Professional Documents
Culture Documents
Computer Communications
journal homepage: www.elsevier.com/locate/comcom
1. Introduction include passenger safety (e.g. emergency brake light warning, forward
collision warning, control loss warning, weather-related vehicle stabi-
The Internet of Things (IoT) is a vision for an internetwork of lization activation), passenger comfort (e.g. Internet browsing, info-
intelligent, communicating objects such as home appliances, vehicles, tainment, downloading, electronic toll collection) and vehicular energy
factory machines, wearable devices and various types of sensors. The efficiency [2,3]. These applications use different forms of vehicle-
convergence of technologies like ubiquitous wireless communications, to-transportation-network communication, known collectively as V2X,
machine learning, real-time analytics and embedded systems has made to either inform decisions taken by network or automate procedures
novel IoT applications possible in a multitude of domains [1]. The sheer initiated by a network’s drivers. The networks themselves are some-
volume and potential heterogeneity of IoT devices are, however, cre- what amorphous groups of interacting vehicles and roadside devices,
ating new challenges regarding control, communication, coordination, collectively known as VANETs [4,5]. Network science will be at the
and data management. helm to address these challenging issues.
The IoV (Internet of Vehicles), also known as Connected Vehicles, The Dedicated Short Range Communication (DSRC) protocol is the
is a subfield of IoT that uses Dedicated Short Range Communication industry standard for communication in VANETs. The basic DSRC
(DSRC) technology to enable vehicles to wirelessly communicate with protocol meets latency requirements for safety-critical Intelligent Trans-
the neighboring vehicles, infrastructure, and pedestrians. Researchers portation Systems (ITS) applications [6]. It supports the use of several
are actively studying connected vehicle (CV) technology to improve preset channels to exchange information about a vehicular network’s
the quality of vehicular transportation, focusing on the needs that state. One of these, the control channel (CCH), is monitored by DSRC
∗ Corresponding author.
E-mail addresses: anirudh.paranjothi@ou.edu (A. Paranjothi), adhoc.khan@gmail.com (M.S. Khan), prizwan5@gmail.com (R. Patan),
rparizi1@kennesaw.edu (R.M. Parizi), atiq@ou.edu (M. Atiquzzaman).
1
Senior Member, IEEE.
https://doi.org/10.1016/j.comcom.2020.01.017
Received 9 October 2019; Received in revised form 21 December 2019; Accepted 7 January 2020
Available online 10 January 2020
0140-3664/© 2020 Elsevier B.V. All rights reserved.
A. Paranjothi, M.S. Khan, R. Patan et al. Computer Communications 151 (2020) 275–289
devices at periodic intervals for road safety messages, including pe- We validated the proposed scheme by conducting extensive simu-
riodic updates and event-driven messages, and Basic Safety Messages lations using urban and highway scenarios. VANETomo outperformed
(BSM). BSMs are periodically broadcast by each vehicle to its neigh- when compared with MoTabu [11], PRBC [12], CABS [13], and
boring vehicles. They convey a vehicle’s status, including its speed, UoTabu [14] in terms of average delay, packet loss, packet loss ratio,
position, direction, and acceleration. CV applications use BSMs to track and average throughput.
neighboring vehicles and respond to dangerous situations to prevent To the best of our knowledge, this work is the first to implement an
possible accidents [7,8]. This combination of messages renders the NT approach to study congestion identification and control in VANETs.
CCH susceptible to possible congestion, packet loss, and delay, due The paper’s key contributions can be summarized as follows:
to attempts to flood a VANET with critical, event-driven messages
concurrently with periodic broadcasts. This potential degradation of • VANETomo statistically infers the network to identify the opti-
the quality of service (QoS) risks the safety of the drivers as well as mum link available.
the users of ITS applications [9]. • Network congestion is inferred in the network by solving the
VANETs create challenges for congestion control that are more Network tomography problem.
difficult than those presented by other types of mobile ad hoc networks • Once congestion is identified then network traffic can be routed
(MANETs). VANETs have two main components: vehicles equipped more efficiently to reduce congestion in a VANET.
with onboard units (OBUs) and roadside units (RSUs). Fig. 1 illustrates
The remainder of this paper is organized as follows: Section 2 gives the
a traffic network that is serviced by a VANET. The region in the VANET
related work. Section 3 presents the proposed approach, and its inner
consists of vehicles and RSUs. Each RSU is enclosed by a circle that
workings. Section 4 talks about the proposed VANETomo algorithm.
shows its transmission range. RSU transmission ranges are overlapped,
In Section 5, we present the performance evaluation and simulation
which allows every vehicle in the VANET to connect to at least one
results followed by a conclusion in Section 6.
RSU. When a vehicle enters the VANET, the VANET’s topology changes.
The loads on the VANET’s RSUs also change as vehicles request services
from them. High-speed movements of vehicles in the VANET produce 2. Related work
frequent changes in network topology and congestion.
In Fig. 1, overloaded RSU regions are enclosed by a red circle as Networks implement congestion control to enable better use of
more number of vehicles requesting services at the same time resulting bandwidth and provide higher QoS. VANETs pose a particular problem
in network congestion and unsuccessful communication for vehicles for congestion control, due to the need to fit a variable workload to an
try to establish a connection with an RSU after being overloaded. The inherently unstable network topology. Strategies for VANET congestion
normally loaded and least loaded RSU are represented in green and control can be divided into those that address congestion after it occurs
yellow circles respectively results in the least network congestion and and those that address congestion before it occurs. We now discuss
successful communication between vehicles and RSU. several congestion control schemes, broadly classified into the post and
This paper proposes VANETomo, a strategy for identifying con- pre congestion control.
gested nodes and controlling congestion in VANETs. VANETomo is
designed to route data traffic through a VANET’s least congested relay 2.1. Post congestion control
devices, or roadside units (RSUs), to allow vehicles to dynamically
select the least congested access points along their respective paths. Trishita et al. [15] presented a congestion control mechanism for
Our algorithm, unlike earlier algorithms, identifies congested nodes VANETs that dynamically shares available bandwidth between each
using Network Tomography (NT), a technique proposed by Vardi [10] node’s service and control channels. Each node (vehicle) is treated
for estimating end-to-end traffic intensity without the aid of data from as a combination of a message manager module (MMM), which man-
a network’s internal components. NT uses statistical inference to esti- ages message transmission and reception; a congestion control module
mate network performance from repeated measurements of traffic on a (CCM), which schedules message delivery using a waiting queue; and a
network’s links. This approach quickly estimates delay in a network bandwidth manager module (BWM), which does dynamic calculations
without expecting any cooperation from internal nodes. Thus, the of bandwidth. Their approach incurs high rates of message loss when
overhead at RSUs is very low when compared to earlier approaches multiple vehicles are near one another.
discussed in Section 2 (Related Work). Communication delay on the Dahiya et al. [16] described a strategy for load balancing that routes
links in our approach is negligible because RSUs do not communicate messages based on queue length, diverting messages from nodes with
with each other to find the loads on the links between them. longer queues to nodes with lightly loaded queues. Routing overhead
In our approach, a Controller Module (CM) running in a vehicle’s of this scheme is high when compared to AODV.
onboard unit (OBU) uses NT to infer the likelihood of delays on
a network’s links. Loads on links are then estimated by correlating 2.2. Pre-congestion control
load with link delay. Nodes with heavy loads are identified as highly
congested nodes. Pre-congestion control strategies can be divided into three cate-
Once congested nodes are identified, we use a combination of open- gories, based on the type of routing protocol they use.
loop and closed-loop methods to reduce congestion. Our algorithm’s
open-loop component uses the CM to inform vehicles about network (1) Unicast/multicast routing : Unicast and multicast routing is often
congestion. Vehicles then use this information to select an optimal implemented in VANETs, using variations of the AODV (Ad-hoc On-
RSU through which to send messages. The closed-loop component uses Demand Distance Vector) protocol. Rani et al. [17] proposed a modified
the CM to inform RSUs about network congestion; Overloaded RSUs AODV routing protocol that prioritizes routes whose nodes have shorter
then use this information to forward requests to other RSUs with less queue lengths. Ding et al. [18] proposed a strategy for reducing the
load. This use of a Network Tomography-based hybrid strategy for AODV-related overhead that selects stable routes based on Route Ex-
congestion control differentiates this work from most congestion control piration Time (RET) and routes weight. Abedi et al. [19] improved
strategies, which use one or the other rather than both [10–14]. AODV’s stability and reduced overhead by restricting the number of
Due to its use of statistical inference to quantify congestion, our requests and routes. Li et al. [20] proposed an optimized version of
scheme accounts for all factors leading to delayed response or packet AODV that adds a packet header to RREQ packets.
loss at RSUs. These contributing factors may include but are not limited Each of these four schemes has its particular limitations. Those
to a buffer overflow, collision, and a lack of bandwidth or processing presented in [17,18] fail to account for router stability and complex
power. routing scenarios; they suffer from routing overhead. That in [19] has
276
A. Paranjothi, M.S. Khan, R. Patan et al. Computer Communications 151 (2020) 275–289
Fig. 1. Illustration of a VANET environment.. (For interpretation of the references to color in this figure legend, the reader is referred to the web version of this article.)
a very high delay when compared to AODV. While delays in [20] are algorithm that uses a closed-loop congestion control strategy. The algo-
less, so is the packet delivery ratio. rithm tunes transmission range, transmission rate and minimizes delay
and jitter by selecting the best option from a list of candidate solutions.
(2) Location-based routing : This involves load balancing based on
The scheme, however, also incurs excessive routing overhead.
geographical location. Geographic and Traffic Load based Routing
(GLTR), proposed by Li et al. [21], is intended for urban environments. Stanica et al. [28] present a CSMA/CA (Carrier Sense Multiple Ac-
GLTR assumes that each vehicle is equipped with GPS (Geographic cess with Collision Avoidance) strategy for connecting communication
Positioning Systems) or navigation settings. It selects the best route channels. This strategy was reformulated by the IEEE820.11p (WAVE)
based on less traffic to avoid overloading nodes. standard and is now standard for congestion control in VANETs. This
Geographic Load Balancing Routing in Hybrid VANET (GLRV), de- approach, however, performs poorly under high loads.
veloped by Wu et al. [22], assumes an architecture that combines Wire- In [29], Torrent-Morenoet al. propose the D-FPAV (Distributed-Fair
less Mesh Networks (WMN) and Ad-hoc networks. QoS Location-Aided Power Adjustment for the Vehicular environment) approach for VANET
Gateway Advertisement and Discovery, proposed by Aljeri et al. [23], congestion control. D-FPAV avoids packet collision during safety mes-
allows RSUs to connect to heterogeneous networks to relay data to sage exchange between vehicles. These safety messages consist of emer-
balance network loads. A final protocol by Van et al. [24] first selects gency messages, which are broadcast only in certain situations, and
a gateway RSU based on efficiency, then routes data based on location. beacon messages, periodic broadcasts of information associated with
Schemes in [21–24] have high overhead due to the re-routing of vehicles like speed, direction, and velocity. The authors refer to this
packets. policy as their ‘‘concept of fairness’’. The policy allows users to make
informed decisions during dangerous situations. The strategy’s use
(3) Priority-based protocols: Taherkhani and Pierre [25], proposed
of reduced power transmissions for congestion control reduces the
two congestion control strategies to prioritize and schedule safety and
transmission range of beacon messages, a significant drawback of this
service messages. These strategies consist of a priority assignment unit,
approach.
which prioritizes messages based on static and dynamic factors and
In [12], Djahel and Y. Ghamri-Doudane proposed PBRC, a three-
message size, together with a message scheduling unit, which resched-
stage strategy to reduce overutilization of bandwidth by beacons. Their
ules control and service channel queues before transferring messages to
approach first assigns priorities to messages to transmit. This allows
channels. These priorities are embedded in packet headers.
Mitra et al. [26] devised a mobility model for studying the feasibility PBRC to prioritize the delivery of emergency messages over normal
of mobile gateways in VANETs. Their model assumes that vehicles messages. It then uses congestion detection as a basis for adjusting
connected to wireless LANs and cellular radios act as gateways to do transmission power for beacon messages. The scheme, however, incurs
load balancing. high transmission delays.
Wu et al. [27] proposed a fast handoff technique to achieve load In [13], Bai, Oh, and Jung proposed CABS, an algorithm that like
balancing in a connected vehicle environment. The authors’ ‘‘Quality TDMA provides beacon transmissions in a defined time interval. This
Scan’’ scheme manages load balancing at access points while improv- time interval is calculated based on channel load at a particular time
ing the network’s QoS. This Quality Scan mechanism, however, also and knowledge about the context in which messages are transmitted.
increases overall network. Schemes [25–27] either use a closed loop or CABS provides high reliability when compared to other approaches.
open loop congestion control approach, but not both. However, CABS does not account for the MAC layer implementation
In [11], Taherkhani and Pierre provided a dynamic and distributed to address the different time slots for different transmissions.
strategy for congestion control in VANETs. This strategy has com- In [14], Taherkhani and Pierre proposed a heuristic UOTabu (Uni-
ponents for congestion detection and congestion control. Congestion Objective Tabu search) strategy for congestion control. UOTabu adjusts
is detected by sensing channel usage level and comparing it with a message transmission range and rate based on channel usage. These
predefined threshold, set to 70% in wireless communication channels. adjustments are determined based on a delay function, which serves as
Congestion is controlled by implementing a Meta-Heuristic MOTabu the algorithm’s objective function and whose value the algorithm seeks
277
A. Paranjothi, M.S. Khan, R. Patan et al. Computer Communications 151 (2020) 275–289
to minimize. Dynamic change in a network’s topology can restrict the equilibrium state that maximizes each player’s utility without channel
effective calculation of delay. congestion.
In [30], Darus et al. proposed two algorithms. One, a measurement In [37], Qureshi et al. propose a dynamic congestion control scheme
based congestion detection and control algorithm, detects congestion (DCCS) for congestion detection and communication channel control.
based on the length of the CCH’s packets queue. The algorithm discards Weighing factors are used for congestion detection. DCCS controls con-
queued BSM messages when it determines that the CCH is congested. gestion using either an adaptive congestion control scheme or message
The algorithm initiates congestion control, freezing all safety messages origination-based queue freezing.
except the event-driven safety messages if a number of safety messages All the above congestion control approaches assume a high level of
in the CCH’s queue exceeds a threshold value. The other algorithm is cooperation from network elements to identify congested nodes. Such
an event-driven rebroadcast algorithm that uses forward and makeup assumptions are not realistic in an environment, where network topol-
phases to avoid the loss of messages when the CCH is congested. In this ogy is changing very rapidly. Comparison of the existing congestion
scheme, the authors assumed a congestion control threshold of 70% in control approaches with VANETomo is discussed in Appendix.
wireless communication channels. Channel usage levels exceeding 70%
will limit the scheme’s scalability. 3. Proposed approach: VANETomo
In [31], Fadilah and Rahman describe a scheme for warning vehicles
In what follows, we present an algorithm for detecting and control-
of impending collisions. Their scheme is based on calculations involving
ling VANET congestion. Our strategy for controlling congestion uses a
time gaps: the time that a car needs to avoid a potential collision with
combination of anticipatory and reactive techniques to route messages
a car in front of it. Time gaps are calculated from information obtained
to nodes that are more likely to be lightly loaded. Our algorithm
from beacon messages.
for detecting congestion uses network tomography (NT) to reduce
Fadilah and Rahman propose the use of adaptive periodic beacon-
its impact on network bandwidth. The algorithm provides dynamic
ing to convey time gap data. Fixed rate periodic beaconing schemes
load balancing by inferring link delays of connected nodes statistically
impose a transmission-rate-based tradeoff between channel congestion
without assuming any co-operation between them. The use of NT to
and non-optimal message dissemination. Adaptive schemes avoid these
infer internal network characteristics was first proposed by Vardi [10].
problems by adjusting parameters like beacon frequency, window con-
Other related work includes Khan et al.’s stitching algorithm for mea-
tention size, and transmission power based on network topology. They
suring performance in dynamic networks like MANETs [38,39]. Their
modify the beacon interval to reduce congestion in wireless links. The
algorithm integrates the dynamic performances of a network’s links,
transmission power is affected by beacon power; low beacon power thereby enabling estimates of local and global network performance.
limits transmissions to a vehicle’s nearest neighbors, while higher Also, Pan et al. [40] used NT in a study of multipath routing to examine
power increases the number of neighbors that receive a message. the relationship between sub-paths. Their simulations showed that high
Adaptive contention-window-size-based beaconing schemes [31] degrees of accuracy could be obtained from flows of 200 packets per
adjust a contention window to reduce beacon collisions. Fadilah and probe.
Rahman’s adaptive rate control algorithm varies the rate of periodic This section is divided into four subsections: (a) Classification of
safety message (PSM) generation based on vehicular safety. PSMs can RSUs, (b) Identification of congested nodes, (c) Congestion control, and
cause packet loss and increase the busy channel percentage due to the (d) Congestion identification and control algorithm: VANETomo.
short CCH interval. This creates safety risks for vehicles. Adaptive time
gap based congestion control schemes improve CCH utilization [31] by 3.1. Classification of RSUs
keeping transmission power constant while varying the rate of packet
generation. A distance-based wait time method selects rebroadcast VANET performance characteristics like load, delay and throughput
nodes and retransmits messages to mitigate multipath fading in multi- depend on the number of vehicles requesting services from its RSUs. For
hop networks. The appropriate time gap settings improve performance instance, consider a region near a traffic signal where vehicle density
and compensate for in-vehicle distractions. Adaptive rate control algo- is high. An RSU in this region is likely to receive a large number of
rithms [31] have higher packet success rates at times of higher packet requests from vehicles for Internet access or to relay messages to the
density as compared to times of lower vehicle density. These algorithms destination. As the number of requests at an RSU increase, congestion
yield lower end-to-end delays than fixed rate transmission with variable at the RSU also increases. Eventually, the RSU becomes overloaded
values of vehicle speed and density. Reducing the minimum time gap with requests. Conversely, if an RSU is in a region with sparse vehicle
can only improve the CCH busy percentage by compromising safety. density, the number of requests at this RSU is likely to be low. The RSU
In [32], Bellache et al. propose a proactive CBF2C strategy to reduce should remain idle for more extended periods of time, experiencing low
congestion control while providing transmission redundancy whenever levels of congestion. Since congestion at an RSU leads to overload, the
possible. The strategy uses the busy channel ratio to determine a load is treated as a means of classifying RSUs. Our scheme classifies
retransmission threshold and does timed retransmissions until a retry RSUs based on a number of vehicles they are servicing, a maximum
threshold is reached. In [33], these authors propose a similar packet threshold limit of load on RSU (THMAX ), and a minimum threshold limit
forwarding algorithm (CBF2C) for distributed congestion control. The of load on RSU (THMIN ) as given below.
algorithm monitors the channel load status. Based on this load it adapts (A) Least-loaded RSU : In regions with low vehicle density (i.e., rural
the message retransmission rate. Willis et al. [34] propose a distributed areas), service requests at an RSU are likely to be low, thus load on
congestion control scheme that prioritizes transmissions to nearer vehi- RSU is slight. If the load on RSU is below THMIN , then the RSU is said
cles over transmissions to more distant vehicles. Their scheme balances to be least-loaded.
adjustments to transmission power and transmission rate. A second dis-
tributed congestion control scheme by Math et al. [35] focuses more on (B) Normally loaded RSU : If an RSU’s load is between THMIN and
packet count that specific threshold values. Their PDR-DCC algorithm THMAX , the RSU is said to be normally loaded. If a considerable number
reduces channel congestion by selecting the lowest permissible data of vehicles enter the range of a normally loaded RSU and request
rate that ensures maximum coverage. service at the same time, then the RSU may become overloaded. Con-
versely, if most vehicles in the range of a normally loaded RSU leave
Chen et al. [36] propose a congestion control scheme based on
and no other vehicles enter the range, the RSU becomes least-loaded.
a non-cooperating bargaining game. The game divides vehicles into
clusters, each of which has a leader. The clusters’ leaders negotiate (C) Over-loaded RSU : If high numbers of vehicles try to access an RSU at
with each for an optimal combination of transmission power and packet the same time, thereby creating a load on the RSU that exceeds THMAX ,
generation rate for their members. Ideally, negotiations should yield an the RSU is said to be overloaded.
278
A. Paranjothi, M.S. Khan, R. Patan et al. Computer Communications 151 (2020) 275–289
279
A. Paranjothi, M.S. Khan, R. Patan et al. Computer Communications 151 (2020) 275–289
280
A. Paranjothi, M.S. Khan, R. Patan et al. Computer Communications 151 (2020) 275–289
281
A. Paranjothi, M.S. Khan, R. Patan et al. Computer Communications 151 (2020) 275–289
Fig. 8. Roadmap.
The proposed scheme aims to find the best RSU to connect with,
based on estimating the level of congestion at each RSU from the round-
trip end-to-end delay of probe requests. Probe messages are forwarded
using the control channel (178). The 2016 release of the IEEE 1609.3
standard provides for optional fields in WSMP packet headers. These
fields can be used to relay probe messages for congestion detection.
In Fig. 4, node-1 represents a vehicle-mounted OBU that is con-
The algorithm uses four inputs: a path matrix, a delay list (stored in nected to an RSU (node-2). We assume this vehicle has subscribed to a
CMs, consisting of overall end-to-end delays for each of the network’s non-safety infotainment application. We further assume that the OBU is
graphlets), the minimum threshold limit (THMIN ), and the maximum communicating with the RSU using one of the service channels (SCH).
threshold limit (THMAX ). When a vehicle enters a region corresponding The IEEE 1609.4 standards’ alternating mode allows the OBU to use the
to a graphlet, it scans the RSUs to find the region’s available RSUs. first 50 ms of every 100 ms timeslot for the control channel (CCH) and
Scan_Rsu() is used to do this scan; the result will be stored in variable the second 50 ms for the service channel (SCH). This allows the OBU to
R. These available RSUs are used to extract the region’s topology, using simultaneously transmit and receive on both CCH and SCH every 0.1 s.
extract_topology(R). The result is stored in variable T for future use. While the SCH is used for the infotainment application, the CCH acts as
Once the topology is extracted, the delay list is accessed from the the common channel for control and probe messages. To select the next
centralized controller (Steps 5 through 8). This delay list contains RSU node, the vehicle (node1 ) will send a probe packet to RSU (node2 )
a list of historical delays calculated at earlier times. Each historical with a relay request. The RSU will then relay the probe to node3 and
delay is stored in a 𝑦𝑖 . (i.e., y1 , y2 , y3 , y4 , . . . , yn ). We use the NT node4 through the control channel.
technique to infer the links’ delays; the call to NT(Y 𝑛 , A𝑛𝑚 ) does these While the details of the implementation of relaying probe packets
inferences. The path matrix Anm and the vector of path delays Yn are are out of scope, it should be noted that probe packets will contain at
passed as parameters to the NT function to infer Xm , where Xm = least the following fields in the WSMP header:
282
A. Paranjothi, M.S. Khan, R. Patan et al. Computer Communications 151 (2020) 275–289
Table 1
WSMP header fields and description.
Fields Description
SRC Current sender’s MAC address
DST Current destination’s MAC address
HOP Current Hop#
ORIG Original probe sender’s MAC address
TS Timestamp of sending a probe message
TR Trace of route
MH Maximum number of allowed hop (in integer)
R Relay request? (Yes/No)
SCH Service channel to connect with
TTL Maximum time-to-live
Resp True when it is a response to the probe
RSU, that RSU responds to the probe, specifying the service channel
(SCH) for the OBU to connect to. The RSU’s response to the probe
follows the same path in reverse with the help of traceroute (TR)
information updated in the probe header every hop. Once the OBU that
originated the probe receives the response from the RSU, the overall
end-to-end delay is used to infer link delays corresponding to the path
specified by TR.
283
A. Paranjothi, M.S. Khan, R. Patan et al. Computer Communications 151 (2020) 275–289
Table 2
Parameters for simulation in the highway and urban scenarios.
Parameters Value
Road Length 2000 ma , 572 m × 672b m
Number of lanes 8 lanes (4 in each direction)a and 4 (2 in each direction)b
Number of vehicles 50, 80, 100, 120, 150, 200
Vehicles speed 55–75 mpha and 15–45 mphb
Bandwidth 10 MHz
MAC type IEEE 802.11p
Propagation model TwoRayGrounda , and Nakagamib
MAC buffer size 14 Frames
Contention window 15–1023
Simulation time 200 s
Simulation runs 30
a
Highway scenario.
b Urban scenario.
Fig. 11. Effect of change in number of vehicles on packet loss ratio in highway
scenario.
284
A. Paranjothi, M.S. Khan, R. Patan et al. Computer Communications 151 (2020) 275–289
Fig. 14. Effect of change in number of vehicles on packet loss ratio in urban scenario. Fig. 16. Effect of change in number of vehicles on average throughput in urban
scenario.
Fig. 15. Effect of change in number of vehicles on average delay in urban scenario.
Fig. 17. Effect of change in simulation time on average delay in highway scenario.
285
A. Paranjothi, M.S. Khan, R. Patan et al. Computer Communications 151 (2020) 275–289
286
A. Paranjothi, M.S. Khan, R. Patan et al. Computer Communications 151 (2020) 275–289
Table A.1
Comprehensive comparision of existing methodolgies.
Approach Year Objective Pros Cons
Trishita et al. [15] 2012 The authors used post congestion control Dynamic channel This approach suffers from high packet loss when
mechanism for the VANET environment. A allocation and number of vehicles increases in the urban
congestion control module dynamically allocates message delivery. environment.
messages in the channel and schedule a message
delivery based upon queuing techniques.
Dahiya et al. [16] 2012 The proposed approach performs congestion Dynamic routing The end-to-end delay of this approach is high.
control through load balancing. The algorithm messages and high High packet loss when the queues are heavily
dynamically performs load balancing by routing throughput. loaded.
the packets from heavily loaded queues to lightly
loaded queues.
Rani et al. [17] 2007 The authors modified the AODV routing protocol Priority based This approach is not suitable for complex routing
for congestion control. This approach performs routing and less scenarios due to high routing overhead.
multicast routing for routing the messages to the end-to-end delay.
least congested nodes and prioritize nodes with
shorter queue lengths.
Abedi et al. [19] 2009 Unlike [17], the proposed approach reduces Less routing This approach is not suitable for high vehicle
routing overhead by limiting number of requests overhead and high dense regions like downtown environment due to
in a time interval (t ). packet delivery large number of requests in a time period (t ).
ratio.
Li et al. [21] 2010 The proposed approach performs location-based Less packet loss High end-to-end delay and routing overhead. Not
routing to reduce congestion. The authors proposed ratio. suitable for highway environment.
an algorithm called Geographic and Traffic Load
based Routing (GLTR). In GTLR, each vehicle is
equipped with GPS to selects the best route based
on less traffic to avoid overloading nodes.
Wu et al. [22] 2011 The hybrid location-based routing protocol is used Less end-to-end High routing overhead, requires more bandwidth,
for congestion control. The hybrid protocol delay and packet not suitable for urban environment.
combines two commonly used paradigms: wireless loss.
mesh networks and ad hoc-networks to reduce
end-to-end delay and packet loss.
Aljeri et al. [23] 2013 The proposed work performs location-based routing Dynamic routing High routing overhead and end-to-end delay. Not
with the help of RSUs. RSUs contain information messages and high suitable for high dense vehicular regions like
of least and heavily loaded nodes. Thus, it helps in throughput. downtown environment.
routing the messages to the least congested nodes.
Taherkhani et al. 2016 This approach uses priority-based congestion Priority based Requires more bandwidth and high collision of
[25] control strategies to reduce congestion. The routing and high packets.
proposed technique consists of a priority throughput.
assignment unit, which prioritizes messages based
on factors like message size, type, etc.
Mitra et al. [26] 2004 The authors presented the load balancing Dynamic routing This approach is not suitable for complex routing
technique to reduce congestion in the VANET messages and high scenarios due to high routing overhead.
environment. The proposed technique assumes that throughput.
vehicles connected to wireless LANs and cellular
radios act as gateways to do load balancing.
Stancia et al. [28] 2012 The authors illustrated CSMA/CA (Carrier Sense Less packet loss and This approach is not suitable for complex routing
Multiple Access with Collision Avoidance) strategy high throughput scenarios due to high routing overhead.
for connecting communication channels and
congestion control. Moreover, this approach
retransmits the dropped packets to increase the
packet delivery ratio.
Torrent-Moreno 2006 The authors proposed the D-FPAV (Distributed-Fair Suitable for high High communication overhead and delay.
et al. [29] Power Adjustment for the Vehicular environment) dense vehicular
approach for VANET congestion control. D-FPAV environment and
avoids packet collision during safety message less packet loss
exchange between vehicles. These safety messages ratio.
consist of emergency messages, which are
broadcast only in certain situations, and beacon
messages, periodic broadcasts of information
associated with vehicles like speed, direction, and
velocity.
Darus et al. [30] 2011 The authors proposed a pre-congestion control Less packet loss Requires more bandwidth when the number of
scheme to reduce congestion. The proposed ratio and end-to-end vehicles increases in the system and high jitter.
algorithm discards queued messages when it delay
determines that the CCH is congested and initiates
congestion control, freezing all safety messages
except the event-driven safety messages if a
number of safety messages in the CCH’s queue
exceeds a threshold value. In addition, the
algorithm retransmits the dropped packets to
increase the packet delivery ratio.
287
A. Paranjothi, M.S. Khan, R. Patan et al. Computer Communications 151 (2020) 275–289
References [13] S. Bai, J. Oh, J.-i. Jung, Context-awareness beacon scheduling scheme for
congestion control in the vehicle to vehicle safety communication, Ad Hoc Netw.
[1] T.M. Behera, S.K. Mohapatra, U.C. Samal, M.S. Khan, M. Daneshm, A.H. Gan- 11 (7) (2013) 2049–2058.
domi, Residual energy-based cluster-head selection in WSNs for IoT application, [14] N. Taherkhani, S. Pierre, Congestion control in vehicular ad hoc networks using
IEEE Internet Things J. 6 (2019) 5132–5139. meta-heuristic techniques, in: Second ACM International Symposium on Design
[2] O. Senouci, Z. Aliouat, S. Harous, MCA-V2I: A multi-hop clustering approach over and Analysis of Intelligent Vehicular Networks and Applications, DIVANet ’12,
vehicle-to-internet communication for improving VANETs performances, Future New York, NY, 2012, pp. 47–54.
Gener. Comput. Syst. 96 (2019) 309–323. [15] T. Ghosh, S. Mitra, Congestion control by dynamic sharing of bandwidth among
[3] H. Zheng, W. Chang, J. Wu, Traffic flow monitoring systems in smart cities: vehicles in VANET, in: IEEE 12th International Conference on Intelligent Systems
Coverage and distinguishability among vehicles, J. Parallel Distrib. Comput. 127 Design and Applications, ISDA, 2012, pp. 291–296.
(2019) 224–237.
[16] A. Dahiya, R.K. Chauhan, R. Kait, Experimental analysis of AODV and LBV_AODV
[4] M.S.P. Sharma, R.S. Tomar, VANET based communication model for transporta-
with varying vehicle mobility in the vehicular scenario, in: 3rd International
tion systems, in: IEEE Symposium on Colossal Data Analysis and Networking,
Conference on Reliability, Infocom Technologies and Optimization, Noida, 2014,
CDAN, 2016, pp. 1–6.
pp. 1–4.
[5] J. Kim, O. Jo, S.W. Choi, Feasibility of index-coded retransmissions for enhancing
sidelink channel efficiency of V2X communications, IEEE Access 7 (2019) [17] A. Rani, M. Dave, Performance evaluation of modified AODV for load balancing,
6545–6552. J. Comput. Sci. 3 (2007) 863–868.
[6] A. Paranjothi, M.S. Khan, M. Nijim, R. Challoo, MAvanet: Message authentication [18] B. Ding, Z. Chen, Y. Wang, H. Yu, An improved AODV routing protocol for
in VANET using social networks, in: IEEE 7th Annual Ubiquitous Computing, VANETs, in: International Conference on Wireless Communications and Signal
Electronics & Mobile Communication Conference, UEMCON, 2016, pp. 1–8. Processing, WCSP, Nanjing, 2011, pp. 1–5.
[7] A. Paranjothi, M.S. Khan, M. Atiquzzaman, Hybrid-vehcloud: an obstacle shad- [19] O. Abedi, R. Berangi, M.A. Azgomi, Improving route stability and overhead on
owing approach for VANETs in urban environment, in: 2018 IEEE 88th Vehicular AODV routing protocol and make it usable for VANET, in: 29th IEEE Interna-
Technology Conference, VTC-Fall, 2018, pp. 1–5. tional Conference on Distributed Computing Systems Workshops, Montreal, QC,
[8] A. Paranjothi, M.S. Khan, M. Atiquzzaman, DFCV: A novel approach for message 2009, 464–467.
dissemination in connected vehicles using dynamic fog, in: Wired/Wireless [20] B. Li, Y. Liu, G. Chu, Optimized AODV routing protocol for vehicular Ad hoc
Internet Communications, WWIC, 2018, pp. 311–322. networks, Global Mobile Congress, Shanghai, 2010, pp. 1–4.
[9] W.M. Alenazy, W. Mugahed Al-Rahmi, M.S. Khan, Validation of TAM model on
[21] H. Li, A. Guo, G. Li, Geographic and traffic load based routing strategy for VANET
social media use for collaborative learning to enhance collaborative authoring,
in urban traffic environment, in: IET Conference Proceedings, China, 2010, pp.
IEEE Access 7 (2019) 71550–71562.
26–29.
[10] Y. Vardi, Network tomography: Estimating source–destination traffic intensities
from link data, J. Amer. Statist. Assoc. 91 (433) (1996) 365–377. [22] D. Wu, J. Luo, R. Li, A. Regan, Geographic load balancing routing in hybrid
[11] N. Taherkhani, S. Pierre, Improving dynamic and distributed congestion control vehicular ad hoc networks, IEEE 14th International Conference on Intelligent
in vehicular ad hoc networks, Ad Hoc Netw. 33 (2015) 112–125. Transportation Systems, ITSC, Washington, DC, 2011, pp. 2057–2062.
[12] S. Djahel, Y. Ghamri-Doudane, A robust congestion control scheme for the [23] N. Aljeri, K. Abrougui, M. Almulla, A. Boukerche, A Performance evaluation of
fast and reliable dissemination of safety messages in VANETs, in: IEEE Wire- load balancing and QoS-aware gateway discovery protocol for VANETs, in: 27th
less Communications and Networking Conference, WCNC, Shanghai, 2012, pp. International Conference on Advanced Information Networking and Applications
2264–2269. Workshops, Barcelona, 2013, pp. 90–94.
288
A. Paranjothi, M.S. Khan, R. Patan et al. Computer Communications 151 (2020) 275–289
[24] T.P. Van, V.D. Nguyen, Location-aware and load-balanced data delivery at road- Anirudh Paranjothi received the B.E. degree in computer
side units in vehicular ad hoc networks, in: IEEE International Symposium on science from Anna University, Chennai, India in 2014 and
Consumer Electronics, ISCE 2010, Braunschweig, 2010, pp. 1–5. his M.Sc. in computer science from Texas A&M University,
[25] N. Taherkhani, S. Pierre, Prioritizing and scheduling messages for congestion Kingsville in 2016. He is currently a Ph.D. student at the
control in vehicular ad hoc networks, Comput. Netw. 108 (2016) 15–28. University of Oklahoma. His research is Vehicular Ad-hoc
[26] V. Namboodiri, M. Agarwal, L. Gao, A study on the feasibility of mobile gateways Networks (VANET), social networks, Computer networks,
for vehicular ad-hoc networks, in: ACM International Workshop on Vehicular Ad Mobile cloud computing and Software engineering.
Hoc Networks, VANET ’04, ACM, New York, NY, pp. 66–75.
[27] T.-Y. Wu, M.S. Obaidat, H.-L. Chan, QualityScan scheme for load balancing
efficiency in vehicular ad hoc networks (VANETs), J. Syst. Softw. 104 (2015)
60–68. Mohammad S. Khan (SM’ 19) is currently an Assistant
[28] R. Stanica, E. Chaput, A.L. Beylot, Congestion control in CSMA-based vehicular Professor of Computing at East Tennessee State University
networks: do not forget the carrier sensing, in: IEEE 9th Annual Communications and the director of Network Science and Analysis Lab
Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, (NSAL). He received his M.Sc. and Ph.D. in Computer
SECON, Seoul, 2012, pp. 650–658. Science and Computer Engineering from the University of
[29] M. Torrent-Moreno, P. Santi, H. Hartenstein, Distributed fair transmit power Louisville, Kentucky, USA, in 2011 and 2013, respectively.
adjustment for vehicular ad hoc networks, in: IEEE 3rd Annual Communications His primary area of research is in ad-hoc networks, net-
Society on Sensor and Ad Hoc Communications and Networks, Reston, VA, 2006, work tomography, connected vehicles, and vehicular social
pp. 479–488. networks. He currently serves as an associate editor of IEEE
[30] M.Y. Darus, K.A. Bakar, Congestion control algorithm for event-driven safety Access, IET ITS, IET WSS and Springer Telecommunication
messages in vehicular networks, Int. J. Comput. Sci. 8 (2011) 49–53. Systems. He has been on technical program committees of
various international conferences and technical reviewer of
[31] S.I. Fadilah, A. Rahman, A novel adaptive time gap based congestion control for
various international journals in his field. He is a member
vehicular ad hoc network, ARPN J. Eng. Appl. Sci. 10 (2015) 9821–9829.
of IEEE.
[32] T. Bellache, O. Shagdar, S. Kallel, S. Tohme, Reducing channel load by the
enhanced contention-based forwarding in vehicular networks, in: 2017 Inter- Rizwan Patan, is an Assistant Professor in the Depart-
national Conference on Selected Topics in Mobile and Wireless Networking, ment of Computer Science and Engineering, Velagapudi
MoWNeT, Avignon, 2017, pp. 1–6. Ramakrishna Siddhartha Engineering College, Vijayawada,
[33] T. Bellache, O. Shagdar, S. Tohme, An alternative congestion control using an India since 2019. Former Assistant Professor at school of
enhanced contention-based forwarding for vehicular networks, in: 2017 13th computing science and engineering, Galgotias University,
Annual Conference on Wireless On-demand Network Systems and Services, NCR Delhi, Indian from 2017–19. Dr. Rizwan is completed
WONS, Jackson, WY, 2017, pp. 81–87. his Ph.D. (Computer Science and Engineering) in 2017 at
[34] J.T. Willis, A. Jaekel, I. Saini, Decentralized congestion control algorithm for school of computer science and engineering, VIT Univer-
vehicular networks using oscillating transmission power, in: 2017 Wireless sity, Vellore, Tamil Nadu, Indian and B. Tech and M.
Telecommunications Symposium, WTS, Chicago, IL, 2017, pp. 1–5. Tech completed respectively 2012 and 2014 on Jawahar-
[35] C.B. Math, H. Li, S.H. de Groot, I. Niemegeers, Fair decentralized data-rate con- lal Nehru Technological University Anantapur, India. Dr.
Rizwan has published reputed 20 SCI journals and 10
gestion control for V2V communications, in: 2017 24th International Conference
free Scopus indexed journals, and also presented paper in
on Telecommunications, ICT, Limassol, 2017, pp. 1–7.
National/International Conferences, published book chapters
[36] C. Chen, J. Hu, J. Sui, Y. Zhou, An information congestion control scheme on the
in CRC Press, IGI global, Elsevier, and Edited as books.
internet of vehicles: A bargaining game approach, Comput. Electr. Eng. (ISSN:
Dr. Rizwan has ten Indian patents one USA patent. Dr.
0045-7906) 58 (2017) 282–298.
Rizwan is a guest editor for International Journal of Grid
[37] Kashif Naseer Qureshi, Abdul Hanan Abdullah, Omprakash Kaiwartya, Saleem and Utility Computing (Inderscience), Recent Patents on
Iqbal, Rizwan Aslam Butt, Faisal Bashir, A dynamic congestion control scheme Computer Science, Information Medical Unlock (Elsevier).
for safety applications in vehicular ad hoc networks, Comput. Electr. Eng. (ISSN: Neural Computing and Applications (Springer). Dr. Rizwan
0045-7906) (2017) Available online 20 December. received award from world research council and American
[38] M. Khan, A. Kumar, B. Xie, P.K. Sahoo, Network tomography application in a medical Council in the title of innovative researcher on Big
mobile ad-hoc network using stitching algorithm, J. Netw. Comput. Appl. 56 Data and IoT for year 2019.
(2015) 77–87.
[39] M. Khan, A. Kumar, B. Xie, Stitching algorithm: A network performance analysis Reza M. Parizi (SM’ 19) is the director of Decentralized
tool for dynamic mobile networks, Proc. Technol. 3 (2012) 41–51. Science Lab (dSL) in the College of Computing and Software
[40] S. Pan, Z. Zhang, F. Yu, G. Hu, End-to-end measurements for network Engineering at Kennesaw State University, GA, USA. He has
tomography under multipath routing, IEEE Commun. Lett. 18 (5) (2014) served for more than a decade in a variety of industrial and
881–884. academic positions with leading players in cybersecurity and
[41] S. Dhakal, Load Balancing in Delay-Limited Distributed Systems (M.S. thesis), software development (e.g., Oracle). Prior to joining KSU,
he was an Assistant Professor at New York Institute of Tech-
Dept. Elect. Eng, Univ. New Mexico, 2003.
nology (NYIT). He received a Ph.D. in Software Engineering
[42] M.A. Bhuiyan, M. Rahman, M.A. Hasan, Guise: Uniform sampling of graphlets
in 2012 and M.Sc. and B.Sc. degrees in Computer Science
for large graph analysis, in: IEEE 12th International Conference on Data Mining,
respectively in 2008 and 2005. His research interests are
Brussels, 2012, pp. 91–100.
R&D in decentralized computing and blockchain, IoT, AI-
[43] A. Bujari, M. Conti, C. De Francesco, C.E. Palazzi, Fast multi-hop broadcast
powered malware and threat detection, and emerging issues
of alert messages in VANETs: An analytical model, Ad Hoc Netw. 82 (2019) in the practice of secure software-run world applications. He
126–133. is a senior IEEE member, and a member of IEEE Blockchain
[44] A. Paranjothi, M.S. Khan, S. Zeadally, A. Pawar, D. Hicks, GSTR: Secure multi- Community, and ACM
hop message dissemination in connected vehicles using social trust model,
Internet Things 7 (2019) 1–16. Mohammed Atiquzzaman obtained his M.S. and Ph.D. in
[45] B. Michael, B. Laura, E. Jakob, K. Daniel, SUMO–simulation of urban mobility: an Electrical Engineering and Electronics from the University
overview, in: Third International Conference on Advances in System Simulation, of Manchester, Manchester, (UK). He is currently an Edith
SIMUL, Barcelona, 2011, pp. 23–28. Kinney Gaylord Presidential Professor in the School of
[46] B. Amina, E. Mohamed, Performance evaluation of VANETs routing protocols Computer Science at the University of Oklahoma, Norman,
using SUMO and NS3, in: IEEE 5th International Congress on Information Science OK, USA. His research interests are in communications
and Technology, CiSt, Marrakech, 2018, pp. 525–530. switching, transport protocols, wireless and mobile net-
[47] A. Paranjothi, M. Atiquzzaman, M.S. Khan, PMCD: Platoon - merging approach works, ad hoc networks, satellite networks, Quality of
for cooperative driving, Wiley Internet Technol. Lett. 3 (2019) 1–6. Service, and optical communications. Dr. Atiquzzaman is
[48] S. Rezaei, M. Gharib, A. Movaghar, Throughput analysis of IEEE 802.11 multi- the editor-in-chief of Journal of Networks and Computer
Applications, founding Editor-in-Chief of Vehicular Commu-
hop wireless networks with routing consideration: A general framework, IEEE
nications and has served or currently serves on the Editorial
Trans. Commun. 66 (11) (2018) 5430–5443.
Board of various IEEE journals and co-chaired numerous
IEEE inter-national conferences, including the IEEE Global
Communications Conference.
289