Empowering Pedestrian Safety: Unveiling a Lightweight Scheme for Improved Vehicle-Pedestrian Safety

: Rapid advances in technology and shifting tastes among motorists have reworked the contemporary automobile production sector. Driving is now much safer and more convenient than ever before thanks to a plethora of new technology and apps. Millions of people are hurt every year despite the fact that automobiles are networked and have several sensors and radars for collision avoidance. Each year, many of them are injured in car accidents and need emergency care, and sadly, the fatality rate is growing. Vehicle and pedestrian collisions are still a serious problem, making it imperative to advance methods that prevent them. This paper refines our previous efficient VANET-based pedestrian safety system based on two-way communication between smart cars and the cell phones of vulnerable road users. We implemented the scheme using C and NS3 to simulate different traffic scenarios. Our objective is to measure the additional overhead to protect vulnerable road users. We prove that our proposed scheme adds just a little amount of additional overhead and successfully satisfies the stringent criteria of safety applications.


Introduction
Vehicle-to-everything communication might reduce crash rates, pollution, and poor road management [1].Speed-related crashes account for four times as many homicide fatalities annually in certain countries [2].Road accidents are mostly caused by human negligence while bolstering preventative efforts can lessen their impact [3].According to [4], the mortality per capita rate in the USA increased by 6% between 2019 and 2020.Vulnerable road users (VRUs), defined in [5] as walkers, cyclists, and motor wheels with high accident involvement risk, are now a component of collision avoidance research.This is a positive shift since vulnerable road users (VRUs) accounted for over 50% of the 1.35 million fatalities on the roads in 2018 [6].Collision damage is decreased via research on passive collision avoidance (PCA).Contrarily, autonomous collision avoidance (ACA) helps avoid crashes [7].Bike lanes [8,9], bumpers [10] that are friendly to pedestrians, LED-equipped gloves [11] and helmets [12], and sensor-enabled airbag systems [13] are a few PCA techniques.Since these safeguards have not been been tested, it is unclear how effective they will be [14].The two main groups of autonomous collision avoidance techniques are those that presume visibility or a line of sight (LOS), such as radar, lidar, and vision-based systems [7], and those designed for non-line of sight (NLOS) circumstances, which are the subject of this study.Vehicle-to-vulnerable road user (V2X) communication via RFID, DSRC, WIFI, or cellular V2X are examples of NLOS ACA techniques.The strategies for avoiding collisions are listed in Figure 1.Weather and lighting have little impact on NLOS techniques [15].They depend on OBU-VRU communication [16].This is crucial since the majority of fatal traffic accidents are caused by poor visibility and slow response times [17].Connectivity is made possible by these policies [18].This makes use of these users' critical perception and informationsharing abilities with other road users [19].In NLOS, several system design variables might categorize VRU safety systems, which are sometimes referred to as vehicle-to-pedestrian (V2P) systems.The role of the VRU device in the system is one significant distinction.Applications for awareness allow the driver total control and limit the VRU device to a "Hello" signal to announce its presence.The VRU device may carry out algorithmic computations and trajectory predictions in challenging collision avoidance applications [20].Due to the startlingly high incidence of deadly VRU road accidents, research into V2P system design has expanded.These attempts make use of unique parameters with unique features and limitations, and there is still more work to be carried out in order to address problems with V2P system design.
The contributions of this paper are as follows.

•
We build up on our previous V2P lightweight scheme [21] by enhancing an efficient VANET-based pedestrian protection scheme based on vehicle-to-pedestrian (V2P) communication between smart vehicles and vulnerable road users' smartphones.Consequently, our scheme contributes to a decrease in road collisions and casualties that are likely to occur, and roads are anticipated to become safer as a result.

•
We show the efficiency of our scheme through simulations and implementations to meet the real-time constraints of V2P communications in different traffic scenarios.
We measured critical network parameters in terms of average throughput, processing delay, and network load.

•
We compare the different technologies used in V2P system design in terms of range, latency, and ease of deployment in our related work and study the factors that influence V2P system design specifications, like VRU types, VRU roles, VRU devices, communication technologies, notified parties, and purpose.
The remainder of this paper is organized as follows.Section 2 presents our efficient VANET-based pedestrian protection scheme in detail.In Section 3, we explain our NS3 simulation, metrics, and the results for the proposed scheme.Section 4 offers background information on V2P system design, including categorizations by different design parameters, a comparison of different technologies used, and an overview of previous endeavors.In Section 5, we discuss the limitations of our work.Finally, Section 6 concludes our paper with a general discussion of results, and it presents future directions in the domain of V2P schemes.

Proposed Vulnerable Road Users Protection Scheme
In this section, we propose our VANET-based pedestrian protection scheme followed by the NS3 simulation.Our simulation assesses various network parameters such as throughput, processing delay, and network load.

Scheme Overview and Network Model
Our scheme consists of two phases, where vehicles first estimate the degree of threat by measuring the signal strength of nearby VRU smartphones as depicted in Figure 2. A lightweight collision detection algorithm (CDA) is then executed to confirm or refute a collision.Our V2P network model consists of vehicles, VRU smartphones, and a synchronization server.The designated app on the VRU smartphone is responsible for creating WIFI hotspots to connect with nearby vehicles as well as running the CDA.The server is an additional asset that could or could not exist.Depending on the situation, it is advantageous in terms of its large storage and computation capabilities, but our system could run without it.Finally, vehicles move with different trajectories and speeds and are equipped with OBUs that communicate via cellular or DSRC communications.
In the first phase of our scheme, a VRU smartphone creates a WIFI hotspot, and nearby vehicles search for available hotspots and attempt to connect to them using their OBUs.Once a pedestrian-vehicle connection is established, the signal strength is measured to estimate the distance between the two parties.If the signal strength exceeds a certain threshold, suggesting that the distance between them is dangerously small, a lightweight CDA is executed to determine whether or not there is a real threat of collision.The vehicle and the pedestrian could connect directly via WIFI/DSRC or communicate via cellular network through the synchronization server, which increases system latency.
The second phase of our system is executed in instances where signal strength exceeds a certain threshold and involves the implementation of a CDA to detect potential collisions.The smartphone app at the VRU end requires the two most recent GPS locations of the incoming vehicle and uses them to construct a line representing its path.The VRU is located at the center of a circle of configurable radius; then, a circle-line intersection is calculated using analytic geometry, as shown in the efficient detection Algorithm 1.
The potential scenarios of collision detection after executing the detection algorithm are shown in Figure 3.
Our scheme is summarized in the flowchart depicted in Figure 4.

Simulation
In this section, we present the experimental setup, simulation parameters, and simulation results.We also discuss the simulation results and their implications.

Simulation Setup
We simulated the proposed scheme using NS-3 simulator [22] to assess the network's performance.OpenStreetMap (OSM) was used to generate the topography, which resembles a square of size 600 × 600 m.The vehicular movement traces are generated randomly using SUMO [23].We used IEEE 802.11p as the underlying protocol that provides communication among vehicles.We considered three different traffic scenarios: light traffic, average traffic, and heavy traffic.The vehicle's arrival rate varies according to the desired number of vehicles in different scenarios.Vehicles are randomly inserted into the simulation at a uniform rate, which can be modeled as a binomial distribution of inserted vehicles for each edge.In large networks, this approximates a Poisson distribution, which adequately reflects the vehicle's arrival in real-world scenarios.The pedestrians follow a random mobility model with an average speed of one meter per second.The pedestrians' mobility is equivalent to people running and those who are scattered along the map.The simulation parameters are shown in detail in Table 1.The simulation focuses on comparing the network overhead of our proposed scheme with a baseline vehicle-to-vehicle scheme.Specifically, we implemented two scenarios.The first scenario "Without Pedestrian Protection" comprises pure vehicle-to-vehicle communication, where vehicles exchange BSM messages without any pedestrian involvement in such communication.In the second scenario "With Pedestrian Protection", we implemented vehicleto-vehicle aside from vehicle-to-pedestrian, where pedestrians communicate with vehicles and run our scheme to detect a potential collision.When a node detects a potential collision with another node, it sends a warning message to this node, as shown in Figure 5.We used C++ on top of NS-3 to implement both schemes.Our study included three traffic scenarios:

Simulation Metrics
We considered the following performance metrics to assess the network performance in both schemes: • Average throughput: The average amount of data in Kbps received by vehicles/ pedestrians per second.This is an important metric for measuring the required bandwidth and assessing the feasibility of the proposed scheme.

•
Processing delay: This is the average time it takes to run our proposed scheme and send a reply back to the sender.For example, when a vehicle receives a BSM message from a pedestrian, it runs our scheme and sends a warning message if it detects a collision.The processing delay is the time between the reception of the BSM message and the transmission of the warning message.

•
Network load: This is the total number of packets sent by vehicles and pedestrians within the simulation time.

Simulation Results
In this section, we present the simulation results for our proposed V2P system using the three evaluation network parameters: Average throughput, processing delay, and network load.

•
Average throughput: The average throughput at different traffic scenarios is presented in Figure 6 It can be observed that the throughput increases with an increase in the number of vehicles and pedestrians in both schemes.In different traffic scenarios, the throughput's increase is expected because the number of transmissions increases as the number of vehicles and pedestrians grows.We observed that our scheme introduces slightly more throughput in all traffic scenarios than the pure V2V scheme.This is because pedestrians' engagement in communication with vehicles introduces more transmission and the reception of data.However, the increase in the throughput introduced by our scheme is minimal.For example, it can be observed that the throughputs of the pure V2V scheme and the scheme with pedestrian protection in the average traffic scenario are 28.21 and 33.28 Kbps, respectively.This is a 15% throughput increase introduced by our scheme for pedestrian safety.In addition, the throughput increase is only 8% in the low-traffic scenario.• Processing delay: Figure 7 depicts the average processing delay.We differentiate between the delay in both schemes: with pedestrian protection and without pedestrian protection.In the pedestrian protection scheme, we run our scheme after the verification process of BSM messages.In the other scheme, we only run the verification process of BSM messages.We set the verification time of BSM messages to be 4.97 ms according to [24,25].As observed in the following Figure 7, the delay introduced by both schemes is almost constant in all traffic scenarios, even with increasing the number of nodes in the high-traffic scenario.We observe that in our scheme, the processing delay times are 13.07, 13.77, and 13.97 ms in all traffic scenarios.Without pedestrian protection, the delay times are 4.97 ms for the same traffic scenarios.The introduced delay by our scheme is only 8 ms, which is a minimal cost and proves that our scheme is lightweight and fits well in VANET safety applications.More importantly, the delay is far below 100 ms even in dense traffic scenarios, which meets the minimum latency requirements of VANET safety applications according to [26,27].• Network load: The number of packets transmitted throughout the simulation time at different traffic scenarios is shown in Figure 8.It can be observed that the number of packets increases with an increase in the number of vehicles and pedestrians involved in communication.This is normal behavior because of the increase in packet transmission.When comparing the pure V2V scheme with our scheme, we can observe that our scheme has more packets transmitted.We attribute the increase in transmitted packets to the pedestrians' communication with vehicles.The increase in network load due to the use of our scheme is negligible.For example, our scheme transmits 73,967 packets while the pure V2V scheme transmits 71,712 packets in the low-traffic scenario.This is an increase in the transmission of 2255 packets only (3%), which is a small bandwidth cost for protecting pedestrians.

Related Work
Network congestion, context information sharing, pedestrian placement, and energy efficiency are just some of the issues that might arise while designing a V2P system.This section will detail recent initiatives, which have included both theoretical inquiries and actual answers to these issues.Four methods were presented in [28] to eliminate superfluous warnings to VRUs, helping alleviate network congestion.To facilitate V2P communication in emergency situations, the authors of [29] suggested a dedicated channel paradigm.To further anticipate deployment issues, Ref. [30] provided a technique to estimate CITS performance in dynamic vehicular networks.The success of the algorithms powering the CITS application may be determined using this technique by analyzing actual or predicted traffic volumes.Finally, in [31], the authors tried to put a number on VRU awareness by analyzing the relationship between the sampling frequency of VRU warnings and the tradeoff between VRU safety and network congestion.A novel measure, VRU awareness probability (VAP), was created to quantify the likelihood of detection by neighboring cars based on the flow of signals between operational VRUs.The authors of [32] employed automobiles as anchors in addition to satellites to solve the issue of pedestrian placement, thereby overcoming GPS-related inconsistencies.By monitoring the evolution of CSI over time, they were also able to devise a technique for estimating the propagation angle of a signal.Their solution only needs one antenna on the VRU device (instead of the standard eight) and is more precise.The Kalman filter was used to mitigate GPS errors by the authors of [33].To examine bikers' behavior without placing real-life participants in danger, researchers in [16] simulated a VANET using data collected from a virtual riding environment.Both Refs.[34,35] used machine learning to analyze pedestrian activity.In the former, decision tree classifiers were used to differentiate between friendly and hostile pedestrians while connected to a server, whereas four conventional classifying vectors were used when no server was available.The former addressed movement prediction as a classification task, whereas the latter used two distinct classification paradigms: the linear kernel support vector machine and the XG Boost classifier.While the sharing of contextual information is crucial for V2P systems, delays in carrying this out may have a major impact on the effectiveness of collision detection algorithms (CDAs), as shown in [36].The scientists looked into the link between the two and created a curb detection module to boost the precision of collision detection just as the pedestrian steps off the curb.In [37][38][39], multi-access edge computing (MEC) was employed to increase efficiency by computational offloading to cloud servers, weighing the tradeoff between latency and energy usage in context information transmission.These efforts make it possible to utilize a mobile device as an OBU without draining its power supply too quickly.
Finally, although VRU privacy and data security are essential issues, they are beyond the scope of this article.We do, however, briefly describe one attempt from [40], in which the authors use machine learning classifiers to provide a framework for the safe processing of massive amounts of data.Figure 9 summarizes the research directions and trends for V2P design.
Context information exchange, precise pedestrian positioning, network congestion, and energy efficiency are challenges in designing V2P systems [41].In Table 2, we describe the different challenges in V2P design.
V2P systems can be classified according to several design criteria, contrasting the technologies utilized in V2P systems and design.ACA NLOS techniques, referred to as V2P systems, may be categorized in a variety of ways based on the parameters used.The different design parameters and associated classifications are illustrated in Figure 10.
These categorizations affect V2P system design.The VRU movement patterns and reaction times differ from autos, pedestrians, cyclists, and powered two-wheelers [42].Children walk haphazardly, whereas older and handicapped people move slowly [43].Variations affect the VRU's role and device selection.Kids prefer tag-based unilateral communication since they cannot be VRUs.Various efforts have been made to develop V2P communication, with the goal of overcoming possible problems by adjusting the interaction of various aspects.Figure 11 classifies and provides an overview of the various V2P design initiatives based on the three design criteria: VRU type, the technology employed, and the VRU device.Visualization is a key aspect of V2P systems, helping convey information in an intuitive and effective manner.Visualization points are used to support safety in V2P systems and include pedestrian presence visualization, where icons are used on the vehicle's display to indicate the presence of pedestrians in the vicinity.Crosswalk status indicators employ dynamic visual cues to indicate the status of a crosswalk (e.g., flashing lights, changing colors) to notify drivers of pedestrians who are actively crossing.Distance and speed visualization displays real-time information about the distance and speed of pedestrians relative to the vehicle to assist drivers in making informed decisions.Intersection safety visualization uses augmented reality or head-up displays to highlight potential collision points at intersections and provide guidance on safe navigation.Smart crosswalks integrate embedded LED lights that dynamically change based on the presence of pedestrians, creating a visual warning for drivers.Effective visualization in V2P systems can significantly contribute to safer road interactions by enhancing situational awareness for both drivers and pedestrians.It is essential to design these visualizations with clarity and simplicity to ensure the quick and accurate interpretation of information.
In [44], the authors discuss the communication between automated vehicles (AVs) and human road users through external human-machine interfaces (eHMIs), like the displays on the AV's surface.The study examines the size requirements for displayed text or symbols to ensure legibility, considering factors such as road traffic dynamics and human reaction time.The results suggest that, for the maximum detection range among human road users, AVs should display symbols rather than text, and color-coded symbols can enhance message comprehension without affecting detection range.In [45], The paper explores the challenges of ensuring pedestrian safety, especially at crosswalks, in unique environments where traditional traffic infrastructure is absent, such as "naked streets."The research introduces an innovative smart pole interaction unit (SPIU) with an external human-machine interface (eHMI) in autonomous vehicles (AVs).Using virtual reality (VR) technology, the study demonstrates that integrating an SPIU with an eHMI in vehicles significantly improves secure decision making for pedestrian passing and stops in shared spaces, leading to a substantial 21% reduction in response time and highlighting the positive impact on interaction dynamics in both unidirectional and bidirectional scenarios.Ennia et al. [46] focus on cyclist safety in traffic, utilizing a visual tracking tool to identify critical points in infrastructure with high distraction levels.By replicating the scenario in a bicycle simulator and comparing it to a real test conducted in Stockholm, the research objectively analyzes cycling behavior, finding the crossing as a significant critical aspect.The results, based on both objective and subjective evaluations, highlight the importance of attention and workload perception, emphasizing the potential differences in user experience between simulated and real-world cycling situations.Diego et al. [35] propose a method for the early detection of pedestrian movement transitions using smart devices, enabling advanced protection for vulnerable road users (VRUs) by facilitating communication with intelligent vehicles and infrastructure.The study utilizes human activity recognition to categorize pedestrians into four states (waiting, starting, moving, and stopping) and employs machine learning classifiers, including a support-vector machine and XGBoost, for movement transition detection.Empirical studies based on real-world data from 11 test subjects and 79 scenes demonstrate the effectiveness of the proposed method, achieving a robust and early detection of movement transitions with an F1-score of 85%.

Limitations
The study primarily focuses on a set of predefined pedestrian behaviors, such as typical walking patterns.However, the real-world variability in pedestrian actions, sudden changes in direction, and interactions with the environment may not be fully captured.
A broader exploration of diverse pedestrian behaviors, including unpredictable movements, is essential for a more comprehensive assessment.The proposed scheme relies on the assumption that pedestrians actively engage with their smartphones during road activities.This assumption may not align with real-world scenarios, where distractions or varying levels of smartphone usage might impact the effectiveness of V2P communication.The scheme may not thoroughly explore potential privacy concerns associated with collecting and communicating data from pedestrians' smartphones.Balancing the need for safety with individual privacy rights is a delicate aspect that should be carefully considered in the deployment of V2P communication systems.

Conclusions and Future Work
Traffic accidents are a consistent tragic reality of the contemporary world.While numerous endeavors have strived to mitigate the casualties of such accidents, they still remain a significant contributor to global fatalities every year.There is a growing interest in the involvement of pedestrians as subjects in the research field of collision prevention, using vehicle-to-pedestrian (V2P) communication.In this paper, we proposed a pedestrian protection scheme based on communication between vulnerable road users' smartphones and smart vehicles.We used NS-3 to simulate different traffic scenarios to confirm the efficiency of our scheme.We measured essential network parameters such as average throughput, processing delay, and network load.Our simulation results indicate that the overhead introduced by our scheme is minimal and acceptable.These results confirm that the proposed scheme scales well in dense traffic scenarios and will certainly contribute to the safety of vulnerable road users.Future research efforts that can be based on our work include the following: 1.
The study of the effect of including a synchronization server in our V2P system to measure the expected delay; 2.
We will study different behaviors of pedestrians to consider the differences in their patterns of motion (like children, elderly pedestrians, and disabled pedestrians); 3.
We will include different types of vulnerable road users other than pedestrians, like cyclists and motorized two-wheelers in our study.
By undertaking these future research efforts, we anticipate not only refining our proposed scheme but also contributing valuable insights to the broader domain of collision prevention and V2P communication.Through continuous exploration and collaboration, we strive to make meaningful strides toward enhancing the safety of vulnerable road users in diverse traffic scenarios.

Figure 3 .
Figure 3. Three different scenarios of pedestrian vehicle collision detection.

Figure 5 .
Figure 5. Exchanged messages in our simulation.

Figure 6 .
Figure 6.Average throughput in different traffic scenarios.

Figure 7 .
Figure 7. Processing delay in different traffic scenarios.

Figure 8 .
Figure 8. Network load in different traffic scenarios.

Figure 9 .
Figure 9. Research directions and trends for V2P design.

Figure 11 .
Figure 11.Design parameters in current V2P systems.

Table 2 .
Challenges to V2P system design.