Expanding Coverage of an Intelligent Transit Bus Monitoring System via ZigBee Radio Network

  • Ahmad SalmanEmail author
  • Samy El-Tawab
  • Zachary Yorio
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 69)


Public transportation around midsize college towns has become increasingly vital as residential, and commuter populations continue to grow every year. Our research team proposes a cyber-physical system that monitors the quality of service of the transit bus system around James Madison University. By using the power of Internet of Things (IoT), it is possible to create a network of smart nodes that collect data on the bus routing efficiency and ridership. Using Big-Data gathered, improvements can be made to bus route efficiency and traffic congestion in Harrisonburg, as well as similar college towns in the future. This paper concentrates on the steps taken to improve and expand upon our current system’s network infrastructure to allow the collection of data to take place outside the range of campus WiFi. Additionally, the security of passenger data during transmission and storage from smart nodes is also addressed.


IoT (Internet of Things) Cyber-physical system Intelligent Transportation Systems Cloud Computing Zigbee radio Hashing algorithm 



This work was supported by the 4-VA Collaborative at James Madison University Fall 2017. The authors would like to thank James Madison University Public Safety, and transit bus manager Mr. Lee Eshelman for allowing us to conduct our experiments.


  1. 1.
    United States Department of Transportation. Intelligent Transportation Systems, November 2015Google Scholar
  2. 2.
    Centenaro, M., Vangelista, L., Zanella, A., Zorzi, M.: Long-range communications in unlicensed bands: the rising stars in the iot and smart city scenarios. IEEE Wirel. Commun. 23(5), 60–67 (2016)CrossRefGoogle Scholar
  3. 3.
    Chatzigiannakis, I., Vitaletti, A., Pyrgelis, A.: A privacy-preserving smart parking system using an IoT elliptic curve based security platform. Comput. Commun. 89, 165–177 (2016)CrossRefGoogle Scholar
  4. 4.
    Popescu, O., Sha-Mohammad, S., Abdel-Wahab, H., Popescu, D.C., El-Tawab, S.: Automatic incident detection in intelligent transportation systems using aggregation of traffic parameters collected through V2I communications. IEEE Intell. Transp. Syst. Mag. 9(2), 64–75 (2017)CrossRefGoogle Scholar
  5. 5.
    USDOT Releases 2016 Fatal Traffic Crash Data, October 2017Google Scholar
  6. 6.
    El-Tawab, S., Oram, R., Garcia, M., Johns, C., Park, B.B.: Data analysis of transit systems using low-cost IoT technology. In: First International Workshop on Mobile and Pervasive Internet of Things 2017 - 2017 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), March 2017Google Scholar
  7. 7.
    Evers, K., Oram, R., El-Tawab, S., Heydari, M.H., Park, B.B.: Security measurement on a cloud-based cyber-physical system used for intelligent transportation. In: 2017 IEEE International Conference on Vehicular Electronics and Safety (ICVES), pp. 97–102. IEEE (2017)Google Scholar
  8. 8.
    Tubaishat, M., Zhuang, P., Qi, Q., Shang, Y.: Wireless sensor networks in intelligent transportation systems. Wirel. Commun. Mob. Comput. 9(3), 287–302 (2009)CrossRefGoogle Scholar
  9. 9.
    Florin, R., Ghazizadeh, P., Zadeh, A.G., El-Tawab, S., Olariu, S.: Reasoning about job completion time in vehicular clouds. IEEE Trans. Intell. Transp. Syst. PP(99), 1–10 (2016)Google Scholar
  10. 10.
    Ghazizadeh, P., Olariu, S., Zadeh, A.G., El-Tawab, S.: Towards fault-tolerant job assignment in vehicular cloud. In: 2015 IEEE International Conference on Services Computing, pp. 17–24, June 2015Google Scholar
  11. 11.
    Blum, J., Eskandarian, A.: The threat of intelligent collisions. IT Prof. 6(1), 24–29 (2004)CrossRefGoogle Scholar
  12. 12.
    Mejri, M.N., Ben-Othman, J., Hamdi, M.: Survey on VANET security challenges and possible cryptographic solutions. Veh. Commun. 1(2), 53–66 (2014)Google Scholar
  13. 13.
    Elhamshary, M., Youssef, M., Uchiyama, A., Yamaguchi, H., Higashino, T.: TransitLabel: a crowd-sensing system for automatic labeling of transit stations semantics. In: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, pp. 193–206. ACM (2016)Google Scholar
  14. 14.
    Garcia, M., Rose, P., Sung, R., El-Tawab, S.: Secure smart parking at James Madison University via the cloud environment (SPACE). In: 2016 IEEE Systems and Information Engineering Design Symposium (SIEDS), pp. 271–276 (2016)Google Scholar
  15. 15.
    Dunlap, M., Li, Z., Henrickson, K., Wang, Y.: Estimation of origin and destination information from Bluetooth and Wi-Fi sensing for transit. In: Transportation Research Board 95th Annual Meeting, no. 16-6837 (2016)CrossRefGoogle Scholar
  16. 16.
    Liu, J., Shen, H., Narman, H.S., Chung, W., Lin, Z.: A survey of mobile crowdsensing techniques: a critical component for the internet of things. ACM Trans. Cyber-Phys. Syst. 2(3), 18 (2018)CrossRefGoogle Scholar
  17. 17.
    Statista: Forecast: number of smartphone users in the U.S. 2010–2018. Technical report (2015)Google Scholar
  18. 18.
    United states vehicle registration data, automobile statistics and trends. Technical report (2015)Google Scholar
  19. 19.
    Salem, A., Nadeem, T., Cetin, M., El-Tawab, S.: DriveBlue: traffic incident prediction through single site Bluetooth. In: 18th IEEE International Conference on Intelligent Transportation Systems, 15-18 September 2015 (2015)Google Scholar
  20. 20.
    Dimatteo, S., Hui, P., Han, B., Li, V.O.K.: Cellular traffic offloading through WiFi networks. In: 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems, pp. 192–201, October 2011Google Scholar
  21. 21.
    Merino, B.: How-to Instant Traffic Analysis with Tshark. Packt Publishing Ltd., Birmingham (2013)Google Scholar
  22. 22.
    Tellez, M., El-Tawab, S., Heydari, H.M.: Improving the security of wireless sensor networks in an IoT environmental monitoring system. In: 2016 IEEE Systems and Information Engineering Design Symposium (SIEDS), pp. 72–77, April 2016Google Scholar
  23. 23.
    Kumar, T., Mane, P.B.: ZigBee topology: a survey. In: International Conference on Control, Instrumentation, Communication and Computational Technologies Paper (2016)Google Scholar
  24. 24.
    Parallax Inc.: XBee-PRO ZB S2B extended range module, wire antennaGoogle Scholar
  25. 25.
    Salman, A., Ferozpuri, A., Homsirikamol, E., Yalla, P., Kaps, J.P., Gaj, K.: A scalable ECC processor implementation for high-speed and lightweight with side-channel countermeasures. In: 2017 International Conference on ReConFigurable Computing and FPGAs (ReConFig), pp. 1–8, December 2017Google Scholar
  26. 26.
    National Institute of Standards and Technology. FIPS PUB 180-4: The Keyed-Hash Message Authentication Code (HMAC). pub-NIST, August 2008Google Scholar
  27. 27.
    Yorio, Z., Oram, R., El-Tawab, S., Salman, A., Heydari, M.H., Park, B.B.: Data analysis and information security of an internet of things (IoT) intelligent transit system. In: 2018 Systems and Information Engineering Design Symposium (SIEDS), pp. 24–29, April 2018Google Scholar
  28. 28.
    Stevens, M.M.J.: Attacks on hash functions and applications. Ph.D. thesis, Mathematical Institute, Faculty of Science, Leiden University, June 2012Google Scholar
  29. 29.
    Salman, A., Rogawski, M., Kaps, J.P.: Efficient hardware accelerator for IPSec based on partial reconfiguration on Xilinx FPGAs. In: 2011 International Conference on Reconfigurable Computing and FPGAs, pp. 242–248, November 2011Google Scholar
  30. 30.
    National Institute of Standards and Technology. FIPS PUB 180-4: Secure Hash Standard. pub-NIST, August 2015Google Scholar
  31. 31.
    Hatzivasilis, G., Papaefstathiou, I., Manifavas, C.: Password hashing competition - survey and benchmark. Cryptology ePrint Archive, Report 2015/265 (2015).
  32. 32.
    Martin, J., Mayberry, T., Donahue, C., Foppe, L., Brown, L., Riggins, C., Rye, E.C., Brown, D.: A study of MAC address randomization in mobile devices and when it fails. CoRR abs/1703.02874 (2017)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.College of Integrated Science and EngineeringJames Madison UniversityHarrisonburgUSA

Personalised recommendations