Skip to main content
Log in

A Cluster-Based Beaconing Approach in VANETs: Near Optimal Topology Via Proximity Information

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

A key component for safety applications in Vehicular ad-hoc network (VANET) is the use of periodic beacon messages which provide vehicles with a real-time vehicle proximity map of their surroundings. Based on this map, safety applications can be used for accident prevention by informing drivers about evolving hazardous situations. In order to allow synchronized and cooperative reactions, the target of this work is to design a beacon dissemination process that provides a real-time, broad and coordinated map under the challenging VANET conditions. In order to obtain the desired map, we consider an aggregation-dissemination based scheme for a beacon dissemination process that based on top of a cluster-based topology. To this end, we propose the Distributed Construct Underlying Topology (D-CUT) algorithm tailed specifically to provide an optimized topology for such beacon dissemination process. To deal with the heavy load of beacon messages required for an accurate and broad map, we propose a topology that allows the execution of extensive but reliable spatial bandwidth reuse. Our D-CUT algorithm exploits the real-time and coordinated map for constructing an adaptive and robust topology to deal with the dynamic nature of the VANET environment. We present theoretically provable bounds demonstrating the ability of the algorithm to deal with the dynamic nature of the VANET environment supported by simulation results.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

Notes

  1. This application warns a vehicle if it is attempting to merge from a location with limited visibility and another vehicle is approaching and predicted to occupy the intended merging space.

  2. Here we assume that an invalid cluster, which was a valid cluster in the previous iteration, can be split to 2 valid clusters. The algorithm can intuitively be expanded to deal with the case where an invalid cluster is required to be split to more than 2 clusters.

References

  1. Kumar D, Kherani A, Altman E (2006) Route lifetime based optimal hop selection in VANETs on highway: an analytical viewpoint. In: Proceedings of IFIP Networking, Coimbra, Portugal

  2. Baldessari R et al. (2007) Car-2-car communication consortium-manifesto. In: DLR Electronic Library [http://elib.dlr.de/perl/oai2](Germany)

  3. Torrent-Moreno M, Santi P, Hartenstein H (2005) Fair sharing of bandwidth in VANETs. In: Proceedings of the 2nd ACM international workshop on Vehicular ad hoc networks, pp. 49–58

  4. Gunter Y, Wiegel B, Großmann HP (2007) Cluster-based medium access scheme for vanets. In: IEEE Intelligent Transportation Systems Conference, pp. 343–348

  5. Su H, Zhang X (2007) Clustering-based multichannel MAC protocols for QoS provisionings over vehicular ad hoc networks. IEEE Trans Veh Technol 56(6):3309–3323

    Article  Google Scholar 

  6. Tian D, Wang Y, Lu G, Yu G (2010) A VANETs routing algorithm based on Euclidean distance clustering. In: 2nd International Conference on Future Computer and Communication, vol. 1, pp. 183–187

  7. Wischhof L, Ebner A, Rohling H (2005) Information dissemination in self-organizing intervehicle networks. IEEE Trans Intell Transp Syst 6(1):90–101

    Article  Google Scholar 

  8. Bononi, Di Felice M (2007) A cross layered mac and clustering scheme for efficient broadcast in vanets. In: IEEE International Conference on Mobile Adhoc and Sensor Systems, pp. 1–8

  9. Fan P (2007) Improving broadcasting performance by clustering with stability for inter-vehicle communication. In: IEEE 65th Vehicular Technology Conference, pp. 2491–2495

  10. Raya M, Aziz A, Hubaux JP (2006) Efficient secure aggregation in VANETs. In: The 3rd International Workshop on Vehicular ad hoc Networks, pp. 67–75

  11. Fan P, Haran J, Dillenburg J, Nelson P (2005) Cluster-based framework in vehicular ad-hoc networks. In: Ad-hoc, mobile, and wireless networks, pp. 32–42

  12. Wang Z, Liu L, Zhou MC, Ansari N (2008) A position-based clustering technique for ad hoc intervehicle communication. IEEE Trans Syst Man Cybern Part C Appl Rev 38(2):201–208

    Article  Google Scholar 

  13. Kenichi M, Yoshiyuki W, Nobuhito M, Nakano K, Sengoku M (2002) Flooding schemes for clustered ad hoc networks. IEICE Trans Commun 85(3):605–613

    Google Scholar 

  14. Kayis O, Acarman T (2007) Clustering formation for inter-vehicle communication. In: IEEE Intelligent Transportation Systems Conference, pp. 636–641

  15. Papadimitratos P, Buttyan L, Holczer T, Schoch E, Freudiger J, Raya M, Ma Zhendong Z, Kargl F, Kung A, Hubaux JP (2008) Secure vehicular communication systems: design and architecture. In: IEEE Communications Magazine 46(11):100–109

  16. Reed B (2003) The height of a random binary search tree. J ACM 50(3):306–332

    Article  MathSciNet  Google Scholar 

  17. Krauß S, Wagner P, Gawron C (1997) Metastable states in a microscopic model of traffic flow. Phys Rev E 55:55–97

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michael Segal.

Appendices

Appendix 1—list of abbreviations

CA :

Clustering Assignment

D-CUT:

Distributed Construct Underlying Topology

GNOCA :

Geographically Near-Optimal CA

JC1 :

the first join condition

JC2 :

the second join condition

MMIDP :

Max-Min Inter-Distance Pair

SC1 :

the first split condition

SC2 :

the second split condition

SJC :

the spit join condition

VANET:

Vehicular ad-hoc network

Appendix 2—an example of the D-CUT convergence process

In the following we provide a detailed example of the D-CUT convergence process.

The D-CUT gets as an input 9 small scrappy clusters (see Fig. 17a). Next we show how D-CUT converges to the GNOCA in three iterations that match the height of the corresponding SBT.

Fig. 17
figure 17

An example of D-CUT convergence process

Throughout the convergence process 14 inter-distances are involved. Those inter-distances are associated to the class A 1 , A 2 , and A 3 as the following: {d 1 , d 2, d 3 , d 4 , d 5 , d 6 , d 8 , d 9 , d 10 , d 12 , d 14 } ∈ A 1 ;{d 13 } ∈ A 2 ; {d 7 , d 11 } ∈ A 3.

In first iteration (see Fig. 17b) the inter-distances {d 1 , d 3 , d 5 , d 8 , d 10 , d 12 , d 14 } (which belong to A 1 ) satisfy the SJC and are classified as inner-gap (Lemma 2). In addition, the inter-distance d 13 that belong to A 2 is classified as an inter-cluster gap (Lemma 4).

In the second iteration (see Fig. 17c) the inter-distances {d 2 , d 6 , d 9 } that belong to A 1 satisfy the SJC and are classified as inner-gap. At the end of this iteration (after all inter-distances that belong to A 1 are classified as inner-gap), the CA produced by the D-CUT algorithm meets Objective 1 (Lemma 3).

In the third iteration (see Fig. 17d), the inter-distance d 11 that belongs to A 3 satisfies the JC1 and is classified as an inner-gap. In addition, the inter-distance d 7 that belongs to A 3 is classified as an inter-cluster gap (since F(d 7 , d f ) = false; see Lemma 5). At the end of this iteration the D-CUT algorithm produces the GNOCA (Lemma 6).

Rights and permissions

Reprints and permissions

About this article

Cite this article

Allouche, Y., Segal, M. A Cluster-Based Beaconing Approach in VANETs: Near Optimal Topology Via Proximity Information. Mobile Netw Appl 18, 766–787 (2013). https://doi.org/10.1007/s11036-013-0468-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-013-0468-5

Keywords

Navigation