The importance of V2X simulation: An in-depth comparison of intersection control algorithms using a high-fidelity communication simulation

被引:6
作者
Ormandi, Tamas [1 ]
Varga, Balazs [1 ]
机构
[1] Budapest Univ Technol & Econ, Fac Transportat Engn & Vehicle Engn, Dept Control Transportat & Vehicle Syst, Muegyet Rkp 3, H-1111 Budapest, Hungary
关键词
Autonomous intersection control; Cybersecurity; Modeling and simulation; Sensitivity analysis; Vehicular communications; OPTIMIZATION; VEHICLES; MODEL; CAVS;
D O I
10.1016/j.vehcom.2023.100676
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The rapid evolution of vehicle-to-vehicle and vehicle-to-infrastructure communication opens doors to various control algorithms, one particular domain being intersection control. Several researchers have proposed communication-based intersection control algorithms omitting traditional traffic lights with the promise of enhanced throughput and improved traffic safety. On the other hand, the majority of these algorithms ignore the uncertainties and delays of communication and overlook new cyberattack vectors that are opened by connected traffic. The present study employs a highly detailed simulation of vehicular communication to highlight the sensitivity of different autonomous intersection control algorithms (both centralized and decentralized) to communication-related imperfections. The paper investigates five different algorithms borrowed from the literature in a comparative way. This research focuses on traffic-related parameters such as average speed, occupancy, and network throughput while also analyzing communication-related parameters (e.g., packet loss, computational demand) and considering possible attack vectors. Simulation results suggest that even the simplest control logic is sensitive to communication failures, degrading intersection throughput below traditional intersection control or even compromising traffic safety. For centralized algorithms, in the presence of noise, average speeds drop significantly, suggesting reduced intersection throughput and even gridlock for the First Come First Serve algorithm. Decentralized algorithms can be heavily affected by incoming message orders, which can lead to dangerous situations. During the simulations, multiple collisions were registered for the Monte-Carlo Tree Search algorithm. More complex algorithms that rely on accurate prediction on vehicle trajectories are more sensitive to noise and even produce accidents in the simulation. In conclusion, regardless of control architecture, the evaluated algorithms require additional fallback solutions and redundancies to retain traffic safety. (c) 2023 The Author(s). Published by Elsevier Inc. This is an open access article under the CC BY license (http://creativecommons .org /licenses /by /4 .0/).
引用
收藏
页数:27
相关论文
共 89 条
[1]  
[Anonymous], 1957, Am. Math. Mon., DOI [10.2307/2309088, DOI 10.2307/2309088]
[2]   Monte Carlo Tree Search in Hex [J].
Arneson, Broderick ;
Hayward, Ryan B. ;
Henderson, Philip .
IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES, 2010, 2 (04) :251-258
[3]  
Azimi R, 2014, ACM IEEE INT CONF CY, P1, DOI 10.1109/ICCPS.2014.6843706
[4]  
Bajaj L., 1999, UCLA COMPUTER SCI DE, V990027, P213
[5]  
Barr R., 2005, JIST SWANS
[6]  
Bashiri M, 2017, IEEE INT VEH SYM, P667, DOI 10.1109/IVS.2017.7995794
[7]   Metaheuristic Optimization-Based Path Planning and Tracking of Quadcopter for Payload Hold-Release Mission [J].
Belge, Egemen ;
Altan, Aytac ;
Hacioglu, Rifat .
ELECTRONICS, 2022, 11 (08)
[8]  
Benesty Jacob, 2009, The SAGE Encyclopedia of Educational Research, Measurement, and Evaluation, P1, DOI DOI 10.4135/9781506326139
[9]  
Bredel M., 2009, P 2 INT C SIM TOOLS, P1
[10]  
Lobo SC, 2020, Arxiv, DOI [arXiv:2011.11995, 10.48550/arxiv.2011.11995, DOI 10.48550/ARXIV.2011.11995]