Skip to Content
SensorsSensors
  • Article
  • Open Access

17 February 2021

On the Design of Efficient Hierarchic Architecture for Software Defined Vehicular Networks

,
,
,
,
,
and
1
Department of Information Technology, Hazara University Mansehra, Mansehra 21120, Pakistan
2
Department of Computer Science, Capital University of Science and Technology, Islamabad 44000, Pakistan
3
School of Electrical and Computer Engineering, Seoul National University, Seoul 08826, Korea
4
Tecnologico de Monterrey, School of Engineering and Sciences, Zapopan 45201, Mexico
This article belongs to the Section Intelligent Sensors

Abstract

Modern vehicles are equipped with various sensors, onboard units, and devices such as Application Unit (AU) that support routing and communication. In VANETs, traffic management and Quality of Service (QoS) are the main research dimensions to be considered while designing VANETs architectures. To cope with the issues of QoS faced by the VANETs, we design an efficient SDN-based architecture where we focus on the QoS of VANETs. In this paper, QoS is achieved by a priority-based scheduling algorithm in which we prioritize traffic flow messages in the safety queue and non-safety queue. In the safety queue, the messages are prioritized based on deadline and size using the New Deadline and Size of data method (NDS) with constrained location and deadline. In contrast, the non-safety queue is prioritized based on First Come First Serve (FCFS) method. For the simulation of our proposed scheduling algorithm, we use a well-known cloud computing framework CloudSim toolkit. The simulation results of safety messages show better performance than non-safety messages in terms of execution time.

1. Introduction

Recently, VANETs have received great attraction in the research community. The researchers are developing protocols, applications, and simulation tools in different dimensions to make them smarter. In this connection, several architectures were proposed but are still facing some difficulties such as less flexibility, less programmability, less scalability in the deployment of services in large-scale VANETs environment. Similarly, the network throughput problem becomes more sensitive when a large amount of information is simultaneously transferred between the hosts. The situation gets inferior when the network is congested with inefficient routing or bottlenecks. These issues create difficulty in the management of the network due to the dynamic behavior of the VANETs. Therefore, a new networking paradigm was introduced, known as Software Defined Networks (SDN). The basic idea behind SDN is the decoupling of the network control plane from the data plane. The data plane defines forwarding data, while the control plane is responsible for controlling the entire network [1]. The decoupling of the network control plane from the data plane provides a simpler programmable environment and provides external software opportunity to define a network’s behavior.
The integration of SDN and VANETs can play a vital role in developing a new, improved VANETs architecture. With the in-depth study of literature review and comprehensive analysis of these two networking trends (VANETs and SDN), we aim to design a new SDN-based VANETs architecture where the VANETs will be managed in a programmable and centralized way. SDN splits the data plane from the control plane, with centralized network controllers, which conclude how traffic flow will be forwarded within the entire network [2]. We believe that QoS in traffic management is an unavoidable and challenging concern for these two networking trends (VANETs and SDN).

1.1. Contributions

The main contributions of this paper are as follows;
  • We proposed a novel efficient architecture for SDVN to improve the QoS using a priority-based scheduling algorithm.
  • We prioritize traffic flow messages both in safety and non-safety queues.
  • In the safety queue, the messages are prioritized based on deadline and size using the NDS with constrained location and deadline.
  • In contrast, the non-safety queue is prioritized based on the FCFS algorithm.
  • We used a well-known cloud computing framework CloudSim toolkit to simulate the proposed priority-based scheduling algorithm in hierarchic SDVN architecture.

1.2. Paper Organization

The structure of this paper is categorized as follows. Section 2 consists of related work about VANETs and their traffic management, the background of SDN-based VANETs, scheduling schemes used in SDVN and VANETs. Section 3 consists of the proposed scheme. This proposed scheme consists of proposed hierarchic architecture for SDVN that contributes to the QoS in traffic management by proposing a priority-based scheduling algorithm. Section 4 consists of simulation and performance analysis of Priority-based Scheduling Algorithm (PSA) where we used CloudSim toolkit to simulate our proposed PSA. Section 5 concludes the paper.

3. Proposed Scheme

In this paper, we proposed hierarchic architecture for SDVN (shown in Figure 1) contributes to the QoS in traffic management by proposing a priority-based scheduling algorithm.
Figure 1. Proposed hierarchic architecture for SDVN.
To improve Intelligent Transportation Services (ITS), researchers worldwide continuously designed new architecture, routing strategies. To make VANETs systems more efficient, SDN technology is introduced with VANETs, which allows the decoupling of the data plane from the control plane, configure the network dynamically, and improved the performance. Notations used throughout this paper described in Table 1.
Table 1. Notations and Description.

3.1. Proposed Hierarchic Architecture for SDVN

With the in-depth study of literature review and comprehensive analysis of these two networking trends (VANETs and SDN), we will move towards the SDN-based VANETs architecture. These two emerging technology (VANETs and SDN) are still under consideration and development because of its feature and real applications. Therefore, it is essential to design an efficient routing strategy for SDN-based VANETs architecture. To tackle this, we design an efficient hierarchic architecture for SDVN. The network model and proposed routing strategy are discussed below.

3.1.1. Network Model

In this scheme, the network model consists of the following components as shown in the Figure 1: the main SDN controller, sub SDN controller, Base Stations (BSs), RSUs, wireless switches, and vehicles. It is a hierarchic architecture, so the network’s control plane consists of a central SDN controller at the top of its level. The lower level consists of sub SDN controllers, RSUs and BSs. The wireless switches and vehicles are present in the infrastructure layer. The following SDN components are needed for deploying the system:

3.1.2. SDN Controller

The leading SDN controller builds a global view of the communication infrastructure and distributes its policy rules. Moreover, it divides the VANETs into zones of responsibility. The main SDN controller sends the global rules to each controller, which describes the network’s general behavior and has a clear scope of the entire VANETs. The SDN controllers set the rules and identify the routing parameters concerning the launch of a specific protocol. The communication between the data plane and the control plane is done on OpenFlow protocol. In contrast, the communication between the SDN controllers and the cloud is performed through specific APIs.
The SDN controller is a logically centralized entity in charge of (i) translating the requirements from the SDN application layer down to the SDN Datapath and (ii) providing the SDN applications with an abstract view of the network (which may include statistics and events). An SDN controller consists of one or more North Bound Interface (NBI) Agents, the SDN Control Logic, and the Control to Data-Plane Interface (CDPI) driver.

3.1.3. SDN Nodes

In VANETs, nodes are vehicles equipped with On-Board Units (OBUs), making the vehicles communicate with each other by sending information directly or through Road Side Units (RSUs) deployed on the road and operating on OpenFlow protocol.

3.1.4. SDN Road Side Unit

The RSU is a physical device that is permanently installed on the roadside. The RSU device is connected to the network to provide communication between vehicles and the SDN controller.

3.1.5. Trusted Authority (TA)

The responsibility of the TA includes the registration of vehicles. It authenticates all the users registered to the VANETs environment and manages the secret parameters such as keys for all those users.

3.1.6. Database

A database stores information about the network, vehicles, and their owners.

3.1.7. SDN Cloud

The SDN controllers are connected to the cloud where different computations are performed, such as calculations of the car speed and distance, assessments of the road traffic situation, and perform services on a priority basis. The database is processed and managed through the cloud. The stored information in the database is updated continuously using a priority-based scheduling algorithm. The services are categorized on a priority basis for improving the QoS in VANETs.

3.1.8. Priority Based Scheduling Algorithm

This section has applied the concept of a priority-based scheduling algorithm to divide messages into two categories: safety and non-safety messages. The safety messages consist of emergency messages, including hospital emergency, police helpline, rescue, natural disaster, etc. At the same time, the non-safety messages are related to user requirements such as the next traffic signal, nearest petrol pump, nearest airport, nearest shopping mall, and nearest restaurant, etc. Safety messages are the essential messages associated with human life and usually constrained by location and time (for instance, the safety information is valuable only to measure the relative distance from its original location). In this way, we can include context information with the exact time and location. The safety messages have a smaller deadline, which indicates that the data is valuable or outdated. It will be discarded if the information is outdated; otherwise, it is forwarded through the application layer for immediate response. We use an NDS method, where the message with the smallest deadline and size will be assigned first in the scheduling queue. In contrast, non-safety messages are given to the output queue on an FCFS basis.
Following are the steps for categorizing the services on priority-based scheduling as shown the above Figure 2;
Figure 2. Services on priority-based scheduling.
  • Multiple vehicles send requests/messages for different services; these requests are stored in the queue.
  • Each request is forwarded one by one to the SDN controller.
  • The SDN controller is connected to the cloud where various computations are performed, such as services are categorized into safety and non-safety messages. Then these messages are sent back to the SDN controller.
  • Scheduling algorithm assigns the priority to emergency messages based on deadline and size. The message having the least deadline and smallest length will be considered for higher priority among all services.
  • The services are forwarded to the output queue to the given priority, as shown in Figure 2.
  • The vehicles efficiently receive their services.
  • For non-safety messages, the requests are categorized based on FCFS.
In the Algorithm 1, the vehicles send a request for different services. These requests are placed in a queue. In this case, we say List (L1) is sending to the SDN controller for further processing.
Algorithm 1: For Vehicles/Nodes request to cloud.
Input: Request type
Output: List of request L1.
 1.  for ( i = 1 ; i < = n ; i + + )
    // vehicle request i = { 1 , 2 , 3 , n }
 2.   S = { j 1 , j 2 , j 3 , j n }
    // S = Request Type (vehicle can send multiple requests such as nearest ATM, nearest petrol pump, natural disaster, police helpline, rescue, etc.
    // i = 1 , n are vehicles.
 3.   L1= Add request of vehicle (i) // vehicle ( i ) = S = { S 1 , S 2 , S 3 S n }
 4.   Return L1
 5.   End of for
In the Algorithm 2, these services are categorized into safety and non-safety messages, and the two lists are prepared, i.e., List (L2) and (L3). The safety messages are placed in (L2), and the non-safety messages are placed in (L3).
Algorithm 2: Data categorization by cloud.
Input: List of the request of vehicle L1
Output: L2 and L3 safety and non-safety list of requests.
 1.   for ( i = 1 ; i < = length of L 1 ; i + + )
 2.   if ( L 1 i = (“ambulance”, “hospital emergency”, “police helpline”, “rescue” ))
 3.   Assign L 1 i = L 2
 4.   else assign L 1 i = L 3
    End if
 5.   Return L2 and L3
    End of for
In the Algorithm 3, the (L2) and (L3) are the lists of safety, and non-safety messages take as an input. Furthermore, for safety messages, the weight is calculated for each message based on deadline and size. Get the length and deadline of a message and then find the average length and deadline of each message, sorted in ascending order. The average difference is calculated for each message based on deadline and size. The messages that have the smallest deadline and size will be assigned first in the scheduling queue. Moreover, for non-safety messages, the priority is given based on the FCFS scheduling algorithm.
Algorithm 3: Prioritization of Safety and Non-Safety List (i.e., L 2 & L 3 ).
Input: L 2 and L 3
Output: L 4 and L 5 lists i.e., prioritize the list of safety and non-safety messages are sent to vehicles
 1.   for ( i = 1 ; i < = length of L 2 ; i + + )
    L 4 = P S i = D i S i
    Q 1 = P S i // Q1 is the random list of L3.
 2.   for ( i = 1 ; i < = Q 1 . length ; i + + )
    Find min Q 1 i
    L 4 = min Q 1 i // Build list L 4 from minimum to maximum
    End for
 3.   Non-Safety for (j=1; j<=length of L3; j++)
    P N S J = F C F S
    L 5 = P N S J
In the Algorithm 3, the ( P S i ) stands for the priority of safety messages, and ( P N S J ) stands for the priority of non-safety messages.

3.1.9. A Walk-trough Example

In this section, we explain the proposed model practical scenario. In VANETs, nodes are vehicles equipped with OBUs, making the vehicles communicate with each other by sending information directly or through RSUs. In real life, it is essential to provide instant communication to the vehicles for the safety of people’s precious lives. In this regard, the available model sends all the information to the center and then to the vehicles in the area’s range. Therefore, in the proposed model, we provided scheduling algorithms that differentiate between important/safety messages and non-important/non-safety messages. We can enhance the communication QoS, which means we will first prioritize urgent messages while we will send the regular messages after that. In the following example, we consider ten vehicles that send different messages for onward delivery. The messages that are sent by the vehicles are provided in the following Table 2.
Table 2. Ten vehicles messages that want to send.
In Table 2 we stored the vehicle’s requests in one RSU, the other RSUs will perform in the same way. We have ten cars from 1 to 10, and they requested eleven requests as shown in Table 2. Requests deadline and size also mentioned Table 2, as the time unit of the deadline is min and size are bytes for better understanding. Important/safety and non-safety messages will be stored in a cloud-connected with the RSUs. In the above table we have important requests are ( R 1 , R 2 , R 4 , R 6 , R 7 , R 9 and R 10 ) and normal/non-safety requests are ( R 3 , R 5 , R 8 , R 11 ). After applying our scheduling algorithms, the following Table 3 and Table 4 will be generated accordingly, as we first will use priority basis scheduling algorithm and then FCFS algorithm.
Table 3. Priority basis scheduling algorithm output in ascending order.
Table 4. FCFS basis scheduling algorithm output.
In the proposed priority basis scheduling algorithm, each message’s weight is calculated based on deadline and size. Get the length and deadline of a message and then find the average length and deadline of each message, sorted in ascending order. The average difference is calculated for each message based on deadline and size. The messages/request that has the smallest deadline and size will then be sent first, then the other messages. Table 3 our proposed system generated the seven important messages deadline and size and made them in ascending order for further sending. R 9 has a short deadline and size so that it will be sent first, then R 1 will be sent, and so on as provided in Table 3.
Table 4 is the output of FCFS algorithm, the non-important messages requests ( R 3 , R 5 , R 8 , R 11 ) will be sent after important messages. Therefore, in this way, our proposed system will work and will communicate the messages of vehicles. After communication, the data will be stored in the cloud for future use.
In VANETs, fast and QoS-based communication is required; for instance, if one node wants to send messages, which is a common conversation (just asking for the nearest petrol pump, nearest restaurant, nearest bank, etc.) and one another node is passing some important information such as informing the other vehicles about Fog, accident, thieves or asking helping for hospital emergency, police helpline and rescue, etc. In this case, we need to send the important messages and then move on to the other information. Here, we need such a mechanism/algorithm that decides which message needs to be sent first and then the other messages. We enhance the entire VANETs communication process, and we categorize traffic flow messages into safety and non-safety messages. The safety messages consist of emergency messages, including hospital emergency, police helpline, rescue, natural disaster, etc. At the same time, the non-safety messages are related to user requirements such as the next traffic signal, nearest petrol pump, nearest airport, nearest shopping mall, and nearest restaurant, etc. After categorization of safety and non-safety messages, we will give priority to safety messages. Because the safety message is associated with the life of human and usually constrained by location and time (for instance, the safety information is valuable only to measure the relative distance from its original location) so in this way, we can include the context information with exact time and location as (for example, accident-Friday 11 am -Location: MN- [X, Y]) in Information Object (IO) name. The safety content has a smaller deadline, and from this context information, it is checked that the information is valuable or outdated. If the information is outdated, then it will be discarded. Otherwise, it is forwarded through the application layer. For this reason, we used a priority-based scheduling algorithm for safety messages using the NDS method. In this method, the message having the least deadline and smallest length will be considered for higher priority among all services as shown in Figure 3. For safety messages, the weight is calculated for each message based on deadline and size. Get the length and deadline of a message and then find the average length and deadline of each message, sorted in ascending order. The average difference is calculated for each message based on deadline and size. The messages that have the smallest deadline and size will be assigned first in the scheduling queue. For non-safety messages, the requests are categorized based on FCFS. In this way, the vehicles efficiently receive their services within the proper time.
Figure 3. A walk through Example of PSA.

4. Simulation and Analysis of Priority-Based Scheduling Algorithms

In this section, we present the proposed model simulation setup and evaluation of the model. We use the CloudSim toolkit to simulate the proposed priority-based scheduling algorithms.

4.1. Simulation Setup

The CloudSim [23] toolkit has been used to simulate the proposed priority-based scheduling algorithm. This framework is used for modeling and simulation of cloud computing services. There are two types of scheduling queues, such as safety and non-safety. In the safety queue, every message is scheduled based on length and deadline. The message that has the smallest deadline and size will be assigned first in the scheduling queue. For the non-safety queue, the messages are processed based on the FCFS method.

4.2. Experimental Evaluation

We created a data center, having a processing rate is 1000 Million Instructions Per Second (MIPS), and memory is 512 MB. Table 5 consists of a detailed description of the data center configuration, and Table 6 describes the configuration of the simulated cloud. In the first step, we got the length and deadline of a cloudlet and then found the average length and deadline of each cloudlet, which are sorted in ascending order in the lists. The average difference is calculated for each cloudlet based on deadline and size, and the cloudlets that have the smallest deadline and size are assigned first in the scheduling queue. A Cloudlet is a representation of a task in CloudSim. Cloudlet is defined, in CloudSim, as a job submitted to the cloud. In this case, jobs are the messages that are assigned to the cloud. For non-safety messages, the priority is given based on the FCFS scheduling algorithm.
Table 5. Configuration of Simulated Cloud.
Table 6. Configuration of Data Center.

4.3. Simulation Result

In this section, each task’s total execution time is calculated in the cloud by adopting the scheduling policy based on deadline and size. Figure 4 and Table 7 show the expected calculated execution time for safety messages based on the sum of the start and running time. Figure 5 and Table 8 show the expected calculated execution time for non-safety messages. Figure 6 shows the comparison of safety and non-safety messages in terms of the computed execution time, which shows better results than non-safety messages.
Figure 4. The life cycle of safety messages.
Table 7. Total calculated execution time for safety messages.
Figure 5. Life Cycle of non-safety messages.
Table 8. Total calculated execution time for non safety messages.
Figure 6. Comparison of calculated execution time for safety messages and non-safety messages.
Figure 7 shows the experimental result in terms of execution time for scheduling safety messages based on NDS. Figure 7 is shown the simulation results run on the cloudlets that are successfully executed by the datacenters. The time unit here in this Figure 7 is ms.
Figure 7. Experimental results in term of execution time for scheduling safety messages.
Table 7, we calculate the result of 10 cloudlets based on the sum of start and running time, and the average result is calculated for 10 cloudlets and then 20, 30, and 40 cloudlets as well for safety messages. The time unit of Table 7 in ms.
Figure 4 shows the expected calculated execution time for safety messages based on the sum of start and running time for 10, 20, 30, and 40 cloudlets.
In this section, the experimental result is carried out for 40 messages, and the execution time of each task is calculated in the cloud by adopting an FCFS basis. Figure 8 shows the experimental result in term of execution time for scheduling non-safety messages based on FCFS. Figure 8 is shown the simulation results run on the cloudlets that are successfully executed by the datacenters. The time unit here in this Figure 8 is ms.
Figure 8. Experimental result in term of execution time for scheduling non safety messages.
Table 8 we calculate the result of 10 cloudlets based on the sum of start and running time, and the average result is calculated for 10 cloudlets and then 20, 30, and 40 cloudlets as well for non-safety messages. The time unit of Table 8 is ms.
Figure 5 shows the expected calculated execution time for non-safety messages based on the sum of start and running time for 10, 20, 30, and 40 cloudlets.
The above Figure 6 shows the comparison of calculated execution time for safety messages and non-safety messages. The calculated execution time of 40 messages is carried out for safety and non-safety messages and we see that the safety messages are executed in less time as compared to non-safety messages.

5. Conclusions

QoS is the main research concerns in designing our proposed SDVN architecture. QoS in traffic management is achieved by a Priority-based Scheduling Algorithm (PSA), where messages are categorized into two queues, i.e., safety queue and non-safety queue. In the safety queue, the messages are prioritized based on deadline and size using NDS as the safety messages are human life critical and constrained by location and deadline. In contrast, the non-safety queue is prioritized based on the FCFS method. We used the CloudSim toolkit to simulate the proposed PSA. The experimental result is carried out for 40 messages, and the execution time of each task is calculated in the cloud by adopting an NDS method for safety messages and an FCFS method for non-safety messages. We also calculated the result of 10 cloudlets based on the sum of start and running time, and the average result is calculated for 10 cloudlets and then 20, 30, and 40 cloudlets as well for safety messages and non-safety messages. Finally, the comparison of safety and non-safety messages in terms of the computed execution time and the PSA simulation result shows better results than non-safety messages in terms of execution time.
Future Direction- In the future, we are going to design a novel and efficient cryptosystem based on PKI-based digital signature for secure communication between Vehicle to Vehicle (V2V), public key authority infrastructure for Vehicle to Infrastructure (V2I), and a three-way handshake mechanism for the secure communication between main and sub-SDN controllers. The security validity of the proposed scheme will be check using a new familiar simulation tool called AVISPA.

Author Contributions

Formal analysis, M.A., and A.U., Funding acquisition, M.Z., and S.G., Investigation, J.I., and M.Z., Methodology, M.A., Project administration, A.W., and S.G., Resources, A.W., and S.G., Software, M.A., J.I., and A.U., Supervision, N.U.A., and J.I., Validation, N.U.A., Writing—original draft, M.A., Writing—review & editing, A.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research supported and funded by the the Ministry of Higher Education Malaysia and Universiti Kebangsaan Malaysia under grant ID: GGPM-2020-029 and grant ID: PP-FTSM-2020.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Shin, M.K.; Nam, K.H.; Kim, H.J. Software-defined networking (SDN): A reference architecture and open APIs. In Proceedings of the IEEE 2012 International Conference on ICT Convergence (ICTC), Jeju Island, Korea, 15–17 October 2012; pp. 360–361. [Google Scholar]
  2. Kreutz, D.; Ramos, F.M.V.; Verissimo, P.E.; Rothenberg, C.E.; Azodolmolky, S.; Uhlig, S. Software-defined networking: A comprehensive survey. Proc. IEEE 2015, 103, 14–76. [Google Scholar] [CrossRef]
  3. Singh, S.; Sunil, A. VANET routing protocols: Issues and challenges. In Proceedings of the 2014 Recent Advances in Engineering and Computational Sciences (RAECS), Chandigarh, India, 6–8 March 2014; pp. 1–5. [Google Scholar]
  4. Pankaj, K.; Chakshu, G.; Inderjeet, S. Performance Evaluation of Network Aggregation Techniques in VANET. IJIREEICE 2017, 5, 36–39. [Google Scholar]
  5. Mousa, S.H.; Ismail, M.; Nordin, R.; Abdullah, N.F. Effective wide spectrum sharing techniques relying on CR technology toward 5G: A survey. J. Commun. 2020, 15, 122–147. [Google Scholar] [CrossRef]
  6. Goudarzi, S.; Anisi, M.H.; Ahmadi, H.; Musavian, L. Dynamic Resource Allocation Model for Distribution Operations using SDN. IEEE Internet Things J. 2020, 8, 976–988. [Google Scholar] [CrossRef]
  7. Kalinin, M.O.; Krundyshev, V.M.; Semianov, P.V. Architectures for building secure vehicular networks based on SDN technology. Autom. Control Comput. Sci. 2017, 51, 907–914. [Google Scholar] [CrossRef]
  8. Toufga, S.; Abdellatif, S.; Assouane, H.T.; Owezarski, P.; Villemur, T. Towards Dynamic Controller Placement in Software Defined Vehicular Networks. Sensors 2020, 20, 1701. [Google Scholar] [CrossRef] [PubMed]
  9. Soleymani, S.A.; Goudarzi, S.; Anisi, M.H.; Kama, N.; Adli Ismail, S.; Azmi, A.; Hanan Abdullah, A. A trust model using edge nodes and a cuckoo filter for securing VANET under the NLoS condition. Symmetry 2020, 12, 609. [Google Scholar] [CrossRef]
  10. Sadio, O.; Ngom, I.; Lishou, C. Design and Prototyping of a Software Defined Vehicular Networking. IEEE Trans. Veh. Technol. 2019, 69, 842–850. [Google Scholar] [CrossRef]
  11. Al-Mayouf, Y.R.B.; Abdullah, N.F.; Mahdi, O.A.; Khan, S.; Ismail, M.; Guizani, M.; Ahmed, S.H. Real-time intersection-based segment aware routing algorithm for urban vehicular networks. IEEE Trans. Intell. Transp. Syst. 2018, 19, 2125–2141. [Google Scholar] [CrossRef]
  12. Thota, J.; Abdullah, N.F.; Doufexi, A.; Armour, S. V2V for vehicular safety applications. IEEE Trans. Intell. Transp. Syst. 2019, 21, 2571–2585. [Google Scholar] [CrossRef]
  13. Alioua, A.; Senouci, S.-M.; Moussaoui, S.; Sedjelmaci, H.; Messous, M.-A. Efficient data processing in software-defined UAV-assisted vehicular networks: A sequential game approach. Wirel. Pers. Commun. 2018, 101, 2255–2286. [Google Scholar] [CrossRef]
  14. Singh, S.; Negi, S.; Verma, S.K. VANET based p-RSA scheduling algorithm using dynamic cloud storage. Wirel. Pers. Commun. 2018, 98, 3527–3547. [Google Scholar] [CrossRef]
  15. Zhang, Y.; Zhao, J.; Cao, G. On scheduling vehicle-roadside data access. In Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks, Montreal, QC, Canada, 10 September 2007; pp. 9–18. [Google Scholar]
  16. Kumar, R.; Pal, R.; Prakash, A.; Tripathi, R. A Collective Scheduling Algorithm for Vehicular Ad Hoc Network. In Recent Trends in Communication, Computing, and Electronics; Khare, A., Tiwary, U., Sethi, I., Singh, N., Eds.; Springer: Singapore, 2019; pp. 165–180. [Google Scholar]
  17. Zhu, W.; Gao, D.; Zhao, W.; Zhang, H.; Chiang, H.-P. SDN-enabled hybrid emergency message transmission architecture in internet-of-vehicles. Int. J. Enterp. Inf. Syst. 2018, 12, 471–491. [Google Scholar] [CrossRef]
  18. Singh, S.; Negi, S.; Verma, S.K.; Panwar, N. Comparative study of existing data scheduling approaches and role of cloud in vanet environment. Procedia Comput. Sci. 2018, 125, 925–934. [Google Scholar] [CrossRef]
  19. Shahverdya, M.; Asgarib, M.; Fathyc, M. A qos-based scheduling algorithm in vanets. J. Theor. Appl. Inf. Technol. 2015, 77, 429–437. [Google Scholar]
  20. Lim, J.M.-Y.; Chang, Y.C.; Alias, M.Y.; Loo, J. Performance modelling of adaptive VANET with enhanced priority scheme. KSII Trans. Internet Inf. Syst. 2015, 9, 1337–1358. [Google Scholar]
  21. Javad, S.M.; Mahmood, F. A new approach in packet scheduling in the VANET. arXiv 2010, arXiv:1010.0430. [Google Scholar]
  22. Dubey, B.B.; Chauhan, N.; Chand, N.; Awasthi, L.K. Priority based efficient data scheduling technique for VANETs. Wirel. Netw. 2016, 22, 1641–1657. [Google Scholar] [CrossRef]
  23. Wadhonkar, A.; Deepti, T. An Analysis of Priority Length and Deadline Based Task Scheduling Algorithms in Cloud Computing. IJCSN 2016, 5, 360–364. [Google Scholar]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.