Next Article in Journal
User-Driven Relay Beamforming for mmWave Massive Analog-Relay MIMO
Next Article in Special Issue
A Modular In-Vehicle C-ITS Architecture for Sensor Data Collection, Vehicular Communications and Cloud Connectivity
Previous Article in Journal
A Novel Adaptive Time-Frequency Filtering Approach to Enhance the Ultrasonic Inspection of Stainless Steel Structures
Previous Article in Special Issue
Road Traffic Forecast Based on Meteorological Information through Deep Learning Methods
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Contention-Free Cooperative MAC Protocol for Eliminating Heterogenous Collisions in Vehicular Ad Hoc Networks

1
School of Electronics and Information Engineering, Beihang University, Beijing 100191, China
2
Hangzhou Innovation Institute, Beihang University, Hangzhou 310051, China
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(2), 1033; https://doi.org/10.3390/s23021033
Submission received: 16 December 2022 / Revised: 28 December 2022 / Accepted: 11 January 2023 / Published: 16 January 2023
(This article belongs to the Special Issue Sensor Networks for Vehicular Communications)

Abstract

:
In vehicular ad hoc networks (VANETs), efficient data dissemination to a specified number of vehicles with minimum collisions and limited access delay is critical for accident prevention in road safety. However, packet collisions have a significant impact on access delay, and they may lead to unanticipated link failure when a range of diversified collisions are combined due to complex traffic conditions and rapid changes in network topology. In this paper, we propose a distributed contention-free cooperative medium access control (CFC-MAC) protocol to reduce heterogenous collisions and unintended access delay in stochastic traffic scenarios. Firstly, we develop a cooperative communication system model and cooperative forwarding mechanism to explore the optimum road path between the source and destination by identifying the potential cooperative vehicles. Secondly, we propose a vectorized trajectory estimation mechanism to suppress merging collisions by identifying the relative velocity of vehicles with different speeds in a specific time interval. Based on the case study, typical heterogeneous collisions and aggregated heterogeneous collisions at dissociated positions and associated positions are investigated. In both cases, we propose the corresponding collision-resolving mechanisms by methodically recapturing the colliding time slot or acquiring the available free time slots after identifying the access vehicles and comparing the received signal strengths. Performance analysis for collision probability and access delay is conducted. Finally, the simulation results show that the proposed protocol can achieve deterministic access delay and a minimal collision rate, substantially outperforming the existing solutions.

1. Introduction

In recent years, the intelligent transportation system (ITS) has been developed to alleviate the number of road fatalities, accidents, and traffic jams [1,2]. Vehicular ad hoc networks (VANETs) are emerging as a new landscape of mobile ad hoc networks (MANETs); they aim to provide a wide spectrum of safety and comfort applications to drivers and passengers, and are regarded as an essential component in developing smart cities and applications, ranging from safety to entertainment services in ITS [3,4,5].
For the purpose of seamlessly connecting vehicles, IEEE 802.11p-based wireless communication technologies have been developed, called dedicated short-range communications (DSRC) in the US and ITS-G5 in the European Union (EU) [6,7]. As one option, the 3rd Generation Partnership Project (3GPP) has completed the first version of the Long-Term Evolution Vehicle-to-Everything (LTE-V2X) technology in the 4G-LTE network and has been investigating new use cases and technology requirements in 5G, 6G, and 6G-and-beyond networks [8,9].
DSRC/ITS-G5 or LTE/5G V2X technologies bring forth vehicle-to-infrastructure (V2I), infrastructure-to-vehicle (I2V), vehicle-to-vehicle (V2V), and V2X communications, which are predominant building blocks for future ITS applications [4,5,6,7,8,9,10]. Observing the specific dynamics of vehicular mobility, along with the local scope targeted by DSRC, ITS-G5, LTE/5G V2X, and the AI-empowered intelligent reflecting surface (IRS) communication framework [11] for ITS applications, notable protocol stacks have been developed by IEEE Wireless Access in Vehicular Environments (WAVE), ISO Communications Access for Land Mobiles (CALM), and the European Telecommunications Standards Institute (ETSI) [5,12].
In the VANET environment, medium access control (MAC) protocols play a critical role in providing reliable communications and disseminating important safety messages (SMs) to avoid chain reactions and catastrophes by efficiently utilizing the shared wireless channel. Providing an efficient MAC protocol is a challenge because of the high speed of the vehicles, frequent topology changes, insufficient infrastructure, and wide range of quality-of-service (QoS) requirements [13,14,15,16]. Time division multiple access (TDMA)-based MAC protocols are becoming an emerging research topic in the area of VANETs, in which time is divided into frames and each frame is divided into time slots, and various vehicles can access different time slots [17,18].
Obviously, TDMA-based MAC protocols for VANETs are categorized as contention-based and contention-free strategies [16]. Since contention-based IEEE802.11p has been developed, DSRC has adopted carrier-sense multiple access with collision avoidance (CSMA/CA) mechanisms to avoid collisions by beginning transmission only after the channel is sensed to be idle [5,6]. However, CSMA/CA is affected by serious collisions in cases of heavy traffic load, and it is not effective in providing shared high-data-rate transmissions [9,19]. Furthermore, IEEE 802.11p has been standardized with enhanced distributed channel access (EDCA) to handle the problem of rapid network topology and vehicle mobility [20,21]. However, the IEEE 802.11p protocol suffers from poor scalability and involves the problems of hidden and exposed terminals, which results in the failure of real-time message delivery [6].
The contention-based protocols do not have pre-scheduled transmissions. As a matter of fact, when a vehicle wishes to send its data packets, it competes for channel access without guaranteeing successful packet transmissions. They also have some limitations that cause broadcast storm problems, severe packet collisions, large average coverage delay, and diminished reachability [20,22]. In contrast, the main idea of contention-free schemes is to eliminate unnecessary collisions and avoid predicaments via the periodic exchange of control messages to maintain the scheduled table and network time in synchronization [17]. Therefore, we focus on the contention-free approach to provide short latency, a significant decrease in packet loss, and deterministic access delay in real-time applications.
It is undeniable that delay is one of the most crucial metrics to evaluate the QoS of a network [22,23]. In principle, the delay for successfully transmitting a data packet from one vehicle to another consists of various elements, including processing delay, queuing delay, local delay, and access delay over a link [23]. In general, processing delay and queuing delay are negligible since they are in the order of tens of milliseconds and are relatively smaller than other delay factors [24]. Local delay can also be omitted since it is mostly concerned with contention-based failed channel transmission quality [25]. However, access delay has a significant impact on packet collisions because it is the average time from the moment when a vehicle starts attempting to send a packet until the beginning of its successful packet transmission [20,23]. Therefore, in this paper, we focus on diminishing the access delay to prevent unexpected link failure when a variety of distinctive collisions are aggregated interchangeably.
Although many existing studies [24,26,27,28,29,30,31,32,33,34,35] have been devoted to mitigating certain kinds of collisions in VANET, there are still two major issues that have not been completely addressed. First, the majority of these studies focus on distributed vehicle communication mechanisms, but there has not yet been any extensive research on the thematic analysis of heterogenous collisions to lessen cumulative access delay since safety applications have stringent QoS requirements in VANETs. Second, the deployment of existing slot-partitioning techniques remains a challenge in having deterministic access delay in highly dynamic and stochastic traffic flow, and may lead to slot redundancy and link failure. In this paper, we propose a novel distributed contention-free cooperative MAC (CFC-MAC) protocol; moreover, we systemically investigate the suppression of typical heterogenous collisions and aggregated heterogenous collisions in hidden terminals and exposed terminals and diminish the merging collisions of cooperative vehicles, which may offer deterministic access delay with minimal collisions to mitigate unnecessary retransmissions. The contributions of this paper are as follows:
  • We develop an optimized traffic model to forward data packets by effectively utilizing cooperative vehicles to improve the probability of successful packet transmission. A limited number of optimum cooperative vehicles are carefully selected by determining the closest position to the midpoint between the source vehicle and the destination vehicle.
  • To reduce merging collisions to adapt to the frequent converging and diverging of rapid topology changes in the network due to high vehicle mobility, we propose a vectorized trajectory estimation (VTE) method by comparing the relative velocity of vehicles within a specific time interval by identifying the previous positions.
  • Cooperation collisions occur when the cooperative vehicle and relay vehicle are contending to reserve the same time slot. Based on the distinct stochastic traffic scenarios of the proposed system model, we investigate two cases of heterogenous collisions: (1) typical heterogeneous collisions, such as cooperation collisions, access collisions, relay collisions, and reservation collisions; (2) aggregated heterogeneous collisions of the hidden terminals and exposed terminals at dissociated positions (occurring simultaneously but quite independently) and associated positions, respectively. In both cases, we propose the relevant collision-resolving mechanisms of time slot assignment procedures by methodically operating the four distinctive packets after identifying the access vehicles and comparing the received signal strengths.
  • We validate the protocol performance by analyzing the collision probability, packet reception probability, and access delay of diversified heterogenous collisions in stochastic traffic scenarios. Extensive simulation experiments are conducted under various traffic conditions with different vehicular networking settings.
The rest of the paper is organized as follows. Section 2 presents an overview of the related work. Section 3 describes the basic concepts and assumptions and the proposed system model in depth. In Section 4, we provide the details of the proposed CFC-MAC protocol concerning the techniques for time slot assignment procedures, packet operations, and collisions resolution, as well as the time slot reallocation mechanisms for reducing typical heterogenous collisions and aggregated heterogeneous collisions of hidden and exposed terminals, and merging collisions. In Section 5, performance analysis in terms of collision probability, packet reception probability and access delay is described. Section 6 presents the simulation results and a performance comparison. Section 7 briefly discusses the significant points of our work. In Section 8, we draw conclusions and present ideas for future work.

2. Related Work

Based on cooperative communication mechanisms and distinctive resource allocation procedures, several TDMA-based MAC protocols have been proposed recently to resolve various types of packet collision problems, link failures, and the reusability of time slot allocation. Two of the most promising classifications developed for TDMA-based contention-free MAC protocols are centralized and distributed schemes [18,30]. In centralized TDMA-based contention-free MAC protocols, the central coordinators, i.e., roadside units (RSUs) or cluster heads (CHs), allocate and control message forwarding in the network [22,31,36]. In the RSU-based approach, RSUs act as intermediate relays for inter-cluster communication. Since a large number of RSUs are required to facilitate high traffic, this approach is not suitable for highway roads [37]. For the cluster-based approach, the clusters have to form and change over time in high-mobility scenarios, and the dramatic change in vehicle mobility has an impact on cluster stability due to cluster splitting and merging, which results in consequential network overheads and performance degradation [22,36,38].
In distributed TDMA-based contention-free MAC protocols, the cooperative communication-based method is an excellent way to improve transmission performance in high-density traffic as compared to low-density traffic [17,35]. Based on this, [20,22,24,39,40] propose increasing channel capacity in VANETs and satisfying the latency requirements of various applications. In multi-hop wireless networks, cooperative communication is an effective and successful way to improve performance [20,41,42]. Therefore, we adopt the contention-free cooperative approach since these forms of strategy are highly scalable and fault-tolerant. In survey works [4,10,17,42], the selection of cooperative vehicles is the predominant factor in transmission efficiency, and the vehicle with the highest transmission rate will be selected as the third-party cooperative vehicle. Generally, the heterogeneity of collisions and delay demands is unexplored.
In contention-free cooperation-based MAC protocols, it is common for vehicles to communicate with each other on the basis of one-hop distance, and the time slot is randomly reserved for each vehicle in the network. Afterward, the cooperating vehicles or RSUs forward the messages that are multi-hop toward the destination vehicle VD from the source vehicle VS [17,27,34,40,41,42]. EVC-TDMA MAC [28] selects the ideal forwarding vehicle in multi-hop message transmission by dynamically selecting the relay vehicles based on the relative speeds and buffer sizes, and resolves the dramatic merging collisions. Its drawback is that the packet dropping rate increases in highly dense traffic by removing the header packets when the buffer is full. In addition, it may not resolve the hidden and exposed terminal problems. In NC-MAC [33], the preamble-based feedback mechanism, retransmissions, and network coding are combined to enhance broadcasting reliability to support V2V beacon broadcasting. However, the protocol design only supports one-hop transmissions with the increased probability of linear combinations of undesirable beacons, which may incur performance loss in highly dense scenarios.
In ECTOB-MAC [43], the expected broadcast performance is enhanced by designating cooperators with the maximum expected single-hop broadcast efficiency (SBE) value for a single relay. However, redundant transmissions from multiple relays may not be avoided since the expected waiting time for a relay candidate can be interfered with by some unexpected transmissions from a hidden terminal of the previous forwarder. TMR-MAC [44] can identify an optimized path with a short round-trip time (RTT) threshold for packet delivery to VD with a minimal time delay. When one path fails, data packets are sent through the next least RTT path. However, an increasing delay occurs when RSU sends the packet using the first minimum RTT path in its routing table and waits for the acknowledgment from the VD. MCDP-MAC [45] relies on the forward-if-relevant principle to dynamically determine the zone of relevance (ZOR) of the event. Its major disadvantage is that there is no stringent mechanism whenever a new event arrives to resolve the access collisions and broadcast storms.
In DARP MAC [30], each vehicle coordinates its channel access with its neighbors to address the hidden terminal problem. Different preamble types are used to facilitate distributed reservation, identify beacon collisions, and resolve collisions to guarantee the dependability of beacon broadcasting. Its disadvantage is that it is only concerned with the hidden terminals for single-hop beacon broadcasting, and does not consider exposed terminals and merging collisions. In PeerProbe-MAC [46], the online neighbor distribution estimate approach is proposed, and vehicles collaborate to concurrently probe their neighborhood via wireless symbol-level communication. Although it is scalable and capable of correctly reconstructing highly dynamic neighbor distributions under harsh channel conditions, the signal-to-noise ratio (SNR)-based adaptive de-mapping strategy is insufficient to decrease the bit error rate (BER) in the most catastrophic channel conditions.
A comparison of the most recent studies related to our work is shown in Table 1. For instance, the studies conducted in [24,33,43] partially cover resolving hidden terminals and access collisions, but others do not discuss exposed terminals and different types of collisions in the field of cooperative approaches. Obviously, the work in [28] only considers resolving merging collisions, whereas [45,46] does not resolve any of the collisions.
Despite the fact that the aforementioned contention-free cooperative MAC protocols are conducted to support transmission performance in multi-hop networks, the majority of these protocols are still unable to comply with the highly dynamic topology and frequently disconnected network links. Moreover, none of them figure out the typical heterogeneous collisions, such as cooperation collisions, access collisions, relay collisions and reservation collisions, and also do not consider the cumulative access failure of network scenarios in the aggregated heterogeneous collisions of hidden terminals, exposed terminals, and merging collisions. Motivated by these issues, we design CFC-MAC in this paper by reducing the typical heterogenous collisions and aggregated heterogenous collisions to avoid chain collisions and guarantee optimal access delay.

3. System Model

This section describes the fundamental assumptions and the proposed cooperative communication system model with a typical traffic scenario.

3.1. Fundamental Assumptions

In our CFC-MAC, similar to 5G C-V2X [33], it is assumed that the network is distributed and all vehicles have equivalent capacities. Vehicles utilize the same transmission power to communicate with each other via DSRC/WAVE operation mode in the range of 5.850~5.925 GHz, which can actively regulate transmission power to alter the communication range, provided that there is one control channel (CCH) for system control and SMs, and six service channels (SCHs) for the exchange of non-safety messages (NSMs) [21]. The proposed system model is composed under the following assumptions:
  • Communication: To provide reliable communications, we consider that each vehicle is equipped with two transceivers: one transceiver for CCH to listen for the channel status and SM transmission, and the other transceiver for SCH to send NSMs of infotainment services. Our proposed model primarily outlines how to access CCH to broadcast SMs. As depicted in Figure 1, the channel time is divided into synchronization intervals (SIs) of the TDMA frames with a fixed length of 100 ms. Each TDMA frame is split into two sets of time slots: the left CCH interval (L-CCHI) and right CCH interval (R-CCHI); these correspond to the vehicles going in the left and right directions, respectively. A guard interval of 4 ms is appended at the end of each interval set for synchronization.
  • Synchronization: Each vehicle is equipped with a global positioning system (GPS) receiver to provide a synchronous reference time. Because low-end GPS receivers can provide a one-pulse-per-second (PPS) signal with an accuracy of fewer than 100 ns and the GPS oscillator is stable, vehicles may preserve synchronization for a while even if the GPS signal is lost temporarily.
  • Computation: For road safety, the minimum headway between all vehicles on the road must follow the 2s rule, which means that the distance for V2V connectivity must be equal to 2 times the vehicle velocity [47,48,49]. Vehicles are capable of performing fundamental operations, such as generating random numbers, hash functions (by using this, hashing algorithms can convert data with arbitrary length to a fixed length), and simple matrix algebra calculations.

3.2. System Model of Cooperative Relay

In VANETs, it is a common phenomenon that a vehicle wants to exchange messages with other vehicles out of its communication radius Rc, which is called multi-hop communication. We first propose the basic idea of the cooperative relay for multi-hop communication in an ideal traffic scenario, as shown in Figure 2. When Rc is the same for each vehicle, the distance between the source vehicle VS and the destination vehicle VD is defined as DSD, and the distance of the potential cooperative vehicle from VS is defined as DC. It can be clearly seen that VS is unable to transfer data directly to VD due to the limitation of the transmission range. Depending on the Rc between each of the vehicles, all vehicles can be classified into five categories: the source vehicle VS, the destination vehicle VD, the relay vehicle VR, the cooperative vehicle VC, and the optimum cooperative vehicle VOC.
VS can transmit data packets generated by itself, whereas VD is not in its Rc, and the relay vehicle VR can deliver multi-hop relay data packets generated by other vehicles whether it is in the range of DSD or not. A relay vehicle VR can be transformed into a cooperative vehicle VC when it belongs to the transmission range of DSD. Very few numbers of cooperative vehicles VC are prone to becoming the optimum cooperative vehicle VOC when they are effectively selected by determining the closest position to the midpoint within the minimum distance of DSD. A detailed selection procedure for VOC will be discussed in the next section.
In fact, the channel characteristics for V2V and V2I communication must be determined using propagation models. For the free-space propagation of an electromagnetic wave between two vehicles, we consider the wireless channel model based on the Friis transmission formula [50]. The received signal power P r of a vehicle can be given by
P r = P t G r G t L ( λ 4 π 2 ) 2 ( 1 D S D ) γ ,
where P t is the transmitted power, and G t and G r represent the transmitter and receiver gains, respectively. λ is the signal wavelength, γ denotes the path loss exponent, and L is the system attenuation loss.
Assuming that each vehicle antenna is isotropic and has no directivity, the free-space path loss between the transmitter and receiver can be defined as the loss factor in the ratio of the transmitted power to the received power as ( x t x , x r x ) = P t / P r = ( 4 π D S D / λ ) 2 . We can express the signal-to-interference-plus-noise ratio (SINR) at the vehicle receiver as
SIN R = P t K 0 ( x t x , x r x ) K x ( x i , x r x ) + N ,
where ( x i , x r x ) is the path loss between the interferer and receiver, and N is the noise power of additive white Gaussian noise. K0 denotes a constant that depends on the channel and antenna characteristics, and Kx represents a constant that depends on the interfering channel fading for an interferer at location x. If the SINR is greater than the preset threshold β, i.e., SINR ≥ β, the received vehicle is regarded as a productive neighbor, and a packet is expected to be successfully received.

4. CFC-MAC Protocol

In this section, to visualize the proposed CFC-MAC protocol design, a structured flowchart is shown in Figure 3. First, we propose the cooperative forwarding mechanism (CFM) to determine the optimum cooperative vehicle to minimize excessive retransmissions for improving transmission efficiency. Next, we define four types of packet based on the different preambles to discover the status of the specific vehicle and perform the relevant execution. Actually, they are employed to support the resolving of the diversified heterogenous collisions.
Then, we scrutinize the merging collisions of the proposed cooperative system model and provide a vectorized trajectory estimation (VTE) mechanism by identifying the relative velocity of vehicles with different speeds in a specific time interval. Moreover, we thematically analyze the typical heterogeneous collisions and aggregated heterogeneous collisions at dissociated positions and associated positions. In both cases, we propose the corresponding collision-resolving mechanisms by methodically recapturing the colliding time slot or acquiring the available free time slots after identifying the access vehicles and comparing the received signal strengths.

4.1. Cooperative Forwarding Mechanism

Each vehicle is considered to have a vehicle information table (VIT) about itself and its one-hop neighboring vehicles, which comprises information such as vehicle identification (ID), reserved time slot ID, vehicle position, vehicle speed, moving direction, and channel number. To join the channel, all vehicles need to sense for one frame period to identify which time slots have not been occupied. Additionally, then, they randomly select one of the time slots and send an updated info (UI) packet through the acquired time slot. By sensing the UI packet, every vehicle maintains the VIT of the one-hop set (1HS), two-hop set (2HS), and three-hop set (3HS) with neighboring vehicles, as illustrated in Table 2. It shows the structure of the vehicle information of the 1HS, 2HS, and 3HS with adjacent vehicles.
At first, any vehicle which belongs to the transmission range of DSD is primarily chosen as a potential cooperative vehicle VC at any moment the source vehicle VS intends to transmit data packets. When the data packets with the cooperation header are received by the cooperative vehicles VC, they keep track of the channel and monitor the number of packet transmissions. Next, cooperative transmissions will initiate if VC can confirm that its received SINR from the destination vehicle VD is greater than the preset threshold β. Afterward, VC determines the successful transmission rate between VD and itself by means of observing the previously received data packets. Meanwhile, VS adds cooperation header information to the packet including the number of allocated time slots, available free time slots, and the IDs of potential cooperative vehicles. VS also determines the minimum number of cooperative vehicles to be deployed for the whole transmission range in order to minimize transmission overhead.

4.1.1. Optimum Cooperative Vehicle Determination

If there is more than one VC within the transmission range of DSD, it is necessary to select the most efficient cooperative vehicle to reduce unnecessary transmission times and the concerned link interference [51,52]. The precise procedure for choosing the optimum cooperative vehicle is covered in this part. When the vehicles are randomly dispersed along a multilane roadway, we first consider the traffic scenarios of cooperative vehicles VC before and after a particular period tβ.
As shown in Figure 4a, when the vehicles are moving in the right direction of the roadway before a tβ, the communication radius Rc of the source vehicle VS can cover vehicles V1, V2, V3, and V4; hence, the multi-paths based on these four vehicles are considered to forward the data packets to the destination vehicle VD and they are generally considered as potential cooperative forwarding vehicles in this network. In Figure 4a, two vehicles, V1 and V3, are considered not effective for forwarding the data packets in this network scenario and they are defined as only suitable as relay vehicles VR. The reason is that even though they are located in the Rc of VS, but not in the direct communication range of VD, they also need to communicate with vehicles V2 and V4 to relay the data packets to VD.
On the other hand, vehicles V2 and V4 are in the intersection area RS-D (i.e., the area between the direct communication range of VS and VD). Therefore, V2 and V4 are successfully selected as VC and added to the list of the VIT by defining a set of VC in order to avoid excessive cooperative transmissions. Eventually, the vehicle which has the closest position with DSD is selected as the optimum cooperative vehicle VOC. The verification process of a new vehicle VN transforming into VOC is depicted in Figure 5.
It is obvious that the successful forwarding rate reaches the maximum transmission rate when the optimum cooperative vehicle is selected accurately. As a first step, the distance of the potential cooperative vehicle from VS is defined as DC and it can be calculated as:
D C = ( x c x s + x d 2 ) 2 + ( y c y s + y d 2 ) 2 ,
where ( x c , y c ) , ( x s , y s ) , and ( x d , y d ) are the corresponding coordinates of the potential cooperative vehicle VC, the source vehicle VS, and the destination vehicle VD, respectively. If x s D c x d , the received signal strength RSS at VD can be defined as:
R S S V D = 10 n 1 log 10 ( D C x c ) + P t + p + X σ ,
where X σ is a Gaussian-distributed random variable with zero mean and standard deviation σ. At this point, the value of the cumulative distributive function of X σ at the origin can be considered as having a change of 0.5.
In the next step, to select the most optimum vehicle from a number of cooperative vehicles, the vehicles within the lower values of DC are listed first in the VIT, and the vehicle with the closest position to the midpoint between VS and VD is successfully selected as the VOC. Then, in priority order, the other vehicles are put into the substitution list of the VIT in case urgent replacement of VOC is required upon a rapid topology change.
When the mobility of the vehicles is changed to a new scenario after a particular period tβ as shown in Figure 3b, vehicle V2 leaves the RS-D, and vehicle V5 moves forward into the intersection area of RS-D, and it seems to perform as a VC instead of the former vehicle V2. At the same time, from the opposite direction, vehicle V11 also moves into the RS-D, and another vehicle V14 enters into the Rc of VS. However, both V11 and V14 are excluded from the operation process of L-CCHI since they are assigned to the R-CCHI by taking advantage of the disjoint time slot assignment upon the opposite directional mobility of vehicle traffic.

4.1.2. Packet Structure

Let us consider the case that if a new vehicle VN needs to transmit, it senses the channel for a frame period and searches for a free time slot. When the new time slot is identified, it simply transmits a UI packet on the selected time slot (for example, time slot τj). After successfully reserving, the vehicles that have already been allocated a time slot in that frame will observe it, and specify if they have “heard” vehicle VN in time slot τj. It is assumed that after a vehicle successfully reserves a time slot for data packet transmissions, the time slot will not be released until it departs the system or a collision occurs as a result of topology changes. Each time slot is divided into two sections: the control preamble and the data payload. As shown in Figure 6, the proposed packet structure is depicted as follows:
  • Legacy short training field (L-STF): executed for packet sensing, time acquisition, automatic gain control, and coarse frequency correction.
  • Legacy long training field (L-LTF): executed for pilot-based channel estimation, fine frequency correction, and fine symbol-timing offset correction.
  • Legacy SIGnal (L-SIG): contains metadata from the received configuration packets, such as the modulation coding scheme (MCS), and the physical layer convergence protocol (PLCP) service data unit (PSDU) length.
  • Service: to set up the data scrambler.
  • PLCP service data unit (PSDU): includes actual user information.
  • Tail: executed for terminating convolutional code.
  • Padding: executed for ensuring an integer number of symbols.
For actual transmissions, orthogonal frequency division multiplexing (OFDM) is used with a total of 64 sub-carriers (SCs). Among these 64 SCs, 52 SCs are used for carrying data and pilot symbols, and the remaining 12 SCs are for null SCs that carry no data. Additionally, the null SCs occupy the central 11 SCs and the 0th SC, and the pilot symbols occupy 4 SCs (Nos. 7, 10, 44, and 58). The remaining 48 SCs are used for data and the actual length of the data depends on the choice of MCS with the supported schemes. The frame information (FI) in the PSDU is organized as follows:
  • Source temporary identifier (STI)—8 bits: the label of the vehicle “heard” by vehicle VN on time slot τj.
  • Priority status field (PSF)—2 bits: the field indicates the priority of data transmitted in the time slot.
  • BUSY—1 bit: a flag indicating whether time slot τj is free (0) or busy (1).
  • File transfer protocol (FTP)—1 bit: executed in point-to-point transmission.
For local topology discovery, each vehicle sends all the information in its UI packet, and all adjacent vehicles update their VIT based on their received UI packets. If a vehicle does not receive any UI packets from its one-hop neighboring vehicles during three consecutive UI periods, it is assumed that all its neighboring vehicles have left its communication range and it updates its own VIT to announce temporarily losing contact with them.
Since preambles are deployed to identify a message and reservation collisions, in the CFC-MAC protocol, four types of packets are defined based on the different preambles: (1) a UI packet for time slot reservation, channel access, and periodic updates; (2) a data dissemination (DD) packet for transferring data and detecting collisions; (3) a successfully reserved (SR) packet for resolving collisions and recapturing a new time slot; and (4) an individual relay (IR) packet for relay vehicles to announce their exclusion from the cooperation process. Originally, each vehicle periodically transmits a UI packet for short status messages to notify the neighboring vehicles of its presence. Since SMs have two types (periodic beaconing messages and emergency event messages [53,54]), the UI packet and DD packet are mostly employed to enable periodic updates and data packet transmissions, respectively.

4.2. Vectorized Trajectory Estimation Mechanism

In VANETs, vehicles may frequently converge and diverge due to their varying velocities and routes. Merging collisions occur when two vehicles in different hop sets (HSs) accessing the same time slot become members of the same HS due to rapid changes in their positions after a particular period. As a result of merging collisions, there are subsequent access collisions between the vehicles that have abandoned their time slots [31]. In this subsection, we first examine the merging collision recognition procedure, and then, propose an SINR-based estimation mechanism to completely eliminate them.
Generally, merging collisions are likely to occur in the following two cases: (1) vehicles moving in the same direction with different speeds, and (2) vehicles moving in opposite directions on a bi-directional road [29]. Since our proposed system model only utilizes the disjoint time slot assignment by dividing L-CCHI and R-CCHI for the left and right directions, it is not necessary to consider merging collisions that occur on a bi-directional road. Therefore, we specifically emphasize the merging collisions of vehicles moving in the same direction in this paper.
As shown in Figure 7, two vehicles, VS1 and VD1, in a 2HS move at a higher speed than three vehicles, VS2, VOC and VD2, in their three-hop sets (3HSs). Concurrently, VD1 and VD2 reserve the same time slot when they drive into direct communication range of each other after a period of ∆t; this conflict of using the same time slot leads to a merging collision.
The residence time of a vehicle in a service area can be calculated by using mobility metrics, such as position, direction, and speed, to synthesize the transmission probability of each individual vehicle with respect to its residence time [55]. In this paper, we propose a VTE mechanism, in which the relative velocity of vehicles with different speeds is mainly considered to reduce merging collisions. Let us consider that each vehicle can be aware of its own information regarding velocity v t , acceleration a t , and current position ϕ t at time t, which are vectorized in x and y coordinates. For a moving vehicle, after a given period ξ, the current moving position ϕ t can be calculated as
ф t = a t ξ 2 2 + v t ,
and let us assume that ϕ t ξ is the previous moving position at time t ξ . Next, the current moving direction β ξ is given by
β ξ = c o s 1 ф t ξ ф t | ф t ξ | | ф t | .
If a merging collision occurs in an HS, firstly, VS needs to compare the relative velocities of the collided vehicles before the time interval ∆t by identifying the previous position ϕ t ξ in this HS. If no vehicles have a higher velocity, the time interval is expanded into 2∆t, 3∆t, 4∆t, etc., and the previous velocities are compared. If it is discovered that one of the collided vehicles has a higher velocity at the previous positions, that vehicle is put into a blacklist for a random time interval since it is considered to enter into this HS from other HSs. This random time interval is based on the priority order of the arbitrary interframe space (AIFS). A message has a better chance of being transmitted with minimal latency when its AIFS period is shorter, which is extremely important for delay-critical applications. After waiting for its allocated time period, in the next frame, the collided vehicle with higher velocity can randomly pick up an available time slot from the remaining free time slots, and it is required to send its SR packet to notify other vehicles that the merge collision is fully resolved. Meanwhile, the other collided vehicle with lower velocity is required to recapture the colliding time slot again, and also needs to send its SR packet. Therefore, merging collisions are completely eliminated.

4.3. Heterogenous Collision Resolution

The proposed CFC-MAC protocol utilizes multiple cooperative vehicles to forward data packets, and then, intentionally selects the optimum cooperative vehicle so as to improve the probability of successful packet transmissions. Based on the road connectivity probability under high network load [47,56], the existing TDMA-based MAC protocols do not show compatibility with the occurrence of multiple cumulative collisions in stochastic traffic conditions. Therefore, unified models for defining heterogeneous collisions become captious for traffic characterization and modeling. In this subsection, we develop sustainable collision models by focusing on the context of typical and aggregated heterogeneous collisions under congested or heavy traffic flow.
If a vehicle has been discovered in the occurrence of any type of collision, it is unable to recapture the same time slot in the current frame and needs to acquire a new time slot in the next frame. In this case, it is extremely important that the new time slot must be completely free and not occupied by any other vehicles in the upcoming frames to eliminate the possibility of further subsequent collisions.

4.3.1. Typical Heterogenous Collision Resolution

The time slot allocation procedures of typical heterogenous collisions in our proposed CFC-MAC protocol are shown in Figure 8. First, we consider that all vehicles are moving in the right direction, as illustrated in scenario A. It is clear that a new vehicle VN is not in the RS-D; therefore, only one time slot for VS is available in frame 0. Considering scenario B, the network topology is changed when VN enters the RS-D. In the case of VN attempting to join the network, it first senses the channel for one frame (beaconing time) to figure out which time slots have not been occupied in this frame. Next, VN randomly chooses one of the available time slots to reserve the channel and becomes a VOC after being fully selected by following the procedures shown in Figure 5. In scenario B, another new vehicle also goes into the Rc range of VS, but it can only be defined as a VR because it cannot directly communicate with VD. As illustrated in the frame (n-b), VOC and VR can send their UI packets to their successfully reserved time slots, respectively.
Scenario C comes into existence when the network topology is changed to be broader than the 2HS of the VOC1 and VOC2, and they are successfully involved in the whole process of data transmission from VS to VD. Meanwhile, vehicle VR is also entering into the transmission range between VOC2 and VS, under the same condition as VOC1. In this case, cooperation collision occurs when vehicle VR is acting as a cooperating vehicle for relaying the lost messages and trying to reserve the allocated time slot, whereas the vehicles VOC1 and VR are contending to reserve the same time slot (the seventh time slot) as depicted in the frame (n ). As a result, these two vehicles cannot affiliate with the current frame.
To handle the issue, both collided vehicles have to wait for the next frame (n d + 1) and sense the channel again. In the (n d + 1)th frame, VS needs to send a DD packet to its own time slot with the preamble part containing the information about VR, stating that it must put the colliding seventh time slot into the blacklist for a random period based on AIFS. After waiting for this period, VOC1 can recapture the seventh time slot again and it needs to send the SR packet to notify other vehicles that the collision is fully resolved. On the other hand, another collided vehicle, VR, can randomly pick up an available time slot from the remaining free time slots in the frame, and it is also required to send the SR packet. Consequently, the cooperation collisions have been resolved, and all collided vehicles can pick up the available time slots and continue the cooperating process.
Scenario D is incurred when two VOC vehicles within the direct communication range of the 2HS are contending to reserve the same time slot, which directly causes access collisions. To resolve this, the received SINR values of these two collided vehicles are compared first, and the vehicle with a greater received SINR value is selected as the front vehicle, here VOC1 is selected in this demonstration since the relative distance is directly proportional to the received SINR. Then, VS also needs to send a DD packet to its own time slot, whereas its preamble part contains instructions stating that the preceding vehicle VOC1 can recapture the colliding time slot (the second time slot) and the following vehicle VOC2 is required to wait for a random period depending on AIFS. Subsequently, VOC2 can acquire a new available free time slot and sends the SR packet, acting as the same foregoing procedure of resolving cooperating collisions.
To examine the packet transmission collisions of the relay vehicles, the IR packet is sent out by a relay vehicle when it has successfully reserved the time slot to inform other types of vehicles that it is not involved in the cooperation process. Upon receiving the time slots with the IR packet, a relay collision between the relay vehicles can also appear, as depicted in Scenario E. To address this collision, a DD packet is employed by VS to place these collided vehicles in the exclusion list for a random amount of time in the next frame (n  h + 1). After waiting for this random amount of time, both collided relay vehicles can join the channel again by sensing and acquiring the new time slots based on the prior order in comparing the intensity of their received SINR, and both of them also need to send SR packets, respectively. In this way, relay collisions are successfully mitigated.
Without the occurrence of access collisions, a collision can nevertheless occur, rarely, when two vehicles unexpectedly reserve the same time slot, and this kind of collision is called a reservation collision. To tackle this issue, both collided vehicles are put into the exclusion list at first; then, the received SINRs are compared, and VS will send its DD packet including the instruction that the vehicle with the greater SINR has a higher opportunity to recapture the time slot in the next frame, and the other collided one can attempt to join the channel after waiting for a random period. Both of them also need to send their SR packets after reserving the available time slots successfully to announce that the access collisions have been resolved.
Furthermore, failure in packet reception may happen due to a transmission error or interference when different packets are assigned to the same time slot. In this case, vehicle VS will detect the colliding time slot with the packet failure and put it into the exclusion list for a random period. Collision information in the DD packet is released in the next frame to reassign a new free time slot again, and the collisions are resolved. Through this approach, subsequent collisions can be discovered and efficiently mitigated. However, there is still the possibility of encountering aggregate heterogeneous collisions, which happen when numerous collisions take place at once because of heavy or highly congested traffic load.

4.3.2. Aggregated Heterogenous Collision Resolutions

Very little research has been focused on modeling in the context of aggregated heterogeneous collisions, particularly in situations under highly congested or heavy traffic flow. Therefore, we develop sustainable collision models when making decisions on discovering efficient solutions to resolve these types of collisions. In this subsection, we first discuss the case of aggregated heterogenous collisions of hidden terminals (HTs) and exposed terminals (ETs) at dissociated positions, occurring simultaneously but quite independently. Additionally, then, the case of their aggregated heterogenous collision at an associated position is presented. In both cases, we provide the corresponding resolving methods depending on their received SINRs, vehicle mobility, and relevant collisions.
1.
Aggregated Heterogenous Collisions of Hidden and Exposed Terminals at Dissociated Positions
When two vehicles are not within direct communication range and contend to reserve the same time slot, it leads to a hidden-terminal problem. As seen on the left of Figure 9, vehicles VS1, VD1, and VOC1 can successfully reserve time slots 2, 6, and 8, respectively. However, vehicle VOC1 is entering the intersection area between VS1 and VD1; as a consequence, VS1 and VD1 cannot sense each other, while VOC1 can sense both of them. In this instance, vehicles VS1 and VD1 unexpectedly reserve the same time slot (the third time slot) and an HT occurs.
In the meantime, as seen on the right in Figure 9, when two sender vehicles (VS2 and VS3) are within communication range of each other, and their expected destination vehicles (VD2 and VD3) are far away from each other, respectively, VS2 and VS3 can concurrently transmit the message to VD2 and VD3, respectively, using the same time slot without any conflict. However, VS2 and VS3 are not allowed to reserve the same time slot (the seventh time slot in Figure 9), and the ET problem occurs. This kind of scenario is termed aggregated heterogenous collisions at the dissociated position. From the above phenomenon, we have discovered that both HT and ET problems can lead to inefficient reusability and directly cause time slot collisions.
In order to resolve an HT problem, at first, the vehicle between the two collided vehicles is considered to be an access point vehicle Vap since it is the only vehicle that can discover the current collision. Alternatively, to resolve an ET problem, the two collided vehicles (VS2 and VS3) can be assumed to be Vap1 and Vap2, respectively, since both of them are within each others’ communication radii.
The procedures of the slot reallocation mechanism for aggregated heterogenous collisions of HTs and ETs at dissociated positions (SRM-DP) are shown in Figure 10 for resolving any HT or ET problems. First, it is necessary to confirm that the number of collided vehicles Ncv is less than the number of currently available free time slots Nfs. If not, the vehicle is required to wait for the next frame. If yes, the Vap compares the received SINRs of the collided vehicles through VIT. To resolve the HT problem, the vehicle with the higher received SINR is given priority to recapture the colliding time slot since it is assumed to get closer to Vap than the others.
To resolve the ET problem, both Vap1 and Vap2 need to compare the received SINRs of their adjacent vehicles (VD2 and VD3), respectively, and the Vap with the higher received SINR with its adjacent vehicle is selected to recapture the colliding time slot. Then, the other residual vehicle needs to acquire any of the other free available time slots. After both collided vehicles have successfully reserved the available time slots, respectively, they need to broadcast SR packets to notify other vehicles. By following this process, the collisions due to HT and ET problems are successfully eliminated.
2.
Aggregated Heterogenous Collisions of Hidden and Exposed Terminals at Associated Positions
If multiple aggregated collisions of HTs and ETs have occurred jointly and simultaneously, it is necessary for all collided vehicles to acquire a new time slot in the next frame, whereas the collided vehicles with higher received SINRs can recapture the colliding time slots. As shown in Figure 11, we consider that three types of collisions occur concurrently, with one collision occurring due to ETs, and the other two collisions occurring due to HTs; therefore, a total number of four HTs and three ETs occur in this network scenario.
The procedures of the slot reallocation mechanism for aggregated collisions of HTs and ETs at associated positions (SRM-AP) are discussed in Figure 12. First, it is necessary to confirm that Ncv < Nfs. If not, it is necessary to wait for the next frame. If yes, we compare the number of Vap vehicles within the collisions. If there is only one Vap, we can follow the SRM-DP procedure. If there are more than two Vap vehicles, the received SINRs of both are compared, and the Vap with the highest SINR value related to the HTs is given higher priority.
On the basis of Figure 11, three vehicles (VS1, VS2, and VS3) are within the communication range of HT-1 and HT-2. Therefore, the received SINRs from these two HTs are compared first, and then, the Vap with the higher SINR is selected to resolve the collisions. Then, the SINRs of the collided vehicles are compared. Moreover, the collided vehicle with a higher SINR is selected to recapture the colliding time slot since it is anticipated to approach the targeted Vap. Next, the rest of the vehicles can acquire any of the remaining available free time slots. After successfully reserving their respective time slots, the two vehicles also need to transmit an SR packet to inform the others, respectively.
To resolve the aggregated collisions of ETs, as shown in Figure 12, all Vap1, Vap2, and Vap3 vehicles need to compare the SINRs of their adjacent vehicles, including VD1, VD2, VD3, and VD4, respectively, and the Vap with the higher received SINR relative to its adjacent vehicles is selected to recapture the colliding time slot. Then, the same steps with the aforementioned procedures are followed. By following this SRM-AP mechanism, the cumulative collisions due to the aggregated heterogenous collisions of HT and ET problems are successfully eliminated.

5. Performance Analysis

In this section, we first investigate the performance analysis of collision probability and packet reception probability to evaluate the protocol performance and optimize network parameters. Then, we analyze access delay to validate the protocol’s fairness and efficiency.

5.1. Collision Probability

In this subsection, we investigate the average number of all types of collisions experienced by the CFC-MAC and derive the probability mass function (PMF) to describe the discrete probability distribution of these collisions. Let us consider that the vehicles are distributed randomly on a multi-lane roadway and follow the Poisson distribution [48] for a limited transmission range. Traffic density λ T can be acquired through fixed installed detectors, such as cameras, inductive loops, microphones, and Electronic Toll Collection (ETC) readers [46,57]. The PMF of n vehicles, running on a road segment of length L r , can be expressed as follows:
P ( n ) = ( λ T L r ) n e λ T L r n ! .
When at least two vehicles access the same time slot, there is a probability of a collision. Different kinds of collisions may occur within a given frame when two or more vehicles are contending to reserve specific time slots. Therefore, the probability that a collision happens at a specific time slot is 1 P ( n ) . Let j be the number of time slots among i encountering collisions whereby j n / 2 ; the probability P ( j ) can be defined as
P ( j ) = C i j [ 1 P ( n ) ] j P ( n ) i j ,
and the average number of collisions N c can be calculated as
N c = j = 1 n / 2 j P ( j ) .
Let us assume that a frame has n τ number of time slots for each direction and each vehicle needs to assign a certain time slot where n τ n . In general, there are at least two vehicles for one colliding time slot, and collided vehicles are also able to encounter a new collision again when they try to acquire a new time slot. In this case, the same process of achieving achieve N c can be iterated until no collisions are left. Then, the probability of x number of collisions for n τ number of time slots can be defined as
P ( x ) = ( N c n τ ) x e 2 N c N τ x ! .

5.2. Packet Reception Probability

To validate our design process, an analytical expression of packet reception probability is necessary. Considering that a packet’s arrival at a vehicle follows the Poisson point process (PPP), in each frame, the probability that a specific vehicle generates a packet is p = 1 P r ( 0 ) , where P r ( 0 ) represents the probability of generating a zero packet. When there are n vehicles in the system, the probability that x cooperative vehicles will generate a packets is
P ( x ) = C n x p x ( 1 p ) n x ,
where C n x = n ! / ( x ! ( n x ) ! ) . Let us assume that there is N o c number of optimum cooperative vehicles; the probability that the cooperative vehicle receives k packets is
P { C = k } = x = k n P ( x ) C x k [ ( 1 P r e ) N o c ] k [ 1 ( 1 P r e ) N o c ] x k ,
where P r e is the probability of the relay vehicle receiving the packets and C x k = x ! / ( k ! ( x k ) ! ) .

5.3. Access Delay

In the VANET environment, the access delay is defined as the time duration needed by a new vehicle to access a time slot successfully for data packet transmissions, and it can be disastrous in time-sensitive deployments where immediate detection and actions impact security, safety, and link failures. When a vehicle attempts to access a time slot, it will receive a DD packet with access denial or access failure from its neighboring vehicles if another vehicle is exploiting it. In our CFC-MAC, we consider the access failure for a transmission range based on the received SINR threshold.
The maximum density achieved under congestion, called the jam density K c , within a length of a roadway L r at a given time is equal to the inverse of the average spacing of the n vehicles, i.e., K c = S n / L r . For the transmission range DSD, the average number of vehicles Mv for ls lanes can be stated as follows:
M v = l s K c D S D .
For a time duration t d , the average velocity of a vehicle v = 2 R c / t d . When N τ number of total time slots have j number of colliding time slots, the successful channel access of 1HS, 2HS, and 3HS is n τ j / n τ , n τ 2 R c M v / n τ , and n τ 3 R c M v / n τ , respectively. The access failure probability of the 3HS range can be defined as
P f a i l u r e = j = 0 n / 2 [ 1 ( n τ j n τ n τ 2 R c M v n τ n τ 3 R c M v n τ ) ] P ( x ) .
By following the geometric distribution theory, if the probability of successful transmission in each trial is P f a i l u r e , the probability of possessing successful channel access after X failed for the kth trial (out of finite trials) is
P { X = k } = ( 1 P f a i l u r e ) P f a i l u r e k 1 ,
where k = 1, 2, 3, 4, … and the expected value E(X) is 1 / P f a i l u r e . When a vehicle wants to utilize a time slot, it initially looks for free time slots for one frame period. After reserving a time slot, the UI packet is transmitted, and the vehicle will be informed as to whether it may utilize the reserved time slot after a certain amount of time t ω . If not, it will attempt to acquire another time slot. Let us assume that T c o is the average time between a cooperative vehicle receiving an SM from the previous source and rebroadcasting it, T p s is the average time taken for a collided vehicle to recapture the colliding time slot again, and T n s is the average time taken for a collided vehicle to reserve a new time slot. Therefore, the total average time taken for the whole process t ω will be
t ω = j = 0 n / 2 T c o + T p s + T n s ,
where T p s = τ min N τ , and τ min is the minimum time interval of a time slot based on the frame size of a packet. The time interval between receiving the notice and moving on to the next attempt (including the initial time slot decision taken after scanning the available time slots) is a random variable z following a Uniform Cumulative Distribution Function (UCDF), z ~ U ( 0 , t ω ) , where the mean (first moment) of the distribution is μ = t ω / 2 . Based on this approach, the access delay D A can be calculated as
D A = 1 1 P f a i l u r e ( t ω + μ ) + t ω .
It is worth mentioning that a more precise access delay can be achieved depending on the access failure probability within the transmission range.

6. Performance Evaluation

In this section, we first elaborate on the simulation parameters and performance metrics; then, we evaluate the performance of our proposed CFC-MAC in terms of five key measures: access delay, packet loss ratio (PLR), throughput, end-to-end (E2E) delay, and collision rate. Using consistent simulation settings for the highway traffic scenario, the performance of the proposed CFC-MAC protocol is evaluated in comparison with the EVC-TDMA [28], ECTOB-MAC [43], and PeerProbe-MAC [46] protocols.

6.1. Simulation Parameters

We performed extensive simulations in OMNET++5.6.2 with the INET 4.2.8 framework for the event-based network simulation, which combines open-source vehicular network simulator VEINS 5.2, and Simulation of Urban MObility (SUMO) 1.11.0 msi (eclipse) for the generation of real-world mobility models, which include the deployment of the Intelligent Driver Model (IDM) and the Minimizing Overall Braking Induced by Lane Changes (MOBIL) model. We obtained the randomly partitioned map from OpenStreetMap (OSM) and turned it into a SUMO simulation using INET and VEINs together to simulate a V2V network. In the simulation, the radio channel models, such as shadowing and fading effects [47], were not taken into account.
A 5 km bidirectional road is set with four lanes in each direction and varying speed limits of 60, 80, 100, and 120 km/h, and the total network area is 6 × 4 km2. The executed vehicles in the traffic scenarios have distinct performance characteristics, such as length, acceleration, deceleration, and maximum speed. The attributes of vehicles utilized in the SUMO are summarized in Table 3. The vehicle performance parameters and destination are chosen randomly when they enter the simulation system, and they leave the system when they reach the chosen destination.
The simulation of CFC-MAC is implemented as follows. Each vehicle maintains a VIT status for all time slots, and its operation is dependent on the VIT information. The deployment of multi-channel devices allows the vehicles to listen to all channels and broadcast SM at the selected time slot. The PHY layer of CFC-MAC is modeled in the same way as IEEE 802.11p, in which the protocol packet data unit (PPDU) [58] is composed of a preamble, a signal field, and a payload component containing the useful data. A total of 52 subcarriers (data + pilot) are assigned numbers from −26 to 26, and the symbol interval is 8 μs, respectively. On the other hand, the EVC-TDMA, ECTOB-MAC, and PeerProbe-MAC protocols are implemented based on the existing INET framework with a data rate of 6 Mbps and a communication radius of 250 m.
The packets are successfully received by a vehicle if the received SINR is more than the preset threshold β, and a collision occurs when there is more than one transmitter using the same time slot within the 2HS range of the receiver. By considering the antenna gains and feeder losses, it is possible to determine the transmission power for various vehicle densities, as shown in Table 4—with the results for the number of optimum cooperative vehicles N o c = 10 —by using (2) based on the desired SINRs of 5, 20, 40, and 60; these correspond to time slot duration of 4 ms, 2 ms, 1 ms, and 0.5 ms, respectively. Since a signal with an SINR value of 20 dBm or more is recommended and the duration of a time slot should not be longer than 2 ms, it can be seen that λ < 0.059 and the transmitted power is less than 25 dBm. Furthermore, the network simulation parameters are specified in Table 5.

6.2. Performance Evaluation

In the implementation of all the compared MAC protocols, a cooperative vehicle attempts to forward the data packet a specified number of times, regardless of receiving a packet from a farther vehicle or source vehicle. Therefore, the packet reception probability is effectively improved by increasing the maximum number of transmission counts. On the contrary, the relay vehicle aborts its forwarding process upon receiving the packet, which can definitely reduce the number of retransmission attempts. To evaluate the performance of our proposed protocol under varied traffic densities, the following is a list of definitions for the evaluated performance metrics:
  • Access delay: The time duration required by a new vehicle to access a time slot successfully for data packet transmission. It depends on the number of total vehicles when a vehicle has acquired a time slot and utilizes it in all continuous frames without collision.
  • Packet loss ratio: A packet loss denotes that a packet is not received because of a collision or channel fading. The packet loss ratio (PLR) can be defined as
P L R = 1 # of   received   packets # of   expected   packets   to   be   received = 1 η .
  • Throughput: The average number of successful data transmissions per unit of time as a fraction of the channel capacity. It is controlled by bandwidth, the received SINR, and hardware limitations.
  • End-to-end (E2E) delay: The time taken for a packet to route through the network from a source vehicle to its destination vehicle.
  • Collision rate: The average number of collisions per frame. The collision rate significantly depends on traffic density and the total number of available time slots.
For various vehicle densities, Figure 13 contrasts the simulation results of the access delay with the analytical results, whereas the power control mechanism is not deployed to provide a fair assessment. The simulations were performed ten times, and the standard deviations and average values were plotted on a graph. The derived access collision probability and access delay are estimations. Therefore, the analytical results provide an upper bound for the access delay. In the simulation, there is only a minor difference between the bound and the simulated access delay, and this difference tends to increase when the density is very high and the frequency of cumulative heterogenous collisions is significant. As a result, the proposed CFC-MAC is adaptable and capable of ensuring an effectively consistent access delay up to a specific number of vehicles.
Figure 14 presents the analytical results for access delay related to different numbers of optimum cooperative vehicles VOC. With the increase in vehicle densities, a growing number of optimum cooperative vehicles participate in the communication process. A total of 184 available time slots is set, and each time slot has a duration of 0.5 ms. The access delay slightly increases and is on the verge of 0.5 s, even when the vehicle density goes up to 300. Moreover, it can be seen that there is a significant difference at the beginning of the access delay with the enlarging of vehicle densities. However, higher vehicle densities do not have a substantial impact on the access delay, showing that it is almost stable and deterministic. The reason is that CFM can reduce excessively long retransmission delays and endure the occurrence of heterogenous collisions in highly congested traffic scenarios.
In Figure 15, we compare the packet loss ratio (PLR) between our CFC-MAC and the aforementioned three protocols at 0.4 and 0.7 percent of Pk, which is the probability of the cooperative vehicle receiving k packets, and overall, the results for 0.7 are better than those for 0.4. We can observe that all the MAC protocols provide a low PLR under different traffic densities. When the background traffic level increases, the PLR also becomes steadily higher. The proposed CFC-MAC yields the lowest PLR among the four different MAC protocols because cooperative forwarding with a selected number of VOC vehicles can reduce the number of unnecessary retransmissions of relay vehicles. It should be noted that the proposed CFC-MAC slightly underestimates the figure at Pk = 0.7, resulting in a smaller-scale increase in PLR than at Pk = 0.4 and a relatively lower result than the other protocols. This is because due to the probability simplification in the derivation through rapid identification of the next VOC after the previous forwarder, PLR is effectively minimized by manipulating the maximum number of transmissions.
Figure 16 depicts the normalized throughput for different protocols. From the figure, it can be seen that more packets result in larger throughput when there is little congestion. We implement the channel busy ratio of the ECTOB-MAC into the throughput calculation since it is the average value for the ratio of the channel busy time of each vehicle over the broadcast period of an emergency warning message (EWM). We can see that the proposed CFC-MAC protocol outperforms other competing protocols under diversified traffic densities. The prominent reason is that the CFC-MAC is capable of adapting to unbalanced traffic conditions and can reduce the various types of heterogenous collision, especially aggregated heterogenous collisions and same-direction merging collisions.
Figure 17 demonstrates how successfully CFC-MAC minimized the E2E delay in contrast to the other protocols. It can be clearly seen that it consistently achieves a comparable delay of no more than 8 ms at 350 vehicles/km, even at the value of Pk = 0.4. It is important to realize that EVC-TDMA has a substantial computation delay at a density of 200 vehicles/km, which is quite close to CFC-MAC’s E2E delay of around 5 ms; this is because a relay vehicle can straightforwardly find a sufficient number of cooperators with an EWM size of 500 bytes and significant background traffic levels. On the other hand, both ECTOB-MAC and PeerProbe-MAC have E2E delays above 10 ms and also reach steeper curves at higher densities. This is because the time slot partition method cannot provide enough time slots for vehicles on the dense side, which may result in various types of collisions.
In Figure 18, we compare the collision rated of four different protocols. Increasing the number of vehicles causes more contentious, noteworthy interference among vehicles and an excessive collision rate. The EVC-TDMA and PeerProbe-MAC have a steady collision rates with escalating density levels. Noticeably, the proposed CFC-MAC has the lowest collision rate and remains constant or slightly increasing, generally below 30% at both Pk = 0.4 and Pk = 0.7, whereas the number of collisions in a frame for ECTOB-MAC towers significantly at higher densities of between 140 and 160 at 350 vehicles/km. The main reason is that CFC-MAC’s VTE is more trustworthy in resolving same-direction merging collisions to a certain extent, and has a greater connection in cooperative forwarding schemes. Moreover, CFC-MAC can also extensively identify and reduce the occurrence of typical heterogenous collisions and aggregated heterogenous collisions, and gains more adaptability to real-world traffic scenarios.

7. Discussion

The existing TDMA-based distributive cooperative MAC protocols do not show compatibility with the occurrence of heterogenous collisions. Therefore, unified models of defining aggregated heterogeneous collisions become captious for traffic characterization and modeling in a congested state of traffic flow. The proposed CFC-MAC protocol utilizes optimum cooperative vehicles to forward data packets, so as to improve the probability of successful data packet transmissions and achieve deterministic access delay. Specifically, CFC-MAC can achieve 5% to 25% performance enhancement compared to other protocols.

8. Conclusions and Future Work

In this paper, we have presented a novel TDMA-based contention-free cooperative MAC protocol to develop a cooperative forwarding model by proficiently selecting the optimum cooperative vehicles. Based on the disjoint time slot partitioning method, same-direction merging collisions can be predicted and effectively eliminated using the SINR-based vectorized trajectory estimation method by identifying the upcoming pathways. Based on the proposed cooperative forwarding model, we scrutinize the diversified patterns of typical heterogenous collisions, including cooperation collisions, access collisions, relay collisions, and reservation collisions. Moreover, we investigate the aggregated heterogenous collisions of hidden terminals and exposed terminals at dissociated positions (which occur simultaneously but separately) and associated positions. By identifying the access point vehicles and comparing the received signal strengths, we provide pertinent resolving methods to reduce both types of heterogenous collision. Finally, we conduct extensive simulation experiments, and the results confirm the effectiveness of the proposed protocol. In the near future, we may study the effects of RSUs on cooperative forwarding mechanisms to select the optimum cooperative vehicle. Further, we intend to develop a machine-learning-based technique to resolve the various types of heterogenous collision for VANETs.

Author Contributions

Conceptualism, N.N.L. and K.L.; methodology, Q.G.; simulation, N.N.L.; validation, N.N.L., K.L., and Q.G.; writing—original draft preparation, N.N.L. and K.L.; writing—review and editing, Q.G.; visualization, K.L.; supervision, Q.G.; project administration, K.L.; funding acquisition, K.L. and Q.G. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Key R&D Program of China under Grant No. 2021YFB1600503, the National Nature Science Foundation of China under Grant No. U2033215, and the Key R&D Program of Zhejiang Province under Grant No. 2020C05005.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The authors would like to thank the editor and the anonymous reviewers for their helpful and constructive comments, which have helped us to improve the manuscript significantly.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. ISO. CEN ISO/TR 21186-2:2021; Cooperative Intelligent Transport Systems (C-ITS) Guidelines on the Usage of Standards. ISO: Geneva, Switzerland, 2020.
  2. ETSI (European Telecommunications Standards Institute). ETSI EN 302 637-2 Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 2: Specification of Cooperative Awareness Basic Service V1.4.1; ETSI: Sophia Antipolis, France, 2019; Volume V1.4.1. [Google Scholar]
  3. IEEE Vehicular Technology Society. IEEE Standard for Wireless Access in Vehicular Environments (WAVE)--Identifiers. IEEE Std 1609.12-2019 (Revision of IEEE Std 1609.12-2016); IEEE: Piscataway, NJ, USA, 2019. [Google Scholar]
  4. Hussein, N.H.; Yaw, C.T.; Koh, S.P.; Tiong, S.K.; Chong, K.H. A Comprehensive Survey on Vehicular Networking: Communications, Applications, Challenges, and Upcoming Research Directions. IEEE Access 2022, 10, 86127–86180. [Google Scholar] [CrossRef]
  5. Maaloul, S.; Aniss, H.; Kassab, M.; Berbineau, M. Classification of C-ITS Services in Vehicular Environments. IEEE Access 2021, 9, 117868–117879. [Google Scholar] [CrossRef]
  6. Sepulcre, M.; Gonzalez-Martin, M.; Gozalvez, J.; Molina-Masegosa, R.; Coll-Perales, B. Analytical Models of the Performance of IEEE 802.11p Vehicle to Vehicle Communications. IEEE Trans. Veh. Technol. 2022, 71, 713–724. [Google Scholar] [CrossRef]
  7. Zhang, S.; Chen, J.; Lyu, F.; Cheng, N.; Shi, W.; Shen, X. Vehicular Communication Networks in the Automated Driving Era. IEEE Commun. Mag. 2018, 56, 26–32. [Google Scholar] [CrossRef] [Green Version]
  8. TSGR (Transport System Generic Requirement). TS 136 101-V14.5.0-LTE; Evolved Universal Terrestrial Radio Access (E-UTRA); User Equipment (UE) Radio Transmission and Reception (3GPP TS 36.101 Version 14.5.0 Release 14); ETSI: Sophia Antipolis, France, 2017. [Google Scholar]
  9. ETSI (European Telecommunications Standards Institute). TR 103 439-V2.1.1-Intelligent Transport Systems (ITS); Multi-Channel Operation Study; Release 2; ETSI: Sophia Antipolis, France, 2021; Volume 1. [Google Scholar]
  10. Jeong, H.H.; Shen, Y.C.; Jeong, J.P.; Oh, T.T. A Comprehensive Survey on Vehicular Networking for Safe and Efficient Driving in Smart Transportation: A Focus on Systems, Protocols, and Applications. Veh. Commun. 2021, 31, 100349. [Google Scholar] [CrossRef]
  11. Pan, Q.; Wu, J.; Nebhen, J.; Bashir, A.K.; Su, Y.; Li, J. Artificial Intelligence-Based Energy Efficient Communication System for Intelligent Reflecting Surface-Driven VANETs. IEEE Trans. Intell. Transp. Syst. 2022, 23, 19714–19726. [Google Scholar] [CrossRef]
  12. Molina-Masegosa, R.; Gozalvez, J.; Sepulcre, M. Comparison of IEEE 802.11p and LTE-V2X: An Evaluation With Periodic and Aperiodic Messages of Constant and Variable Size. IEEE Access 2020, 8, 121526–121548. [Google Scholar] [CrossRef]
  13. Bhardwaj, P.; Pal, R.; Gupta, N. An Intelligent Scheme for Slot Reservation in Vehicular Ad Hoc Networks. China Commun. 2021, 18, 223–235. [Google Scholar] [CrossRef]
  14. Zang, J.; Shikh-Bahaei, M. Full Duplex-Based Scheduling Protocol for Latency Enhancement in 5G EV2X VANETs. In Proceedings of the 2021 IEEE Wireless Communications and Networking Conference (WCNC), Nanjing, China, 29 March–1 April 2021; pp. 1–6. [Google Scholar] [CrossRef]
  15. Shah, P.; Kasbe, T. A Review on Specification Evaluation of Broadcasting Routing Protocols in VANET. Comput. Sci. Rev. 2021, 41, 100418. [Google Scholar] [CrossRef]
  16. Amin, F.; Abbasi, R.; Khan, S.; Abid, M.A. An Overview of Medium Access Control and Radio Duty Cycling Protocols for Internet of Things. Electronics 2022, 11, 3873. [Google Scholar] [CrossRef]
  17. Johari, S.; Bala Krishna, M. TDMA Based Contention-Free MAC Protocols for Vehicular Ad Hoc Networks: A Survey. Veh. Commun. 2021, 28, 100308. [Google Scholar] [CrossRef]
  18. Ma, M.; Liu, K.; Luo, X.; Zhang, T.; Liu, F. Review of MAC Protocols for Vehicular Ad Hoc Networks. Sensors 2020, 20, 6709. [Google Scholar] [CrossRef] [PubMed]
  19. Arena, F.; Pau, G.; Severino, A. A Review on IEEE 802.11p for Intelligent Transportation Systems. J. Sens. Actuator Netw. 2020, 9, 22. [Google Scholar] [CrossRef]
  20. Srivastava, A.; Prakash, A.; Tripathi, R. A Cross Layer Based Cooperative Broadcast Protocol for Multichannel VANET. Ad Hoc Netw. 2022, 131, 102840. [Google Scholar] [CrossRef]
  21. Cao, Y.; Zhang, H.; Fang, Y.; Yuan, D. An Adaptive High-Throughput Multichannel MAC Protocol for VANETs. IEEE Internet Things J. 2020, 7, 8249–8262. [Google Scholar] [CrossRef]
  22. Chakroun, R.; Abdellatif, S.; Villemur, T. LAMD: Location-Based Alert Message Dissemination Scheme for Emerging Infrastructure-Based Vehicular Networks. Internet Things 2022, 19, 100510. [Google Scholar] [CrossRef]
  23. Huang, C.-M.; Lai, C.-F. The Delay-Constrained and Network-Situation-Aware V2V2I VANET Data Offloading Based on the Multi-Access Edge Computing (MEC) Architecture. IEEE Open J. Veh. Technol. 2020, 1, 331–347. [Google Scholar] [CrossRef]
  24. Deng, T.; Wei, S.; Liu, X.; Zhou, H.; Dong, M. Distributed Resource Allocation Based on Timeslot Reservation in High-Density VANETs. IEEE Trans. Veh. Technol. 2022, 71, 6586–6595. [Google Scholar] [CrossRef]
  25. Wu, Y.; Zheng, J. Modeling and Analysis of the Local Delay in an MEC-Based VANET for a Suburban Area. IEEE Internet Things J. 2022, 9, 7065–7079. [Google Scholar] [CrossRef]
  26. Liu, Y.; Zhou, H.; Huang, J. OCA-MAC: A Cooperative TDMA-Based MAC Protocol for Vehicular Ad Hoc Networks. Sensors 2019, 19, 2691. [Google Scholar] [CrossRef] [Green Version]
  27. Sudheera, K.L.K.; Ma, M.; Chong, P.H.J. Real-Time Cooperative Data Routing and Scheduling in Software Defined Vehicular Networks. Comput. Commun. 2022, 181, 203–214. [Google Scholar] [CrossRef]
  28. Zhang, T.; Zhu, Q. EVC-TDMA: An Enhanced TDMA Based Cooperative MAC Protocol for Vehicular Networks. J. Commun. Netw. 2020, 22, 316–325. [Google Scholar] [CrossRef]
  29. Liu, B.; Deng, D.; Rao, W.; Wang, E.; Xiong, S.; Jia, D.; Wang, J.; Qiao, C. CPA-MAC: A Collision Prediction and Avoidance MAC for Safety Message Dissemination in MEC-Assisted VANETs. IEEE Trans. Netw. Sci. Eng. 2022, 9, 783–794. [Google Scholar] [CrossRef]
  30. Mosavat-Jahromi, H.; Li, Y.; Ni, Y.; Cai, L. Distributed and Adaptive Reservation MAC Protocol for Beaconing in Vehicular Networks. IEEE Trans. Mob. Comput. 2021, 20, 2936–2948. [Google Scholar] [CrossRef]
  31. Latif, M.B.; Liu, F.; Liu, K. A TDMA-Based MAC Protocol for Mitigating Mobility-Caused Packet Collisions in Vehicular Ad Hoc Networks. Sensors 2022, 22, 643. [Google Scholar] [CrossRef] [PubMed]
  32. Tiwari, J.; Prakash, A.; Tripathi, R. A Novel Cooperative MAC Protocol for Safety Applications in Cognitive Radio Enabled Vehicular Ad-Hoc Networks. Veh. Commun. 2021, 29, 100336. [Google Scholar] [CrossRef]
  33. Mosavat, H.; Li, Y.; Cai, L.; Lu, L. NC–MAC: A Distributed MAC Protocol for Reliable Beacon Broadcasting in V2X. IEEE Trans. Veh. Technol. 2021, 70, 6044–6057. [Google Scholar] [CrossRef]
  34. Karabulut, M.A.; Shah, A.F.M.S.; Ilhan, H. CoMACAV: Cooperative MAC Protocol for Autonomous Vehicles. In Proceedings of the 2019 IEEE International Symposium on INnovations in Intelligent SysTems and Applications (INISTA), Sofia, Bulgaria, 3–5 July 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 1–5. [Google Scholar]
  35. Tiwari, J.; Prakash, A.; Tripathi, R.; Naik, K. A Fair and Cooperative MAC Protocol for Heterogeneous Cognitive Radio Enabled Vehicular Ad-Hoc Networks. IEEE Trans. Cogn. Commun. Netw. 2022, 8, 1005–1018. [Google Scholar] [CrossRef]
  36. Nyi Linn, N.; Liu, K.; Lu, H. A Clustering-Based Contention-Free MAC Protocol for Vehicular Ad Hoc Networks. In Proceedings of the 2022 7th International Conference on Computer and Communication Systems (ICCCS), Guangzhou, China, 21–24 April 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 560–565. [Google Scholar]
  37. Tanenbaum, A.S.; Wetherall, D.J. Computer Networks, 5th ed.; Prentice Hall: Englewood Cliffs, NJ, USA, 2011; ISBN 9780132126953. [Google Scholar]
  38. Abdelkader, G.; Elgazzar, K.; Khamis, A. Connected Vehicles: Technology Review, State of the Art, Challenges and Opportunities. Sensors 2021, 21, 7712. [Google Scholar] [CrossRef]
  39. Babu, S.; Parthiban, A.R.K. DTMR: An Adaptive Distributed Tree-Based Multicast Routing Protocol for Vehicular Networks. Comput. Stand. Interfaces 2022, 79, 103551. [Google Scholar] [CrossRef]
  40. Shin, Y.; Choi, H.; Nam, Y.; Lee, E. Data Delivery Protocol Using the Trajectory Information on a Road Map in VANETs. Ad Hoc Netw. 2020, 107, 102260. [Google Scholar] [CrossRef]
  41. Abbasi, H.I.; Voicu, R.C.; Copeland, J.A.; Chang, Y. Towards Fast and Reliable Multihop Routing in VANETs. IEEE Trans. Mob. Comput. 2020, 19, 2461–2474. [Google Scholar] [CrossRef]
  42. Ameur, A.I.; Lakas, A.; Yagoubi, M.B.; Oubbati, O.S. Peer-to-Peer Overlay Techniques for Vehicular Ad Hoc Networks: Survey and Challenges. Veh. Commun. 2022, 34, 100455. [Google Scholar] [CrossRef]
  43. Zhang, H.; Zhang, X.; Sung, D.K. An Efficient Cooperative Transmission Based Opportunistic Broadcast Scheme in VANETs. IEEE Trans. Mob. Comput. 2021, 2, 1. [Google Scholar] [CrossRef]
  44. Ghaemi, Y.; El-Ocla, H.; Yadav, N.R.; Madana, M.R.; Raju, D.K.; Dhanabal, V.; Sheshadri, V. Intelligent Transport System Using Time Delay-Based Multipath Routing Protocol for Vehicular Ad Hoc Networks. Sensors 2021, 21, 7706. [Google Scholar] [CrossRef]
  45. Yeferny, T.; Yahia, S. Ben A Markov Chain-Based Data Dissemination Protocol for Vehicular Ad Hoc Networks. Comput. Commun. 2021, 180, 303–314. [Google Scholar] [CrossRef]
  46. Cai, Y.; Zhu, H.; Chang, S.; Wang, X.; Shen, J.; Guo, M. PeerProbe: Estimating Vehicular Neighbor Distribution With Adaptive Compressive Sensing. IEEE/ACM Trans. Netw. 2022, 30, 1703–1716. [Google Scholar] [CrossRef]
  47. Abuelenin, S.M.; Elaraby, S. A Generalized Framework for Connectivity Analysis in Vehicle-to-Vehicle Communications. IEEE Trans. Intell. Transp. Syst. 2022, 23, 5894–5898. [Google Scholar] [CrossRef]
  48. Wang, X.; Weng, Y.; Gao, H. A Low-Latency and Energy-Efficient Multimetric Routing Protocol Based on Network Connectivity in VANET Communication. IEEE Trans. Green Commun. Netw. 2021, 5, 1761–1776. [Google Scholar] [CrossRef]
  49. Osman, R.A.; Zaki, A.I.; Abdelsalam, A.K. Novel Road Traffic Management Strategy for Rapid Clarification of the Emergency Vehicle Route Based on V2V Communications. Sensors 2021, 21, 5120. [Google Scholar] [CrossRef]
  50. Hota, L.; Nayak, B.P.; Kumar, A.; Sahoo, B.; Ali, G.G.M.N. A Performance Analysis of VANETs Propagation Models and Routing Protocols. Sustainability 2022, 14, 1379. [Google Scholar] [CrossRef]
  51. Gao, Q.; Wang, R.; Deng, H.; Luo, X.; Liu, K.; Peng, X.-H.; Liu, G.; Li, A. Performance Analysis of Cooperative Multiple Access With Minimum Interference Range for Large Scale Wireless Networks. IEEE Access 2022, 10, 2154–2169. [Google Scholar] [CrossRef]
  52. Aung, N.; Zhang, W.; Dhelim, S.; Ai, Y. T-Coin: Dynamic Traffic Congestion Pricing System for the Internet of Vehicles in Smart Cities. Information 2020, 11, 149. [Google Scholar] [CrossRef] [Green Version]
  53. Pei, Z.; Wang, X.; Lei, Z.; Zheng, H.; Du, L.; Chen, W. Joint Optimization of Multi-Hop Broadcast Protocol and MAC Protocol in Vehicular Ad Hoc Networks. Sensors 2021, 21, 6092. [Google Scholar] [CrossRef]
  54. C, T.; M G, J. An Enhancement for IEEE 802.11p to Provision Quality of Service with Context Aware Channel Access for the Forward Collision Avoidance Application in Vehicular Ad Hoc Network. Sensors 2021, 21, 6937. [Google Scholar] [CrossRef] [PubMed]
  55. Siddik, M.; Moni, S.; Alam, M.; Johnson, W. SAFE-MAC: Speed Aware Fairness Enabled MAC Protocol for Vehicular Ad-Hoc Networks. Sensors 2019, 19, 2405. [Google Scholar] [CrossRef] [Green Version]
  56. Kuhlmorgen, S.; Lu, H.; Festag, A.; Kenney, J.; Gemsheim, S.; Fettweis, G. Evaluation of Congestion-Enabled Forwarding With Mixed Data Traffic in Vehicular Communications. IEEE Trans. Intell. Transp. Syst. 2020, 21, 233–247. [Google Scholar] [CrossRef]
  57. Zhou, S.; Li, D.; Tang, Q.; Fu, Y.; Guo, C.; Chen, X. Multiple Intersection Selection Routing Protocol Based on Road Section Connectivity Probability for Urban VANETs. Comput. Commun. 2021, 177, 255–264. [Google Scholar] [CrossRef]
  58. IEEE. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std 802.11-2012 (Revision of IEEE Std 802.11-2007); IEEE: Piscataway, NJ, USA, 2012. [Google Scholar]
Figure 1. Each TDMA frame is divided into two sets of time slots: set L-CCHI for the left direction, and set R-CCHI for the right direction.
Figure 1. Each TDMA frame is divided into two sets of time slots: set L-CCHI for the left direction, and set R-CCHI for the right direction.
Sensors 23 01033 g001
Figure 2. Cooperative relay between vehicles.
Figure 2. Cooperative relay between vehicles.
Sensors 23 01033 g002
Figure 3. Structural flowchart of the proposed CFC-MAC protocol design.
Figure 3. Structural flowchart of the proposed CFC-MAC protocol design.
Sensors 23 01033 g003
Figure 4. Cooperation models (a) before a particular period and (b) after a particular period.
Figure 4. Cooperation models (a) before a particular period and (b) after a particular period.
Sensors 23 01033 g004
Figure 5. The verification process of optimum cooperative vehicle (VOC).
Figure 5. The verification process of optimum cooperative vehicle (VOC).
Sensors 23 01033 g005
Figure 6. Packet structure.
Figure 6. Packet structure.
Sensors 23 01033 g006
Figure 7. Merging collisions occur when vehicles move in the same direction at different speeds.
Figure 7. Merging collisions occur when vehicles move in the same direction at different speeds.
Sensors 23 01033 g007
Figure 8. Time slot assignment procedures for resolving typical heterogenous collisions.
Figure 8. Time slot assignment procedures for resolving typical heterogenous collisions.
Sensors 23 01033 g008
Figure 9. Aggregated collisions of HT and ET problems occurring at dissociated positions.
Figure 9. Aggregated collisions of HT and ET problems occurring at dissociated positions.
Sensors 23 01033 g009
Figure 10. Slot reallocation mechanism for aggregated heterogenous collisions of HTs and ETs at dissociated positions.
Figure 10. Slot reallocation mechanism for aggregated heterogenous collisions of HTs and ETs at dissociated positions.
Sensors 23 01033 g010
Figure 11. Aggregated collisions of HTs and ETs at associated positions.
Figure 11. Aggregated collisions of HTs and ETs at associated positions.
Sensors 23 01033 g011
Figure 12. Slot reallocation mechanism for aggregated heterogenous collisions of HTs and ETs at the associated position.
Figure 12. Slot reallocation mechanism for aggregated heterogenous collisions of HTs and ETs at the associated position.
Sensors 23 01033 g012
Figure 13. Comparison of access delay for simulation and analytical results.
Figure 13. Comparison of access delay for simulation and analytical results.
Sensors 23 01033 g013
Figure 14. Comparison of access delay with the growing number of vehicle densities related to optimum cooperative vehicles.
Figure 14. Comparison of access delay with the growing number of vehicle densities related to optimum cooperative vehicles.
Sensors 23 01033 g014
Figure 15. Comparison of packet loss ratio for different protocols.
Figure 15. Comparison of packet loss ratio for different protocols.
Sensors 23 01033 g015
Figure 16. Comparison of throughput for different protocols.
Figure 16. Comparison of throughput for different protocols.
Sensors 23 01033 g016
Figure 17. Comparison of E2E delay for different protocols.
Figure 17. Comparison of E2E delay for different protocols.
Sensors 23 01033 g017
Figure 18. Comparison of collision rates for different protocols.
Figure 18. Comparison of collision rates for different protocols.
Sensors 23 01033 g018
Table 1. Comparison of recent surveys on contention-free cooperative MAC protocols.
Table 1. Comparison of recent surveys on contention-free cooperative MAC protocols.
ProtocolBeaconing RangeStrategyAccess DelayResolving
Collisions
Objective
EVC-TDMA [28]Multi-hopOne-dimensional MarkovModerateMerging
collisions
Reduce packet dropping rate, improve throughput
NC-MAC [33]One-hopNetwork
coding
LowHidden terminals,
access collisions
Enhance broadcasting
reliability
ECTOB-MAC [43]Multi-hopQuasi-
orthogonal
ModerateHidden terminals,
access collisions
Improve broadcast
performance
TMR-MAC [44]Multi-hopRound-trip timeModerateAccess collisionsShortest route to destination
MCDP-MAC [45]Multi-hopMarkovModerateNoHigh reachability ratio
DARP-MAC [24]Multi-hopAdaptive
Reservation
LowHidden terminals,
access collisions
Enhance reliability and
scalability
PeerProbe-MAC [46]Multi-hopAdaptive
compressive
sensing
ModerateNoHigh-accuracy neighbor distribution estimation
Table 2. Vehicle information table of the 1HS, 2HS, and 3HS with adjacent vehicles.
Table 2. Vehicle information table of the 1HS, 2HS, and 3HS with adjacent vehicles.
No. of Hop SetsVehicle IDPositionSpeedMoving DirectionChannel No.Slot No.
1HS/2HS/3HS[0, 350] [ x n , y n ] [20, 120]Left/Right[n-a, n-z] [ 0 , n τ , 2 n τ , 3 n τ ]
Table 3. Vehicle parameters in SUMO.
Table 3. Vehicle parameters in SUMO.
ParameterValueDescription
MaxSpeed[80, 200]The maximum speed that a vehicle can travel (km/h)
Entry 2[2.2, 18]The netto-length of a vehicle (m)
Width[1.6, 2]The width of a vehicle (m)
Accel[2, 5]The acceleration ability of a vehicle (m/s2)
Decel[3, 8]The deceleration ability of a vehicle (m/s2)
MinGap[2.5, 5]The gap to the leader when standing in a jam (m)
Sigma[0.2, 0.7]The vehicle’s driver imperfection (between 0 and 1)
Tau[0, 1]The driver’s desired (minimum) time headway
Car-following modelKarussThis model describes how a vehicle follows another one
Lane-changing modelLC2013This model describes how a driver changes lanes
Table 4. Transmission power for different vehicle densities.
Table 4. Transmission power for different vehicle densities.
Duration of a Time SlotSINR RangeVehicles/km at NOC = 10Power (dBm) at NOC = 10
Lb = 0.5 ms[40, 60][0.059, 0.375][–6, 25]
Lb = 1 ms[20, 40][0.052, 0.098][15.8, 25]
Lb = 2 ms[5, 20][0.0573, 0.062][20.34, 25]
Lb = 4 ms[1, 5][0.05, 0.0278][23.4, 25]
Table 5. Simulation parameters.
Table 5. Simulation parameters.
ParameterValueDescription
L r 5 (km)Road segment length
λ T [0.05, 0.3] (vehicles/m)Vehicle density
l s 4Lanes/direction
S m 27.57 (m/s)Mean speed value
R b 6 (Mbps)Data rate
K 0 10−4.38Path loss constant
γ 3.68Path loss exponent
P t 23 (dBm)Transmission power
S r x −85 (dBm)Receiver sensitivity
S I N R t 3.3 (dBm)Decoding SINR threshold
W180 × 6 (kHz)Channel bandwidth
N 0 W × 10−17.4 (mW)Noise power
ρ0.5, 0.7, 0.9Correlation factor
S T 500 (s)Simulation time
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Linn, N.N.; Liu, K.; Gao, Q. A Contention-Free Cooperative MAC Protocol for Eliminating Heterogenous Collisions in Vehicular Ad Hoc Networks. Sensors 2023, 23, 1033. https://doi.org/10.3390/s23021033

AMA Style

Linn NN, Liu K, Gao Q. A Contention-Free Cooperative MAC Protocol for Eliminating Heterogenous Collisions in Vehicular Ad Hoc Networks. Sensors. 2023; 23(2):1033. https://doi.org/10.3390/s23021033

Chicago/Turabian Style

Linn, Nyi Nyi, Kai Liu, and Qiang Gao. 2023. "A Contention-Free Cooperative MAC Protocol for Eliminating Heterogenous Collisions in Vehicular Ad Hoc Networks" Sensors 23, no. 2: 1033. https://doi.org/10.3390/s23021033

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop