Will the Internet of Things Save us from Traffic Jams?

1_11_12.jpg

Experts have given the green light to a traffic light revolution – but we’re still some distance from a queuing-free future
Traffic is getting worse. It doesn’t just feel that way, the stats prove it: commuters in 2014 spent an average 66 more hours stuck in traffic than they did in 2013, according to navigation tech firm TomTom. So when Internet of things technology is disrupting every part of our lives, when will traffic lights be rethought and rebuilt?
 
Well, the traffic light revolution is already underway. It is all part of the promise of connected and self-driving cars, which allow data about individual journeys, routes and vehicles to be centrally monitored, controlled and systematized.
Once computers are in full control of our cars, do we even need traffic lights at intersections? That’s the idea behind AIM – autonomous intersection management – at the artificial intelligence laboratory at the University of Texas at Austin. Rather than stop at red lights, self-driving cars would schedule a slot through an intersection in real-time, speeding up or slowing down to ensure they’re in the right place at the right time – and not smashing into another car.
For the idea to work, it would require roads to be mostly full of autonomous cars, says project leader Professor Peter Stone – and then it wouldn’t seem so terrifying.
How much faster will careening through intersections be compared to carefully stopping? The researchers compared AIM to heavy traffic on a major road, saying it would reduce delay by as much as 100 times – though that’s only at intersections, not total driving time.
It not only promises to remove time waiting at lights, but will cut fuel usage and emissions as well. “A lot of emissions and fuel usage are caused by acceleration, and our system will allow the cars to make a much more constant speed,” he says, adding that the savings could be “quite significant”.
But even with a complicated system such as AIM, intersections will still be safer than they are today, Prof Stone says, pointing out that a third of all fatal accidents happen at intersections.
“Intersections are already quite dangerous. When a computer’s doing the driving, even with all the cars going through without stopping, it’s going to be a lot safer than it is today.”
Computers aren’t driving our cars yet and won’t be for some time, but there are some connected car projects that already claim to be easing the flow of traffic.
TomTom collects swaths of traffic data from its satnav devices but also used anonymised data from third party navigation apps, including smartphone maps. “We have agreements with a number of smartphone manufacturers, so they provide us with real time GPS feeds wherever their smartphones are,” says Nick Cohn, senior traffic expert at TomTom.
It also gathers data from telematics units installed in fleet vehicles as well as in-dash systems, giving TomTom a comprehensive overview of traffic flows. The resulting information on near real-time congestion is shared with customers, which includes road authorities and they can use it to plan traffic management as well as consumers.
As cars become more connected – whether it’s through satnav or simply the smartphones in our pockets – better data in means we get better data out on the road.
Though traffic data makes it possible to see the movement of traffic in real time, and traffic lights themselves are operated algorithmically, it is still not possible to engineer a way of turning the lights green as you pull up.
This is already happening in in a limited sense, noted Stevens. “At a local signal level, we can implement priority measures for ambulances, buses, etc - that’s a standard feature in some software and has been for years,” says Stevens. “However, giving priority to one vehicle makes things slightly worse for all others. So, there’s little point in giving one or two connected private passenger vehicles special priority.”
There are reasons to give some cars priority, and that’s being trialed by Newcastle. There, traffic lights are “talking” to motorists, sending messages to a device in car about obstacles or delays ahead, as well as helping them adjust their speeds to hit lights when they’re green.
As with any tech innovation, one of the biggest challenges is security. The best example so far is surely hacked construction signs in the US with attackers warning of zombies ahead, but it’s easy to imagine how taking out traffic networks could shut down a city or otherwise wreak havoc.
The best way to achieve it may not be via smart, reactive traffic lights, but by sending messages to drivers in cars, giving them useful information to react to and nudging them into better routes.
“It’s probably easier to change driver behaviour than it is to change the traffic lights.” Until computers take over driving, at least.
Guardian: http://bit.ly/1aKT7eX

 

« Kaspersky Denies KGB Connections
Hiring A Hacker – So, how much do they charge? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Happiest Minds Technologies

Happiest Minds Technologies

Happiest Minds offers domain centric solutions in IT Services, Product Engineering, Infrastructure Management and Security.

Cyber Resilience

Cyber Resilience

Cyber Resilience offer an intensive program designed to help you create strategies to quickly become cyber resilient and to manage cyber risks in a measurable and predictable way.

DDOS-Guard

DDOS-Guard

DDoS-GUARD is one of the leading service providers on the global DDoS protection and content delivery markets.

Censys

Censys

Our customers rely on Censys data to get the global visibility they need of their attack surfaces in order to proactively prevent nation-state attacks and emerging threats.

Carson McDowell

Carson McDowell

Carson McDowell are one of Northern Ireland's leading law firms. We are the law firm of choice for many of Northern Ireland's Top 100 companies as well as international companies doing business here.

blueAllianceIT

blueAllianceIT

blueAlliance IT is an investment and growth platform that unites local MSP and IT companies around the nation, helping them to grow and operate competitively.

Grant Thornton

Grant Thornton

Grant Thornton is one of the world’s leading networks of independent assurance, tax and advisory firms.

HackEDU

HackEDU

HackEDU provides secure coding training to companies ranging from startups to the Fortune 500.

Recon InfoSec

Recon InfoSec

The Recon InfoSec team includes analysts, architects, engineers, intrusion specialists, penetration testers, and operations experts.

Tech Seven Partners

Tech Seven Partners

At TechSeven Partners, we provide a full suite of cyber security solutions for your business including network monitoring, onsite and cloud backup solutions, HIPAA or PCI compliance.

CryptoDATA

CryptoDATA

CryptoDATA develops products and services based on Blockchain technology, that ensure user security and data encryption, applicable in various fields.

Velum Labs

Velum Labs

Velum Labs is a cyber intelligence company that provides simple and non-intrusive, cloud and cyber intelligence solutions; built from a market-leading understanding of cyber-attack methodology.

Corona IT Solutions

Corona IT Solutions

At Corona IT Solutions, our team of specialists in networking, wireless and VoIP are dedicated to providing proactive monitoring and management of your IT systems.

Zeron

Zeron

Zeron build bridges between security teams and top management. Our platform unifies your cyber risk posture seamlessly, encompassing threat insights and quantifiable risk scenarios.

Cypfer

Cypfer

CYPFER is a global market leader in ransomware post-breach remediation and cyber-attack first response.

Applied Insight

Applied Insight

Applied Insight work closely with government agencies and industry to overcome technical and cultural hurdles to innovation, empowering them with the latest cloud, data and cyber capabilities.