We have divided this section into three parts concerning vehicular networks, current communication approaches in vehicular networks, and space–time-constrained communication.
2.1. Vehicular Networks
Vehicular networks, or Vehicular Adhoc NETworks (VANETs), are a particular kind of Mobile Adhoc NETworks, or MANETs [
1]. The main difference is that MANETs are mostly composed of mobile nodes connected by wireless links that move on random trajectories ([
15] in [
16]), while in VANETs, fixed entities or roadside units (RSUs) might be present in addition to mobile entities or onboard units (OBUs) [
1] that move along predefined roads [
3]. A recent study also described a remote controller called a Trusted Authority (TA) [
17] with functions such as registering nodes and network security. However, we aim to communicate with nodes faced with the task of communicating EMs only under space–time constraints; thus, security and related matters are outside of the scope of our research, and therefore this term will be intentionally omitted from the rest of this paper.
A major objective of VANETs is to provide physical welfare to the vehicle occupants through the opportune communication of data; therefore, several safety applications have been proposed and studied [
1]. Other non-safety applications include route efficiency and fuel economy (see
Table 1); for these applications, communication among entities in VANETs is mandatory.
In general, authors in the literature agree that there are three kinds of communication depending on the entities involved [
1,
3]: infrastructure-to-infrastructure (I2I), i.e., RSU to RSU communication; vehicle-to-infrastructure (V2I), i.e., OBU to RSU communication; and vehicle-to-vehicle (V2V), i.e., OBU to OBU communication. See
Figure 1. Mobility issues, however, represent problems in the desired communication, namely packet routing and packet delivery [
18].
2.2. Communication in Vehicular Networks
The simplest way to disseminate messages in a VANET is by means of simple broadcast and relay by flooding to entities in range [
7]. However, two main problems arise: uncontrollable broadcast storms and non-receiving nodes not located inside the broadcast region. For this, Ghazi et al., 2020 [
2], classified message dissemination approaches as follows:
Dissemination by Intelligent Traffic Lights (ITL). Mobile entities that provoke or detect an emergency create messages communicated to ITLs, and then forward them to other ITLs and vehicles in advance before they reach the emergency zone. Another goal is to provide better routes by adjusting speeds or clearing lanes for emergency vehicles such as ambulances, for example.
Dissemination using Internet of Things (IoT). Oriented to the detection and priority flow of emergency vehicles by means of Radio Frequency Identification (RFID) tags and Worldwide Interoperability for Microwave Access (WiMAX) wireless technologies with centralized management for the clearance of lanes and streets. Nevertheless, the proposed solutions are more focused on transportation than on communication issues.
Dissemination using Priority Messaging. A broadcast is made before other messages and storms are controlled by an algorithm. Communication is location-sensitive by using the real-time updated location of where incidents happened; despite this, discrimination of messages for storm control generates overheads in message processing in the network.
Dissemination using a Clustering Approach. Messages received, either through routing tables or opportunistic receipt, by a member are delivered in a unicast way to heads within groups of neighbor vehicles (clusters) that share a heading and speed at determined times in the environment. Those heads are responsible for broadcasting messages to all vehicles inside clusters. This approach retain a controlled and geographically limited scheme, but flooding still occurs, and it tries to reach every entity currently in the environment.
Dissemination using Software-Defined Networks. Central or in-the-cloud entities control data flows by means of on-demand requirement analysis and, in this case, emergency messages are sent dynamically with higher priority among vehicles; however, connectivity with mobility is the main issue, not to mention the fact that data are communicated over previously deployed and dedicated expensive infrastructure or resources.
Dissemination using Fog-Based Approaches. Fog computing basically delegates tasks from cloud to edge devices that will allow the dissemination of messages dynamically. These approaches nonetheless inherit the issues and requirements related to resources deployment as those seen under Software-Defined Networking (SDNs).
Dissemination using 5G Technology. These approaches use the benefits given by 5G technology over mobile devices, such as connectivity and a broader bandwidth. Some drawbacks are that the operation is offered by third-party carriers, and the relatively new and expensive cellular technology requires time to be deployed to rural zones or zones through which highways are routed.
The classification of approaches for message dissemination provided by [
2] does not match or exceed the performance of other feasible approaches, while the means of data transport are also classified as mechanisms. Other works include the following studies, including a proposed classification for message dissemination approaches in vehicular networks.
In [
19], the authors propose a synchronous system for clustered vehicles traveling in the same direction for highway scenarios with only a V2V scheme. Their objective is to deliver the warning messages with higher priority, given that these kind of messages are time-sensitive. However, the application of this solution to urban scenarios where vehicles display more random movements is not considered, not to mention the fact that preserving synchronized clocks requires more control packets (overheads) than asynchronous ones.
An infrastructure-based solution involving clustered vehicles is proposed in [
20]. RSUs are used as gateways in order to maintain the connection throughout the network, while they compute more distant movements and topology changes with the participation of an additional transport control center (TCC). The extra deployment of infrastructure might increase the costs of this infrastructure and the centralized entity.
The authors in [
21] propose the communication of head clusters with close fixed nodes called sinks, as an additional infrastructure with fog computing, in order to avoid congestion. The purpose is to maintain connectivity throughout the network. Nevertheless, congestion is only avoided at sinks, since beacon packets that maintain the clusters are not avoided.
Two mechanisms for the dissemination of emergency messages are proposed in [
22]. The first is a known code that reduces the packet size to be communicated among vehicles. The second is an inter-cluster communication protocol based on the A* algorithm [
23] for message delivery. The solution is, however, cluster-based, with centralized (heads) dissemination and beacon messages that are larger than the emergency ones, meaning more overheads.
Reduced relay nodes in a geo-routing protocol are proposed in [
24] for an overall reduced hop number and end-to-end propagation delay time. Frontier vehicles are selected as relays in consecutive areas that might not be permanently connected, i.e., the store–carry–forward approach is also applied. Since the scheme is only V2V and under ideal conditions, the authors do not mention how they deal with line-of sight and density problems.
A predictive vehicular location is proposed in [
25] by means of a Kalman filter [
26]. The main motivation is to avoid the excessive use of beacon messages and predict more distant positions. The vehicle with minimum error acts as the relay for the data geo-route to a destination zone; however, it is unclear if the vehicles execute the algorithm with limited resources or offline and how they obtain the actual position if the Global Positioning System, or GPS, is partially reliable.
The authors in [
27] present a bio-inspired approach based on Particle Swarm Optimization (PSO) and aim to achieve a high data delivery rate, while the critical response time is reduced. Hello packets determine communication ranges and a Next Hop Vehicle (NHV), computed by the mentioned heuristic, relays data to the next region. Full knowledge of neighbor vehicles is assumed.
Ant Colony Optimization (ACO) is used in a bio-inspired geo-routing protocol [
28]. Besides RSUs, a central entity sends agents (ants) with the purpose of finding less congested routes in the physical environment to provide shorter paths and travel times. High pheromone intensity means a high vehicular density to be avoided if a dynamic threshold is exceeded. Note that this solution requires reliable links and extra entities and its scope is to avoid traffic jams, instead of dealing with intermittent communication due to vehicular mobility.
A bio-inspired protocol based on spider behavior is presented by [
29]. Their aim is to avoid V2I communication by dispatching agents from point to point in a spiderweb-like network and returning with the shortest path to the destination node. However, the reported overheads are higher than those of the compared works and reliable geographic services and connectivity is assumed.
Data dissemination under unstable links solution is provided by [
30]. Both sparse and dense vehicular scenarios are considered, while alternative routes are computed if the main route presents failures. Despite the recovery mechanism, a greedy algorithm is used to calculate routes, where frontier nodes are used as relays if moving in the same direction.
In [
31], the authors deal with the problem of broadcast storms using a barrier time mechanism, where a super-node delays data delivery in a cluster-based solution in order to control flooding instead of immediate retransmission. Nevertheless, their aim is to extend the messages network-wide to the majority of clusters.
The distributed data dissemination protocol DV-cast is presented in [
32]. Fully connected, fully disconnected, and sparsely connected networks are observed in addition to the changes in topology at the same time. Broadcast suppression and store–carry–forward approaches are applied if connected or disconnected networks are detected, respectively. The geographical position, heading, and local or distant neighbors are identified through hello packets. An epidemic routing is used in sparse scenarios.
The authors in [
33] propose location services for mobile nodes in order to locate and deliver data with reduced overheads. Described as semi-flooding, the nodes periodically broadcast their current position with a time stamp and maintain neighbor tables to be updated with received data. Two-dimensional and uni-dimensional scenarios as urban and highway scenarios are considered with uniform distribution densities. Problems such as topology changes or disconnected networks are not treated.
Head of clusters are computed according to the prey location behavior of whales in the work of [
34]. The heuristic determines the optimal cluster formation, since the problem is NP-Hard. The revealed benefits of clustered-based solutions are reduced delay, scalability, no hidden node problems, and topology stability, among others. However, the vehicles must match the optimal speed and acceleration, while the iterative evolutive-like algorithm for cluster conformation must be run on every agent.
Open problems such as security in heterogeneous networks, non-standardization in car makers and local regulations, scalability, priority, and compatibility in future communication frameworks are explored in [
35]. The authors also classify routing protocols in VANETs as follows:
Topology-based protocols: Routing tables are created from the topology in the network. The same routes are maintained proactively or reactively, i.e., routes are calculated before being required or on-demand when required, respectively, or are locally proactive and externally reactive in hybrid scenarios.
Position-based protocols: Information regarding position and geographic location is required for every node. Data are sent at once from the source to the destination in the non-DTN mode; meanwhile, in DTNs, data are communicated when connectivity happens. In hybrid modes, data run through both non-delay-tolerant networks (non-DTNs) and delay-tolerant networks (DTNs).
Broadcast-based protocols: Packets are forwarded in multiple hops and delivered intentionally to all nodes in the network.
Cluster-based protocols: Groups of vehicles are formed (clusters) where receivers forward data to designated heads responsible for delivering data to every node in the cluster. This approach is used to deal with blind flooding; however, the objective is to forward packets to all nodes in the network, similar to a broadcast, and thus it is questionable whether this can be described as routing.
Geo-cast protocols: Destinations are computed by means of geographical locations.
Ross et al. [
36] define routing as follows:
… ‘the network-wide process that determines the end-to-end paths that packets take from source to destination’…
Note that it is unclear if broadcast and cluster-based message dissemination approaches might be considered as routing given their controlled or uncontrolled forwarding to every feasible node in the network, as opposed to the other approaches that determine paths according to their path discovery algorithms. Furthermore, forwarded data are valid only where and when they represent close and recent events, i.e., distant and outdated events might be redundant, currently invalid, and physically far enough away that they have no effect on the receivers; however, network overheads, bandwidth abuse, and the local waste of storage and decision-making can happen if the acquired data have no use.
2.3. Spatio-Temporal Studies
Events in physically dynamic environments, specifically with spatial constraints, are related to each other according to the first law of geography by Tobler [
37]:
… ‘everything is related to everything else, but near things are more related than distant things’…
Note that the same law is also applicable to more recent events in time. Thus, vehicular networks have an inherent interaction with their physical environment in which entities move; consequently, in addition to recent events that happen in time, the near spatial closeness of event also impacts the network behavior and current topology. Furthermore, the exchanged data describe these events. Therefore, the term spatio-temporal constraints in communication refers to the relationship between the space and time in which the events happen, and this needs to be communicated for the system to be useful.
In the literature, three basic behaviors and the combination of spatio-temporal phenomena in nature are presented: affectation, degradation, and propagation [
13,
14]. These behaviors are detailed in
Table 2, as well as analogue or equivalent bio-inspired behaviors examples:
Additionally to the spatio-temporal constraints, we state that spatio-temporal coupled entities are those that enable these constraints, i.e., they exist as message transmitters and receivers and share a region in space during a period of time, while feasible communication among them is achieved. If one condition, either space or time, is not satisfied, even if the other is satisfied, then the coupling is not achieved.
Finally, unlike routing and cluster approaches, previous knowledge among entities or discovery or location services is not mandatory, and the message receivers are determined by the space–time constraints, as in stigmergic communication, which is a type of indirect communication in which individuals take advantage of the environment by changing it [
38]. Social insects such as ants use stigmergic communication through pheromones by means of traces to food sources in a spatial way, and the pheromone will lasts as long as it is reaffirmed depending directly on the time validity of the food source [
9,
10]. Therefore, stigmergic communication through pheromones is considered a spatio-temporal behavior (degradation), as noted in
Table 2. Furthermore, communicating entities are defined through these spatio-temporal constraints; however, these entities become secondary as the due communication is established in order to achieve the common task of food retrieval or dissemination of emergency messages, in the cases of described social insects and vehicular networks, respectively [
11,
12].