20.IJAEST-Vol-No-6-Issue-No-1-A-Novel-Dangerous-Vehicle-Detection-Protocol-For-Safety-Application-12

Page 1

K.PREMA KUMAR et al. / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 6, Issue No. 1, 124 - 132

A Novel Dangerous Vehicle Detection Protocol For Safety Application K.PREMA KUMAR

B.M.KUSUMA KUMARI

DR.K.SRI RAMAKRISHNA

Student M.Tech

Lecturer Professor & Head of Department Department TIFAC-CORE in TELEMATICS V.R. Siddhartha Engineering College , Vijayawada, A.P-520007 premakumarkumbha@gmail.com bhupathimercy@gmail.com srk_kalva@yahoo.com

M.KANTI KIRAN Lecturer

kantikiran81@gmail.com

Abstract:- Recently, considerable research has been focused on applying ad hoc wireless networking technology to on-themove vehicles. In this paper, we focus on distributed detection of dangerous vehicles on roads and highways using the dangerous vehicle-detection protocol (DVDP) to detect drivers who violate the permitted speed limit. In DVDP, each vehicle

T

collects surrounding vehicles identifications (IDs) and propagates warning information (including its position, speed, time, and collected IDs). This information is then forwarded hop-by-hop using ad hoc communications. A vehicle that receives this information will start to observe its surrounding vehicles. If surrounding vehicles are identified in the received warning information, it will estimate the speed of such vehicles. If the estimated speed exceeds the permitted speed, such vehicles are

ES

then marked as “suspected vehicles,” and the updated warning information is further propagated. By repeating this process, the suspected vehicle (where other vehicles observe the speed violation) will ultimately be marked as a “dangerous vehicle.” This judgment is then further propagated to warn others and to inform the traffic police. We evaluated the performance of DVDP using a simulator that performs both macroscopic and microscopic traffic simulation, taking into account realistic lane and speed models, mobility, position, and location errors. Simulation results revealed that DVDP’s detection probability is greater than 80% when vehicle density is above 40 vehicles/min. When vehicle density is low, deployment of relay points can help to further improve detection probability. In addition, by utilizing vehicles in opposite lanes, detection probability can be further improved. This inter-vehicular communication protocol i.e., dangerous vehicle-detection protocol useful for to collect

A

the fine from the driver who exceeds the permitted speed on highways and to warn other drivers from accidents. Keywords : Mobile ad-hoc networks , mobile communication , vehicular mobility and vehicle-to-vehicle communication.

IJ

I . INTRODUCTION

Vehicular Ad Hoc Networks (VANETs) have recently

attracted the attention of

network congestion , performance analysis, privacy and

researchers , automotive

security[5] .In VANETS communications between nodes are

industry, and governments , for their potential of improving

direct ,i.e. without relying on any dedicated infrastructure

safety of the surrounding environment through infrastructure

,contrary to earlier vehicular networks Although it is self-

less ,vehicle to-vehicle(V2V) wireless communications The

organized and easily to deploy, the infrastructure less

vision for VANETs includes applications such as route

vehicular network

planning, road safety, e-commerce , entertainment in for

be tackled before real implementations. For instance, to allow

VANETs includes applications such as route planning, road

communications between nodes (vehicles) which are out of

safety,

[2],

the power range of each other some other intermediaries

cooperative driver assistance, sharing traffic and road

should act as routers, to remedy the lack of dedicated routers.

conditions for smooth traffic flow, user interactions,

Thus, a distributed routing protocol needs to be employed. In

information services, etc. VANET raises several interesting

the European Union Seventh Framework Program me

issues in regard to media access control (MAC), data

SAFESPOT project [11],[12] and the Japanese Advanced

aggregation, data validation , data dissemination , routing ,

Road

e-commerce

,

ISSN: 2230-7818

entertainment

in

vehicles

introduces many challenges that should

Transportation

@ 2011 http://www.ijaest.iserp.org. All rights Reserved.

