Skip to main content

Wyoming develops open-source RSU monitoring app

A connected vehicle project in the US state of Wyoming has developed an open-source application to allow third parties to monitor safety along the I-80 highway. The Wyoming Department of Transportation (WYDoT) Connected Vehicle Pilot includes the deployment of 75 roadside units (RSUs) along 400 miles of I-80. WYDoT’s app allows authorised transportation management centre (TMC) operators to monitor and manage each RSU on the route – and can also be used to let the travelling public know what is happening.
September 16, 2019 Read time: 2 mins

A connected vehicle project in the US state of Wyoming has developed an open-source application to allow third parties to monitor safety along the I-80 highway.

The Wyoming Department of Transportation (WYDoT) Connected Vehicle Pilot includes the deployment of 75 roadside units (RSUs) along 400 miles of I-80. WYDoT’s app allows authorised transportation management centre (TMC) operators to monitor and manage each RSU on the route – and can also be used to let the travelling public know what is happening.

Wyoming’s roads are characterised by lengthy drive times and harsh winter weather, so effective monitoring of RSUs – to ensure they are managed and updated as necessary - is vital.

The TMC part of the application, called Service Monitor Device Management, gives WYDoT TMC operators a “quick, real-time, single view into RSU status and management”. They can remotely manage each RSU and perform reboots, check and update firmware, view active traveller information messages (TIMs) and see how many connected vehicles have driven past in the last 24 hours.

WYDoT says that a new National Transportation Communications for Intelligent Transportation Systems Protocol standard (NTCIP 1218 v01, Object Definitions for RSUs) is currently in development and will define the protocols for configuring, operating and maintaining RSUs from a TMC.

There is also a view-only mode, which allows users to view specific stretches of I-80, seeing how TIMs are being pushed out to RSUs and how many vehicles are receiving the messages.

Related Content

  • November 10, 2017
    Keeping cyber criminals from your website
    If a hacker can penetrate your website, they can do business as you. Joe Dysart explains how you and your customers may not discover the fraud for some time. In the latest twist on identity theft, hackers are clandestinely taking over business websites - and then brazenly billing visiting customers as if the sites are their own.
  • June 7, 2024
    Nema's updated signage standards are key to managing the variables
    National Electrical Manufacturers Association’s revision of standards relating to variable message signs will help to improve interoperability and reflect changes in vehicle technology
  • October 22, 2018
    Six easy steps to security
    As security threats become increasingly vast and varied, multinationals are beginning to see the need for an effective global security operations centre to protect their organisation. James I. Chong spells out what is required. You know you need a global security operations centre (GSOC) to support what you’ve built, identify threats, and prevent disasters before they happen - but how do you know if it’s truly effective? There’s no shortage of information coming into operation centres. Too often, it’s the
  • June 29, 2018
    Avoiding the call of the wild
    Hitting an animal on a rural road can be fatal for all parties involved – but detecting and avoiding them requires clever technology. Andrew Williams carefully scans the horizon for details. Wildlife-vehicle collisions are an ever-present threat in rural areas around the world, and there is certainly nothing funny about suddenly finding an angry moose in your headlights on a sharp bend. A variety of detection and avoidance systems are currently in use or under development to help prevent your vehicle being