Conference PaperPDF Available

Autonomous Traffic Management: Open Issues and New Directions

Authors:

Abstract and Figures

Many technical communities are vigorously pursuing research topics that contribute to the Autonomous Traffic Management (ATM). ATM is a research field of Intelligent Transportation Systems (ITS) that aims to decrease traffic congestion based on autonomous vehicles cooperation and capacities. However, a literature review reveals that many issues related to ATM and autonomous vehicles are up for discussion, and so are the key research challenges lying ahead. We first present the ATM aims and scope to provide a basis for discussing related open research problems. This paper enumerates and discusses six key research topics and research problems within those issues.
Content may be subject to copyright.
Autonomous Traffic Management: Open Issues and New
Directions
Sara El Hamdani#1, Nabil Benamar #2
# University Moulay Ismail, Meknes Morocco
1 s.elhamdani@edu.umi.ac.ma
2 n.benamar@est.umi.ac.ma
Abstract Many technical communities are vigorously pursuing
research topics that contribute to the Autonomous Traffic
Management (ATM). ATM is a research field of Intelligent
Transportation Systems (ITS) that aims to decrease traffic
congestion based on autonomous vehicles cooperation and
capacities. However, a literature review reveals that many issues
related to ATM and autonomous vehicles are up for discussion,
and so are the key research challenges lying ahead. We first
present the ATM aims and scope to provide a basis for
discussing related open research problems. This paper
enumerates and discusses six key research topics and research
problems within those issues.
Keywords Autonomous vehicle, self-driving car, cooperative
system, Vehicle to vehicle communication (V2V), traffic
management, ITS
I. INTRODUCTION
Traffic management is one of the most challenging
problems within transportation system for keeping traffic
safety and decreasing traffic congestion. Meanwhile, traffic
congestion is often a contributing cause of accidents [1] and
has an important impact on the economy [2].
To reduce congestion rate, traffic management used road
signs and infrastructure such as traffic lights controller system.
However, traditional systems for traffic management did not
prove their efficiency, while the number of vehicles on the
roads is growing and hence congestion rate is still increasing.
Accordingly, Intelligent Transportation Systems (ITS) play a
crucial role in diminishing traffic jams using new
technologies such as autonomous vehicles.
Nowadays, autonomous vehicles are equipped with
advanced sensors and cameras that provide much more
detailed environmental information, supporting richer
perception of local surroundings. Likewise, wireless
communication allows vehicles to share information with
other vehicles (and with infrastructure). Thus, vehicles are
able to cooperate and manage the road autonomously based
on an Autonomous Traffic Management (ATM) system.
ATM has a key role in decreasing vehicles traffic delay
and hence in diminishing road congestion which make it a
central research field of ITS where important efforts were
done. However, many ATM issues related to autonomous
vehicles real capacities in complex road architectures and
situations, to communication limitations and the ability of
cohabitation between autonomous vehicles and other road
users.
In this paper, we briefly mention a vision for autonomous
vehicles and ATM scope in section II. We then
discuss open research questions categorized into six topics in
section III. Finally, we conclude the paper in section IV.
II. AUTONOMOUS TRAFFIC MANAGEMENT SCOPE
A. Autonomous vehicle
ATM systems are based on autonomous vehicles as the
powerful agents that are capable to cooperate between them
to manage the traffic more efficiently. As illustrated in figure
1, autonomous vehicle is equipped with diverse cameras and
sensors that permit full vision of the different elements of the
road. High-accuracy Global Positioning System (GPS) device
in turn allows the vehicle to follow the road indicated by a
digital road-map database that the vehicle has access to.
Furthermore, the smart vehicle is able to collect more
complex traffic information based on vehicle to vehicle (V2V)
or generally Vehicle to another entity (V2X) communication
using the wireless interface.
In the other hand, the central computer provides the
vehicle with a high computation capacity and enables it to
analyze the set of collected data, to achieve complex
processing and to take smart driving decisions. Thus, the
vehicle is capable to participate to the fully autonomous
management of the traffic.
B. Autonomous traffic management
As a research field of ITS, ATM is concerned by the
development of smart systems for traffic management based
Fig. 1 An illustration of autonomous vehicle.
on autonomous vehicles capacity of cooperation. Such new
technologies enable ATM to have a key role in increasing
traffic flow and solving many road concerns. As illustrated in
figure 2, the following summarizes some features provided by
ATM:
Improving Traffic Light Controller System (TLCS):
Toward fully autonomous system, ATM
participates also to the improvement of smart
TLCS based on Vehicle to Infrastructure (V2I)
communication.
Replacing stop signs: A fully ATM aims to replace
traditional TLCS and signs which are using
autonomous vehicles cooperation based on V2V
communication.
Enhancing road throughput: By replacing road signs
and using vehicles coordination, ATM systems
aims to increase traffic flow. This later is enhanced
by minimizing vehicles stopping which contributes
to decreasing vehicles travel delay.
Intersection management: Intersections are
considered as traffic bottleneck of that signalized
systems failed in managing it efficiently. Hence, a
big part of ATM works are concerned by
cooperative management of intersection.
Enhancing security: Like the rest of ITS research
areas, security is the most important objective of
ATM, since transportation is a direct cause of
death injury of human beings. Cooperative
vehicles exchange data and coordinate while
driving to avoid collisions.
Decreasing Congestion rate: Directly or indirectly, all
previous discussed ATM aims has an important
effect in decreasing road congestion. This later is a
serious issue of ITS due to its negative impact on
the economy (big waste of fuel and time).
III. RESEARCH DIRECTIONS
The spectrum of research required to reach ATM at the
scale intended above involves significant investigation along
many directions. In this section, issues and required research
directions are introduced in six topic areas: complex situations,
complex architecture, communication, data privacy,
coexistence of driverless/ normal vehicles and vulnerable users.
The research topics presented in each case are
representative and not complete. Some issues such as the
development of standards and the cultural impact on
application of these systems are outside the scope of the paper.
A. Complex situations
As aforementioned in the previous section, ATM rely on
autonomous vehicles capacities of communication [3],
computation and taking smart decisions [4]. Thus, it aim to
manage intersections and roads efficiently based on a
cooperative approach. Thus, ATM are able to decrease
vehicles travel delay and accordingly, to diminish significantly
road congestion rates.
Autonomous vehicles, in turn, are based on machine
learning and pattern recognition [5] using sensors [6] and
cameras [7]. Thus, the vehicle is able to recognize persons,
objects and road signs before arriving to them. Moreover, it is
capable to avoid obstacles [8] and respect road marks [9]
based on smart decisions that it can take in real time, for
instance: breaking, changing line or slowing down according
to the situation. The issue here is that autonomous vehicles
capacities require a perfect road conditions. In other words, the
vehicles could easily stump due to undefined situations such as
inclement weather, detours and rerouted roads, dramatic
crashes or roads without clear lane marking.
Moreover, autonomous vehicles are not able to drive
defensively like a human driver can interact by anticipating
potential risks when navigating in construction zones for
instance, or when driving near drunks, wild animals or
children. Likewise, the vehicle could straggle due to a simple
misreading harmless puddle of water as pothole or a little
mistake made by Google maps for instance. In other words,
how will an autonomous vehicle react in imperfect road
conditions?
The majority of existing autonomous architectures [10][11]
ignore this big issue and require perfect conditions that allow
them to suppose a faultless behavior from autonomous
vehicles. However, this field of research is very critical since it
is related to human beings safety and the smallest mistake
could cause a tragedy; hence, it should not be ignored by the
system.
Despite the big effort made on cyber physical systems [12]
and on accurate object recognition technologies [13][14] of
autonomous driving vehicles, the hardest reasoning tasks
remain unsolved to date, as no autonomous vehicle has yet
Fig. 2 An illustration of a set of important features autonomous traffic
management. aims.
proved a capacity to navigate in such undefined situations [15].
Thus, works on ATM need focus more on complex situations
and should take into consideration the limited capacities of
autonomous vehicles.
B. Complex Architecture
The main objective of ATM is to avoid possible collisions
with other vehicle using the capacities of autonomous vehicles
[16]. To do so, the system drives from a starting point to an
ending point following the path indicated using the GPS. Thus,
the vehicle’s system uses cameras and sensors to visualize the
path elements such as lines, pedestrian crossing and
roundabout.
Regarding vehicle-collision avoidance, the system needs to
model the road architecture that it can define the collision
region. Accordingly, the majority of the ATM tend to model
the road architecture especially in urban area as simple squares
[17][14] as shown in the figure 3 a). For instance, several
works [18][19] modelled the intersection as a grid of small
cells to make the vehicle able to recognize its trajectory
accurately in order to detect the collision region before
arriving to it. As illustrated in Fig. 3. (b), the trajectory of
vehicle Ainside the junction is {2, 6, 10, 14}, when vehicle
B”’s trajectory is {8, 7, 6, 5}. Thus, the cell number 6 is
expected as a region where a collision may happen between
the two vehicles.
Such simple modelling of road enable a more accurate
collision detection for the system. However, it is too far to be
feasible in real world because intersections are not always a
junction of two simple road and do not have a perfect
geometric shape.
Road network topologies even in urban area are more
complex than the topology used in simulations. Thus, these
systems are not designed to manage traffic in real world roads.
Excluding some works which used real topologies in
simulations such as [20], researches in this field should be
directed towards more complicated topologies to be more valid
for real life road architectures.
C. Communication
In ATM, vehicles are cooperative and generally do not rely
on road signs and infrastructure; hence, communication has the
key role in the autonomous management of the traffic.
Autonomous vehicles require communication [21][22] to share
their information with infrastructure and to deduce the
situation of the road. Based on this data, autonomous vehicle
decide to change route [23], to stop, to slow down…
Generally, the mode of dissemination used in V2V
communication is geocast which is a broadcast but limited
only to within a specific area using Dedicated Short Range
Communications/Wireless Access in Vehicular Environments
(DSRC/WAVE) [24] in a range of 1km [25]. Thus, in an ATM
vehicles broadcast and receive information to all vehicles in
their range permanently [26] [27].
The main drawback is that the packet delivery ratio
increases with the density of traffic environment [28] which is
inconsistent with the main objective of the system which is
congestion avoidance. Moreover, increasing the transmission
power require involving more vehicles which increases the
channel load in turn significantly and ends in channel
congestion.
Furthermore, ATM systems should study the ability of the
vehicle’s system: to receive hundreds or even thousands of
messages in a congested area, to handle them simultaneously,
to remove essential information, to do complex calculations
based on it, to take critical decisions and to apply them in real
time.
Thus, future works on ATM must take into account this
issue and should study the real communication capacity of
autonomous vehicles and should measure the maximum
number of packet that a vehicle can handle and respond to in
real time. Likewise, they should make more efforts on
minimizing communication between vehicles like in [29]
where researchers worked on replacing physical
communication with virtual communication.
D. Data privacy
Despite of security issues of autonomous vehicles that are
b)
a)
Fig. 3 An illustration of road architecture modelling as squares.
a) An urban road network modelled as squares. b) An
intersection modelled as a grid of numbered small cells to detect
collision region.
“A”
B
not solved until now such as the frightening possibility of
hacking the entire vehicle, ATM requires from vehicle to share
their personal information with other vehicles and/or with
servers across the country.
ATM assumes that all vehicles should share private
information such as current position, depart station and arrival
station [30][31]. However, such information is not always
without value or easy to share. In fact, vehicles information
could be used badly in espionage or in criminal operations
easily from where comes the necessity of safeguarding of
some persons (habitually public figures) information.
Nevertheless, even normal persons may have the issue of
losing the confidentiality of their information while travelling
on the road and they have the right to require data privacy.
Existing research proposed security systems to protect
external communication for autonomous vehicles. The
proposed system in [32] is able to detect malicious vehicles,
likewise the system in [33] can detect black hole attacks before
they causes significant damage.
