You are on page 1of 10

LIU LAYOUT 2/7/11 10:47 AM Page 64

ACCEPTED FROM OPEN CALL

DISTRIBUTED AUTOMATED
INCIDENT DETECTION WITH VGRID
BEHROOZ KHORASHADI, FRED LIU, DIPAK GHOSAL, MICHAEL ZHANG, AND CHEN-NEE CHUAH,
UNIVERSITY OF CALIFORNIA, DAVIS

ec. 5 Sec. 6 Sec. 7 ABSTRACT dent detection is critical to notify approaching


drivers, dispatch emergency response teams to
In this article, we study an ad hoc distributed deal with the injured, clear the road of the
3 automated incident detection algorithm for high- impeding obstruction, to return traffic patterns
way traffic using vehicles that are equipped with to the normal flow, and prevent subsequent sec-
wireless communications, processing, and stor- ondary incidences.
age capabilities (referred to as VGrid vehicles). Automated incident detection (AID) meth-
ec. 5 Sec. 6 Sec. 7
Each VGrid vehicle periodically broadcasts bea- ods have been developed for detecting potential
con messages with its speed, location, and lane incidents since the 1970s. However, early deploy-
information. Using these beacons, each VGrid ments of these systems were relatively ineffective
1 2
vehicle builds and maintains information about since they had either high false alarm rates
different sections of the road. Using such infor- (which rendered them ineffective) or low detec-
mation, each VGrid vehicle independently per- tion rates (which rendered them unreliable). The
forms an anomaly detection algorithm based on recent advances in sensor technologies and wire-
the traffic density, speed, and the number of less devices have created a new paradigm for
ec. 5 Sec. 6 Sec. 7 lane changes to identify incidents. The robust- design and development of AID systems. Recent
ness of the detection is improved by a voting systems have incorporated complex algorithms
scheme in which a consensus, among participat- to predict and detect incidents and their loca-
ing VGrid vehicles, is achieved when a fixed tions [2]. Unfortunately, even these elaborate
The authors study an number of votes are accumulated. We use a sim- methods have unacceptable levels of false posi-
ulation tool called VGSim to study the perfor- tive and false negative rates.
ad hoc distributed mance of our detection algorithm in a highway In this article, we propose an AID system
scenario. The results show that our distributed that leverages vehicular ad hoc networks
automated incident incident detection algorithm has low false posi- (VANETs) and is implemented as an application
detection algorithm tive rate, zero false negative rate, and can still
achieve incident detection with as little as 10
on the VGrid framework [3]. Within a geograph-
ic area, an ad hoc network of vehicles equipped
for highway traffic percent penetration of VGrid vehicles. with sensors and in-vehicle processing capability
can form an ad hoc cluster of sensors and grid
using vehicles that INTRODUCTION computers, which we refer to as VGrid. VGrid is
a control and management infrastructure frame-
are equipped Every year freeway accidents and obstructions work, where VGrid collects and processes real-
result in traffic congestion [1], environmental time traffic data using in-vehicles sensors and
with wireless pollution, and damages in property, personal computers to make distributed control decisions.
communications, injury, and/or fatalities. The overall cost to soci-
ety is in the billions of dollars and increasing [1].
VGrid can complement and extend the existing
fixed infrastructure by distributing previously
processing, and With the availability of advanced sensor tech- centralized control functions, such as traffic
nologies, preventing and/or minimizing the statistics collection and dissemination of traffic
storage capabilities impact of these occurrences has been a major advisory messages, to local intelligent agents,
focus in highway incident detection research in including in-vehicle sensors and computers.
(referred to as VGrid the past decade. An important goal in these As part of its design, VGrid vehicles broad-
efforts has been to reduce the response times in cast beacon messages that include information
vehicles). detecting the incident. Timely and accurate inci- about the vehicle’s speed, position, and lane.
These messages are then collected by nodes 1
that are within the broadcast range of transmit-
1 Nodes refer to VGrid vehicles that can store and process ting vehicles. Using the aggregated information,
information and, using wireless communication, commu- each node independently estimates and main-
nicate with other VGrid vehicles. Throughout this article tains information on the occupancy, lane
we use the terms VGrid vehicle and node interchangeably. change, and speed for different sections of the

