Next Article in Journal
A Novel Approach to Evaluating Crosstalk for Near-Infrared Spectrometers
Previous Article in Journal
Extension of Operating Range in Hybrid Cascaded H-Bridge Inverters with Capacitor Voltage Balancing Capability
Previous Article in Special Issue
Integrated Sensing and Secure Communication with XL-MIMO
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Framed Slotted Aloha Medium Access Control Protocol Based on Capture Effect in Vehicular Ad Hoc Networks

School of Ocean Information Engineering, Jimei University, Xiamen 361000, China
*
Author to whom correspondence should be addressed.
Submission received: 11 December 2023 / Revised: 31 January 2024 / Accepted: 1 February 2024 / Published: 3 February 2024

Abstract

:
The capture effect is a frequently observed phenomenon in vehicular ad hoc networks (VANETs) communication. When conflicts arise during time slot access, failure to access does not necessarily occur; instead, successful access may still be achieved. The capture effect can enhance the likelihood of multiple access and improve communication efficiency. The security of VANETs communication is undoubtedly the primary concern. One crucial approach to enhance security involves the design of an efficient and reliable medium access control (MAC) protocol. Taking into account both aspects, we propose a novel framed slotted Aloha (FSA) MAC protocol model. Firstly, we derive the closed-form expression for the capture probability in the Rician fading channel in this paper. Subsequently, we analyze how the number of vehicles and time slots influence the success probability of vehicle access channels as well as examine the impact of the capture effect on this success probability. Then, under constraints regarding vehicle access channel success probability, we derive optimal values for slot numbers, access times, and transmission power while proposing a comprehensive implementation method to ensure high access channel success probabilities. We verify both theoretical derivations and proposed methods through simulation experiments.

1. Introduction

With the rapid development of information and communication technology, VANETs have been widely applied in the field of intelligent transportation. The vehicle network protocol is also designed with a layered approach, and the MAC protocol of the vehicle network protocol is particularly important due to security considerations. The Aloha protocol, a multiple-access random access algorithm, plays a crucial role in wireless communication networks [1]. It encompasses the pure-Aloha protocol, slotted Aloha (SA) protocol, and frame slotted Aloha (FSA) protocol [2,3,4]. The FSA is further categorized into basic frame slotted Aloha (BFSA) with fixed frame length and dynamic frame slotted Aloha (DFSA) with variable frame length [5,6].
The performance of various FSA protocols is significantly affected by the capture effect, which arises from the adoption of an access slot contention mechanism [7]. In the FSA protocol, a frame consists of N slots, and each user randomly selects one slot within the frame for transmitting data packets. Slot selection follows a method of random selection and free competition. If only one user selects a slot, the access is successful. However, if two or more users select the same slot simultaneously, a collision conflict occurs. In case of collision, access may either fail or succeed depending on the power levels involved. When competing users have similar power levels, access fails; however, when one user’s power level significantly exceeds that of the others in competition, it successfully accesses while others fail to do so. This phenomenon is known as the capture effect [8,9]. The prudent utilization of the capture effect can thus augment the probability of user access.
In recent years, the research on FSA protocol has garnered significant attention [10,11]. The utilization of FSA has been widespread in various domains including wireless sensor networks [12], vehicular ad hoc networks [13,14], and radio frequency identification networks [15]. Meanwhile, an increasing number of end-users are adopting the FSA protocol for communication, leading to intensified competition for access time slots. The phenomenon of capture within the FSA protocol has emerged as a pivotal consideration.
In this paper, the capture probability of the Rician fading channel in FSA-based networks is analyzed, and a novel FSA MAC protocol model based on the capture effect is proposed. Additionally, the access probability is considered as an essential constraint. The key contributions of this study are outlined below.
  • The closed-form expression for the acquisition probability is derived in the context of a Rician fading channel.
  • The paper presents an FSA MAC protocol model based on the capture effect and conducts an analysis of the impact of vehicle quantity and slot allocation on the success rate of vehicle access channels.
  • The impact of the capture effect on the success rate of the vehicle access channel is analyzed, and the numerical results validate the accuracy of the theoretical analysis.
  • The relationship between the number of vehicles and time slot allocation under maximum conflict probability is derived, providing a foundation for the rational distribution of time slots.
  • Under the constraint of a vehicle access channel success probability, this paper derives the requirements for slot number, access times, and transmission power. Taking into account comprehensive factors, an implementation method is proposed to comprehensively enhance the success rate of vehicle access channels from these three aspects.
The remaining sections of this article are organized as follows: Section 2 presents an overview of the research work related to this paper. In Section 3, we derive a closed-form expression for the capture probability in a Rician fading channel. Section 4 proposes an FSA MAC protocol model based on the capture effect and analyzes the impact of the number of vehicles and slots on the success rate of vehicle access channels. We present numerical results in Section 5. Finally, we summarize this article in Section 6.

2. Related Work

The medium access control (MAC) protocol plays a pivotal role in wireless networks, exerting a direct impact on their performance. Numerous approaches have been proposed from diverse perspectives.
The paper proposed an FSA protocol with variable frame length in ref. [4], taking into account the channel capture effect. By deriving the expression of the optimal frame length from maximum channel utilization, this study focuses on effectively utilizing the channel. In [16], a novel approach is presented for estimating the population of active nodes using an additive scheme, and this estimate is utilized to optimize throughput by determining frame size and participation probability. In [7], a comprehensive analysis of the correlation between the normalized offered load and the attainable performance is provided in terms of packet loss rate. In [17], the authors focus on the case of messaging from mobile vessels to stationary control centers on land through advanced channel random access schemes that exploit time diversity. This paper extends an existing theoretical framework to evaluate the probability of packet loss in FSA systems by examining both the probability distribution of colliding users within a frame and their replicas in time slots. In [18], the authors investigate the congestion behavior of a IEEE802.11p/1609.4-based MAC protocol by varying the vehicle density under urban and highway conditions. In ref. [19], an adaptive and on-demand TDMA-based MAC protocol is proposed to address the challenges of high-transmission collisions and channel resource wastage in the unbalanced traffic conditions of VANETs. In ref. [20], an analytical model based on the Markov chain model is presented to evaluate the performance of IEEE 802.11 MAC for VANETs in the presence of the capture effect. The study investigates various parameters that can potentially impact the performance and establishes their relationship with performance metrics, including the probability of successful transmission, probability of frame capture, and throughput expressions. In ref. [21], the proposed novel scheme can be seamlessly integrated with IEEE 1609.4 to operate on top of IEEE 802.11p infrastructure. The core concept in the proposed solution revolves around distributing access time initiation across the control channel (CCH) period. This technique, an enhanced iteration of the S-Aloha protocol, effectively mitigates collision risks. The MAC protocol based on framed slotted Aloha for these networks is proposed in ref. [22]. The paper investigates the probable packet sizes, energy consumption, battery lifetime, and success rate of our protocol. In ref. [23], the proposed Coordinated multichannel MAC (C-MAC) protocol incorporates the contention-free broadcasting of safety messages. In our C-MAC, vehicles utilize dynamic framed slotted ALOHA (DFSA) to transmit their channel reservation requests during dedicated channel reservation slots. The paper proposes a low-energy low-latency MAC (LL-MAC) protocol, referred to as the low-energy consumption and low-delay MAC protocol in ref. [24], which is based on receiver-initiated and captured effects. This protocol enables rapid matching between the senders and receivers when the sending nodes have data to transmit. Additionally, an enhanced greedy algorithm is introduced for power allocation among nodes, while an efficient collision response mechanism is employed for effective data transmission. In ref. [25], an MAC algorithm is proposed that utilizes the average waiting time as a common control reference, facilitating nodes to achieve equitable channel access by modifying one of the parameters of the IEEE 802.11-enhanced distributed channel access: contention window, arbitration inter-frame space, or transmission opportunity.
In the aforementioned literature, none of them considered the success rate of access probability as a significant security constraint. The closed-form expression for the acquisition probability in the Rician fading channel is derived in this paper. We establish an FSA system model where N vehicles compete freely for L slots. We analyze the impact of the number of vehicles and slots, as well as the capture effect, on the success probability of vehicle access. From a security perspective, we propose that meeting the constraint condition of successful vehicle access to roadside units is essential. Under this condition, we derive requirements for the number of slots, access times, and vehicle transmission power.

3. Capture Probability of Rician Fading Channel

The PDF of the received signal power of Rice channel fading is
f p p = 1 σ 2 e p σ 2 e K I 0 4 K p σ 2
where p represents the instantaneous power of the received signal, σ 2 represents the power of the received signal’s random reflection component, and K is the Rician factor. As shown in Equation (1), the power of the Rician fading channel follows a non-centrosymmetric Chi square distribution. When the Rician factor K = 0 corresponds to a Rayleigh fading channel.
Under normal circumstances, when multiple signals are simultaneously connected to a channel, a collision effect occurs, resulting in the failure of collectively accessing these signals. However, if the power of one dominant signal is significantly higher—meaning that the ratio between its power and the sum of all other signals’ powers exceeds a certain threshold—and all other signals can be considered as negligible noise, then the successful connection of the dominant signal can still be achieved. This phenomenon is known as the capture effect.
Consider a scenario where n signals are simultaneously connected to a channel, and one of these signals is designated as the main signal with the maximum power value denoted by p t . When the ratio of p t to the sum of powers from the remaining n 1 signals exceeds a threshold value of z, it is considered significantly larger. In such cases, an acquisition effect occurs, resulting in successful access for p t while causing access failure for the other n 1 signals. The mathematical representation is given by Equation (2).
p t j = 1 n 1 p j > z .
The probability of capture effect is shown in Equation (3)
P c a p n = n 0 f p t p t · Pr p t p t j = 1 n 1 p j j = 1 n 1 p j > z d p t = n 0 f p t p t · 0 p t p t z z f p n 1 p n 1 d p n 1 d p t .
According to the reference [26], the probability density function (PDF) of the capture effect in a Rician fading channel is presented in Equation (4), while the probability of capture in the Rice fading channel is given by Equation (5).
f p n p n = 1 + K p ¯ n n + 1 n + 1 2 2 e n K p n n K n 1 n 1 2 2 exp p n 1 + K p ¯ n · I n 1 2 1 + K n K p n p ¯ n
p c a p n , z , K = n 1 e n K · i = 0 n 1 K i i ! · k = 0 n 2 + i 1 z + 1 k k ! · j = 0 K j k + j ! j ! 2 · z z + 1 j + 1
The function p c a p in the Rice fading channel is dependent on the variables n, z, and K. In the case where the Rice factor k = 0 , the Rice fading channel transforms into a Rayleigh fading channel.

4. System Model and Access Probability

4.1. Access Model Description

The system model depicting the vehicle’s access to the roadside unit is illustrated in Figure 1. A total of N vehicles engage in a competitive allocation of L time slots among the available roadside units. Each individual vehicle has the flexibility to select any L idle time slots, with an equal probability 1 1 L L assigned to each selection.
In Figure 1, L represents the count of available idle time slots for access, and N denotes the total number of vehicles. The regulations governing vehicle access to the roadside unit are as follows. If no vehicle selects a time slot to access, the time slot remains idle. In the case where only one vehicle chooses to access a time slot, there is no competition conflict, resulting in the successful occupation of the slot. However, if two or more vehicles attempt to access the same time slot simultaneously, a competition conflict arises which may lead to either successful or failed access. The probability of success or failure depends on the capture probability in this scenario. Notably, as the number of vehicles competing for a particular time slot increases, the capture probability decreases and vice versa.

4.2. Access Success and Conflict Probability without Considering Capture Effect

N vehicles engage in a competitive selection process for the L slots of roadside units, with each vehicle exercising its discretion. The total number of possible combinations is denoted as Equation (6)
N c m b = L N , L 1 , N 1 .
If only one vehicle accesses a specific slot, there is no competition conflict. The number of successful access combinations is denoted by
N c o l 0 = N 1 0 L L 1 N 1 = L L 1 N 1
where N c o l 0 represents the number of combinations without conflicts. In this context, it signifies that a vehicle is not combined with other N 1 vehicles, resulting in N 1 0 possible combinations. Subsequently, there are L available slots for making a free choice, providing L options. The remaining N 1 vehicles have the freedom to choose from the available L 1 slots, resulting in a total of L 1 N 1 possible choices. Thus, there are N 1 0 L L 1 N 1 combinations.
In a given time slot, n vehicles simultaneously attempt to gain access, resulting in competition conflicts. The number of combinations in such scenarios is calculated as Equation (8)
N c o l n = N 1 n 1 L L 1 N n , n N
where N c o l n represents the count of combinations involving conflicts among n vehicles, wherein all n vehicles attempt to select a slot simultaneously. The meaning of this expression is that a certain vehicle is combined with any n 1 vehicles among the set of N 1 vehicles. The total number of possible combinations is determined by the value of N 1 n 1 . Subsequently, exercise your autonomy by selecting freely among L available options. There exist L alternatives to choose from. The remaining N n vehicles have the freedom to choose from the remaining L 1 slots, resulting in a total of L 1 N n possible choices. Overall, there are N 1 n 1 L L 1 N n combinations available. In the absence of multiple vehicles vying for a slot, there is no occurrence of competition conflict. The probability of successfully accessing the slot remains
p a c c = p c o l 0 = N c o l 0 N c m b = L 1 L N 1 .
When multiple vehicles concurrently attempt to access a slot, the likelihood of encountering competition conflicts is
p c o l n = N c o l n N c m b = N 1 n 1 L 1 N n L N 1 .
A slot is selected by multiple vehicles, and the likelihood of conflicts is
p c o l = p i 2 = i = 2 N p c o l i = i = 2 N N 1 i 1 L 1 N i L N 1 .
According to Equation (9), we can obtain
L ln p a c c = L ln L 1 L N 1 = N 1 L L 1 > 0 .
Therefore, p a c c monotonically increases with L. The access probability p a c c also increases as the value of L increases.
According to Equation (10), let L ln p c o l n = 0 , then obtain the Equation (13)
L = n 1 ! N 1 n 1 ! 1 N n 1 ! n .
The maximum value of p c o l n occurs at this point in time. It represents the probability that n vehicles select the same slot for collision, which is maximized. When p c o l 2 , p c o l 3 , and p c o l 4 are maximum, the relationship between L and N is shown in Equations (14)–(16)
L = N 1 s . t . max p c o l 2
L = 2 N 1 N + 1 s . t . max p c o l 3
L = 6 N 1 5 N 2 s . t . max p c o l 4 .

4.3. Access Success and Failure Probability When Considering Capture Effect

When considering the capture effect, successful access may occur when multiple vehicles simultaneously contend for a slot. The probability of achieving successful access under such circumstances is enhanced due to the capture effect. The conditional probability in cases of competition conflict can be represented by Equation (17).
Δ p s u c = p c a p p c o l = i = 2 N p c o l i p c a p i .
When considering the capture effect, the probability of successful slot access can be expressed as Equation (18), while the probability of slot access failure is represented by Equation (19).
p s u c = p a c c + Δ p s u c = p a c c + i = 2 N p i p c a p i
p f a i l = p c o l Δ p s u c = p c o l 1 p c a p = i = 2 N p c o l i 1 p c a p i

4.4. Access Methods When Access Probability Constraints

Safety is the paramount concern in VANETs, with numerous factors influencing it. Among these, ensuring the timely connectivity of vehicles to VANETs through roadside units stands out as the most crucial aspect. Access delay and access success rate are two key dimensions of this issue for vehicles. A low delay implies a high access success rate and vice versa. Therefore, enforcing a constraint on the vehicle’s access success rate to roadside units becomes imperative for guaranteeing VANET safety. The threshold value for this success rate may vary based on different road conditions; however, addressing this problem is essential. This paper proposes three approaches to enhance the access success rate.

4.4.1. Increase the Number of Access Slots to Improve the Success Rate of Vehicle Access

Revised sentence: “In this scenario, the probability of multiple vehicles selecting the same time slot simultaneously is reduced, thereby enhancing the success rate of accessing the slot in a single attempt through the comprehensive configuration of time slot resources”.
Assuming that the threshold of the access success rate is p t h , then
p s u c = p a c c + p c a p p c o l > p a c c > p t h .
According to Equations (9) and (15), Equation (21) can be inferred
L > 1 1 e ln p t h N 1 .
where · denotes the floor function. When Equation (21) is satisfied, the one-time access success probability of the vehicle can be guaranteed to exceed p t h .

4.4.2. Improving the Success Rate of Vehicle Access in VANETs by Increasing the Access Times

Theoretically, for a given vehicle V1, the initial attempt to access fails, and the probability of successful access within n attempts is described by Equation (22)
p i n n = 1 p s u c n 1 p s u c .
The time interval is Δ t . The method of accessing the slot is implemented using an equal time interval cycle mode, without considering the access back time strategy. The time required for the n-th successful access is represented as Equation (23)
t n = n 1 Δ t p i n n .
In the practical application scenario, it is imperative for the vehicle to access the roadside unit slot at a specific time t n as the Equation (24) in order to satisfy the conditional real-time requirements
t n < t max .
Therefore, the maximum value of access times, denoted as n max , can be calculated when the access slot interval Δ t is constant. In normal circumstances, the maximum duration t max is determined by vehicle speed and safe distance under road conditions. However, in practice, the TDMA slot cycle time is very short and vehicle travel distance is limited. Thus, it is reasonable for vehicles that fail to access roadside units to attempt multiple accesses in order to improve their success rate.
In the initial scenario, assuming that a total of N 1 vehicles randomly access L 1 available slots, the probability of the first vehicle to successfully gain access can be determined using either Equation (9) or (13), denoted by p 1 . The number of vehicles successfully accessing slots after the first random access is N 1 p 1 , and these vehicles occupy the same number of slots. The number of vehicles that have not successfully established a connection can be expressed as N 2 = N 1 N 1 p 1 , while the remaining slots can be represented by L 2 = N 1 N 1 p 1 . According to Equation (9) or (13), the probability of the second successful vehicle gaining access is denoted by p 2 . The number of vehicles successfully accessing slots after the second random access is N 2 p 2 , and they occupy N 2 p 2 time slots. The number of vehicles that have not been successfully accessed is given by N 3 = N 2 N 2 p 2 , where N 2 represents the total number of vehicles and p 2 denotes the probability of successful access. Similarly, the remaining time slots can be calculated as L 3 = N 2 N 2 p 2 . Furthermore, Equation (9) or (13) provides an expression for the probability ( p 3 ) of achieving a third successful access to vehicles. The process is N 1 L 1 p 1 N 2 L 2 p 2 N 3 L 3 p 3 .
Equations (25) and (26) present the probabilities of total access failure and total access success, respectively, after three random accesses
p f a i l = 1 p 1 1 p 2 1 p 3
p s u c = 1 p f a i l .

4.4.3. Revising the Vehicle Transmission Power to Enhance the Capture Probability and Thereby Improve the Success Rate of Vehicle Access

In accordance with the fundamental principles of the capture effect, augmenting the transmission power of a vehicle can enhance its likelihood of being allocated slots when competing with other vehicles, thereby improving the success rate of vehicle access to slots. When the transmission power p t exceeds z j = 1 n 1 p j , it means that the capture effect occurs in the region below z j = 1 n 1 p j .
Pr p t < z j = 1 n 1 p j = Pr p t < z · E j = 1 n 1 p j = Pr p t < z · n 1 E p j
where p j obeys a Chi-square distribution with one degree of freedom.
The condition N < L is typically necessary to enhance the access success rate and reduce the access delay, particularly for security information frames. This implies that the likelihood of multiple vehicles contending for the same time slot simultaneously is exceedingly low. Consequently, the number of conflicting vehicles can be limited to a maximum of 4, disregarding scenarios where it exceeds this threshold. When z = 2 , we can derive
Pr p t < z j = 1 n 1 p j = Pr p t < z · n 1 E p j = Pr p t < 6 = 0.9857 .
Equation (28) demonstrates that a 7.8 dB increase in vehicle power guarantees an access success rate exceeding 98%. Moreover, when the vehicle power is amplified by 9 dB, it ensures an access success rate surpassing 99.7%.
The access success probability of a vehicle can be improved by increasing the transmission power, while keeping other conditions unchanged. However, this approach is not an overall optimal solution but rather a priority due to the resulting failure of competitive time slots for other vehicles and decrease in access success rate. Nevertheless, it remains feasible and necessary within the context of security information framework.

4.4.4. Access Method Subject to Constraints on Access Probability

After considering the aforementioned cases comprehensively, it becomes evident that adopting a single method has its limitations. Hence, we propose a comprehensive access approach. The specific methodology is as follows: the time slot length is set to L = 2 N , with access times generally being three-fold, twice in the high-speed section and four times in the low-speed section. In situations requiring safety information transmission during emergencies, an increase of 7 dB to 9 dB in transmission power is implemented.

5. Simulation

In this section, we present the simulation results of the algorithm performance. Most simulations were conducted using both numerical and Monte Carlo methods. The Monte Carlo method was employed to validate the accuracy of the numerical simulation results, with an average value obtained from 10,000 independent random experiments. All simulations were performed using MATLAB 2022b software, with random numbers generated by internal MATLAB function. In the provided simulation figures, the legend for the numerical simulation method is labeled as ‘Ana’, while the legend for the Monte Carlo simulation method is labeled as ‘Sim’.

5.1. Simulation of Capture Effect

The relationship between the acquisition probability and the number of vehicle conflict n, the Rician factor K, and the power ratio threshold z of capture effect is shown in Figure 2 based on Equation (5).
In Figure 2, the relationship between the capture probability p c a p and the power ratio threshold z is depicted for six combinations of vehicle conflict number n and Rician factor K. The simulation curves are divided into two groups, with three curves corresponding to n = 2 forming one group, and three curves corresponding to n = 3 forming the other group. This observation highlights that the impact of n on the capture probability p c a p outweighs that of K. Moreover, when both K and n remain constant, p c a p exhibits a rapid decrease as z increases. These findings indicate that p c a p , particularly when considering values of n 3 , tends to be very small. Additionally, for values of z 10 , p c a p also remains negligible. These empirical laws serve as a foundation for approximating the calculation of capture probability.

5.2. Simulation of the Model

According to Equations (9) and (10), Table 1 presents the probabilities of successful vehicle access to the roadside unit slot and conflicts arising from 2, 3, or more vehicles simultaneously selecting a slot. The capture effect is not considered in this analysis.
In Table 1, the probabilities of successful access for vehicle 0 under various conditions are presented, including “extreme conditions”, “more vehicles with fewer slots”, “fewer vehicles with more slots”, and “general conditions”, as well as the probability of conflicts arising from multiple vehicles selecting a slot simultaneously. These probabilities can be analyzed quantitatively to assess both successful access and conflict occurrences. Furthermore, they serve as a means to validate the accuracy of the algorithm.
According to Equations (9) and (10), Figure 3 depicts the relationship between the probability of successful vehicle access to the roadside unit slot, as well as the probabilities of 2, 3, and 4 vehicles simultaneously selecting a slot leading to conflicts, in relation to the number of vehicles. In this analysis, we do not consider the capture effect and assume a constant time slot length.
In Figure 3, with a fixed number of slots L = 50 , the range of vehicles N varies from 1 to 100. The term “no collide” refers to the scenario where only one vehicle successfully selects and connects to a slot without any conflicts. On the other hand, “2 collide” indicates that two vehicles simultaneously select the same slot, resulting in a conflict. Similar patterns can be observed for other scenarios as well. Figure 3 demonstrates that, when the number of slots remains constant, the probability of successful access without slot selection conflicts decreases as the number of vehicles increases. When N is twice as large as L, this probability reduces to less than 10%. In cases where there are slot selection conflicts, it is predominantly observed between two or three cars, while conflicts involving four or more cars are relatively rare. Additionally, there is a high likelihood of the capture effect when two or three cars experience slot selection conflicts; however, this effect becomes negligible when four or more cars encounter such conflicts. Therefore, our focus on studying capture effects should primarily revolve around scenarios involving two or three cars slot selection conflicts while disregarding those with four or more cars selections.
According to Equations (9) and (10), in the absence of considering the capture effect and with a constant number of vehicles, Figure 4 illustrates the relationship between the probability of successful vehicle access to the roadside unit slot, as well as the probabilities of two, three, and four vehicles simultaneously selecting a slot causing conflicts.
In Figure 4, for a fixed number of vehicles N = 50 , the range of slots L is from 1 to 500. The term “no collide” refers to a scenario where only one vehicle selects a slot and successfully accesses it without any conflict, while “2 collide” indicates that two vehicles select the same slot simultaneously, resulting in a conflict. The remaining cases follow similar patterns. Figure 4 illustrates that, as the number of slots increases, there is a rapid escalation in the probability of slot selection conflicts, with successively increasing probabilities observed for scenarios involving four, three, and two vehicles. Subsequently, this probability gradually decreases but at a slower rate for conflicts between two vehicles. When the number of slots exceeds 100, the likelihood of conflict between car 4 and car 3 becomes negligible and can be disregarded. These findings demonstrate that, when dealing with large numbers of slots and relatively fewer vehicles, the capturing effect primarily considers conflicts between pairs of vehicles while other situations have minimal impact.
When considering the capture effect, successful access can occur when multiple vehicles simultaneously contend for a slot. According to Formula (13), the probability of successful access under this condition represents an increment in the probability due to the capture effect. This corresponds to the conditional probability in cases of competition conflict, as illustrated in Figure 5 and Figure 6.
According to Equation (13), the factors affecting the acquisition probability are L, N, and K. In Figure 5 and Figure 6, we set L = 50 and varied the number of vehicles, N, from 1 to 150. For Figure 5, we fixed K = 2 and varied spreading factor, z, from 2 to 5. For Figure 6, we fixed z = 2 and varied K from 2 to 5. Our results show that (1) when there are as many vehicles as slots ( N = L ), the capture probability is the highest with a significant capture effect; (2) when there are a few vehicles relative to slots ( N L ), acquisition probability is very low due to low collision probabilities; (3) when there are many more vehicles than slots ( N L ), the capture probability decreases due to high collision probabilities but also because competition for access reduces the likelihood of successful captures; (4) comparing Figure 5 and Figure 6, it can be seen that spreading factor has a greater impact on capture probability than does value of K.
The relationship between the probability of a vehicle successfully accessing a roadside unit slot and the number of vehicles is depicted in Figure 7, based on Equations (10) and (14).
The simulation parameters in Figure 7 are L = 50 , z = 3 , K = 3 , and the number of vehicles, denoted as N, ranges from 1 to 100. As the number of vehicles increases while keeping the number of slots constant, there is an elevated likelihood for multiple vehicles to select the same slot simultaneously, leading to a continuous decline in successful access probability. Figure 7 demonstrates that considering the capture effect significantly enhances the probability of successful vehicle-to-roadside unit access under similar conditions.
According to Equations (10) and (14), Figure 8 illustrates the correlation between the probability of successful vehicle access to a roadside unit slot and the number of slots.
The simulation parameters in Figure 8 are N = 50 , z = 3 , K = 3 , and the number of time slots L ranges from 1 to 500. As the number of time slots increases while keeping the number of vehicles constant, the likelihood of multiple vehicles selecting the same time slot simultaneously decreases, leading to an increased probability of successful time slot access. Figure 8 demonstrates a significant enhancement in vehicle’s successful access to roadside units when considering the capture effect under similar conditions.

5.3. Simulation of Performance

5.3.1. Time Responsiveness

The probability of successful access for vehicle V1 until the n-th attempt is as follows. Figure 9 illustrates a rapid decline in the probability of success for each subsequent access attempt, with the fourth and subsequent attempts having a very low probability of success. Consequently, if an access failure occurs, there is a high likelihood of achieving access success after three consecutive attempts.
We considered three cases in which the number of vehicles and the number of slots are, respectively, 100/200, 50/100, and 100/100 as Figure 10.
In the 100/200 and 50/100 cases, all the vehicles access successfully within 5 times. In the case 100/100, due to intense competition among vehicles, they need to go through multiple rounds of competition in order to successfully connect with the RSU. The competition for vehicle access time slots is more intense, requiring more attempts to establish connections. Figure 10 meanwhile demonstrates that the proposed method in this paper outperforms ADHOC MAC, particularly when there are many vehicles vying for limited time slots and the competition is fierce. The ADHOC MAC simulation data are sourced from ref. [2].
We consider a highway equipped with a roadside unit, where vehicles enter and exit the coverage area of the RSU. Assuming a constant speed of 100 km/h for vehicles, the inter-vehicle distance follows a uniform distribution. The RSU coverage ranges are 300 m, 400 m, and 500 m, respectively. Figure 11 illustrates the direct correlation between vehicle density and the successful connection of vehicles to roadside units.
The graph in Figure 11 demonstrates that, at low vehicle densities, the probability of successful access is 1. However, as the vehicle density surpasses a certain threshold, there is a significant decrease in the likelihood of successful access. Specifically, when the RSU coverage range is set to 300 m, the probability of successful access starts declining once the vehicle density exceeds 0.16.
The algorithm demonstrates superiority over the C-MAC algorithm, as depicted in Figure 11. This advantage becomes more pronounced when the RSU coverage range is 300 m. With an increase in vehicle density, the probability of successful vehicle access rapidly decreases. However, compared to the C-MAC method, this decrease occurs at a slower rate due to the capture effect. Consequently, this characteristic renders this algorithm more suitable for urban traffic scenarios characterized by significant fluctuations in vehicle density. The C-MAC simulation data are sourced from ref. [23].

5.3.2. Selection of Parameters under the Constraint of Successfully Accessing Probability

For ensuring security, it is imperative that newly arrived vehicles can access the VANETs in a timely manner through the roadside unit with a high probability of success. In the FSA network, there exist three primary approaches to enhance the vehicle’s access success rate: (1) augmenting the configuration of access slot numbers; (2) mitigating failure probability via multiple accesses; and (3) amplifying the transmission power of vehicles to improve the capture probability.
(1)
Increase the number of access slots to improve the success rate of vehicle access.
The objective of this approach is to prioritize access delay, allocate resources comprehensively, and enhance the success rate of one-time access. The simulation results in Figure 12 demonstrate the impact of different values (0.6, 0.7, 0.8, and 0.9) for p t h as per Equation (21).
It can be observed from Figure 12 that a significantly high access success rate can be achieved when the number of slots is abundant. Specifically, with ten times more slots than vehicles, the one-time success rate of vehicle access to the roadside unit exceeds 90%.
(2)
Increase access times to improve vehicle access success rate.
The objective of this approach is to comprehensively consider both the delay and the availability of slot resources in order to enhance the access success rate through multiple access. This method requires fewer slot resources, albeit resulting in a higher vehicle access delay to the roadside unit, making it particularly suitable for low-speed scenarios. Based on Equations (25) and (26), the simulation results are presented in Table 2.
The results presented in Table 2 demonstrate that, when the number of slots is twice the number of vehicles, the final access success rate exceeds 98.7% after three consecutive attempts. In comparison to method (1), this approach significantly reduces the number of provided slots while maintaining a remarkably high access success rate.
(3)
Enhance the transmission power to elevate the success rate of vehicle access by augmenting the capture probability.
The capture probability can be enhanced by increasing the transmitting power of the vehicle. Figure 13 illustrates the relationship between the access success probability and the number of slots, considering N = 50 , as derived from Equations (9), (10) and (27). In this scenario, we account for the capture probability by augmenting the transmission power of vehicles.
The access success probability exhibits a slow increase with the number of slots when the transmission power is small and the capture probability is neglected, as depicted in Figure 13. However, as the transmitting power of vehicles increases, a collision capture effect between two vehicles emerges. Further increasing the transmitting power leads to collision capture effects involving three or four vehicles. Under these circumstances, the access success probability experiences a rapid growth with an increasing number of slots. Remarkably enhanced access success probabilities are observed under identical conditions.
It is worth noting that increasing the transmission power for a specific vehicle can enhance the access success probability. However, this enhancement comes at the expense of reduced success rates for other vehicles’ access attempts. Consequently, while not an overall optimal approach, it becomes indispensable in emergency situations for individual vehicles.

6. Conclusions

In this paper, we propose a novel FSA MAC protocol based on the capture effect and derive the closed-form expression of access probability in the Rician fading channel. We establish a system model where N vehicles compete for L slots, and analyze the impact of vehicle and slot numbers on the success probability of vehicle access. From a security perspective, we suggest that vehicle access to roadside units must adhere to constraints regarding access success rate. Under these conditions, we derive requirements for the slot number, access times, and vehicle transmission power. Finally, through simulation verification, we validate our proposed model and algorithm.

Author Contributions

Conceptualization, L.L. and W.X.; methodology, L.L. and W.X.; software, Z.S.; validation, W.X.; formal analysis, Z.S. and W.X.; investigation, L.L. and W.X.; resources, L.L.; data curation, Z.S.; writing—original draft preparation, L.L.; writing—review and editing, Z.S.; visualization, L.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Fujian Provincial Natural Science Foundation (Grant number 2023J01810), the Guidance Projects of FuJian Science and Technology Agency: 2022H0022, the Project of the Xiamen Science and Technology Bureau: 2022CXY0315, the Project of the Xiamen Science and Technology Bureau: 2022CXY0317.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data that support the findings of this study are available from the corresponding authors upon reasonable request.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Baccelli, F.; Blaszczyszyn, B.; Muhlethaler, P. An Aloha protocol for multihop mobile wireless networks. IEEE Trans. Inf. Theory 2006, 52, 421–436. [Google Scholar] [CrossRef]
  2. Borgonovo, F.; Capone, A.; Cesana, M.; Fratta, L. ADHOC MAC: New MAC Architecture for Ad Hoc Networks Providing Efficient and Reliable Point-to-Point and Broadcast Services. Wirel. Netw. 2004, 10, 359–366. [Google Scholar] [CrossRef]
  3. Han, C.; Dianati, M.; Tafazolli, R.; Liu, X.; Shen, X. A Novel Distributed Asynchronous Multichannel MAC Scheme for Large-Scale Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 2012, 61, 3125–3138. [Google Scholar] [CrossRef]
  4. Wang, Y.; Shi, J.; Chen, L.; Lu, B.; Yang, Q. A Novel Capture-Aware TDMA-Based MAC Protocol for Safety Messages Broadcast in Vehicular Ad Hoc Networks. IEEE Access 2019, 7, 116542–116554. [Google Scholar] [CrossRef]
  5. Choi, S.S.; Kim, S. A dynamic framed slotted aloha algorithm using collision factor for RFID identification. IEICE Trans. Commun. 2009, 92, 1023–1026. [Google Scholar] [CrossRef]
  6. Ferreira, H.P.A.; Assis, F.M.D.; Serres, A.R. A Novel RFID Method for Faster Convergence of Tag Estimation on Dynamic Frame Size ALOHA Algorithms. IET Commun. 2019, 13, 1218–1224. [Google Scholar] [CrossRef]
  7. Cassará, P.; Cola, T.D.; Gotta, A. A Statistical Framework for Performance Analysis of Diversity Framed Slotted Aloha With Interference Cancellation. IEEE Trans. Aerosp. Electron. Syst. 2020, 56, 4327–4337. [Google Scholar] [CrossRef]
  8. Wang, Y.; Shi, J.; Chen, L. Capture Effect in the FSA-Based Networks under Rayleigh, Rician and Nakagami-m Fading Channels. Appl. Sci. 2018, 8, 414. [Google Scholar] [CrossRef]
  9. Hadzi-Velkov, Z.; Spasenovski, B. Capture effect in IEEE 802.11 basic service area under influence of Rayleigh fading and near/far effect. In Proceedings of the 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Lisbon, Portugal, 18 September 2002; Volume 1, pp. 172–176. [Google Scholar]
  10. Tian, N.; Cai, X.; Cheng, J.; Yue, W.; Luo, M. Short-Packet Transmission in Irregular Repetition Slotted ALOHA System over the Rayleigh Fading Channel. Int. J. Pattern Recognit. Artif. Intell. 2022, 36, 2259016. [Google Scholar] [CrossRef]
  11. Pejoski, S.; Hadzi-Velkov, Z. Slotted ALOHA Wireless Networks with RF Energy Harvesting in Nakagami-m Fading. Ad Hoc Netw. 2020, 107, 102235. [Google Scholar] [CrossRef]
  12. Yue, Z.; Yang, H.H.; Zhang, M.; Pappas, N. Age of Information Under Frame Slotted ALOHA-Based Status Updating Protocol. IEEE J. Sel. Areas Commun. 2023, 41, 2071–2089. [Google Scholar] [CrossRef]
  13. Sun, M.; Guo, Y.; Zhang, D.; Jiang, M.M. Anonymous Authentication and Key Agreement Scheme Combining the Group Key for Vehicular Ad Hoc Networks. Complexity 2021, 2021, 5526412. [Google Scholar] [CrossRef]
  14. Qiong, W.; Shuai, S.; Ziyang, W.; Qiang, F.; Pingyi, F.; Cui, Z. Towards V2I Age-aware Fairness Access: A DQN Based Intelligent Vehicular Node Training and Test Method. Chin. J. Electron. 2023, 32, 1230–1244. [Google Scholar] [CrossRef]
  15. Akyıldız, T.; Ku, R.; Harder, N.; Ebrahimi, N.; Mahdavifar, H. ML-Aided Collision Recovery for UHF-RFID Systems. In Proceedings of the 2022 IEEE International Conference on RFID (RFID), Las Vegas, NV, USA, 17–19 May 2022; pp. 41–46. [Google Scholar]
  16. Yu, J.; Zhang, P.; Chen, L.; Liu, J.; An, J. Stabilizing Frame Slotted Aloha Based IoT Systems: A Geometric Ergodicity Perspective. IEEE J. Sel. Areas Commun. 2020, 39, 714–725. [Google Scholar] [CrossRef]
  17. Bacco, M.; Cassara, P.; Gotta, A.; Cola, T.D. Diversity Framed Slotted Aloha with Interference Cancellation for Maritime Satellite Communications. In Proceedings of the ICC 2019–2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar]
  18. Rajeswar, R.G.; Ramanathan, R. An Empirical study on MAC layer in IEEE 802.11p/WAVE based Vehicular Ad hoc Networks. Procedia Comput. Sci. 2018, 143, 720–727. [Google Scholar]
  19. Liu, J.X.; Ding, S.B.; Zhang, L.; Xie, X.P. Event-driven intermittent control for vehicle platooning over vehicular ad hoc networks. Int. J. Robust Nonlinear Control 2023, 33, 1214–1230. [Google Scholar] [CrossRef]
  20. Shah, A.F.M.S.; Ilhan, H.; Tureli, U. Modeling and Performance Analysis of the IEEE 802.11 MAC for VANETs under Capture Effect. In Proceedings of the 2019 IEEE 20th Wireless and Microwave Technology Conference (WAMICON), Cocoa Beach, FL, USA, 8–9 April 2019; pp. 1–5. [Google Scholar]
  21. Menouar, H.; Yagoubi, M.B.; Ouladdjedid, L.K. CSSA MAC: Carrier sense with slotted-Aloha multiple access MAC in vehicular network. Int. J. Veh. Inf. Commun. Syst. 2018, 3, 336–354. [Google Scholar]
  22. Chowdhury, M.S.; Ullah, N.; Al Ameen, M.; Kwak, K.S. Framed slotted aloha based MAC protocol for low energy critical infrastructure monitoring networks. Int. J. Commun. Syst. 2015, 27, 1783–1797. [Google Scholar] [CrossRef]
  23. Kim, Y.; Lee, M.; Lee, T.J. Coordinated Multichannel MAC Protocol for Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 2016, 65, 6508–6517. [Google Scholar] [CrossRef]
  24. Qi, H.M.; Chen, J.Q.; Yuan, Z.Y.; Fan, L.L. A Low Energy Consumption and Low Delay MAC Protocol Based on Receiver Initiation and Capture Effect in 5G IoT. In Proceedings of the Algorithms and Architectures for Parallel Processing: 21st International Conference, Virtual Event, 3–5 December 2022; pp. 709–723. [Google Scholar]
  25. Jeong, J.; Choi, S.; Yoo, J.; Lee, S.; Kim, C.K. Physical layer capture aware MAC for WLANs. Wirel. Netw. 2013, 19, 533–546. [Google Scholar] [CrossRef]
  26. Sanchez-Garcia, J.; Smith, D.R. Capture probability in Rician fading channels with power control in the transmitters. Commun. IEEE Trans. 2002, 50, 1889–1891. [Google Scholar] [CrossRef]
Figure 1. System model (n vehicles compete for L slots).
Figure 1. System model (n vehicles compete for L slots).
Sensors 24 00992 g001
Figure 2. Capture probability vs. power ratio threshold.
Figure 2. Capture probability vs. power ratio threshold.
Sensors 24 00992 g002
Figure 3. Relationship between access probability, collision probability of n vehicles, and the number of vehicles (the slot number is constant, L = 50 ).
Figure 3. Relationship between access probability, collision probability of n vehicles, and the number of vehicles (the slot number is constant, L = 50 ).
Sensors 24 00992 g003
Figure 4. Relationship between access probability, collision probability of N vehicles, and slot number (the number of vehicles is constant, N = 50 ).
Figure 4. Relationship between access probability, collision probability of N vehicles, and slot number (the number of vehicles is constant, N = 50 ).
Sensors 24 00992 g004
Figure 5. Increment in successful access probabilities due to capture effect vs. number of vehicles.
Figure 5. Increment in successful access probabilities due to capture effect vs. number of vehicles.
Sensors 24 00992 g005
Figure 6. Increment in successful access probabilities due to capture effect vs. number of vehicles.
Figure 6. Increment in successful access probabilities due to capture effect vs. number of vehicles.
Sensors 24 00992 g006
Figure 7. Relationship between the probability of successful access to slots and the number of vehicles (the number of slots is constant).
Figure 7. Relationship between the probability of successful access to slots and the number of vehicles (the number of slots is constant).
Sensors 24 00992 g007
Figure 8. Relationship between the probability of successful access to slots and the number of slots (the number of vehicles is constant).
Figure 8. Relationship between the probability of successful access to slots and the number of slots (the number of vehicles is constant).
Sensors 24 00992 g008
Figure 9. Probability of successful access for the first time.
Figure 9. Probability of successful access for the first time.
Sensors 24 00992 g009
Figure 10. Average number of successful vehicles vs. access time (n).
Figure 10. Average number of successful vehicles vs. access time (n).
Sensors 24 00992 g010
Figure 11. Probability of successful access vs. vehicle density.
Figure 11. Probability of successful access vs. vehicle density.
Sensors 24 00992 g011
Figure 12. The number of slots vs. the number of the vehicle under the condition of access probability ( p t h = 0.6 , 0.7 , 0.8 , 0.9 ).
Figure 12. The number of slots vs. the number of the vehicle under the condition of access probability ( p t h = 0.6 , 0.7 , 0.8 , 0.9 ).
Sensors 24 00992 g012
Figure 13. Access success probability vs. the number of slots (N = 50).
Figure 13. Access success probability vs. the number of slots (N = 50).
Sensors 24 00992 g013
Table 1. Illustrative calculations of the probabilities of successful and unsuccessful access.
Table 1. Illustrative calculations of the probabilities of successful and unsuccessful access.
LN p col 0 p col 2 p col 3 p col 4 p col 5
Extreme conditions1110000
1201000
1300100
2110000
220.500.50000
230.250.500.2500
More vehicles with fewer slots10150.228770.355860.257010.114230.04413
10200.135090.285180.285180.179560.11500
10250.079770.212710.271800.221460.21426
Fewer vehicles with more slots30150.622120.300330.067320.0092850.00095
30200.525120.344040.106770.0208640.003201
30250.443240.366820.145460.0367840.007688
General conditions50400.454800.361980.140360.0353290.007534
50500.371600.371600.182010.0581930.016594
50600.303630.365590.216370.0838980.030516
Table 2. Success probability after three accesses (the number of slots is twice the number of vehicles).
Table 2. Success probability after three accesses (the number of slots is twice the number of vehicles).
N 1 L 1 p 1 N 2 L 2 p 2 N 3 L 3 p 3 p fail p suc
20400.602698280.747563230.875151.2522098.7478
501000.6050120700.749936560.897531.0122098.9878
1002000.60577401400.75071101100.912720.8577699.1422
2004000.60615792790.75302202200.912910.8471399.1529
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Lai, L.; Song, Z.; Xu, W. A Novel Framed Slotted Aloha Medium Access Control Protocol Based on Capture Effect in Vehicular Ad Hoc Networks. Sensors 2024, 24, 992. https://doi.org/10.3390/s24030992

AMA Style

Lai L, Song Z, Xu W. A Novel Framed Slotted Aloha Medium Access Control Protocol Based on Capture Effect in Vehicular Ad Hoc Networks. Sensors. 2024; 24(3):992. https://doi.org/10.3390/s24030992

Chicago/Turabian Style

Lai, Lianyou, Zhongzhe Song, and Weijian Xu. 2024. "A Novel Framed Slotted Aloha Medium Access Control Protocol Based on Capture Effect in Vehicular Ad Hoc Networks" Sensors 24, no. 3: 992. https://doi.org/10.3390/s24030992

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop