Bingyi Liu Preposition Prediction For Clustering
Bingyi Liu Preposition Prediction For Clustering
This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2022.3195655
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: COMSATS INSTITUTE OF INFORMATION TECHNOLOGY. Downloaded on October 26,2022 at 09:08:11 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2022.3195655
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: COMSATS INSTITUTE OF INFORMATION TECHNOLOGY. Downloaded on October 26,2022 at 09:08:11 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2022.3195655
In particular, the rapid development of 5G, mobile edge and [28], respectively. And [29] proposed a distance-based
computing (MEC) technologies has brought new solutions to relay node selection method at intersections under LTE-V2V
networking, and message dissemination [16]. 5G cellular net- communication mode.
works provide high-capacity and low-latency communications Besides, some studies have combined mathematical theory
for vehicles in highly mobile environments. [17] presents a to achieve good performance. [30] presents a distributed algo-
cluster-based broadcast algorithm in a 5G-VANET system, rithm in which the broadcast network is a clustered structure.
where the control messages are disseminated by cluster head in Nevertheless, the recognition and transition of vehicles (such
a cluster with dedicated short-range communications (DSRC), as cluster heads or gateways) need massive beacons, leading
and vehicular networking is formed by the base stations to channel congestion. In [31], and [32], non-cooperative
(BSs) and vehicles based on the software-defined 5G-VANET forwarding schemes are proposed with game theory through
architecture. This method utilizes historical data to model the the volunteer dilemma approach. [33] studies the temporal
socialites of vehicles and reduces the communication overhead topology of the vehicular network and reveals an invariant law
caused by frequent changes in network topology. However, binding the performance of store-carry-and-forward to proper-
since the cover range of a 5G BS is even smaller than 4G BS ties of the road traffic and road layout. It can provide valuable
or RSU, the blind area is much more and larger, which will guidelines for assessing and predicting the performance of
bring a loss to the timeliness of messages. An edge computing vehicular networks.
architecture is proposed in [18], which is composed of two Although the aforementioned methods are essential to sup-
layers—BS and autonomous vehicles. Each BS is equipped port reliable and efficient message dissemination, most of
with an edge server to cache contents (e.g., HD map, traffic them focus on the end-to-end mode and network connectivity,
condition, news) for nearby vehicles. [19] presents a message which cannot exactly meet the requirement of some typical
dissemination scheduling architecture that supports both the vehicular applications that are mainly associated with the
logically centralized control via the cloud node in the core information within specific areas, such as road conditions and
network and the distributed data dissemination via the fog real-time traffic path recommendations. Besides, most of the
nodes at the network edge. However, updating the contents existing safety message dissemination schemes only consider
on the edge nodes requires much communication overhead. spatial or temporal correlation among vehicles to select relays,
disregarding the safety message coverage and the forwarding
path maintenance at the same time. Moreover, Some recently
B. V2V-based Vehicular Networking and Message Dissemina- influential work has contributed to the construction and main-
tion tenance phase for improving clustering lifetime and reducing
Instead of depending on additional roadside infrastructures, communication overhead. However, many of them ignore the
V2V-based networking schemes select vehicles on roads to performance from a network construction perspective in a
establish a network for message transmission [20]. However, target area that is of great importance for safety message
ensuring network connectivity and stability is a challenge due dissemination in urban environments, especially in limited
to the high mobility of vehicles. To address this issue, [21] infrastructure deployment scenarios.
uses interest compatibility as a metric to select cluster heads
and proposes a location-based emergency message distribution III. S YSTEM M ODEL
method to reduce communication delay. A mobility-based This section demonstrates in detail our system model with
clustering algorithm is proposed in [22] with effective mul- main assumptions and specifications in terms of the traffic
timedia broadcasts in a fog computing network, which selects scenario and communication scheme, respectively. To facili-
cluster heads with similar average relative speeds to ensure tate further discussions, we first summarize some important
the stability of clusters. [23] constructs a stable hierarchical symbols and notations in Table I.
network to achieve effective information dissemination via
a backbone network. Based on the backbone network, [24] TABLE I
further utilizes mobility metrics such as movement direction, N OTATIONS
vehicle density, relative speed, and distance to implement dy-
Notation Description
namic mobility and stability-based clustering scheme, in which
the link lifetime estimation is performed by the movement TWN Temporary warning network
RoI Region of interest
direction and relative position of vehicles. [25] uses realistic AA Active area
vehicle trajectories to investigate the effect of node mobility IBV Initial broadcast vehicle
on the connectivity of clustering networks and proposes a CV Core vehicle
OV Ordinary vehicle
dynamic evolutionary network model to maintain the connec- BSM Broadcast starting message
tivity of clustering networks. ELT Expected leaving time
Some studies also consider more complex urban scenarios. vi Vehicle No. i
ri Road segment No. i
In [26], the authors propose a protocol named urban multi-hop (t)
pi Position probability vector
broadcast protocol (UMBP), which adopts flexible broadcast v
RAA AA of vehicle v
strategies according to the positions of the forwarding nodes. δv Selection factor of vehicle v
To reduce the delay of message dissemination, dynamics δth Selection factor threshold
prediction, and concurrent transmission are adopted in [27],
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: COMSATS INSTITUTE OF INFORMATION TECHNOLOGY. Downloaded on October 26,2022 at 09:08:11 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2022.3195655
the emergency event, such as the time and place of occurrence, Ordinary Vehicle (OV, partial)
the estimated duration, and the road segments affected by Region of Interest
Active Area (AA, partial)
(RoI)
the event. According to this information, the relay vehicles
are then selected to construct a dynamic temporary warning Inter-AA Links Intra-AA Links (partial)
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: COMSATS INSTITUTE OF INFORMATION TECHNOLOGY. Downloaded on October 26,2022 at 09:08:11 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2022.3195655
A. Pre-clustering for Vehicular Network Characteristics Ex- 2) Let K be the number of zeros among these eigenvalues,
traction K is exactly the number of connected components in
In a V2V-based distributed network, it is difficult for a single the graph.
vehicle to obtain the global state of the whole traffic network. 3) For any f = (f1 , f2 , . . . , fN )′ , we have f ′ Lf =
1
P N 2
To select proper parameters for the TWN establishment in real 2 i,j=1 wij (fi − fj ) .
traffic situations, in this paper, we take advantage of historical Employ eigen decomposition to the Laplacian matrix L,
vehicular trajectory data and analyze the topology and link and let λ1 , λ2 , . . . , λN denote the eigenvalues. According to
quality between vehicles in a macroscopic view. the property 2) of the Laplacian matrix, K is the number of
The links between vehicles in our framework are divided connected components in graph G. Two nodes within the same
into two categories: the inter-AA links between CVs and the connected component can be connect via a multi-hop link.
intra-AA links between a CV and an OV. The inter-AA links To get the result of pre-clustering, we define
are used to establish the TWN in which the safety messages K
are transmitted and updated, while the intra-AA links are used 1 X W(Ci , Ci )
NCut(C1 , C2 , . . . , CK ) = (5)
for the periodic broadcast of safety messages within an AA. 2 i=1 vol(Ci )
Hence the inter-AA links need to be more stable to reduce P
the maintenance overhead of the TWN structure. In order to where Ci = G − Ci , W(Ci , Ci ) = j∈Ci ,k∈Ci wjk , vol(Ci )
increase the inter-AA link stability, we cluster the network of denotes the number of edges in cluster Ci . To get the mini-
vehicles at different time based on historical data in advance mum sum of weights of all edges between clusters (i.e., the
to obtain the optimal cluster size from a global perspective, maximum similarity within each cluster) and proper cluster
and the average size of the area covered by the clusters is size, our goal is to minimize the NCut.
used to determine the size of the AAs. In addition, the cluster For a subset Cj ⊂ V , we define f j = (f1j , f2j , . . . , fN j )′ ,
size can also reflect the link stability of the entire network, where
and the impact of parameters (e.g., the area similarity and ( p
1/ vol(Ci ), vi ∈ Cj ,
position) in networking can be determined based on the results fij = (6)
of clustering in different situations. 0, vi ∈ Cj .
As mentioned in the previous section, (i, j) ∈ E if the two And f j (j = 1, 2, . . . , K) form a matrix F . As the aforemen-
vehicles vi and vj are within the direct transmission range. tioned property 3), we have
We define the link stability of two adjacent vehicle nodes as
N
min (υi , υj ) 1 X
LS(i, j) = · cos (⟨υ i , υ j ⟩/2) (1) f ′j Lf j = wmn (fmj − fnj )2
max (υi , υj ) 2 m,n=1
q 2
where υi , υj represent the speed of the two vehicles, and 1 X
⟨υ i , υ j ⟩ denotes the angle between the velocity of them. The = wmn 1/ vol(Cj ) − 0
2
definition of link stability takes into account both the speed m∈Cj ,n∈Cj
2 (7)
and direction of vehicles on the link stability, namely, the link 1 X q
between the two vehicles with similar speeds and directions is + wmn 0 − 1/ vol(Cj )
2
more stable. Then we get the weighted adjacency matrix W m∈Cj ,n∈Cj
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: COMSATS INSTITUTE OF INFORMATION TECHNOLOGY. Downloaded on October 26,2022 at 09:08:11 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2022.3195655
normalization and K-means clustering to the matrix formed System (GPS), electronic map and on-board sensors. The
by the eigenvectors to get the result of clustering. The road vehicles collect their own position data at intervals and store
segments covered by vehicles within the same cluster are in the form of {time, road id}. Its state transition probability
labeled with the same cluster number, and the clustering results and distribution function of sojourn time are updated regularly
are stored in the electronic map in the form of {time, road id, according to Eq. (12) and Eq. (13).
cluster number}. 2) Position Probability Matrix: The vehicle either transfers
It shall be noted that the clustering results will not be its state or sojourns in a period in the future, thus we discuss
updated frequently once it is calculated by the cloud. This is the probability of the vehicle’s position in the future from these
because the trajectory characteristics of vehicles hardly change two aspects respectively. We define the position probability at
significantly within a short period of time. The pre-clustering a time slot t in the future as
results are distributed to the vehicles by the cloud.
(t)
pij = Pr (Xt = j|X0 = i) (14)
B. Semi-Markov Model Based Vehicle Position Prediction
Method There may be different paths for the state transition of a
vehicle (e.g., if a vehicle transfers from road section 1 to
Achieving fast propagation in the RoI is a major purpose in 4, there may exist paths as 1→2→4, 1→3→4, 1→2→1→4,
safety message dissemination. According to [34], the trajectory etc.), so the state transition probability in Eq. (12) cannot be
of most vehicles is rather stationary with time. Namely, a directly used as the position probability. We adopt an iterative
vehicle only visits a few particular road segments at a certain approach to calculate the position probability of the vehicle
time, which is called spatio-temporal correlation. As described considering different transition paths. Assume that the vehicle
in Sec. III, the set of these particular road segments is the is located on road segment ri , then the initial condition of the
AA of a vehicle. Therefore, if several vehicles are selected as position probability is
relays so that their AAs cover the RoI, the performance of
broadcast propagation will be significantly improved. (0)
pij = pij , j = 1, 2, . . . , M (15)
In this section, a vehicle trajectory prediction method is
(t)
proposed. The motion of each vehicle is modeled as a semi- pij in Eq. (14) can be calculated as follows:
Markov process, in which the position transition probability (1) If the vehicle has been sojourning on ri until t, we have
and sojourn time distribution function are evaluated from
M M
historical trajectory data to calculate the position probability. (t)
X X
The positions where a vehicle will appear with the highest pii = Pr (τij > t) = 1 − Fij (t) (16)
j=1 j=1
probability in the future are the vehicle’s trajectory prediction j̸=i j̸=i
of the vehicle.
(2) If the vehicle transfers from ri to rj before t, we have
1) Processing of Historical Trajectory Data: We denote the
position of a vehicle as its state. Assume that a vehicle is t
M X
(t) (t−z)
X
located on the road segment ri at time slot t, thus its state pij = Fik (z) · pik · pkj (17)
Xt = i. For the situation of Xt = i and Xt+1 = j, we can k=1 z=0
infer that the vehicle transfers from ri to rj at time slot t + 1, The term indicates that the state transition process can be
which is called state transition; on the contrary, Xt+1 = Xt = divided into three phases: i) sojourning on ri before time slot
i means there is no state transition happens to the vehicle, z; ii) transferring to rk at time slot z; iii) transferring to rj
which is called sojourn. The time slot is divided small enough after time slot z. The transition process from rk to rj can also
that the vehicle performs at most one state transition in one be divided into the three phases. The vehicle may not transfer
single time slot. directly from rk to rj between time slots z to t, so an iterative
Based on the vehicle trajectory data, the probability of a (t−z)
calculation is also performed to pkj . The time complexity
state transition from ri to rj can be calculated. We first define of Algorithm. 1 depends on the number of road segments on
the state transition probability as the map. Thus, it may be slightly high in a complex and large-
size road network. However, the computation of this algorithm
pij = Pr (Xt+1 = j|Xt = i) = lij /li (12) does not affect the performance of our networking scheme
where lij indicates the number of times in the historical since the process is completed in the cloud before our network
data that the vehicle transferred from ri to rj ; li indicates construction.
the number of times transfers from ri to all possible road Hence, the position probability of a vehicle can be obtained
segments; t is a random time slot. Then the distribution based on the state transition probability and the sojourn time
function of sojourn time on segment ri before the vehicle distribution function from the historical trajectory data. Let
transferred from ri to rj is defined as X0 = i, and the position probability vector can be calculated
according to Eq. (16) and Eq. (17) as
t−1
X
Fij (t) = Pr (τij < t) = Pr (τij = u) (13)
(t) (t) (t) (t)
pi = pi1 , pi2 , . . . , piM (18)
u=0
where τij denotes the sojourn time. All vehicles are assumed to Based on the pre-clustering results in Sec. IV-A, we can get
be equipped with communication devices, Global Positioning the optimal clustering size nC (t) at time t. The road segments
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: COMSATS INSTITUTE OF INFORMATION TECHNOLOGY. Downloaded on October 26,2022 at 09:08:11 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2022.3195655
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: COMSATS INSTITUTE OF INFORMATION TECHNOLOGY. Downloaded on October 26,2022 at 09:08:11 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2022.3195655
The superior CV sets a timer to wait for parameter packets Algorithm 2: Subordinate CVs selection of a CV vi
from candidate subordinate vehicles. It receives the parameter Input: Basic Safety Message, relative information
packets from all subordinate vehicles within the duration, and (e.g., content, location, area of interest, validity
selects the vehicle whose parameter packet is received at period) and status information of the vehicle
the earliest time as the subordinate CV. In this way, safety (e.g., speed, direction, active area).
messages can be forwarded quickly among CVs. The packets Output: The collection of selected CVs Vselc .
out of the duration will be discarded. For other received pa- 1 Vselc = ∅;
rameters packets, the superior CV first calculates the selection 2 for any vehicle vj in the neighbor list of vi do
factor of the corresponding candidate vehicle as 3 send BSM to vj ;
4 end
δ v = α · dv + β · β ′ · LS(sup, v) 5 set a timer Tinfo ;
D E. (21) 6 while Tinfo does not expire do
+ γ · sin ARP v , ARP selc 2 7 if vi receives an information message from vj then
where dv denotes the similarity calculated by Eq. (19); sup 8 calculate δcand by Eq. 21;
and v denote the superior CV and a candidate subordinate 9 if ∥Vselc ∥ = 0 or δcand > δth then
vehicle. β ′ is the cluster factor, which equals to 1 when the 10 remove AAj from RoI;
vsup and vcand are on the roads with the same cluster number, 11 send the notification and safety message to
and equals to 0.5 otherwise. ARP selc represents the average vj ;
relative position between all selected CVs and the superior 12 set a timer TACK ;
CV. α, β, γ are weight coefficients satisfying α + β + γ = 1. 13 while TACK does not expire do
The first term in Eq. (21) measures the similarity (i.e., 14 if vi receives ACK message from vj
the degree of overlapping) between the AA of the candidate then
vehicle and the RoI; the second term represents the link 15 terminate TACK ;
stability; and the third term indicates the direction between the 16 Vselc ← Vselc ∪ {vj };
AA of the candidate vehicle and the active area of existing 17 end
CVs, which enables the coverage of message dissemination 18 end
and avoids repetitive selection of CVs in the same region. 19 end
With regard to different average cluster size of pre- 20 end
21 end
clustering results in Sec. IV-A, these coefficients can be set to
different values. The smaller clustering size leads to a smaller
AA, which makes the similarity in a low level by Eq. (19).
On the other hand, the dissemination direction can be chosen period. In this section, the CV re-selection mechanism is
more flexibly. As a result, α needs to be increased accordingly, proposed to solve the problem of link interruption of TWN
while γ can be slightly reduced. to ensure the duration and freshness of the safety message.
If δ v is greater than the given threshold δth , the vehicle is In an established TWN, a CV sets several timers of ELT
selected as the subordinate CV and added to the selected CVs of all subordinate CVs. The CV transmits a query message
list of the superior CV to the corresponding vehicle after a timer expires, and a link
interruption is assumed to happen if the CV does not receive
Vselc = {v ∈ V |δ v > δth } (22) a response. As mentioned in Sec. V-A2, ELT is included in
the packets transmitted by the candidate subordinate vehicles.
3) Establishment of the TWN: If a vehicle is notified that ELT of a vehicle will be set to the expiration time of the
it is selected as a CV by the superior, its AA is removed safety message if the vehicle stays in the RoI until the message
from the RoI to reduce the CVs with overlapping AA so that expires; otherwise, ELT will be set to the time that the vehicle
the channel utilization can be improved. Then the three-step leaves the AA of its superior CV.
connection procedure is repeated to finish the TWN structure The re-selection mechanism is initiated by a superior CV
until all the road segments or vehicles in the initial RoI are once the link between it and its subordinate node interrupts.
covered. The TWN has a tree-like structure in a macroscopic The BSM with a new RoI from which the AAs of existing CVs
view, as shown in Fig. 2. If the vehicle has not received the are removed will be transmitted to the one-hop neighbors of
notification until the waiting timer expired, it is set as an OV. the superior CV, and the subordinate CV will be re-selected by
We set a timeout mechanism in both Algorithm 2 and 3. Thus, the three-step connection procedure. Other CVs without link
the computation time of the two algorithms mainly depends interruption will ignore the BSM.
on the transmission delay between the vehicles.
C. Safety Message Dissemination
B. Maintenance of TWN Structure There are two phases involved in the safety message dis-
An emergency event usually lasts for a period until it has semination. Firstly, the safety message is disseminated from
been resolved. Thus, the safety message is required to cover the IBV to all CVs, which is completed in the process of
the RoI and can be updated efficiently during the emergency TWN establishment as mentioned above. To guarantee the
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: COMSATS INSTITUTE OF INFORMATION TECHNOLOGY. Downloaded on October 26,2022 at 09:08:11 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2022.3195655
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: COMSATS INSTITUTE OF INFORMATION TECHNOLOGY. Downloaded on October 26,2022 at 09:08:11 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2022.3195655
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: COMSATS INSTITUTE OF INFORMATION TECHNOLOGY. Downloaded on October 26,2022 at 09:08:11 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2022.3195655
80 80 80 80
Coverage (%)
Coverage (%)
Coverage (%)
Coverage (%)
60 60 60 60
40 40 40 40
TWNSMD (dense) TWNSMD (dense) TWNSMD (dense) TWNSMD (dense)
0 1 2 3 4 5 6 7 8 0 1 2 3 4 5 6 7 8 0 1 2 3 4 5 6 7 8 0 1 2 3 4 5 6 7 8
Fig. 6. Coverage and timeliness under different density of vehicles and two road typologies. (a) Coverage for vehicles, a grid-like RoI. (b) Coverage for road
segments, a grid-like RoI. (c) Coverage for vehicles, a trunk-like RoI. (d) Coverage for road segments, a trunk-like RoI.
100 100
100 100
80 80 80 80
Coverage (%)
Coverage (%)
Coverage (%)
Coverage (%)
60 TWNSMD (dense) 60 TWNSMD (dense) 60 60
TWNSMD (dense)
TWNSMD (dense)
TWNSMD (average) TWNSMD (average) TWNSMD (average)
TWNSMD (average)
TWNSMD (sparse) TWNSMD (sparse) TWNSMD (sparse)
TWNSMD (sparse)
MCMA (average) MCMA (average) 40 MCMA (average) 40
40 40 MCMA (average)
UMBP (average) UMBP (average) UMBP (average)
UMBP (average)
Flooding (average) Flooding (average) Flooding (average)
Flooding (average)
20 20
20 20
0 0
0 0
0 200 400 600 800 1000 0 200 400 600 800 1000 0 200 400 600 800 1000 0 200 400 600 800 1000
Fig. 7. Duration of message dissemination with different density of vehicles and two road typologies. (a) Coverage for vehicles, a grid-like RoI. (b) Coverage
for road segments, a grid-like RoI. (c) Coverage for vehicles, a trunk-like RoI. (d) Coverage for road segments, a trunk-like RoI.
95 95 95 95
90 90 90 90 Flooding Flooding
Redundancy packets
85 85 85 85
Coverage (%)
Retransmissions
Coverage (%)
80 80 80 80
75 75 75 75
70 70 70 70
65 65 65 65
10% cruise vehicle 10% cruise vehicle 10% cruise vehicle 10% cruise vehicle
25% cruise vehicle 25% cruise vehicle
60 25% cruise vehicle 60 25% cruise vehicle
60 60
50% cruise vehicle 50% cruise vehicle
50% cruise vehicle 50% cruise vehicle
Coverage for vehicle under grid-like RoI Coverage for road under grid-like RoI
55 55 55 Coverage for vehicle under trunk-like RoI 55 Coverage for road under trunk-like RoI
0 200 400 600 800 1000 0 200 400 600 800 1000 0 200 400 600 800 1000 0 200 400 600 800 1000
(a) (b)
(a) (b)
100 100 100 100
80 80 80 80
Fig. 9. Overhead of safety message dissemination. (a) Number of retrans-
60 60 60 60
missions with different density of vehicles in trunk-like and grid-like RoI. (b)
Coverage (%)
Coverage (%)
40 40 40 40
Redundancy with different density of vehicles in in trunk-like and grid-like
20 20 20 20
RoI.
0 0 0 0
Message A Message A
Message A Message A
Message B (100% RoI overlapping with A) Message B (100% RoI overlapping with A)
Message B (100% RoI overlapping with A) Message B (100% RoI overlapping with A)
-20 Message C (50% RoI overlapping with A)
-20 Message C (50% RoI overlapping with A)
-20
Message C (50% RoI overlapping with A)
-20
Message C (50% RoI overlapping with A)
Message D (0% RoI overlapping with A) Message D (0% RoI overlapping with A)
Message D (0% RoI overlapping with A) Message D (0% RoI overlapping with A)
Coverage for vehicle under trunk-like RoI Coverage for road under trunk-like RoI
Coverage for vehicle under grid-like RoI Coverage for road under grid-like RoI
-40 -40 -40 -40
0 2 4 6 8 10 0 2 4 6 8 10 0 2 4 6 8 10 0 2 4 6 8 10
Generally, the coverage of safety messages declines faster,
Time (s) Time (s) Time(s) Time (s)
and the duration of stable coverage will become slightly
(c) (d) lower in the situation of more cruise vehicles. In the case
Fig. 8. Duration of safety message dissemination. (a) Duration of message of two road typologies, the difference of region similarity
with different ratio of cruise vehicles under grid-like RoI. (b) Duration of becomes more noticeable, especially when the active area of
message with different ratio of cruise vehicles under trunk-like RoI. (c) the vehicle is highly similar to the RoI under grid-like RoI.
Dissemination of two safety messages under grid-like RoI. (d) Dissemination
of two safety messages under trunk-like RoI. This is because the predicted future positions of the cruise
vehicles may be different from the actual trajectory, which
leads to the deviation between the actual trajectory and the
UMBP, MCMA and the flooding method, do not consider calculated active area. Therefore, trajectory prediction with
the broadcast duration, which results in a rapid decline of higher accuracy over a longer period may improve the duration
coverage. of the safety message dissemination.
Furthermore, the proportion of cruise vehicles also has an We also evaluate the compatibility of TWN for the multiple
impact on dissemination performance. Fig. 8(a) and Fig. 8(b) safety messages dissemination by different IBVs. The existing
show the duration of the message dissemination with different TWN network structure can be reused in case other safety
cruise vehicles ratios under two road typologies, respectively. messages with overlapping RoI need to be transmitted. We
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: COMSATS INSTITUTE OF INFORMATION TECHNOLOGY. Downloaded on October 26,2022 at 09:08:11 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2022.3195655
consider a scenario wherein message A is first completely and better exploit the availability of onboard data to facilitate
transmitted in different structures of RoI. Then we verify the various vehicular applications more effectively and efficiently.
coverage of messages B, C, and D with varying settings of Communication efficiency: In the foreseeable future, the
the overlapping percentage of RoI related to message A. As data generated by intelligent vehicles will likely increase
shown in Fig. 8(c) and Fig. 8(d), for 100% RoI overlapping exponentially and be transmitted at a high frequency (similar
(message B), the transmission of the new message is around to the current big data trend). However, traditional V2V-based
21% faster in trunk-like RoI and around 25% faster in grid- or clustering-based networking schemes mostly focus on end-
like RoI than independent transmission (message D), and 15% to-end data transmission, ignoring the network coverage and
faster in trunk-like RoI and 20% faster in grid-like RoI for 50% duration. The data transmission efficiency may not be achieved
overlapping (message C). In our framework, safety messages due to the high overhead of frequent information exchange
with different overlapping RoI are transmitted by the same caused by link establishment. Moreover, in a traditional vehic-
part of TWN in the overlapping area to reduce the time for ular cloud network, data are normally uploaded and processed
TWN establishment. in the cloud or at the edge server, which may become a
bottleneck for the vehicular applications with the requirement
D. Overhead of large and frequent data exchange. The proposed TWN
consider the trajectory of vehicles and explore the spatio-
Message dissemination methods in VCN may cause channel
temporal features of safety message to establish a stable local
collision and packet loss. When a packet is transmitted, the
vehicular network, which makes it possible to realize IV data
sender needs to delay a backoff window to retransmit if a
storage and processing at three levels, i.e., onboard, edge, and
channel collision is detected. This mechanism also applies in
cloud. Thus, it can alleviate the aforementioned limitations
the process of TWN establishment when a superior CV does
by pre-processing the collected data so that the data can be
not receive the ACK message from a subordinate CV. Fig.
aggregated/filtered before uploading.
9(a) shows the total number of retransmissions when the three
Deployment and cost: The TWN proposed in this paper
methods achieve the maximum message coverage respectively
is built on top of V2V communication and does not rely
in different simulation scenarios. It can be observed our
on infrastructures. V2V communication is self-organizing and
method outperforms to UMBP and flooding, especially when
depends only on some on-board devices with no user costs. In
the CVs are located in grid-like RoI. This is because CVs are
other words, from the perspective of network construction, we
selected to minimize the overlapping area between the AAs,
do not need to provide incentives for relay vehicles to join the
which reduces the channel collisions in the same area.
TWN and forward safety messages. Therefore, our solution
The number of redundancy packets are also measured as
can be easily incorporated in traditional cloud-based VCN,
the metric of overhead. Due to the retransmissions, the same
and accordingly, further extend the coverage and connectivity
packets will be repeatedly received by some vehicles. Fig.
of vehicular network. More importantly, as the number of
9(b) shows the number of redundancy packets for different
smart cars with high computing and communication resources
structures of RoI when the three methods achieve 100%
increases, the proposed TWN can be deployed at a much lower
message coverage. It can be seen that the redundancy packets
cost.
are significantly reduced in the proposed method, especially
when the vehicle is at the grid-like RoI. This is because the
broadcast frequency can be adaptively adjusted according to VII. C ONCLUSIONS AND F UTURE W ORK
the position of CVs in RoI. Meanwhile, the grid-like RoI may
In this paper, we have proposed a novel TWN for safety
provide more suitable subordinate vehicles for the CVs.
message dissemination in the urban traffic scenario. Compared
to traditional networking methods in VANET, the spatio-
E. Discussion temporal correlation of the vehicle trajectory is utilized to
In this part, we discuss some potential benefits based on the establish and maintain a TWN for safety message dissemina-
design and simulation results of the proposed TWN, and also tion. Specifically, to achieve better performance of the TWN,
the advantages compared to some existing work. we also extract the connectivity characteristics of the vehicle
Response time: Real-time response is a critical evaluation network from the historical trajectory data and the results are
indicator to most vehicular applications, such as vehicle con- utilized for the establishment of the network. The optimal
trol and road safety. However, conventional vehicular cloud coverage, timeliness, duration, and redundancy of dissemina-
computing architecture is not specifically designed to meet tion are also considered when establishing and maintaining the
this low-latency requirement [9], since data collected from TWN structure. Extensive simulation results indicate that our
smart vehicles will be processed remotely instead of locally. scheme achieves a faster coverage and much longer continuity
Due to the transmission delay and potential connectivity issues of message dissemination in the RoI with less overhead.
(e.g., out of communication coverage), the average response Moreover, since our proposed scheme is infrastructure-free
time for cloud-based applications will likely be more than and only depends on some onboard devices with lower costs,
a second [10]. The proposed TWN, located in proximity to it will be easily deployed in practical traffic applications such
smart vehicles, can significantly reduce the response time as content sharing and information spreading. The simulation
for delay-sensitive applications. it can provide flexible and results in this paper can provide practical guidance for the
efficient communication capacity to the end nodes in a VCN, system implementation in real traffic scenarios.
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: COMSATS INSTITUTE OF INFORMATION TECHNOLOGY. Downloaded on October 26,2022 at 09:08:11 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2022.3195655
Although connected vehicles are not yet sufficiently [15] K. Liu, V. C. S. Lee, J. K.-Y. Ng, J. Chen, and S. H. Son, “Temporal
widespread currently and are inadequate to support the imple- data dissemination in vehicular cyber–physical systems,” in IEEE Trans.
Intell. Transp. Syst. (TITS), vol. 15, no. 6, pp. 2419–2431, 2014.
mentation of our proposed TWN, we believe the popularity of [16] G. Luo, H. Zhou, N. Cheng, Q. Yuan, J. Li, F. Yang, and X. Shen,
connected vehicles is the future trend and our TWN is able “Software-defined cooperative data sharing in edge computing assisted
to provide reliable and efficient safety message dissemination 5g-vanet,” in IEEE Trans. Mob. Comput. (TMC), vol. 20, no. 03, pp.
1212–1229, 2021.
service. In future work, some novel learning-based methods [17] G. Luo, H. Zhou, N. Cheng, Q. Yuan, J. Li, F. Yang, and X. S. Shen,
such as multi-agent reinforcement learning (MARL) will also “Software defined cooperative data sharing in edge computing assisted
be considered to further optimize the parameters settings (e.g., 5g-vanet,” in IEEE Trans. Mob. Comput. (TMC), 2019.
[18] Q. Yuan, H. Zhou, J. Li, Z. Liu, F. Yang, and X. S. Shen, “Toward
selection factor threshold, RoI size, and broadcast frequency) efficient content delivery for automated driving services: An edge
and improve the performance of TWN. Besides, it is very computing solution,” in IEEE Netw., vol. 32, no. 1, pp. 80–86, 2018.
difficult to achieve accurate of vehicle trajectory predictions [19] K. Liu, K. Xiao, P. Dai, V. C. Lee, S. Guo, and J. Cao, “Fog comput-
ing empowered data dissemination in software defined heterogeneous
in highly dynamic urban environments. In the future, we will vanets,” in IEEE Trans. Mob. Comput. (TMC), vol. 20, no. 11, pp. 3181–
consider more advanced deep learning frameworks to achieve 3193, 2020.
more accurate trajectory prediction for TWN construction and [20] K. Liu, X. Xu, M. Chen, B. Liu, L. Wu, and V. C. Lee, “A hierarchical
architecture for the future internet of vehicles,” in IEEE Commun. Mag.,
maintainance. vol. 57, no. 7, pp. 41–47, 2019.
[21] M. Ali, A. W. Malik, A. U. Rahman, S. Iqbal, and M. M. Hamayun,
“Position-based emergency message dissemination for internet of ve-
R EFERENCES hicles,” in Int. J. Distrib. Sens. Netw. (IJDSN), vol. 15, no. 7, p.
1550147719861585, 2019.
[1] Y. C. Hu, M. Patel, D. Sabella, N. Sprecher, and V. Young, “Mobile edge [22] M. Syfullah, J. M.-Y. Lim, and F. L. Siaw, “Mobility-based clustering
computing—a key technology towards 5g,” ETSI white paper, vol. 11, algorithm for multimedia broadcasting over ieee 802.11 p-lte-enabled
no. 11, pp. 1–16, 2015. vanet.” in IEEE Trans. Intell. Transp. Syst. (TITS), vol. 13, no. 3, pp.
[2] Z. Khan, P. Fan, S. Fang, and F. Abbas, “An unsupervised cluster-based 1213–1237, 2019.
vanet-oriented evolving graph (cvoeg) model and associated reliable [23] M. Ren, L. Khoukhi, H. Labiod, J. Zhang, and V. Veque, “A new
routing scheme,” in IEEE Trans. Intell. Transp. Syst. (TITS), vol. 20, mobility-based clustering algorithm for vehicular ad hoc networks
no. 10, pp. 3844–3859, 2019. (vanets),” in Proceedings of NOMS 2016-2016 IEEE/IFIP Network
[3] F. Lyu, H. Zhu, N. Cheng, H. Zhou, W. Xu, M. Li, and X. Shen, Operations and Management Symposium. IEEE, 2016, pp. 1203–1208.
“Characterizing urban vehicle-to-vehicle communications for reliable [24] M. Ren, L. Khoukhi, H. Labiod, J. Zhang, and V. Veque, “A mobility-
safety applications,” in IEEE Trans. Intell. Transp. Syst. (TITS), vol. 21, based scheme for dynamic clustering in vehicular ad-hoc networks
no. 6, pp. 2586–2602, 2019. (vanets),” in Veh. Commun., vol. 9, pp. 233–241, 2017.
[4] W. Chen, F. Lyu, F. Wu, P. Yang, G. Xue, and M. Li, “Sequential [25] X. Qu, E. Liu, R. Wang, and H. Ma, “Complex network analysis of vanet
message characterization for early classification of encrypted internet topology with realistic vehicular traces,” in IEEE Trans. Veh. Technol.
traffic,” in IEEE Trans. Veh. Technol. (TVT), vol. 70, no. 4, pp. 3746– (TVT), vol. 69, no. 4, pp. 4426–4438, 2020.
3760, 2021. [26] Y. Bi, H. Shan, X. S. Shen, N. Wang, and H. Zhao, “A multi-
[5] B. Liu, D. Jia, K. Lu, D. Ngoduy, J. Wang, and L. Wu, “A joint control– hop broadcast protocol for emergency message dissemination in urban
communication design for reliable vehicle platooning in hybrid traffic,” vehicular ad hoc networks,” in IEEE Trans. Intell. Transp. Syst. (TITS),
in IEEE Trans. Veh. Technol. (TVT), vol. 66, no. 10, pp. 9394–9409, vol. 17, no. 3, pp. 736–750, Mar. 2016.
2017. [27] X. M. Zhang, L. Yan, K. H. Chen, and D. K. Sung, “Fast, efficient
[6] F. Lyu, N. Cheng, H. Zhou, W. Xu, W. Shi, J. Chen, and M. Li, “Dbcc: broadcast schemes based on the prediction of dynamics in vehicular ad
Leveraging link perception for distributed beacon congestion control in hoc networks,” in IEEE Trans. Intell. Transp. Syst. (TITS), pp. 531–542,
vanets,” in IEEE Internet Things J. (IoT-J), vol. 5, no. 6, pp. 4237–4249, 2019.
2018. [28] X. M. Zhang, L. Yan, H. Zhang, and D. K. Sung, “A concurrent
[7] P. Wang, B. Di, H. Zhang, K. Bian, and L. Song, “Cellular v2x transmission based broadcast scheme for urban VANETs,” in IEEE
communications in unlicensed spectrum: Harmonious coexistence with Trans. Mob. Comput. (TMC), vol. 18, no. 1, pp. 1–12, Jan. 2019.
vanet in 5g systems,” in IEEE Trans. Wirel. Commun. (TWC), vol. 17, [29] M. Noor-A-Rahim, G. G. M. N. Ali, Y. L. Guan, B. Ayalew, P. H. J.
no. 8, pp. 5212–5224, 2018. Chong, and D. Pesch, “Broadcast performance analysis and improve-
[8] B. Liu, D. Jia, K. Lu, H. Chen, R. Yang, J. Wang, Y. Barnard, and ments of the lte-v2v autonomous mode at road intersection,” in IEEE
L. Wu, “Infrastructure-assisted message dissemination for supporting Trans. Veh. Technol. (TVT), vol. 68, no. 10, pp. 9359–9369, 2019.
heterogeneous driving patterns,” in IEEE Trans. Intell. Transp. Syst. [30] S. Kamakshi and V. S. Shankar Sriram, “Plummeting broadcast storm
(TITS), vol. 18, no. 10, pp. 2865–2876, 2017. problem in highways by clustering vehicles using dominating set and
[9] B. Liu, D. Jia, J. Wang, K. Lu, and L. Wu, “Cloud-assisted safety mes- set cover,” in Sensors, vol. 19, no. 9, p. 2191, May 2019.
sage dissemination in vanet–cellular heterogeneous wireless network,” [31] A. Naja, M. Boulmalf, M. Essaaidi, and O. Ait Oualhaj, “Adaptive alert
in IEEE Syst. J. (ISJ), vol. 11, no. 1, pp. 128–139, 2017. content dissemination protocol inspired from volunteer’s dilemma game
[10] J. Wang, J. Liu, and N. Kato, “Networking and communications in for Vehicular Ad-hoc Networks,” in Veh. Commun., vol. 19, p. 100180,
autonomous driving: A survey,” in IEEE Commun. Surv. Tutorials Oct. 2019.
(COMST), vol. 21, no. 2, pp. 1243–1274, 2018. [32] E. Limouchi and I. Mahgoub, “Volunteers dilemma game inspired
[11] D. Grewe, M. Wagner, and H. Frey, “A domain-specific comparison of broadcast scheme for vehicular ad hoc networks,” in IEEE Trans. Intell.
information-centric networking architectures for connected vehicles,” in Transp. Syst. (TITS), vol. 20, no. 12, pp. 4439–4449, Dec 2019.
IEEE Commun. Surv. Tutorials (COMST), vol. 20, no. 3, pp. 2372–2388, [33] L. Bedogni, M. Fiore, and C. Glacet, “Temporal reachability in vehicular
2018. networks,” in Proceedings of IEEE INFOCOM 2018 - IEEE Conference
[12] O. Senouci, Z. Aliouat, and S. Harous, “Mca-v2i: A multi-hop clustering on Computer Communications, 2018, pp. 81–89.
approach over vehicle-to-internet communication for improving vanets [34] B. Wu, H. Shen, and K. Chen, “Exploiting active subareas for multicopy
performances,” in Future Gener. Comput. Syst. (FGCS), vol. 96, pp. routing in VDTNs,” in IEEE Trans. Veh. Technol. (TVT), vol. 67, no. 5,
309–323, 2019. pp. 4374–4388, 2017.
[13] A. Jalooli, M. Song, and W. Wang, “Message coverage maximization
in infrastructure-based urban vehicular networks,” Vehicular Communi-
cations, vol. 16, pp. 1–14, 2019.
[14] J. Jeong, Y. Shen, S. Jeong, S. Lee, H. Jeong, T. Oh, T. Park, M. U.
Ilyas, S. H. Son, and D. H. Du, “Stmac: Spatio-temporal coordination-
based mac protocol for driving safety in urban vehicular networks,” in
IEEE Trans. Intell. Transp. Syst. (TITS), vol. 19, no. 5, pp. 1520–1536,
2017.
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: COMSATS INSTITUTE OF INFORMATION TECHNOLOGY. Downloaded on October 26,2022 at 09:08:11 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2022.3195655
Bingyi Liu received the Ph.D. degree in the De- Jianping Wang received the B.S. and M.S. degrees
partment of Computer Science from City University in computer science from Nankai University, Tianjin,
of Hong Kong, Kowloon, Hong Kong in 2018, and China, in 1996 and 1999, respectively, and the Ph.D.
in the Department of Computer Science, Wuhan degree in computer science from the University of
University, Wuhan, China in 2017, respectively. He Texas at Dallas, Richardson, TX, USA, in 2003.
was a Visiting Ph.D. student in the Department of She is currently a Professor in the Department
Computer Science, University at Buffalo, The State of Computer Science, City University of Hong
University of New York, NY, USA from 2016 to Kong, Kowloon, Hong Kong. Her research interests
2017. He is currently an Associate Professor in the include dependable networking, optical networks,
School of Computer Science and Artificial Intel- cloud computing, service oriented networking, and
ligence, Wuhan University of Technology, Wuhan, data center networks.
China, Sanya Science and Education Innovation Park of Wuhan University
of Technology, Sanya, China, and Chongqing Research Institute, Wuhan
University of Technology, Chongqing, China. His research interests include
wireless networks, vehicular ad-hoc network, and Internet of Things.
Chunming Qiao (F’10) is currently the Director
of the Laboratory for Advanced Network Design,
Analysis, and Research, University at Buffalo. He
has pioneered research on optical Internet and in
particular, optical burst switching. He was the Chair
Weizhen Han received the B.E. degree in 2019 and
of the IEEE Technical Committee on High Speed
is currently pursuing the M.E. degree in Wuhan Uni-
Networks and the IEEE Subcommittee on Integrated
versity of Technology, Wuhan, China. His research
Fiber and Wireless Technologies, which he founded.
interests include vehicular ad-hoc network.
He was elected an IEEE Fellow for his contributions
to optical and wireless network architectures and
protocols.
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: COMSATS INSTITUTE OF INFORMATION TECHNOLOGY. Downloaded on October 26,2022 at 09:08:11 UTC from IEEE Xplore. Restrictions apply.