Professional Documents
Culture Documents
net/publication/314110478
CITATIONS READS
27 242
5 authors, including:
Xi Chen Bin Fu
Wuhan University University of Texas Rio Grande Valley
14 PUBLICATIONS 169 CITATIONS 98 PUBLICATIONS 597 CITATIONS
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Xi Chen on 30 October 2018.
RSU-Assisted Geocast in
Vehicular Ad Hoc Networks
Peng Li, Tao Zhang, Chuanhe Huang, Xi Chen, and Bin Fu
Quadtree Model
To efficiently represent this region, we use a
quadtree model. The definition of quadtree is as
follows.
Definition 1: A quadtree T represents a region.
The root refers to the whole region, and it has
four children. The four children are clockwise to
the four sub-regions, respectively. Each child of
the node is either a sub-quadtree or a leaf.
In order to explain the quadtree structure,
we use different colors to represent the different
regions. As shown in Fig. 2, we use red to refer to (a) (b)
the first level of the four nodes. The root has four
red children in the quadtree. Then we use green Figure 2. An example of region graph and quadtree graph: a) the region graph;
to refer to the second level of nodes. Note that b) the quadtree.
the southeastern corner of the region is not divid-
ed into a sub-region, so it does not have a child.
In the third level, we use blue, and we can see When RSU j receives a Hello packet from vehi-
that there are only three regions that have been cle i, it adds the Vi(vid, v, din, dout, rid, t) to list
divided into sub-regions. In the end, we use the L r. If the difference of current system time and
yellow color to refer to the fourth level of nodes. the timestamp t is above a threshold, the packet
Therefore, we build a quadtree to represent the becomes old, and we delete it from list L v. For
whole region. Note that we do not ensure that RSU-to-vehicle list L r2v, we exploit the idea of
each region has an RSU. The RSUs only need a backward learning algorithm to build list Lr2v.
to know their own regions. They do not have to Every entry RVi of list Lr2v has three fields: RVi(rid,
know their parent region division. If there is no dout, num), where rid is the identifier of the esti-
RSU in some region, the region must be a leaf mated next arrival RSU, dout is the direction of
node. Thus, for all non-leaf nodes of the region, the vehicle leaving the RSU, and num is the statis-
there must be an RSU. We assume that each RSU tic value with initial value set to zero. When RSU j
has a unique identification number. For all the receives a hello packet from vehicle i, it first deter-
non-leaf nodes, we select a gateway RSU to rep- mines whether the tuples RVi(Vi.rid, Vi.din) are in
resent the non-leaf node. list Lr2v. Vi.rid means the RSU id that vehicle meets
for the last time, and Vi.din means the direction of
Vehicle-to-RSU Communication Model the vehicle toward the RSU. If it is not in the list,
To reduce the system overhead, we do not need the RSU adds the RVi(Vi.rid, Vi.din, 1) in list Lr2v.
each vehicle to periodically send hello pack- Otherwise, the RSU updates the num value of this
ets to its neighbors as our geocast is an on-de- entry, that is, num = (num + 1).
mand-based protocol. Different from [3], we only As Fig. 3 shows, there are three RSUs, Ra, Rb
assume that the vehicles and RSUs communicate and Rc, and three vehicles, v1, v2, and v3, in the
with each other when the vehicles are in commu- system. Assume that the vehicle’s trajectories are
nication range of an RSU. shown in the lines with arrows. If v1 comes from Ra
When vehicle i meets an RSU, vehicle i sends and enters RSU Rb toward the north direction, the
a hello packet V i(vid, v, din, dout, rid, t), where entry (Ra, north, 1) is added to the RSU-to-vehicle
vid is the unique identifier of the vehicle, v is the list of Rb. Finally, Rb’s vehicle list is (V1.vid, V1.v,
instantaneous speed of vehicle, din is the direc- V1.din, V1.dout, V1.rid, V1.t), (V2.vid, V2.v, V2.din,
tion of the vehicle toward the RSU, dout is the V2.dout, V2.rid, V2.t), and (V3.vid, V3.v, V3.din,
direction of the vehicle leaving the RSU, rid is the V3.dout, V3.rid, V3.t), and Rb’s RSU-to-vehicle list is
RSU identifier when the vehicle meets the RSU (Ra, north, 1), (Ra, east, 1), and (Rc, north, 1).
for the last time, and t is the current system time-
stamp. As the RSUs are usually deployed at the Problem Formulation
intersection, we set four direction vectors (north, Our problem can be viewed as the geocast prob-
south, west, east) for the system. If the system has lem, that is: Given a piece of message m and a
more directions, we could set more directions. destination area, our goal is to find a minimal vehi-
As RSU j receives the hello packet from Vi, it cle set and RSUs set to forward message m to the
sends acknowledgment packet R j(rid, long, lat, specific vehicle in the given destination area.
regid) to vehicle i, where rid is the unique iden- Let C v and C r denote the cost to forward a
tifier of the RSU, long and lat are the longitude message to a vehicle and an RSU, respectively.
and latitude of the RSU’s location, and regid is the For a forwarding strategy, let Gv and Gr denote
unique identifier of the region. the set of vehicles and RSUs that forward the
Each vehicle maintains an RSU list, Lr, which is message, respectively. Thus, the total cost can be
updated as follows: When vehicle i meets a new defined as Eq. 1:
RSU j, it adds the Rj(rid, long, lat, regid) to list Lr.
Due to the fixed position of the RSUs, we do not C = Cv · |Gv| + Cr · |Gr| (1)
delete the entries of list Lr. After that, each vehicle
knows its visited RSUs’ locations. Our problem asks for the optimal forwarding
Each RSU maintains a vehicle list L v and a strategy of vehicles Gv and RSUs Gr, such that the
RSU-to-vehicle list Lr2v. Lv is updated as follows: total defined cost in Eq. 1 is minimized.
Algorithm Prune(C, R, T): Input: an input of circle Claim 2: There is a constant c0 such that if R1,
of radius r, a node R in T, and a rectangular-de- R2, …, Rm is a pruning list of C of radius r in T, then
composition-tree T; m ≤ c0(r/h).
If R ∩ C = , then return ; Proof: For each a b rectangle R fully inside
If R ⊆ C, then return {R}; C in the pruning list of C, without loss of gener-
else ality, let a ≤ b and b ≤ ka. The distance from the
If R has children R1, R2, R3, R4, center of R to the boundary of C is at most 10b.
then return Prune(C, R1, T) ∪ Prune(C, R2, T) ∪ Otherwise, F(R) is in the pruning list. The number
Prune(C, R3, T) ∪ Prune(C, R4, T); of nodes in the pruning of C of radius r in T is
else return {R} (R is a leaf); at most c(r/a) for some constant c0 by Claim 1.
End of Algorithm Thus, the number of rectangles of the same size
as R in the pruning list of C is at most c1(r/a) for
We have the following theorem that shows the some constant c1. The total number of rectangles
computational time complexity for the algorithm in the list of pruning of C in T is at most
to prune a rectangular decomposition tree.
+∞ ⎛ r ⎞ ⎛ r⎞
Theorem 1: Assume that k is fixed at least 1. ∑ t=0 c1 ⎜ t ⎟ = O ⎜ ⎟ .
⎝ 2 h⎠ ⎝ h⎠
Let h g be the size of least rectangle in a k-rect-
angular decomposition tree T. Then there is an The largest rectangle node in the pruning list
⎛ r r⎞ of C in T is of size at a b with a = O(r) and b
O ⎜ d + log ⎟ = O(r). In tree T, the distance of the largest size
⎝ h h⎠ rectangle in the pruning list to a leaf is O(log (r/h).
time algorithm that generates a pruning of C of This is because that the sizes of rectangles shrink
radius r in T with root R*, where d is the depth of exponentially from a node to its children in the
the tree. tree T. Therefore, the total time is
Proof: For a circle C of radius r, we can prune ⎛ r r⎞
the tree T by a top-down approach by calling the O ⎜ d + log ⎟ .
function Prune(C, R*, T).
⎝ h h⎠
Claim 1: There are at most
⎛ r⎞
Performance Evaluation
O⎜ ⎟ In this section, we evaluate the performance of
⎝ d⎠
our proposed method and present the simulation
rectangles of size a b in T with non-empty inter- results of the algorithm for different situations.
section with C.
Proof: Without loss of generality, assume a ≤ b. Synthetic Simulation Model
We have b ≤ ka by Definition 3. All rectangles of In the synthetic simulation, the area of the region
size a b that have intersection with the bound- area is 100 km 100 km. We assume that there
ary of C are between two circles of radii is no transmission conflict, and both vehicles and
RSUs have infinite buffer to store messages. The
r − 1+ k 2 a and r + 1+ k 2 a, vehicle speed follows the normal distribution
N(m v, s v) where m v = 50 km/s and the default s v
respectively. The two circles are of the same cen- = 30 km/s, and a vehicle can change its speed
ter as that of C. The number of rectangles of size at each road section. The communication range
a b in this region is bounded by of RSUs is 2 km, the number of RSUs is 100, and
the number of vehicles is 100. We assume that
( ) − π(r − )
2 2 one-hop communication delay is 200 ms, and
π r + 1+ k 2 a 1+ k 2 a communication delay between RSUs is 50 ms.
a×b We consider three performance metrics: delivery
cos, delivery delay, and delivery ratio. For delivery
4π 1+ k ra 4π 1+ k 2 r
2
⎛ r⎞ cost, we consider the total number of transmis-
≤ = = O⎜ ⎟ .
a×a a ⎝ a⎠ sions, and we do not count the data delivery cost
for the control overhead for election RSUs in our
Delivery cost
70
100 60
50
50 40
30
0 20
20 40 60 80 100 120 140 160 180 200 0.8 1 1.2 1.4 1.6 1.8 2 2.2 2.4
Number of RSUs Communication range of RSU (km)
(a) (b)
Figure 5. Impact of number of RSUs and communication range: a) delivery cost vs. number of RSUs; b) delivery cost vs. communication
range.
performance evaluation. We investigate the influ- decreases slightly. It is because the system is not
ence of our proposed algorithm and other algo- sensitive to the delivery cost as the communica-
rithms under different number of RSUs, different tion range increases.
communication range, different vehicle speed,
different number of vehicles, and different region Impact of Region Area
area. We compare several algorithms as follows. We investigate how the changes of region area
RSU-Assisted Geocast Algorithm (RAG): Our affect the delivery delay. We select Fig. 6a to
proposed algorithm for geocast problem. We first show the delivery delay under different road area
send the message to the nearest RSU with mini- from 20 km 20 km to 200 km 200 km. Com-
mal cost, then select an optimal RSU to send the pared to other algorithms, our RAG algorithm
message. Finally, the RSU sends the message to always obtains the lower delay in Fig. 6a. Mean-
the specific vehicle in the given area. while, the larger region area leads to the higher
Flood Algorithm (Flood): In this algorithm, the delay. This is because the larger region area yields
vehicle first floods the message to the nearest less opportunity for a vehicle to meet RSUs, lead-
RSU, then the nearest RSU floods the message ing to higher delivery delay.
to all the RSUs in the specific region. Finally, the
RSUs flood the messages to the vehicles in the Impact of Number of Vehicles
given area. We investigate how the changes of number of
Random Algorithm (Random): In this algo- vehicles affect the delivery ratio in Fig. 6b. The
rithm, the vehicle first sends the message to a ran- number of vehicles is from 50 to 500. As shown
dom RSU, then the RSU sends the message to in Fig. 6b, the ratio of our proposed algorithm
a random RSU in the specific region. Finally, the performs better than the Flood algorithm and
random RSU floods the messages to the vehicles worse than the Random algorithm. As the number
in the given area. of vehicles increases, the delivery ratio increases
quickly. This is because the larger number of vehi-
Impact of Number of RSUs cles yields more opportunity for multihop wire-
We investigate how the changes of number of less communication, not for carry-and-forward
RSUs affect the performance of the different algo- communication. This can be understood since
rithms. Figure 5a shows the delivery cost of three with the larger number of vehicles, RAG has a
algorithms under different number of RSUs from higher opportunity to find the specific vehicle in
20 to 200 with an increment of 20. Compared the given area.
to other algorithms, our RAG algorithm always
obtains the minimal cost, as shown in Fig. 5a. Conclusion
In this article, we investigate the geocast problem
Impact of Communication Range in vehicular ad hoc networks, which finds minimal
We investigate how seriously communication cost to relay a message to a specific vehicle in
ranges of RSUs affect the performance of the dif- a given geographical area. We exploit roadside
ferent algorithms. We also use Fig. 5b to show units to help geocast. First, we propose a quadtree
the delivery cost under different communication model that represents a hierarchical decompo-
range of RSUs. The communication range is from sition of the global region. Then we propose a
0.8 to 2.6 km with an increment of 0.2 km. As tree trimming approach to get the intersection
shown in Fig. 5b, even when the communication between the destination area and the quadtree.
range is small, the RAG algorithm still achieves Next, we propose an election approach that
good performance (e.g., when communication selects an optimal RSU to forward the message
range is 0.8 km). As the communication range to the destination area based on the quadtree
increases, the delivery cost of all algorithms model. Simulation results show the effectiveness
600
200 30
100 20
0 10
20 40 60 80 100 120 140 160 180 200 50 100 150 200 250 300 350 400 450 500
Region width (km) Number of vehicles
(a) (b)
Figure 6. Impact of communication range and number of vehicles: a) delivery delay vs. region area; b) delivery ratio vs. number of vehicles.
of our methods under different environments. As [14] K. L. Tseng and T. P. Wang, “Overhead Reduction for
Duplicate Address Detection in VANET,” Proc. 2013 Int’l.
future work, we will explore how to effectively Conf. Parallel and Distrib. Systems, 2013, Dec. 2013, pp.
geocast under different forwarding models. 582–86.
[15] S. Kumar et al., “Carspeak: A Content-Centric Network for
Acknowledgment Autonomous Driving,” SIGCOMM Comput. Commun. Rev.,
vol. 42, no. 4, Aug. 2012, pp. 259–70.
This work was supported by the National Science
Foundation of China (Nos. 61502359, 61572370, Biographies
61373040, and 61303117). This research was Peng Li (lipeng@wust.edu.cn) received his B.S. degree in com-
also supported in part by National Science Foun- puter science and technology from Wuhan University of Tech-
dation Early Career Award 0845376 and the Ben- nology, China, in 2003, his M.S. degree in computer science
from Huazhong University of Science and Technology, Wuhan,
sten Fellowship of the University of Texas -Rio China, in 2006, and his Ph.D. degree in computer science from
Grande Valley. Wuhan University in 2015. He is currently a visiting scholar with
the University of Calgary, Canada. He is also an associate pro-
References fessor with Wuhan University of Science and Technology. His
[1] C. Maihofer, “A Survey of Geocast Routing Protocols,” IEEE research interests include vehicular networks, mobile comput-
Commun. Surveys & Tutorials, vol. 6, no. 2, Second Qtr. ing, and cloud computing.
2004, pp. 32–42.
[2] Y. Wu, Y. Zhu, and B. Li, “Infrastructure-Assisted Routing Tao Zhang [M’05, SM’07] (tzhang@nyit.edu) received her M.S.
in Vehicular Networks,” Proc. 2012 IEEE INFOCOM, Mar. and Ph.D. degrees in computer science from the University of
2012, pp. 1485–93. Texas at Dallas in 2003 and 2005, respectively. She joined the
[3] K. Mershad, H. Artail, and M. Gerla, “We Can Deliver Mes- faculty of New York Institute of Technology at Old Westbury in
sages to Far Vehicles,” IEEE Trans. Intelligent Transportation 2005. She is currently a professor of computer science at New
Systems, vol. 13, no. 3, Sept. 2012, pp. 1099–1115. York Institute of Technology. Her research interest spans wireless
[4] J. P. Jeong, T. He, and D. H. Du, “TMA: Trajectory-Based communication and networking, cloud computing, WDM optical
Multi-Anycast Forwarding for Efficient Multicast Data Deliv- networks, and network security focusing on the design and anal-
ery in Vehicular Networks,” Computer Networks, vol. 57, ysis of network architectures and protocols. She was the Principal
no. 13, 2013, pp. 2549–63. Investigator of two National Science Foundation (NSF) funded
[5] H. Zhu et al., “Zoom: Scaling the Mobility for Fast Oppor- projects. She currently serves on the NSF Proposal Review Panel.
tunistic Forwarding in Vehicular Networks,” Proc. 2013 IEEE
INFOCOM, April 2013, pp. 2832–40. C huanhe H uang (huangch@whu.edu.cn) received his B.S.,
[6] Y. Li and W. Wang, “Horizon on the Move: Geocast in Inter- M.S., and Ph.D. degrees in Computer Science from Wuhan
mittently Connected Vehicular Ad Hoc Networks,” Proc. University in 1985, 1988, and 2002, respectively. He is currently
2013 IEEE INFOCOM, April 2013, pp. 2553–61. a professor and Ph.D. supervisor at the School of Computers,
[7] R. Jiang et al., “Tmc: Exploiting Trajectories for Multicast in Wuhan University. His research interests include SDN, oppor-
Sparse Vehicular Networks,” IEEE Trans. Parallel Distrib. Sys- tunistic networks, and wireless networks, focusing on cryptogra-
tems, vol. 26, no. 1, Jan. 2015, pp. 262–71. phy, wireless security, and trust management.
[8] R. Jiang et al., “Exploiting Trajectory-Based Coverage for
Geocast in Vehicular Networks,” IEEE Trans. Parallel Distrib. X i C hen (chenxi_cs@whu.edu.cn) is working for his Ph.D. in
Systems, vol. 25, no. 12, Dec. 2014, pp. 3177–89. computer system architecture at Wuhan University. He received
[9] F. Zhang et al., “On Geocasting over Urban Bus-Based Net- his B.Sc. degree in computer science and technology from
works by Mining Trajectories,” IEEE Trans. Intelligent Trans- Wuhan University in 2011. His research interests are in the area
portation Systems, vol. 17, no. 6, June 2016, pp. 1734–47. of wireless networks, with an emphasis on the design and opti-
[10] K. Liu et al., “Cooperative Data Scheduling in Hybrid Vehicular mization of medium access control protocols for long-distance
Ad Hoc Networks: Vanet as a Software Defined Network,” wireless network.
IEEE/ACM Trans. Net., vol. 24, no. 3, June 2016, pp. 1759–73.
[11] Y. Li et al., “Contact-Aware Data Replication in Roadside Bin Fu (bin.fu@utrgv.edu) received his B.S. and M.S. degrees in
Unit Aided Vehicular Delay Tolerant Networks,” IEEE Trans. computer science from Wuhan University in 1985 and 1988,
Mobile Computing, vol. 15, no. 2, Feb. 2016, pp. 306–21. respectively, and his Ph.D. degree in computer science in 1998
[12] H. Zheng and J. Wu, “Optimizing Roadside Advertisement from Yale University, where he finished his Ph.D. dissertation,
Dissemination in Vehicular Cyber-Physical Systems,” Proc. Volume Bounded Molecular Computing, under the supervision
2015 35th IEEE Conf. Distributed Computing Systems, June of Dr. Richard Beigel. He is currently a professor at the Univer-
2015, pp. 41–50. sity of Texas Rio Grande Valley. His research interests include
[13] L. Zhang, B. Yu, and J. Pan, “Geomob: A Mobility-Aware the fields of algorithms, bioinformatics, complexity theory, and
Geocast Scheme in Metropolitans via Taxicabs and Buses,” molecular computing. He received the U.S. National Science
Proc. IEEE INFOCOM 2014, Apr. 2014, pp. 1279–1787. Foundation Early Career Award (2009–2014).