.
    </t>

    <section anchor="subsection:V2V-Use-Cases" title="V2V">
    <t>
        The use cases of V2V networking discussed in this section include 
        <list style="symbols">
            <t>Context-aware navigation for safe driving and collision avoidance;</t>
            <t>Cooperative adaptive cruise control in a roadway;</t>
            <t>Platooning in a highway;</t>
            <t>Cooperative environment sensing;</t>
			<t>Collision avoidance service of end systems of Urban Air Mobility (UAM)
               <xref target="UAM-ITS" />.</t>
        </list>
        These five techniques will be important elements for autonomous vehicles, 
        which may be either terrestrial vehicles or UAM end systems.
	</t>
	
    <t>
    Context-Aware Safety Driving (CASD) navigator <xref target="CASD" />
    can help drivers to drive safely by alerting them to
    dangerous obstacles and situations. That is, a CASD navigator displays
    obstacles or neighboring vehicles relevant to possible collisions in
    real-time through V2V networking. CASD provides vehicles with a
    class-based automatic safety action plan, which considers three
    situations, namely, the Line-of-Sight unsafe, Non-Line-of-Sight
    unsafe, and safe situations. This action plan can be put into action
    among multiple vehicles using V2V networking.
    </t>

    <t>
    Cooperative Adaptive Cruise Control (CACC)
    <xref target="CA-Cruise-Control" /> helps individual vehicles to adapt their
    speed autonomously through V2V communication among vehicles according
    to the mobility of their predecessor and successor vehicles in an
    urban roadway or a highway. Thus, CACC can help adjacent vehicles to
    efficiently adjust their speed in an interactive way through V2V 
    networking in order to avoid a collision.
    </t>

    <t>
    Platooning <xref target="Truck-Platooning" /> allows a series (or group) of
    vehicles (e.g., trucks) to follow each other very closely.
    Trucks can use V2V communication in addition to
    forward sensors in order to maintain constant clearance between two
    consecutive vehicles at very short gaps (from 3 meters to 10 meters).
    Platooning can maximize the throughput of vehicular traffic in
    a highway and reduce the gas consumption because the leading vehicle
    can help the following vehicles to experience less air resistance.  
    </t>

    <t>
    Cooperative-environment-sensing use cases suggest that vehicles can 
    share environmental information (e.g., air pollution, hazards/obstacles,
    slippery areas by snow or rain, road accidents, traffic congestion,
    and driving behaviors of neighboring vehicles) from various
    vehicle-mounted sensors, such as radars, LiDARs, and cameras, with other
    vehicles and pedestrians.
    <xref target="Automotive-Sensing"/> introduces millimeter-wave 
    vehicular communication for massive automotive sensing. 
    A lot of data can be generated by those sensors, and 
    these data typically need to be routed to different destinations. 
    In addition, from the perspective of driverless vehicles, it is 
    expected that driverless vehicles can be mixed with driver-operated 
    vehicles. Through cooperative environment sensing, driver-operated 
    vehicles can use environmental information sensed by driverless vehicles 
    for better interaction with the other vehicles and environment.
    Vehicles can also share their intended maneuvering information (e.g.,
    lane change, speed change, ramp in-and-out, cut-in, and abrupt braking)
    with neighboring vehicles.
	Thus, this information sharing can help the vehicles behave as more
    efficient traffic flows and minimize unnecessary acceleration and
    deceleration to achieve the best ride comfort.
    </t>
	
	<t>
    A collision avoidance service of UAM end systems in air can be envisioned
    as a use case in air vehicular environments. This use case is similar to the 
    context-aware navigator for terrestrial vehicles. Through V2V coordination,
    those UAM end systems (e.g., drones) can avoid a dangerous situation
    (e.g., collision) in three-dimensional space rather than two-dimensional
    space for terrestrial vehicles. Also, UAM end systems (e.g., flying car)
    with only a few meters off the ground can communicate with terrestrial vehicles 
    with wireless communication technologies (e.g., DSRC, LTE, and C-V2X).
	Thus, V2V means any vehicle to any vehicle, whether the vehicles are 
	ground-level or not.
	</t>

    <t>
    To encourage more vehicles to participate in this cooperative environmental
    sensing, a reward system will be needed. Sensing activities of each vehicle
	need to be logged in either a central way through a logging server
    (e.g., TCC) in the vehicular cloud or a distributed way (e.g., blockchain
    <xref target="Bitcoin"/>) through other vehicles or infrastructure. 
    In the case of a blockchain, each sensing message from a vehicle can be
    treated as a transaction and the neighboring vehicles can play the
    role of peers in a consensus method of a blockchain <xref target="Bitcoin"/><xref target="Vehicular-BlockChain"/>.	
    </t>

	<t>
    Although a Layer-2 solution can provide a support for multihop communications 
    in vehicular networks, the scalability issue related to multihop forwarding still 
    remains when vehicles need to disseminate or forward packets toward    
    multihop-away destinations. In addition, the IPv6-based approach for V2V as a 
    network layer protocol can accommodate multiple radio technologies as MAC
    protocols, such as 5G V2X and DSRC. Therefore, the existing IPv6 protocol can  
    be augmented through the addition of an Overlay Multilink Network (OMNI) Interface
    <xref target="OMNI" /> and/or protocol changes in order to support both wireless
    single-hop/multihop V2V communications and multiple radio technologies in 
    vehicular networks.
    In such a way, vehicles can communicate with each other by V2V communications to
    share either an emergency situation or road hazard in a highway having multiple
    kinds of radio technologies, such as 5G V2X and DSRC.
	</t>
	
    <t>
    To support applications of these V2V use cases, the functions of IPv6
    such as VND and VSP are prerequisites for IPv6-based packet exchange 
    and secure, safe communication between two vehicles.
    </t>

    </section>	<!--  end subsection "V2V Use Cases"  --> 
    
    <section anchor="subsection:V2I-Use-Cases" title="V2I">
    <t>
        The use cases of V2I networking discussed in this section include
        <list style="symbols">
            <t>Navigation service;</t>
            <t>Energy-efficient speed recommendation service;</t>
            <t>Accident notification service;</t>
            <t>Electric vehicle (EV) charging service;</t>
            <t>UAM navigation service with efficient battery charging.</t>
        </list>
    </t>

    <t>
    A navigation service, for example, the Self-Adaptive Interactive 
    Navigation Tool(SAINT) <xref target="SAINT" />, using V2I networking 
    interacts with a TCC for the large-scale/long-range road traffic 
    optimization and can guide individual vehicles along appropriate 
    navigation paths in real time.
    The enhanced version of SAINT <xref target="SAINTplus" /> can
    give fast moving paths to emergency vehicles (e.g., ambulance
    and fire engine) to let them reach an accident spot while redirecting other vehicles
    near the accident spot into efficient detour paths.
    </t>

    <t>
    Either a TCC or an ECD can recommend an energy-efficient speed to a vehicle 
    that depends on its traffic environment and traffic signal scheduling
    <xref target="SignalGuru"/>. For example, when a vehicle approaches 
    an intersection area and a red traffic light for the vehicle becomes
    turned on, it needs to reduce its speed to save fuel consumption. In 
    this case, either a TCC or an ECD, which has the up-to-date
    trajectory of the vehicle and the traffic light schedule, can notify
    the vehicle of an appropriate speed for fuel efficiency.
    <xref target="Fuel-Efficient"/> studies fuel-efficient route 
    and speed plans for platooned trucks. 
    </t>

    <t> 
    The emergency communication between accident vehicles (or emergency
    vehicles) and a TCC can be performed via either IP-RSU or 4G-LTE networks.
    The First Responder Network Authority (FirstNet)
    <xref target="FirstNet" /> is provided by the US government to
    establish, operate, and maintain an interoperable public safety
    broadband network for safety and security network services, e.g.,
    emergency calls. The construction of the nationwide FirstNet network
    requires each state in the US to have a Radio Access Network (RAN)
    that will connect to the FirstNet's network core. 
    The current RAN is mainly constructed using 4G-LTE for the communication 
    between a vehicle and an infrastructure node (i.e., V2I) 
    <xref target="FirstNet-Report"/>, but it is expected that DSRC-based vehicular 
    networks <xref target="DSRC"/> will be available for V2I and V2V in the near future.
    </t>

    <t>
    An EV charging service with V2I can facilitate the efficient battery
    charging of EVs. In the case where an EV charging station is connected to
    an IP-RSU, an EV can be guided toward the deck of the EV charging station
    through a battery charging server connected to the IP-RSU. In addition to
    this EV charging service, other value-added services (e.g., air 
    firmware/software update and media streaming) can be provided to an EV
    while it is charging its battery at the EV charging station.
    </t>

    <t>
    A UAM navigation service with efficient battery charging can plan the
    battery charging schedule of UAM end systems (e.g., drone) for
    long-distance flying <xref target="CBDN"/>.
    For this battery charging schedule, a UAM end system can communicate with
    an infrastructure node (e.g., IP-RSU) toward a cloud server via V2I 
    communications. This cloud server can coordinate the battery charging 
    schedules of multiple UAM end systems for their efficient navigation path,
    considering flight time from their current position to a battery charging
    station, waiting time in a waiting queue at the station, and battery
    charging time at the station.
    </t>

	<t>
    The existing IPv6 protocol must be augmented through the addition of an
    OMNI interface and/or protocol changes in order to support wireless
    multihop V2I communications in a highway where RSUs are sparsely deployed,
    so a vehicle can reach the wireless coverage of an RSU through the
    multihop data forwarding of intermediate vehicles. 
    Thus, IPv6 needs to be extended for multihop V2I communications.
	</t>

    <t>
    To support applications of these V2I use cases, the functions of IPv6
    such as VND, VMM, and VSP are prerequisites for IPv6-based packet 
    exchange, transport-layer session continuity, and secure, safe 
    communication between a vehicle and a server in the vehicular cloud.
    </t>

    </section>  <!--  end subsection "V2I Use Cases"  --> 
    
    <section anchor="subsection:V2X-Use-Cases" title="V2X">
    <t>
    The use case of V2X networking discussed in this section is
    for a pedestrian protection service. 
    </t>

    <t>
    A pedestrian protection service, such as Safety-Aware Navigation 
    Application (SANA) <xref target="SANA" />, using V2I2P networking 
    can reduce the collision of a vehicle and a pedestrian carrying a
    smartphone equipped with a network device for wireless communication
    (e.g., Wi-Fi) with an IP-RSU. Vehicles and pedestrians can also 
    communicate with each other via an IP-RSU. An edge computing device
    behind the IP-RSU can collect the mobility information from vehicles
    and pedestrians, compute wireless communication scheduling for the
    sake of them. This scheduling can save the battery of each 
    pedestrian's smartphone by allowing it to work in sleeping mode
    before the communication with vehicles, considering their mobility.
    </t>

    <t>
    For Vehicle-to-Pedestrian (V2P), a vehicle can directly communicate 
    with a pedestrian's smartphone by V2X without IP-RSU relaying. 
    Light-weight mobile nodes such as bicycles may also communicate 
    directly with a vehicle for collision avoidance using V2V.
    </t>

	<t>
    The existing IPv6 protocol must be augmented through the addition
    of an OMNI interface and/or protocol changes in order to support
    wireless multihop V2X (or V2I2X) communications in an urban road
    network where RSUs are deployed at intersections, so a vehicle
    (or a pedestrian's smartphone) can reach the wireless coverage of
    an RSU through the multihop data forwarding of intermediate
    vehicles (or pedestrians' smartphones). Thus, IPv6 needs to be
    extended for multihop V2X (or V2I2X) communications.
	</t>

    <t>
    To support applications of these V2X use cases, the functions of IPv6
    such as VND, VMM, and VSP are prerequisites for IPv6-based packet exchange,
    transport-layer session continuity, and secure, safe communication 
    between a vehicle and a pedestrian either directly or indirectly via an IP-RSU.
    </t>

    </section>  <!--  end subsection "V2X Use Cases"  --> 

</section>	<!--  end section "Use Cases"  --> 
	
<section anchor="section:Vehicular-Networks" title="Vehicular Networks">
    <t>
    This section describes an example vehicular network architecture 
    supporting V2V, V2I, and V2X communications in vehicular networks.
    It describes an internal network within a vehicle or an edge network 
    (called EN). It explains not only the internetworking between the
    internal networks of a vehicle and an EN via wireless links, but also
    the internetworking between the internal networks of two vehicles
    via wireless links.		
    </t>
	
	   <figure anchor="fig:vehicular-network-architecture"
        title="An Example Vehicular Network Architecture for V2I and V2V">
        <artwork><![CDATA[
                     Traffic Control Center in Vehicular Cloud
                    *******************************************
+-------------+    *                                           *
|Corresponding|   *             +-----------------+             *
|    Node     |<->*             | Mobility Anchor |             *
+-------------+   *             +-----------------+             *
                  *                      ^                      *
                  *                      |                      *
                   *                     v                     *
                    *******************************************
                    ^                   ^                     ^
                    |                   |                     |
                    |                   |                     |
                    v                   v                     v
              +---------+           +---------+           +---------+
              | IP-RSU1 |<--------->| IP-RSU2 |<--------->| IP-RSU3 |
              +---------+           +---------+           +---------+
                  ^                     ^                    ^
                  :                     :                    :
           +-----------------+ +-----------------+   +-----------------+
           |      : V2I      | |        : V2I    |   |       : V2I     |
           |      v          | |        v        |   |       v         |
+--------+ |   +--------+    | |   +--------+    |   |   +--------+    |
|Vehicle1|===> |Vehicle2|===>| |   |Vehicle3|===>|   |   |Vehicle4|===>|
+--------+<...>+--------+<........>+--------+    |   |   +--------+    |
           V2V     ^         V2V        ^        |   |        ^        |
           |       : V2V     | |        : V2V    |   |        : V2V    |
           |       v         | |        v        |   |        v        |
           |  +--------+     | |   +--------+    |   |    +--------+   |
           |  |Vehicle5|===> | |   |Vehicle6|===>|   |    |Vehicle7|==>| 
           |  +--------+     | |   +--------+    |   |    +--------+   |
           +-----------------+ +-----------------+   +-----------------+
                 Subnet1              Subnet2              Subnet3
                (Prefix1)            (Prefix2)            (Prefix3)          

        <----> Wired Link   <....> Wireless Link   ===> Moving Direction
    ]]></artwork>
    </figure>		        
	
    <section anchor="subsection:GP-Vehicular-Network-Architecture"
	        title="Vehicular Network Architecture">
    <t>
    <xref target="fig:vehicular-network-architecture" /> shows an
    example vehicular network architecture for V2I and V2V in 
    a road network <xref target="OMNI" />. 
    The vehicular network architecture contains vehicles 
    (including IP-OBU), IP-RSUs, Mobility Anchor, Traffic Control
    Center, and Vehicular Cloud as components. Note that the
    components of the vehicular network architecture can be mapped
    to those of an IP-based aeronautical network architecture in
    <xref target="OMNI" />, as shown in 
    <xref target="fig:network-component-mapping" />.
	</t>
	
   <figure anchor="fig:network-component-mapping"
        title="Mapping between Vehicular Network Components and
        Aeronautical Network Components">
        <artwork><![CDATA[
     +-------------------+------------------------------------+
     | Vehicular Network | Aeronautical Network               | 
     +===================+====================================+
     | IP-RSU            | Access Router (AR)                 |
     +-------------------+------------------------------------+
     | Vehicle (IP-OBU)  | Mobile Node (MN)                   |
     +-------------------+------------------------------------+
     | Moving Network    | End User Network (EUN)             |
     +-------------------+------------------------------------+
     | Mobility Anchor   | Mobility Service Endpoint (MSE)    |
     +-------------------+------------------------------------+
     | Vehicular Cloud   | Internetwork (INET) Routing System |
     +-------------------+------------------------------------+
    ]]></artwork>
    </figure>

    <t>
    These components are not mandatory, and they can be deployed
    into vehicular networks in various ways. Some of them (e.g., 
    Mobility Anchor, Traffic Control Center, and Vehicular Cloud) may
    not be needed for the vehicular networks according to target use
    cases in <xref target="section:Use-Cases" />.
    </t>
	
	<t>
    An existing network architecture (e.g., an IP-based aeronautical
    network architecture <xref target="OMNI" /><xref target="UAM-ITS" />,
    a network architecture of PMIPv6 <xref target="RFC5213" />, and
    a low-power and lossy network architecture <xref target="RFC6550" />)
    can be extended to a vehicular network architecture for multihop
    V2V, V2I, and V2X, as shown in <xref target="fig:vehicular-network-architecture" />. 
    In a highway scenario, a vehicle may not access an RSU directly
    because of the distance of the DSRC coverage (up to 1 km).
    For example, the OMNI interface and/or RPL (IPv6 Routing Protocol
    for Low-Power and Lossy Networks) <xref target="RFC6550" /> can be
    extended to support a multihop V2I since a vehicle can take advantage
    of other vehicles as relay nodes to reach the RSU. 
    Also, RPL can be extended to support both multihop V2V and V2X in
    the similar way.
	</t>
	
	<t>
    Wireless communications needs to be considered for end systems
    for Urban Air Mobility (UAM) such as flying cars and taxis
    <xref target="UAM-ITS" />. These UAM end systems may have multiple
    wireless transmission media interfaces (e.g., cellular, 
    communications satellite (SATCOM), short-range omni-directional
    interfaces), which are offered by different data link service
    providers. To support not only the mobility management of the UAM
    end systems, but also the multihop and multilink communications of 
    the UAM interfaces, the UAM end systems can employ an Overlay Multilink
    Network (OMNI) interface <xref target="OMNI" /> as a virtual
    Non-Broadcast Multiple Access (NBMA) connection to a serving ground
    domain infrastructure. This infrastructure can be configured over the
    underlying data links. The OMNI interface and its link model provide a
    means of multilink, multihop and mobility coordination to the legacy
    IPv6 ND messaging <xref target="RFC4861" /> according to the NBMA
    principle. Thus, the OMNI link model can support efficient UAM
    internetworking services without additional mobility messaging, and
    without any modification to the IPv6 ND messaging services or link model.	
	</t>
		
    <t>
    As shown in this figure, IP-RSUs as routers and vehicles with IP-OBU 
    have wireless media interfaces for VANET. 
    Furthermore, the wireless media interfaces are 
    autoconfigured with a global IPv6 prefix (e.g., 2001:DB8:1:1::/64) 
    to support both V2V and V2I networking.
    Note that 2001:DB8::/32 is a documentation prefix <xref target="RFC3849"/> 
    for example prefixes in this document, and also that any routable 
    IPv6 address needs to be routable in a VANET and a vehicular network 
    including IP-RSUs.
    </t>

    <t>
    In <xref target="fig:vehicular-network-architecture" />, 
    three IP-RSUs (IP-RSU1, IP-RSU2, and IP-RSU3) are deployed in the road 
    network and are connected with each other through the wired networks 
    (e.g., Ethernet). 
    A Traffic Control Center (TCC) is connected to the Vehicular Cloud for
    the management of IP-RSUs and vehicles in the road network. 
    A Mobility Anchor (MA) may be located in the TCC as a mobility management
    controller. 
    Vehicle2, Vehicle3, and Vehicle4 are wirelessly connected to IP-RSU1, 
    IP-RSU2, and IP-RSU3, respectively.
    The three wireless networks of IP-RSU1, IP-RSU2, and IP-RSU3 can belong to three 
    different subnets (i.e., Subnet1, Subnet2, and Subnet3), respectively.
    Those three subnets use three different prefixes (i.e., Prefix1, Prefix2, 
    and Prefix3).
    </t>
		
	<t>
    Multiple vehicles under the coverage of an RSU share a prefix just as
    mobile nodes share a prefix of a Wi-Fi access point in a wireless
    LAN. This is a natural characteristic in infrastructure-based wireless
    networks. For example, in <xref target="fig:vehicular-network-architecture" />, 
    two vehicles (i.e., Vehicle2, and Vehicle5) can use Prefix 1 to configure
    their IPv6 global addresses for V2I communication. 
    Alternatively, mobile nodes can employ an OMNI interface and use their
    own IPv6 Unique Local Addresses (ULAs) <xref target="RFC4193" /> over the
    wireless network without requiring the messaging of IPv6 Stateless Address
    Autoconfiguration (SLAAC) <xref target="RFC4862" />, which uses an on-link
    prefix provided by the (visited) wireless LAN; this technique is known as
    "Bring-Your-Own-Addresses".
    </t>
	
    <t>
    A single subnet prefix announced by an RSU can span multiple vehicles 
    in VANET. For example, in <xref target="fig:vehicular-network-architecture" />, 
    for Prefix 1, three vehicles (i.e., Vehicle1, Vehicle2, and Vehicle5)
    can construct a connected VANET. Also, for Prefix 2, two vehicles
    (i.e., Vehicle3 and Vehicle6) can construct another connected VANET,
    and for Prefix 3, two vehicles (i.e., Vehicle4 and Vehicle7) can
    construct another connected VANET.
    Alternatively, each vehicle could employ an OMNI interface with their own
    ULAs such that no topologically-oriented subnet prefixes need be announced
	by the RSU.	
    </t>
		
    <t>
    In wireless subnets in vehicular networks (e.g., Subnet1 and Subnet2
    in <xref target="fig:vehicular-network-architecture" />), vehicles can 
    construct a connected VANET (with an arbitrary graph topology) and can 
    communicate with each other via V2V communication.
    Vehicle1 can communicate with Vehicle2 via V2V communication, and 
    Vehicle2 can communicate with Vehicle3 via V2V communication because
    they are within the wireless communication range of each other.
    On the other hand, Vehicle3 can communicate with 
    Vehicle4 via the vehicular infrastructure (i.e., IP-RSU2 and IP-RSU3) 
    by employing V2I (i.e., V2I2V) communication because they are not 
    within the wireless communication range of each other.
    </t>

    <t>
    For IPv6 packets transported over IEEE 802.11-OCB, 
    <xref target="RFC8691"/> specifies several details, including
    Maximum Transmission Unit (MTU), frame format, link-local address, 
    address mapping for unicast and multicast, stateless autoconfiguration, and 
    subnet structure. 
    An Ethernet Adaptation (EA) layer is in charge of transforming some 
    parameters between the IEEE 802.11 MAC layer and the IPv6 network layer, which is 
    located between the IEEE 802.11-OCB's logical link control layer and 
    the IPv6 network layer. This IPv6 over 802.11-OCB can be used for both 
    V2V and V2I in IPv6-based vehicular networks.
    </t>

    <t>
    An IPv6 mobility solution is needed for the guarantee of communication
    continuity in vehicular networks so that a vehicle's TCP session can be
    continued, or UDP packets can be delivered to a vehicle as a destination
    without loss while it moves from an IP-RSU's wireless coverage to another
    IP-RSU's wireless coverage.
    In <xref target="fig:vehicular-network-architecture" />, 
    assuming that Vehicle2 has a TCP session (or a UDP session) with a 
    corresponding node in the vehicular cloud, Vehicle2 can move from 
    IP-RSU1's wireless coverage to IP-RSU2's wireless coverage. In this case,
    a handover for Vehicle2 needs to be performed by either a host-based
    mobility management scheme (e.g., MIPv6 <xref target="RFC6275" />) or a 
    network-based mobility management scheme (e.g., PMIPv6 
    <xref target="RFC5213" /> and AERO <xref target="RFC6706BIS" />).
    </t> 
    
    <t>	
    In the host-based mobility scheme (e.g., MIPv6), an IP-RSU plays a role
    of a home agent. On the other hand, in the network-based mobility scheme
    (e.g., PMIPv6, an MA plays a role of a mobility management controller
    such as a Local Mobility Anchor (LMA) in PMIPv6, which also serves
    vehicles as a home agent, and an IP-RSU plays a role of an access router
    such as a Mobile Access Gateway (MAG) in PMIPv6 <xref target="RFC5213" />. 
	The host-based mobility scheme needs client functionality in
    IPv6 stack of a vehicle as a mobile node for mobility signaling 
	message exchange between the vehicle and home agent.
    On the other hand, the network-based mobility scheme does not 
    need such a client functionality for a vehicle because the network
    infrastructure node (e.g., MAG in PMIPv6) as a proxy mobility agent 
    handles the mobility signaling message exchange with the home agent
    (e.g., LMA in PMIPv6) for the sake of the vehicle.
	</t>
	
	<t>
    There are a scalability issue and a route optimization issue in the
    network-based mobility scheme (e.g., PMIPv6) when an MA covers a
    large vehicular network governing many IP-RSUs. In this case, a
    distributed mobility scheme (e.g., DMM <xref target="RFC7429" />)
    can mitigate the scalability issue by distributing multiple MAs in
    the vehicular network such that they are positioned closer to
    vehicles for route optimization and bottleneck mitigation in a
    central MA in the network-based mobility scheme.
    All these mobility approaches (i.e., a host-based mobility scheme,
    network-based mobility scheme, and distributed mobility scheme) and
    a hybrid approach of a combination of them need to provide an
    efficient mobility service to vehicles moving fast and moving along
    with the relatively predictable trajectories along the roadways.
    </t>

    <t>
    In vehicular networks, the control plane can be separated from
    the data plane for efficient mobility management and data forwarding
    by using the concept of Software-Defined Networking (SDN) 
    <xref target="RFC7149" /><xref target="DMM-FPC" />. 
    Note that Forwarding Policy Configuration (FPC) in <xref target="DMM-FPC" />,
	which is a flexible mobility management system, can manage the
    separation of data-plane and control-plane in DMM.
	In SDN, the control plane and data plane are separated for the
    efficient management of forwarding elements (e.g., switches and
    routers) where an SDN controller configures the forwarding elements
    in a centralized way and they perform packet forwarding according to
    their forwarding tables that are configured by the SDN controller.
    An MA as an SDN controller needs to efficiently configure and
    monitor its IP-RSUs and vehicles for mobility management,
    location management, and security services.
    </t>

    <t>		
    The mobility information of a GPS receiver mounted in its vehicle 
    (e.g., position, speed, and direction) can be used to accommodate 
    mobility-aware proactive handover schemes, which can perform the 
    handover of a vehicle according to its mobility and the wireless
    signal strength of a vehicle and an IP-RSU in a proactive way.		
    </t>

    <t>		
    Vehicles can use the TCC as their Home Network having a home agent
    for mobility management as in MIPv6 <xref target="RFC6275" /> and
    PMIPv6 <xref target="RFC5213" />, so the TCC (or an MA inside the
    TCC) maintains the mobility information of vehicles for location
    management. IP tunneling over the wireless link should be avoided
    for performance efficiency. Also, in vehicular networks,
    asymmetric links sometimes exist and must be considered for
    wireless communications such as V2V and V2I.
    </t>
    </section>
			
    <section anchor="subsection:GP-V2I-based-Internetworking"
        title="V2I-based Internetworking">
    <t>
    This section discusses the internetworking between a vehicle's
    internal network (i.e., moving network) and an EN's internal 
    network (i.e., fixed network) via V2I communication.  
    The internal network of a vehicle is nowadays constructed with
    Ethernet by many automotive vendors <xref target="In-Car-Network" />.
    Note that an EN can accommodate multiple routers (or switches) 
    and servers (e.g., ECDs, navigation server, and DNS server) 
    in its internal network.
    </t>
	
    <t>
    A vehicle's internal network often uses Ethernet to interconnect 
    Electronic Control Units (ECUs) in the vehicle.  The internal 
    network can support Wi-Fi and Bluetooth to accommodate a driver's 
    and passenger's mobile devices (e.g., smartphone or tablet).
    The network topology and subnetting depend on each vendor's 
    network configuration for a vehicle and an EN.  
    It is reasonable to consider the interaction between the internal 
    network and an external network within another vehicle or an EN.
    </t>
	
    <figure anchor="fig:v2i-internetworking"
        title="Internetworking between Vehicle and Edge Network">
        <artwork><![CDATA[
                                                 +-----------------+
                        (*)<........>(*)  +----->| Vehicular Cloud |
     (2001:DB8:1:1::/64) |            |   |      +-----------------+
+------------------------------+  +---------------------------------+
|                        v     |  |   v   v                         |
| +-------+          +-------+ |  | +-------+          +-------+    |
| | Host1 |          |IP-OBU1| |  | |IP-RSU1|          | Host3 |    |
| +-------+          +-------+ |  | +-------+          +-------+    |
|     ^                  ^     |  |     ^                  ^        |
|     |                  |     |  |     |                  |        |
|     v                  v     |  |     v                  v        |
| ---------------------------- |  | ------------------------------- |
| 2001:DB8:10:1::/64 ^         |  |     ^ 2001:DB8:20:1::/64        | 
|                    |         |  |     |                           |
|                    v         |  |     v                           |
| +-------+      +-------+     |  | +-------+ +-------+   +-------+ |
| | Host2 |      |Router1|     |  | |Router2| |Server1|...|ServerN| |
| +-------+      +-------+     |  | +-------+ +-------+   +-------+ |
|     ^              ^         |  |     ^         ^           ^     |
|     |              |         |  |     |         |           |     |
|     v              v         |  |     v         v           v     |
| ---------------------------- |  | ------------------------------- |
|      2001:DB8:10:2::/64      |  |       2001:DB8:20:2::/64        |
+------------------------------+  +---------------------------------+
   Vehicle1 (Moving Network1)            EN1 (Fixed Network1)

   <----> Wired Link   <....> Wireless Link   (*) Antenna
    ]]></artwork>
    </figure>
		
    <t>
    As shown in <xref target="fig:v2i-internetworking" />, as internal
    networks, a vehicle's moving network and an EN's fixed network 
    are self-contained networks having multiple subnets and having 
    an edge router (e.g., IP-OBU and IP-RSU) for the communication with 
    another vehicle or another EN.  
    The internetworking between two internal networks via V2I communication 
    requires the exchange of the network parameters and the network 
    prefixes of the internal networks. For the efficiency, the network
    prefixes of the internal networks (as a moving network) in a 
    vehicle need to be delegated and configured automatically. Note
    that a moving network's network prefix can be called a Mobile
    Network Prefix (MNP) <xref target="OMNI" />. 	
    </t>

    <t>
    <xref target="fig:v2i-internetworking" /> also shows the internetworking
    between the vehicle's moving network and the EN's fixed network. 
    There exists an internal network (Moving Network1) inside Vehicle1. 
    Vehicle1 has two hosts (Host1 and Host2), and two routers (IP-OBU1 
    and Router1).  There exists another internal network (Fixed Network1) 
    inside EN1.  EN1 has one host (Host3), two routers (IP-RSU1 and 
    Router2), and the collection of servers (Server1 to ServerN) for 
    various services in the road networks, such as the emergency 
    notification and navigation.  Vehicle1's IP-OBU1 (as a mobile router) 
    and EN1's IP-RSU1 (as a fixed router) use 2001:DB8:1:1::/64 for an 
    external link (e.g., DSRC) for V2I networking.
    Thus, a host (Host1) in Vehicle1 can communicate with a server 
    (Server1) in EN1 for a vehicular service through Vehicle1's moving 
    network, a wireless link between IP-OBU1 and IP-RSU1, and EN1's fixed 
    network.
    </t>

    <t>
   	For the IPv6 communication between an IP-OBU and an IP-RSU or between 
    two neighboring IP-OBUs, they need to know the network parameters, 
    which include MAC layer and IPv6 layer information.  
    The MAC layer information includes wireless link layer parameters, 
    transmission power level, and the MAC address of an external network 
    interface for the internetworking with another IP-OBU or IP-RSU.  
    The IPv6 layer information includes the IPv6 address and network 
    prefix of an external network interface for the internetworking with 
    another IP-OBU or IP-RSU.
    </t>

    <t>
    Through the mutual knowledge of the network parameters of 
    internal networks, packets can be transmitted between the vehicle's moving 
    network and the EN's fixed network. Thus, V2I requires an efficient 
    protocol for the mutual knowledge of network parameters.
    </t>

    <t>
    As shown in <xref target="fig:v2i-internetworking" />, the addresses
    used for IPv6 transmissions over the wireless link interfaces for
    IP-OBU and IP-RSU can be either global IPv6 addresses, or IPv6 ULAs
    as long as IPv6 packets can be routed within vehicular networks 
    <xref target="OMNI" />. When global IPv6 addresses are used, wireless
    interface configuration and control overhead for Duplicate Address
    Detection (DAD) <xref target="RFC4862" /> and Multicast Listener
    Discovery (MLD) <xref target="RFC2710" /><xref target="RFC3810" />
    should be minimized to support V2I and V2X communications for vehicles
    moving fast along roadways; when ULAs and the OMNI interface are used,
    no DAD nor MLD messaging is needed.
    </t>	

    <t>
    Let us consider the upload/download time of a vehicle when it passes
    through the wireless communication coverage of an IP-RSU.
    For a given typical setting where 1km is the maximum DSRC communication
    range <xref target="DSRC"/> and 100km/h is the speed limit in highway,
    the dwelling time can be calculated to be 72 seconds by dividing the diameter
    of the 2km (i.e., two times of DSRC communication range where an IP-RSU
    is located in the center of the circle of wireless communication) by
    the speed limit of 100km/h (i.e., about 28m/s). For the 72 seconds, a
    vehicle passing through the coverage of an IP-RSU can upload and download
    data packets to/from the IP-RSU.
    </t>
	
    </section>	<!--  end section "V2I-based Internetworking"  --> 

    <section anchor="subsubsubsection:GP-V2V-based-Internetworking"
        title="V2V-based Internetworking">
    <t>
    This section discusses the internetworking between the moving
    networks of two neighboring vehicles via V2V communication.				
    </t>

    <figure anchor="fig:v2v-internetworking"
    title="Internetworking between Two Vehicles">
        <artwork><![CDATA[
                        (*)<..........>(*)
     (2001:DB8:1:1::/64) |              |  
+------------------------------+  +------------------------------+
|                        v     |  |     v                        |
| +-------+          +-------+ |  | +-------+          +-------+ |
| | Host1 |          |IP-OBU1| |  | |IP-OBU2|          | Host3 | |
| +-------+          +-------+ |  | +-------+          +-------+ |
|     ^                  ^     |  |     ^                  ^     |
|     |                  |     |  |     |                  |     |
|     v                  v     |  |     v                  v     |
| ---------------------------- |  | ---------------------------- |
| 2001:DB8:10:1::/64 ^         |  |         ^ 2001:DB8:30:1::/64 | 
|                    |         |  |         |                    |
|                    v         |  |         v                    |
| +-------+      +-------+     |  |     +-------+      +-------+ |
| | Host2 |      |Router1|     |  |     |Router2|      | Host4 | |
| +-------+      +-------+     |  |     +-------+      +-------+ |
|     ^              ^         |  |         ^              ^     |
|     |              |         |  |         |              |     |
|     v              v         |  |         v              v     |
| ---------------------------- |  | ---------------------------- |
|      2001:DB8:10:2::/64      |  |       2001:DB8:30:2::/64     |
+------------------------------+  +------------------------------+
   Vehicle1 (Moving Network1)        Vehicle2 (Moving Network2)

   <----> Wired Link   <....> Wireless Link   (*) Antenna
    ]]></artwork>
    </figure>

    <t>
    <xref target="fig:v2v-internetworking" /> shows the internetworking
    between the moving networks of two neighboring vehicles.  There
    exists an internal network (Moving Network1) inside Vehicle1. 
    Vehicle1 has two hosts (Host1 and Host2), and two routers 
    (IP-OBU1 and Router1).  There exists another internal network 
    (Moving Network2) inside Vehicle2.  Vehicle2 has two hosts 
    (Host3 and Host4), and two routers (IP-OBU2 and Router2).  
    Vehicle1's IP-OBU1 (as a mobile router) and Vehicle2's IP-OBU2 
    (as a mobile router) use 2001:DB8:1:1::/64 for an external link 
    (e.g., DSRC) for V2V networking. Alternatively, Vehicle1 and
    Vehicle2 employ an OMNI interface and use IPv6 ULAs for V2V networking.
    Thus, a host (Host1) in Vehicle1 can communicate with another host 
    (Host3) in Vehicle2 for a vehicular service through Vehicle1's 
    moving network, a wireless link between IP-OBU1 and IP-OBU2, and 
    Vehicle2's moving network.	
    </t>

    <t>	
    As a V2V use case in <xref target="subsection:V2V-Use-Cases" />,
    <xref target="fig:multihop-v2v-internetworking" /> shows the
    linear network topology of platooning vehicles for V2V communications
    where Vehicle3 is the leading vehicle with a driver, and Vehicle2 and
    Vehicle1 are the following vehicles without drivers.
    </t>
		
    <figure anchor="fig:multihop-v2v-internetworking"
    title="Multihop Internetworking between Two Vehicle Networks">
        <artwork><![CDATA[
     (*)<..................>(*)<..................>(*)
      |                      |                      |
+-----------+          +-----------+          +-----------+
|           |          |           |          |           |
| +-------+ |          | +-------+ |          | +-------+ |
| |IP-OBU1| |          | |IP-OBU2| |          | |IP-OBU3| |
| +-------+ |          | +-------+ |          | +-------+ |
|     ^     |          |     ^     |          |     ^     |
|     |     |=====>    |     |     |=====>    |     |     |=====>
|     v     |          |     v     |          |     v     | 
| +-------+ |          | +-------+ |          | +-------+ |
| | Host1 | |          | | Host2 | |          | | Host3 | |
| +-------+ |          | +-------+ |          | +-------+ |
|           |          |           |          |           |
+-----------+          +-----------+          +-----------+
   Vehicle1               Vehicle2               Vehicle3
   
 <----> Wired Link   <....> Wireless Link   ===> Moving Direction
 (*) Antenna
    ]]></artwork>
    </figure>

    <t>				
    As shown in <xref target="fig:multihop-v2v-internetworking" />,
    multihop internetworking is feasible among the moving networks of
    three vehicles in the same VANET. For example, Host1 in Vehicle1 can
    communicate with Host3 in Vehicle3 via IP-OBU1 in Vehicle1, IP-OBU2 in
    Vehicle2, and IP-OBU3 in Vehicle3 in the linear network, as shown in
    the figure.
    </t>
		
    </section>	<!--  end subsubsubsection "V2V-based Internetworking"  --> 

</section>	<!--  end subsection "Vehicular Networks"  --> 

<section anchor="section:Problem-Statement"
    title="Problem Statement">
    <t>
    In order to specify protocols using the architecture mentioned in 
    <xref target="subsection:GP-Vehicular-Network-Architecture" />, 
    IPv6 core protocols have to be adapted to overcome certain
    challenging aspects of vehicular networking.  Since the vehicles are
    likely to be moving at great speed, protocol exchanges need to be
    completed in a time relatively short compared to the lifetime of a
    link between a vehicle and an IP-RSU, or between two vehicles.  
    </t>

    <t>
    Note that if two vehicles are moving in the opposite directions in
    a roadway, the relative speed of this case is two times the relative
    speed of a vehicle passing through an RSU. The time constraint
    of a wireless link between two nodes needs to be considered because
    it may affect the lifetime of a session involving the link.
    </t>

    <t>
    The lifetime of a session varies depending on the session's type
    such as a web surfing, voice call over IP, and DNS query. 
    Regardless of a session's type, to guide all the IPv6 packets to
    their destination host, IP mobility should be supported for the
    session.
	</t>
	
    <t>
    Thus, the time constraint of a wireless link has a major impact on
    IPv6 Neighbor Discovery (ND). Mobility Management (MM) is also 
    vulnerable to disconnections that occur before the completion of 
    identity verification and tunnel management.  This is especially
    true given the unreliable nature of wireless communication.  
    This section presents key topics such as neighbor discovery and
    mobility management.
    </t>

    <section anchor="subsection:Neighbor-Discovery"
        title="Neighbor Discovery">
 
    <t>
    IPv6 ND <xref target="RFC4861" /><xref target="RFC4862" />
    is a core part of the IPv6 protocol suite. IPv6 ND is designed 
    for link types including point-to-point, multicast-capable (e.g.,
    Ethernet) and Non-Broadcast Multiple Access (NBMA).
    It assumes the efficient and reliable support of multicast and
    unicast from the link layer for various network operations
    such as MAC Address Resolution (AR), DAD, MLD and Neighbor
    Unreachability Detection (NUD).
    </t>
	
    <t>	  
    Vehicles move quickly within the communication coverage of any 
    particular vehicle or IP-RSU.  Before the vehicles can exchange 
    application messages with each other, they need to be configured 
    with a link-local IPv6 address or a global IPv6 address, and run 
    IPv6 ND.
    </t>
	
	<t>
    The requirements for IPv6 ND for vehicular networks are efficient
    DAD and NUD operations. An efficient DAD is required to reduce 
    the overhead of the DAD packets during a vehicle's travel in a
    road network, which guaranteeing the uniqueness of a vehicle's
    global IPv6 address. An efficient NUD is required to reduce the
    overhead of the NUD packets during a vehicle's travel in a road
    network, which guaranteeing the accurate neighborhood information
    of a vehicle in terms of adjacent vehicles and RSUs.
	</t>
	
    <t>
    The legacy DAD assumes that a node with an IPv6 address can reach any
    other node with the scope of its address at the time it claims its address,
    and can hear any future claim for that address by another party within 
    the scope of its address for the duration of the address ownership.
    However, the partitioning and merging of VANETs makes this assumption 
    frequently invalid in vehicular networks.
    The merging and partitioning of VANETs frequently occurs in vehicular 
    networks. This merging and partitioning should be considered for the 
    IPv6 ND such as IPv6 Stateless Address Autoconfiguration (SLAAC)
    <xref target="RFC4862" />.  Due to the merging of VANETs, two IPv6 
    addresses may conflict with each other though they were unique before 
    the merging. 
    Also, the partitioning of a VANET may make vehicles with the same 
    prefix be physically unreachable.  Also, SLAAC needs to prevent IPv6 
    address duplication due to the merging of VANETs.  According to the 
    merging and partitioning, a destination vehicle (as an IPv6 host) 
    needs to be distinguished as either an on-link host or an off-link 
    host even though the source vehicle uses the same prefix as the 
    destination vehicle.
    </t>
		
    <t>
    To efficiently prevent IPv6 address duplication due to the VANET 
    partitioning and merging from happening in vehicular networks, the 
    vehicular networks need to support a vehicular-network-wide DAD by 
    defining a scope that is compatible with the legacy DAD. In this case, 
    two vehicles can communicate with each other when there exists a
    communication path over VANET or a combination of VANETs and IP-RSUs, 
    as shown in <xref target="fig:vehicular-network-architecture" />.
    By using the vehicular-network-wide DAD, vehicles can assure that 
    their IPv6 addresses are unique in the vehicular network whenever 
    they are connected to the vehicular infrastructure or become 
    disconnected from it in the form of VANET.		
    </t>
  
    <t>
    ND time-related parameters such as router lifetime and Neighbor
    Advertisement (NA) interval need to be adjusted for vehicle speed
    and vehicle density. For example, the NA interval needs to be
    dynamically adjusted according to a vehicle's speed so that
    the vehicle can maintain its neighboring vehicles in a stable way,
    considering the collision probability with the NA messages sent
    by other vehicles.
    </t>
		 		  
    <t>	  
    For IPv6-based safety applications (e.g., context-aware navigation, 
    adaptive cruise control, and platooning) in vehicular networks, 
    the delay-bounded data delivery is critical. IPv6 ND needs to 
    work to support those IPv6-based safety applications efficiently.
    </t>

    <t>
    Thus, in IPv6-based vehicular networking, IPv6 ND should have minimum
    changes for the interoperability with the legacy IPv6 ND used in the
    Internet, including the DAD and NUD operations.
    </t>
  
    <section anchor="subsubsection:Link-Model"
        title="Link Model">
	<t>
    A prefix model for a vehicular network needs to facilitate the 
    communication between two vehicles with the same prefix regardless
    of the vehicular network topology as long as there exist  
    bidirectional E2E paths between them in the vehicular 
    network including VANETs and IP-RSUs.
    This prefix model allows vehicles with the same prefix to 
    communicate with each other via a combination of multihop V2V and
    multihop V2I with VANETs and IP-RSUs.
    Note that the OMNI interface supports an NBMA link model where multihop
    V2V and V2I communications use each mobile node's ULAs without need
    for any DAD or MLD messaging.
	</t>
	
    <t>
    IPv6 protocols work under certain assumptions that do not necessarily
    hold for vehicular wireless access link types other than OMNI/NBMA
    <xref target="VIP-WAVE" /><xref target="RFC5889" />; the rest of this
    section discusses implications for those link types that do not apply
    when the OMNI/NBMA link model is used.
    For instance, some IPv6 protocols assume symmetry in the connectivity 
    among neighboring interfaces <xref target="RFC6250" />. 
    However, radio interference and different levels of transmission power 
    may cause asymmetric links to appear in vehicular wireless links.
    As a result, a new vehicular link model needs to consider the asymmetry
    of dynamically changing vehicular wireless links.
    </t>
       
    <t>
    There is a relationship between a link and a prefix, besides the 
    different scopes that are expected from the link-local and global types 
    of IPv6 addresses. In an IPv6 link, it is assumed that all interfaces 
    which are configured with the same subnet prefix and with on-link bit 
    set can communicate with each other on an IPv6 link.  However, the 
    vehicular link model needs to define the relationship between a link 
    and a prefix, considering the dynamics of wireless links and the 
    characteristics of VANET.		
    </t>
		
    <t>
    A VANET can have a single link between each vehicle pair within 
    wireless communication range, as shown in 
    <xref target="fig:multihop-v2v-internetworking" />.  When two vehicles 
    belong to the same VANET, but they are out of wireless communication 
    range, they cannot communicate directly with each other.  Suppose that 
    a global-scope IPv6 prefix (or an IPv6 ULA prefix) is assigned to
   	VANETs in vehicular networks. 
    Even though two vehicles in the same VANET configure their IPv6 
    addresses with the same IPv6 prefix, they may not communicate with	each 
    other not in one hop in the same VANET because of the multihop 
    network connectivity between them.  Thus, in this case, the concept of 
    an on-link IPv6 prefix does not hold because two vehicles with the 
    same on-link IPv6 prefix cannot communicate directly with each other.
    Also, when two vehicles are located in two different VANETs with the 
    same IPv6 prefix, they cannot communicate with each other.  When these 
    two VANETs converge to one VANET, the two vehicles can communicate with
    each other in a multihop fashion, for example, when they are Vehicle1 
    and Vehicle3, as shown in <xref target="fig:multihop-v2v-internetworking" />.
    </t>
		
    <t>
    From the previous observation, a vehicular link model should consider 
    the frequent partitioning and merging of VANETs due to vehicle mobility. 
    Therefore, the vehicular link model needs to use an on-link prefix and 
    off-link prefix according to the network topology of vehicles such as 
    a one-hop reachable network and a multihop reachable network (or 
    partitioned networks).  If the vehicles with the same prefix are 
    reachable from each other in one hop, the prefix should be on-link.  
    On the other hand, if some of the vehicles with the same prefix are not
    reachable from each other in one hop due to either the multihop 
    topology in the VANET or multiple partitions, the prefix should be 
    off-link.
    </t>
			
    <t>
    The vehicular link model needs to support multihop routing in a 
    connected VANET where the vehicles with the same global-scope IPv6 
    prefix (or the same IPv6 ULA prefix) are connected in one hop or
    multiple hops.  It also needs to support the multihop routing in
    multiple connected VANETs through infrastructure nodes (e.g., IP-RSU)
    where they are connected to the infrastructure.  For example, in 
    <xref target="fig:vehicular-network-architecture" />, suppose that 
    Vehicle1, Vehicle2, and Vehicle3 are configured with their IPv6 
    addresses based on the same global-scope IPv6 prefix.  Vehicle1 and 
    Vehicle3 can also communicate with each other via either multihop 
    V2V or multihop V2I2V. When Vehicle1 and Vehicle3 are connected in
    a VANET, it will be more efficient for them to communicate with each 
    other directly via VANET rather than indirectly via IP-RSUs. On the
    other hand, when Vehicle1 and Vehicle3 are far away from direct
    communication range in separate VANETs and under two different 
    IP-RSUs, they can communicate with each other through the relay of 
    IP-RSUs via V2I2V.
    Thus, two separate VANETs can merge into one network via IP-RSU(s).  
    Also, newly arriving vehicles can merge two separate VANETs into 
    one VANET if they can play the role of a relay node for those VANETs.
    </t>
        
    <t>
    Thus, in IPv6-based vehicular networking, the vehicular link model
    should have minimum changes for interoperability with standard IPv6
    links in an efficient fashion to support IPv6 DAD, MLD and NUD
    operations. When the OMNI NBMA link model is used, there are no link
    model changes nor DAD/MLD messaging required.
    </t>
        
    </section>    <!--  end subsubsection "Link Model"  --> 

    <section anchor="subsubsection:MAC-Address-Pseudonym"
        title="MAC Address Pseudonym">
    <t>
    For the protection of drivers' privacy, a pseudonym of a MAC 
    address of a vehicle's network interface should be used, so that
    the MAC address can be changed periodically.  However, although 
    such a pseudonym of a MAC address can protect to some extent the 
    privacy of a vehicle, it may not be able to resist attacks on 
    vehicle identification by other fingerprint information, for example,
    the	scrambler seed embedded in IEEE 802.11-OCB frames 
    <xref target="Scrambler-Attack" />.  The pseudonym of a MAC address 
    affects an IPv6 address based on the MAC address, and a 
    transport-layer (e.g., TCP and SCTP) session with an IPv6 
    address pair.  However, the pseudonym handling is not implemented 
    and tested yet for applications on IP-based vehicular networking.
    </t>

    <t>
    In the ETSI standards, for the sake of security and privacy, an
    ITS station (e.g., vehicle) can use pseudonyms for its network
    interface identities (e.g., MAC address) and the corresponding 
    IPv6 addresses <xref target="Identity-Management" />.  Whenever 
    the network interface identifier changes, the IPv6 address based 
    on the network interface identifier needs to be updated, and the 
    uniqueness of the address needs to be checked through the DAD 
    procedure.
    </t>
    
    <t>
    For vehicular networks with high mobility and density, the DAD 
    needs to be performed efficiently with minimum overhead so that
    the vehicles can exchange a driving safety message (e.g., 
    collision avoidance and accident notification) with each other
    with a short interval (e.g., 0.5 second) by a technical report
    from NHTSA (National Highway Traffic Safety Administration)
    <xref target="NHTSA-ACAS-Report" />.  Such a driving safety
    message may include a vehicle's mobility information (i.e., 
    position, speed, direction, and acceleration/deceleration).  The
    exchange interval of this message is 0.5 second, which is required
    to allow a driver to avoid a rear-end crash from another vehicle.
    </t>
     
    </section>    <!--  end subsubsection "MAC Address Pseudonym"  --> 

    <section anchor="subsubsection:Routing"
        title="Routing">
    <t>
    For multihop V2V communications in either a VANET or VANETs via
    IP-RSUs, a vehicular Mobile Ad Hoc Networks (MANET)
    routing protocol may be required to support both unicast and 
    multicast in the links of the subnet with the same IPv6 
    prefix.  However, it will be costly to run both vehicular ND 
    and a vehicular ad hoc routing protocol in terms of control 
    traffic overhead <xref target="ID-Multicast-Problems" />.
    </t>

    <t>
    A routing protocol for a VANET may cause redundant wireless 
    frames in the air to check the neighborhood of each vehicle 
    and compute the routing information in a VANET with a dynamic 
    network topology because the IPv6 ND is used to check the 
    neighborhood of each vehicle. Thus, the vehicular routing 
    needs to take advantage of the IPv6 ND to minimize its control
    overhead.
    </t>
		   
    </section>    <!--  end subsubsection "Routing"  --> 

    </section>	<!--  end subsection "Neighbor Discovery"  --> 

    <section anchor="subsection:Mobility-Management" title="Mobility Management">
    <t>
    The seamless connectivity and timely data exchange between 
    two end points requires efficient mobility management 
    including location management and handover.
    Most vehicles are equipped with a GPS receiver as part of 
    a dedicated navigation system or a corresponding smartphone 
    App.  Note that the GPS receiver may not provide vehicles with 
    accurate location information in adverse environments such as 
    a building area or a tunnel.  The location precision can be 
    improved with assistance of the IP-RSUs or a cellular system 
    with a GPS receiver for location information.        
    </t>
		
    <t>
    With a GPS navigator, efficient mobility management can
    be performed with the help of vehicles periodically reporting 
    their current position and trajectory (i.e., navigation path) to 
    the vehicular infrastructure (having IP-RSUs and an MA in TCC). 
    This vehicular infrastructure can predict the future positions
    of the vehicles from their mobility information (i.e., the current
    position,  speed, direction, and trajectory) for efficient mobility
    management (e.g., proactive handover).  For a better proactive 
    handover, link-layer parameters, such as the signal strength of a 
    link-layer frame (e.g., Received Channel Power Indicator (RCPI) 
    <xref target="VIP-WAVE" />), can be used to determine the 
    moment of a handover between IP-RSUs along with mobility 
    information.
    </t>

    <t>
    By predicting a vehicle's mobility, the vehicular infrastructure 
    needs to better support IP-RSUs to perform efficient SLAAC, data 
    forwarding, horizontal handover (i.e., handover in wireless links
    using a homogeneous radio technology), and vertical handover 
    (i.e., handover in wireless links using heterogeneous radio 
    technologies) in advance along with the movement of the vehicle. 
    </t>
    
    <t>
    For example, as shown in <xref target="fig:vehicular-network-architecture" />, 
    when a vehicle (e.g., Vehicle2) is moving from the coverage of an 
    IP-RSU (e.g., IP-RSU1) into the coverage of another IP-RSU (e.g., 
    IP-RSU2) belonging to a different subnet, the IP-RSUs can 
    proactively support the IPv6 mobility of the vehicle, while 
    performing the SLAAC, data forwarding, and handover for the sake
    of the vehicle.
    </t>

    <t>
    For a mobility management scheme in a shared link, where the
    wireless subnets of multiple IP-RSUs share the same prefix,
    an efficient vehicular-network-wide DAD is required. If DHCPv6 is
    used to assign a unique IPv6 address to each vehicle in this shared
    link, the DAD is not required.	On the other hand, for a mobility
    management scheme with a unique prefix per mobile node (e.g., PMIPv6
    <xref target="RFC5213" /> and OMNI <xref target="OMNI" />),
    DAD is not required because the IPv6 address of a vehicle's external
    wireless interface is guaranteed to be unique. There is a tradeoff
    between the prefix usage efficiency and DAD overhead. Thus, the IPv6
    address autoconfiguration for vehicular networks needs to consider
    this tradeoff to support efficient mobility management.
    </t>

    <t>
    For the case of a multihomed network, a vehicle can follow the
    first-hop router selection rule described in <xref target="RFC8028" />.
    That is, the vehicle should select its default router for each prefix
    by preferring the router that advertised the prefix.
	</t>
	
    <t>
    Therefore, for the proactive and seamless IPv6 mobility of vehicles,
    the vehicular infrastructure (including IP-RSUs and MA) needs to 
    efficiently perform the mobility management of the vehicles with 
    their mobility information and link-layer information.
    Also, in IPv6-based vehicular networking, IPv6 mobility management
    should have minimum changes for the interoperability with the 
    legacy IPv6 mobility management schemes such as PMIPv6, DMM, LISP,
    and AERO.
    </t>

    </section>	<!--  end section "Mobility Management"  --> 

</section>

<!-- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% -->

<section anchor="section:Security-Considerations"
    title="Security Considerations">
    <t>
    This section discusses security and privacy for IPv6-based vehicular
    networking. Security and privacy are key components of IPv6-based 
    vehicular networking along with neighbor discovery and mobility 
    management.
    </t>

    <t>
    Security and privacy are paramount in V2I, V2V, and V2X 
    networking.  Vehicles and infrastructure must be authenticated
    in order to participate in vehicular networking.  Also, 
    in-vehicle devices (e.g., ECU) and a driver/passenger's mobile
    devices (e.g., smartphone and tablet PC) in a vehicle need to
    communicate with other in-vehicle devices and another
    driver/passenger's mobile devices in another vehicle, or other
    servers behind an IP-RSU in a secure way.
    Even though a vehicle is perfectly authenticated and legitimate,
    it may be hacked for running malicious applications to track and
    collect its and other vehicles' information.  In this case, an
    attack mitigation process may be required to reduce the aftermath of
    malicious behaviors.
    </t>

    <t>
    Strong security measures shall protect vehicles roaming in road
    networks from the attacks of malicious nodes, which are controlled
    by hackers.  For safe driving applications (e.g., context-aware
    navigation, cooperative adaptive cruise control, and platooning),
    as explained in <xref target="subsection:V2V-Use-Cases"/>, the
    cooperative action among vehicles is assumed.  Malicious nodes may
    disseminate wrong driving information (e.g., location, speed, and
    direction) for disturbing safe driving.  For example, a Sybil attack,
    which tries to confuse a vehicle with multiple false identities,
    may disturb a vehicle from taking a safe maneuver.
	</t>
	
	<t>
	Even though vehicles can be authenticated 
	with valid certificates by an authentication server in the vehicular
    cloud, the authenticated vehicles may harm other vehicles, so
    their communication activities need to be logged in either a central
	way through a logging server (e.g., TCC) in the vehicular cloud or a
	distributed way (e.g., blockchain <xref target="Bitcoin"/>) along 
	with other vehicles or infrastructure. For the non-repudiation of 
    the harmful activities of malicious nodes, a blockchain technology
    can be used <xref target="Bitcoin"/>. Each message from a vehicle
    can be treated as a transaction and the neighboring vehicles can
    play the role of peers in a consensus method of a blockchain
	<xref target="Bitcoin"/><xref target="Vehicular-BlockChain"/>.
	For a blockchain's efficient consensus in vehicular networks having
	fast moving vehicles, a new consensus algorithm needs to be developed
	or an existing consensus algorithm needs to be enhanced.
    </t>
    
    <t>
    To identify malicious vehicles among vehicles, an authentication
    method is required. 
    A Vehicle Identification Number (VIN) and a user certificate (e.g.,
    X.509 certificate <xref target="RFC5280"/>) along with an in-vehicle
    device's identifier generation can be used to efficiently
    authenticate a vehicle or its driver (having a user certificate)
    through a road infrastructure node (e.g., IP-RSU) connected to an
    authentication server in the vehicular cloud.
	This authentication can be used to identify the vehicle that will
    communicate with an infrastructure node or another vehicle.
	In the case where a vehicle has an internal network (called Moving 
    Network) and elements in the network (e.g., in-vehicle devices and
    a user's mobile devices), as shown in 
    <xref target="fig:v2i-internetworking" />, the elements in the 
    network need to be authenticated individually for safe 
    authentication.
    Also, Transport Layer Security (TLS) certificates
    <xref target="RFC8446" /><xref target="RFC5280"/> can be used for
    an element's authentication to allow secure E2E vehicular communications
    between an element in a vehicle and another element in a server in a
    vehicular cloud, or between an element in a vehicle and another
    element in another vehicle.
    </t>

    <t>
    For secure V2I communication, a secure channel (e.g., IPsec) between
    a mobile router (i.e., IP-OBU) in a vehicle and a fixed router
    (i.e., IP-RSU) in an EN needs to be established, as shown in 
    <xref target="fig:v2i-internetworking" />
	<xref target="RFC4301" /><xref target="RFC4302" /><xref target="RFC4303" /><xref target="RFC4308" /><xref target="RFC7296" />.
    Also, for secure V2V communication, a secure channel (e.g., IPsec) 
    between a mobile router (i.e., IP-OBU) in a vehicle and a mobile 
    router (i.e., IP-OBU) in another vehicle needs to be established, as 
    shown in <xref target="fig:v2v-internetworking" />.
	For secure communication, an element in a vehicle (e.g., an 
    in-vehicle device and a driver/passenger's mobile device) needs to 
    establish a secure connection (e.g., TLS) with another element in 
    another vehicle or another element in a vehicular cloud (e.g., a 
    server).	
    Even though IEEE 1609.2 <xref target="WAVE-1609.2" /> specifies
    security services for applications and management messages, this WAVE specification is optional. Thus, if WAVE does not support
    the security of a WAVE frame, either the network layer or the
    transport layer needs to support security services for the WAVE
    frames.
    </t>

    <t>
    For the setup of a secure channel over IPsec or TLS, the multihop V2I
    communications over DSRC is required in a highway for the 
    authentication by involving multiple intermediate vehicles as relay
    nodes toward an IP-RSU connected to an authentication server in the
    vehicular cloud. The V2I communications over 5G V2X (or LTE V2X) is 
	required to allow a vehicle to communicate directly with a gNodeB (or
    eNodeB) connected to an authentication server in the vehicular cloud.
    </t>

    <t>
    To prevent an adversary from tracking a vehicle with its MAC 
    address or IPv6 address, especially for a long-living transport-layer
    session (e.g., voice call over IP and video streaming service),
    a MAC address pseudonym needs to be provided to each vehicle; 
    that is, each vehicle periodically updates its MAC address and
    its IPv6 address needs to be updated accordingly by the MAC
    address change <xref target="RFC4086" /><xref target="RFC4941" />. 
    Such an update of the MAC and IPv6 addresses should not 
    interrupt the E2E communications between two vehicles (or 
    between a vehicle and an IP-RSU) for a long-living transport-layer
    session.  However, if this pseudonym is performed without strong 
    E2E confidentiality  (using either IPsec or TLS), there will be no
    privacy benefit from changing MAC and IPv6 addresses, because an
    adversary can observe the change of the MAC and IPv6 addresses and
    track the vehicle with those addresses. Thus, the MAC address
    pseudonym and the IPv6 address update should be performed with strong
    E2E confidentiality.
    </t>

    <t> 
    For the IPv6 ND, the DAD is required to ensure the uniqueness of the 
    IPv6 address of a vehicle's wireless interface.  This DAD can be 
    used as a flooding attack that uses the DAD-related ND packets
    disseminated over the VANET or vehicular networks. This possibility
    indicates that the vehicles and IP-RSUs need to filter out suspicious
    ND traffic in advance.
    Based on the SEND <xref target="RFC3971" /> mechanism, the authentication for  
    routers (i.e., IP-RSUs) can be conducted by only selecting an IP-RSU that has a 
    certification path toward trusted parties. For authenticating other vehicles, the 
    cryptographically generated address (CGA) can be used to verify the true owner 
    of a received ND message, which requires to use the CGA ND option in the ND 
    protocols. For a general protection of the ND mechanism, the RSA Signature ND 
    option can also be used to protect the integrity of the messages by public key 
    signatures. For a more advanced authentication mechanism, a distributed 
    blockchain-based mechanism <xref target="Vehicular-BlockChain"/> can be used.
    </t>

    <t>
    For mobility management, a malicious vehicle can construct
    multiple virtual bogus vehicles, and register them with IP-RSUs
    and MA.  This registration makes the IP-RSUs and MA waste their
    resources.  The IP-RSUs and MA need to determine whether 
    a vehicle is genuine or bogus in mobility management.
    Also, the confidentiality of control packets and data packets
    among IP-RSUs and MA, the E2E paths (e.g., tunnels) need to be
    protected by secure communication channels.
    In addition, to prevent bogus IP-RSUs and MA from interfering with 
    the IPv6 mobility of vehicles, mutual authentication among them
    needs to be performed by  certificates (e.g., TLS certificate).
    </t>

</section>	<!--  end section "Security Considerations"  --> 

<section anchor="section:IANA-Considerations" title="IANA Considerations">
    <t>	
    This document does not require any IANA actions.
    </t>
</section>

</middle>

<back>
   

<!--
  START: Referenced Papers and Standard Activities
-->

<references title="Informative References">

<!-- START: IETF RFCs and Drafts -->
    <reference anchor="RFC8200">
        <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author initials="S." surname="Deering" />
            <author initials="R." surname="Hinden" />
            <date month="July" year="2017" />

        </front>
        <seriesInfo name="RFC" value="8200" />
    </reference> 

    <reference anchor="RFC6275">
        <front>
            <title>Mobility Support in IPv6</title>
            <author role='editor' initials="C." surname="Perkins" />
            <author initials="D." surname="Johnson" />
            <author initials="J." surname="Arkko" />
            <date month="July" year="2011" />
        </front>
        <seriesInfo name="RFC" value="6275" />
    </reference>  
	
    <reference anchor="RFC5213">
        <front>
            <title>Proxy Mobile IPv6</title>
            <author role='editor' initials="S." surname="Gundavelli" />
            <author initials="K." surname="Leung" />
	    <author initials="V." surname="Devarapalli" />
            <author initials="K." surname="Chowdhury" />
            <author initials="B." surname="Patil" />
            <date month="August" year="2008" />
        </front>
        <seriesInfo name="RFC" value="5213" />
    </reference>  

    <reference anchor="RFC7333">
        <front>
            <title>Requirements for Distributed Mobility Management</title>
            <author initials="H." surname="Chan" />
            <author initials="D." surname="Liu" />
            <author initials="P." surname="Seite" />
            <author initials="H." surname="Yokota" />
            <author initials="J." surname="Korhonen" />
            <date month="August" year="2014" />
        </front>
        <seriesInfo name="RFC" value="7333" />
    </reference>  

    <reference anchor="RFC7429">
        <front>
            <title>Distributed Mobility Management: Current Practices and Gap Analysis</title>
            <author initials="D." surname="Liu" />
            <author initials="JC." surname="Zuniga" />
            <author initials="P." surname="Seite" />
            <author initials="H." surname="Chan" />
            <author initials="CJ." surname="Bernardos" />
            <date month="January" year="2015" />
        </front>
        <seriesInfo name="RFC" value="7429" />
    </reference>  

    <reference anchor="RFC6550">
        <front>
            <title>RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks</title>
            <author initials="T." surname="Winter" />
            <author initials="P." surname="Thubert" />
            <author initials="A." surname="Brandt" />
            <author initials="J." surname="Hui" />
            <author initials="R." surname="Kelsey" />
            <author initials="P." surname="Levis" />
            <author initials="K." surname="Pister" />
            <author initials="R." surname="Struik" />
            <author initials="JP." surname="Vasseur" />
            <author initials="R." surname="Alexander" />
            <date month="March" year="2012" />
        </front>
        <seriesInfo name="RFC" value="6550" />
    </reference>

    <reference anchor="RFC8691">
        <front>
            <title>Basic Support for IPv6 Networks Operating Outside the Context of 
            a Basic Service Set over IEEE Std 802.11</title>
            <author initials="N." surname="Benamar" />
            <author initials="J." surname="Haerri" />
            <author initials="J." surname="Lee" />
            <author initials="T." surname="Ernst" />
            <date month="December" year="2019" />
        </front>
        <seriesInfo name="RFC" value="8691" />
    </reference> 

    <reference anchor="RFC3753">
        <front>
            <title>Mobility Related Terminology</title>
            <author initials="J." surname="Manner" />
            <author initials="M." surname="Kojo" />
            <date month="June" year="2004" />
        </front>
        <seriesInfo name="RFC" value="3753" />
    </reference>
    
    <reference anchor="RFC5415">
        <front>
            <title>Control And Provisioning of Wireless Access Points 
            (CAPWAP) Protocol Specification</title>
            <author initials="P." surname="Calhoun" />
            <author initials="M." surname="Montemurro" />
            <author initials="D." surname="Stanley" />
            <date month="March" year="2009" />
        </front>
        <seriesInfo name="RFC" value="5415" />
    </reference>    

    <reference anchor="RFC7149">
        <front>
            <title>Software-Defined Networking: A Perspective from within a Service Provider Environment</title>
            <author initials="M." surname="Boucadair" />
            <author initials="C." surname="Jacquenet" />
            <date month="March" year="2014" />
        </front>
        <seriesInfo name="RFC" value="7149" />
    </reference>
	
     <reference anchor="RFC4861">
        <front>
            <title>Neighbor Discovery for IP Version 6 (IPv6)</title>
            <author initials="T." surname="Narten" />
            <author initials="E." surname="Nordmark" />
            <author initials="W." surname="Simpson" />
    		<author initials="H." surname="Soliman" />
            <date month="September" year="2007" />
        </front>
        <seriesInfo name="RFC" value="4861" />
    </reference>  

    <reference anchor="RFC4862">
        <front>
            <title>IPv6 Stateless Address Autoconfiguration</title>
            <author initials="S." surname="Thomson" />
            <author initials="T." surname="Narten" />
            <author initials="T." surname="Jinmei" />
            <date month="September" year="2007" />
       </front>
        <seriesInfo name="RFC" value="4862" />
    </reference>

    <reference anchor="RFC4193">
        <front>
            <title>Unique Local IPv6 Unicast Addresses</title>
            <author initials="R." surname="Hinden" />
            <author initials="B." surname="Haberman" />
            <date month="October" year="2005" />
       </front>
        <seriesInfo name="RFC" value="4193" />
    </reference>

    <reference anchor="RFC2710">
        <front>
            <title>Multicast Listener Discovery (MLD) for IPv6</title>
            <author initials="S." surname="Deering" />
            <author initials="W." surname="Fenner" />
            <author initials="B." surname="Haberman" />
            <date month="October" year="1999" />
       </front>
        <seriesInfo name="RFC" value="2710" />
    </reference>

    <reference anchor="RFC3810">
        <front>
            <title>Multicast Listener Discovery Version 2 (MLDv2) for IPv6</title>
            <author initials="R." surname="Vida" />
            <author initials="L." surname="Costa" />
            <date month="June" year="2004" />
       </front>
        <seriesInfo name="RFC" value="3810" />
    </reference>

    <reference anchor="RFC5889">
        <front>
            <title>IP Addressing Model in Ad Hoc Networks</title>
            <author initials="E." surname="Baccelli" />
            <author initials="M." surname="Townsley" />
            <date month="September" year="2010" />
        </front>
        <seriesInfo name="RFC" value="5889" />
    </reference> 

    <reference anchor="RFC4086">
        <front>
            <title>Randomness Requirements for Security</title>
            <author initials="D." surname="Eastlake 3rd" />
            <author initials="J." surname="Schiller" />
            <author initials="S." surname="Crocker" />
            <date month="June" year="2005" />
        </front>
        <seriesInfo name="RFC" value="4086" />
    </reference>  

    <reference anchor="RFC4941">
        <front>
            <title>Privacy Extensions for Stateless Address Autoconfiguration in IPv6</title>
            <author initials="T." surname="Narten" />
            <author initials="R." surname="Draves" />
            <author initials="S." surname="Krishnan" />
            <date month="September" year="2007" />
        </front>
        <seriesInfo name="RFC" value="4941" />
    </reference>  

    <reference anchor="RFC3849">
        <front>
            <title>IPv6 Address Prefix Reserved for Documentation</title>
            <author initials="G." surname="Huston" />
            <author initials="A." surname="Lord" />
	        <author initials="P." surname="Smith" />            
            <date month="July" year="2004" />
        </front>
        <seriesInfo name="RFC" value="3849" />
    </reference>  	

    <reference anchor="RFC6250">
        <front>
            <title>Evolution of the IP Model</title>
            <author initials="D." surname="Thaler" />
            <date month="May" year="2011" />
        </front>
        <seriesInfo name="RFC" value="6250" />
    </reference>  	
	
    <reference anchor="RFC8446">
        <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author initials="E." surname="Rescorla" />            
            <date month="August" year="2018" />
        </front>
        <seriesInfo name="RFC" value="8446" />
    </reference>

    <reference anchor="RFC6830BIS">
        <front>
            <title>The Locator/ID Separation Protocol (LISP)</title>
            <author initials="D." surname="Farinacci" />
            <author initials="V." surname="Fuller" />
            <author initials="D." surname="Meyer" />
            <author initials="D." surname="Lewis" />
            <author initials="A." surname="Cabellos" />			
            <date month="November" year="2020" />
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-lisp-rfc6830bis-36" />
    </reference>

    <reference anchor="RFC6706BIS">
        <front>
            <title>Automatic Extended Route Optimization (AERO)</title>
            <author initials="F." surname="Templin" />            
            <date month="March" year="2021" />
        </front>
        <seriesInfo name="Internet-Draft" value="draft-templin-intarea-6706bis-95" />
    </reference>

    <reference anchor="RFC5280">
        <front>
            <title>Internet X.509 Public Key Infrastructure Certificate
            and Certificate Revocation List (CRL) Profile			
			</title>
            <author initials="D." surname="Cooper" />
            <author initials="S." surname="Santesson" />
            <author initials="S." surname="Farrell" />
            <author initials="S." surname="Boeyen" />
            <author initials="R." surname="Housley" />
            <author initials="W." surname="Polk" />			
            <date month="May" year="2008" />
        </front>
        <seriesInfo name="RFC" value="5280" />
    </reference>

    <reference anchor="RFC4301">
        <front>
            <title>
            Security Architecture for the Internet Protocol
			</title>
            <author initials="S." surname="Kent" />
            <author initials="K." surname="Seo" />
            <date month="December" year="2005" />
        </front>
        <seriesInfo name="RFC" value="4301" />
    </reference>

    <reference anchor="RFC4302">
        <front>
            <title>
            IP Authentication Header
			</title>
            <author initials="S." surname="Kent" />
            <date month="December" year="2005" />
        </front>
        <seriesInfo name="RFC" value="4302" />
    </reference>

    <reference anchor="RFC4303">
        <front>
            <title>
            IP Encapsulating Security Payload (ESP)
			</title>
            <author initials="S." surname="Kent" />
            <date month="December" year="2005" />
        </front>
        <seriesInfo name="RFC" value="4303" />
    </reference>

    <reference anchor="RFC4308">
        <front>
            <title>
            Cryptographic Suites for IPsec
			</title>
            <author initials="P." surname="Hoffman" />
            <date month="December" year="2005" />
        </front>
        <seriesInfo name="RFC" value="4308" />
    </reference>

    <reference anchor="RFC7296">
        <front>
            <title>
            Internet Key Exchange Protocol Version 2 (IKEv2)
			</title>
            <author initials="C." surname="Kaufman" />
            <author initials="P." surname="Hoffman" />
            <author initials="Y." surname="Nir" />
            <author initials="P." surname="Eronen" />
            <author initials="T." surname="Kivinen" />			
            <date month="October" year="2014" />
        </front>
        <seriesInfo name="RFC" value="7296" />
    </reference>

    <reference anchor="RFC8028">
        <front>
            <title>
            First-Hop Router Selection by Hosts in a Multi-Prefix Network
			</title>
            <author initials="F." surname="Baker" />
            <author initials="B." surname="Carpenter" />			
            <date month="November" year="2016" />
        </front>
        <seriesInfo name="RFC" value="8028" />
    </reference>

    <reference anchor="RFC3971">
        <front>
            <title>SEcure Neighbor Discovery (SEND)</title>
            <author initials="J." surname="Arkko" />
            <author initials="J." surname="Kempf" />
	        <author initials="B." surname="Zill" />
            <author initials="P." surname="Nikander" />
            <date month="March" year="2005" />
        </front>
        <seriesInfo name="RFC" value="3971" />
    </reference>  	

    <reference anchor="OMNI">
        <front>
            <title>Transmission of IPv6 Packets over
            Overlay Multilink Network (OMNI) Interfaces
            </title>
            <author initials="F." surname="Templin" />
            <author initials="A." surname="Whyman" />
            <date month="March" year="2021" />
        </front>
        <seriesInfo name="Internet-Draft" value="draft-templin-6man-omni-interface-97" />
    </reference>
	
    <reference anchor="UAM-ITS">
        <front>
            <title>Urban Air Mobility Implications for Intelligent
            Transportation Systems
            </title>
			<author initials="F." surname="Templin" />
            <date month="January" year="2021" />
        </front>
        <seriesInfo name="Internet-Draft" value="draft-templin-ipwave-uam-its-04" />
    </reference>	

    <reference anchor="DMM-FPC">
        <front>
            <title>Protocol for Forwarding Policy Configuration (FPC) in DMM
            </title>
			<author initials="S." surname="Matsushima" />
            <author initials="L." surname="Bertz" />
            <author initials="M." surname="Liebsch" />
            <author initials="S." surname="Gundavelli" />
            <author initials="D." surname="Moses" />
            <author initials="C." surname="Perkins" />			
            <date month="September" year="2020" />
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-dmm-fpc-cpdp-14" />
    </reference>	

	
    <reference anchor="ID-Multicast-Problems">
        <front>
            <title>Multicast Considerations over IEEE 802 Wireless Media</title>
			<author initials="C." surname="Perkins" />
            <author initials="M." surname="McBride" />
			<author initials="D." surname="Stanley" />
			<author initials="W." surname="Kumari" />
			<author initials="JC." surname="Zuniga" />
            <date month="February" year="2021" />
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-mboned-ieee802-mcast-problems-13" />
    </reference>  

<!-- END: IETF RFCs and Drafts -->

<!-- START: Other Standardization Body Documents -->
    <reference anchor="DSRC">
        <front>
            <title>Standard Specification for Telecommunications and Information Exchange Between Roadside and Vehicle Systems - 5 GHz Band Dedicated Short Range Communications (DSRC) Medium Access Control (MAC) and Physical Layer (PHY) Specifications</title>
            <author>
                <organization>
                ASTM International
                </organization>
            </author>
            <date month="October" year="2010" />
        </front>
        <seriesInfo name="ASTM" value="E2213-03(2010)" />
    </reference> 

    <reference anchor="EU-2008-671-EC">
        <front>
            <title>Commission Decision of 5 August 2008 on the Harmonised Use of Radio Spectrum in the 5875 - 5905 MHz Frequency Band for Safety-related Applications of Intelligent Transport Systems (ITS)</title>
            <author>
                <organization>
                European Union
                </organization>
            </author>
            <date month="August" year="2008" />
        </front>
        <seriesInfo name="EU" value="2008/671/EC" />
    </reference> 

    <reference anchor="IEEE-802.11p">
        <front>
            <title>Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications - Amendment 6: Wireless Access in Vehicular Environments</title>
            <author surname="IEEE 802.11 Working Group" />
            <date month="June" year="2010" />
        </front>
    	<seriesInfo name="IEEE" value="Std 802.11p-2010" />
    </reference>

    <reference anchor="IEEE-802.11-OCB">
        <front>
            <title>Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications</title>
    		<author surname="IEEE 802.11 Working Group" />
            <date month="December" year="2016" />
        </front>
    	<seriesInfo name="IEEE" value="Std 802.11-2016" />
    </reference>

    <reference anchor="WAVE-1609.0">
        <front>
            <title>IEEE Guide for Wireless Access in Vehicular Environments (WAVE) - Architecture</title>
            <author initials="" surname="IEEE 1609 Working Group" />
            <date month="March" year="2014" />
        </front>
        <seriesInfo name="IEEE" value="Std 1609.0-2013" />
    </reference>

    <reference anchor="WAVE-1609.2">
        <front>
            <title>IEEE Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages</title>
            <author initials="" surname="IEEE 1609 Working Group" />
            <date month="March" year="2016" />
        </front>
        <seriesInfo name="IEEE" value="Std 1609.2-2016" />
    </reference>

    <reference anchor="WAVE-1609.3">
        <front>
            <title>IEEE Standard for Wireless Access in Vehicular Environments (WAVE) - Networking Services</title>
            <author initials="" surname="IEEE 1609 Working Group" />
            <date month="April" year="2016" />
        </front>
        <seriesInfo name="IEEE" value="Std 1609.3-2016" />
    </reference>

    <reference anchor="WAVE-1609.4">
        <front>
            <title>IEEE Standard for Wireless Access in Vehicular Environments (WAVE) - Multi-Channel Operation</title>
            <author initials="" surname="IEEE 1609 Working Group" />
            <date month="March" year="2016" />
        </front>
        <seriesInfo name="IEEE" value="Std 1609.4-2016" />
    </reference>

   <reference anchor="ISO-ITS-IPv6">
        <front>
            <title>Intelligent Transport Systems - Communications Access for Land Mobiles (CALM) - IPv6 Networking</title>
            <author initials="" surname="ISO/TC 204" />
            <date month="June" year="2012" />
        </front>
        <seriesInfo name="ISO" value="21210:2012" />
    </reference>

   <reference anchor="ISO-ITS-IPv6-AMD1">
        <front>
            <title>Intelligent Transport Systems - Communications Access for Land Mobiles (CALM) - IPv6 Networking -
            Amendment 1</title>
            <author initials="" surname="ISO/TC 204" />
            <date month="September" year="2017" />
        </front>
        <seriesInfo name="ISO" value="21210:2012/AMD 1:2017" />
    </reference>
	
    <reference anchor="TS-23.285-3GPP">
        <front>
            <title>Architecture Enhancements for V2X Services</title>
            <author>
                <organization>
                3GPP
                </organization> 
            </author>
            <date month="December" year="2019" />
        </front>
        <seriesInfo name="3GPP TS" value="23.285/Version 16.2.0" />
    </reference>

    <reference anchor="TR-22.886-3GPP">
        <front>
            <title>Study on Enhancement of 3GPP Support for 5G V2X Services</title>
            <author>
                <organization>
                3GPP
                </organization> 
            </author>
            <date month="December" year="2018" />
        </front>
        <seriesInfo name="3GPP TR" value="22.886/Version 16.2.0" />
    </reference>

    <reference anchor="TS-23.287-3GPP">
        <front>
            <title>Architecture Enhancements for 5G System (5GS) to Support
            Vehicle-to-Everything (V2X) Services</title>
            <author>
                <organization>
                3GPP
                </organization> 
            </author>
            <date month="March" year="2020" />
        </front>
        <seriesInfo name="3GPP TS" value="23.287/Version 16.2.0" />
    </reference>	

<!-- END: Other Standardization Body Documents -->

<!-- START: Papers -->
    <reference anchor="VIP-WAVE">
        <front>
            <title>VIP-WAVE: On the Feasibility of IP Communications in 802.11p Vehicular Networks</title>
            <author initials="S." surname="Cespedes" />
            <author initials="N." surname="Lu" />
            <author initials="X." surname="Shen" />
            <date month="March" year="2013" />
        </front>
        <seriesInfo name="IEEE" value="Transactions on Intelligent Transportation Systems, vol. 14, no. 1" />
    </reference>  

    <reference anchor="Identity-Management">
        <front>
            <title>Cross-layer Identities Management in ITS Stations</title>
            <author initials="M." surname="Wetterwald" />
            <author initials="F." surname="Hrizi" />
            <author initials="P." surname="Cataldi" />
            <date month="November" year="2010" />
        </front>
        <seriesInfo name="The" value="10th International Conference on ITS Telecommunications" />
    </reference>  
	
    <reference anchor="SAINT">
        <front>
            <title>SAINT: Self-Adaptive Interactive Navigation Tool for Cloud-Based Vehicular Traffic Optimization</title>
            <author initials="J." surname="Jeong" />
            <author initials="H." surname="Jeong" />
            <author initials="E." surname="Lee" />
            <author initials="T." surname="Oh" />
            <author initials="D." surname="Du" />
            <date month="June" year="2016" />
        </front>
        <seriesInfo name="IEEE" value="Transactions on Vehicular Technology, Vol. 65, No. 6" />
    </reference>

    <reference anchor="SAINTplus">
        <front>
            <title>SAINT+: Self-Adaptive Interactive Navigation Tool+ for Emergency Service Delivery Optimization</title>
            <author initials="Y." surname="Shen" />
            <author initials="J." surname="Lee" />
            <author initials="H." surname="Jeong" />
            <author initials="J." surname="Jeong" />
            <author initials="E." surname="Lee" />
            <author initials="D." surname="Du" />
            <date month="June" year="2017" />
        </front>
        <seriesInfo name="IEEE" value="Transactions on Intelligent Transportation Systems" />
    </reference>

    <reference anchor="SANA">
        <front>
            <title>SANA: Safety-Aware Navigation Application for Pedestrian Protection in Vehicular Networks</title>
            <author initials="T." surname="Hwang" />
            <author initials="J." surname="Jeong" />
            <date month="December" year="2015" />
        </front>
        <seriesInfo name="Springer" value="Lecture Notes in Computer Science (LNCS), Vol. 9502" />
    </reference>

    <reference anchor="CASD">
        <front>
            <title>CASD: A Framework of Context-Awareness Safety Driving in Vehicular Networks</title>
            <author initials="Y." surname="Shen" />
            <author initials="J." surname="Jeong" />
            <author initials="T." surname="Oh" />
            <author initials="S." surname="Son" />
            <date month="March" year="2016" />
        </front>
        <seriesInfo name="International Workshop" value="on Device Centric Cloud (DC2)" />
    </reference>

    <reference anchor="CA-Cruise-Control">
        <front>
            <title>Cooperative Adaptive Cruise Control</title>
            <author initials="" surname="California Partners for Advanced Transportation Technology (PATH)" />
            <date month="" year="2017" />
        </front>
        <seriesInfo name="Available:" value="http://www.path.berkeley.edu/research/automated-and-connected-vehicles/cooperative-adaptive-cruise-control" />
    </reference>  

    <reference anchor="Truck-Platooning">
        <front>
            <title>Automated Truck Platooning</title>
            <author initials="" surname="California Partners for Advanced Transportation Technology (PATH)" />
            <date month="" year="2017" />
        </front>
        <seriesInfo name="Available:" value="http://www.path.berkeley.edu/research/automated-and-connected-vehicles/truck-platooning" />
    </reference>  

    <reference anchor="FirstNet">
        <front>
            <title>First Responder Network Authority (FirstNet)</title>
            <author initials="" surname="U.S. National Telecommunications and Information Administration (NTIA)" />
            <date month="" year="2012" />
        </front>
        <seriesInfo name="Available:" value="https://www.firstnet.gov/" />
    </reference>  

    <reference anchor="FirstNet-Report">
        <front>
            <title>FY 2017: ANNUAL REPORT TO CONGRESS, Advancing Public Safety
            Broadband Communications</title>
            <author>
                <organization>
                First Responder Network Authority
                </organization>
            </author>
            <date month="December" year="2017" />
        </front>
        <seriesInfo name="FirstNet" value="FY 2017" />
    </reference> 

    <reference anchor="SignalGuru">
        <front>
            <title>SignalGuru: Leveraging Mobile Phones for Collaborative
            Traffic Signal Schedule Advisory</title>
            <author initials="E." surname="Koukoumidis" />
            <author initials="L." surname="Peh" />
            <author initials="M." surname="Martonosi" />
            <date month="June" year="2011" />
        </front>
        <seriesInfo name="ACM" value="MobiSys" />
    </reference> 

    <reference anchor="Fuel-Efficient">
        <front>
            <title>Fuel-Efficient En Route Formation of Truck Platoons</title>
            <author initials="S." surname="van de Hoef" />
            <author initials="K." surname="H. Johansson" />
            <author initials="D." surname="V. Dimarogonas" />
            <date month="January" year="2018" />
        </front>
        <seriesInfo name="IEEE" value="Transactions on Intelligent Transportation Systems" />
    </reference> 

    <reference anchor="Automotive-Sensing">
        <front>
            <title>Millimeter-Wave Vehicular Communication to Support Massive Automotive Sensing</title>
            <author initials="J." surname="Choi" />
            <author initials="V." surname="Va" />
            <author initials="N." surname="Gonzalez-Prelcic" />
            <author initials="R." surname="Daniels" />
            <author initials="C." surname="R. Bhat" />
            <author initials="R." surname="W. Heath" />
            <date month="December" year="2016" />
        </front>
        <seriesInfo name="IEEE" value="Communications Magazine"/>
    </reference>
	
    <reference anchor="NHTSA-ACAS-Report">
        <front>
            <title>Final Report of Automotive Collision Avoidance Systems (ACAS) Program</title>
            <author>
                <organization>
                National Highway Traffic Safety Administration (NHTSA) 
                </organization>
            </author>
            <date month="August" year="2000" />
        </front>
        <seriesInfo name="DOT" value="HS 809 080" />
    </reference> 
	
    <reference anchor="CBDN">
        <front>
            <title>CBDN: Cloud-Based Drone Navigation for Efficient Battery Charging
            in Drone Networks</title>
            <author initials="J." surname="Kim" />
            <author initials="S." surname="Kim" />
            <author initials="J." surname="Jeong" />
            <author initials="H." surname="Kim" />
            <author initials="J." surname="Park" />
            <author initials="T." surname="Kim" />			
            <date month="November" year="2019" />
        </front>
        <seriesInfo name="IEEE" value="Transactions on Intelligent Transportation Systems" />
    </reference> 
		
    <reference anchor="In-Car-Network">
        <front>
            <title>Challenges in a Future IP/Ethernet-based In-Car Network for Real-Time Applications</title>
            <author initials="H." surname="Lim" />
            <author initials="L." surname="Volker" />
            <author initials="D." surname="Herrscher" />
            <date month="June" year="2011" />
        </front>
        <seriesInfo name="ACM/EDAC/IEEE" value="Design Automation Conference (DAC)"/>
    </reference>
	
    <reference anchor="Scrambler-Attack">
        <front>
            <title>The Scrambler Attack: A Robust Physical Layer Attack on Location Privacy in Vehicular Networks</title>
            <author initials="B." surname="Bloessl" />
            <author initials="C." surname="Sommer" />
            <author initials="F." surname="Dressier" />
            <author initials="D." surname="Eckhoff" />
            <date month ="February" year="2015" />
        </front>
        <seriesInfo name="IEEE" value="2015 International Conference on Computing, Networking and Communications (ICNC)" />
    </reference>

   <reference anchor="Bitcoin">
        <front>
            <title>Bitcoin: A Peer-to-Peer Electronic Cash System</title>
            <author initials="S." surname="Nakamoto" />
            <date month="May" year="2009" />
        </front>
        <seriesInfo name="URL:" value="https://bitcoin.org/bitcoin.pdf" />
    </reference>

    <reference anchor="Vehicular-BlockChain">
        <front>
            <title>BlockChain: A Distributed Solution to Automotive Security and Privacy</title>
            <author initials="A." surname="Dorri" />
            <author initials="M." surname="Steger" />
            <author initials="S." surname="Kanhere" />
            <author initials="R." surname="Jurdak" />
            <date month="December" year="2017" />
        </front>
        <seriesInfo name="IEEE" value="Communications Magazine, Vol. 55, No. 12" />
    </reference>

<!-- END: Papers -->

</references>

<!--
<section title="Changes from draft-ietf-ipwave-vehicular-networking-16">
    <t> The following changes are made from draft-ietf-ipwave-vehicular-networking-16:
    <list style="symbols">
    <t>
    This version is revised based on the further comments from the following reviewer:
    Fred L. Templin (The Boeing Company).
    </t>
    </list>
    </t>
</section>
-->

<section title="Acknowledgments">
    <t>
    This work was supported by Institute of Information &amp;
    Communications Technology Planning &amp; Evaluation (IITP) grant funded by
    the Korea MSIT (Ministry of Science and ICT) (R-20160222-002755, Cloud based
    Security Intelligence Technology Development for the Customized
    Security Service Provisioning).
    </t>     

    <t>
    This work was supported in part by the MSIT, Korea, under the ITRC
    (Information Technology Research Center) support program 
    (IITP-2020-2017-0-01633) supervised by the IITP.
    </t>

    <t>
    This work was supported in part by the French research project DataTweet
	(ANR-13-INFR-0008) and in part by the HIGHTS project funded by the 
	European Commission I (636537-H2020).
    </t>
</section>

<section anchor="section:Contributors" title="Contributors">
    <t> 
    This document is a group work of IPWAVE working group, greatly benefiting 
    from inputs and texts by Rex Buddenberg (Naval Postgraduate School), 
    Thierry Ernst (YoGoKo), Bokor Laszlo (Budapest University of Technology 
    and Economics), Jose Santa Lozanoi (Universidad of Murcia), Richard Roy (MIT),
    Francois Simon (Pilot), Sri Gundavelli (Cisco), Erik Nordmark, Dirk von Hugo
    (Deutsche Telekom), Pascal Thubert (Cisco), Carlos Bernardos (UC3M),  
    Russ Housley (Vigil Security), Suresh Krishnan (Kaloom), Nancy Cam-Winget
    (Cisco), Fred L. Templin (The Boeing Company), Jung-Soo Park (ETRI), Zeungil
    (Ben) Kim (Hyundai Motors), Kyoungjae Sun (Soongsil University), Zhiwei Yan
    (CNNIC), YongJoon Joe (LSware), Peter E. Yee (Akayla), and Erik Kline.
    The authors sincerely appreciate their contributions.
    </t>

    <t> 
    The following are co-authors of this document:
    </t>   

    <t>
    Nabil Benamar <vspace blankLines="0"></vspace>
    Department of Computer Sciences <vspace blankLines="0"></vspace>
    High School of Technology of Meknes <vspace blankLines="0"></vspace>
    Moulay Ismail University <vspace blankLines="0"></vspace>
    Morocco <vspace blankLines="0"></vspace>
        <vspace blankLines="1"></vspace>
    Phone: +212 6 70 83 22 36 <vspace blankLines="0"></vspace>
    EMail: benamar73@gmail.com <vspace blankLines="1"></vspace>
    </t>  

    <t>   
    Sandra Cespedes <vspace blankLines="0"></vspace>
    NIC Chile Research Labs <vspace blankLines="0"></vspace>
    Universidad de Chile <vspace blankLines="0"></vspace>
    Av. Blanco Encalada 1975 <vspace blankLines="0"></vspace>
    Santiago <vspace blankLines="0"></vspace>
    Chile <vspace blankLines="1"></vspace>
        <vspace blankLines="1"></vspace>
    Phone: +56 2 29784093 <vspace blankLines="0"></vspace>
    EMail: scespede@niclabs.cl <vspace blankLines="1"></vspace>
    </t>

    <t>
    Jerome Haerri <vspace blankLines="0"></vspace>
    Communication Systems Department <vspace blankLines="0"></vspace>
    EURECOM <vspace blankLines="0"></vspace>
    Sophia-Antipolis <vspace blankLines="0"></vspace>
    France <vspace blankLines="0"></vspace>
        <vspace blankLines="1"></vspace>
    Phone: +33 4 93 00 81 34 <vspace blankLines="0"></vspace>
    EMail: jerome.haerri@eurecom.fr <vspace blankLines="1"></vspace>
    </t>

    <t>   
    Dapeng Liu <vspace blankLines="0"></vspace>
    Alibaba <vspace blankLines="0"></vspace>
    Beijing, Beijing 100022 <vspace blankLines="0"></vspace>
    China <vspace blankLines="0"></vspace>
        <vspace blankLines="1"></vspace>
    Phone: +86 13911788933 <vspace blankLines="0"></vspace>
    EMail: max.ldp@alibaba-inc.com <vspace blankLines="1"></vspace>
    </t>   

    <t>   
    Tae (Tom) Oh <vspace blankLines="0"></vspace>
    Department of Information Sciences and Technologies <vspace blankLines="0"></vspace>
    Rochester Institute of Technology <vspace blankLines="0"></vspace>
    One Lomb Memorial Drive <vspace blankLines="0"></vspace>
    Rochester, NY  14623-5603 <vspace blankLines="0"></vspace>
    USA <vspace blankLines="0"></vspace>
        <vspace blankLines="1"></vspace>
    Phone: +1 585 475 7642 <vspace blankLines="0"></vspace>
    EMail: Tom.Oh@rit.edu <vspace blankLines="1"></vspace>
    </t>

    <t>   
    Charles E. Perkins <vspace blankLines="0"></vspace>
    Futurewei Inc. <vspace blankLines="0"></vspace>
    2330 Central Expressway <vspace blankLines="0"></vspace>
    Santa Clara, CA  95050 <vspace blankLines="0"></vspace>
    USA <vspace blankLines="0"></vspace>
        <vspace blankLines="1"></vspace>
    Phone: +1 408 330 4586 <vspace blankLines="0"></vspace>
    EMail: charliep@computer.org <vspace blankLines="1"></vspace>
    </t>
   
    <t>   
    Alexandre Petrescu <vspace blankLines="0"></vspace>
    CEA, LIST <vspace blankLines="0"></vspace>
    CEA Saclay <vspace blankLines="0"></vspace>
    Gif-sur-Yvette, Ile-de-France 91190 <vspace blankLines="0"></vspace>
    France <vspace blankLines="0"></vspace>
        <vspace blankLines="1"></vspace>
    Phone: +33169089223 <vspace blankLines="0"></vspace>
    EMail: Alexandre.Petrescu@cea.fr <vspace blankLines="1"></vspace>
    </t>

    <t>   
    Yiwen Chris Shen <vspace blankLines="0"></vspace>
    Department of Computer Science &amp; Engineering <vspace blankLines="0"></vspace>
    Sungkyunkwan University <vspace blankLines="0"></vspace>
    2066 Seobu-Ro, Jangan-Gu <vspace blankLines="0"></vspace>
    Suwon, Gyeonggi-Do  16419 <vspace blankLines="0"></vspace>
    Republic of Korea <vspace blankLines="0"></vspace>
        <vspace blankLines="1"></vspace>
    Phone: +82 31 299 4106 <vspace blankLines="0"></vspace>
    Fax:   +82 31 290 7996 <vspace blankLines="0"></vspace>
    EMail: chrisshen@skku.edu <vspace blankLines="0"></vspace>
    URI: http://iotlab.skku.edu/people-chris-shen.php <vspace blankLines="1"></vspace>
    </t>

    <t>   
    Michelle Wetterwald <vspace blankLines="0"></vspace>
    FBConsulting <vspace blankLines="0"></vspace>
    21, Route de Luxembourg <vspace blankLines="0"></vspace>
    Wasserbillig, Luxembourg L-6633 <vspace blankLines="0"></vspace>
    Luxembourg <vspace blankLines="0"></vspace>
        <vspace blankLines="1"></vspace>
    EMail: Michelle.Wetterwald@gmail.com <vspace blankLines="1"></vspace>
    </t>
</section>

</back>

<!-- <vspace blankLines="100"/> -->
<!-- page break to put addresses onto one page-->

</rfc>
