The time synchronization of LTE-R train-to-ground communication systems plays an important role in ensuring the safety of high-speed railways. In the LTE-R time synchronization process, existing problems, such as the time synchronization message broadcast address and LTE-R all-IP architecture, are vulnerable to attack. In order to analyze the impact of these problems, we propose a new vulnerability analysis method of LTE-R time synchronization based on stochastic Petri nets. Firstly, we construct a stochastic Petri net model of an LTE-R time synchronization process under attack. Secondly, steady-state probability expressions are obtained using the model isomorphism Markov chain. Finally, bychanging the firing rate of several key vulnerable nodes, the relationship curve between the firing rate and the steady-state probability of the clock node is obtained. Simulations show that the vulnerability of LTE-R time synchronization is most affected by the attack on eNodeB of the LTE-R base station. The results can provide a certain theoretical basis for the evolution of high-speed railway GSM-R communication systems to LTE-R.
PurposeAs the strategy of 5G new infrastructure is deployed and advanced, 5G-R becomes the primary technical system for future mobile communication of China’s railway. V2V communication is also an important application scenario of 5G communication systems on high-speed railways, so time synchronization between vehicles is critical for train control systems to be real-time and safe. How to improve the time synchronization performance in V2V communication is crucial to ensure the operational safety and efficiency of high-speed railways.Design/methodology/approachThis paper proposed a time synchronization method based on model predictive control (MPC) for V2V communication. Firstly, a synchronous clock for V2V communication was modeled based on the fifth generation mobile communication-railway (5G-R) system. Secondly, an observation equation was introduced according to the phase and frequency offsets between synchronous clocks of two adjacent vehicles to construct an MPC-based space model of clock states of the adjacent vehicles. Finally, the optimal clock offset was solved through multistep prediction, rolling optimization and other control methods, and time synchronization in different V2V communication scenarios based on the 5G-R system was realized through negative feedback correction.FindingsThe results of simulation tests conducted with and without a repeater, respectively, show that the proposed method can realize time synchronization of V2V communication in both scenarios. Compared with other methods, the proposed method has faster convergence speed and higher synchronization precision regardless of whether there is a repeater or not.Originality/valueThis paper proposed an MPC-based time synchronization method for V2V communication under 5G-R. Through the construction of MPC controllers for clocks of adjacent vehicles, time synchronization was realized for V2V communication under 5G-R by using control means such as multistep prediction, rolling optimization, and feedback correction. In view of the problems of low synchronization precision and slow convergence speed caused by packet loss with existing synchronization methods, the observer equation was introduced to estimate the clock state of the adjacent vehicles in case of packet loss, which reduces the impact of clock error caused by packet loss in the synchronization process and improves the synchronization precision of V2V communication. The research results provide some theoretical references for V2V synchronous wireless communication under 5G-R technology.
Aiming at the possible hazards that a pipe will face when crossing the goaf, preliminary analysis and assessment was given in this paper. Firstly, basic parameters in surface movement were determined using comprehensive factor P for rock character evaluation. Based on probability integral method of surface residual movement, the analysis for main section of mined-out area was completed. The results showed that the goaf had not yet been fully stable and the pipeline would be in risk of damage. Secondly, two models were introduced. One was single beam model, for the fact that the deformation of pipe and ground was out-sync, on the assumption that stress and deformation characteristics of pipeline above the goaf were similar to that of a beam under uniform load with at both ends fixed. The pipeline allowable subsidence value was obtained by structural mechanics method. The other was elastic foundation beam on the assumption that the deformation of pipe and ground was in sync. The pipe was regarded as an elastic foundation beam, and the allowable subsidence of pipe was obtained. At last, comparing the pipeline allowable subsidence value with value of surface residual movement, conclusion that the pipeline would not be subjected to the hazards of mining subsidence was drawn.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.