Nonetheless, vehicles data privacy should be considered in
researches on ATM. The system should value the information
exchanged between vehicles and should protect as possible
vehicles data and limit its circulation to only essential cases.
E. Coexistence of Driverless/ Normal vehicles
Autonomous vehicles are seen as the future trend in
Intelligent ITS world. Therefore, ATM for traffic management
centers around autonomous vehicles and the exploitation of
their capacities to improve the effectiveness of urban vehicular
mobility. Thus, majority of ATM systems assumes that all the
existing vehicles on the road are fully autonomous with perfect
function [34].
However, autonomous vehicles are still under test and are
not ready for use in real-world roads soon for many reasons
[35]. Moreover, when self-driving vehicles will be ready for
use they cannot replace all normal vehicles at once, but they
will be inserted gradually due to social and economic obstacles.
Therefore, researches on autonomous vehicles should focus
first on the integration of autonomous vehicles with normal
vehicles.
Accordingly, in some existing works [36][37] the system
considers the existence of non-connected vehicles side by side
with autonomous vehicles on the same road network.
Nevertheless, works on ATM should focus more on the
transition phase from normal vehicles to autonomous vehicles.
Thus, the system should be able to detect a normal vehicle and
to avoid it without requiring communication or a smart
reaction from it.
F. Vulnerable users
As aforementioned in the previous subsection, the problem
with the majority of ATM focus only on autonomous vehicles
and do not consider normal vehicles. Furthermore, the systems
ignore the existence of vulnerable road users [38] such as
motorcycles, bicycles and pedestrians so they do not include
them [30][39][40].
Nevertheless, vulnerable users do not have the same
autonomous vehicles capacities such as communication and
detection; hence, it is difficult to deal with them on the road.
Moreover, many security issues are related to vulnerable users
such as detection and warning.
Actually, important effort were done in this research field
for vehicular detection of pedestrians [8], pedestrian collision
avoidance [41], vehicular to pedestrian (V2P) communication
based approach for pedestrian crossing [42]. Likewise, in [43]
researchers worked on motorcycle crash avoidance based on
V2X communication.
Nevertheless, ATM trend to replace traditional road signals
and infrastructure that manage all road users now by
cooperative architectures that rely only communication
between vehicles [39]. Thus, vulnerable users’ detection,
avoidance or even warning are not enough.
To replace existing traffic management mechanisms for
signalized roads, ATM should consider all road users and their
rights of navigating or crossing the road. Furthermore,
vulnerable users such as pedestrians should be prioritized
without requiring specific devices to be able to cross the road.
IV. CONCLUSIONS AND FUTURE WORKS
In summary, ITS relies on ATM to solve traffic problems in
the future such as decreasing congestion rate and economic
cost when autonomous vehicles are ready for use. Generally,
ATM assumes perfect function from autonomous vehicles, and
simple road architectures. Likewise, they assume defined
situation, unlimited wireless communication and the existence
of autonomous vehicles as the only road user. In fact, these
assumptions and requirements open many issues of the
application of ATM in real world roads. We discussed these
issues in six point to provide clear research directions that
would help to improve ATM.
LIST OF ACRONYMS
ATM
Autonomous Traffic Management
DSRC
Dedicated Short Range Communications
GPS
Global Positioning System
ITS
Intelligent Transportation Systems
TLCS
Traffic Light Controller System
V2I
Vehicle to Infrastructure
V2P
Vehicle to Pedestrian
V2V
Vehicle to Vehicle
V2X
Vehicle to another entity
WAVE
Wireless Access in Vehicular Environments
REFERENCES
[1] C. A. Kahn and C. S. Gotschall, “The economic and societal impact
of motor vehicle crashes, 2010 (Revised),” Ann. Emerg. Med., vol.
66, no. 2, pp. 194196, 2015.
[2] D. Schrank., B. Eisele., T. Lomax., and J. Bak., “2015 Urban
Mobility Scorecard,” Texas A&M Transp. Institue, vol. 39, no.
August, p. 5, 2015.
[3] V. Gradinescu, C. Gorgorin, R. Diaconescu, V. Cristea, and L.
Iftode, “Adaptive Traffic Lights Using Car-to-Car Communication,”
in 2007 IEEE 65th Vehicular Technology Conference - VTC2007-
Spring, 2007, no. 1, pp. 2125.
[4] J. R. Perez, V. Milanes, T. De Pedro, and L. Vlacic, “Autonomous
Driving Manoeuvres In Urban Road Traffic Environment : A Study
On Roundabouts,” 18th World Congr. Int. Fed. Autom. Control,
2012.
[5] J. Wei, J. M. Snider, J. Kim, J. M. Dolan, R. Rajkumar, and B.
Litkouhi, “Towards a Viable Autonomous Driving Research
Platform.”
[6] N. Radwan, W. Winterhalter, C. Dornhege, and W. Burgard, “Why
did the Robot Cross the Road? - Learning from Multi-Modal Sensor
Data for Autonomous Road Crossing,” 2017.
[7] P. Dollar, C. Wojek, B. Schiele, and P. Perona, “Pedestrian detection:
An evaluation of the state of the art,” IEEE Trans. Pattern Anal.
Mach. Intell., vol. 34, no. 4, pp. 743761, 2012.
[8] Y. Morales, A. Carballo, E. Takeuchi, A. Aburadani, and T.
Tsubouchi, “Autonomous robot navigation in outdoor cluttered
pedestrian walkways,” J. F. Robot., vol. 26, no. 8, pp. 609635,
2009.
[9] U. Franke, D. Gavrila, S. Görzig, F. Lindner, F. Paetzold, and C.
Wöhler, “Autonomous Driving approaches Downtown,” IEEE Intell.
Syst., vol. 13, no. 6, pp. 114, 1999.
[10] K. Dresner and P. Stone, “A multiagent approach to autonomous
intersection management,” J. Artif. Intell. Res., vol. 31, pp. 591656,
2008.
[11] R. Azimi, G. Bhatia, and R. R. Rajkumar, “STIP : Spatio-Temporal
Intersection Protocols for Autonomous Vehicles,” pp. 1–12, 2014.
[12] C. Berger and B. Rumpe, “Autonomous Driving - 5 Years after the
Urban Challenge: The Anticipatory Vehicle as a Cyber-Physical
System,” no. September, pp. 789–798, 2014.
[13] A. Teichman, J. Levinson, and S. Thrun, “Towards 3D object
recognition via classification of arbitrary object tracks,” Proc. -
IEEE Int. Conf. Robot. Autom., pp. 40344041, 2011.
[14] D. Mitzel, “Taking {M}obile {M}ulti-{O}bject {T}racking to the
{N}ext {L}evel,” PhD thesis, pp. 566579, 2013.
[15] J. Levinson, J. Askeland, J. Becker, J. Dolson, D. Held, S. Kammel,
J. Z. Kolter, D. Langer, O. Pink, V. Pratt, M. Sokolsky, G. Stanek, D.
Stavens, A. Teichman, M. Werling, and S. Thrun, “Towards fully
autonomous driving: Systems and algorithms,” IEEE Intell. Veh.
Symp. Proc., pp. 163168, 2011.
[16] S. B. Raut and L. G. Malik, “Survey on vehicle collision prediction
in VANET,” 2014 IEEE Int. Conf. Comput. Intell. Comput. Res.
IEEE ICCIC 2014, no. Idm, pp. 735751, 2015.
[17] S. Huang, A. W. Sadek, and Y. Zhao, “Assessing the Mobility and
Environmental Benefits of Reservation-Based Intelligent
Intersections Using an Integrated Simulator,” vol. 13, no. 3, pp.
12011214, 2012.
[18] L. Chen and C. Englund, “Cooperative Intersection Management: A
Survey,” IEEE Trans. Intell. Transp. Syst., vol. 17, no. 2, pp. 570
586, 2016.
[19] R. Azimi, G. Bhatia, R. Rajkumar, and P. Mudalige, “V2V-
Intersection Management at Roundabouts,” SAE Int. J. Passeng.
Cars - Mech. Syst., vol. 6, no. 2, pp. 681690, 2013.
[20] P. Bellavista, L. Foschini, and E. Zamagni, “V2X Protocols for low-
penetration-rate and cooperative traffic estimations,” IEEE Veh.
Technol. Conf., no. November, 2014.
[21] G. Karagiannis, O. Altintas, E. Ekici, G. Heijenk, B. Jarupan, K. Lin,
and T. Weil, “Vehicular networking: A survey and tutorial on
requirements, architectures, challenges, standards and solutions,”
IEEE Commun. Surv. Tutorials, vol. 13, no. 4, pp. 584616, 2011.
[22] G. Lu, L. Li, Y. Wang, R. Zhang, Z. Bao, and H. Chen, “A rule
based control algorithm of connected vehicles in uncontrolled
intersection,” Intell. Transp. Syst. (ITSC), 2014 IEEE 17th Int. Conf.,
pp. 115120, 2014.
[23] S. Gupte and M. Younis, “Vehicular networking for intelligent and
autonomous traffic management,” IEEE Int. Conf. Commun., pp.
53065310, 2012.
[24] “J2735D: Dedicated Short Range Communications (DSRC)
Message Set DictionaryTM - SAE International,” p. 2735, 2016.
[25] K. Dar, M. Bakhouya, J. Gaber, M. Wack, and P. Lorenz, “Wireless
communication technologies for ITS applications,” IEEE Commun.
Mag., vol. 48, no. 5, pp. 156162, 2010.
[26] R. Azimi, G. Bhatia, R. Rajkumar, and P. Mudalige, “Intersection
Management using Vehicular Networks,” Soc. Automot. Eng. World
Congr., pp. 113, 2012.
[27] L. Makarem and D. Gillet, “Information sharing among autonomous
vehicles crossing an intersection,” Conf. Proc. - IEEE Int. Conf. Syst.
Man Cybern., no. 1, pp. 25632567, 2012.
[28] S. Azimi, G. Bhatia, R. Rajkumar, and P. Mudalige, “Reliable
intersection protocols using vehicular networks,” 2013 ACM/IEEE
Int. Conf. Cyber-Physical Syst. ICCPS 2013, pp. 110, 2013.
[29] P. Desai, S. W. Loke, A. Desai, and J. Singh, “CARAVAN:
Congestion avoidance and route allocation using virtual agent
negotiation,” IEEE Trans. Intell. Transp. Syst., vol. 14, no. 3, pp.
11971207, 2013.
[30] M. Zhu, X. Li, H. Huang, L. Kong, M. Li, and M. Wu, “LICP : A
Look-ahead Intersection Control Policy with Intelligent Vehicles.”
[31] M. M. Abdelhameed, M. Abdelaziz, S. Hammad, and O. M. Shehata,
“Development and Evaluation of a Multi-Agent Autonomous
Vehicles Intersection Control System,” pp. 0–5, 2014.
[32] K. M. A. Alheeti, A. Gruebler, K. D. McDonald-Maier, and A.
Fernando, “Prediction of DoS attacks in external communication for
self-driving vehicles using a fuzzy petri net model,” 2016 IEEE Int.
Conf. Consum. Electron., no. 1, pp. 502503, 2016.
[33] K. M. A. Alheeti, A. Gruebler, and K. McDonald-Maier, “Using
discriminant analysis to detect intrusions in external communication
for self-driving vehicles,” Digit. Commun. Networks, vol. 3, no. 3,
pp. 180187, 2017.
[34] T.-C. Au, N. Shahidi, and P. Stone, “Enforcing Liveness in
Autonomous Traffic Management,” AAAI’11 Proc. Twenty-Fifth
AAAI Conf. Artif. Intell., no. August, pp. 13171322, 2011.
[35] D. J. Fagnant and K. Kockelman, “Preparing a nation for
autonomous vehicles: Opportunities, barriers and policy
recommendations,” Transp. Res. Part A Policy Pract., vol. 77, pp.
167181, 2015.
[36] L. C. Bento, R. Parafita, S. Santos, and U. Nunes, “Intelligent traffic
management at intersections: Legacy mode for vehicles not
equipped with v2v and v2i communications,” in 16th International
IEEE Conference on Intelligent Transportation Systems (ITSC 2013),
2013, pp. 726731.
[37] M. Guériau, R. Billot, N. E. El Faouzi, J. Monteil, F. Armetta, and S.
Hassas, “How to assess the benefits of connected vehicles? A
simulation framework for the design of cooperative traffic
management strategies,” Transp. Res. Part C Emerg. Technol., vol.
67, pp. 266279, 2016.
[38] S. El Hamdani and N. Benamar, “A Comprehensive Study of
Intelligent Transportation System Architectures for Road
Congestion Avoidance,” in International Symposium on Ubiquitous
Networking, vol. 10542, Cham: Springer, 2017, pp. 95106.
[39] P. S. VanMiddlesworth, Mark, Kurt Dresner, “Replacing the Stop
Sign: Unmanaged Intersection Control for Autonomous Vehicles,”
in Proceedings of the 7th international joint conference on
Autonomous agents and multiagent systems-Volume 3, 2008, pp.
14131416.
[40] R. Azimi, G. Bhatia, R. Rajkumar, and P. Mudalige, “Ballroom
intersection protocol: Synchronous autonomous driving at
intersections,” Proc. - IEEE 21st Int. Conf. Embed. Real-Time
Comput. Syst. Appl. RTCSA 2015, pp. 167175, 2015.
[41] D. F. Llorca, V. Milanés, I. P. Alonso, M. Gavilán, I. G. Daza, J.
Pérez, and M. Á. Sotelo, “Autonomous pedestrian collision
avoidance using a fuzzy steering controller,” IEEE Trans. Intell.
Transp. Syst., vol. 12, no. 2, pp. 390401, 2011.
[42] M. Bagheri, M. Siekkinen, and J. K. Nurminen, “Cellular-based
vehicle to pedestrian (V2P) adaptive communication for collision
avoidance,” 2014 Int. Conf. Connect. Veh. Expo, ICCVE 2014 -
Proc., no. February 2016, pp. 450456, 2014.
[43] E. Gogou, G. Katsaros, E. Derens, G. Alvarez, P. S. Taoukis, and C.
Chain, “Application of Vehicle to another entity (V2X)
Communications for Motorcycle Crash Avoidance,” J. Intell. Transp.
Syst., vol. 21, no. 285295, pp. 131, 2017.
... Overall goals of a human-centered ATM. The design and implementation process of an ATM should not just consider safety and efficiency related goals but also goals from the human factors domain to help with the adoption of AVs [4]. ...
... The research field of ATM and ITS has so far focused mainly on the goals of optimizing traffic efficiency, reducing congestion and improving safety [4]. Common metrics to evaluate an ITS are the waiting times at intersections, total trip duration, CO2 emission and fuel consumption of the traffic participants. ...
Chapter
Autonomous traffic management (ATM) allows autonomous vehicles to cooperate and can thus lead to an increased traffic efficiency, enhanced traffic safety and decreased ecological footprint of traffic. For the adoption of autonomous vehicles (AVs), humans have to accept and trust them, but so far, the research field of ATM has focused mainly on the aspired safety and efficiency gain instead of an increase in trust and user acceptance of the technology. In this paper, we discuss the need for a human-centered approach for ATM.For demonstration purposes we designed a turning scenario at an urban intersection with just AVs. The traffic scenario was then simulated with the traffic simulation package SUMO. We implemented a simple ATM system that can interact and manage the behavior of the traffic participants. We present the results of the traffic simulation and the proposed ATM and discuss why the human factors perspective should be considered for the design of ATM. We argue how a human-centered ATM could be used to find a good trade-off between safe and efficient traffic and a comfortable and trustworthy user experience. KeywordsTraffic management systemsAutonomous vehiclesHuman-centered designTraffic simulations
... of these new technologies can put his life and health in real danger [6]. Accordingly, pedestrian perception is an active AI research area where extensive efforts are being invested to apply different machine learning methods and to enable the autonomous vehicle to recognize pedestrians and avoid any possible collision with them [7]. ...
... Autonomous Traffic Management (ATM) is a new ITS research area that has a more specific objective in making the trade-off between safety and traffic efficiency by means of fully distributed and cooperative systems based on Vehicle to Vehicle (V2V) communication [6]. Thus, the new ATM architecture [9] [10] focuses on avoiding VRUs while minimizing vehicular travel delays. ...
Chapter
Full-text available
Pedestrian is the main Vulnerable Road User (VRU) that needs further support when designing enhanced Intelligent Transportation Systems (ITSs). The pedestrian’s perception and motion identification in real time and in different situations are still challenging tasks for the autonomous vehicle designer. Serious efforts have been invested in this field using recent Artificial Intelligence (AI) techniques such as deep and reinforcement learning. However, pedestrian refuge island perception and decision-making have not been investigated so far. In this paper, we propose a model to detect pedestrians and count their numbers in refuge islands using the Pedestrian Location Perception Network (P-LPN) technique. Also, our model uses the Long Short-Term Memory (LSTM) for updating the number of pedestrians over time and predict the desired decision.KeywordsP-LPNLSTMPedestrian recognitionSemantic detectionControl decisionV2V communicationAutonomous Traffic ManagementATM
... Emotional data, in particular, can be complex and multimodal, necessitating sophisticated, AI-driven approaches for reliable interpretation and reaction. • Autonomous traffic management (ATM) [171]: Extending the scope of ATM to include affective factors is an intriguing area of research. For instance, traffic congestion, an external factor, invariably impacts the overall mood of a passenger within a vehicle. ...
Article
Full-text available
Autonomous vehicles (AVs), defined as vehicles capable of navigation and decision-making independent of human intervention, represent a revolutionary advancement in transportation technology. These vehicles operate by synthesizing an array of sophisticated technologies, including sensors, cameras, GPS, radar, light imaging detection and ranging (LiDAR), and advanced computing systems. These components work in concert to accurately perceive the vehicle’s environment, ensuring the capacity to make optimal decisions in real-time. At the heart of AV functionality lies the ability to facilitate intercommunication between vehicles and with critical road infrastructure—a characteristic that, while central to their efficacy, also renders them susceptible to cyber threats. The potential infiltration of these communication channels poses a severe threat, enabling the possibility of personal information theft or the introduction of malicious software that could compromise vehicle safety. This paper offers a comprehensive exploration of the current state of AV technology, particularly examining the intersection of autonomous vehicles and emotional intelligence. We delve into an extensive analysis of recent research on safety lapses and security vulnerabilities in autonomous vehicles, placing specific emphasis on the different types of cyber attacks to which they are susceptible. We further explore the various security solutions that have been proposed and implemented to address these threats. The discussion not only provides an overview of the existing challenges but also presents a pathway toward future research directions. This includes potential advancements in the AV field, the continued refinement of safety measures, and the development of more robust, resilient security mechanisms. Ultimately, this paper seeks to contribute to a deeper understanding of the safety and security landscape of autonomous vehicles, fostering discourse on the intricate balance between technological advancement and security in this rapidly evolving field.
... The proposed technique has been divided into four stages. 20 Discussed many issues related to traffic control. ...
Article
Full-text available
Miniaturization of Internet of Things (IoT) enabled devices has led to advancement in Intelligent Transportation System. Some of the challenges for efficient traffic management are connection of vehicles through an IP based infrastructure for transportation, reliable, and flexible traffic control management, maintaining quality of services for video streaming applications in Internet of Vehicles and many more. Today there is a need of an efficient transportation system with improved efficiency of traffic safety and lower traveling costs. An intelligent traffic control system using Ant Colony Optimization (ACO) algorithm has been proposed and analyzed in this paper. Proposed algorithm has been compared with existing state of art algorithms in terms of average waiting time and average traveling time.
... Some researchers focused on ramp metering as in [22], while others concentrated on intersection management on a larger scale such as [23] and [24]. That said, besides the AV traffic management algorithm itself, which is sometimes quite complicated, there are side problems that need to be handled [25] such as the coexistence of AV with human-driven cars, pedestrians, motorcyclists, etc.; dealing with complicated situations such as severe weather conditions or natural accidents, advanced architecture support. There are also data handling and communication problems. ...
Article
Full-text available
Artificial Intelligence (AI) is changing every technology we are used to deal with. Autonomy has long been a sought-after goal in vehicles, and now more than ever we are very close to that goal. Big auto manufacturers as well are investing billions of dollars to produce Autonomous Vehicles (AVs). This new technology has the potential to provide more safety for passengers, less crowded roads, congestion alleviation, optimized traffic, fuel-saving, less pollution as well as enhanced travel experience among other benefits. But this new paradigm shift comes with newly introduced privacy issues and security concerns. Vehicles before were dumb mechanical devices, now they are becoming smart, computerized, and connected. They collect huge troves of information, which needs to be protected from breaches. In this work, we investigate security challenges and privacy concerns in AVs. We examine different attacks launched in a layer-based approach. We conceptualize the architecture of AVs in a four-layered model. Then, we survey security and privacy attacks and some of the most promising countermeasures to tackle them. Our goal is to shed light on the open research challenges in the area of AVs as well as offer directions for future research.
... In the other side, Autonomous Traffic Management (ATM) is an innovative direction of ITS that aims to completely replace the signal-based traffic control with more efficient distributed management that relies on vehicular cooperation based on Vehicle-to-Vehicle (V2V) communication [11] and hence help to decrease vehicular delay. Nonetheless, the intersection of Vulnerable Road Users (VRUs) such as cyclists and pedestrian into the full Connected and Autonomous Vehicle (CAV) system is a remaining challenge [12] that few studies has considered [13,14]. ...
Chapter
Autonomous Traffic Management (ATM) is a growing field of Intelligent Transportation Systems (ITSs) that aims to replace conventional traffic signals with more efficient cooperative systems. Accordingly, it relays on vehicular communication for sharing awareness messages and hence to enable Autonomous Vehicles (AVs) to make effective control decision to optimize their traffic delay. Nonetheless, little focus has been placed on the insertion of bicycles in the ATM. Moreover, no research, to our knowledge, has studied the benefit of the application of Deep Reinforcement Learning (DRL) to integrate cyclists in these distributed systems. To fill this gap, we propose first a Markov Decision Process (MDP) modeling for this scenario. Then, we investigate the use of Deep Q-Learning to optimize vehicle time loss. Finally, we discuss deeply the performance of our proposed DRL-based solution compared to similar traditional programming-based systems.KeywordsDeep Reinforcement Learning DRLMarkov Decision Process MDPCyclist avoidanceV2V communicationAutonomous Traffic Management ATM
Article
Full-text available
The present paper focuses on vehicle simulator fidelity, particularly the effect of motion cues intensity on driver performance. The 6-DOF motion platform was used in the experiment; however, we mainly focused on one characteristic of driving behavior. The braking performance of 24 participants in a car simulator was recorded and analyzed. The experiment scenario was composed of acceleration to 120 km/h followed by smooth deceleration to a stop line with prior warning signs at distances of 240, 160, and 80 m to the finish line. To assess the effect of the motion cues, each driver performed the run three times with different motion platform settings-no motion, moderate motion, and maximal possible response and range. The results from the driving simulator were compared with data acquired in an equivalent driving scenario performed in real conditions on a polygon track and taken as reference data. The driving simulator and real car accelerations were recorded using the Xsens MTi-G sensor. The outcomes confirmed the hypothesis that driving with a higher level of motion cues in the driving simulator brought more natural braking behavior of the experimental drivers, better correlated with the real car driving test data, although exceptions were found.
Conference Paper
Abstract—Knowledge of pedestrian’s walking direction is very crucial in multiple domains of video processing. This paper proposes a graph based, robust and light weighted model for direction estimation of pedestrian’s walk by using the property of perspective distortion. Here perspective distortion pattern is used as an advantage in estimation of direction. The graph based solution uses 3 parallel approaches for estimating the direction: Perspective Distortion Graph, Centroid Displacement and Clustering of Vanishing point. A pedestrian in a frame can be identified by bounding boxes. The temporal dimensional features of bounding boxes are height and width and these features changes for a particular object from frame to frame as the objects moves. These changes are unique for each direction for each object. These changes in dimension along with clustering of vanishing point and centroid displacement is used for the assessment of the pedestrian’s walk direction. All the existing approaches need some sort of pre-processing on the frames, which makes the model more complex and time consuming. In the proposed model, the video sequence is applied on YOLO V4 algorithm and bounding boxes are obtained. By analyzing the changes from frame to frame for the dimensions, graphs are plotted and minimum and maximum extremas are detected form the graph by eliminating soft extremas. After that envelope is placed for the graph and an average line is drawn based on the envelope, which will give the inference about the direction of walk of the pedestrian. The perspective distortion graph will not give accurate estimation for all directions. So, Centroid displacement and clustering of vanishing point are also used for direction estimation. The result obtained from the three methods are combined and form a robust model. For accurately estimating walk direction, the movement is limited to 8 different directions. For experiment, NITR Conscious Walk dataset and self-acquired dataset are used. With balanced accuracy of 97.003% and 96.25% and a false positive rate of 0.63% and 0.65%, respectively, the model produces good results for the above dataset.
Preprint
Full-text available
Route guidance in traffic management aims to improve traffic network performance aligned with a system optimum. However, service providers commonly offer user optimum travel advice that can negatively impact centralized route guidance. This paper quantifies and demonstrates the impact of different policy strategies for a centralized route guidance systems where road authorities and service providers work together in a coordinated approach. Cooperation through an intermediary is considered with various policy strategies that consider different approaches and levels of cooperation between road authorities and service providers, which are evaluated using traffic modelling. A use case for the ring network of Milan shows that cooperation between the two parties has the potential to get the best out of the measure by utilizing a system optimum approach, while still allowing service providers to offer individual travel advice. The results of the modelled case study clearly show that the two approaches of far-reaching cooperation and increased compliance have a greater positive effect on traffic network performance in terms of reduced delays, reduced congestion and total time spent. In addition, the future presence of connected automated vehicles (CAV) is also considered in which these vehicle demonstrate full compliance. This shows that with increasing percentage of CAVs that route guidance can have a substantial positive effect compared to low compliance or a smaller penetration rate of automated vehicles.
Chapter
For several years, cars manufacturers and government agencies have been looking for a way to improve road safety and manage traffic efficiently. Wireless communication systems are evolving, and the prospect of vehicles communicating with each other (V2V) and with roadside units (V2I) is becoming a reality. These wireless automotive communication systems expected for communications from Vehicle to Everything (V2X) are known by all as intelligent transportation systems (ITS). It is essential that security requirements must always respect the proper functioning of a system in order to guarantee the safety and privacy of users. When a requirement is not met, it presents a security problem. The purpose of wireless vehicular networks is to enhance road traffic and preserve the safety of drivers and passengers. For these reasons, security in these networks presents a very important challenge to researchers. Many research studies are concerned with the security of wireless vehicular networks in order to fight and protect these networks from threats and attacks. Motivated by the security requirements, in this work, we propose a secure and lightweight authentication scheme for V2X communication. The proposed solution uses Attribute-based Signature (ABS) to achieve message authentication, privacy, and integrity and to support vehicles to receive a secret key and message from a roadside unit (RSU) or other vehicles in a secure way. The security analysis demonstrates that our proposal achieves the goals of V2X security using the formal verification by the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The performance evaluation illustrates that the proposed protocol has a less computational cost compared with the previous protocols, which prove that the authentication and communication efficiency are improved, and that is more appropriate for the practical uses.KeywordsITSV2XABSAuthenticationAVISPA
Chapter
Full-text available
Road congestion is considered as the bottleneck in Intelligent Transportation System (ITS). It has serious impact on human security, the environment and the economy. Thus, congestion avoidance is one of the main challenges facing ITS. In the aim of reducing the congestion problem, different ITS schemes were proposed. In this paper, we present a comprehensive study of the recent approaches dealing with the congestion issue. This study brings to the scientific community a new classification of the previous schemes based on their specific features. To this end, we introduce some new metrics to evaluate all the studied approaches. We found that the majority of the new congestion management approaches are cooperative and efficient in decreasing the travel delay. However, they are generally focusing on vehicles control and ignoring other elements, such as the use of the road in daily life. The current study presents a new direction of future researches on congestion management systems.
Conference Paper
Full-text available
We consider the problem of developing robots that navigate like pedestrians on sidewalks through city centers for performing various tasks including delivery and surveillance. One particular challenge for such robots is crossing streets without pedestrian traffic lights. To solve this task the robot has to decide based on its sensory input if the road is clear. In this work, we propose a novel multi-modal learning approach for the problem of autonomous street crossing. Our approach solely relies on laser and radar data and learns a classifier based on Random Forests to predict when it is safe to cross the road. We present extensive experimental evaluations using real-world data collected from multiple street crossing situations which demonstrate that our approach yields a safe and accurate street crossing behavior and generalizes well over different types of situations. A comparison to alternative methods demonstrates the advantages of our approach.
Conference Paper
Full-text available
Road safety is one of the most important applications of vehicular networks. However, improving pedestrian safety via vehicle-to-pedestrian (V2P) wireless communication has not been extensively addressed. In this paper, our vision is to propose a method which enables development of V2P road safety applications via wireless communication and only utilizing the existing infrastructure and devices. As pedestrians' smartphones do not support the IEEE 802.11p amendment which is customized for vehicular networking, we have initiated an approach that utilizes cellular technologies. Study shows potential of utilizing 3G and LTE for highly mobile entities of vehicular network applications. In addition, some vehicles are already equipped with cellular connectivity but otherwise the driver's smartphone is used as an alternative. However, smartphone limited battery life is a bottleneck in realization of such pedestrian safety system. To tackle the energy limitation in smartphones, we employ an adaptive multi-level approach which operates in an energy-saving mode in risk-free situations but switches to normal mode as it detects a risky situation. Based on our evaluation and analysis, this adaptive approach considerably saves electrical energy and thus makes the cellular-based road-safety system practical.
Article
Full-text available
Advances in Information and Communication Technologies (ICT) allow the transportation community to foresee dramatic improvements for the incoming years in terms of a more efficient, environmental friendly and safe traffic management. In that context, new ITS paradigms like Cooperative Systems (C-ITS) enable an efficient traffic state estimation and traffic control. C-ITS refers to three levels of cooperation between vehicles and infrastructure: (i) equipped vehicles with Advanced Driver Assistance Systems (ADAS) adjusting their motion to surrounding traffic conditions; (ii) information exchange with the infrastructure; (iii) vehicle-to-vehicle communication. Therefore, C-ITS makes it possible to go a step further in providing real time information and tailored control strategies to specific drivers. As a response to an expected increasing penetration rate of these systems, traffic managers and researchers have to come up with new methodologies that override the classic methods of traffic modeling and control. In this paper, we discuss some potentialities of C-ITS for traffic management with the methodological issues following the expansion of such systems. Cooperative traffic models are introduced into an open-source traffic simulator. The resulting simulation framework is robust and able to assess potential benefits of cooperative traffic control strategies in different traffic configurations.
Article
Full-text available
Reducing traffic congestion and improving the efficiency of urban vehicular mobility are widely recognized as central objectives for smart cities. In particular, given the economic/time costs of developing an infrastructure for traffic monitoring and surveillance, there is growing interest in the exploitation of V2V communication technologies to foster new forms of peer-to-peer cooperation and to achieve even coarse-grained estimations of vehicular traffic, also with no need for communication towards global data collection centers. In addition, in realistic scenarios for the next years, it is necessary that such solutions can reasonably work with limited penetration rates of vehicles equipped with V2X traffic surveillance capabilities. In this perspective and within the framework of the ongoing EU FP7 COLOMBO project, we have investigated, developed, and thoroughly evaluated some innovative locality-based cooperation protocols for the determination of traffic characteristics in proximity of intersections, with the goal of offering concise monitoring indicators to optimize traffic light management. The reported results (obtained through realistic simulations based on real traffic traces and the real road topology of the city of Bologna) show that it is possible to achieve reasonable estimations of vehicular traffic, suitable for traffic light control optimization, even if with limited penetration rates of our solution.
Article
We consider the problem of developing robots that navigate like pedestrians on sidewalks through city centers for performing various tasks including delivery and surveillance. One particular challenge for such robots is crossing streets without pedestrian traffic lights. To solve this task the robot has to decide based on its sensory input if the road is clear. In this work, we propose a novel multi-modal learning approach for the problem of autonomous street crossing. Our approach solely relies on laser and radar data and learns a classifier based on Random Forests to predict when it is safe to cross the road. We present extensive experimental evaluations using real-world data collected from multiple street crossing situations which demonstrate that our approach yields a safe and accurate street crossing behavior and generalizes well over different types of situations. A comparison to alternative methods demonstrates the advantages of our approach.
Article
Security systems are considered a necessity for the deployment of smart vehicles in our society. Security in vehicular ad hoc networks is crucial to the reliable exchange of information and control data. In this paper, an intelligent intrusion detection system (IDS) is proposed to protect the external communication of self-driving and semi self-driving vehicles. This technology has the ability to detect Denial of Service (DoS) and black hole attacks on VANETs. The advantage of the proposed IDS over incumbent security systems is that it detects the attack before it causes significant damage. The intrusion prediction technique is based on a Linear Discriminant Analysis (LDA) and Quadratic Discriminant Analysis (QDA) to predict the attack based on an observed vehicle behaviour. Simulations utilised Network Simulator version 2 to demonstrate that the IDS exhibits a low rate of false alarms and high accuracy in detection.
Article
Driving through intersections can be potentially dangerous because nearly 23 percent of the total automotive related fatalities and almost 1 million injury-causing crashes occur at or within intersections every year [1]. The impact of traffic intersections on trip delays also leads to waste of human and natural resources. Our goal is to increase the safety and throughput of traffic intersections using co-operative driving. In earlier work [2], we have proposed a family of vehicular network protocols, which use Dedicated Short Range Communications (DSRC) and Wireless Access in Vehicular Environment (WAVE) technologies to manage a vehicle's movement at intersections Specifically, we have provided a collision detection algorithm at intersections (CDAI) to avoid potential crashes at or near intersections and improve safety. We have shown that vehicle-to-vehicle (V2V) communications can be used to significantly decrease the trip delays introduced by traffic lights and stop signs. In this paper, we investigate the use of more realistic controller models and higher concurrency to improve V2V intersection protocols for autonomous driving at intersections. We quantify the throughput enhancements due to the use of V2V under various driving conditions, while maintaining safe passage through intersections.
Conference Paper
Aiming to address the safety issue for the uncontrolled intersection, the existing schemes including design optimization of the intersection structure and additional traffic signal layout will waste lots of resources. With the rapid development of intelligent transportation, the technology of vehicle-vehicle communication provides a new way for this problem. The paper proposed a set of rules to clarify the sequence of vehicles to pass through uncontrolled intersection. The rules are planned based on the law of road traffic safety. According to the rules, each approaching car makes decision for preempting or yielding other cars based on the information from vehicle-vehicle communication. If the approaching car needs to yield other cars, we propose an algorithm to find a proper deceleration value to do yielding. The car brakes automatically using this deceleration value to avoid collision with other cars. After all, the tests were done to verify the effectiveness of the algorithm and demonstrate the function among the connected vehicles in intersection. The rule based collision avoidance algorithm can provide real-time collision detection and make safe deceleration for the cars crossing the uncontrolled intersection.