Systems

(ARTS)

project,

Page 124

future


K.PREMA KUMAR et al. / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 6, Issue No. 1, 124 - 132

propagates warning information including their position,

vehicle-to-vehicle (V2V) and vehicle to- roadside (V2I) [9]

speed, time, and collected IDs. When a vehicle receives

[10] communications are actively being studied .In fact, V2V

warning information, the vehicle calculates the distance

is considered useful for localized emergency and respond

between the current position and the position where warning

cases, while V2I is viewed as the long-haul pipe for

information was generated. If the distance is shorter than a

noncritical information push and pull. In the ARTS project,

certain amount, the vehicle will forward the warning

there are several research projects on cooperatively detecting

information to preceding vehicles as soon as possible.

vehicles

corners,

Otherwise , the vehicle that receives the warning information

intersections, vehicles in the wrong lane, vehicles travelling at

starts to observe its surrounding vehicles. When it finds

extremely dangerous speeds, and vehicles wrongly stopping or

vehicles whose IDs are included in its received warning

running on a motorway shoulder. In this paper, we focus on

information, it estimates the speed of those vehicles. If the

the use of ad- hoc communications to detect dangerous

estimated speed exceeds the permitted speed limit ,those

vehicles on roads and highways [6],[7],[8] .

Reckless and

vehicles are considered as ― suspected vehicles,‖ and the

careless driving can endanger the lives of other drivers and

updated warning information is then further propagated to

passengers on roads and highways. Increasingly, many

vehicles ahead. By repeating this process, the suspected

accidents can be avoided if such dangerous drivers are

vehicle where multiple other vehicles witnessed the speed

detected early and other drivers are warned [14][15]. In most

violation will ultimately be marked as a ― dangerous vehicle.‖

from

approaching

ramps,

invisible

ES

roads nowadays, cameras and speed detectors are used to

T

intelligent transportation system. technologies based on

monitor and identify drivers who had exceeded the permitted speed limit on roads and highways. This is the primitive approach, and there are limitations. If the drivers slow down

before the speed detectors, they will not be detected, even

though they had exceeded the permitted speed earlier. Additionally, bad weather can distort the quality of image captured

by cameras.

Currently,

there

are

various

A

interpretations and definitions of dangerous drivers. Reckless drivers are those who are negligent. For example, they do not

give signals when overtaking other vehicles, or they follow too closely to vehicles ahead of them. Fatigue drivers are those who are overpowered by physical and mental stress.

IJ

They fell asleep while driving, creating a dangerous situation

Fig. 1. Overview of the proposed dangerous-vehicle-detection mechanism

on roads and highways, resulting in accidents and Collisions 19] . Aggressive drivers are those who drive and overtake

II. DANGEROUS VEHICLE DETECTION PROTOCOL

others dangerously, often speeding, and do not give warning

Current methods of deploying speed detectors at

or signals to others. They create catastrophic accidents, often

fixed points are inadequate for detecting certain kinds of

involving fatal injuries and loss of lives. In this paper, we

dangerous vehicles. For example, if a dangerous vehicle

focus our research on the detection of drivers who violate the

exceeding the permitted speed limit knows the locations of

speed limits on roads and highways [16],[18] . We used the

those speed detectors, it might slow down before the speed

dangerous-vehicle-detection protocol (DVDP) to detect

detectors, thereby avoiding detection. In this paper, we

drivers who violate the perm permitted speed limit .Here ,we

propose DVDP to detect dangerous vehicle autonomously. Its

assume that a kind of next-generation license plate number

operation is discussed in the following section.

system is used, where each vehicle disseminates its own

A . Assumption for Proposed Protocol:

vehicle identification (ID) in a regular interval. In DVDP, each

vehicle

collects

ISSN: 2230-7818

surrounding

vehicles’

IDs

and

Here, we assume a kind of next-generation license plate system. We assume that each vehicle broadcasts its

@ 2011 http://www.ijaest.iserp.org. All rights Reserved.

