You are on page 1of 8

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/314110478

RSU-Assisted Geocast in Vehicular Ad Hoc Networks

Article in IEEE Wireless Communications · February 2017


DOI: 10.1109/MWC.2017.1600192WC

CITATIONS READS

27 242

5 authors, including:

Xi Chen Bin Fu
Wuhan University University of Texas Rio Grande Valley
14 PUBLICATIONS 169 CITATIONS 98 PUBLICATIONS 597 CITATIONS

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

NSF Early Career View project

All content following this page was uploaded by Xi Chen on 30 October 2018.

The user has requested enhancement of the downloaded file.


A rchitecture for N ext G eneration W ireless N etworks :
S calability , F lexibilty , and I nteroperability

RSU-Assisted Geocast in
Vehicular Ad Hoc Networks
Peng Li, Tao Zhang, Chuanhe Huang, Xi Chen, and Bin Fu

Abstract other vehicles either directly, if they are within


each other’s transmission range, or through RSUs
Geocast, delivering a message to nodes within otherwise. These units are wireless nodes with
a geographical region, is an important issue in store-and-forward capabilities placed along vehi-
VANETs. In this article, we address the geocast cles’ routes that exchange data with vehicles that
problem in VANETs. Given a piece of a message, pass through the node. Therefore, they increase
we must find the minimal cost to relay the mes- the probability of connectivity in the network and
sage to a specific vehicle in a given geographical improve the overall network performance. Mean-
area. To solve this problem, we propose an RSU while, forwarding schemes can be efficient with
RAG approach for VANETs. We use a quadtree considering vehicles mobility patterns, such as
model that represents a hierarchical decompo- trajectory-based mobility or social-aware mobil-
sition of the global region. Then we propose a ity. There are some approaches that exploit the
tree trimming approach to search the intersection vehicle’s mobility pattern and the RSU-assisted
between the destination area and the quadtree. routing or geocasting [2–4]. However, most tra-
Based on the quadtree model, we propose an jectory-based approaches do not consider privacy
election approach that selects an optimal RSU to protection for exchanging trajectory information
forward the message to the destination area. The- between vehicles. Even vehicles do not release
oretical analysis is given about the complexity to their trajectories to other vehicles for privacy
search the quadtree. Extensive simulations show concerns in RSU-assisted routing, they release
that the performance of our proposed method is their trajectory to RSUs or a traffic control center
superior to other approaches. (TCC). In practice, most users will not input the
destination information if they are familiar with
Introduction the road paths. Thus, the previous approaches are
Vehicular ad hoc networks (VANETs) have recent- difficult to implement in practical applications.
ly attracted a lot of attention. In VANETs, geo- In this article, we study the geocast problem
cast is a task of sending a message from a source in VANETs. Given a piece of a message and a
node to a specific location, which is important for specific area, find a minimum cost to relay the
many applications, including accident warning, information such that the message is delivered
geographic advertising, and so on. The design of to a given vehicle within the specific area. As
reliable and efficient geocast protocols is essen- the delay of sending the message through the
tial for such applications in VANETs. The tradi- fixed RSU network is much less than through the
tional geocast protocols applied in the area of VANETs, we use RSUs to help geocast for the
ad hoc networks are divided into two categories, basic motivation. Meanwhile, we do not need the
non-flooding approaches and flooding approach- vehicle to input its trajectory information based
es [1]. However, neither of them is suitable for on consideration of privacy protection. Therefore,
VANETs for the following reasons: First, non-flood- the approach is easier to achieve in practice. Our Peng Li is with Wuhan
ing approaches require a fixed network or net- problem is different from the previous geocast University of Science and
Technology and the Hubei
work topology information, neither of which is work in the following aspects: Province Key Laboratory of
well implemented as the nodes move fast and • We consider RSU-assisted geocast, and our sys- Intelligent Information
network topology changes quickly in VANETs. tem does not need users to input their trajecto- Processing and Real-time
Second, the communication mode (e.g., vehi- ry information. Industrial System.
cle-to-vehicle or vehicle-to-infrastructure) is differ- • We consider minimal cost information dissemi- Tao Zhang is with New York
ent from ad hoc networks, and vehicle movement nation, which is desirable for many applications Institute of Technology.
has some certain mobility pattern such as trajecto- in vehicular networks.
ry-based mobility. Without considering the com- The main contributions of this article are as fol- Chuanhe Huang and Xi Chen
are with Wuhan University.
munication mode and the mobility patterns, the lows:
flooding approaches cause tremendous overhead • We propose a quadtree model that uses a Bin Fu is with the University
in VANETs. Third, the previous approaches do not quadtree to represent a hierarchical decompo- of Texas Rio Grande Valley.
consider using roadside units (RSUs) to help geo- sition of the global region. Then we propose a
cast, which is more efficient in vehicular networks. tree trimming approach to get the intersection Digital Object Identifier:
In VANETs, a vehicle can communicate with between the destination area and the quadtree. 10.1109/MWC.2017.1600192WC

IEEE Wireless Communications • February 2017 1536-1284/17/$25.00 © 2017 IEEE 53


problem. Zheng et al. [12] not only studied the
mobile advertising problem, but also maximized
the RSU placement problem to attract potential
customers.
There is some recent work on RSU-assisted
geocast [3, 4, 13]. Zhang et al. [13] exploited
bus and taxi mobility patterns to help geocast.
The work in [3, 4] is closely related to our prob-
lem. Mershad et al. [3] exploited the infrastruc-
ture of RSUs to efficiently and reliably deliver
messages to distant vehicles. However, they did
not consider privacy protection for exchanging
trajectory information between vehicles. Jeong
s et al. [4] exploited the RSUs and relay nodes for
(a) (b) efficient data delivery in vehicle networks. They
considered privacy protection and released the
Figure 1. System model: a) the region area; b) the region division. trajectory information to a traffic central serv-
er. However, there is no traffic central server in
many suburbs. For that reason, we exploit RSUs
• Based on the quadtree model, we propose an to help geocasting while considering privacy pro-
election approach that selects an optimal RSU tection without using a central server. Also, there
to forward the message to the destination area. is some work about quadtree-based or octree-
Meanwhile, we give a case study about the tree based methods [14, 15] in VANETs. Li et al. [14]
trimming approach to search the quadtree. proposed a grid-based duplicate address detec-
• We conduct an extensive simulation over differ- tion (GDAD) scheme with a quadtree-based
ent traffic data to evaluate the performance of method in VANETs. Kumar et al. [15] used an
the proposed methods. Simulation results show octree to represent different regions in the world.
that the methods can significantly reduce the However, they did not exploit a quadtree-based
total cost, compared to other geocast methods. method to geocast routing. To the best of our
The rest of this article is organized as follows. knowledge, this is the first work that exploits RSUs
Previous studies are summarized in the following and quadtree to perform efficient geocast in the
section. We then present the system model and literature.
the problem. Following that we give a detailed
description of our geocast algorithms. Then we
evaluate our proposed approach by comparing it
System Model and
in different environments. We conclude this arti- Problem Formulation
cle in the final section. In this section, we present the quadtree model
to efficiently represent the whole region. Then
Related work we state the communication model and problem
Nowadays, there are many algorithms for data formulation.
delivery, message dissemination, multicast, and
geocast routing protocols in VANETs [5–9]. Assumption
Zhu et al. [5] found that pairwise contacts have In the system, we assume that RSUs have been
strong temporal correlation, and they exploited deployed in advance. RSUs are interconnected
the mobility patterns to help data delivery. Li and by wired lines, which are gateways integrating
Wang [6] considered spatial and temporal limits the vehicular network and wired network. Each
of geocast, and they defined the dissemination RSU has dedicated short-range communications
distance and hitting time in geocast. Based on (DSRC), storage, and processing capability to for-
the definition, they derived the lower and upper ward messages to vehicles. Vehicles are equipped
bounds for the distance and time. Jiang et al. pro- with onboard units (OBUs). The vehicles can
posed TMC [7] and CAG [8], which considered communicate with RSUs and other vehicles by
vehicular trajectory to help multicast or geocast OBUs. Therefore, there are two communication
routing. Zhang et al. [9] focused on bus-based modes: one is vehicle-to-vehicle communication
VANETs, and they exploited the bus trajectories (V2V), and the other is vehicle-to-RSU communi-
to geocast. cation (V2R). As shown in Fig. 1a there are some
The work in [2, 10–12] is about RSU-assisted RSUs deployed in a region, and a source vehicle s
routing, data scheduling, and advertisement dis- wants to send a message to the specific vehicle in
semination. Wu et al. [2] investigated the optimal the given dark green area. The problem is how to
infrastructure-assisted routing for inter-vehicle data efficiently transmit to the destination at low cost
delivery. They considered the packet forwarding as fast as possible.
and buffer allocation problem and designed a We assume that the region has an intrinsic par-
global algorithm to solve the optimization prob- tition based on geography position. We do not
lem. Liu et al. [10] studied the cooperative data require that the region division be uniform, but in
scheduling problem, and proved that the cooper- accordance with the intrinsic characteristics of the
ative data scheduling problem was NP-hard. Then geographical position. The partition granularity
they proposed several algorithms to solve it. Li et is small for some hotspots while large for some
al. [11] considered the problem of data replica- less popular areas. As shown in Fig. 1b, we divide
tion for RSU-aided vehicular networks. They for- the region into squares recursively. The south-
mulated the problem as an optimization problem eastern corner of the region is less popular, so it
and proposed a heuristic algorithm to solve the does not have a sub-region. Note that if there is

54 IEEE Wireless Communications • February 2017


no deployed RSU in a region, we will not further
divide the region.

Quadtree Model
To efficiently represent this region, we use a
quadtree model. The definition of quadtree is as
follows.
Definition 1: A quadtree T represents a region.
The root refers to the whole region, and it has
four children. The four children are clockwise to
the four sub-regions, respectively. Each child of
the node is either a sub-quadtree or a leaf.
In order to explain the quadtree structure,
we use different colors to represent the different
regions. As shown in Fig. 2, we use red to refer to (a) (b)
the first level of the four nodes. The root has four
red children in the quadtree. Then we use green Figure 2. An example of region graph and quadtree graph: a) the region graph;
to refer to the second level of nodes. Note that b) the quadtree.
the southeastern corner of the region is not divid-
ed into a sub-region, so it does not have a child.
In the third level, we use blue, and we can see When RSU j receives a Hello packet from vehi-
that there are only three regions that have been cle i, it adds the Vi(vid, v, din, dout, rid, t) to list
divided into sub-regions. In the end, we use the L r. If the difference of current system time and
yellow color to refer to the fourth level of nodes. the timestamp t is above a threshold, the packet
Therefore, we build a quadtree to represent the becomes old, and we delete it from list L v. For
whole region. Note that we do not ensure that RSU-to-vehicle list L r2v, we exploit the idea of
each region has an RSU. The RSUs only need a backward learning algorithm to build list Lr2v.
to know their own regions. They do not have to Every entry RVi of list Lr2v has three fields: RVi(rid,
know their parent region division. If there is no dout, num), where rid is the identifier of the esti-
RSU in some region, the region must be a leaf mated next arrival RSU, dout is the direction of
node. Thus, for all non-leaf nodes of the region, the vehicle leaving the RSU, and num is the statis-
there must be an RSU. We assume that each RSU tic value with initial value set to zero. When RSU j
has a unique identification number. For all the receives a hello packet from vehicle i, it first deter-
non-leaf nodes, we select a gateway RSU to rep- mines whether the tuples RVi(Vi.rid, Vi.din) are in
resent the non-leaf node. list Lr2v. Vi.rid means the RSU id that vehicle meets
for the last time, and Vi.din means the direction of
Vehicle-to-RSU Communication Model the vehicle toward the RSU. If it is not in the list,
To reduce the system overhead, we do not need the RSU adds the RVi(Vi.rid, Vi.din, 1) in list Lr2v.
each vehicle to periodically send hello pack- Otherwise, the RSU updates the num value of this
ets to its neighbors as our geocast is an on-de- entry, that is, num = (num + 1).
mand-based protocol. Different from [3], we only As Fig. 3 shows, there are three RSUs, Ra, Rb
assume that the vehicles and RSUs communicate and Rc, and three vehicles, v1, v2, and v3, in the
with each other when the vehicles are in commu- system. Assume that the vehicle’s trajectories are
nication range of an RSU. shown in the lines with arrows. If v1 comes from Ra
When vehicle i meets an RSU, vehicle i sends and enters RSU Rb toward the north direction, the
a hello packet V i(vid, v, din, dout, rid, t), where entry (Ra, north, 1) is added to the RSU-to-vehicle
vid is the unique identifier of the vehicle, v is the list of Rb. Finally, Rb’s vehicle list is (V1.vid, V1.v,
instantaneous speed of vehicle, din is the direc- V1.din, V1.dout, V1.rid, V1.t), (V2.vid, V2.v, V2.din,
tion of the vehicle toward the RSU, dout is the V2.dout, V2.rid, V2.t), and (V3.vid, V3.v, V3.din,
direction of the vehicle leaving the RSU, rid is the V3.dout, V3.rid, V3.t), and Rb’s RSU-to-vehicle list is
RSU identifier when the vehicle meets the RSU (Ra, north, 1), (Ra, east, 1), and (Rc, north, 1).
for the last time, and t is the current system time-
stamp. As the RSUs are usually deployed at the Problem Formulation
intersection, we set four direction vectors (north, Our problem can be viewed as the geocast prob-
south, west, east) for the system. If the system has lem, that is: Given a piece of message m and a
more directions, we could set more directions. destination area, our goal is to find a minimal vehi-
As RSU j receives the hello packet from Vi, it cle set and RSUs set to forward message m to the
sends acknowledgment packet R j(rid, long, lat, specific vehicle in the given destination area.
regid) to vehicle i, where rid is the unique iden- Let C v and C r denote the cost to forward a
tifier of the RSU, long and lat are the longitude message to a vehicle and an RSU, respectively.
and latitude of the RSU’s location, and regid is the For a forwarding strategy, let Gv and Gr denote
unique identifier of the region. the set of vehicles and RSUs that forward the
Each vehicle maintains an RSU list, Lr, which is message, respectively. Thus, the total cost can be
updated as follows: When vehicle i meets a new defined as Eq. 1:
RSU j, it adds the Rj(rid, long, lat, regid) to list Lr.
Due to the fixed position of the RSUs, we do not C = Cv · |Gv| + Cr · |Gr| (1)
delete the entries of list Lr. After that, each vehicle
knows its visited RSUs’ locations. Our problem asks for the optimal forwarding
Each RSU maintains a vehicle list L v and a strategy of vehicles Gv and RSUs Gr, such that the
RSU-to-vehicle list Lr2v. Lv is updated as follows: total defined cost in Eq. 1 is minimized.

IEEE Wireless Communications • February 2017 55


In the second phase, we should find an RSU
Vehicle trajectory that has the highest probability to transmit the mes-
sage to the destination vehicle. We first find the
RSU set CR of the RSUs from the tree trimming set
CT; then we build the set of destination RSUs Cd
that have meet the destination vehicle vd. If an RSU
Ri meets vehicle vd, the information of vd will be
added to its vehicle list Lv. We add RSU Ri to the
set of destination RSUs Cd. If the set of destination
RSUs Cd is not an empty set, all RSUs elect an Rd
Rb
from Cd that has the minimal encounter time with
the destination vehicle vd. Otherwise, we should
expand the given destination area.
Step 3: From a Destination RSU to a Vehicle:
Finally, the destination RSU R d should transmit
V1 Ra Rc V3 message m to the destination vehicle. The des-
tination RSU R d gets the i d, latitude, longitude,
speed, direction out of RSU Rd, and timestamp
of vd from D’s latest hello packet. We use three
V2 steps as [3] proposed. How we differ from them is
that RSU Rd first estimates the current destination
Figure 3. An example of an RSU’s list. region r d and the next arrival of RSU R’d. Since
the destination RSU maintains the vehicle list Lv
Our Solution and RSU-to-vehicle list L r2v, it can estimate the
current position of vd and give an estimated area
In this section, we first give an overview of our according to the speed of the vehicle. Accord-
solution, then present a case study for the pro- ing to the vehicle’s direction out of RSU R d, Rd
posed approach in the last section. finds the maximum possibility to the next arrival of
RSU R’d. Then the operations of vehicles outside
Overview of the estimated area and inside of the estimated
In order to solve the geocast problem, we pro- area are the same as [3]. Finally, when the desti-
pose our RSU Assisted Geocast (RAG) approach. nation vehicle receives the message, it sends an
The RAG approach has three steps: Acknowledgment message to the nearest RSUs.
1. A source vehicle sends the message to its near-
est RSU. A Case Study
2. The nearby RSU receives the message, then the In this subsection, we show a case study of the pro-
nearest RSU transmits the message to the desti- posed tree trimming approach. As shown in Fig. 4,
nation RSU. we use yellow to represent the source region and
3. The destination RSU sends the message to the blue to represent the destination area. The tree
destination vehicles. trimming algorithm searches for the quadtree’s
Step 1: From Source Vehicle to Its Nearest root, as the root region covers the destination area
RSU: When source vehicle v s wants to send a and source region. Note that we do not always
message m to its nearest RSU Rn, it determines search for the root region, but search for an inter-
whether Rn is within its communication range. If mediate node as long as it covers the destination
so, vs sends m to Rn directly. Otherwise, it finds area and source region. Then we use depth-first
whether it has a neighbor vn closer to Rs. If it finds search and build the set of clip regions as the blue
one, vs sends the message m to vn, drops the mes- nodes shown. In order to reduce the complexity,
sage, and lets vn be vs. Otherwise, vs keeps the we delete eight gray nodes and add their parents
message until it meets a neighbor closer to Rn. to the set of the tree trimming. At the end of the
Step 2: From a Nearest RSU to a Destination tree trimming, we determine a destination region
RSU: Next, the nearest RSU should transmit the mes- efficiently based on the given destination area.
sage m to the destination RSU. The RSU-to-RSU algo-
rithm has two phases. In the first phase, we should Complexity Analysis
determine a destination region based on the given In this subsection, we give some definitions and
destination area. We denote Rs and gd as the source theoretical analysis about the tree trimming algo-
RSU and destination region, respectively, and denote rithm. We develop an algorithm that selects a list
Parent(gc) as the parent node of the current region of squares from the quadtree to cover a circular
node gc. Based on quadtree T, we propose a tree region.
trimming approach. First, as each RSU maintains a Definition 2: A decomposition of an a  b rect-
region list Lr, it finds its own region according to the angular region R is partitioned into four equal size
source RSU. If its own region does not contain the rectangles R1, R2, R3, R4 of size
destination areas, the algorithm keeps up the search
a b
for its parent region until the current region contains × .
the destination areas gd. Then the algorithm uses 2 2 .
depth-first search to determine whether each leaf It is called rectangular decomposition. Define func-
region gf intersects with the destination area gd, if so, tions F(Ri) = R for i = 1, 2, 3, 4 and S(R,i) = Ri for
this leaf region gf is added to the tree trimming set CT. i = 1, 2, 3, 4.
If all the leaf regions gf are covered by the destination Definition 3: Given a rectangular region R* to
areas gd, we add the parent of the leaf region and be the root of a tree T, for each internal node R
delete all the covered leaf regions. in tree T, it has four children R 1, R 2, R 3, and R 4

56 IEEE Wireless Communications • February 2017


that form a rectangular decomposition of R. We
call tree T to be a rectangular-decomposition-tree
(RD-Tree) for R*. If R is of size a  b with a ≤ kb
and b ≤ ka, it is called a k-rectangular-decomposi-
tion-tree. A square-decomposition-tree is a 1-rect-
angular-decomposition-tree.
Definition 4: For a circle C and a rectangu-
lar-decomposition-tree T, a pruning of C in T is a
subset of nodes R1, …, Rm (rectangles) in T that
satisfies the following conditions:
1. C ⊆ R1 ∪ R2 ∪… Rm;
2. For each Ri (i = 1, 2, …, m), Ri ∩ C ≠ ;
3. If Ri ⊆ C, then F(Ri) ⊆/ C;
4. For each pair of Ri and Rj, Ri ⊆ / Rj; and
5. If Ri ⊆
/ C, then Ri is a leaf in T. (a) (b)
We give a recursive description about how to
prune a rectangular decomposition tree with a Figure 4. An example of intersection region and quadtree; a) the intersection
circle. region of destination; b) the intersection node of quadtree.

Algorithm Prune(C, R, T): Input: an input of circle Claim 2: There is a constant c0 such that if R1,
of radius r, a node R in T, and a rectangular-de- R2, …, Rm is a pruning list of C of radius r in T, then
composition-tree T; m ≤ c0(r/h).
If R ∩ C = , then return ; Proof: For each a  b rectangle R fully inside
If R ⊆ C, then return {R}; C in the pruning list of C, without loss of gener-
else ality, let a ≤ b and b ≤ ka. The distance from the
If R has children R1, R2, R3, R4, center of R to the boundary of C is at most 10b.
then return Prune(C, R1, T) ∪ Prune(C, R2, T) ∪ Otherwise, F(R) is in the pruning list. The number
Prune(C, R3, T) ∪ Prune(C, R4, T); of nodes in the pruning of C of radius r in T is
else return {R} (R is a leaf); at most c(r/a) for some constant c0 by Claim 1.
End of Algorithm Thus, the number of rectangles of the same size
as R in the pruning list of C is at most c1(r/a) for
We have the following theorem that shows the some constant c1. The total number of rectangles
computational time complexity for the algorithm in the list of pruning of C in T is at most
to prune a rectangular decomposition tree.
+∞ ⎛ r ⎞ ⎛ r⎞
Theorem 1: Assume that k is fixed at least 1. ∑ t=0 c1 ⎜ t ⎟ = O ⎜ ⎟ .
⎝ 2 h⎠ ⎝ h⎠
Let h  g be the size of least rectangle in a k-rect-
angular decomposition tree T. Then there is an The largest rectangle node in the pruning list
⎛ r r⎞ of C in T is of size at a  b with a = O(r) and b
O ⎜ d + log ⎟ = O(r). In tree T, the distance of the largest size
⎝ h h⎠ rectangle in the pruning list to a leaf is O(log (r/h).
time algorithm that generates a pruning of C of This is because that the sizes of rectangles shrink
radius r in T with root R*, where d is the depth of exponentially from a node to its children in the
the tree. tree T. Therefore, the total time is
Proof: For a circle C of radius r, we can prune ⎛ r r⎞
the tree T by a top-down approach by calling the O ⎜ d + log ⎟ .
function Prune(C, R*, T).
⎝ h h⎠
Claim 1: There are at most
⎛ r⎞
Performance Evaluation
O⎜ ⎟ In this section, we evaluate the performance of
⎝ d⎠
our proposed method and present the simulation
rectangles of size a  b in T with non-empty inter- results of the algorithm for different situations.
section with C.
Proof: Without loss of generality, assume a ≤ b. Synthetic Simulation Model
We have b ≤ ka by Definition 3. All rectangles of In the synthetic simulation, the area of the region
size a  b that have intersection with the bound- area is 100 km  100 km. We assume that there
ary of C are between two circles of radii is no transmission conflict, and both vehicles and
RSUs have infinite buffer to store messages. The
r − 1+ k 2 a and r + 1+ k 2 a, vehicle speed follows the normal distribution
N(m v, s v) where m v = 50 km/s and the default s v
respectively. The two circles are of the same cen- = 30 km/s, and a vehicle can change its speed
ter as that of C. The number of rectangles of size at each road section. The communication range
a  b in this region is bounded by of RSUs is 2 km, the number of RSUs is 100, and
the number of vehicles is 100. We assume that

( ) − π(r − )
2 2 one-hop communication delay is 200 ms, and
π r + 1+ k 2 a 1+ k 2 a communication delay between RSUs is 50 ms.
a×b We consider three performance metrics: delivery
cos, delivery delay, and delivery ratio. For delivery
4π 1+ k ra 4π 1+ k 2 r
2
⎛ r⎞ cost, we consider the total number of transmis-
≤ = = O⎜ ⎟ .
a×a a ⎝ a⎠ sions, and we do not count the data delivery cost
for the control overhead for election RSUs in our

IEEE Wireless Communications • February 2017 57


250 120
RAG
Flood 110
Random
200 100
RAG
90 Flood
Random
150 80
Delivery cost

Delivery cost
70

100 60

50

50 40

30

0 20
20 40 60 80 100 120 140 160 180 200 0.8 1 1.2 1.4 1.6 1.8 2 2.2 2.4
Number of RSUs Communication range of RSU (km)
(a) (b)

Figure 5. Impact of number of RSUs and communication range: a) delivery cost vs. number of RSUs; b) delivery cost vs. communication
range.

performance evaluation. We investigate the influ- decreases slightly. It is because the system is not
ence of our proposed algorithm and other algo- sensitive to the delivery cost as the communica-
rithms under different number of RSUs, different tion range increases.
communication range, different vehicle speed,
different number of vehicles, and different region Impact of Region Area
area. We compare several algorithms as follows. We investigate how the changes of region area
RSU-Assisted Geocast Algorithm (RAG): Our affect the delivery delay. We select Fig. 6a to
proposed algorithm for geocast problem. We first show the delivery delay under different road area
send the message to the nearest RSU with mini- from 20 km  20 km to 200 km  200 km. Com-
mal cost, then select an optimal RSU to send the pared to other algorithms, our RAG algorithm
message. Finally, the RSU sends the message to always obtains the lower delay in Fig. 6a. Mean-
the specific vehicle in the given area. while, the larger region area leads to the higher
Flood Algorithm (Flood): In this algorithm, the delay. This is because the larger region area yields
vehicle first floods the message to the nearest less opportunity for a vehicle to meet RSUs, lead-
RSU, then the nearest RSU floods the message ing to higher delivery delay.
to all the RSUs in the specific region. Finally, the
RSUs flood the messages to the vehicles in the Impact of Number of Vehicles
given area. We investigate how the changes of number of
Random Algorithm (Random): In this algo- vehicles affect the delivery ratio in Fig. 6b. The
rithm, the vehicle first sends the message to a ran- number of vehicles is from 50 to 500. As shown
dom RSU, then the RSU sends the message to in Fig. 6b, the ratio of our proposed algorithm
a random RSU in the specific region. Finally, the performs better than the Flood algorithm and
random RSU floods the messages to the vehicles worse than the Random algorithm. As the number
in the given area. of vehicles increases, the delivery ratio increases
quickly. This is because the larger number of vehi-
Impact of Number of RSUs cles yields more opportunity for multihop wire-
We investigate how the changes of number of less communication, not for carry-and-forward
RSUs affect the performance of the different algo- communication. This can be understood since
rithms. Figure 5a shows the delivery cost of three with the larger number of vehicles, RAG has a
algorithms under different number of RSUs from higher opportunity to find the specific vehicle in
20 to 200 with an increment of 20. Compared the given area.
to other algorithms, our RAG algorithm always
obtains the minimal cost, as shown in Fig. 5a. Conclusion
In this article, we investigate the geocast problem
Impact of Communication Range in vehicular ad hoc networks, which finds minimal
We investigate how seriously communication cost to relay a message to a specific vehicle in
ranges of RSUs affect the performance of the dif- a given geographical area. We exploit roadside
ferent algorithms. We also use Fig. 5b to show units to help geocast. First, we propose a quadtree
the delivery cost under different communication model that represents a hierarchical decompo-
range of RSUs. The communication range is from sition of the global region. Then we propose a
0.8 to 2.6 km with an increment of 0.2 km. As tree trimming approach to get the intersection
shown in Fig. 5b, even when the communication between the destination area and the quadtree.
range is small, the RAG algorithm still achieves Next, we propose an election approach that
good performance (e.g., when communication selects an optimal RSU to forward the message
range is 0.8 km). As the communication range to the destination area based on the quadtree
increases, the delivery cost of all algorithms model. Simulation results show the effectiveness

58 IEEE Wireless Communications • February 2017


1000 100
RAG
900 Flood
Random 90 RAG
800 Flood
80 Random
700
70
Delivery delay (s)

600

Delivery ratio (%)


60
500
50
400
40
300

200 30

100 20

0 10
20 40 60 80 100 120 140 160 180 200 50 100 150 200 250 300 350 400 450 500
Region width (km) Number of vehicles
(a) (b)

Figure 6. Impact of communication range and number of vehicles: a) delivery delay vs. region area; b) delivery ratio vs. number of vehicles.

of our methods under different environments. As [14] K. L. Tseng and T. P. Wang, “Overhead Reduction for
Duplicate Address Detection in VANET,” Proc. 2013 Int’l.
future work, we will explore how to effectively Conf. Parallel and Distrib. Systems, 2013, Dec. 2013, pp.
geocast under different forwarding models. 582–86.
[15] S. Kumar et al., “Carspeak: A Content-Centric Network for
Acknowledgment Autonomous Driving,” SIGCOMM Comput. Commun. Rev.,
vol. 42, no. 4, Aug. 2012, pp. 259–70.
This work was supported by the National Science
Foundation of China (Nos. 61502359, 61572370, Biographies
61373040, and 61303117). This research was Peng Li (lipeng@wust.edu.cn) received his B.S. degree in com-
also supported in part by National Science Foun- puter science and technology from Wuhan University of Tech-
dation Early Career Award 0845376 and the Ben- nology, China, in 2003, his M.S. degree in computer science
from Huazhong University of Science and Technology, Wuhan,
sten Fellowship of the University of Texas -Rio China, in 2006, and his Ph.D. degree in computer science from
Grande Valley. Wuhan University in 2015. He is currently a visiting scholar with
the University of Calgary, Canada. He is also an associate pro-
References fessor with Wuhan University of Science and Technology. His
[1] C. Maihofer, “A Survey of Geocast Routing Protocols,” IEEE research interests include vehicular networks, mobile comput-
Commun. Surveys & Tutorials, vol. 6, no. 2, Second Qtr. ing, and cloud computing.
2004, pp. 32–42.
[2] Y. Wu, Y. Zhu, and B. Li, “Infrastructure-Assisted Routing Tao Zhang [M’05, SM’07] (tzhang@nyit.edu) received her M.S.
in Vehicular Networks,” Proc. 2012 IEEE INFOCOM, Mar. and Ph.D. degrees in computer science from the University of
2012, pp. 1485–93. Texas at Dallas in 2003 and 2005, respectively. She joined the
[3] K. Mershad, H. Artail, and M. Gerla, “We Can Deliver Mes- faculty of New York Institute of Technology at Old Westbury in
sages to Far Vehicles,” IEEE Trans. Intelligent Transportation 2005. She is currently a professor of computer science at New
Systems, vol. 13, no. 3, Sept. 2012, pp. 1099–1115. York Institute of Technology. Her research interest spans wireless
[4] J. P. Jeong, T. He, and D. H. Du, “TMA: Trajectory-Based communication and networking, cloud computing, WDM optical
Multi-Anycast Forwarding for Efficient Multicast Data Deliv- networks, and network security focusing on the design and anal-
ery in Vehicular Networks,” Computer Networks, vol. 57, ysis of network architectures and protocols. She was the Principal
no. 13, 2013, pp. 2549–63. Investigator of two National Science Foundation (NSF) funded
[5] H. Zhu et al., “Zoom: Scaling the Mobility for Fast Oppor- projects. She currently serves on the NSF Proposal Review Panel.
tunistic Forwarding in Vehicular Networks,” Proc. 2013 IEEE
INFOCOM, April 2013, pp. 2832–40. C huanhe H uang (huangch@whu.edu.cn) received his B.S.,
[6] Y. Li and W. Wang, “Horizon on the Move: Geocast in Inter- M.S., and Ph.D. degrees in Computer Science from Wuhan
mittently Connected Vehicular Ad Hoc Networks,” Proc. University in 1985, 1988, and 2002, respectively. He is currently
2013 IEEE INFOCOM, April 2013, pp. 2553–61. a professor and Ph.D. supervisor at the School of Computers,
[7] R. Jiang et al., “Tmc: Exploiting Trajectories for Multicast in Wuhan University. His research interests include SDN, oppor-
Sparse Vehicular Networks,” IEEE Trans. Parallel Distrib. Sys- tunistic networks, and wireless networks, focusing on cryptogra-
tems, vol. 26, no. 1, Jan. 2015, pp. 262–71. phy, wireless security, and trust management.
[8] R. Jiang et al., “Exploiting Trajectory-Based Coverage for
Geocast in Vehicular Networks,” IEEE Trans. Parallel Distrib. X i C hen (chenxi_cs@whu.edu.cn) is working for his Ph.D. in
Systems, vol. 25, no. 12, Dec. 2014, pp. 3177–89. computer system architecture at Wuhan University. He received
[9] F. Zhang et al., “On Geocasting over Urban Bus-Based Net- his B.Sc. degree in computer science and technology from
works by Mining Trajectories,” IEEE Trans. Intelligent Trans- Wuhan University in 2011. His research interests are in the area
portation Systems, vol. 17, no. 6, June 2016, pp. 1734–47. of wireless networks, with an emphasis on the design and opti-
[10] K. Liu et al., “Cooperative Data Scheduling in Hybrid Vehicular mization of medium access control protocols for long-distance
Ad Hoc Networks: Vanet as a Software Defined Network,” wireless network.
IEEE/ACM Trans. Net., vol. 24, no. 3, June 2016, pp. 1759–73.
[11] Y. Li et al., “Contact-Aware Data Replication in Roadside Bin Fu (bin.fu@utrgv.edu) received his B.S. and M.S. degrees in
Unit Aided Vehicular Delay Tolerant Networks,” IEEE Trans. computer science from Wuhan University in 1985 and 1988,
Mobile Computing, vol. 15, no. 2, Feb. 2016, pp. 306–21. respectively, and his Ph.D. degree in computer science in 1998
[12] H. Zheng and J. Wu, “Optimizing Roadside Advertisement from Yale University, where he finished his Ph.D. dissertation,
Dissemination in Vehicular Cyber-Physical Systems,” Proc. Volume Bounded Molecular Computing, under the supervision
2015 35th IEEE Conf. Distributed Computing Systems, June of Dr. Richard Beigel. He is currently a professor at the Univer-
2015, pp. 41–50. sity of Texas Rio Grande Valley. His research interests include
[13] L. Zhang, B. Yu, and J. Pan, “Geomob: A Mobility-Aware the fields of algorithms, bioinformatics, complexity theory, and
Geocast Scheme in Metropolitans via Taxicabs and Buses,” molecular computing. He received the U.S. National Science
Proc. IEEE INFOCOM 2014, Apr. 2014, pp. 1279–1787. Foundation Early Career Award (2009–2014).

IEEE Wireless Communications • February 2017 59

View publication stats

You might also like