Next Article in Journal
Flow-Induced Noise Characteristics Analysis of a Pipeline Structure in a Cabin Rigid Corner
Next Article in Special Issue
How Does the Built Environment Affect Drunk-Driving Crashes? A Spatial Heterogeneity Analysis
Previous Article in Journal
L-Band Erbium Fiber Laser with Tunable and Narrow Sub-kHz Linewidth Output
Previous Article in Special Issue
A Novel Dual Mixing Attention Network for UAV-Based Vehicle Re-Identification
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Clustering Routing Algorithm Based on Improved Ant Colony Optimization for an Urban Rail Transit Ad Hoc Network

1
School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, China
2
Traffic Control Technology Co., Ltd., Beijing 100071, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2023, 13(21), 11769; https://doi.org/10.3390/app132111769
Submission received: 28 July 2023 / Revised: 19 October 2023 / Accepted: 24 October 2023 / Published: 27 October 2023
(This article belongs to the Special Issue AI Techniques in Intelligent Transport Systems)

Abstract

:
As traffic pressure increases, urban rail transit has attracted attention because of its high speed and growing capacity in recent years. However, the traditional vehicle–ground communication systems of urban rail transit have been unable to meet the increasing requirements for communication. In this paper, we introduce an ad hoc network for urban rail transit to improve communication reliability, reduce end-to-end latency, and improve throughput of vehicle–ground communication. A novel clustering algorithm based on improved ant colony optimization is presented, which integrates various variables to elect cluster heads and adopts a low-latency queuing strategy. In addition, the algorithm can also replace the cluster heads adaptively to optimize the communication quality. Through the simulation results, the proposed algorithm can reduce the packet loss rate by about 60%, reduce the delay by about 50%, and improve the throughput by about 40% compared with the classical clustering routing protocol.

1. Introduction

With the rapid development of city size, urban rail transit becomes a critical way to release traffic pressure, which could provide large capacity and safe passenger services within medium-sized and large cities [1]. According to the statistical data, over 50% of people choose urban rail transit as their primary mode of travel. With the deep integration of new communication technologies and urban rail transit, such as 5G, vehicle-to-everything (V2X), and machine learning, the communication demands of urban rail transit will substantially grow [2,3].
How to ensure safe driving of the train is a significant problem [4]. The wireless communication system is an essential factor affecting the safety and efficiency of train operations. The traditional urban rail transit system commonly uses communication-based train control (CBTC), which has the characteristics of short departure intervals and high operating efficiency. However, more and more challenges in terms of reliable communication have been encountered by to CBTC systems due to their infrastructure, which includes multiple trackside equipment and central nodes. Central nodes are the fixed infrastructure along the trackside, such as access points in WLANs and base stations in LTE networks. Each terminal communicates with the station through central nodes, and the data packets are forwarded to the core network by the central nodes through cable or optical fiber. Therefore, the construction of a CBTC communication network relies on the central nodes, and the vehicle–ground communication is broken off when the central nodes are disturbed or destroyed, which causes problems such as emergency braking, delay, and suspension of trains [5]. In addition, the central nodes also increase the deployment and maintenance costs of trackside equipment and the core network. Based on this, decentralized networks have recently been researched.
An ad hoc network is a typical decentralized network formed by wireless nodes that can communicate without pre-existing infrastructure. They have been widely used in the internet of things, internet of vehicles, and satellite internet. The train autonomous circumambulate system (TACS) is a development direction of the urban rail transit system, which simplifies the trackside equipment and adopts the intelligent onboard controller as the core, achieving the autonomous and safe operational control of trains [6]. Therefore, it is necessary to utilize the ad hoc network to optimize the vehicle–ground network. By arranging communication nodes reasonably, key areas such as turnouts and curves can be covered, and essential information can be exchanged between each node directly, which realizes the robust and dynamic networking of trains, trackside nodes, and station nodes. Compared with the traditional urban rail communication network, the ad hoc network has the following advantages:
  • Decentralized network. Trains and trackside equipment can communicate directly under the ad hoc network without being forwarded by the central nodes;
  • Lower cost. Construction and maintenance costs of the base station and the core network can be reduced due to the simplification of the infrastructure, and the cost of deploying cables can also be reduced because of the wireless communication between each trackside node;
  • Lower time delay. Direct communication between trains and trackside equipment can reduce the time delay of forwarding;
  • Strong network robustness. Because of the cancellation of central nodes, damage to some nodes will not seriously affect the whole network’s performance, leading to the network having strong survivability.
Ad hoc networks can be divided into flat networks and hierarchical clustering networks [7]. Flat networks have a peer-to-peer structure, making it difficult to uniformly manage and maintain each node with the movement of nodes in an extensive network. Therefore, the flat topology results in the easy interruption of network links. In addition, each node under this topology maintains routes to all other nodes, resulting in high overheads and low network scalability.
Under the hierarchical clustering structure, the network is separated into groups called clusters. Each cluster contains one cluster head node and several member nodes. This architecture has two levels: all cluster head nodes constitute the upper-layer network, and normal nodes constitute the lower-layer network. The upper-layer network is responsible for forwarding the data and managing the nodes of the lower-layer network. The clustering structure has the following advantages: (1) Only the cluster heads form the backbone network, rustling in simple topology; (2) Only part of the network is affected when nodes are changed, making the topology more stable; (3) Only the cluster heads need to maintain route information, which reduces the network overhead.
Due to these advantages, researchers have proposed many clustering schemes. Low-energy adaptive clustering hierarchy (LEACH) is a critical and widely considered clustering protocol in ad hoc networks. LEACH chooses the cluster heads based on a random probability number and aims to reduce energy consumption in wireless sensor networks (WSNs). Because the wireless sensor node is battery-powered, an energy-efficient routing protocol should be considered in a WSN to extend network lifetime. Although LEACH has been proposed for a long time, it has also been researched widely in recent years and has good performance. CH-leach is proposed to optimize cluster head selection in ref. [8], which divides clusters by the k-means algorithm, and selects the node nearest to the cluster center as the cluster head. But the algorithm in ref. [8] only has one cluster head for each cluster, which may cause hot-zone problems, and its ability to combat network congestion is weak. To solve the problem, Wang proposed a non-uniform clustering algorithm based on LEACH, which selects double cluster heads to prolong the network lifetime [9]. Furthermore, machine learning algorithms have also been used to select cluster heads. In ref. [10], a genetic algorithm (GA) is utilized for optimal cluster-head selection in the LEACH protocol, which can extend the lifetime to about three times that of conventional LEACH. Another useful machine learning algorithm in these networks is the ant colony optimization algorithm, which can help to find the best route. Authors in ref. [11] used an improved ant colony optimization method to find optimal multi-hop paths according to the residual energy of the next hop node. To avoid unnecessary energy consumption, energy-efficient dynamic and adaptive state-based scheduling (EDASS) was proposed [12], which can dynamically switch nodes between four states of route, active, wait, and sleep, and in this way, highly efficient energy management can be achieved.
In addition to WSN, a vehicular ad hoc network (VANET) is another widely used type of network, which has the characteristics of strong mobility and rapid topology change. QMM-VANET is proposed in ref. [13], which considers quality-of-service (QoS) requirements, the distrust value parameters, and mobility constraints. To reduce the influence of vehicle movement, Luo took into account the location information of vehicles and divided geographical locations into grids for clustering [14]. A wireless body area network (WBAN) is another new ad hoc network which has been developed in recent years. The WBAN is based on the human body and composed of network elements related to the human body. Authors in ref. [15] proposed an efficient QoS-based multi-path routing (MPR) scheme for WBAN, which divided data traffic into normal and emergency types, and the emergency traffic is routed onto the best path.
In an urban rail transit scenario, ad hoc networks have often been used to monitor train operational status and the carriage environment. In ref. [16], a clustering algorithm was utilized to maximize the lifetime of the high-speed railway network under the WSN network. Another cluster algorithm was proposed in ref. [17], which was used to minimize and balance the energy consumption of nodes. However, nodes used for vehicle–ground critical service transmission are powered by cables, so there is no need to save node energy as in a WSN network. In addition, trackside nodes are distributed along tunnel walls, and only the train is moving, which is different from VANET. Therefore, a novel clustering routing protocol is needed to meet the needs of urban rail transit vehicle–ground communication.
In this paper, we adopt an ad hoc network for the urban rail transit system and propose a clustering algorithm based on improved ant colony optimization. The contributions of this paper are as follows:
  • An ad hoc network is deployed in an urban rail transit scenario, which can help to improve the robustness of the vehicle–ground network and the driving safety. Furthermore, urban rail transit is different from WSN or VANET, due to the fixed driving environment, power-suppliable nodes, and large data traffic;
  • A cluster-head selection strategy based on cost function is proposed to reduce packet loss rate, which can elect cluster head nodes periodically and change cluster head nodes according to the packet loss rate;
  • A low-delay queuing strategy based on service priority is proposed to reduce end-to-end delay, which can guarantee the time delay according to different service requirements;
  • An improved ant colony algorithm is proposed to find the best route from source node to destination node, which integrates the route length, search direction, and node load to find a path.
The rest of this paper is organized as follows. In Section 2, we introduce the communication network architecture. The proposed algorithm and the network flow are discussed in Section 3. Section 4 shows the simulation results for end-to-end delay, packet loss rate, and throughput, and compares the proposed algorithm with classic LEACH and the ad hoc on-demand distance vector (AODV). Finally, Section 5 concludes the paper.

2. The Network Architecture

2.1. In-Vehicle Network Architecture

Figure 1 shows the network topology in a carriage, and the in-vehicle network includes three types of nodes: service nodes, cluster head nodes, and sink nodes.
1.
Service nodes. Service nodes are responsible for bearing different services. Generally, urban rail transit services can be divided into security and non-security services. Security services are essential for the safe operation of the train, such as the operation control service, video monitoring service, emergency text service, and operating conditions monitoring service. Non-security services generally refer to passenger services with lower latency requirements, such as web browsing, video calls, and online games [18]. In this paper, we classify the services into three priorities according to the delay and reliability requirements: strict security service, sub-security service, and non-security service, as shown in Table 1.
2.
Cluster head nodes. As mentioned above, cluster heads are responsible for forwarding the service data and managing the cluster members, usually selected by a selection algorithm. In this study, we elected cluster heads considering comprehensively the factors affecting the time delay and packet loss rate. In addition, we also set a low-delay queuing strategy for the cluster head nodes. Under this strategy, cluster heads can always forward the high-priority services first.
3.
Sink nodes. Sink nodes are the superior nodes of cluster heads. They are deployed at the carriage’s top center, responsible for receiving data from cluster heads and then forwarding information to the trackside system. In the ad hoc network, each node works according to the method of time-division multiple access (TDMA). The sink nodes are responsible for issuing the schedule to avoid resource collision and network congestion.
Figure 1. In-vehicle network architecture.
Figure 1. In-vehicle network architecture.
Applsci 13 11769 g001
Table 1. The categories of urban rail services.
Table 1. The categories of urban rail services.
Security ServiceNon-Security Service
Strict Security ServiceSub-Security Service
Operation control system (OCS)Train operation status monitoring (TOSM)Passenger multimedia service
Operational voice communication system (OVC)Passenger information service (PIS)
Closed-circuit television (CCTV)

2.2. Vehicle-Ground Networking Architecture

The vehicle–ground network architecture is shown in Figure 2. We assume that the trackside nodes are randomly distributed along the tunnel wall, and the k-means algorithm is utilized to divide clusters. Assuming that the trackside nodes are x 1 , x 2 , x 3 , , x n the clustering process can be divided into the following steps:
  • Step 1: Determine the number of clusters, which is denoted as K. Then, randomly select K nodes as the center of each cluster, which are denoted as u 1 ( 0 ) , u 2 ( 0 ) , u 3 ( 0 ) , , u k ( 0 ) ;
  • Step 2: Calculate the loss function J ( c , μ ) = min i = 1 n x i μ c i 2 , where c i is the cluster for x i . Then, repeat Step 3 and Step 4 until cluster members do not change with the repetition;
  • Step 3: Assign x i to the cluster with the minimum J ;
  • Step 4: Recalculate cluster central nodes as u 1 ( 1 ) , u 2 ( 1 ) , u 3 ( 1 ) , , u k ( 1 ) ;
In Step 1, we depend on the sum of the square errors and cluster load to determine K, which can be expressed by the following formula:
S S E = i = 1 k p C f p u c i 2 ,
C L = i = 1 n c i L c i ,
where p is the cluster member of c i , L c i is the packet length of p . For K [ k 1 , k n ] , the value that can minimize the clustering evaluation value is selected as the number of clusters. The clustering evaluation value can be calculated by Equation (3):
E V = a 1 S S E + a 2 C L ,
where a 1 and a 2 are evaluation coefficients. Cluster load is an importance parameter in an urban rail transit scenario, which affects whether the network is congested, and square error is also a valuable evaluation parameter. Based on this, a 1 and a 2 are set to the same value in this paper. Therefore, we have a 1 = a 2 = 0.5 .
Similarly, the communication nodes in the vehicle–ground network system include relay nodes, cluster head nodes, and sink nodes.
  • Relay nodes. Relay nodes are responsible for forwarding the information from the vehicle to the trackside cluster heads. Unlike in-vehicle service nodes, relay nodes do not carry specific services but only play the role of the wireless relay. Each relay node has equal status and the same communication ability and can participate in cluster-head election.
  • Cluster head nodes. Cluster head nodes in the vehicle–ground network have the same function as in the in-vehicle network.
  • Sink nodes. In the in-vehicle network, sink nodes are deployed on the top center of the carriage, but in the vehicle–ground network, sink nodes are located at the stations. Sink nodes in the vehicle–ground network are responsible for forwarding the data from cluster heads to the core network. Considering the time delay, when the train is in the first-half area between two stations, the data packets are forwarded to the sink node of the previous station and vice versa to the sink node of the next station.
Figure 2. Vehicle–ground network architecture.
Figure 2. Vehicle–ground network architecture.
Applsci 13 11769 g002

3. The Proposed Algorithm

The proposed algorithm in this paper consists of cluster-head election, latency optimization methods, and an improved ant colony optimization method. In this section, the algorithm and the network flow are introduced in detail.

3.1. The Network Flow

The network flow can be divided into seven steps, described in Table 2.

3.2. Cluster-Head Election Strategy Based on Cost Function

Due to the characteristics of decentralization, each node in an ad hoc network can be the cluster head. Therefore, how to select a suitable node to be the cluster head and dynamically update it is a significant problem. A common method is to use multi-factor analysis to jointly evaluate the ability of each node as the cluster head. Based on this, we propose a cluster-head election strategy based on cost function (CHCF).
The algorithm comprehensively considers two variables: distance and packet loss rate. There are two types of distance: the distance between the node and the next hop, as shown in Equation (4), and the distance between the node and the cluster center, as shown in Equation (5). Note that the center node here is a virtual node based on the location information of cluster member nodes.
dis ( i ) = x i x next   2 + y i y next   2 + z i z next 2 ,
cen ( i ) = x i 1 N j = 1 N x j 2 + y i 1 N j = 1 N y j 2 + z i 1 N j = 1 N z j 2 ,
where dis ( i ) and cen ( i ) are the two separate types of distance. ( x i , y i , z i ) represents the coordinate of node i , ( x n e x t , y n e x t , z n e x t ) is the coordinate of the next hop node, and N refers to the node number in the cluster.
The packet loss rate is essential for communication reliability. In CHCF, the cluster head is re-elected each time period, which is denoted by T . At the end of each round, clusters calculate the average packet loss rate according to the packet number sent by the previous cluster and received by the current cluster head, as shown in Equation (6):
l o s s _ r a t e = 1 P a c k e t _ r e c e i v e P a c k e t _ s e n d .
We use the two variables to calculate each node’s cost value, and the node with the minimum cost value is elected as the cluster head. The specific calculation method is as follows:
C ( i ) = k 1 d i s ( i ) j = 1 n d i s ( j ) + k 2 c e n ( i ) j = 1 n c e n ( j ) , l o s s _ r a t e c t h r e s h o l d 1 , l o s s _ r a t e > c t h r e s h o l d ,
in which C ( i ) is the cost value and k 1 and k 2 are cost factors, which represent the influence level of different variables and have a relationship of k 1 + k 2 = 1 . In this paper, k 1 and k 2 are set as 0.5 and 0.5, respectively, considering the two factors are of equal importance. c t h r e s h o l d indicates the threshold of packet loss rate. After each network round, cluster heads compare the value of l o s s _ r a t e with c t h r e s h o l d . If l o s s _ r a t e > c t h r e s h o l d , the current cluster head is restored as a common node and is not elected in the next round. If l o s s _ r a t e c t h r e s h o l d , the current cluster head continues to be the cluster head in the next round. In this way, the reliability requirements of urban rail services can be guaranteed.

3.3. Low-Delay Queuing Strategy Based on Service Priority

Reducing the delay of delay-sensitive services in urban rail transit is a significant problem in guaranteeing secure driving. End-to-end delay consists of transmission, propagation, queuing, and processing delays. The propagation delay is related to the propagation distance. In Section 3.1, we use the distance factor when electing cluster heads to reduce the propagation delay. Queuing delay refers to the waiting time for service after packets arrive at the router, which is affected by router processing capacity and network congestion degree. When a data packet arrives at an overloaded node, a sizeable queuing delay is generated, and significantly affects the timely delivery of delay-sensitive services. Therefore, it is necessary to focus on a low-delay queuing strategy to guarantee meeting the delay requirements of different services [19].
This paper proposes a low-delay queuing strategy based on service priority (LDQSP). Assuming that the packet size of the same service and the processing capability of the routers are the same, and the arrival probability of data packets follows the Poisson distribution. The M/G/1 model in queuing theory is utilized to analyze the queuing time.
In traditional networks, data packets adopt the first-come-first-served method, which cannot optimize for service requirements. In LDQSP, data packets wait for packets being processed and packets with higher priority to complete processing before being served. Therefore, high-priority services can always be processed first, which can ensure the requirements of delay-sensitive services are met.
In queuing theory, λ refers to the average number of packets arriving at the queuing system per unit of time, and μ refers to the number of packets a router can process per unit of time. ρ indicates queuing strength, which meets ρ = λ / μ . To consider the service priority, we have Equation (8) according to the Pollaczek–Khintchine formula:
L Q = ρ 2 2 ( 1 ρ ) ,
in which L Q is the average queue length. Based on the Little theorem, the average queue time W Q should be:
W Q = L Q λ = ρ R 1 ρ ,
where R is the average remaining time of packets under processing when the current packets arrive. Therefore, the average time in the queue satisfies Equation (10):
W S = W Q + W B = ρ R 1 ρ + 1 μ ,
in which W B is the average process time for a packet.
Assuming that the service priorities in the network are ranked from high to low as 1 ,   2 ,   3 ,   ,   i ,   i + 1 ,   i + 2 ,   ,   n , when considering the service priority, the average queuing time of the service with priority i consists of three parts:
  • The remaining time of the packet being processed;
  • The waiting time of the packets already in the queue with higher priorities;
  • The waiting time for newly arrived packets with higher priorities in the waiting process.
Based on the analysis in ref. [20], W S ( i ) satisfies:
W S ( i ) = W Q ( i ) + W B ( i ) = j = 1 n ρ j R j ( 1 j = 1 i ρ i ) ( 1 j = 1 i 1 ρ i ) + 1 μ i .
Therefore, the end-to-end delay of the service with ith priority is as follows:
T a v g = W S ( i ) 1 + j = 2 n W S ( i ) j + j = 1 n t t r a n s ( i ) j ,
where t t r a n s ( i ) j is the propagation delay of the hop j , and W S ( i ) j is the average time in the queue of the hop j . Note that each cluster of the in-vehicle network is composed of service nodes with the same priority. W S ( i ) 1 and W S ( i ) j should be calculated by Equations (10) and (11), respectively.

3.4. The Ant Colony Optimization Method

After completing the cluster-head election, an effective routing algorithm is needed to complete the end-to-end communication from the train to the station. In the routing process, the source node and destination node are train and station, respectively, and the intermediate nodes are cluster heads. As a classical swarm intelligence algorithm, ant colony optimization (ACO) was first proposed in ref. [21], and is usually used to solve the problem of complicated combination optimization. Considering the similarity between finding the best route and ant colony foraging, an improved ACO algorithm is proposed in this section.
ACO uses the pheromone left by ants in foraging to find the optimal path. Pheromone is a substance left by ants on the path in the process of foraging, and ants can sense the pheromone intensity. Therefore, more ants pass along the path with stronger pheromone, and a positive feedback mechanism is formed, thereby gradually approaching the optimal path [22]. In the foraging process, the node with higher pheromone concentration has higher probability of being selected, but ants also choose the next hop based on higher heuristic information. Therefore, the next hop is determined according to the transition probability comprehensively calculated according to the pheromone concentration and heuristic information left on the current node path, which can be described by Equation (13) [21]:
p i j k ( t ) = [ τ i j ( t ) ] α [ η i j ( t ) ] β u J k ( i ) [ τ i u ( t ) ] α [ η i u ( t ) ] β , j J k ( i ) 0 , j J k ( i ) ,
where p i j k ( t ) is the transition probability of ant k from node i to node j at time t , τ i j ( t ) and η i j ( t ) are the pheromone concentration and heuristic information, respectively, α and β represent the importance of the pheromone concentration and heuristic information, and J k ( i ) indicates the optional node set of ant k at node i , which is the set of nodes that have not been visited. Based on Equation (13), ant k determines the next hop node until arriving at the destination node. After all ants arrive at the destination node, the shortest route is saved, and then the pheromone concentration of each route is updated. After a certain number of iterations, all ants tend to choose the same path, and the algorithm reaches convergence.
η i j ( t ) is usually calculated as 1 / d i j ( t ) in traditional ACO, in which d i j ( t ) is the distance between node i to node j at time t . Compared with other ad hoc networks, the urban rail transit scenario has the characteristics of linear distribution and huge data traffic; thus, specifying the routing direction and avoiding node congestion should be considered. In this paper, three factors are considered when calculating η i j ( t ) , as shown in Equation (14):
η i j ( t ) = a 1 n o r m [ 1 d i j ( t ) ] + a 2 n o r m [ 1 2 cos θ i j , i d ( t ) ] + a 3 n o r m [ ( 1 q j ( t ) ) ] ,
in which n o r m [ ] indicates the normalization operation, cos θ i j , i d ( t ) indicates the cosine value of the angle between edge i j and edge i d , where node d represents the destination node. Assume that the train moves from z 1 to z m , and the train’s position is z t at time t . Based on the assumption, q j ( t ) is the ratio of the number of times node j has been selected as the node on the best path in the process from z 1 to z t and the total path number from z 1 to z t . According to Equation (14), η i j ( t ) is constrained by d i j ( t ) , cos θ i j , i d ( t ) , and q j ( t ) , which influence the route length, search direction, and node load, respectively.
τ i j ( t ) is updated at the end of each iteration, according to Equation (15):
τ i j ( t + 1 ) = ( 1 ρ ( t ) ) τ i j ( t ) + k = 1 m Δ τ i j k ,
where ρ ( t ) is the pheromone volatilization factor and Δ τ i j k is the pheromone left by ant k on path i j . ρ and Δ τ i j k are improved by Equations (16) and (17):
ρ ( t + 1 ) = ρ ( t ) ( 1 e t ) ,
Δ τ i j k = Q L b e s t ( 1 q j ( t ) ) ,
in which Q is a constant and L b e s t represents the length of the best route. According to Equation (16), the pheromone volatilization factor gradually increases with the number of iterations, which can increase the search depth and avoid falling into local optimum. Compared with the traditional method Equation (17) adds the node’s load factor and can avoid selecting congested nodes during routing.

4. Simulation Results

This section presents the simulation results for end-to-end delay, packet loss rate, and throughput for the urban rail transit communication network under the proposed protocol. In order to validate the performance of our algorithm, we compare it with the LEACH clustering protocol and AODV routing protocol. LEACH utilizes random numbers to elect cluster heads periodically and AODV is an on-demand routing protocol based on node sequence number, and both are classical algorithms used in ad hoc networks.

4.1. Simulation Parameters

The simulation scenario is a typical tunnel within an urban rail transit system, which begins from one station and ends at the next station. The trackside nodes are randomly distributed along the tunnel wall, and the nodes in the train are also distributed randomly. Source nodes on the trackside are changed as the train moves, and destination nodes are located at the stations. Therefore, we only consider the simulation from the station to the middle of the tunnel, due to the symmetry on both sides of the tunnel.
The transmission power and the receiver sensitivity are set to10 dBm and −77 dBm, respectively. Each transceiver antenna’s gain is 5 dBi, and the frequency point is 2.4 GHz. The parameters above were obtained based on [23]. The parameters of the improved ACO algorithm are also given, which were obtained through a large number of experiments to confirm the best route. The parameters are summarized in Table 3.

4.2. Packet Loss Rate Results

The proposed algorithm utilizes CHCF and the improved ACO algorithm to elect cluster heads and find the best route, and is compared with the LEACH and AODV algorithms. The process was set so that each node had 1000 packets to be sent every round, and the network ran 500 rounds. The statistical packet loss rate results are shown in Figure 3.
Figure 3a shows that the packet loss rate obtained by the proposed algorithm is significantly lower than the packet loss rate obtained by LEACH and AODV, and the error bars of the average packet loss rate are shown in Figure 3b. In Figure 3b, the bars represent the mean value of packet loss rate from network round 1 to round 500, and the vertical line at the top of the bars represents the standard deviation of packet loss rate from network round 1 to round 500. The mean values of packet loss rate are 0.25% and 22.37% for the proposed algorithm and comparison algorithm, respectively. It can be seen from Figure 3b that the proposed algorithm has a smaller and more stable packet loss rate than LEACH and AODV. The reason is that the proposed algorithm comprehensively considers multiple factors to elect cluster heads each round. However, LEACH only elects cluster heads according to a random number in each round, and the node which has been the cluster head cannot continue to serve as the cluster head in the next round. Therefore, the cluster head elected by LEACH can only guarantee the minimum packet loss rate for a short time. In addition, LEACH may elect the nodes at the edge positions to be cluster heads, which leads to the result that the packet loss rate fluctuates widely in different rounds. In contrast, the proposed algorithm re-elects the cluster heads according to the packet loss rate during each round. Thus, a node with a packet loss rate higher than c t h r e s h o l d cannot be the cluster head in the next round. Therefore, the packet loss rate obtained by the proposed algorithm only fluctuates in a small range and always keeps a low value.
Considering the train is moving and the surrounding environment is constantly changing, it is necessary to validate the performance of the proposed algorithm under circumstances of different channel quality. In Figure 4, we depict the average packet loss when the train is at different positions and obtain the results for different channel qualities. The figure shows that the packet loss rate has an increasing trend, which is because the data packets are sent to the previous station as the train moves on. As the channel quality changes from good to bad, the received signal power decreases, and the packet loss rates of the proposed algorithm and the comparison algorithm both increase. However, the comparison algorithm is affected by channel quality and driving distance more seriously than the proposed algorithm. When the channel quality is bad, the maximum packet loss rate exceeds 20% for LEACH and AODV, while that for the proposed algorithm can still be below 10%. The reason is that as the train moves away from the station, the improved ACO algorithm can always find the best way depending on the shortest distance to neighboring nodes, routing direction, and node loads.

4.3. End-to-End Delay Results

Based on the cluster heads and the best route selected by the proposed algorithm, we compared LDQSP with non-LDQSP in the simulation of end-to-end delay, in which non-LDQSP is a queuing strategy following the principle of first-come-first-served, and the route is found by the improved ACO algorithm.
Figure 5a shows the relationship between end-to-end delay and arrival rate. Since the arrival rate represents the number of packets arriving per time unit, the network becomes more congested with the increase in arrival rate. It can be seen from the figure that as the network becomes congested, the end-to-end delay of all services increases and the delay of LDQSP is lower than that of non-LDQSP. Figure 5b shows the error bars of the mean of end-to-end delay. The bars in Figure 5b represent the mean values of end-to-end delay when the arrival rate gradually increases, and the vertical line at the top of the bars represents the standard deviation of end-to-end delay when the arrival rate gradually increases. It can be seen that LDQSP has less delay than non-LDQSP, especially for strict security safety, which is decreased by about 50% compared with non-LDQSP. The results confirm that our low-delay queuing strategy can significantly guarantee the high-priority services.
Figure 6 depicts the variation of end-to-end delay with driving distance. Similar to the packet loss rate results, the end-to-end delay also has an increasing trend, which is due to the increase in communication distance and hop numbers as the train moves away from the station. The result of LDQSP is lower than non-LDQSP, which is consistent with the results in Figure 5. Due to the optimization for different services in LDQSP, the delay has less fluctuation than that of non-LDQSP, which ensures the data packets can be delivered to the receiving end in time.

4.4. Throughput Results

The throughput of different services is compared in Figure 7. It can be seen from Figure 7 that the throughput of the proposed algorithm is larger than the throughput of LEACH and AODV, no matter what kind of service. The reason is that the proposed algorithm can achieve lower end-to-end delay and packet loss rate, enabling more data packets to be delivered in a certain time. With the increase in vehicle distance, the throughput gradually decreases, which is because the multiples hops influence the packet-delivery delay and the number of received packets. In addition, by observing the throughput of the three service types, it can be found that the strict security service has the smallest throughput, and the non-security service has the largest throughput, which is appropriate to the services’ characteristics. Non-security services are usually games, video, and other high data-traffic services, and from the simulation of throughput it can be seen that the proposed algorithm can guarantee high throughput.

4.5. Summary

The simulations above compare some key network parameters obtained by the proposed algorithm and the typical algorithms using LEACH and AODV. LEACH and AODV are important algorithms in ad hoc networks and have been widely used in recent years. But the urban rail transit scenario is different from the traditional ad hoc network, due to the linear deployment of nodes and there being no need to consider energy consumption, and to our knowledge there are few works focused on the ad hoc network routing algorithm in this scenario. It can be seen that in an urban rail transit scenario, the proposed algorithm has better performance in terms of packet loss rate, end-to-end delay, and throughput. In addition, the proposed algorithm can guarantee different service requirements according to the service characteristics in urban rail transit, such as reduced delay and packet loss rate for strict security services, greater throughput for non-security services, and better anti-congestion capability. Overall, the proposed algorithm is suitable for the urban rail transit scenario, and can provide better performance than other typical algorithms.

5. Conclusions

In this paper, a clustering algorithm based on an improved ant colony optimization algorithm is proposed, which can meet the communication requirements of next-generation urban rail transit systems with low delay and high reliability. The proposed algorithm includes the cluster-head election algorithm CHCF, low-delay queuing algorithm LDQSP, and a routing method based on improved ACO. CHCF elects cluster heads according to node cost. LDQSP enables cluster heads to implement different queuing strategies according to service priorities to ensure the end-to-end delay requirements of higher-priority services are met. Then, the improved ACO algorithm is used to find the best route under conditions of different train locations and wireless channel quality. Finally, the proposed algorithm was compared with the LEACH and AODV algorithms through simulation. The simulation results indicate that compared with the typical ad hoc network routing algorithms, the proposed algorithm in this paper can guarantee the different services’ requirements, reduce the packet loss rate and end-to-end delay about by 60% and 50%, respectively, and improve the network throughput by about 40% in an urban rail transit scenario.

Author Contributions

Conceptualization, Z.S.; Methodology, Z.S.; Software, Z.S.; Validation, Z.H.; Resources, Z.H.; Writing—original draft, Z.S.; Writing—review & editing, L.L.; Supervision, L.L.; Project administration, L.L.; Funding acquisition, X.X. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Beijing Natural Science Foundation under the grant [L211002].

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Because the data in this paper will continue to be used in the future, participants of this study do not allow the data to be publicly shared.

Conflicts of Interest

Author Xiao Xiao was employed by the company Traffic Control Technology Co., Ltd. Beijing. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

References

  1. Bao, X. Urban Rail Transit Present Situation and Future Development Trends in China: Overall Analysis Based on National Policies and Strategic Plans in 2016–2020. Urban Rail Transit. 2018, 4, 1–12. [Google Scholar] [CrossRef]
  2. Liu, Q.; Li, H.; Shang, W.-L.; Wang, K. Spatio-temporal distribution of Chinese cities’ air quality and the impact of high-speed rail. Renew. Sustain. Energy Rev. 2022, 170, 112970. [Google Scholar] [CrossRef]
  3. Shang, W.-L.; Chen, Y.; Bi, H.; Zhang, H.; Ma, C.; Ochieng, W.Y. Statistical Characteristics and Community Analysis of Urban Road Networks. Complexity 2020, 2020, 6025821. [Google Scholar] [CrossRef]
  4. Shang, W.-L.; Tao, X.; Bi, H.; Chen, Y.; Zhang, H.; Ochieng, W.Y. Audio Related Quality of Experience Evaluation in Urban Transportation Environments with Brain Inspired Graph Learning. IEEE Trans. Intell. Transp. Syst. 2023, 1–11. [Google Scholar] [CrossRef]
  5. Bi, H.; Shang, W.-L.; Chen, Y.; Wang, K. Joint Optimization for Pedestrian, Information and Energy Flows in Emergency Response Systems with Energy Harvesting and Energy Sharing. IEEE Trans. Intell. Transp. Syst. 2022, 23, 22421–22435. [Google Scholar] [CrossRef]
  6. Zhao, J.; Liu, J.; Yang, L.; Ai, B.; Ni, S. Future 5G-oriented system for urban rail transit: Opportunities and challenges. China Commun. 2021, 18, 1–12. [Google Scholar] [CrossRef]
  7. Walikar, G.A.; Biradar, R.C. A survey on hybrid routing mechanisms in mobile ad hoc networks. J. Netw. Comput. Appl. 2017, 77, 48–63. [Google Scholar] [CrossRef]
  8. Abushiba, W.; Johnson, P.; Alharthi, S.; Wright, C. An energy efficient and adaptive clustering for wireless sensor network (CH-leach) using leach protocol. In Proceedings of the 13th International Computer Engineering Conference (ICENCO), Cairo, Egypt, 27–28 December 2017; pp. 50–54. [Google Scholar]
  9. Wang, H.; Chang, H.; Zhao, H.; Yue, Y. Research on LEACH algorithm based on double cluster head cluster clustering and data fusion. In Proceedings of the IEEE International Conference on Mechatronics and Automation (ICMA), Takamatsu, Japan, 6–9 August 2017; pp. 342–346. [Google Scholar]
  10. Harun, H.B.; Islam, M.S.; Hanif, M. Genetic Algorithm for Efficient Cluster Head Selection in LEACH protocol of Wireless Sensor Network. In Proceedings of the International Conference on Advancement in Electrical and Electronic Engineering (ICAEEE), Gazipur, Bangladesh, 24–26 February 2022; pp. 1–6. [Google Scholar]
  11. Xiao, X.; Huang, H. A Clustering Routing Algorithm Based on Improved Ant Colony Optimization Algorithms for Underwater Wireless Sensor Networks. Algorithms 2020, 13, 250. [Google Scholar] [CrossRef]
  12. Khan, M.N.; Rahman, H.U.; Khan, M.Z.; Mehmood, G.; Sulaiman, A.; Shaikh, A.; Alqhatani, A. Energy-Efficient Dynamic and Adaptive State-Based Scheduling (EDASS) Scheme for Wireless Sensor Networks. IEEE Sens. J. 2022, 22, 12386–12403. [Google Scholar] [CrossRef]
  13. Fatemidokht, H.; Rafsanjani, M.K. QMM-VANET: An efficient clustering algorithm based on QoS and monitoring of malicious vehicles in vehicular ad hoc networks. J. Syst. Softw. 2020, 165, 110561. [Google Scholar] [CrossRef]
  14. Luo, Y.; Zhang, W.; Hu, Y. A New Cluster Based Routing Protocol for VANET. In Proceedings of the 2nd International Conference on Networks Security, Wireless Communications and Trusted Computing, Wuhan, China, 24–25 April 2010; pp. 176–180. [Google Scholar]
  15. Mehmood, G.; Khan, M.Z.; Bashir, A.K.; Al-Otaibi, Y.D.; Khan, S. An Efficient QoS-Based Multi-Path Routing Scheme for Smart Healthcare Monitoring in Wireless Body Area Networks. Comput. Electr. Eng. 2023, 109, 108517. [Google Scholar] [CrossRef]
  16. Ma, X.; Dong, H.; Liu, X.; Jia, L.; Xie, G.; Bian, Z. An Optimal Communications Protocol for Maximizing Lifetime of Railway Infrastructure Wireless Monitoring Network. IEEE Trans. Ind. Inform. 2018, 14, 3347–3357. [Google Scholar] [CrossRef]
  17. Sheng, B.; Sun, G.-X. Optimal Energy Resources Allocation Method of Wireless Sensor Networks for Intelligent Railway Systems. Sensors 2020, 20, 482. [Google Scholar]
  18. Fang, Z.-Y.; Cheng, Q.-X.; Ruo, J.; Liu, Z.-Y. Urban rail transit demand analysis and prediction: A review of recent studies. In Proceedings of the International Conference on Intelligent Interactive Multimedia Systems and Services, Gold Coast, Australia, 20–22 June 2018; Springer: Cham, Switzerland, 2018; p. 98. [Google Scholar]
  19. Phung-Duc, T.; Akutsu, K.; Kawanishi, K.I.; Salameh, O.; Wittevrongel, S. Queueing models for cognitive wireless networks with sensing time of secondary users. Ann. Oper. Res. 2021, 310, 641–660. [Google Scholar] [CrossRef]
  20. Adan, I.; Resing, J. Queueing Theory; Eindhoven University of Technology: Eindhoven, The Netherlands, 2002. [Google Scholar]
  21. Colorni, A.; Dorigo, M.; Maniezzo, V. Distributed optimization by ant colonies. In Proceedings of the 1st European Conference on Artificial Life, Paris, France, 11–13 December 1991; p. 142. [Google Scholar]
  22. Luo, R.; Zheng, H.; Guo, J. Solving the Multi-Functional Heterogeneous UAV Cooperative Mission Planning Problem Using Multi-Swarm Fruit Fly Optimization Algorithm. Sensors 2020, 20, 18. [Google Scholar] [CrossRef] [PubMed]
  23. IEEE Std 802.11-2020 (Revision of IEEE Std 802.11-2016); IEEE Standard for Information Technology—Telecommunications and Information Exchange between Systems—Local and Metropolitan Area Networks—Specific Requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE: Piscataway, NJ, USA, 2021.
Figure 3. The statistical packet loss rate: (a) Packet loss rate of each round; (b) The error bars of the mean value of packet loss rate.
Figure 3. The statistical packet loss rate: (a) Packet loss rate of each round; (b) The error bars of the mean value of packet loss rate.
Applsci 13 11769 g003
Figure 4. The average packet loss rate at different positions.
Figure 4. The average packet loss rate at different positions.
Applsci 13 11769 g004
Figure 5. The statistical end-to-end delay: (a) End-to-end delay of different arrival rates; (b) The error bars of the mean value of end-to-end delay.
Figure 5. The statistical end-to-end delay: (a) End-to-end delay of different arrival rates; (b) The error bars of the mean value of end-to-end delay.
Applsci 13 11769 g005
Figure 6. End-to-end delay at different positions.
Figure 6. End-to-end delay at different positions.
Applsci 13 11769 g006
Figure 7. Throughput at different positions.
Figure 7. Throughput at different positions.
Applsci 13 11769 g007
Table 2. Network flow.
Table 2. Network flow.
StageFunction
Step 1: Initial phaseInitialize the network. At this time, all nodes do not belong to any cluster.
Step 2: Flooding phaseAll nodes in the network broadcast data packets containing their service type, geographic location, and IP address until each node knows the other nodes’ information.
Step 3: Clustering phaseIn-vehicle network: The service nodes with the same service type form a cluster, calculate the cost value based on the method in Section 3.2, and broadcast it in the cluster.
Vehicle–ground network: Nodes are clustered by the k-means method. Then, the cost value is calculated based on the method in Section 3.2 and broadcasted in the cluster.
Step 4: Cluster-head electing phaseThe node with the minimum cost becomes the cluster head. The selected information is broadcasted in the network.
Step 5: Routing phaseThe best route is selected according to the improved ACO method in Section 3.4.
Step 6: Working phaseThe member nodes and cluster heads start to work. Each cluster head node forwards data according to the method in Section 3.3.
Step 7: Finish phaseWhen the network finishes a round, restart the network from Step 3.
Table 3. Simulation parameters.
Table 3. Simulation parameters.
ParameterValue
Parameters of vehicle–ground communicationCarrier frequency2.4 GHz
Data rate20 Mbps
Transmit power10 dBm
Tx Antenna gain5 dBi
Rx Antenna gain5 dBi
Receiver sensitivity−77 dBm
Parameters of the improved ACO algorithm α , β 1, 10
α 1 , α 2 , α 3 0.5, 0.3, 0.2
Q 1
ρ ( 0 ) 0.8
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Su, Z.; Xiao, X.; Han, Z.; Liu, L. A Clustering Routing Algorithm Based on Improved Ant Colony Optimization for an Urban Rail Transit Ad Hoc Network. Appl. Sci. 2023, 13, 11769. https://doi.org/10.3390/app132111769

AMA Style

Su Z, Xiao X, Han Z, Liu L. A Clustering Routing Algorithm Based on Improved Ant Colony Optimization for an Urban Rail Transit Ad Hoc Network. Applied Sciences. 2023; 13(21):11769. https://doi.org/10.3390/app132111769

Chicago/Turabian Style

Su, Zhaoyang, Xiao Xiao, Zijie Han, and Liu Liu. 2023. "A Clustering Routing Algorithm Based on Improved Ant Colony Optimization for an Urban Rail Transit Ad Hoc Network" Applied Sciences 13, no. 21: 11769. https://doi.org/10.3390/app132111769

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop