1. Introduction
Due to the exceptional progress in digital technologies made in recent decades, many aspects of our lives are subject to rapid changes. Technology has advanced the way we communicate, travel, and entertain ourselves. The automotive industry has been significantly transformed, and the latest cars provide many benefits to their passengers in terms of safety and comfort. However, we are still quite far away from an ideal state, represented by the Zero Accident Vision [
1].
The automotive industry, public authorities, as well as researchers all around the world are addressing pressing issues related to road traffic, including traffic safety [
2], environmental impacts [
3], and traffic congestion [
4]. One of the key technologies expected to bring major benefits towards achieving these goals is cooperative, connected, and automated mobility [
5]. Despite some accidents occurring in the past, connected and automated vehicles are expected to be much safer than human-driven cars when the corresponding technology will be mature enough [
6].
Until automated vehicles become an every-day reality, conventional vehicles can also benefit from vehicle-to-everything (V2X) communication [
7]. The European Commission published a list of Day 1 Cooperative Intelligent Transport Systems (C-ITS) applications [
8] that are expected to be supported first by connected vehicles. The list also includes an emergency vehicle approach (EVA) warning system. The initial idea leading to the system proposed in this paper was awarded by the European Commission in 2017 as a project with innovative potential in the transport area [
9].
1.1. Previous Work
Emergency vehicles (EVs) have been using warning devices for a long time. Currently, the most used warning system deployed by EVs is a combination of flashing lights and sirens. This system has obvious disadvantages, as has been demonstrated by several studies. For instance, a siren is a severely limited warning device effective only for very short range and very low speeds. On top of that, hearing loss of siren-exposed personnel has also been documented in several studies [
10,
11,
12]. Currently, many cars are equipped with multimedia entertainment systems, which can lead to a situation where a driver is not able to hear the audio warning system of the approaching EV. Furthermore, many cars are now virtually sound-proof. Due to the limited range of the audio alerts, even if a driver notices the siren, he/she often does not have enough time to react in time. Such situations may lead to traffic accidents, mostly occurring at intersections [
13].
Both the scientific community as well as the public authorities believe that these limitations can be addressed by the deployment of information and communication technologies (ICT). There are two major communication technologies capable of transferring warning messages—Vehicular Ad hoc Networks (VANETs) and 5G [
14,
15]. Currently, it is not certain, which technology will dominate the future market, however, when it comes to the available standards (e.g., frequency allocations), VANET is the most mature technology [
15]. Moreover, it provides an adequate communication range, non-line-of-sight message dissemination, and innovative use of data transmission methods, easing the information interpretation and thus leveraging the benefits of an electronic-communication-based warning system. For these reasons, we selected VANET to implement the privacy ensuring emergency vehicle approaching warning system (PEEV-WS).
Some works have already explored the possibilities of EVA implementation using VANETs [
16,
17]. All these works are based on broadcasting the expected EV route to all vehicles. Based on a projected route, a receiving vehicle determines whether the warning message is relevant or not. This practice introduces two issues. First, the EV route needs to be properly interpreted. The route can be transmitted in two forms—either as a sequence of geographical coordinates, or as a succession of map-specific edges (e.g., road segments and lanes). In both cases, the sender as well as the receiver must use the same reference map, to reliably recognize the transport infrastructure objects (e.g., lanes) which will be used by the EV. Hence, the map must be either agreed on in advance or transmitted together with the EV route. As presented in [
18], updates of high-definition maps can take a significant amount of communication network resources, decreasing the available bandwidth for application payload, and increasing the communication latency. Difficulties of map exchanges can be avoided if the EV is responsible for the decision-making process and determines which vehicles can potentially interfere with the EV in the near future and notifies those vehicles only by unicasting the vehicle-customized information (e.g., a request to change the lane). To predict vehicle trajectory and the probability of a lane change, techniques based on the extended Kalman filter [
19], long-short-term-memory networks [
20], and support vector machine in combination with Bayesian filter [
21] were already explored. Second, there is a significant risk that the information about the route of the EV can be misused. This can be prevented by encrypting the message content. In the general context, several research projects systematically targeted the security issues in the VANETs, for example the Cooperative Vehicle-Infrastructure Systems (CVIS), E-safety Vehicle Intrusion Protected Applications (EVITA), and Secure Vehicular Communication (SeVeCom) [
22,
23,
24]. In [
25], Ďurech evaluated various digital signature schemes [
26]. However, when the number of messages becomes large, traditional per-message authentication schemes may generate unaffordable delays [
27]. The privacy can be enforced even further by avoiding transmissions of sensitive information (e.g., projected EV route) over the wireless channel. This can be achieved by making the EV responsible for determining which vehicles can potentially interfere with the EV in the near future. To the best of our knowledge, this approach has not been previously addressed in the literature. Furthermore, the unicast eliminates the need of frequent resource-heavy map exchanges between communicating vehicles.
To communicate the vehicle-customized information, the network routing protocols have to be used. It is worth noting that the performance of ad hoc routing protocols in the specific conditions of VANETs has been questioned in some studies. For example, Sommer et al. [
28] concluded that the ad hoc routing protocols fail to deliver the performance needed to reliably support the variety of proposed VANET applications and should not be used as a universal method for information dissemination in the VANETs. The authors of the study [
29], dealing with the performance of the Greedy Perimeter Stateless Routing (GPSR) protocol in vehicular networks, conclude that due to its performance limitations, GPSR seems to be unsuitable for vehicular communication applications. The usage of certain network-layer protocols can be restricted for certain services in Europe. For instance, the European Telecommunications Standards Institute (ETSI) European Standard (EN) 302 636-3 [
30] requires the use of ETSI GeoNetworking [
31] as the only network-layer protocol for safety-related communications in ETSI ITS-G5A band. However, for a certain sort of application, e.g., warning applications, that have less strict delay requirements than the safety-related applications, deployment of ad hoc routing-based communication can still be justified and considered as a legitimate approach. Moreover, an ability to implement relatively reliable unicast communication can even be, for some applications, preferred over the sheer value of the end-to-end delay.
1.2. Scientific Contributions and Structure of the Paper
The amount of available studies addressing privacy issues in VANET-based emergency vehicle warning systems is rather small. Our main scientific contribution is constituted by the proposed privacy preserving concept and by the feasibility study of the application protocol for the emergency vehicle warning system. Specific contributions of this work can be summarized as follows:
Formulation of the requirements and the concept of the application protocol for an emergency vehicle warning system based on VANET, with low risk of EV location disclosure;
Application of the federated telco-traffic simulator and benchmarking of the communication performance of the Ad hoc On-Demand Distance Vector (AODV), GPSR, and Dynamic MANET On-demand (DYMO) routing protocols using realistic scenarios;
Evaluation of the proposed system in the transport domain in terms of reaction time available to drivers.
The rest of the paper is organized as follows. System requirements and assessment of communication technologies are given in
Section 2.
Section 3 presents the concept of the proposed system. Simulation scenarios and simulation results are presented in
Section 4 and
Section 5, respectively. Discussion and summary of conclusions are provided in
Section 6.
3. Privacy Ensuring Emergency Vehicle Approaching Warning System
To avoid the need to broadcast the EV’s route, we propose a novel privacy preserving emergency vehicle warning system, which utilizes a unicast communication to target the selected vehicles only, i.e., those whose action is required to ensure fluent transit of the EV. The proposed application message format can be adopted by any other vehicle-to-vehicle technology allowing unicast communication. This makes the proposed system transmission technology agnostic.
The proposed system assumes the following preconditions:
All the vehicles are equipped with the compatible communication modules and other hardware necessary to either display the information to a driver or act autonomously following the received requests.
All the regular vehicles except for the EV periodically disseminate the CAMs or other similar sources of data that can be used to estimate their current position at a lane-level resolution.
All the vehicles are equipped with the proposed emergency vehicle warning system deploying the standardized request codes, and drivers obey the requests provided by the system.
In VANETs, the EV receives the CAMs [
36] from other vehicles within its communication range. From the received data, the EV learns a topology of the network and extracts the information about other vehicles’ locations and compiles a list of all reachable vehicles (see
Figure 2). When the PEEV-WS is initiated, the main process executing the steps illustrated in
Figure 3 is triggered. The main process updates the list of relevant vehicles based on CAMs. For each newly identified relevant vehicle, a communication handling process is triggered, and the communication process with already irrelevant vehicles is terminated. When an interference between EV trajectory and a vehicle is detected in the communication handling process, the corresponding warning message is created, and a routing protocol is used to find a communication route to the interfering vehicle (see
Figure 3). This ensures that only the relevant vehicle receives the information about the approaching EV together with the specific request for the desired action. In general, to decide on a suitable action is a very complex problem and it is out of the scope of this paper. In simulations, we consider scenarios involving multiple lanes and the action is limited to changing lanes to one which is not interfering with the EV trajectory.
As communication between vehicles in VANET does not use acknowledgments, a sender does not have the information about the transmission result. Even if some messages may get lost the vehicles still have to be informed about the approaching EV. When the EV needs to communicate a request to a vehicle, it generates messages periodically with a specific interval ∆t. The generation of messages continues until the EV detects the desired change in the vehicle’s trajectory. When the vehicle again obstructs the EV’s trajectory, this behavior is detected, and the communication loop is initiated again.
Considering the communication algorithm visualized in
Figure 3, the time
when the vehicle receives the
ith message from the EV is expressed by Equation (1):
where
and
are an
ith message’s encapsulation and decapsulation delays respectively,
is a propagation delay,
is a message transmission duration,
is a medium access (MAC) delay,
is a message generation interval, and
is a start time of the message transmission. Please note that MAC delays arise due to the contention-based nature of the VANET MAC layer. A time
when the vehicle receives the information about the approaching EV can be obtained as
. The difference between the time when an EV passes by the informed vehicle and
gives us an estimate of the available reaction time.
The structure of the message was designed to accommodate all information required for the correct operation of the system (see
Figure 4). Blue fields represent the message header while green fields are the system payload. The length of the payload field was chosen to allow the stacking of multiple requests linked with the same destination. This approach helps to decrease wireless channel congestion by transferring multiple requests within a single medium access procedure at the MAC layer. Two timestamp fields in the payload were introduced to get a high precision timestamp of the message encapsulation. The 64 bits correspond to the resolution of one nanosecond. Based on this information, the receiving node can estimate the end-to-end delay of the corresponding transmission, while gaining information about the timeliness of the received message. The calculated end-to-end delay could also be used by the routing process at the network layer to fine-tune a next-hop selection. A detailed description of the remaining message format fields can be found in
Table 2.
5. Simulation Results
For each scenario and each routing protocol, we ran 15 independent simulation experiments. The average simulation run time varied strongly depending on the simulated routing protocol. For AODV and GPSR, the average simulation run time was about 30 min on the computer equipped with Intel Core i7 Central Processing Unit (CPU) and 16 GB of Random-access Memory (RAM.) A single simulation run of the DYMO protocol took up to several hours using the same simulation workstation. As the performance metrics for the communication domain, the end-to-end delay and the message delivery probability of the messages were considered. Both indicators showed high variability across individual vehicles as they strongly depend on the distance between the EV and the vehicle. For this reason, the values of indicators were evaluated for single vehicles by averaging over delivered messages. The results of the simulation experiments are presented in
Table 3. The best-case value represents the average end-to-end delay calculated over all the received messages by the vehicle, with the lowest average communication delay in simulations. The worst-case value represents the same quantity for the vehicle with the maximum average communication delay. The analogous approach was applied to the average message delivery probability.
It is worth noting here that while the obtained message delivery probability values presented in
Table 3 may appear to be very low even for the best-case scenarios, the values correspond to the previous observations made in the ad hoc network environment, see [
44,
45] for more details.
The performance of routing protocols for the two traffic scenarios differs due to the density of vehicles. Even though the traffic flow was the same in both scenarios, the lower speed limit in the Bratislava scenario implies a higher number of vehicles located in the EV’s communication range. Moreover, vehicles often stopped at signalized intersections. Hence, the communication network was denser, the routing protocols could often find more than one communication route to the destination vehicle and the message delivery probability was increased.
The AODV protocol, even though reaching relatively high end-to-end latency, if compared to typical expectations, is sufficient to support the dissemination of warning system messages. The achieved latency is well below the value that could substantially affect the reaction time available to drivers. Moreover, the AODV protocol achieved the highest message delivery probability among the three investigated protocols. Unlike DYMO, the AODV protocol may use Hello messages through which a vehicle periodically checks the availability of neighboring vehicles. This helps to keep the routing table more up to date at the cost of slightly increased signalization overhead. A more up to date routing table implies increased reliability and decreased latency when transmitting payload messages. The GPRS protocol achieves very low latency and the message delivery probability is lower than 24%. This comes from the routing strategies behind the GPSR protocol as also reported in [
29]. If the protocol is unable to find next hop that is geographically closer to the destination, then the protocol switches to the perimeter routing mode and the algorithm traverses the network in a counter-clockwise direction. The DYMO protocol achieves the highest end-to-end delay and its message delivery probability ranges from 4% to 53% in both traffic scenarios. Please note rather high values of the standard deviation of the end-to-end delay in the case of the DYMO protocol. These are caused by extremely large end-to-end delays of the first transmitted messages. If there is no communication route to the destination vehicle in the EV’s routing table, DYMO initiates the route discovery process and the first messages are transmitted only when this process is accomplished, which in our simulation experiments took several seconds. The following messages are usually delivered with a delay in the range of tens of milliseconds.
In summary, only the AODV routing protocol reached sufficiently high reliability and it will be further employed by the PEEV-WS.
When forming the emergency lane, the number of vehicles that need to be informed about an approaching EV depends on the traffic conditions (speed and traffic density). For example, considering the required communication range of 1000 m and the uniform separation between vehicles of 25 m, the number of vehicles that could occupy the emergency lane is 40. Through simulations, we investigated the number of vehicles the EV can communicate to. When using the default configuration of the AODV protocol, we found out that in the Bratislava scenario, the EV was able to communicate with all relevant vehicles, however, in the Žilina scenario, the EV could simultaneously communicate at maximum to 12 destination vehicles only, which was not enough to communicate with all relevant vehicles. Close investigations revealed that this limitation is caused by the parameter settings affecting the routing mechanism, in particular, it is given by the maximum number of route request messages that can be generated in one second,
. This value limits the number of messages that are sent out within one cycle by the EV, to discover the existing communication routes in the network. In the AODV protocol specification, this value is given by the value of the parameter RREQ_RATELIMIT. A relationship between the number of successfully addressed vehicles and the value of
is analyzed in
Figure 6a while simulating the Žilina scenario.
By increasing the value
, the number of vehicles that the EV can communicate to increases as well. When
reaches 45, the number of vehicles saturates, as it has already reached the maximum number of vehicles that simultaneously occupied the emergency lane. The simulation results clearly indicate that the number of vehicles can be easily increased, however, increasing the
value increases the overall signalization traffic in the communication network and it could potentially increase the of end-to-end delays experienced by the PEEV-WS. In
Figure 6b,c, we examine the minimum and the maximum end-to-end delay, i.e., the minimum and the maximum value of end-to-end delays across all PEEV-WS messages, as a function of
. In both cases, we find an increasing trend, however, considering the required reaction time, the increase in the end-to-end delay is not substantial.
To assess the system performance in the transport domain, the empirical reaction time available to drivers is evaluated. The available reaction time strongly depends on the distance between the EV and the involved vehicle at the time when the EV initiates the message transmission. Its value is naturally low for the vehicles close to the EV and it is different for every combination of transmission start time and vehicle positions. For this reason, we evaluate the system performance for individual vehicles considering the emergency scenarios Žilina and Bratislava.
The delivery time of the first message can be found in
Figure 7. The time of the delivery of the first message is the difference between the time when the first message was received and the time when the first message was sent. Please note, if some messages are not delivered, then the time of delivery does not coincide with the end-to-end delay of messages.
If the distance between the EV and vehicle was less than 1000 m, the time of the first message delivery was negligible as in most cases one hop was sufficient. When more hops were needed the delivery time increased, nevertheless, it did not exceed 1.5 s, which is an acceptable value, considering the required reaction time. The three vehicles in
Figure 7a with times of message delivery greater than 1 s, correspond to the cases when the first sent message did not reach the destination vehicle and the message was retransmitted during the following time interval.
For simplicity reasons, the time needed to present the content of the received communication message to the driver and the time a driver needs to learn the message content was neglected as it can vary depending on the utilized human-machine interface implementation. Hence, the available reaction time depends on the distance from the EV to the vehicle at the time when the first message was delivered, on the relative speed of the vehicles, and on the action taken by the vehicle driver. To estimate the lower and the upper bound of the available reaction time, we assume two hypothetical options for how the situation could unfold after the driver receives the first message informing about the approaching EV.
The first option is when the driver immediately stops the vehicle on the roadside not to be in the way of the EV (as it is currently required by the Slovak legislation). The second option is when the vehicle changes lane and EV, as well as the vehicle, continue without changing speed. In both cases, we can easily estimate the time when the EV will reach the vehicle and hence estimate the available reaction time.
In simulation, after receiving the first message informing about the EV approaching, vehicles change lane and continue driving with unchanged desired velocity. From the simulation, the available reaction time was evaluated as the difference between the time when the vehicle received the first message and the time when the EV overtook the vehicle. If in the simulation the EV did not manage to overtake the vehicle, then the value of the reaction time is not reported. All three values, the lower and upper estimates and the value of the available reaction time measured from the simulation are presented in
Figure 8.
The linear dependency between the available reaction time and the distance from the EV to the vehicle, for the values of estimated reaction time (lower and upper bounds) indicates that the communication time takes only a small part of the reaction time. Hence, the PEEV-WS successfully manages to communicate the information about the approaching EV to the drivers. If the distance between an EV and the vehicle exceeds 300 m, the reaction time exceeds 25 s, which provides vehicle drivers with sufficient time to take an appropriate action.
In the Bratislava scenario, the free flow of vehicles is interrupted by several traffic-light-controlled intersections. The vehicles which received PEEV-WS request message changed to the rightmost driving lane. However, they could not continue their route as the rightmost lane is a turning lane. Hence vehicles stop at the intersection and wait until the EV safely overtakes them. This behavior can be observed in
Figure 8b as groups of points formed at various distances and have very similar reaction times.
6. Discussion and Conclusions
The PEEV-WS, i.e., the emergency vehicle warning system deploying the VANET network, was proposed and implemented using the OMNeT++ network simulator and assessed by computer simulations. To facilitate the interpretation of the system messages, and to retain the privacy of EV’s dynamic data, network layer routing was selected as the message forwarding approach for the system’s messages. The performance of the three candidate ad hoc routing protocols (namely AODV, GPSR, DYMO) and the reaction time the PEEV-WS provides to drivers, were evaluated using realistic scenarios.
The simulation results suggest that the AODV protocol can support the communication generated by the PEEV-WS. The proposed system deploying the AODV network routing protocol complies with the latency requirements for the high-latency and low-frequency warning applications [
32], in almost all situations. The average end-to-end delay exceeded 1000 milliseconds only for the dense urban network scenario when the EV transmitted messages to distant vehicles. In these cases, the reaction time exceeds 100 s, hence, larger delays do not affect the functionality of the system.
According to Emergency Medical Management Cooperative (EMMCO) West [
46], the effective range of EV audio warning systems tops at less than 460 m in ideal conditions. When the environment is noisy and the vehicle’s windows are closed, the reaction time can be as low as 4 s. The proposed EV warning system can increase reaction time significantly. Thanks to the larger communication range, which reached up to 1750 m, the maximum available reaction time reached 320 s. High values of available reaction time open a new set of issues that have to be addressed as there is no point for the driver to take any action for several minutes. On the contrary, such an action could disrupt traffic fluency and cause other unexpected effects. Therefore, especially when the available reaction time is large, the EV should update the vehicles with information about the estimated time when it is supposed to reach the informed vehicle. Hence, the methods providing predictions of the EV’s driving time should be used in a V2X-based emergency vehicle warning system [
47].
On one hand, the simulation results suggest that the proposed warning system is feasible. On the other hand, if the PEEV-WS is deployed in the real world, we can expect many more situations and variables that could affect the performance of the system, e.g., different traffic conditions, buildings or other constructions potentially blocking signal propagation, different routing protocols, etc. Consequently, the parameter and state spaces are huge and could not be fully explored in this paper.
It is worth noting here that the goals of deploying the V2X-based EV warning system are twofold: (i) to assist formation of an emergency lane free of obstacles; and (ii) to provide assistance in keeping the formed emergency lane clear. The system proposed in this paper covers the first aspect, while the second is left for future work. Furthermore, future work should extend the PEEV-WS to more complex use cases that go beyond the emergency lane. Another great research challenge is the transition period with a presence of mixed traffic (conventional and connected vehicles). Finally, emerging technologies with a high potential for reliable low-latency communication, in particular, 5G and vehicle-to-infrastructure communication, could be used to disseminate EV warning messages to the vehicles and connected infrastructure, e.g., traffic lights and variable message signs. The communication could be managed either via the traffic management center or locally, which will bring new challenges regarding communication latency as well as system security and safety.