64 1536-1284/11/$25.00 © 2011 IEEE IEEE Wireless Communications • February 2011


LIU LAYOUT 2/7/11 10:47 AM Page 65

road. The information is processed to detect


anomalous traffic patterns to identify static
also has the added limitation of creating a large
number of false alarms in low traffic density sce-
The key advantages
obstructions in the road. The initial individual narios. of the California
detection phase is used to detect all potential Examples of AID systems based on statistical
incident points, and then collaboration and veri- methods include the DES algorithm summarized Algorithm is that it is
fication among the nodes is used to filter out in [4], and the Standard Normal Deviation
erroneous predictions. The proposed method (SND) [4] and Single-Station Incident Detection comprehensive in
decreases both the false positive and false nega- (SSID) algorithms [9]. SSID uses the standard
tive rates to acceptable levels. In addition, statistical T-test to analyze the differences in nature and has a
because each vehicle acts as a low-cost sensor
that collects and processes the information
occupancy.
The introduction of AI techniques has result-
low false positive
received from other sensors, the detection time ed in new AID approaches. The study reported rates. Unfortunately,
is, in most cases, very low (on average about 20 in [2] uses a combination of fuzzy logic and
s). The low cost of each device also allows more genetic algorithms (GAs). While this approach is the California Algo-
efficient deployment compared to systems that highly adaptive, both fuzzy logic and GAs are
require devices that must be installed at road- highly complex algorithmic approaches that have rithm makes deci-
sides or in the road itself. yet to be proven to be efficient. The AI-based
The rest of this article is organized as follows. approaches for AID systems have also focused sions based solely on
In the next section we discuss related work on
AID. We then give a detailed description of the
on artificial neural networks which contain mul-
tiple layers, multiple inputs, and a complex
the occupancy rate
proposed incident detection approach. We structure. This approach has been shown to per- of the road; other
briefly describe the simulation tool and the sce- form better than fuzzy logic and GA-based
nario for which we evaluate the performance of approaches; however, complexity and accuracy parameters such as
our proposed incident detection algorithm. We are still major drawbacks. The use of AI in con-
then discuss the results and finally, we conclude junction with modern camera technology was vehicle speed and
with a summary of our results and outline future investigated in [10]. Unfortunately, this approach
work. is very expensive since cameras must be installed volume are not used.
and maintained. An example of this is the video
RELATED WORK or 3D image processing adopted in [11].
In recent years, VANET has provided a
In general there are four main types of AID unique framework to develop new techniques for
detection algorithms. They are based on pattern AID. In the research reported in [12, 13], a cen-
recognition, catastrophe theory, statistical analy- tralized detection approach is proposed for AID.
sis, and artificial intelligence (AI) techniques [4]. These methods rely on information collected
Of these four types, statistical and pattern recog- and reported periodically at roadside nodes by
nition based methods were the first to be devel- VANET vehicles. These roadside nodes then
oped in the 1970s. Later, with the emergence of aggregate the information collected from indi-
more high-powered computers, AI techniques vidual vehicles to detect obstructions upstream
were applied. from the roadside node. Although this work
The earlier work in AID used techniques addresses a similar problem (AID using
based on decision trees for traffic pattern recog- VANET), there are fundamental differences
nition [5], time series analysis [6], and Kalman that distinguish it from the work presented in
filters [7]. Based on these techniques, three this article. A major difference is that the
major AID algorithms were developed: the Cali- method proposed in this article is a fully dis-
fornia Algorithm, the McMaster Algorithm, and tributed approach that leverages the fully dis-
the Minnesota Algorithm. The California Algo- tributed VGrid computing framework in which
rithm utilizes decision trees to identify anoma- vehicles form an ad hoc network with no infra-
lous lane densities between detection points. structure coordination to detect anomalies in
The California Algorithm, also referred to as vehicular traffic flows. This distributed design of
Traffic Services Corporation (TSC) Algorithm-2, the AID scheme has significant advantages, as
uses a five-minute roll-wave suppression logic mentioned later in this article. In addition, the
that helps reduce false alarms due to shock proposed detection method is evaluated using
waves from downstream. The key advantages of VGSim [14], a simulation platform designed
the California Algorithm is that it is comprehen- specifically to simulate a realistic mobility model
sive in nature and has low false positive rates. for vehicles and an integrated wireless network-
Unfortunately, the California Algorithm makes ing protocol stack.
decisions based solely on the occupancy rate of To date, the most effective and rapid detec-
the road; other parameters such as vehicle speed tion system seems to be based on cell phone
and volume are not used. callers and/or roadside call boxes [4]. It has been
The McMaster Algorithm is based on catas- argued that using cell phones to call in roadside
trophe theory [8]. It classifies traffic conditions incidents can be dangerous, and could result in
into subcategories and determines if traffic pat- secondary accidents and/or other traffic flow
terns fall within these categories. They are robust problems. Furthermore, studies have shown that
in the sense that they are not affected by as cell phone conversations increase, the likeli-
upstream input failures. However, the McMaster hood that some highway traffic situation will go
Algorithm only tracks data from the fast lane. unreported and/or unnoticed also increases [15].
Finally, the Minnesota Algorithm, which is simi- The use of call boxes can be very effective but
lar to the California Algorithm, uses the occu- requires the overhead of deployment; the more
pancy rates. This, however, leads to the same frequent the call box stations, the greater the
disadvantage as the California Algorithm but cost.

IEEE Wireless Communications • February 2011 65


LIU LAYOUT 2/7/11 10:47 AM Page 66

Over time each VGrid Field Type Size


vides coordination between vehicles to acquire
road ID and position information which can be
vehicle builds an Source IP address Integer 4 bytes
used to organize obstruction location informa-
tion. To determine lane information multiple
independent and Position Integer 4 bytes
methods exist, and we believe the simplest
method is to use slightly higher accuracy GPS
local view of the systems than are available in today’s vehicles.
Lane number Byte 1 bytes Any GPS unit that can obtain ±1 ft accuracy is
road and its traffic sufficient to determine the lane information
Time-to-live (TTL) Byte 1 bytes
pattern. Each vehicle needed for this detection method. More accu-
rate GPS units are also available that have sub-
periodically searches Message timestamp Long 8 bytes centimeter accuracy; however, that level of detail
far exceeds the needs of lane determination.
this aggregated Vehicle speed Short 2 bytes Through detailed experiments we found that
a beaconing rate between 0.5 Hz and 20 Hz was
information for Road ID Integer 4 bytes required to ensure the required performance of
our proposed AID scheme. For beaconing rate
specific markers that Total bytes 24 bytes less than 0.5 Hz there was noticeable degrada-
indicate road Table 1. Beacon message fields.
tion of the detection rate of the algorithm. For
beaconing rate greater than 20 Hz, there were
obstructions. packet drops due to collisions, which in turn
resulted in higher detection time. Indeed, the
All the previously mentioned AID techniques impact was higher for higher traffic densities,
sort through data collected from roadside sen- which were caused by local congestion near the
sors or other similar data collection devices. As obstruction point. The results shown in this arti-
such, these algorithms are all constrained by the cle have been obtained for a beaconing rate of 4
same limitation; they can only achieve a certain Hz. Note that the size of the beacon messages is
level of accuracy and efficiency. VANET tech- small (24 bytes), resulting in minimal impact on
nologies and the proposed VGrid framework network congestion when beacon frequency is
[14] enable new approaches to AID. They pro- within a given threshold. A more detailed analy-
vide both spatially and temporally fine-grained sis of the impact of beacon frequency on perfor-
data regarding the speed, position, and lane mance is reported in [14].
changes of vehicles. Furthermore, the distributed The beacon messages are collected by each
grid computing (VGrid) framework implement- VGrid vehicle, and then used to form a dynamic
ed over VANET allows complex coordinated view of the road and the traffic patterns. Each
computation over the data to accurately and VGrid vehicle gathers traffic information and
robustly detect various patterns in the traffic uses it to track the movement and position of
flow and thereby detect incidents. other VGrid vehicles. Tracking is done by simply
storing the beacon messages of each distinct
OBSTRUCTION DETECTION ALGORITHM vehicle. Since beacon messages are periodic
when a new beacon is received, the receiving
In order for vehicles to detect potential road vehicle can infer the trajectory of the source
obstruction, vehicles must exchange traffic infor- vehicle. For example, assume that a vehicle x
mation. The VGrid framework [14] provides this receives a message from vehicle y at time 2 s
in the form of traffic beacon messages. These with a beacon message that indicates a position
message are broadcasted periodically by each of 150 in lane 3. Later, vehicle x receives another
VGrid vehicle and, in-turn, collected by all VGrid beacon from vehicle y at time 5 s with position
vehicles that are within the transmission range of 200 and lane 3. Vehicle x infers that vehicle y
the broadcast. Over time each VGrid vehicle traveled from position 150 to 200 in 3 s. In the
builds an independent and local view of the road event of a lane change, vehicle x makes the
and its traffic pattern. Each vehicle periodically assumption that y changed lanes halfway between
searches this aggregated information for specific points 150 and 200.
markers that indicate road obstructions. Once a Each VGrid vehicle maintains three informa-
vehicle detects an obstruction, it initiates a voting tion arrays for each lane, where each cell in the
phase, in which nodes within the transmission array corresponds to a particular section of road.
range vote to reach a distributed consensus on We choose road sections to be the length of a
the detection. In the following subsections we vehicle in the simulation (7.5 m or 75 cells in the
describe the details of the algorithm. simulation). In order to compensate for the reduc-
tion in penetration rate (the percentage of VGrid
BEACON MESSAGES AND ROAD PROFILING enabled vehicles) we then partition the road
The core of this algorithm relies on the dissemi- inversely proportional to the penetration rate:
nation of vehicle traffic information by all VGrid
vehicles. The beacon messages are broadcast at road_section_size = vehicle_length/penetration_rate
4 Hz (4 times/s) and contain the fields shown in (1)
Table 1. The Manual on Uniform Traffic Con-
trol Devices (MUTCD) standardizes the parti- These road section divisions are not relative to
tioning of roads into logical sections by the vehicle itself but to the location. The coordi-
demarcating highway sections into 100 ft incre- nation between vehicles can be achieved rela-
ments. Although this is primarily used for the tively simply as highways have already been
design of highway systems, it additionally pro- naturally partitioned using mile markers. Sec-

66 IEEE Wireless Communications • February 2011


LIU LAYOUT 2/7/11 10:47 AM Page 67

Sec. 1 Sec. 2 Sec. 3 Sec. 4 Sec. 5 Sec. 6 Sec. 7 Sec. 8 Sec. 9 Sec. 10
The coordination
2 4
Lane 1
between vehicles can
T=0
1 3 Lane 2 be achieved
relatively simply as
Sec. 1 Sec. 2 Sec. 3 Sec. 4 Sec. 5 Sec. 6 Sec. 7 Sec. 8 Sec. 9 Sec. 10
highways already
5
Lane 1
have been naturally
T=1
1 2 3 Lane 2
partitioned using
mile markers.
Sections zero can
Sec. 1 Sec. 2 Sec. 3 Sec. 4 Sec. 5 Sec. 6 Sec. 7 Sec. 8 Sec. 9 Sec. 10
5 2 start at the
Lane 1
T=2
1
beginning of each
Lane 2
unique mile marker
X on the highway.
VGrid Vehicle X Road obstruction

Figure 1. Illustration of how vehicles move through in time. Table 2 represents the corresponding array val-
ues as seen by vehicle 1 or 2 as both vehicles are present in all three time instances.

tions zero can start at the beginning of each tions, Eq. 2 is applied to each section vehicle y
unique mile marker on the highway. passes over. A weighted moving average is used
We use the following three arrays to collect to quickly reflect the speed changes in traffic
information used for the detection algorithm. over time. We chose an α = .25 to quickly exhib-
The road section count (RSC) array indicates it changes in traffic speeds in a particular section
the number of vehicles that have been tracked but not overly emphasize the information dis-
over a particular section. In order to create the seminated by any one particular vehicle. The
RSC array, vehicle x will increment each cell in end goal was to have newly disseminated traffic
the RSC when a vehicle is either tracked over a information about a recently created obstruction
section or is located in a particular section. Con- quickly dampen stale data in a road section
sider the previous example. If vehicle x receives where an obstruction did not previously exist.
a beacon from vehicle y located in section 150 of The vehicle lane change (VLC) array con-
the road, x will increment its count or RSC array tains a counter for each section of the road. If a
by one at index 150 for lane 3. When the second vehicle is observed changing out of a lane in a
beacon is received x will increment indexes particular section the index is decremented. If a
151–200 in lane 3. If y were to change lanes the vehicle is observed entering a lane at a particular
increment would be for 151–175 in lane 3 and section, the index in VLC is incremented. The
175–200 in lane 2 (assuming lane 2 was the lane lane change point is an estimation of a vehicle’s
vehicle y moved into). actual location of change. However, because
The road section speed (RSS) array contains beacon messages are so frequent (4 Hz, which is
the weighted average of speeds tracked over a 4 beacon messages/s), and the sections of the
particular section of the road. The indices (which road are large, it was found that this estimation
correspond to road sections) in the RSS array was adequate for the detection process.
are initialized to the maximum, which for simu- Figure 1 illustrates the obstruction detection
lation study reported in this article is set to 30 scenario at three different time instances, and
m/s (≈60 mph). Vehicles are tracked over road Table 2 shows the RSC, RSS, and VLC array
sections in the same fashion as in the RSC array. values for each time frame. In this example, we
Speed is either calculated by tracking a vehicle assume that all vehicles are within each other’s
over time or extracted directly from the beacon transmission range and there are no packet loss-
message itself. The RSS for an index i in the es (due to interference and collision).
array is updated or calculated using an exponen- It is important to note that the proposed
tially weighted moving average given by method relies on accurate positioning informa-
tion. We assume that the VGrid vehicles have a
RSS[lane][i] = (1 – α)RSS[lane][i] GPS device that is accurate to within a few feet
+ α * vtracked_speed, (2) to pinpoint lane location. While currently mid-
range GPS devices are accurate to within 10–15
where 0 < α ≤ 1, lane is the lane which the vehi- ft, the higher end units are accurate within 1–2 ft
cle is being tracked, and v tracked_speed is the and would satisfy the requirements to accurately
observed speed of the vehicle being tracked. determine the vehicles, lane, and position. We
Again, as a vehicle y is tracked over multiple sec- also found that there are production quality

