Will the Internet of Things Save us from Traffic Jams?

1_11_12.jpg

Experts have given the green light to a traffic light revolution – but we’re still some distance from a queuing-free future
Traffic is getting worse. It doesn’t just feel that way, the stats prove it: commuters in 2014 spent an average 66 more hours stuck in traffic than they did in 2013, according to navigation tech firm TomTom. So when Internet of things technology is disrupting every part of our lives, when will traffic lights be rethought and rebuilt?
 
Well, the traffic light revolution is already underway. It is all part of the promise of connected and self-driving cars, which allow data about individual journeys, routes and vehicles to be centrally monitored, controlled and systematized.
Once computers are in full control of our cars, do we even need traffic lights at intersections? That’s the idea behind AIM – autonomous intersection management – at the artificial intelligence laboratory at the University of Texas at Austin. Rather than stop at red lights, self-driving cars would schedule a slot through an intersection in real-time, speeding up or slowing down to ensure they’re in the right place at the right time – and not smashing into another car.
For the idea to work, it would require roads to be mostly full of autonomous cars, says project leader Professor Peter Stone – and then it wouldn’t seem so terrifying.
How much faster will careening through intersections be compared to carefully stopping? The researchers compared AIM to heavy traffic on a major road, saying it would reduce delay by as much as 100 times – though that’s only at intersections, not total driving time.
It not only promises to remove time waiting at lights, but will cut fuel usage and emissions as well. “A lot of emissions and fuel usage are caused by acceleration, and our system will allow the cars to make a much more constant speed,” he says, adding that the savings could be “quite significant”.
But even with a complicated system such as AIM, intersections will still be safer than they are today, Prof Stone says, pointing out that a third of all fatal accidents happen at intersections.
“Intersections are already quite dangerous. When a computer’s doing the driving, even with all the cars going through without stopping, it’s going to be a lot safer than it is today.”
Computers aren’t driving our cars yet and won’t be for some time, but there are some connected car projects that already claim to be easing the flow of traffic.
TomTom collects swaths of traffic data from its satnav devices but also used anonymised data from third party navigation apps, including smartphone maps. “We have agreements with a number of smartphone manufacturers, so they provide us with real time GPS feeds wherever their smartphones are,” says Nick Cohn, senior traffic expert at TomTom.
It also gathers data from telematics units installed in fleet vehicles as well as in-dash systems, giving TomTom a comprehensive overview of traffic flows. The resulting information on near real-time congestion is shared with customers, which includes road authorities and they can use it to plan traffic management as well as consumers.
As cars become more connected – whether it’s through satnav or simply the smartphones in our pockets – better data in means we get better data out on the road.
Though traffic data makes it possible to see the movement of traffic in real time, and traffic lights themselves are operated algorithmically, it is still not possible to engineer a way of turning the lights green as you pull up.
This is already happening in in a limited sense, noted Stevens. “At a local signal level, we can implement priority measures for ambulances, buses, etc - that’s a standard feature in some software and has been for years,” says Stevens. “However, giving priority to one vehicle makes things slightly worse for all others. So, there’s little point in giving one or two connected private passenger vehicles special priority.”
There are reasons to give some cars priority, and that’s being trialed by Newcastle. There, traffic lights are “talking” to motorists, sending messages to a device in car about obstacles or delays ahead, as well as helping them adjust their speeds to hit lights when they’re green.
As with any tech innovation, one of the biggest challenges is security. The best example so far is surely hacked construction signs in the US with attackers warning of zombies ahead, but it’s easy to imagine how taking out traffic networks could shut down a city or otherwise wreak havoc.
The best way to achieve it may not be via smart, reactive traffic lights, but by sending messages to drivers in cars, giving them useful information to react to and nudging them into better routes.
“It’s probably easier to change driver behaviour than it is to change the traffic lights.” Until computers take over driving, at least.
Guardian: http://bit.ly/1aKT7eX

 

« Kaspersky Denies KGB Connections
Hiring A Hacker – So, how much do they charge? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Galaxkey

Galaxkey

Galaxkey is a data protection product that protects email, documents and any data using access control and an encryption platform.

Threatpost

Threatpost

Threatpost, is an independent news site which is a leading source of information about IT and business security.

Zerto

Zerto

Zerto provides enterprise-class disaster recovery and business continuity software specifically for virtualized data centers and cloud environments.

California Cybersecurity Institute (CCI) - Cal poly

California Cybersecurity Institute (CCI) - Cal poly

The CCI provides a hands-on research and learning environment to explore new cyber technologies and train and test tactics alongside law enforcement and cyberforensics experts.

CIO Dive

CIO Dive

CIO Dive provides news and analysis for IT executives in areas including IT strategy, cloud computing, cyber security, big data, AI, software, infrastructure, dev ops and more.

Sera-Brynn

Sera-Brynn

Sera-Brynn is one of the highest-ranked, pure-play cybersecurity compliance and advisory firms in the world.

Ordr

Ordr

Ordr Systems Control Engine. The first actionable AI-based systems control engine for the hyper-connected enterprise. You’re in control.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Adarma Security

Adarma Security

Adarma are specialists in threat management including SOC design, build & operation.

PrivacySavvy

PrivacySavvy

PrivacySavvy's mission is to provide you with all the information that you need to ensure that your internet privacy is intact, your devices are secure, and that any time you step online, you’re safe.

Sunday Cyber

Sunday Cyber

Sunday is a personal cybersecurity platform, built to protect the world’s top executive teams beyond the enterprise perimeter.

BCyber

BCyber

BCyber is a Swiss Cyber Security company that provides security products, training, and managed services to protect diverse IT and OT environments against cyber, physical, and cyber-physical threats.

Information Security Officers Group (ISOG)

Information Security Officers Group (ISOG)

ISOG's mission is to strengthen information security through awareness and education programs, promoting community and fellowship among information security leaders.

Azerbaijan Cybersecurity Center (ACC)

Azerbaijan Cybersecurity Center (ACC)

Azerbaijan Cybersecurity Center is a state-of-the-art facility to deliver advanced cyber training programs and build the next generation of Azerbaijan’s cybersecurity professionals.

StepSecurity

StepSecurity

StepSecurity provides a comprehensive security platform for GitHub Actions.

Cyberagentur (Cyber Agency)

Cyberagentur (Cyber Agency)

Cyberagentur is the Federal Agency in Germany for innovation in cybersecurity. Our mission is to advance research and groundbreaking innovations in the field of cybersecurity and related technologies.