targeted denial of service attacks can be identified and
handled appropriately.
From Fig. 8, one can see that even with low traf-
fic, on average, five vehicles pass a junction in a sin-
gle queue. Therefore, these five vehicles form a k-
anonymity set of 5 as long as nobody can derive in
which order they arrive at and leave the junction. Al-
though the presentation tokens are generally crypto-
graphically unlinkable and untraceable, conclusions
could be drawn from the content or time of transmis-
sion. Therefore, it is necessary that V communicate
independently of their location with T L and that the
arrival time is not exact to the second, but should be
given in buckets of e.g. 5 seconds. The independence
from the location can be achieved by sending the mes-
sages to the traffic light with a random delay.
5 CONCLUSION
Here, we proposed an intelligent traffic light system
using crowdsourced user input transferred via V2X to
optimize the traffic light cycle and thus reduce overall
waiting time and emissions. A simulation has shown
that up to 40% of waiting time can be reduced in com-
plex situations. Therefore, the emissions can also be
lowered by around 5 % for the same number of vehi-
cles. This is done by i.a. avoiding unneccessary stops.
Furthermore, our approach achieves a significant level
of privacy by adapting ABC4Trust to our needs.
For future work, we plan to analyze the poten-
tial of our approach by extending the range of in-
formation available, i.e. interconnecting the traffic
light network, allowing two or more traffic lights to
exchange information and knowledge. However, the
impact of privacy for vehicles has to be taken into ac-
count. Our existing k-anonymity results only allow a
specific level of interconnection, which is of further
interest. Furthermore, we want to analyse the influ-
ence of even more flexible light schedules.
REFERENCES
Abuelsamid, S. (2019). Volkswagen Adds ‘Vehicle-
To-Everything’ Communications To Revamped Golf
With NXP Chips.
Arel, I., Liu, C., Urbanik, T., and Kohls, A. G. (2010). Rein-
forcement learning-based multi-agent system for net-
work traffic signal control. IET Intelligent Transport
Systems, 4(2).
Blumberg, A. J., Keeler, L. S., and Shelat, A. (2005). Auto-
mated traffic enforcement which respects ”driver pri-
vacy”. In IEEE Conference on Intelligent Transporta-
tion Systems, Proceedings, ITSC, volume 2005.
Darroch, J. N., Newell, G. F., and Morris, R. W. J. (1964).
Queues for a Vehicle-Actuated Traffic Light. Opera-
tions Research, 12(6).
Gao, J., Shen, Y., Liu, J., Ito, M., and Shiratori, N. (2017).
Adaptive Traffic Signal Control: Deep Reinforcement
Learning Algorithm with Experience Replay and Tar-
get Network. Technical report.
Gao, K., rong Han, F., fei Wen, M., hua Du, R., Li, S., and
Zhou, F. (2019). Coordinated control method of in-
tersection traffic light in one-way road based on V2X.
Journal of Central South University, 26(9).
Li, Y. (2012). Netzweite Lichtsignalsteuerung auf Basis
Rekurrenter Neuronaler Netze. Dissertation, Technis-
che Universit
¨
at M
¨
unchen.
Liang, X., Du, X., Wang, G., and Han, Z. (2019). A Deep
Reinforcement Learning Network for Traffic Light
Cycle Control. IEEE Transactions on Vehicular Tech-
nology, 68(2).
Nirmani, A., Thilakarathne, L., Wickramasinghe, A.,
Senanayake, S., and Haddela, P. S. (2018). Google
Map and Camera Based Fuzzified Adaptive Net-
worked Traffic Light Handling Model. In 2018 3rd
International Conference on Information Technology
Research, ICITR 2018. Institute of Electrical and
Electronics Engineers Inc.
Pfitzmann, A. and Borcea-Pfitzmann, K. (2010). Lifelong
privacy: Privacy and identity management for life.
In IFIP Advances in Information and Communication
Technology, volume 320. Springer New York LLC.
Rachmadi, M. F., Al Afif, F., Jatmiko, W., Mursanto, P.,
Manggala, E. A., Ma’sum, M. A., and Wibowo, A.
(2011). Adaptive traffic signal control system using
camera sensor and embedded system. In TENCON
2011 - 2011 IEEE Region 10 Conference. IEEE.
Sabouri, A., Krontiris, I., and Rannenberg, K. (2015).
Attribute-based Credentials for Trust. Springer Inter-
national Publishing, Cham.
Schaub, F., Ma, Z., and Kargl, F. (2009). Privacy re-
quirements in vehicular communication systems. In
Proceedings - 12th IEEE International Conference on
Computational Science and Engineering, CSE 2009,
volume 3.
Steingr
¨
over, M., Steingr
¨
over, M., Schouten, R., Peelen, S.,
Nijhuis, E., and Bakker, B. (2005). Reinforcement
learning of traffic light controllers adapting to traffic
congestion. Benelux Conference on Artificial Intelli-
gence, BNAIC 2005.
Varga, N., Bokor, L., Takacs, A., Kovacs, J., and Vi-
rag, L. (2017). An architecture proposal for V2X
communication-centric traffic light controller sys-
tems. In Proceedings of 2017 15th International Con-
ference on ITS Telecommunications, ITST 2017. Insti-
tute of Electrical and Electronics Engineers Inc.
Wiedersheim, B., Ma, Z., Kargl, F., and Papadimitratos, P.
(2010). Privacy in inter-vehicular networks: Why sim-
ple pseudonym change is not enough. In WONS 2010 -
7th International Conference on Wireless On-demand
Network Systems and Services.
Xing, S.-Y., Lian, G.-L., Yan, D.-Y., and Cao, J.-Y.
(2018). Traffic Signal Light Optimization Control
Based on Fuzzy Control and CCD Camera Technol-
ogy. DEStech Transactions on Computer Science and
Engineering, (cmsms).