Page 125


K.PREMA KUMAR et al. / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 6, Issue No. 1, 124 - 132

denotes the suspected level of a monitoring vehicle Vid .When

is 40 m. It is also assumed that those vehicles have wireless

vehicle Vid estimates the speed of each surrounding vehicle

communication facilities so that they can transmit and receive

Vid , if it finds that Vid exceeds the permitted speed limit, i.e.,

data. For inter-vehicular communications, we use the

if the estimated speed vk in TRid exceeds the permitted speed

IEEE802.11 independent basic service set (IBSS) [3], [4]. Our

limit, the vehicle Vid sets {TRid , 1 } into its suspected vehicle

protocol is an application layer protocol running over user

information Sid. Also, if vehicle Vid finds again that Vid in Sid

datagram

and

still exceeds the permitted speed limit, the suspected level is

wireless

incremented by one, i.e., it is incremented as { TRid , levelid +

communication range is 200 m and that each vehicle knows its

1} .The vehicles in Sid correspond to questionable vehicles,

precise position and time from its global positioning system

and they are continuously monitored by other vehicles . If the

(GPS) receiver. Different radios are used for transmitting data

suspected level reaches a predefined threshold N , { TRid ,

and vehicle IDs. In DVDP , each vehicle collects vehicles’ Ids

levelid } is recorded into the dangerous vehicle information

disseminated from surrounding vehicles and forwards them to

Did. The data structure of dangerous vehicle information Did

preceding vehicles as warning information (see Fig. 1). Note

is the same as the suspected vehicle information Sid. If

that DVDP can work well even if dangerous vehicles do not

preceding vehicles receive the dangerous vehicle information

execute DVDP although we assume that all vehicles including

from vehicles in the rear, they can continuously monitor the

dangerous

dissemination of vehicle IDs of those vehicles. If they find

protocol/

IEEE802.11.

Here,

vehicles

Internet we

protocol

assume

broadcast

(UDP/IP)

that

their

the

vehicle

ID’s

periodically[1].

T

vehicle ID periodically, and that the vehicle ID’s radio range

B . DVDP Operation

ES

such dissemination of vehicle IDs, they can recognize the approach of dangerous vehicles in advance. Hence, this can

Let Vid denotes the vehicle whose vehicle ID is id.

enhance the safety of preceding vehicles.

Warning information Wid of Vid contains the following four

types of information ( Wid = < Oid , Mid, Sid , Did > ): 1) observing vehicle information Oid; 2) monitoring vehicle information Mid; 3) suspected vehicle information Sid; and 4) dangerous vehicle information Did. The observing vehicle

A

information Oid is represented as 4- tuple ( Vid, tid, pid, dirid

) , where pid denotes the position of the vehicle Vid at time tid, and dirid denotes the direction in which it is moving. When other vehicles receive the warning information, they can recognize where the vehicle Vid is running at time tid and

IJ

to which direction it is moving from pid and dirid, respectively.

Fig.2 Dangerous vehicle speed estimation

The monitoring vehicle information Mid is represented as a set { TRid } of monitoring vehicles’ moving traces. The

C. Detection Approach

moving trace TRid of each monitored vehicle Vid is

In DVDP, each vehicle executes the following two

represented as a pair {trid, id } of a list of positions trid and its

processes in parallel. 1. forwarding process and 2.Observing

vehicle’s ID

process.

id_.

Here, trid denotes a list of positions { ( t1, p1,

The

forwarding

process

relays

the

warning

v1),( t2, p2, v2 ), . . . , ( tk, pk, vk ) }, where pi and vi denote the

information sent from rear vehicles to preceding vehicles. It

estimated position and speed of the monitored vehicle Vid_ at

also relays the warning information of oncoming vehicles so

time ti, respectively. The estimated speed vi is calculated by

that they can be used for vehicles running in opposing lanes

comparing its current position and time with its preceding

.The observing process, however, monitors dissemination of

position and time .

vehicle IDs from surrounding vehicles and estimates the speed

The suspected vehicle information Sid is represented as a

of surrounding vehicles using the warning information

set of suspected vehicles Sid = { TRid, levelid }, where levelid_

obtained in the forwarding process. The forwarding process

ISSN: 2230-7818

@ 2011 http://www.ijaest.iserp.org. All rights Reserved.

Page 126


K.PREMA KUMAR et al. / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 6, Issue No. 1, 124 - 132

b) If id’ is not included in the observing list, then construct its

be forwarded. Likewise, the observing process has an

moving trace << tcur, pcur, vcur> , id’>, and add it to the

observing list for keeping vehicle IDs to be monitored.

forwarding list.

1). Forwarding Process: The forwarding process is executed

c) If id_ is included in the observing list and if <<t1, p1, v1>,

as follows.

<t2, p2, v2>, . . . , <tk, pk, vk>, id’> is recorded as a moving

a) If a vehicle Vid receives a warning information Wid, it

trace, then estimate its current speed Vcur as follows:

compares its current position of Vid with the position of the

Vcur = d(pk, pcur) − 2R /tcur – tk

sender vehicle (Vid ) recorded in Wid. It also compares the

where d(p1, p2) denotes the distance between p1 and p2.

moving direction.

d) Let Vlimit denote the permitted speed limit. If Vcur > Vlimit,

b) If Wid is sent from an oncoming vehicle running on the

then increment the suspected level lid , and put it on the

opposite lanes, then add Wid into the forwarding list, and go to

forwarding list. Let L denote a threshold. If lid > L, then treat

step 5).

the corresponding vehicle as a dangerous one, and put it on the

c) If Wid is sent from a front vehicle running in the same

forwarding list.

direction, then discard it, and repeat from step 1).

e) For a predefined speed Vsend, if Vsend ≤ Vcur ≤ Vlimit, then

d) If Wid is sent from a rear vehicle running in the same

retain the suspected level lid, and add the corresponding

direction, then do the following.

warning information on the forwarding list.

1) For each moving trace <trid’’, id‖> in the monitoring

f) Otherwise (Vcur < Vsend), remove the target vehicle Vid from

vehicle information Mid_ = {<trid‖, id‖>} of Wid ,if the

the observing list.

ES

T

has a forwarding list for keeping the warning information to

distance between the latest position of the moving trace <trid‖,

Here, we assume that the observing list is periodically

id‖> and the current position is less than a fixed distance Dmin,

updated and old information is discarded. For each

then put the moving trace <trid‖, id‖> into the forwarding list.

information whose latest timestamp is older than a fixed

Repeat this process for all moving traces in Mid’.

period Top, observation of such vehicles is no longer

2) Else, if the distance is larger than or equal to Dmin, then add

necessary, and the old information is discarded. In each

<trid, id> into the observing list.

moving trace TRid_ = <{<t1, p1, v1>, <t2, p2, v2>, . . . , <tk, pk, vk>}, Vid’> , a new list <tcur, pcur, vcur> is added only when the

contents as a new warning message, and remove them from

suspected level is incremented. Therefore, the maximum

the list.

length of the list is N + 1, where N is the predefined threshold

A

e) If the forwarding list is not empty, then disseminate its

The speed check of suspected vehicles will begin after

for deciding whether a suspected vehicle is treated as a

the warning information is propagated over the fixed distance

dangerous vehicle. If each<ti, pi, vi> is given as 20-B data,

Dmin. When the vehicular distance is short, vehicles driving in

and if Vid’ is given as 4-B data, the size of a moving trace TRid’ is 20 * N + 24 B .For neighboring vehicles running with

the warning information. Here, if the differential angle

similar speeds, their suspected levels are zero. In such a case,

(absolute value) between the moving direction described in the

the required data size is 24 B since N = 0. Although the size of

received warning information and the current vehicle moving

warning information varies depending on how many vehicles’

direction is less than π/2, both vehicles are considered to be

information should be forwarded, in our experiments, the sizes

moving in the same direction. Else, they are said to be moving

of the warning information are smaller than 1 kB in most

in opposite directions.

cases. The number of transmitted warning information per

2 .Observing Process:Each vehicle Vid executes the following

second within the wireless communication range of each

IJ

front may encounter the suspected vehicle before they receive

observing process (see Fig. 2). a) If vehicle Vid finds dissemination of a vehicle ID id’ from its surrounding vehicle Vid’ , then note its own current position pcur, speed vcur, and time tcur.

ISSN: 2230-7818

vehicle is at most 20–50, even for rather congested road conditions. This amount is enough for transmitting data in IEEE 802.11p environments .When estimating the speed of a surrounding vehicle, we cannot find its exact position.

@ 2011 http://www.ijaest.iserp.org. All rights Reserved.

Page 127


K.PREMA KUMAR et al. / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 6, Issue No. 1, 124 - 132

In Fig. 2, if R is the wireless communication range, the real

successfully reproduce vehicular density and fluctuations of

position of an observed vehicle might be at most R meters

real traffic flows.

.away from the position of its monitoring vehicle. Therefore, if

A. Speed Model:

the distance between two monitoring vehicles is X meters, the

engineering, it is known that, in general, each vehicle’s speed

actual distance X_ between two positions of vehicle VX

V can be modeled by the following Green shields’ function

satisfies X − 2R ≤ X_ ≤ X + 2R. Therefore, we use the

[17]:

According to the theory of traffic

minimum distance X − 2R as the distance between two positions of vehicle VX when estimating its speed. Since X −

V = VMAX ×(1 – K/KMAX )

- (1)

2R is used, the estimated speed is slower than the actual speed. This avoids cases where non dangerous vehicles are

V speed of the target vehicle;

detected as dangerous vehicles.

K density of vehicles around the target vehicle;

The warning information is also transmitted when the

VMAX maximum speed at which vehicles can run in case that K = 0;

speed is less than the permitted speed limit Vlimit. If the

KMAX saturated density of vehicles when their speeds become

warning information is not sent when the estimated speed is

0.

lower than Vlimit, dangerous vehicles might not be detected if

Here, we assume that the ratio K/KMAX is roughly proportional

they temporarily slow down. By relaying warning information

to the ratio DMIN/D .Then, we arrive at

ES

of vehicles whose speeds are faster than Vsend, we avoid misdetection dangerous vehicles. Hence, we refer Vsend as the forwarding speed.

T

estimated speed is faster than a fixed speed Vsend, even if the

V = VMAX ×(1 − DMIN /D)

-

(2)

where D is the distance to the preceding vehicle, and DMIN is

III . REALISTIC VEHICULAR MOBILITY

the minimum distance between two vehicles.

In the evaluation of inter-vehicular communication, it is desirable that realistic vehicular traffic flows are considered. If

IV.SIMULATION ENVIRONMENT

inter-vehicular communication is used for estimating the

A. Simulation environment: we evaluated the performance of our proposed DVDP on

jam form a line with similar distances, i.e., they have uniform

metropolitan highways. The common simulation condition is

arrangement. If inter-vehicular communication is used for

given as follows. We assume that the legally allowed highway

avoiding collisions at intersections, one can assume that a

speed is 100 km/h and that each normal vehicular speed is set

message informing the approach of a vehicle can reach

at 100 ±5 km/h . We vary the vehicular density from 5 to 55

vehicles on its crossing road by at most a few hops. In such

vehicles/min. Each highway has two or three lanes, and there

cases , performance of inter-vehicular communication for real

is almost no traffic congestion for the given vehicular density

traffic might be similar to simulation results based on artificial

.Here, vehicles with an average speed exceeding 130 km/h are

macroscopic traffic flow models. However, to identify moving

classified as dangerous vehicles. The number of dangerous

traces of dangerous vehicles and estimate when and how

vehicles is set to 9.For inter-vehicular communications, we

dangerous vehicles exceed the permitted speed using inter-

use the IEEE802.11 IBSS [7], [8]. Our protocol is an

vehicular communication, one must carefully reproduce real

application layer protocol running over UDP/IP and

traffic flows on highways for considerable time periods. This

IEEE802.11. The warning information dissemination range is

requires a realistic vehicular mobility model. In this section,

200 m, and the vehicle ID’s radio range is 40 m. Different

we consider vehicular mobility by taking into account realistic

radios are used for sending data and vehicle IDs. For wireless

speed model and lane selection/change model. We have

communications, it is known that the probability of successful

extracted specific characteristics of real vehicular mobility

reception of each packet depends on the inter-vehicular

from several vehicular positions on Google Earth , and we

distance and that it decreases suddenly when the distance

have shown that our vehicular mobility model can

becomes larger [20]. Here, we approximate that if packet

IJ

A

duration of a traffic jam, one can assume that vehicles in the

ISSN: 2230-7818

@ 2011 http://www.ijaest.iserp.org. All rights Reserved.

Page 128


K.PREMA KUMAR et al. / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 6, Issue No. 1, 124 - 132

collision does not occur, the correct reception probability of

speed between the normal vehicles and dangerous ones is at

the warning information, which depends on the inter-vehicular

most 100 km/h (28 m/s), and it is less than the radio range of

distance, follows the expression 1 − (x/D)2, where x denotes

vehicle IDs (40 m), each vehicle can receive the vehicle ID of

the inter-vehicular distance, and D denotes the data

every passing vehicle with a high probability, even if the

dissemination range. If packet collision occurs, then we say

passing vehicle’s speed is very fast .In our simulation, we will

that collided packets are lost . We assume all vehicle IDs

evaluate the performance of DVDP in scenarios with and

from surrounding vehicles can be received at the same

without relay points. Our simulation results are discussed

probability of 60% for simplicity of discussion. Here, every

below

vehicle emits its vehicle ID every second. Since the relative

Fig .4. Correlation between Dmin and detection probability

IJ

A

Fig.3. Suspected level versus Dmin

ES

T

.

Fig .5. Detection probability with location and time error

Fig. 6. Detection probability with the help of vehicles in opposite lanes

ISSN: 2230-7818

@ 2011 http://www.ijaest.iserp.org. All rights Reserved.

Page 129


K.PREMA KUMAR et al. / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 6, Issue No. 1, 124 - 132

and the estimated speed V becomes large. This makes the detection probability low since the estimated speed is rather slower than the actual speed. On the other hand, if Dmin is very long, the warning information is often lost due to the absence of forwarding vehicles. As shown in Fig. 4, in our experiments ,if Dmin is 300 m, the detection probability is less than 40%. If it increases, i.e., if it is between 500 and 800 m, the detection probability becomes 60%. If it exceeds 1000 m, the detection probability decreases. From these results, we choose Dmin =800 m .We discuss here the error between the estimated speed and the actual speed caused by position and time errors. Here, we assume that the position error is −10 < dx < 10 m

T

and that the time error of GPS is −0.5 < tx < 0.5 s. The position and time errors are present in both front- and rearobserving vehicles. Hence, the estimated speed V _ is

Fig.7. Detection probability versus forwarding speed.

calculated as V In

the

forwarding

process,

= X + 2dx − 2R/T + 2tx. Here, X and T

denote the exact location and time. By considering the range

ES

B. Dmin Versus Suspected Level Versus Detection Probability

i

when

warning

of dx and tx from the assumption, the range of V _ is (X − 20

information is sent from a rear vehicle to its preceding vehicle,

− 2R/T + 1) < Vi < (X + 20 − 2R/T − 1). Fig.5 denotes the

if the distance between the two vehicles is shorter than Dmin,

detection probability of dangerous vehicles with location and

the preceding vehicle just forwards the received warning

time errors. This evaluation was done with the dangerous

information to its preceding

vehicle’s speed at 150 km/h and Dmin at 800 m. As shown,

Vehicle. The speed check is

there is no

exceeds Dmin. Here, we have evaluated the influence of Dmin

probabilities with and without errors. Hence, our proposed

on suspected levels of dangerous vehicles. The two evaluation

DVDP can work well even if vehicles do not have exact

parameters are listed as follows:

location and time information.

1) Vehicle density = 31.7 vehicles passing in a minute;

D. Influences by Vehicles From Opposite Lanes :

A

carried out only if the distance between the two vehicles

2) Dangerous vehicles speed = 150 km/h.

So far, we have focused on vehicles running in the same direction. Here, we utilize vehicles in the opposite lanes to

IJ

Fig. 3 shows the increase in suspected levels for different

major difference between the detection

values of Dmin. As Dmin decreases, the suspected level

relay warning information. This can further improve detection

increases quickly . As Dmin increases ,the suspected level

probability . Fig. 6.denotes the detection probability for the

increases with a lower gradient. While a shorter Dmin increases

following four cases.

the suspected levels quickly, too short a distance can result in

1) Observing and forwarding vehicles are the only vehicles

the failure of detecting dangerous vehicles.

driving in the same direction with the dangerous vehicles.

C. Position and Time Errors:

2) Observing vehicles are vehicles driving in the same

In our DVDP, the speed of each observed vehicle is

direction with the dangerous vehicles and forwarding vehicles

checked when it is recognized that the vehicle moves Dmin

are vehicles driving in both lane directions.

meters. As shown in Fig.2. Suspected Level versus Dmin

3) The role of vehicles is the same as the first case, but

i

meters, the actual moving distance X of each observed vehicle

additional relay points are set per 1 km by the roadside.

might be 2+R meters longer than the estimated distance X. If

4) The role of vehicles is the same as the second case, but

it takes T seconds to move Dmin meters, the actual speed might

relay points are set per 1 km by the roadside.

be (Dmin + 2 * R)/T , although the estimated speed is Dmin/T. If

As shown in Fig.6, with vehicles running in the same lane and

Dmin is very short, the difference between the actual speed Vi

direction, as vehicle density increases, detection probability

ISSN: 2230-7818

@ 2011 http://www.ijaest.iserp.org. All rights Reserved.

Page 130


K.PREMA KUMAR et al. / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 6, Issue No. 1, 124 - 132

also increases, reaching above 80% beyond 40 vehicles/min.

models, speed of dangerous vehicles, forwarding speed, relay

However, with the inclusion of vehicles from opposite lanes ,

points, and vehicles in opposite lanes . Simulation results

detection probability is greatly improved

revealed that detection probability for realistic vehicular

.E . Detection Probability Versus forwarding Speed:

mobility is less than that of the macroscopic case. Increasing

Next, we focus on the forwarding speed Vsend. If a

forwarding speed reduces detection probability

.

We

dangerous vehicle slows down temporarily, the estimated

observed that the deployment of relay points increases

speed might temporally become less than the speed limit Vlimit

detection probability. Furthermore, the higher

(even if the average speed exceeds the speed limit Vlimit).

speed of dangerous vehicles, the higher the detection

Therefore, to detect such a case, we introduce the forwarding

probability. Exploiting vehicles in the opposite lanes to relay

speed Vsend , whose value is less than the speed limit Vlimit,

warning

and the warning information is forwarded when the estimated

probability. From our results, it is clear that distributed

speed exceeds Vsend .When the estimated speed is less than

detection of dangerous vehicles is possible using ad hoc

Vlimit and greater than Vsend , the suspecting level of the

sensing ,communications ,and relay points.

information

can

further

the average

improve

detection

information must continue to be forwarded.

We evaluate

T

warning information is not increased, and the warning VI.REFERENCES:

detection probability by varying the forwarding speed Vsend. In Fig.7, we show the detection probability under various

[1]. S. Panwai and H. Dia, ― Comparative evaluation of microscopic car

forwarding speed Vsend: 100–125 km/h. In this evaluation, the

following behaviour,‖ IEEE Trans. Intell. Transp. Syst., vol. 6, no. 3, , Sep. 2005

ES

average speed of dangerous vehicles is 134 km/h, and the

maximum speed is 150 km/h. The vehicular density is 32

[2].

Hartenstein, B. Bochow, A. Ebner, M. Lott, M. Radimirsch, and D.

Vollmer, ― Position-aware ad-hoc

wireless networks for inter-

vehicles passing in a minute . Fig. 7 shows that the slower the

vehicle communications: The Fleet Net project,‖ in Proc. 2nd ACM

forwarding speed, the higher the detection probability. This is

Int. Symp Mobi Hoc, 2001,

because when the forwarding speed is slower, the number of

[3]. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE802.11 Std.,

warning information transmitted is increased, and dangerous vehicles can be readily detected. When the forwarding speed

11:1999.

[4]. Supplement to 802.11-1999, Wireless LAN MAC and Specifications: Higher Speed Physical Layer

A

is 100 km/h, the detection probability becomes low because

the 2.4 GHz Band,

the warning information from normal vehicles is also sent, and the number of the warning information becomes too large.

IJ

.

model for information diffusion in MANETs,‖ Int. Workshop MS Wi M, 2002,.

[6]. .G. Korkmaz, E. Ekici, F. Ozguner, and U.ozguner, Urban multiin Proc. 1st ACM Int. Workshop VANET, 2004, [7].

communications

to

propagate

uses

ad

warning

hoc

networks,‖ in Proc.

mobile

information

to

implement

a

realistic

simulator

that

I shall

[8].

2nd Int. Workshop V2VCOM, 2006. CD-

R. Miller and Q. Huang, ― An adaptive peer-to-peer collision warning system,‖ in Proc. IEEE VTC, 2002

[9].

T. Nadeem, S. Dashtinezhad, C. Liao, and L. Iftode, Traffic view: A scalable traffic monitoring system,‖

perform both

macroscopic and microscopic simulation. We had also taken

for vehicle- to-vehicle

ROM.

preceding vehicles so that dangerous vehicles can be monitored and identified over time and space.

R. Mangharam, D. Weller, R. Rajkumar, P. Mudalige, and F. Bai, ― GrooveNet: A hybrid simulator

vehicular communication protocol for distributed detection of DVDP

in Proc. 5th ACM

hop broadcast protocol for inter-vehicle communication systems,‖

In this paper, we have proposed the DVDP an intervehicles.

(PHY) Extension in

IEEE802.11b Std., 1999. ISO/IEC8802-

[5]. A. Khelil, C. Becker, J. Tian, and K. Rothermel, An epidemic

V.CONCLUSION

dangerous

PHY

11:1999.

Therefore, the warning information of dangerous vehicles cannot be propagated effectively.

1999. ISO/IEC8802-

in Proc. 5th IEEE

Int. Conf. MDM, 2004. [10].

K. Nakanishi, T. Umedu, T. igashino, H. Mori, and H.

into account appropriate speed and lane models, along with

Kitaoka, ― Synthesizing realistic vehicular mobility for

considerations for time and position errors. We evaluated the

simulation of inter-vehicle communication,‖ in Proc. 2nd IEEE

performance of DVDP by examining detection probability

Workshop AutoNet, 2007. CD- ROM.

over various parameters, such as vehicle density, mobility

ISSN: 2230-7818

@ 2011 http://www.ijaest.iserp.org. All rights Reserved.

Page 131

precise


K.PREMA KUMAR et al. / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 6, Issue No. 1, 124 - 132

[11].

S. Ni, Y. Tseng, Y. Chen, and J. Sheu, ― The broadcast storm problem in a mobile ad hoc network,‖ in Proc.5th ACM/IEEE Int. Conf. MobiCom, 1999,.

[12]. An

Inter-vehicular-Communication

Protocol

for

Distributed

Detection of Dangerous Vehicles Takaakimedu, Member, IEEE, Kumiko Isu, Member, IEEE ,Teruo Higashino, Senior Member, C. K. Toh, Fellow ,IEEE transactions on vehicular technology, vol. 59, no. 2, February 2010. [13].

S. Panwai and H. Dia, ― Comparative evaluation of microscopic car following behaviour,‖ IEEE Trans. Intell. Transp. Syst., vol. 6, no. 3, pp. 314–325, Sep. 2005.

[14].

M. Saito, J. Tsukamoto, T. Umedu, and T. Higashino, ― Design and evaluation of inter-vehicle dissemination

protocol for

propagation of preceding traffic information,‖ IEEE Trans. Intell. Transp. Syst., vol.8, no. 3, Sep. 2007. C. Schwingenschlogl and T. Kosch, ― Geocast enhancements of AODV for vehicular networks,‖ ACM SIGMOBILE Mobile Comput. Commun. Rev., vol. 6, no. 3, pp. 96–97, Jul. 2002. [16].

in Proc. 5th World Congr.Intell. Transp. Syst., 1998, vol. 4, M. Torrent-Moreno, D. Jiang, and H. Hartenstein,

― Broadcast

reception rates and effects of priority access in 802.11-based ACM Int. Workshop

ES

vehicular ad-hoc networks,‖ in Proc. 1st

T

[15].

VANET, 2004.U.S. Dept. Transp., Fed.Highway Admin., Traffic [17].

Flow

Theory—A

State

of

the

Art

Report.

[Online].available:http://www.tfhrc.gov/its/tft/tft.ht [18].

B. Xu, A. Ouksel, and O.Wolfson, ― Opportunistic resource

exchange in inter-vehicle ad-hoc networks,‖ in proc. 5th IEEE Int. Conf. MDM, 2004 [19].

J. Yoon, M. Liu, and B. Noble, ― Sound mobility models,‖ in .

IJ

A

Proc. 9th ACM/IEEE Int. Conf. MobiCom.

ISSN: 2230-7818

@ 2011 http://www.ijaest.iserp.org. All rights Reserved.

Page 132


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.