Skip to main content

FHWA targets border congestion with technology

To reduce delays at US border crossings in New York, Michigan and Washington, the US Department of Transportation’s Federal Highway Administration (FHWA) has awarded US$256,470 for the use of innovative new technology that will provide information on wait times at border crossings and help manage delay by giving truckers advance notice of crossing conditions. FHWA’s Border Wait Time Deployment Initiative is designed to accelerate the adoption of innovative technology, such as sensors, to measure delay an
June 6, 2016 Read time: 2 mins
To reduce delays at US border crossings in New York, Michigan and Washington, the 324 US Department of Transportation’s 831 Federal Highway Administration (FHWA) has awarded US$256,470 for the use of innovative new technology that will provide information on wait times at border crossings and help manage delay by giving truckers advance notice of crossing conditions.

FHWA’s Border Wait Time Deployment Initiative is designed to accelerate the adoption of innovative technology, such as sensors, to measure delay and wait times at land border ports of entry. The program supports the collection and dissemination of real-time traveller information to improve the reliability of goods movement across these borders.  

Under the initiative, FHWA will provide US$100,000 to the 1780 New York State Department of Transportation for its Niagara Falls International Rainbow Bridge, along with funding of US$95,920 to the 1688 Michigan Department of Transportation for technology at the Detroit-Windsor Tunnel Crossing with a grant. FHWA will also award US$60,550 to the Whatcom Council of Governments (WCOG) in Whatcom County, Washington, for the Booth Integration project. All of these research projects will use dynamic message signs and advance traveller information systems to convey the border wait times.

In recent years, trucker wait time and unexpected delays have been identified as an impediment to the free flow across the border, and the FHWA has undertaken several research initiatives aimed at measuring border delays at major land-border crossings.

Related Content

  • Umovity: Revolutionising mobility through innovative technologies
    December 1, 2023
    United under the brand Umovity, PTV Group and Econolite join forces and introduce their new combined Mobility Tech Suite. The companies’ CEO Christian U. Haas explains the details
  • US enforcement regulation to deliver clearer guidelines?
    February 2, 2012
    Jim Tuton of American Traffic Solutions looks at the evolution of automated enforcement in North America "Technological regulation will become more sophisticated at the federal level, giving states clearer guidelines" Jim Tuton In just 20 years, photo enforcement in North America has grown from a single speed camera in a small town in Arizona to thousands of photo traffic enforcement cameras which are now operating in 350 communities spread across 27 states and three Canadian provinces. Most of these p
  • Tri-nation cooperation on C-ITS Corridor
    June 20, 2016
    In the European C-ITS Corridor project, authorities from three countries are working with the automotive industry on the deployment of Cooperative (V2X) Systems. Cooperative Intelligent Transport Systems/Services (C-ITS) has the potential to improve road safety, transport efficiency and environmentally friendly mobility, as well as creating additional services and new business models. A set of international standards have been developed to provide the technical basis for the deployment of Cooperative ITS.
  • Need for secure approach to connected vehicle technology
    January 7, 2013
    Accidental or malicious issue of false messages to connected vehicles could result in dire consequences, so secure systems of authentication and certification are likely to be necessary, write Paul Avery and Sandra Dykes. Connectivity among vehicles in urban traffic systems will provide opportunity for beneficial impacts such as congestion reduction and greater safety. However, it also creates security risks with the potential for targeted disruption. Security algorithms, protocols and procedures must take