IEEE Wireless Communications • February 2011 67


LIU LAYOUT 2/7/11 10:47 AM Page 68

Time Array Lane # Sec: 1 Sec: 2 Sec: 3 Sec: 4 Sec: 5 Sec: 6 Sec: 7 Sec: 8 Sec: 9 Sec: 10

Lane 1 0 0 0 1 0 0 0 0 1 0
RSC
Lane 2 0 1 0 0 0 1 0 0 0 0

Lane 1 30 30 30 29 30 30 30 30 28.5 30
T=0 RSS
Lane 2 30 27.5 30 30 30 29 30 30 30 30

Lane 1 0 0 0 0 0 0 0 0 0 0
VLC
Lane 2 0 0 0 0 0 0 0 0 0 0

Lane 1 1 0 0 1 1 0 0 0 1 1
RSC
Lane 2 0 1 1 1 2 2 1 1 1 0

Lane 1 29 30 30 29 7 30 30 30 28.5 29
T=1 RSS
Lane 2 30 27.5 20 20 14 20 29 29 29 30

Lane 1 0 0 0 0 –1 0 0 0 0 0
VLC
Lane 2 0 0 0 0 1 0 0 0 0 0

Lane 1 1 1 1 2 1 0 1 1 2 1
RSC
Lane 2 0 1 1 1 2 3 3 1 1 0

Lane 1 29 28.5 28.5 28 7 30 27 27 26.5 29


T=2 RSS
Lane 2 30 27.5 20 20 14 21.5 25.2 25 29 30

Lane 1 0 0 0 0 –1 0 +1 0 0 0
VLC
Lane 2 0 0 0 0 1 0 –1 0 0 0

Table 2. Representation of RSC, RSS, and VLC arrays for vehicle 2 in Fig. 1.

units that can pinpoint position accuracy to with- a road obstruction from a purely human per-
in 2 cm.2 These devices are designed specifically spective. Figure 2 depicts what we would expect
to measure vehicle positions and are currently from tracking vehicles around an obstruction
used to collect acceleration and braking distance point. The most prominent characteristic of an
measurements. Accuracy within 2 cm is, of obstruction point will be the lack of vehicles in
course, not a requirement for functional perfor- the lane downstream from the obstruction. In
mance of our proposed AID system. However, it addition, vehicles upstream from the obstruction,
is important to note that such technology is in the same lane, would attempt to merge out of
available and can be applied in the future. Addi- that lane while no vehicles should enter that
tional technologies that are able to track lane lane. Conversely, vehicles after the obstruction
change include devices that track a vehicles tire point should attempt to merge back into the
movement, accelerometers coupled with GPS lane due to the available space. Finally, vehicles
systems, or other types of sensors such as those stuck behind the obstruction point will travel at
embedded within the road itself designating each much slower rates than the normal traffic, and
lane. Although lane determination is a required vehicles past the obstruction point should be
component of this proposed AID system, we able to travel at average traffic speeds (where
have described several technologies that are average speed is calculated by averaging all
available for lane detection. Consequently, we speeds collected from beacon messages within
believe that this requirement would not be a the area).
cause for barrier to entry for our proposed AID The detection method consists of two phases.
system. In the first phase individual VGrid vehicles inde-
pendently search through the accumulated and
DETECTION METHOD aggregated traffic information collected from
2An example of such a Detection is carried out by each vehicle by peri- beacon messages to identify potential obstruc-
device can be found at odically scanning the three arrays in search of tion points. Once a vehicle identifies a potential
http://www.racelogic.co.u anomalous traffic patterns. In order to quantify obstruction point, it moves to the second phase
k/?show=vbox the search object, we first formulated the look of of the algorithm, in which it broadcasts an

68 IEEE Wireless Communications • February 2011


LIU LAYOUT 2/7/11 10:47 AM Page 69

obstruction detection vote. The vote contains the


vehicles unique id and also the details concern- VGrid enabled vehicle
ing the obstruction location. The first vehicle to Non-VGrid enabled vehicle
collect enough votes exceeding some pre-defined
vote_threshold, broadcasts an alert message veri-
fying the obstruction point. In this article, we
consider positive detection only once an alert
message is generated. Once a consensus is
reached, alert messages can be generated to all
VGrid vehicles by the method described in [14]. VGrid enabled vehicle Road obstruction
We define the time to detection as the time at
Non-VGrid enabled vehicle Expected vehicle trajectory
which the obstruction occurs until the first alarm
message is generated. Vehicles that have not
Area of low traffic density
detected the obstruction point themselves are
restricted from broadcasting an alert message.
Only vehicles that have both locally detected the Figure 2. Figure depicts what is expected from a road obstruction. Directly after
obstruction point and acquired enough votes are the obstruction point it is expected that average density would be lower than
permitted to generate an alert message. the rest of the lanes. Before the obstruction vehicles should be attempting to
exit the lane and return after the obstruction point.
Phase 1 (Independent Search) — Phase one of the
detection algorithm begins by periodically (every
1 second) scanning only the RSC array. As pre-
Road section count (RSC)
viously mentioned, the point of, and following,
an obstruction can be classified as a low density Lane 1
80 Lane 2
area, where few or no vehicles entered. In the Lane 3
70
case of the RSC, a search is conducted for large Lane 4
drops in observed count between adjacent sec- 60
tions in the road. For example, if road section i
50
Count

contains an obstruction, each vehicle scans for a


significant contrast between RSC[lane][i – 1] and 40
RSC[lane][i]. This is done by building an orthog-
30
onal array RSCdif, which is defined as follows:
20
RSCdif[lane][i] = abs(RSC[lane][i] 10
– RSC[lane][i – 1]),
0
0 2,500 5,000 7,500 10,000 12,500 15,000
where i is the section of road, lane is the lane in Position (cells)
the road, and abs(x) is the absolute value of x.
Since RSCdif contains the absolute value
Figure 3. Road Section Count (RSC) array for a particular vehicle collected
change between road sections, vehicles then
during actual simulation. Penetration rate = 100 percent, traffic density = 15
search for a large fluctuation in RSCdif. The
percent, and transmission range = 500 m (19.2 dBm, which is a transmission
scope of the investigation is made more efficient
power that yields a transmission range of approximately 500 m).
by implementing a sliding search window, which
reduces the range of the search to 200 m before
the current vehicle’s position and 100 m after.
This is done to increase the efficiency of search- inbound. If this is verified the RSS is then used
es by avoiding an entire scan every cycle. We can to check that the average speed of section i – 1
assume that few messages will be received from is less than 20 percent of the observed average
outside of the search window range and that the speed of surrounding vehicles and that average
search should not be conducted in road sections speed of section i + 1 is at least 80 percent of
where the vehicle has not passed or reached (in the observed average speed. In essence, vehicle
terms of transmission range). The asymmetry of speeds behind the obstruction should be slow
the search range is used to limit the scope of the and speeds in front of the obstruction faster.
search upstream from the vehicle (200 m before) Phase 1 can be summarized as follows:
based on the relative range of the vehicles trans-
mission. The downstream (100 m ahead) limit is RSCdif[lane][i] > mean + 3 * stdev (3)
due to the fact that sufficient information may
not have been collected for an accurate search VLC[lane][i – k] < 0 ∀ k < 100 m (4)
since the vehicle has not yet reached the area in
question. In order to classify a significant change VLC[lane][i + k] > 0: ∀ k < 100 m (5)
in RSCdif, we track the mean and standard devi-
ation of the values in RSCdif. Changes that are RSS[lane][i – 1] < avgSpeed * .2 (6)
three standard deviations from the mean are
flagged as significant drops in road count. When RSS[lane][i + 1] > avgSpeed * .8 (7)
such a point is detected, vehicles examine the
section in question and use the VLC and RSS to We use Eq. 3 to locate a potential obstruc-
verify those anomalous points. This is done tion point and then use Eqs. 4, 5, 6, and 7 as a
through analysis of the VLC to verify that lane filtering mechanism to filter out false positives.
changes 100 m before the flagged section are Figure 3 represents a snapshot of the RSC array
outbound, and all lane changes 100 m after are collected from a particular vehicle, in a simula-

IEEE Wireless Communications • February 2011 69


LIU LAYOUT 2/7/11 10:47 AM Page 70

RSCdif Array SIMULATION STUDY


45 Lane 1
Lane 2
SIMULATION TOOL
40 Lane 3
Lane 4 In order to carry out simulations we use
35 VGSim,3 which is a simulator based on Java in
RSC(i) – RSC(i – 1)

30 Simulation Time (JiST). 4 In VGSim, the net-


25 work simulation module is based on SWANS, 5
a Java based network simulator. In VGSim,
20
vehicular movements and applications are
15 transformed into events that are processed by
10 the JiST event driven platform. The network
5 simulator and the vehicular traffic model run
0
on a feedback loop that enables the interac-
0 2500 5000 7500 10,000 12,500 15,000 tion between the networking simulation and
Position (cells) the vehicular mobility. Information obtained
from the SWANS network simulator is fed
Figure 4. The RSCdif generated from RSC array illustrated in Fig. 3. Penetra- into the mobility model and then based on the
tion rate = 100 percent, traffic density = 15 percent and transmission range = mobility model, updated antenna positions are
500 m (19.2 dBm). determined for the SWANS network simula-
tor. The work done in [3] proposes and vali-
dates a mobility model specifically for the
VGSim platform. The vehicular mobility mod-
Sleep for 1 s ule of VGSim is a Cellular Automata (CA)
model, which implements a modified version
Phase 1 Phase 2
of Nagel and Schreckenberg (N-S) model. A
detailed description of this integration of the
Voting threshold modified N-S model and the VGSim simula-
Search for anomalies in No anomaly is reached and
RSCdif array (Equation 3) detected alert is generated tion platform is described in [14]. The simula-
tion tool also has a graphical user interface
(GUI) which provide a visual interface to the
Anomaly detected
Vehicle totals all simulations. The SWANS network simulator
Insufficient votes received and vehicle mobility simulator both update a
votes thus far for this graphical interface that allows network and
Verify anomaly with VLC No detection location
and RSS arrays vehicle mobility parameters to be changed
(equations 4,5,6 & 7)
dynamically.
Vehicle
Anomaly verifed by vehicle broadcasts a SIMULATION PARAMETERS
“vote” VGrid vehicles are equipped with low cost pro-
cessor and memory to store data and carry out
computation on the data. In addition each VGrid
Figure 5. A flow diagram of the detection method. vehicle carries an onboard GPS unit and wireless
network enabled following the IEEE 802.11b
standard. As part of our study, we vary the per-
tion in which an obstruction was present. The centage of VGrid vehicles and refer to this per-
RSCdif generated from Fig. 3 is represented in centage as the penetration rate.
Fig. 4. In order to quantify our algorithm, we use
the following three common AID performance
Phase 2 (Coordinated Voting) — In the second measurements: false alarm rate (FAR), detec-
phase, vehicles cast votes to verify an obstruc- tion rate (DR), and mean time to detection
tion point. We found that in phase 1, approxi- (MTTD),
mately 98 percent of the votes cast were
# of false alerm cases
accurate. However, we argue that not only does FAR = × 100% (8)
the second phase guarantee that votes do not 20 seconds
generate inaccurate alerts, but it avoids even a 1
percent false positive rate, which can render an # of detected incidents
DR = (9)
3 Details of VGSim can AID system unreliable [4]. It can also protect total # of incidents
be found at http://wwwc- against misbehaving nodes, which could broad-
sif.cs.ucdavis.edu/VGrid cast bogus votes. In this article we do not 1 n
explore the effect of misbehaving nodes. Fur- MTTD = ∑ (tdetection − t start )
n i =1 (10)
4This tool can be found ther study of the second phase of this algorithm
at showed that for particular traffic situations the where tdetection is the time of the first alert mes-
http://jist.ece.cornell.edu/ voting mechanism was critical in reducing the sage and t start is the start time of the incident.
false alarm rate while still ensuring reasonable We chose an interval of 20 s to calculate FAR
5 Documentation for detection times. In particular, we found that a because in the majority of the studies presented
SWANS can be found at voting threshold of three was sufficient to weed in [4], the AID algorithms used the same FAR
http://www.aqualab.cs.nor out the false positives generated in the first metric.
thwestern.edu/projects/sw phase of the algorithm. Figure 5 gives a high- We consider a 1.5 km stretch of highway.
ans++/ level overview of the detection method as exe- Incidents are injected at cell position 9000
cuted by an individual vehicle. (900 m) in lane 2 at time 0. The simulation

70 IEEE Wireless Communications • February 2011


LIU LAYOUT 2/7/11 10:47 AM Page 71

ends when the first alarm is generated. Trans-


Average detection time, all TX ranges
mission range is based on an estimation of the
corresponding decibel level designated in the 70 Penetration 1.0 Tx tange (meters) 250
65 Penetration 1.0 Tx tange (meters) 250
simulation. A transmission range of 500 m Penetration 1.0 Tx tange (meters) 750
60
refers to the maximum transmission distance 55 Penetration 1.0 Tx tange (meters) 1000
achievable given the transmission decibel level 50
(19.2 dBm). As a result, the average transmis- 45

MTTD (s)
sion range is far less than the designated trans- 40
mission range. When the transmission range is 35
30
set to 500 m, the average transmission is closer 25
to 250 m. 20
The traffic injection is based on the traffic 15
density parameter. The road is initially populat- 10
ed in probabilistic fashion. If the traffic density 5
0
parameter is 20 percent, enough vehicles are 0.05 0.10 0.15 0.20 0.25 0.30 0.35 0.40 0.45 0.50 0.55 0.60
placed on the road to fill 20 percent of the cells Traffic density
on the road. Since each vehicle occupies 75 cells
(7.5 m), calculating the number of vehicles to
Figure 6. The MTTD for transmissions ranges of 250, 500, 750, and 1000 m
place on the road for a given density is a simple
and penetration rate of 100 percent.
linear equation. When placing the vehicles the
initial positions of each vehicle is chosen at ran-
dom. The injection pattern is based on exit the
frequency of each vehicle. When a vehicle exits Penetration rate Traffic density DR
the road, a new vehicle is injected at the begin-
ning of the road. If the new vehicle cannot be 5% All 0%
injected, the vehicle is queued and injected when
sufficient room is available. Vehicle are random- 10% 5% 7%
ly marked as VGrid vehicles upon creation (both
in the initial population of vehicles or upon 10% 10% 20%
injection) with a probability based on the chosen
penetration rate. 10% 15% 77%

RESULTS 10% 20% 90%

EFFECTS OF TRANSMISSION RANGE 20% 5% 96%


Figure 6 shows the impact of transmission range Table 3. DRs less than 100 percent.
on the mean detection time (MTTD) for a pen-
etration rate of 100 percent. Figures represent-
ing the other penetrations are omitted due to Penetration Traffic Obstruction
DR
space constraints. Our study found that a trans- rate density present
mission range of 250 meters was not sufficient
for a 100 percent DR in all cases. In fact, for 50% and
50% 1.1% No
penetration rates less than 25 percent, DR was 60%
almost zero except when traffic density was very
high. Conversely, for higher transmission 50% 40% 0.56% Yes
ranges, such as 1000 meters, it was possible to
increase the detection rate even with low pene- 50% and
50% 1.1% Yes
tration rates and low traffic densities. We also 60%
observed some anomalous behavior in the 20 to
30 percent traffic density ranges seen by the 25% 60% 0.56% Yes
erratic values for MTTD. This behavior is a
result of traffic mobility transitioning between 75% 60% 0.13% Yes
free flow (vehicles can travel at maximum veloc-
ity) and congested traffic (vehicle velocity is Table 4. FAR greater than 0 percent.
constrained by downstream traffic). In these
transition ranges the variance in velocity of
individual vehicles is much greater across the EFFECTS OF PENETRATION RATE
entire road, resulting in a higher variance in AND TRAFFIC DENSITY
MTTD. The result in Fig. 6 shows that in order
to enable detection, VGrid vehicles must form To test the limits of our detection algorithm, we
a connected grid or mesh to coordinate detec- focused on penetration rates and traffic density
tion. If the transmission range is too small and parameters in ranges that were less than ideal
the VGrid vehicles are sparse, inter-vehicle for detection. The detection rate is a function of
communication becomes sporadic if not entirely penetration rate and traffic density. In general, if
disabled. As a result, detection of obstructions enough VGrid vehicles were present, detection
(through coordination) becomes unlikely or was possible. With a penetration rate of 5 per-
impossible. Results clearly show that there is a cent, detection was not possible for any traffic
minimum required transmission range to enable densities. Detection became possible with a 10
detection. percent penetration rate. However, at the lower

IEEE Wireless Communications • February 2011 71


LIU LAYOUT 2/7/11 10:47 AM Page 72

cle tracking traffic pattern over time and space.


3D Comparison of penetration rate and traffic density vs MTTD With very high traffic congestion, vehicles move
slowly, which has the same effect as slowing
down time. When the vehicles move slowly, it is
500 more difficult to quickly identify areas of low
450 traffic density.
Table 5 is a comparison of the proposed
400
method (referred to as VGrAID) and other AID
350 algorithms. When presenting our results in Table
MTTD (s)

300
5, we choose to aggregate our findings by pene-
tration rate. The average FAR for a given pene-
250 tration rate across all traffic densities is less than
200 the previously stated FAR considering both the
traffic density and the penetration rate. The
150
results and values presented for other AID algo-
100 rithms are referenced from the “Summary of
50 Algorithms” table in [4] with results of VGrAID
appended at the bottom. Note that the values
0
0 for DR, TTD, and FAR may not have been mea-
0.2 0 sured in the same way. The table only gives a
0.2
0.4 0.4 qualitative comparison of the different algo-
0.6
0.6 0.8
Traffic density 0.8 1 Penetration rate rithms that exist.

Figure 7. The MTTD as a function of both penetration rate and traffic density CONCLUSION AND FUTURE WORK
(transmission range is set at 500 m). In this article we have presented a distributed
AID method that leverages ad hoc networking
and computing in vehicles with storage, comput-
traffic densities (5, 10, 15, 20 percent), DR was ing, and wireless networking capabilities. We
still less than 100 percent. Table 3 represents all show that information collected by the vehicles,
points were DR was less than 100 percent. For analyzed, and shared in a distributed manner
other penetration rate and traffic density values can improve AID detection times compared to
the DR was 100 percent. those of traditional systems. In addition, since
An important metric of any AID system is its nodes are mobile and the information they gen-
false alarm rate (FAR). If FAR is too large, the erate is shared, the data is more accurate and
system become unreliable. Even a FAR of 1 per- timely than other AID systems. With the low
cent, can make the system unreliable [4]. For the cost of each device, we believe that implementa-
proposed approach, we categorize the FAR for tion of such a system could potentially be more
two different scenarios. The first is false alarms cost effective than other traditional infra-
generated in a traffic scenario where an accident structure-based systems. Finally, the collabora-
exists (an alarm generated for an obstruction tive nature of the system also greatly reduces the
other than the actual obstruction). The second false alarm rate and can, in the future, protect
case is false alarms generated in the situation against malicious behavior such as a malfunc-
where no obstructions exist (control simula- tioning sensor or intentional disruptive behavior.
tions). Table 4 shows the data for which a FAR As part of the future work we will explore the
greater than 0 percent was observed. When con- concept of categorizing incidents based on addi-
sidering the FAR for the first scenario (an tional information collected by the vehicular grid
obstruction is present) it is important to point network. Furthermore, in this work we categorize
out that all false alarms were generated for loca- an obstruction as a fixed blockage in the roadway.
tions upstream from the actual obstruction. This We can expand this definition to include slow
was due to the traffic congestion generated by moving or partially disabled vehicles. As an exten-
the downstream road blockage. In highly con- sion to this work, we also plan to modify the pro-
gested traffic vehicles move very slowly, which is posed algorithm to adapt to a centralized
falsely detected as obstructions. infrastructure where roadside sensors can be
Figure 7 shows a 3D plot of the effects of leveraged in order to accumulate traffic data col-
penetration rate and traffic density on MTTD. lected and dumped by moving vehicles. This
Excluding the low penetration rate and traffic could greatly reduce the number of VGrid vehi-
density scenarios, we found that MTTD was, in cles needed to facilitate detection as the roadside
general, less than 1 min. It is interesting to note nodes could collect and aggregate information
the effect of traffic density on MTTD. We over a period of time. In addition to studying
found that the more vehicles present, the faster variations in which VGrid AID can be applied,
the detection time. This is clearly shown in the we will also study the communication impact of
figure as detection time is much slower for the this AID system and how it could impact other
5 and 10 percent traffic densities. We also concurrent safety and infotainment applications.
found, however, that for the higher traffic den-
sities there was also a slight increase in MTTD. ACKNOWLEDGMENT
The increase in MTTD for the congested traffic The authors would like to thank the reviewers for
scenarios is due to the fact that the detection their comments. This research was funded by
time is correlated with the movement of the NSF grant CMMI-0700383. Dr. Behrooz Kho-
vehicles. Our algorithm is based on each vehi- rashadi is now employed with Qualcomm.

72 IEEE Wireless Communications • February 2011


LIU LAYOUT 2/7/11 10:47 AM Page 73

REFERENCES Name DR (%) TTD (min) FAR (%)


[1] D. Schrank and T. Lomax, “The 2007 Urban Mobility
Report,” Texas Transportation Institute, Texas A&M
Univ., Sept. 2007. APID 86 2.50 0.05%
[2] D. Srinivasan, R. L. Cheu, and Y. P. Poh, “Hybrid Fuzzy
Logic-Genetic Algorithm Technique for Automated DES 92 0.70 1.87%
Detection of Traffic Incidents On Freeways,” Proc. IEEE
Intelligent Transportation Sys. Conf., Aug. 2001.
[3] C.-N. Chuah et al., “Distributed Vehicular Traffic Control ARIMA 100 0.40 1.50%
and Safety Applications with VGrid,” IEEE Wireless Hive
Net. Conf., Aug. 2008.
Bayesian 100 3.90 0%
[4] T. Martin et al., “Incident Detection Algorithm Evaluation,”
prepared for Utah Dept. Transportation, Mar. 2001.
[5] H. J. Payne, E. D. Helfenbein, and H. C. Knobel, “Devel- California 82 0.85 1.73%
opment and Testing of Incident Detection,” Federal
Highway Administration, Research Methodology and
Results, vol. 2, 1976, report no: FHWA-RD-76-20. Low-pass filter 80 4.00 0.30%
[6] S. R. Ahmed and A. R. Cook, “Application of Time-Series
Analysis Techniques to Freeway Incident Detection,” Trans- McMaster 68 2.20 0.0018%
portation Research Record, 1982, pp. 19–21.
[7] S. Willsky et al., “Dynamic Model-Based Techniques for
the Detection of Incidents on Freeways,” IEEE Trans. Neural networks 89 0.96 0.012%
Automatic Control, vol. 25, no. 3, 1980, pp. 347–60.
[8] N. Persaud, F. L. Hall, and L. M. Hall, “Congestion Iden- SND 92 1.10 1.30%
tification Aspects of the McMaster Incident Detection
Algorithm,” Transportation Research Record, tech. rep.
1287, 1990, pp. 167–75. SSID 100 not reported 0.20%
[9] C. Antoniades and Y. Stephanedes, “Single-Station Inci-
dent Detection Algorithm (SSID) for Sparsely Instru-
mented Freeway Sites,” Transportation Eng., 1996.
TSC 7 67 2.91 0.134%
[10] S. Kamijo et al., “Traffic Monitoring and Accident
Detection at Intersections,” Proc. IEEE ITSC, Oct. 1999. TSC 8 68 3.04 0.177%
[11] T. Martin et al., “Video-Based Automatic Incident
Detection for Smart Roads: The Outdoor Environmental
Challenges Regarding False Alarms,” IEEE Trans. Intelli- Video image processing 90 0.37 3.00%
gent Transportation Sys., vol. 9, no. 2, June 2008.
[12] M. Abuelela, S. Olariu, and G. Yan, “Enhancing auto- Cell phones 100 — 5.00%
matic incident detection techniques through vehicle to
infrastructure communication,” 11th IEEE ITSC ‘08, Oct.
2008, pp. 447–52. VGrAID 10% penetration 74% 3.58 0.0%
[13] M. Abuelela and S. Olariu, “Automatic Incident Detec-
tion in VANETs: A Bayesian Approach,” Proc. IEEE VTC-
VGrAID 20% penetration 99.6% 1.29 0.0%
Spring, Barcelona, Spain, Apr. 2009.
[14] B. Khorashadi, Enabling Traffic Control and Data Dis-
semination Applications with VGrid — A Vehicular Ad VGrAID 25% penetration 100% 1.06 0.046%
Hoc Distributed Computing Framework, Ph.D. thesis,
UC Davis, 2009; http://wwwcsif.cs.ucdavis.edu/~VGrid/
VGrid/Publications.html. VGrAID 50% penetration 100% .45 0.16%
[15] J. McKnight and A. McKnight, “The Effect of Cellular
Phone Use upon Driver Attention,” Nat’.l Public Services VGrAID 75% penetration 100% 0.37 0.01%
Research Inst., 1991.

BIOGRAPHIES VGrAID 100% penetration 100% 0.48 0.0%


DIPAK GHOSAL received his B.Tech. degree in electrical engi-
neering from the Indian Institute of Technology, Kanpur, in Note: This table provides a high level qualitative comparison of the DR, TTD,
1983, his M.S. degree in computer science and automation and FAR metrics. These variations are the result of the various measurement
from the Indian Institute of Science, Bangalore, in 1985, methodologies used in each study.
and his Ph.D. in computer science from the University of
Louisiana in 1988. He is currently a professor in the Table 5. Comparison of VGrAID with other AID algorithms.
Department of Computer Science at the University of Cali-
fornia, Davis. His primary research interests are in the areas
of high-speed networks, wireless networks, vehicular ad
transportation systems. He received his B.S. degree in civil
hoc networks, next-generation transport protocols, and
engineering from Tongji University, and M.S. and Ph.D.
parallel and distributed computing.
degrees in engineering from the University of California,
Irvine. He is an Area Editor of the journal Network and
CHEN-NEE CHUAH is currently a professor in the Electrical and
Spatial Economics and an Associate Editor of Transporta-
Computer Engineering Department at the University of Cali-
tion Research — Part B: Methodological.
fornia, Davis. She received her B.S. in electrical engineering
from Rutgers University, and her M. S. and Ph.D. in electrical B OJIN L IU (frdliu@ucdavis.edu) is a Ph.D. student in the
engineering and computer sciences from the University of Computer Science Department, University of California,
California, Berkeley. Her research interests lie in the area of Davis. He received his Bachelor’s degree in computing from
computer networks and wireless/mobile computing, with Hong Kong Polytechnic University. His research interests
emphasis on Internet measurements, network anomaly detec- include vehicular ad hoc networks, wireless networks, and
tion, network management, multimedia, online social net- parallel and distributed systems.
works, and vehicular ad hoc networks. She received the NSF
CAREER Award in 2003 and the Outstanding Junior Faculty BEHROOZ KHORASHADI received his Bachelor’s degree from the
Award from the UC Davis College of Engineering in 2004. In University of California, Berkeley in 2004. He is a Ph.D.
2008 she was selected as a Chancellor’s Fellow of UC Davis. graduate from the Department of Computer Science at the
She has served on the executive/technical program commit- University of California, Davis in 2009 and is currently
tee of several ACM and IEEE conferences, and is currently an working at Qualcomm’s Bay Area Research and Develop-
Associate Editor for IEEE/ACM Transactions on Networking. ment (BARD) facility, Santa Clara, California. His research
interests include vehicular ad hoc networks, wireless net-
MICHAEL ZHANG is currently a professor in the Civil and Envi- works, parallel and distributed systems, and network pro-
ronmental Engineering Department at the University of Cal- tocol optimization. His current work at Qualcomm includes
ifornia, Davis. His research is in traffic operations and projects dealing with indoor location services on mobile
control, transportation network analysis, and intelligent devices and multicore systems on mobile devices.

IEEE Wireless Communications • February 2011 73

You might also like