Assisting Vehicles Using Cyber-Physical Systems

  • Navid Anjum Munshi
  • Chandreyee Chowdhury
  • Sarmistha Neogy
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 701)


Real-time vehicle control is one of the main applications of cyber-physical system. Modern smart vehicles contain different sensors and actuators and these execute physical processes, thereby making it a typical cyber-physical system. The exact operation of the vehicle depends on the correct interaction between its cyber and physical component. Any error or malfunctioning of any component in the vehicle may be fatal or cause property damages. Now-adays, accidents on roads are very frequent and in most of the cases, the main reason is over speeding. The main aim of this paper is to calculate average speed that uses real-time traffic information with historical traffic data. This may be used to develop traffic strategies that will improve and smoothen real-time traffic. Here, we propose a scheme to control vehicle speed using Cyber-Physical System (CPS) for driver assistance and traffic safety.


  1. 1.
    Kyoung, D.K., Kumar, P.R.: Cyber–physical systems: a perspective at the centennial. In: Proceedings of the IEEE 2012, pp. 1287–1308Google Scholar
  2. 2.
  3. 3.
  4. 4.
    Lin, C.-Y., Zeadally, S., Chen, T.S., Chang, C.-Y.: Enabling cyber physical systems with wireless sensor networking technologies. Int. J. Distrib. Sens. Netw. Article ID 489794 (2012)Google Scholar
  5. 5.
    Lehpamer, H.: Transmission Systems Design Handbook for Wireless Networks. Artech House (2002)Google Scholar
  6. 6.
    Mitchell, R., Chen, I.-R.: A survey of intrusion detection techniques for cyber-physical systems. ACM (2014). ISSN: 0360-0300, EISSN: 1557-7341Google Scholar
  7. 7.
    Rajkumar, R.R., Lee, I., Sha, L., Stankovic, J.: Cyber-physical systems: the next computing revolution. In: Design Automation Conference 2010, Anaheim, California, USA, pp. 731–736. ACMGoogle Scholar
  8. 8.
    Mills, E.: Hackers broke into FAA air traffic control system. Wall Str. J. A6 (2009)Google Scholar
  9. 9.
    Biswas, S., Dey, P., Neogy, S.: Secure checkpointing-recovery using trusted nodes in MANET. In: IEEEXplore 2013 4th ICCCT, pp. 174–180 (2013)Google Scholar
  10. 10.
    Chowdhury, C., Neogy, S.: Checkpointing using mobile agents for mobile computing system. Int. J. Recent Trends Eng. 1(2), 26–29 (2009)Google Scholar
  11. 11.
    Chowdhury, C., Neogy, S.: Consistent checkpointing, recovery protocol for minimal number of nodes in mobile computing system. In: Lecture Notes in Computer Science, High Performance Computing—HiPC 2007, vol. 4873, pp. 599–611 (2007)Google Scholar
  12. 12.
    Mitchell, R., Chen, I.R.: A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. 46(4) (2014)Google Scholar
  13. 13.
    Bell, M., Muirhead, L., Hu, F.: Cyber-physical system for transportation application. In: Hu, F. (ed.) Cyber-Physical Systems, pp. 253–265. CRC Press (2014)CrossRefGoogle Scholar
  14. 14.
    Jianjun, S., Xu, W., Jizhen, G., Yanzhou, C.: The analysis of traffic control cyber-physical systems. In: Procedia Social and Behavioral Sciences, vol. 96, pp. 2487–2496 (2013)CrossRefGoogle Scholar
  15. 15.
    Möller, D.P.F., Fidenco, A.X., Cota, E., Jehle, I.A., Vakilzadian, H.: Cyber-physical smart traffic light system. In: Proceedings of the IEEE EIT 2015 ConferenceGoogle Scholar
  16. 16.
    Astarita, V., Giofre, V.P., Guido, G., Festa, D.C.: Traffic delays estimation in two lane highway reconstruction. Proced. Comput. Sci. 32, 331–338 (2014)CrossRefGoogle Scholar
  17. 17.
    Treiber, M., Kestling, A.: Traffic Flow Dynamics: Data, Models and Simulation. Springer Publishing (2014)Google Scholar
  18. 18.
    Möller, D.P.F., Deriyenko, T., Vakilzadian, H.: Cyber- physical vehicle tracking system-requirements for using radio frequency identification technique. In: Proceedings of the IEEE IET 2015 ConferenceGoogle Scholar
  19. 19.
  20. 20.

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Navid Anjum Munshi
    • 1
  • Chandreyee Chowdhury
    • 1
  • Sarmistha Neogy
    • 1
  1. 1.Department of Computer Science and EngineeringJadavpur UniversityKolkataIndia

Personalised recommendations