Skip to Content
SensorsSensors
  • Article
  • Open Access

6 July 2021

Context-Aware Naming and Forwarding in NDN-Based VANETs

,
,
,
and
1
Department of Computer Science, COMSATS University, Islamabad 45550, Pakistan
2
Department of Electronics and Computer Engineering, Hongik University, Sejong 30016, Korea
3
Department of Software and Communication Engineering, Hongik University, Sejong 30016, Korea
*
Authors to whom correspondence should be addressed.
This article belongs to the Section Sensor Networks

Abstract

Vehicular ad-hoc network (VANET) is a technology that allows ubiquitous mobility to mobile users. Inter-vehicle communication is an integral component of intelligent transportation systems that enables a wide variety of applications where vehicles interact and cooperate with each other, from safety applications to non-safety applications. VANETs applications have different needs (e.g., latency, reliability, delivery priorities, etc.) in terms of delivery effectiveness. In the last decade, named data networking (NDN) gained the attention of the research community for effective content retrieval and dissemination in mobile environments such as VANETs. In NDN, the content’s name has a vital role in storing and retrieving the content effectively and efficiently. In NDN-based VANETs, adaptive content dissemination solutions must be introduced that can make decisions related to forwarding, cache management, etc., based on context information represented by a content name. In this context, our main contributions are two-fold: (i) we present the hierarchical context-aware content-naming (CACN) scheme for NDN-based VANETs that enables naming the safety and non-safety applications, and (ii) we present a decentralized context-aware notification (DCN) protocol that broadcasts event notification information for awareness within the application-based geographical area. Simulation results show that the proposed DCN protocol succeeds in achieving reduced transmissions, bandwidth, and energy compared to existing critical contents dissemination protocols.

1. Introduction

Advances in information and communication technology (ICT) in areas such as hardware, software, and communications enable its integration with the transport infrastructure to intelligently provide support for planning, designing, maintenance, and transport management. Vehicular ad-hoc networks (VANETs) allow ubiquitous mobility to mobile users. Inter-vehicle communication is an integral component of intelligent transportation systems (ITSs) [1,2]. The capability of in-vehicle technology enables a wide variety of applications where the vehicles interact and cooperate with each other, from safety and warning applications [3] to non-safety applications whose aim is to increase drivers’ convenience and efficiency by delivering services. Therefore, autonomous vehicles have been the subject of intense research recently [4]. Tesla, Google, Amazon, Uber, and automakers such as Ford, Volkswagen, and Audi are investing heavily in the research and development of autonomous vehicles that can provide services without driver attention. According to a report, as many as 8 million autonomous cars will be shipped in 2025 [5]. The biggest challenge posed by autonomous vehicles is how much data these vehicles will generate and communicate [6].
Contents associated with VANET’s applications when generated are associated with the time and location where generated. VANETs applications have different quality of service (QoS) expectations (e.g., latency, reliability, and availability) and transportation requirements in terms of delivery effectiveness [7,8,9]. Existing VANETs applications can be divided into two subgroups: non-safety and safety. A non-safety subgroup that is delay-tolerant includes applications whose primary goal is the delivery of services to clients and automates vehicle-related tasks. Applications under the safety subgroup include time-sensitive applications where vehicles exchange safety messages with each other or with roadside units (RSUs) to ensure safety. If the relevant information is not delivered in time, its usefulness is lost. For example, in the event of an automobile accident (post-crash notification application), information needs to be received at the nearby entities (vehicles and RSU) in a timely manner so that it can be transferred to the emergency center of the health maintenance organization. Otherwise, inefficient safety-related content dissemination could lead to life loss and disabilities. Moreover, such information is also necessary for nearby vehicles to make timely decisions on speed, lane change, etc. In case of a road hazard, information must be received at the nearby traffic police station within a short time. Otherwise, it could lead to traffic congestion, which could result in casualties, damage, and time wastage for the motorist and passengers. The time validity of non-safety applications (fee information relating to charging stations for electric vehicles and promotional messages in a road area) may extend for several hours. Different delivery priorities may be required by the traffic of the same type, e.g., video. For example, video delivery to a vehicle required for safe driving (to raise awareness related to the area of interest under bad weather) should take precedence over the delivery of a recent cartoon for a child. The latter video is less critical, but both videos demand quality of experience (QoE).
Ineffective data dissemination may trigger poor use of resources, increased delay in content delivery, and unavailability of content/services, resulting in degradation of user quality of expectation. Taking into consideration the VANETs characteristics, environment (urban, highway, and rural), and applications, efficient and effective content dissemination in NDN-based VANETs is a known problem and faces unique challenges [9,10,11].
Like mobile ad-hoc networks (MANETs), in IP-based VANETs, it is necessary to identify each vehicle with a unique address. The IP of vehicles changes as they move to new physical places. This creates interruptions in communication between vehicles [12]. The IP communication model is based on host-to-host communications, where one host requests it, and others provide a resource. Furthermore, IP-based routers do not support caching. In an infrastructure-less environment, autonomous vehicles will be unable to survive if traditional IP-based protocols are used. Recently, the concept of information-centric networking (ICN) has been proposed for future Internet architecture [13,14]. The main concept of ICN is to support content-oriented communication, not host-oriented. The content identifier does not depend on location. It allows in-network caching to reduce delays in retrieving content. Consequently, producer availability for retrieving data is not required. Many ICN-associated projects have been proposed, such as NDN/CCN [13,14]. To build a content-based connection model, all these architectures replace hosts with contents. Data-oriented network architecture (DONA) and network of information (NetInf) architectures are considered for fixed networks. NDN uses location-independent, variable-length, application-generated content names for retrieving and/or disseminating the content efficiently. Name-based communication does not require any central entity for name resolution. Therefore, provide better forwarding, especially in VANETs environments. Furthermore, in-network caching is particularly beneficial under intermittent connectivity and dynamic topology as it can facilitate content retrieval. Thus, by using the above benefits, NDN is more feasible for effective content retrieval in highly mobile and dynamic environments such as VANETs.
In NDN-based VANETs, the content’s name has a vital role in disseminating, storing, and retrieving the content effectively and efficiently [13,14,15]. Different VANETs applications have multiple, possibly conflicting, and different QoS expectations. Without a proper context-aware naming scheme, it is not possible to provide a scalable and effective content dissemination solution. The context information can be aggregated along with the information components such as type of content (such as safety, non-safety), scope, application type (e.g., post-crash notification), content format (text, audio, video), the location where content is generated, the time when content is generated, and network environment (rural, urban, and highway). While there has been work on naming for NDN-based VANETs, it tends to be narrow in scope and aims [15,16,17,18,19,20,21,22,23,24,25,26,27,28]. The existing NDN-based naming schemes cannot cater to a wide range of VANETs applications. Moreover, the current state of the art does not address the content fragmentation requirement. Most of the existing schemes do consider some of the context components such as time, location, application type [15,20,21]. However, naming in NDN is still subject to more investigation to be tailored for VANETs.
In NDN-based VANETs, adaptive content dissemination solutions must be introduced that can make dynamic decisions (related to forwarding, cache management, etc.) based on content context, spatial validity, time validity information [7], rather than treating each content in the same way. The most appropriate forwarding strategy can be chosen based on context and associated transportation requirements [29,30,31,32].
Different events on the road (e.g., post-crash notification, road work, etc.) can significantly affect traffic conditions. Dissemination of event notification to vehicles heading to the event site may help to make timely decisions such as to reroute or reduce speed. The conventional NDN takes advantage of the pull-based model, where data are being retrieved upon consumer request only. In most safety applications, the content is created based on event detection or in case of an emergency [9,10,11]. Furthermore, it is necessary to notify the vehicles prior to reaching the hazardous site. To respond to the minimum latency requirement, the current state of the art takes into account the push-based content model for safety-related content forwarding [23,33,34,35,36,37,38,39]. Pushing content is useful for disseminating content over the geographic area. However, the push-based content dissemination approach meets the safety application’s requirements (such as low latency, availability, reliability) with increased communication and storage costs. If the push-based model is considered for disseminating safety content, then in native NDN, the vehicle discards the unsolicited content upon reception. There exists work that uses the beacon messages to announce events or safety content [37,38]. Upon the reception of beacons, the vehicles create synthetic entries in the pending information table (PIT), which helps to accept the data pushed into the network. These schemes [23,33,34,35,36,37,38,39] overlook the suppression of duplicate messages while forwarding and exchanging the messages with other vehicles. In contrast to the works of [33,34,35,36,37,38,39], just the work of [23] discusses the content-naming scheme considered in their safety content forwarding scheme. The proposed naming scheme tends to be narrow in scope and can be used to represent just a particular application scenario [23].
In most safety applications, notification messages containing only the context-aware names will be sufficient for vehicles to make the decision timely. For example, in safety applications (such as dangerous road warning, work zone warning, emergency vehicle warning, post-crash notification), all vehicles moving to the hazardous site need a contextual alert to make timely decisions such as to reroute. Even such an alert will be adequate for the emergency vehicles to reach the hazardous site. In such applications, the notification messages with the context-aware content name will reduce the need to attach content to the messages. Research efforts should be focused on the development of context-aware content-naming (CACN) solutions for NDN-based VANETs that must allow representing different applications, not just a particular application scenario. The CACN scheme will help to introduce adaptive content dissemination solutions that will allow selecting solution based on content context information rather than treating each content in the same way.

Contributions

More specifically, the major contributions of this paper can be summarized as follows:
  • The hierarchical context-aware content-naming (CACN) scheme for NDN-based VANETs is proposed. CACN scheme allows naming the safety and non-safety applications contents. It enables the entities to retrieve context and content-specific information from the content name, which allows effective and efficient context-aware decisions related to content forwarding and caching;
  • The CACN scheme exploits the coding scheme to represent most of the content name components, which allows addressing communication and storage complexity;
  • In this work, we focus on the dissemination of safety-related information with reduced latency. To this end, we present a decentralized context-aware notification (DCN) protocol that broadcasts event notifications for information awareness within the application-based geographical area. The dissemination of messages in the geographic area is controlled by exploiting the spatial and time validity requirements of the application. The viability of a DCN protocol for safety (critical) content notification is enhanced by presenting the broadcast control mechanism that assigns priority to the vehicle based on its location, angular position, and distance to the event site;
  • Simulations in an NS-3-based NDN simulator (ndnSIM) [40,41] to check the performance of the proposed scheme with relevant and state-of-the-art schemes [23,39].
The remaining document is organized as follows: Section 2 describes the applications of VANETs; Section 3 discusses the relevant work; Section 4 discusses the context-aware naming scheme for NDN-based VANETs; Section 5 present a context-aware forwarding scheme for safety contents; Section 6 presents the performance analysis; and Section 7 concludes our work.

2. VANETs Applications

Typical VANETs applications can be broadly classified into two categories: (i) non-safety and (ii) safety applications.

2.1. Non-Safety Applications

Comfort and entertainment applications are called non-safety applications that aim to improve drivers’ and passengers’ comfort levels and make travel more pleasant. These applications require high bandwidth. Moreover, such applications do not demand high availability as information is not needed by all the vehicles but on-demand according to user choice [3,13,14]. Normally, the typical requirements of these applications are reliability, availability, and connectivity. These applications and services are not bound to the limited geographical area and low latency requirements. Therefore, such applications are also termed as non-critical applications. Such applications are delay-tolerant because they have no stringent real-time requirements. However, reducing the delay and packet loss for non-safety applications would improve service quality. Spatial validity represents the extent of a geographical area in which the information is required, valid, and valuable (termed as spatial validity of the content) [9]. Spatial and time validity information can be used by vehicles to determine, for example, what to cache, and whether to participate in disseminating messages. The spatial and time validity requirements of an application might change depending on the road type where vehicles are driven [3,8,10]. The reason is that a vehicle must comply with the road network’s mobility pattern. Some of the non-safety applications are as follows:
Multimedia file sharing: Such applications allow users to share files such as music and movies. The spatial validity for such an application is 1 km, and the temporal validity is 10 min. The service consumers are required to subscribe to such a service [13,14].
Commercial advertisement: Service area announcements, restaurants, and other businesses can use an RSU to send promotional messages to vehicle drivers in their communication range. The spatial validity for such an application is 1–5 km, and the temporal validity is 1–10 days [13,14]. The user may only want to receive the selected brand’s advertisement not all, so it varies from vehicle to vehicle.
TrafficNavigationmap: This application is only required by subscribers. The spatial validity is 10 km and time validity is 30 min [13,14].

2.2. Safety Applications

The quality of service (QoS) required by the safety applications is close to real-time. The delay in information dissemination could lead to life loss and disabilities. Such information is also necessary for nearby vehicles to make timely decisions on speed, lane change, etc. Therefore, such applications are also termed as critical applications. Another requirement is reliability. All vehicles close to the hazard need to be alerted. Vehicles use the supplied information to make decisions during the trip. For example, all vehicles in the hazardous neighborhood are interested in receiving safety messages, compared with non-safety applications where a small number of vehicles are interested in commercial advertisements. Car collisions are currently one of the most common causes of death. Road safety applications primarily provide drivers with assistance in avoiding vehicle collisions and reducing crash death ratios [3,13]. The focus of such applications is to assist drivers by providing time-sensitive traffic information that enables drivers to avoid accidents from occurring in the first place.
In a post-crash notification application, a vehicle involved in a road accident broadcasts warning messages to request support from highway patrol as well as to inform the impending vehicles so that they can make timely decisions about changing the lane or route. These applications have lesser bandwidth requirements but have localized spatial scope regarding the extent of a geographical area in which the information is required, valid, and valuable (termed as spatial validity of the content) [14]. Localized spatial validity indicates that the spatial scope of such messages is limited. For example, the speed-warning message is only valid to vehicles approaching the sharp road turn, say within 100 m. The time validity for 30 s means that the message should be considered valuable if its time freshness is less than time validity [7,9,14]. The time freshness represents the time in transit after message creation. The receiving vehicle calculates time freshness based on the current time and time of creation specified in the message. In a post-crash notification application, if the received message time freshness is less than the specified time validity (say 30 s), then it can be considered valuable, and necessary actions should be taken, such as participation in message dissemination. Existing work suggested 30 s as time validity for post-crash notification application, but it is simply a rough specification and can be changed based on requirements. Some of the safety applications are as follows:
Post-crash notification: A vehicle involved in an accident or spectator vehicle sends warning messages in a broadcast to approaching vehicles (its time validity is 30 s within 500 m) [13,14].
Work zone: This information is needed by all the vehicles in the range of 0–1 km moving toward the work zone so that they can choose alternate routes. The time validity is construction duration [13,14].
Dangerous road warning: This information is needed by all the vehicles in the range of 100 m moving toward the work zone so that they can choose alternate routes. The time validity is 10 s [13,14].
Emergency Vehicle Warning: This information is needed by all the vehicles in the range of 500 m. The time validity is 10 m [13,14].
Highway information: This information is needed by all the vehicles in the range of 5 km. The time validity is all day [13,14].
Road congestion information: Such a warning message by the vehicle facing road congestion helps the other vehicles to make timely decisions such as to change lanes, etc. Only the vehicles within the 5 km range of the hazard need this information. Information is valid for only for 30 min [13,14].

4. Proposed Context-Aware Content-Naming (CACN) Scheme

In this section, we will present the context-aware content-naming (CACN) scheme. CACN scheme subdivides the name hierarchically into components. The initial component in the CACN scheme is content type (CT), enabling the efficient implementation of content prioritization schemes considering application type. This segregation of the content type is based on the communication requirement of the data, such as reliability, latency, and availability. Like native NDN, the content name components are separated with ‘/’. The subcomponents are segregated by the separator ‘:’ rather than ‘/’ for easier identification of names major and subcomponents. CACN scheme broadly divides the applications into two categories: safety and non-safety. These categories include VANETs applications having varying requirements, including reliability, latency, and availability.
Figure 1 presents the CACN scheme. The content name is divided into two partitions: (i) obligatory and (ii) supplementary. The obligatory part holds the contextual information about the content. The CACN scheme allows the entities to derive received content properties from its name. The context information is aggregated along with the following components: content type ( C T ), content scope ( C S ), content format ( C F ), application, w h e n , and w h e r e . C T represents the kind of content, i.e., safety or non-safety. Our naming scheme supports handling the content lookup more efficiently and effectively by allowing segregating the content according to C T . C S represents the scope of the content, i.e., local or global. The C F field represents content format, which is divided into four categories: text, audio, image, and video. The application component has two subcomponents: Application ID ( A p p I D ) and Sub-type ID. A p p I D uniquely identifies the VANETs application. Sub-type defines the nature of application such as news, sports, cartoons, and movies. The content name’s supplementary partition holds the information about the producer and vital information about the content such as fragments information (FI), its coding information, and content size, etc. Producer identity ( P I D ) holds vehicle identity (original or anonymous) information that generated the content, required to address the security requirements [21,42,43]. Due to the large and distributed nature of VANETs, mostly the communication occurs between vehicles that are strangers to each other. Moreover, there may exist malicious vehicles in the network that may broadcast false messages due to different reasons, including business gains, personality/habit, victim exploitation, irresponsibleness, and randomness. Calculating the trustworthiness of both data and vehicles will help vehicles to make correct, timely decisions to avoid dire consequences of acting on false messages from malicious vehicles. Therefore, we included P I D in our content name.
Figure 1. CACN naming format.
The CACN scheme exploits the coding scheme to represent most of the context information components, which include: (i) C T , (ii) C S , (iii) C F , (iv) A p p I D , (v) Sub-Type ID, (vi) R o a d T y p e , and (vii) more fragments (MF). The first byte of the content name holds information about the following name components: (i) C T , (ii) C S , (iii) C F , (iv) A p p I D . From the first byte of a content name, effective and efficient context-aware decisions related to the content forwarding, caching, and lookup can be made. The coding information helps support efficient lookup with minimum latency. The existing current state of the art [7,8,9] suggested 10 s as time validity for dangerous road warning applications. The current state of the art suggests similar values for spatial and time validity for each network environment (urban, rural, and highway). Our CACN enables the representation of the network environment as part of the name. The road type component is added in the CACN to be used, if necessary, to specify the spatial validity and time validity for applications based on road type. Our CACN allows us to introduce adaptive content dissemination solutions in NDN-based VANETs, that can make dynamic decisions (related to forwarding, cache management, etc.) based on content context (specified in the content name) information, rather than treating each content in the same way.

4.1. CACN Attributes and Coding

This section describes the CACN components and the coding scheme used for their representation.

4.1.1. CACN Obligatory Part

As depicted in Figure 1, the compulsory part of the CACN is divided into the following components:
  • Content Type ( C T ):  C T segregates the content into two basic types: safety and non-safety. For this segregation, only the first bit will be used. The safety content is represented by 0, while the non-safety content is represented by 1;
  • Content Scope ( C S ): The second bit will be used to represent C S . The C S can be local, represented by 0, or global, represented by 1. VANETs applications can also be distinguished by their scope, i.e., whether they provide communication across a large geographical area or are local only. The applications having local scope represent a restricted spatial scope and a limited temporal scope. Examples include post-crash warnings and multimedia sharing. The global scope represents that the content can be disseminated within the larger geographic area. Examples include distributed games.
  • Content Format ( C F ): The CACN scheme supports four content formats: text, audio, image, and video. C F help manages the content according to its quality of service (QoS) requirements. With 2 bits, four states can be supported: 00, 01, 10, or 11. The 2-bit state 00 is used to represent text notification or information, 11 for video content, 01 for pictorial information, and 10 for audio-type content;
  • Application:
    • Application ID ( A p p I D ): Four bits are used for application specification. CACN naming scheme allows representing 32 different applications uniquely. For this purpose, CT and A p p I D content-naming components are considered in combination. A total of 4 bits for A p p I D , allow representing 16 safety and 16 non-safety applications where each application can have 16 subtypes. The general segregation of applications is safety and non-safety categories, using the bit coding scheme is as follows:
      • When CT = 0
        A p p I D = 0000 used to represent post-crash notification
        A p p I D = 0001 used to represent work zone
        A p p I D = 0010 used to represent dangerous road warning
        A p p I D = 0011 used to represent emergency vehicle warning
        A p p I D = 0100 used to represent highway information
        A p p I D = 0101 used to represent road congestion information
        ..
      • When CT = 1
        A p p I D = 0000 used to represent multimedia file sharing
        A p p I D = 0001 used to represent commercial advertisement
        A p p I D = 0010 used to represent traffic navigation map
        .
    • Sub-Type ID (Sub-Type ID): Four bits are used for application sub-type specification. The general segregation of application sub-type, using the bit coding scheme is as follows:
      • When CT = 0, A p p I D = 0000
        Sub-Type ID = 0000 used to represent head-on collisions;
        Sub-Type ID = 0001 used to represent hit from behind;
        Sub-Type ID = 0010 used to represent hitting the driver in front;
        Sub-Type ID = 0011 used to represent hide collisions;
        …………………………………………..
      • When CT = 1, A p p I D = 0000
        Sub-Type ID = 0000 used to represent scenic landscape;
        Sub-Type ID = 0001 used to represent drama;
        Sub-Type ID = 0010 used to represent cartoon;
        Sub-Type ID = 0011 used to represent music;
        …………………………………………..
  • W h e n :  W h e n represents the content creation time used to hold the content time of creation. We have not designed a coding scheme for this naming component. For the sake of flexibility, we have left it open-ended. However, it can be represented using Unix base timestamp format (length 4–8 bytes [44]);
  • Where: Where is comprised of L o c a t i o n , L a n e I D , and R o a d T y p e . L o c a t i o n represents the location where the content is generated or to which it belongs. CACN scheme is based on global positioning system (GPS) location, and the vehicles obtain their location information via GPS. For example, 31.418474/73.079147 information represents the clock tower Faisalabad, Pakistan location. The location can be represented using 8 to 16 bytes [45];
  • R o a d T y p e is used to represent the network environment. L a n e I D represents the lane number. Road type (urban, rural, or highway) represents VANET’s conditions such as density and network traffic. Two bits are used for R o a d T y p e specification: state 00 to represent a rural road, 01 for urban road, 10 for highway, and 11 for the street. L a n e I D   can be calculated using one of the schemes presented in recent work on L a n e I D computing [46].

4.1.2. CACN Optional Information Part

  • Producer ID (PID): The PID can hold information such as registration number, MAC address, anonymous identity (pseudonym). We have not designed a coding scheme for this naming component, but it can be represented using 6 to 18 bytes [23];
  • Content Length (CL): CL holds information about the content size. We have not designed a coding scheme for this naming component. It can be represented using 2 to 4 bytes as represented in IP networks [47];
  • Coding Info (CI): Holds information about the content format, such as resolution encoding and sampling information. We have not designed a coding scheme for this naming component but can be represented using the scheme exploited in [48];
  • Fragments Information (FI): In a case where the data cannot be forwarded using a single packet because of its size, then data are divided into fragments. The fragments may be received out of order; therefore, the fragment offset (FO) information component is exploited while reassembling the received fragments. The FO contains fragment offset information to identify the fragment’s starting position in relation to the original packet. FO is set to 0 in the first packet. For remaining fragments, FO is computed in units of 8-byte blocks as computed in IP networks [47]. This component will be empty in case the content is not divided into fragments. More fragments (MF) flag represents that there exist more fragments after the current fragment for a packet. MF value is either 0 or 1. The value 0 represents that it is the last fragment of the specific content;
  • Hash: Hash-tag is added to uniquely identify the content, generated using the hashing algorithm, either MD5 or SHA-1. It can be represented using 12 to 16 bytes.

4.2. Use Case Scenarios in NDN-Based VANETs

4.2.1. Non-Safety Content

Figure 2 shows an example scenario where the vehicle produced non-safety music content while moving from an urban area (Markaz G-9, Islamabad, Pakistan). The vehicle gets its location information via GPS. The content is generated at location (1323201600;1323205200) on Friday, 5 June 2020, 9:49:40 PM GMT+05:00 (Unix timestamp= 1542193562000). The producer vehicle has registration number ABC-888. The content has a local scope, audio format, and multimedia file sharing application type. The content is not divided into fragments. The audio content size is 4 KB, and the format is MPEG. The generated content name prefix is as follows: /1/0/10/0000:0011/1591393780/ 33.689037,73.032418::01/ABC-888/4028/MPEG///....
Figure 2. Example scenario where the non-critical content is generated by vehicle.

4.2.2. Safety Content

Let us consider an example scenario where the vehicle produced post-crash video content on the urban road at location (1323201600;1323205200) on Friday, 5 June 2020, 9:49:40 PM GMT+05:00 (Unix timestamp = 1542193562000). The producer vehicle has registration number LH-888 and is in lane 2. The content has a local scope, video format, and post-crash notification application type. The content is not divided into fragments. The content size is 1 MB, and the format is 3GP. The generated content name prefix will be as follows:
/0/0/11/0000:0000/1578808800/33.653006,73.157438:lane2:01/LH-888/1000000/3GP/….

4.2.3. Content Fragmentation

Let us consider an example scenario where the vehicle produced a large-size non-safety cartoon content while moving from an urban area Markaz G-9, Islamabad, Pakistan (GPS location: 1323201600;1323205200) on Friday, 5 June 2020, 9:49:40 PM GMT+05:00 (Unix timestamp = 1542193562000). The producer vehicle is having a registration number LH-888. The content has a local scope, video format, and multimedia file sharing application type. The movie is divided into small fragments considering the maximum transmission unit (MTU) allowed on the outgoing face. Let us suppose the size of the video is 4000 bytes and the MTU is 2000 bytes. Let us suppose that the content name size and other attributes in the data message are 100 bytes. Three fragments will be required to transmit the video.
  • The first fragment will contain 1900 bytes of the video content. The fragment offset will be zero, and MF will be set to 1. The context-aware content name for the first fragment will be:
    /1/0/11/0000:0010/1591393780/33.689037,73.032418::01/ABC-888/4000B//3GP/0:1/....
  • The second fragment will contain 1900 bytes of the video content. The fragment offset will be ( 1900 / 8 ) = 237.5 , and MF will be set to 1. The context-aware content name for the second fragment will be:
    /1/0/11/0000:0010/1591393780/33.689037,73.032418::01/ABC-888/4000B//3GP/ 237.5:1/....
  • The third fragment will contain 200 bytes of video content. The fragment offset will be ( 3800 / 8 ) = 475 ,   and MF will be set to 0. The context-aware content name for the third fragment will be:
    /1/0/11/0000:0010/1591393780/33.689037,73.032418::01/ABC-888/4000B//3GP/ 475:0/…..
CACN scheme handles the content lookup more efficiently by allowing seclusion according to content type (i.e., safety and non-safety content). Furthermore, it also allows prioritizing the content delivery based on C T , or/and C F , or/and A p p I D . The A p p I D ,   C F ,   C I   components allow identification of the basic communication requirements of the requested content. In addition, the A p p I D ,   s u b t y p e I D , C F components support prioritizing the content. Non-safety content communication requirements differ from safety content. Safety applications have fewer bandwidth requirements but have limited spatial scope concerning the extent of a geographical area in which the information is required, valid and valuable. Our scheme addresses non-safety contents as well by permitting to insert the necessary information such as coding information, size, and content fragmentation. Moreover, C T ,   A p p I D , RoadType helps to associate the spatial and temporal scope with the application. The road can be of type rural, urban, or highway. Existing work [7,8,9] just emphasizes associating single spatial scope and temporal scope with an application without considering the environment. However, our naming scheme supports linking different spatial scope and temporal scope with the same application considering road type/environment. For example, if the spatial scope of the post-crash notification application is 500 m in urban areas, then on highways, the spatial validity might be by 750 m due to high speed. Like existing work [7,8,9] in Section 5, we considered that an application is associated with a single spatial and temporal scope.

5. Context-Aware Forwarding Scheme for Safety Contents

In this section, we present the decentralized context-aware notification (DCN) protocol that broadcasts information about an event for awareness within the application-based geographical area. In this approach, whenever an event occurs, it notifies the nearby entities about the existence of the content. In the real-world scenario, when an accident occurs, then an event (e.g., the release of an airbag) triggers a system to send DCN messages to inform nearby entities [23]. In our scheme, the producer vehicle is immovable and sends DCN messages to the nearest RSU and vehicles. The DCN protocol aims to reach as many entities as possible quickly by generating less possible overhead in the network. The proposed DCN protocol performs better for safety applications, where the DCN message is intended for all the vehicles that are lying in the specific geographical area (as required by the specific application represented by spatial validity).
The DCN message contains the content name prefix and the location of the entity that forwards the DCN message (termed as the previous node). In the previous section, we proposed a context-aware hierarchical naming scheme for NDN-based VANETs that effectively reduces content name size with coding. The content name provides meaningful information about context to entities, thus optimizing network use. Like native NDN, each entity includes three data structures. The forwarding information base (FIB) data structure stores the forwarding information by maintaining a mapping of the content name prefixes and the interfaces (Face) through which the data packets can be forwarded. The pending interest table (PIT) stores the currently pending interests and their incoming interface that have not yet been served. The content store (CS) caches the content objects according to a caching policy.
In the work of [39], hop count is used to control the dissemination of the message, whereas, in the work of [23], the area-of-interest (RSU radio range) concept is exploited. The DCN protocol aims to reach as many entities as possible quickly by generating less possible overhead in the network. In our work, each vehicle can participate in the dissemination of the received DCN message only if it meets the spatial and time validity. To check the spatial and time validity of DCN messages, each vehicle is equipped with a spatial and temporal scope (STS) table. The STS table has five attributes: (i) CT, (ii) A p p I D , (iii) spatial scope (SS), (iv) temporal scope (TS), and (v) road type. As discussed in Section 2, each VANETs application is associated with spatial and time validity. The spatial and time validity for an application may vary based on the road type.
On reception of DCN message, the vehicles store in their forwarding information base (FIB) content name and the incoming interface. Every vehicle that receives a DCN message ( DCN _ msg ) verifies whether a similar entry already exists for the name prefix specified in the received DCN _ msg (Line 3 of Algorithm 1). If it is a duplicate message, the vehicle inhibits itself from forwarding the DCN message. If there is no such entry, then it first verifies the spatial and time validity of the received message.
Algorithm 1: DCN message dissemination protocol
/ /   S T S T a b l e       S p a t i a l   a n d   T e m p o r a l   S c o p e   t a b l e  
/ /   D C N   m e s s a g e   ( D C N _ m s g )   i n c l u d e   c o n t e n t   n a m e   ( C A C N ) ,   p r e v i o u s   n o d e   l o c a t i o n   ( P r e v N o d e L o c a t i o n )
    I f   ( C h k F o r D u p l i c a t e ( D C N _ m s g . C A C N )     ! = T R U E )   t h e n
      / /   S e a r c h i n g   a p p l i c a t i o n   s p e c i f i c   s p a t i a l   a n d   t e m p o r a l   s c o p e   i n   S T S   t a b l e
      / /   D C N _ m s g . C A C N . C T     c o n t e n t   t y p e   s p e c i f i e d   i n   C o n t e x t   a w a r e   c o n t e n t name
      / /   D C N _ m s g . C A C N . A p p I D     A p p I D   s p e c i f i e d   i n   C o n t e x t   a w a r e   c o n t e n t   n a m e
      A p p T e m p S c o p e T S _ S T S T a b l e   ( D C N _ m s g . C A C N . C T ,       D C N _ m s g . C A C N . A p p I D )
      A p p S p a t i a l S c o p e S S _ S T S T a b l e   ( D C N _ m s g . C A C N .   C T ,       D C N _ m s g . C A C N . A p p I D )
      / /   C o m p u t i n g   t i m e   f r e s h n e s s ,   a n d   d i s t a n c e   t o   h a z a r d   a t   c u r r e n t   V e h i c l e
      T i m e F r e s h n e s s T i m e I n T r a n s i t   ( D C N _ m s g . C A C N . W h e n ,   C u r r e n t D a t e T i m e ( ) ) ;
      C u r r N o d e _ D i s t H a z a r d D i s t a n c e   ( D C N _ m s g . C A C N . W h e r e . L o c a t i o n ,   C u r r e n t L o c a t i o n ( ) ) ;
        I f   ( T i m e F r e s h n e s s <     A p p T e m p S c o p e )
  I f   ( D i s t T o H a z a r d <     A p p S p a t i a l S c o p e )
          // Computing previous entity (forwarder) distance to hazard
  PrevNode _ DistHazard Distance   ( DCN _ msg . CACN . Where . Location ,   DCN _ msg . PrevNodeLocation ) ;
  Angle _ PrevNode AngleCompute ( DCN _ msg . PrevNodeLocation ,   CurrentLocation ( ) ) ;
I f   ( R e d Z o n e ( A n g l e _ P r e v E n t i t y ) )
F r w d T i m e D e l a y M a x * ( 1   P r e v N o d e _ D i s t H a z a r d   C u r r N o d e _ D i s t H a z a r d R R m a x ) + D e l a y r a n d o m ( 0 , i )  
E l s e
F r w d T i m e D e l a y M a x * ( 1   P r e v N o d e _ D i s t H a z a r d   C u r r N o d e _ D i s t H a z a r d R R m a x ) + D e l a y r a n d o m ( i , j )  
  S e t D C N T i m e r ( F r w d T i m e )
E l s e
D r o p   D C N _ m s g  
S t o p D C N T i m e r ( F r w d T i m e )
Let us suppose that the received DCN message is related to the application with A p p I D =   A p p i . Based on the CACN components ( C T , and A p p I D ), the STS table lookup is carried out to determine the spatial and temporal scope of the application (Equation (1), Equation (2)). The CACN component R T can also be used if spatial and temporal scopes for applications are stored in the STS table based on road type.
A p p T e m p S c o p e T S _ S T S T a b l e ( D C N _ m s g . C A C N . C T ,   D C N _ m s g . C A C N . A p p I D )                    
A p p S p a t i a l S c o p e S S _ S T S T a b l e ( D C N _ m s g . C A C N .   C T ,   D C N _ m s g . C A C N . A p p I D )              
The vehicle computes time freshness based on current date and time and W h e n component using Equation (3). The time freshness represents time in transit after DCN _ msg creation, computed to verify time validity requirement.
T i m e F r e s h n e s s T i m e I n T r a n s i t   ( D C N _ m s g . C A C N . W h e n ,   C u r r e n t D a t e T i m e ( ) )          
Time validity of the received DCN message is satisfied if the computed TimeFreshness is less than the AppTempScope of the A p p i given in the STS table (as shown in Algorithm 1). If the time validity is satisfied, a new FIB entry is added, and the receiving vehicle schedules to forward it using the deferred timer. Unix base timestamp format is exploited to store the date and time of creation in the W h e r e name component in CACN.
C u r r N o d e _ D i s t H a z a r d D i s t a n c e   ( D C N _ m s g . C A C N . W h e r e . L o c a t i o n ,   C u r r e n t L o c a t i o n ( ) )
To verify spatial validity, the distance from the vehicle current location to the location where the content was produced (mentioned in W h e n name component) is computed (Equation (4)). The spatial validity of the received DCN message is satisfied if the computed distance is less than the AppSpatialScope of the A p p i given in the STS table. Deferred timer concept and a duplicate suppression mechanism are being introduced to avoid the broadcast storm problem (unnecessary retransmissions). The forwarding strategy is based on the following components: location of the previous vehicle, maximum radio range, zone type to which the vehicle is associated (constructed based on the angular information), and distance between vehicles with respect to the entity that generated the event. Upon reception of the DCN message, the receiving vehicle computes the zone in which it lies, considering the previous vehicle location from which it received the message.
In our scheme, there are two types of zones: red and white. As shown in Figure 3, each receiving vehicle divides the area of communication (1-hop) into eight zones, each of 45 degrees. The four zones with the following ranges are termed as red zones: (i) > = 67.5   a n d 112.5 , (ii) > = 157.5   a n d 202.5 , (iii) > = 247.5   a n d 292.5 , and (iv) 22.5   a n d > = 337.5 . Red zones are the most significant zones due to the following reasons: (i) in these zones, most vehicles are mobile, (ii) being the middle zones (in the vehicle’s radio range), selecting forwarders first from these zones will help reduce unnecessary retransmission. The remaining four zones are termed white zones. The suppression angle concept is introduced to provide priority to vehicles located in better positions on roads. Exploiting the previous vehicle location from which the current vehicle received the message, the vehicle computes the angle information (Equation (5)).
A n g l e _ P r e v N o d e A n g l e C o m p u t e ( D C N _ m s g . P r e v N o d e L o c a t i o n ,   C u r r e n t L o c a t i o n ( ) )
Figure 3. Communication range divided into eight zones: 04 Red, and 04 White zones.
Using the angle information, the vehicle figures out whether it lies in the red zone or the white zone. To address the broadcast storm problem due to the broadcast of DCN messages, forwarding priorities are computed by all vehicles that lie inside the transmission region based on information including zone type, the distance between vehicles with respect to event vehicle (that generated the event), and maximum radio range ( R R m a x ). For such purpose deferred timer concept is exploited.
When a vehicle broadcasts the DCN message, all vehicles in the vicinity receive the message. If it is not a duplicate message, meets spatial and time validity, every vehicle sets a deferral timer. Red zones vehicles are given priority over white zone vehicles. A deferral timer is set based on geographic progress toward the destination and the type of zone in which it lies. This allows the eligible receiving vehicles to contend for the forwarder. Shorter delays are calculated by the vehicles in red zones compared to vehicles in white zones, as shown in Algorithm 1. A small delay is added to the computed deferred timer value of the vehicles in white zones. The aim is if they overhear the duplicate message from vehicles, then they should suppress it; otherwise, they send it upon timer expiry.
The geographic progress toward the destination (where spatial validity expires) is computed based on two information components: (i) distance of the previous vehicle from the hazardous site location (Equation (6)), and (ii) distance of the current vehicle from the hazardous site location (Equation (4)). The farthest vehicle(s) that lies in the red zone(s) are given priority by computing shorter delays (waiting time) for them (Equation (7)). During the waiting time, the vehicle listens to the channel. If it overhears the DCN message with the same content name, then it stops the timer.
P r e v N o d e D i s t H a z a r d D i s t a n c e   ( D C N _ m s g . C A C N . W h e r e . L o c a t i o n   ,     D C N _ m s g . P r e v N o d e L o c a t i o n )
F r w d T i m e D e l a y M a x * ( 1     P r e v N o d e D i s t H a z a r d   C u r r N o d e D i s t H a z a r d R R m a x ) +   D e l a y r a n d o m ( 0 , i )

6. Performance Evaluation

For evaluation of our proposed scheme called DCN protocol, which exploits the CACN naming scheme, we implemented it in ndnSIM [40,41]. To create mobility scenarios, we distributed a set of (50 primarily) vehicles randomly on the road of 1.8 km. Different events on the road (e.g., road work, post-crash notification, etc.) can significantly affect traffic conditions. Dissemination of event notification to vehicles heading to the event site may help to make timely decisions such as to reroute or reduce speed. In most safety applications, only a message containing CACN will be sufficient for vehicles to make a timely decision. For example, in safety applications such as dangerous road warning, work zone warning, emergency vehicle warning, and post-crash notification, all vehicles moving to the hazardous site need a contextual alert. Such an alert will be adequate for most of the vehicles, reducing the need to send explicit interest messages to request data. We compare our scheme performances with the most recent proposals: hierarchical name-based (HNB) [23] and extended content-centric network (ECCN) [39].
Our proposed DCN scheme considers a push-based scheme for the dissemination of notification messages containing context-aware content names. The schemes presented in the works of [23,39] exploit a push-based approach for the dissemination of safety content. Therefore, we selected these two closely relevant schemes for comparison. Another reason for selecting the work of [23] is that it also proposes a naming scheme for vehicular communication. We considered the safety application scenario as considered in the work of [23,39]). Figure 4 presents an experimental scenario where an accident vehicle broadcasts the message to the entities (RSU, vehicle) in its neighborhood. In our proposed DCN protocol, a message is comprised of two fields: CACN and the location of the previous forwarder vehicle. The size of the DCN message is 83 bytes. Whereas in the case of HNBs [23] and ECCN [39], the message is a data message with content of size 1103 bytes. Just like the work of [23,39], we assume that each vehicle is equipped with GPS, using which it obtains its location. In the simulation scenario, we use an 1800 m road, with one accidental vehicle as a producer. Common parameter settings for all the experiments are depicted in Table 2.
Figure 4. Simulation scenario.
Table 2. Common configuration parameters.
In the work of [39], hop count is used to control the dissemination of the data message, whereas, in the work of [23], the area-of-interest (RSU radio range) concept is exploited. In addition, no suppression scheme is proposed to address the broadcast storm problem. In the work of [23], no suppression scheme is incorporated to address the broadcast storm problem. In the work of [23], whenever a vehicle receives a data packet, it will participate in its dissemination if it is lying in the RSU radio range whose ID is mentioned in the content name. Each time upon receiving the same (duplicate) message from the neighbors, a vehicle reforwards it as long as it satisfies the validity check (lying in the RSU range whose ID is mentioned in the content name). Depending on the vehicle speed and radio range of the RSU, a vehicle resends the same (duplicate) message a large number of times. In the work of [39], hop count is used to control the dissemination of the data message. In addition, no suppression scheme is proposed to address the broadcast storm problem. In the work of [39], when a vehicle receives a data packet, it will participate in its dissemination only if the TTL in the packet is greater than zero. Each time upon receiving the same (duplicate) message from the neighbors, a vehicle reforwards it after decrementing the TTL. Each time when a vehicle receives the same data message from one or more of its neighbors (with identical or different TTL), it will reforward it (if it meets the validity check) after decrementing the TTL. In our work, each vehicle can participate in the dissemination of the received DCN message only if it meets the spatial and time validity. Furthermore, our scheme incorporates a suppression scheme to address the broadcast storm problem. In all the experiments for our proposed DCN protocol, we considered the spatial validity as 900 m and time validity as 10 s. For ECCN [39], we set the time to live (TTL) requirement to 15. Each experiment scenario evaluation is repeated 10 times, and the results are plotted after taking the average.

6.1. Experiment 1: Total Number of Messages Processed vs. Number of Packets Created Per Second

The experiment is carried out to demonstrate the network load in terms of the total number of transmissions (data [23,39] or DCN messages) as a function of the number of messages generated by the event vehicle per second. This experiment is conducted over a network of 50 vehicles, with an average speed of 72 kph. In this experiment, the number of messages generated by the event vehicle ranges between 1 and 7 packets/s. The X-axis is representing the number of messages generated by the event vehicle per second, and the Y-axis represents the number of transmissions. The Y-axis uses a logarithmic scale [49]. Figure 5 shows the comparison of our DCN protocol with HNB [23] and ECCN [39]. The schemes presented in the works of [23,39] exploit a push-based mechanism for the dissemination of safety content. In HNB [23], only those vehicles continue participation in dissemination that lies in the radio range of RSU, whose ID is mentioned in the content name. No message suppression scheme is presented. If a vehicle receives the data packet and is not in the radio range of a specific RSU, it discards it. In ECCN [39], each vehicle participates in the dissemination of safety content if the TTL requirement is satisfied. In contrast, in our proposed DCN protocol, the event vehicle only disseminates the notification message containing context-aware content name. Each vehicle participates in its dissemination as long as it satisfies the spatial validity and time validity. In addition, a suppression scheme is incorporated to address broadcast storm problems (by controlling the dissemination of duplicate messages). In Figure 5, it is obvious that with an increase in the number of messages generated by the event vehicle per second, there is an increase in the number of messages generated for DCN, HNB [23], and ECCN [39]. The proposed scheme (DCN) minimizes the number of messages disseminated in the network and can be considered as a solution for the dissemination of notification information related to safety content.
Figure 5. Total number of messages generated per second.

6.2. Experiment 2: Total Number of Messages Processed with Relative Speed

The experiment is carried out to demonstrate the network load in terms of the total number of transmissions as a function of the vehicle’s speed. This experiment is conducted over a network of 50 vehicles with varying speeds ranging from 40 to 120 kph. The X-axis is representing the average vehicle speed, and the Y-axis represents the number of transmissions. In Figure 6, the vertical axis (Y-axis) uses a logarithmic scale [49]. Figure 6 shows the comparison of our DCN protocol with HNB [23] and ECCN [39]. In this experiment, the event vehicle generates one message per second. In the case of HNB [23], due to an increase in vehicle speed, it stays in the RR of the RSU for a short duration. In the work of [23], the area-of-interest (RSU radio range) concept is exploited to control the dissemination of the data message. The vehicle participates in the dissemination only if it lies in the area of interest. Therefore, with an increase in vehicle speed, there is a decrease in the number of messages for HNB [23]. For DCN, an increase in speed does not impact the number of message transmissions, and the reason is that a node participates a limited number of times due to the proposed suppression scheme. In the work of [39], hop count is used to control the dissemination of the data message. Due to increased speed, a dynamic environment is generated that restricts interconnectivity between vehicles for a longer duration. Consequently, there is a slight increase in the number of transmissions with the speed increase.
Figure 6. Total number of messages processed with relative speed.

6.3. Experiment 3: Total Number of Messages Processed vs. Number of Vehicles

The experiment is carried out to demonstrate the network load in terms of the total number of transmissions as a function of the number of vehicles. This experiment is carried out over the networks with 40, 50, 60, 70, 80, 90, 100, and 120 vehicles, with an average speed of 70 kph. The X-axis represents the number of vehicles in the network, and the Y-axis represents the number of transmissions. In Figure 7, the vertical axis (Y-axis) uses a logarithmic scale [49]. In this experiment, the event vehicle generates one message per second. Figure 7 shows a performance comparison of our DCN protocol with HNB [23] and ECCN [39]. It is obvious to see that with an increase in the number of vehicles, there is an increase in the number of messages for DCN, HNB [23], and ECCN [39]. In the proposed DCN, the message dissemination is controlled; therefore, the trend is not as steep as that of ECCN [39] and HNB [23].
Figure 7. Total number of messages processed as a function of the number of vehicles.

6.4. Experiment 4: Total Energy Consumption

In this experiment, we demonstrate the scalability property of our proposed DCN protocol. We conducted a set of experiments (Figure 8, Figure 9 and Figure 10) to demonstrate the overall energy consumption in the network. In Figure 8, Figure 9 and Figure 10, the vertical axis (Y-axis) uses a logarithmic scale [49]. For this experiment, we consider the energy model presented in the work of [23,50] for energy consumption evaluation. Figure 8 demonstrates the energy consumption as a function of the number of messages generated by the event vehicle per second. In Figure 8 and Figure 10, the number of vehicles considered is 50. In contrast, 75 kph is considered as average vehicle speed. In Figure 8, it can be seen that with an increase in the number of messages generated by the event vehicle per second, there is an increase in the energy consumption for DCN, HNB [23], and ECCN [39].
Figure 8. Total energy consumption by the increasing number of messages generated per second.
Figure 9. Total energy consumption increasing network size.
Figure 10. Total energy consumption considering the average relative speed of vehicles.
Figure 9 demonstrates the energy consumption as a function of the network size. The average speed of vehicles is 75 kph. In Figure 9 and Figure 10, the event vehicle generated one message per second. With an increase in the number of vehicles, there is an increase in the number of messages, resulting in an increase in energy consumption for DCN, HNB [23], and ECCN [39]. Figure 10 demonstrates the overall network energy consumption as a function of an increase in the average vehicle speed. In this experiment, the event vehicle generates one message per second. It is obvious to see that, with an increase in vehicle speed, there is a decrease in the energy consumption for DCN, HNB [23], and ECCN [39]. In contrast, the energy in the case of ECCN presents a slightly increasing trend.

6.5. Experiment 5: Network Load

In this experiment, we demonstrate the scalability property of our proposed DCN protocol. We conducted a set of experiments (Figure 11, Figure 12 and Figure 13) to demonstrate the network load. In Figure 11, Figure 12 and Figure 13, the vertical axis (Y-axis) uses a logarithmic scale [49]. Figure 11 demonstrates the network load as a function of the number of messages generated by the event vehicle per second. This experiment is conducted over a network of 50 vehicles, with an average speed of 75 kph. In this experiment, the number of messages generated by the event vehicle ranges between 1 and 7 packets/s. It is obvious to see that, with an increase in the number of messages generated by the event vehicle per second, there is an increase in the network load for DCN, HNB [23], and ECCN [39].
Figure 11. Total network load as a function of the number of messages.
Figure 12. Total network load as a function of average vehicle speed.
Figure 13. Total network load as a function of the number of vehicles.
Figure 12 demonstrates the network load as a function of the average vehicle speed. This experiment is conducted over a network of 50 vehicles with varying speeds between 40 and 120 kph. In Figure 12 and Figure 13, the event vehicle generates one message per second. It is obvious to see that, with an increase in vehicle speed, there is a decrease in the network load for HNB [23]. Figure 13 demonstrates the network load as a function of the network size. It is obvious to see that, with an increase in the number of vehicles, there is an increase in the network load for DCN, HNB [23], and ECCN [39].

6.6. Experiment 6: Delay

Figure 14 illustrates the average delay of DCN, HNB [23], and ECCN [39] schemes in a VANETs scenario. This experiment is conducted over a network of 50 vehicles, with an average speed of 75 kph. In this experiment, the number of messages generated by the event vehicle ranges between 1 and 7 packets/s.
Figure 14. Average delay as a function of the total number of messages generated per second.
Figure 14 shows that HNB [23] and ECCN [39] face higher delays compared to our proposed DCN scheme. This is due to an increase in congestion due to a higher number of packets in the network. DCN protocol is based on CACN and exploits the receiver-based suppression scheme. The DCN protocol allows the packets to reach the vehicles coming toward the event site with minimum delay.

7. Conclusions

Different events on the road (e.g., road work, post-crash notification, etc.) could have a big impact on traffic conditions. Dissemination of information about such events to all vehicles heading toward the event site may help them decide whether rerouting or reducing speed is necessary. It is required to disseminate the information to all the vehicles heading toward the event site within a short time. To disseminate safety content information, there exist literature that exploits push-based data dissemination technique in NDN. Such schemes though meet the low latency requirement but result in a broadcast storm problem in the dense NDN-based VANETs. In most safety applications, only a contextual alert containing a context-aware name will be enough for vehicles to make the decision timely. In NDN, content name plays a vital role in effective and efficient content forwarding and caching.
In this paper, the context-aware content-naming (CACN) scheme is presented to provide an adaptive content dissemination solution in NDN-based VANETs. The focus is making dynamic decisions related to forwarding, cache management, etc. (based on content context, spatial validity, time validity information) rather than treating each content in the same way. In the content name, the context information is aggregated along with the information components such as: type of content (such as safety and non-safety), scope, application type (e.g., post-crash notification), content format (text, audio, and video), the location where content is generated, the time when content is generated, and network environment (such as road type (rural, urban, highway) where the vehicle is located). CACN allows naming the safety and non-safety contents. The CACN scheme aggregates the context and content-specific information. In addition, a coding scheme is presented to represent most of the content name components, which enables addressing communication and storage complexity.
To overcome the broadcast storm problem, we presented a receiver-based DCN protocol that exploits angle information, distance, zone, spatial validity, and time validity information to select a forwarder. We have demonstrated by simulation that the proposed DCN protocol reduces unnecessary DCN message retransmissions. Furthermore, due to the context-aware content name (CACN) in the message, the vehicle can make decisions more quickly, as it reduces the need in the majority of the safety applications to access the data packet explicitly. Very few NDN-based VANETs naming schemes exist, but these cannot cater to a wide range of VANETs applications. In the future, there is a need for NDN-based VANETs naming schemes that focus on the context-aware naming of both safety and non-safety applications.

Author Contributions

Conceptualization, W.U.I.Z. and F.J.; Methodology, W.U.I.Z., M.A.U.R., and F.J.; Validation, W.U.I.Z., F.J., M.A.U.R., Z.R., and B.-S.K. Formal Analysis, W.U.I.Z., F.J., and M.A.U.R.; Investigation, W.U.I.Z., F.J., Z.R., and M.A.U.R.; Resources, W.U.I.Z., F.J., M.A.U.R., and Z.R.; Writing—Original Draft Preparation, W.U.I.Z. and F.J.; Writing—Review and Editing, W.U.I.Z., F.J., M.A.U.R., Z.R., and B.-S.K.; Supervision, F.J.; Funding Acquisition, F.J., W.U.I.Z., B.-S.K., and Z.R. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Maalej, Y.; Sorour, S.; Abdel-Rahim, A.; Guizani, M. VANETs meet autonomous vehicles: A multimodal 3D environment learning approach. In Proceedings of the GLOBECOM 2017-2017 IEEE Global Communications Conference, Singapore, 4–8 December 2017; Institute of Electrical and Electronics Engineers (IEEE): Piscataway, NJ, USA, 2017; pp. 1–6. [Google Scholar]
  2. Shladover, S.E. Connected and automated vehicle systems: Introduction and overview. J. Intell. Transp. Syst. 2018, 22, 190–200. [Google Scholar] [CrossRef]
  3. Maria, A.; Biagi, M.; Cusani, R. Smart Vehicles, technologies and main applications in vehicular ad hoc networks. In Vehicular Technologies: Deployment and Applications; Giordano, L.G., Reggiani, L., Eds.; BoD–Books on Demand: Norderstedt, Germany, 2013. [Google Scholar] [CrossRef] [Green Version]
  4. Somerville, H.; Cherelus, G. Uber Resumes Self-Driving Program Three Days after Arizona Crash. Available online: http://mobile.reuters.com/article/idUSKBN16Y1WB (accessed on 21 March 2021).
  5. Automated Driving: Insurance Industry’s Role in Automated Driving. Available online: https://www.abi.org.uk/products-and-issues/topics-and-issues/driverless-cars/ (accessed on 21 March 2021).
  6. Data is the New Oil in the Future of Automated Driving. Available online: https://newsroom.intel.com/editorials/krzanich-the-future-of-automated-driving/#gs.fbpq63 (accessed on 21 March 2021).
  7. Lee, E.; Lee, E.; Gerla, M.; Oh, S.Y. Vehicular cloud networking: Architecture and design principles. IEEE Commun. Mag. 2014, 52, 148–155. [Google Scholar] [CrossRef]
  8. Villarreal-Vasquez, M.; Bhargava, B.; Angin, P. Adaptable safety and security in V2X systems. In Proceedings of the 2017 IEEE International Congress on Internet of Things (ICIOT), Honolulu, HI, USA, 25–30 June 2017; Institute of Electrical and Electronics Engineers (IEEE): Piscataway, NJ, USA, 2017; pp. 17–24. [Google Scholar] [CrossRef]
  9. Eze, E.C.; Zhang, S.-J.; Liu, E.-J.; Eze, J.C. Advances in vehicular ad-hoc networks (VANETs): Challenges and road-map for future development. Int. J. Autom. Comput. 2016, 13, 1–18. [Google Scholar] [CrossRef] [Green Version]
  10. Cunha, F.D.; Boukerche, A.; Villas, L.; Viana, A.C.; Loureiro, A.A.F. Data Communication in VANETs: A Survey, Challenges and Applications; [ResearchReport] RR-8498, INRIA Saclay; hal-00981126v4; INRIA: Palaiseau, France, 2014. [Google Scholar]
  11. Najafzadeh, S.; Ithnin, N.B.; Abd Razak, S. Broadcasting in connected and fragmented vehicular ad hoc networks. Int. J. Veh. Technol. 2014, 2014, 1–15. [Google Scholar] [CrossRef] [Green Version]
  12. Jeong, J. IP-based Vehicular Networking: Use Cases, Survey and Problem Statement. Available online: https://tools.ietf.org/id/draft-ietf-ipwave-vehicular-networking-01.html#rfc.section.4 (accessed on 26 March 2021).
  13. Fang, C.; Yao, H.; Wang, Z.; Wu, W.; Jin, X.; Yu, F.R. A survey of mobile information-centric networking: Research issues and challenges. IEEE Commun. Surv. Tutor. 2018, 20, 2353–2371. [Google Scholar] [CrossRef]
  14. Khelifi, H.; Luo, S.; Nour, B.; Moungla, H.; Faheem, Y.; Hussain, R.; Ksentini, A. Named data networking in vehicular ad hoc networks: State-of-the-Art and challenges. IEEE Commun. Surv. Tutor. 2020, 22, 320–351. [Google Scholar] [CrossRef] [Green Version]
  15. Wang, L.; Wakikawa, R.; Kuntz, R.; Vuyyuru, R.; Zhang, L. Data naming in vehicle-to-vehicle communications. In Proceedings of the 2012 Proceedings IEEE INFOCOM Workshops, Orlando, FL, USA, 25–30 March 2012; Institute of Electrical and Electronics Engineers (IEEE): Piscataway, NJ, USA, 2012; pp. 328–333. [Google Scholar]
  16. Pesavento, D.; Grassi, G.; Palazzi, C.E.; Pau, G. A naming scheme to represent geographic areas in NDN. IFIP Wireless Days (WD) 2013, 1–3. [Google Scholar] [CrossRef]
  17. Yan, Z.; Zeadally, S.; Park, Y.-J.; Park, Y.-J. A novel vehicular information network architecture based on named data networking (NDN). IEEE Internet Things J. 2014, 1, 525–532. [Google Scholar] [CrossRef]
  18. Amadeo, M.; Campolo, C.; Molinaro, A. Priority-based content delivery in the internet of vehicles through named data net-working. J. Sens. Actuator Netw. 2016, 5, 17. [Google Scholar] [CrossRef] [Green Version]
  19. Amadeo, M.; Campolo, C.; Molinaro, A. Named data networking for priority-based content dissemination in VANETs. In Proceedings of the 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Valencia, Spain, 4–8 September 2016; Institute of Electrical and Electronics Engineers (IEEE): Piscataway, NJ, USA, 2016; pp. 1–6. [Google Scholar] [CrossRef]
  20. Liu, X.; Nicolau, M.J.; Costa, A.; Macedo, J.; Santos, A. A geographic opportunistic forwarding strategy for vehicular named data networking. In Econometrics for Financial Applications; Springer Science and Business Media LLC: Berlin, Germany, 2015; pp. 509–521. [Google Scholar]
  21. Chowdhury, M.; Gawande, A.; Wang, L. Secure information sharing among autonomous vehicles in NDN. In Proceedings of the Proceedings of the second international conference on Human-agent interaction, Pittsburgh, PA, USA, 18–21 April 2017; Association for Computing Machinery (ACM): New York, NY, USA, 2017; pp. 15–25. [Google Scholar]
  22. Modesto, F.M.; Boukerche, A. SEVeN: A novel service-based architecture for information-centric vehicular network. Comput. Commun. 2018, 117, 133–146. [Google Scholar] [CrossRef]
  23. Ullah, R.; Rehman, M.A.U.; Kim, B.S. Hierarchical Name-based mechanism for push-data broadcast control in information-centric multihop wireless networks. Sensors 2019, 19, 3034. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  24. Quan, W.; Xu, C.; Guan, J.; Zhang, H.; Grieco, L.A. Social cooperation for information-centric multimedia streaming in highway VANETs. In Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014, Sydney, NSW, Australia, 19 June 2014; Institute of Electrical and Electronics Engineers (IEEE): Piscataway, NJ, USA, 2014; pp. 1–6. [Google Scholar]
  25. Bouk, S.H.; Ahmed, S.H.; Kim, D. Hierarchical and hash-based naming scheme for vehicular information centric networks. In Proceedings of the 2014 International Conference on Connected Vehicles and Expo (ICCVE), Vienna, Austria, 3–7 November 2014; Institute of Electrical and Electronics Engineers (IEEE): Piscataway, NJ, USA, 2014; pp. 765–766. [Google Scholar]
  26. Bouk, S.H.; Ahmed, S.H.; Kim, D. Hierarchical and hash based naming with Compact Trie name management scheme for vehicular content centric networks. Comput. Commun. 2015, 71, 73–83. [Google Scholar] [CrossRef]
  27. Prates, A.A.; Bastos, I.V.; Moraes, I.M. GeoZone: An interest-packet forwarding mechanism based on dissemination zone for content-centric vehicular networks. Comput. Electr. Eng. 2019, 73, 155–166. [Google Scholar] [CrossRef]
  28. Yu, Y.-T.; Gerla, M.; Sanadidi, M. Scalable VANET content routing using hierarchical bloom filters. Wirel. Commun. Mob. Comput. 2015, 15, 1001–1014. [Google Scholar] [CrossRef]
  29. Wan, J.; Gu, X.; Wang, J.; Chen, L. A trust scheme based on vehicles reports of events in VANETs. Wirel. Pers. Commun. 2019, 105, 121–143. [Google Scholar] [CrossRef]
  30. Tiennoy, S.; Saivichit, C. Using a distributed roadside unit for the data dissemination protocol in VANET with the named data architecture. IEEE Access 2018, 6, 32612–32623. [Google Scholar] [CrossRef]
  31. Amadeo, M.; Campolo, C.; Molinaro, A. Forwarding Strategies in Named Data Wireless Ad Hoc Networks: Design and Evaluation. J. Netw. Comput. Appl. 2015, 50, 148–158. [Google Scholar] [CrossRef]
  32. McCarthy, J.; Chaudhry, S.R.; Kuppuudaiyar, P.; Loomba, R.; Clarke, S. QoSA-ICN: An information-centric approach to QoS in vehicular environments. Veh. Commun. 2021, 30, 100351. [Google Scholar] [CrossRef]
  33. Arnould, G.; Khadraoui, D.; Habbas, Z. A self-organizing content centric network model for hybrid vehicular ad-hoc networks. ACM Int. Symp. 2011, 15. [Google Scholar] [CrossRef]
  34. Farahat, H.; Hassanein, H.S. Proactive caching for Producer mobility management in Named Data Networks. In Proceedings of the 13th International Wireless Communications and Mobile Computing Conference (IWCMC), Valencia, Spain, 26–30 June 2017; Institute of Electrical and Electronics Engineers (IEEE): Piscataway, NJ, USA, 2017; pp. 171–176. [Google Scholar]
  35. Abani, N.; Braun, T.; Gerla, M. Proactive caching with mobility prediction under uncertainty in information-centric networks. In Proceedings of the 4th ACM Conference on Information-Centric Networking, Berlin, Germany, 26–28 September 2017; ACM: New York, NY, USA, 2017; pp. 88–97. [Google Scholar]
  36. Lehmann, M.B.; Barcellos, M.P.; Mauthe, A. Providing producer mobility support in NDN through proactive data replication. In Proceedings of the IEEE/IFIP Network Operations and Management Symposium, Istanbul, Turkey, 26–29 April 2016; Institute of Electrical and Electronics Engineers (IEEE): Piscataway, NJ, USA, 2016; pp. 383–391. [Google Scholar] [CrossRef]
  37. Hannan, A.; Arshad, S.; Azam, M.A.; Loo, J.; Ahmed, S.H.; Majeed, M.F.; Shah, S.C. Disaster management system aided by named data network of things: Architecture, design, and analysis. Sensors 2018, 18, 2431. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  38. Majeed, M.F.; Ahmed, S.H.; Dailey, M.N. Enabling push-based critical data forwarding in vehicular named data networks. IEEE Commun. Lett. 2017, 21, 873–876. [Google Scholar] [CrossRef]
  39. Niari, A.K.; Berangi, R.; Fathy, M. ECCN: An extended CCN architecture to improve data access in vehicular content-centric network. J. Supercomput. 2018, 74, 205–221. [Google Scholar] [CrossRef]
  40. Mastorakis, S.; Afanasyev, A.; Zhang, L. On the Evolution of ndnSIM. ACM SIGCOMM Comput. Commun. Rev. 2017, 47, 19–33. [Google Scholar] [CrossRef]
  41. Grassi, G.; Pesavento, D.; Pau, G.; Vuyyuru, R.; Wakikawa, R.; Zhang, L. VANET via Named Data Networking. In Proceedings of the 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada, 27 April–2 May 2014; Institute of Electrical and Electronics Engineers (IEEE): Piscataway, NJ, USA, 2014; pp. 410–415. [Google Scholar]
  42. Jacobson, V.; Smetters, D.K.; Thornton, J.D.; Plass, M.; Briggs, N.; Braynard, R. Networking named content. Commun. ACM 2012, 55, 117–124. [Google Scholar] [CrossRef]
  43. Ioanna, K.; Alexandros, S.C.; Vassilis, T. Reputation-based trust approaches in named data networking. Future Internet 2019, 11, 241. [Google Scholar] [CrossRef] [Green Version]
  44. What is the Smallest Number of Bytes that Can Store a Timestamp? Available online: https://stackoverflow.com/questions/595884/what-is-the-smallest-number-of-bytes-that-can-store-a-timestamp (accessed on 20 April 2021).
  45. Longitude and Latitude storage requirements. Available online: https://www.gps-forums.com/threads/latitude-and-longitude-storage-requirements.8934/ (accessed on 20 April 2021).
  46. Ibrahim, H.; Bouzaraa, F.; Urfalioglu, O.; Minzhen, L. Real-time lane ID estimation using recurrent neural networks with dual convention. arXiv 2020, arXiv:2001.04708. [Google Scholar]
  47. Kurose, J.F.; Ross, K.W. Computer Networking: A Top-Down Approach; Pearson Education: London, UK, 2017. [Google Scholar]
  48. Resolution and Sampling Rate. Available online: https://eng.libretexts.org/@go/page/3623 (accessed on 22 March 2021).
  49. Ngo, Q.M.; Yamamoto, R.; Ohzahata, S.; Kato, T. Proposal and performance evaluation of hybrid routing mechanism for NDN ad hoc networks combining proactive and reactive approaches. IEICE Trans. Inf. Syst. 2019, 102, 1784–1796. [Google Scholar] [CrossRef] [Green Version]
  50. Gao, S.; Zhang, H.; Das, S.K. Efficient data collection in wireless sensor networks with path-constrained mobile sinks. IEEE Trans. Mob. Comput. 2011, 10, 592–608. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.