Securing Road Traffic Congestion Detection by Incorporating V2I Communications

Vinh Thong Ta, Amit Dvir, Yalin Arie

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

In this paper, we address the security properties of automated road congestion detection systems. SCATS, SCOOT and InSync are three examples of Adaptive Traffic Control Systems (ATCSs) widely deployed today. ATCSs minimize the unused green time and reduce traffic congestion in urban areas using different methods such as induction loops and camcorders installed at intersections. The main drawback of these system is that they cannot capture incidents outside the range of these camcorders or induction loops. To overcome this hurdle, theoretical concepts for automated road congestion alarm systems including the system architecture, communication protocol, and algorithms are proposed. These concepts incorporate secure wireless vehicle-to-infrastructure (V2I) communications. The security properties of this new system are presented and then analyzed using the ProVerif protocol verification tool.

Original languageEnglish
Title of host publication19th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Print)9781538647257
DOIs
StatePublished - 28 Aug 2018
Event19th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2018 - Chania, Greece
Duration: 12 Jun 201815 Jun 2018

Publication series

Name19th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2018

Conference

Conference19th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2018
Country/TerritoryGreece
CityChania
Period12/06/1815/06/18

Keywords

  • Road Traffic
  • Security
  • V2I

Fingerprint

Dive into the research topics of 'Securing Road Traffic Congestion Detection by Incorporating V2I Communications'. Together they form a unique fingerprint.

Cite this