skip to main content

This content will become publicly available on April 18, 2023

Title: Evaluating the driving behavior of autonomous vehicles and human driver vehicles in mixed driver environments at a signalized intersection
With the rapid development of smart cities, interest in vehicle automation continues growing. Autonomous vehicles are becoming more and more popular among people and are considered to be the future of ground transportation. Autonomous vehicles, either with adaptive cruise control (ACC) or cooperative adaptive cruise control (CACC), provide many possibilities for smart transportation in a smart city. However, traditional vehicles and autonomous vehicles will have to share the same road systems until autonomous vehicles fully penetrate the market over the next few decades, which leads to conflicts because of the inconsistency of human drivers. In this paper, the performance of autonomous vehicles with ACC/CACC and traditional vehicles in mixed driver environments, at a signalized intersection, were evaluated using the micro-simulator VISSIM. In the simulation, the vehicles controlled by the ACC/CACC and Wiedemann 99 (W99) model represent the behavior of autonomous vehicles and human driver vehicles, respectively. For these two different driver environments, four different transport modes were comprehensively investigated: full light duty cars, full trucks, full motorcycles, and mixed conditions. In addition, ten different seed numbers were applied to each model to avoid coincidence. To evaluate the driving behavior of the human drivers and autonomous vehicles, this paper will compare more » the total number of stops, average velocity, and vehicle delay of each model at the signalized traffic intersection based on a real road intersection in Minnesota. « less
; ; ; ; ; ;
Zonta, Daniele; Su, Zhongqing; Glisic, Branko
Award ID(s):
2224135 1953102
Publication Date:
Journal Name:
Proceedings Volume 12046, Sensors and Smart Structures Technologies for Civil, Mechanical, and Aerospace Systems 2022
Page Range or eLocation-ID:
Sponsoring Org:
National Science Foundation
More Like this
  1. Zonta, Daniele ; Su, Zhongqing ; Glisic, Branko (Ed.)
    Recent developments in autonomous vehicle (AV) or connected AVs (CAVs) technology have led to predictions that fully self-driven vehicles could completely change the transportation network over the next decades. However, at this stage, AVs and CAVs are still in the development stage which requires various trails in the field and machine learning through autonomous driving miles on real road networks. Until the complete market adoption of autonomous technology, a long transition period of coexistence between conventional and autonomous cars would exist. It is important to study and develop the expected driving behavior of future autonomous cars and the traffic simulationmore »platforms provide an opportunity for researchers and technology developers to implement and assess the different behaviors of self-driving vehicle technology before launching it to the actual ground. This study utilizes PTV VISSIM microsimulation platform to evaluate the mobility performance of unmanned vehicles at a 4-way signalized traffic intersection. The software contains three different AV-ready driving logics such as AV-cautious, AV-normal, and AV-aggressive which were tested against the performance of the conventional vehicles, and the results of the study revealed that the overall network operational performance improves with the progressive introduction of AVs using AV-normal, and AV-aggressive driving behaviors while the AV-cautious driving behavior stays conservative and deteriorates the traffic performance.« less
  2. Autonomous vehicle-following systems, including Adaptive Cruise Control (ACC) and Cooperative Adaptive Cruise Control (CACC), improve safety, efficiency, and string stability for a vehicle (the ego vehicle) following its leading vehicle. The ego vehicle senses or receives information, such as the position, velocity, acceleration, or even intention, of the leading vehicle and controls its own behavior. However, it has been shown that sensors and wireless channels are vulnerable to security attacks, and attackers can modify data sensed from sensors or received from other vehicles. To address this problem, in this paper, we design three types of stealthy attacks on ACC ormore »CACC inputs, where the stealthy attacks can deceive a rule-based detection approach and impede system properties (collision-freeness and vehicle-following distance). We then develop two deep-learning models, a predictor-based model and an encoder-decoder-based model to detect the attacks, where the two models do not need attacker models for training. The experimental results demonstrate the respective strengths of different models and lead to a methodology for the design of learning-based intrusion detection approaches.« less
  3. Emergent vehicles will support a variety of connected applications, where a vehicle communicates with other vehicles or with the infrastructure to make a variety of decisions. Cooperative connected applications provide a critical foundational pillar for autonomous driving, and hold the promise of improving road safety, efficiency and environmental sustainability. However, they also induce a large and easily exploitable attack surface: an adversary can manipulate vehicular communications to subvert functionality of participating individual vehicles, cause catastrophic accidents, or bring down the transportation infrastructure. In this paper we outline a potential direction to address this critical problem through a resiliency framework, REDEM,more »based on machine learning. REDEM has several interesting features, including (1) smooth integration with the architecture of the underlying application, (2) ability to handle diverse communication attacks within the same underlying foundation, and (3) real-time detection and mitigation capability. We present the vision of REDEM, identify some key challenges to be addressed in its realization, and discuss the kind of evaluation/analysis necessary for its viability. We also present initial results from one instantiation of REDEM introducing resiliency in Cooperative Adaptive Cruise Control (CACC).« less
  4. This study focuses on how to improve the merge control prior to lane reduction points due to either accidents or constructions. A Cooperative Car-following and Merging (CCM) control strategy is proposed considering the coexistence of Automated Vehicles (AVs) and Human-4 Driven Vehicles (HDVs). CCM introduces a modified/generalized Cooperative Adaptive Cruise Control (CACC) for vehicle longitudinal control prior to lane reduction points. It also takes courtesy into account to ensure that AVs behave responsibly and ethically. CCM is evaluated using microscopic traffic simulation and compared with no control and CACC merge strategies. The results show that CCM consistently generates the lowestmore »delays and highest throughputs approaching the theoretical capacity. Its safety benefits are also found to be significant based on vehicle trajectories and density maps. AVs in this study do not need to be fully automated and can be at Level-1 automation. CCM only requires automated longitudinal control such as Adaptive Cruise Control (ACC) and information sharing among vehicles, and ACC is already commercially available on many new vehicles. Also, it does not need 100% ACC penetration, presenting itself as a promising and practical solution for improving traffic operations in lane reduction transition areas such as highway work zones.« less
  5. Internet of Vehicles (IoV) in 5G is regarded as a backbone for intelligent transportation system in smart city, where vehicles are expected to communicate with drivers, with road-side wireless infrastructure, with other vehicles, with traffic signals and different city infrastructure using vehicle-to-vehicle (V2V) and/or vehicle-to-infrastructure (V2I) communications. In IoV, the network topology changes based on drivers' destination, intent or vehicles' movements and road structure on which the vehicles travel. In IoV, vehicles are assumed to be equipped with computing devices to process data, storage devices to store data and communication devices to communicate with other vehicles or with roadside infrastructuremore »(RSI). It is vital to authenticate data in IoV to make sure that legitimate data is being propagated in IoV. Thus, security stands as a vital factor in IoV. The existing literature contains some limitations for robust security in IoV such as high delay introduced by security algorithms, security without privacy, unreliable security and reduced overall communication efficiency. To address these issues, this paper proposes the Elliptic Curve Cryptography (ECC) based Ant Colony Optimization Ad hoc On-demand Distance Vector (ACO-AODV) routing protocol which avoids suspicious vehicles during message dissemination in IoV. Specifically, our proposed protocol comprises three components: i) certificate authority (CA) which maps vehicle's publicly available info such as number plates with cryptographic keys using ECC; ii) malicious vehicle (MV) detection algorithm which works based on trust level calculated using status message interactions; and iii) secure optimal path selection in an adaptive manner based on the intent of communications using ACO-AODV that avoids malicious vehicles. Experimental results illustrate that the proposed approach provides better results than the existing approaches.« less