Document Open Access Logo

A Dependable Detection Mechanism for Intersection Management of Connected Autonomous Vehicles (Interactive Presentation)

Authors Rachel Dedinsky, Mohammad Khayatian, Mohammadreza Mehrabian, Aviral Shrivastava



PDF
Thumbnail PDF

File

OASIcs.ASD.2019.7.pdf
  • Filesize: 2.14 MB
  • 13 pages

Document Identifiers

Author Details

Rachel Dedinsky
  • Arizona State University, 660 S Mill Ave, Tempe, AZ, US
Mohammad Khayatian
  • Arizona State University, 660 S Mill Ave, Tempe, AZ, US
Mohammadreza Mehrabian
  • Arizona State University, 660 S Mill Ave, Tempe, AZ, US
Aviral Shrivastava
  • Arizona State University, 660 S Mill Ave, Tempe, AZ, US

Cite AsGet BibTex

Rachel Dedinsky, Mohammad Khayatian, Mohammadreza Mehrabian, and Aviral Shrivastava. A Dependable Detection Mechanism for Intersection Management of Connected Autonomous Vehicles (Interactive Presentation). In Workshop on Autonomous Systems Design (ASD 2019). Open Access Series in Informatics (OASIcs), Volume 68, pp. 7:1-7:13, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2019)
https://doi.org/10.4230/OASIcs.ASD.2019.7

Abstract

Traffic intersections will become automated in the near future with the advent of Connected Autonomous Vehicles (CAVs). Researchers have proposed intersection management approaches that use the position and velocity that are reported by vehicles to compute a schedule for vehicles to safely and efficiently traverse the intersection. However, a vehicle may fail to follow intersection manager (IM) scheduling commands due to erroneous sensor readings or unexpected incidents like engine failure, which can cause an accident if the failure happens inside the intersection. Additionally, rogue vehicles can take the advantage of the IM by providing false position and velocity data and cause traffic congestion. In this paper, we present a new technique and infrastructure to detect anomalies and inform the IM. We propose a vision system that can monitor the position of incoming vehicles and provide real-time data for the IM. The IM can use this data to verify the trajectories of CAVs and broadcast a warning when a vehicle fails to follow commands, making the IM more resilient against attacks and false data. We implemented our method by building infrastructure for an intersection with 1/10 scale model CAVs. Results show our method, when combined with an IM dataflows, is more dependable in the event of a failure compared to an IM without it.

Subject Classification

ACM Subject Classification
  • Computer systems organization → Embedded and cyber-physical systems
Keywords
  • Connected Autonomous Vehicles
  • Intersection Management
  • Dependable Systems

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads

References

  1. Patricia L Alfano and George F Michel. Restricting the field of view: Perceptual and performance effects. Perceptual and motor skills, 70(1):35-45, 1990. Google Scholar
  2. Edward Andert, Mohammad Khayatian, and Aviral Shrivastava. Crossroads - A Time-Sensitive Autonomous Intersection Management Technique. In Proceedings of The 54th Annual Design Automation Conference (DAC), 2017. Google Scholar
  3. Tsz-Chiu Au and Peter Stone. Motion Planning Algorithms for Autonomous Intersection Management. In Bridging the Gap Between Task and Motion Planning, 2010. Google Scholar
  4. Karl C Bentjen. Mitigating the Effects of Cyber Attacks and Human Control in an Autonomous Intersection. Technical report, AIR FORCE INSTITUTE OF TECHNOLOGY WRIGHT-PATTERSON AFB OH WRIGHT-PATTERSON AFB United States, 2018. Google Scholar
  5. Qi Alfred Chen, Yucheng Yin, Yiheng Feng, Zhuoqing Morley Mao, and Henry Xianghong Liu. Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control. In Proceedings of the 25th Network and Distributed System Security Symposium (NDSS'18), San Diego, CA, February 2018. Google Scholar
  6. John R Douceur. The sybil attack. In International workshop on peer-to-peer systems, pages 251-260. Springer, 2002. Google Scholar
  7. Kurt Dresner and Peter Stone. A multiagent approach to autonomous intersection management. Journal of artificial intelligence research, 31:591-656, 2008. Google Scholar
  8. Mohsen Kheirandish Fard, Mehran Yazdi, and Mohammadali MasnadiShirazi. A block matching based method for moving object detection in active camera. In Information and Knowledge Technology (IKT), 2013 5th Conference on, pages 443-446. IEEE, 2013. Google Scholar
  9. Chien-Liang Fok, Maykel Hanna, Seth Gee, Tsz-Chiu Au, Peter Stone, Christine Julien, and Sriram Vishwanath. A Platform for Evaluating Autonomous Intersection Management Policies. In Proceedings of IEEE/ACM 3rd International Conference on Cyber-Physical Systems. IEEE Computer Society, 2012. Google Scholar
  10. John E Greivenkamp. Field guide to geometrical optics, volume 1. SPIE Press Bellingham, WA, 2004. Google Scholar
  11. Mohammad Khayatian, et. al. RIM: Robust Intersection for Connected Autonomous Vehicles. In RTSS. IEEE, 2018. Google Scholar
  12. Joyoung Lee and Byungkyu Park. Development and Evaluation of A Cooperative Vehicle Intersection Control Algorithm under The Connected Vehicles Environment. IEEE ITS Transactions, 2012. Google Scholar
  13. Florent Perronnet, Abdeljalil Abbas-Turki, and Abdellah El-Moudni. Cooperative Intersection Management: Using Mini-Robots to Compare Sequenced-based Protocols. Les Journées Nationales des Communications dans les Transports (JNCT), 2013. Google Scholar
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail