SwRI will be exhibiting at the Intelligent Transportation Systems (ITS) America Annual Meeting, Booth No. 431.
For more information, please contact Josh Johnson.
Wednesday, June 5
3:30 p.m. – 3:45 p.m., Room 204 B
“Case Study: Tracking Truck Parking in Florida,” Tucker Brown
Up until recently, truck parking in Florida was, at best, a difficult situation for many drivers. Truck drivers were having difficulty finding places to stop for the night. Frequently, truck parking areas would be full, thus forcing drivers to illegally drive over their allotted number of drivable hours or park in illegal spots. In an attempt to alleviate this problem, the Florida Department of Transportation (FDOT) decided to investigate the situation and determined the issue was “imbalance of truck parking capacity due to a lack of parking information management". FDOT concluded the next step was to install a Truck Parking Availability System (TPAS) to better deliver information about parking availability (1). FDOT owns an existing ATMS solution (SunGuide) that tracks a multitude of field devices, including Dynamic Message Signs, Cameras, Traffic Sensors, Ramp Meters, Highway Advisory Radios, and Roadside Weather Devices. With such a connected roadway already, it was only a matter of time before they took on an initiative to equip these truck parking facilities with sensors for collecting space counts, cameras for monitoring the area, and signs to communicate the parking availability counts to passing truck drivers. To allow as much data to flow to truck drivers, they also publish the data to 3rd parties. The design of the system took several iterations and this paper discusses the design options and technical hurdles faced in the implementation of the SunGuide Truck Parking System integration.
3:54 p.m. – 4:06 p.m., Room 204 A
“Combining Traditional Traffic Data and Connected Vehicle Technology to Implement Reduced Speed Work Zone and Queue Warnings in Lonestar,” Lynne Randolph
Using Connected Vehicle technology such as Dedicated Short-Range Communication (DSRC) equipment, transportation management centers can communicate with vehicles to both receive real-time information and provide back valuable road conditions information. As part of a Texas Department of Transportation (TxDOT) project with the Crash Avoidance Metrics Partnership (CAMP) and Texas A&M Transportation Institute (TTI), data from both connected vehicles and traditional traffic data were combined in an implementation of two connected vehicle applications, Reduced Speed Work Zone and Queue Warning. These implementations inform travelers about existing road conditions using the Lonestar™ Advanced Traffic Management System (ATMS) software to send both connected vehicle and traditional Dynamic Message Sign (DMS) messages.
Thursday, June 6
2:30 p.m. – 2:45 p.m., Room 204 A
“Cybersecurity Guidance for Managing Risk of TMS Equipment,” Marisa Ramon
There are more than 300,000 traffic signal systems across the United States with 2,550 added each year and all containing varying levels of network access and embedded security. Traffic managers and government stakeholders may be unaware of cyber risks to these systems and connected devices relaying data. SwRI is researching cybersecurity weakness in Transportation Management Systems (TMSs) as part of program with the Transportation Research Board (TRB) to help state and local agencies address cyber-attack risks on transportation systems and those posed by connected vehicles. As part of this research, a Web Guidance Tool (WGT) has been developed to help transportation agencies assess their risks as part of the NIST’s Risk Management process and gain an understanding of their TMS’s current cyber-security standing. The WGT accomplishes this through gathering information regarding the TMS’s current field deployment of devices, calculating risk associated with devices and how they are deployed, and provides recommendations for areas to improve their security practices while displaying this to the end user in an easily understood format. With these recommendations, an agency can then better understand potential flaws in their field deployment and seek to improve their security posture. This paper highlights the program background, the WGT developed as part of this program, and the cryptographic methods implemented in the WGT.