ITM Challenges and Approaches
ITM Challenges and Approaches
fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2339817, IEEE Communications Surveys & Tutorials
MANUSCRIPT SUBMITTED TO IEEE COMMUNICATIONS SURVEYS & TUTORIALS
Abstract—The growing size of cities and increasing population a tremendous growth. One major consequence of this in-
mobility have determined a rapid increase in the number of crease is related to management problems that range from
vehicles on the roads, which has resulted in many challenges traffic congestion control to driving safety and environmental
for road traffic management authorities in relation to traffic
congestion, accidents and air pollution. Over the recent years, impact. Over recent years, researchers from both industry
researchers from both industry and academia were focusing their and academia were focusing their efforts on leveraging the
efforts on exploiting the advances in sensing, communication advances in wireless sensing equipment and communication
and dynamic adaptive technologies to make the existing road technologies, along with simulation and modeling tools to
Traffic Management Systems (TMS) more efficient to cope with make the existing road TMS more efficient, enabling them to
the above issues in future smart cities. However, these efforts
are still insufficient to build a reliable and secure TMS that cope with the above issues in future smart cities. One of the
can handle the foreseeable rise of population and vehicles in most critical consequence of traffic congestion is the delay of
smart cities. In this survey, we present an up to date review of emergency services, such as police, fire and rescue operations,
the different technologies used in the different phases involved medical services, etc. Indeed, very often individual human
in a TMS, and discuss the potential use of smart cars and lives, general population safety and institutional economic or
social media to enable fast and more accurate traffic congestion
detection and mitigation. We also provide a thorough study financial situation in case of incidents, robberies or criminal
of the security threats that may jeopardize the efficiency of attacks highly depend on the efficiency and timely response
the TMS and endanger drivers’ lives. Furthermore, the most of emergency vehicle services. Additionally, recent road traffic
significant and recent European and worldwide projects dealing statistics reveal another extremely serious concern which is the
with traffic congestion issues are briefly discussed to highlight increasing number of vehicle crashes. These crashes usually
their contribution to the advancement of smart transportation.
Finally, we discuss some open challenges and present our own happen in the areas around congested roads as the drivers tend
vision to develop robust TMSs for future smart cities. to drive faster, before or after encountering congestions, in
order to compensate for the experienced delay. The negative
Index Terms—Traffic Management System (TMS), Smart
Cities, Smart Transportation, Data Sensing and Gathering, consequences of these accidents are many, at personal, group
VANETs, Route Planning, Traffic prediction. and societal levels, and could be exacerbated if emergency
vehicles are involved in a crash.
I. I NTRODUCTION However, most large cities in the world are still suffering
MART cities is a label that is associated with a significant from traffic congestion, despite employing different solutions
S paradigm shift of interest towards proposing and using
various innovative technologies to make cities ”smarter” in
to reduce it, including using TMSs deploying advanced con-
gestion control mechanisms. In order to best contribute to
order to improve the people’s quality of life. As a very impor- the ongoing efforts to solve the traffic congestion problem
tant and highly visible initiative, the European Commission or at least reduce its impact, there is a need to understand
has launched the European Initiative on Smart Cities in 2010 the different types of congestion and their impact. Two major
[1] that addresses four dimensions of the city: buildings, types of congestion can be distinguished: recurrent and non-
heating and cooling systems, electricity and transport. Strictly recurrent. Recurrent congestion usually occurs when a large
related to transportation, the goal is to identify and support number of vehicles use the limited space of the road network
sustainable forms of transportation, to build intelligent public simultaneously (e.g. weekday morning and afternoon peak
transportation systems based on real-time information, Traffic hours). Non-recurrent congestion mainly results from random
Management Systems (TMS) for congestion avoidance, safety events such as traffic incidents (e.g. car crash or a stalled
and green applications (e.g. to reduce fuel consumption, gas vehicle), work zones, bad weather conditions and some special
emissions or energy consumption). events like sport events, Christmas, etc. According to recent
In this context, it is worth noting that the number of statistics (http://www.transport2012.org), road traffic conges-
cars using the limited road network infrastructure has seen tion costs billions to the world economy. For instance losses
have reached:
Soufiene Djahel and John Murphy are with Performance Engineering
Laboratory, University College Dublin, Ireland. • 200 e billions in Europe (2% of GDP)
Ronan Doolan and Gabriel-Miro Muntean are with Performance Engi- • $101 billion in USA
neering Laboratory, Dublin City University, Ireland.
Manuscript received November 2013. Aggregate delays of 4.8 billion hours were experienced
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2339817, IEEE Communications Surveys & Tutorials
MANUSCRIPT SUBMITTED TO IEEE COMMUNICATIONS SURVEYS & TUTORIALS
and 1.9 billion gallons of fuel were wasted worldwide. These address the Data Sensing and Gathering phase with a brief
statistics give a clear indication of the devastating impact that description of the different technologies used for road traffic
congestion has on individuals, companies (e.g. freight and and events monitoring, and discuss alternative technologies
transport companies, etc.) and society. that may improve the quality and accuracy of the collected
Unfortunately, to date the existing TMSs do not provide data. Afterwards, we discuss Data Fusion, Processing and Ag-
sufficient and accurate road traffic information to enable gregation techniques, followed by a description of the services
granular and timely monitoring and management of the road that a TMS may provide based on the collected and fused
traffic network. Some of the reasons include: lack of granular data, including short term traffic prediction information, route
data collection, inability to meaningfully aggregate much of planning and parking management information, in sections
the data collected, and a lack of complex management systems IV and V, respectively. In section VI, we investigate the
capable of providing accurate views of the road transport different routing approaches used in VANETs to exchange
network. This inability to effectively monitor and manage the collected road traffic information among the vehicles, the
the traffic maintains traffic congestion high, which in turn beacon congestion problem in IEEE 802.11p as well as the
affects road safety (i.e. increases the number of death on simulation tools used for traffic and VANET-based application
the roads), augments fuel consumption and causes large gas simulation. Subsequently, we show how smart vehicles may
emissions. The main solutions used by the existing TMSs significantly improve the efficiency of current TMSs, in section
to manage the traffic after an incident or during peak hours VII. In section VIII, we discuss the different threats that may
is changing/adapting traffic lights cycles, closing road lanes jeopardize the security and privacy of TMSs. In section IX, we
and intersections, etc. These solutions have limited efficiency present the major international projects aiming at improving
when the increasing number of cars are using the limited the different aspects of future TMSs. In the final sections, our
road infrastructure and constantly new solutions to be used vision on open challenges is discussed and this survey paper
by TMSs are being proposed by the research community. is concluded.
This survey paper provides a comprehensive study of the
solutions employed by existing TMSs, by looking at the
different phases of a modern TMS in a smart city environment,
II. OVERVIEW OF F UTURE T RAFFIC M ANAGEMENT
from information gathering to service delivery. In particular
S YSTEMS
the paper discusses the Data Sensing and Gathering (DSG)
phase in which heterogeneous road monitoring equipment A Traffic Management System (TMS) offers capabilities
measure traffic parameters (such as traffic volume, speed and that can potentially be used to reduce road traffic congestion,
road segments occupancy, etc.), and periodically report these improve response time to incidents, and ensure a better travel
readings to a management entity. These monitoring tools can experience for commuters. A typical TMS consists of a set
detect random incidents and immediately report them through of complementary phases, as shown in Figure 1, each of
broadband wireless networks, cellular networks or mobile which plays a specific role in ensuring efficient monitoring
sensing applications. As these data feeds are fused and aggre- and control of the traffic flow in the city. The cornerstone
gated during the Data Fusion, Processing and Aggregation phase of a TMS is Data Sensing and Gathering (DSG)
(DFPA) phase to extract useful traffic information, the paper in which heterogeneous road monitoring equipment measure
analyses this phase in detail. The Data Exploitation (DE) traffic parameters (such as traffic volumes, speed and road
phase uses the acquired knowledge from the data processing segments occupancy, etc.), and periodically report these read-
phase to compute optimal routes for the vehicles, short-term ings to a central entity. For example, these monitoring tools
traffic forecasts, and various other road traffic statistics. Finally can detect random incidents and immediately report them
in the Service Delivery (SD) phase, the TMS delivers this through wireless networks, cellular networks or mobile sensing
knowledge to the end users (such as drivers, authorities, applications. Subsequently, these data feeds are fused and ag-
private companies, etc.) using a variety of devices such as gregated during the Data Fusion, Processing and Aggregation
smart phones, vehicle on-board units, etc. Moreover, the paper (DFPA) phase to extract useful traffic information. The next
investigates the advantages of using alternative approaches, phase, Data Exploitation (DE), uses this acquired knowledge
such as mobile sensing and social media, to improve TMS’s from the processed data to compute: optimal routes for the
efficiency and accuracy. This survey also discusses the security vehicles, short term traffic forecasts, and various other road
attacks that may threaten the integrity of traffic data, leading traffic statistics. Finally in the Service Delivery (SD) phase,
to non-optimal and incorrect decisions taken by the TMS in the TMS delivers this knowledge to the end users (such as
relation to the detected/reported incidents. Furthermore, the drivers, authorities, private companies, etc.) using a variety of
most significant and recent projects trying to address traffic devices such as smart phones, vehicles’ on-board units, etc.
congestion are briefly discussed, highlighting their contribu- The capabilities offered by a TMS are not confined to serve
tion to the advancement of TMS. Finally, open challenges are drivers and road authorities only, but can also contribute signif-
noted and the authors’ vision on robust TMS development for icantly to the economic growth of a country, to the preservation
future smart cities is presented. of citizens’ safety and to the support of national security. The
The remainder of this paper is organized as follows. In the currently deployed technologies for road traffic surveillance
next section, we give an overview of future TMSs, highlighting still suffer from a lack of traffic parameters measurement
their important conceptual phases and design stages. Then, we accuracy and real-time report of events that occur on the roads,
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2339817, IEEE Communications Surveys & Tutorials
MANUSCRIPT SUBMITTED TO IEEE COMMUNICATIONS SURVEYS & TUTORIALS
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2339817, IEEE Communications Surveys & Tutorials
MANUSCRIPT SUBMITTED TO IEEE COMMUNICATIONS SURVEYS & TUTORIALS
heterogeneous sources. Many of the current deployed systems able to collect data from a specific region of interest under
used by traffic management agencies collect data in a variety specific time constraints, while minimising cost and spectrum
of formats, time scales, and granularity. This is due to the usage and maximising system utilisation.
fact that those systems have been deployed at different time
periods with little or no integration between them. This creates A. Wireless Sensor Networks (WSNs)
a management problem for operators whom must manage,
Due to their high efficiency and accuracy in sensing the
analyse and interpret all of this dissimilar data. A modern
different events, wireless sensors have been widely deployed
TMS will analyse a number of the existing traffic informa-
in various environments for data collection and monitoring
tion collection mechanisms employed by city authorities and
purposes [76], [77]. Indeed, it is foreseen that WSNs can
identify where new technologies and systems can be used to
enable several applications that may significantly improve the
improve the accuracy, timeliness and cost efficiency of data
control of road traffic flow and ease its management, examples
collection. In addition, these new data collection technologies
of these applications are the real-time control of traffic lights
must provide a more informed explanation of the root causes
[73] and their adaptation according to the congestion level
behind the increasing congestion levels on the roads. More
[74], as well as parking spaces management [72]. However,
specifically, the current trends in TMS development consist in
the deployment of wireless sensors in the road environment to
leveraging advanced communication and sensing technologies
realize these applications face several challenges, in addition
like Wireless Sensor Networks (WSNs), cellular networks,
to the well-known issues in WSNs [75], that require careful
mobile sensing and social media feeds as potential solutions
consideration and design of appropriate protocols. Among
to circumvent the limitation of the existing systems.
these challenges, we highlight the need of a fast and reliable
The main wireless technology used for events sensing and MAC access protocol [31] and data forwarding mechanisms
gathering on the roads is the tiny sensor devices. These sensors to guarantee timely transmission of critical messages carrying
could be mounted on vehicles, at the roadside or under the information about the occurred emergency events on the road.
road pavement to sense and report different events. In the An example of WSNs deployment for road traffic monitoring
former case, the in-vehicles embedded sensors monitor and is shown in Figure 3.
measure several parameters related to the vehicle operations It is also worth mentioning that the expected wide and dense
and communicate them to the nearby vehicles or roadside deployment of wireless sensors on the roads necessitates the
units. In the latter cases, the sensors are mainly used to design of robust data aggregation techniques to deal with the
measure the passing vehicles’ speed, the traffic volumes as high redundancy and correlation of the transmitted informa-
well other environmental parameters. WSNs can be used to tion, especially from neighboring sensors, as the redundant
interconnect these sensors and greatly reduce the cost of transmission of this information may lead to quick depletion
monitoring systems deployment. In an urban scenario, we can of sensors battery, increase the delay of emergency messages,
imagine a plethora of sensors being deployed to collect data as well as the collision rate. To reduce traffic data redundancy,
about traffic conditions, air pollution, environmental noise and the optimal placement of wireless sensors on road networks
many other applications. Information can also be obtained should be investigated and a trade-off solution between the
from vehicles that have proper sensors and communication number of sensors deployed in a specific area, and road events
antennas on board; these would primarily be public transporta- detection and accuracy should be designed. The spatial and
tion vehicles, taxis, police cars, and freight vehicles. A modern temporal correlation of traffic data are intrinsic characteristics
TMS will, therefore, focus on designing innovative solutions of road networks, which can be leveraged to solve both sensor
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2339817, IEEE Communications Surveys & Tutorials
MANUSCRIPT SUBMITTED TO IEEE COMMUNICATIONS SURVEYS & TUTORIALS
data aggregation and optimal sensors placement problems in reporting of incidents and accurate travel time estimation for
future smart cities. improving commuters travel experience. The key enabler of
the widespread of mobile sensing applications, mainly for
B. Machine to Machine (M2M) communication traffic monitoring purposes, is the voluntary participation of
the users. These users demand high level of privacy, anonymity
A key technology that is a promising solution for reliable
and security guarantees in order to participate to such a system.
and fast traffic data monitoring and collection is Machine to
Indeed, these requirements constitute major concerns that need
Machine (M2M) communication. The M2M technology has
to be carefully addressed to instigate larger participation of
recently attracted increasing attention from both academic and
mobile devices users to mobile sensing applications. These
industrial researchers aiming to foster its application for data
issues can be dealt with as discussed in the following to
collection in various environments. Recent forecasts [116],
mitigate their impact on the TMS efficiency and accuracy of
[117] indicate an outstanding market growth over the next few
its decisions.
years for M2M devices usage and connectivity. According to
• Trust management of mobile sensing data sources: how
these forecasts, billions of devices will be potentially able to
benefit from the M2M technology. The report published by to build a trust relationship with the mobile sensing data
the Organisation for Economic Co-operation and Development source? In this case, reputation systems, such as [144],
(OECD) in [118] reveals that around 5 billion mobile wireless need to be used to continually assess the level of trust-
devices are currently connected to mobile wireless sensor worthiness of each mobile sensing data source. A mobile
networks, and foresees that this number will grow to reach data source is deemed trustworthy if the information it
50 billion connected devices by the end of the decade. In has reported has been validated by either other mobile
M2M communication, a sensor gathers traffic data and sends sources or a trusted data source such as road-side sensors,
it via wireless communication/cellular/3G/LTE networks to- induction loops or CCTV cameras.
• Privacy preservation of mobile devices users: several
wards one or multiple central servers for processing purposes.
The ability of M2M devices to avoid the multi-hop trans- levels of privacy could be defined in the context of
mission, as opposed to WSNs, makes the data transmission smart cities, and users can adjust the setting of their
faster and more reliable, which represents a significant benefit devices to increase/decrease the privacy level according,
for the sensors reporting delay critical events. Moreover, it for example, to traffic conditions (e.g. normal driving con-
is foreseeable that this technology will significantly enhance ditions, traffic jam, incident ) and the service they need
the accuracy of data collection and lead to more flexible to request from the TMS (e.g. optimal/fastest route to
deployment of sensors on the roads. their destination). Therefore, adaptive privacy protection
M2M over LTE networks is expected to be a key aspect techniques that manage the users privacy preferences and
of future TMS. These M2M devices are equipped with access adapt the privacy level to the contextual factors in smart
technology capable of communicating in a reliable, fast and cities are required.
• Design robust authentication techniques to prevent any
extremely efficient way with the central entity that processes
and aggregates the collected data. Moreover, M2M solutions misuse of the system such as identity spoofing and fake
support different classes of QoS, thus they can efficiently alerts, etc.
collect prioritized data from multiple sources and ensure
that appropriate QoS is applied to each stream. The M2M D. Social media
technology provides an extremely attractive solution for data
In the context of smart cities, social media feeds, such as
collection in urban areas due to its management benefits in
Twitter and Facebook for instance, can play an important
terms of reduced data reporting delay, high efficiency, and
role in improving the accuracy and richness of the traffic
low complexity. However, deploying M2M devices as an
information provided by the traditional monitoring equipment
alternative of WSNs technology will incur an additional cost
such as road sensors and induction loops. Despite the fact that
related to the use of cellular/3G/LTE networks. Therefore,
these pieces of equipment can measure the vehicles’ speed and
this may hinder the wide deployment of M2M technology
road segments’ occupancy to enable the estimation of traffic
by city traffic managers, especially for cities with limited
congestion level, they are unable to identify the root event
financial resources, which is the case of the majority of cities
that has led to this situation. [70] has shown that relying
in developing countries.
on social media feeds, in addition to the traditional data
sources, can significantly enrich the real-time perception of
C. Mobile sensing traffic conditions in the cities, and help to explain the reasons
In addition to the above data sources, mobile sensing behind the variation of the congestion level. Indeed, revealing
using mobile devices is expected to enable fast detection the real causes of the sudden increase of the congestion level
of events on the roads and enhance the accuracy of traffic (e.g. accident, road works, political or social protest etc) will
conditions monitoring. According to recent studies in [32] enable more appropriate reaction from the road authorities
and [33], mobile crowd-sensing systems have been recently to alleviate the impact of this situation. Therefore, there is
used to provide more accurate real-time traffic information on a need to deeply investigate [71] this traffic data source to
a large scale, using smart phones that enable services such enhance citizens’ quality of life and aid the traffic authorities
as, accurate localization of vehicles, faster and more precise for efficient management of the increasing number of cars.
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2339817, IEEE Communications Surveys & Tutorials
MANUSCRIPT SUBMITTED TO IEEE COMMUNICATIONS SURVEYS & TUTORIALS
Figure 3: Scenario illustrating wireless technology deployment in road environment for data sensing and gathering
In order to maximize the benefits of using this novel traffic of data and the content accuracy. At least an indication of the
data source, we need to raise the citizens awareness to its level of trust in the data is required to be present in order for
utility. Applying a reward system, for example, to encourage any further processing to make use of it in an informed manner.
the citizens to use social networks to report accidents and un- To this end, some recent efforts have been devoted to design
usual events that occur in the roads is highly recommended. In robust security and privacy preservation solutions. In [138],
this case, any citizen who reports an authentic emergency/non the authors have investigated the various hacking techniques
emergency event will get a reward which will increase their that may threaten the reliability of such data sources, and
rank among road users. Higher ranked users could get higher presented potential mitigation methods. This paper highlights
quality of service from the TMS. For example, when they the dangers incurred by poor security, such as identity theft
sign up to the TMS to plan a trip they will get the route and corporate espionage etc, and proposes novel architecture
that satisfies all their requirements, while other drivers may to mainly improve the security of personal data. On the other
just get a route that satisfies a subset of their preferences. hand, [139] has shown the potential security and privacy
Using social media feeds may also assist the road authorities challenges that may arise as a consequence of the emergence
for better planning of road networks expansion, as well as of MMSN (Multimedia-oriented Mobile Social Network) con-
optimal road signs placement and speed limits setting. This is cept. MMSN is a new social media application in which users
feasible by analyzing the citizens’ feedback, including drivers in the vicinity share useful multimedia content of interest, such
and pedestrians, which may significantly improve traffic flow as road traffic information etc. However, this application may
control and improve road safety. create new security threats such as privacy disclosure. The
authors presented three MMSN applications emphasising their
However, at the same time, there is a need to verify the
corresponding security and privacy problems, and discussed a
accuracy of the data acquired from such poorly reliable sources
set of solutions to face those threats. The studied applications
of information. Mechanisms are needed to be proposed and
were mainly content query, service evaluation, and content
deployed which best balance the need for fast information
filtering. In addition to the above works, other researchers
propagation with validation and verification of both the source
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2339817, IEEE Communications Surveys & Tutorials
MANUSCRIPT SUBMITTED TO IEEE COMMUNICATIONS SURVEYS & TUTORIALS
have also thoroughly investigated privacy concerns and trust describes the data concepts for traffic data, metadata, network
management issues in social networks such as [148], [149] devices and events. Moreover, IBM Intelligent transportation
and [147]. product uses TMDD standard to ease interfacing with Traffic
Management Centers and Advanced Traffic Management Sys-
tems (ATMS). The aim of the TMDD standard is to provide
IV. DATA F USION , P ROCESSING AND AGGREGATION
a standards-based, high-level definition in a protocol indepen-
T ECHNIQUES
dent manner, with which a system specification interface can
Although there are a large number of systems currently be prepared. Besides its main purpose, which is supporting
employed for road traffic monitoring, there is very little traffic management applications, all ITS practical areas can
integration between these systems and in most cases the data benefit from TMDD format such as for emergency situation
from each system has different types, formats and metadata. management, products shipment and travel information for
Much of the data is also of different time scales and levels communication needs.
of granularity. During the DFPA phase of TMS numerous The ultimate objective of the introduction of TMDD stan-
techniques are applied to combine these heterogeneous data dard and the development of data fusion and integration
sources to produce unified metrics that can be processed and techniques is to simplify and automate data collection from
delivered to various consumers based on their requirements. existing and future systems, and reduce data aggregation and
A modern TMS should enable the real-time aggregation of conversion delay and complexity in order to improve the
these high volume data sets from a plethora of heterogeneous overall system efficiency. To this end, recent research studies
sources. It will also store this data over long periods of time have designed innovative techniques to ensure efficient fusion
to perform statistical analysis, which can be further used to and integration of the traffic data gathered from heterogeneous
better plan and deploy changes/upgrades to the transportation road monitoring equipment. A snapshot of these recent works
network. This will enable the system to combine the various is given below.
traffic measurements produced by existing traffic systems - The authors of [99] have developed a technique to improve
such as induction loop counters, CCTV cameras and cellular the quality of detector data which is combined with Floating
handover information - to monitor and manage traffic flow car data (FCD). It is acknowledged that discovering the
within the city. dynamic properties of the traffic is a difficult task due to
The main steps involved in DFPA phase are summarized in the sparseness of induction loops and low penetration rates
Figure 4 which describes the processing flow of the data and of vehicles transmitting FCD. To overcome this issue, the
what are the different issues that this phase deals with. After authors have used conventional spatio-temporal interpolation
receiving the gathered data, the DFPA engine applies cleansing to determine fine structures, such as stop and go waves from
and verification techniques to identify incorrect, inaccurate the collected data. Moreover, interpolation can also be used to
and incomplete data and either correct or remove them. compensate for detector failure. The efficiency of this approach
Afterwards, these data will be prepared to the fusion phase has been evaluated using real traffic dataset collected from the
by resolving time synchronization issues and exploiting the roads of Birmingham which are known by the high penetration
geographical correlation of these data to further reduce their rate of induction loops.
amount or extract new knowledge. Subsequently, the chosen A more recent technique has been proposed in [100], where
fusion algorithm is thus applied to integrate the different set ASDA (Automatische Staudynamikanalyse: Automatic Track-
of data into a consistent, accurate and valuable representation ing of Moving Jams)/FOTO (Forecasting of traffic objects)
of the road network traffic. The output of this phase will model has been applied to process induction loops data, and
be then transmitted to the core TMS system and samples of then fuse the resulting data with FCD. Both of these datasets
the forwarded data will be stored for future aggregation and are processed to determine traffic state changes (e.g. from
redundancy removal purposes. free flow to congested flow, stopped to congested flow etc).
In order to enable the TMS to scale to larger cities, the de- Subsequently, they are fused to construct a spatiotemporal
ployed techniques must be capable of aggregating traffic data map of the traffic state changes. This work has shown that
feeds from various levels and at various levels of granularity. a probe vehicles penetration rate of 1.5 % has yielded a very
For example, a modern TMS will investigate how traffic feeds similar model to detectors deployed at every 1-2km, hence the
can be aggregated and filtered for specific geographic regions assertion is that now they can be easily combined, resulting in
before being passed to the core system. This reduces the a more efficient traffic model than the original ASDA /FOTO
amount of information processing and filtering that is required model.
at the core, and will allow the system to scale and evolve over Fuzzy rough set theory has been also used in [101] to
time and to be deployed to cover increasingly large geographic fuse heterogeneous traffic data feeds, each of which can often
regions. yield contradictory evidence. By using this theory, a significant
Due to the heterogeneity of the collected traffic data for- reduction of the redundant data can be achieved. In addition,
mats, a common data format is required to enable high level a novel fusion technique based on Yagers formula [105] has
management and processing of the aggregated data. IBM been developed to rank the different data sources. Furthermore,
intelligent transportation product, for example, uses the Traffic the maximum fuzzy probability function is applied for the
Management Data Dictionary (TMDD) standard developed by different datasets to avoid the subjective factor effect. It is
the Institute of Transportation Engineers (ITE). This standard worthwhile to notice that this work is different from the two
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2339817, IEEE Communications Surveys & Tutorials
MANUSCRIPT SUBMITTED TO IEEE COMMUNICATIONS SURVEYS & TUTORIALS
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2339817, IEEE Communications Surveys & Tutorials
MANUSCRIPT SUBMITTED TO IEEE COMMUNICATIONS SURVEYS & TUTORIALS
Figure 5: Overview of traffic prediction system and its impact on TMS efficiency
use a combination of simulation, traffic modelling, real-time concerns that may arise as consequence of the sensitivity of
feeds and historical data to predict how the traffic situation some used data feeds such as social media and GPS data are
will evolve in the near future. These techniques may also also covered.
leverage some properties of the road network such as the Designing effective tools for fast, scalable and accurate
spatio-temporal correlation for faster inference of traffic jam, road traffic prediction is a key solution to overcome the
as well as other techniques as discussed above. The typical weaknesses of the existing TMSs. The fast prediction allows
outputs of a prediction algorithm are the traffic forecast and the the traffic managers to take early actions to control the traffic
identification of the bottlenecks. Moreover, it can also explore load and prevent the congestion state. Fast and accurate road
a set of what-if scenarios through simulation to infer the traffic prediction is a paramount technique to enable better
impact of random incidents on the expected traffic conditions, efficiency of TMSs and mitigate the awful impact of road
and therefore more informed decisions will be taken in case of traffic congestion. However, most of prediction algorithms are
real incident. These decisions may involve adjusting the traffic likely to combine historical data with real-time traffic feeds,
signal timing, the message signs as well as closing some road and apply some advanced and complex modelling approaches
lanes or changing the driving rules. to predict the future traffic state, as discussed earlier in this
A comprehensive comparison of the major traffic prediction section. Therefore, the legacy simulation approaches are not
approaches in the literature is provided in Table III. Those suitable in this case and distributed simulation is required
approaches are compared based on their achieved prediction to allow fast and accurate reaction to the change in traffic
accuracy, their scalability level when applied to large scale congestion in order to mitigate its consequences. The main
road networks, the modelling technique used (i.e. parametric or advantages of fast road traffic simulation are summarized
non-parametric), the road environment in which the forecast- below:
ing approach is applied (i.e. highway or urban area). Moreover,
we also considered the type of traffic data source, meaning • Enable more accurate recommendations from the TMS to
whether the prediction is based on data collected from fixed police men regulating traffic at a junction, especially after
monitoring equipment, such as sensors and CCTV cameras, an incident or during special events. Indeed, after an ac-
or using mobile data sources such as floating GPS data and cident it is a hard task for a human to take the optimal ac-
SMS, social data feeds etc. This metric is very important tion that mitigates other problems (i.e. accidents, increase
as the heterogeneity of data sources and the variety of their the congestion, block other roads etc). Hence, adequate
format and level of granularity may add extra constraints on recommendations to traffic authorities, for example in the
the designed prediction algorithm, and may also affect its effi- case of an accident what are the optimal lanes to close
ciency and accuracy. Since some prediction techniques impose to ease traffic congestion?, are needed. This would be
some constraints on the quality, type and format of the used based upon exploring the entire solution space (i.e. what-
data feeds in order to ensure high level of accuracy we have if scenarios) to achieve a reasonably optimal solution.
also addressed this metric. Finally, the privacy and security Therefore, this requires extremely fast simulation tools to
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2339817, IEEE Communications Surveys & Tutorials
MANUSCRIPT SUBMITTED TO IEEE COMMUNICATIONS SURVEYS & TUTORIALS
provide the optimal recommendation within a very short finds the fastest and most reliable route with less computation
time-frame. complexity is, therefore, required. The reliability of the route
• Enable faster and more efficient emergency service deliv- in this context refers to the probability that no abnormal delay
ery (i.e. ambulance, police and fire fighters cars) which occurs on any link constructing the fastest route during the
significantly reduces the incurred financial loss and save vehicle journey, as stated in [97].
human lives. Here, fast simulation allows the traffic In addition to the travel time, other criteria such as, the
authorities to detect the traffic bottlenecks in advance and length of the best route, its cost and its associated level of
take effective actions to prevent them. driving easiness and risk are considered by some drivers due
• Enable better load balancing of the traffic over the road to their specific needs. The cost of the route is computed
networks infrastructure, which decreases the traffic con- in terms of the fuel consumption level and the number of
gestion and its economic and environmental impact as toll tags included in this route. The fuel consumption is
well as improve road safety. highly dependent on the traffic conditions as well as the road
conditions measured in terms of the roughness and the gradient
of the road segments of the chosen route [98]. The easiness
B. Route planning
of driving varies according to the number of turns, number of
The growing complexity of the big cities’ road networks traffic lights, lanes width and number of hills in the best route,
has led to an unprecedented expansion in the automotive and it could be an interesting criterion for elderly, new drivers
navigation systems market. These systems, such as TOMTOM and people with poor driving skills. Finally, the level of risk
[130] and GARMIN [131], have made the journey of drivers of a route is calculated based on historical statistics about the
easier and more comfortable due to the valuable information number and severity of accidents happened on a given route,
that they provide like the city roads map, GPS localisation and some drivers may prefer to avoid this route for safety
and the guided route towards the destination. Despite the purposes.
