Next Article in Journal
Low-Dimensional Dynamics of Brain Activity Associated with Manual Acupuncture in Healthy Subjects
Previous Article in Journal
Applications of Biosensors for Meat Quality Evaluations
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

TARS: A Novel Mechanism for Truly Autonomous Resource Selection in LTE-V2V Mode 4

by
Izaz Ahmad Khan
1,2,
Syed Adeel Ali Shah
1,
Adnan Akhunzada
3,
Abdullah Gani
3,* and
Joel J. P. C. Rodrigues
4,5
1
Department of Computer Science and Information Technology, University of Engineering and Technology (UET), Peshawar 25000, Pakistan
2
Department of Computer Science, Bacha Khan University, Charsadda 24420, Pakistan
3
Faculty of Computing and Informatics, University Malaysia Sabah, Kota Kinabalu 88400, Malaysia
4
Research and Development, Senac Faculty of Ceara, Fortaleza 60160-194, Brazil
5
Instituto de Telecomunicações, 6201-001 Covilhã, Portugal
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(22), 7431; https://doi.org/10.3390/s21227431
Submission received: 14 September 2021 / Revised: 15 October 2021 / Accepted: 20 October 2021 / Published: 9 November 2021
(This article belongs to the Section Internet of Things)

Abstract

:
Effective communication in vehicular networks depends on the scheduling of wireless channel resources. There are two types of channel resource scheduling in Release 14 of the 3GPP, i.e., (1) controlled by eNodeB and (2) a distributed scheduling carried out by every vehicle, known as Autonomous Resource Selection (ARS). The most suitable resource scheduling for vehicle safety applications is the ARS mechanism. ARS includes (a) counter selection (i.e., specifying the number of subsequent transmissions) and (b) resource reselection (specifying the reuse of the same resource after counter expiry). ARS is a decentralized approach for resource selection. Therefore, resource collisions can occur during the initial selection, where multiple vehicles might select the same resource, hence resulting in packet loss. ARS is not adaptive towards vehicle density and employs a uniform random selection probability approach for counter selection and reselection. As a result, it can prevent some vehicles from transmitting in a congested vehicular network. To this end, the paper presents Truly Autonomous Resource Selection (TARS) for vehicular networks. TARS considers resource allocation as a problem of locally detecting the selected resources at neighbor vehicles to avoid resource collisions. The paper also models the behavior of counter selection and resource block reselection on resource collisions using the Discrete Time Markov Chain (DTMC). Observation of the model is used to propose a fair policy of counter selection and resource reselection in ARS. The simulation of the proposed TARS mechanism showed better performance in terms of resource collision probability and the packet delivery ratio when compared with the LTE Mode 4 standard and with a competing approach proposed by Jianhua He et al.

1. Introduction

The convergence of wireless communication and vehicular networks has spurred road safety applications and use cases for safer and efficient traveling on roads [1,2]. Accurate gathering of traffic information and subsequent dissemination of the information in real time are the foundations of the road safety applications. Traffic information may include vehicle state information such as speed, direction, yaw rates, and emergency warning messages to alert the vehicles in the network.
The Wireless Access for Vehicular Environment (WAVE) standard is used to disseminate traffic information. WAVE employs a wireless communication channel, which is shared among the vehicles and infrastructure. All the vehicles are perfectly synchronized to transmit on the shared wireless channel. A vehicle must contend with and acquire the shared wireless channel before transmission. The downside of shared wireless resources in the WAVE comes from the limited channel capacity, which is subject to frequent saturation, which causes packet loss and inaccurate traffic information [3].
More recently, the Long-Term Evolution (LTE)-based Vehicle-to-Everything (V2X) proposal has shown potential to improve upon the channel saturation experienced in the WAVE [4,5,6,7,8,9,10,11]. Explicitly, Release 14 of the Third Generation Partnership Project (3GPP) includes support for Vehicle-to-Vehicle (V2V) services [12,13]. There are two types of channel resource scheduling, i.e., (1) controlled by Evolved Node B (eNodeB), i.e., LTE-V2V Mode 3, and (2) a distributed scheduling carried out by every vehicle, also known as the Autonomous Resource Selection (ARS), i.e., LTE-V2V Mode 4, shown in Figure 1. Resource scheduling via eNodeB provides a centralized mechanism of allocating resources to vehicles, and it involves a slight delay before communication occurs. vehicle safety applications require more spontaneous transmission of messages; therefore, the distributed scheduling approach in Release 14 of the 3GPP is preferred for safety applications [14].
Vehicles in distributed scheduling autonomously select resources from a set of periodically reoccurring resource pools. Each vehicle then broadcasts its selection through a message called Scheduled Assignment (SA). This broadcast helps prevent other vehicles from selecting the same resource. However, resource collisions may still occur in the initial selection, where multiple vehicles can select the same resource at a time [15]. Vehicles involved in resource collisions might not cooperate with other vehicles, making the performance of the network questionable and bringing Release 14 of the 3GPP away from its design objectives for vehicle safety communication.
It is also worth noting that counter selection specifies the time for which allocated resources can be used by a vehicle. Upon expiry of the counter value, the resources must be released and reselected. The mechanism of specifying a counter value for resource usage and probability of reselecting the same resource for communication is purely based on the uniform random selection probability [12]. It is argued that the uniform random selection probability for counter selection and reselection of the same resources is an unfair approach, as it can circumvent some vehicles during transmission in congested vehicular networks. While the periodic transmission of vehicle safety messages and the broadcast nature cannot be given up, the mechanisms for resource selection can be deployed such that the collisions in ARS are reduced and the resource selection is fair towards all vehicles in congested vehicular networks.
To this end, the paper presents a Truly Autonomous Resource Selection (TARS) mechanism for vehicular networks. TARS considers resource allocation as a problem of locally detecting the selected resources at neighbor vehicles. To ensure the effect of the random uniform selection probability, TARS employs the crypto-hash function. To observe the behavior of resource selection and collision, this paper presents a Discrete Time Markov Chain (DTMC) model for the counter selection and resource reselection. Subsequently, insights from the model are used to specify the mechanism for fair counter selection, as well as the resource reselection policy.
The rest of the paper is divided into the following sections. In Section 2, an overview of the related work is presented. Preliminaries regarding the Device-to-Device (D2D) communication are given in Section 3. Section 4 explains the system model and proposed TARS mechanism. The performance of the proposed technique is evaluated in Section 5. Lastly, the paper is concluded in Section 6.

2. Related Work

A substantial research effort has been conducted aiming at efficient resource allocation for LTE-based vehicular communication. A two-stage distributed resource allocation technique was presented in [16] to assist the outside network coverage scenario of LTE-based V2V communication. Initially, vehicles are classified in subpools according to their orthogonal directions, followed by Resource Block (RB) assignment based on the directions in which they are moving. Automobiles traveling in the same direction are granted the same set of resources. Secondly, in order to avoid packet collision between vehicles traveling parallel to each other, a channel-sensing mechanism is employed. The proposed scheme provides better Collision Avoidance (CA) for ARS mode of resource allocation in LTE.
The authors in [14] proposed a collision-avoidance scheme for ARS in vehicular communication based on LTE. The performance of ARS is significantly improved by the proposed algorithm. To inform the neighbor vehicles about the reserved data packets, SA information is piggybacked on the data packets in the reservation phase, resulting in improved reliability and minimized data packet collisions.
In [17], an optimized resource allocation for LTE-V2X networks was achieved, keeping different sizes of periodic broadcast packets in consideration. The number of automobiles that can be assigned when the parameters are upgraded for messages of various extents was valuated. The effect of some transmission parameters on the count of vehicles was examined.
The authors presented an improved resource selection approach in [18] for V2V communication, which delivers an ARS grounded on a defined frame structure, involving SA and data transmission. Sensing results are utilized to mitigate collisions in a secondary approach. The proposed mechanism is analogous to the LTE Release 12 side link communication with reference to throughput and the probability of collision.
A novel collective ARS and scheduled resource assignment mechanism was introduced in [19]. The goal is to augment the aggregate of the data values of users. The presented approach takes the user’s Proximity Service (ProSe) Per-Packet Priority (PPPP) and the reliability of the communication into account, while satisfying the Quality of Service (QoS) of Vehicular User Equipment (V-UE) and Pedestrian User Equipment (P-UE).
The authors presented a D2D resource allocation and power control (DRAPC) strategy for sharing spectrum and allocating power for D2D communications in [20]. There were four resource sharing models proposed, in which the Cellular User Equipment (CUE) and Machine-to-Machine (M2M) pairings were related to one another in one-to-one, one-to-many, many-to-one, and many-to-many ways. M2M communication minimizes the network traffic burden because the communication does not pass through eNodeB.
Radio Resource Management (RRM) for V2X was presented in [21], which offers reliability and latency when assigning resources to vehicles and is based on D2D communication. To ensure the sum-rate and reliability constraints, the authors explored a unicast communication paradigm. In a highway scenario, the signal power and buffer size were chosen as the key parameters for V2X communication.
To improve the network’s performance, an algorithm for relay-based two-hop D2D communication was developed in [22]. A resource allocation approach with minimal interference was presented, which can be used in cellular networks with two-hop D2D communications. eNodeB assigns cellular users’ resources to D2D users, based on signal-to-interference-plus-noise ratio (SINR) with the aim of increasing system throughput.
In [23], the authors presented a method for jointly optimizing relay selection, power control, and spectrum allocation. The technique involves a refined jointly optimized relay selection problem, while taking care of the constraints of EE. To reduce power consumption, the problem is represented as a bipartite graph between the UEs and a set of relays. The aim was to maximize energy efficiency while maintaining the QoS.
To obtain a greater throughput in D2D communication, the joint scheduling problem on mode selection, radio resource allocation, and power coordination was investigated in [24]. The aim was to improve the traffic offloading capacity of cellular-assisted D2D communication by incorporating D2D relays. Relay-aided and “local route” (i.e., devices communicate utilizing the BS as a relay station) D2D were evaluated, and the suggested model increased the capacity of relay-enabled cellular-assisted D2D communication. The simulation results indicated that the suggested technique improves the traffic offloading capacity of D2D-capable UEs in LTE networks.

3. Preliminaries of D2D Communications

3.1. D2D Communication

The 3GPP is developing an enhanced LTE radio interface called LTE-Advanced (LTE-A) to overcome the shortcomings of LTE. The LTE-A radio interface has many features including D2D communication, Multiple-Input Multiple-Output (MIMO), carrier aggregation, and millimeter wave. D2D communication is a direct communication amongst two closely located UE without passing over the base station (eNodeB/eNB) or the central network Evolved Packet Core (EPC). The communication occurs on a Side Link (SL) or PC5 interface between the two devices [25]. D2D communication promises three kinds of benefits: (1) the proximity of UE; this permits enhanced bit rates, lower delays, and less power consumption; (2) reuse gain; radio resources can be used by cellular and D2D links at the same time; (3) hop gain; there is one link in the D2D mode instead of the Uplink (UL) and Downlink (DL) when communicating through eNodeB [26].
Based on the coverage of the LTE network, D2D communication can occur in three ways: within network coverage, outside network coverage, and partial network coverage. In the partial network coverage scenario, the in-coverage UE acts as a relay between the out-of-coverage UE and eNodeB, resulting in an increase in the coverage area of eNodeB [27]. Figure 2a,b and c shows the communication scenarios for D2D.
Release 14 of 3GPP reveals that vehicles can communicate with other vehicles based on the principles of D2D communication. Figure 2b represents Mode 4 communication in Release 14, wherein vehicles can manage and select resources from available resources without the involvement of the core cellular network [12].

3.2. LTE-V2V Mode 4

Mode 4 is studied as the baseline for V2V communication because of its ability to operate without the involvement of cellular infrastructure. Safety applications based on V2V communication cannot depend on the coverage of cellular network, making Mode 4 even more suitable for such communication. Vehicles in Mode 4 use PC5/the side link for V2V communication. Radio resources are autonomously selected, having no dependency on cellular network coverage. For in-coverage vehicles, the configuration decision of the V2X channel is performed and sent to vehicles by the network through the PC5 V2X configurable parameters. The message comprises the V2X resource pool, the number of subchannels in a subframe, the number of RBs in a subchannel, the carrier frequency, etc. [28].
For vehicles present outside network coverage, a set of preconfigured parameters is used to replace the configurable PC5 V2X parameters. However, an exact value of each parameter is not specified in the standard. The subframes utilized for V2X communication are indicated in the V2X resource pool. Remaining subframes can be exploited for cellular communication. Geographical-area-based division of the V2X resource pool is included in the standard termed zoning. Vehicles in a specific area can use the resources assigned to that area [28]. In this paper, the channel was assumed to be entirely dedicated to V2X communication.
In LTE Mode 4, resources are arranged as blocks called RBs. The following section discusses the mechanisms used for the selection of these blocks.

3.3. Resources in LTE-V2V Mode 4

3.3.1. Anatomy of RB in Mode 4

The smallest block of resources represented in the time and frequency domain is referred to as an RB. RBs are used for DL/UL transmission. A group of 12 contiguous subcarriers, having a subcarrier spacing of 15 kHz, over a single time slot comprise an RB, as shown in Figure 3.
One RB corresponds to 180 kHz (i.e., 15 × 12 = 180) in the frequency domain over one slot (1 slot = 0.5 ms). There are seven Orthogonal Frequency Division Multiplexing (OFDM) symbols in each time slot [29]. Transmissions are allotted in units of RBs. In [30], the number of RBs corresponding to their respective channel bandwidths was presented, i.e., channels with bandwidths of 1.4 MHz, 3 MHz, 5 MHz, 10 MHz, 15 MHz, and 20 MHz correspond to 6 RBs, 15 RBs, 25 RBs, 50 RBs, 75 RBs, and 100 RBs, respectively.

3.3.2. Resource Selection

LTE-enabled devices/vehicles require wireless resources to broadcast messages. Two mechanisms of resource (RBs) scheduling defined in Release 14 of the 3GPP are: (a) Scheduled Resource Allocation (SRA), referred to as Mode 3, and (b) ARS, referred to as Mode 4 [12].
SRA is a centralized mechanism wherein a UE initially sends a Radio Access Control (RAC) request to the associated eNodeB, that in return allots some resources for it to send the status of its buffer via a Buffer Status Report (BSR). After this report, eNodeB schedules resources to the LTE UE for D2D communication [31], as illustrated in Figure 4.
Due to the signaling overhead involved for each UE, Mode 3 is not a good choice for delay-critical applications.
ARS uses a distributed approach. A static resource pool comprising many RBs is presented after every Transmission Time Interval (TTI). The UE can autonomously select RBs from it with no prior signaling [31]. Figure 5 presents this idea. The dotted line in Figure 5 represents RB selection for data transmission. Step 2 involves sending feedback regarding RB selection.
Mode 4 does not involve signaling for the request of resources from LTE, and hence, it is more suitable for delay-constrained vehicle safety applications. However, the lack of signaling also means contention for the RB selection and the probability of resource collisions [32]. The probability of resource collisions is bound to increase for densely populated networks [16]. This scenario of resource collisions among multiple vehicles and the broadcast nature of vehicle safety messages brings Release 14 of the 3GPP away from its design objectives of LTE-V2X for vehicular broadcast communications.

4. System Model Assumptions and Proposed Mechanism

4.1. System Description

To understand the behavior of resource collisions, a discrete-time ARS mechanism is considered. Vehicles having data to transmit must select RBs from a periodically reappearing pool of RBs. Subsequently, the selected RBs are used to transmit the data. According to the standard [33], the model considers three processes, i.e., (1) RB selection, (2) counter selection, and (3) RB reselection. When a vehicle has data to transmit, the RB selection process executes, which refers to the initial selection of RBs from a pool of resources. Upon the selection of the RB, the counter selection process starts, which refers to the selection of an integer counter value. This counter defines the number of times the selected RB can be used for subsequent transmissions. Finally, upon expiry of the counter, the RB reselection process is called, which refers to the probability of reselecting the same RB for further transmissions. These three processes are called Process 1, Process 2, and Process 3, respectively.

4.2. System Model

To observe the behavior of RB selection and collision, it is important to model Process 1, Process 2, and Process 3. The probability of RB collision in the context of Process 1 in ARS is elementary. For n users and a number of RBs r, RB selection is an independent event of RB selection from a single pool, performed by every vehicle, and it is given by n / n ( n r ) ! . Therefore, the system model only considers Process 2 and Process 3. Symbols/acronyms and their abbreviations are listed in Table 1.
Considering Process 2 and Process 3 as the DTMC, the following assumptions were made:
  • If a user has data to transmit, then the user has already selected an RB for the transmission of the data; hence, Process 1 is omitted;
  • The number of transmitting users is directly proportional to the RB collisions;
  • A user is considered as a transmitting user only after reselecting the same resource for further transmission. The transmitting users are the ones that have more data, and they contend for more resources, hence resulting in more collisions.
Therefore, to observe the behavior of Process 2 and Process 3 in terms of the number of transmitting users, let X n be the number of transmitting users in ARS at any instant of time,
X n S : = { 0 , 1 , 2 , , N }
where X represents the ARS process, S is the state space, n is the time slot, and N is the total number of transmitting users.
A user that has data to transmit always enters Process 2 to select a counter. The probability of Process 2 is defined by the probability that a user has data to transmit. Therefore, the probability that a user has data to transmit and that it is in Process 2 in time slot n is given by γ . It was assumed that after Process 2, a simultaneous event also occurs, i.e., X enters in Process 3 at time n. Then, the probability of reselecting the same RB is given by δ , and the probability of not selecting the same RB is given by ( 1 δ ) . Once a counter and reselection counter are selected, the user is considered as a transmitting user at time slot n + 1 .
The state transitions in X happen when X enters in Process 3. When a user has data to transmit at time n, the number of transmitting nodes X n either increases or decreases at n + 1 depending on the probabilities of Process 2 and Process 3. The transition probability matrix P is given by:
P x , t = p 1 = γ ( δ ) , { t = x + 1 | x = 1 , 2 , 3 , } p 2 = γ ( 1 δ ) , { t = x 1 | x = 1 , 2 , 3 , } p 3 = ( 1 γ ) ( 1 δ ) , { t = x | x = 1 , 2 , 3 , } γ , { x = 0 , t = 1 } ( 1 γ ) , { x = 0 , t = 0 }
where P x , t is the transition probability matrix from the current state x to the next state t. The transitions happen when the user enters Process 2 and Process 3. Observe that, at n, if  γ and δ are selected, then X n increases by one, i.e.,  X n + 1 = X n + 1 . X n decreases if, after counter selection, the same RB is not selected. Similarly, X n + 1 = X n , if the user has no data to transmit and Process 2 and Process 3 are not called.
Observe that the DTMC is very similar to the discrete time birth and death Markov chain, as shown in Figure 6. Therefore, the balanced equations of X n are:
π 0 * γ = π 1 * p 2
where π i is the frequency of being in a certain state. Similarly, according to Figure 6:
π 1 = π 0 * γ + π 1 * p 3 + π 2 * p 2
We can further generalize the equations for state n, where n 2 , as follows:
π n = π n 1 * p 1 + π n * p 3 + π n + 1 * p 2
π n = m = 0 x ( p i , n π m )
The collision probability is plotted in Figure 7a. The X-axis shows the probability of a node having data to transmit, i.e.,  γ . The Y-axis shows the resource collision probability. In addition, the degree of uncertainty is analyzed at a confidence interval level of 95% to show the range in which the values of & = 0.2, & = 0.5, and & = 0.7 fall.
The plotted graph shows the collision probability for different values of δ . Observe that for higher values of δ and γ , the collision probability increases rapidly. The behavior of the DTMC suggests that the design of the ARS mechanism should be adaptive towards the vehicle density and/or traffic intensity to reduce resource collisions. In the following section, we present the TARS mechanism, which not only employs a novel technique for autonomous resource selection, but also is adaptive towards the vehicle densities.

4.3. Proposed Approach

Enhancement in collision avoidance for the LTE D2D side link resource allocation provides significant benefits for LTE broadcasting. For the selection of RBs, our proposed approach utilizes the crypto-hash function. Through the use of the crypto-hash function, the aim was to achieve the following two tasks: (1) to provide randomness in the selection of an RB by exploiting the avalanche effect and (2) to predict the resource selection of the neighbors to a certain level through the use of the input to the crypto-hash.
The avalanche effect is the property of algorithms for which, for a slight change in the input, there is a significant change in the output (almost half the bits flip) [34]. The proposed approach exploits this property in Message Digest 5 (MD5), which has a 128 bit hash value expressed as a 32-digit hexadecimal number. In addition, by handpicking the seed for the crypto-hash function, the RB selection of the neighbor vehicles can be predicted to a certain level.

4.4. TARS Mechanism

Truly Autonomous Resource Selection (TARS) has an iterative process including (a) RB selection, (b) counter selection, (c) the transmission of the message, and (d) RB reselection, as depicted in Figure 8.
The following steps are involved in TARS.

4.4.1. RB Selection

The purpose of RB selection in TARS is to ensure that neighbor vehicles select unique RBs to avoid resource collision. To control resource collisions effectively, the neighbors’ RB information is locally available on every vehicle, and there is a local mechanism to predict the selected RBs by the neighbors as well.
The neighbors’ information is calculated by every vehicle by monitoring the signal strengths of the RBs. This information includes the neighbor identification and the corresponding resource records. This information is gathered after every 5 s interval for every vehicle. In addition, the stored record is also weighted in such a way that the recently selected RBs have a higher weight than the old RBs.
R s = j = 1 / 10 1 i = 1 n w j R i , w 1 < w j 1 < w j
where R s is the selected RB, w is the weighted moving average, w 1 represents the oldest recorded value, and  w j is the latest value. Preference is given to the latest value. R i is the set of RBs.
Once the neighbor information is populated on every vehicle, TARS uses a crypto-hash function to select an RB for transmission by predicting the selected RBs of its neighbors. Explicitly, the neighbor information, along with time as a random variable, is fed into the crypto-hash function to acquire a 128 bit value. The 128 bit value is then pruned and mapped to one of the 50 RBs using Equation (8), as shown in Figure 9. Each vehicle calculates RBs in the same way for all of its neighbors.
R B = ( v a l c u r v a l m i n ) * 50 ( v a l m a x v a l m i n )
where v a l c u r is the decimal-converted equivalent of the last two hexadecimal digits obtained by using MD5 hash. The number 50 shows the considered range of RBs. V a l m a x and v a l m i n shows the maximum and minimum decimal equivalents for two hexadecimal digits, i.e., FF = 255 ( v a l m a x ) and 00 = 0 ( v a l m i n ).

4.4.2. Counter Selection

According to the standard [33], once an RB is assigned to a vehicle, a selection counter is randomly set up between five and fifteen. The counter is decremented by one after each packet transmission. For congested scenarios, the selection of a counter value with a uniform random selection probability has limitations. For instance, a vehicle in a congested network and in a scarce network has equal probability of selecting a higher counter value and vice versa. We argue that the counter selection should be adaptive and based on the network congestion. This ensures that vehicles in a congested network autoselect lower counter values to allow fair opportunities for transmission for neighbor vehicles.
To incorporate adaptiveness in counter selection, the proposed approach divides the selection counter window into two, i.e., [5 to 10] and [10 to 15]. Subsequently, Equation (9) is used to find the probability of setting the counter between the two selection windows.
S c = 1 [ R s 1 * β ] , β 35 %
where S c is the selection counter, R s 1 is the inverse of channel load, and  β is a threshold after which our selection counter is used. As a design choice, β is set to 35%. The result of Equation (9) is the probability for setting the counter between [5 to 10], and (1 – S c ) is the probability for setting the counter between [10 to 15]. For  R s 1 less than β , our approach follows the standard, i.e., the counter is set between [5 to 15] and for R s 1 greater than or equal to β , and when the channel is busier, Equation (9) is used, i.e.,
R s 1 < β , S c ( S t d ) R s 1 β , S c
When the channel is busy, the proposed approach sets the counter to a smaller value. The significance of defining two ranges for the counter and adaptive counter value selection is bound to provide fairness in channel access in congested scenarios. Figure 10a,b shows the effect of using S c for counter selection.

4.4.3. RB Reselection

It is known from the standard that after the start of transmission, once the selection counter reaches zero, the reselection of resources must be performed with probability ( 1 p ) , where the value of p is set between [0–0.8] [33]. This can cause unfair selection for dense networks. As an example, a vehicle with a lower value of p may cause some vehicles to wait for their turn for RB selection. The value of p should be inversely proportional to the network density and not set as a random value between [0–0.8].
P r = 1 R x R i R x τ R i
where P r is the probability of reselecting the same RB, τ is the threshold, which is set to less than or equal to 20% as in the standard [33], and  R x is some RBs out of the total RBs ( R i ). R x τ means the set of R x greater than or equal to 20% free. Figure 11a,b shows the effect of using P r for RB reselection.

4.4.4. Algorithm

This section describes the TARS algorithm. The inputs for Algorithm 1 include local neighbor information l n , current local time t l , and channel information in terms of the signal-to-noise ratio c h ( i ) S N R . A successful algorithm execution gives the resource block, R B l , to be used by a vehicle for beacon transmission.
Initially, a vehicle needs l n , t l , and  c h ( i ) S N R . l n is acquired through the received beacons from the neighbors and stored in a list. This information contains the unique MAC identifier for a neighbor. It was assumed that the time at every vehicle is perfectly synchronized. This is a reasonable assumption because of the prevalent time synchronization standards. c h ( i ) S N R is the signal-to-noise ratio measurement of all the RBs. This information is stored in a table where every RB is recorded, along with its previous SNR value.
In Lines 6–7, if a vehicle has a beacon to transmit, it first selects a suitable RB. The algorithm uses a 64 bit crypto-hash function, which is pruned and mapped to an RB number. From Line 8 to Line 10, to avoid resource collision with neighbors, each vehicle tries to predict the RB selection by its neighbors. For each of its neighbors, a vehicle uses a seed that includes the MAC address of a neighbor and t l to acquire a list of all the RBs selected by its neighbors. In Line 12 and Line 13, if the vehicle finds resource collision, then the vehicle selects an RB that has the least SNR value across all the RBs.
From Lines 15–17, the process of counter selection is called. The value of the counter is determined via Line 22–25. If the value of β is less than 35%, then the standard value of counter S c (Std) is used, which is [5–15]; otherwise, Equation (9) is used to set up the counter value. At Line 27, transmission is performed on the selected RB. RB reselection is carried out in Lines 30–34 when the counter value reaches zero. If the same RB is reassigned, transmission is established; otherwise, the process of acquiring a new RB is restarted via RB selection.
Algorithm 1RB selection using TARS.
inputs: l n , t l , c h ( i ) S N R
output: R B l
1:
procedure  Main
2:
    procedure RBSelection
3:
         G e t N e i g h b o r l i s t l n
4:
         G e t G N S S t l
5:
         G e t S N R c h ( i ) c h ( i ) S N R
6:
         C a l c u l a t e h a s h l ( l n + t l )
7:
         M a p h a s h l R B l u s i n g E q u a t i o n ( 8 )
8:
        for  ( e a c h i i n c h ( i ) S N R 20 % )  do
9:
               C a l c u l a t e h a s h l ( l i + t l )
10:
             M a p h a s h l R B i
11:
       end for
12:
       for  ( e a c h i i n c h ( i ) S N R )  do
13:
             if  ( R B l = = R B i )  then
14:
                    S e l e c t R B l c h ( i ) S N R : c h ( i ) S N R < c h ( i ) S N R
15:
                    C o u n t e r S e l e c t i o n ( )
16:
             else
17:
                    C o u n t e r S e l e c t i o n ( )
18:
              end if
19:
        end for
20:
    end procedure
21:
    procedure CounterSelection
22:
         if  ( β < 35 % )  then
23:
                c o u n t e r = = S c ( S t d )
24:
         else
25:
                 c o u n t e r u s i n g E q u a t i o n ( )
26:
         end if
27:
          T r a n s m i t u s i n g R B l
28:
    end procedure
29:
    procedure ReSelection
30:
          R B r e s l e c t i o n u s i n g E q u a t i o n ( )
31:
         if  ( R B n e w = = R B l )  then
32:
                   T r a n s m i t u s i n g R B l
33:
         else
34:
                   R B s e l e c t i o n ( )
35:
         end if
36:
     end procedure
37:
end procedure

5. Performance Evaluation

The model for TARS was implemented in MATLAB, and its performance was compared with the LTE Mode 4 standard and a competing autonomous resource selection approach proposed and described in [14]. The simulation parameters are given in Table 2.
The result in Figure 12a shows the resource collision probability with respect to increasing distances. The probabilistic range of values for collision probability is also depicted in the figure at a confidence interval level of 95%. At lower distances, the resource collision probability is negligible. As the distance between the sender and receiver increases, i.e., beyond 50 m, the collision probability starts to increase. This is due to the increase in the number of neighbors of a vehicle, which results in higher contention for resource blocks. At even higher distances, i.e., around 250 m, the collision probability starts to reduce. Observe that at higher distances, the vehicle density remains the same and so does the transmit power for sender. Therefore, the resource collision probability reduces for higher distances. Observe that the standard, i.e., LTE Mode 4, is comparatively more prone to collisions due to the random nature of resource selection. The probability of resource collisions was reduced by He et al. due to the piggyback mechanism through SA, which contains information about the reserved RBs for future transmissions. However, continuous collisions are still possible during the initial selection of RBs from multiple vehicles. TARS, on the other hand, reduces resource collisions by effectively predicting the RBs being used by the neighbors, hence reducing the probability of collision.
Figure 13a reports the increase in the probability of resource collision with the increase in vehicle density and the probabilistic range of values for collision probability at a confidence interval level of 95%. Note that the increase in the probability of resource collisions with respect to density in LTE Mode 4 and He et al. is due to the uniform resource pool and the random selection of RBs by vehicles. TARS improves this performance through its ability to select unique RBs instead of a uniform random resource selection mechanism. Moreover, at lower densities, better TARS performance is due to the unique selection of resources by TARS instead of the uniform random resource selection mechanism of LTE Mode 4 and He et al. However, the at around 300 vehicles and beyond, the performance of TARS is comparable with LTE Mode 4 and He et al. This is because at higher vehicle densities, a unique selection of resources by TARS is not fully applicable because of the limited number of RBs.
The Packet Delivery Ratio (PDR) against increasing vehicle densities is depicted in Figure 14 and Figure 15. At lower densities, the PDR is high. It drops with the increase in the number of vehicles in the network because of the interference caused by other vehicles. We also evaluated TARS by employing retransmission mechanism as proposed in LTE Mode 4 and in He et al. The PDR of all approaches improves when packets are retransmitted. There are more RBs available for selection; therefore, TARS without retransmission achieves a better PDR than LTE Mode 4 and He et al. Similarly, with retransmissions, the better PDR in TARS is due to the fewer resource collisions owing to its effective local RB prediction and subsequent selection for transmission.
LTE Mode 4 and He et al. employ retransmissions for redundancy and reliability in terms of PDR. However, this has a tradeoff of consuming more bandwidth [35]. Since TARS does not rely on retransmission, TARS can also be theoretically evaluated to understand its bandwidth savings. By way of an example, the periodic message size is between 50 B and 300 B if no cryptography codes are used. Vehicle safety applications have a typical message frequency of 5 Hz to 50 Hz. If we assume a 10 ms scheduling period and one RB for every transmission, then in a 10 MHz bandwidth, 2 dB of noise, and 28 dBm of signal power, we are left with approximately 19 Mbps of savings in bandwidth.

6. Conclusions

This paper presented TARS, a resource selection mechanism that identifies resource collisions locally using a crypto-hash function. TARS locally calculates adaptable metrics for counter selection and the resource reselection probability with respect to vehicle density. The simulation results justified the importance of TARS in reducing resource collisions and enhancing the PDR with respect to different vehicle densities and distances. This verifies that resource collisions can be avoided by using a local collision identification approach. Adapting the counter selection and resource reselection with respect to vehicle density provides a fair opportunity for vehicles to transmit.

Author Contributions

I.A.K. did the literature review, conceived the idea, designed the model, performed simulations and data analysis. S.A.A.S. supervised the project, refined the concept and proposed solution, helped in (data interpretation, model verification and write-up). A.A. provided advised on designing the experiments for data analysis. A.G. and J.J.P.C.R. did the mentor-ship of the overall project, gave advice in the refinement of the protocol design and edited the write-up. All authors have read and agreed to the published version of the manuscript.

Funding

This work was partially funded by FCT/MCTES through national funds and, when applicable, cofunded EU funds under the Project UIDB/50008/2020, as well as by the Brazilian National Council for Scientific and Technological Development (CNPq) via Grant No. 313036/2020-9.

Institutional Review Board Statement

Not Applicable.

Informed Consent Statement

Not Applicable.

Data Availability Statement

Not Applicable.

Conflicts of Interest

Not Applicable.

References

  1. Garip, M.T.; Reiher, P.; Gerla, M. Ghost: Concealing vehicular botnet communication in the VANET control channel. In Proceedings of the 2016 IEEE International Wireless Communications and Mobile Computing Conference (IWCMC), Paphos, Cyprus, 5–9 September 2016; pp. 1–6. [Google Scholar]
  2. Chatrapathi, C.; Rajkumar, M.N.; Venkatesakumar, V. VANET based integrated framework for smart accident management system. In Proceedings of the 2015 IEEE International Conference on Soft-Computing and Networks Security (ICSNS), Coimbatore, India, 25–27 February 2015; pp. 1–7. [Google Scholar]
  3. Shah, S.A.A.; Ahmed, E.; Imran, M.; Zeadally, S. 5G for vehicular communications. IEEE Commun. Mag. 2018, 56, 111–117. [Google Scholar] [CrossRef]
  4. Soleimani, H.; Boukerche, A. D2D scheme for vehicle safety applications in LTE advanced network. In Proceedings of the 2017 IEEE International Conference on Communications (ICC), Paris, France, 21–25 May 2017; pp. 1–6. [Google Scholar]
  5. Intelligent Transport Systems (ITS); Framework for Public Mobile Networks in Cooperative ITS (C-ITS). Available online: https://www.etsi.org/deliver/etsi_tr/102900_102999/102962/01.01.01_60/tr_102962v010101p.pdf (accessed on 17 September 2021).
  6. Vinel, A. 3GPP LTE versus IEEE 802.11 p/WAVE: Which technology is able to support cooperative vehicle safety applications? IEEE Wirel. Commun. Lett. 2012, 1, 125–128. [Google Scholar] [CrossRef] [Green Version]
  7. Lottermann, C.; Botsov, M.; Fertl, P.; Müllner, R.; Araniti, G.; Campolo, C.; Condoluci, M.; Iera, A.; Molinaro, A. LTE for vehicular communications. In Vehicular ad hoc Networks; Springer: Berlin/Heidelberg, Germany, 2015; pp. 457–501. [Google Scholar]
  8. Bazzi, A.; Berthet, A.O.; Campolo, C.; Masini, B.M.; Molinaro, A.; Zanella, A. On the Design of Sidelink for Cellular V2X: A Literature Review and Outlook for Future. IEEE Access 2021, 9, 97953–97980. [Google Scholar] [CrossRef]
  9. Bazzi, A.; Campolo, C.; Molinaro, A.; Berthet, A.O.; Masini, B.M.; Zanella, A. On wireless blind spots in the C-V2X side link. IEEE Trans. Veh. Technol. 2020, 69, 9239–9243. [Google Scholar] [CrossRef]
  10. Noor-A-Rahim, M.; Liu, Z.; Lee, H.; Ali, G.M.N.; Pesch, D.; Xiao, P. A survey on resource allocation in vehicular networks. arXiv 2020, arXiv:1909.13587. Available online: https://arxiv.org/abs/1909.13587 (accessed on 19 September 2021).
  11. Khan, U.A.; Lee, S.S. Distance-Based Resource Allocation for Vehicle-to-Pedestrian Safety Communication. Electronics 2020, 9, 1640. [Google Scholar] [CrossRef]
  12. 3GPP TS 36.300. Evolved Universal Terrestrial Radio Access (EUTRA) and Evolved Universal Terrestrial Radio Access Network (EUTRAN); Overall description; Stage 2. Available online: https://www.etsi.org/deliver/etsi_ts/136300_136399/136300/09.04.00_60/ts_136300v090400p.pdf (accessed on 16 September 2021).
  13. Masmoudi, A.; Mnif, K.; Zarai, F. A survey on radio resource allocation for V2X communication. Wirel. Commun. Mob. Comput. 2019, 2019, 2430656. [Google Scholar] [CrossRef]
  14. He, J.; Tang, Z.; Fan, Z.; Zhang, J. Enhanced collision avoidance for distributed LTE vehicle to vehicle broadcast communications. IEEE Commun. Lett. 2018, 22, 630–633. [Google Scholar] [CrossRef] [Green Version]
  15. Gonzalez-Martín, M.; Sepulcre, M.; Molina-Masegosa, R.; Gozalvez, J. Analytical models of the performance of C-V2X Mode 4 vehicular communications. IEEE Trans. Veh. Technol. 2018, 68, 1155–1166. [Google Scholar] [CrossRef] [Green Version]
  16. Yang, J.; Pelletier, B.; Champagne, B. Enhanced autonomous resource selection for LTE-based V2V communication. In Proceedings of the 2016 IEEE Vehicular Networking Conference (VNC), Columbus, OH, USA, 8–10 December 2016; pp. 1–6. [Google Scholar]
  17. Bazzi, A.; Zanella, A.; Masini, B.M. Optimizing the resource allocation of periodic messages with different sizes in LTE-V2V. IEEE Access 2019, 7, 43820–43830. [Google Scholar] [CrossRef]
  18. Shih, M.J.; Liu, H.H.; Shen, W.D.; Wei, H.Y. UE autonomous resource selection for D2D communications: Explicit vs. implicit approaches. In Proceedings of the 2016 IEEE Conference on Standards for Communications and Networking (CSCN), Berlin, Germany, 31 October–2 November 2016; pp. 1–6. [Google Scholar]
  19. Li, X.; Shankaran, R.; Orgun, M.; Ma, L.; Xu, Y. Joint autonomous resource selection and scheduled resource allocation for D2D-based V2X communication. In Proceedings of the 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), Porto, Portugal, 3–6 June 2018; pp. 1–5. [Google Scholar]
  20. Lai, W.K.; Wang, Y.C.; Lin, H.C.; Li, J.W. Efficient resource allocation and power control for LTE-A D2D communication with pure D2D model. IEEE Trans. Veh. Technol. 2020, 69, 3202–3216. [Google Scholar] [CrossRef]
  21. Masmoudi, A.; Feki, S.; Mnif, K.; Zarai, F. Efficient scheduling and resource allocation for D2D-based LTE-V2X communications. In Proceedings of the IEEE 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), Tangier, Morocco, 24–28 June 2019; pp. 496–501. [Google Scholar]
  22. Mishra, P.K.; Kumar, A.; Pandey, S. Minimum interference based resource allocation method in two-hop D2D communication for 5G cellular networks. In Proceedings of the IEEE 2017 International Conference on Intelligent Sustainable Systems (ICISS), Palladam, India, 7–8 December 2017; pp. 1191–1196. [Google Scholar]
  23. Xu, C.; Feng, J.; Huang, B.; Zhou, Z.; Mumtaz, S.; Rodriguez, J. Joint relay selection and resource allocation for energy-efficient D2D cooperative communications using matching theory. Appl. Sci. 2017, 7, 491. [Google Scholar] [CrossRef] [Green Version]
  24. Ma, R.; Xia, N.; Chen, H.H.; Chiu, C.Y.; Yang, C.S. Mode selection, radio resource allocation, and power coordination in D2D communications. IEEE Wirel. Commun. 2017, 24, 112–121. [Google Scholar] [CrossRef]
  25. Liu, J.; Kato, N.; Ma, J.; Kadowaki, N. Device-to-device communication in LTE-advanced networks: A survey. IEEE Commun. Surv. Tutorials 2014, 17, 1923–1940. [Google Scholar] [CrossRef]
  26. Fodor, G.; Dahlman, E.; Mildh, G.; Parkvall, S.; Reider, N.; Miklós, G.; Turányi, Z. Design aspects of network assisted device-to-device communications. IEEE Commun. Mag. 2012, 50, 170–177. [Google Scholar] [CrossRef]
  27. Roessler, J. LTE-Advanced (3GPP Rel. 12) Technology Introduction White Paper. Available online: https://www.rohde-schwarz.com/us/applications/lte-advanced-3gpp-rel.12-technology-introduction-white-paper-white-paper_230854-108294.html (accessed on 16 September 2021).
  28. Molina-Masegosa, R.; Gozalvez, J. LTE-V for side link 5G V2X vehicular communications: A new 5G technology for short-range vehicle-to-everything communications. IEEE Veh. Technol. Mag. 2017, 12, 30–39. [Google Scholar] [CrossRef]
  29. Ahmadi, S. Mobile WiMAX: A Systems Approach to Understanding IEEE 802.16 m Radio Access Technology; Academic Press: Cambridge, MA, USA.
  30. LTE/LTE-Advanced. 2010. Available online: https://www.rohde-schwarz.com/th/solutions/test-and-measurement/wireless-communication/lte-lte-advanced/overview_56087.html (accessed on 16 September 2021).
  31. Nardini, G.; Stea, G.; Virdis, A. A fast and reliable broadcast service for LTE-Advanced exploiting multihop device-to-device transmissions. Future Internet 2017, 9, 89. [Google Scholar] [CrossRef] [Green Version]
  32. Nardini, G.; Stea, G.; Virdis, A.; Sabella, D.; Caretti, M. Broadcasting in LTE-Advanced networks using multihop D2D communications. In Proceedings of the 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Valencia, Spain, 1–4 September 2016; pp. 1–6. [Google Scholar]
  33. Molina-Masegosa, R.; Gozalvez, J. System level evaluation of LTE-V2V Mode 4 communications and its distributed scheduling. In Proceedings of the 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), Sydney, Australia, 4–7 June 2017; pp. 1–5. [Google Scholar]
  34. De Guzman, L.B.; Sison, A.M.; Medina, R.P. MD5 secured cryptographic hash value. In Proceedings of the 2018 International Conference on Machine Learning and Machine Intelligence, Cambridge, UK, 11–13 December 2018; pp. 54–59. [Google Scholar]
  35. Wen, H.; Lin, C.; Ren, F.; Yue, Y.; Huang, X. Retransmission or redundancy: Transmission reliability in wireless sensor networks. In Proceedings of the 2007 IEEE International Conference on Mobile Adhoc and Sensor Systems, Pisa, Italy, 8–11 October 2007; pp. 1–7. [Google Scholar]
Figure 1. LTE-V2V Mode 3 and Mode 4.
Figure 1. LTE-V2V Mode 3 and Mode 4.
Sensors 21 07431 g001
Figure 2. D2D communication scenarios: (a) within network coverage, (b) outside network coverage, and (c) partial network coverage.
Figure 2. D2D communication scenarios: (a) within network coverage, (b) outside network coverage, and (c) partial network coverage.
Sensors 21 07431 g002
Figure 3. A Resource Block (RB).
Figure 3. A Resource Block (RB).
Sensors 21 07431 g003
Figure 4. Resource allocation in SRA, Mode 3.
Figure 4. Resource allocation in SRA, Mode 3.
Sensors 21 07431 g004
Figure 5. Resource selection in ARS, Mode 4.
Figure 5. Resource selection in ARS, Mode 4.
Sensors 21 07431 g005
Figure 6. Birth and death Markov chain.
Figure 6. Birth and death Markov chain.
Sensors 21 07431 g006
Figure 7. Resource collision probability; (a) of the Markov model and, (b) a confidence interval of 95%.
Figure 7. Resource collision probability; (a) of the Markov model and, (b) a confidence interval of 95%.
Sensors 21 07431 g007
Figure 8. Workflow of TARS.
Figure 8. Workflow of TARS.
Sensors 21 07431 g008
Figure 9. RB selection.
Figure 9. RB selection.
Sensors 21 07431 g009
Figure 10. Probabilities of the proposed selection counter; (a) For R s = 0.4, (b) For R s = 0.7 .
Figure 10. Probabilities of the proposed selection counter; (a) For R s = 0.4, (b) For R s = 0.7 .
Sensors 21 07431 g010
Figure 11. Probabilities of reselection; (a) For R x = 5, (b) For R x = 40.
Figure 11. Probabilities of reselection; (a) For R x = 5, (b) For R x = 40.
Sensors 21 07431 g011
Figure 12. Resource collision probability; (a) with respect to distance and, (b) a confidence interval of 95%.
Figure 12. Resource collision probability; (a) with respect to distance and, (b) a confidence interval of 95%.
Sensors 21 07431 g012
Figure 13. Resource collision probability; (a) with respect to density and, (b) a confidence interval of 95%.
Figure 13. Resource collision probability; (a) with respect to density and, (b) a confidence interval of 95%.
Sensors 21 07431 g013
Figure 14. PDR with no retransmission versus density.
Figure 14. PDR with no retransmission versus density.
Sensors 21 07431 g014
Figure 15. PDR with retransmission versus density.
Figure 15. PDR with retransmission versus density.
Sensors 21 07431 g015
Table 1. List of acronyms/symbols.
Table 1. List of acronyms/symbols.
AcronymsAbbreviations
Xrepresents the ARS process
ntime slot
X n number of transmitting users at n
Sstate space
Ntotal number of transmitting users
γ the probability that a user has data to transmit at n
δ the probability of reselecting the same RB
Ptransition probability matrix
xcurrent state
tnext state
P x , t transition probability matrix from x to t
p 1 the probability of moving from the current state to the next state
p 2 the probability of moving back to the previous state
p 3 the probability of staying in the same state
π i the frequency of being in a certain state
Table 2. Parameters.
Table 2. Parameters.
ParametersValues
Vehicular Density50 to 350
Sender/Receiver Distance50 m to 400 m
Vehicular Speed55 km/h
No. of lanes2 lane highway
RB Bandwidth10 MHz
RBs50
Tx Power26 dBm
Pkt Size350 B
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Khan, I.A.; Shah, S.A.A.; Akhunzada, A.; Gani, A.; Rodrigues, J.J.P.C. TARS: A Novel Mechanism for Truly Autonomous Resource Selection in LTE-V2V Mode 4. Sensors 2021, 21, 7431. https://doi.org/10.3390/s21227431

AMA Style

Khan IA, Shah SAA, Akhunzada A, Gani A, Rodrigues JJPC. TARS: A Novel Mechanism for Truly Autonomous Resource Selection in LTE-V2V Mode 4. Sensors. 2021; 21(22):7431. https://doi.org/10.3390/s21227431

Chicago/Turabian Style

Khan, Izaz Ahmad, Syed Adeel Ali Shah, Adnan Akhunzada, Abdullah Gani, and Joel J. P. C. Rodrigues. 2021. "TARS: A Novel Mechanism for Truly Autonomous Resource Selection in LTE-V2V Mode 4" Sensors 21, no. 22: 7431. https://doi.org/10.3390/s21227431

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop