Sociotechnical
Plan for Dedicated Short-Range Communication (DSRC) Systems
https://tylerscafidi.blogspot.com/2025/03/blog-post-13-unit-9-individual-project.html
Tyler
L. Scafidi
Colorado
Technical University
March
9, 2025
Sociotechnical
Plan for Dedicated Short-Range Communication (DSRC) Systems
Dedicated Short-Range Communication (DSRC) is
a combination of several networking technologies that enable short-range
communication networks on a mass-scale (Everything RF, n.d.). One aspect of DSRC
are smart highways, which use 5G 802.11p technology to communicate with the
vehicles (V2V) and/or infrastructure (V2I) within its short-range. The main
idea is to convert many of the vehicles, road, and traffic signs into
network-enabled Internet-of-Things (IoT) devices. They would be able to take
advantage of the DSRC network, and report real-time granular data back to
operations centers.
I assume that there would also be some form of
monitoring/logging, which may be used as legal evidence. Another benefit is the
vehicle collision avoidance features that would be built-in, as enabled
vehicles report their location, heading, and speed approximately 10 times per
second (Everything RF, n.d.). Artificial Intelligence (AI) systems would be
layered on top of the technology to provide more efficient and effective
insights by being able to analyze mass amounts of data with east. While these
features provide many benefits, from a sociotechnical perspective, I am not
sure about the privacy and legal implications it can have on drivers.
Another form of large-scale networks would be
the FirstNet network project (FirstNet Responder Network Authority, n.d.). The FirstNet
Network program was designed for first-responders to have an always-available
wireless network to connect to while in the field. Today, it seems that
AT&T is administering a FirstNet program for first-responders (FirstNet, n.d.). Public access seems
very desirable, but calls to implement public access have not gone far.
Integrating the FirstNet and Dedicated Short-Range Communication (DSRC)
networks makes a lot of sense, but also increases the government’s breadth and
depth of your life they monitor.
Part I
Scope
Vehicle-to-vehicle
(V2V) and vehicle-to-infrastructure (V2I) both offer many benefits that many
would agree on (Tie, 2024). One of the most
popular applications of the Dedicated Short-Range Communications (DSRC), which
also utilizes 5G cellular-V2X (C-V2X) connectivity, is for autonomously-driven
vehicles. Vehicle-to-vehicle (V2V) communications, which not only would provide
real-time data to surrounding enabled vehicles for traffic mitigation, but may
also be used in to remotely control a gride/cluster of vehicles.
Vehicle-to-infrastructure (V2I) would enable vehicles to provide real-time
traffic information to reports and administrators. As research progresses, I
will propose a sociotechnical innovation that utilizes V2X technologies.
The main
limitation for these innovations has to be the number of vehicles owned that
would meet the requirements to use these services. Infrastructure development
and/or upgrades would be costly (i.e. all traffic devices, roadways, everything
in-between, etc.). Privacy will most likely be an issue throughout the
technology, which owners will have to accept as a trade-off and/or mandate.
Retrofitting vehicles for integration with vehicle-to-everything (V2X) may be a
challenge, due to the numerous sensors required. There may be potential to
design an On-Board Diagnostics (OBD) adapter/device to transmit the very
minimum required data.
Purpose
Some of the
main reasons that Dedicated Short-Range Communication (DSR) is being
implemented is the demand for better traffic safety/incidents, have a more
realistic and centralized view of traffic patterns, better insurance/law
enforcement efforts, and autonomous driving (U.S. Department of Transportation & National
Highway Traffic Safety Administration, n.d.). Another benefit is having
a massive network that may be available wherever drivers go, and I have my own
interest on DSRC systems to develop, use, and try. Blind and lane change
warnings, forward collision warnings, do-not-pass (DNP) warnings, left turn
assist, intersection movement assist, and emergency electronic brake lights are
all some of the major purposes for vehicle-to-vehicle (V2V) and
vehicle-to-infrastructure (V2I) development. Projected impact would be up to 1,080
lives saved, around 600k traffic accidents avoided, and approximately 270k
injuries.
Supporting Forces
As mentioned
above, the accident, injury, and deaths saved is essentially worth it on their
own. On top of that, being able to rollout automation/Artificial Intelligence
(AI)-based driving and extended features is both exciting and frightening.
While these are some basic vehicle-to-everything (V2X) technologies, I imagine
that the software/after-market products and services available will also rapidly
increase in a new sociotechnical market. When systems are safely and reliability
automated, the automobile will transform into more of an entertainment vessel,
with driving capabilities. There are already automated self-driving taxis in
some cities, and having the feature available would be nice. Law enforcement
must also support the V2X projects, as they will likely be able to issue more
citations, track criminals more efficiently, and will be available to serve as
legal evidence.
Challenging Forces
In 2020 it
was estimated that implementation would cost approximately $350 per vehicle to
be compliant, and cost from around $300 million to $6.4 billion annually,
depending ( (U.S. Department of Transportation
& National Highway Traffic Safety Administration, n.d.). While the cost per
vehicle is relatively inexpensive, it would likely be supported by a tax rebate
or credit as many drivers would likely push back. Would it actually provide an
overall savings in the short- to long-run? How will drivers’ privacy be
handled, what breach potentials/impact, hacking vehicles and essentially
imprisoning their passengers, law enforcement, etc., are all serious concerns
drivers may have. Furthermore, how would a major national breach and
command-and-control takeover of highways, traffic systems, and automobiles in a
hostile attack? The United States has had its government systems hacked several
times in the past few years, as well as ransomware attacks on critical
infrastructure.
Methods
When it comes
to choosing an appropriate research method for this sociotechnical
product/service, I considered the following research method designs: the Delphi
method, the nominal group technique (NGT), and a structured design process
(SDP) approach. The Delphi method is designed to get feedback from remote
participants throughout several rounds (Ribaud, 2025). The nominal group
technique (NGT) is more informal than the Delphi research method, as it is
typically time-limited to a one-session meeting in which participants voice
their ideas to solve a problem, in a round-robin style, until a conclusion has
been reached. The structured design process (SDP) is a top-down/functional
solution approach to research, and incorporates modules/modularity (singular
components that are combined into one) (Encyclopedia of Information Systemsc, n.d.). It focuses on
sequence, selection, and repetition, when it comes to coding/information
systems design.
From the few search results I found,
structured design process (SDP) seems to be the most suitable research and
design methodology for information systems (ISs) (Encyclopedia of Information Systemsc, n.d.). Being able to
segment separate pieces of code, delegate tasks, and juggle priorities through
modular design is one of the most attractive SDP aspects. Since the approach is
top-down, focusing on fixing overarching issues versus smaller/user-level ones,
can be more effective than solving problems one-by-one, patching a system that
ultimately needs a new design. Additionally, SDP processes focus on sequence,
selection, and repetition, which is what code design is all about. The code
must be resilient for repeated use, with a target margin-of-error of zero
percent.
While the
structured design process (SDP) seems to be one of the most appropriate methods
for systems and software design for the vehicle-to-everything (V2X) systems,
the Delphi method could be integrated into user-feedback testing/beta stages.
Not only consumers, but agencies that work with the systems will also need to
provide iterative feedback. Since the demographic selection may be clustered
and geographically dispersed, making in-person interviews much more difficult
and expensive, Delphi method feedback loops and testing could help pre- and
post-launch.
Part II
Models
When
thinking about sociotechnical systems, it is important to understand exactly
what that means. Being able to visualize, classify, and disseminate information
spaces and functions is essential to understanding the sociotechnical system (Figure
1), similar to the Open Systems Interconnection (OSI) model’s technical design
needs (Figure 2) (Smart Building Academy, 2013; Whitworth & Ahmad, n.d.).
Figure one categorizes various levels of sociotechnical systems. For instance,
the Technology and Information Technology layers would be considered the
technical layers, while the Human-Computer Interaction (HCI) (i.e. preferences
like button sizes, layouts, accessibility, etc.) and socioecological layers
are non-critical desires upon how technology is used within society (Whitworth & Ahmad, n.d.). Figure two is a usefully
condensed overview of the Open Systems Interconnection (OSI) model. The OSI
model is used within technology to define various code or hardware spaces, such
as: physical (hardware) and the application layer (software). These segmentations
help to troubleshoot issues that may arise, and help in systems design. Figure three
provides an overview of a sample Access Control System (ACS) policy from a sociotechnical
system standpoint
Figure 1
Requirements for Socio-Technical Design
Note: Diagram
that visualizes how additional demands on technology have evolved within
Human-Computer Interaction (HCI) and Socio-Technology Systems (STS) (Whitworth & Ahmad, n.d.).
Figure 2
The Open Systems Interconnection (OSI) Model
Note: Retrieved
from Smart Buildings Academy’s website (Smart Building Academy, 2013).
Figure 3
An Access Control System Policy from a
Socio-Technical Design Perspective
Note: This
model represents front-end versus back-end technologies and interaction,
retrieved from the Interaction Design Foundation (Whitworth & Ahmad, n.d.).
Analytical Plan
Analyzing data is always useful, for
informational purposes, for improvements, and to troubleshoot errors that may occur.
Since sociotechnical systems involve both qualitative and quantitative data (e.g.
experiences and technical), a mixed-methods approach should be designed, even
if not needed right away (George, 2025). By staging the
design analytical reporting metrics and environments, benchmarking those will
be more efficient. Of course, these designs can be done before, during, after,
or adjusted along the way to fit the productivity and design needs, but analysts
may benefit from segmenting the research into teams so that research richness,
efficiency, and expertise will be greater.
Some
Artificial Intelligence (AI)-based technologies may exist to automate a lot of
the reporting and management via centralized dashboards and robust analysis
features. However, it is important to take a holistic approach to qualitative
and quantitative sociotechnical system design (e.g. consider all stakeholders).
Not only must the technology suit the needs of the users and society overall,
but it also must fit the business’s needs, cultural alignment, and
requirements. I would check the results regularly, setting up alerts for warning-
or critical-type issues, at minimum. Then, I would setup a regular meeting, on
whatever interval/schedule makes sense, among all key personnel to review the
analytics, brainstorm new ideas, and collaborate on any persistent issues.
Anticipated Results
The social impact of change is basically how the
technology is impacting society. The main priority is typically whether it
works, if it stable enough, safe, privacy-focused (legally/within reason), and
if hot-patches can be released Over-the-Air (OTA) (e.g. mostly technical). On
the social side, I would expect there to be some resistance, learning-curves, high
consumer costs to convert/purchase new equipment and/or automobiles, and minor
bugs. Over time, with monitoring, analysis, and change management, the sociotechnical
system will become second-nature; possibly, even revered! After all, most of
the monitoring and penalties that could be imposed are just as present as they
are currently. Providing a customer-support ticketing system to track issues, net
promoter score/user-feedback surveys, Customer Relationship Management (CRM)
system, and skilled support teams are key to gauging the sociotechnical systems’
results.
Conclusion
Innovation
requires buy-in, support, and/or a desire to adopt the innovation. Within
organizations, discontent and dissatisfaction about innovations can cause toxic
work culture, and potentially lead to project failure. It is important to
solicit good and negative feedback. While the good metrics are nice to see,
often translate into profits, and successes, the negative feedback are the
areas of improvement that should be analyzed and built into the next iterations’
changes. Additionally, a customer dispute resolution process would also be
helpful to setting expectations, and also providing support while soliciting
issues with the sociotechnical systems. While it would be nice to solve all
issues, it is not always practical.
In
1962, a full framework for the diffusion of innovation was published by Everett
Rogers, a sociology professor (The Interaction Design Foundation, 2018). In it, he reviewed
over 500 case studies throughout various disciplines to determine what the defining
characteristics of innovations are. In his book, Rogers developed a five-stage
process that describes how innovation is diffused: 1) knowledge, 2) Persuasion,
3) decision, 3a) reject, 3b) accept, 4) implementation, and 5) confirmation (see
Figure 4 and Figure 5). The knowledge stage is mostly focused on awareness. Users’
interest to try the new innovation is considered the persuasion stage. Users
make decisions about whether or not they will accept the new innovation in the third
stage. Once a user decides to adopt the new innovation, it must be implemented;
innovation ownership experience should be closely monitored to ensure end-users
have satisfactory post-sales support. The fifth stage (confirmation) could be
considered a user-loyalty metric; it is where they will decide whether or not
to continue using the innovation.
Figure 4
Everett Rogers’ Five-Stage Process for the
Diffusion of Innovation
Note:
Adapted from Ryan and Gross’s 1943 study about the adoption of hybrid seed
corn, which identified key innovation stages: adoption, importance of mass
communications, and interpersonal networks (The Interaction Design Foundation, 2018).
Figure
5
The
Five-Stages of Innovation Diffusion
Note:
Derived from Everett Rogers’ 1962 book “Diffusion of Innovations” (The Interaction Design Foundation, 2018).
It is also noted that adoption
and innovation are not the same, as it relates to sociotechnical perspective (The Interaction Design Foundation, 2018). Adoption is more
about how the user begins to feel comfortable and enjoys using the innovation.
Diffusion is centered around all stakeholders. Rogers also suggested that
innovation be studied through social networks, and that those networks should
be analyzed, and provided white-glove support. Additionally, there is an
emphasis on learning through failure, which does not always translate into
innovation failure, but can be a result of several other circumstances (i.e.
competition, lack of knowledge, unaware of innovations’ utility, etc.).
Areas of Future Research
While Dedicated Short-Range Communication (DSRC)
is certainly innovative, it has some limitations (Tie, 2024). Vehicles using DSRC
must have a line-of-sight (LOS) to the sensors in order to communicate, and can
be problematic when there is typical interference from surround infrastructure
and environments. Scalability is also an issue, as the DSRC technology uses only
one particular band to transmit, which can be a problem for growth/integrations.
Furthermore, DSRC is not used as much in some areas of the United States as
others, and some have speculated about re-purposing the wireless bands there.
On
the other hand, Cellular Vehicle-to-Everything (CV2X) is a newer standard,
which leverages 3rd Generation Partnership Project (3GPP) LTE and 5G
cellular standards (Tie, 2024). Meaning, it has two
ways to communicate (redundancy): direct short-range communication (a PC5 interface),
and long-range cellular communications (Uu interface). Since CV2X has the
ability to perform direct and cellular connections, it is much more versatile
and reliable. By leveraging existing cellular infrastructure, reliability, and
management, costs can be mitigated while being backed up by resilient and
trustworthy networks. Additionally, CV2X is designed for forward-compatibility with
5G networks (i.e. ultra-reliable low-latency communication (URLLC), massive
machine-type communication (mMTC), etc.). However, cellular reliability and coverage
can also pose an issue. Companies like Starlink and T-Mobile are already
delivering cellular service via satellite enhancements (T-Mobile USA, Inc., n.d.).
Overall,
innovation requires serious buy-in and trust (Lane, Marlani, Chew, & Holden, 2023). Trust is reported
to enable innovators to be creative, improves information flow, and supports
adopting new innovations. One key component to instilling trust within
governmental organizations is to understand what roles are truly needed for the
innovation. Project teams are a great way to accomplish subject-matter expert
(SME)-based participation. Knowing that each stage takes time to adapt to reinforces
the project’s commitment to solving any issues that may arise in a serious
manner. Deloitte recommends determining what is important, assigning appropriate
talent-based roles, and to maintain an open-line of communication to instill
trust and goodwill.
From a cybersecurity
standpoint, I just imagine the number of new hosts that will be assigned Internet
Protocol (IP) addresses (Cloudflare, n.d.). I have heard of
issues with IPv6 and its assumed inherit security/needlessness for
certificates, and also know that it was created to accommodate the already crowded
IPv4 space. Internet Protocol version six (IPv6) has the ability to use 128-bit
addresses, which can also be sub-netted, as compared to 32-bit IPv4 (Welsh, 2012). The actual IPv6
address space can hold ~340,282,366,920,938,463,463,374,607,431,768,211,456, or
340 undecillion (3.4 x 1^38) IP addresses, but even that number is not as
accurate (considering reserved addresses). Overall, I see it being a total
nightmare, or a major success.
References
Cloudflare. (n.d.). What is the Internet
Protocol? Retrieved March 9, 2025, from cloudflare.com:
https://www.cloudflare.com/learning/network-layer/internet-protocol/What is
the Internet Protocol?
Encyclopedia
of Information Systemsc. (n.d.). Encyclopedia of Information Systems.
Retrieved March 2, 2025, from sciencedirect.com:
https://www.sciencedirect.com/topics/computer-science/structured-design
Everything
RF. (n.d.). What is DSRC (Dedicated Short-Range Communication)?
Retrieved March 2, 2025, from everythingrf.com:
https://www.everythingrf.com/community /what-is-dsrc
FirstNet.
(n.d.). Nationwide broadband for first responders & public safety at
FirstNet. Retrieved March 2, 2025, from firstnet.com:
https://www.firstnet.com/
FirstNet
Responder Network Authority. (n.d.). The Network | First Responder Network
Authority. Retrieved March 2, 2025, from firstnet.gov:
https://www.firstnet.com/
George,
T. (2025, January 14). Mixed Methods Research | Definition, Guide &
Examples. Retrieved March 9, 2025, from scribbr.com:
https://www.scribbr.com/methodology/mixed-methods-research/
Lane, K.,
Marlani, J., Chew, B., & Holden, A. (2023, June 15). Spurring
innovation in government agencies through trust. Retrieved from
www2.deloitte.com:
https://www2.deloitte.com/us/en/insights/industry/public-sector/innovation-and-trust-government-agencies.html
Ribaud,
A. (2025, February 20). Comparing the Delphi method & nominal group
technique | Triducive. Retrieved from triducive.com:
https://triducive.com/2024/09/27/comparing-the-delphi-method-and-the-nominal-group-technique-ngt/
Smart
Building Academy. (2013, May 3). What is the OSI model. Retrieved from
blog.smartbuildingsacademy.com:
https://blog.smartbuildingsacademy.com/what-is-the-osi-model
The
Interaction Design Foundation. (2018, June 19). The diffusion of
innovation – strategies for adoption of products. Retrieved from
interaction-design.org:
https://www.interaction-design.org/literature/article/the-diffusion-of-innovation-strategies-for-adoption-of-products
Tie, H.
L. (2024, November 25). V2X Vehicle-to-Everything Communication – the
Future of Autonomous Connectivity. Retrieved from 3blmedia.com:
https://www.3blmedia.com/news/v2x-vehicle-everything-communication-future-autonomous-connectivity#:~:text=Key%20issues%20include%20signal%20degradation,like%20buildings%20and%20traffic%20congestion.
T-Mobile
USA, Inc. (n.d.). If you can see the sky, you're connected. Retrieved
March 9, 2025, from t-mobile.com:
https://www.t-mobile.com/coverage/satellite-phone-service?&cmpid=MGPO_PB_P_25NTWSAT_43700081483020639_731985394449&gad_source=1
U.S.
Department of Transportation & National Highway Traffic Safety
Administration. (n.d.). Vehicle-to-Vehicle Communication Technolgoy.
Retrieved March 2, 2025, from nhtsa.gov:
https://www.nhtsa.gov/sites/nhtsa.gov/files/documents/v2v_fact_sheet_101414_v2a.pdf
Welsh, R.
C. (2012, May 24). Just how many IPv6 addresses are there? Really?
Retrieved from rednectar.net:
https://rednectar.net/2012/05/24/just-how-many-ipv6-addresses-are-there-really/#:~:text=There%20are%203.4%C3%9710,56%20prefixes%20to%20such%20users)
Whitworth,
B., & Ahmad, A. (n.d.). Socio-Technical system design. Retrieved
March 9, 2025, from interaction-design.org:
https://www.interaction-design.org/literature/book/the-encyclopedia-of-human-computer-interaction-2nd-ed/socio-technical-system-design
Wiley
Data and Cybersecurity. (n.d.). Defining networks with the OSI model.
Retrieved March 9, 2025, from ieeexplore.ieee.org:
https://ieeexplore.ieee.org/document/9823217