Skip to main content

New traffic safety system at Dartford Crossing

From 13 June a new traffic safety system will be in use on the A282 (M25) northbound approach to the Dartford crossing tunnels. The system will identify and stop oversized vehicles or those carrying dangerous goods from entering the tunnels. It will also enable dangerous goods vehicles to be escorted through the tunnels safely and stop traffic in the event of an incident in the tunnels. Electronic message signs on the approach to the traffic safety system will provide drivers with information relating
May 22, 2015 Read time: 2 mins
From 13 June a new traffic safety system will be in use on the A282 (M25) northbound approach to the Dartford crossing tunnels.

The system will identify and stop oversized vehicles or those carrying dangerous goods from entering the tunnels. It will also enable dangerous goods vehicles to be escorted through the tunnels safely and stop traffic in the event of an incident in the tunnels.

Electronic message signs on the approach to the traffic safety system will provide drivers with information relating to road conditions and safety.

Signs on gantries over the carriageway will display variable speed limits to keep traffic flowing safely, dependant on the road conditions at the time. A red X symbol will show that a lane is closed because of an incident or people working on the road.

Additional electronic message signs will be used in the safety system to give instructions to goods vehicle drivers who have failed to comply with the size and content restrictions of the tunnels.

Traffic signals will be used to stop and direct oversized vehicles, or those carrying dangerous goods that are not approaching the tunnels in the correct lane. The signals will also be used to stop traffic in the event of a tunnel emergency. Red light camera enforcement will also be in use at the traffic signals.

Barriers will be used in conjunction with traffic signals to stop vehicles and enforce crossing restrictions when required.

Average speed camera enforcement will be in use at the Dartford Crossing. Drivers should drive at speeds appropriate to the road conditions and must not exceed the variable speed limits displayed.

Related Content

  • Malaga first to trial Kapsch traffic optimiser
    April 16, 2021
    Variable message signs will display least-congested routes in the southern Spanish city
  • Mexico implements Indra traffic management technology
    October 2, 2014
    Indra, in partnership with Auneti (Autopista Necaxa-Tihuatlán) and FCC, has deployed traffic management technology in the six tunnels of the new Necaxa-Tihuatlán highway in Mexico. The US$18 million project also includes intelligent transportation systems (ITS) and control and communication systems on the 83 kilometres of highway sections 1 and 2. A new operational control centre equipped with Indra's Horus integrated roadway and tunnel management solution manages traffic along the new road's two sectio
  • Highways Agency trials new traffic monitoring technology
    September 24, 2013
    The UK Highways Agency is trialling a system to add commercially available traffic data to its existing sources to monitor traffic flow on England’s motorways and strategic roads. Similar data sources are already used by satellite navigation devices, smartphones, and applications like Google maps. The system uses data that comes mostly from vehicle tracking devices installed by fleet operators, and a proportion from mobile sat-nav type devices, including smartphone traffic applications where the user has
  • Need for secure approach to connected vehicle technology
    January 7, 2013
    Accidental or malicious issue of false messages to connected vehicles could result in dire consequences, so secure systems of authentication and certification are likely to be necessary, write Paul Avery and Sandra Dykes. Connectivity among vehicles in urban traffic systems will provide opportunity for beneficial impacts such as congestion reduction and greater safety. However, it also creates security risks with the potential for targeted disruption. Security algorithms, protocols and procedures must take