popularity of these systems, fast and accurate route search Although several dynamic routing algorithms have been
algorithms under the rapid and sudden variation of traffic proposed such as, [87] [88], and [89], many problems are
conditions are still required to accommodate the needs of still unresolved yet. A noteworthy problem in this context is
future smart and autonomous cars. As opposed to static routing how can we ensure better usage of the road infrastructure
algorithms used for shortest path finding in graph theory, while maintaining a reasonable satisfaction of the drivers
route planning algorithms must update the best route assigned preferences? Load balancing mechanisms based on centralized
to each vehicle as soon as any change in road and traffic system architecture are more appropriate in this case, but guar-
conditions that affect at least one road segment that this vehicle anteeing their efficiency is another challenge, especially during
should pass through is detected [30], [145], [146]. the peak hours. We foresee, then, that managing efficiently
A typical dynamic route planning algorithm for smart cars is the growing number of vehicles in smart cities necessitates a
described in Figure 6. This figure emphasizes the main inputs mix of centralized and distributed system architectures through
of a dynamic routing algorithm, its output and the road events leveraging vehicular communication and mobile sensing infor-
that may trigger an update of this output. These inputs consist mation during the decision making process. For example, the
of the city road network modelled as a directed graph in order vehicle can combine the alternative route received from the
to reflect one and two ways road segments, the vehicle features system with the acquired information from the vehicles ahead
(e.g. its height, weight, type ), current traffic conditions and the to take more information decision about the alternative route
short term traffic forecasts, as well as the driver preferences. that it will follow. Moreover, the system can adapt the quality
By applying the routing algorithm on the directed graph and of the best route assigned to each vehicle according to the
taking into account all the other inputs, the best route is level of participation of the driver to mobile sensing process as
returned. This latter should be updated dynamically, during the well as the level of information disclosure. Consequently, this
vehicles journey upon occurrence of any event that may lead can help to achieve a balance of the traffic load and maintain
to the failure of a road segment included in this route. Notice adaptive satisfaction of the drivers. To get more insight into
that the failure of a road segment means its closure due to an the proposed approaches in the literature to improve route
incident or road works, or the abnormal increase of travel delay planning in smart cities, the reader may refer to the following
across it. Updating the best route means quickly providing an recent papers [43], [44], [45], [46], [47] and [48].
alternative route that mitigates the detected bottlenecks. One of
the challenges here is how to keep the quality of the alternative
route very close to that of the failed best route? C. Parking Management Systems
Usually, the best route depends on driver preferences which Another important service that results from data exploitation
may include one criterion or a combination of several criteria. is parking management which is foreseen to play a key role in
The travel time is the preferred criterion for most of the improving traffic congestion control and reducing its impact.
drivers due to the critical consequences of the delay. For To be more specific, an advanced parking management system
example, people may lose their job for recurrent late arrival at should be operating in tight cooperation with the prediction
work, companies may lose money for late delivery of goods and routing components of a TMS due to the fact that knowing
to their customers and injured people may lose their lives the volume of traffic heading towards a destination will give
due to the delay of emergency services. An algorithm that more insights about the expected demands on parking spots
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2339817, IEEE Communications Surveys & Tutorials
MANUSCRIPT SUBMITTED TO IEEE COMMUNICATIONS SURVEYS & TUTORIALS
Accuracy Scalability Parametric Application Data source Fixed-location Privacy & security
based techniques
in the near future. Therefore, the routing component may parking spots. The major consequences of this problem are
adapt the individual vehicles routes based on its awareness time wasted, increased cost for the journeys and especially,
of the available parking spots in an urban area, such that the increase of the congestion level, as the drivers will
the traffic jam is mitigated and the usage of parking spots occupy the limited road infrastructure for longer time than
is optimized. Figure 7 illustrates a scenario in which the was expected. Therefore, developing efficient solutions for
parking management system regularly reports the available parking management and smart phone based applications (e.g.
parking spots to the routing component in order to increase its ParkYa [133] application developed in Ireland and parkinglook
awareness of parking availability. Then, the routing component [134] in Australia) that signpost parking locations and provide
combines this information with the traffic forecasts reported real-time information about spot availability to drivers will
by the prediction component, and adapts the routing decisions certainly alleviate the traffic load on the roads and enhance
accordingly, in order to achieve a global traffic load balance the TMS effectiveness. In order to contribute to the ongoing
and maximize the usage of available parking spaces. To this efforts aiming at making smart cities happen, worldsensing
end, the routing component may request the parking manage- [135] has developed a green and self-sustainable smart parking
ment system to adjust the number of free spots to be advertised solution named Fastprk which makes use of M2M technology
through its mobile applications in accordance with the routing to ensure real-time monitoring of available parking spaces.
objectives to direct the drivers, for example, towards a specific Fastprk has proven its efficiency through the success achieved
parking in a given area such that the occurrence of traffic jam in the city of Moscow, known by its heavy traffic congestion,
is mitigated. where Worldsensing has deployed a huge number of parking
Nowadays, finding an available parking spot is becoming a monitoring sensors (approximately 15,000) to provide both
difficult problem for car drivers. Usually long time is spent end users and city council authority with real-time information
looking for available parking places, especially in big cities. regarding parking space occupancy. This solution allows the
Often taking public transportation rather than driving own users to find their parking places via electronic street signs
cars is the preferred option for many people. This problem or smart phone applications. Fastprk was shown to reduce
is mainly due to the lack of efficient parking management travel time and fuel consumption, by reducing the time and
systems that ensure early notification of the drivers about the distance driven to find a parking space. In addition to these
available spots as well as the limited number of available applications, other solutions are being investigated by the
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2339817, IEEE Communications Surveys & Tutorials
MANUSCRIPT SUBMITTED TO IEEE COMMUNICATIONS SURVEYS & TUTORIALS
research community such as sophisticated carpooling [136], Szczurek et al. [56] have proposed a machine learning
[137] and public transportation systems that may stimulate the algorithm for determining whether a given car park will have
citizens to use these alternative transportation modes, instead a space to park. In this system, when a vehicle leaves a
of driving their own cars. parking space, it sends a message over VANETs announcing
Most recently, many researchers have designed solutions to that a parking space has become available and specifies its
detect available parking spaces and share this information with corresponding coordinates. This work has shown a reduction
other cars, via V2V communication, within a specific area. in the time spent searching for a car park space of over 25%
Mathur et al. [49] have focused on urban on street-parking compared to a blind search.
availability and designed a mobile system named ParkNet It is well known that on street parking offers most car park-
that uses vehicles equipped with GPS receiver along with ing spaces in cities, which means that an efficient management
ultrasonic sensors to determine the parking spots occupancy of these spaces may lead to a substantial benefits for both
while passing by. Based on real data collected in San Fran- city and citizens. Unlike off-street parking lots where the car
cisco, ParkNet has proven an accuracy of more than 90% in park gate can be used as a sensor to assess the occupancy
determining the free parking spots. It would also achieve a level, a sensor per parking space is required to monitor and
cost saving of an estimated factor of 10 compared to static detect the availability of on street parking, which represents
sensors deployed at each street-parking place. a significant cost for their deployment. However, to reduce
Klappenecker et al. [50] have proposed a system to predict this cost, Evenepoel et al.[57] have proposed to deploy the
the number of available parking spaces when a vehicle reaches sensors on a fraction of on-street car park spaces only and
the parking. In this system, the parking ticket machine regu- then use extrapolation to infer the amount of cars parked in
larly communicates the number of available spaces to the ve- the entire city. A probabilistic model was devised to quantify
hicles upon arrival using Markov chain based estimation. This the reliability and efficiency of the proposed approach and the
system, however, doesn’t exploit the free spaces efficiently as obtained results were promising, as they show that ensuring
more than one vehicle may drive to the same parking spot as slightly less than 2 % of parking space coverage by sensors
described in [53]. To overcome this drawback, [53] proposes a would be optimal. Therefore, a significant reduction of the
reservation protocol that allows a vehicle to claim a spot when sensor deployment cost would be achieved. However, the main
it becomes free, thus an optimal use of the available spots is shortcoming of using so few sensors is that some drivers
guaranteed in this case. might be tempted to ”cheat” in order to guarantee easy and
Panayappan et al. [51] have proposed to deploy sensors on fast parking for themselves or their colleagues at work. For
the sides of each vehicle to detect the presence of any vehicle example, an employee may intentionally park on the parking
in the place next to it. This is a useful mechanism to prevent spot equipped with a sensor so that the road would appear full
abuse as the multiple cars and car park sensors will check to other users, whereas this is not the case.
whether the space is free. In the paper by Kokolaki et al. [52],
each vehicle gathers the location of each empty parking space VI. V EHICULAR N ETWORKING S UPPORT FOR DATA
and then forwards this over the ad-hoc network. This approach G ATHERING AND S ERVICE D ELIVERY
was compared with a non-assisted search and centralized In this section, we explore the different routing approaches
server approach. The VANETs based scheme didn’t always used in vehicular networks to disseminate the gathered data
outperform the centralized server but the paper highlights the among the vehicles as well as the information transmitted by
fact that the VANETs based scheme requires no additional the TMS or other service providers towards all the vehicles
infrastructure to be built, so it is a much more cost effective or a sub-set of them, discuss their advantages and disadvan-
solution. tages, and provide a comprehensive comparison of their main
A decentralized and scalable parking spots information features. We also address the challenging problem of beacon
system has been developed in [55] to inform the drivers congestion control in IEEE 802.11p MAC layer and briefly
about parking spots availability in an urban area. This system describe the pioneer works that have dealt with this issue.
makes use of VANETs to disseminate micro and macro park- Moreover, we outline the recent advances in simulation tools
ing information either locally or at large scale, respectively. for road traffic and VANETs based applications, and highlight
Micro information refers to free parking spots coordinated their main features and degree of realism.
by one automat while macro (i.e. aggregated) information
covers several parking within one urban area. This system
has shown high efficiency under realistic model of German A. Vehicular Ad-hoc Networks (VANETs)
city in which 5% of the vehicles, out of 10000, are equipped Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure
with wireless communication capabilities. To complement the (V2I) communications are expected to play a key role in the
previous work, Caliskan et al. [54] have developed a model development of TMS in smart cities. The efficiency of this
using homogenous Markov chains and queueing theory that type of communication depends on the reliability of the WAVE
estimates the future occupancy of parking spots located within system and mainly on IEEE 802.11p MAC protocol [40], in
the vehicle’s destination area at its arrival time. Based on the addition to the information dissemination (i.e. routing) pro-
parking information received through VANETs the vehicles tocols. In this section, we will present, classify and compare
apply this model to decide about its orientation to one of the the most significant protocols proposed to find the best route
available parking. for the exchanged packets among non-neighboring vehicles
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2339817, IEEE Communications Surveys & Tutorials
MANUSCRIPT SUBMITTED TO IEEE COMMUNICATIONS SURVEYS & TUTORIALS
in road network. Usually, these protocols use either the road the network infrastructure. Other nodes then set up a virtual
network map, the vehicles mobility model, both of them or location by judging their distance from those sink nodes. For
none of them to accurately determine an end to end connected efficient routing, a greedy geographic approach is used to route
route between the source and destination vehicles. Therefore, the exchanged messages among the nodes, and the evalua-
we classify these protocols, as shown in Figure 8, into four tion results have shown that this scheme outperforms GPSR
categories based on their awareness of these two parameters (Greedy perimeter Stateless Routing) in terms of energy-
(i.e. the map and mobility model), as described below. efficiency, path length and robustness.
1) Context-unaware routing protocols: these routing
In Location-Based Routing Algorithm with Cluster-Based
mechanisms do not take into account the road map and nor
Flooding (LORA CBF) [4], the cluster based flooding mech-
the predicted mobility of vehicles.
anism is used, where a number of gateways are chosen for
Greedy Perimeter Coordinator Routing (GPCR) [3] is a inter clusters communication, in addition to the cluster head.
position based routing protocol. It uses the fact that streets When a data packet needs to be sent, the sender first checks
and junctions form a natural planar graph. In this protocol, its routing table to find the location of the destination node.
messages are forwarded along the street with decisions only If this location is missing then a location request message is
taken at junctions. GPCR uses a repair strategy to get rid of broadcasted to the network. Upon reception of this request,
local minimums. This protocol does not require a static streets the destination node or any intermediate node, which has
map as it can heuristically detect the junctions on the road, fresh location information of the destination node, sends a
however it is not resilient to network partitioning that may location reply message to the source. The data packet is then
occur due to links loss. transmitted through this route. The hierarchical architecture
In the 3rule routing protocol [86], a set of sink nodes of LORA CBF leads to shorter route discovery time but the
aware of their location are deployed and configured to form overhead increases considerably [41].
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2339817, IEEE Communications Surveys & Tutorials
MANUSCRIPT SUBMITTED TO IEEE COMMUNICATIONS SURVEYS & TUTORIALS
Figure 8: A classification of VANETs routing protocols based on their awareness of the mobility model and the road map
DV-CAST [5] applies two different approaches according Other protocols in this category are Urban Multi-Hop
to the network connectivity, it uses the broadcast suppression Broadcast protocol(UMB) [8] which addresses the broadcast
technique in order to reduce the broadcast overhead in case storm and hidden nodes problem and ARBR [11] which uses
of a dense network, while a store-carry and forward method carry and forward scheme to overcome network fragmentation
is used in a sparse network. The network density level is issue.
determined based on the size of one-hop neighbors list. This 3) Mobility model-aware routing protocols: the following
protocol overcomes some of the previous protocols’ limitations routing mechanisms leverage the knowledge of vehicles’ mo-
as it reduces the broadcast storm and adapts its routing bility models for messages routing purposes.
approach to deal with network disconnection problem. Connectivity-Aware Routing (CAR) [12] uses a greedy
Broadcomm [13] is a fast routing protocol specifically forwarding approach with anchor points to find the route
designed for safety applications. It divides the highway into relaying origin-destination pairs. In CAR, the messages are
virtual cells which move along at the average highway speed. forwarded to the closest node to the next anchor point instead
At the center of each virtual cell, some nodes are designated of the closest node to the destination, and the location of
as cell reflectors which, in turn, act as virtual base stations. It this latter is tracked so that the route can be adjusted to
is worth mentioning that cell reflectors are similar to cluster provide connectivity even if the destination has moved a great
heads, except that several cell reflectors may co-exist within deal. Notice that the incorporation of CAR routing approach
one cell. The main weakness of this protocol is the high in GPSR has shown an improvement of the performance
incurred overhead. by 30%, however the main shortcoming of this protocol is
2) Map-aware routing protocols: in this category of rout- its inefficiency to handle different sub-paths under frequent
ing protocols, map information is a cornerstone for calculating topology changes.
the end to end path for a data packet. Predictive Directional Greedy Routing protocol (PDGR)
SADV [6] is an infrastructure based routing protocol that [14] routes the vehicles based on both their current and
presumes the existence of a static node (i.e. a Road-side Unit predicted positions. It applies a greedy strategy and forwards
(RSU)) at each junction. Each RSU has a digital street map the messages in the direction of the destination vehicle without
to determine which road presents the best trajectory. A data a predetermined route. PDGR considers both the position
packet waits at the RSU till a route to the next intersection and movement of a vehicle for forwarding decisions. It has
is established. This route is selected based on the delay been shown that PDGR outperforms GPSR in terms of delay,
estimation of each road in order to achieve a near optimal delivery ratio and overhead.
choice. SADV improves the packet delivery ratio and presents MUlti-hop Routing for Urban VANET (MURU) [18] is
an enabler for RSUs placement in road networks. another protocol that attempts to increase packet delivery ratio
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2339817, IEEE Communications Surveys & Tutorials
MANUSCRIPT SUBMITTED TO IEEE COMMUNICATIONS SURVEYS & TUTORIALS
through early detection of the broken links in the VANETs, Therefore, an ideal routing protocol for VANETs in the context
whereas Vector-based TRAcking DEtection (V-TRADE) [16] of smart cities should be aware of extra parameters, in addition
uses vehicles positions and directions to ensure more efficient to the mobility model and map, such as the shape of the roads,
routing. destination of other vehicles, channel interference level, etc.
4) Map and Mobility mode-aware routing protocols: This In the Table II, we compare the different routing ap-
class of protocols exploits both the road map and vehicles proaches presented above according to the following criteria:
mobility model to ensure a robust route for messages delivery the incurred communication and computation overhead, to
among vehicles. what extent the protocol is scalable?, the end-to-end delay
VADD (Vehicle-Assisted Data Delivery) [7] is designed of the transmitted packets, its efficiency in terms of packet
specifically to route data packets in sparse VANETs with delivery ratio, its resiliency to VANET fragmentation due to
frequent network fragmentation due to the high mobility of the high mobility of vehicles, whether its applicable in urban
vehicles. These packets will be transmitted over the routes with or highway scenarios or both of them, and finally whether it
shortest transmission delay. In case of network fragmentation, requires the help of the road-side infrastructure or not?.
the packet is forwarded to a vehicle that crosses the network In addition to the routing function, the media service in
partitions first and then forwards it towards the destination. VANETs has become a hot topic in recent years and several
VADD determines whether there is a direct route to the contributions have been proposed to enhance the efficiency
destination by analyzing the map of the area and the traffic of VANET applications and services. In [140], the authors
conditions around it. This protocol ensures higher delivery have addressed VANET-based entertainment services such as
ratio compared with GPSR [17] and DSR [2], as stated in [7]. video streaming, file sharing, mobile office and gaming etc.
However, a large delay may occur under varying topologies As noted in the paper, these services can make the drivers and
and vehicles density. passengers travel experience more pleasant, however a number
Inter-Vehicles Geocast (IVG) [21] is a safety based protocol of research challenges need to be overcome to make those
that broadcasts an alarm message to all the vehicles in a services efficient and robust. To this end, several challenges
given area if there is a danger. The vehicles are in the danger have been highlighted such as frequent network disconnection,
area if this danger is in front of them. In this case, these high mobility of vehicles etc. the authors discuss also the
vehicles constitute the multicast group that will receive the requirements that the existing channel access and resources
alarm message, then forward it in the backward direction. In management schemes in VANETs need to satisfy in order to
order to reduce the gratuitous alarm messages IVG takes into be suitable to support entertainment and safety applications.
account the braking distance before broadcasting this message. Another work [141] has focused on Video on Demand (VoD)
However, if the danger is immediate the alarm message is sent, services provided to vehicles using P2P networks. This work
regardless of this distance, to prevent crashes. proposes Quality oriented User centric VoD (QUVoD) de-
GVGrid [23] uses a reactive routing approach to construct signed specifically for vehicular networks. QUVoD introduces
a route from a fixed source node to another vehicle located a new grouping based storage strategy as well as a novel
within a specific geographic area. GVGrid divides the road speculation-based prefetching strategy. The simulation results
network map into a set of uniform squares and assume that of this work have proven its superior performance benefit in
each vehicle is equipped with a digital map and is aware comparison with the state of art solutions.
of its location and direction through GPS. This protocol
ensures route recovery in case of link break due to vehicles
mobility. GVGrid uses stop signs and highways with constant B. IEEE 802.11p congestion control
vehicles distance as prediction indicators for vehicles mobility Congestion control is probably the most challenging issue at
to enhance messages routing. MAC layer in VANETs [79] given the fact that IEEE 802.11 is
In addition to the above protocols, A-STAR [19] and Gy- well known by its scalability problem. The research commu-
TAR [22] have been also proposed in this category. A-STAR is nity has highlighted the importance of congestion control in
an Anchor-based Street and Traffic Aware routing protocol that VANETs, and the ETSI ITS framework [80], [81] has defined
combines street map and bus routes information to determine a set of mechanisms to deal with this issue such as data rate
the fastest path that exhibits higher connectivity. A-stars use of adaptation, transmission power control and beacons frequency
the right hand rule is inefficiently biased in one direction, as adjustment. However, these mechanisms are still inefficient
stated in [20]. The latter protocol, GyTAR, employs a greedy due to the characteristics of the control channel (CCH) [40] in
strategy that takes into account real-time traffic conditions and vehicular environment as well as the large number of vehicles
road topology, in addition to a recovery strategy to overcome unusually contend for channel access.
local optimum. Most of the proposed solutions to control the congestion in
To summarize, each of these routing protocol categories has VANETs focus on adjusting the transmission power [35], [82]
advantages and shortcomings and might be suitable for some used for broadcasting the beacons to prevent the congestion
road traffic scenarios and not applicable in others. Moreover, state or at least reduce its impact on the performance. However,
the awareness of vehicle mobility models and road network in some situations, this may cause an isolation of some
maps might not be sufficient to meet the requirements of safety vehicles when vehicles density decreases. This is because of
applications, especially in emergency scenarios where both fast the highly fluctuating topology of VANETs as the vehicles
and reliable dissemination of danger alerts are compulsory. move very fast and change their directions often. To take into
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2339817, IEEE Communications Surveys & Tutorials
MANUSCRIPT SUBMITTED TO IEEE COMMUNICATIONS SURVEYS & TUTORIALS
account this specific feature of VANETs, [83] has proposed to discreet-event network simulators, such as ns-2, ns-3, OP-
assign data rates based on the average utility of the messages NET, OMNet++ and QualNet, have been widely used by
transmitted by each vehicle. Thereby, vehicles transmitting the researchers to validate their ideas and approaches, they
information with a high utility (e.g. safety messages) for the cannot be used in ITS scenarios without an accurate vehicular
VANET are allowed to consume a larger part of the available mobility model. Moreover, if the ITS application influences
bandwidth. This scheme requires that the vehicles share the the behaviour/mobility of the vehicles then a real-time bidi-
information that allows to each of them to calculate its own rectional coupling of network and road traffic simulators is
data rate. Hence, the overhead incurred by the exchanged required [78]. To this end, some European research projects
messages may significantly reduce the available bandwidth, have recently developed platforms integrating both network
especially when the number of vehicles gets larger. and microscopic traffic simulators to improve the accuracy and
Data rate control [84] has been also proposed to deal realism of ITS solutions evaluation. The most known platforms
with MAC layer congestion in the ETSI ITS framework. are Veins [93] which is based on OMNeT++ and SUMO, and
The idea behind this adaptive mechanism is that a higher iTETRIS [91] that integrates NS-3 with SUMO.
data rate implies the message occupies the channel for a There are two major avenues for road traffic and IVC model-
smaller duration, thus allowing more transmissions to take ing and simulation. One approach, taken by macro simulators,
place. An important observation here is that the higher the considers the overall traffic flow modeling and simulation
data rate provided by a modulation, the higher the signal-to- on the road network, and no detailed level information and
interference ratio (SIR) required at the receiver side in order related input, output or processing (e.g. at vehicle level)
to correctly decode the message. Simulation studies (e.g. [84]) are being considered. The second avenue is taken by micro
have shown that the reception probability for geographically simulators, which simulate individual vehicles in the traffic
close vehicles is hardly affected and, in these conditions, systems. Vehicles are seen as important actors in the road
adjusting the data rate gives similar results with transmission network system and not only are mobile in this context, but
power control. Therefore, choosing the modulation based on also generate, process and sink network data traffic. In order to
the local vehicles density seems to be a promising solution in best address the current research and development needs, this
crowded environments like VANETs. section focuses on micro traffic simulators. A study conducted
Other works, such as [85] and [29], have proposed to in- between 2009 and 2011 on top level international conference
crease the bandwidth available for the CCH to reduce/mitigate papers [92] has identified the three most popular road traffic
the impact of congestion. In [29], the authors have proposed micro simulators used by the research and development com-
a cognitive radio technology based technique that allows the munity. The Simulation of Urban Mobility (SUMO) has been
vehicles to opportunistically use the detected holes in the reported as used by more than 20 % of the papers with a peak
primary users frequency spectrum in their neighbourhood. This of 30 % in 2010. The use of SUMO is almost constant, trend
extra bandwidth gained by the vehicles could be mainly used which continues today. In contrast, the dedicated vehicular
to ensure rapid transmission of alert messages in emergency network movement simulator VanetMobiSim, which has been
cases. Radio cognitive technology has been also applied in used in nearly 20 % of the publications surveyed in 2009,
the following works [37], [38], [42] and [39] to improve the has experienced a marginal use lately. VISSIM, which is a
reliability of safety applications in VANETs. In addition to commercial tool, maintained an average proportion of about
the above discussed works, the reader may refer to [27], [25], 6% during last three years. In meanwhile other micro traffic
[26], [34], [24], [24], and [36] to get a broader idea about the simulators have also been proposed and are being used by the
different solutions designed to mitigate the congestion problem research and development community focusing on vehicular
in VANETs. traffic modeling and simulations. Next most important of these
solutions are presented.
C. Current trends in road traffic and VANETs simulation In what follows, we will briefly discuss the most used
In June 2013, researchers from the Transportation Research road traffic simulation tools and applications in the research
Institute of University of Michigan have showcased V2V and community, and highlight their main features and limitations,
V2I communication demo [132], during which the vehicles as shown in Table III.
equipped with IEEE 802.11p communication technology were 1) SUMO: SUMO is an open-source traffic micro-simulator
able to exchange their position, speed and direction with designed to handle large road networks. Sumo was mainly
similarly equipped peers as well as with the roadside infras- developed by the Institute of Transport Systems at the German
tructure like traffic lights and tollbooths. This unprecedented Aerospace Center. SUMO allows for space-continuous and
real world vehicular communication experiment has involved time-discrete vehicle movement modeling and simulations.
2 800 vehicles of different types and shown that vehicular Some of the features include: different vehicle types, multi-
communication technology can play a key role for improving lane streets with lane changing support, different right-of-way
roads safety. Despite that, simulation remains one of the rules, traffic lights, etc. SUMO provides network-wide, edge-
strategic tools for evaluating the performance of the developed based, vehicle-based, and detector-based outputs. It has a fast
VANETs communication protocols and ITS applications due openGL graphical user interface, scales very well (i.e. tens
to the inaccessibility or the high cost of the resources needed of thousands of streets) and provides fast execution speed
(e.g. vehicles equipped with communication capabilities, road- (e.g. 100.000 vehicle updates/s on a 1GHz machine). It also
side units etc) to carry out real world tests. Although many supports interoperability with other applications at run-time.
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2339817, IEEE Communications Surveys & Tutorials
MANUSCRIPT SUBMITTED TO IEEE COMMUNICATIONS SURVEYS & TUTORIALS
Table II: Comparison of the main characteristics of the surveyed vehicular routing protocols
Characteristics
DV-CAST [5] Low Low High Low Medium Very High All No
SADV [6] Low Low Medium Medium Medium High Urban Yes
UMB [8] Medium Medium Medium High Medium Medium Urban Yes
ARBR [11] Low Medium Medium Medium High High Urban Yes
CAR [12] Medium Medium Medium Medium Medium Medium All Yes
BROADCOMM [13] High Low Medium Low Low Medium Highway Yes
GVGrid [23] Medium Medium Medium Medium Medium Medium Urban Yes
Sumo allows the user to import different sources such as the position of vehicles is calculated and updated regularly.
VISSIM and open street map. Sumo is coded in C++ [90]. VISSIM offers a high level of complexity in terms of display
2) iTETRIS: iTETRIS has opted for integrating two well- with both 2D and 3D views. VISSIM can be used to investigate
known and widely used open source simulation platforms. private and public transport including in particular pedestrian
SUMO (http://sumo.sourceforge.net) as an open-source mi- movements scenarios. The use of VISSIM is moderate with
croscopic traffic platform and Network Simulator 3 - NS3 roughly 6,000 individual PTV Vissim Licenses around the
(http://www.nsnam.org/) for wireless communications mod- world. There has also been roughly 3,800 downloads of the
eling and simulations. The capability to perform large-scale VISSIM demo in 2012 [95].
simulations and to support multi-radio/technology nodes was Additionally there are several applications which allow for
a key-parameter for the selection. iTETRIS resulted to have vehicular traffic modeling, simulations and analysis. Among
the best performance in terms of scalability [65]. these for instance SIDRA TRIP allows to compare travel
3) STRAW: STRAW (STreet RAndom Waypoint) is an conditions on alternative routes, to assess network traffic
open-source traffic simulator built by researchers at the performance, and to analyse vehicle movements and traffic
AquaLab at the Northwestern University, US. STRAW runs performance. It is based on collected GPS data inputted by
on top of the highly efficient JiST/SWANS discrete-event the user to form traffic traces, which are then used during
network simulator. STRAW includes a realistic mobility model simulation and analysis. SIDRA has quite a small user base
with very good level of details for vehicular networking compared with SUMO and VISSIM [96].
research. STRAW street topology modeling uses real life
TIGER street maps collected by the US Census Bureau. It
VII. S MART V EHICLES AND TMS I NTERACTION
includes streets whose structure allows for identification of
segments, ramps, intersections, etc. STRAW models vehicular Vehicular communication can play an essential role in
node movement including acceleration, deceleration, etc. The improving the efficiency of both data collection and TMS
mobility model addresses aspects such as vehicular congestion reaction to some circumstances or emergency events. Smart
and traffic control by deploying specialised mechanisms to vehicles are usually equipped with on board sensors that are
impose infrastructure limitations on the traffic flow [94]. able to detect both in-vehicle events as well as the surrounding
4) VISSIM: VISSIM is a microscopic, behaviour-based dis- traffic conditions. These inner events such as sudden decel-
crete event traffic simulation system modeling motorway and eration and airbag tripping are immediately reported to the
urban road traffic. Based on complex mathematical models, neighbouring vehicles and the Road-Side Units (RSUs). On
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2339817, IEEE Communications Surveys & Tutorials
MANUSCRIPT SUBMITTED TO IEEE COMMUNICATIONS SURVEYS & TUTORIALS
Table III: A summary of the main features and limitations of road traffic microscopic simulation tools and applications
Accuracy Time step of 1ms Time step of 1s Time step of 0.1s Time step of 1s
the other hand, the received events from other vehicles or approaching vehicles, in order to reduce their waiting time
road sensors are processed and reported similarly to the inner when they reach the intersection. In this case, the vehicles
ones. The gathered traffic data from smart vehicles are then are informed about the optimal speed which allows them to
analyzed and combined with other data feeds in order to speed cross the intersection without stopping. To achieve this goal,
up traffic congestion detection and improve the congestion the vehicles need to coordinate between each other to adjust
levels evaluation accuracy. In this context, these data need their current speed according to the speed advised by the
to be quickly disseminated with high transmission reliability, infrastructure. The purpose of the coordination between the
especially if it reports safety critical events. Thus, appropriate vehicles is to avoid collision when they adapt their speed
dissemination protocols are required. In what follows, we according to the information received from the traffic light
discuss a set of scenarios in which the interaction between controller.
the TMS and smart vehicles will significantly help to reduce One of the most critical consequences of traffic congestion
traffic congestion and improve roads safety. is the delay of emergency services, such as police intervention,
In the first scenario, we propose to investigate the possibility fire and rescue operations as well as medical services. This
of affecting/changing the cars behavior (e.g. speed, optimal scenario aims to reduce the latency of emergency services
route etc) and the driving policies (e.g. maximum speed, delivery by dynamically adjusting traffic lights, changing
minimum speed, reserved lanes etc) rather than only closing related driving policies, recommending behaviour change to
some road segments as proposed in the legacy systems. In this drivers, and applying essential security controls [28]. This
case, the cars need fast and accurate coordination when they will create green route for these vehicles and significantly
change lanes to temporarily use a lane which was reserved reduce their response time, which may save human lives and
for buses or slow cars, in order to prevent crashes. To this reduce the induced damage/loss in case of fire or robbery.
end, a real-time dissemination of lane change notification is a The TMS should be also able to control the behaviour of non-
must since lane change in this context may lead to collision if emergency vehicles to ensure minimum number (ideally zero)
more than one car move to the same lane simultaneously and of crashes, minimum disruption to the regular traffic flow, and
without coordination. Moreover, the road-side infrastructure satisfaction of security requirements to prevent any misuse of
may also make use of the information exchanged between the the system. To make this scenario viable and valuable in real
vehicles through the transmission of beacon messages. It will road environment, some specific actions should be taken by
then combine the content of these beacons (i.e. vehicle speed, both TMS and smart vehicles in addition to some requirements
position, heading etc) with the reported data from the road which should be satisfied, such as:
monitoring equipment, as shown in Figure 1, to speed up the • The traffic light controller is made aware of the approach
congestion detection and improve its accuracy, and thus the of an emergency car through a special message sent by
TMSs can take early actions to control the traffic congestion. this car towards the infrastructure when it approaches the
In the second scenario, we propose that the road-side intersection. Alternatively, if an induction loop system is
infrastructure (e.g. traffic light controller at an intersection) in place we can imagine that those cars are equipped
communicates the remaining time for the current traffic light with a special tag (hardware) to distinguish them from
cycle (i.e. to switch from green to red and vice versa) to the the other cars. Hence, whenever an emergency car passes
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2339817, IEEE Communications Surveys & Tutorials
MANUSCRIPT SUBMITTED TO IEEE COMMUNICATIONS SURVEYS & TUTORIALS
through the induction loop system this latter automati- and management, leading to an increasing number of vulner-
cally generates a special message to request the traffic abilities at several levels. For example, the use of wireless
light controller to switch to green or to extend the green sensors for data sensing and gathering may lead to several
light cycle till the emergency car crosses the intersection. attacks inherited from WSNs technology and wireless multi-
• Fast and reliable V2V and V2I communication protocols hop communication paradigm, which affects both the integrity
are needed to enable real-time interactions between the and quality of the collected traffic data. Moreover, leveraging
TMS and the smart vehicles. smart vehicles for spreading warning notifications about on-
• Adequate security mechanisms should be added to this roads emergency events may lead to severe consequences that
system to prevent its misuse by malicious cars that may range from increasing traffic jams to economic damages and
spoof the identity of an emergency car for different human lives loss in case of robbery or terrorist attacks. For
purposes. example, a vehicle advertising an accident in a given road
• The TMS should apply advanced decision-making so- segment not covered by visual monitoring equipment may
lutions to find alternative routes to divert the normal succeed to divert the traffic from this particular area in order
vehicles from the dangerous area in order to protect the to undertake a criminal act or just create traffic jam in the
drivers lives and ease the access for emergency vehicles. surrounding. Indeed, road transportation networks are very
These solutions must consider the real-time contextual attractive targets for criminals aiming to inflict big loss to
factors as well as the security requirements. the city and road authority, serious panic among population
An example of an adaptive TMS in emergency scenario is and create spectacular media images, as those networks are
depicted in Figure 9, in which the Local Traffic Controller usually used by large numbers of cars (drivers) at predictable
(TLC) uses the gathered information about the traffic condi- times in predictable places, especially in big cities.
tions to clear the way for the ambulance. This can be achieved Furthermore, traffic-aware or context-aware content security
by changing the traffic light cycles, and defining new driving has recently attracted a lot of attention from the research
policies and announcing them to the cars through the set of community and several issues have been identified in this
RSUs deployed along the roadside. regard. In [142], the authors revealed that VANETs can be an
easy target of indirect attacks through exploiting the sensors
VIII. S ECURITY T HREATS AGAINST TMS deployed for traffic information collection and reporting. A
Secure and highly efficient TMSs, which are responsible malicious user can, in this case, remove/drop certain sensor
for critical operations such as transportation infrastructures readings indicating traffic congestion in a given area, or
supervision and road traffic control, are essential to strengthen spoof the identity of some road traffic monitoring sensors and
the national security of any country in the world and support insert fake values indicating a traffic jam in road segments
its economic expansion since both governmental and private with low traffic, which may mislead other vehicles as well
companies rely on these infrastructures to successfully ac- as traffic controllers and lead to devastating consequences.
complish their daily operations. However, both TMSs and Besides these security threats, Sybil attack is another type
road infrastructures are vulnerable to a bunch of threats that of attacks very hard to detect especially in such highly dy-
range from environmental and accidental events to malicious namic environment like VANETs. To cope with it, data-centric
attacks, and may lead to sustained outages and wide disruption. misbehaviour detection schemes have been applied. The two
Advanced TMSs and Traveler Information Systems (TISs) main mechanisms used are consistency check and plausibility
exploit the technologies used by transportation infrastructures check. The former mechanism checks the consistency of traffic
to enable real-time collection and dissemination of information information reported by vehicles in the same area and finds
about traffic flow conditions and transit schedules, in order out any deviating values reported by either malicious or faulty
to decrease the congestion level and traffic incidents. Addi- nodes. The latter mechanism usually has a model of the real
tionally, TMSs may provide other services for public transit world used to check whether the reported values comply with
systems, commercial vehicle systems as well as emergency this model and thus detect any unrealistic values advertised
management systems. Any disruption of these services can by misbehaving vehicles. In addition to the above schemes,
lead to destructive impact on public safety and/or national [143] has proposed novel scheme to deal with malicious nodes
economy depending on the target system. These disruptions attempting to spread forged messages in VANETs for both
can be caused by hackers, terrorists, foreign enemies, or safety and non-safety applications. To this end, the bilinear
unauthorized users, and can be a consequence of power failure, pairing has been used to ensure fast and accurate verification of
natural disaster like a storm or tornado, or a telecommunication the authenticity of the messages content. This scheme assumes
outage. that each vehicle is equipped with a tamper-proof device. The
Despite the efforts of road and public authorities to rein- obtained results have proven its effectiveness and supremacy
force transportation systems security, they are still prone to over the existing solutions in the literature.
numerous threats that may target the critical road infrastructure As discussed above, TMS is vulnerable to numerous secu-
including the monitoring equipment, the connected smart rity attacks that exploit the vulnerabilities of the equipment and
vehicles system, the smartphones based ITS applications, or technologies involved in its operations. These attacks can be
the core of the TMS in order to bring it to halt. These categorized into three main categories according to the target
threats become more serious with the recent trends on in- entity. The first category concerns the attacks targeting the crit-
tegrating advanced technologies for road traffic surveillance ical road infrastructure through an unauthorized access to or
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2339817, IEEE Communications Surveys & Tutorials
MANUSCRIPT SUBMITTED TO IEEE COMMUNICATIONS SURVEYS & TUTORIALS
malicious misuse of the monitoring equipment such as wireless using smart phones as traffic probes for more accurate traffic
sensors, M2M devices and surveillance cameras. The second congestion estimation have raised a particular concern about
category consists of the attacks launched against the smart the privacy of the users. In the context of a TMS, the use
vehicles being used as source/destination of traffic information of smartphones entails also the risk that anyone can join the
by spreading forged information about traffic congestion level, system and start sending its location samples. This means
incidents etc. Finally, the last category includes the attacks that the system is exposed to potential reporting of forged
aiming at breaking down the key components needed for location data by misbehaving users, which may lead to inac-
TMS operations (i.e. the core system which manages both curate assessment of the real traffic conditions. Consequently,
the road infrastructure and the monitoring equipment). Cyber erroneous traffic information will be spread by the TMS
attacks are the most severe threats for the core system of towards the drivers resulting in traffic conditions deterioration
TMS since a successful infiltration, through any cyber defence as well as traffic incidents in some extreme cases. Mobile
breaches, will give criminals full control of the transportation users location privacy and the threats against it have recently
infrastructure, which would cause massive loss of data and raised an increasing attention due to the numerous location-
serious damage to physical assets in addition to potential aware applications that have been designed for smartphones.
human lives loss. Several worms have been developed to To protect their privacy, the drivers tend usually to have their
launch cyber attacks against critical systems such as the exact position obfuscated to prevent being tracked by a third
”Stuxnet” worm, ”Duqu”, ”Flame” and ”Gauss” viruses. To party. This obfuscation will significantly reduce the accuracy
cope with the increasing threat of these sophisticated worms, of real-time traffic conditions estimation. Therefore, robust
conventional security solutions such as anti-virus softwares privacy preservation techniques are required to reassure the
and firewalls are, unfortunately, not sufficient. Therefore, more users and incite them to disclose their exact position.
robust countermeasures are needed to defeat these cyber
attacks. Trust management of mobile users is another issue for
TMS in order to deliver reliable decisions and ensure better
Besides the above security threats, the recent trends of control of the traffic flow. The trust management task will
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2339817, IEEE Communications Surveys & Tutorials
MANUSCRIPT SUBMITTED TO IEEE COMMUNICATIONS SURVEYS & TUTORIALS
enable the TMS to establish a list of reliable mobile data design, implementation and deployment aspects. The very
sources, according to periodic evaluation of their trust level, recent project Accelerate Cooperative Mobility (DRIVE C2X)
in addition to roads monitoring equipment such as, sensors, [64] goes beyond the previous projects which have proven the
CCTV cameras, induction loops etc. A misbehaving driver feasibility of safety and traffic efficiency applications based
(e.g. terrorist, robber) may use his smartphone to broadcast on vehicular communications and addresses large-scale field
fake information in order to re-route the other cars to clear trials under real-world conditions at multiple national test sites
the way for the terrorists’/robbers’ vehicle, or just divert the across Europe.
traffic towards a specific road segment to create a bottleneck.
As the TMS will not react to information sent by a non-trusted B. Safety
data source, the misbehaving driver may spoof the identity
The COOPerative SystEMS for Intelligent Road Safety
of another reliable data source to ensure that his goal will
(COOPERS) [113] is a research and development project in
be achieved. In this case, the lack of adequate authentication
the area of cooperative and in-vehicle integrated safety systems
mechanisms will be of detrimental impact.
funded by the European Commission FP6 programme in 2006.
COOPERS focuses on the development of innovative telem-
IX. R ELATED E UROPEAN /I NTERNATIONAL INITIATIVES atics applications based on communication between vehicles
( PROJECTS ) and infrastructure, which will bring together experts from both
In this section, we present a snapshot of recent projects that car industry and infrastructure operators. Ultimately the goal
aim to improve the different aspects of a traffic management of COOPERS is the enhancement of road safety by direct
system. The projects have been organised based on their and up to date traffic information communication between
major concern in terms of architecture, safety, efficiency, infrastructure and motorised vehicles.
sustainability and energy-awareness, reliability and security The Cooperative Vehicles and Road Infrastructure for Road
and innovative services. Table IV summarises these projects. Safety (SAFESPOT) [114] is an FP6 integrated research project
co-funded by the European Commission Information Soci-
A. Architecture ety Technologies programme. SAFESPOT focuses on road
accidents prevention via an online assistant which extends
The Keystone Architecture Required for European Networks
the drivers’ awareness of the surroundings in both space and
(KAREN) project [110] made the first steps towards an inte-
time and detects potentially dangerous situations in advance.
grated ITS architecture between 1998 and 2000. KAREN has
SAFESPOT makes use of vehicle to vehicle and vehicle to
addressed the need for a single reference platform in Europe,
infrastructure communications. The European Commission-
which would provide a basis for the development of ITS
funded Network of Excellence on Advanced Passive Safety
products and services. The Framework Architecture Made for
(APSN) [128] has established an integrated European Vir-
Europe (FRAME-NET) project [111] has gathered a thematic
tual Centre of Excellence on vehicle passive safety research
network of interested parties funded by the European Union
and development in 2006. APSN goal was to accelerate the
Fifth Framework programme (FP5), which have coordinated
improvements in road safety in order to reduce the annual
and promoted wide scale implementation of ITS architecture-
road victims in the European Union. Advanced Protection
related activities in Europe starting from July 2001. The
SYStems (APROSYS) [129] is a FP6 integrated project that
Framework Architecture Made for Europe - Support (FRAME-
has developed and introduced critical scientific and technology
S) [111] has extended the original ITS architecture and updated
developments that improve passive safety for road users in
it to include the latest requirements from functional, physical
all-relevant accident types in Europe. The Save Our Lives - A
and communications points of view.
Comprehensive Road Safety Strategy for Central Europe (SOL)
Extending the FRAME architecture (E-FRAME) [111] is
[112] is an on-going Central European project whose goal is
another three year European-funded project which has further
to promote sustainable mobility, increase awareness for safety
extended the FRAME ITS architecture to support the creation
issues, and contribute to the achievement of higher quality of
of inter-operable and scalable cooperative systems throughout
living conditions for road users.
the European Union. The project which started in 2008 has
focused on acquiring, exchanging, and processing data from
vehicles (e.g. road conditions) for the benefit of the driver (e.g. C. Sustainability and Energy-awareness
better driver information and trip planning) and third parties The ”Partners for Advanced Transportation TecHnology
(e.g. knowledge of road network state). Very important is the (PATH)” [68] multi-disciplinary large scale research and de-
integration role of this project as the updated ITS architecture velopment program, which involves collaboration between
includes cooperative systems services and applications devel- universities, private industry, state and local agencies, and
oped by other European projects such as COOPERS [113], non-profit institutions from California, USA. PATH proposes
CVIS [121] and SAFESPOT [114]. Also the Preparation for state of the art research solutions to the surface transporta-
Driving Implementation and Evaluation of C2X Communi- tion systems problems. PATH focuses on the relatively long-
cation Technology (PREDRIVE C2X) FP7 integrated project term, high-impact solutions, and on the evolutionary steps
[64] has established a pan-European architecture framework that are required to have the long-term solutions deployed.
for cooperative systems, setting the road for field operational Some of PATH research focuses on fuel saving and transport-
tests on cooperative systems by focusing on architectural related gas emissions reduction. The Connect and Drive
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2339817, IEEE Communications Surveys & Tutorials
MANUSCRIPT SUBMITTED TO IEEE COMMUNICATIONS SURVEYS & TUTORIALS
[115] is a collaborative project between Dutch companies vehicles and between vehicles and roadside infrastructure. This
and universities, sponsored by the Dutch Government, which enables transparent IP connectivity between a vehicle and the
has developed technologies for Cooperative Advanced Cruise infrastructure, even using multi-hop or cache-based solutions.
Control (CACC). CACC has extended the functionality of
the Adaptive Cruise Control (ACC) based on communication E. Innovative Services
between vehicles in addition to sensor capabilities of each
vehicle to adapt the speed to other vehicles. The goal of The Adaptive Integrated Driver vEhicle interface (AIDE)
the project was to optimize traffic throughput, improve traffic [125] is an European project which has designed, developed
safety and reduce emission of vehicles. and validated an adaptive driver-vehicle interface system that
brings in the potential benefits of many new in-vehicle tech-
The Cooperative Mobility Systems and Services for Energy
nologies and nomad devices in terms of mobility and comfort
Efficiency (eCoMove) [119] is an FP7 European Commission-
in an efficient and integrated manner, without compromising
funded project which makes use of the latest vehicle-to-
safety. The Integrated Wireless and Traffic Simulation Platform
infrastructure and vehicle-to-vehicle communication technolo-
for Real-Time Road Traffic Management Solutions (iTETRIS)
gies in order to create an integrated energy-saving road traffic
[65] is an European FP7-funded project which has developed
solution. eCoMove includes eco-driving support and eco-
an open, ETSI standard compliant, and flexible simulation
traffic management in its endeavour to reduce energy waste
platform that integrates wireless communications and road
by passenger and goods vehicles. Lately, there is a significant
traffic simulation technologies and solutions in a common en-
push towards Full Electric Vehicles (FEV) and many FEV-
vironment that is easily tailored to specific situations allowing
related research projects are on-going. Among these works the
performance analysis of cooperative ITS at the level of a city.
Combining Infrastructure for Efficient Electric Mobility (eCo-
The Developing Next Generation Intelligent Vehicular Net-
FEV) [120] is a FP7 European Commission funded project
works and Applications (DIVA) is an on-going Canadian
which aims at achieving a breakthrough in the FEV space by
NSERC-funded research network which targets the develop-
proposing a general architecture for integration of FEV into the
ment and integration of communication systems, vehicular
different cooperating infrastructure systems. This architecture
technologies, and applications for enabling nationwide de-
makes use of state of the art communications technologies
ployment of vehicular ad-hoc networks and intelligent trans-
in order to support precise FEV telematics and charging
portation systems. Its focus ranges from developing innovative
management services based on the real-time information. The
large-scale communication architectures and wireless network
project will complete in 2015.
technologies to proposing solutions increasing the efficiency
and safety of Canada’s transportation systems.
D. Efficiency, Reliability and Security The Road Safety Attributes Exchange Infrastructure in
The Cooperative Vehicle Infrastructure Systems (CVIS) Europe (ROSATTE) is a FP7 European Commission-funded
[121] is a large European Commission-funded FP6 integrated project which has defined and implemented infrastructure and
project that has designed, developed and tested technologies supporting tools to ensure the efficiency and quality assurance
which support vehicles to communicate with each other and in the data supply chain from public authorities to commercial
with the nearby road infrastructure efficiently. By using CVIS map providers with regards to safety related road content.
technology the vehicles can communicate the latest traffic The on-going IBM Smarter City [69] project includes a large
information and safety warnings to road operators and other variety of initiatives, including traffic management, on a global
nearby vehicles, connecting through a multi-channel terminal scale. In particular traffic-related research and development
with a wide range of potential carriers, including cellular net- focuses on traffic modelling and simulation, smarter parking,
works (GPRS, UMTS), wireless local area networks (WiMax, maximizing revenue and minimizing environmental impact,
Wi-Fi), short-range microwave beacons (DSRC) or infrared integrated fare management, real-time traffic updates, reducing
(IR) based on the international ISO CALM standards. the commute time, improving mobility within a city, etc.
The Highly Dependable IP-based Networks and Services The overall aim is to contribute towards realising a smarter
(HIDENETS) [123] is a FP6 European Commission-funded transportation system for the 21st century.
project which has developed and analyzed end-to-end re-
silience solutions for distributed applications and mobility- X. O PEN C HALLENGES
based services in vehicular environments. The Secure Vehicu- This section identifies some open challenges existing re-
lar Communications (SeVeCom) [124] is an EU-funded project search in the area of TMS for smart cities faces and discusses
that has focused on providing full definition and implemen- potential avenues to putting additional effort toward finding
tation of security requirements for vehicular communications. highly sought after solutions. These challenges are presented
The project goal was to develop technologies to improve road in terms of the following major stages related to traffic
safety and optimise road traffic by making use of vehicular to data: gathering, storage, aggregation, exchange, processing and
infrastructure and inter-vehicular communications. The Geo- application-layer support.
addressing and geo-routing for vehicular communications A significant challenge in terms of information gathering
(GeoNET) [122] is a recent European FP7 project which has is related to the number of entities which collect traffic-
focused on a geographic addressing and routing protocol with based data, from road traffic operators such as public transport
support for IPv6 to be used to deliver safety messages between companies, private taxi companies, etc., and public traffic
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2339817, IEEE Communications Surveys & Tutorials
MANUSCRIPT SUBMITTED TO IEEE COMMUNICATIONS SURVEYS & TUTORIALS
KAREN (Keystone Architecture Required for European Networks) 1998-2000 Architecture [110]
CarCoDe (Platform for Smart Car to Car Content Delivery) 2012-2015 [66]
SOL (Save Our Lives:A comprehensive road safety strategy for central europe) 2007-2013 [112]
PATH (Partners for advanced transportation technology) 1986-ongoing Sustainability and [68]
eCoMove (Cooperative Mobility Systems and Services for energy efficiency) 2010-2013 [119]
HIDENETS (Highly dependable IP-based networks and services) 2006-2009 Efficiency, Reliability [123]
GeoNET (The geo-addressing and geo-routing for vehicular communications) 2008-2010 [122]
AIDE (Adaptive integrated driver vehicle interface) 2004-2008 Innovative Services [125]
Itetris (The integrated wireless and traffic simulation platform for real-time and road 2008-2011 [65]
DIVA (The developing next generation intelligent vehicular networks adn applications) 2012- ongoing [62]
FOTsis (Field Operational test on safe intelligent and sustainable road operation) 2010-2013 [63]
CopITS (Cooperative cars and roads for safer and intelligent transport systems) 2010-2013 [67]
management authorities such as local councils, planning insti- by proposing standards for representation and storage, but their
tutions, etc., to health and environment monitoring institutions, adoption is very limited to date.
such as health boards, environmental protection agencies, etc. Data storage suffers from the same problems and has the
and private companies and individuals. All these data gathering same open challenges with information gathering, as these
entities use independent measuring methods which acquire two stages are highly inter-connected. The only issue which
various data with different characteristics and using diverse is strictly related to storage is the database support. In this
methodologies and save it in their own databases. Relative regard there are several widely researched solutions, of which
simple issues such as data formatting in the absence of a the XML-based ones are the most popular. Open challenges
general accepted standard for the representation of traffic- are mostly performance-related, especially in a distributed
related data results in significant problems for its potential environment.
utilization by third parties. The most important consequence Data aggregation poses additional challenges to those re-
of this lack of a common format is the difficult synchronization lated to data gathering and storage. As the data originates from
of the information gathered by various sources, which makes different sources, their conversion is the most important next
almost impossible coherent usage of information and cross- step. In this process, the first obstacle is the amount of data
correlation of events. There are steps forward in this direction collected which is increasing exponentially and the second its
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2339817, IEEE Communications Surveys & Tutorials
MANUSCRIPT SUBMITTED TO IEEE COMMUNICATIONS SURVEYS & TUTORIALS
complexity. This makes data conversion increasingly difficult the open challenges need to be addressed as well as the
and highly time and resource consuming. In this stage relevant major international research projects dealing with TMS related
data extraction and cleaning, as well as data reduction might be challenges are presented.
required. Each of these tasks has its own challenges including
defining what is relevant and what is noise, identifying one or XII. ACKNOWLEDGEMENT
the other and extracting the useful data, given certain accuracy
This work was supported, in part, by Science Foundation
expectations. The latest interest surge in big data research
Ireland grant 10/CE/I1855 to Lero - the Irish Software Engi-
provides solutions to be also used in TMS for smart cities.
neering Research Centre (www.lero.ie).
Data exchange has attracted significant attention from many
interested parties and has resulted in the proposal, design and
standardisation of communication protocols of which IEEE R EFERENCES
1609 DSRC/WAVE [127] and IEEE 802.11p [40] are best [1] European Initiative on Smart Cities, 2010-2020,
known. Yet, there are still open challenges. Some challenges http://setis.ec.europa.eu/set-plan-implementation/technology-
roadmaps/european-initiative-smart-cities
are related to routing, difficult to address due to both high [2] D. B. Johnson and D. A. Maltz, ’The Dynamic Source Routing Protocol
speed of vehicles and their increased mobility which make ex- for Mobile Ad Hoc Networks’, (Internet-Draft), Mobile Ad-hoc Network
isting solutions difficult to be applied. Other problems concern (MANET) Working Group, IETF, October 1999.
[3] F. Li and Y. Wang, ”Routing in vehicular ad hoc networks: A survey,”
security, and are related to driver or passenger authentication, Vehicular Technology Magazine, IEEE, vol. 2, no. 2, pp. 12-22, 2007.
confidentiality and availability. Not at last supporting high [4] R. A. Santos, A. Edwards, and O. Alvarez, ”Towards an Inter-vehicle
levels of Quality of Service for data exchange is highly Communication Algorithm,” in Electrical and Electronics Engineering,
2006 3rd International Conference on, 2006, Veracruz, Mexico, pp. 1-4.
difficult to achieve, mostly as data transfer in multi-hop, high [5] O. K. Tonguz, N. Wisitpongphan, and F. Bai, ”DV-CAST: A distributed
mobility node environments severely affects throughput, delay vehicular broadcast protocol for vehicular ad hoc networks,” Wireless
and jitter. Communications, IEEE, vol. 17, no. 2, pp. 47-57, 2010.
[6] Y. Ding, C. Wang, and L. Xiao, ”A static-node assisted adaptive routing
Data processing and application-layer service support have protocol in vehicular networks,” in Proceedings of the fourth ACM
many open challenges, mostly application specific. With the international workshop on Vehicular ad hoc networks, 2007, Montreal,
increase in the number and type of such applications, the list Canada, pp. 59-68.
[7] J. Zhao and G. Cao, ”VADD: Vehicle-Assisted Data Delivery in Vehic-
of open challenges also grows, with issues mostly related to ular,” Vehicular Technology, IEEE Transactions on, vol. 57, no. 3, pp.
the real-time processing of large amounts of data, real-time 1910-1922, 2008.
interaction with users and group of users, user profiling and [8] G. Korkmaz, E. Ekici, F. zgner, and . zgner, ”Urban multi-hop broadcast
protocol for inter-vehicle communication systems,” in Proceedings of the
modeling, interaction with the environment, etc. 1st ACM international workshop on Vehicular ad hoc networks, 2004,
Philadelphia, PA, USA, pp. 76-85.
[9] E. Fasolo, A. Zanella, and M. Zorzi, ”An effective broadcast scheme for
XI. C ONCLUSION alert message propagation in vehicular ad hoc networks,” in Communi-
cations, 2006. ICC06. IEEE International Conference on, 2006, vol. 9,
Improving the efficiency of Traffic Management Systems Istanbul, Turkey, pp. 3960-3965.
(TMS) is still an active and challenging research area due to [10] G. Korkmaz, E. Ekici, and F. Ozguner, ”An efficient fully ad-hoc multi-
the criticality of transportation infrastructure being monitored hop broadcast protocol for inter-vehicular communication systems,”
in Communications, 2006. ICC06. IEEE International Conference on,
by such systems. This survey has provided a comprehensive 2006, vol. 1, Istanbul, Turkey, pp. 423-428.
study of the different phases of a modern TMS, emphasizing [11] S. A. Arzil, M. H. Aghdam, and M. A. J. Jamali, ”Adaptive routing
the main challenges and shortcomings of the existing systems protocol for VANETs in city environments using real-time traffic in-
formation,” in Information Networking and Automation (ICINA), 2010
and suggesting some directions to make the TMSs more International Conference on, 2010, vol. 2, Kunming, China, pp. V2-132.
efficient in future smart cities. First, we have presented the [12] V. Naumov and T. R. Gross, ”Connectivity-aware routing (CAR) in ve-
different existing technologies used for traffic data gathering hicular ad-hoc networks,” in INFOCOM 2007. 26th IEEE International
Conference on Computer Communications. IEEE, 2007, Anchorage ,
and highlighted the main new technologies that can signif- Alaska , USA, pp. 1919-1927.
icantly improve the accuracy of the collected data. We have [13] M. Durresi, A. Durresi, and L. Barolli, ”Emergency broadcast protocol
also surveyed the numerous routing protocols used in VANETs for inter-vehicle communications,” in Parallel and Distributed Systems,
2005. Proceedings. 11th International Conference on, 2005, vol. 2,
to disseminate the collected data among vehicles and shown Fuduoka, Japan, pp. 402-406.
their respective advantages and shortcomings. The congestion [14] J. Gong, C. Z. Xu and H. J, ”Predictive Directional Greedy Routing in
problem in VANETs as well as the simulation tools are also Vehicular Ad hoc Networks,” In Proc. of the International Conference on
Distributed Computing Systems Workshops (ICDCSW’07), June 25-29,
deeply discussed. Second, a critical discussion of data fusion 2007, Toronto, Canada. pp 2-2.
and aggregation solutions are provided along with a brief [15] U. Nagaraj and P. Dhamal, ”Broadcasting Routing Protocols in VANET,”
overview on the TMDD standard used by IBM. Third, routes Network and Complex Systems, vol. 1, no. 2, pp. 13-19, 2012.
[16] M. T. Sun, W. C. Feng, T. H. Lai, K. Yamada, H. Okada, and K.
planning and traffic prediction services are investigated with Fujimura, ”GPS-based message broadcasting for inter-vehicle commu-
main focus on highlighting the limitations of the existing nication,” in Parallel Processing, 2000. Proceedings. 2000 International
algorithms and suggesting alternative directions for better Conference on, 2000, Toronto, Canada, pp. 279-286.
[17] B. Karp and H. T. kung, ”GPSR: Greedy perimeter Stateless Routing for
accuracy and efficiency. Finally, we presented our vision on Wireless Networks”, ACM MobiCom 2000, August 6-11, 2000, Boston,
improving TMSs efficiency and robustness, which consists in MA, USA, pp. 243-254.
leveraging smart vehicles capabilities and advanced parking [18] Z. Mo, H. Zhu, K. Makki, and N. Pissinou, ”MURU: A multi-hop
routing protocol for urban vehicular ad hoc networks,” in Mobile
systems to achieve the desired level of accuracy and control and Ubiquitous Systems: Networking & Services, 2006 Third Annual
of the traffic. Moreover, the security threats targeting TMSs, International Conference on, 2006, London, Great Britain, pp. 1-8.
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2339817, IEEE Communications Surveys & Tutorials
MANUSCRIPT SUBMITTED TO IEEE COMMUNICATIONS SURVEYS & TUTORIALS
[19] B. C. Seet, G. Liu, B. S. Lee, C. H. Foh, K. J. Wong, and K. K. Conference on Telecommunications (ICT) , Doha, Qatar, pp. 798-805,
Lee, ”A-STAR: A mobile ad hoc routing strategy for metropolis vehicu- Apr. 4-7, 2010.
lar communications,” NETWORKING 2004. Networking Technologies, [39] X. Y. Wang and P. Han Ho, ”A Novel sensing Coordination Framework
Services, and Protocols; Performance of Computer and Communication for CR-VANET”, IEEE Transactions on Vehicular Technology, Vol. 59,
Networks; Mobile and Wireless Communications, pp. 989-999, 2004. No. 4, pp. 1936-1948, May. 2010.
[20] J. Bernsen and D. Manivannan, ”Unicast routing protocols for vehicular [40] 802.11p-2010 - IEEE Standard for Information technology– Local and
ad hoc networks: A critical comparison and classification,” Pervasive metropolitan area networks– Specific requirements– Part 11: Wireless
and Mobile Computing, vol. 5, no. 1, pp. 1-18, 2009. LAN Medium Access Control (MAC) and Physical Layer (PHY) Spec-
[21] A. Bachir and A. Benslimane, ”A multicast protocol in ad hoc networks ifications Amendment 6: Wireless Access in Vehicular Environments.
inter-vehicle geocast,” in Vehicular Technology Conference, 2003. VTC [41] R. Aquino-Santos, et al., ”Inter-Vehicular Communications Using Wire-
2003-Spring. The 57th IEEE Semiannual, 2003, vol. 4, Jeju, Korea, pp. less Ad Hoc Networks”, Automotive Informatics and Communicative
2456-2460. Systems: Principles in Vehicular Networks and Data Exchange. IGI
[22] M. Jerbi, R. Meraihi, S. M. Senouci, and Y. Ghamri-Doudane, ”GyTAR: Global, 2009. pp. 120-138. doi:10.4018/978-1-60566-338-8.ch007
improved greedy traffic aware routing protocol for vehicular ad hoc [42] L. Husheng and D. K. Irick, ”Collaborative Spectrum Sensing in
networks in city environments,” in Proceedings of the 3rd international Cognitive Radio Vehicular Ad Hoc Networks: Belief Propagation on
workshop on Vehicular ad hoc networks, 2006, Los Angeles, CA, USA, Highway”, In Proc. of the 71st IEEE Vehicular Technology Conference,
pp. 88-89. VTC Spring 2010 , Taipei, pp. 1-5, May. 16-19, 2010.
[23] W. Sun, H. Yamaguchi, K. Yukimasa, and S. Kusumoto, ”GVGrid: A [43] C.L.P. Chen, J. Zhou and W. Zhao, ”A Real-Time Vehicle Navigation
QoS routing protocol for vehicular ad hoc networks,” in Quality of Algorithm in Sensor Network Environments,” IEEE Transactions on In-
Service, 2006. IWQoS 2006. 14th IEEE International Workshop on, telligent Transportation Systems, Vol.13, No.4, pp.1657,1666, December
2006, New Haven, CT, USA, pp. 130-139. 2012.
[24] H. Lu and C. Poellabauer, ”Balancing broadcast reliability and transmis- [44] T.-Y. Liao and T.-Y. Hu, An object-oriented evaluation framework for
sion range in VANETs,” in Vehicular Networking Conference (VNC), dynamic vehicle routing problems under real-time information, Expert
2010 IEEE, 2010, Jersey City, New Jersey, USA, pp. 247-254. Systems with Applications, vol. 38, pp. 12548-12558, Sept. 2011.
[25] M. Feiri, J. Petit, and F. Kargl, ”Congestion-based certificate omission in [45] M. Gendreau, J.-Y. Potvin, O. Braumlaysy, G. Hasle, and A. L kketan-
VANETs,” in Proceedings of the ninth ACM international workshop on gen, Metaheuristics for the Vehicle Routing Problem and Its Extensions:
Vehicular inter-networking, systems, and applications, 2012, Ambleside, A Categorized Bibliography, in The Vehicle Routing Problem: Latest
United Kingdom, pp. 135-138. Advances and New Challenges (B. Golden, S. Raghavan, and E. Wasil,
[26] D. B. Rawat, D. C. Popescu, G. Yan, and S. Olariu, ”Enhancing VANET eds.), vol. 43 of Operations Research/Computer Science Interfaces, pp.
Performance by Joint Adaptation of Transmission Power and Contention 143-169, Boston, MA: Springer US, 2008.
Window Size,” IEEE Transactions on Parallel and Distributed Systems, [46] B. Tatomir, L. J. M. Rothkrantz, and A. C. Suson, Travel time prediction
vol. 22, no. 9, pp. 1528-1535, Sep. 2011. for dynamic routing using ant based control, in Winter Simulation
[27] S. Djahel and Y. Ghamri-Doudane, ”A Robust Congestion Control Conference, Austin, TX, USA, pp. 1069-1078, Dec. 2009.
Scheme for Fast and Reliable Dissemination of Safety Messages in
[47] H. Kanoh and K. Hara, Hybrid genetic algorithm for dynamic mul-
VANETs”, IEEE WCNC 2012, Paris, France, pp. 2264-2269, April 1-4,
tiobjective route planning with predicted trafic in a real-world road
2012.
network, in Proceedings of the 10th annual conference on Genetic and
[28] S. Djahel, M. Salehie, I. Tal and P. Jamshidi, ” Adaptive Traffic Man-
evolutionary computation - GECCO 08, (New York, NY, USA), p. 657,
agement for Secure and Efficient Emergency Services in Smart Cities”,
ACM Press, July 2008.
IEEE Pervasive Computing and Communication (PerCom) conference,
[48] B. Chakraborty, T. Maeda, and G. Chakraborty, Multiobjective route
San Diego, California, USA, pp. 240-243, March 18-22, 2013.
selection for car navigation system using genetic algorithm, Proceedings
[29] I. H. Brahmi, S. Djahel and Y. Ghamri-Doudane. ”A Hidden Markov
of the 2005 IEEE Midnight-Summer Workshop on Soft Computing in
Model based Scheme for Efficient and Fast Dissemination of safety
Industrial Applications, 2005. SMCia/05., Espoo, Finland, pp. 190195,
Messages in VANETs”. IEEE GLOBECOM 2012, Anaheim, California,
2005.
USA, pp. 177-182, December 3-7, 2012.
[30] V. T. Ngoc Nha, S. Djahel and J. Murphy. ”A Comparative Study of [49] S. Mathur, T. Jin, N. Kasturirangan, J. Chandrasekaran, W. Xue, M.
Vehicles’ Routing Algorithms for Route Planning in Smart Cities”. VTM Gruteser, and W. Trappe, ”Parknet: drive-by sensing of road-side parking
2012, Satellite Workshop of IFIP Wireless Days 2012, Dublin, Ireland, statistics,” in Proceedings of the 8th international conference on Mobile
pp. 1-6, November 20, 2012. systems, applications, and services, 2010, San Francisco, CA, USA, pp.
[31] H. I. Brahmi, S. Djahel and J. Murphy. ”Improving Emergency Mes- 123-136.
sages Transmission Delay in Road Monitoring based WSNs”. The 6th [50] A. Klappenecker, H. Lee, and J. L. Welch, ”Finding available parking
Joint IFIP Wireless and Mobile Networking Conference (WMNC’2013), spaces made easy,” Proceedings of the 6th International Workshop on
Dubai, UAE, pp. 1-8, April 23-25, 2013. Foundations of Mobile Computing, 2012, Cambridge, MA, USA,pp. 49-
[32] N. D. Lane, E. Miluzzo, H. Lu, D. Peebles, T. Choudhury and A. T. 52.
Campbell. ”A Survey of Mobile Phone Sensing”. IEEE Communications [51] R. Panayappan, ”VANET-based Approach for Parking Space Avail-
Magazine, Vol. 48, N. 9, pp.140-150, September 2010. ability.”, in VANET ’07 Proceedings of the fourth ACM international
[33] R. K. Ganti, F. He and H. Lei. ”Mobile crowdsensing: current state and workshop on Vehicular ad hoc networks, 2007, Montreal, Canada, pp.
future challenges”. IEEE Communications Magazine, Vol. 49, N. 11, 75-76
pp.32-39, November 2011. [52] E. Kokolaki, M. Karaliopoulos, and I. Stavrakakis, ”Opportunistically
[34] S. konur and M. Fisher, ”Formal Analaysis of a VANET Congestion assisted parking service discovery: Now it helps, now it does not,”
Control Protocol through Probabilistic Verification”, In Proc. of the Pervasive and Mobile Computing, vol. 8, no. 2, pp. 210-227, 2012.
73rd IEEE Vehicular Technology Conference (VTC Spring), Budapest, [53] T. Delot, N. Cenerario, S. Ilarri, and S. Lecomte, ”A cooperative
Hungary, pp. 1-5, May 15-18, 2011. reservation protocol for parking spaces in vehicular ad hoc networks,” in
[35] M. Torrent-Moreno, Jens Mittag, P. Santi and H. Hartenstein, ”Vehicle- Proceedings of the 6th International Conference on Mobile Technology,
to-Vehicle Communication: Fair Transmit Power Control for Safety- Application & Systems, 2009, Nice, France, p. 30.
Critical Information”, IEEE Transactions on Vehicular Technologty, Vol. [54] M. Caliskan, A. Barthels, B. Scheuermann, and M. Mauve, ”Predicting
58, No. 7, pp. 3684-3703, Sep. 2009. parking lot occupancy in vehicular ad hoc networks,” in Vehicular
[36] M. Bouassida and M. Shawky, ”A Cooperative and Fully-distributed Technology Conference, 2007. VTC2007-Spring. IEEE 65th, 2007,
Congestion Control Approach within VANETs”, In Proc. of the 9th Dublin, Ireland, pp. 277-281.
International Conference on Intelligent Transport systems Telecommu- [55] M. Caliskan, D. Graupner, and M. Mauve, ”Decentralized discovery of
nications, (ITST), Lille, France, pp. 526-531, 20-22 Oct. 2009. free parking places,” in Proceedings of the 3rd international workshop
[37] M. D. Felice, K. R. Chowdhury and L. Bononi, ”Analyzing the Potential on Vehicular ad hoc networks, New York, NY, USA, 2006, pp. 30-39.
of Cooperative Cognitive Radio Technology on Inter-Vehicle Commu- [56] P. Szczurek, B. Xu, O. Wolfson, J. Lin, and N. Rishe, ”Learning the
nication”, In Proc. of IFIP Wireless Days 2010, Venice, pp. 1-6, Oct. relevance of parking information in VANETs,” in Proceedings of the
20-22, 2010. seventh ACM international workshop on VehiculAr InterNETworking,
[38] K. Fawaz, A. Ghandour, M. Olleik and H.Artail,”Improving reliability 2010, Chicago, IL, USA, pp. 81-82.
of safety applications in vehicle ad hoc networks through the imple- [57] S. Evenepoel, J. Van Ooteghem, S. Verbrugge, D. Colle and M.
mentation of a cognitive network ”, In Proc. of the 17th International Pickavet, ”On-street smart parking networks at a fraction of their cost:
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2339817, IEEE Communications Surveys & Tutorials
MANUSCRIPT SUBMITTED TO IEEE COMMUNICATIONS SURVEYS & TUTORIALS
performance analysis of a sampling approach,” ETT Special Issue on Cooperative Awareness Basic Service;]”, Draft Version 1.0.4, March
Smart Cities, vol. 25, no. 1, pp. 136-149, Jan. 2014. 2010.
[58] W. Min and L. Wynter, ”Real-time road traffic prediction with spatio- [81] ETSI TS 102 637-3, ”Intelligent Transport Systems (ITS); Vehicular
temporal correlations”, Transportation Research Part C: Emerging Tech- Communications; Basic Set of Applications; [Part 3: Specifications
nologies 19(4), pp. 606-616, Elsevier, 2011 of Decentralized Environmental Notification Basic Service;]”, Draft
[59] J. He et al., ”Ensemble-based Method for Task 2: Predicting Traffic Version 2.1.1, April 2010.
Jam”, in Proc. of IEEE International Conference on Data Mining [82] D. Rawat et al. ,”Dynamic Adaptation of Joint transmission Power
Workshops, Sydney, Australia, 14-17 December 2010, pp. 1363-1365. and Contention Window in VANET”, In Proc. of IEEE VTC Fall09,
[60] Y. Kamarianakis, W. Shen and L. Wynter, ” Real-time road traffic Anchorage, AK, September 2009, pp. 1-5.
forecasting using regime-switching space-time models and adaptive [83] L. Wischhof and H. Rohling, ”Congestion Control in Vehicular Ad Hoc
LASSO”, Applied Stochastic Models in Business and Industry, Wiley Networks”, In Proc. of IEEE International Conference on Vehicular
Online Library, 2012. Electronics and Safety, Xian, Shaan”xi, China, October 14-16, 2005,
[61] W. Shen and L. Wynter, ”Real-time road traffic fusion and prediction pp. 58-63.
with GPS and fixed-sensor data”, Information Fusion (FUSION), 15th [84] Y. Mertens, M. Wellens, and P. Mahonen, ”Simulation-based Perfor-
International Conference on, Singapore, pp. 1468-1475, 2012. mance Evaluation of Enhanced Broadcast Schemes for IEEE802.11
[62] O. Abumansoor, and A. Boukerche. ”Preventing a dos threat in vehicular based Vehicular Networks”, In Proc. of IEEE VTC Spring08, Singapore,
ad-hoc networks using adaptive group beaconing.” Proceedings of the 8h May 2008, pp. 3042-3046.
ACM symposium on QoS and security for wireless and mobile networks. [85] X. Y. Wang and P. Han Ho, ”A Novel sensing Coordination Framework
ACM, 2012, Paphos, Cyprus, pp. 63-70. for CR-VANET”, IEEE Transactions on Vehicular Technology, Vol. 59,
[63] Viragg, L., Kovcs, J., & Edelmayer, A. (2013, March). Extension of No. 4, pp. 1936-1948, May. 2010.
the ITS Station Architecture to Low-Power Pervasive Sensor Networks. [86] T. Watteyne, I. Aug-Blum, M. Dohler, S. Ubda, and D. Barthel, Centroid
In Advanced Information Networking and Applications Workshops virtual coordinates - A novel near-shortest path routing paradigm,
(WAINA), 2013 27th International Conference on (pp. 1386-1391). Computer Networks, vol. 53, no. 10, pp. 1697-1711, Jul. 2009.
IEEE. Barcelona, Spain. [87] Chabini, Ismail, and Shan Lan. ”Adaptations of the A* algorithm for
[64] R. Stahlmann, et al. ”Starting European field tests for Car-2-X com- the computation of fastest paths in deterministic discrete-time dynamic
munication: the DRIVE C2X framework.” Proceedings 18th ITS World networks.” Intelligent Transportation Systems, IEEE Transactions on 3.1
Congress and Exhibition. 2011, Orlando, FL, USA. (2002): 60-74.
[65] V. Kumar, L. Lin, D. Krajzewicz, F. Hrizi, O. Martinez, J. Gozalvez, & [88] Huang, Bo, Q. Wu, and F. B. Zhan. ”A shortest path algorithm with novel
R. Bauza. (2010, May). itetris: Adaptation of its technologies for large heuristics for dynamic transportation networks.” International Journal of
scale integrated simulation. In Vehicular Technology Conference (VTC Geographical Information Science 21.6 (2007): 625-644.
2010-Spring), 2010 IEEE 71st, Taipei, Taiwan, (pp. 1-5). IEEE. [89] Bell, Michael GH, et al. ”Time-dependent Hyperstar algorithm for robust
[66] CarCoDe website, ”Platform for Smart Car to Car Content Delivery”, vehicle navigation.” Transportation Research Part A: Policy and Practice
http://www.itea2.org/project/index/view/?project=10147 (2012).
[67] F. Filali , H. Menouar, and A. Abu-Dayya. ”CopITS: The first con- [90] Behrisch, M., Bieker, L., Erdmann, J., & Krajzewicz, D. (2011, October).
nected car standard-compliant platform in Qatar and the region.” Qatar Sumo-simulation of urban mobility-an overview. In SIMUL 2011, The
Foundation Annual Research Forum. No. 2012. Third International Conference on Advances in System Simulation ,
2011, Barcelona, Spain, (pp. 55-60).
[68] Shladover, Steven E. ”PATH at 20-History and major milestones.” IEEE
[91] J. Hrri, P. Cataldi et al., ” Modeling and Simulating ITS Applica- tions
Transactions on intelligent transportation systems 8.4 (2007): 584-592.
with iTETRIS”, In Proc. of the 6th ACM workshop on Performance
[69] Naphade, M., Banavar, G., Harrison, C., Paraszczak, J., & Morris, R.
monitoring and measurement of heterogeneous wireless and wired
(2011). Smarter cities and their innovation challenges. Computer, 44(6),
networks (ACM PM2HW2N 11) , Miami Beach, FL, Oct. 2011, pp.
32-39.
33-40.
[70] E. M. Daly, F. Lecue and V. Bicer, ”Westland Row Why So Slow? [92] S. Joerer, F. Dressler and C. Sommer, ”Comparing apples and oranges?:
Fusing Social Media and Linked Data Sources for Understanding Real- trends in IVC simulations”, In Proc. of the 9th ACM international
Time Traffic Conditions”, In Proc. of the 2013 international conference workshop on Vehicular inter-networking, systems, and applications, June
on Intelligent user interfaces, IUI’13, March 19-22, 2013, Santa Monica, 25, 2012, Low Wood Bay, Lake District, UK, pp. 27-32.
CA, USA. pp. 203-212. [93] C. Sommer, R. German, and F. Dressler, ”Bidirectionally Coupled
[71] F. Lecue, A. Schumann, and M. L. Sbodio,” Applying semantic web Network and Road Traffic Simulation for Improved IVC Analysis,” IEEE
technologies for diagnosing road traffic congestions”, In Proc. of the Transactions on Mobile Computing, vol. 10, no. 1, pp. 3-15, Jan. 2011.
11th International Semantic Web Conference (ISWC) (2012), November [94] D. R. Choffnes and F. E. Bustamante, ”An Integrated Mobility and
11-15, Boston, USA, pp. 114-130. Traffic Model for Vehicular Wireless Networks”, Proc. of the 2nd
[72] M. Tubaishat, P. Zhuang, Q. Qi, and Y. Shang, ”Wireless Sensor Net- ACM International Workshop on Vehicular Ad Hoc Networks (VANET),
works in Intelligent Transportation Systems”, Wireless Communications September 2005, Cologne, Germany, pp. 69-78.
and Mobile Computing, March 2009. [95] M. Fellendorf, P. Vortisch, ”Microscopic Traffic Flow Simulator VIS-
[73] M. Tubaishat, Q. Qi, Y. Shang and H. Shi. ”Wireless Sensor-Based Traf- SIM”, in Fundamentals of Traffic Simulation, J. Barcel (ed.), Inter-
fic Light Control”, IEEE Consumer Communications and Networking national Series in Operations Research & Management Science 145,
Conference (CCNC’08), Jan 2008, Las Vegas, NV, pp. 702-706. Springer Science+Business Media, LLC 2010.
[74] M. Tubaishat, Y. Shang and H. Shi,”Adaptive Traffic Light Control [96] Panwai, Sakda, Charnwet Haripai, and Chakrapan Tapkwa. ”Develop-
with Wireless Sensor Networks”l, IEEE Consumer Communications and ment of SIDRA-TRIP integrated GPS model to evaluate fuel consump-
Networking Conference (CCNC’07), Jan 2007, Las Vegas, NV, pp. 187- tion/emission on expressway and alternative road.” 17th ITS World
191. Congress. 2010.
[75] A. Bachir, M. Dohler, T. Watteyne, and K. K. Leung, ”MAC Essentials [97] Y. Chen, M. H. Bell and K. Bogenberger, ”Reliable Pretrip Multipath
for Wireless Sensor Networks”, IEEE Communications Surveys & Planning and Dynamic Adaptation for a Centralized Road Navigation
Tutorials, vol. 12, no. 2, pp. 222-248l, 2010. System”. IEEE Transactions on Intelligent Transportation Systems, Vol.
[76] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, ” Wireless 8, No. 1,, March, 2007, pp. 14-20.
sensor networks: a survey”, Computer Networks, vol. 38, no. 4, pp. 393- [98] R. Doolan and G. M. Muntean, ”VANET-enabled Eco-friendly Road
422, 2002. Characteristics-aware Routing for Vehicular Traffic”,IEEE Vehicular
[77] J. Yick, B. Mukherjee, and D. Ghosal, ”Wireless sensor network survey”, Technology Conference (VTC), Dresden, Germany, June 2013, pp. 1-5.
Computer Networks, vol. 52, no. 12, pp. 2292-2330, 2008 [99] M. Treiber, A. Kesting, and R. E. Wilson, ”Reconstructing the Traffic
[78] S. Joerer, C. Sommer and F. Dressler, ”Towards Reproducibility and State by Fusion of Heterogeneous Data”, Computer-Aided Civil and
Comparability of IVC Simulation Studies: A Literature Survey”, IEEE Infrastructure Engineering, vol. 26, no. 6, pp. 408-419, Aug. 2011.
Communications Magazine, vol. 50, no. 10, pp. 82-88, 2012. [100] H. Rehborn, M. Koller, and B. S. Kerner, ”Traffic data fusion of
[79] R. Stanica, E. Chaput, and A. Beylot, ”Properties of the MAC layer in vehicle data to detect spatiotemporal congested patterns”, 19th ITS World
safety vehicular Ad Hoc networks”. IEEE Communications Magazine, Congress, Vienna, Austria, 22/26 Oct. 2012.
vol. 50, no. 5, pp. 192-200, 2012. [101] N. Chen and X. Xu, ”Formation-Fusion method for urban traffic flow
[80] ETSI TS 102 637-2, ”Intelligent Transport Systems (ITS); Vehicular based on evidence theory combining with fuzzy rough set”, Journal of
Communications; Basic Set of Applications; [Part 2: Specification of Theoretical and Applied Information Technology, vol. 49, no. 2, 2013.
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2339817, IEEE Communications Surveys & Tutorials
MANUSCRIPT SUBMITTED TO IEEE COMMUNICATIONS SURVEYS & TUTORIALS
[102] E. I. Vlahogianni, J. C. Golias and M. G. Karlaftis, ”Short-term Traffic [127] IEEE1609 WAVE Workgroup, http://vii.path.berkeley.edu/1609 wave/
Forecasting: Overview of Objectives and Methods”, Transport reviews, [128] Vezin, P., et al. ”5.15. European Biomechanical Experiment Database:
vol. 24, no. 5, pp.533-557, 2004. A Tool to Promote the Sharing and the Dissemination of the Biome-
[103] S. Ishak and H. Al-Deek, ”Performance of short-term time series traffic chanics Experiments with Human Subject for Passive Safety.” D16-WG
prediction model”, Journal of Transportation Engineering, vol. 128, no. 5.2 Workshop on Biomechanical Experiments. 2004.
6, pp. 490-498, 2002. [129] KELLENDONK, G., and J. WISMANS. ”Advanced Protection Sys-
[104] M. S. Ahmed and A. R. Cook, ”Analysis of freeway traffic time-series tems (APROSYS).” TRA-TRANSPORT RESEARCH ARENA EU-
data by using Box-Jenkins techniques”, Transportation Research Board ROPE 2006: GOETEBORG, SWEDEN, JUNE 12TH-15TH 2006:
, pp. 1-9, 1979. GREENER, SAFER AND SMARTER ROAD TRANSPORT FOR EU-
[105] S. Quan, Y. Xiuqing and G. Weikang, ”A New Combination Rules of ROPE. PROCEEDINGS (2006).
Evidence Theory”, Acta Electronica Sinica, Vol. 39, No. 8, 2004, pp [130] TOMTOM Website, http://www.tomtom.com/
611-628 [131] GARMIN Website, http://www.garmin.com/
[106] W. Zheng, D.-H. Lee, and Q. Shi,”Short-term freeway traffic flow [132] http://www.technologyreview.com/news/515966/the-internet-of-cars-is-
prediction: Bayesian combined neural network approach”. Journal of approaching-a crossroads/
Transportation Engineering, Vol. 132, No. 2, pp.114-121, 2006. [133] http://parkya.com/
[107] S.R. Chandra and H. Al-Deek, ”Predictions of freeway traffic speeds [134] http://www.parkinglook.com.au/
and volumes using vector autoregressive models”. Journal of Intelligent [135] http://www.worldsensing.com/news-press.html
Transportation Systems, vol. 13, no. 2, pp.53-72, 2009. [136] D. Zhang, Y. Li, F. Zhang, M. Lu, Y. Liu, and T. He, ”coRide:Carpool
[108] S. I. J. Chien, and C. M. Kuchipudi, ”Dynamic travel time prediction Service with a Win-Win Fare Model for Large-Scale Taxicab Networks”,
with real-time and historical data”, in: Proceedings of the Transportation ACM SenSys 2013, Rome, Italy, pp. 1-14.
Research Board 81st Annual Meeting, Washington, DC, 2002. [137] D. Zhang, T. He, Y. Liu and J. A. Stankovic,”callCab:A Unified
[109] A. Stathopoulos, and M. G. Karlaftis, ”A multivariate state-space ap- Recommendation System for Carpooling and Regular Taxicab Services”,
proach for urban traffic flow modelling and prediction”, Transportation IEEE BIGDATA 2013, Santa Clara, CA, USA, pp. 439-447.
Research Part C, vol. 11, no. 2, pp. 121-135, 2003. [138] A. Kumar, S. K. Gupta, A. K. Rai, and S. Sinha, ”Social Networking
[110] Eriksson, Owen, and K. Axelsson. ”ITS Systems Architectures- Sites and Their Security Issues,” International Journal of Scientific and
From Vision to Reality.” PROCEEDINGS OF THE 7TH WORLD Research Publications, vol. 3, no. 4, p. 3, 2013.
CONGRESS ON INTELLIGENT SYSTEMS. 2000. [139] K. Zhang, X. Liang, X. Shen, and R. Lu, ”Exploiting multimedia ser-
[111] Blinov, Zuzana, Petr Bure, and Peter Jesty. ”Intelligent transport system vices in mobile social networks from security and privacy perspectives,”
architecture different approaches and future trends.” Data and Mobility. Communications Magazine, IEEE, vol. 52, no. 3, pp. 58-65, 2014.
Springer Berlin Heidelberg, 2010. 115-125. [140] H. T. Cheng, H. Shan, and W. Zhuang, ”Infotainment and road
[112] ”SOL - Save Our Lives. A Comprehensive Road Safety Strategy for safety service support in vehicular networking: From a communication
Central Europe”, project website, http://www.sol-project.eu/, 2010-2013 perspective”, Mechanical Systems and Signal Processing, vol. 25, no. 6,
[113] ”CO-OPerative SystEms for Intelligent Road Safety”, project website, pp. 2020-2038, Aug. 2011.
http://www.coopers-ip.eu/, 2006-2010 [141] C. Xu, F. Zhao, J. Guan, H. Zhang, and G.-M. Muntean, ”QoE-Driven
[114] Bonnefoi, Fabien, et al. ”SAFESPOT Applications for Infrasructure- User-Centric VoD Services in Urban Multihomed P2P-Based Vehicular
based Co-operative Road Safety.” 14th World Congress and Exhibition Networks,” IEEE Transactions on Vehicular Technology, vol. 62, no. 5,
on Intelligent Transport Systems and Services. 2007. pp. 2273-2289, Jun. 2013.
[115] ”Connect & Drive”, project website, [142] R. V. D Heijden, S. Dietzel, F. Kargl, ”Misbehavior Detection in
http://www.tue.nl/en/university/departments/industrial- Vehicular Ad-hoc Networks”. Proceedings of the 1st GI/ITG KuVS
design/research/research-programs/user-centered- Fachgesprch Inter-Vehicle Communication (FG-IVC 2013),Innsbruck,
engineering/research/projects/explorations-in-interactions/connect- Tyrol, Austria, Feb. 21-22, 2013.
drive/, 2009-2011 [143] C.-C. Lee and Y.-M. Lai, ”Toward a secure batch verification with
[116] ”Worldwide Cellular M2M Modules Forecast Market Brief,” Beecham group testing for VANET,” Wireless Networks, vol. 19, no. 6, pp. 1441-
Research, Aug. 2010. 1449, Aug. 2013.
[117] S. Lucero, ”Maximizing Mobile Operator Opportunities in M2M: The [144] Z. Zhang, P.-H Ho, and F. Nait-Abdesselam, ”RADAR: A Reputation-
Benefits of an M2M-Optimized Network,” ABI Research, 1Q 2010. Driven Anomaly Detection System for Wireless Mesh Networks”, ACM
[118] OECD- Machine-to-Machine Communications: Connecting Billions of Wireless Networks (WINET), vol. 16, no. 8, pp. 2221-2236, 2010.
Devices, OECD Digital Economy Papers, No. 192, 2012. [145] S. Wang, S. Djahel J. McManis, C. McKenna and L. Murphy, ”Com-
[119] Vreeswijk, J. D., M. K. M. Mahmod, and B. Van Arem. ”Energy prehensive Performance Analysis and Comparison of Vehicles Routing
efficient traffic management and control-the eCoMove approach and Algorithms in Smart Cities”, IEEE GIIS 2013, Trento, Italy, 28-31
expected benefits.”Intelligent Transportation Systems (ITSC), 2010 13th October 2013.
International IEEE Conference on. IEEE, 2010. [146] D. Smith, S. Djahel, and J. Murphy, ”A SUMO Based Evaluation of
[120] ”Combining Infrastructure for Efficient Electric Mobility (eCo-FEV)”, Road Incidents’ Impact on Traffic Congestion Level in Smart Cities”,
project website, http://www.eco-fev.eu/, 2012-2015 goSMART 2014, The 3rd IEEE International Workshop on GlObal
[121] Toulminet, Gwenalle, Jacques Boussuge, and Claude Laurgeau. ”Com- Trends in SMART Cities, co-located with IEEE LCN 2014, Edmonton,
parative synthesis of the 3 main European projects dealing with Coop- Canada, Sep. 8-11, 2014.
erative Systems (CVIS, SAFESPOT and COOPERS) and description of [147] J. Li, Z. Zhang, and W. Zhang, ”MobiTrust: Trust Management System
COOPERS Demonstration Site 4.” Intelligent Transportation Systems, in Mobile Social Computing”, Proc. of the 3rd IEEE International
2008. ITSC 2008. 11th International IEEE Conference on. IEEE, 2008. Symposium on Trust, Security, and Privacy for Emerging Applications
”Cooperative Vehicle Infrastructure Systems (CVIS)”, project website, (TSP-10), Bradford, UK, Jun. 29-Jul. 01, 2010.
http://www.cvisproject.org, 2006-2010 [148] C. Dwyer, S. R. Hiltz, and K. Passerini, ”Trust and privacy concern
[122] ”Geo-addressing and geo-routing for vehicu- within social networking sites: A comparison of Facebook and MyS-
lar communications (GeoNET)”, project website, pace”, Proc. of the Thirteenth Americas Conference on Information
http://cordis.europa.eu/projects/rcn/85551 en.html, 2008-2012 Systems, Keystone, Colorado, Aug. 09-12, 2007.
[123] Casimiro, A., Lollini, P., Dixit, M., Bondavalli, A., & Verssimo, [149] J. Golbeck, ”Trust and nuanced profile similarity in online social
P. (2008, March). A framework for dependable QoS adaptation in networks”, ACM Transactions on the Web (TWEB), vol. 3, no. 4, pp.
probabilistic environments. In Proceedings of the 2008 ACM symposium 1-33, Sep. 2009.
on Applied computing (pp. 2192-2196). ACM.
[124] ”Secure Vehicular Communications (SeVeCom)”, project website,
http://www.sevecom.org/ 2006-2010
[125] Amditis, Angelos, et al. ”Design and development of an adaptive
integrated driver-vehicle interface: overview of the AIDE project.”
Proceedings of the IFAQ conference, Prague. 2005.
[126] Roche-Cerasi, Isabelle, et al. ”Road Safety Attributes Exchange Infras-
tructure in Europe: State of the Art and Perspectives.” 16th ITS World
Congress and Exhibition on Intelligent Transport Systems and Services.
2009.
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2339817, IEEE Communications Surveys & Tutorials
MANUSCRIPT SUBMITTED TO IEEE COMMUNICATIONS SURVEYS & TUTORIALS
Dr. Soufiene Djahel is an engineering research John Murphy is an Associate Professor in Com-
manager at University College Dublin and member puter Science and Informatics at University College
of wireless networking group of PEL since February Dublin. He received a first class honours degree
2012. Before joining in PEL, he was a postdoc in electronic engineering (B.E.) in 1988 from the
fellow at ENSIIE where he was involved in a re- National University of Ireland (UCD), an M.Sc. in
search project aiming at designing communication electrical engineering from the California Institute
protocols for Hybrid Sensor and Vehicular Networks of Technology in 1990 and a Ph.D. in electronic
(HSVNs). He got his Ph.D degree in computer engineering from Dublin City University in March
science in December 2010 from LILLE 1 University- 1996. He is an IBM Faculty Fellow, a Fellow of
Science and Technology of France. During his Ph.D, the Institution of Engineering and Technology, a
he was working on security issues at MAC and Senior Member of the IEEE, a Fellow and Chartered
Routing layers in wireless multi-hop networks. Prior to that, he spent 6 Engineer with Engineers Ireland, and a Fellow of the Irish Computer Society.
months at INRIA NORD Europe research center as an engineer researcher. He For many years he held an academic part-time position at the Jet Propulsion
received a Magister degree with majors in networking and distributed systems Laboratory in Pasadena, and acted as a consultant to the US Department of
and a state engineering degree in computer science from Abderrahmane- Justice.
mira University (Bejaia, Algeria) and Badji-Mokhtar University (Annaba, Prof. Murphy is an editor for both IEEE Communications Surveys and
Algeria) in February 2007 and June 2004, respectively. The research interests Tutorials (since 2012) and Telecommunications Systems Journal (since 2008),
of Soufiene Djahel include Intelligent Transportation Systems, Security and and a guest editor for an upcoming issue on ’Automation in Software
QoS issues in Wireless Networks (VANETs, MANETs, WSNs and WBANs) Performance Engineering’ in the Automated Software Engineering Journal
and Internet of Things. He is member of IEEE and reviewer of its major (2014). He has served on the Editorial Board of IEEE Communications Letters
conferences and journals in wireless networks and security. He was the general (2008-2012) and IET Communications (2006-2010), where he was a guest
co-chair of VTM 2014 and the TPC co-chair of VTM 2012, and has served editor (with Prof. Perros) for ’Optical Burst and Packet Switching’ in 2009.
on the TPC of several conferences including IEEE ICC, IEEE WCNC, IEEE He has published over 100 peer-reviewed journal articles or international
Globecom and IEEE IWCMC. conference full papers in performance engineering of networks and distributed
systems. He has supervised 17 Ph.D. students to completion and been awarded
over 20 competitive research grants (in excess of 7.5 million euro)
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.