SAFE-MAC: Speed Aware Fairness Enabled MAC Protocol for Vehicular Ad-hoc Networks
Next Article in Journal
A Flexible and Highly Sensitive Inductive Pressure Sensor Array Based on Ferrite Films
Next Article in Special Issue
Preamble-Based Adaptive Channel Estimation for IEEE 802.11p
Previous Article in Journal
A Distributed Approach for Collision Avoidance between Multirotor UAVs Following Planned Missions
Previous Article in Special Issue
An Interest-Based Approach for Reducing Network Contentions in Vehicular Transportation Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

SAFE-MAC: Speed Aware Fairness Enabled MAC Protocol for Vehicular Ad-hoc Networks †

by
Md. Abubakar Siddik
1,
Shafika Showkat Moni
2,
Mohammad Shah Alam
1,3,* and
William A. Johnson
3
1
IICT, Bangladesh University of Engineering and Technology, Dhaka 1000, Bangladesh
2
Department of Computer Science, University of Kentucky, Lexington, KY 40506, USA
3
Department of Computer Science, Tennessee Technological University, Cookeville, TN 38505, USA
*
Author to whom correspondence should be addressed.
This paper is an extended version of the conference paper: Siddik, M.A.; Moni, S.S.; Alam, M.S. An efficient MAC protocol for provisioning fairness in vehicle to roadside communications. In Proceedings of the 2016 9th International Conference on Electrical and Computer Engineering (ICECE), Dhaka, Bangladesh, 20–22 December 2016.
Sensors 2019, 19(10), 2405; https://doi.org/10.3390/s19102405
Submission received: 1 April 2019 / Revised: 16 May 2019 / Accepted: 21 May 2019 / Published: 26 May 2019
(This article belongs to the Special Issue Vehicular Network Communications)

Abstract

:
Highly dynamic geographical topology, two-direction mobility, and varying traffic density can lead to fairness issues in Vehicular Ad-hoc Networks (VANETs). The Medium Access Control (MAC) protocol plays a vital role in sharing the common wireless channel efficiently between vehicles in a VANET system. However, ensuring fairness between vehicles can be a challenge in designing MAC protocols for VANET systems. The existing protocol, IEEE 802.11 DCF, ensures that the packet transmission rate for a particular vehicle is directly proportional to the amount of time a vehicle spends within a service area, but it does not guarantee that faster vehicles will be able to send the minimum number of packets. Other existing MAC protocols based on IEEE 802.11 are able to provide a minimum amount of data transmission regardless of velocity, but are unable to provide an amount of data transmission that is more proportionate to the time a vehicle spends in the service area. To address the above limitations, we propose a Speed Aware Fairness Enabled MAC (SAFE-MAC) protocol that calculates the residence time of a vehicle in a service area by using mobility metrics such as position, direction, and speed to synthesize the transmission probability of each individual vehicle with respect to its residence time. This is achieved by dynamically altering the values of parameters such as minimum contention window, maximum backoff stage, and retransmission limit in the MAC protocol. We then develop an analytical model to compare the performance of our proposed protocol with contemporary MAC protocols. Numerical analysis results show that our proposed protocol significantly improves fairness among the speed-varying vehicles in VANET.

1. Introduction

Academia, transportation services, and the automotive industry have long awaited the realization of a completely autonomous VANET system that can prevent collisions, reduce wasteful driving, stay up to date with real time traffic information, and provide streaming entertainment to commuters. VANET are a subset of Mobile Ad-hoc Networks (MANETs) that offer a promising avenue towards these goals [1]. VANET is implemented via Vehicle to Vehicle (V2V), Vehicle to Infrastructure (V2I), and Vehicle to hand held Device (V2D) communications. These communications can be referred to collectively as Vehicle to Anything (V2X) communications [2]. In its early stages, VANET was only proposed for safety applications [3]. More recently however, VANET has been applied to more general features such as traffic safety, traffic information, and infotainment [4]. Safety applications include a variety of detection, warning, and avoidance mechanisms to prevent road accidents. Non-safety applications include passenger infotainment, driving assistance, and traffic efficiency and management systems [5,6,7,8]. The major requirements of safety applications are low latency and high reliability. High throughput is the major concern for non-safety applications.
Unique characteristics of VANET systems include highly dynamic geographic topology, predictable two-direction random mobility, strict delay constraints, varying node density, and rapid joining and leaving rate. While these characteristics distinguish VANET as a unique research field within MANET [4,5,9,10,11,12,13,14], they also impose several constraints onto MAC protocol design. Important goals in designing a MAC protocol for VANET are fairness, Quality of Service (QoS), reliability, time-bound delivery, robustness, distributed, and on demand channel access, among others [10]. Due to the use of a single radio channel, the MAC protocol is of paramount importance in VANET systems. The MAC protocol is responsible for sharing the common medium among the contending nodes. The primary goal of an efficient MAC protocol is to fairly share common resources such as bandwidth, and access time among participating nodes, while also maximizing throughput and minimizing access delays.
Due to the relative velocity between nodes (vehicle and Road Side Unit (RSU)), as well as different velocities of the vehicles within the service area of an RSU, the residence time of different vehicles can vary widely. This can adversely affect the chance of communication of a vehicle within the RSU. Vehicles may not be able to get the information that they want or need within an acceptable time without disturbing others. We refer to this as the fairness problem. With respect to only safety applications, all vehicles need a similar chance to transmit data. This requirement is defined by absolute fairness and is ensured by a modified IEEE 802.11-based MAC scheme [3]. To support safety and non-safety applications, high velocity vehicles will require a minimum chance to communicate to the RSU, such that they can at least complete the safety information. Other vehicles will also need chances proportional to their residence time so that they may communicate with the RSU effectively. This relative fairness is called proportional fairness [15,16].
The IEEE 802.11p standard [17] defines MAC and PHY layer specifications for VANET. It uses a MAC layer that is adopted from the IEEE 802.11e EDCA standard. The IEEE 802.11e EDCA provides service differentiation and QoS. In EDCA, the node separates its arrival traffic into four categories based on priority. Each category is called an Access Category (AC). Performance analysis of this protocol shows greater QoS than IEEE 802.11 DCF [18]. Service differentiation in IEEE 802.11p when providing QoS is not effective. This is because faster vehicles with high priority service may not be able to gain the data transmission, they need due to their low residence time. Instead, slower vehicles with lower priority may still easily communicate with the RSU. As a result, service prioritization is disturbed. Therefor in VANET, the residence time of vehicles has great impact on the achievement of QoS. Since the IEEE 802.11 DCF protocol has achieved some widespread popularity in WLANs, it seems to be a promising choice for V2I communications in VANET. In [19], V. Nguyen et al. discuss about different types of MAC protocols which are based on IEEE 802.11p. Their protocols use dynamic interval schemes to enhance throughput and reduce access delay.
The IEEE 802.11 standard MAC protocol [20] does not provide a minimum chance for high velocity vehicles to communicate with RSU, because the same MAC parameters are utilized by all vehicles. As a result, this protocol is not suitable for safety applications. The protocol provides a certain chance that is proportional to residence time for all vehicles. This makes it more applicable to non-safety applications. A modified IEEE 802.11 DCF based fair access MAC scheme is proposed in [3] that ensures absolute fairness by providing equal chance for all vehicles to communicate with the RSU. This protocol assumes that all vehicles will only transmit safety messages. As a result, absolute fairness is not afforded to both safety and non-safety applications.
To resolve this issue, we proposed a Speed Aware Fairness Enabled MAC (SAFE-MAC) protocol based on IEEE 802.11 DCF for V2I communications. Utilizing residence time, our protocol groups all vehicles into three batches. By considering their own position, direction, and velocity after a certain time interval, each vehicle calculates a batch number. Vehicles then use this batch number to adjust the MAC parameters to suit their respective batch. If a vehicle’s velocity changes, it can recalculate its batch number to suit its new velocity. This allows every vehicle the chance to enter into the high priority batch. Based on the analytical model, our protocol sets MAC parameters for each batch individually. This ensures that faster vehicles will be afforded some minimum number of messages, while message transmission rate of other vehicles is directly proportional to their residence time. As far as we are aware, there exists no other efficient MAC protocol that can provision proportional fairness in V2I communications while also realizing the requirements to support both safety and non-safety applications. A preliminary version of this work was presented in [21].

1.1. Contributions of the Paper

The main contributions of this paper, building on a complete description of MAC protocol for provisioning fairness, are summarized as follows:
  • We propose and design a Speed Aware Fairness Enabled MAC (SAFE-MAC) protocol to ensure fairness in V2I communications.
  • We introduce a new algorithm to calculate residence time of a vehicle in the service area of a RSU using direction, position, and speed of vehicles for both straight road and intersection road scenarios.
  • We propose a new batch selection and update algorithm which uses instantaneous residence time of the vehicles to ensure proportional fairness.
  • We develop an analytical model using 2-D Markov chain and derive some equations from this model for the proposed SAFE-MAC protocol under consideration for both saturated and non-saturated conditions of the vehicle queue.
  • We evaluate our proposed protocol in terms of collision probability, channel idle probability, successful probability, packet drop probability, transmission probability, normalized throughput, and total normalized throughput while considering a dense network that resembles an urban scenario. We also investigate the effect of vehicle density on the total normalized throughput.
  • Last but not least, we present a comprehensive view of the comparisons that describes the percentage of transmitted packets of different batches under different MAC protocols including the proposed SAFE-MAC protocol.

1.2. Organization of the Paper

The rest of the paper is organized as follows: Background of vehicular communications is discussed in Section 2. Problem statement is outlined in Section 2.3. In Section 3 brief discussion of previous work of fairness problem is presented. The proposed SAFE-MAC protocol that distributes fairness is described in Section 4. Section 5 derives the analytical model that carry out the performance analysis of the network solving fairness problem in a non-saturated state. Section 6 shows the numerical results of the model derived in Section 5. Finally, Section 7 concludes this paper.

2. Background

In this section, we review the architecture and the components of the network of vehicular communications. We also discuss our problem statement and the fairness issues in resource allocation.

2.1. VANET System Architecture and Components

VANET utilizes two Service Sets (SS) toward network handling. The first is called the Basic Service Set (BSS) and is used in the communication between RSU and On Board Units (OBUs). The second is known as the Independent Basic Service Set (IBSS), and it supports communications between two nodes in a mesh network such as V2V communications. Figure 1 represents the RSU communication zones. The OBUs move between communication zones and exchange information with RSUs. To define different WLAN communication zones, each SS uses a unique identifier. Vehicles must associate with only one SS at a time. VANET specifies different types of DSR devices such as (a) OBUs with Global Positioning Systems (GPS) receivers located inside the vehicle (b) stationary RSU placed along the roadside, and (c) hand-held devices that are carried by pedestrians, cyclists, roadside workers, and/or driver passengers. RSUs are typically established in an elevated position on existing transport infrastructure i.e., traffic light, road sign, etc.

2.2. Fairness in Resource Allocation

Fairness is a broad concept in communication systems. MAC protocols are responsible for sharing common resources fairly among participating nodes. Unfair resource allocation among different individuals could cause resource waste and starvation as well as redundant resource allocation. It is also important to note what characterizes the fairness that we are interested in. Fairness can be seen from different perspective such as targeted or resultant fairness, short-term or long-term fairness, and system or individual fairness [22].
Another attribution of fairness is absolute or relative. Absolute fairness is defined as a situation in which each node has precisely the same amount of resources (time, throughput, etc) as every other node in the network. It is measured by either the Jain fairness indexed proposed by Jain et al. [23] or the entropy function introduced by Shannon [24]. Since different traffic types have different requirements based on their velocities, absolute fairness is not a very useful measure. Relative fairness is a better method to quantify fairness, because it accounts for however many of the individual requirements are taken into account. Overall relative fairness is then calculated by comparing how fulfilled the individual requirements are. There are two types of relative fairness: max–min fairness and proportional fairness. Max–min fairness is characterized by nodes with a smaller number of packets fulfilling all of their demand, while nodes with a larger number of packets having to share the remainder of the capacity equally [25]. Conversely, proportional fairness tries to keep a balance between maximizing network throughput while also allowing a minimum level of service to all nodes [15,16]. This criterion also favors nodes with a smaller number of packets, but it does not favor them as heavily as max-min fairness does.

2.3. Problem Statement

VANET can be uniquely characterized by highly dynamic geographic topology, predictable two-direction mobility, and varying vehicle density. All of these characteristics allow for a problem in fairness. The fairness problem can be defined as the case where higher velocity vehicles do not have enough chance to perform V2I communications or V2V communications with lower velocity vehicles. To allow for both safety and non-safety applications, we must ensure proportional fairness among the contending vehicles. In this paper, our goal is to design an efficient MAC protocol which can ensure proportional fairness of the networks.

3. Previous Works

The fairness issue with respect to faster vehicles has been explored for V2I scenarios [3,26,27,28,29,30,31] and for V2V scenarios in [32]. In [32], W. Alasmary et al. propose two dynamic CW-based mechanisms to reduce degradation of performance due to different velocities of vehicles. They do not, however, describe any processes to select an optimal contention window size to avoid the fairness problem. E. Karamad et al. propose a modified IEEE 802.11 DCF based MAC protocol in [3] that can dynamically assign a minimum contention window to vehicles of each batch by adjusting transmission probability with respect to speed. This minimum contention window is assigned at the beginning of access, and is utilized for the entire duration of access time. [3] ensures absolute fairness in the case that the network is in a state of saturation. It also derives relations between average velocity and minimum contention window for each batch by utilizing analytical approximations. The performance model for this model is based on the Bianchi model [33], and has the following assumptions:
  • Every node of the network always has at least one packet to transmit.
  • There are no hidden or exposed terminals in the network, and there is no capture effect.
  • Each packet collides with constant probability that is independent of the node state and other packets.
  • Transmission channel is ideal and transmission errors occur due to packet collision only.
In [26], Q. Wu et al. analyzed the performance of a MAC protocol proposed by E. Karamad et al. [3] in a saturated network state. [26] also derives the relationship between the minimum contention window size of a vehicle and the transmission probability, and the relationship between minimum contention window size of a vehicle in a network saturated state, and the average velocity. Both authors [3,26] assume the following concerning network model:
  • Vehicles arrive in the service area of an RSU in batches with respect to Poisson process with constant arrival rate.
  • The vehicles in each batch have the same average velocity which stays the same throughout the entire duration of the residence time of a particular RSU.
  • Vehicles do not change direction, and batch numbers stay fixed for each vehicle during the entire residence time.
Both authors [3,26] ensure the absolute fairness of the network, but they do not guarantee the proportional fairness of the network. This is appropriate for safety applications, but does not allow for non-safety applications.
In [27], V. P. Harigovindan et al. ensure equal opportunity for vehicles of different average speed in the service area of an RSU by deriving the analytical expression for optimum CW. They do not however analyze the performance of the network in both saturated and non-saturated states. Although this protocol can achieve absolute fairness, it does not consider the proportional fairness that we require for safety and non-safety applications.
To address the fairness problem of V2I communications, Hoeft et al. [28] proposed an algorithm to select RSU for OBUs. This algorithm minimizes the variation of OBUs connect to each RSU. However, they do not solve the fairness problem among vehicles with different velocities for a particular RSU. In [29], Zhang et al. build a Mixed Service Mobility (MSM) model for the IEEE 802.11p scheme to analyze the interactions between delay-tolerant services and real-time services under high speed mobility conditions. This contrasts heavily with the four different Access Categories defined by the IEEE 802.11p standard. While [29] achieves long term fairness for delay-tolerant services, they do not achieve fairness for real time services. In [30], S. A. Hussain et al. proposed a RSU-based efficient channel access scheme for VANETs under high traffic and mobility conditions. It dynamically adapts the contention window of each vehicle based on its deadline of departure from the range of RSU. The contention window for higher priority packets is varied slowly and vice versa for lower priority ones. However, their protocol ignores the case where changes may occur in Early Deadline First (EDF) (i.e., from low to high or high to low) due to a change in vehicle’s velocity or direction. It is also observed that a poor Jain’s fairness index is achieved for low to moderate traffic density. A velocity-adaptive V2I fair-access scheme based on IEEE 802.11 DCF for platooning vehicles is proposed in [31]. Their scheme achieves absolute fairness by varying Contention Window (CW) according to the velocity.
In this paper, we consider two important issues in designing an Speed Aware Fairness Enabled MAC (SAFE-MAC) protocol: high residence time variation among contending vehicles and vehicular communications for safety and non-safety applications. We believe that these issues can be solved by the applications of proportional fairness. To the best of our knowledge, we are the first to design an efficient MAC protocol for VANET systems to provision proportional fairness. In this way, we support both safety and non-safety applications.

4. Proposed Speed Aware Fairness Enabled MAC (SAFE-MAC) Protocol

In this section, the proposed SAFE-MAC is presented in detail. Assumptions and the system model of the proposed SAFE-MAC protocol are discussed.

4.1. System Model and Assumptions

In this paper, we consider a simple traffic model in which vehicles travel along a straight path with an intersection with bidirectional traffic covered by AP or RSU at a fixed position on either the road divider or along the road side as shown in Figure 2. The traffic model allows vehicles to change their direction and speed. Our network model groups vehicles into three classes based on their residence time.
  • Vehicles will arrive in an RSU service area according to a Poisson process and there will be no transmission error due to defective channels.
  • Vehicle to RSU links are symmetric and the effects of hidden terminals, exposed terminals, and channel capture are ignored.
  • Vehicles are able to measure their own positions, moving directions, and speeds.
  • Two non-overlapping channels are used by neighboring RSUs, and these channels will not interfere with each other.
  • Vehicles are equipped with IEEE 802.11 enabled communication devices.
  • All vehicles and RSUs have some unique identification number.
  • Within the service area of an RSU, the RSU and the vehicles operate at the same frequency.
  • Errors may occur because of packet collisions. We define a packet collision to be the case when two packets arrive at the same vehicle or RSU at the same time.
In assumption 2, the effects of hidden terminals, exposed terminals, and channel capture are ignored. These three dominant MAC layer issues are extensively studied in [34,35,36]. Overall throughput of the system is degraded for the presence of hidden terminal and exposed terminal in the network. Throughput is increased when capture effect is considered in the network. However, we do not consider hidden or exposed terminals because we try to find out the sole impact of MAC parameters on the performance of SAFE-MAC protocol. We also ignore the channel capture effect, a mechanism that auto-corrects some of the packet collisions, to allow us in measuring the actual packet collisions due to MAC parameter alone. The two contemporary protocols that we compared our proposed SAFE-MAC protocol with, also do not consider the hidden terminal, exposed terminal and capture effect.

4.2. Proposed SAFE-MAC Protocol

The proposed SAFE-MAC protocol is a channel access mechanism specifically designed to avoid the fairness problem which is shown at the MAC layer. It is based on IEEE 802.11 DCF. It groups all the vehicles in one RSU service area into three batches. These batches are denoted as Batch 1, Batch 2, and Batch 3. Each batch’s vehicles are organized into a queue, and independently contend for transmission with the RSU. Requirements of safety and non-safety applications for VANET are extensively studied in [37]. Authors have discussed safety and non-safety applications separately because they used multi-channel MAC protocol based on IEEE 802.11p standard. Although multi-channel MAC protocol have higher performance than that of single-channel MAC protocols. We have considered a single-channel MAC protocol based on IEEE 802.11 because of low cost, less complexity, and popularity. IEEE 802.11 DCF do not consider service differentiation. In our proposed MAC, both safety and non-safety applications can be applicable. If both safety and non-safety messages are generated at the same time in one vehicle, and the channel is accessed successfully by that vehicle, safety application messages will be transmitted first followed by the non-safety messages. When vehicles enter the service area of an RSU, they perform the following steps to communicate with the RSU:
  • At first, every vehicle will enter into the service area of a particular RSU and associate with that RSU.
  • Vehicles will compute their moving direction, speed, and position within the network using a GPS receiver on their OBUs. Vehicles will then compute their residence time using Algorithm 1. Based on their residence time, vehicles will be associated as a member of Batch i. The detailed procedure of batch selection and batch update are given in Algorithm 2.
  • Every vehicle will listen to the channel to determine if it is idle. In the case that the time the channel sits idle reaches the DIFS time for a particular vehicle, that vehicle will enter the backoff procedure and execute steps from 5.
  • If the channel is perceived to be busy, the vehicle will do nothing and continue to listen to the channel for idleness. In the case that the time that the channel has been idle reaches the DIFS time for a particular vehicle, that vehicle will execute steps from 5.
  • Every vehicle will check the queue. If the vehicle has at least one packet in the queue, the backoff instant will enter the backoff procedure. If the vehicle has no packets to transmit, the backoff instant will enter into the post-backoff procedure.
  • In the post-backoff procedure, the backoff instant of the vehicles will start a backoff counter with an initial value randomly selected from [ 0 , W i , 0 - 1 ] , where W i , 0 = C W m i n ( i ) . After this, the vehicle will execute the steps from 8.
  • In the backoff procedure, the backoff instant of the vehicle will start a backoff counter with an initial value randomly selected from [ 0 , W i , 0 - 1 ] , where W i , 0 = C W m i n ( i ) . After this, the vehicle will execute the steps from 10.
  • During the post-backoff procedure, if the channel is perceived to be busy and the queue becomes empty, the backoff counter will stop at its current value. When the channel has become idle and stayed that way for DIFS time, the backoff counter will resume. If the channel is perceived to be idle in a time slot ( σ ) and the queue becomes empty, the backoff counter will be decremented by one. When the backoff counter reaches zero, the queue will wait to receive a packet, and wait a predefined time interval. After this, the vehicles will execute from 2.
  • During the post-backoff procedure, if the channel is perceived to be busy and the queue has at least one packet to transmit, the backoff instance moves to the backoff procedure without changing the backoff counter. If the channel is perceived to be idle and the queue has at least one packet to transmit, the backoff instant moves to the backoff procedure and the backoff counter will be decremented by one. After that, the vehicle continues to the next steps.
  • During the backoff procedure, if the channel is perceived to be busy, the backoff counter will stop at its current value and the vehicle will continue to listen on the channel until the channel has been idle for up to the DIFS time. After this, the backoff counter will resume. Then If the channel is perceived to be idle in a time slot ( σ ), the backoff counter will be decremented by one. When the backoff counter reaches 0, the packet will be transmitted.
  • If the transmission is successful, the vehicle executes the steps from 2.
  • If the vehicle is not successful in sending its packet, the packet will be retransmitted. At the end of the retransmission, the backoff instant of the vehicle will start a new backoff counter, setting its value randomly from [ 0 , W i , j - 1 ] , where W i , j = 2 j × C W m i n ( i ) and j is the number of retransmission. After this, the vehicle executes the steps from 2.
  • If the value of W i , j reaches C W m a x ( i ) , the backoff instant keeps the contention window size C W m a x ( i ) . Then the vehicle will try to retransmit up to the retransmission limit ( m i + x i ) without changing the contention window size using step 10. After the ( m i + x i + 1 ) times unsuccessful transmissions, the packet will be dropped and the vehicle will execute steps from 2.
  • When the residence time of the vehicle becomes zero, the vehicle will exit from the service area of the RSU and continue the above procedure under the next RSU. The channel access mechanism with batch update procedure is shown in Figure 3.
Algorithm 1 Residence time calculation
1:
when vehicle complete the association process with an particular RSU
2:
set radius of RSU = R
3:
compute the distance of vehicle from RSU = r
4:
determine the average velocity of vehicle = v
5:
determine the moving direction of the vehicle
6:
ifr < R then
7:
  if (direction is toward) then
8:
    residence time, T r = R + r v
9:
  else
10:
    residence time, T r = R - r v
11:
  end if
12:
else
13:
  go to the step 1
14:
end if
Algorithm 2 Batch selection and update
1:
calculate the instantaneous residence time T r using algorithm 1
2:
set theoretical minimum velocity of vehicle = v m i n
3:
set theoretical maximum velocity of vehicle = v m a x
4:
calculate minimum residence time T r ( m i n ) , maximum residence time T r ( m a x ) and intermediate residence time T r ( i n ) using Equations (2)–(4) respectively
5:
if (0 < T r T r ( m i n ) ) then
6:
  batch number = 1
7:
else if ( T r ( m i n ) < T r T r ( i n ) ) then
8:
  batch number = 2
9:
else if ( T r ( i n ) < T r T r ( m a x ) ) then
10:
  batch number = 3
11:
else
12:
  go to the step 1
13:
end if
14:
set the MAC parameters of selected batch in DCF function
15:
attempt to transmit packet or wait for packet
16:
if (successful transmission OR packet drop OR waiting time cross a predefined time with empty queue) then
17:
  execute the step from 1 to step 13
18:
  break
19:
end if
20:
if (batch number changed) then
21:
  update the MAC parameters
22:
else
23:
  unchanged the MAC parameters
24:
end if
25:
go to the step 15

5. Modeling of the Proposed SAFE-MAC Protocol

In this section, we present an analytical model of the proposed SAFE-MAC using 2-D Markov chain. Batch selection, transmission probability determination for each batches and normalized throughput are discussed.

5.1. Batch Selection

In this section, we describe the batch selection and transmission probability determination of each batch to ensure proportional fairness. The network model is described in Figure 2, and the batch selection and update algorithm is shown in Algorithm 2. The instantaneous residence time, T r , of a vehicle can be expressed as:
T r = R ± r v
where R is the radius of the service area of an RSU, r is the instantaneous distance from a vehicle to the RSU, v is the instantaneous velocity of the vehicle, ‘+’ indicates that the vehicle is moving toward to RSU and the—denotes that the vehicle is moving backward from RSU.
For the intersection scenario shown in Figure 2, the instantaneous residence time of a vehicles is also calculated by Equation (1). We consider an intersection point in the road which is marked by a color and covered by RSU. Consider the case that a vehicle is in the overlapping service area of RSU-2 and RSU-3. The vehicle will associate with RSU-3 due to strong carrier signal of RSU-3 compared to the carrier signal of RSU-2. Measurement of vehicle direction at the intersection is a very important issue. To understand this issue, we consider five marked positions which are denoted by A, B, C, D and E. If the vehicle moves from point A to point E, the direction of the vehicles from A to B and from C to D is toward the RSU. In this case, ‘+’ sign is used. For from B to C and from D to E, we use − sign because the direction is away from RSU. When the vehicle moves from point E to point A, the sign will be opposite in Equation (1) for these corresponding points.
The velocity of the vehicle is uniformly distributed in v m i n , v m a x m s - 1 . Different residence times of the vehicles are computed as:
T r ( m i n ) = 2 R v m a x
T r ( m a x ) = 2 R v m i n
T r ( i n ) = T r ( m i n ) + T r ( m a x ) 2
where T r ( m i n ) , T r ( i n ) and T r ( m a x ) are minimum residence time, intermediate residence time, and maximum residence time respectively. Batch number selection of each vehicle is carried out on Table 1.
According to E. Karamad et al. [3], the packet transmission rate, R i of a vehicle in batch i ( i = 1 , 2 , 3 ) can be expressed as:
R i = H × R b i t N b i t × P t ( i ) k = 1 3 P t ( k )
where H is the normalized throughput of the network, N b i t is the average number of bits in a packet, R b i t is the bit rate over the channel, and P t ( i ) is the transmission probability of the vehicle in Batch i. If the minimum number of packets transmitted by each vehicle to achieve proportional fairness is N P then the transmission probabilities of different batches will satisfy the following condition. Transmission probability of each batch can be calculated by using Equations (5) and (6):
R i × T r ( i ) = N P

5.2. Markov Chain Analysis

Performance modeling of IEEE 802.11, IEEE 802.11e, and IEEE 802.11p standards have recently been studied [33,38,39,40,41]. In this paper, we develop an analytical model to measure the performance of our proposed SAFE-MAC protocol by assuming transmission error can only be caused by data collision. The summary of the used notations are listed in Table 2.
Firstly, we create a 2-D Markov chain to describe the backoff and post-backoff procedure of a vehicle queue for both non-saturated and saturated network states respectively. This can be seen in Figure 4. In this Markov chain, the state of each vehicle queue is denoted by ( i , j , k ) where i is an index denoted the batch number, j is the backoff stage number, and k is the backoff counter. The backoff stage j initializes at zero, and is incremented by one each time a packet is retransmitted until it reaches the retransmission limit ( m i + x i ) . After a successful transmission or packet drop, j is set to either 0 or e to represent either a non-empty or empty queue respectively. The value of k is initially set to a value uniformly selected from [ 0 , W i , j - 1 ] once the state reaches stage j and k is either decremented by one if the channel is perceived to be idle in a slot, or k is frozen if a transmission is detected on the channel. The backoff counter k is reactivated when the channel is perceived to be idle again for more than DIFS time. Transmission is attempted when the channel is perceived to be idle after k reaches 0. The backoff instant initiates the backoff procedure when the queue is not empty and post-backoff procedure when the queue is empty. The contention window of a vehicle of Batch i at stage j is defined as:
W i , j = C W m i n ( i ) ; j = 0 o r e 2 j × C W m i n ( i ) ; 1 j m i C W m a x ( i ) ; m i < j m i + x i
At the time of backoff procedure, if the channel is sensed busy, the backoff counter is frozen to the present backoff value and if the channel is sensed idle, the backoff counter is decremented by one. For 0 < k W i , j - 1 , these one-step transition probabilities are given by:
P i , j , k | i , j , k = 1 - P i d l e ( i ) ; 0 j m i + x i
P i , j , k - 1 | i , j , k = P i d l e ( i ) ; 0 j m i + x i
During the backoff procedure, after each unsuccessful transmission attempt, the backoff instance moves down to below row at probability P c o l l ( i ) until reaches to maximum retransmission limit m i + x i and chose a random backoff time at probability 1 / W i , j . For 0 k W i , j - 1 and 0 j m i + x i - 1 , this one-step transition probability is given by:
P i , j + 1 , k | i , j , 0 = P c o l l i W i , j
After exceeding the retransmission limit, the packet is dropped at probability P d r o p ( i ) .
P d r o p ( i ) = P c o l l ( i ) m i + x i + 1
During the backoff procedure, after each successful transmission or packet drop, the backoff instance moves to second row at probability P s u c c ( i ) or P d r o p ( i ) respectively if there is a packet waiting in the transmission queue represented by probability 1 - P e q a t i or moves of first row if there is no packet waiting in the transmission queue represented by the probability P e q a t ( i ) and backoff instance enters to the post-backoff procedure. When backoff instance reaches to the state i , j , 0 of Markov chain, the channel idle probability is zero. So that the probability of successful transmission is 1 - P c o l l i . For 0 k W i , 0 - 1 , these one-step transition probabilities are given by:
P i , e , k | i , j , 0 = 1 - P c o l l i P e q a t ( i ) W i , 0 ; 0 j m i + x i - 1
P i , 0 , k | i , j , 0 = 1 - P c o l l i 1 - P e q a t i W i , 0 ; 0 j m i + x i - 1
P i , e , k | i , m i + x i , 0 = P e q a t ( i ) W i , 0
P i , 0 , k | i , m i + x i , 0 = 1 - P e q a t i W i , 0
During the post-backoff procedure, if the channel is sensed idle and the queue is empty, the backoff counter is decremented by one, if the channel is sensed idle and the queue has at least one packet to transmit, the backoff counter is decremented by one and backoff instance jump to next backoff stage, if the channel is sensed busy and the queue is empty, the backoff counter is frozen, or if the channel is sensed busy and the queue has at least one packet to transmit, the backoff counter is frozen and backoff instance jump to next backoff stage. For 0 < k W i , 0 - 1 , these one-step transition probabilities are given by:
P i , e , k | i , e , k = P e q ( i ) 1 - P i d l e i
P i , e , k - 1 | i , e , k = P e q ( i ) P i d l e ( i )
P i , 0 , k - 1 | i , e , k = 1 - P e q i P i d l e ( i )
P i , 0 , k | i , e , k = 1 - P e q i 1 - P i d l e i
When backoff instance complete the post backoff procedure then it is waiting for a packet at probability P e q ( i ) . If it receives a packet and channel is busy, the backoff instance shift down to next backoff stage but when channel is sensed idle and received a packet, the backoff instance moves to state ( i , 0 , 0 ) to attempt transmission.
P i , e , 0 | i , e , 0 = P e q ( i )
P i , 0 , 0 | i , e , 0 = 1 - P e q i P i d l e ( i )
P i , 0 , k | i , e , 0 = 1 - P e q i 1 - P i d l e i W i , 0 ; 0 k W i , 0 - 1
To compress the stationary probability equations, let a = j = 0 m i + x i - 1 P s u c c i b i , j , 0 + b i , m i + x i , 0 and b = a 1 - P e q a t ( i ) + 1 - P i d l e i ( 1 - P e q ( i ) ) b i , e , 0 .
According to the 2-D Markov chain in Figure 4, all birth-death equations write recursively through the chain from upper row to lower row and from right to left, then the following stationary probabilities are given as follows:
b i , e , 0 = a P e q a t ( i ) W i , 0 ( 1 - P e q i ) 1 - P e q ( i ) W i , 0 1 - P e q ( i )
b i , e , k = a P e q a t ( i ) W i , 0 P i d l e ( i ) 1 - P e q ( i ) W i , 0 - k 1 - P e q ( i ) ; 0 < k W i , 0 - 1
b i , 0 , k = ( W i , 0 - k ) W i , 0 P i d l e ( i ) b i , 0 , 0 + ( 1 - P e q ( i ) ) P i d l e ( i ) b i , e , k + 1 + ( 1 - P e q ( i ) ) ( 1 - P i d l e ( i ) ) b i , e , k ; 0 < k W i , 0 - 1
b i , j , o = P c o l l ( i ) j b i , 0 , 0 ; 0 j m i + x i
b i , j , k = W i , j - k W i , j P i d l e ( i ) P c o l l ( i ) j b i , 0 , 0 ; 0 < j m i + x i a n d 0 < k W i , 0 - 1
By using Equations (23)–(27), all stationary probabilities b i , j , k are expressed by b i , 0 , 0 and which is finally determined by imposing the normalization condition, as follows:
k = 0 W i , 0 - 1 b i , e , k + j = 0 m i + x i k = 0 W i , j - 1 b i , j , k = 1
b i , e , 0 + k = 1 W i , 0 - 1 b i , e , k + b i , 0 , 0 + j = 1 m i b i . j . 0 + k = 1 W i , 0 - 1 b i , 0 , k + j = 1 m i + x i k = 1 W i , j - 1 b i , j , k = 1
1 b i , 0 , 0 = 1 + 1 - P e q a t i W i , 0 - 1 2 P i d l e i + j = 1 m i + x i P c o l l i j 1 + W i , j - 1 2 P i d l e i + P e q a t i W i , 0 1 - P e q i W i , 0 1 - P e q i 1 - P i d l e i 2 P i d l e i 2 P e q i 1 - P e q i + W i , 0 - 1 - 1 P e q i + P e q a t i W i , 0 2 2 - P e q i P i d l e 1 - P e q i + 1 - P e q i P e q i
Packet transmission occurs if backoff counter becomes zero, regardless of the backoff stage. So packet transmission probability of a vehicle in a random time slot express as:
P t ( i ) = b i , 0 , 0 1 - P c o l l ( i ) m i + x i + 1 1 - P c o l l ( i )
Substituting Equations (29) and (30), the packet transmission probability of a vehicle in a randomly chosen time slot is produced.

5.3. Normalized Throughput Analysis

As can be seen from Equation (30), P t ( i ) is directly dependent on the conditional collision probability and the channel idle probability, which is still unknown. A vehicle of Batch i determines that the channel is idle if there are no other vehicles in Batch i, even if another batch transmits simultaneously in the same channel. A successful transmission can be defined as the case where only one vehicle transmits a packet in a particular time slot. A collision occurs when more than one vehicle transmits a packet in the same time slot. According to Y. H. Bae et al. [41], P i d l e ( i ) , P s u c c ( i ) and P c o l l ( i ) can be calculated as follows:
P i d l e ( i ) = k = 1 3 ( 1 - P t ( k ) ) n k 1 - P t ( i )
P s u c c i = i = 1 3 n i P t i 1 - P t i k = 1 3 1 - P t i n i
P c o l l ( i ) = 1 - i = 1 3 n i P t i 1 - P t i k = 1 3 1 - P t i n i - k = 1 3 ( 1 - P t ( k ) ) n k 1 - P t ( i )
According to Bianchi model [33], the normalized throughput of Batch i of the network can be calculated as:
S i = T p P s u c c ( i ) T s u c c P s u c c ( i ) + T c o l l P c o l l ( i ) + σ P i d l e ( i )
where T p is the average packet length (measured in time) σ is the time duration of an empty CSMA slot, T c o l l is the average duration of a packet collision, and T s u c c is the average duration of a successful packet transmission. Time intervals T s u c c and T c o l l depend on the access method used.

6. Analytical Results

In this section, we discuss the performance analysis of the proposed SAFE-MAC protocol based on the analytical model of Section 5. For simplicity, we assume that the packet size is 216 bytes, the probability that a packet is in the queue is 0.01, and the vehicle uses the basic access mechanism. The parameters used in our analysis are listed in Table 3.
Figure 5 shows the relationship between the minimum contention size and the transmission probability of a vehicle. It can be seen that the two have an inverse relationship; as the contention size decreases, the transmission probability of a vehicle increases. To ensure fairness, the transmission probability of each batch is calculated by using Equations (5) and (6). The minimum contention window size of each batch seen in Figure 5, is determined using the calculated transmission probability. The maximum backoff stage and retransmission limit of each batch is a set, fixed value for the sake of simplicity. The MAC parameters can be seen in Table 4.
Figure 6 shows the probability that a channel is idle for each batch with a different number of vehicles under the RSU service area. The probability that the channel is idle decreases as the number of vehicles increases. This is due to the fact that as the number of vehicles increases, there are more vehicles to contend with each other for transmission in the same time slot. This results in a decreased probability that the channel is idle. When the number of vehicles increases, the channel idle probability of the high priority batch decreases faster than other batches. For example, when the number of vehicles is 5, the channel idle probability of Batch 1, Batch 2 and Batch 3 are 0.66, 0.74 and 0.72 respectively. As the number of vehicles is increased to 50, the channel idle probability of Batch 1, Batch 2 and Batch 3 are 0.34, 0.55 and 0.67 respectively. reduction of channel idle probability in percentage is 48.48% for Batch 1, 25.67% for Batch 2 and 6.94% for Batch 3. Due to the low contention window size of the high priority batch, as compared with other batches, the probability of the number of contending vehicles in a slot is high for the same number of vehicles.
Figure 7 shows the probability of a successful transmission as the number of vehicles under an RSU service area changes. The probability that the transmission is successful increases as the number of vehicles increases. This is due to the fact that as the number of vehicles increases, there are more vehicles to contend with each other for transmission in the same time slot. As a result, more collision occur as do successful transmissions. When the number of vehicles increases, the successful transmission probability of high priority batches increases faster than other batches and fixed in a saturated value. For example, probability of a successful transmission of Batch 1 is 0.21, 0.331 and 0.336 at the number of vehicles 5, 30 and 50, respectively. Due to low contention window size of high priority batch (as compared with other batches) the probability of the number of contending vehicles in a slot is high for the same number of vehicles.
Figure 8 shows the probability of collision as the number of vehicles under an RSU service area changes. The probability of collision increases as the number of vehicles increases. This is due to the fact that as the number of vehicles increases, there are more vehicles to contend with each other for transmission in the same time slot. It is also observed that the probability of collision of high priority batch vehicle is higher than other batches when the density of vehicles is increased, especially when the number of vehicles is greater than or equal to 33. After 33, the channel idle probability is very low (0.34 for 50 vehicles) and successful probability tends to a saturated value (0.33), so that collision probability of high priority batch vehicle is higher than other batches. It is calculated by Equation (33).
Figure 9 shows probability of packet drop as the number of vehicles under an RSU service area changes. The probability that the packet is dropped increases as the number of vehicles increases. This is due to the fact that as the number of vehicles increases, there are more vehicles to contend with each other for transmission in the same time slot and more collision occur. As a result more packets are dropped. When the number of vehicles increases, the probability of packet drop of high priority batch increases faster as compared to other batches. For example, when the number of vehicles are increased from 30 to 60, the probability of packet drop of Batch 1, Batch 2 and Batch 3 are also increased 7.0, 2.65 and 1.35 times higher than previous. Due to low contention window size of high priority batch (as compared with other batches), the probability of number of contending vehicles in a slot is high for the same number of vehicles. The results are more collision in tge high priority batch and more packets are dropped.
Figure 10 shows the probability of transmission for each batch of vehicles as the number of vehicles increases under a particular RSU service area. The probability of transmission decreases as the number of vehicles increases. This is again due to the fact that as more vehicles are introduced, more vehicles contend with each other to transmit messages in a certain time slot. This causes more vehicles to stay in the backoff stage for longer, which results in an increased probability of collision and an increase of time needed to access the channel. This leads to an overall decrease in transmission probability.
Figure 11 shows the normalized throughput of each batch of vehicles as the number of vehicles in an RSU service area changes. It can be seen that the normalized throughput of each batch approaches a maximum value as the number of vehicles increases. This is due to the fact that a small number of vehicles leads to a low normalized throughput for every batch. As the number of vehicles increases within a range, it would not result in many collisions. This results in an increase in the normalized throughput for each batch. As the number of vehicles continues to increase, the network enters into a saturated state. In such a state, more vehicles will be contending for transmission at any given time, which results in an increase in collisions, and therefor a reduction in the normalized throughput for all batches. For example, maximum normalized throughput of Batch 1, Batch 2, and Batch 3 are achieved when the number of vehicles are 6, 28, and 35, respectively. After that, the normalized throughput of each batch is decreased as the number of vehicles increase. Maximum normalized throughput of Batch 1, Batch 2, and Batch 3 are 0.5848, 0.321 and 0.104, respectively.
Figure 12 shows the total normalized throughput of vehicles which are members of different batches at different times as the number of vehicles increase. We assume that initially three types of vehicles enter into the service area of an RSU with the velocities 5 ms−1, 9 ms−1 and 45 ms−1. These vehicle types keep their velocities throughout their entire residence time. According to Table 5, the first type of vehicles enter the network under Batch 3. The second type of vehicles enter the network as Batch 2, and the last type of vehicles enter the network under Batch 1. It can be observed from Figure 12 that the vehicles in Batch 3 have the longest residence time and achieve the highest normalized throughput because these vehicles get three times more opportunities to transmit data (as compared with the other two batches). Batch 2 has the second highest residence time, and has twice as many opportunities to transmit data (as compared with Batch 1). Finally, Batch 1 has the lowest residence time, and thus the lowest transmission normalized throughput. Our scheme assumes that the demand of transmitting data is proportional to the residence time of any given vehicle. It can be seen from Figure 12 that the total normalized throughput of vehicles is proportional to their residence time, and every vehicle (including Batch 1) has at least a minimum level of normalized throughput. Based on the definition of proportional fairness [15], this proposed protocol ensures proportional fairness. For example, the total normalized throughput of batches(for vehicle 30) which enter into the network as a member of Batch 1, Batch 2, and Batch 3 are 0.52, 0.84, and 0.94 when their maximum residence time are 11.11 s, 55.55 s and 100 s, respectively.
Figure 13 shows the relationship between vehicle density, that is measured in terms of number of vehicles within a RSU service area, and total normalized throughput of vehicles belonging to different batches over a period of time. We assume that the observation period is 20 min, changing rate of vehicle density is equal for all batches, and the density of vehicles varies from 6 to 56. Y-axis at the left side represents the vehicle density whereas right-side Y-axis represents total normalized throughput of vehicles. There are three groups of vehicles in the network: First group of vehicles enter the network as a member of Batch 3. The second group of vehicles enter the network as Batch 2, and the last group of vehicles enter the network as Batch 1. It can be observed from Figure 13 that first group vehicles entering in Batch 3 have the longest residence time, and achieve the highest normalized throughput. The reason is that these vehicles get three times more opportunities to transmit data as compared to other two batches. Second group vehicles that enters in Batch 2 have the second highest residence time, and has as many as double opportunity to transmit data compared to that of Batch 1. Finally, vehicles in the last group that enters in Batch 1 have the lowest residence time, and thus have the lowest normalized throughput. Our protocol assumes that the demand of transmitting data is proportional to the residence time for any given vehicle. It is observed in the same figure that the total normalized throughput of vehicles is proportional to their residence time, scaled in right-side Y-axis. Moreover, the effect of density on total normalized throughput is observed by considering left-side and right-side Y-axis together. Figure 12 shows that the maximum normalized throughput (i.e., saturated condition) of vehicles which enter in the network as a member of Batch 1, Batch 2, and Batch 3 are achieved when the number of vehicles are 6, 24, and 28, respectively. Accordingly, this figure shows that the normalized throughput increases as vehicle density increases and vice versa in case of a non-saturation condition. However, when the network is in saturated condition, the normalized throughput decreases with the increase of vehicle density, and the other way around. For example, in this figure, it is observed that vehicles having high velocity and contending in Batch 1 sees the total normalized throughput being decreased as vehicle density increases and vice versa. This characteristics is observed because the total number of vehicles is always greater than 6, and the network goes to saturated condition for Batch 1. However, Batch 2 experiences both saturated and non-saturated condition. When number of vehicles of second group (i.e., entering as a member of Batch 2) is less than 24, the network is non-saturated which results in a throughput increase with the increase in density and vice versa. When the number of vehicles is greater than 24, opposite characteristics is observed as the network enters in saturated state. Vehicles in the third group also follow the same characteristic as group 2. However, this group enters in saturated condition when the number of vehicles reaches 28. Furthermore, it is also clearly observed that our proposed SAFE-MAC protocol always achieves proportional fairness in both saturated and non-saturated conditions for scenarios with a varying vehicle density.
Figure 14 shows the comparison of maximum number of transmitted packets of different MAC protocols with various velocities over residence time. IEEE 802.11 DCF MAC protocol [20] ensures that the number of packet transmitted is proportional to the residence time of the vehicles, but a minimum chance for all vehicles in not achieved. The E. Karamad protocol [3] ensures absolute fairness by ensuring the amount of packet transmission is constant regardless of velocity variation. Our protocol clearly demonstrates that the number of packets transmitted is directly proportional to the residence time and that a minimum channel access for high velocity vehicles is guaranteed. In this way, we have shown that our protocol meets the requirements for proportional fairness.
Finally, we present a comprehensive view of the comparisons in Table 6 that describes the percentage of transmitted packets of different batches under different MAC protocols. It can be seen that the IEEE 802.11 DCF MAC protocol [20], represented by the pie charts in the second column, ensures the number of packets transmitted be proportional to the total residence time of the vehicle as all the MAC parameters are commonly used by the vehicles. When the vehicle speed varies between 5 ms−1 and 35 ms−1, 58.3% packets are sent by the slowest moving vehicles that uses Batch 3 (B3). However, only 8.3% data can be sent by fast moving vehicles which contends in Batch 1 (B1). Vehicles with moderate speed that contend in Batch 2 (B2) send 33.3% data. As the variation in speed increases between the vehicles, the percentage of transmitted data becomes more unfair. For example, in case of the vehicles having speed between 5 and 85, Batch 1 (B1) gets only 3.7% share in the transmitted data while the slowest moving vehicles that contend in Batch 3 comprise 62% of the transmitted data. Therefore, the pie charts in the second column clearly show the unfairness issue of IEEE 802.11 DCF which gets more dominant in case of high variance in speed. E. Karamad proposed MAC protocol [3], represented in the third column, offers maximum transmitted data regardless of velocity variation and regardless of batch because each batch of vehicles use different MAC parameters constantly for whole residence time. This ensures that the total number of packets transmitted by each vehicles remains equal. Pie charts in column 3 show that all the batches i.e., B1, B2 and B3 send an equal percentage (33.3%) of data regardless of the variation in speed. As a result, the slowest moving vehicles cannot transmit more packets than the fast moving vehicles even though the residence time of the slowest moving vehicles is much higher than that of fast moving vehicles. Hence, E. Karamad protocol cannot provide enough opportunities to transmit packet for slow moving vehicles, thereby creating starvation problem. This protocol does not allow the amount of maximum transmitted data to be proportional to residence time. Finally, our proposed SAFE-MAC protocol, illustrated by the fourth column, offers an opportunity to transmit a minimum number of packets for every vehicle regardless of batch. At the same time, it also allows the amount of maximum transmitted data to be proportional to residence time. When the speed of the vehicles varies between 5 and 35, Batch 1 (B1), representing the fastest moving vehicles, can achieve a transmitted data ratio as high as 20.2% in contrast to only 8.3% in IEEE 802.11 DCF. If the speed variation increases further, for example vehicles having speed between 5 and 85, B1 can still achieve 19% whereas the highest percentage (44.9%) of transmitted data is achieved by Batch 3. This is because different batches use different MAC parameters, and vehicles are allowed to update their batch after a predefined time interval thereby allowing them to use the new MAC parameters (i.e., high priority batch). When velocity variation is increased, variation of maximum number of packets among the batches increases proportionally.

7. Conclusions & Future Work

In this paper, we designed a Speed Aware Fairness Enabled MAC protocol, SAFE-MAC, for V2I communications environments. It adapts the MAC parameters of each vehicle according to its residence time in the service area of a RSU to mitigate the fairness problem which arises due to the varying residence time of the vehicles. In the proposed scheme, small size minimum contention window is used by high speed vehicles or/and vehicles having small residence time. On the other hand, low speed vehicles or/and vehicles having high residence time use large size minimum contention windows. Since a small size minimum contention window provides more chance for communication thana large window, high speed vehicles get an optimal chance to transmit data with low speed vehicles. The proposed protocol ensures proportional fairness because each vehicle has a chance to adapt at least higher priority MAC parameters (e.g., small size minimum contention window). Furthermore, we have developed and applied an analytical model to test the performance of our proposed scheme in both saturated and non-saturated states. We also take into account all major factors that affect the access performance of our protocol, including the saturation condition, backoff counter freezing, channel idle, collision, successful transmission, packet drop and retransmission limit. Morover, we proposed two algorithms for residence time calculation and batch selection and update process. We derived the relationship between the transmission probability and minimum contention window size; we also derived the relationship between number of vehicles and some other important parameters including probability of collision, probability of packet drop, probability of channel idle, probability of successful transmission, probability of transmission and normalized throughput based on our analytical model. The effect of vehicle density on total normalized throughput in both saturated and non-saturated conditions is also investigated. Finally, we explore the relationship between residence time and maximum transmitted data of vehicles such that we could compare our performance against the basic access mechanism IEEE 802.11 DCF MAC and the E. Karamad MAC protocol. Accordingly, the proposed SAFE-MAC protocol overcomes the fairness problem by ensuring minimum access of all the vehicles for all applications in V2I communications Environment.
In the proposed SAFE-MAC protocol, we do not consider service differentiation to enhance the Quality of Service (QoS), as in IEEE 802.11p standard. Moreover, the fairness issue in case of Vehicle to Vehicle (V2V) and Vehicle to Device (V2D) communications is not considered here. Both these issues will be explored in our future work.

Author Contributions

Conceptualization, M.S.A.; methodology, M.A.S.; software, M.A.S.; validation, M.S.A.; formal analysis, M.A.S. and S.S.M.; investigation, M.A.S.; resources, M.A.S.; data curation, M.A.S.; writing–original draft preparation, M.A.S. and S.S.M.; writing–review and editing, W.A.J.; visualization, M.A.S. and S.S.M.; supervision, M.S.A.; project administration, M.S.A.

Funding

This research received no external funding.

Acknowledgments

The authors would like to express their sincere gratitude to the anonymous reviewers for their very useful and valuable comments that helped significantly in improving the quality of this paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Atallah, R.; Khabbaz, M.; Assi, C. Throughout analysis of IEEE 802.11p-based multi-hop V2I communications. In Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, Boston, MA, USA, 14–17 June 2015; pp. 1–6. [Google Scholar]
  2. Cavalcanti, E.R.; de Souza, J.A.R.; Spohn, M.A.; de Morais Gomes, R.C.; da Costa, A.F.B.F. VANETs’ research over the past decade: Overview, credibility, and trends. ACM SIGCOMM Comput. Commun. Rev. 2018, 48, 31–39. [Google Scholar] [CrossRef]
  3. Karamad, E.; Ashtiani, F. A modified 802.11-based MAC Scheme to Assure Fair Access for Vehicle to Roadside Communications. Comput. Commun. 2008, 31, 2898–2906. [Google Scholar] [CrossRef]
  4. Ren, M.; Khoukhi, L.; Labiod, H.; Zhang, J.; Vèque, V. A mobility-based scheme for dynamic clustering in vehicular ad-hoc networks (VANETs). Veh. Commun. 2017, 9, 233–241. [Google Scholar] [CrossRef]
  5. Zheng, L.; Wu, Y.; Xu, Z.; Lin, X. A Novel MAC Protocol for VANET based on Improved Generalized Prime Sequence. In Proceedings of the 2014 IEEE 7th International Conference on Advanced Infocomm Technology, IEEE/ICAIT 2014, Fuzhou, China, 14–16 November 2014; pp. 1–7. [Google Scholar]
  6. Atallah, R.; Khabbaz, M.; Assi, C. Modelling of Multi-hop Inter-vehicular Path formation for Connecting far Vehicles to RSUs. In Proceedings of the Wireless Communications and Networking Conference (WCNC), New Orleans, LA, USA, 9–12 March 2015; pp. 1954–1959. [Google Scholar]
  7. Bariah, L.; Shehada, D.; Salahat, E.; Yeun, C.Y. Recent Advances in VANET Security: A Survey. In Proceedings of the Vehicular Technology Conference (VTC Fall), Honolulu, HI, USA, 22–25 September 2019; pp. 1–7. [Google Scholar]
  8. Atallah, R.; Khabbaz, M.; Assi, C. Multihop V2I Communications: A Feasibility Study, Modeling, and Performance Analysis. IEEE Trans. Veh. Technol. 2017, 66, 2801–2810. [Google Scholar] [CrossRef]
  9. Dharsandiya, A.N.; Patel, R.M. A review on MAC Protocols of Vehicular Ad Hoc Networks. In Proceedings of the Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 23–25 March 2016; pp. 1040–1045. [Google Scholar]
  10. Gupta, N.; Prakash, A.; Tripathi, R. Medium Access Control Protocols for Safety Applications in Vehicular Ad Hoc Network: A Classification and Comprehensive Survey. Veh. Commun. 2015, 2, 223–237. [Google Scholar] [CrossRef]
  11. Jiang, X.; Du, D.H. PTMAC: A Prediction-Based TDMA MAC Protocol for Reducing Packet Collisions in VANET. IEEE Trans. Veh. Technol. 2016, 65, 9209–9223. [Google Scholar] [CrossRef]
  12. Balador, A.; Böhm, A.; Calafate, C.T.; Cano, J.C. A Reliable Token-based MAC Protocol for V2V Communication in Urban VANET. In Proceedings of the the 2016 IEEE 27th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Valencia, Spain, 4–7 Sepember 2016; pp. 1–6. [Google Scholar]
  13. Yu, B.; Xu, C. Vehicular Ad hoc Networks: An Information-centric Perspective. ZTE Commun. 2010, 8, 42–49. [Google Scholar]
  14. Sam, D.; Velanganni, C.; Evangelin, T.E. A vehicle control system using a time synchronized Hybrid VANET to reduce road accidents caused by human error. Veh. Commun. 2016, 6, 17–28. [Google Scholar] [CrossRef]
  15. Kushner, H.J.; Whiting, P.A. Convergence of proportional-fair sharing algorithms under general conditions. IEEE Trans. Wirel. Commun. 2004, 3, 1250–1259. [Google Scholar] [CrossRef]
  16. Miao, G.; Zander, J.; Sung, K.W.; Slimane, S.B. Fundamentals of Mobile Data Networks; Cambridge University Press, University Printing House: Cambridge, UK, 2016. [Google Scholar]
  17. IEEE 802.11p Working Group. IEEE Standard for Information Technology-Local and Metropolitan Area Networks-Specific Requirements-part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 6: Wireless Access in Vehicular Environments. In IEEE Std; IEEE: Piscataway, NJ, USA, 2010; 11p. [Google Scholar]
  18. Karamad, E.; Ashtiani, F. Performance analysis of IEEE 802.11 DCF and 802.11e EDCA based on queueing networks. IET Commun. 2009, 3, 871–881. [Google Scholar] [CrossRef]
  19. Nguyen, V.; Pham, C.; Oo, T.Z.; Tran, N.H.; Huh, E.N.; Hong, C.S. MAC protocols with dynamic interval schemes for VANETs. Veh. Commun. 2019, 15, 40–62. [Google Scholar] [CrossRef]
  20. IEEE 802.11 Working Group. IEEE Standard for Information Technology-Telecommunications and Information Exchange between Systems-Local and Metropolitan Area Networks-Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. In IEEE Std; IEEE: Piscataway, NJ, USA, 2002; Volume 802. [Google Scholar]
  21. Siddik, M.A.; Moni, S.S.; Alam, M.S. An efficient MAC protocol for provisioning fairness in vehicle to roadside communications. In Proceedings of the 2016 9th International Conference on Electrical and Computer Engineering (ICECE), Dhaka, Bangladesh, 20–22 December 2016; pp. 475–478. [Google Scholar]
  22. Shi, H.; Prasad, R.V.; Onur, E.; Niemegeers, I. Fairness in Wireless Networks: Issues, Measures and Challenges. IEEE Commun. Surv. Tutor. 2014, 16, 5–24. [Google Scholar]
  23. Jain, R.; Chiu, D.M.; Hawe, W.R. A Quantitative Measure of Fairness and Discrimination for Resource Allocation in Shared Computer System; Eastern Research Laboratory, Digital Equipment Corporation: Hudson, MA, USA, 1984; Volume 38. [Google Scholar]
  24. Shannon, C.E. The Mathematical Theory of Communication. Bell Syst. Tech. J. 1948, 27, 379–423. [Google Scholar] [CrossRef]
  25. Radunović, B.; Boudec, J.Y.L. A Unified Framework for Max-min and Min-max Fairness with Applications. IEEE/ACM Trans. Netw. 2007, 15, 1073–1083. [Google Scholar] [CrossRef]
  26. Wu, Q.; Zheng, J. Performance modeling and analysis of IEEE 802.11 DCF based fair channel access for vehicle-to-roadside communication in a non-saturated state. Wirel. Netw. 2015, 21, 1–11. [Google Scholar] [CrossRef]
  27. Harigovindan, V.P.; Babu, A.V.; Jacob, L. Ensuring Fair Access in IEEE 802.11p-Based Vehicle to Infrastructure Networks. EURASIP J. Wirel. Commun. Netw. 2012, 2012, 168–185. [Google Scholar] [CrossRef]
  28. Hoeft, M.; Rak, J. How to Provide fair Service for V2I Communications in VANETs? Ad Hoc Netw. 2016, 37, 283–294. [Google Scholar] [CrossRef]
  29. Zhang, L.; Liu, Y.; Wang, Z.; Guo, J.; Huo, Y. Mobility and QoS Oriented 802.11p MAC Scheme for Vehicle to Infrastructure Communications. Telecommun. Syst. 2015, 60, 107–117. [Google Scholar] [CrossRef]
  30. Hussain, S.A.; Iqbal, M.; Saeed, A.; Raza, I.; Raza, H.; Ali, A.; Bashir, A.K.; Baig, A. An efficient channel access scheme for vehicular ad hoc networks. Mob. Inf. Syst. 2017, 2017, 1–10. [Google Scholar] [CrossRef]
  31. Wu, Q.; Xia, S.; Fan, P.; Fan, Q.; Li, Z. Velocity-Adaptive V2I Fair-Access Scheme Based on IEEE 802.11 DCF for Platooning Vehicles. Sensors 2018, 18, 4198. [Google Scholar] [CrossRef]
  32. Alasmary, W.; Zhuang, W. Mobility Impact in IEEE 802.11p Infrastructureless Vehicular Networks. Ad Hoc Netw. 2012, 10, 222–230. [Google Scholar] [CrossRef]
  33. Bianchi, G. Performance Analysis of the IEEE 802.11 Distributed Coordination Function. IEEE J. Sel. Areas Commun. 2000, 18, 535–547. [Google Scholar] [CrossRef]
  34. Zhao, H.; Garcia-Palacios, E.; Wang, S.; Wei, J.; Ma, D. Evaluating the impact of network density, hidden nodes and capture effect for throughput guarantee in multi-hop wireless networks. Ad Hoc Netw. 2013, 11, 54–69. [Google Scholar] [CrossRef]
  35. Zhao, H.; Garcia-Palacios, E.; Song, A.; Wei, J. Calculating end-to-end throughput capacity in wireless networks with consideration of hidden nodes and multi-rate terminals. In Proceedings of the 2011 IEEE 73rd Vehicular Technology Conference (VTC Spring), Budapest, Hungary, 15–18 May 2011; pp. 1–5. [Google Scholar]
  36. Son, I.K.; Mao, S.; Hur, S.M. Medium access control for opportunistic concurrent transmissions under shadowing channels. Sensors 2009, 9, 4824–4844. [Google Scholar] [CrossRef] [PubMed]
  37. Nguyen, V.; Kim, O.T.T.; Pham, C.; Oo, T.Z.; Tran, N.H.; Hong, C.S.; Huh, E.N. A survey on adaptive multi-channel MAC protocols in VANETs using Markov models. IEEE Access 2018, 6, 16493–16514. [Google Scholar] [CrossRef]
  38. Zheng, J.; Wu, Q. Performance Modeling and Analysis of the IEEE 802.11p EDCA Mechanism for VANET. IEEE Trans. Veh. Technol. 2016, 65, 2673–2687. [Google Scholar] [CrossRef]
  39. Liu, X.; Saadawi, T.N. IEEE 802.11e (EDCA) analysis in the presence of hidden stations. J. Adv. Res. 2011, 2, 219–225. [Google Scholar] [CrossRef] [Green Version]
  40. Engelstad, P.E.; Østerbø, O.N. Non-saturation and saturation analysis of IEEE 802.11e EDCA with starvation prediction. In Proceedings of the 8th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems, Montréal, QC, Canada, 10–13 October 2005; pp. 224–233. [Google Scholar]
  41. Bae, Y.H.; Kim, K.J.; Moon, M.N.; Choi, B.D. Analysis of IEEE 802.11 Non-saturated DCF by Matrix Analytic Methods. Ann. Oper. Res. 2008, 162, 3–18. [Google Scholar] [CrossRef]
Figure 1. VANET architecture.
Figure 1. VANET architecture.
Sensors 19 02405 g001
Figure 2. A V2I based VANET model.
Figure 2. A V2I based VANET model.
Sensors 19 02405 g002
Figure 3. Channel access mechanism of proposed SAFE-MAC protocol.
Figure 3. Channel access mechanism of proposed SAFE-MAC protocol.
Sensors 19 02405 g003
Figure 4. Markov chain model for the backoff procedure of a vehicle with both saturated and non-saturated state.
Figure 4. Markov chain model for the backoff procedure of a vehicle with both saturated and non-saturated state.
Sensors 19 02405 g004
Figure 5. Selection of minimum contention window size based on transmission probability [21].
Figure 5. Selection of minimum contention window size based on transmission probability [21].
Sensors 19 02405 g005
Figure 6. Probability of channel idle vs. number of vehicles.
Figure 6. Probability of channel idle vs. number of vehicles.
Sensors 19 02405 g006
Figure 7. Probability of successful transmission vs number of vehicles.
Figure 7. Probability of successful transmission vs number of vehicles.
Sensors 19 02405 g007
Figure 8. Probability of collision vs. number of vehicles.
Figure 8. Probability of collision vs. number of vehicles.
Sensors 19 02405 g008
Figure 9. Probability of packet drop vs. number of vehicles.
Figure 9. Probability of packet drop vs. number of vehicles.
Sensors 19 02405 g009
Figure 10. Probability of transmission vs. number of vehicles.
Figure 10. Probability of transmission vs. number of vehicles.
Sensors 19 02405 g010
Figure 11. Normalized throughput vs. number of vehicles.
Figure 11. Normalized throughput vs. number of vehicles.
Sensors 19 02405 g011
Figure 12. Total normalized throughput vs. number of vehicles.
Figure 12. Total normalized throughput vs. number of vehicles.
Sensors 19 02405 g012
Figure 13. Relationship between vehicle density and total normalized throughput considering both saturated and non-saturated conditions.
Figure 13. Relationship between vehicle density and total normalized throughput considering both saturated and non-saturated conditions.
Sensors 19 02405 g013
Figure 14. Number of transmitted packets vs. residence time [21].
Figure 14. Number of transmitted packets vs. residence time [21].
Sensors 19 02405 g014
Table 1. Batch selection and update.
Table 1. Batch selection and update.
Instantaneous Residence Time ( T r )Batch No ( Bi )Maximum Residence Time ( T r ( i ) )Priority (i)
0 < T r T r ( m i n ) B 1 T r ( m i n ) High
T r ( m i n ) < T r T r ( i n ) B 2 T r ( i n ) Medium
T r ( i n ) < T r T r ( m a x ) B 3 T r ( m a x ) Low
Table 2. Notations used in the model.
Table 2. Notations used in the model.
NotationDefinition
P i , j , k Probability of a vehicle of Batch i
is in backoff stage k with backoff counter value k
P c o l l ( i ) Collision probability of Batch i
P i d l e ( i ) Channel idle probability when Batch i has a packet to transmit
P s u c c ( i ) Probability of successful transmission of Batch i
P d r o p ( i ) Packet drop probability of Batch i
P e q a t ( i ) Probability that an vehicle of Batch i has empty queue after
successful transmission or packet drop
P e q ( i ) Probability that an vehicle of Batch i has empty queue
W i , j Contention window size of Batch i at backoff stage j
C W m i n ( i ) Minimum contention window size of Batch i
C W m a x ( i ) Maximum contention window size of Batch i
m i Maximum stage of Batch i beyond which the
contention window will not be increased
m i + x i Retransmission limit of Batch i
P t ( i ) Transmission probability of Batch i
n i Average number of vehicle of Batch i
T s u c c Average time of a successful transmission
T c o l l Average time of a collision
σ Duration of a empty CSMA slot
T p Average packet length in time
T i Average residence time of Batch i
S i Normalized throughput of Batch i
R i Packet transmission rate of Batch i
Table 3. System parameters.
Table 3. System parameters.
ParameterValueParameterValue
T p ( μ s ) 8184H0.8
T s u c c ( μ s ) 8972 R b i t ( M b p s ) 1
T c o l l ( μ s ) 8713 N b i t ( b y t e ) 216
σ ( μ s ) 50 D ( m ) 500
S I F S ( μ s ) 28 N P 4000
D I F S ( μ s ) 128 v m a x ( m s - 1 ) 45
A C K ( μ s ) 240 v m i n ( m s - 1 ) 5
Table 4. Parameters used in numerical calculations.
Table 4. Parameters used in numerical calculations.
ParametersBatch 1 (B1)Batch 2 (B2)Batch 3 (B3)
C W m i n 3930
C W m a x 121121280
m i 247
x i 420
Table 5. Batch selection.
Table 5. Batch selection.
Instantaneous Residence Time ( T r ) (Sec.)Batch No ( Bi )
0 < T r ≤ 11.11 B 1
11.11 < T r ≤ 55.55 B 2
55.55 < T r ≤ 100 B 3
Table 6. Performance comparison of SAFE-MAC with contemporary protocols in terms of percentage of transmitted packets while varying the difference between minimum speed and maximum speed.
Table 6. Performance comparison of SAFE-MAC with contemporary protocols in terms of percentage of transmitted packets while varying the difference between minimum speed and maximum speed.
Sensors 19 02405 i001
Standard
IEEE 802.11
DCF MAC
E. Karamad &
F. Ashtiani
Proposed Protocol
Proposed
SAFE-MAC
Protocol
Speed varies between 5 and 35 Sensors 19 02405 i002 Sensors 19 02405 i003 Sensors 19 02405 i004
Speed varies between 5 and 45 Sensors 19 02405 i005 Sensors 19 02405 i006 Sensors 19 02405 i007
Speed varies between 5 and 65 Sensors 19 02405 i008 Sensors 19 02405 i009 Sensors 19 02405 i010
Speed varies between 5 and 85 Sensors 19 02405 i011 Sensors 19 02405 i012 Sensors 19 02405 i013

Share and Cite

MDPI and ACS Style

Siddik, M.A.; Moni, S.S.; Alam, M.S.; Johnson, W.A. SAFE-MAC: Speed Aware Fairness Enabled MAC Protocol for Vehicular Ad-hoc Networks. Sensors 2019, 19, 2405. https://doi.org/10.3390/s19102405

AMA Style

Siddik MA, Moni SS, Alam MS, Johnson WA. SAFE-MAC: Speed Aware Fairness Enabled MAC Protocol for Vehicular Ad-hoc Networks. Sensors. 2019; 19(10):2405. https://doi.org/10.3390/s19102405

Chicago/Turabian Style

Siddik, Md. Abubakar, Shafika Showkat Moni, Mohammad Shah Alam, and William A. Johnson. 2019. "SAFE-MAC: Speed Aware Fairness Enabled MAC Protocol for Vehicular Ad-hoc Networks" Sensors 19, no. 10: 2405. https://doi.org/10.3390/s19102405

APA Style

Siddik, M. A., Moni, S. S., Alam, M. S., & Johnson, W. A. (2019). SAFE-MAC: Speed Aware Fairness Enabled MAC Protocol for Vehicular Ad-hoc Networks. Sensors, 19(10), 2405. https://doi.org/10.3390/s19102405

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop