You are on page 1of 15

Computer Communications 151 (2020) 275–289

Contents lists available at ScienceDirect

Computer Communications
journal homepage: www.elsevier.com/locate/comcom

VANETomo: A congestion identification and control scheme in connected


vehicles using network tomography
Anirudh Paranjothi c , Mohammad S. Khan a ,∗,1 , Rizwan Patan b , Reza M. Parizi d ,1 ,
Mohammed Atiquzzaman c ,1
a
East Tennessee State University, USA
b
VRS Engineering College, Andhra Pradesh, India
c University of Oklahoma, USA
d Kennesaw State University, GA, USA

ARTICLE INFO ABSTRACT


Keywords: The Internet of Things (IoT) is a vision for an internetwork of intelligent, communicating objects, which is
VANET on the cusp of transforming human lives. Smart transportation is one of the critical application domains of
Connected vehicles IoT and has benefitted from using state-of-the-art technology to combat urban issues such as traffic congestion
Congestion control
while promoting communication between the vehicles, increasing driver safety, traffic efficiency and ultimately
Network tomography
paving the way for autonomous vehicles. Connected Vehicle (CV) technology, enabled by Dedicated Short
Graphlets
Range Communication (DSRC), has attracted significant attention from industry, academia, and government,
due to its potential for improving driver comfort and safety. These vehicular communications have stringent
transmission requirements. To assure the effectiveness and reliability of DRSC, efficient algorithms are needed
to ensure adequate quality of service in the event of network congestion. Previously proposed congestion
control methods that require high levels of cooperation among Vehicular Ad-Hoc Network (VANET) nodes.
This paper proposes a new approach, VANETomo, which uses statistical Network Tomography (NT) to infer
transmission delays on links between vehicles with no cooperation from connected nodes. Our proposed
method combines open and closed loops congestion control in a VANET environment. Simulation results show
VANETomo outperforming other congestion control strategies.

1. Introduction include passenger safety (e.g. emergency brake light warning, forward
collision warning, control loss warning, weather-related vehicle stabi-
The Internet of Things (IoT) is a vision for an internetwork of lization activation), passenger comfort (e.g. Internet browsing, info-
intelligent, communicating objects such as home appliances, vehicles, tainment, downloading, electronic toll collection) and vehicular energy
factory machines, wearable devices and various types of sensors. The efficiency [2,3]. These applications use different forms of vehicle-
convergence of technologies like ubiquitous wireless communications, to-transportation-network communication, known collectively as V2X,
machine learning, real-time analytics and embedded systems has made to either inform decisions taken by network or automate procedures
novel IoT applications possible in a multitude of domains [1]. The sheer initiated by a network’s drivers. The networks themselves are some-
volume and potential heterogeneity of IoT devices are, however, cre- what amorphous groups of interacting vehicles and roadside devices,
ating new challenges regarding control, communication, coordination, collectively known as VANETs [4,5]. Network science will be at the
and data management. helm to address these challenging issues.
The IoV (Internet of Vehicles), also known as Connected Vehicles, The Dedicated Short Range Communication (DSRC) protocol is the
is a subfield of IoT that uses Dedicated Short Range Communication industry standard for communication in VANETs. The basic DSRC
(DSRC) technology to enable vehicles to wirelessly communicate with protocol meets latency requirements for safety-critical Intelligent Trans-
the neighboring vehicles, infrastructure, and pedestrians. Researchers portation Systems (ITS) applications [6]. It supports the use of several
are actively studying connected vehicle (CV) technology to improve preset channels to exchange information about a vehicular network’s
the quality of vehicular transportation, focusing on the needs that state. One of these, the control channel (CCH), is monitored by DSRC

∗ Corresponding author.
E-mail addresses: anirudh.paranjothi@ou.edu (A. Paranjothi), adhoc.khan@gmail.com (M.S. Khan), prizwan5@gmail.com (R. Patan),
rparizi1@kennesaw.edu (R.M. Parizi), atiq@ou.edu (M. Atiquzzaman).
1
Senior Member, IEEE.

https://doi.org/10.1016/j.comcom.2020.01.017
Received 9 October 2019; Received in revised form 21 December 2019; Accepted 7 January 2020
Available online 10 January 2020
0140-3664/© 2020 Elsevier B.V. All rights reserved.
A. Paranjothi, M.S. Khan, R. Patan et al. Computer Communications 151 (2020) 275–289

devices at periodic intervals for road safety messages, including pe- We validated the proposed scheme by conducting extensive simu-
riodic updates and event-driven messages, and Basic Safety Messages lations using urban and highway scenarios. VANETomo outperformed
(BSM). BSMs are periodically broadcast by each vehicle to its neigh- when compared with MoTabu [11], PRBC [12], CABS [13], and
boring vehicles. They convey a vehicle’s status, including its speed, UoTabu [14] in terms of average delay, packet loss, packet loss ratio,
position, direction, and acceleration. CV applications use BSMs to track and average throughput.
neighboring vehicles and respond to dangerous situations to prevent To the best of our knowledge, this work is the first to implement an
possible accidents [7,8]. This combination of messages renders the NT approach to study congestion identification and control in VANETs.
CCH susceptible to possible congestion, packet loss, and delay, due The paper’s key contributions can be summarized as follows:
to attempts to flood a VANET with critical, event-driven messages
concurrently with periodic broadcasts. This potential degradation of • VANETomo statistically infers the network to identify the opti-
the quality of service (QoS) risks the safety of the drivers as well as mum link available.
the users of ITS applications [9]. • Network congestion is inferred in the network by solving the
VANETs create challenges for congestion control that are more Network tomography problem.
difficult than those presented by other types of mobile ad hoc networks • Once congestion is identified then network traffic can be routed
(MANETs). VANETs have two main components: vehicles equipped more efficiently to reduce congestion in a VANET.
with onboard units (OBUs) and roadside units (RSUs). Fig. 1 illustrates
The remainder of this paper is organized as follows: Section 2 gives the
a traffic network that is serviced by a VANET. The region in the VANET
related work. Section 3 presents the proposed approach, and its inner
consists of vehicles and RSUs. Each RSU is enclosed by a circle that
workings. Section 4 talks about the proposed VANETomo algorithm.
shows its transmission range. RSU transmission ranges are overlapped,
In Section 5, we present the performance evaluation and simulation
which allows every vehicle in the VANET to connect to at least one
results followed by a conclusion in Section 6.
RSU. When a vehicle enters the VANET, the VANET’s topology changes.
The loads on the VANET’s RSUs also change as vehicles request services
from them. High-speed movements of vehicles in the VANET produce 2. Related work
frequent changes in network topology and congestion.
In Fig. 1, overloaded RSU regions are enclosed by a red circle as Networks implement congestion control to enable better use of
more number of vehicles requesting services at the same time resulting bandwidth and provide higher QoS. VANETs pose a particular problem
in network congestion and unsuccessful communication for vehicles for congestion control, due to the need to fit a variable workload to an
try to establish a connection with an RSU after being overloaded. The inherently unstable network topology. Strategies for VANET congestion
normally loaded and least loaded RSU are represented in green and control can be divided into those that address congestion after it occurs
yellow circles respectively results in the least network congestion and and those that address congestion before it occurs. We now discuss
successful communication between vehicles and RSU. several congestion control schemes, broadly classified into the post and
This paper proposes VANETomo, a strategy for identifying con- pre congestion control.
gested nodes and controlling congestion in VANETs. VANETomo is
designed to route data traffic through a VANET’s least congested relay 2.1. Post congestion control
devices, or roadside units (RSUs), to allow vehicles to dynamically
select the least congested access points along their respective paths. Trishita et al. [15] presented a congestion control mechanism for
Our algorithm, unlike earlier algorithms, identifies congested nodes VANETs that dynamically shares available bandwidth between each
using Network Tomography (NT), a technique proposed by Vardi [10] node’s service and control channels. Each node (vehicle) is treated
for estimating end-to-end traffic intensity without the aid of data from as a combination of a message manager module (MMM), which man-
a network’s internal components. NT uses statistical inference to esti- ages message transmission and reception; a congestion control module
mate network performance from repeated measurements of traffic on a (CCM), which schedules message delivery using a waiting queue; and a
network’s links. This approach quickly estimates delay in a network bandwidth manager module (BWM), which does dynamic calculations
without expecting any cooperation from internal nodes. Thus, the of bandwidth. Their approach incurs high rates of message loss when
overhead at RSUs is very low when compared to earlier approaches multiple vehicles are near one another.
discussed in Section 2 (Related Work). Communication delay on the Dahiya et al. [16] described a strategy for load balancing that routes
links in our approach is negligible because RSUs do not communicate messages based on queue length, diverting messages from nodes with
with each other to find the loads on the links between them. longer queues to nodes with lightly loaded queues. Routing overhead
In our approach, a Controller Module (CM) running in a vehicle’s of this scheme is high when compared to AODV.
onboard unit (OBU) uses NT to infer the likelihood of delays on
a network’s links. Loads on links are then estimated by correlating 2.2. Pre-congestion control
load with link delay. Nodes with heavy loads are identified as highly
congested nodes. Pre-congestion control strategies can be divided into three cate-
Once congested nodes are identified, we use a combination of open- gories, based on the type of routing protocol they use.
loop and closed-loop methods to reduce congestion. Our algorithm’s
open-loop component uses the CM to inform vehicles about network (1) Unicast/multicast routing : Unicast and multicast routing is often
congestion. Vehicles then use this information to select an optimal implemented in VANETs, using variations of the AODV (Ad-hoc On-
RSU through which to send messages. The closed-loop component uses Demand Distance Vector) protocol. Rani et al. [17] proposed a modified
the CM to inform RSUs about network congestion; Overloaded RSUs AODV routing protocol that prioritizes routes whose nodes have shorter
then use this information to forward requests to other RSUs with less queue lengths. Ding et al. [18] proposed a strategy for reducing the
load. This use of a Network Tomography-based hybrid strategy for AODV-related overhead that selects stable routes based on Route Ex-
congestion control differentiates this work from most congestion control piration Time (RET) and routes weight. Abedi et al. [19] improved
strategies, which use one or the other rather than both [10–14]. AODV’s stability and reduced overhead by restricting the number of
Due to its use of statistical inference to quantify congestion, our requests and routes. Li et al. [20] proposed an optimized version of
scheme accounts for all factors leading to delayed response or packet AODV that adds a packet header to RREQ packets.
loss at RSUs. These contributing factors may include but are not limited Each of these four schemes has its particular limitations. Those
to a buffer overflow, collision, and a lack of bandwidth or processing presented in [17,18] fail to account for router stability and complex
power. routing scenarios; they suffer from routing overhead. That in [19] has

276
A. Paranjothi, M.S. Khan, R. Patan et al. Computer Communications 151 (2020) 275–289

Fig. 1. Illustration of a VANET environment.. (For interpretation of the references to color in this figure legend, the reader is referred to the web version of this article.)

a very high delay when compared to AODV. While delays in [20] are algorithm that uses a closed-loop congestion control strategy. The algo-
less, so is the packet delivery ratio. rithm tunes transmission range, transmission rate and minimizes delay
and jitter by selecting the best option from a list of candidate solutions.
(2) Location-based routing : This involves load balancing based on
The scheme, however, also incurs excessive routing overhead.
geographical location. Geographic and Traffic Load based Routing
(GLTR), proposed by Li et al. [21], is intended for urban environments. Stanica et al. [28] present a CSMA/CA (Carrier Sense Multiple Ac-
GLTR assumes that each vehicle is equipped with GPS (Geographic cess with Collision Avoidance) strategy for connecting communication
Positioning Systems) or navigation settings. It selects the best route channels. This strategy was reformulated by the IEEE820.11p (WAVE)
based on less traffic to avoid overloading nodes. standard and is now standard for congestion control in VANETs. This
Geographic Load Balancing Routing in Hybrid VANET (GLRV), de- approach, however, performs poorly under high loads.
veloped by Wu et al. [22], assumes an architecture that combines Wire- In [29], Torrent-Morenoet al. propose the D-FPAV (Distributed-Fair
less Mesh Networks (WMN) and Ad-hoc networks. QoS Location-Aided Power Adjustment for the Vehicular environment) approach for VANET
Gateway Advertisement and Discovery, proposed by Aljeri et al. [23], congestion control. D-FPAV avoids packet collision during safety mes-
allows RSUs to connect to heterogeneous networks to relay data to sage exchange between vehicles. These safety messages consist of emer-
balance network loads. A final protocol by Van et al. [24] first selects gency messages, which are broadcast only in certain situations, and
a gateway RSU based on efficiency, then routes data based on location. beacon messages, periodic broadcasts of information associated with
Schemes in [21–24] have high overhead due to the re-routing of vehicles like speed, direction, and velocity. The authors refer to this
packets. policy as their ‘‘concept of fairness’’. The policy allows users to make
informed decisions during dangerous situations. The strategy’s use
(3) Priority-based protocols: Taherkhani and Pierre [25], proposed
of reduced power transmissions for congestion control reduces the
two congestion control strategies to prioritize and schedule safety and
transmission range of beacon messages, a significant drawback of this
service messages. These strategies consist of a priority assignment unit,
approach.
which prioritizes messages based on static and dynamic factors and
In [12], Djahel and Y. Ghamri-Doudane proposed PBRC, a three-
message size, together with a message scheduling unit, which resched-
stage strategy to reduce overutilization of bandwidth by beacons. Their
ules control and service channel queues before transferring messages to
approach first assigns priorities to messages to transmit. This allows
channels. These priorities are embedded in packet headers.
Mitra et al. [26] devised a mobility model for studying the feasibility PBRC to prioritize the delivery of emergency messages over normal
of mobile gateways in VANETs. Their model assumes that vehicles messages. It then uses congestion detection as a basis for adjusting
connected to wireless LANs and cellular radios act as gateways to do transmission power for beacon messages. The scheme, however, incurs
load balancing. high transmission delays.
Wu et al. [27] proposed a fast handoff technique to achieve load In [13], Bai, Oh, and Jung proposed CABS, an algorithm that like
balancing in a connected vehicle environment. The authors’ ‘‘Quality TDMA provides beacon transmissions in a defined time interval. This
Scan’’ scheme manages load balancing at access points while improv- time interval is calculated based on channel load at a particular time
ing the network’s QoS. This Quality Scan mechanism, however, also and knowledge about the context in which messages are transmitted.
increases overall network. Schemes [25–27] either use a closed loop or CABS provides high reliability when compared to other approaches.
open loop congestion control approach, but not both. However, CABS does not account for the MAC layer implementation
In [11], Taherkhani and Pierre provided a dynamic and distributed to address the different time slots for different transmissions.
strategy for congestion control in VANETs. This strategy has com- In [14], Taherkhani and Pierre proposed a heuristic UOTabu (Uni-
ponents for congestion detection and congestion control. Congestion Objective Tabu search) strategy for congestion control. UOTabu adjusts
is detected by sensing channel usage level and comparing it with a message transmission range and rate based on channel usage. These
predefined threshold, set to 70% in wireless communication channels. adjustments are determined based on a delay function, which serves as
Congestion is controlled by implementing a Meta-Heuristic MOTabu the algorithm’s objective function and whose value the algorithm seeks

277
A. Paranjothi, M.S. Khan, R. Patan et al. Computer Communications 151 (2020) 275–289

to minimize. Dynamic change in a network’s topology can restrict the equilibrium state that maximizes each player’s utility without channel
effective calculation of delay. congestion.
In [30], Darus et al. proposed two algorithms. One, a measurement In [37], Qureshi et al. propose a dynamic congestion control scheme
based congestion detection and control algorithm, detects congestion (DCCS) for congestion detection and communication channel control.
based on the length of the CCH’s packets queue. The algorithm discards Weighing factors are used for congestion detection. DCCS controls con-
queued BSM messages when it determines that the CCH is congested. gestion using either an adaptive congestion control scheme or message
The algorithm initiates congestion control, freezing all safety messages origination-based queue freezing.
except the event-driven safety messages if a number of safety messages All the above congestion control approaches assume a high level of
in the CCH’s queue exceeds a threshold value. The other algorithm is cooperation from network elements to identify congested nodes. Such
an event-driven rebroadcast algorithm that uses forward and makeup assumptions are not realistic in an environment, where network topol-
phases to avoid the loss of messages when the CCH is congested. In this ogy is changing very rapidly. Comparison of the existing congestion
scheme, the authors assumed a congestion control threshold of 70% in control approaches with VANETomo is discussed in Appendix.
wireless communication channels. Channel usage levels exceeding 70%
will limit the scheme’s scalability. 3. Proposed approach: VANETomo
In [31], Fadilah and Rahman describe a scheme for warning vehicles
In what follows, we present an algorithm for detecting and control-
of impending collisions. Their scheme is based on calculations involving
ling VANET congestion. Our strategy for controlling congestion uses a
time gaps: the time that a car needs to avoid a potential collision with
combination of anticipatory and reactive techniques to route messages
a car in front of it. Time gaps are calculated from information obtained
to nodes that are more likely to be lightly loaded. Our algorithm
from beacon messages.
for detecting congestion uses network tomography (NT) to reduce
Fadilah and Rahman propose the use of adaptive periodic beacon-
its impact on network bandwidth. The algorithm provides dynamic
ing to convey time gap data. Fixed rate periodic beaconing schemes
load balancing by inferring link delays of connected nodes statistically
impose a transmission-rate-based tradeoff between channel congestion
without assuming any co-operation between them. The use of NT to
and non-optimal message dissemination. Adaptive schemes avoid these
infer internal network characteristics was first proposed by Vardi [10].
problems by adjusting parameters like beacon frequency, window con-
Other related work includes Khan et al.’s stitching algorithm for mea-
tention size, and transmission power based on network topology. They
suring performance in dynamic networks like MANETs [38,39]. Their
modify the beacon interval to reduce congestion in wireless links. The
algorithm integrates the dynamic performances of a network’s links,
transmission power is affected by beacon power; low beacon power thereby enabling estimates of local and global network performance.
limits transmissions to a vehicle’s nearest neighbors, while higher Also, Pan et al. [40] used NT in a study of multipath routing to examine
power increases the number of neighbors that receive a message. the relationship between sub-paths. Their simulations showed that high
Adaptive contention-window-size-based beaconing schemes [31] degrees of accuracy could be obtained from flows of 200 packets per
adjust a contention window to reduce beacon collisions. Fadilah and probe.
Rahman’s adaptive rate control algorithm varies the rate of periodic This section is divided into four subsections: (a) Classification of
safety message (PSM) generation based on vehicular safety. PSMs can RSUs, (b) Identification of congested nodes, (c) Congestion control, and
cause packet loss and increase the busy channel percentage due to the (d) Congestion identification and control algorithm: VANETomo.
short CCH interval. This creates safety risks for vehicles. Adaptive time
gap based congestion control schemes improve CCH utilization [31] by 3.1. Classification of RSUs
keeping transmission power constant while varying the rate of packet
generation. A distance-based wait time method selects rebroadcast VANET performance characteristics like load, delay and throughput
nodes and retransmits messages to mitigate multipath fading in multi- depend on the number of vehicles requesting services from its RSUs. For
hop networks. The appropriate time gap settings improve performance instance, consider a region near a traffic signal where vehicle density
and compensate for in-vehicle distractions. Adaptive rate control algo- is high. An RSU in this region is likely to receive a large number of
rithms [31] have higher packet success rates at times of higher packet requests from vehicles for Internet access or to relay messages to the
density as compared to times of lower vehicle density. These algorithms destination. As the number of requests at an RSU increase, congestion
yield lower end-to-end delays than fixed rate transmission with variable at the RSU also increases. Eventually, the RSU becomes overloaded
values of vehicle speed and density. Reducing the minimum time gap with requests. Conversely, if an RSU is in a region with sparse vehicle
can only improve the CCH busy percentage by compromising safety. density, the number of requests at this RSU is likely to be low. The RSU
In [32], Bellache et al. propose a proactive CBF2C strategy to reduce should remain idle for more extended periods of time, experiencing low
congestion control while providing transmission redundancy whenever levels of congestion. Since congestion at an RSU leads to overload, the
possible. The strategy uses the busy channel ratio to determine a load is treated as a means of classifying RSUs. Our scheme classifies
retransmission threshold and does timed retransmissions until a retry RSUs based on a number of vehicles they are servicing, a maximum
threshold is reached. In [33], these authors propose a similar packet threshold limit of load on RSU (THMAX ), and a minimum threshold limit
forwarding algorithm (CBF2C) for distributed congestion control. The of load on RSU (THMIN ) as given below.
algorithm monitors the channel load status. Based on this load it adapts (A) Least-loaded RSU : In regions with low vehicle density (i.e., rural
the message retransmission rate. Willis et al. [34] propose a distributed areas), service requests at an RSU are likely to be low, thus load on
congestion control scheme that prioritizes transmissions to nearer vehi- RSU is slight. If the load on RSU is below THMIN , then the RSU is said
cles over transmissions to more distant vehicles. Their scheme balances to be least-loaded.
adjustments to transmission power and transmission rate. A second dis-
tributed congestion control scheme by Math et al. [35] focuses more on (B) Normally loaded RSU : If an RSU’s load is between THMIN and
packet count that specific threshold values. Their PDR-DCC algorithm THMAX , the RSU is said to be normally loaded. If a considerable number
reduces channel congestion by selecting the lowest permissible data of vehicles enter the range of a normally loaded RSU and request
rate that ensures maximum coverage. service at the same time, then the RSU may become overloaded. Con-
versely, if most vehicles in the range of a normally loaded RSU leave
Chen et al. [36] propose a congestion control scheme based on
and no other vehicles enter the range, the RSU becomes least-loaded.
a non-cooperating bargaining game. The game divides vehicles into
clusters, each of which has a leader. The clusters’ leaders negotiate (C) Over-loaded RSU : If high numbers of vehicles try to access an RSU at
with each for an optimal combination of transmission power and packet the same time, thereby creating a load on the RSU that exceeds THMAX ,
generation rate for their members. Ideally, negotiations should yield an the RSU is said to be overloaded.

278
A. Paranjothi, M.S. Khan, R. Patan et al. Computer Communications 151 (2020) 275–289

Fig. 2. Pictorial representation of classification of RSUs based on the number of vehicles.

Fig. 3. Classification of RSUs based on Threshold.

This three-way classification of RSUs is based on numbers of vehi-


cles and thresholds. Consider a roadmap with RSUs deployed on roads
as shown in Fig. 2. RSU3 , RSU5 , RSU8 , RSU9 , and RSU16 are under-
loaded as very few vehicles are trying to access them. RSU1 , RSU4 ,
RSU6 , RSU7 , RSU10 , RSU12 , RSU13 , and RSU15 are normally loaded as Fig. 4. 4-node graph.
a reasonable number of vehicles is trying to access them. RSU2 , RSU11 ,
and RSU14 are overloaded as many vehicles are trying to access them,
overloading them with requests. Link delays are inferred from overall end-to-end delays by us-
ing Eq. (1), which models the NT of VANET as an inverse matrix
3.2. Identification of congested nodes problem.

Our approach identifies congested nodes through an inverse NT Y = AX (1)


technique. Unlike other forward measurement approaches, NT does
In the above equation, ‘‘Y’’ represents a vector of measurements ob-
not require significant cooperation from network elements to estimate
served at various time periods (e.g. overall end-to-end delay from
network characteristics (see Fig. 3). Congested nodes are identified in
source to destination nodes); ‘‘A’’ represents a path matrix, where value
two steps:
1 represents that the particular path is chosen to forward information
1. Estimating link delay between RSUs by using the NT technique and value 0 represents otherwise; and ‘‘X’’ represents the estimated time
2. Estimating load on RSU through correlation between delay to load. independent performance vector (e.g., link delay). By varying Y vector
In particular, nodes with high loads are assumed to have high values, link delays can be estimated through the NT technique.
congestion. For instance, consider the four-node network at time period t as
represented in Fig. 4. The end-to-end delay 𝑦1 for path1 through node-1,
node-2, and node3 and 𝑦2 for path2 through node1 , node2 , and node4
3.2.1. Estimating link delay between RSUs using NT are estimated from repeated measurements. Here, the path matrix A
The NT technique is a promising alternative method to direct evalu- for the network shown in Fig. 4 is given in Eq. (2). In this matrix A, an
ation of network performance. The technique infers a network’s internal entry’s value is 1 if its associated link was used to relay the message.
characteristics (e.g., link delay) from continuous measurements of ex-
e1 e2 e3
ternal characteristics (e.g., end-to-end delay). Overall end-to-end delay [ ] [ ] ⎡𝑥1⎤
in a region at time period ‘‘t ’’ is estimated from the data of previous 𝑦1 1 1 0 ⎢𝑥2⎥
= (2)
delays in that particular region at time instances 𝑡1 , 𝑡2 , 𝑡3 , … , 𝑡𝑛 . 𝑦2 1 0 1 ⎢ ⎥
⎣𝑥3⎦

279
A. Paranjothi, M.S. Khan, R. Patan et al. Computer Communications 151 (2020) 275–289

Let Y = (𝑦1 , 𝑦2 , 𝑦3 , … , 𝑦𝑛 .)′ be the n-dimensional vector of measure-


ments of end-to-end delays corresponding to X, where 𝑦𝑗,1≤𝑗≤𝑛 is the
end-to-end delay of the 𝑗th path. Let X = (𝑥1 , 𝑥2 , 𝑥3 , … , 𝑥𝑚 )′ be the m-
dimensional vector that represents link delays, where 𝑥𝑖,1<i<m is the link
delay of the 𝑖th link. Through repeated measurements of vector Y, the
values in vector X – i.e., the link delays – are inferred.
Our approach expects no information from nodes (RSUs) about their
current loads. Instead, the delay is determined based on probability
distribution. Papers [38,39] present detailed mathematical modeling of
this technique in a dynamic network.

3.2.2. Estimating load on RSU through correlation between delay to load


Load and delay are highly correlated network performance param-
eters. In a network, the presence of high load implies a high delay Fig. 5. RSUs represented as nodes.
in forwarding packets and vice versa. Our approach focuses primarily
on two sources of delay: route discovery delay, which a node incurs
when it tries to communicate with neighboring nodes to identify the (c) Passive nodes:
best node to relay packets, and load transfer delay, which occurs Nodes in the network that do not participate in forwarding a
while packets are being transferred between the source and destination message from source to destination are termed passive nodes relative to
nodes [41]. Communication delay is assumed to be negligible, as RSUs that particular message. In our example, node10 and node19 are passive
do not use DSRC to communicate with each other. nodes.
Load transfer delay depends on the load on the network links. Due to
(d) Graphlets:
the correlation between load and delay, if load transfer delay is known,
Graphlets are the small, isomorphic, connected and included sub-
the load can be measured by Eqs. (3) and (4), [41]:
graphs of a large network [42]. Our scheme uses graphlets to construct
([ ]−1 )
1 + exp 𝐿𝑖𝑗 (𝑡) ∗ 𝑑 ∗ 𝛽 representations of VANETs that yield approximate, fast characteriza-
𝜃𝑖𝑗 (𝑡) = 𝑑𝑚𝑖𝑛 − [ ]−1 (3) tions of network performance. Comprehensive evaluations of network
1 − exp( 𝐿𝑖𝑗 (𝑡) ∗ 𝑑 ∗ 𝛽 ) performance in real time for large and dynamic networks like VANETs
are impractical. Thus, our algorithm divides a network into subgraphs
where
and evaluates the performance of each subgraph individually.
𝜃𝑖𝑗 (𝑡) = average transfer delay;
𝑑𝑚𝑖𝑛 = minimum possible transfer delay; (e) Active Graphlets:
d = constant; Due to the difficulty of estimating the end-to-end delay of large
𝛽 = parameter characterizing the transfer delay; networks, our approach extracts graphlets from networks dynamically,
𝐿𝑖𝑗 (𝑡) = load on network based on the node at which a vehicle is located. Fig. 6 illustrates the
extraction of active graphlets from the active network topology. When
The load 𝐿𝑖𝑗 (𝑡) in network can be obtained from Eq. (3) as follows:
the active graphlets are combined, the original active topology can be
1 reconstructed.
𝐿𝑖𝑗 (𝑡) = [( ) ] (4)
𝑑 −𝜃 (𝑡) −1
( 𝑚𝑖𝑛 𝑖𝑗 )
For instance, assume a vehicle in this network is at node2 at time
d ∗ 𝛽 ∗ ln 𝑑𝑚𝑖𝑛 −𝜃𝑖𝑗 (𝑡) +1 𝑡2 The CM extracts the active graphlet with node2 ’s neighbor nodes –
RSUs are classified as least loaded, normally loaded or overloaded node 1, node 3, and node 9 – from the topology, then measures end-
based on the solutions to the above equation. Congested nodes are iden- to-end delays for the graphlet’s links through the NT technique. The
delays obtained for these links are correlated with the load on the links
tified from this information. In our approach, all these computations are
and provided to the vehicle. The vehicle is then assumed to use these
carried out in the CM within the OBU mounted inside the vehicle.
load statistics to identify and connect to the least loaded RSU in this
graphlet. By repeating this process, the vehicle consistently chooses less
4. Congestion control mechanism heavily loaded RSUs in its path from source to destination.
The nodes that the vehicle at RSU1 might traverse en route to the
Our approach uses two congestion control methods: a pre- destination are shown in Fig. 7. For example, assume that a vehicle
congestion control method, which is applied at least-loaded RSUs, and moves from node1 at time t1 to node2 at time t2. After node 2, the vehi-
post-congestion control methods, applied at overloaded RSU. cle can connect to node 3 or node 9. By using the techniques mentioned
above, the CM estimates the load on the links in this particular active
4.1. Definitions graphlet at time period t2 and provides this information to the vehicle,
which connects to the more lightly loaded node 9. Similar inferences
at successive points in time might then cause the vehicle to select node
This section presents definitions used in subsequent sections. These
11, node 12, node 17, node 22, node 23, node 24, and node 25.
definitions are integral to the proposed scheme.

(a) Active nodes: 4.2. Pre-congestion control method


The nodes in a network that actively participate in forwarding a
message from source to destination are referred to as active nodes with Pre-congestion control seeks to limit congestion before an RSU is
respect to that message. In our example (as shown in Fig. 5), all nodes overloaded. The method provides a list of least loaded RSUs to vehicles
other than node 10 and node 19 are regarded as active nodes. in a VANET region, assuming that vehicles will connect to these RSUs
when they can. Using this information, the RSUs that are likely to
(b) Active topology: become overloaded can be prevented from entering into the overloaded
The topology formed with a set of active nodes is referred to as state.
a message’s active topology. The active topology formed for nodes in For a better understanding of our approach, consider the vehicular
Fig. 5 is shown in Fig. 6. network scenario shown in Fig. 8. The scenario assumes a huge flux

280
A. Paranjothi, M.S. Khan, R. Patan et al. Computer Communications 151 (2020) 275–289

Assume that a vehicle’s source and destination points are in regions


serviced by RSU1 and RSU25 respectively. While moving from source
to destination, the vehicle tries to connect to an available RSU in its
range. When a vehicle can connect to two or more RSUs, it connects to
the RSU with least load.

4.3. Post-congestion control method

Post-congestion control seeks to reduce congestion at overloaded


RSUs. The method uses CMs to provide lists of less loaded RSUs to
overloaded RSUs, so that these RSUs can forward overload to these
less loaded RSUs. To reduce overhead on other RSUs, this list is only
provided to overload RSUs.
Among the available methods for load balancing, the best way
to manage overloaded RSUs is to forward excess requests to RSUs
with less load. In our approach, each RSU decides where to forward
overloaded requests. The CM correlates delay as calculated using NT
techniques with load, then passes load statistics to overloaded RSUs.
These overloaded RSUs then use this information to choose less loaded
RSUs and send them excess requests.
For instance, assume that the nodes 8 and 16 are overloaded and
nodes 17 and 24 are less loaded than other nodes. The information
Fig. 6. Active topology. regarding load at each RSU is given to nodes 8 and 16. As it is assumed
that the vehicle does not move backward, the nodes that are along
the route to the destination are chosen to forward these overloaded
of vehicles and 25 RSUs. It is assumed that vehicles in the network requests. Assume that among the available nodes, nodes 17 and 24
communicate with RSUs to forward safety-related messages and request have the least load in the direction of the destination. In this situation,
services for comfort applications. overloaded requests would be forwarded from node 8 to node 17
It is difficult to monitor and control a dynamic and huge network through node 13 and from node 16 to node 24, thereby reducing the
like a VANET. Thus, the algorithm partitions the VANET’s geographical load on nodes 8 and 16 and the delay on these links (see Fig. 9).
area into smaller regions (defined by graphlets) and enables an OBU
with the limited computational power to monitor network character-
istics like delay, load, and efficiency in each region. The diameter of 5. VANETomo algorithm
the region (graphlet) can be varied using the MAX_HOP field in our
probe packets described in the earlier section. The CM maintains a
delay database of the current region and computes the associated delays VANETomo is developed to identify congested nodes and provide
for the next region when it approaches the current region’s boundary information on such nodes to OBUs and RSUs for better congestion con-
node. This information regarding previous delays is used to infer link trol. The formal presentation of the VANETomo is given in Algorithm
delays using the NT technique. 1.

Fig. 7. Nodes to which vehicle connects.

281
A. Paranjothi, M.S. Khan, R. Patan et al. Computer Communications 151 (2020) 275–289

Fig. 8. Roadmap.

(x1 , x2 , x3 , … , xm ) is an m-dimensional vector of link delays. Inferred link


delays from network tomography are stored into 𝑋𝑚 .
Inferred link delays are then correlated to load, using
Correlation(x 𝑗 ). The result of each correlated load is stored in an Lj
variable. Nodes whose correlated loads are less than THMIN or exceed
THMAX are classified as least loaded and overloaded, respectively. Least
loaded, overloaded, and normally loaded nodes are stored in variables
Lleast , Lover, and Lnormal respectively for future use. Steps 13–26 perform
these operations.
Finally, least loaded and normally loaded RSUs are sent to the
vehicles for pre-congestion control and to overloaded nodes for post-
congestion control. A flow chart for Algorithm 1 is provided in Fig. 10.

6. Performance evaluation and results

VANETomo’s performance was evaluated using scenarios that simu-


lated highway (with eight lanes, four in each direction) and urban (with
four lanes, two in each direction) networks to reflect different levels of
congestion.

6.1. Experimental setup

The proposed scheme aims to find the best RSU to connect with,
based on estimating the level of congestion at each RSU from the round-
trip end-to-end delay of probe requests. Probe messages are forwarded
using the control channel (178). The 2016 release of the IEEE 1609.3
standard provides for optional fields in WSMP packet headers. These
fields can be used to relay probe messages for congestion detection.
In Fig. 4, node-1 represents a vehicle-mounted OBU that is con-
The algorithm uses four inputs: a path matrix, a delay list (stored in nected to an RSU (node-2). We assume this vehicle has subscribed to a
CMs, consisting of overall end-to-end delays for each of the network’s non-safety infotainment application. We further assume that the OBU is
graphlets), the minimum threshold limit (THMIN ), and the maximum communicating with the RSU using one of the service channels (SCH).
threshold limit (THMAX ). When a vehicle enters a region corresponding The IEEE 1609.4 standards’ alternating mode allows the OBU to use the
to a graphlet, it scans the RSUs to find the region’s available RSUs. first 50 ms of every 100 ms timeslot for the control channel (CCH) and
Scan_Rsu() is used to do this scan; the result will be stored in variable the second 50 ms for the service channel (SCH). This allows the OBU to
R. These available RSUs are used to extract the region’s topology, using simultaneously transmit and receive on both CCH and SCH every 0.1 s.
extract_topology(R). The result is stored in variable T for future use. While the SCH is used for the infotainment application, the CCH acts as
Once the topology is extracted, the delay list is accessed from the the common channel for control and probe messages. To select the next
centralized controller (Steps 5 through 8). This delay list contains RSU node, the vehicle (node1 ) will send a probe packet to RSU (node2 )
a list of historical delays calculated at earlier times. Each historical with a relay request. The RSU will then relay the probe to node3 and
delay is stored in a 𝑦𝑖 . (i.e., y1 , y2 , y3 , y4 , . . . , yn ). We use the NT node4 through the control channel.
technique to infer the links’ delays; the call to NT(Y 𝑛 , A𝑛𝑚 ) does these While the details of the implementation of relaying probe packets
inferences. The path matrix Anm and the vector of path delays Yn are are out of scope, it should be noted that probe packets will contain at
passed as parameters to the NT function to infer Xm , where Xm = least the following fields in the WSMP header:

282
A. Paranjothi, M.S. Khan, R. Patan et al. Computer Communications 151 (2020) 275–289

Fig. 9. Nodes with overloaded requests.

Table 1
WSMP header fields and description.
Fields Description
SRC Current sender’s MAC address
DST Current destination’s MAC address
HOP Current Hop#
ORIG Original probe sender’s MAC address
TS Timestamp of sending a probe message
TR Trace of route
MH Maximum number of allowed hop (in integer)
R Relay request? (Yes/No)
SCH Service channel to connect with
TTL Maximum time-to-live
Resp True when it is a response to the probe

RSU, that RSU responds to the probe, specifying the service channel
(SCH) for the OBU to connect to. The RSU’s response to the probe
follows the same path in reverse with the help of traceroute (TR)
information updated in the probe header every hop. Once the OBU that
originated the probe receives the response from the RSU, the overall
end-to-end delay is used to infer link delays corresponding to the path
specified by TR.

6.2. Simulation scenarios

VANETomo’s performance was evaluated using network and mo-


bility simulators. VANETs were simulated with the NS2 (version NS
2.35) network simulator. We chose NS2 because complex scenarios
can be easily tested and it is widely used by researchers [43,44].
Fig. 10. Flow chart of VANETomo. Vehicular mobility was simulated using the SUMO (Simulation of Urban
Mobility) mobility simulator. SUMO is an open source traffic simula-
tor [45,46] that generates road topologies and patterns of vehicular
SRC DST HOP ORIG TS TR MH R SCH TTL Resp. movement [47]. NS2 and SUMO were connected using MOVE (MObility
model generator for VEhicular networks), which converted traffic pat-
The fields are described in Table 1. tern movements in SUMO to node movements in NS2 [48]. This com-
In this scenario, the maximum hop count is set to 2. While this bination of NS2, SUMO and MOVE created an environment analogous
maximum can be increased to 3 or 4 hops, we prefer to specify a small to a VANET, which we used to evaluate VANETomo. TwoRayGround
number of hops to assure the efficiency of routing. The current hop and Nakagami propagation models were used for traffic propagation
number (Hop) is updated during each relay and checked against the in highway and urban scenarios respectively. Poisson distribution was
maximum hop number (MH). If the maximum hop is reached at any used for data generation.

283
A. Paranjothi, M.S. Khan, R. Patan et al. Computer Communications 151 (2020) 275–289

Table 2
Parameters for simulation in the highway and urban scenarios.
Parameters Value
Road Length 2000 ma , 572 m × 672b m
Number of lanes 8 lanes (4 in each direction)a and 4 (2 in each direction)b
Number of vehicles 50, 80, 100, 120, 150, 200
Vehicles speed 55–75 mpha and 15–45 mphb
Bandwidth 10 MHz
MAC type IEEE 802.11p
Propagation model TwoRayGrounda , and Nakagamib
MAC buffer size 14 Frames
Contention window 15–1023
Simulation time 200 s
Simulation runs 30
a
Highway scenario.
b Urban scenario.
Fig. 11. Effect of change in number of vehicles on packet loss ratio in highway
scenario.

6.3. Simulation parameters & metrics

We considered the following six parameters for simulation in urban


and highway scenarios: (a) Road length, (b) Number of lanes, (c)
Number of vehicles, (d) Vehicle speed, (e) MAC type, and (f) Simulation
time. These parameters are presented in Table 2.
In VANETs, vehicles and network infrastructure communicate using
IEEE802.11 standards. We used the following three metrics to evaluate
our proposed algorithm’s performance:
Average delay: This metric specifies the amount of time required for a
packet to travel from source to destination.
Average throughput : In communication networks, average throughput is
the average rate of successful message transmission over communica-
tion channels.
Packet loss ratio: This is the ratio of packets lost to packets transmitted. Fig. 12. Effect of change in number of vehicles on average delay in highway scenario.

6.4. Simulation results

VANETomo was compared with peer approaches including,


MoTabu [11], PRBC [12], CABS [13], UoTabu [14] in terms of average
delay, packet loss, packet loss ratio and average throughput. The results
are divided into the highway and urban scenarios. Figs. 11–20 compare
various congestion control techniques in highway and urban scenarios.

6.4.1. Effect of changing number of vehicles


This subsection describes the effect of changing the number of ve-
hicles on various network performance metrics (e.g., average through-
put, average delay and packet loss ratio) for highway (Figs. 11–13)
and urban (Figs. 14–16) scenarios. In each evaluation, VANETomo
outperformed the remaining congestion control strategies.
Fig. 13. Effect of change in number of vehicles on average throughput in highway
6.4.1.1. Highway scenario. Figs. 11–13 show the results corresponding scenario.
to the highway scenario, where the level of congestion is low.
6.4.1.1.1. Packet loss ratio (highway) .
Fig. 11 shows packet loss ratio as a function of vehicle count. In counts is due to its use of NT in place of direct probes of network
the 50-vehicle simulation, these ratios were 13% for PRBC, 8% for elements to identify congested nodes. This imposes less overhead on
CABS, 2% for UOTabu, and 1% each for MOTabu and VANETomo. In network elements than other strategies.
the 200-vehicle simulation, the ratios increase to 27% for PRBC, 23% 6.4.1.1.3. Average throughput (highway) .
for CABS, 12% for UOTabu, 4%, for MOTabu, and 3% for VANETomo. Fig. 13 shows average throughput as a function of a number of
MOTabu and VANETomo were clearly less sensitive than the other vehicles. For all strategies, throughput increases as the number of
four algorithms to increases in vehicular traffic, with VANETomo (2% vehicles increases. Throughputs for the 50 vehicles simulations are 4.5
increase) slightly outperforming MOTabu (3% increase). Mbps for UOTabu and 4.6 Mbps each for MOTabu and VANETomo. (For
6.4.1.1.2. Average delay (highway) . clarity, CABS and PBRC are omitted from the graph). In the 200 vehicle
The second goal of congestion control is to reduce delay. Fig. 12
simulation, throughputs increase to 35.5 Mbps for UOTabu, 38 Mbps
shows average transmission delay in milliseconds as a function of
for MOTabu, and 38.8 Mbps for VANETomo. VANETomo’s increase in
vehicle count. In the 50-vehicle simulation, these delays are 12 ms for
average throughput of 34.2 Mbps is the largest of the strategies.
PRBC, 8 ms for CABS, 4 ms each for UOTabu and MOTabu, and 3.8 ms
for VANETomo. In the 200-vehicle simulation, delays increase to 48 ms 6.4.1.2. Urban scenario. In an urban scenario, the level of congestion is
for PRBC, 33 ms for CABS, 10 ms for UOTabu, 8 ms for MOTabu, and high because the density of vehicles is high in small regions. Figs. 14–16
7.5 ms for VANETomo. VANETomo’s relative insensitivity to vehicle shows the results.

284
A. Paranjothi, M.S. Khan, R. Patan et al. Computer Communications 151 (2020) 275–289

Fig. 14. Effect of change in number of vehicles on packet loss ratio in urban scenario. Fig. 16. Effect of change in number of vehicles on average throughput in urban
scenario.

Fig. 15. Effect of change in number of vehicles on average delay in urban scenario.
Fig. 17. Effect of change in simulation time on average delay in highway scenario.

6.4.1.2.1. Packet loss ratio (urban) .


Fig. 14 shows the effect of a change in the number of vehicles the highway (Figs. 17 and 18) and urban (Figs. 19 and 20) scenarios.
on packet loss ratio in an urban scenario. Packet loss ratio increases Here the number of vehicles in the network is equal to 50.
for all strategies with the increase in a number of vehicles. VANE- 6.4.2.1. Highway scenario.
Tomo has an almost constant packet loss ratio for all vehicle densities Figs. 17 and 18 show the variation of average delay and throughput
from 50 to 200 vehicles. The packet loss ratio of congestion control concerning the simulation time.
strategies for 50 vehicles is 0.13%, 0.08%, 0.03%, 0.02% and 0.018% 6.4.2.1.1. Average delay (highway) .
for PRBC, CABS, UOTabu, MOTabu and VANETomo respectively. For Fig. 17 shows average packet delay, evaluated at 50, 100, 150,
200 vehicles, packet loss ratios increase to 0.29%, 0.21%, 0.14%, and 200 s into the simulations. At 50 s, these delays are 1.19 s for
0.027% and 0.024% for PRBC, CABS, UOTabu, MOTabu and VANE- PBRC and CABS, 1.13 s for UOTabu, 1.04 s for MOTabu and 1s for
Tomo respectively. PRBC, CABS, and UOTabu, unlike MOTabu and VANETomo. At 200 s, delays decreased to 0.46 s for PRBC and CABS,
VANETomo, exhibit huge increases in packet loss. Fig. 12(b) shows that 0.35 s for UOTabu, 0.32 s for MOTabu and 0.26 s for VANETomo. All
the packet loss ratio for VANETomo is quite low when compared to five algorithms exhibit decreased delays as simulation time increase,
other strategies. due to reduced delays in packet delivery. VANETomo exhibits the least
6.4.1.2.2. Average delay (urban) . delay at all times.
Fig. 15 shows that the variation in average delay when the number 6.4.2.1.2. Average throughput (highway) .
of vehicles increases from 50 to 200 is 121 ms, 91 ms, 7 ms, 5 ms Fig. 18 shows average throughput, evaluated at 50, 100, 150, and
and 3.4 ms respectively for PRBC, CABS, UOTabu, MOTabu, and VANE- 200 s of simulation time. For all strategies, average network throughput
Tomo, respectively. Among all the strategies, VANETomo exhibits the increases gradually as simulation time increases, due to decreases in
least delay. Also, UOTabu, MOTabu, and VANETomo incur less delay congestion and packet loss. At 50 s, average throughputs is 0.17 Mbps
than PRBC and CABS. for the remaining five algorithms. At 200 s, throughputs increase to
6.4.1.2.3. Average throughput (urban) . 1.53 Mbps for PRBC, 1.79 Mbps for CABS, 1.85 Mbps for UOTabu,
Fig. 16 demonstrates that the average throughput increases for 1.89 Mbps for MOTabu, and 1.95 Mbps for VANETomo. All strategies
different congestion control strategies as the number of vehicles in- exhibit linear increases in average throughput from the 50 s and
creases. When the number of vehicles increases from 50 to 200, the 100 s, followed by near-constant throughput at later times. This linear
increase was due to controlling congestion and reducing the number of
increase in average throughput is 22 Mbps, 27 Mbps, 31 Mbps, 33 Mbps
packet loss, which increases the number of packets delivered over the
and 35 Mbps for PRBC, CABS, UOTabu, MOTabu, and VANETomo,
simulation time period. VANETomo’s average throughput is the highest
respectively. VANETomo exhibits the highest average throughput in an
of all five.
urban scenario at all vehicle densities.
6.4.2.2. Urban scenario.
6.4.2. Effect of changing simulation time Figs. 19 and 20 represent the effect of variation in simulation time
This subsection compares VANETomo’s performance to the other on average delay and throughput respectively. The congestion control
congestion control schemes concerning changes in simulation time for strategies are evaluated at the 50 s, 100 s, 150 s, 200 s simulation times.

285
A. Paranjothi, M.S. Khan, R. Patan et al. Computer Communications 151 (2020) 275–289

Based on our simulation study for VANETomo, the average channel


load experienced per RSU within a network including 25 RSUs varies
from 0.2 Mbps (for 50 vehicles) to 1.6 Mbps (for 200 vehicles).

7. Conclusions and future work

VANETomo’s primary objective is to help route data traffic through


a VANET’s least congested nodes (RSUs). From this perspective, VANE-
Tomo is a congestion-aware load-balancing routing algorithm that uses
statistical inference to analyze congestion. The routing of vehicular
traffic was beyond the scope of this work. However, an extension
Fig. 18. Effect of change in simulation time on average throughput in highway of VANETomo could in theory support data-driven navigation by au-
scenario. tonomous vehicles. These vehicles would follow routes that maximize
network connectivity and bandwidth resources over the entire travel
time.
As supported by the simulation results, the proposed algorithm
correlates delays on a network’s links as inferred from inverse net-
work tomography (NT) with loads on a network’s nodes. It reduces
congestion and improves communication performance by proactively
routing vehicles to less loaded nodes and routing messages away from
points of congestion. To enable the use of probe messages to assess
congestion in real time without recourse to direct queries of node
loading, VANETomo splits networks into active graphlets: a strategy
that accounts for the algorithm’s demonstrable scalability. Thus, the
idea is to infer the level of congestion through these probe packets
where the network diameter of the graphlets at each iteration could
Fig. 19. Effect of change in simulation time on average delay in urban scenario.
be dynamically changed based on the density of RSU deployment. This
will minimize unnecessary handover from one RSU to another eliminate
ping-pong effects.
In our current implementation, we have kept graphlet diameters
constant. Our future implementation will investigate the benefits of
dynamic resizing of graphlets based on the market penetration rates
of DSRC technology. These rates will determine the density of RSU
deployment in urban areas.
Simulations of limited-access and urban highways involving be-
tween 50 and 200 active vehicles compared VANETomo against four
published algorithms for congestion control: PRBC, CABS, UOTabu and
MOTabu. VANETomo outperformed these four other algorithms at all
vehicle densities and simulation times, according to comparisons of
average delay, average channel load and throughput, and packet loss
ratio. These findings suggest VANETomo’s potential value as a tool for
Fig. 20. Effect of change in simulation time on average throughput in urban scenario. identifying and controlling congestion in VANET environments.

Declaration of competing interest


6.4.2.2.1. Average delay (urban) .
In Fig. 19, the average delay is reduced with increases in simulation
No author associated with this paper has disclosed any potential or
time for all congestion control strategies. VANETomo clearly exhibits
pertinent conflicts which may be perceived to have impending conflict
less delay than all other strategies at most simulation times. For all
with this work. For full disclosure statements refer to https://doi.org/
strategies, the average delay is reduced more for simulation times 10.1016/j.comcom.2020.01.017.
between 50 and 100 s. After 100 s, the decrease in average delay is
minimal.
CRediT authorship contribution statement
6.4.2.2.2. Average throughput (urban) .
Fig. 20 shows increases in average throughput with an increase in
Anirudh Paranjothi: Formal analysis. Mohammad S. Khan: Con-
simulation time. There is huge increase in average throughput when
ceptualization, Methodology, Writing - original draft, Formal analysis,
the simulation time is increased from the 50 s to 100 s. After 100 s,
Supervision. Rizwan Patan: Visualization. Reza M. Parizi: Writing
the average throughput is almost constant. The variation in average
- review & editing. Mohammed Atiquzzaman: Writing - review &
throughput when simulation time is increased from the 50 s to 200 s
editing.
is 1.24 Mbps, 1.38 Mbps, 1.53 Mbps, 1.59 bps and 1.62 Mbps for
PRBC, CABS, UOTabu, MOTabu, and VANETomo respectively. VANE-
Tomo exhibits more improvement in average throughput than other Appendix
strategies. Moreover, the average throughput of VANETomo is high at
all simulation times. See Table A.1.

286
A. Paranjothi, M.S. Khan, R. Patan et al. Computer Communications 151 (2020) 275–289

Table A.1
Comprehensive comparision of existing methodolgies.
Approach Year Objective Pros Cons
Trishita et al. [15] 2012 The authors used post congestion control Dynamic channel This approach suffers from high packet loss when
mechanism for the VANET environment. A allocation and number of vehicles increases in the urban
congestion control module dynamically allocates message delivery. environment.
messages in the channel and schedule a message
delivery based upon queuing techniques.
Dahiya et al. [16] 2012 The proposed approach performs congestion Dynamic routing The end-to-end delay of this approach is high.
control through load balancing. The algorithm messages and high High packet loss when the queues are heavily
dynamically performs load balancing by routing throughput. loaded.
the packets from heavily loaded queues to lightly
loaded queues.
Rani et al. [17] 2007 The authors modified the AODV routing protocol Priority based This approach is not suitable for complex routing
for congestion control. This approach performs routing and less scenarios due to high routing overhead.
multicast routing for routing the messages to the end-to-end delay.
least congested nodes and prioritize nodes with
shorter queue lengths.
Abedi et al. [19] 2009 Unlike [17], the proposed approach reduces Less routing This approach is not suitable for high vehicle
routing overhead by limiting number of requests overhead and high dense regions like downtown environment due to
in a time interval (t ). packet delivery large number of requests in a time period (t ).
ratio.
Li et al. [21] 2010 The proposed approach performs location-based Less packet loss High end-to-end delay and routing overhead. Not
routing to reduce congestion. The authors proposed ratio. suitable for highway environment.
an algorithm called Geographic and Traffic Load
based Routing (GLTR). In GTLR, each vehicle is
equipped with GPS to selects the best route based
on less traffic to avoid overloading nodes.
Wu et al. [22] 2011 The hybrid location-based routing protocol is used Less end-to-end High routing overhead, requires more bandwidth,
for congestion control. The hybrid protocol delay and packet not suitable for urban environment.
combines two commonly used paradigms: wireless loss.
mesh networks and ad hoc-networks to reduce
end-to-end delay and packet loss.
Aljeri et al. [23] 2013 The proposed work performs location-based routing Dynamic routing High routing overhead and end-to-end delay. Not
with the help of RSUs. RSUs contain information messages and high suitable for high dense vehicular regions like
of least and heavily loaded nodes. Thus, it helps in throughput. downtown environment.
routing the messages to the least congested nodes.
Taherkhani et al. 2016 This approach uses priority-based congestion Priority based Requires more bandwidth and high collision of
[25] control strategies to reduce congestion. The routing and high packets.
proposed technique consists of a priority throughput.
assignment unit, which prioritizes messages based
on factors like message size, type, etc.
Mitra et al. [26] 2004 The authors presented the load balancing Dynamic routing This approach is not suitable for complex routing
technique to reduce congestion in the VANET messages and high scenarios due to high routing overhead.
environment. The proposed technique assumes that throughput.
vehicles connected to wireless LANs and cellular
radios act as gateways to do load balancing.
Stancia et al. [28] 2012 The authors illustrated CSMA/CA (Carrier Sense Less packet loss and This approach is not suitable for complex routing
Multiple Access with Collision Avoidance) strategy high throughput scenarios due to high routing overhead.
for connecting communication channels and
congestion control. Moreover, this approach
retransmits the dropped packets to increase the
packet delivery ratio.
Torrent-Moreno 2006 The authors proposed the D-FPAV (Distributed-Fair Suitable for high High communication overhead and delay.
et al. [29] Power Adjustment for the Vehicular environment) dense vehicular
approach for VANET congestion control. D-FPAV environment and
avoids packet collision during safety message less packet loss
exchange between vehicles. These safety messages ratio.
consist of emergency messages, which are
broadcast only in certain situations, and beacon
messages, periodic broadcasts of information
associated with vehicles like speed, direction, and
velocity.
Darus et al. [30] 2011 The authors proposed a pre-congestion control Less packet loss Requires more bandwidth when the number of
scheme to reduce congestion. The proposed ratio and end-to-end vehicles increases in the system and high jitter.
algorithm discards queued messages when it delay
determines that the CCH is congested and initiates
congestion control, freezing all safety messages
except the event-driven safety messages if a
number of safety messages in the CCH’s queue
exceeds a threshold value. In addition, the
algorithm retransmits the dropped packets to
increase the packet delivery ratio.

(continued on next page)

287
A. Paranjothi, M.S. Khan, R. Patan et al. Computer Communications 151 (2020) 275–289

Table A.1 (continued).


Approach Year Objective Pros Cons
Fadilah et al. [31] 2015 The proposed technique uses adaptive periodic Suitable for high High end-to-end delay and routing overhead. Not
beaconing to convey time gap data. Fixed-rate dense vehicular suitable for highway environment.
periodic beaconing schemes impose a environment and
transmission-rate-based tradeoff between channel less packet loss
congestion and non-optimal message ratio.
dissemination. Adaptive schemes avoid these
problems by adjusting parameters like beacon
frequency, window contention size, and
transmission power based on network topology.
Bellache et al. [32] 2017 The authors proposed a proactive strategy to Less packet loss High end-to-end delay, routing overhead, and
reduce congestion while providing transmission ratio and high requires more bandwidth for transmission of
redundancy to the channel. This strategy uses the throughput. messages.
busy channel ratio to determine a retransmission
threshold and does timed retransmissions until a
retry threshold is reached.
Chen et al. [36] 2017 The authors used clustering technique to reduce Dynamic routing High end-to-end delay and packet loss for complex
congestion in the VANET environment. The messages and high routing scenarios.
algorithm combines group of vehicles and creates throughput.
a cluster. Every cluster has cluster leader
responsible for coordinating all the members in
the cluster. The cluster leaders negotiate with each
for an optimal combination of transmission power
and packet generation rate for their members.
Ideally, negotiations should yield an equilibrium
state that maximizes each node utility without
channel congestion.
Proposed work VANETomo proposes a new approach, which uses Less end-to-end We have kept graphlet diameters constant.
(VANETomo) statistical Network Tomography (NT) to infer delay, high However, our future implementation will
transmission delays on links between vehicles with throughput, less investigate the benefits of dynamic resizing of
no cooperation from connected nodes. packet loss ratio, graphlets based on the market penetration rates of
VANETomo’s primary objective is to help route and performs better DSRC technology.
data traffic through a VANET’s least congested at all simulation
nodes (RSUs). From this perspective, VANETomo is times compared to
a congestion-aware load-balancing routing existing congestion
algorithm that uses statistical inference to analyze control techniques.
congestion.

References [13] S. Bai, J. Oh, J.-i. Jung, Context-awareness beacon scheduling scheme for
congestion control in the vehicle to vehicle safety communication, Ad Hoc Netw.
[1] T.M. Behera, S.K. Mohapatra, U.C. Samal, M.S. Khan, M. Daneshm, A.H. Gan- 11 (7) (2013) 2049–2058.
domi, Residual energy-based cluster-head selection in WSNs for IoT application, [14] N. Taherkhani, S. Pierre, Congestion control in vehicular ad hoc networks using
IEEE Internet Things J. 6 (2019) 5132–5139. meta-heuristic techniques, in: Second ACM International Symposium on Design
[2] O. Senouci, Z. Aliouat, S. Harous, MCA-V2I: A multi-hop clustering approach over and Analysis of Intelligent Vehicular Networks and Applications, DIVANet ’12,
vehicle-to-internet communication for improving VANETs performances, Future New York, NY, 2012, pp. 47–54.
Gener. Comput. Syst. 96 (2019) 309–323. [15] T. Ghosh, S. Mitra, Congestion control by dynamic sharing of bandwidth among
[3] H. Zheng, W. Chang, J. Wu, Traffic flow monitoring systems in smart cities: vehicles in VANET, in: IEEE 12th International Conference on Intelligent Systems
Coverage and distinguishability among vehicles, J. Parallel Distrib. Comput. 127 Design and Applications, ISDA, 2012, pp. 291–296.
(2019) 224–237.
[16] A. Dahiya, R.K. Chauhan, R. Kait, Experimental analysis of AODV and LBV_AODV
[4] M.S.P. Sharma, R.S. Tomar, VANET based communication model for transporta-
with varying vehicle mobility in the vehicular scenario, in: 3rd International
tion systems, in: IEEE Symposium on Colossal Data Analysis and Networking,
Conference on Reliability, Infocom Technologies and Optimization, Noida, 2014,
CDAN, 2016, pp. 1–6.
pp. 1–4.
[5] J. Kim, O. Jo, S.W. Choi, Feasibility of index-coded retransmissions for enhancing
sidelink channel efficiency of V2X communications, IEEE Access 7 (2019) [17] A. Rani, M. Dave, Performance evaluation of modified AODV for load balancing,
6545–6552. J. Comput. Sci. 3 (2007) 863–868.
[6] A. Paranjothi, M.S. Khan, M. Nijim, R. Challoo, MAvanet: Message authentication [18] B. Ding, Z. Chen, Y. Wang, H. Yu, An improved AODV routing protocol for
in VANET using social networks, in: IEEE 7th Annual Ubiquitous Computing, VANETs, in: International Conference on Wireless Communications and Signal
Electronics & Mobile Communication Conference, UEMCON, 2016, pp. 1–8. Processing, WCSP, Nanjing, 2011, pp. 1–5.
[7] A. Paranjothi, M.S. Khan, M. Atiquzzaman, Hybrid-vehcloud: an obstacle shad- [19] O. Abedi, R. Berangi, M.A. Azgomi, Improving route stability and overhead on
owing approach for VANETs in urban environment, in: 2018 IEEE 88th Vehicular AODV routing protocol and make it usable for VANET, in: 29th IEEE Interna-
Technology Conference, VTC-Fall, 2018, pp. 1–5. tional Conference on Distributed Computing Systems Workshops, Montreal, QC,
[8] A. Paranjothi, M.S. Khan, M. Atiquzzaman, DFCV: A novel approach for message 2009, 464–467.
dissemination in connected vehicles using dynamic fog, in: Wired/Wireless [20] B. Li, Y. Liu, G. Chu, Optimized AODV routing protocol for vehicular Ad hoc
Internet Communications, WWIC, 2018, pp. 311–322. networks, Global Mobile Congress, Shanghai, 2010, pp. 1–4.
[9] W.M. Alenazy, W. Mugahed Al-Rahmi, M.S. Khan, Validation of TAM model on
[21] H. Li, A. Guo, G. Li, Geographic and traffic load based routing strategy for VANET
social media use for collaborative learning to enhance collaborative authoring,
in urban traffic environment, in: IET Conference Proceedings, China, 2010, pp.
IEEE Access 7 (2019) 71550–71562.
26–29.
[10] Y. Vardi, Network tomography: Estimating source–destination traffic intensities
from link data, J. Amer. Statist. Assoc. 91 (433) (1996) 365–377. [22] D. Wu, J. Luo, R. Li, A. Regan, Geographic load balancing routing in hybrid
[11] N. Taherkhani, S. Pierre, Improving dynamic and distributed congestion control vehicular ad hoc networks, IEEE 14th International Conference on Intelligent
in vehicular ad hoc networks, Ad Hoc Netw. 33 (2015) 112–125. Transportation Systems, ITSC, Washington, DC, 2011, pp. 2057–2062.
[12] S. Djahel, Y. Ghamri-Doudane, A robust congestion control scheme for the [23] N. Aljeri, K. Abrougui, M. Almulla, A. Boukerche, A Performance evaluation of
fast and reliable dissemination of safety messages in VANETs, in: IEEE Wire- load balancing and QoS-aware gateway discovery protocol for VANETs, in: 27th
less Communications and Networking Conference, WCNC, Shanghai, 2012, pp. International Conference on Advanced Information Networking and Applications
2264–2269. Workshops, Barcelona, 2013, pp. 90–94.

288
A. Paranjothi, M.S. Khan, R. Patan et al. Computer Communications 151 (2020) 275–289

[24] T.P. Van, V.D. Nguyen, Location-aware and load-balanced data delivery at road- Anirudh Paranjothi received the B.E. degree in computer
side units in vehicular ad hoc networks, in: IEEE International Symposium on science from Anna University, Chennai, India in 2014 and
Consumer Electronics, ISCE 2010, Braunschweig, 2010, pp. 1–5. his M.Sc. in computer science from Texas A&M University,
[25] N. Taherkhani, S. Pierre, Prioritizing and scheduling messages for congestion Kingsville in 2016. He is currently a Ph.D. student at the
control in vehicular ad hoc networks, Comput. Netw. 108 (2016) 15–28. University of Oklahoma. His research is Vehicular Ad-hoc
[26] V. Namboodiri, M. Agarwal, L. Gao, A study on the feasibility of mobile gateways Networks (VANET), social networks, Computer networks,
for vehicular ad-hoc networks, in: ACM International Workshop on Vehicular Ad Mobile cloud computing and Software engineering.
Hoc Networks, VANET ’04, ACM, New York, NY, pp. 66–75.
[27] T.-Y. Wu, M.S. Obaidat, H.-L. Chan, QualityScan scheme for load balancing
efficiency in vehicular ad hoc networks (VANETs), J. Syst. Softw. 104 (2015)
60–68. Mohammad S. Khan (SM’ 19) is currently an Assistant
[28] R. Stanica, E. Chaput, A.L. Beylot, Congestion control in CSMA-based vehicular Professor of Computing at East Tennessee State University
networks: do not forget the carrier sensing, in: IEEE 9th Annual Communications and the director of Network Science and Analysis Lab
Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, (NSAL). He received his M.Sc. and Ph.D. in Computer
SECON, Seoul, 2012, pp. 650–658. Science and Computer Engineering from the University of
[29] M. Torrent-Moreno, P. Santi, H. Hartenstein, Distributed fair transmit power Louisville, Kentucky, USA, in 2011 and 2013, respectively.
adjustment for vehicular ad hoc networks, in: IEEE 3rd Annual Communications His primary area of research is in ad-hoc networks, net-
Society on Sensor and Ad Hoc Communications and Networks, Reston, VA, 2006, work tomography, connected vehicles, and vehicular social
pp. 479–488. networks. He currently serves as an associate editor of IEEE
[30] M.Y. Darus, K.A. Bakar, Congestion control algorithm for event-driven safety Access, IET ITS, IET WSS and Springer Telecommunication
messages in vehicular networks, Int. J. Comput. Sci. 8 (2011) 49–53. Systems. He has been on technical program committees of
various international conferences and technical reviewer of
[31] S.I. Fadilah, A. Rahman, A novel adaptive time gap based congestion control for
various international journals in his field. He is a member
vehicular ad hoc network, ARPN J. Eng. Appl. Sci. 10 (2015) 9821–9829.
of IEEE.
[32] T. Bellache, O. Shagdar, S. Kallel, S. Tohme, Reducing channel load by the
enhanced contention-based forwarding in vehicular networks, in: 2017 Inter- Rizwan Patan, is an Assistant Professor in the Depart-
national Conference on Selected Topics in Mobile and Wireless Networking, ment of Computer Science and Engineering, Velagapudi
MoWNeT, Avignon, 2017, pp. 1–6. Ramakrishna Siddhartha Engineering College, Vijayawada,
[33] T. Bellache, O. Shagdar, S. Tohme, An alternative congestion control using an India since 2019. Former Assistant Professor at school of
enhanced contention-based forwarding for vehicular networks, in: 2017 13th computing science and engineering, Galgotias University,
Annual Conference on Wireless On-demand Network Systems and Services, NCR Delhi, Indian from 2017–19. Dr. Rizwan is completed
WONS, Jackson, WY, 2017, pp. 81–87. his Ph.D. (Computer Science and Engineering) in 2017 at
[34] J.T. Willis, A. Jaekel, I. Saini, Decentralized congestion control algorithm for school of computer science and engineering, VIT Univer-
vehicular networks using oscillating transmission power, in: 2017 Wireless sity, Vellore, Tamil Nadu, Indian and B. Tech and M.
Telecommunications Symposium, WTS, Chicago, IL, 2017, pp. 1–5. Tech completed respectively 2012 and 2014 on Jawahar-
[35] C.B. Math, H. Li, S.H. de Groot, I. Niemegeers, Fair decentralized data-rate con- lal Nehru Technological University Anantapur, India. Dr.
Rizwan has published reputed 20 SCI journals and 10
gestion control for V2V communications, in: 2017 24th International Conference
free Scopus indexed journals, and also presented paper in
on Telecommunications, ICT, Limassol, 2017, pp. 1–7.
National/International Conferences, published book chapters
[36] C. Chen, J. Hu, J. Sui, Y. Zhou, An information congestion control scheme on the
in CRC Press, IGI global, Elsevier, and Edited as books.
internet of vehicles: A bargaining game approach, Comput. Electr. Eng. (ISSN:
Dr. Rizwan has ten Indian patents one USA patent. Dr.
0045-7906) 58 (2017) 282–298.
Rizwan is a guest editor for International Journal of Grid
[37] Kashif Naseer Qureshi, Abdul Hanan Abdullah, Omprakash Kaiwartya, Saleem and Utility Computing (Inderscience), Recent Patents on
Iqbal, Rizwan Aslam Butt, Faisal Bashir, A dynamic congestion control scheme Computer Science, Information Medical Unlock (Elsevier).
for safety applications in vehicular ad hoc networks, Comput. Electr. Eng. (ISSN: Neural Computing and Applications (Springer). Dr. Rizwan
0045-7906) (2017) Available online 20 December. received award from world research council and American
[38] M. Khan, A. Kumar, B. Xie, P.K. Sahoo, Network tomography application in a medical Council in the title of innovative researcher on Big
mobile ad-hoc network using stitching algorithm, J. Netw. Comput. Appl. 56 Data and IoT for year 2019.
(2015) 77–87.
[39] M. Khan, A. Kumar, B. Xie, Stitching algorithm: A network performance analysis Reza M. Parizi (SM’ 19) is the director of Decentralized
tool for dynamic mobile networks, Proc. Technol. 3 (2012) 41–51. Science Lab (dSL) in the College of Computing and Software
[40] S. Pan, Z. Zhang, F. Yu, G. Hu, End-to-end measurements for network Engineering at Kennesaw State University, GA, USA. He has
tomography under multipath routing, IEEE Commun. Lett. 18 (5) (2014) served for more than a decade in a variety of industrial and
881–884. academic positions with leading players in cybersecurity and
[41] S. Dhakal, Load Balancing in Delay-Limited Distributed Systems (M.S. thesis), software development (e.g., Oracle). Prior to joining KSU,
he was an Assistant Professor at New York Institute of Tech-
Dept. Elect. Eng, Univ. New Mexico, 2003.
nology (NYIT). He received a Ph.D. in Software Engineering
[42] M.A. Bhuiyan, M. Rahman, M.A. Hasan, Guise: Uniform sampling of graphlets
in 2012 and M.Sc. and B.Sc. degrees in Computer Science
for large graph analysis, in: IEEE 12th International Conference on Data Mining,
respectively in 2008 and 2005. His research interests are
Brussels, 2012, pp. 91–100.
R&D in decentralized computing and blockchain, IoT, AI-
[43] A. Bujari, M. Conti, C. De Francesco, C.E. Palazzi, Fast multi-hop broadcast
powered malware and threat detection, and emerging issues
of alert messages in VANETs: An analytical model, Ad Hoc Netw. 82 (2019) in the practice of secure software-run world applications. He
126–133. is a senior IEEE member, and a member of IEEE Blockchain
[44] A. Paranjothi, M.S. Khan, S. Zeadally, A. Pawar, D. Hicks, GSTR: Secure multi- Community, and ACM
hop message dissemination in connected vehicles using social trust model,
Internet Things 7 (2019) 1–16. Mohammed Atiquzzaman obtained his M.S. and Ph.D. in
[45] B. Michael, B. Laura, E. Jakob, K. Daniel, SUMO–simulation of urban mobility: an Electrical Engineering and Electronics from the University
overview, in: Third International Conference on Advances in System Simulation, of Manchester, Manchester, (UK). He is currently an Edith
SIMUL, Barcelona, 2011, pp. 23–28. Kinney Gaylord Presidential Professor in the School of
[46] B. Amina, E. Mohamed, Performance evaluation of VANETs routing protocols Computer Science at the University of Oklahoma, Norman,
using SUMO and NS3, in: IEEE 5th International Congress on Information Science OK, USA. His research interests are in communications
and Technology, CiSt, Marrakech, 2018, pp. 525–530. switching, transport protocols, wireless and mobile net-
[47] A. Paranjothi, M. Atiquzzaman, M.S. Khan, PMCD: Platoon - merging approach works, ad hoc networks, satellite networks, Quality of
for cooperative driving, Wiley Internet Technol. Lett. 3 (2019) 1–6. Service, and optical communications. Dr. Atiquzzaman is
[48] S. Rezaei, M. Gharib, A. Movaghar, Throughput analysis of IEEE 802.11 multi- the editor-in-chief of Journal of Networks and Computer
Applications, founding Editor-in-Chief of Vehicular Commu-
hop wireless networks with routing consideration: A general framework, IEEE
nications and has served or currently serves on the Editorial
Trans. Commun. 66 (11) (2018) 5430–5443.
Board of various IEEE journals and co-chaired numerous
IEEE inter-national conferences, including the IEEE Global
Communications Conference.

289

You might also like