Abstract
Application of safety-related information interaction among vehicles has always been a research frontier in Vehicular Ad-hoc NETworks (VANETs). These messages require high real-time performance. There is a lot of research dependant on creating optimization model for communication task scheduling or routing protocols to reduce communication delay. In this paper, we analyze characteristics of safety-related information and introduce Interference Alignment (IA) technology in VANETs. To further improve routing efficiency, a data-driven assisted transmission routing and broadcast model framework for Vehicle to Vehicle(V2V) and Vehicle to Infrastructure (V2I) communication are constructed which are the basis for IA. Depending on the proposed model, we propose an optimization problem of minimizing total number of time slots required for safety information sharing in VANETs. Then a clustering algorithm is designed to narrow feasible solution space. Simulation results show that the approach can effectively reduce the number of time slots required and improve link use by 20% percent compared with no IA applied.
1. Introduction
The US Federal Communications Commission (FCC) allocated 75 MHz of wireless spectrum (5.850 GHz to 5.925 GHz) bandwidth to dedicated short range communications (DSRC) for intelligent transportation systems (ITS) service. According to FCC regulations, this band is further divided into seven isolated sub-channels, including one control channel and six service channels, where control channel is reserved for transmitting beacons or fundamental safety-related messages. Each vehicle periodically broadcasts traffic state information including its speed, acceleration and GPS on control channel. These types of information help vehicle interacts with surrounding vehicles timely. However, with the number of vehicles increasing, demand for communication between vehicles rises, causing congestion in communication band and decreasing communication efficiency.
Communication protocols of VANETs are mainly based on IEEE802.11 series protocols, but a large number of performance verification experiments show that competitive protocols cannot meet Quality of communication Service (QoS) requirement of VANETs [1,2]. Since safety related information should be delivered as quickly as possible, the effective method is that vehicles broadcast their safety-related information directly to surrounding vehicles, which will inevitably lead to information redundancy and flooding [3].
In the area of wireless communication networks, some research was conducted to improve channel resource use though managing interference between wireless terminals, such as Interference Alignment (IA). Simulation results in [4,5] show that in interference channel of the K-node communication network equipped with M antennas, if IA is adopted, the total degree of whole network freedom approaches . However, Channel State Information (CSI) of senders and receivers are required for IA application. The relative positions of vehicles are constantly changing, making it difficult to obtain CSI information.
Since the location of base station is fixed, in some studies, prediction model of CSI between vehicle with base station are constructed to estimate CSI during a certain period of time [6,7]. Once CSI information between vehicles and base station can be predicted in advance, IA can be applied to communication of V2I.
With the advent of Cognitive Radio (CR) and dynamic spectrum access technology, Spectrum Database (SD) including CSI information provided by ITS could be obtained by a user who is about to pass a road segment [8]. Depending on SD and the user’s location, CSI between the user and base station could be queried, which could meet time requirement for safety related information in a long enough period [9].
All above, in this paper, we analyze the communication flow of V2V and V2I in VANETs and construct broadcast model for IA technology. Different communication fashion is adopt for different type senders. Combined with characteristics of safety related information, an assisted transmission model is constructed to further reduce redundancy transmission and improve link use efficiency. Based on these model, we propose an optimization problem of minimizing total number of time slots required for safety information sharing in VANETs. In addition, a clustering algorithm is designed to narrow feasible solution space.
1.1. Literature Review
Safety related information exchange is the key to the next generation of VANETs. In VANETs, vehicle is required to exchange information quickly and reliably with others within safety radius. In order to fulfill this target, some studies have designed VANETs distributed cross-layer protocols to adjust the priority of safety related information and intervene the direction of data propagation to reduce communication delay [10]. In [11], Velmurugan et al., proposed a new algorithm works on the selective distance allocation methodology for data transmission.
As an emerging multiplexing-based interference cancellation method, IA is based on use of channel transmission features to align multiple interference streams to a specific direction at the receiving node to reduce interference. In [12], sAhn et al., proposed a new cellular network interference management method, which applied IA to cellular network. The simulation verified that IA can effectively improve communication rate. There is some research that studied a blind IA in cell network without full CSI information [13,14,15]. However, without full CSI information, the blind IA caused a large delay in direct communication and relatively large loss of effectiveness in routing.
In [16], Liang et al., proposed an intra-group IA scheme for V2V. In their research, the network is divided into two groups. One group used doppler frequency domain IA to ensure vehicles in this group are not interfered by other same group vehicles, while other groups only experience partial interference. However, because of the mobility, the vehicle cluster couldn’t keep for a long time.
In [17], Cheng et al., combined VANETs with CR called CR-VANETs protocol to solve spectrum scarcity problem. This method significantly increased spectrum use by equipping vehicles with a CR communication device to detect idle channel in DSRC. With the ability to capture and use available CR spectrum holes in space and time, vehicles were able to make full use of spectrum resources, thereby improving communication efficiency of VANETs [18,19].
In contrast to the preemptive channel exclusive method such as IEEE802.11p, i.e., in IA application, channel resources are allocated dynamically and the channel access method is time division multiple access (TDMA) [20,21]. There are a lot of researchers that apply TDMA in VANETs and prove TDMA could overcome problems of hidden and exposed terminals. Meanwhile, TDMA makes it possible to facilitate IA in VANETs. The study in [22] verifies the feasibility of TDMA in VANETs and proves that TDMA has shorter latency and higher communication efficiency than IEEE802.11p.
Most of the broadcast models are developed from a periodic single-hop communication. In [23], Kang et al., proposed a new model to calculate a single-hop survival broadcast packet probability with a forwarding mechanism. This model accounted all possible cases of contention window assignments to all the nodes simultaneously receiving a broadcast message. Without considering characteristic of safety related information, the performance would be limited by bandwidth. For piggybacking traffic information over periodic safety related messages, Abbasi et al., proposed a highly efficient and reliable multi-hop broadcasting protocol, Intelligent Forwarding Protocol (IFP) [24]. Tahmasbi-Sarvestani proposed a network-aware double-layer distance-dependent protocol for fast broadcasting of aggregated traffic information over multiple hops [25]. However, the hidden and exposed terminal problems still remained in these researches.
1.2. Goals of This Paper and Main Contributions
The main contributions of this article are as follows:
- Depending on analyzing communication flow between base station and vehicles in VANETs, we construct V2V and V2I broadcast model. In this model, IA technology is adopted in upload transmission for V2I in VANETs.
- Combining characteristics of safety-related information, we build a data-driven assisted transmission model to improve link reuse rate.
- We propose an optimization problem of minimizing total number of time slots required for safety information sharing in VANETs. In order to solve this problem, we reform constraints in optimization problem by transforming quadratic items into multiple linear constraints, which simplify the optimization problem.
Based on this model, solution results of the optimization problem show that data-driven assisted transmission-based IA Application can effectively improve link reuse rate and reduce communication delay in VANETs.
1.3. Organization of this Paper
The remainder of this article is organized as follows: Section 1 introduces related works. Section 2 analyzes the research and communication scenario of VANETs, explains symbols in this paper and communication procedure. In Section 3, V2V & V2I broadcast model and IA model are constructed in detail. Combined with the characteristics of safety-related information, VANETs data-driven assisted transmission model is constructed and the optimization problem is proposed. Section 4 designs a clustering algorithm to pre-cut feasible solution space for optimization problem in Section 3. In Section 5, results of experiments are presented to evaluate performance of our approach. Section 6 concludes this paper.
2. System Model
In VANETs, according to the type of message sender and receiver, the communication fashions can be divided into two categories: (1). Vehicle to Vehicle (V2V), which means the sender and receiver are all vehicles; 2. Vehicle to infrastructure (V2I). In (V2I), the types of terminals include Base Station (BS), wireless access point (AP) and other infrastructure. Without loss of generality, in this paper, we use V to indicate vehicle and I as BS, AP, etc.
2.1. Research Scenario in VANETs and the Symbol System
As shown in Figure 1, the entire VANETs scheduling time can be divided into several time frames. Every frame is taken as one scheduling period containing several equal interval Time Slots (TS) based on TDMA. Each vehicle transmits data during the assigned TS. However, before the scheduling period, the base station sends the status of the entire network and TS scheduling scheme to each vehicle to avoid communication collision.
Figure 1.
Contents of Scheduling Time.
- In this scenario, both V2V and V2I communication fashion are coexisting simultaneously.
- In this scenario, the vehicle speed is relatively low and SD could be updated timely.
- Due to the buildings and other architectures, CSI amongst vehicles with base station varies a lot, which should be solved first of all.
In this road section, there is one base station and several vehicles, denoted by I and V respectively in this paper as shown in Figure 2.
Figure 2.
Typical VANETs Scenario.
Symbol indicates base station broadcasts message to vehicle and indicates vehicles upload information to Base Station. Vehicle communicates with each other denoted as . Other symbols in this paper are listed in Table 1. To simply formulas, we use to represent , in which i is integer.
Table 1.
SYMBOLS and NOTATION.
2.2. Case Study in VANETs Communication
CSI is the key data for IA technology application. In VANETs, CSI could be obtained from SD in ITS and should be updated in time. When a vehicle enters a new road, firstly, it registers itself in VANETs. If the vehicle is within communication range of base station, the registration request could be posted to base station directly. Otherwise the vehicle should turn to other vehicles for relaying the request. After registration, base station allocates idle time slot and sends SD containing CSI of this road to the new vehicle.
The detailed procedure is shown in Figure 3, which contains 4 stages. In the first stage, when vehicle A enters the range of base station from the boundary In point, it posts an access request to base station in communication 1. During this stage, the base station collects the new access request and allots idle time slot to vehicle A. During the second stage, the base station sends SD and time slot information to vehicle A in communication 2. During the third stage, vehicle A runs on this road and collects CSI with base station. At the last stage, when vehicle A reaches the boundary Out point, the latest CSI information collected by vehicle A is sent to base station in communication 3 for SD update. When a new vehicle B enters this road, it will repeat this process as vehicle A. In this way, the base station could keep the latest SD of this road.
Figure 3.
Workflow of New Vehicle Registering at Base Station and Uploading CSI to SD.
During stage 3, vehicles broadcast their safety related information to surrounding vehicles. These information should be pre-encoded based on CSI before being broadcast if IA is adopt. After the information is encoded with pre-coded vector, the valid signals are mapped to different directions with the interference signals [4]. If the road is reasonably divided, as shown in Figure 4, the CSI in the same segment can be considered as the same value [10].
Figure 4.
CSI Based Road Segments.
In this paper, vehicles adopts half-duplex working mode and safety-related information contains location, speed and acceleration et al., In VANETs, the base station is equipped with multiple antennas for Multiple-Input Multiple-Output (MIMO). A communication task that sending a safety related information from one vehicle to another one, is called a communication session. The fashions of communication sessions sent from different senders to receivers can be categorized as follows:
: For base station, it sends information to multiple vehicles simultaneously by broadcast.
: Since the base station is fixed, vehicles can obtain CSI from SD, thereby making it possible to implement IA MIMO communication with base station.
: Due to vehicle mobility, CSI between vehicles is not stable and difficult to be maintained. For this reason, broadcast is used as communication method for V2V without IA.
In addition, due to limited coverage of base station, the vehicles among communication range could communicate with base station directly. As shown in Figure 5, coverage of the communication for all vehicles cannot be achieved. Such as the vehicle 2 is out of base station’s service. For these vehicles, they should be assisted to upload information to base station.
Figure 5.
Illustration of Base Station Broadcast Coverage and Assisted Transmission.
3. Model of Broadcast Assisted Transmission Based IA Application in VANETs
In this section, we construct IA application model in VANETs. At first, V2V and V2I broadcast model is constructed as basis for IA. Then IA constraints are formulated. In order to support multi-hop, a data-driven assisted transmission model is constructed according to characteristics of safety related information.
3.1. V2V and V2I Broadcast Model
In our paper, all terminals adopt a half-duplex mode of operation to switch between receiving and transmitting state. is the sending state of vehicle i at time slot t and is receiving state. Then we get
Since all vehicles should broadcast their safety related information in one scheduling frame, which means they must make a broadcast task during. Thus, we have
For V2V communication, IA cannot be applied, so the number of valid session and interference received by a vehicle cannot exceed the number of its antennas [8]. When a vehicle broadcasts to surrounding vehicles, number of receivers is equal to the number of vehicles in receiving state. Thus, the following equation should be met:
Constraints in (4) can be further combined as (5):
Since vehicle i may receive interference from its surrounding vehicles at the same time, the intended information might not be decoded. Therefore, at the same time, the amount of vehicle data received by vehicle i cannot exceed its number of antennas, then we get
which can be combined as
When a vehicle is in sending or silent state, and it cannot receive sessions from neighboring vehicles, then the following constraint should be met:
If a terminal switches to receiving mode and there is no vehicle sends message to it, it will only receive interference or nothing. Thus, we get
For a vehicle in receiving state, the number of interference a vehicle can receive is no exceed the number of its antennas. Then we get
Some constraints can be set default value in advance based on practical situation. When the distance between vehicles exceeds communication range, equals 0. Similarly, when vehicles out of interference range with each others, there is no interference. Then, we have the following equations
3.2. Model of Interference Alignment between Vehicles and Base Station
According to IA technology, when vehicle communicates with base station, the interference caused by other vehicles could be aligned together in the same direction to save network freedom. Since interference from the same CSI cluster cannot be aligned in the same direction [9], then for a cluster m, we have following equation:
Since interference from vehicles in the same cluster cannot be aligned to each other, the number of valid signals and interference caused by vehicles in all areas should be less than the number of antennas of base station. Then, we have
The number of interference can be aligned in same cluster cannot outnumber the total number of interference invoked in same area, we get the first constraint in (14). And the actual number of degrees of freedom consumed at base station cannot exceed its number of antennas, the second constraint of (14) should be met:
Symbol is the number of interference caused by vehicle i to station j and is the number of aligned interference. Then we get
According to the meaning of , when vehicle is the off state that not transmits nor receives, it will not cause or receive any interference, we get
If vehicle is outside interference range of others, it will not be interfered by them.
For base station, signals are treated as interference if not intended for it. Thus, we have following constraint
3.3. The Model of Data-Driven Assisted Transmission
In contrast to other types of information, safety related information in VANETs is open to all vehicles. Furthermore, during the same scheduling frame, information of a vehicle remains unchanged. Therefore, when a vehicle receives information from others, it could re-encode safety related information together and broadcasts to others in one session to improve the efficiency of information propagation. Based on these characteristics, in this subsection, we design a data-driven assisted transmission model for safety related information.
Transmission without data-driven assisted is illustrated in Figure 6. Taking the session sent from vehicle as an example, it can be delivered or relayed by base station and vehicle G. When vehicle E and B broadcast sessions simultaneously, vehicle D would receive two messages at same time slot. Once the number of received signals exceeds number of vehicle D’s freedom degrees, it will not be able to obtain the valid information. Therefore, in order to avoid collision, messages of vehicle E and vehicle B should be transmitted in different time slots. Since vehicle G also needs to transmit data to vehicle D, there should be one more time slot be assigned.
Figure 6.
Example of V2I without Assisted Transmission.
As shown in Figure 7, we can arrange one time slot for session with session and another time slot for . After vehicle G receives message from vehicle E, it can merge its own information with other vesicles. Although vehicle D get message of E one time slot later, there are only two time slots are occupied for all network.
Figure 7.
Example of V2I with Assisted Transmission.
Nevertheless, when vehicles adopt assisted transmission, it is necessary to ensure safety related information is delivered in time. In this paper, we choose minimum hop counts donated as to be the upper limit of hops, then we get
is feasible routing path of session f. If a routing path bears a data relay task, the following formula is met
For session f, its initiator is start of route, then we get
For relaying vehicles, we get the following constraint:
As destination vehicles, there must be some vehicle that broadcasts message to them, then we have
In order to avoid routing loop at destination vehicle, we have:
3.4. Optimization Objective
It is obvious that the safety related information should be transmitted punctually. During each scheduling frame, we have K time slots and is the state of time slot t. If there is no vehicle initiates communication at time slot t, equals 0, then we get
Fewer time slots are occupied, more efficient of safety related information propagation is. Therefore, we take time slot taken-up ratio denoted as to be the optimization objective, then we get
Combined with other constraints, we have the optimization problem :
| OPT: | Min | |
| –,,– |
Among all the constraints, Formula (1)–(2) regulate half-duplex mode of vehicle terminals; (5)–(7) give constraints on receiving state and communication links; (8)–(10) introduce constraints on V2V broadcast communication; (11) presets initialization values to reduce searching range of feasible solutions; (14)–(18) regulate V2I and IA constraints for base station. (19)–(25) impose constraints on communicate route and data-driven assisted transmission. Among them, and are positive integer variables. is non-negative variable. can be adjusted according to delay requirement of VANETs.
Due to type of variable and constraint (18) which is not linear, the prime optimization problem is Mixed Integer Nonlinear Programming (MINLP). In order to solve this problem, we have to reform some constraints into much neater forms. The next two lemmas will help us to reduce complexity of problem. Proofs of these two lemmas are postponed to Appendix A.
Lemma 1.
Constraint (26) with integer variable is identical with the form listed in (28)
Lemma 2.
Nonlinear constraint (16) combined with (17), (18) can be reformed in to the following linear constraint (29)–(31)
With these two lemmas, prime optimization problem is identical with the following
| OPT: | Min | |
| –,,–,–,– |
is reformed into Mixed Integer Linear Programming that can be solved more efficiently compared with prime one.
4. The -Clustering Algorithm Based on CSI in VANET
To solve CSI stability problem, which is the key information of IA application, in this section, we design a CSI based clustering algorithm. Reasonable CSI clustering algorithm would improve accuracy of CSI estimation and IA efficiency though avoiding vehicles with similar CSI allocated the same time slot. In this paper, we take RSSI value as CSI parameter.
is the clustered vehicle set. is the number of clusters. is RSSI value between vehicle i and base station. is variance of each cluster which is calculated as follows
Traditional clustering algorithms is set with fixed . In our clustering algorithm, we impose requirement on . Define upper limit of as . Then, we have
According to the definition of , we can conclude that the number of clusters increases while the value of decreases. A reasonable value of should be determined.
Since signal fading rate varies due to buildings and other obstacles, the clustering algorithm only based on RSSI is not pragmatic in VANETs. Hence, the location information should also be taken into consideration. After RSSI based clustering algorithm, we introduce kemans++ clustering algorithm based on location to avoid this problem. Pseudocode of our algorithm is listed in Algorithm 1.
| Algorithm 1 Clustering |
|
5. Simulations
5.1. Simulation for Clustring Algorithm
Our simulation scenario is shown in Figure 8, including 7 vertical streets and 3 horizontal streets in this scenario. Vehicles are generated by SUMO [13]. Simulation area is 500 m in width and 2000 m in length. There is one base station in this area. The time slots of each scheduling frame is set to 20. Gurobi is chosen to be the solver for the optimization [26].
Figure 8.
Base Station and Clusters ( indicates cluster of vehicles with similar CSI).
Clustering results based on RSSI and location are shown in Figure 9. The RSSI based clustering vehicles are grouped into ring-shaped area which is obviously not suitable for our scenarios since it does not take buildings into consideration.
Figure 9.
Clustering According to RSSI.
The clustering result based on -clustering algorithm is shown in Figure 10. Vehicles from the same intersection or blocked by the same building are grouped into the same cluster, which is more reasonable.
Figure 10.
-Clustering Algorithm According to path loss and location.
5.2. Analysis of IA Simulation
In our simulation, is set to 6 to limit the number of hops in data routing. Then we analyze simulation results based on V2V, I2V and V2I cases.
Case Study for V2V communication: As shown in Figure 11, we select some vehicles as example. The communication sessions of selected vehicles are listed in Table 2 and routes of some sessions are listed in Table 3. From Table 3, we find that only 5 sessions adopt direct communication. And vehicle 6 and 54 contribute most routing tasks. It is because that vehicle 54 is closer to base station than any other vehicles in the same cluster and vehicle 6 is located in the center of its cluster.
Figure 11.
Example of Communication Simulation Result.
Table 2.
and for Session.
Table 3.
Routes of .
The hop counts are shown in Table 4 with different size of experiments. The 5-hop routing only occurs when there are 30 vehicles in this road since the distribution of these cars is sparser. The percentage of different hop counts are shown in Figure 12. With the vehicle density increasing, the percentage of two hops is increased and the direct communication is reduced, which means the information would be propagated through assisted transmission instead of directly communication under the condition with more vehicles.
Table 4.
Number of Route Hops for as The Number of Vehicles Increases.
Figure 12.
Graph of Proportions of Different Hops.
Case Study for I2V Assisted Communication: If a vehicle is within communication range of base station, direct data transmission is preferred. Otherwise, multi-hop forwarding will be adopted mostly. Direct communication from base station is shown in Figure 13 and vehicles out of communication range choose multi-hop communication method as shown in Figure 14. As increase in number of vehicles, the base station takes part in assisting data forwarding more frequently due to its higher concurrent communication ability as shown in Table 5.
Figure 13.
Sessions Base Station Participated.
Figure 14.
Sessions Uploading from Vehicles out of Base Station Communication Range.
Table 5.
Percentage of Base Station Participation in Route.
Case Study for IA in V2I Communication: During the 20th time slot, vehicle 21, 31, 39, 47, 59, 68 broadcast message as shown in Figure 15. Vehicle 31, 68 and 59 broadcast to base station that will take up 3 antennas of the base station. However, the base station is also in the interference range of vehicle 39 and 47. Therefore, in order to receive intended messages from 31, 68 and 59, the interference caused by 39 and 47 will be aligned together to save 1 degree of communication freedom.
Figure 15.
Example of IA in 20th Time Slot.
Case Study for Data-driven Assisted Transmission: We draw an example of data routing path as shown in Figure 16. The route table is shown in Table 6:
Figure 16.
An Example of Session Routes from Base Station to Vehicles out of Vommunication Range.
Table 6.
Proportions of Different Hops in Routes of .
As shown in Figure 16, during 1st slot, the base station initiates a broadcast and vehicle 54 receives the message from base station. At time slot 15, vehicle 54 broadcasts to its surrounding vehicles. Since vehicle 65, 24 and 6 are out of the base station’s communication range, the session from base station is relayed by vehicle 54. At time slot 16, vehicle 6 center on the cluster broadcasts messages to surrounding vehicles. In this time slot, vehicle 6 relays message sent from vehicle 54 at time slot 15. To make full use of channel resources, during time slot 16, vehicles 43, 16 and 62 are assigned to send messages to base station simultaneously and vehicle 33 broadcasts to surrounding vehicles.
The experiment results listed in Table 7 and Figure 17 show that there exists approximate linearity between number of sessions and routing links with number of vehicles.
Table 7.
The number of Sessions and Transmit Links.
Figure 17.
Number of Route Links and Sessions.
As shown in Figure 18, with the increase in the number of vehicles, proportion of routing task that base station participated also increases, which is is due to MIMO and large broadcast coverage of base station. Besides, keeps increasing along with increase of vehicle number. The proportion of idle time slots as shown in Table 8, could be at 30 vehicles. Even in 70 vehicles simulation, this number could keep . For comparisons, the time slots of MIMO without IA are almost used up when there are 70 vehicles, which would lead communication congestion.
Figure 18.
and Some Percentages of Sessions as the number of vehicles increases.
Table 8.
PTU and Percentages of Sessions.
As shown in Table 9, in simulation with 30 vehicles, the proportion direct transmission is relatively high, mainly due to fewer vehicles within safety distance. And communication delay could be reduced by . However, with the increase of vehicle number, the proportion of assisted transmission is getting higher, which can reach . Routing communication is reduced by an average of about compared with no assisted transmission.
Table 9.
Proportion of Direct and Forward Transmission.
6. Conclusions
This paper studies communication problems of safety related information in VANETs. Under the proposed framework, the IA technology applied in VANETs is realized. Taking advantage of data-driven assisted transmission, the use ratio of route is improved. The simulation results show that this approach can effectively improve VANETs link use and reduce communication delay.
Author Contributions
C.Z. contributes to the writing of this article, references, analysis of experimental results and data interpretation. J.H. contributes to the research idea, direction, acquisition and design of this article. X.D. contributes to the literature retrieval, research content, algorithm design, data analysis, algorithm analysis, manuscript writing, etc. L.S. contributes to the experimental design, algorithm realization, experimental analysis and manuscript review of this article. F.Y. contributes to the implementation of experimental algorithm, chart making, data collection and data analysis of this article.
Funding
This work is supported by the National Natural Science Foundation of China under Grant No. 61701162 and the Fundamental Research Funds for the Central Universities (GRANT NO. JZ2019YYPY0298, JZ2019YYPY0290).
Acknowledgments
We also want to deliver our sincere gratitude to those who made arduous efforts in reviewing this article.
Conflicts of Interest
The authors declare no conflict of interest.
Abbreviations
The following abbreviations are used in this manuscript:
| VANETs | Vehicular Ad-hoc NETworks |
| IA | Interference Alignment |
| V2V | Vehicle to Vehicle and Vehicle |
| V2I | Vehicle to Infrastructure |
| CSI | Channel State Information |
| CR | Cognitive Radio |
| SD | Spectrum Database |
| TDMA | Time Division Multiple Access |
| ITS | Intelligent Transportation Systems |
| MIMO | Multiple-Input Multiple-Output |
| MINLP | Mixed Integer Nonlinear Programming |
Appendix A
Proof of Lemma 1.
Constraint (26) with integer variable is identical with the form listed in (28).
By the definition of , if there exists any data transmission in time slot t, then equals to 1, otherwise, it is 0.
(1) If there exists any data transmission in time slot t, then there must be one that not equals 0. Therefore, we have
For the first inequality in (28), we have:
where is greater than or equal to 1. Therefore, we have is less than or equal to which is greater than or equal to 1.
For the second inequality in (28), we have:
Combining the above, we have:
Since the value of can only be chosen from integer 0 and 1, we have , which is identical to the first equation in (28)
(2) If there is no data transmission on time slot t, it is obvious that equals 0.
For the first inequality in (28), we have:
For the second inequality in (28), we have:
Combining the above, we have:
Since the value of can only be chosen from integer 0 and 1, we have , which is identical to the second equation in (28).
Therefore, we draw the conclusion that (26) and (28) are identical to each other. □
Proof of Lemma 2.
Nonlinear constraint (16) combined with (17), (18) can be reformed in to the following linear constraint (29)–(31)
During the communication, we have following cases:
- (1)
- When vehicle i is in transmitting mode, we have . In the same time slot, if vehicle j is in receiving mode, we have . However, if session from vehicle i is NOT intended for j, we have . In this case, we have .
- (2)
- When vehicle i is in transmitting mode, we have . In the same time slot, if vehicle j is in receiving mode, we have . And if session from vehicle i is intended for j, we have . In this case, we have .
- (3)
- When vehicle i is in transmitting mode, we have . In the same time slot, if vehicle j is NOT in receiving mode, we have . In this case, we have . In this case, we have .
- (4)
- When vehicle i is NOT in transmitting mode, we have . In the same time slot, if vehicle j is in receiving mode, we have . In this case, we have . In this case, we have .
- (5)
- When vehicle i is NOT in transmitting mode, we have . In the same time slot, if vehicle j is in receiving mode, we have . In this case, we have . In this case, we have .
Combining the above five cases, we have the following Equation:
We have two items on the right-hand-side of the equation. One is in the quadratic form, the other one is in cubic form, which will lead to a relatively high complexity in solving the optimization problem. What is done next is to reshape the polynomial form of constraint into a linear one. Considering the following constraints with (10), (29)–(31):
In the case corresponding to case (1), we have:
In the case corresponding to case (2), we have:
In the case corresponding to case (3), we have:
In the case corresponding to case (4), we have:
In the case corresponding to case (5), we have:
Therefore, the outcomes of these series of inequalities are identical to the values calculated by Equation (10), (29)–(31). Hence, we reach the conclusion that polynomial constraint (16), (17), (18) is the same as inequalities (10), (29)–(31). □
References
- Dressler, F.; Klingler, F.; Sommer, C.; Cohen, R. Not All VANET Broadcasts Are the Same: Context-Aware Class Based Broadcast. IEEE/ACM Trans. Netw. 2018, 26, 17–30. [Google Scholar] [CrossRef]
- Nguyen, V.; Oo, T.Z.; Chuan, P.; Hong, C.S. An Efficient Time Slot Acquisition on the Hybrid TDMA/CSMA Multichannel MAC in VANETs. IEEE Commun. Lett. 2016, 20, 970–973. [Google Scholar] [CrossRef]
- Limouchi, E.; Mahgoub, I. Volunteers Dilemma Game Inspired Broadcast Scheme for Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transport. Syst. 2019, 1–11. [Google Scholar] [CrossRef]
- Zeng, H.; Shi, Y.; Hou, Y.T.; Lou, W.; Kompella, S.; Midkiff, S.F. An Analytical Model for Interference Alignment in Multi-Hop MIMO Networks. IEEE Trans. Mobile Comput. 2016, 15, 17–31. [Google Scholar] [CrossRef]
- Sundaresan, K.; Sivakumar, R.; Ingram, M.A.; Chang, T.Y. Medium access control in ad hoc networks with MIMO links: Optimization considerations and algorithms. IEEE Trans. Mobile Comput. 2004, 3, 350–365. [Google Scholar] [CrossRef]
- Jaiswal, R.K.; Jaidhar, C.D. Location prediction algorithm for a nonlinear vehicular movement in VANET using extended Kalman filter. Wirel. Netw. 2016, 23, 1–16. [Google Scholar] [CrossRef]
- Feteiha, M.F.; Hassanein, H.S. Enabling Cooperative Relaying VANET Clouds Over LTE-A Networks. IEEE Trans. Veh. Technol. 2015, 64, 1468–1479. [Google Scholar] [CrossRef]
- Atakan, B.; Akan, O.B. Biological Foraging-Inspired Communication in Intermittently Connected Mobile Cognitive Radio Ad Hoc Networks. IEEE Trans. Veh. Technol. 2012, 61, 2651–2658. [Google Scholar] [CrossRef]
- Al-Ali, A.K.; Sun, Y.; Di Felice, M.; Paavola, J.; Chowdhury, K.R. Accessing Spectrum Databases Using Interference Alignment in Vehicular Cognitive Radio Networks. IEEE Trans. Veh. Technol. 2015, 64, 263–272. [Google Scholar] [CrossRef]
- Ma, X.; Zhang, J.; Yin, X.; Trivedi, K.S. Design and Analysis of a Robust Broadcast Scheme for VANET Safety-Related Services. IEEE Trans. Veh. Technol. 2012, 61, 46–61. [Google Scholar] [CrossRef]
- Velmurugan, V.; Leo Manickam, J.M. A efficient and reliable communication to reduce broadcast storms in VANET protocol. Clust. Comput. 2018. [Google Scholar] [CrossRef]
- Sahn, S.; Chae, S.H. Blind Integer-Forcing Interference Alignment for Downlink Cellular Networks. IEEE Commun. Lett. 2019, 23, 306–309. [Google Scholar] [CrossRef]
- Alaa, A.M.; Ismail, M.H. Achievable Degrees of Freedom of the K-User SISO Interference Channel With Blind Interference Alignment Using Staggered Antenna Switching. IEEE Trans. Veh. Technol. 2017, 66, 2825–2829. [Google Scholar] [CrossRef]
- Johnny, M.; Aref, M.R. Blind Interference Alignment for the K -User SISO Interference Channel Using Reconfigurable Antennas. IEEE Commun. Lett. 2018, 22, 1046–1049. [Google Scholar] [CrossRef]
- Guo, Q.; Liu, S.P.; Xiong, W.; Zhou, Z.Y. A Ground Target Positioning Method Facing Small UAVs. Key Eng. Mater. 2012, 503, 272–276. [Google Scholar] [CrossRef]
- Liang, W.; Zhang, Z.; Jian, D.; Wu, Y. Frequency-Domain Inter-Group Interference Coordination for V2V Communications. IEEE Signal Process. Lett. 2017, 24, 1739–1743. [Google Scholar]
- Cheng, N.; Zhang, N.; Lu, N.; Shen, X.; Mark, J.W.; Liu, F. Opportunistic Spectrum Access for CR-VANETs: A Game-Theoretic Approach. IEEE Trans. Veh. Technol. 2014, 63, 237–251. [Google Scholar] [CrossRef]
- Deepak, G.C.; Navaie, K.; Ni, Q. Radio Resource Allocation in Collaborative Cognitive Radio Networks Based on Primary Sensing Profile. IEEE Access 2018, 6, 50344–50357. [Google Scholar] [CrossRef]
- Han, Y.; Ekici, E.; Kremo, H.; Altintas, O. Throughput-Efficient Channel Allocation Algorithms in Multi-Channel Cognitive Vehicular Networks. IEEE Trans. Wirel. Commun. 2017, 16, 757–770. [Google Scholar] [CrossRef]
- Omar, H.A.; Zhuang, W.; Li, L. VeMAC: A TDMA-Based MAC Protocol for Reliable Broadcast in VANETs. IEEE Trans. Mobile Comput. 2013, 12, 1724–1736. [Google Scholar] [CrossRef]
- Cao, S.; Lee, V.C.S. A Novel Adaptive TDMA-Based MAC Protocol for VANETs. IEEE Commun. Lett. 2018, 22, 614–617. [Google Scholar] [CrossRef]
- Arthur, D.; Vassilvitskii, S. K-Means++: The Advantages of Careful Seeding. In Proceedings of the Eighteenth ACM-SIAM Symposium on Discrete Algorithms, New Orleans, LA, USA, 7–9 January 2007. [Google Scholar]
- Virdaus, I.K.; Kang, M.; Shin, S.; Lee, C.G.; Pyim, J. A Counting-Based Broadcast Model of Emergency Message Dissemination in VANETs. In Proceedings of the 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN), Milan, Italy, 4–7 July 2017; pp. 927–930. [Google Scholar] [CrossRef]
- Abbasi, H.I.; Voicu, R.C.; Copeland, J.; Chang, Y. Towards Fast and Reliable Multi-hop Routing in VANETs. IEEE Trans. Mobile Comput. 2019. [Google Scholar] [CrossRef]
- Tahmasbi-Sarvestani, A.; Fallah, Y.P.; Kulathumani, V. Network-Aware Double-Layer Distance-Dependent Broadcast Protocol for VANETs. IEEE Trans. Veh. Technol. 2015, 64, 5536–5546. [Google Scholar] [CrossRef]
- Gurobi Optimization, Inc. Gurobi Optimizer Reference Manual. 2018. Available online: http://www.gurobi.com (accessed on 1 November 2019).
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).