Next Article in Journal
Using Android Smartphones to Collect Precise Measures of Reaction Times to Multisensory Stimuli
Next Article in Special Issue
Integrated Authentication Server Design for Efficient Kerberos–Blockchain VANET Authentication
Previous Article in Journal
A Review: Grating Encoder Technologies for Multi-Degree-of-Freedom Spatial Measurement
Previous Article in Special Issue
BcDKM: Blockchain-Based Dynamic Key Management Scheme for Crowd Sensing in Vehicular Sensor Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Evaluation of Connectivity Reliability of VANETs Considering Node Mobility and Multiple Failure Modes

1
Department of Equipment Support and Remanufacturing, Army Academy of Armored Forces, Beijing 100072, China
2
National Key Laboratory of Intelligent Parallel Technology, Beijing 100072, China
3
Unit 92942, PLA, Beijing 100161, China
*
Author to whom correspondence should be addressed.
Sensors 2025, 25(19), 6073; https://doi.org/10.3390/s25196073
Submission received: 11 September 2025 / Revised: 30 September 2025 / Accepted: 1 October 2025 / Published: 2 October 2025
(This article belongs to the Special Issue Advanced Vehicular Ad Hoc Networks: 2nd Edition)

Abstract

As a subclass of Mobile Ad hoc Networks (MANETs), Vehicle Ad hoc Networks (VANETs) possess multi-hop relay communication and dynamic topology reconstruction capabilities and are widely applied in various social activities. When they are used as clusters to perform various disaster search and rescue operations or communication relay, reliable, secure, and timely communication connectivity becomes particularly important. This paper focuses on the research of connectivity reliability in VANETs, emphasizing the impact of node movement characteristics and various failure modes on the connectivity reliability of VANETs: As a cluster, the nodes in VANETs have interactive relationships and no longer follow a random movement model, exhibiting regular movements of the network as a whole; the failure modes of nodes in VANETs include vehicular hardware/software failure, energy consumption failure, intentional attack, and isolation failure. Additionally, to optimize node communication energy consumption, the paper proposes a routing path identification algorithm. Finally, the paper presents a simulation algorithm for solving the connectivity reliability of VANETs. Through MATLAB simulation experiments, the effectiveness and correctness of the proposed algorithm are verified, and it is found that the attraction distance between nodes has a certain impact on the isolation failure mode and connectivity reliability.

1. Introduction

The recent advancements in wireless communication technology and the Internet of Things, coupled with the urgent need for interconnectivity and enhanced transportation efficiency in the real world, have propelled the rapid development of vehicle ad hoc networks (VANETs) [1,2,3,4]. As a type of Infrastructure-Less Network (ILN), VANETs can leverage their self-organizing capabilities to flexibly and swiftly configure the network to support communication for specific tasks, all while minimizing the need for infrastructure. The vehicle-to-vehicle (V2V) communication function of VANETs not only plays a significant role in urban traffic management, enabling functions such as emergency broadcasting and collision avoidance for road vehicles, but also assists managers in scenarios such as fire rescue, earthquake rescue, and flood rescue, as well as the exploration of unknown forest environment [5]. In the latter cases, VANETs are often utilized in a cluster form [6]. During the deployment phase, the overall mission objectives and scope of the VANETs are clearly defined. During the mission execution phase, reliable connectivity within the network is achieved through V2V and vehicle-to-infrastructure (V2I) communication, which continuously constraining individual node behaviors and adjusting cluster behaviors.
As a special type of engineering system, a VANET has nodes that can be further abstracted as a collection of hardware devices (such as on-board units) and software. Consequently, nodes possess general quality characteristic indicators such as reliability. When hardware or software malfunctions, it may affect the communication connectivity between nodes, even leading to some nodes going offline. The energy of nodes in VANETs also has a certain impact on communication functions. When there is no energy replenishment during the execution of tasks in VANETs, the greater the demand for node information transmission and reception, the direct increase in information processing volume, and thus, accelerated energy consumption. When the node energy is insufficient to support information reception or transmission functions, the node will lose its communication function [7]. This situation is more prominent in clusters such as autonomous vehicle fleets and wireless sensor networks (WSNs). With the continuous exploration of VANETs by engineering and management personnel, VANETs are increasingly active in certain hazardous application scenarios, such as fire rescue, and emergency communication networking in earthquake disaster areas. Such scenarios often have an obvious hazard source (such as a fire point, or epicenter) and form a hazardous area with the hazard source as the radius. When VANETs enter the hazardous area and move closer to the hazard source, the probability of node malfunctions due to high temperatures, aftershocks, and human attacks increases significantly. Moreover, in urban application scenarios of VANETs, there are also deliberate attack events such as Denial of Service (DoS) and identity spoofing [8,9,10,11]. For example, an attacker sends a large amount of beacon information at an intersection, preventing other vehicles from receiving real traffic information [3,12]. The paper collectively refers to these as intentional attack events [13]. As a special type of network system, VANETs have nodes that also exhibit a special failure mode during mutual communication, isolation failure. When a node in VANETs has both hardware/software working normally, sufficient remaining energy, and is not subject to intentional attacks, if all neighboring nodes within its communication coverage lose communication functionality due to various failure events, the node is in an “offline” state as it cannot establish communication connectivity with any node in VANETs, and thus will no longer exert any impact on the VANET. In addition, when VANETs operate in a cluster form, the connections between nodes are closer, and there is often a control relationship [14,15]. Each node continuously sends and receives information related to the overall movement direction of the network, road conditions, node coordinates, and network task details under the influence of one or a few control nodes. While ensuring the overall movement consistency of VANETs as a cluster, the movement of each network node exhibits a certain degree of randomness. In general traffic management scenarios, vehicle movement often exhibits significant randomness [16], and the connections between different nodes are not tight. This paper will investigate the impact of the overall motion characteristics of the network on the connectivity reliability of VANETs [6].
Abstracting vehicles with communication functions in VANETs as vertices or nodes, and the connections between vehicles as edges or arcs, we can obtain the general graph theory model of VANETs G = V , E , where V = N 1 , N 2 , , N m is the set of vertices, representing m vehicles; E = e i j | N i , N j V ; i j is the set of edges, representing communication links between different vehicles, such as e i j indicating that there is a link between node N i and N j . The model is determined at the deployment stage and task initiation of VANETs. Analogizing the relationship between components and systems in classical reliability theory, nodes, as the basic components of the network system, are the foundation of VANETs. Combining domestic and international research, in current studies on the connectivity reliability of VANETs, it is often assumed that network nodes are idealized perfect nodes [17,18], meaning that nodes do not fail or malfunction and will always be in working condition during the task time. However, in reality, VANETs nodes composed of communication devices or equipment have basic reliability and other quality characteristics, and their hardware or software may fail, which in turn affects communication quality and even communication connectivity. Some studies consider non-perfect nodes [19], meaning that nodes may malfunction, but they assume that failures between nodes are independent, ignoring the correlation between node failures. This paper defines VANETs nodes as mobile vehicles with communication functions and makes the following assumptions:
(1) VANETs nodes are non-perfect nodes [20], which exhibit fault modes and fault states.
(2) VANETs nodes possess both communication and mobility functions. They can be abstracted as n × n points on a two-dimensional coordinate plane, and their positions are determined by x , y coordinates. The core function of VANETs nodes studied in this paper is the communication function, without considering the scenario where the mobility function fails, i.e., there is no mobility failure mode or mobility function failure state, to focus on the analysis and evaluation of VANETs connectivity reliability [21].
(3) VANETs nodes are categorized into key control nodes ( N C ) and general mobile nodes ( N M ) based on their command relationships [5,6,22].
(4) Any nodes in VANETs can be interconnected without relying on fixed relay nodes or infrastructure, provided that the communication requirements are met. There is no signal interference between VANETs nodes [2,23,24].
(5) The wireless links in VANETs are symmetric and fault-free, adhering to a binary model: if the distance between nodes is less than the communication distance threshold, a communication link can be established [21].
(6) The battery within VANETs nodes is non-rechargeable and has limited energy [21,25].
(7) The paper selects the shortest path routing protocol [22,26,27] to support the information transmission and reception activities of VANETs nodes: that is, information is transmitted only along the shortest path between each pair of nodes, and the path consists of connected links between nodes, with the path length equal to the number of links.
Based on the assumptions, the paper comprehensively considers random node failures, correlations between nodes, node energy depletion, and mobility characteristics to derive a node failure model and establish a node reliability model. The failure events of VANETs nodes mainly include four categories: hardware/software failure, energy consumption failure [25], intentional attack, and isolation failure. Denoted S as the node state set, each node has five states S = 1 , 2 , 3 , 4 , 5 : S = 1 represents that the node’s communication function is normal and it can complete information transmission and reception tasks with neighboring nodes; S = 2 represents that the node has experienced a hardware/software failure event, lost its communication function, and is in a failed state; S = 3 represents that the node has experienced an energy depletion event, lost its communication function, and is in a failed state; S = 4 represents that the node has suffered an intentional attack, lost its communication function, and is in a failed state; S = 5 represents that the node cannot connect with other nodes in the network, lost its communication function, and is in an isolation failure state. It is stipulated that only nodes that meet the specified criteria are considered normal nodes and can achieve communication functions. Nodes in other states will maintain their corresponding failure states after experiencing a failure event, and there is no transition between different failure states, meaning that a node only experiences one type of failure.
Compared with existing research, the research in this paper primarily focuses on the cluster application scenarios of VANETs, comprehensively considering the overall movement trend of the network, task objectives, and the impact of multiple failure modes of network nodes on the connectivity reliability of VANETs. Firstly, mathematical analysis and modeling are conducted for four failure modes existing in VANETs nodes. The energy consumption failure model can be further extended to the reliability analysis of unmanned vehicle clusters and wireless sensor networks. The intentional attack failure mainly considers various external attacks that may be encountered during the execution of dangerous tasks in VANETs. Secondly, the paper proposes an improved Couzin-leader model to describe the interaction relationships and movement behaviors of nodes within VANETs in a cluster form, highlighting the overall characteristics of the network. Subsequently, a routing path identification algorithm is proposed for the periodic information transmission scenario of VANET nodes, with the goal of reducing the amount of repeated information transmission and energy consumption. Finally, a simulation algorithm for solving the connectivity reliability of VANETs is proposed and implemented in MATLAB. The research is validated through parameter indicators and sensitivity analysis. The main contributions of the paper include:
  • Comprehensively considering four types of failure modes: hardware/software failure, energy consumption failure, intentional attack, and isolation failure, we model the nodes in VANETs, thereby expanding the versatility of the node failure model;
  • Design a cluster application scenario for VANETs, considering factors such as the overall network objectives, the influence relationships between nodes, the movement trends of the network and nodes, and periodic information transmission;
  • Design a simulation algorithm and metrics for solving the connectivity reliability of VANETs, and further investigate the impact of attraction distance between nodes on node failure and network connectivity reliability in cluster application scenarios of VANETs through sensitivity analysis.

2. Related Work

2.1. Research on the Reliability of Vehicular Ad Hoc Networks

Many scholars have studied the connectivity reliability of VANETs in urban environments, and expanded from node failure analysis to link communication quality, channel analysis, etc. Dharmaraja et al. [20] focused on VANETs as their research subject. Given the crucial importance of reliability and survivability to road safety, and the insufficient attention previously paid to the impact of hardware and channel availability, they adopted hierarchical modeling techniques. Utilizing reliability block diagrams, Markov chains, and Markov reward models, they conducted research on V2V and V2R (Vehicle-to-Roadside) communication. They analyzed the reliability of on-board units (OBUs) and roadside units (RSUs), network reliability, channel availability, message transmission, connectivity, and other related aspects. The validity of their model was verified through MATLAB Simulink simulations. They analyzed the trends of network reliability, connectivity, and other indicators as they varied with factors such as time and the number of nodes. Shelly et al. [28] proposed a next-hop node selection scheme based on the residual lifetime of links to address the issue in VANETs where traditional greedy forwarding strategies fail to consider link reliability, often leading to transmission failures. This scheme utilizes Kalman filtering to predict the residual lifetime of links between vehicles. By constructing a system model to describe vehicle movement and communication, and combining the Gaussian-Markov mobility model to analyze vehicle relative speed and position, it selects the node corresponding to the link with the longest residual lifetime as the forwarding node. Regragui et al. [29] focused on the impact of intelligent mobility design on the connectivity dynamics of VANETs in urban environments. They proposed three mobility models based on Cellular Automata (CA) (real-time path update, fixed path, traffic light control), combined with the Bellman-Ford algorithm to implement intelligent path planning, and simulated real traffic scenarios such as roundabout traffic rules and vehicle acceleration and deceleration behaviors. Through NS-2 simulation, they analyzed the impact of factors such as vehicle density, transmission range, and RSU deployment on traffic flow, average speed, packet delivery rate, end-to-end delay, and other indicators.
Babu et al. [30] propose a distributed adaptive multicast routing protocol to address the challenges of multicast tree construction and maintenance caused by high mobility and dynamic topology in vehicle ad hoc networks. This protocol dynamically selects high-stability parent nodes and guardian nodes, utilizes link expiration time to quantify link stability, achieves efficient construction of multicast trees and rapid switching in case of failure, and reduces network fragmentation and reconnection delay. Kadhim et al. [31] propose a delay-efficient multicasting scheme, DMPFS, based on parked vehicles, fog computing, and software-defined networking (SDN), to address the challenges of high latency and unstable links faced by secure information multicasting in vehicular ad hoc networks. By integrating parked vehicles as fixed fog nodes into a four-layer network architecture (vehicle layer, FC layer, OpenFlow switch layer, and SDN controller layer), DMPFS leverages the centralized control capabilities of SDN and the edge processing capabilities of FC, combined with bandwidth-constrained optimization models, priority scheduling strategies, and partitioning techniques, to construct low-latency multicast routes and dynamically manage links and sessions.
Sohail et al. [32] comprehensively reviewed the routing protocols in VANETs, focusing on their key roles in intelligent urban transportation systems and challenges such as high mobility and sparse connectivity. Through systematic classification, they analyzed in detail the working principles, architectures, and application scenarios of topology-based, location-based, anycast, multicast, and broadcast-based protocols. Combining standardized achievements such as IEEE 802.11p, they compared their performance metrics (such as packet delivery ratio, delay, and routing overhead) and pointed out deficiencies. The study also summarized the applicable scenarios of simulation tools such as NS-2, MATLAB, and QualNet. Finally, it looked forward to future directions, including integrating 5G and machine learning to optimize routing decisions, improving the efficiency, reliability, and security of protocols in dynamic scenarios, and providing theoretical support for the practical deployment of VANETs in intelligent transportation systems.
Dui et al. [33] took the unmanned vehicle distribution network in the Internet of Things (IoT) environment as the research object, constructed a network model, analyzed the cascading failure process, and proposed two shunting methods based on importance; established a resilience model, defined performance indicators and resilience calculation methods, and proposed three optimization strategies; designed a Floyd time-varying resilience optimization algorithm.

2.2. Research on the Reliability of Similar Self-Organizing Networks

Considering that VANETs are a subclass of MANETs, the connectivity reliability evaluation of similar networks is also valuable for the research of this paper. Fu et al. [34] proposed a comprehensive fault model based on CA for binary WSNs, addressing complex fault issues driven by multiple factors such as energy exhaustion, hardware/software malfunctions, and impaired connectivity. The model systematically evaluates the invulnerability of WSNs under three strategies: random attacks, maximum-degree attacks, and maximum-betweenness attacks, and explores the impact of sink node layouts (random, degree-oriented, and betweenness-oriented).
Xiang et al. [27] focused on the research of performance reliability in mobile ad hoc networks and defined transmission reliability to measure its transmission performance. By setting up network, node mobility, transmission, and interference models, they constructed a performance reliability evaluation method. However, in their study, all nodes moved within the network area according to a Random Direction Mobility Model (RDMM) with a constant speed, simplifying the complex mobility characteristics of nodes; and they did not describe the impact of node positions at specific time points on network reliability, lacking time-related and location-related reliability indicators.
Kumar et al. [35] proposed a Free Space Two Ray Ground Propagation (FS-TRG) hybrid model to assess network performance, such as connectivity, during task execution, addressing the connectivity issues in MANETs caused by node mobility. In their study, the Random Way Point Mobility Model (RWPM) was employed to mathematically describe the distribution of mobile nodes, and link reliability was determined based on the hybrid model. MATLAB simulations were conducted by setting various simulation parameters to analyze the impact of propagation parameters and network size on path reliability and average hop count. The research findings indicate that due to the characteristics of signal propagation, the reliability of homogeneous MANETs may decrease. Nevertheless, even with lower reliability values, the network can still maintain a certain level of reliability, providing a reference for users to deploy MANETs in suitable scenarios. However, the study assumed that node positions are uniformly and randomly distributed within the coverage area, and the network is homogeneous, with different nodes having the same reliability, ignoring factors such as the heterogeneity and non-uniform distribution of actual mobile networks.
Wang et al. [21] took wireless sensor networks as the research object. Addressing the issue that existing research on transmission reliability evaluation often overlooks the impact of multiple failure modes and random factors, they proposed a node reliability model that comprehensively considers random failures and energy consumption failures, a Signal-to-Noise Ratio-Capacity (SNR-Capacity) connection model that takes into account the randomness of channel capacity, as well as a transmission reliability evaluation model and algorithm based on the Sum of Disjoint Products (SDP) method and Monte Carlo simulation. Through case analysis, the effectiveness of the models and algorithms was verified. Furthermore, the study explored the impact of factors such as channel capacity randomness, energy consumption failures, transmission periods, transmission power, and background noise power on transmission reliability, providing a basis for accurately evaluating transmission reliability. However, the algorithms and methods proposed in the study were only applied to static networks with fixed topologies and did not consider possible mobility characteristics.
The relevant literature is further compared with this paper through Table 1.

3. Analysis and Modeling of Node Hardware/Software Failure

The implementation of communication functions in VANET nodes primarily relies on various communication devices (such as OBUs) and their software systems [36]. Among these, hardware devices exhibit basic reliability parameters such as MTTF and adhere to certain failure patterns [19,34]. Drawing from existing research literature [21], this paper notes that various hardware and software components within VANETs often experience sporadic failures. Therefore, the paper assumes that hardware/software failure events in VANETs nodes follow an exponential distribution and models them as follows:
Pr S N i t = 2 = 1 e λ i t
In the formula, S N i t = 2 indicates that node N i fails at time t due to hardware/software failure events, and Pr S N i t = 2 represents the corresponding probability; λ i is the failure rate parameter in the exponential distribution; t 0 represents the working time of the node. Let S N i t = 2 be denoted as event E N i 2 t , then the complementary event E ¯ N i 2 t represents that the hardware/software of the node N i is working normally at time t . The following equations can be derived:
Pr E N i 2 t = Pr S N i t = 2 = 1 e λ i t Pr E ¯ N i 2 t = 1 Pr E N i 2 t = e λ i t

4. Analysis and Modeling of Node Energy Consumption Failure

Considering that there is no charging event for the batteries within VANETs nodes, and the node energy (battery capacity) is limited, when the remaining energy of the node is insufficient to support its normal operation, it is considered to be in an energy consumption failure state [37].

4.1. Node Energy Consumption Model

Let the remaining energy of node N i at time t be denoted by E i t , and its initial energy be denoted by E i 0 , i.e., E i 0 = E i 0 . The paper utilizes a first-order radio model to characterize the energy consumption process of VANETs nodes [34].
Let the energy consumed by node N i to send information l T N i t over a distance d at time t be denoted as E T N i t , and the energy consumed by it to receive information l R N i t at time t be denoted as E R N i t , where
E T N i t = l T N i t E e l e c + ε a m p d γ i t ,   2 γ i t 4
E R N i t = l R N i t E e l e c
In the formula, l T N i t represents the amount of information sent by the node N i at time t , measured in bits; E e l e c represents the energy consumption of the circuit for transmitting 1 bit of information, ε a m p is the power consumption coefficient of the power amplification circuit; γ i t represents the interference factor of the environment in which the node N i is located at time t ; l R N i t represents the amount of information received by the N i at time t , measured in bits. The formula for calculating the remaining energy of node N i at a given moment t is:
E i t = E i 0 0 t E T N i t + E R N i t d t
In the formula, 0 t E T N i t + E R N i t d t represents the integral sum of energy consumed by node N i for sending and receiving information within the time interval.
When the remaining energy of a VANET node N i at time t is less than the energy threshold E T h , the node N i experiences an energy depletion event, loses its communication function, and enters a failed state S N i t = 3 . In this context, E T h = max E T N i t , E R N i t , if a VANET node loses either its information transmission or reception function, it is deemed to have experienced an energy consumption failure, and S N i t = 3 E i t < E T h an equivalent relationship holds. Denote S N i t = 3 as event E N i 3 t , where the complementary event indicates that the remaining energy of the node N i at time t is still sufficient to support the completion of its communication function. The probability calculation formula is:
Pr E ¯ N i 3 t = Pr E i t E T h = Pr E i 0 0 t E T N i t + E R N i t d t E T h

4.2. Analysis of the Amount of Information Processed by Nodes

Based on practical deployment scenarios, the information detected and sensed by the outermost nodes of VANETs during operation is often more valuable than that from internal nodes. For instance, it includes changes in terrain and topography ahead, obstructions caused by barriers, and dangerous sources such as epicenters or fire centers. According to computational geometry theory, the set of outermost nodes in VANETs constitutes what is known as the convex hull, as illustrated in Figure 1.
According to Figure 1, the internal nodes of VANETs are marked with blue solid dots, and the outermost nodes, namely the convex hull nodes, are marked with yellow circles. The lines connecting the convex hull nodes enclose the VANETs. The communication connection relationships between nodes are omitted in the figure. Considering the characteristics of VANETs, key control nodes N C do not appear at the location of convex hull nodes, so only general action nodes N M are judged on whether to move to the location of convex hull nodes. At time t , there are a total of m 1 key control nodes in VANETs, forming a set of control nodes N C = N i C | i = 1 , 2 , , m 1 ; a total of m 2 general action nodes move to the outermost, forming a set of convex hull nodes N M C H = N i M C H | i = 1 , 2 , , m 2 ; and another m 3 general action node is surrounded by the convex hull boundary, forming a set of general nodes N M G = N i M G | i = 1 , 2 , , m 3 . Combining the VANETs graph theory model G V , E , we have:
m 1 + m 2 + m 3 = m
V = N C N M C H N M G = N 1 , N 2 , , N m
Considering that during the task process, the information transmission cycles of various types of nodes in VANETs are inconsistent with the requirements:
(1) For control nodes N C , these nodes are responsible for sending command and control information l C 2 to all nodes within the network at the initial moment t = 0 . Based on the situational information collected by each convex hull node during the task process, they make response decisions and then send the updated control information l C 2 to the corresponding action nodes. For ease of analysis, the paper assumes that the period for the control nodes N C to send real-time command information is T S C .
(2) For convex hull nodes N M C H , this type of node needs to send situational awareness information l S C to the control node at regular intervals T S C , and send coordinate information l C O to the control node at regular intervals T C O .
(3) For general nodes N M G , they need to forward (as relay nodes) situational information l S C from convex hull nodes and send coordinate information l C O to control nodes. The relay information depends on the timing of the convex hull node’s situational awareness information transmission, that is, the interval period T S C , while the coordinate information needs to be sent every interval period T C O . The above nodes and their types of information transmission and reception are shown in Table 2.
Based on Table 2 and the aforementioned analysis, the paper considers three types of information transmission situations (ITS) within VANETs, as shown in Table 3.
In ITS1, the node N C sends control information to all nodes in VANETs, unifying node actions and ensuring that the overall network always aims to complete the predetermined task. The timing of its transmission includes both the initial moment t = 0 and the moment after receiving situational information from the convex hull node N M C H and making decisions: 0 ,   T S C ,   2 T S C ,   3 T S C ,   Furthermore, in ITS1, any relay node is only responsible for receiving control information from the source node N C and forwarding it to the sink node N M C H , without generating additional self-coordinate information l C O .
In ITS2, as the convex hull nodes N M C H move to the outermost perimeter of VANETs, they need to send situational awareness information l S C to the nodes N C to assist them in making decisions for the next action. The timing of this transmission is 0 ,   T S C ,   2 T S C ,   3 T S C ,   Furthermore, in ITS2, any relay node is only responsible for receiving situational awareness information from the source node N M C H and forwarding it to the sink node N C , without generating additional self-coordinate information l C O .
In ITS3, all working nodes within VANETs are required to send their own coordinate information l C O to the node N C to ensure that the control node is aware of the survival and distribution of network nodes. The timing for sending this information is 0 ,   T C O ,   2 T C O ,   3 T C O ,   . Additionally, in ITS3, relay nodes are not only responsible for receiving coordinate information from source nodes and predecessor nodes, but also generate their own coordinate information. After all information is aggregated, it is then sent to successor nodes. That is, on the same routing path, relay nodes closer to the sink node N C have a greater amount of information to process than those farther away from the sink node.
Consider a k -hop connected path consisting of k + 1 nodes, where the source node N s o u r c e is marked in yellow and the sink node N s i n k is marked in blue. The k 1 intermediate nodes N i i = 1 , 2 , , k 1 serve as relay nodes, facilitating communication connectivity between the source and sink nodes through single-hop links, as illustrated in Figure 2.
Without considering communication delay, the amount of information l T N s o u r c e sent by the source node during the establishment of a k -hop connected path is first received and stored by the node N 1 . The information sent by the node N 1 to N 2 consists of two parts: the amount of information received from the source node and requiring relaying, l R N 1 = l T N s o u r c e , and the information generated by the node N 1 and intended for the sink node, l G N 1 . That is, l T N 1 = l T N s o u r c e + l G N 1 . For the node N 2 , the amount of information it receives is equal to the amount of information sent by the preceding node N 1 , and the information it sends consists of two parts: the amount of information received from the preceding node and requiring relaying, l R N 2 = l T N 1 , and the information generated by the node and needing to be sent to the subsequent node N 3 in the routing path. That is, l T N 2 = l R N 2 + l G N 2 = l T N 1 + l G N 2 = l T N s o u r c e + l G N 1 + l G N 2 .
By analogy, in this path, the i th node N i forms the i th hop with node N i 1 and the i + 1 th hop with node N i + 1 . The amount of information received by node N i is equal to the amount of information sent by the preceding node N i 1 and has l R N i = l T N i 1 . The information sent by node N i to N i + 1 consists of two parts: the amount of information received from the preceding node N i 1 and needs to be relayed l R N i = l T N i 1 , and the amount of information generated by node N i and needs to be sent to the sink node l G N i . Therefore, in a route consisting of a k -hop connected path, the mathematical expression of the amount of information that the relay node N i at i th hop needs to process is:
l R N i = l T N i 1 = l T N s o u r c e + a = 1 i 1 l G N a
l T N i = l T N i 1 + l G N i = l T N s o u r c e + a = 1 i l G N a
l T N i l R N i = l G N i
Furthermore, there may be Q multiple routing paths P = P 1 , P 2 , , P Q within VANETs, and nodes N i may act as relay nodes to send and receive information across multiple routing paths, as shown in Figure 3. The amount of information l R N i and l T N i processed at this time are as follows:
l R N i = v = 1 Q ζ N i P v R l R P v N i = v = 1 Q ζ N i P v R l T s o u r c e P v + a = 1 I n P v N i 1 ζ N a P v T l G N a
l T N i = l R N i + l G N i = v = 1 Q ζ N i P v R l T s o u r c e P v + a = 1 I n P v N i 1 ζ N a P v T l G N a + l G N i
In the formula, Q represents the number of routing paths existing within VANETs; P v v = 1 , 2 , , Q denotes the v th routing path; ζ N i P v R is a binary variable, ζ N i P v R = 1 indicating node N i receives information in the routing path P v , otherwise ζ N i P v R = 0 ; l R P v N i represents the amount of information received by the node N i in the routing path P v ; l T s o u r c e P v denotes the amount of information sent by the source node s o u r c e P v in the routing path P v ; I n P v N i is the index value of the hop count where the node N i is located in the routing path P v ; I n P v N i 1 denotes the number of predecessor nodes of the node N i in the routing path P v ; N a a = 1 , 2 , , I n P v N i 1 represents the a th predecessor node of the node N i in the routing path P v ; ζ N a P v T is a binary variable, ζ N a P v T = 1 indicating node N a sends information generated by itself in the routing path P v , otherwise ζ N a P v T = 0 ; a = 1 I n P v N i 1 ζ N a P v T l G N a represents the sum of the amount of information generated by predecessor nodes and transmitted in the routing path P v for the node N i ; v = 1 Q ζ N i P v R l R P v N i denotes traversing all routing paths within VANETs and summing the amount of information received by the node N i in each routing path.
Based on Table 3, the information processing volume l R N i and l T N i of relay nodes N i in VANETs under 3 information transmission situations can be obtained:
ITS1 node processing information volume:
l R N i t = v = 1 Q ζ N i P v R l R P v N i t = v = 1 Q ζ N i P v R l T s o u r c e P v t + a = 1 I n P v N i 1 ζ N a P v T l G N a t = v = 1 Q ζ N i P v R l C 2
l T N i t = l R N i + l G N i t = v = 1 Q ζ N i P v R l T s o u r c e P v t + a = 1 I n P v N i 1 ζ N a P v T l G N a t + 0 = v = 1 Q ζ N i P v R l C 2
l G N i t = 0
ITS2 node processing information volume:
l R N i t = v = 1 Q ζ N i P v l R P v N i t = v = 1 Q ζ N i P v l T s o u r c e P v + a = 1 I n P v N i 1 ζ N a P v T l G N a t = v = 1 Q ζ N i P v l S C
l T N i t = l R N i t + l G N i t = v = 1 Q ζ N i P v l T s o u r c e P v + a = 1 I n P v N i 1 ζ N a P v T l G N a t + 0 = v = 1 Q ζ N i P v l S C
l G N i t = 0
ITS3 node processing information volume:
l R N i t = v = 1 Q ζ N i P v l R P v N i t = v = 1 Q ζ N i P v l T s o u r c e P v t + a = 1 I n P v N i 1 ζ N a P v T l G N a t = v = 1 Q ζ N i P v l C O + a = 1 I n P v N i 1 ζ N a P v T l C O
l T N i t = l R N i t + l G N i t = v = 1 Q ζ N i P v l T s o u r c e P v t + a = 1 I n P v N i 1 ζ N a P v T l G N a t + l C O = v = 1 Q ζ N i P v l C O + a = 1 I n P v N i 1 ζ N a P v T l C O + l C O
l G N i t = l C O
At a given moment t , multiple information transmission situations may coexist within VANETs, such as: if mod t , T S C × T C O = 0 , there were simultaneous ITS1, ITS2, and ITS3 within VANETs. If mod t , T S C = 0 , there were simultaneous ITS1 and ITS2 within VANETs; if mod t , T C O = 0 , there was only ITS3 within VANETs. If a node N i belongs to multiple information transmission situations and multiple routing paths simultaneously at a given moment, its information processing volume should be accumulated not only for multiple information transmission situations but also for multiple routing paths. Here, mod a , b is the remainder of a to b .

4.3. Routing Path Recognition Algorithm

Based on the aforementioned analysis, there are primarily 3 types of information transmission situations within VANETs, each with distinct information flow rules that require sequential analysis. To prevent excessive energy consumption of VANETs nodes due to repeated information transmission, this paper proposes corresponding routing path identification algorithms and pseudocodes for each of the 3 information transmission situations.
ITS1 routing path identification algorithm
At the moment t = 0 , T S C , 2 T S C , , the control node N C in VANETs sends command and control information as well as task information to all remaining nodes ( N M C H N M G ). During this process, relay nodes only forward the information and do not generate their own coordinate information, ensuring the conservation of information flow within VANETs. The routing path identification algorithm at this time is as follows:
(1) Generate VANETs links information: Based on coordinate information C o N i t N i V ; t = 0 , T S C , 2 T S C , , generate a Euclidean distance matrix between nodes for all normally operating nodes N i within VANETs. Further generate a time-varying binary communication connectivity adjacency matrix A B t through logical operations A B t = M d t d T h . Obtain all link information through the matrix A B t and its constituent elements.
(2) Classify VANETs nodes: Determine the control node N C within VANETs based on the command hierarchy (assuming there is only one control node), and determine the convex hull node set N M C H = N i M C H | i = 1 , 2 , , m 2 and general node set N M G = N i M G | i = 1 , 2 , , m 3 based on coordinate location information, where 1 + m 2 + m 3 = m . At this point, the set of all nodes waiting to receive task information is V T o R = N M C H N M G , the set of nodes that have received task information is V R d = , and there are V = N C V T o R V R d = N C N M C H N M G .
(3) Determine the routing path for transmitting task information to the current convex hull set nodes N M C H : Use the control node N C as the source node, and all convex hull nodes N i M C H ( i = 1 , 2 , , m 2 ) as the sink node set V s i n k = N M C H . Identify the minimum path set between the source node and each sink node N i M C H in turn, and determine the routing path P C M C H i between each pair of nodes N C , N i M C H according to the shortest path routing rule.
(4) Identify all received task information nodes: Let the set of relay nodes involved in the routing path P C M C H i between node pairs N C , N i M C H be V C M C H i r e l a y = N C M C H i r e 1 , N C M C H i r e 2 , , then the nodes in the routing path P C M C H i that have received task information are N i M C H V C M C H i r e l a y , update V R d = V R d N i M C H V C M C H i r e l a y , update V T o R = V T o R \ N i M C H V C M C H i r e l a y . After traversing all the routing paths in step (3), update V R d and V T o R .
(5) Establish new convex hull set nodes: In the updated set of task information nodes to be received, determine the convex hull nodes based on the coordinate position information. If the updated convex hull node set N M C H , proceed to step (3); otherwise, proceed to step (6).
(6) Identify all routing paths: Collect all routing paths that appear in the above steps to obtain a complete set of routing paths P C N for transmitting VANETs task information to avoid duplicate sending.
The pseudocode of the ITS1 routing path identification Algorithm 1 is as follows.
Algorithm 1. ITS1 routing path identification algorithm.
Input:Source node N C ; Sink node set V s i n k = N M C H N M G ; Node coordinates C o N i t ; communication distance threshold d T h
Output:Complete routing path set P C N
1.calculate M d t
2.generate A B t = M d t d T h
3.// Generate link information
4.classify N C , N M C H , N M G
5.set V T o R = N M C H N M G
6.set V R d =
7.// Initialize node sets
8.While N M C H
9.// Find paths from N C to N M C H
10.  For N i M C H N M C H
11.     find P C M C H i
12.     extract V C M C H i r e l a y
13.     update V R d = V R d N i M C H V C M C H i r e l a y
14.     update V T o R = V T o R \ N i M C H V C M C H i r e l a y
15.     update P C N = P C N P C M C H i
16.  End For
17.  re-determine N M C H
18.End While
19.Output P C N
ITS2 routing path identification algorithm
At the moment t = 0 , T S C , 2 T S C , , all convex hull nodes in VANETs send situation information to the control node N C . During this process, relay nodes only forward the information and do not generate their own coordinate information, ensuring the conservation of information flow within VANETs. The routing path identification algorithm is as follows:
(1) Generate VANETs links information: Based on coordinate information C o N i t N i V ; t = 0 , T S C , 2 T S C , , generate a Euclidean distance matrix between nodes for all normally operating nodes N i within VANETs. Further generate a time-varying binary communication connectivity adjacency matrix A B t through logical operations A B t = M d t d T h . Obtain all link information through the matrix A B t and its constituent elements.
(2) Classify VANETs nodes: Determine the control nodes N C within VANETs based on command hierarchy, and determine the convex hull node set N M C H = N i M C H | i = 1 , 2 , , m 2 and general node set N M G = N i M G | i = 1 , 2 , , m 3 based on coordinate location information. At this point, the nodes that waiting to receive situational information are only the control nodes N C , i.e., V T o R = N C .
(3) Determine the transmission routing path for the situation information from the convex hull set nodes N M C H to the control node N C : Form a source node set V s o u r c e = N M C H consisting of all convex hull nodes N i M C H ( i = 1 , 2 , , m 2 ), identify the minimum path set between the source nodes and the sink node in turn, and determine the routing path P M C H i C between each pair of nodes N i M C H , N C according to the shortest path routing rule.
(4) Identify all routing paths: Collect all routing paths that appear in the above steps to obtain a complete routing paths set P N C for transmitting VANETs situational information to avoid duplicate transmissions.
The pseudocode of the ITS2 routing path identification Algorithm 2 is as follows.
Algorithm 2. ITS2 routing path identification algorithm.
Input:Source node set V s o u r c e = N M C H ; Sink node N C ; Node coordinates C o N i t ; communication distance threshold d T h
Output:Complete routing path set P N C
1.calculate M d t
2.generate A B t = M d t d T h
3.// Generate link information
4.For N i M C H V s o u r c e :
5.// Find paths from N M C H to N C
6.  find P M C H i C
7.  update P N C = P N C P M C H i C
8.End For
9.Output P N C
ITS3 routing path identification algorithm
At any given moment t = 0 , T C O , 2 T C O , , all working nodes in VANETs must transmit their own coordinate information to the control node N C . During this process, relay nodes not only need to receive coordinate information from the source node and the preceding node, but also generate their own coordinate information. Once all information is collected and processed, it will continue to be transmitted to the subsequent nodes. This means that the information flow within VANETs is non-conservative and increases during the transmission process from the source node to the sink node. The routing path identification algorithm in this case is as follows:
(1) Generate VANETs links information: Based on coordinate information C o N i t N i V ; t = 0 , T S C , 2 T S C , , generate a Euclidean distance matrix between nodes for all normally operating nodes N i within VANETs. Further generate a time-varying binary communication connectivity adjacency matrix A B t through logical operations A B t = M d t d T h . Obtain all link information through the matrix A B t and its constituent elements.
(2) Classify VANETs nodes: Determine the control nodes N C within VANETs based on the command hierarchy, and identify the convex hull node set N M C H = N i M C H | i = 1 , 2 , , m 2 and general node set N M G = N i M G | i = 1 , 2 , , m 3 based on coordinate location information. At this point, the set of nodes with coordinate information to be sent is V T o S = N M C H N M G , and the set of nodes with coordinate information already sent is V S d = . There is only one sink node N C , and it has V = N C V T o S V S d = N C N M C H N M G .
(3) Determine the transmission routing path for coordinate information of the current convex hull node set N M C H : Form a source node set V s o u r c e = N M C H consisting of all convex hull nodes N i M C H ( i = 1 , 2 , , m 2 ), identify the minimum path set between the source nodes and the sink node N C in turn, and determine the routing path P M C H i C between each pair of nodes N i M C H , N C according to the shortest path routing rule.
(4) Identify all nodes that have sent coordinate information: Let the set of relay nodes involved in the routing path P M C H i C between node pairs N i M C H , N C be denoted by V M C H i C r e l a y = N M C H i C r e 1 , N M C H i C r e 2 , , then the nodes that have sent coordinate information in the routing path P M C H i C are N i M C H V M C H i C r e l a y , update V S d = V S d N i M C H V M C H i C r e l a y , update V T o S = V T o S \ N i M C H V M C H i C r e l a y . After traversing all the routing paths in step (3), update V S d and V T o S .
(5) Establish new convex hull set nodes: In the updated set V T o S of nodes with coordinate information to be sent, determine the convex hull nodes based on the coordinate position information. If the convex hull node set N M C H , proceed to step (3); otherwise, proceed to step (6).
(6) Identify all routing paths: Collect all routing paths that appeared in the above steps to obtain the set P N C of all routing paths for transmitting VANETs coordinate information while avoiding duplicate transmissions.
The pseudocode of the ITS3 routing path identification Algorithm 3 is as follows.
Algorithm 3. ITS3 routing path identification algorithm.
Input:Source node set V s o u r c e = N M C H N M G ; Sink node N C ; Node coordinates C o N i t ; communication distance threshold d T h
Output:Complete routing path set P N C
1.calculate M d t
2.generate A B t = M d t d T h
3.// Generate link information
4.classify N C , N M C H , N M G
5.set V T o S = N M C H N M G
6.set V S d =
7.// Initialize node sets
8.While N M C H
9.// Find paths from N M C H to N C
10.  For N i M C H N M C H
11.     find P M C H i C
12.     extract V M C H i C r e l a y
13.     update V S d = V S d N i M C H V M C H i C r e l a y
14.     update V T o S = V T o S \ N i M C H V M C H i C r e l a y
15.     update P N C = P N C P M C H i C
16.  End For
17.  re-determine N M C H
18.End While
19.Output P N C
To evaluate the computational efficiency of the proposed routing path recognition algorithm (applicable to ITS1, ITS2, and ITS3 scenarios with consistent logical steps), its time complexity is analyzed based on the node scale m (total number of nodes in VANETs) and edge scale n (number of links).
(1) Core Steps and Time Complexity Breakdown
The algorithm consists of five key steps, with time complexity dominated by shortest path search and link information generation.
Generation of Link Information. First, the Euclidean distance matrix M d t is computed using node coordinates, involving m m 1 2 node pair distance calculations with time complexity O m 2 . Then, a binary adjacency matrix A B t is generated via logical operations d i j d T h , which requires traversing m 2 elements of M d t , with time complexity O m 2 . Total for this step: O m 2 .
Node Classification. Identification of the key control node N C : Directly determined by command hierarchy (assumed 1 control node), time complexity O 1 . Convex hull node N M C H calculation: Implemented using the Andrew’s monotone chain algorithm (efficient for 2D convex hulls), with time complexity O m log m . General node N M G classification: Derived via set difference V N C N M C H , with time complexity O m . Total for this step: O m log m .
Shortest Path Search. The algorithm adopts the Breadth-First Search (BFS) for shortest path routing. Source node count S and destination node count D : Both are O m (e.g., ITS1: S = 1 N C , D = O m N M C H ; ITS2/ITS3: S = O m N M C H , D = 1 N C ). Time per BFS: E = O m 2 , BFS traverses all nodes and edges, time O m + n = O m 2 . Total for this step: O S × D × m + n = O m × m 2 = O m 3 .
Node Set Update. Nodes that have received/transmitted information are added to V R d / V S d and removed from V T o R / V T o S . This involves traversing O m routing paths, each with up to O m nodes. Total for this step: O m 2 .
Path Deduplication and Collection. Duplicate paths are removed by comparing O m paths (each of length O m ) using a hash set. Total for this step: O m 2 .
(2) Overall Time Complexity
The overall time complexity is determined by the dominant step (shortest path search): O m 3 .

5. Node Mobility Analysis and Communication Link Modeling

5.1. Node Position Update Equation

The paper assumes that VANETs are deployed on a two-dimensional plane to perform tasks, where any node N i i = 1 , 2 , , m is positioned by plane coordinates C o N i = x i , y i . It is stipulated that the speed of each node N i falls within the interval v min , v max , and the orientation vectors take values O i = cos θ i , sin θ i , while θ i falls within a certain interval 0 , 2 π . For any node N i , its position update equation at time t + Δ t can be expressed as:
x i t + Δ t = x i t + Δ t v i t cos θ i t + Δ t y i t + Δ t = y i t + Δ t v i t sin θ i t + Δ t v i t + Δ t = v min + r v max v min
In the formula, x i t + Δ t and y i t + Δ t represent the horizontal and vertical coordinates of the node N i at time t + Δ t , respectively; v i t cos θ i t and v i t sin θ i t represent the components of velocity v i t in the x and y axes at time t , respectively; r is a random number in the interval 0 , 1 . That is, the position of the node N i at time t + Δ t depends on its position C o N i t , velocity v i t at time t , displacement in the time increment Δ t , and orientation O i t + Δ t at time t + Δ t .
For a node N i , let its initial coordinate be C o N i 0 = x i 0 , y i 0 . After considering the location update formula, its coordinate at time t can be solved through the formula:
x i t = x i 0 + 0 t v i t cos θ i t + Δ t d t x i 0 + Δ t 0 Δ t v i Δ t cos θ i Δ t y i t = y i 0 + 0 t v i t sin θ i t + Δ t d t y i 0 + Δ t 0 Δ t v i Δ t sin θ i Δ t
The Euclidean distance between two nodes N i ,   N j i j at a given time t can be expressed as:
d i j t = x i t x j t 2 + y i t y j t 2
By traversing all node pairs within VANETs, a Euclidean distance matrix between nodes can be generated:
M d t = d 11 t d 12 t d 1 m t d 21 t d 22 t d 2 m t d m 1 t d m 2 t d m m t
Any element in matrix M d t represents the Euclidean distance d i j t between nodes N i and N j   i j at a given moment t . By symmetry, d i j t = d j i t for i j and d i i t = 0 (i.e., self-loops are excluded).

5.2. Couzin-Leader Improved Model

In practical applications, nodes of self-organizing networks (represented by VANETs nodes) exhibit a high degree of organization and discipline during task execution, and cooperate with each other to achieve common goals. At this time, the random nature of node movement is relatively weakened, and the overall behavior of the network system becomes more prominent. However, existing research often assumes that node movement follows benchmark models such as the Random Waypoint Mobility Model (RWPM) and the Random Direction Mobility Model (RDMM), which emphasize individual behavior in simulation processes and under-characterize the overall movement characteristics of the network [35]. Considering the special control relationships that exist in VANETs, this paper introduces the Couzin-leader mobility model [5] to provide a more realistic description of both arbitrary node movement and overall network behavior. The Couzin-leader model is an improvement of the Couzin model [38] and has certain advantages in depicting self-organizing behavior. It has been widely applied in communication networks such as drone swarms [6,22]. It mainly includes two key roles and four motion rules.
The two key roles in group movement are the leader and the follower. As the key minority in the network, the leader has the highest level of understanding of the overall task information of the network and is responsible for guiding the overall movement of the network towards the target direction. As the majority in the network, the follower has limited understanding of the overall task information of the network, mainly following the leader’s movement and gradually gathering. The above two roles initially stratify the network: the leader resides in the upper layer of the network, sending control information to the followers; the followers reside in the lower layer of the network, sending feedback and situational awareness information upwards, ultimately achieving circular flow of information within the network. From the analysis, it can be seen that the leader role in the Couzin-leader model is equivalent to the control node N C in VANETs, and the follower role is equivalent to the general action node N M C H .
The four motion rules are repulsion, attraction, alignment, and homing. The repulsion rule functions to prevent collisions between adjacent nodes; the attraction rule functions to prevent the emergence of isolated nodes and to make the network as a whole tend towards cohesion; the alignment rule functions to make the speed and direction of movement of nodes tend towards consistency with those of their neighbors. Through these rules, the overall motion of the network can be characterized, while maintaining the relative independence of individual movements within the network, ultimately achieving mathematical modeling of the movement characteristics of self-organizing networks. Combining the actual characteristics of VANETs, the four motion rules are mathematically described.
Exclusion rule: Each moving node N i in VANETs maintains a safe distance d C o from its neighboring nodes to avoid collisions. When the distance d i j between any neighboring node N j and the node N i is less than or equal to the safe distance, the node N i will adjust its direction to move away from the neighboring node N j . The set of neighboring nodes that node N i needs to avoid is denoted as N e i d C o = N j | d i j d C o , j i . The calculation formula for the exclusion direction vector O ^ i r e of node N i is:
O i r e t + Δ t = cos θ i t + Δ t , sin θ i t + Δ t = N j N e i d C o x j t , y j t x i t , y i t x j t , y j t x i t , y i t
O ^ i r e t + Δ t = O i r e t + Δ t O i r e t + Δ t
In the formula, O i r e t + Δ t represents the norm of the vector O i r e t + Δ t . After normalization, the collision avoidance direction vector of the node N i is now a unit vector O ^ i r e t + Δ t .
Attraction rule: If a node N i has no neighboring nodes within its safety distance, that is, N e i d C o = . Nodes N i will tend to attract neighboring nodes N e i d A t = N j | d C o < d i j d A t , j i within the distance d C o , d A t , achieving network convergence. Under this attraction rule, the calculation formula for the attraction direction vector O ^ i a t of the node N i is:
O i a t t + Δ t = N j N e i d A t x j t , y j t x i t , y i t x j t , y j t x i t , y i t
O ^ i a t t + Δ t = O i a t t + Δ t O i a t t + Δ t
Alignment rule: Nodes adjust their own direction angles to face the average direction of neighboring nodes. This rule provides a common forward direction for the entire VANETs, thereby achieving overall movement. The calculation formula for the alignment direction vector O ^ i a l of node N i is:
O i a l t + Δ t = O i t O i t + N j N e i d A t O j t O j t
O ^ i a l t + Δ t = O i a l t + Δ t O i a l t + Δ t
Homing rule: For the leader, namely the control node (denoted as N i ) in VANETs, it is required to guide the overall network towards a predetermined direction, which is called homing. In this case, the calculation formula for the homing direction vector of node N i is:
O i t + Δ t = O ^ i r e t + Δ t + O ^ i a t t + Δ t + O ^ i a l t + Δ t O ^ i r e t + Δ t + O ^ i a t t + Δ t + O ^ i a l t + Δ t
O ^ i h o t + Δ t = O i t + Δ t + ω i g O i t + Δ t + ω i g
In the formula, g represents a unit vector, indicating the overall task information of VANETs, such as the directional information when the target area is located along the x axis g = 1 , 0 . ω i is a weight term, ω i = 0 indicating that the node has no understanding of the overall task information of VANETs and moves completely influenced by neighboring nodes; ω i = 1 indicates that the node has partial understanding of the overall task information of VANETs and is influenced by both the overall task information and neighboring nodes; ω i > 1 represents that the node prefers to complete the overall task of VANETs by influencing the movement of neighboring nodes. For the control node N i in VANETs, it is generally set ω i > 1 .
From the actual deployment of VANETs, it can be seen that at the initial moment of the task, the follower nodes are not completely unaware of the task information, but rather possess limited information. They continuously deepen their understanding and comprehension of the overall task during the task duration, ultimately facilitating the overall completion of the predetermined task by VANETs. Therefore, the paper assumes that the follower nodes are also applicable to the homing rule. At this time, the calculation formula for the direction vector O ^ j h o sought by the follower node N j is:
O j t + Δ t = O ^ j r e t + Δ t + O ^ j a t t + Δ t + O ^ j a l t + Δ t O ^ j r e t + Δ t + O ^ j a t t + Δ t + O ^ j a l t + Δ t
O ^ j h o t + Δ t = O j t + Δ t + ω j g O j t + Δ t + ω j g
ω j = 2 t t m i + T a i n i
In the formula, t represents the current time; t m i is the planned time for the task; T a i n i is a constant and 0 < T a i n i < 1 , representing the limited task information grasped by the follower node at the initial time t = 0 ; for the follower node N j , its weight term ω j takes values within an interval T a i n i , 2 + T a i n i .
In summary, the updated direction vector O i t + Δ t of VANETs nodes at time t + Δ t can be obtained.
O i t + Δ t = O ^ i r e t + Δ t + O ^ i a t t + Δ t + O ^ i a l t + Δ t + O ^ i h o t + Δ t O ^ i r e t + Δ t + O ^ i a t t + Δ t + O ^ i a l t + Δ t + O ^ i h o t + Δ t
The consistency of the influence exerted by leaders on followers within VANETs is characterized by indicators O N e t :
O N e t = 1 m i = 1 m O i · g
For O N e t = 1 , it indicates that the direction of the follower is completely opposite to that of the leader; for O N e t = 0 , it indicates that the directions of the followers in VANETs are completely disordered; for O N e t = 1 , it indicates that the direction of the follower is completely aligned with that of the leader; for other situations 1 < O N e t < 1 , it indicates that some followers in VANETs are moving in the opposite direction to the leader.

5.3. VANETs Node Location Update Algorithm Based on the Improved Couzin-Leader Model

The paper proposes a VANETs node location update algorithm based on the improved Couzin-leader model:
(1) Initialize the parameters of the improved Couzin-leader model, and set the safety distance d C o , attraction distance d C o , d A t , leader weight term ω i , and overall task information vector g ;
(2) Obtain all node information at the current moment t , including the number of nodes operating normally, node coordinates C o N i t , node direction vectors O i t , and node types (whether they are leaders or followers);
(3) Calculate the inter-node distance. Based on the node coordinate information C o N i t , traverse all working node pairs i , j within VANETs to generate an Euclidean distance matrix M d t between nodes, where i j ;
(4) Identify the set of neighboring nodes, traverse all nodes within VANETs, and sequentially identify the set of neighboring nodes N e i d C o = N j | d i j d C o , j i that N i needs to be avoided and the set of neighboring nodes N e i d A t = N j | d C o < d i j d A t , j i that N i are prone to attraction. If N e i d C o , proceed to step (5); otherwise, proceed to step (6);
(5) Apply the exclusion rule and substitute the exclusion rule formula to calculate the exclusion direction vector O ^ i r e of node N i ;
(6) Apply the attraction rule, and calculate the attraction direction vector O ^ i a t of node N i ;
(7) Apply the alignment rule, and calculate the alignment direction vector O ^ i a l of node N i ;
(8) Apply the homing rule, and calculate the direction vector O ^ i h o of the node N i ;
(9) Update the node direction vector, and substitute it into the update equation to calculate the updated direction vector O i t + Δ t of the node at the next moment t + Δ t ;
(10) Update the node speed and position, iterate through all nodes and substitute them into the position update equation, and calculate the node coordinates C o N i t + Δ t at the next moment t + Δ t ;
(11) Iterate and repeatedly execute steps (2)–(10) of the algorithm until the termination condition is met (such as the number of normal working nodes reducing to 0, reaching the set task time t m i , etc.).

5.4. Node Communication Link Modeling

According to the binary communication link model, a communication connection is established between nodes N i and N j if their Euclidean distance d i j t is less than the communication distance threshold d T h . A time-varying binary communication connectivity adjacency matrix A B t is established:
A B t = a 11 t a 12 t a 1 m t a 21 t a 22 t a 2 m t a m 1 t a m 2 t a m m t
The elements a i j t = 1   i j in the matrix represent that the nodes N i and N j are connected at time t . Based on the assumption of symmetry of communication links, there exists a i j t = a j i t . Where a i j = 0   i j or a j i t = 0 indicates that the nodes N i and N j are not connected at time t , and node self-loops are not considered, that is:
a i j t = 1 , d i j t d T h , i j 0 , else
Based on the aforementioned formula, the binary communication connectivity adjacency matrix A B t can be obtained by performing logical operations A B t = M d t d T h on the Euclidean distance matrix M d t between nodes. This operation involves sequentially comparing the elements d i j t in the matrix M d t with real numbers d T h : if d i j t d T h holds, the logical result is true, and a value of 1 is returned, with a i j t = 1 ; otherwise, the logical result is false, with a i j t = 0 .

6. Analysis and Modeling of Intentional Attack

From a risk management perspective, considering the potential dangers of VANETs in certain operational scenarios, nodes closer to the hazard source are more likely to be attacked. For instance, when VANETs advance toward a target fire area and conduct activities (e.g., personnel search and rescue, firefighting), the target area often presents hazards such as flames, explosions, high temperatures, and smoke. These hazards preferentially interfere with nodes within the hazard source’s coverage range and even cause node failures, as illustrated in Figure 4.
According to Figure 4, VANETs nodes that enter the danger zone first tend to experience intentional attacks earlier and with greater intensity. Therefore, it can be assumed that the intensity of intentional attack is negatively correlated with the distance d i T a from the node N i to the target point N T a . Let the coordinates of the target point N T a be C o N T a = x T a , y T a , then the Euclidean distance d i T a t between node N i and target point N T a at time t can be calculated as:
d i T a t = x i t x T a 2 + y i t y T a 2
The purpose of this paper is to analyze the impact of intentional attack events based on relative distance and hazard source coverage on the connectivity reliability of VANETs. Drawing on existing studies [23,39,40,41,42], the intentional attack-induced failure of nodes is modeled as an exponential distribution, where the parameter λ i T is inversely proportional to d i T a :
Pr S N i t = 4 = 1 e λ i T t λ i T = 1 d i T a
In the formula, S N i t = 4 indicates that node N i is in a failed state due to intentional attack at time t ; λ i T is a parameter in the exponential distribution of intentional attack events; and t 0 represents the working time of node’s. Consider S N i t = 4 as an event E N i 4 t , and the complementary event E ¯ N i 4 t indicates that the node N i has not been subjected to an intentional attack at time t . Thus, we can conclude:
Pr E N i 4 t = Pr S N i t = 4 = 1 e λ i T t Pr E ¯ N i 4 t = 1 Pr E N i 4 t = e λ i T t

7. Analysis and Modeling of Node Isolation Failure

In VANETs, when multiple nodes fail simultaneously, it may result in a situation where the distance between a certain node N i and its nearest neighbor N j exceeds the communication distance threshold. That is d i j > d T h , the node N i cannot establish communication connectivity with the nearest neighbor, let alone connect with other nodes within the network, and remains in an isolated state. Although the node N i does not experience hardware/software failure, energy depletion, or intentional attack at this time, considering its loss of communication function and unavailability of message services within VANETs, it is still considered as failed and set to an isolated failure state S = 5 , as show in Figure 5.
In Figure 5a the network comprises 6 nodes and 8 edges, where communication links only exist between nodes N 6 and N 4 . In Figure 5b When the node N 4 fails (such as running out of energy), it directly affects edges e 54 , e 24 , e 14 , e 34 and e 46 , which are marked with red dashed lines in the figure. In Figure 5c, after removing the failed node, the connectivity among the original four nodes N 1 , N 2 , N 3 and N 5 remains unchanged. However, since the Euclidean distance between the node N 6 and the four nodes exceeds the communication distance threshold, it cannot establish communication links with them. Even if the node N 6 does not experience hardware/software failures, energy depletion, intentional attacks, or other failure events, it is still defined as an isolated fault state and marked with a red dashed line, indicating that faults among VANETs nodes are not completely independent and exhibit a certain degree of correlation.
For the isolation failure event of VANETs nodes, it can be described through a time-varying binary communication connectivity adjacency matrix A B t . Any node in a given state S N i = 1 , if it satisfies the following conditions at time t :
j V a i j = j V a j i = 0
That is, determine the isolation failure of the node N i at time t , record the node state S N i t = 5 , and record the event E N i 5 t .

8. Connectivity Reliability Evaluation Algorithm

Based on the analysis presented in the paper, there are primarily four types of communication function failures in nodes during the actual deployment and operation of VANETs: hardware/software failures, energy consumption failures, intentional attacks, and isolation failures. Additionally, the high-speed mobility characteristics of nodes also impact communication connectivity. Considering that accurately solving the connectivity reliability of VANETs is an NP-hard problem, the paper proposes a simulation-based algorithm to approximately solve and evaluate the connectivity reliability of VANETs.

8.1. Connectivity Reliability Metrics Definition

1. Failure proportion of node failure mode
For the four VANETs node failure modes studied in the paper, the number of failed nodes under different failure modes is counted separately and compared with the total number of failed nodes. Based on this, the most prone failure mode among VANETs nodes is analyzed, providing a basis for subsequent optimization measures such as node improvement and protection.
Let N F 2 i t , N F 3 i t , N F 4 i t and N F 5 i t represent the number of failed nodes due to hardware/software failures, energy consumption failures, intentional attacks, and isolation failures in VANETs at time t in the i th simulation experiment, respectively; let N F i t represent the total number of failed nodes in VANETs at time t in the i th simulation experiment; F P 2 i t , F P 3 i t , F P 4 i t and F P 5 i t represent the proportions of failed nodes in VANETs at time t in the i th simulation experiment-due to hardware/software failures, energy consumption failures, intentional attacks, and isolation failures, respectively. Additionally,
N F i t = N F 2 i t + N F 3 i t + N F 4 i t + N F 5 i t
The formula for calculating the failure proportion F P k i t of fault mode F M k k = 2 , 3 , 4 , 5 at time t in the i th simulation experiment is:
F P k i t = N F k i t N F i t = N F k i t j = 2 5 N F j i t
After running N S i m u simulation experiments, the formula for calculating the average failure proportion F P k t of VANETs nodes’ failure modes F M k   k = 2 , 3 , 4 , 5 at time t is as follows:
F P k t = 1 N s i m u i = 1 N s i m u F P k i t = 1 N s i m u i = 1 N s i m u N F k i t N F i t
2. Residual energy of nodes
For the three types of nodes classified in the analysis of node energy consumption failure: control nodes N C = N i C | i = 1 , 2 , , m 1 , convex hull nodes N M C H = N i M C H | i = 1 , 2 , , m 2 , and general nodes N M G = N i M G | i = 1 , 2 , , m 3 , the remaining energy of each type of nodes at different moments is statistically analyzed and compared. Based on this, the energy consumption patterns of different nodes are analyzed, providing a decision-making basis for VANETs node deployment and routing rule optimization.
Let E C i t , E M C H i t , E M G i t and E A N i t represent the remaining energy of the control nodes, convex hull nodes, general nodes, and all network nodes in VANETs at time t in the i th simulation experiment, respectively. Let E C t , E M C H t , E M G t and E A N t represent the remaining energy of the control nodes, convex hull nodes, general nodes, and all network nodes in VANETs at time t after running N s i m u simulation experiments, respectively. Then we have:
E C i t = 1 m 1 i = 1 m 1 E i t E M C H i t = 1 m 2 i = 1 m 2 E i t E M G i t = 1 m 3 i = 1 m 3 E i t E A N i t = 1 m A N i = 1 m A N E i t , m A N = m 1 + m 2 + m 3
E C t = 1 N s i m u k = 1 N s i m u E C k t = 1 N s i m u × m 1 k = 1 N s i m u i = 1 m 1 E i t E M C H t = 1 N s i m u k = 1 N s i m u E M C H k t = 1 N s i m u × m 2 k = 1 N s i m u i = 1 m 2 E i t E M G t = 1 N s i m u k = 1 N s i m u E M G k t = 1 N s i m u × m 3 k = 1 N s i m u i = 1 m 3 E i t E A N t = 1 N s i m u k = 1 N s i m u E A N k t
3. Appointed end-to-end (s-t) connectivity reliability
In the i th simulation experiment, let the set of nodes within VANETs still possess normal communication functions at time t and can complete information receiving and transmitting tasks be denoted as V 1 t , i.e., V 1 t = N i | S N i = 1 , N i V . In the i th simulation experiment, let the number of nodes within V 1 t be denoted as N V 1 t , then N V 1 t = V 1 t .
When VANETs need to ensure that the source node N s maintains communication connectivity with a specified sink (terminal) node N t during operation, as can be inferred from the aforementioned analysis, it is equivalent to the condition where the sink node N t experiences no faults, i.e., the sink node N t status value is S N t = 1 , and there exists a routing path between the source node N s and the sink node N t . At this time, both the source node N s and the specified sink node N t must belong to the set V 1 : the nodes are free from failures, their communication functions are normal, and there is no isolation failure, ensuring that a routing path always exists between the source nodes and the sink node. Therefore, to solve the connectivity reliability between two specified ends in VANETs through Monte Carlo simulation, it is necessary to check whether the source node N s and the specified sink node N t belong to the set V 1 t in each simulation time step. Introduce indicator functions I N s V 1 t and I N t V 1 t :
I N s V 1 t = 1 , N s V 1 t 0 , N s V 1 t
I N t V 1 t = 1 , N t V 1 t 0 , N t V 1 t
In the formula, if the source node N s at time t belongs to the set V 1 t , then I N s V 1 t = 1 ; otherwise, I N s V 1 t = 0 . If the designated sink node N t at time t belongs to the set V 1 t , then I N t V 1 t = 1 ; otherwise, I N t V 1 t = 0 . After running N s i m u simulation experiments, the formula for calculating the average appointed end-to-end (s-t) connectivity reliability between two of VANETs at time t is:
A p p R s t t = 1 N s i m u i = 1 N s i m u I N s V 1 t I N t V 1 t
4. Arbitrarily end-to-end (s-t) connectivity reliability
When VANETs are operating and need to ensure that the source node N s always maintains communication connectivity with at least one sink node N j   N j V , j s , it is equivalent to saying that there exists at least one sink node that is not experiencing any faults, i.e., the sink node N j status value is 1, and there is a route between it and the source node. At this time, the source node N s and at least one sink node N j must simultaneously belong to the set V 1 . To solve the connectivity reliability of any two ends within VANETs through Monte Carlo simulation, it is necessary to check in each simulation time step t whether the source node N s and one arbitrarily sink node N j belong to the set V 1 t . An indicator function I 2 V 1 t is introduced:
I 2 V 1 t = 1 , N V 1 t 2 0 , N V 1 t < 2
In the formula, if the number of nodes in the set V 1 t normally communicating connected nodes at time t is greater than or equal to 2, the value is set to 1; otherwise, it is set to 0. After running N s i m u simulation experiments, the formula for calculating the average connectivity reliability between two arbitrarily ends in VANETs at time t is:
A r b R s t t = 1 N s i m u i = 1 N s i m u I N s V 1 t I 2 V 1 t
5. Appointed end-to-K ends (s-Kt) connectivity reliability
When VANETs need to ensure that the source node N s maintains communication connectivity with a specified number of K sink nodes N t i   i = 1 , 2 , , K < m during operation, as can be inferred from the aforementioned analysis, it is equivalent to assuming that none of the appointed K sink nodes N t i experience any failures, and there exists a route between them and the source node N s . At this point, both the source node N s and the appointed K sink nodes must simultaneously belong to the set V 1 . An indicator function I K N V 1 t is introduced:
I K N V 1 t = 1 , N t i V 1 ; i = 1 , 2 , , K 0 , else
In the formula, if the appointed K sink nodes N t i at time t belongs to the set V 1 t , then I K N V 1 t = 1 , otherwise the value is 0. After running N s i m u simulation experiments, the formula for calculating the average appointed K terminal connectivity reliability of VANETs at time t is:
A p p R s K t t = 1 N s i m u i = 1 N s i m u I N s V 1 t I K N V 1 t
6. Arbitrarily end-to-K ends (s-Kt) connectivity reliability
When VANETs need to ensure that the source node N s always maintains communication with at least any K sink nodes N j   N j V ; j = 1 , 2 , , K < m ; j s during operation, it is equivalent to the existence of at least K sink nodes without any failure, that is, the sink nodes status value are 1, and there is a route between every sink node and the source node. At this time, the source node and at least any K sink nodes must belong to the set V 1 . To solve the arbitrarily end-to-K ends (s-Kt) connectivity reliability of VANETs through Monte Carlo simulation, it is necessary to check whether the source node and at least K sink nodes belong to the set V 1 t in each time step. Introducing the indicator function I K + 1 V 1 t :
I K + 1 V 1 t = 1 , N V 1 t K + 1 0 , N V 1 t < K + 1
In the formula, if the number of nodes in the set V 1 t at time t is greater than or equal to K + 1 ( K sink nodes plus 1 source node), the value is set to 1; otherwise, it is set to 0. After running N s i m u simulation experiments, the formula for calculating the average arbitrarily K terminal connectivity reliability of VANETs at time t is:
A r b R s K t t = 1 N s i m u i = 1 N s i m u I N s V 1 t I K + 1 V 1 t
7. ALL-terminal (s-At) connectivity reliability
Considering the scenario where all nodes within VANETs are required to be connected at any given time t , we introduce an indicator function I m V 1 t :
I m V 1 t = 1 , N V 1 t = m 0 , N V 1 t < m
After running N s i m u simulation experiments, the formula for calculating the average all-terminal (end-to-all ends) connectivity reliability of VANETs at time t is:
A r b R s A t t = 1 N s i m u i = 1 N s i m u I m V 1 t

8.2. Simulation Algorithm for Connectivity Reliability of VANETs Based on Node Motion Characteristics

In this subsection, the paper will elaborate on in detail the specific process of the simulation solution algorithm for the connectivity reliability of VANETs. To facilitate the reference to the key terms and notations appearing in the simulation algorithm, the paper summarizes the main notations used in the analysis of previous chapters in Table 4.
(1) Input VANETs tasks and related operation information: Node information processing and energy consumption parameters E e l e c , ε a m p , γ i t , l C 2 , l S C , l C O , T S C , T C O ; node movement parameters v min , v max , d C o , d A t , g , ω i ; task information A r e a m i , t m i , C o N T a . Where t m i is the duration of VANETs task execution; A r e a m i is the area where VANETs execute tasks; C o N T a = x T a , y T a is the target point coordinate.
(2) Initialize VANETs graph theory model G = V , E at time t = 0 : Based on task and deployment information, determine the number of nodes m = V in VANETs, the corresponding index values N i   i = 1 , 2 , , m for each node, and the index value for the control node N C ; assign initial coordinates C o N i 0 , initial directions O i 0 , and initial velocities v i 0 to all nodes; set up a set V 1 = V of nodes with normal communication functions, a set V 2 = of nodes with hardware/software failures, a set V 3 = of nodes with energy consumption failures, a set V 4 = of nodes under attack, and a set V 5 = of nodes with isolation failure.
(3) Determine whether a hardware/software failure event has occurred at nodes: For all nodes in the current V 1 , calculate the probability Pr E ¯ N i 2 t of each node not experiencing a hardware/software failure, and compare it with a random number 0 r 1 . If Pr E ¯ N i 2 t < r , then a failure is determined, and updates V 1 = V 1 \ N i , V 2 = V 2 N i are made. After traversing all normal nodes in the current VANETs, if V 1 , then proceed to step (4); otherwise, proceed to step (15) of the algorithm.
(4) Determine whether nodes have been intentional attacked and failed: For all nodes in the current V 1 , calculate the probability Pr E ¯ N i 4 t of each node not failing due to an intentional attack event, and compare it with a random number 0 r 1 . If Pr E ¯ N i 4 t < r , then it is determined to have failed, update V 4 = V 4 N i , and update V 1 = V 1 \ N i . After traversing all normal nodes in the current VANETs, if V 1 , then proceed to step (5); otherwise, proceed to step (15) of the algorithm.
(5) Generate node distance matrix and adjacency matrix: For all nodes in the current V 1 , generate the Euclidean distance matrix between nodes, and generate the binary communication connectivity adjacency matrix through logical operations A B t = M d t d T h .
(6) Update VANETs convex hull set: Keep the index values N 1 of control node N C unchanged, update the convex hull set N M C H and general action node set N M G based on the node coordinate information, and V 1 = N 1 N M C H N M G holds.
(7) Determine the current VANETs information transmission situation: Compare the current time t with the transmission cycle. If mod t , T S C × T C O = 0 , then there are simultaneous ITS1, ITS2, and ITS3 in the VANETs; if mod t , T S C = 0 , then there are simultaneous ITS1 and ITS2 at the current time; if mod t , T C O = 0 , then there is only ITS3 at the current time;
(8) Determine routing paths within VANETs: Apply routing path identification algorithms for different information transmission situations (ITS1, ITS2, ITS3) to determine all existing routing paths within the current VANETs.
(9) Calculating the information processing capacity of VANETs nodes: The formula for information processing capacity of nodes is applied to calculate the amount of information sent and received by each node.
(10) Determine whether nodes have experienced an energy consumption failure event: Calculate the remaining energy of all nodes in VANETs at the current moment t , and compare it with the energy threshold E T h . If E i t < E T h , then it is determined as failure, update V 3 = V 3 N i , and update V 1 = V 1 \ N i . After traversing all normal nodes in the current VANETs, if V 1 , then proceed to step (11); otherwise, proceed to step (15) of the algorithm.
(11) Update distance matrix and adjacency matrix: For all nodes in the current V 1 , generate the Euclidean distance matrix between nodes, and generate the binary communication connectivity adjacency matrix through logical operations A B t = M d t d T h .
(12) Determine whether an isolation failure event has occurred at nodes: Check all nodes in the system, if there is a node that satisfies j V 1 a i j = j V 1 a j i = 0 , it is determined that an isolation failure has occurred. Update V 5 = V 5 N i , update V 1 = V 1 \ N i , and set N M C H = N M G = . If V 1 , proceed to step (13); otherwise, proceed to step (15).
(13) Update node location information: For all nodes in the current V 1 , run the VANETs node location update algorithm based on the improved Couzin-leader model, calculate and update the direction vectors O i t + Δ t , coordinates C o N i t + Δ t , and other information of each node at the next moment t + Δ t ;
(14) Update the simulation clock: t = t + Δ t , if t t m i , proceed to step (3) of the algorithm and continue the iterative operation; otherwise, proceed to step (15) of the algorithm.
(15) End the simulation algorithm and output data: the number of failed nodes N F 2 i t , N F 3 i t , N F 4 i t and N F 5 i t ; the remaining energy of nodes E C i t , E M C H i t and E M G i t ; the indicator function I N s V 1 , I N t V 1 , I 2 V 1 t , I K N V 1 t , I K + 1 V 1 t , I m V 1 t , etc.

9. Case Study

9.1. Simulation Case Parameter Setting

The paper illustrates the network connectivity reliability evaluation method proposed in the study through a specific VANETs application case. In this case, VANETs consists of 150 mobile nodes, including one control node that plays the role of a leader, and the remaining nodes play the role of followers. The network needs to proceed towards a predetermined target point, with a mission duration (single simulation duration) of 1 h. During the deployment phase, node coordinates, velocities, and directions are initialized. During the simulation experiment, motion information, node reliability information, link information, and network topology information are continuously updated. After repeating the simulation experiment 50 times, the network connectivity reliability parameters are estimated through average values. The relevant parameters of VANETs are shown in Table 5. The simulation experiments were completed using MATLAB R2023.

9.2. Simulation Case Result Analysis

The simulation model utilizing the proposed routing path recognition algorithm is named as the main model, while the simulation model without utilizing the routing path recognition algorithm serves as the control model. Both models underwent 50 simulation experiments, respectively. Figure 6 illustrates the node consistency analysis of the main model. It can be observed that due to the random deployment of nodes within VANETs at the initial moment, O N e t 0 = 0 . 5582 , as the simulation time progresses, follower nodes are influenced by the leader node, continuously enhancing the overall movement consistency of the cluster and moving towards the target area. At time t = 436 , O N e t t begins to converge to the range 0.9761 ,   0.9975 , reflecting a high degree of organization and discipline during the task process, proving the effectiveness of the improved Couzin-leader model proposed in this paper.
Figure 7 shows the comparison of evaluation values for connectivity reliability metrics.
From Figure 7a,b, it can be observed that among the connectivity reliability evaluation metrics of VANETs, there exists a pattern where A r b R s A t t < A p p R s K t t < A p p R s t t < A r b R s K t t < A r b R s t t at the same time, with K = 120 . Furthermore, both A r b R s A t t and A p p R s K t t decrease rapidly after the start of the simulation experiment, which is observed in both the main model and the control model. Specifically, A r b R s A t 805 = A p p R s K t 805 = 0 in both models. In contrast, A r b R s t t remains 1 even at the end of the simulation experiment (i.e., A r b R s t 3600 = 1 ), indicating that the above 3 connectivity reliability metrics have low value for practical management decisions.
This paper further focuses on two metrics: A p p R s t t and A r b R s K t t , as shown in Figure 7c,d. It can be seen that at any given time, the evaluation value of the main model is greater than that of the control model. Taking A p p R s t t as an example, when it decreases to 0.8, the corresponding time for the control model is t = 840 , while the corresponding time for the main model is t = 1285 , indicating an increase of 52.98% in VANETs working time compared to the former. When it decreases to 0.6, the corresponding time for the control model is t = 1050 , while the corresponding time for the main model is t = 1520 , indicating an increase of 44.76% in VANETs working time compared to the former. Taking A r b R s K t t as an example, when it decreases to 0.8, the corresponding time for the control model is t = 1978 , while that for the main model is t = 2356 . This indicates an increase of 19.11% in VANETs working time compared to the former. When it decreases to 0.6, the corresponding time for the control model is t = 2265 , while the corresponding time for the main model is t = 2543 , indicating an increase of 12.27% in VANETs working time compared to the former.
When distinguish between the main model and the control model, various failure modes during VANETs operation are analyzed, as shown in Figure 8 specifically.
According to Figure 8a,b, the total number of failed nodes increases at an accelerating rate as the simulation time progresses. For both the main model and the control model, no isolation failure mode occurred during the simulation experiment. However, the main failure modes differed in the simulation experiments: in the control model, there was N F 3 3600 = 22.6 > N F 4 3600 = 20.68 > N F 2 3600 = 20.02 , and the main failure mode was energy consumption failure, with a total number of failed nodes N F 3600 = 63.3 ; while in the main model, there was N F 2 3600 = 21.84 > N F 4 3600 = 20.8 > N F 3 3600 = 11.68 , and the main failure mode was hardware/software failure, with a total number of failed nodes N F 3600 = 54.32 . At the end of the simulation experiment, the frequency of four failure events is listed in Table 6. Figure 8c,d is equivalent to scaling Figure 8a,b on the y-axis (in the example m ), thus the variation pattern is consistent. It should be noted that although the main model has a 14.19% reduction in the total number of failed nodes compared to the control model, in fact, the main model only has one failure mode of energy consumption failure with a smaller number of failed nodes than the control model (a decrease of 48%), while the number of failed nodes due to hardware/software failure increased by 9.1%, and the number of failed nodes due to intentional attacks increased by 0.58%. The above indicates that in VANETs operation, when the probability of energy consumption failure occurring in nodes decreases, there is even a higher probability (compared to the control model) of other failure modes occurring, rather than maintaining a working or operational state throughout.
Further analysis from Figure 8e,f reveals the occurrence pattern of failure modes within VANETs. In the control experiment, there is a clear turning point t = 859 . Before this point, the main failure mode among all failed nodes is intentional attack, followed by hardware/software failure, and finally energy consumption failure. After the turning point t = 859 , energy consumption failure becomes the main failure mode but its proportion tends to stabilize with a certain downward trend, while hardware/software failure remains the second largest failure mode with no fluctuation in proportion, and intentional attack shows a certain upward trend. In the main model, the turning point occurs before t = 1469 which the failure occurrence pattern is similar to that in the control model. However, after the turning point, hardware/software failure becomes the main failure mode with a stable proportion, intentional attack shows an upward trend as the second largest failure mode, and energy consumption failure shows a certain downward trend. From the beginning of the simulation experiment to the turning point, node hardware/software failures follow an exponential distribution, and the cumulative amount of information sent and received is small, resulting in a low occurrence rate of these two failure modes. However, from the turning point to the end of the simulation experiment, as nodes continue to approach the target area, the probability of being attacked increases exponentially, leading to a significant increase in the intentional attack failure mode; for energy consumption failure, on the one hand, as the simulation time steps forward, the cumulative amount of information sent and received by nodes continues to increase, resulting in a decrease in the remaining energy of nodes and an increase in the probability of energy consumption failure. On the other hand, the total number of failed nodes continues to increase, leading to fewer and fewer nodes capable of sending and receiving information within the VANETs, and the instantaneous amount of information that nodes need to process continues to decrease, reducing the probability of energy consumption failure. The above analysis has a comprehensive impact on energy consumption failure, which is reflected in Figure 8e,f.
Distinguishing between the main model and the control model, we analyze the remaining energy of nodes during the operation of VANETs, as shown in Figure 9. Since the control nodes are assumed to be fault-free, their residual energy remains constant. From Figure 9a,b, it can be observed that during the operation of VANETs, E M G t < E A N t < E M C H t holds. General nodes consume energy the fastest, followed by the average energy consumption of all network nodes, and convex hull nodes consume energy the slowest. From Figure 9c, it can be seen that at the end of the simulation experiment, the average remaining energy E A N 3600 = 471.3736 of all network nodes in the main model increased by 0.41% compared with that in the control model, E A N 3600 = 469.1390 . Although this numerical difference is not significant, it still contributes to the reduction in energy consumption failure.

9.3. Sensitivity Analysis

Given that scholars have already conducted sensitivity analyses on network characteristics such as task areas, radio coverage, and network scale (number of nodes) [22,35], this paper further focuses on the cluster movement characteristics exhibited by VANETs in practical deployments, studying the impact of the nodes’ attraction distance on VANETs connectivity reliability. The repulsion distance d C o and communication distance thresholds d T h within a VANET are kept constant, and only the attraction distance d A t is varied, with its value ranging within an interval d C o , d T h . A new independent variable, Attractive-communication distance threshold ratio (ATR), is defined:
A T R = d A t d T h
Each change in the value of the attraction distance d A t will generate a new A T R , with A T R d C o d T h , 1 . For the simulation case proposed in this paper, the influence of different d A t values 30 ,   40 ,   60 ,   80 ,   100 on the connectivity reliability of VANETs is analyzed, that is, A T R values 0.3 ,   0 .4 ,   0 .6 ,   0 .8 ,   1 , in which 50 simulation experiments are repeated for each A T R value, and the average result is used for subsequent analysis.
Figure 10 illustrates the impact of different A T R on the A r b R s K t t of VANETs. It can be observed that at the same time, as the A T R increases, the A r b R s K t t of VANETs also shows an increasing trend, indicating A T R has a positive correlation with the connectivity reliability of VANETs.
Further analyze the occurrence patterns of failure events for various types of fault nodes, as shown in Figure 11.
From Figure 11, it is evident that when A T R < 0.6 , the VANETs node has isolation failure during operation. However, in the previous main model simulation experiment, the isolation failure mode was not observed for A T R = 1 was set. Furthermore, it can be observed that the proportion of isolation failures is extremely sensitive to changes in the A T R : when the ratio changes from 0.3 to 0.4, the proportion of isolation failures decreases sharply from 61.29% to 30.15% (the denominator represents the total number of failed nodes); when the ratio changes from 0.4 to 0.6, the proportion of isolation failures decreases sharply from 30.15% to 0.50%. In addition, it can be found that when there are isolation failure events in VANETs, the proportion of node energy consumption failures is relatively low, as a large number of isolated nodes do not perform information reception or transmission operations, resulting in lower energy consumption. This result further confirms the effectiveness and correctness of the simulation experiments in the paper.

10. Conclusions

The paper focuses on the connectivity reliability evaluation of VANETs, conducting research from aspects such as node failure modeling, mobility model construction, and connectivity reliability solving algorithm design. The specific content includes: analyzing four types of failure modes existing in VANETs nodes based on the assumption of imperfect nodes; analyzing the motion characteristics of VANETs clusters based on the node control relationships that exist in actual operation; proposing a routing path identification algorithm that considers energy consumption; and proposing a connectivity reliability evaluation algorithm for VANETs through the mapping relationship between mathematical models and simulation models.
The connectivity reliability solving algorithm proposed in the paper is verified through simulation examples, and it is demonstrated that the routing path identification algorithm considering energy consumption reduces the amount of information processed by nodes, thereby reducing node energy consumption and ultimately leading to a decrease in both the number and probability of energy consumption failures occurring in nodes. However, there is a correlation between different failure modes similar to competitive failure: a decrease in the probability of one failure mode may lead to more nodes failing due to other reasons. As the simulation time progresses, the occurrence patterns of different failure modes also vary, and the same failure mode (taking energy consumption failure as an example) may have both promoting and inhibiting factors. According to the sensitivity analysis, with the change of A T R , the most obvious change in VANETs is the occurrence of node isolation failure events: in this paper, when A T R = 0.6 , the proportion of isolation failure is only 0.50%, which can be predicted that when A T R > 0.6 , VANETs will not have isolation failure during operation. The limitations of this study lie in modeling the link reliability in VANETs using a binary communication model, which simplifies real-world scenarios and fails to consider the relationship between link capacity and node information processing load. In the future, the FS-TRG model will be introduced to account for complex scenarios such as signal fading and interference in VANETs node communication. Additionally, the impact of link capacity (which follows a certain probability distribution) on node information transmission will be considered to comprehensively analyze the problem of connectivity reliability evaluation for VANETs under the assumption of unreliable nodes and unreliable links. Finally, optimization suggestions will be proposed targeting the main sensitive factors.

Author Contributions

Conceptualization, J.C. and Y.B.; methodology, Y.B.; software, J.C., Y.B. and C.H.; validation, C.H. and F.L.; formal analysis, J.C.; investigation, D.X.; resources, Y.G.; data curation, D.X. and Y.G.; writing—original draft preparation, Y.B.; writing—review and editing, J.C.; visualization, Y.B.; supervision, F.L.; project administration, J.C.; funding acquisition, J.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by AAAF Independent Fund for Youth Scientific Research (No. 2024CJ77).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Azni, A.H.; Ahmad, R.; Noh, Z.A.M.; Hazwani, F.; Hayaati, N. Systematic Review for Network Survivability Analysis in MANETS. Procedia Soc. Behav. Sci. 2015, 195, 1872–1881. [Google Scholar] [CrossRef]
  2. Xing, L. Cascading Failures in Internet of Things: Review and Perspectives on Reliability and Resilience. IEEE Internet Things J. 2021, 8, 44–64. [Google Scholar] [CrossRef]
  3. Carsancakli, M.F.; Al Imran, M.A.; Yildiz, H.U.; Kara, A.; Tavli, B. Reliability of Linear WSNs: A Complementary Overview and Analysis of Impact of Cascaded Failures on Network Lifetime. Ad Hoc Netw. 2022, 131, 102839. [Google Scholar] [CrossRef]
  4. Tsao, K.Y.; Girdler, T.; Vassilakis, V.G. A Survey of Cyber Security Threats and Solutions for UAV Communications and Flying Ad-Hoc Networks. Ad Hoc Netw. 2022, 133, 102894. [Google Scholar] [CrossRef]
  5. Xu, B.; Bai, G.; Liu, T.; Fang, Y.; Zhang, Y.A.; Tao, J. An Improved Swarm Model with Informed Agents to Prevent Swarm-Splitting. Chaos Solitons Fractals 2023, 169, 113296. [Google Scholar] [CrossRef]
  6. Zhou, X.; Huang, Y.; Bai, G.; Xu, B.; Tao, J. The Resilience Evaluation of Unmanned Autonomous Swarm with Informed Agents under Partial Failure. Reliab. Eng. Syst. Saf. 2024, 244, 109920. [Google Scholar] [CrossRef]
  7. Harifi, S.; Razavi, A.; Rad, M.H.; Moradi, A. A Giza Pyramids Construction Metaheuristic Approach Based on Upper Bound Calculation for Solving the Network Reliability Problem. Appl. Soft Comput. 2024, 167, 112241. [Google Scholar] [CrossRef]
  8. Liang, Y.; Yan, H.; Liu, Y. Unlinkable Signcryption Scheme for Multi-Receiver in VANETs. IEEE Trans. Intell. Transp. Syst. 2023, 24, 10138–10154. [Google Scholar] [CrossRef]
  9. Liu, G.; Li, H.; Liang, Y.; Le, J.; Wang, N.; Mu, N.; Liu, Z.; Liu, Y.; Xiang, T. PSRAKA: Physically Secure and Robust Authenticated Key Agreement for VANETs. IEEE Trans. Veh. Technol. 2025, 74, 7953–7968. [Google Scholar] [CrossRef]
  10. Liang, Y.; Liu, G.; Zhang, X.; Chen, Y.; Chen, J.; Xia, Y.; Liu, Y. Fully Anonymous Broadcast Signcryption for Secure Health Data Transmission in WBANs. IEEE Trans. Mob. Comput. 2025, 1–15. [Google Scholar] [CrossRef]
  11. Chen, Y.; Liang, Y.; Tang, C.; Liu, Y. EFGDAS-MU: Efficient and Fine-Grained Data Aggregation Scheme for Multi-User in Cloud-Assisted IoT. Inf. Fusion 2025, 126, 103605. [Google Scholar] [CrossRef]
  12. Ahmed, N.; Mohammadani, K.; Bashir, A.K.; Omar, M.; Jones, A.; Hassan, F. Secure and Reliable Routing in the Internet of Vehicles Network: AODV-RL with BHA Attack Defense. Comput. Model. Eng. Sci. 2023, 139, 633–659. [Google Scholar] [CrossRef]
  13. Zhao, Y.; Cai, B.; Cozzani, V.; Liu, Y. Failure Dependence and Cascading Failures: A Literature Review and Research Opportunities. Reliab. Eng. Syst. Saf. 2025, 256, 110766. [Google Scholar] [CrossRef]
  14. Liu, K.; Zhong, J.; Bai, G.; Yang, Y. A Complex Networks Approach for Reliability Evaluation of Swarm Systems under Malicious Attacks. IEEE Access 2020, 8, 81209–81219. [Google Scholar] [CrossRef]
  15. Bernardi, S.; Eftimie, R.; Painter, K.J. Leadership Through Influence: What Mechanisms Allow Leaders to Steer a Swarm? Bull. Math. Biol. 2021, 83, 69. [Google Scholar] [CrossRef]
  16. Sridhar, K.N.; Chan, M.C. Modeling Link Lifetime Data with Parametric Regression Models in MANETs. IEEE Commun. Lett. 2009, 13, 983–985. [Google Scholar] [CrossRef]
  17. Chang, P.C.; Huang, D.H.; Lin, Y.K.; Nguyen, T.P. Reliability and Maintenance Models for a Time-Related Multi-State Flow Network via d-MC Approach. Reliab. Eng. Syst. Saf. 2021, 216, 107962. [Google Scholar] [CrossRef]
  18. Niu, Y.F.; Xiang, H.Y.; Xu, X.Z. Expected Performance Evaluation and Optimization of a Multi-Distribution Multi-State Logistics Network Based on Network Reliability. Reliab. Eng. Syst. Saf. 2024, 251, 110321. [Google Scholar] [CrossRef]
  19. Ding, C.; Wei, P.; Shi, Y.; Liu, J.; Broggi, M.; Beer, M. Sampling and Active Learning Methods for Network Reliability Estimation Using K-Terminal Spanning Tree. Reliab. Eng. Syst. Saf. 2024, 250, 110309. [Google Scholar] [CrossRef]
  20. Dharmaraja, S.; Vinayak, R.; Trivedi, K.S. Reliability and Survivability of Vehicular Ad Hoc Networks: An Analytical Approach. Reliab. Eng. Syst. Saf. 2016, 153, 28–38. [Google Scholar] [CrossRef]
  21. Wang, N.; Tian, T.-Z.; He, J.-T.; Zhang, C.-Z.; Yang, J. Transmission Reliability Evaluation of Wireless Sensor Networks Considering Channel Capacity Randomness and Energy Consumption Failure. Reliab. Eng. Syst. Saf. 2024, 242, 109769. [Google Scholar] [CrossRef]
  22. Liu, T.; Bai, G.; Tao, J.; Zhang, Y.A.; Fang, Y. A Multistate Network Approach for Resilience Analysis of UAV Swarm Considering Information Exchange Capacity. Reliab. Eng. Syst. Saf. 2024, 241, 109606. [Google Scholar] [CrossRef]
  23. Fu, X.; Zheng, D.; Liu, X.; Xing, L.; Peng, R. Systematic Review and Future Perspectives on Cascading Failures in Internet of Things: Modeling and Optimization. Reliab. Eng. Syst. Saf. 2025, 254, 110582. [Google Scholar] [CrossRef]
  24. Padmavathy, N.; Chaturvedi, S.K. Evaluation of Mobile Ad Hoc Network Reliability Using Propagation-Based Link Reliability Model. Reliab. Eng. Syst. Saf. 2013, 115, 1–9. [Google Scholar] [CrossRef]
  25. Vijayalakshmi, K.; Maheshwari, A.; Saravanan, K.; Vidyasagar, S.; Kalyanasundaram, V.; Sattianadan, D.; Bereznychenko, V.; Narayanamoorthi, R. A Novel Network Lifetime Maximization Technique in WSN Using Energy Efficient Algorithms. Sci. Rep. 2025, 15, 10644. [Google Scholar] [CrossRef]
  26. Zhou, J.; Huang, N.; Coit, D.W.; Felder, F.A. Combined Effects of Load Dynamics and Dependence Clusters on Cascading Failures in Network Systems. Reliab. Eng. Syst. Saf. 2018, 170, 116–126. [Google Scholar] [CrossRef]
  27. Xiang, S.; Yang, J. Performance Reliability Evaluation for Mobile Ad Hoc Networks. Reliab. Eng. Syst. Saf. 2018, 169, 32–39. [Google Scholar] [CrossRef]
  28. Shelly, S.; Babu, A.V. Link Residual Lifetime-Based next Hop Selection Scheme for Vehicular Ad Hoc Networks. EURASIP J. Wirel. Commun. Netw. 2017, 2017, 23. [Google Scholar] [CrossRef]
  29. Regragui, Y.; Moussa, N. Impact of Mobility Design on Network Connectivity Dynamics in Urban Environment. Simul. Model. Pract. Theory 2022, 119, 102577. [Google Scholar] [CrossRef]
  30. Babu, S.; Parthiban, A.R.K. DTMR: An Adaptive Distributed Tree-Based Multicast Routing Protocol for Vehicular Networks. Comput. Stand. Interfaces 2022, 79, 103551. [Google Scholar] [CrossRef]
  31. Kadhim, A.J.; Seno, S.A.H.; Naser, J.I.; Hajipour, J. DMPFS: Delay-Efficient Multicasting Based on Parked Vehicles, Fog Computing and SDN in Vehicular Networks. Veh. Commun. 2022, 36, 100488. [Google Scholar] [CrossRef]
  32. Sohail, M.; Latif, Z.; Javed, S.; Biswas, S.; Ajmal, S.; Iqbal, U.; Raza, M.; Khan, A.U. Routing Protocols in Vehicular Adhoc Networks (VANETs): A Comprehensive Survey. Internet Things 2023, 23, 100837. [Google Scholar] [CrossRef]
  33. Dui, H.; Zhang, H.; Dong, X.; Zhang, S. Cascading Failure and Resilience Optimization of Unmanned Vehicle Distribution Networks in IoT. Reliab. Eng. Syst. Saf. 2024, 246, 110071. [Google Scholar] [CrossRef]
  34. Fu, X.; Yang, Y. Analysis on Invulnerability of Wireless Sensor Networks Based on Cellular Automata. Reliab. Eng. Syst. Saf. 2021, 212, 107616. [Google Scholar] [CrossRef]
  35. Kumar, B.V.S.; Padmavathy, N. A Hybrid Link Reliability Model for Estimating Path Reliability of Mobile Ad Hoc Network. Procedia Comput. Sci. 2020, 171, 2177–2185. [Google Scholar] [CrossRef]
  36. Wu, B.; Sun, L. A Novel Layer-by-Layer Recursive Decomposition Algorithm for Calculation of Network Reliability. Reliab. Eng. Syst. Saf. 2024, 244, 109968. [Google Scholar] [CrossRef]
  37. Walikar, G.A.; Biradar, R.C. A Survey on Hybrid Routing Mechanisms in Mobile Ad Hoc Networks. J. Netw. Comput. Appl. 2017, 77, 48–63. [Google Scholar] [CrossRef]
  38. Couzin, I.D.; Krause, J.; Franks, N.R.; Levin, S.A. Effective Leadership and Decision-Making in Animal Groups on the Move. Nature 2005, 433, 513–516. [Google Scholar] [CrossRef]
  39. Zhang, L.; Du, Y.; Xu, J.; Wang, X. UAV-Enabled IoT: Cascading Failure Model and Topology-Control-Based Recovery Scheme. IEEE Internet Things J. 2024, 11, 22562–22577. [Google Scholar] [CrossRef]
  40. Xing, L.; Johnson, B.W. Reliability Theory and Practice for Unmanned Aerial Vehicles. IEEE Internet Things J. 2023, 10, 3548–3566. [Google Scholar] [CrossRef]
  41. Fu, X.; Li, Q.; Li, W. Modeling and Analysis of Industrial IoT Reliability to Cascade Failures: An Information-Service Coupling Perspective. Reliab. Eng. Syst. Saf. 2023, 239, 109517. [Google Scholar] [CrossRef]
  42. Yang, F.; Ma, T.; Shu, N.; Liu, C.; Wu, T.; Chang, C. Is Your Solution Accurate? A Fault-Oriented Performance Prediction Method for Enhancing Communication Network Reliability. Reliab. Eng. Syst. Saf. 2025, 256, 110793. [Google Scholar] [CrossRef]
Figure 1. VANET and convex hull nodes.
Figure 1. VANET and convex hull nodes.
Sensors 25 06073 g001
Figure 2. k-hop connected path.
Figure 2. k-hop connected path.
Sensors 25 06073 g002
Figure 3. A single node belonging to multiple routing paths simultaneously.
Figure 3. A single node belonging to multiple routing paths simultaneously.
Sensors 25 06073 g003
Figure 4. VANETs node movement and Danger zone.
Figure 4. VANETs node movement and Danger zone.
Sensors 25 06073 g004
Figure 5. VANETs node isolation failure diagram; (a) the network topology at time a; (b) the network topology at time b; (c) the network topology at time c.
Figure 5. VANETs node isolation failure diagram; (a) the network topology at time a; (b) the network topology at time b; (c) the network topology at time c.
Sensors 25 06073 g005
Figure 6. Node consistency analysis of the main model.
Figure 6. Node consistency analysis of the main model.
Sensors 25 06073 g006
Figure 7. Evaluation values of connectivity reliability metrics in simulation experiments; (a) connectivity reliability metrics of the main model; (b) connectivity reliability metrics of the control model; (c) A p p R s t t of the main model and control model; (d) A r b R s K t t of the main model and control model; K = 120.
Figure 7. Evaluation values of connectivity reliability metrics in simulation experiments; (a) connectivity reliability metrics of the main model; (b) connectivity reliability metrics of the control model; (c) A p p R s t t of the main model and control model; (d) A r b R s K t t of the main model and control model; K = 120.
Sensors 25 06073 g007
Figure 8. Analysis of various fault modes; (a) the number of various types of failed nodes for the main model; (b) the number of various types of failed nodes for the control model; (c) the proportion of various types of failed nodes for the main model (denominator: the total number of nodes); (d) the proportion of various types of failed nodes for the control model (denominator: the total number of nodes); (e) the proportion of various types of failed nodes for the main model (denominator: the total number of failed nodes); (f) the proportion of various types of failed nodes for the control model (denominator: the total number of failed nodes).
Figure 8. Analysis of various fault modes; (a) the number of various types of failed nodes for the main model; (b) the number of various types of failed nodes for the control model; (c) the proportion of various types of failed nodes for the main model (denominator: the total number of nodes); (d) the proportion of various types of failed nodes for the control model (denominator: the total number of nodes); (e) the proportion of various types of failed nodes for the main model (denominator: the total number of failed nodes); (f) the proportion of various types of failed nodes for the control model (denominator: the total number of failed nodes).
Sensors 25 06073 g008
Figure 9. The remaining energy of VANETs nodes; (a) the remaining energy curves of four types of nodes in the main model; (b) the remaining energy curves of four types of nodes in the control model; (c) a comparative analysis of the average remaining energy of all network nodes in the main model and the control model.
Figure 9. The remaining energy of VANETs nodes; (a) the remaining energy curves of four types of nodes in the main model; (b) the remaining energy curves of four types of nodes in the control model; (c) a comparative analysis of the average remaining energy of all network nodes in the main model and the control model.
Sensors 25 06073 g009
Figure 10. Impact of ATR on the connectivity reliability of VANETs.
Figure 10. Impact of ATR on the connectivity reliability of VANETs.
Sensors 25 06073 g010
Figure 11. The proportion of various types of fault nodes varies with ATR at the end of the simulation experiment.
Figure 11. The proportion of various types of fault nodes varies with ATR at the end of the simulation experiment.
Sensors 25 06073 g011
Table 1. Comparison of related work and this paper.
Table 1. Comparison of related work and this paper.
LiteratureResearch ObjectEvaluation
Indicators
Node Failure ModesLink Connection ModelMobility Model
[20]VANETsReliability,
survivability
Hardware
failures
Probabilistic/
(Simplified)
[28]VANETsCommunication reliability/
(Not considered)
ProbabilisticGauss-Markov mobility model
[29]VANETsNetwork
performance
/
(Not considered)
DeterministicMicroscopic mobility model
[30]VANETsReliability/
(Not considered)
DeterministicCar-Following Model
[31]VANETsNetwork
performance
/
(Not considered)
DeterministicRealistic model of vehicular traffic
[32]VANETsQuality of Service (QoS) requirements/
(Not considered)
ProbabilisticMacroscopic mobility model
[33]VANETsReliability,
resilience
Cascading
failures
Deterministic/
(Fixed nodes)
[34]WSNs InvulnerabilityIntrinsic failure, external attackDeterministic/
(Fixed nodes)
[27]MANETTransmission
reliability
/
(Not considered)
ProbabilisticRandom direction mobility model
[35]MANETConnectivity
reliability
Undefined but consideredProbabilisticRandom waypoint mobility model
[21]WSNsTransmission
reliability
Random failure,
energy consumption failure
Probabilistic/
(Fixed nodes)
OursVANETsConnectivity
reliability
Hardware/software failure,
energy consumption failure,
intentional attack,
isolation failure
DeterministicImproved Couzin-leader model
Table 2. Correspondence between VANET node types and transmitted and received information.
Table 2. Correspondence between VANET node types and transmitted and received information.
Node TypeGenerate and Send
Information Type
CycleReceived Information TypeRelay Information Type
N C l C 2 T S C l S C ,   l C O /
N M C H l S C ,   l C O T S C l C 2 /
N M G (Relay) l C O T C O l C 2 l S C ,   l C 2 ,   l C O
N M G
(Non-relay)
l C O T C O l C 2 /
Table 3. Three information transmission situations (ITS) within VANETs.
Table 3. Three information transmission situations (ITS) within VANETs.
ITSSource NodeSink NodesDelivery CycleSend Information Type
ITS1 N C N M C H ,
N M G
T S C l C 2
ITS2 N M C H N C T S C l S C
ITS3 N M C H ,   N M G N C T C O l C O
Table 4. Notations.
Table 4. Notations.
NotationDescription
E e l e c the energy consumption of the circuit for transmitting 1 bit of information
ε a m p the power consumption coefficient of the power amplification circuit
γ i t the interference factor of the environment at time t
l C 2 the control information
l S C the situational awareness information
l C O the coordinate information
l T N i t the   amount   of   information   sent   by   the   node   N i at time t
l R N i t the   amount   of   information   received   by   the   N i at time t
E T N i t the   energy   consumed   by   node   N i   to   send   information   l T N i t to a distance d at time t
E R N i t the   energy   consumed   by   node   N i   to   receive   information   l R N i t at time t
T S C the interval period for real-time control information to be sent
T C O the interval period for coordinate information to be sent
v min the minimum velocity of nodes
v max the maximum velocity of nodes
d C o the safety distance between nodes to avoid collision
d A t the mutual attraction distance between nodes
g a unit vector, indicating the overall task information of VANETs
ω i a weight term to measure the degree of knowledge of task information
A r e a m i the area where VANETs execute tasks
t m i the duration of VANETs task execution
C o N T a C o N T a = x T a , y T a is the target point coordinate
m m = V is the number of nodes in VANETs
N i the   corresponding   index   value   for   the   i th   i = 1 , 2 , , m node
N C the control node
N M C H the convex hull set
N M G the action node set
C o N i t the   coordinate   of   node   N i at time t   t = 0 , 1 , , t m i
O i t the   direction   of   node   N i at time t
v i t the   velocity   of   node   N i at time t
V 1 the set of nodes with normal communication functions
V 2 the set of nodes with hardware/software failure
V 3 the set of nodes with energy consumption failure
V 4 the set of nodes under attack
V 5 the set of nodes with isolation failure
0 r 1 a random number
Pr E ¯ N i j t the   probability   of   node   N i   not   experiencing   the   j th failure at time t ,   while   j = 2   indicates   hardware / software   failure ,   j = 3   indicates   energy   consumption   failure ,   j = 4   indicates   intentional   attack ,   j = 5 indicates isolation failure
M d t the Euclidean distance matrix between nodes in VANETs
A B t the binary communication connectivity adjacency matrix of VANETs
a i j the   element   of   A B t
E i t the   remaining   energy   of   node   N i
E T h the energy threshold
Δ t the simulation time step
N F j i t the   number   of   nodes   failed   in   the   j th   failure   mode   in   the   i th simulation experiment
I N s V 1 the   indicator   function   for   judging   whether   the   source   node   N s works normally at time t
I N t V 1 the   indicator   function   for   judging   whether   the   designated   sin k   node   N t works normally at time t
I 2 V 1 t the   indicator   function   for   judging   whether   the   number   of   nodes   in   the   set   V 1 t normally communicating connected nodes at time t is greater than or equal to 2
I K N V 1 t the indicator function for judging the appointed K   sink   nodes   N t i   i = 1 , 2 , , K < m at time t belongs   to   the   set   V 1 t
I K + 1 V 1 t the   indicator   function   for   judging   whether   the   number   of   nodes   in   the   set   V 1 t at time t is   greater   than   or   equal   to   K + 1
I m V 1 t the   indicator   function   for   judging   whether   the   number   of   nodes   in   the   set   V 1 t at time t is equal to m
Table 5. VANET parameter settings.
Table 5. VANET parameter settings.
ParameterValueUnitParameterValueUnit
d A t 100m T C O 10s
d C o 20m E 0 500J
d T h 100m M T T F 10,000h
v min 20km/h Δ t 1s
v max 40km/h C o N T a (19,000, 19,000)m
E e l e c 100 × 10−9J/bit g [1, 1]/
ε a m p 100 × 10−12J/bit/m2 ω 1 3/
γ 2/ T a i n i 1/
l C 2 10KB A p p t 5/
l S C 10KB k 120/
l C O 4KB A p p k 2 : k + 1 /
T S C 5s
Table 6. Ranking of four types of failure modes.
Table 6. Ranking of four types of failure modes.
RanksExperimental Model
Main ModelControl Group
1Hardware/software failure (14.56%)Energy consumption failure (15.07%)
2Intentional attacks (13.87%)Intentional attacks (13.79%)
3Energy consumption failure (7.79%)Hardware/software failure (13.35%)
4Isolation failure (0)Isolation failure (0)
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Cao, J.; Bian, Y.; He, C.; Liu, F.; Xu, D.; Guo, Y. Evaluation of Connectivity Reliability of VANETs Considering Node Mobility and Multiple Failure Modes. Sensors 2025, 25, 6073. https://doi.org/10.3390/s25196073

AMA Style

Cao J, Bian Y, He C, Liu F, Xu D, Guo Y. Evaluation of Connectivity Reliability of VANETs Considering Node Mobility and Multiple Failure Modes. Sensors. 2025; 25(19):6073. https://doi.org/10.3390/s25196073

Chicago/Turabian Style

Cao, Junhai, Yunlong Bian, Chengming He, Fusheng Liu, Dan Xu, and Yiming Guo. 2025. "Evaluation of Connectivity Reliability of VANETs Considering Node Mobility and Multiple Failure Modes" Sensors 25, no. 19: 6073. https://doi.org/10.3390/s25196073

APA Style

Cao, J., Bian, Y., He, C., Liu, F., Xu, D., & Guo, Y. (2025). Evaluation of Connectivity Reliability of VANETs Considering Node Mobility and Multiple Failure Modes. Sensors, 25(19), 6073. https://doi.org/10.3390/s25196073

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop