Next Article in Journal
Spatial Path Smoothing for Car-like Robots Using Corridor-Based Quadratic Optimization
Next Article in Special Issue
Evaluating Efficiency of Connected and Autonomous Vehicles with Different Communication Topologies
Previous Article in Journal
ADSAttack: An Adversarial Attack Algorithm via Searching Adversarial Distribution in Latent Space
Previous Article in Special Issue
Ultrasonic-Aided Fast-Layered Alternating Iterative Tensor Channel Estimation for V2X Millimeter-Wave Massive MIMO Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Dynamic Beacon Distribution Mechanism for Internet of Vehicles: An Analytical Study

by
Lakhdar Kamel Ouladdjedid
1 and
Bouziane Brik
2,*
1
Laboratoire d’Informatique et de Mathematiques, Amar Thelidji University of Laghouat, Laghouat 03000, Algeria
2
DRIVE Lab, University of Burgundy, 58000 Nevers, France
*
Author to whom correspondence should be addressed.
Electronics 2023, 12(4), 818; https://doi.org/10.3390/electronics12040818
Submission received: 28 November 2022 / Revised: 27 January 2023 / Accepted: 2 February 2023 / Published: 6 February 2023
(This article belongs to the Special Issue V2X Communications and Applications for NET-2030)

Abstract

:
In the last decade, with the arrival of the 5G communication technology and the increasing numbers of vehicles being connected to the internet, conventional vehicle ad-hoc networks (VANETs) are evolving towards the internet of vehicles (IoV), which makes the co-existence of IEEE 802.11p and 5G-based technologies very important for the design of a heterogeneous IoV system that takes advantage of both. The IEEE 802.11p standard is still the best candidate to support direct communications for safety critical services. In fact, both the ETSI ITS-G5 and the IEEE 1609 standard families adopt the IEEE 802.11p standard as a medium access control (MAC) mechanism, and they require vehicles to exchange periodic awareness messages to avoid dangerous situations. When the density of vehicles increases, the MAC layer will suffer from radio channel congestion problems, and this may affect the various VANET applications, especially safety applications. Therefore, the decentralized congestion control (DCC) mechanism has been specified by ETSI to mitigate the channel congestion; this was achieved by adapting the transmission parameters, such as the transmit power and data-rate. However, many research studies have demonstrated limitations and a low performance of DCC, especially when the channel load is extremely high. To deal with this, in this paper, we investigate a new promising technique, called the transmission timing control (TTC), to control the channel load for periodic cooperative awareness. It consists of spreading the transmissions over time in order to avoid contention on the transmission channel. The objective of the paper is to propose an analytical study to calculate the probability of successful transmission using TTC. The demonstrated results show the efficiency of our timing control-enabled scheme to deal with the channel load on top of different conditions.

1. Introduction

The internet of things is driving the evolution of the traditional VANETs into the IoV, which promises huge commercial interest and research value [1]. Therefore, researchers and scientists are continuously designing and developing advanced wireless technologies for vehicular communication. In this regard, the arrival of 5G provides additional spectrum resources to the wireless network for vehicle-to-everything applications, which enable massive data transmissions and low-latency communications. However, for the successful and timely transfer of data, vehicular communications still require direct short range communications (DSRC) to support safety-related applications, without the need for passing through an access point [2,3]. For a seamless network connectivity, combining short-range technologies (IEEE-802.11p/ITS-G5) [4] and long-range technologies (5G), it is becoming primordial to leverage the best of both so as to achieve enhanced vehicular communications [5,6,7].
Cooperative awareness is one of the most important use-cases concerning safety-related applications in the context of the IoV [8]. It is supported by a beaconing algorithm, which consists of vehicles periodically broadcasting a beacon message called a cooperative awareness message (CAM) in Europe [9], as standardized by the European Telecommunications Standards Institute (ETSI) [10] and basic safety message (BSM) in the USA used by the approved IEEE 1609.0 standard and known under the work name “wireless access in vehicular environment” (WAVE) [11,12]. CAM/BSM messages are transmitted with a frequency typically ranging from 1 to 10 Hz, where each vehicle shares its position, speed, and direction with its neighbors. This allows increasing the drivers’ awareness, and having a real-time visibility of the neighborhood.
The control channel (CCH) is the typical frequency channel where the CAM/BSM is sent, so that every vehicle has to listen to data traffic in this specific channel. Of course, other communication channels are typically available for non-safety traffic, which are termed service channels (SCHs). Since vehicles share the same frequency channels, it becomes necessary to control the access to the medium to prevent/avoid frame collisions among vehicles located within the same collision area. The collision area of a vehicle can be defined as the radio range covering its 1-hop and 2-hop neighbors, which may cause known direct and hidden collision problems, respectively [5].
The MAC layer is responsible for controlling access to the communication medium, and plays a fundamental role for controlling channel usage. The best candidate for short-range vehicular communication is the MAC layer specified in the IEEE 802.11p standard [3]. It is a widely adopted contention-based MAC technique due to its simplicity, dynamicity, as well as its asynchronicity. It is a distributed channel access called enhanced distributed channel access (EDCA), which is the improved version of the distributed coordination function (DCF) mechanism used in 802.11. EDCA relies on the carrier sense multiple access/collision avoidance (CSMA/CA) technique, to reduce the probability of collisions between multiple vehicles accessing the medium. It is mainly based on carrier sensing (CS), backoffs, and retransmission schemes.
In North America, the WAVE architecture uses 802.11p/1609.4 standards for the MAC layer implementation, introducing a switching mechanism among multiple physical channels [13,14]. So, right after channel switching from SCH to CCH, many WAVE devices may simultaneously start the channel access contention period [15], causing the “start-of-interval contention” problem [16], which results in a high collision risk, especially when the network is dense. The only congestion control technique available in a WAVE system for safety message beaconing is the backoff mechanism, which is generated using small contention window (CW) sizes, and executed right after the guard interval. This mechanism is not enough to prevent different vehicles from accessing the channel at the same time. Thus, when attempting to support real-time applications, such as safety message beaconing under dynamic topologies, which requires high communication reliability and low latency, the current MAC layer functioning can generate serious problems.
In a previous study [17], we proposed a novel scalable random access MAC for vehicular networks with the objective to prevent the start-of-interval contention problem, which occurs upon switching to the CCH. It aims to provide an efficient one-hop broadcast access to the CCH, and attempts to minimize the risk of direct and hidden collision problems. The proposal is called CSSA MAC (carrier sense for slotted-ALOHA random multiple access MAC), which tries to combine the advantages and the simplicity of the two MAC mechanisms: CSMA and slotted-ALOHA [18]. It can be seamlessly integrated in IEEE 1609.4 on top of the IEEE 802.11p standard. Its main idea is to spread the transmission time of beacons of the contending vehicles, over a spreading window (SW) within the CCH interval. Therefore, the CCH period is virtually slotted, the same way as the S-ALOHA MAC method, where the virtual slots (Vslots) represent the possible start of transmission times of the beacons. The beacon spreading process relies on randomly selecting the Vslot from the SW by contending vehicles. Hence, with this mechanism, CSSA MAC aims to ensure a more efficient use of the limited bandwidth available.
The objective of this paper is to calculate the optimal size of the SW and CW that allows increasing the probability of successful transmission when adopting the CSSA MAC protocol. Thus, we provide a new analytical study on the transmission timing control (TTC), to control the channel load for periodic cooperative awareness. It consists of spreading the transmissions over time in order to avoid contention on the transmission channel. The objective of the paper is to propose a new method to calculate the probability of successful transmission using TTC. The demonstrated results show the efficiency of our timing control-enabled scheme to deal with the channel load on top of different conditions. For more readability, the used abbreviations in this paper, along with their definitions are provided in Table 1.
The remainder of this paper is organized as follows: Section 2 provides an overview of some related studies found in the literature providing MAC layer solutions. Then, Section 3 describes the proposed CSSA-based MAC. The investigation of the beacon distribution is presented in Section 4, followed by the analytical study of the CSSA parameters on the successful transmission probability in Section 5. Finally, the paper is concluded in Section 6.

2. Related Work

Random medium access protocols have been extensively used in contention-based algorithms whenever multiple nodes share a common channel, and compete to access it in a way that can lead to conflicts. A refinement over pure ALOHA, called the slotted ALOHA (S-ALOHA), is a random medium access approach used in wireless local area networks thanks to its simplicity and ease of implementation [19]. Such a protocol requires time to be partitioned into slots of a fixed length that are exactly equal to the packet transmission time. Every packet transmitted must fit into one of these slots, which is randomly selected, by beginning and ending at slot boundaries with perfect synchronization. Thus, a packet to be transmitted at any given node must be delayed until the beginning of the next slot. If two or more nodes transmit their packets in the same slot, a collision occurs. The colliding packets are buffered and retransmitted after a random retransmission delay, calculated with probability P. Many methods have been proposed [20,21,22,23] to improve S-ALOHA by adapting the retransmission delay and the probability value. Nonetheless, these alternative solutions still offer a low performance in terms of throughput, mainly due to the weaknesses associated with their collision avoidance mechanism. Moreover, the higher the packet arrival rate, the higher the risk of experiencing collisions.
The CSMA/CA becomes the basis of the majority of the proposed asynchronous MAC for V2V under the IoV. This is thanks to its simplicity, distributed nature, freedom from a central coordinator, and effectiveness to deal with mobility and topology changes. However, its weaknesses become evident when the channel starts to become congested. Therefore, any improvement upon CSMA/CA remains meaningful. The classification of CSMA/CA-based proposed protocols is performed according to the mechanism which they act upon. These mechanisms can be categorized under two relevant classes: EDCA parameter adaptation mechanisms, and distributed congestion control (DCC) mechanisms.
Concerning the EDCA parameter adaptation mechanisms, these act exclusively on CSMA/CA parameters, such as the contention window, priorities, etc. The researchers working on the medium access issue mention that the CW, and the priorities values used in the standard, are not optimal [24,25,26,27,28,29,30,31,32,33,34,35]. Adapting these values, which can be increased or decreased according to the vehicular density, is a method experiencing a growing tendency in the context of random multiple access control. Several solutions based on a CSMA-like MAC have been extensively investigated in the literature [36,37,38,39,40,41,42] to improve the performance of beaconing in the context of vehicular networks. In particular, adapting the CW parameter is the most attractive approach in the context of a safety message beaconing system. This adaptation may consist in either increasing or decreasing the CW according to the network density. Researchers that have been working and tackling the backoff issue state that the CW value used in the standard is not optimal [43,44,45,46,47,48,49,50]. In that regard, a number of modified backoff algorithms have been proposed in the literature [51,52,53,54,55,56,57]. These mechanisms should take into account the optimal contention window size. Increasing the CW size can lead to the beacon expiration problem; in addition, decreasing its size may lead to an increased number of collisions. So, obtaining a good balance between these two issues becomes a challenging problem, and it is still not sufficient to decrease the risk of collision under high contention [58,59,60,61,62,63,64,65].
Regarding the second category, the main idea of distributed congestion control (DCC) mechanisms is to reduce the load on shared communication channels, and to coordinate a fair channel access among vehicles in the context of vehicular communication.
To that end, the congestion control algorithms usually adopt a method of dynamically adjusting one or more DCC transmission parameters, such as (1) the transmitted power, (2) the generation rate, (3) the transfer rate, and (4) transmission timing [66]. The European ITS architecture ETSI standard gives the opportunity to adapt these parameters through cross-layer design. Note that the transmission timing control is not standardized yet. A more general survey related to DCC-based techniques for vehicular environment is instead presented and classified in [67] with the aim to derive open challenges and future research directions.
Adjusting the beacon rate generation is the most obvious solution for controlling the channel load in a congested environment in vehicular networks. It can be achieved in a straightforward manner through cross-layer mechanisms. In a very dense environment, vehicles usually have low speeds, and the beaconing frequency could be reduced, which has proved to be an effective approach in congestion control. Zheyuan [68] examined the performance of ETSI DCC under a platooning scenario. He implemented a transmit rate control technique for DCC under highway scenarios with a static frequency (in his study, 10 Hz and 20 Hz). A linear message rate integrated control (LIMERIC) [69] is a distributed and adaptive linear control algorithm which remains nowadays as one of the most cited approaches. In LIMERIC, the message transmission rate of each vehicle is adapted with the aim of making channel congestion converge to a given target value. Yet, from time to time, the transmission rate is adapted according to a linear adaptive formula. Bansal et al. [70] extended the LIMERIC algorithm to adapt the message transmission to the vehicle’s action. They introduced an error model based adaptive rate control (EMBARC) in which vehicles with higher dynamics have more transmission opportunities. In [71], Cheng et al. analyzed the performance of ETSI DCC and LIMERIC in a heterogeneous scenario, where some vehicles exploit ETSI DCC, while others vehicles implement the LIMERIC algorithm. Several protocols have been proposed to improve LIMRIC, in terms of fairness and scalability [72,73,74,75,76,77]. In [78], the authors propose a model based on a game-theoretic approach that optimizes the rate and transmission power for each vehicle to enhance throughput by reducing re-transmissions. However, the rate adaptation of such beacons should be designed carefully because sending fewer messages can easily have the effect of damaging the performance of safety applications instead of improving them. The consequences of this adjustment on every safety application should be taken into account as it remains unclear if all applications could deal with such a reduction. Moreover, the maximum frequency of these messages is still an open research problem, and anticipating a maximum value between 5 Hz and 10 Hz could be a hindrance in some situations.
Adjusting the data rate is the third mechanism of DCC; it intends to reduce the transmission time of a message when the vehicular density increases in order to give more stations the chance to access the channel during a beacon period. It consists of speeding up the transmission time of a beacon by using high data rates at high vehicular densities. This practically means to use the signal modulation which occupies the channel for less time. Since LIMERIC decreases the message-rate to reduce congestion without increasing the channel capacity, authors in [79] proposed a data-rate DCC technique (DR-DCC) as an improvement for LIMERIC. DR-DCC increases the data-rate to reduce congestion, effectively making messages shorter in time and increasing the channel capacity. DR-DCC can easily result in unfairness where vehicles with similar channel load conditions can obtain different data-rate settings.

3. The CSSA MAC Overview

3.1. The Main Idea

The CSSA MAC protocol consists of randomly spreading the beacon throughout the Vslots of the entire SW time interval, aiming to prevent simultaneous channel access attempts. The size of the SW can cover the whole CCH interval, or part of it. At the beginning of each CCH interval, each vehicle updates the size of their SW according to the number of neighbors (or the local density (LD)) within a two-hop range. When the virtual slot is reached, each vehicle has a chance to access the channel, and attempts to transmit using the conventional IEEE 802.11p’s CSMA/CA.

3.2. System Model

The system is formed by vehicles which can transmit, receive, and forward beacon messages to/from vehicles within two hops from each other. The communication links are assumed to be symmetric, and each vehicle in the network has the same communication range, which is fixed to a specified value. The carrier sensing range is assumed to be the same as the communications range. The system uses the MAC protocol, as defined in IEEE 802.11p/1609.4, and operates in one CCH which is used for the transmission of a beacon message, also known in the WAVE architecture as a BSM (CAM in the ETSI architecture). The beacon messages are always transmitted at the beginning of each CCH interval, B is the set of beacons, where B = i / 1 i m   . All of the vehicles transmit beacon packets of the same size, and at the same transmission rate λ, and they start at the same instant.
It is assumed that the transmission duration between two successive beacons is equal to the CCH interval, which is reasonable to limit the lifetime of a beacon message to one CCH interval. The time synchronization at the MAC layer is also required by our scheme, and it can be achieved in real deployments by relying on the coordinated universal time (UTC), which can be obtained easily using GPS timestamps. The CCH interval is partitioned into a variable number of virtual slots (Vslot), where their borders and size are calculated at the beginning of each CCH interval, according to the beacon size and the beacon transmission rate. Note that the VSlotset = j / 1 j N represents the set of virtual slots of the CCH interval where SW interval is equal or a part of it, i.e.,   SW VSlotset , as shown in Figure 1.
For that purpose, the protocol defines the duration of the Vslot for the beacon’s transmission, as presented in Equation (1). It consists of a guard time T Guard , which is a guard interval that accounts for the propagation delay and timing inaccuracy, an AIFS period, the minimum contention window (CWmin) interval, and the beacon transmission time (TBeacon). Note that the CWmin is used to ensure a competition between the vehicles that have selected the same Vslot, when they arrive at the MAC layer. The duration of the Vslot , used can be adjusted according to the CW value and the chosen beacon size, as follows:
Vslot = T Guard + T AIFS + T CW + T Beacon
Based on that, the control channel is slotted virtually, and the size of   STT CHH is calculated according to Equation (2), defined as follows:
Vslotset = 1 γ div   TTD
where γ refers to the beacon transmission rate (note that 1 γ is equal to the CCH interval).

4. Analytical Study of the Beacon Distribution

Spreading the beacons of vehicles over the SW interval results in a set of occupied Vslots where each of them receives at least one beacon. The spreading function is implemented in MATLAB under the name SWOccupancyDist   NB , SW , where (NBs) is the number of beacons and (SW) represents the spreading window, as shown in Figure 2. It is clear that the spreading is a random phenomenon where different beacon distributions are possible. In order to predict the number of occupied Vslots, as well as the number of beacons in each Vslot, this phenomenon should be modeled as an occupancy problem [68], where (m) distinguishable balls are randomly distributed into (n) distinguishable boxes, as shown in Figure 2.

4.1. The Number of Occupied Vslots

To begin with, let O m , n be the random variable which determines the number of occupied boxes when distributing (m) distinguishable balls into (n) distinguishable boxes, and let ( O m , n = k ) be the probability that (k) boxes are occupied. It is extracted from the famous equation named “Stirling number of the second kind” [69]. The deduced probability can be written as:
P ( O m , n = k ) = n k j = 0 k 1 j k j m n m
The graphs of Figure 3 are generated from the implementation of the Equation (3) in order to show the occupancy probabilities when varying the number of occupied Vslots for a NBs = 10. It also presents the impact of the SW size on the whole graph. It is noticeable that for all graphs, the occupancy possibilities do not have the same probability of appearance and for each SW size, there is one occupancy possibility which has the highest value denoted as the highest occupancy possibility (HOP). It represents the number of occupied Vslots which have the highest chances to appear when the beacons are spread over the SW. The graphs show that, when the SW increases, the whole graph shifts to the right, and the value of the HOP comes closer to the maximum number of beacons. This means that the occupied STTs will be receiving only one beacon as the SW becomes bigger.
A more general study about the impact of the SW on the HOP is needed to ascertain the previous results. Let HOP(NBs, SW) be the function which returns the HOP value when spreading the NBs over the SW. This way, the occupancy ratio (OR) can be defined in Equation (4), as follows:
OR NB , SW = HOP NB ,   SW NB
lim HOP 1 OR 0 ,   lim HOP NB OR = 1 ,
The worst case takes place when the HOP is equal to 1, meaning that the occupancy is minimal. Moreover, the best case occurs when the HOP is equal to the number of beacons (NBs), in this case each occupied Vslot receives only one beacon. Now, let us define the average occupancy ratio (AvgOR) for a set of NB values, and for a given SW. The AvgOR can be determined in Equation (5), as follows:
  SW   SWset ,     NB   NBset :
AvgOR SW = NB HOP NB , SW NBset
Figure 4 shows the analytic and the simulation results of AvgOR, where the average results of different numbers of beacons are taken:   NBset = i /   i = 10 . . n   and   i = 5 , for each SW size. The SW sizes taken represent a set of multiples of NBs, where SWset = k NB /   i = 1 , 3   and   k = 0 , 5 . Note that, when multiple NB values are equal to zero (k = 0), it means that the SW has just one Vslot (SW = 1). It is remarkable from the graph, that the results of both analytic and simulation graphs are close, especially between 0 and 0.5, 2 and 2.5 where both graphs match each other. For the rest of the graph, there is a slight difference due to the randomness of the simulation which cannot generate the same results in each experiment. Despite that, the margin of error can be considered acceptable. Moreover, from an analytic point of view, the occupancy ratio increases when the SW size increases. It means that the probability of occupying a number of Vslots equal to the number of beacons (NBs) increase as the size of the SW becomes bigger, and this is what is shown in Figure 3. Moreover, the simulation experiments show stable probability results once the SW has a size bigger than 2.5, which means that in reality, it is slightly difficult to occupy a number of Vslots with the same number of beacons (NBs).
The results of the AvgOR graph can be used as a model to estimate and to predict the number of occupied Vslots, noted as HOP, for any number of beacons belonging to the NBset, spread over any SW size belonging to the SWset. The HOP can be extracted using Equation (6):
  SW   SWset ,     NB   NBset :
HOP NB , SW = Round AvgOR SW NB NB

4.2. The Number of Beacons in the Occupied Vslots

In order to predict the number of beacons in each Vslot, the imbrical spreading function (ISF) is proposed. It performs the spreading process multiple times over the occupied Vslots, recursively in a nested loop. Following each round of beacon spreading, the function assigns one beacon to each occupied Vslot and, in the next round, the remaining ones are re-spread once again exclusively over the previously occupied Vslots. The process is repeated several times until there is no beacon left to be spread.
The ISF calculation is performed based on the highest occupancy possibility (HOP) function presented in Equation (3). The notification IFS NB , SW represents the recursive distribution of NBs over the SW. For that purpose, let HOPr i be the highest occupancy possibilities in the round (i) of spreading, and let RBr i be the remaining beacons in the round (i) of spreading, which can be defined as follows:
HOPr i = HOP NBr i ,   SWr i
RBr i = SWr i HOPr i
where NBr i represents the number of beacons to be spread in the round (i), and SWr i is the spreading window of the round (i).
The ISF can then be computed recursively as follows (cf. Algorithm 1):
Algorithm 1. The Imbrical Spreading Function Algorithm

Input: NB and SW
Output: Array of HOPr of the spreading rounds

NBr(1) = NB; SWr(1) = SW
i = 1;
While NBr(1) ≠ 0 Do
HOPr(i) = HOP(NBr(i), SWr(i))
RBr(i) = SWr(i) − HOPr(i)
NBr(i + 1) = RBr(i)
SWr(i + 1) = HOPr(i)
i = i + 1

end
Following the execution of the ISF function, the following information can be extracted. Let HOPset be the set of the highest occupancy possibilities of all rounds, and   NVset i   be the number of Vslots that receive (i) beacons, and finally let NVslotset be the set the occupied Vslots that have the same number of beacons. They can be defined as follows:
HOPset = HOPr i /   i = 1 , 2 n  
NVset i = HOPr i HOPr i + 1
NVslotset = NVslot i /   i = 1 , 2 . . n  
Table 2 shows the analytic results of an application example generated by the ISF with (NB, SW) = (10, 10) and (NB, SW) = (15, 15), respectively.
The information extracted from Table 2 is presented as follows:
  • The HOPset = 7 , 3 , 0  
  • NVset 1 = HOPr 1 HOPr 2 = 4 , it means that there are “4” STTs which receive “1” beacon
  • NVset 2 = HOPr 2 HOPr 3 = 3 , it means that there are “3” STTs which receive “2” beacons.
  • VNslotset = 4 , 3 ,   It means that there are “4” STTs having “1” beacons and “3” STTs having “2 ” beacons.

5. Impact of CSSA Parameters on the Successful Transmission Probability

In order to reduce the contention in the occupied Vslots and to reduce the risk of transmission collision, the value of the optimal CW has to be adjusted according to the maximum number of beacons received by one of the occupied Vslots. The latter is affected by the density of vehicles and the size of the SW. Therefore, the influence of these parameters on each other has to be studied. Figure 5 shows the variation of the maximum number of beacons per Vslot, which are generated by the ISF function, compared to the density of vehicles and the size of the SW. Note that the graphs present the value that has the high probability of occurrence. As expected, the higher the value of SW, the lower the number of beacons per occupied Vslot. This is due to the large number of Vslots when the SW becomes larger. Moreover, for each SW value, the maximum number of beacons remains the same for all vehicle densities. It is because of the SW size, which is chosen according to the number of vehicles.
Figure 6 presents the percentage of the occupied Vslots which receive a different number of beacons for different vehicle densities. It is clear that the occupied Vslot of one beacon has almost the higher percentage of appearance for all of the graphs and the percentage becomes bigger when the size of the SW increases. Moreover, the Vslot with two beacons shows a considerably smaller percentage than those with one beacon and they decrease with the increase of the SW size. While the Vslot with three beacons appears only when the size of the SW is equal to the vehicle density, except in the case of the density of 10 vehicles. The reason for this is because the size of the SW, which has an impact on the distribution of beacons. The larger the size of the SW, the more the occupied Vslots probably receive just one beacon.
According to the CSSA MAC protocol, the access to the Vslot is based on the CSMA in which collisions happen when more than two or more nodes backoff their counters to zero at the same time. Therefore, the values of the SW and CW have a direct impact on the successful transmission probability. Notice that the successful transmission in each Vslot is considered only in two cases. The first one is if the STT contains only one beacon, the vehicle obtains access to the channel without contention, and in the second case, when only one of them sends its beacon exclusively. This means that the backoff of the winner has to be unique, compared to the other contenders, and expires before them, otherwise a collision will occur. This phenomenon can be modeled by Equation (7), defined as p(k, cw, d,v) [70]. It represents the probability that k vehicles generate beacon messages at the same time, and select the backoff counter from the contention window(CW), and (d-1) has passed from the counting down before the first transmission attempt, and that v<=k vehicles transmit in backoff number d.
P k , cw , d , v = 1 d 1 w k k v 1 w d + 1 v 1 1 w d + 1 k v
where:
  • 1 W is the probability that a vehicle selects one of the backoff numbers d from w,
  • 1 d 1 w is the probability of not selecting a backoff number lower than d which represents the interval [0, d−1],
  • ( 1 1 w d + 1 ) is the probability of not selecting slot d among w − d + 1,
  • k v represents all the possibilities where v among k vehicles can select d.
The probability of a successful transmission will be equal to “one” if one and only one vehicle (v = 1) can select the backoff number d. Let T k , w be the random variation which counts the number of transmissions at one occupied STT among k contenders. Therefore,   P T k , w = 1 represents the successful transmission probability of one occupied STT, as shown in Equation (8):
P T k , w = 1 = d = 1 w P k , w , d , 1  
From that, the average successful transmission probability, denoted as AvgSTP(NB,SW,CW), applies to all occupied STTs during a SW interval with a given CW (contention window). It can be calculated, as presented in Equation (9):
AvgSTP NB , SW , CW = i = 1 NSTTset j = 1 NSTT i P T i , cw = 1 HOPr 1
where HOPr 1 returns the number of all occupied STTs generated from the first spreading round by the ISF function, HOPset is the set of the different highest occupancy possibilities of the different spreading rounds, and NSTT i represents the number of STTs which receive exactly i beacons.
Figure 7 shows the impact of the SW and CW size on the average theoretical successful transmission probability for the CSSA MAC protocol. The CW of the 802.11p standard achieves a low performance, since it uses a fix and small value of CW. Moreover, the more the CW becomes bigger, according to the maximum number of beacons in the occupied Vslots, the more the protocol shows a better successful transmission probability. This checks the efficiency of using an adaptive value of the CW. However, as the size of the SW becomes bigger, the protocol will have almost the same average of a successful transmission probability for different values of the CW. The reason is that, as shown in Figure 7, when the SW becomes larger the probability to receive only one beacon in each occupied Vslot becomes bigger too. Therefore, the transmission contention in the occupied Vslot is reduced and the size of the CW has no impact on the successful transmission of beacons. So the value of both parameters of the SW and CW should work in reverse, so that if one of them increases the other should decrease. However, it is a better to double the SW size for a good performance.

6. Conclusions

The objective of this paper is to investigate through analytical study, the performance of the previously proposed protocol called CSSA MAC. It is a random medium access method aimed at increasing the successful transmission probability of the beacon message to support the cooperative awareness which is one of the most important use-cases concerning safety-related applications in the field of IoV. Its main idea is the adoption of a spreading technique for the beacons of vehicles over a SW interval which contains a set of Vslots, and it uses a contention period generated from a CW before sending in each occupied Vslot. For that, the imbrical spreading function (ISF) is proposed to predict the number of occupied Vslots from both the SW size and the number of contender vehicles, and then to estimate the number of beacons affected by each Vslot.
The analytical study performed in this paper proposes an adaptation of the two parameters, SW and CW, according to the number of contending vehicles, and show their impact on the probability of a successful transmission. The obtained results demonstrate that their values have to be adjusted in reverse to each other with the priority for the SW to be increased as high as possible for a better performance in terms of successful transmission probability. However, increasing the sizes of the SW has the side effect of reducing the efficiency of the protocol in the case of a low number of contending stations. It implies that a high fraction of the channel time is wasted before the last beacon can be sent. Thus, it is not suitable for the safety applications where the communications need to be in real time.
Regarding the limitations of the CSSA MAC scheme, while its method works randomly, meaning the risk that several vehicles pick a similar Vslot is still always possible. Moreover, the protocol relies on the IEEE 802.11p CSMA/CA procedure to reduce the risk of simultaneous transmissions. Obviously, when a vehicle succeeds to transmit in a given Vslot, the other vehicles around should again contend to transmit in the following Vslot which increases the risk of collision. In addition, the proposal does not add any additional signaling exchanges in order to reserve the Vslot, so, the vehicle that successfully transmits in a given STT will not keep transmitting at the same Vslot in the next CCH intervals. Thus, contention will necessarily take place in future occasions due to a lack of a memory mechanism. As future work, we are planning to deal with all of the aforementioned challenges as well as to leverage deep-learning based approaches in order to design intelligent and optimal schemes at the MAC level.

Author Contributions

Conceptualization and methodology L.K.O., Validation and analysis B.B. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Yang, F.; Wang, S.; Li, J.; Liu, Z.; Sun, Q. An overview of Internet of vehicles. China Commun. 2014, 11, 1–15. [Google Scholar] [CrossRef]
  2. Duo, R.; Wu, C.; Yoshinaga, T.; Zhang, J.; Ji, Y. SDN-based handover scheme in cellular/IEEE 802.11 p hybrid vehicular networks. Sensors 2020, 20, 1082. [Google Scholar] [CrossRef]
  3. Wu, Q.; Xia, S.; Fan, Q.; Li, Z. Performance analysis of IEEE 802.11 p for continuous backoff freezing in IoV. Electronics 2019, 8, 1404. [Google Scholar] [CrossRef]
  4. Baiocchi, A.; Turcanu, I.; Lyamin, N.; Sjöberg, K.; Vinel, A. Age of Information in IEEE 802.11 p. In Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management (IM): ITAVT Workshop, Bordeaux, France, 17–21 May 2021; pp. 1024–1031. [Google Scholar]
  5. Tahir, M.N.; Katz, M. Performance evaluation of IEEE 802.11 p, LTE and 5G in connected vehicles for cooperative awareness. Eng. Rep. 2021, 4, e12467. [Google Scholar]
  6. Arena, F.; Pau, G.; Severino, A. A review on IEEE 802.11 p for intelligent transportation systems. J. Sens. Actuator Netw. 2020, 9, 22. [Google Scholar] [CrossRef]
  7. Puttagunta, H.; Agrawal, D.P. Performance of 802.11 P in VANET at 5G Frequencies for Different Channel Models. In Proceedings of the 2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, Canada, 4–7 November 2020; pp. 0468–0472. [Google Scholar]
  8. Patil, A.; Muthuchidambaranathan, P.; Shet NS, V. Congestion control mechanisms in vehicular networks: A perspective on Internet of vehicles (IoV). In Autonomous and Connected Heavy Vehicle Technology; Academic Press: Cambridge, MA, USA, 2022; pp. 211–224. [Google Scholar]
  9. ETSI EN 302 637-2 Draft V.0.0.5; Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 2: Specification of Cooperative Awareness Basic Service. ETSI: Alpes Maritimes, France, 2012.
  10. ETSI TC ITS 2010 ETSI EN 302 665 V1.1.1 (2010-09)—Intelligent Transport Systems (ITS); Communications Architecture. ETSI. Available online: https://www.etsi.org/deliver/etsi_en/302600_302699/302665/01.01.01_60/en_302665v010101p.pdf (accessed on 26 November 2022).
  11. Xiang, W.; Gozalvez, J.; Niu, Z.; Altintas, O.; Ekici, E. Wireless Access in Vehicular Environments. EURASIP J. Wirel. Commun. Netw. 2009, 2009, 1–2. [Google Scholar] [CrossRef]
  12. SAE Std. J2735; Dedicated Short Range Communications (DSRC) Message Se Dictionary, DSRC Committee. ETSI: Alpes Maritimes, France, 2009.
  13. IEEE 802.11p/D10.0, Part11: Wireless LAN Medium Access Control (MAC) and the Physical Layer (PHY) specifications: Amendment 7: Wireless Access in Vehicular Environment, Draft 7.0. IEEE: New York, NY, USA, 2010. Available online: https://ieeexplore.ieee.org/servlet/opac?punumber=8624658 (accessed on 27 November 2022).
  14. IEEE Std/1609.4; IEEE Standard for Wireless Access in Vehicular Environments (WAVE)—Multi-Channel Operation. IEEE: New York, NY, USA, 2016; No. 16264705.
  15. Toutouh, J.; Alba, E. Distributed fair rate congestion control for vehicular networks. In Proceedings of the Distributed Computing and Artificial Intelligence, 13th International Conference, Sevilla, Spain, 1–3 June 2016; Springer: Cham, Switzerland; pp. 433–442. [Google Scholar]
  16. Ahmad, A.; Doughan, M.; Mougharbel, I.; Marot, M. A new adapted back-off scheme for broadcasting on IEEE 1609.4 control channel in VANET. In Proceedings of the 2012 The 11th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), Ayia Napa, Cyprus, 19–22 June 2012; pp. 9–15. [Google Scholar]
  17. Ouladdjedid, L.K.; Yagoubi, M.B.; Menouar, H. CSSA MAC: Carrier sense with slotted Aloha multiple access MAC in vehicular network. Int. J. Veh. Inf. Commun. Syst. 2018, 3, 4. [Google Scholar] [CrossRef]
  18. Abramson, N. The ALOHA system: Another alternative for computer communications. In Proceedings of the Fall Joint Computer Conference, Houston, TX, USA, 17–19 November 1970; pp. 281–285. [Google Scholar]
  19. Rom, R.; Sidi, M. Multiple Access Protocols: Performance and Analysis; Springer Science & Business Media: Berlin, Germany, 2012. [Google Scholar]
  20. Hossain, A.E.; Sarker, J.H. On throughput performance of single and multichannel S-ALOHA with exponential backoff retransmission schemes for packet transmissions in multiple power levels. In Proceedings of the 1997 IEEE International Conference on Personal Wireless Communications, Mumbai, India, 17–19 December 1997; pp. 152–156. [Google Scholar]
  21. Jeong, D.G.; Jeon, W.S. Performance of an exponential backoff scheme for slotted-ALOHA protocol in local wireless environment. IEEE Trans. Veh. Technol. 1995, 44, 470–479. [Google Scholar] [CrossRef]
  22. Sallent, O.; Agustí, R. A proposal for an adaptive S-ALOHA access system for a mobile CDMA environment. IEEE Trans. Veh. Technol. 1998, 47, 977–986. [Google Scholar] [CrossRef]
  23. Azzaoui, N.; Korichi, A.; Brik, B.; Fekair, M.E.A.; Kerrache, C.A. Wireless communication in internet of vehicles networks: DSRC-based Vs cellular-based. In Proceedings of the 4th International Conference on Smart City Applications, Casablanca, Morocco, 2–4 October 2019; pp. 1–6. [Google Scholar]
  24. Benblidia, M.A.; Brik, B.; Esseghir, M.; Merghem-Boulahia, L. A game based power allocation in cloud computing data centers. In Proceedings of the 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Limassol, Cyprus, 15–17 October 2018; pp. 1–7. [Google Scholar]
  25. ITS-ETSI. European profile standard for the physical and medium access control layer of Intelligent Transport Systems operating in the 5 GHz frequency band. ETSI ES 2009, 202, 663. [Google Scholar]
  26. Torrent-Moreno, M.; Mittag, J.; Santi, P.; Hartenstein, H. Vehicle-to-vehicle communication: Fair transmit power control for safety-critical information. IEEE Trans. Veh. Technol. 2009, 58, 3684–3703. [Google Scholar] [CrossRef]
  27. Mertens, Y.; Wellens, M.; Mahonen, P. Simulation-based performance evaluation of enhanced broadcast schemes for IEEE 802.11-based vehicular networks. In Proceedings of the Vehicular Technology Conference 2008, VTC Spring 2008, Marina Bay, Singapore, 11–14 May 2008; IEEE: Piscataway, NJ, USA, 2008; pp. 3042–3046. [Google Scholar]
  28. Bai, F.; Stancil, D.D.; Krishnan, H. Toward understanding characteristics of dedicated short range communications (DSRC) from a perspective of vehicular network engineers. In Proceedings of the Sixteenth Annual International Conference on Mobile Computing and Networking, New York, NY, USA, 20 September 2010; ACM: New York, NY, USA, 2010; pp. 329–340. [Google Scholar]
  29. Yang, Q.; Xing, S.; Xia, W.; Shen, L. Modelling and performance analysis of dynamic contention window scheme for periodic broadcast in vehicular ad hoc networks. IET Commun. 2015, 9, 1347–1354. [Google Scholar] [CrossRef]
  30. Chrysostomou, C.; Djouvas, C.; Lambrinos, L. Contention window adaptation for broadcast beaconing in vehicular ad hoc networks. In Proceedings of the Wireless Communications and Mobile Computing Conference (IWCMC), Nicosia, Cyprus, 4–8 August 2014; IEEE: New York, NY, USA; pp. 1039–1044. [Google Scholar]
  31. Wu, Y.J.; Wang, W.S.; Hwang, W.S. A modified backoff algorithm for safety message delivery in IEEE 802.11 p/WAVE networks. In Proceedings of the 2014 International Conference on Computer, Information and Telecommunication Systems (CITS), Jeju, Republic of Korea, 7–9 July 2014; IEEE: New York, NY, USA, 2014; pp. 1–5. [Google Scholar]
  32. Brik, B.; Khan, J.A.; Ghamri-Doudane, Y.; Lagraa, N. A distributed service advertising scheme for vehicular cloud networks. In Proceedings of the 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 11–14 January 2019; pp. 1–6. [Google Scholar]
  33. Dang, D.N.M.; Hong, C.S.; Lee, S.; Huh, E.N. An efficient and reliable MAC in VANETs. IEEE Commun. Lett. 2014, 18, 616–619. [Google Scholar] [CrossRef]
  34. Djaidja, T.E.T.; Brik, B.; Senouci, S.M.; Ghamri-Doudane, Y. Adaptive Resource Reservation to Survive Against Adversarial Resource Selection Jamming Attacks in 5G NR-V2X Distributed Mode 2. In Proceedings of the ICC 2022—IEEE International Conference on Communications, Seoul, Republic of Korea, 16–20 May 2022; pp. 3406–3411. [Google Scholar] [CrossRef]
  35. Campolo, C.; Vinel, A.; Molinaro, A.; Koucheryavy, Y. Modeling broadcasting in IEEE 802.11 p/WAVE vehicular networks. IEEE Commun. Lett. 2011, 15, 199–201. [Google Scholar] [CrossRef]
  36. Stanica, R.; Chaput, E.; Beylot, A.L. Enhancements of IEEE 802.11 p protocol for access control on a VANET control channel. In Proceedings of the 2011 IEEE International Conference on Communications (ICC), Kyoto, Japan, 5–9 June 2011; IEEE: New York, NY, USA, 2011; pp. 1–5. [Google Scholar]
  37. Wang, Y.; Ahmed, A.; Krishnamachari, B.; Psounis, K. IEEE 802.11 p performance evaluation and protocol enhancement. In Proceedings of the ICVES 2008. IEEE International Conference on Vehicular Electronics and Safety, Columbus, OH, USA, 22–24 September 2008; IEEE: New York, NY, USA, 2008; pp. 317–322. [Google Scholar]
  38. Stanica, R.; Chaput, E.; Beylot, A.L. Reverse back-off mechanism for safety vehicular ad hoc networks. Ad Hoc Netw. 2014, 16, 210–224. [Google Scholar] [CrossRef]
  39. Rossi, G.V.; Leung, K.K. Optimised CSMA/CA protocol for safety messages in vehicular ad-hoc networks. In Proceedings of the 2017 IEEE Symposium on Computers and Communications (ISCC), Heraklion, Greece, 3–6 July 2017; IEEE: New York, NY, USA, 2017; pp. 689–696. [Google Scholar]
  40. Taherkhani, N.; Pierre, S. Prioritizing and scheduling messages for congestion control in vehicular ad hoc networks. Comput. Netw. 2016, 108, 15–28. [Google Scholar] [CrossRef]
  41. Shah SA, A.; Ahmed, E.; Xia, F.; Karim, A.; Shiraz, M.; Noor, R.M. Adaptive beaconing approaches for vehicular ad hoc networks: A survey. IEEE Syst. J. 2016, 12, 1263–1277. [Google Scholar] [CrossRef]
  42. Rawat, D.B.; Popescu, D.C.; Yan, G.; Olariu, S. Enhancing VANET performance by joint adaptation of transmission power and contention window size. IEEE Trans. Parallel Distrib. Syst. 2011, 22, 1528–1535. [Google Scholar] [CrossRef]
  43. Kloiber, B.; Harri, J.; Strang, T.; Sand, S. Bigger is better—Combining contention window adaptation with geo-based backoff generation in dsrc networks. In Proceedings of the 2013 International Conference on Connected Vehicles and Expo (ICCVE), Las Vegas, NV, USA, 2–6 December 2013. [Google Scholar] [CrossRef]
  44. Chaabouni, N.; Hafid, A.; Sahu, P.K. A collision-based beacon rate adaptation scheme (CBA) for VANETs. In Proceedings of the 2013 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Chennai, India, 15–18 December 2013; IEEE: New York, NY, USA; pp. 1–6. [Google Scholar]
  45. Amer, H.M.; Hadi, E.A.; Shihab, L.G.; Al Mohammed, H.H.; Khami, M.J. Hybrid power control and contention window adaptation for channel congestion problem in internet of vehicles network. Int. J. Electr. Comput. Eng. 2022, 12, 497. [Google Scholar] [CrossRef]
  46. Alonso Gómez, A. Survey on Decentralized Congestion Control Methods for Vehicular Communication; Elsevier: Amsterdam, The Netherlands, 2022. [Google Scholar]
  47. Lyamin, N.; Deng, Q.; Vinel, A. Study of the platooning fuel efficiency under ETSI ITS-G5 communications. In Proceedings of the 2016 IEEE 19th International Conference on Intelligent Transportation Systems, Rio de Janeiro, Brazil, 1–4 November 2016; pp. 551–556. [Google Scholar]
  48. Bansal, G.; Kenney, J.; Rohrs, C. LIMERIC: A linear adaptive message rate algorithm for DSRC congestion control. IEEE Trans. Veh. Technol. 2013, 62, 4182–4197. [Google Scholar] [CrossRef]
  49. Bansal, G.; Lu, H.; Kenney, J.; Poellabauer, C. EMBARC: Error Model Based Adaptive Rate Control for Vehicle-to-Vehicle Communications; ACM Press: New York, NY, USA, 2013; p. 41. [Google Scholar]
  50. Cheng, B.; Rostami, A.; Gruteser, M.; Kenney, J.; Bansal, G.; Sjoberg, K. Perfor-Mance evaluation of a mixed vehicular network with CAM-DCC and LIMERIC vehicles. In Proceedings of the 2015 IEEE 16th International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM, Boston, MA, USA, 14–17 June 2015; pp. 1–6. [Google Scholar]
  51. Cheng, B.; Rostami, A.; Gruteser, M.; Lu, H.; Kenney, J.; Bansal, G. Evolution of vehicular congestion control without degrading legacy vehicle performance. In Proceedings of the 2016 IEEE 17th International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM, Coimbra, Portugal, 21–24 June 2016; pp. 1–6. [Google Scholar]
  52. Tielert, T.; Jiang, D.; Chen, Q.; Delgrossi, L.; Hartenstein, H. Design methodology and evaluation of rate adaptation based congestion control for Vehicle Safety Communications. In Proceedings of the 2011 IEEE Vehicular Networking Conference, VNC, New York, NY, USA, 16–18 December 2011; pp. 116–123. [Google Scholar]
  53. Bansal, G.; Kenney, J. Achieving weighted-fairness in message rate-based congestion control for DSRC systems. In Proceedings of the 2013 IEEE 5th International Sym- posium on Wireless Vehicular Communications, WiVeC, Dresden, Germany, 2–3 June 2013; pp. 1–5. [Google Scholar]
  54. Lorenzen, T.; Garrosi, M. Achieving Global Fairness at Urban Intersections UsingCooperative DSRCCongestion Control; ACM Press: New York, NY, USA, 2016; pp. 52–59. [Google Scholar]
  55. Kim, B.; Kang, I.; Kim, H. Resolving the unfairness of distributed rate control in the IEEE WAVE safety messaging. IEEE Trans. Veh. Technol. 2014, 63, 2284–2297. [Google Scholar] [CrossRef]
  56. Egea-Lopez, E.; Pavon-Mariño, P. Distributed and fair beaconing rate adapta-tion for congestion control in vehicular networks. IEEE Trans. Mob. Comput. 2016, 15, 3028–3041. [Google Scholar] [CrossRef]
  57. Lorenzen, T. SWeRC: Self-weighted semi-cooperative DSRC congestion control based on LIMERIC. In Proceedings of the 2017 IEEE 86th Vehicular Technology Conference, VTCFall, Toronto, ON, Canada, 24–27 September 2017; pp. 1–7. [Google Scholar]
  58. Rostami, A.; Cheng, B.; Bansal, G.; Sjöberg, K.; Gruteser, M.; Kenney, J. Stability challenges and enhancements for vehicular channel congestion control approaches. IEEE Trans. Intell. Transp. Syst. 2016, 17, 2935–2948. [Google Scholar] [CrossRef]
  59. Math, C.; Ozgur, A.; Groot, S.; Li, H. Data rate based congestion control in V2V communication for traffic safety applications. In Proceedings of the 2015 IEEE Symposium on Communications and Vehicular Technology in the Benelux, SCVT, Luxembourg, 24 November 2015; pp. 1–6. [Google Scholar]
  60. Brik, B.; Lagraa, N.; Yagoubi, M.B.; Lakas, A. An efficient and robust clustered data gathering protocol (CDGP) for vehicular networks. In Proceedings of the second ACM international symposium on Design and analysis of intelligent vehicular networks and applications (DIVANet ‘12), Association for Computing Machinery, New York, NY, USA, 21 October 2012; pp. 69–74. [Google Scholar] [CrossRef]
  61. Tamani, N.; Brik, B.; Lagraa, N.; Ghamri-Doudane, Y. On Link Stability Metric and Fuzzy Quantification for Service Selection in Mobile Vehicular Cloud. In IEEE Transactions on Intelligent Transportation Systems; IEEE: Piscataway, NJ, USA, 2020; Volume 21, pp. 2050–2062. [Google Scholar] [CrossRef]
  62. Brik, B.; Lagraa, N.; Tamani, N.; Lakas, A.; Ghamri-Doudane, Y. Renting Out Cloud Services in Mobile Vehicular Cloud. In IEEE Transactions on Vehicular Technology; IEEE: Piscataway, NJ, USA, 2018; Volume 67, pp. 9882–9895. [Google Scholar] [CrossRef]
  63. Brik, B.; Lagraa, N.; Lakas, A.; Cheddad, A. DDGP: Distributed Data Gathering Protocol for vehicular networks. Veh. Commun. 2016, 4, 15–29. [Google Scholar] [CrossRef]
  64. Brik, B.; Lagraa, N.; Lakas, A.; Ghamri-Doudane, Y. Finding a Public Bus to Rent out Services in Vehicular Clouds. In Proceedings of the 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall), Boston, MA, USA, 6–9 September 2015; pp. 1–7. [Google Scholar] [CrossRef]
  65. Brik, B.; Lagraa, N.; Cherroun, H.; Lakas, A. Token-based Clustered Data Gathering Protocol(TCDGP) in vehicular networks. In Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC), Sardinia, Italy, 1–5 July 2013; pp. 1070–1074. [Google Scholar] [CrossRef]
  66. Tamani, N.; Brik, B.; Lagraa, N.; Ghamri-Doudane, Y. Vehicular Cloud Service Provider Selection: A Flexible Approach. In Proceedings of the GLOBECOM 2017—2017 IEEE Global Communications Conference, Singapore, 4–8 December 2017; pp. 1–6. [Google Scholar] [CrossRef]
  67. Brik, B.; Lagraa, N.; Lakas, A.; Ghamri-Doudane, Y. RCS-VC: Renting out and consuming services in vehicular clouds based on LTE-A. In Proceedings of the 2015 Global Information Infrastructure and Networking Symposium (GIIS), Guadalajara, Mexico, 28–30 October 2015; pp. 1–6. [Google Scholar] [CrossRef]
  68. Dupuis, P.; Zhang, J.X.; Whiting, P. Refined large deviation asymptotics for the classical occupancy problem. Methodol. Comput. Appl. Probab. 2006, 8, 467–496. [Google Scholar] [CrossRef]
  69. Feller, W. An Introduction to Probability Theory and Its Applications (Volume 2); John Wiley & Sons: New York, NY, USA, 2008. [Google Scholar]
  70. Brik, B.; Bettayeb, B.; Sahnoun, M.H.; Louis, A. Accuracy and localization-aware rescheduling for flexible flow shops in industry 4.0. In Proceedings of the 2019 6th International Conference on Control, Decision and Information Technologies (CoDIT), Paris, France, 23–26 April 2019; pp. 1929–1934. [Google Scholar]
  71. Torgunakov, V.; Loginov, V.; Khorov, E. A Study of the Impact of the Contention Window on the Performance of IEEE 802.11 bd Networks with Channel Bonding. In Proceedings of the 2021 International Conference Engineering and Telecommunication (En&T), Dolgoprudny, Russia, 24–25 November 2021; IEEE: New York, NY, USA, 2021; pp. 1–5. [Google Scholar]
  72. Lei, X.; Chen, X.; Rhee, S.H. A hybrid access method for broadcasting of safety messages in IEEE 802.11 p VANETs. EURASIP J. Wirel. Commun. Netw. 2021, 2021, 1–18. [Google Scholar] [CrossRef]
  73. Dou, Z.; Zhou, X.; Yang, Q.; Yang, L.; Tian, J. Improvement and Performance Evaluation of IEEE 802.11 p Protocol in Dense Scenario of VANET. Mob. Inf. Syst. 2022, 2022, 1–19. [Google Scholar]
  74. Mohammed, M.A.; Shareef, S.M.; Ghafoor, K.Z. Adaptive and Optimized Control Channel Utilization in Vehicular Ad Hoc Networks. Wirel. Commun. Mob. Comput. 2022, 2022, 1–12. [Google Scholar] [CrossRef]
  75. Septa, N. The Performance Analysis of 802.11 p with Cooperative Communication and Dynamic Contention Window. Res. Sq. 2022. [Google Scholar]
  76. Jibukumar, M.G. An enhancement for IEEE 802.11 p to provision quality of service with context aware channel access for the forward collision avoidance application in vehicular ad hoc network. Sensors 2021, 21, 6937. [Google Scholar]
  77. Balador, A.; Cinque, E.; Pratesi, M.; Valentini, F.; Bai, C.; Gómez, A.A.; Mohammadi, M. Survey on decentralized congestion control methods for vehicular communication. Veh. Commun. 2021, 33, 100394. [Google Scholar] [CrossRef]
  78. Brik, B.; Khan, J.A.; Ghamri-Doudane, Y.; Lagraa, N.; Lakas, A. GSS-VC: A game-theoretic approach for service selection in vehicular cloud. In Proceedings of the 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 12–15 January 2018; pp. 1–6. [Google Scholar] [CrossRef]
  79. Azzaoui, N.; Korichi, A.; Brik, B.; Amirat, H. A survey on data dissemination in internet of vehicles networks. J. Locat. Based Serv. 2022, 1–44. [Google Scholar] [CrossRef]
Figure 1. Virtual time slicing and SW size, compared to the CCH interval.
Figure 1. Virtual time slicing and SW size, compared to the CCH interval.
Electronics 12 00818 g001
Figure 2. The occupancy problem modeling of the beacon distribution.
Figure 2. The occupancy problem modeling of the beacon distribution.
Electronics 12 00818 g002
Figure 3. Impact of the SW size on the occupancy possibilities and on the HOP, for a number of beacons equal to 10.
Figure 3. Impact of the SW size on the occupancy possibilities and on the HOP, for a number of beacons equal to 10.
Electronics 12 00818 g003
Figure 4. Impact of the SW size on the occupancy possibilities and on the HOP.
Figure 4. Impact of the SW size on the occupancy possibilities and on the HOP.
Electronics 12 00818 g004
Figure 5. The maximum number of beacons per Vslot, compared to the density of vehicles and the size of the SW.
Figure 5. The maximum number of beacons per Vslot, compared to the density of vehicles and the size of the SW.
Electronics 12 00818 g005
Figure 6. The maximum number of beacons per Vslot, compared to the density of vehicles and the size of the SW.
Figure 6. The maximum number of beacons per Vslot, compared to the density of vehicles and the size of the SW.
Electronics 12 00818 g006
Figure 7. The impact of the SW and CW size on the average successful transmission probability for the CSSA MAC protocol.
Figure 7. The impact of the SW and CW size on the average successful transmission probability for the CSSA MAC protocol.
Electronics 12 00818 g007
Table 1. List of used acronyms.
Table 1. List of used acronyms.
AcronymsMeaningAcronymsMeaning
5GFifth GenerationIoTInternet of Things
BSMBasic Safety MessageIoVInternet of Vehicles
CAMCooperative Awareness MessageMACMedium Access Control
CCHControl ChannelOROccupancy Ratio
CSMA/CACarrier Sense Multiple Access/Collision AvoidanceSCHService Channels
CSCarrier SensingSNRSignal-to-Noise Ratio
CSSACarrier Sense for Slotted-ALOHA Random Multiple AccessSWSpreading Window
CWContention WindowS-ALOHASlotted ALOHA
DCCDecentralized Congestion ControlTBeaconBeacon Transmission Time
DCFDistributed Coordination FunctionUTCCoordinated Universal Time
DSRCDirect Short Range CommunicationsVANETVehicular Ad-Hoc Networks
EDCAEnhanced Distributed Channel AccessVslotVirtual Slots
ETSIEuropean Telecommunications Standards InstituteWAVEWireless Access in Vehicular Environment
ITSIntelligent Transportation System
Table 2. Application example of the imbrical spreading function where (NB, SW) = (10, 10).
Table 2. Application example of the imbrical spreading function where (NB, SW) = (10, 10).
iNBrSWrAvgORHOPrRBrNSTT
110100.7734
2370.8303
3030000
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Ouladdjedid, L.K.; Brik, B. Dynamic Beacon Distribution Mechanism for Internet of Vehicles: An Analytical Study. Electronics 2023, 12, 818. https://doi.org/10.3390/electronics12040818

AMA Style

Ouladdjedid LK, Brik B. Dynamic Beacon Distribution Mechanism for Internet of Vehicles: An Analytical Study. Electronics. 2023; 12(4):818. https://doi.org/10.3390/electronics12040818

Chicago/Turabian Style

Ouladdjedid, Lakhdar Kamel, and Bouziane Brik. 2023. "Dynamic Beacon Distribution Mechanism for Internet of Vehicles: An Analytical Study" Electronics 12, no. 4: 818. https://doi.org/10.3390/electronics12040818

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop