Real-time traffic congestion management and deadlock avoidance for vehicular ad Hoc networks

Syed Rafiul Hussain, Ala Odeh, Amrut Shivakumar, Shalini Chauhan, Khaled Harfoush

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations

    Abstract

    Traffic congestion is common in heavily populated cities. In this paper, we introduce a novel protocol to guide vehicles to their destinations while managing congestion and avoiding deadlock situations in urban city grids. The protocol relies on vehicle-to-infrastructure (V2I) communication, infrastructure-to-infrastructure (I2I) communication as well as GPS information to disseminate congestion information to city grid intersections. Our proposal pro-actively aims at avoiding congestion scenarios and reacts to arising congestion in case it happens due to unpredictable events such as collisions. Simulation results reveal that vehicles enjoy reduced travel times even during rush hours and in the presence of collisions.

    Original languageEnglish (US)
    Title of host publication2013 High Capacity Optical Networks and Emerging/Enabling Technologies, HONET-CNS 2013
    PublisherIEEE Computer Society
    Pages223-227
    Number of pages5
    ISBN (Print)9781479925698
    DOIs
    StatePublished - 2013
    Event10th International Conference on High Capacity Optical Networks and Emerging/Enabling Technologies, HONET-CNS 2013 - Famagusta, Cyprus
    Duration: Dec 11 2013Dec 13 2013

    Publication series

    Name2013 High Capacity Optical Networks and Emerging/Enabling Technologies, HONET-CNS 2013

    Other

    Other10th International Conference on High Capacity Optical Networks and Emerging/Enabling Technologies, HONET-CNS 2013
    CountryCyprus
    CityFamagusta
    Period12/11/1312/13/13

    All Science Journal Classification (ASJC) codes

    • Computer Networks and Communications

    Fingerprint Dive into the research topics of 'Real-time traffic congestion management and deadlock avoidance for vehicular ad Hoc networks'. Together they form a unique fingerprint.

    Cite this