Bitam 2015
Bitam 2015
fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2371828, IEEE Communications Surveys & Tutorials
This paper has been submitted on January 2014 for consideration for These aforementioned limitations of vehicular network
publication in IEEE Communication Surveys and Tutorials. require all vehicles to engage in a unicast and multi-hop
S. Bitam is with the Laboratory LESIA, Department of Computer Science, routing process with each other and with stationary and fixed
University of Biskra, 07000 Biskra, ALGERIA (e-mail: salim.bitam@
laposte.net).
gateways. As result, a new type of vehicular networks known
A. Mellouk is with the Image, Signal and Intelligent Systems Laboratory- as vehicular ad-hoc network (VANET) has been conceived to
LISSI, Department of Networks and Telecoms, IUT C/V, University of Paris- provide a reliable and ubiquitous connectivity on the road to
Est Creteil (UPEC), 94400 Vitry sur Seine, Paris - FRANCE (e-mail:
[email protected]).
traffic users that enhances the vehicular infrastructure networks
S. Zeadally is with the College of Communication and Information, and enables ITS applications in terms of network reliability,
University of Kentucky, Lexington, 40506, Kentucky, USA (e-mail: and network coverage [5], where only on-board devices could
[email protected]).
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2371828, IEEE Communications Surveys & Tutorials
be deployed, and the communication cost is negligible [4]. messages should be guaranteed. In addition, multimedia
information can also play a role in traffic management and road
A Vehicular Ad-hoc NETwork (VANET) is considered as a
safety. For instance, a timely video stream that depicts a
specific kind of Mobile Ad-hoc NETwork (MANET) which
particular road situation (such as a major traffic congestion,
consists of a set of mobile nodes (Vehicles) and fixed nodes
fire, or natural disaster) ahead on a highway can enable drivers
known as Road-Side Units (RSUs). A VANET provides digital
to make appropriate decisions on whether to proceed or turn
data communication between vehicles through Inter-Vehicle
back [9]. Furthermore, there are also various types of comfort
Communication (IVC) and, between vehicles and RSUs
applications for VANETs which improve passengers’ traveling
through Vehicle-to-Roadside Communication (VRC). Due to
experience and provide informative services such as fuel
their restricted range of motion in terms of directions and
station locations, weather information, emergency and
speeds, VANET vehicles move according to an organized
breakdown services, interactive communication, Internet
mobility model with some differences between highways,
access, etc.
urban or rural areas. Moreover, a vehicle is also equipped with
some sort of radio interface or On-Board Unit (OBU) that It appears here that we need to develop and deploy efficient
enables short-range wireless IVCs and/or VRCs along with a routing algorithms which allow packets to be routed from the
Global Positioning System (GPS) integrated into vehicles to sender to the receiver via a set of intermediate nodes with a
facilitate location-based services. high level of Quality of Service (QoS) [10], [11] to ensure the
timely and reliable delivery of information and multimedia
It is widely accepted that ITS safety applications are the
data, and ITS applications [12]. QoS, in this context, means
most sensitive services in VANETs because of the significant
sending data between nodes with a minimum end-to-end delay
impact they can have on human lives.
and routing overheads. In addition, QoS also implies ensuring
It is worth mentioning that there are two types of ITS safety the successful delivery of the maximum number of transmitted
applications that can be distinguished in terms of their messages (i.e., with a minimum number of dropped packets)
transmission modes. The former is performed by relying on where the network bandwidth is optimally used. There are two
safety messages for broadcast or geocast mode, often used in main transmission modes in VANET routing: the first one is
single hop, and sent by fixed access points. We can cite called unicast in which data packets are sent to one
Freeway Management, Crash Prevention and Safety, Road destination. The second mode, known as multicast, aims to
Weather Management as examples of ITS safety applications transmit data packets to multiple destinations at once.
offered by fixed infrastructure vehicular networks [6]. The
Over the last couple of years, several routing protocols [13],
second type of ITS safety applications is provided by network
[14], [15], [16], [17] have been proposed in the literature to
vehicles which transmit safety messages to other vehicles over
support road safety, multimedia, and comfort applications in
multiple hops using a unicast mode. Collision Notification,
VANETs. These routing protocols were designed to discover
Collision Avoidance, Driver Assistance are examples of ITS
and maintain routes in order to disseminate information
safety applications provided by vehicles which form a
between any two VANET nodes (vehicles and/or RSUs) where
VANET and require routing solutions [6].
the sender is the source node, and the receiver the destination
ITS safety applications for VANET rely on the aggregation node. VANET routing protocols can be broadly classified into
of VANET information using safety messages which are sent two categories: topology-based routing protocols and
by each vehicle in the vehicular environment. These safety geography-based ones.
messages carry information such as the state of the other
Topology-based routing protocols determine routes based on
vehicles including their location, speed, acceleration, brake
topological links between nodes along the source-destination
state, etc.
path [13], [14]. Common characteristics shared among
The timely delivery and processing of such vehicular topology-based routing protocols include the accuracy of the
information can help vehicle drivers avoid accidents or to found destination, the reduced length of the discovered paths,
react appropriately [7]. Following an emergency brake or absence of loops, and a low rate of dropped messages.
weather conditions, traffic accidents or collisions can also be However, they also suffer from various drawbacks such as the
prevented by receiving emergency or warning messages instability of the found routes, high end-to-end delays and
generated and sent by VANET nodes; either particular routing overheads.
vehicles (such as police cars, ambulances, etc.) or by RSUs at
In contrast, geography-based protocols route data packets
the appropriate time, through a unicast and multi-hop routing.
without any knowledge of the underlying network topology.
We note here that the infrastructure-based vehicular networks
Geography-based protocols make use of the geographic
(i.e. V-WLAN or VCN) are not well-suited for certain direct
positions of the source and destination nodes to discover
vehicle-to-vehicle or vehicle-to-infrastructure communications
routes and to make packet forwarding decisions [15], [16].
due to limited presence of access point or cellular gateway in
This category of protocols is known for its robustness of the
the whole road traffic environment [8].
routes found as well as the reduced number of dropped
To ensure the timely reception of these kinds of safety messages during congestion. However, geography-based
messages, fast, reliable and efficient dissemination of protocols often incur considerable end-to-end delays. They
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2371828, IEEE Communications Surveys & Tutorials
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2371828, IEEE Communications Surveys & Tutorials
protocols: it can contain either mono or multi-objective routing packet with certain constraints such as a reduced end-to-end
processes that try to find best route with one or multiple criteria delay and few dropped packets. On the other hand, due to the
such as end-to-end delay, hop count, transmission cost or high-speed mobility of vehicles, there are frequent changes in
others. The second type is the unicast or multicast transmission the network topology, and selected paths could rapidly change
mode which can differentiate the different VANET routing and then, cause a delayed transfer of data, as well possible data
protocols. packet losses. This problem has prompted researchers to find
robust routing protocols that discover efficient and long
Bio-inspired approaches have showed their strengths and
effectiveness in various application scenarios. They have a strong
lifetime paths.
potential to address the challenges associated with VANET B. Mobility models used for VANET routing
routing such as vehicular network scalability, self-organized
To test and validate research studies in VANET routing, it
control of VANET’s dynamics, complexity of messages
is hard to conduct real experiments in vehicular areas due to
exchanges, and VANET robustness as will be highlighted below.
high risks, dangers and elevated costs of such tests. Therefore,
Based on the Reinforcement Learning (RL) paradigm, we to study VANET routing, modeling and simulating of
suggest a unified formal model of the bio-inspired multi- vehicular network with a high level of accuracy and reality are
modular approaches applied to VANET routing. This model necessary. To address these challenges, several research
aims at finding multiple solutions represented by a global activities have been proposed to simulate realistic VANET
objective function. The purpose of this contribution is to deal mobility models. We classify VANET mobility models
with VANET routing problems such as routes discovery and proposed in the VANET literature into four categories based
maintaining, parameter tuning, routing optimization etc., on the type of vehicular movement: random-based mobility
considered as a part of some global function to be built. This model, geographic Map-based mobility model, group-based
model performs an iterative process which is sufficient for mobility model, and prediction-based mobility model.
routing, especially when we have no a priori knowledge about
the global function to be built. Moreover, RL is more suitable 1) Random-based Mobility Models
for bio-inspired methods compared to traditional exact In this category, the Movement (location, velocity and
methods, where RL is focused on on-line performance, acceleration) of vehicles changes randomly over time. More
without any sub-optimal actions explicitly introduced. specifically, a vehicle selects a random destination and a speed
The rest of the paper is organized as follows. Section II between 0 and a maximum speed, and then it pauses for a
highlights a background of VANET routing and existing fixed number of seconds. Recently proposed random-based
standards. The basic bio-inspired concepts and operations mobility models include Random Waypoint Mobility Model
applied to VANET routing are explained in section III. The [39], and Random Walk Mobility Model [40]. Despite its
motivations for using bio-inspired techniques in VANET simplicity, random-based mobility models cannot be applied
routing are presented in section IV. In sections V, VI and VII, to certain vehicular scenarios with geographic restrictions and
we present each set of routing algorithms based on our obstacles such as buildings, streets, curves, etc. Moreover,
classification; Evolutionary algorithms for VANET routing are vehicles move in random fashion and do not displace with an
reviewed in section V, swarm intelligence optimization for increased or decreased velocity over the time as with the real
VANET routing is presented in section VI and the section VII movement of vehicles.
presents other bio-inspired routing studies. Based on all these
different approaches, we propose in section VIII a unified 2) Geographic Map-based Mobility Models
formal model for bio-inspired multi-modular approaches To overcome the limitations of random-based mobility
applied to VANET routing. Section IX presents some future models concerning geographic restrictions presented in
trends. Finally, section X concludes the paper. vehicular environment, several mobility models have been
proposed aiming to allow vehicles to move over constrained
II. VANET ROUTING BACKGROUND AND EXISTING and limited urban or rural maps. Vehicular maps consist of a
STANDARDS set of roads, streets, curves, obstacles, buildings, etc. which
This section presents a background on VANET routing and restrict vehicles displacements. Various models have been
VANET mobility models as well existing standards ratified for introduced, namely Manhattan Grid Mobility Model [41], City
VANET routing. Section Mobility Model [42], and Freeway mobility model
[43]. These types of models imply geographic restrictions as
A. Definition of VANET routing in reality and is very simple simulate. However some traffic
Routing is considered as one of the most important processes parameters such as network density, differentiating between
in VANET research that allows vehicular applications to vehicular scenarios in rush hours and off-pick hours may be
provide their digital services. Routing is the process of considered or predicted to improve these types of models.
selecting the best paths between the sender (i.e. source node)
and the receiver (i.e. designation node) through a set of
VANET nodes. To improve vehicular safety and to satisfy the
needs of traffic users, VANET routing should forward a data
4
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2371828, IEEE Communications Surveys & Tutorials
3) Group-based Mobility Models For DSRC, 75 MHz of spectrum at 5.9 GHz was allocated
to be used by DSRC operations in an approximate range of
Group-based mobility models focus on using the
1000 meters [48]. The DSRC spectrum band is organized into
collaboration among network nodes which have the same goal
7 channels of 10 MHz wide each, allowing parallel
such as traveling for the same destination. Therefore, the
transmissions of different applications. These channels are
network is divided into several groups, each with its own
reserved for both public and private data communications,
mobility behavior. Group-based mobility models include:
with higher priority given to public communications such as
Reference Point Group Mobility Model [44], Virtual Track
safety messages. One channel is restricted for safety
Mobility Model [45]. Despite the expected good outcomes
communications only (channel 178 called Control CHannel
(such as the reduced routing overhead) of this category, there
CCH), while the two channels at the ends of the spectrum
are some limitations with group-based models such as nodes
band are reserved for special purposes, namely critical safety
in the same geographic group do not always move in the same
of life and high power public safety. Moreover, all the
direction. Also, this category does not consider the network
remaining channels are Service CHannels (SCH) which can be
density.
used for either safety or non-safety applications.
4) Prediction-based Mobility Models Concerning energy, DSRC standard limited the peak
In prediction-based mobility models, the vehicle keeps transmit output power over the frequency band of operations
information about its previous location and velocity which to no more than 750 mW (milliWatt) (28.8 dBm decibel
will be correlated in order to predict its future movement. milliWatt), and the maximum Effective Isotropically Radiated
Hence, the changes in speed and direction of vehicles are Power (EIRP) to no more than 30 W (44.8 dBm), as the
smooth and realistic. Moreover, network density may be amount of power emitted by a DSRC isotropic antenna. DSRC
determined using prediction rules according to the vehicular used Orthogonal Frequency Division Multiplexing (OFDM) as
traffic flow. Examples in this category include the Gauss- the method of encoding digital data (digital modulation).
Markov mobility model [46], and the Markov-History based Furthermore, since transmissions are performed via the
Mobility Model [47]. Despite the practical realistic aspect of wireless interface, DSRC works in high vehicle speed mobility
prediction-based mobility models, when modeling mobile conditions (up to 120 mph (miles per hour)), and in extreme
nodes movement and network density, these models hide some weather conditions (e.g. rain, fog, snow, etc.) with a short time
VANET topology details such as obstacles, traffic lights, etc. delay.
which cannot be omitted. 2) Standards for Wireless Access in Vehicular Environments
(WAVE)
C. VANET Routing Standards
A VANET routing standard is a normative specification of As a part of IEEE 1609 series of Standards [49], IEEE
a wider array of technologies applicable to routing in vehicular Standard for Wireless Access in Vehicular Environments
networks. The standard allows telecommunication and (WAVE) was proposed to identify wireless access for
automotive industry operators to produce routing devices with vehicular wireless and mobile networks. WAVE was specified
uniform features in order to be used with certain portability. as a set of rules aiming to ensure safety, health, or
Also, standards are designed to support a variety of environmental protection, or ensure against interference with
applications based on vehicular communication which or from other devices or networks.
guarantee interconnectivity and interoperability among Initially, the physical layer and the Medium Access
different devices. This subsection presents several important Control of vehicular wireless connections were managed by
standards proposed for VANET routing. existing IEEE 802.11, 802.11a and 802.11p standards
respectively proposed for wireless networks (Wi-Fi).
1) Dedicated Short Range Communication (DSRC) Therefore, data is modulated using Orthogonal Frequency
Proposed initially by the Federal Communications Division Multiplexing (OFDM) and forwarded with data rates
Commission (FCC) of the US Department Of Transportation of up to 54 MBits/s within a radio frequency band of 5 GHz
(DOT) in 1999, Dedicated Short Range Communications range giving rise to transmission range of 100 meters. In
(DSRC) is a two-way, short-to-medium-range wireless WAVE, network upper layers are supported by IEEE 1609
communications capability that permits very high data standards. IEEE 1609.4 resides above the IEEE 802.11p and is
transmission critical in communications-based active safety considered as a MAC extension standard applied when DSRC
and non-safety applications in vehicular wireless networks. performs in a multi-channel environment. It helps a device
DSRC was developed to support vehicle-to-vehicle and with several radios to effectively switch among those
vehicle-to-roadside communications, where vehicles and channels, as well as to remain tuned to a single channel all the
RoadSide Units (RSUs) are assumed to be equipped with time [50].
OnBoard Units (OBUs) and wireless transmission devices,
respectively. The network services in the network and transport layers
are supported by IEEE 1609.3 standard. This standard defined
a new network layer protocol known as WAVE Short Message
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2371828, IEEE Communications Surveys & Tutorials
Protocol (WSMP) aimed to avoid the packet overhead the number of iterations must not exceed a maximum
associated with Internet Protocol (IP) using WAVE Short number to deal with the non- stagnation state.
Messages (WSMs) and WAVE Service Advertisements
2) Swarm Intelligence Optimization (SIO)
(WSAs). The security protocols are defined in IEEE 1609.2 by
the application of standard mechanisms for authenticating and Considered as bio-inspired algorithms, SIO includes
encrypting messages, especially WSMs and WSAs. computational techniques that are used to solve optimization
Concerning authentication, the sender’s authority to transmit problems by imitating the collective behavior of ant, bird and
messages is verified through a digital signature based on the fish or other biological species which leads to the emergence
Elliptic Curve Digital Signature Algorithm (ECDSA) [51]. of intelligent global behavior of these species. The result is a
self-organized behavior with simple rules used by the species
III. OVERVIEW OF BASIC BIO-INSPIRED CONCEPTS USED FOR used to fulfill their needs (i.e., food searching, reproduction,
VANET ROUTING defense, etc.) without any centralized administrative authority
We briefly present the basic concepts and operations often in the entire system [53].
used by different bio-inspired approaches, either for routing B. Basic Bio-inspired Algorithms
protocols or for optimization algorithms.
In this section, the main bio-inspired algorithms applied to
A. Fundamental Concepts and Operations the computational area and their principles are described
1) Basic Parameters of an Optimization Problem: (figure 2).
Optimization problem definition: in the computational 1) Genetic Algorithm (GA)
area, the optimization problem is defined as the selection
of a best solution (optimal solution) among others with Genetic algorithm is a bio-inspired algorithm proposed in
respect to some criteria [52]. 1970s [54]. The algorithm imitates the process of natural
Search Space (SSp): this includes all feasible solutions to evolution. GA is an optimization approach based on a
solve an optimization problem. SSp can be represented by population of individuals (called chromosomes) which
a graph in which each feasible solution can be marked by generate another population during an iteration. The initial
its value for the problem. population is set by using a random initialization. Afterward,
Objective function (Fitness function): is a computational all chromosomes (parents) are probably selected two by two in
function used to evaluate SSp solutions to find some order to participate in a crossover operation, followed by a
extreme (minimum or maximum) solution by considering mutation operation. Both of these operations result in a set of
the optimal one based on one or multiple objectives. chromosomes (offsprings) which are compared with the
parents so that the best chromosomes can be used for the next
Population and individual encoding: a population is a set
generation. The processes of selection, crossover, mutation,
of individuals where each individual represents a SSp
and generation are rerun until a stopping criterion is satisfied.
solution. Each individual is encoded using a data structure
We briefly describe the selection, crossover, and mutation
based on Boolean, Strings, Trees etc. Some individual
operations below.
encoding types include: Binary encoding which consists of
a set of binary variables; Discrete encoding is based on a a) Selection Strategy
discrete vector of integer values; natural encoding in The selection strategy determines the chromosomes which
which an individual is represented by a vector of integer will be chosen to be the parents of the offsprings of the next
values. Encoding plays a major role in the efficiency and generation. Parents are selected according to their fitness using
effectiveness of the resolution algorithm which helps to various strategies. For example, Roulette Wheel Selection
reduce the computational complexity [52]. (RWS) [55] is based on the assignment of a selection
Initialization: is the way of assigning a set of initial values probability to each chromosome that is proportional to its
from SSp to form the initial population. There are several fitness. These probabilities are represented on a roulette-wheel
ways to choose first solutions (initial population). For
example, the random initialization in which the first SSp
individuals are selected at random. With uniform
initialization, SSp individuals are equally likely to be
chosen (every individual of n individuals of SSp has equal
probability “1/n” to be selected).
Stopping criterion: is defined as a measured value which
controls the number of times of execution of the resolution
algorithm. This criterion can be static in which a fixed
number of iterations is set before starting the resolution
algorithm. The stopping criterion can also be dynamic
when the iterations are carried out and stopped only if the
fitness function does not improve after a certain number of
times (also known as the stagnation state). We note that
Figure 2. Main Bio-inspired Algorithms
6
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2371828, IEEE Communications Surveys & Tutorials
that has a circular shape and contains one indicator. Once the 3) Particle Swarm Optimization (PSO)
roulette-wheel is wheeled; it will stop with the indicator
The PSO algorithm [26] is similar to the way birds flock in
showing one of the represented probabilities and its
real life. Using swarm optimization, PSO considers a particle
corresponding chromosome is selected.
defined by its position (i.e., quality of solution) and its
b) Crossover Operation velocity (i.e., its ability to move toward another solution
Crossover is a binary operation that is applied to two which may be better). This algorithm ensures that each
chromosomes in order to generate two new chromosomes. particle chooses among the best previously encountered
Crossover simulates the reproduction of individuals, where the positions or moves toward a new position using the particle’s
representation of each chromosome is partitioned and gives velocity if this new one is the best. PSO performs these steps
rise to new chromosomes each of which consists of one part of until it reaches a stopping criterion.
one parent and another part of the second parent. Crossover 4) Bees Life Algorithm (BLA)
operation aims to generate new diversified solutions in SSp. It
Several computational problems have been solved using
is the choice of far solutions (offsprings) in SSp from the point
new approaches inspired by Bees’ behaviors. The general
of view of fitness compared to the original solutions (parents).
approach is called Bees Life Algorithm in which the two
There are several crossover strategies such as one-point
major behaviors of bees have been used: food foraging and
crossover, where one cut-off point is randomly chosen in the
reproduction.
representation of both chromosomes to be divided into two
parts. The first part of the first parent is added to the last part Food foraging behavior is observed when bees search new
of the second one to form the first offspring chromosome, and nest sites or during the food source foraging. To do this, some
vice versa. Moreover, a two-point crossover has also been bees (called scouts) navigate and explore the region to find a
proposed where two cut-off points are applied [56]. food source. If found, they come at the dance floor in the
c) Mutation Operation
beehive to share this discovery with their nest mates via the
language of dance which can be round or waggle related to the
Mutation is a unary operation that is applied to one distance of discovery. Some bees (called foragers) are
chromosome generated after crossover operation. Mutation recruited to exploit this discovery.
aims to perform a small change in the representation of a
chromosome to reach a new solution near to the original one Reproductive behavior is guaranteed by the queen which
in SSp from the point of view of fitness. There are various mates with several drones in a mating-flight. After three days,
mutation strategies and one popular one is the one-point the queen lays its eggs. The unfertilized egg will give rise to a
mutation [57], where one cut-off point is randomly chosen in drone, while, the fertilized egg gives rise to worker or queen
the representation of the offspring to be changed with a depending on the food quality given to the larvae [60].
random value. This strategy generates a new chromosome 5) Fuzzy Logic of Human Brain (FL)
which is near to the first one in the SSp. Another mutation
strategy called Uniform Mutation, in which a random value is Fuzzy logic (also called probabilistic logic) corresponds to
selected between the user-specified upper and lower bounds approximate reasoning rather than fixed and exact. FL [61] is
which replaces a value of the chosen cut-off point of the inspired from the human brain which imitates the
chromosome [58]. interpretation of uncertain sensory information [62]. Fuzzy
logic is based on the use of a set of variables which may have
2) Ant Colony Optimization (ACO) a truth value that ranges in degree between 0 and 1, against
ACO is a SIO algorithm which is inspired by the food source binary logic where variables may take only 0 or 1 values. The
searching behavior of ants and was proposed in 1992 [59]. In partial truth may represent more realistic systems, especially
their natural environment, ants exploit their areas randomly: the continuous systems which require an interval of values to
once they have found food, ants return to the colony while be explained.
laying down pheromone (a chemical substance) trails. This 6) Escherichia Coli Bacteria Behavior
path is likely to be used by other ants which follow the trail
with more pheromone being laid down and the quality of the An Escherichia coli (E. coli) bacterium is an ideal organism
path is reinforced against other paths that are less visited. for chemotaxis modeling because of the rich experimental
Nevertheless, over time, the pheromone trail starts to information collected over years of extensive research. Similar
evaporate thereby reducing its attractive strength. to many other bacteria, Escherichia coli bacteria are
Consequently, a short path, by comparison, gets marched over considered as an illness cause, affecting species immune
more frequently, and thus the pheromone density becomes system. These bacteria can move from a set of rigid flagella
higher on shorter paths than longer ones. The idea of ACO is that enables the bacteria to swim in regular or irregular
similar to this behavior by representing SSp solutions with directions. More specifically, two types of movements are
paths traveled by ants. performed. The first type is performed when the flagella turns
clockwise, then the bacteria tumble and do not move in any
particular direction (random movement in any direction). In
contrast, the second type is accomplished when the flagella
7
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2371828, IEEE Communications Surveys & Tutorials
turn counter-clockwise causing the bacteria to swim in a To address the data acquisition problem in WSNs, the authors
specific direction. The sensors of an E. coli are the receptor of [67] proposed the use of mobile sinks (particular nodes that
proteins that are stimulated by external substances. Based on are responsible to receive and process the network data to help
the level of nutrients (or attractants) a bacterium moves in make decisions relevant to the network context: forest, farm
different search modes. etc.). In [67], the authors proposed a routing protocol called
SIMPLE inspired by Swarm Intelligence, to maximize the
When the bacteria are placed in a substance with a nutrient
network lifetime. Since SIMPLE is based on swarm
with homogenous concentration, they exhibit a search
intelligence, it does not require any global information of the
behavior but with increased run length of swimming and
entire network to improve the network’s lifetime. A cooperative
decreased tumble time. However, when the bacteria detect a behavior between nodes (also known as collective behavior) is
change in the concentration level of the nutrition, they swim planned to achieve global optimal performance. SIMPLE was
along the gradient of concentration towards the most nutrition shown to yield better scalability and robustness against node
rich area, and spend less time tumbling [38]. This behavior has failures when compared with Ad hoc On-demand Distance
been applied to solve several computational problems by Vector routing (AODV) [35], Dynamic Source Routing (DSR)
representing SSp solutions with the bacteria area where the [68], and a traditional routing algorithm called Max-min
bacteria change place from one solution to another one [63]. Remaining Energy Protocol (MREP) [69].
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2371828, IEEE Communications Surveys & Tutorials
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2371828, IEEE Communications Surveys & Tutorials
algorithm with end-to-end delay as objective as well as the iterations). The simulations have shown that the GA-based
connectivity probability and hop count as constraints. Each IGRP could find a near-optimal solution in terms of
route of successive intersections between the vehicle and the probability of connectivity compared with the optimal value. It
RSU (i.e. the solution) is represented by natural encodings is worth noting that this proposal is based on the intersection
(strings format), such as routes (A-C-E-F), (A-B-D-F), or (A- nodes which are more appropriate for urban scenarios and can
C-D-F). The initial population which contains a set of be limited in highways or rural environments.
individuals (routes) is generated at random.
In [84], a hybrid geographic and Delay Tolerant Networks
After, the RWS strategy is applied to select two parents (DTN) routing protocol was proposed. This unicast protocol
(routes) to perform the probabilistic one-point crossover. Here, used a genetic algorithm to enhance the DTN routing protocol
a common intersection is searched between parents, and then which may be limited whenever the network is sparse. This
the two parts of routes are swapped to form two offsprings. proposal starts with a greedy forwarding in which the source
The following step is the mutation in which a random node sends a packet to an immediate neighbor that is
individual is randomly chosen from the population using a geographically closer to the destination. If there is no neighbor
uniform mutation. After this step, a random intersection is closer to the destination, perimeter forwarding is then
picked and is replaced with the adjacent intersection. These considered in which each node forwards packets through the
steps are performed until a fixed maximum number of perimeter to its first neighbor counterclockwise from itself
generations is reached. We note that AMR copes with network (this principle is called the right hand rule).
dis-connectivity by allowing vehicles to store and carry
Often, greedy and perimeter forwarding processes are less
messages while moving until it can forward the messages to a
efficient than DTN for VANET where the network is sparse
next valid node.
leading to network partitioning in terms of node density.
Numerical and simulation results show that AMR Therefore, a connection strategy between partitions should be
improved end-to-end delay and connectivity probability when defined which tries to find the switching time from the
compared with GPCR [16]. AMR also exhibited an adaptive perimeter mode to the DTN mode and to select a proper node
behavior when the network density changes. However, the for storing packets and carrying them from one partition to
complexity of finding the optimal routes can be increased another. This study used a genetic algorithm to train the DTN
because AMR assumes that a threshold of GA generation node evaluation system to determine the optimal DTN node.
should be executed even if the optimal solution is found early In other words, the GA is applied to determine how effective
on. Moreover, another possible drawback with AMR is that each parameter is in choosing the DTN node. There are
the applied crossover and mutation can give rise to long routes several parameters considered for the switching decision such
in which duplicated intersections can occur. as the vehicle’s speed, the vehicle’s direction, the distance
between vehicle and destination, and the probability of loss of
Saleet et al. in [31] proposed a routing protocol called the
network connectivity. The GA is initialized by the
Intersection-based Geographical Routing Protocol (IGRP). It
construction of the first generation set of chromosomes
is mostly used for packet forwarding from vehicles to the
(individuals).
Internet through a gateway (through which a packet must
traverse) by an effective selection of road intersections. IGRP Each chromosome is initialized by random values of the
proposed to discover an optimal path between the source and abovementioned parameters. Some chromosomes are selected
the destination in a unicast way, which consists of successive using selection strategies such as Roulette-wheel selection
interconnected road intersections using a genetic algorithm. (RWS) [55], to generate some offsprings using one-point
These road intersections are selected in a way to maximize the crossover and a probabilistic mutation (i.e., a chromosome is
probability of connectivity among the intersections as the mutated with a probability equal to 0.01%). This process is
protocol objective. This work requires satisfying QoS rerun four times. After an experimental study, the authors
requirements such as tolerable delay, bandwidth, and error obtained an improvement in terms of average delivery delays,
rate. and average delivery ratio against the original GeoDTN+Nav
especially, for the fourth generation. This proposed approach
A natural encoding has been used to define each
can be evaluated for rural scenarios to study the case of sparse
intersection in the backbone route. Then, a chromosome
networks. In addition, the vehicle speed (40 km/h) used in the
(individual) expresses one route by its ordered intersections. A
performance evaluation is very low to cope with the loss of
set of chromosomes is randomly selected to generate the initial
network connectivity limitation in VANET.
population. More specifically, each chromosome begins with
the intersection adjacent to the source node and the following 2) Multi-objective Sequential Genetic Algorithms
intersections are chosen at random until the Internet gateway
xChangeMobile [85] is a multi-objective, sequential
is reached. The authors used the roulette wheel selection
genetic algorithm that uses unicast geography-based routing
strategy to select parents and one point crossover to generate
for VANETs. It is an inter-vehicular content exchange system
offsprings. Moreover, a uniform mutation operator is applied
that makes use of two routing protocols, VanetDFCN and
to ensure solutions’ diversity and avoid the stagnation state on
ChunkXChange which are enhanced by genetic algorithms
wrong solution (local optimum).
with the aim of addressing multimedia packets lost due to
This GA algorithm is rerun until a maximum number of obstacles along the road and interrupting the transmission
iterations is reached (in this work the authors used 30 caused by gaps in the multimedia messages. First, the
10
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2371828, IEEE Communications Surveys & Tutorials
xChangeMobile system uses VanetDFCN as a broadcasting evaluating the resulting individual; then the algorithm decides
protocol which is an extension of the Delayed Flooding with whether the new offspring replaces the current one which then
Cumulative Neighborhood (DFCN) [86]. DFCN is a gets transferred (the replaced solution) to the external archive
mechanism for broadcasting packets from one node to its which is an additional population composed of less optimal
neighbors. DFCN has been extended to VanetDFCN by solutions found during the optimization process.
supporting additional parameters to decide if the received
The xChangeMobile system has been evaluated using the
packet needs to be forwarded or not in order to optimize the
Madhoc simulator [87] for a highway scenario. The MOCell
use of intermediate nodes. VanetDFCN requires the use of
algorithm was implemented in the jMetal framework [88]. The
GPS devices for each node (vehicle). VanetDFCN forwards
results obtained have shown that the two objectives (missing
the received packet only if the following three conditions are
chunks and bandwidth) are in conflict, and choosing a solution
satisfied: first, the packet should be received for the first time.
with better bandwidth leads to a decrease in the number of
Second, the received packet does not exceed a certain distance
missing chunks. In addition, the authors found out that around
called the Distance To Live (DTL) which indicates the
half of the obtained solutions have more than 50% of missing
maximum length of a path the message can travel and cannot
chunks in vehicles’ cache memories due to the short
be exceeded. Finally, a time estimate that the sender and the
simulation time (60 seconds). It is worth noting that this work
receiver are in the same range is used to compute the number
can be extended if it is further evaluated for both urban and
of grouped TCP packets called chunks, they could exchange.
rural scenarios.In [89], a Statistical Location-Assisted
It is worth noting that a chunk is a data container in which
Broadcast (SLAB) protocol was proposed as a multi-hop and
TCP packets are stored. A chunk consists of two parts: a
multicast protocol for VANETs. SLAB is based on machine
unique identifier placed in the header of chunk, and a chunk’s
learning techniques such as genetic algorithms and particle
content which is composed of one up to many TCP packets,
swarm optimization to automatically discover decision
where its size is fixed by the proposed xChangeMobile
threshold values, and then to make a decision to re-broadcast.
protocol. Consequently, if the number of chunks is higher than
The threshold values studied are: the period of HELLO
a given threshold, then the packet can be forwarded. Note that
beacons and the number of broadcast packets transmitted per
the time estimate between the sender and the receiver is based
receiving node to decrease routing overheads. These threshold
on their positions (latitude and altitude), speeds, and
values vary with node density, spatial distribution pattern, and
directions.
channel quality as multiple criteria to be evaluated. The
The second protocol used by the xChangeMobile system is authors of SLAB use the threshold values obtained for a
the ChunkXChange protocol which manages data gaps (i.e., broadcasting technique called distance-to-mean method [90],
missing chunks) which may be encountered in chunks. This in order to allow nodes to favor re-broadcasting when a small
protocol uses three functions: (i) making requests for chunks part of their transmission area is covered by other nodes.
that are missing in the local cache memory, (ii) answering to
The distance-to-mean method estimates the coverage by
possible chunk requests received from other nodes in the
network, and (iii) updating the cache memory when a reply for considering the distance from the node to the spatial mean of
a requested chunk is received. In the case of missing chunks the neighbors from whom the message has already been
(detected in the cache memory of the current node), the received. Therefore, the node refrains from retransmitting the
request is sent through VanetDFCN to fill the gaps. Therefore, message only if this distance is small because of the even
when a receiver receives this request and knows the missing distribution of neighbors around the sender node.
chunks, it replies by sending the available requested chunks in Evaluations of SLAB showed high reachability (i.e., the
its local memory through VanetDFCN. average fraction of nodes to receive broadcast messages) and
To optimize the performance of xChangeMobile the efficient bandwidth consumption (i.e., the fraction of re-
authors aim to minimize the number of remaining missing broadcasting nodes and the number of bytes sent per covered
chunks in all the vehicles and the bandwidth usage which is node) for both urban and highway scenarios with varying node
measured as the total number of messages sent in the network. densities. However, the use of HELLO beacons messages by
To achieve these objectives, a multi-objective algorithm based SLAB can flood the network.
on a Genetic Algorithm (MOCell) is used. This algorithm B. Parallel Genetic Algorithms for VANET Routing
starts with the initialization step by creating a population of N
individuals, where each individual represented a particular set Genetic algorithms were also applied for VANET but in a
of parameters of the proposed protocols (VanetDFCN and parallel manner and to evaluate only multi-objective routing.
ChunkXChange). These population individuals are evaluated Here, a parallel genetic algorithm was proposed in [91] to find
using the two previously mentioned objectives (missing the optimal parameter setting (automatic configuration) of the
chunks and bandwidth) through a Pareto front. unicast Optimized Link State Routing (OLSR) [32] protocol
when applied to VANETs. Thus, parallel genetic algorithm
After this evaluation process, crossover and mutation was applied to improve the efficiency of OLSR in VANETs
operations are successively applied to the populations’ by trying to reduce the power consumption of wireless
individuals until the stopping criterion is reached. In other communication devices of vehicles, and to minimize the time
words, for each population, the MOCell algorithm consists of required to perform the automatic configuration. OLSR is a
selecting two parents from its neighborhood, re-combining proactive routing protocol conceived for MANETs. To find
them in order to obtain an offspring, mutating it, and routes, and to cope with nodes’ mobility, OLSR uses an
11
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2371828, IEEE Communications Surveys & Tutorials
TABLE I
EVOLUTIONARY ALGORITHMS FOR VANET ROUTING
(NOTATION. +: SUITABLE, -: LESS SUITABLE, M: MEDIUM, L: LOW, N/A: NOT AVAILABLE)
Evaluated objectives Unicast/ Performance characteristics
Sub- multicast Routing Mobility Packet
Algorithm Scalability Robustness Complexity Routing
category Type Criteria Transmission decider model Delay Delivery Bandwidth
mode overhead
ratio
[83] End-to-end Source
Unicast Urban + ND L + ND ND ND
AMR delay node
Probability
[31] Mono Source
of Unicast Urban + ND L + ND + ND
IGRP -obj node
connectivity
[84] Urban
Delivery Distributed
Sequential Hybrid Unicast & - ND L - ND ND ND
delay decision
Genetic DTN highway
Algorithms [85] Missing TCP
Source
xChange packets & Multicast Highway - ND L - ND ND +
node
Mobile Bandwidth
Multi Reachability
-obj (probability Urban
[89] Distributed
of Unicast & + ND L + ND - ND
SLAB decision
connectivity) highway
& bandwidth
Power
Parallel consumption
[91] Multi Distributed
Genetic & automatic Unicast Urban M ND L M ND + +
GAP -obj decision
Algorithm configuration
time
efficient periodic flooding of control messages by using energy-aware OLSR configuration found by the parallel GA
special nodes called Multi-Point Relays (MPRs). The main compared when the standard OLSR configuration is used.
message types used by an OLSR node include: a) periodic However, this proposed algorithm can suffer from many
HELLO messages to detect neighborhood connections; b) drawbacks because of limitations such as the long end-to-end
Topology Control (TC) messages generated by MPRs, and delays, instability of routes, and routing overheads (because of
broadcasted periodically with the purpose of providing each the proactive property of OLSR) of OLSR in vehicular
node in the network with sufficient link-state information to environment.
allow route calculation.
After a general analysis of GA-based routing protocols
Moreover, TC messages are used to compute next hop proposed for VANETs, we can conclude that this kind of
destinations for all nodes in the network using the shortest hop inspiration dealt with the routing problem with linear
forwarding paths. The authors of [91] have proposed to complexity which is the optimal one compared to complexity
modify OLSR in order to reduce the power consumption and of conventional routing protocols often characterized by a
increase the packet delivery ratio which can decrease due to high complexity of finding or maintaining paths used to
data exchanges of each OLSR node. The modified OLSR disseminate data packets in VANETs. We note that the
starts by encoding different configuration parameters of OLSR proposed GA-based VANET routing lacked the study of
which represent one chromosome of the GA. These connectivity robustness, as well as packet loss when
configuration parameters represent time fields used to decide forwarding packets. In addition, vehicular rural areas were not
if a message will be forwarded. These parameters are: considered to evaluate these proposals. These limitations can
HELLO_INTERVAL, REFRESH_INTERVAL, TC_INTERVAL, be investigated in future GA-based studies. Table 1
WILLINGNESS, NEIGHB_HOLD_TIME, TOP_HOLD_TIME, summarizes the main characteristics of recently proposed GA-
MID_HOLD_TIME, and DUP_HOLD_TIME (more detailed based routing protocols for VANETs.
explanations are given in [32]).
To initialize the first population, a uniform distribution is VI. SWARM INTELLIGENCE FOR VANET ROUTING
proposed to ensure the diversity of the individuals of this Life species have been considered as a source of
population. Next, the recombination (crossover) operation is inspiration for VANET routing. Therefore, three main
applied according to an operator called the classic arithmetic categories arise from swarm intelligence studies and they
recombination operator. In the classic arithmetic crossover, include: ant colonies, particle swarm systems, and bee
two chromosomes (routes) are selected which should possess colonies, as presented in figure 5. In this section, swarm
at least one common node, from which one is randomly intelligence algorithms for VANET routing will be reviewed.
selected [92]. Hence, the offsprings are generated by the
combination of the first part of the first parent with the second A. Ant Colony Optimization for VANET Routing
part of the second parent, and vice-versa.
The mutation operation is performed with the aim of
simultaneously changing the encoded parameters using the
OLSR power-aware problem specifications in order to ensure
that the new individual belongs to valid OLSR configurations.
This proposal has been simulated using a vehicular urban area
in which the GA iteration was rerun 500 times. The results
obtained show significant reductions in the power
consumption of the VANET nodes when using the automatic Figure 5. Swarm Intelligence Algorithms Sub-classes
12
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2371828, IEEE Communications Surveys & Tutorials
Several studies inspired by Ant colonies have been process simulates a random selection of a route).
proposed for VANET routing, either to optimize a single
It is worth noting that each route’s pheromone quantity is
criterion or as multi-objective ant colony optimization. These
periodically evaporated following a mathematical model based
two classes are presented as follows.
on the current pheromone quantity and an evaporation rate
1) Mono-objective Ant Colony Optimization [33]. Moreover, the authors of MAR-DYMO modified
HELLO messages used to ensure neighborhood connections.
One of the first studies of a single objective, unicast, and
The modification led to aperiodic messages in contrast to
multi-path routing protocol for VANETs was proposed in
native DYMO HELLO messages which were periodic. The
[33]. This protocol is the integration of ACO [93] with the
HELLO messages in MAR-DYMO are used to ensure the
Dynamic Manet On-demand (DYMO) routing protocol [94],
knowledge of local connections between a vehicle and its
[95]. This proposal is called Mobility-aware Ant colony
neighbors and are managed by a Kinetic Graph framework
optimization Routing DYMO (MAR-DYMO). DYMO is a
[97] that allows a vehicle to make predictions about their
reactive, multi-hop routing protocol and is the successor of
neighbors such as their position at a given time instant and the
AODV [96] that is used to discover routes using a simple
duration they will remain as neighbors, for instance.
principle based on sending a Route Request (RReq) packet to
all neighbors, which in turn resend it to their neighbors and so MAR-DYMO was simulated using the Network Simulator
on until the destination node is reached or node that knows the ns-2 [98] and was compared with AODV, DYMO, and Ant-
destination is encountered. Once found, a Route Reply (RRep) DYMO [99] using the following metrics: average delivery
packet is sent to the source through the reverse route. ratio, average end-to-end delay and routing overhead. The
results obtained have shown better performance against
MAR-DYMO uses the ACO principle along with
DYMO and Ant-DYMO. MAR-DYMO only showed minor
predictions on the mobility of vehicles in terms of position and
improvements in the average packet delivery ratio at the
speed aiming to find routing paths with an optimal lifetime, as
expense of increased routing overheads. This work may be
a single objective. To achieve this goal, MAR-DYMO updates
extended to include other VANET scenarios such as rural
the routing table of each node with new information:
areas and other MAC protocol such as IEEE 802.11p suited
pheromone. First, the pheromone deposited into each routing
for VANET.
table entry corresponds to the quality of each route between
source and destination. More specifically, pheromone is added Another ACO based routing approach for VANETs was
to a route entry when the RReq (called Forward Ant) traveled proposed in [100]. It is a geography-based unicast routing
along this route. More pheromone is deposited if RRep (called protocol called Trust dependent Ant Colony Routing (TACR).
Backward Ant) crossed the same route. Figure 6 shows the In this work, the authors introduced an algorithm that creates
pheromone table of the node i after receiving and ant from the VANET clusters by considering direction, position, and
node j. In the link (j-i), the pheromone level Δϕij is calculated relative speed of the vehicle to manage the scalability of the
using equation 1, as follows: network in terms of the number of vehicles. For each cluster, a
selection procedure is executed to choose the most appropriate
∆∅ (1) cluster head. In this procedure, priority is given to the roadside
unit to be selected as the head due to its fixed position and
Where PR is the probability of i receiving a message from high processing capabilities. Otherwise, the cluster vehicle
j, tlink is the route lifetime, and tMAX is a value defined as the that presents a high value of trust (calculated with the slowest
maximum route lifetime. speed in real time) is chosen as the cluster head. As a third
The pheromone, along with ACO, is then used to predict contribution, the authors have proposed an evolutionary-based
and select the best route that connects the source and the routing protocol using the Ant Colony technique.
destination based on the pheromone concentrations level of This position-based routing approach is based on trust for
multiple routes. The pheromone concentration on a route the simple VANET highway scenario. The routing process
indicates how good this path is in terms of the route quality starts with the source node whenever it wants to disseminate a
(i.e., estimated lifetime of the route as a single aimed message towards a destination node. To do this, the message is
criterion). Using this substance, a path is selected. If several sent to the cluster head of the destination following an inter-
paths between the same source and the same destination were cluster routing process if the source node and the cluster head
found, probabilistic Roulette-Wheel Selection (RWS) method are out of range of each other. The cluster head then transmits
as we described earlier in this work can be used. Hence, the the message to the destination using an intra-cluster routing
appropriate path is selected to disseminate packets (this process.
The cluster head starts the inter-cluster routing based on
the Ant Colony algorithm by generating (n-1) forward ants
which are sent to (n-1) network cluster heads through multi-
hop paths. When a cluster head receives an ant, it checks that
it never received this ant, and also checks if the destination
node belongs to its cluster. If yes, the cluster head kills the
forward ant and generates a backward ant which will be sent
Figure 6. Ant Walking and Deposited Pheromone in link i-j to the source node as feedback. If a duplicate ant is received or
13
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2371828, IEEE Communications Surveys & Tutorials
there is no destination in the current cluster, the ant will be considered as the best one to be used to disseminate further
killed. With intra-cluster routing, the cluster head is data packets.
responsible for routing the received message (from the source
Simulation results have showed that this approach can lead
node) to the appropriate destination in a unicast manner using
its member list table. to a fast converged topology in terms of packet delivery ratio,
routing overhead, and end-to-end delay performance metrics
The TACR protocol’s simulation results were compared when compared to Ad hoc On-demand Distance Vector
with AODV and (MAR-DYMO) protocols using routing routing (AODV) [35] and Dynamic Source Routing (DSR)
overhead as the only performance metric. The results obtained [68] protocols. However, predefining the number of iterations
show that TACR presented a large improvement in terms of can lead either to no topology convergence if the iteration
routing overhead against AODV with six times lower number is small, or spending too much time unnecessarily to
overhead than AODV but against MAR-DYMO, TACR is discover the topology when the number of iterations is high.
only slightly better, especially when the number of vehicles
does not exceed 75 vehicles. It would be interesting to conduct Another proposed bio-inspired protocol, called Multicast
further performance tests on TACR for other performance with Ant Colony Optimization for VANETs (MAV-AODV)
metrics such as average end-to-end delay, packet delivery ratio for enhancing multicast routing in VANETs, based on
and the consumed bandwidth. Moreover, it would also be Multicast Ad-hoc On-demand Distance Vector (MAODV) [102]
interesting to investigate how TACR can be applied to urban was developed in [103]. MAV-AODV uses an ant colony
and rural scenarios. system to improve multicast routing. The main goal of MAV-
AODV is to find and to enhance multicast routes from the
2) Multi-objective Ant Colony Optimization source to multiple destinations. By making use of vehicular
Ant-based algorithms have also been deployed to mobility information, this proposal builds stable multicast
disseminate messages in VANETs trying to optimize multiple group trees (such as a tree that gathers all multicast group
criteria. members proposed initially by MAODV), and uses Ant
Colony Optimization (ACO) to increase the multicast tree’s
In [101], an Ant-based algorithm applied ant intelligence lifetime.
behaviors to find the near-optimal converged topology set up
by trusted mobile nodes and links in V2V communications. First, beacon messages between vehicles in the same range
This topology helps to achieve an efficient routing to achieve are communicated to allow a vehicle to predict the mobility of
QoS. A distributed approach was proposed in that each node other vehicles (position vector and velocity vector of the
collects information from the local neighboring nodes by vehicle), as well as the lifetime of each link [103]. Second, to
sending and receiving ant packets from each active node to discover a route from the source to the multicast group, a route
find the appropriate nodes to construct a routing path. Each request message called Ant-RREQ-J is broadcasted to find any
vehicle in the network could interact with other nodes by member node of target’s multicast group (similar to when an
sending and receiving ant packets as control packets to ant tries to find its food). Each Ant-RREQ-J sent stores the
discover the expected topology where each node is assumed to lower lifetime value of a link of the route estimated by beacon
be traversed at most once. messages. This lifetime field is updated each time a new node
is visited. In addition, the hop count to the destination node is
During the initialization step each link is initialized by a also stored in the Ant-RREQ-J message.
pheromone value to express the link quality based on the
available bandwidth information, delay information, capacity After finding a member of the multicast group, an Ant-
and cost information, and connectivity information, as RREP message is generated and is sent to the source node
multiple evaluated criteria. From one randomly selected node, through the reverse route in a unicast manner. Before
a set of ‘M’ ants are dispatched in the network, where each ant generating an Ant-RREP, the node examines the traversed
chooses its adjacent node in a probabilistic manner based on route quality by calculating the route pheromone using Ant-
the quality of adjacent links indicated by pheromone values. RREQ-J lifetime and hop count fields.
Upon receiving the ant from one node, the pheromone This link quality information represents the quality of the
values along the path are increased. When the link’s lifetime route found and is used by the source node to predict and
expires or no more packets go through, the pheromone on this make the best routing decision. Transporting this quality
link is reduced. Consequently, a more frequented link has information is similar to ants when they deposit pheromone
more chances of being selected by other ants and vice versa. If along the route back.
the destination node is reached by all M ants, one round of
iterations is considered as completed, then the ants will stop MAV-MAODV showed better performance than MAODV
searching and sleep there (i.e. there is no going back to the in terms of maximum end-to-end delay and packet delivery
source node). Next, another round of iterations is rerun when ratio. Nevertheless, MAV-MAODV incurred important
the pheromone information from the previous iteration is used, routing overheads when the transmission range was fixed to
and so on until a predefined number of searching iterations is 350m. Future work may focus on evaluation of MAV-
reached. Therefore, the route with maximum pheromone is MAODV using realistic mobility models and non-urban
scenarios as well.
14
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2371828, IEEE Communications Surveys & Tutorials
15
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2371828, IEEE Communications Surveys & Tutorials
C. Bees Colony Optimization for VANET Routing end delay and packet delivery ratio over both AODV and
DSDV along with an acceptable routing overhead. However,
In addition to ACO and PSO, bees colony optimization has
QoSBeeVANET can flood the network by control packets
been applied to improve VANET routing. Two sub-categories
especially when link failures occur.
of this kind of algorithms can be found in the literature: mono
and multi-objective bees colony optimization. To overcome the drawbacks of QoSBeeVANET, the
authors of [36] proposed Hybrid Bee swarm Routing (HyBR)
1) Mono-objective Bees Colony Optimization
protocol for VANET. HyBR is unicast and multipath routing
In this sub-category, the authors of [10] proposed a protocol which guarantees that the stringent requirements
topology-based unicast routing protocol called Quality of (such as end-to-end delay, packet delivery ratio and
Service Bee Swarm routing protocol for VANET normalized overhead load) of VANET safety applications are
(QoSBeeVANET). This protocol was inspired by the bee met. As a hybrid routing protocol, a topology-based routing
swarm when bees search the food source. QoSBeeVANET is a procedure is performed when the network is dense (e.g., city-
reactive, multipath routing protocol designed for VANETs based VANET) and a geography-based routing procedure is
which guarantees the Quality of Service in terms of applied if the network density is low, as shown in figure 8. It
performance metrics such as latency and bandwidth. Two
is worth pointing out that HyBR can apply both topology-
main procedures were defined to disseminate data packets
based and geography-based schemes in VANET based on the
from a source node to a destination node.
network density (high and low densities are determined by a
Route discovery is the first step in QoSBeeVANET in threshold [107]). The topological procedure is inspired by the
which the source launches a request route packet called bees’ communication behavior when bees search for food.
forward scout in its neighborhood to find the destination. The More specifically, the source node generates, clones, and
authors proposed a novel broadcasting mode called stochastic sends route request packets (called forward scouts) to a limited
broadcasting which aims to decrease the number of routing number of its neighbors. Each neighbor repeats the same
packets exchanged to reduce network congestion. Stochastic process until the destination is reached or until a node is
broadcasting is the diffusion of routing packets (forward encountered that knows the route to the destination.
scouts are created and cloned by the source node) to only a
limited number of neighbors. If the path is discovered, a route reply (called backward
scout) is generated and is disseminated to the source node
Similarly, after receiving the forward scout, each neighbor
through the reverse route. We note that multiple routes can be
regenerates, clones, and sends this scout to its neighbors in a
stochastic broadcasting fashion until the scout reaches the discovered to forward messages. Concerning the geographical
destination or encounters an intermediate node that knows the procedure, a genetic algorithm is called to find the optimal
route to the destination. After the forward scout reaches the route among several ones found using the geographic
destination, a backward scout is created and is routed toward coordinates of network nodes. The authors proposed to
the source node via the reverse route. This discovery step is execute the GA by the source node starting with an initial
performed by taking into considerations QoS requirements population which has been randomly generated. This
such as the average end-to-end delay, the average throughput, population consists of a set of paths from the source to the
and the packet delivery ratio. The route found is saved in the destination with different intermediate nodes. Each route is
routing table of the source node that contains a set of entries evaluated and considered optimal if its entire geographical
which correspond to all known paths. For each entry, the distance is the shortest one.
destination, the next hop node to the destination and the hop
count to reach the destination are stored. The second step is HyBR GA uses a two-point crossover to generate two
about route maintenance which uses refresh packets that are offsprings after selecting two parents using RWS. Each
periodically sent between nodes in a neighborhood to ensure offspring can be mutated using a two-point mutation operator.
the stability of connections. If a link is broken, the detector This process is rerun until an optimal route is obtained. The
node informs all concerned nodes saved in its routing table authors have simulated HyBR using a realistic mobility model
about this broken link using a special packet called an error with different densities, and various vehicles’ speeds. The
scout. In addition, any node can detect QoS requirements results obtained demonstrated reduced end-to-end delay, high
violations such as reduced bandwidth or delay variations. This
node then sends an error scout to all concerned nodes (nodes
located along the path of the QoS degradation).
The nodes affected remove all invalid routes from their
routing tables and initiate a new QoS route discovery, if
needed. QoSBeeVANET has been simulated using ns-2 using
a realistic mobility model of the downtown area of the city of
Malaga in Spain [105] and its performance was compared
against the reactive routing protocol AODV and a proactive
routing protocol Destination-Sequenced Distance Vector
(DSDV) [106]. QoSBeeVANET improved the average end-to- Figure 8. HyBR Transmission based on the Network Density
16
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2371828, IEEE Communications Surveys & Tutorials
TABLE II
SWARM INTELLIGENCE FOR VANET ROUTING
(NOTATION. +: SUITABLE, -: LESS SUITABLE, M: MEDIUM, L: LOW, N/A: NOT AVAILABLE)
Evaluated objectives Performance characteristics
Unicast/ multicast
Sub- Routing Mobility Packet
Algorithm Transmission Scalability Robustness Complexity Routing
category Type Criteria decision model Delay Delivery Bandwidth
mode overhead
ratio
[33]
Distributed
MAR- Lifetime Unicast Urban M N/A L + M + N/A
decision
DYMO
Mono No
-obj propagation
[100] Distributed
of malicious Unicast Highway M N/A L N/A M + N/A
TACR decision
Ant Colony vehicle
Optimization messages
Bandwidth,
Distributed
[101] delay, cost, Unicast Highway + N/A L + + + N/A
decision
Multi connectivity
[103] -obj
Lifetime, Distributed
MAV- Multicast Urban - N/A L + + - N/A
hop count decision
AODV
Packet
delivery
[34] Distributed
Particle ratio, Unicast Urban - N/A L + + + N/A
pPSO decision
Swarm Multi Overhead,
Intelligence -obj delay
Adjusting
[104] system Unicast Source node Pathway - N/A L + + M N/A
parameters
[10]
Distributed
QoSBee Delay Unicast Urban - N/A L + + + N/A
decision
VANET
Mono
-obj Shortest
Bees Colony [36] path between Distributed Urban &
source and Unicast M + L + + M N/A
Optimization HyBR decision highway
destination
Cost, delay,
[108] Multi jitter,
bandwidth Multicast Source node Urban M N/A L + N/A N/A +
BLA -obj
packet delivery ratio over AODV and GPSR routing protocols population consisting of only N bees. Next, W workers (the W
applied to VANETs. The routing overhead incurred by HyBR worst solutions) are chosen to execute the food foraging. Each
is close to those obtained by AODV and GPSR protocols. worker tries to find the best food (best solution) in its region
2) Multi-objective Bees Colony Optimization with the help of other recruited bees (by comparing neighbor
solutions). Only the best bee in each region is selected to form
Contrary to VANET unicast routing studied using the next bee population (consisting of the new queen, new D
QoSBeeVANET and HyBR, [108] proposed multi-objective drones, and new W workers). This process is rerun until a
and multicast routing algorithm called Bee Life Algorithm stagnation state is reached when the fitness no longer
(BLA). The main goal of this proposal is to find the optimal improves during some iterations.
tree called the multicast tree from the source to multiple
destinations according to four objectives, such as minimum BLA was applied to the multicast routing problem for
cost, reduced delays, decreased jitter and maximum bandwidth VANETs and its performance was compared with GA [54],
usage of links. Moreover, the expected tree should satisfy the Bees Algorithm [109], and the Marriage Bee Optimization
algorithm [110] as optimization algorithms. The results
three QoS constraints (namely, delay, jitter, and a minimum
obtained show the efficiency and the performance of BLA in
bandwidth) requested by VANET applications. To address this
terms of the combination of four objectives, namely delay,
multicast routing problem, and to satisfy the multiple QoS jitter, bandwidth and cost of found multicast routes and
constraints, BLA imitates the two major behaviors of bees: reduced computational time complexity. In the future, other
reproduction and food foraging. important metrics such as the packet loss and routing overhead
First, BLA constructs an initial population of bees which can also be investigated. In addition, BLA could be applied to
consists of N bees (solutions) chosen at random in the search address the multicast routing problem in a scalable VANET.
space. This population contains one queen, D drones and W To summarize, the complexity of VANET routing based
workers sorted following its fitness. One iteration of the bees’ on swarm intelligence is also improved to be linear and
population consists of two bee behaviors: reproduction and realistic. However, except for the study in [36], past studies
food foraging. did not consider robustness of network connectivity. Also,
most prior research works did not consider bandwidth as a
The reproduction is performed by the queen and the D
quality of service metric. Moreover, as cited for GA-based
drones using crossover and mutation operators similar to the studies, rural mobility models are a strong aspect which
natural mating of bees (called mating-flight). Next, the queen should be evaluated in future research to obtain more realistic
starts breeding N broods (i.e., N new solutions) which have results. Table 2 summarizes the properties of proposed
been sorted with the previous population bees to form a new VANET routing based on swarm intelligence.
17
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2371828, IEEE Communications Surveys & Tutorials
making reliable
Human and secure
[37] Mono Distributed
Social routing Unicast Urban + N/A L + + - N/A
FAST -obj decision
Behavior decision towards
destination
18
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2371828, IEEE Communications Surveys & Tutorials
network determines the type of the other nodes from the lists
of friends, or friends-of-friends, or no friends.
The friendship level corresponds to the transmission
requirements. This distribution of node friendship is derived
using a node’s prior knowledge of real-time vehicular traffic.
Therefore, the source node broadcasts a packet only to its
friends in its neighborhood. After that, the friend that is closer
to the destination and available at the street intersection
forwards the message to the next available node. However, if
there is no next node available at the street intersection to
forward the packet then the current node in the street will hold
the message if and only if it can reach at intersection before
Figure 10. Datataxis Harvested Meta-data Diffusion
the Time-To-Live (TTL) expires, otherwise the message is
forwarded to the next available node in the same street.
receives a packet it stores the packet in its local meta-data
databases. For example, figure 10 depicts the operation of The intersection node makes a decision to forward the
meta-data diffusion in the case of two sensors C1 and C2, message to the best suitable route towards destination using a
installed on two vehicles. C1 and C2 sensors periodically fuzzy inference system [107]. This decision is based on prior
advertise a new meta-data packet SC1,1 and SC2,1 respectively. global knowledge of real-time vehicular traffic concerning the
At time T-t4, vehicle of C2 encounters vehicle of C1 (at an traffic-density: friends, friends-of-friends, and non-friends
encounter point), and they exchange these advertisements. information on each road segment. For each node, this system
Nodes keep track of the freshness of meta-data packets by consists of inputs (friends, friends-of-friends, and non-
using a sliding window with the maximum window size of a friends), and membership functions are used to determine if
fixed expiration time. In addition, since a single advertisement the network is Sparse, Medium, Dense in terms of friendships.
packet may contain multiple meta-data records, it is possible As for the output, the greater the friendship density value, the
to define a packet sensing location as the average position of better the optimal node becomes (corresponding to a more
all meta-data in the packet. When a packet expires or the efficient route).
packet originator moves away more than a threshold distance
FAST has been simulated and compared with GPSR,
from the packet sensing location, the packet is automatically
GPCR, RBVT-R, and intersection-based Greedy Traffic-
disposed.
Aware Routing (GyTAR) protocol [116] and Road-Based
For urban scenarios and using the Manhattan mobility using Vehicular Traffic routing -Reactive protocol (RBVT-R)
model, the three algorithms (bacteria harvesting strategy, Lévy [117], and has shown an improvement in the average delay,
walk strategy and stigmergy-based strategy) have been and packet delivery ratio for VANETs with 100, 150 and 200
validated through a set of simulations to demonstrate the nodes. However, constructing friendship lists can increase
efficiency of the bio-inspired behavior of harvesting agents routing overheads. FAST is also more appropriate to urban
and, its robustness for a wide range of various parameters scenarios because it is based on forwarding packets using
including density distribution, aggregated number of harvested intersection nodes which are less used for rural VANETs.
Meta-data and harvesting rate per road segment over time. The
As summarized in table 3, natural immune systems and
simulation results obtained also showed the efficient
human social behavior approaches contributed to reducing
distribution in the movement of multiple agents. However, the
routing complexity to linear. Nevertheless, previous studies
authors conducted their experiments using a theoretical
dealt only with mono-objective problems. In addition, routing
mobility pattern (i.e., the Manhattan model) only for an urban
overhead was not taken into consideration and rural mobility
area in which vehicles moved with limited speeds. Moreover,
models were also not considered but would be interesting to
this proposed approach suffers from an exchange of control
investigate in future bio-inspired VANET routing research.
packets which can cause network congestions.
B. Human Social Behavior influenced by Biological VIII. REINFORCEMENT LEARNING FOR BIO-INSPIRED VANET
Phenomena ROUTING: A UNIFIED FORMAL MODEL
The social behavior of humans on the road influenced by Previous bio-inspired protocols focus mostly on an
some biological phenomena such as genetics or other factors objective function based on distinct bio-inspired modules.
such as emotions, hypnosis, coercion, has been used as an Moreover, most of these previous works suffer from the major
inspiration in the development of a geography-based routing drawback that the programmer should input user parameters.
protocol for VANETs called Fuzzy-Assisted Social-based For example, bio-inspired routing mechanism was proposed
rouTing (FAST) protocol [37]. FAST is based on a fuzzy for discovering paths using GA in AMR [83]. However,
inference system that leverages a friendship mechanism to alternative unicast paths searching mechanism were proposed
make optimal and secure routing decisions from the source to in [104] using fuzzy logic system whenever a broken link or a
the destination using prior global knowledge of real-time congestion event occurs along a path. On the other hand, PSO
vehicular traffic. A secure routing decision was considered as was applied in [32] to adjust OLSR user parameters.
the single objective of FAST. To achieve this, each node in the
19
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2371828, IEEE Communications Surveys & Tutorials
20
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2371828, IEEE Communications Surveys & Tutorials
First, we propose to apply HyBR routing protocol inspired Once the choice of the next hop is made, node s can
by Bees colony systems presented in our prior work [36]. therefore update its reinforcement functions (a global
HyBR provides for each source node s, all possible multiple objective function of end-to-end delay and end-to-end residual
paths towards each destination d through every next hop h bandwidth) as follows:
which is within the transmission range of node s. The multiple ′ , , 1 ,
paths are maintained in the routing table of s. (7)
′ , , 2 ,
To find the best parameters of the optimal path, our RL where αDY and ηDY are the packet transmission times between h
model proposes that the routing table saves a set of end-to-end and s and the delay learning rate respectively. On the other
delay values DYh (s, d), as well as, a collection of end-to-end hand, αBW and ηBW are the residual bandwidth between h and s
residual bandwidth values BWh (s, d) for each destination d and the bandwidth learning rate respectively.
and for every immediate next hop h. Moreover, node h can
estimate the bandwidth and the delay throughout the So, the new estimations , and , can be
remainder path (from node h to the destination) by exchanging written as:
control packets with its neighbor nodes, then its extra- ′ , , 1 1
(8)
neighbor nodes and so on until the destination is reached as ′ , , 1 2
shown in figure 12.
When we compare the formal model given by Eq. 5, we
Upon receipt of the packet, node h responds to node s with
observe the similarity between parameters ηDY and DYh
an estimate of its best bi-criteria (DY and BW) to reach the
representing the gradient step γ and the function J
destination d by sending the reinforcement learning signal
respectively. It is same for ηBW and BWh which represent the
, .
gradient step γ and the function J respectively.
More specifically, the reinforcement signal (s,d)
consists of a set of two types of information namely, minimum IX. OPPORTUNITIES AND FUTURE TRENDS
delay and maximum residual bandwidth from node h to Bio-inspired approaches are powerful and efficient. They
destination node d through all possible neighbors of node h, have strong potential to address some of the challenges
calculated using the following reinforcement functions (local associated with VANET routing. In this section, we present
objective functions): some of the opportunities and future trends that bio-inspired
approaches can efficiently address for VANET routing
1 ∑ ∈ , because of their dynamic characteristics.
s,d (6)
2 ∈ ,
A. Vehicular Network Scalability
After receiving all reinforcement signals (all Bio-inspired methods can efficiently handle a large number
, , ∈ ), node s selects the best of VANET nodes in contrast to traditional routing methods
next hop (best_h) to use to transmit data packets. Selection of because they are based on local and limited cooperation and
best_h is based on the bi-criteria function found using Pareto communication among nodes when searching for routes. More
21
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2371828, IEEE Communications Surveys & Tutorials
specifically, bio-inspired methods are able to increase the withstand against external and internal perturbations [126],
network’s lifetime as well as the QoS performance metrics using a specific topological structure of biological systems
such as bandwidth and packet delivery ratio under high loads called modularity. This modularity structure helps to localize
when new nodes are added. These bio-inspired methods are damages and prohibits malicious effects from spreading
also capable of minimizing transmission delays and errors. throughout the entire system [127]. By exploiting the
robustness and modularity associated with bio-inspired
The idea is to manage the entire vehicular network by
techniques, we can guarantee some level of VANET
dividing it to a set of sub-networks in order to determine an
performance, especially for heterogeneous networks to cope
efficient global behavior in terms of QoS through multiple
with their heterogeneity in terms of structure (used
interactions of local behaviors of sub-networks which have
heterogeneous topologies), or functionality (applied
local and limited networking performance. However, the
heterogeneous protocols).
design of scalable routing protocols which are reliable with
increasing size of the network remains a significant challenge. To summarize, the strongest aspect reinforced by bio-
To address this challenge, researchers need to investigate inspired approaches for VANET routing is the complexity of
routing protocols that attempt to maintain a small data finding routes from source nodes to destinations used to
structure such as the routing table, used to find the outgoing disseminate and forward data packets in the network.
link information when the number of nodes in the VANET is Consequently, routing overhead and the average end-to-end
very large [122] [123]. delay are reduced. However, there are certain design criteria
and additional evaluation metrics which should be investigated
B. Self-organized Control of VANET’s Dynamic Nature
in future bio-inspired approaches for VANET routing. These
Bio-inspired approaches can be investigated to control the metrics include the robustness of network connectivity,
dynamic properties of VANET using self-organizing scalability in terms of network density, and the need to
solutions, which are adaptive to frequent VANET changes consider more realistic vehicular mobility patterns like rural
caused by nodes’ mobility and network failures and areas. Moreover, we suggest in further research works, to
perturbations. VANET changes include vehicles’ positions, study VANET routing as a multi-objective and multi-
directions and velocities, number of nodes in the network, as constraint problem. In other words, more quality of service
well as specific network conditions such as congestion, packet metrics should be taken into account in the objective function
drop, security etc. In contrast to traditional methods, biology- like transmission cost, bandwidth, routing overhead, jitter,
based systems and methods usually show the ability to packet delivery ratio, and others, where some of these
effectively adapt to constantly changing environments. Based objectives can be restricted by the user and explained in the
on a large number of dynamic, autonomous, and distributed computational studies by multiple constrains (e.g. minimum
components, most biological systems can generate effective used bandwidth, maximum accepted jitter etc.).
entire behaviors through local interactions as a result of self-
organization [124]. As result, bio-inspired methods can better We also suggest that the VANET community of researchers
manage undesirable networking events without the apply other bio-inspired methods which are not applied to
intervention of the human operator. solve routing problems for VANETs and could give promising
results. In this context, relevant bio-inspired methods such as
C. Reducing Resource Requirements and Complexity of Evolution Strategy [128], Evolutionary Programming [129],
Message Exchanges Genetic Programming [130], Estimation of Distribution
Bio-inspired methods can be applied to reduce the Algorithm [131], Differential Evolution [132], and Cultural
complexity of message exchange when finding the best routes Algorithms [133] may prove very useful.
in VANET. Indeed, bio-inspired techniques applied to ad hoc
networks can considerably minimize the network resources X. CONCLUSION
(such as memory and network bandwidth) consumed during
We have presented in this paper a survey on bio-inspired
message delivery which ultimately lead to reducing the
approaches applied to VANET routing which support ITS
complexity of message exchanges. Consequently, message
applications. In fact, it has been shown that the bio-inspired
latency can be decreased and the message delivery rate [125]
methods are more efficient for large-scale vehicular networks,
can be increased. Here, bio-inspired methods are based on the
which disseminate data packets with low complexity. Also,
local behavior and reaction of each independent individual.
bio-inspired VANET routing is Adaptive and robust which
Dissemination of messages for VANET can also take
maintains an improved routing performance despite network
advantage of biology inspiration to achieve low-complexity
disruptions. After presenting the VANET routing background
routing compared to traditional routing methods.
and existing standards, we described the basic concepts and
D. Robustness operations of recently proposed bio-inspired algorithms and
We argue that bio-inspired approaches have tremendous techniques reported in the literature which include genetic
potential in providing robust, resilient, and adaptive vehicular algorithms, ant colony optimization, particle swarm
networks. Robustness is the most commonly observed feature optimization, bee colony optimization, natural human system
in all living organisms which have evolved themselves to and fuzzy logic off human brain.
22
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2371828, IEEE Communications Surveys & Tutorials
In this survey, we have identified three bio-inspired [9] J.-S. Park, U. Lee, S. Y. Oh, M. Gerla, and D. S. Lun, “Emergency
related video streaming in VANET using network coding,” in Proc.
categories for routing in VANETs and they include ACM VANET’06, Los Angeles, CA, USA, 2006, pp. 102-103.
evolutionary algorithms, Swarm Intelligence and other bio- [10] S. Bitam, and A. Mellouk, “QoS Swarm bee routing protocol for
inspired approaches for VANET routing. For each category, vehicular ad hoc networks,” in Proc. IEEE ICC’11, Kyoto, Japan, 2011,
pp. 1-5.
research studies have been classified, evaluated and compared [11] A. Mellouk, S. Hoceïni, and S. Zeadally, “Design and performance
with the most important routing and computational criteria, analysis of an inductive QoS routing algorithm,” Comput. Commun, vol.
namely complexity, scalability, robustness, mobility model 32, no. 12, pp. 1371-1376, 2009.
used, and the QoS routing performances (i.e. delay, packet [12] Y. W. Lin, Y. S. Chen, and S. L. Lee, “Routing protocols in vehicular ad
hoc networks: a survey and future perspectives,” J. Inform. Sci. Eng.,
delivery ratio, routing overhead and bandwidth). To determine vol. 26, no. 3, 2010.
the convergence of bio-inspired approaches applied to [13] O. Abedi, M. Fathy, and J. Taghiloo, “Enhancing AODV routing
VANET routing, we have proposed a unified formal model protocol using mobility parameters in VANET,” in Proc. IEEE/ACS
AICCSA, Doha, Qatar, 2008, pp. 229-235.
based on reinforcement learning system. This model aims at [14] J. Santa, M. Tsukada, T. Ernst, O. Mehani, and A. F. Gómez-Skarmeta,
finding multiple solutions represented by a global objective “Assessment of VANET multi-hop routing over an experimental
function representing performance criteria of routes discovery, platform,” Int. J. Internet Protocol Technol., vol. 4, no. 3, pp. 158-172,
2009.
maintaining, and optimization etc. It is worth mentioning that [15] B. Karp, and H. T. Kung, “GPSR: greedy perimeter stateless routing for
the proposed model is more suitable for bio-inspired methods wireless networks,” in Proc. IEEE/ACM MobiCom, Boston, MA, USA,
compared to traditional exact methods, where reinforcement 2000, pp. 243-254.
[16] C. Lochert, H. Hartenstein, J. Tian, H. Füßler, D. Hermann, and M.
learning is focused on on-line performance, without any sub- Mauve, “A routing strategy for vehicular ad hoc networks in city
optimal actions explicitly introduced. environments,” in Proc. IEEE Intell. Vehicles Symp. Columbus, OH,
USA, 2003, pp. 156–161.
Finally, lessons learned, some opportunities, and future [17] S. S Wang, and Y. S Lin, “PassCAR: A passive clustering aided routing
trends of bio-inspired methods for routing in VANET are protocol for vehicular ad hoc networks,” Comput. Commun., vol. 36, no.
discussed. We found that bio-inspired approaches can improve 2, pp. 170-179, 2013.
[18] F. Dressler, and O. B. Akan, “A survey on bio-inspired networking,”
the computational criteria and enhance the QoS performances Comput. Netw., vol. 54, no. 6, pp. 881-900, 2010.
of VANET routing. However, we also discovered that recent [19] G. Liu, and C. Ji, “Scalability of network-failure resilience: analysis
efforts take into consideration only a few of the using multi-layer probabilistic graphical models,” IEEE/ACM Trans.
Netw., vol. 17, no. 1, pp. 319-331, 2009.
aforementioned criteria and lacked the others. Thus, we [20] R. Ramanathan, R. Allan, P. Basu, J. Feinberg, G. Jakllari, V. Kawadia,
recommend that researchers develop bio-inspired VANET and J. Freebersyser, “Scalability of mobile ad hoc networks: Theory vs
routing approaches based on the proposed unified formal practice,” in Proc. IEEE MILCOM, 2010, pp. 493-498.
[21] A. Ovcharenko, D. Ibanez, F. Delalondre, O. Sahni, K. E. Jansen, C. D.
model (i.e. reinforcement learning system) which addresses Carothers, and M. S. Shephard, “Neighborhood communication
different routing aspects. paradigm to increase scalability in large-scale dynamic scientific
applications,” Parallel Computing, vol. 38, no. 3, pp. 140-156, 2012.
[22] F. Neumann, and C. Witt, “Bio-inspired computation in combinatorial
ACKNOWLEDGEMENTS optimization: algorithms and their computational complexity,” in Proc.
We thank the anonymous reviewers for their constructive ACM Int. Conf. Genetic Evol. Computation, 2012, pp. 1035-1058.
[23] J. J. Hopfield, “Neural networks and physical systems with emergent
suggestions and comments which helped us to improve the collective computational abilities,” in Proc. Nat. Academy of Sci. of the
content, quality, and presentation of this paper. USA, vol. 79 no. 8 pp. 2554–2558, 1982.
[24] G. Bin, L. Zhe, Z.-J. Wei, “A Dynamic-cluster energy-aware routing
algorithm based on neural structure in the wireless sensor networks,” in
REFERENCES Proc. IEEE Int. Conf. Comput. Inform. Technol., 2005, pp. 401-405.
[1] S. Zeadally, R. Hunt, Y.-S. Chen, A. Irwin, and A. Hassan, “Vehicular [25] C. List, C. Elsholtz, and T. D. Seeley, “Independence and
ad hoc networks (VANETs): status, results, and challenges,” interdependence in collective decision making: an agent-based model of
Telecommun. Syst. vol. 50, no 4, pp. 217-241, 2012. nest-site choice by honeybee swarms,” Philosoph. Trans. Roy. Soc. B:
[2] A. L. Beylot, and H. Labiod, “CONVOY: a new cluster-based routing biological sci., vol. 364, no 1518, pp. 755-762, 2009.
protocol for vehicular networks,” in Vehicular Networks: Models and [26] J. Kennedy, and R. C. Eberhart, “Particle swarm optimization,” in Proc.
Algorithms, 1st ed., London, UK: John Wiley & Sons, 2013, ch. 3,pp. IEEE Int. Conf. Neural Netw., 1995, pp. 1942–1948.
91-139. [27] F. Heppner, and U. Grenander, “A stochastic nonlinear model for
[3] T. Okabe, T. Shizuno, and T. Kitamura, “Wireless LAN access network coordinated bird flocks,” Washington DC, USA: Amer. Assoc.
system for moving vehicles,” in Proc. 10th IEEE Symp. Comput. Advancement Sci., 1990.
Commun, 2005, pp. 211-216. [28] A. Haghighat, K. Faez, M, Dehghan, A, Mowlaei, and Y, Ghahremani,
[4] J. Santa, A. F. Gómez-Skarmeta, and M. Sánchez-Artigas, “Architecture “GA-based heuristic algorithms for QoS based multicast routing,”
and evaluation of a unified V2V and V2I communication system based Knowledge-Based System, vol. 16, pp. 305–312, 2003.
on cellular networks,” Comput. Commun., vol. 31, no. 12, pp.2850-2861, [29] F. Ducatelle, “Adaptive routing in ad hoc wireless multi-hop networks,”
2008. Ph.D. dissertation, Inform. Fac., Della Svizzera Italiana Univ., Lugano,
[5] F. Li, and Y. Wang, “Routing in vehicular ad hoc networks: A survey,” Switzerland, 2007.
IEEE Trans. Veh. Technol., vol. 2, no. 2, pp. 12-22, 2007. [30] A. Larhlimi, S. Blachon, J. Selbig, and Z. Nikoloski, “Robustness of
[6] Research and Innovative Technology Administration (RITA), Intell. metabolic networks: A review of existing definitions,” Biosystems, vol.
Transportation Syst. Available: http://www.itsoverview. its.dot.gov/. 106, no. 1, pp. 1-8, 2011.
[7] E. Schoch, F, Kargl, M. Weber, and T. Leinmuller, “Communication [31] H. Saleet, R. Langar, K. Naik, R. Boutaba, A. Nayak, and N. Goel,
patterns in VANETs,” IEEE Commun. Mag. vol. 46, no. 11, pp. 119- “Intersection-based geographical routing protocol for VANETs: a
125, 2008. proposal and analysis,” IEEE Trans. Veh. Technol., vol. 60, no. 9, pp.
[8] H. Hartenstein, K. P. Laberteaux, “A tutorial survey on vehicular ad hoc 4560–4575, 2011.
networks,” IEEE Commun. Mag., vol. 46, no 6, p. 164-171, 2008. [32] T. Clausen, and P. Jacquet, “The optimized link-state routing (OLSR)
protocol,” IETF RFC 3626, 2003.
23
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2371828, IEEE Communications Surveys & Tutorials
[33] S. L. O. B. Correia, J. C. Junior, and O. Cherkaoui, “Mobility-aware ant [59] M. Dorigo, “Optimization, learning and natural algorithms,” Ph.D.
colony optimization routing for vehicular ad hoc networks,” in Proc. dissertation, Dept. Elect., Polytechnic Univ. Milano, Italy, 1992.
IEEE WCNC, 2011, pp. 1125-1130. [60] S. Bitam, M. Batouche and E-G. Talbi “A survey on bee colony
[34] J. Toutouh, and E. Alba, “Parallel swarm intelligence for VANETs algorithms,” in Proc. IEEE IPDPS, NIDISC workshop, Atlanta, GA,
optimization,” in Proc. IEEE 3PGCIC, 2012, pp. 285-290. USA, pp. 1-8.
[35] C. Perkins, E. M. Belding-Royer, S. Das, “Ad hoc on-demand distance [61] L. A. Zadeh, “Fuzzy sets,” Information and control, vol. 8, no. 3, pp.
vector (AODV) routing protocol,” draft-perkins-manet-aodvbis-00.txt, 338-353, 1965.
2003. [62] E. H. Mamdani, “Application of fuzzy logic to approximate reasoning
[36] S. Bitam, A. Mellouk, and S. Zeadally, “HyBR: A Hybrid bio-inspired using linguistic synthesis,” IEEE Trans. Comput., vol. 100, no. 12, pp.
bee swarm routing protocol for safety applications in vehicular ad hoc 1182-1191, 1977.
networks (VANETs),” J. Syst. Architecture, vol. 59, no. 10-B, pp. 953- [63] U. Lee, E. Magistretti, M. Gerla, P. Bellavista, P. Lio, and K.-W. Lee
967, 2013. “Bio-inspired multi-agent data harvesting in a proactive urban
[37] R. H. Khokhar, R. M. Noor, K. Z. Ghafoor, C. H. Ke, and M. A. Ngadi, monitoring environment,” Adhoc Netw., vol. 7, no. 4, pp. 725-741, 2008.
“Fuzzy-assisted social-based routing for urban vehicular environments,” [64] J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor network
J. Wireless Commun. Netw. EURASIP, vol. 2011, no. 1, pp. 1-15, 2011. survey,” Comput. Netw., vol. 52, no. 12, pp. 2292-2330, 2008.
[38] H. Berg, and D. Brown, “Chemotaxis in escherichia coli analysed by [65] M. Saleem, G. A. Di Caro, and M. Farooq, “Swarm intelligence based
three-dimensional tracking,” Nature, vol. 239, pp. 500–504, 1972. routing protocol for wireless sensor networks: Survey and future
[39] A. K. Saha, D. B. Johnson, “Modeling mobility for vehicular ad-hoc directions,” Inform. Sci., vol. 181, no. 20, pp. 4597-4624, 2011.
networks”, in Proc. ACM Int. workshop on Veh. ad hoc netw., 2004, pp. [66] R. V. Kulkarni, A. Forster, and G. K. Venayagamoorthy,
91-92. “Computational intelligence in wireless sensor networks: A survey,”
[40] H. Saleet, O. Basir, R. Langar, and R. Boutaba, “Region-based location- IEEE Commun. Surveys Tuts., vol. 13, no. 1, pp. 68-96, 2011.
service-management protocol for VANETs,” IEEE Trans. Veh. [67] H. Yang, F. Ye, and B. Sikdar, “A swarm-intelligence-based protocol
Technol., vol. 59, no. 2, pp. 917-931, 2010. for data acquisition in networks with mobile sinks,” IEEE Trans. Mobile
[41] R. Nagel, and S. Eichler, “Efficient and realistic mobility and channel Comput., vol. 7, no. 8, pp. 931-945, 2008.
modeling for vanet scenarios using omnet++ and inet-framework,” in [68] B. Zhang and H. Mouftah, “Energy-aware on-demand routing protocols
Proc. SIMUTools, Marseille, France, 2008, pp. 98. for wireless ad hoc networks,” Wireless Netw., vol. 12, no. 4, pp. 481-
[42] M. Hossain, and M. Atiquzzaman, “Stochastic properties and application 494, 2006.
of city section mobility model,” in Proc. IEEE Globecom, Honolulu, HI, [69] D. B. Johnson, D. A. Maltz, and J. Broch, “DSR: the dynamic source
USA, 2009, pp. 1-6. routing protocol for multi-hop wireless ad hoc networks,” in Ad hoc
[43] F. Bai, N. Sadagopan, and A. Helmy, “The IMPORTANT framework Netw., C. Perkins, Ed. Boston, MA, USA: Addison-Wesley, 2001, ch. 5,
for analyzing the impact of mobility on performance of routing protocols pp. 139-172.
for adhoc networks,” Ad Hoc Netw., vol. 1, no. 4, pp. 383-403, 2003. [70] J. Sun, W. Fang, X. Wu, Z. Xie, and W. Xu W, “QoS multicast routing
[44] X. Hong, M. Gerla, G. Pei, and C. Chiang, “A group mobility model for using a quantum-behaved particle swarm optimization algorithm,” Eng.
ad hoc wireless networks,” in Proc. 2nd ACM Int. workshop on Appl. Artificial Intell., vol. 24, pp. 123–131, 2011.
Modeling, analysis and simulation of wireless and mobile syst, 1999, pp. [71] S. A. Bitaghsir, and F. Hendessi, “An intelligent routing protocol for
53-60. delay tolerant networks using genetic algorithm,” Smart Spaces and
[45] B. Zhou, K. Xu, and M. Gerla, “Group and swarm mobility models for Next Generation Wired/Wireless Networking, pp. 335-347, 2011.
ad hoc network scenarios using virtual tracks,” in Proc. IEEE MILCOM, [72] C. O’rourke, and S. B. Johnson, “Mobile ad hoc networking revamps
vol. 1, 2004, pp. 289-294. military communications,” J. of Military Electron. and Comput., pp. 34-
[46] N. Meghanathan, “A simulation study on the impact of mobility models 42, 2011.
on the network connectivity, hop count and lifetime of routes for ad hoc [73] G. A. Di Caro, F. Ducatelle, and L. M. Gambardella, “AntHocNet: an
networks,” Informatica, vol. 34, no. 2, 2010, pp. 207-221. adaptive nature-inspired algorithm for routing in mobile ad hoc
[47] S. Bitam, and A. Mellouk, “Markov-history based modeling for realistic networks,” Eur. Trans. Telecommun., vol. 16, no. 5, pp. 443–455, 2005.
mobility of vehicles in VANETs,” in Proc. IEEE VTC-Spring, Dresden, [74] S. Scellato, I. Leontiadis, C. Mascolo, P. Basu, and M. Zafer,
Germany, 2013, pp. 1-5. “Evaluating temporal robustness of mobile networks,” IEEE Trans.
[48] Federal Communications Commission (FCC) of USA, “Amendment of Mobile Comput., vol. 12, no. 1, pp. 105-117, 2013.
the Commission’s Rules Regarding Dedicated Short-Range [75] D. S. Callaway, M. E. Newman, S. H. Strogatz, and D. J. Watts,
Communication Services in the 5.850-5.925 GHz Band,” Tech. Rep. “Network robustness and fragility: Percolation on random graphs,”
FCC-03-324, FCC, Dec. 2003. Physical Review Letters, vol. 85, no. 25, pp. 5468-5471, 2000.
[49] Standards of IEEE, Available: http://standards.ieee.org/IPR/ disclaimers. [76] R. Albert, H. Jeong, and A.-L. Barabasi, “Error and Attack Tolerance of
html/. Complex Networks,” Nature, vol. 406, no. 6794, pp. 378-382, 2000.
[50] B. J. Kenney, “Dedicated short-range communications (DSRC) [77] L. Ma, and P. A. Iglesias, “Quantifying robustness of biochemical
standards in the United States,” in Proc IEEE 99.7, 2011, p. 1162-1182. network models,” BMC bioinformatics, vol. 3, no. 1, pp. 38-50, 2002.
[51] D. Johnson, A. Menezes, and S. Vanstone, “The elliptic curve digital [78] Z. Zi, , K. H. Cho, M. H. Sung, X. , Xia, J. Zheng, and Z. Sun, “In silico
signature algorithm (ECDSA)”, Int. J. Inform. Security, vol. 1, no. 1, p. identification of the key components and steps in IFN-γ induced JAK-
36-63, 2001. STAT signaling pathway,” FEBS letters, vol. 579, no. 5, pp. 1101-1108,
[52] E. G. Talbi, Metaheuristics: from design to implementation. Hoboken, 2005.
NJ: Wiley, 2009. [79] T. Yamada, and P. Bork, “Evolution of biomolecular networks - lessons
[53] C. J. Huang, Y. T. Chuang, Y. J. Chen, Y. C. Luo, and D. X. Yang, from metabolic and protein interactions,” Nature Reviews Molecular
“Constructing alternative routes for VANET using machine learning Cell Biology, vol. 10, no. 11, pp. 791-803, 2009.
techniques,” in Proc. 7th Int. Conf. AIT, Taichung, Taiwan, 2007. [80] A. O. Tarakanov, “Immunocomputing for intelligent intrusion
[54] J. H. Holland, “Genetic algorithms,” Scientific American, vol. 267, no. 1, detection,” IEEE Comput. Intell. Mag., vol. 3, no. 2, pp. 22-30, 2008.
1992, pp. 66-72. [81] N. Atreas, C. Karanikas, and A. Tarakanov, “Signal processing by an
[55] T. Back, Evolutionary algorithms in theory and practice, evolution immune type tree transform,” Artificial Immune Systems, vol. 2787, pp.
strategies, evolutionary programming, genetic algorithms. Oxford 111–119, 2003.
University Press, USA, 1996. [82] R. Horn, and Ch. Johnson, Matrix Analysis. Cambridge University
[56] A. H. Wright, “Genetic algorithms for real parameter optimization,” Press, 1986.
Foundations of Genetic Algorithms, vol. 1, pp. 205-218, 1991. [83] H. Saleet, R. Langar, O. Basir, and R. Boutaba, “Adaptive message
[57] C. Berek, and C. Milstein, “Mutation drift and repertoire shift in the routing with QoS support in vehicular ad hoc networks,” in Proc. IEEE
maturation of the immune response,” Immunological reviews, vol. 96, Globecom, Honolulu, Hawaii, USA, 2009, pp. 1-6.
no. 1, pp. 23-41, 1987. [84] P. C. Cheng, J. T. Weng, L. C. Tung, K. C. Lee, M. Gerla, and J. Haerri,
[58] Z. Michalewicz, and C. Z. Janikow, “Handling constraints in genetic “GeoDTN+ Nav: A hybrid geographic and DTN routing with navigation
algorithms,” in Proc. 4th Int. Conf. Genetic Algorithms, vol. 151, 1991, assistance in urban vehicular networks,” in Proc. 5th Annu. Int. Conf.
pp. 157. Mobile Ubiquitous, Dublin, Ireland, 2008.
24
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/COMST.2014.2371828, IEEE Communications Surveys & Tutorials
[85] G. Danoy, B. Dorronsoro, P. Bouvry, B. Reljic, and F. Zimme, “Multi- [111] J.W. Gilger, and S. L. Hershberger, “Human behavioral genetics:
objective optimization for information sharing in VANETs,” in Proc. synthesis of quantitative and molecular approaches,” Human Biology,
Advances Inform. Technol., pp. 58–70, 2009. vol. 70, no. 20, pp. 156, April 1998.
[86] L. Hogie, M. Seredynski, F. Guinand, and P. Bouvry, “A bandwidth- [112] P. Bellavista, E. Magistretti, U. Lee, and M. Gerla, “Standard integration
efficient broadcasting protocol for mobile multi-hop ad hoc networks,” of sensing and opportunistic diffusion for urban monitoring in vehicular
in Proc. ICN/ICONSMCL, Los Alamitos, CA, USA, pp. 71-79, 2006. sensor networks: the MobEyes architecture,” in Proc. IEEE Int. Symp.
[87] L. Hogie, F. Guinand, and P., Bouvry, “The madhoc metropolitan Adhoc Industrial Electron., Vigo, Spain, 2007, pp. 2582-2588.
network simulator,” Available: http://www-lih.univ-lehavre.fr/~hogie/ [113] P. Lévy, Theorie de l’addition des variables aléatoires. Gauthier-Villars,
madhoc/. Paris, 1954.
[88] J. Durillo, “The jMetal framework,” Available: http:// neo.lcc.uma.es/ [114] D. Sims, D. Righton, and J. W. Pitchford, “Minimizing errors in
software/metal/. identifying Lévy flight behavior of organisms,” J. Animal Ecology, vol.
[89] M. Slavik, and I. Mahgoub, “Applying machine learning to the design of 76, no. 2, pp. 222–229, 2007.
multi-hop broadcast protocols for VANET,” in Proc. IEEE IWCMC, [115] D. E. Jackson, and F. L. Ratnieks, “Primer: communications in ants,”
Istanbul, Turkey, 2011, pp. 1742-1747. Current Biology, vol. 16, no. 15, pp. 570–574, 2006.
[90] M. Slavik, L., Mahgoub, and F. N. Sibai, “The distance-to-mean [116] M. Jerbi, S.M. Senouci, T. Rasheed, and Y. Ghamri-Doudane, “Towards
broadcast method for vehicular wireless communication systems,” in efficient geographic routing in urban vehicular networks,” IEEE Trans.
Proc. IEEE Int. Conf. Innovations Inform. Technol., 2011, pp. 371-374. Veh. Technol., vol. 58, no. 9, pp. 5048-5059, 2009.
[91] J. Toutouh, S. Nesmachnow, and E. Alba, “Fast energy-aware OLSR [117] J. Nzouonta, N. Rajgure, G. Wang, and C. Borcea, “VANET routing on
routing in VANETs by means of a parallel evolutionary algorithm,” city roads using real-time vehicular traffic information,” IEEE Trans.
Cluster Computing, pp. 435-450, 2013. Veh. Technol., vol. 58, no. 7, pp. 3609–3626, 2009.
[92] H. Cheng, and S. Yang, “Genetic algorithms with immigrants schemes [118] V. Vapnik, The nature of statistical learning theory. Springer, 2000.
for dynamic multicast problems in mobile ad hoc networks,” Eng. [119] A. Mellouk, S. Hoceini, and S. Zeadally, “A state-dependent time
Applications AI., vol. 23, no. 5, pp. 806-819, 2010. evolving multi-constraint routing algorithm,” ACM Trans. Autonomous
[93] M. Dorigo, V. Maniezzo, and A. Colorni, “Ant system: optimization by and Adaptive Syst., vol. 8, no. 1, 2013.
a colony of cooperating agents,” IEEE Trans. Syst., Man, Cybern. B, [120] Y. Tsypkin, Foundations of the theory of learning systems. Academic
Cybern. vol. 26, no. 1, pp. 29–41, 1996. Press, New York, 1973.
[94] I. Chakeres and C. Perkins, “Dynamic manet on-demand (DYMO) [121] L. Bottou, “Stochastic learning”, Advanced Lectures on Machine
routing,” IETF draft-ietf-manet-dymo-21, 2010. Learning, 2004, pp. 146-168.
[95] C. Sommer, and F. Dressler, “The DYMO routing protocol in VANET [122] G. Ding, and B. Bhargava, “Peer-to-peer file-sharing over mobile ad hoc
scenarios,” in Proc. IEEE VTC-2007 Fall, Baltimore, MD, USA, 2007, networks,” in Proc. 2nd IEEE Ann. Conf. Pervasive Comput. and
pp. 16–20. Communications Workshops, 2004, pp. 104-108.
[96] C. Perkins, E.M. Belding-Royer, and S. Das, “Ad hoc on-demand [123] J. Yu, T. Kim, W. Na, H. Bae, Y. Lee, J., Lee, and J., Hur, “Fully-
distance vector (AODV) routing,” IETF RFC 3561, 2003. distributed multicast routing protocol for IEEE 802.15. 8 peer-aware
[97] J. Härri, C. Bonnet, and F. Filali, “Kinetic mobility management applied communications,” in Proc. IEEE ICOIN, 2014, pp. 64-69.
to vehicular ad hoc network protocols,” Comput. Commun., vol. 31, no. [124] G. A. Di Caro, F. Ducatelle, and L. M. Gambardella, “BISON: biology-
12, pp. 2907–2924, 2008. inspired techniques for self-organization in dynamic Networks,”
[98] Network simulator, ns-2, Available: http:// www.isi.edu/ nsnam/ns/. Available: http://www. cs. unibo. it/bison/publications/KIbison.pdf,
[99] J. Martins, S. Correia, and J. Celestino, “Ant-DYMO: A bio-inspired 2005.
algorithm for MANETS,” in Proc. IEEE ICT, 2010, pp. 748–754. [125] A. Vahdat, and D. Becker, “Epidemic routing for partially connected ad
[100] R. R. Sahoo, R. Panda, D. K. Behera, and M. K. Naskar, “A trust based hoc networks,” Duke University, Tech. Rep. CS-200006, 2000.
clustering with Ant Colony Routing in VANET,” in Proc. IEEE [126] H. Kitano, “Biological robustness,” Nature Reviews Genetics, vol. 5, no.
ICCCNT, Coimbatore, India, 2012, pp. 1-8. 11, pp. 826-837, 2004.
[101] F. Chiang, and J. I. Agbinya, “Bio-inspired topology convergence [127] S. Eum, S. I. Arakawa, M. Murata, “Toward bio-inspired network
algorithms in resource-constrained VANETs,” in Proc. Australian robustness-Step 1. Modularity,” in Proc. 2nd IEEE Bio-Inspired Models
Telecommun. Netw. Applications Conf., 2007, pp. 1-6. of Netw. Inform. Comput. Syst., Bionetics, 2007, pp. 84-87.
[102] E. Royer, and C. E. Perkins “Multicast operation of the ad-hoc on- [128] H. G. Beyer, and H. P. Schwefel “Evolution strategies–A comprehensive
demand distance vector routing protocol”, in Proc. ACM/IEEE Annu. introduction,” Natural Comput., vol. 1, no. 1, pp. 3-52, 2002.
Conf. Mobile Comput. and Netw., 1999, pp. 207-218. [129] A. E. Eiben, and J. E. Smith, Introduction to evolutionary computing.
[103] A. B. Souza, J. Celestino, F. A. Xavier, F. D. Oliveira, A. Patel, and M. Springer, 2003.
Latifi, “Stable multicast trees based on Ant Colony optimization for [130] J. R. Koza, Genetic programming: on the programming of computers by
vehicular Ad Hoc networks,” in Proc. IEEE ICOIN, 2013, pp. 101-106. means of natural selection. vol. 1, MIT press. 1992.
[104] C. J. Huang, Y. T. Chuang, D. X. Yang, I. F. Chen, Y. J. Chen and K. [131] P. Larrañaga, and A. J. Lozano, “Estimation of distribution algorithms:
W. Hu, “A mobility-aware link enhancement mechanism for vehicular A new tool for evolutionary computation,” vol. 2, Springer, 2002.
ad hoc networks,” EURASIP J. on Wireless Commun. and Netw., [132] P. Rocca, G. Oliveri, and A. Massa, “Differential evolution as applied to
Springer, vol. 2008, no. 24, 2008. electromagnetics,” IEEE Antennas Propag. Mag. Vol. 53, no. 1, pp. 38-
[105] University of Malaga, NEO research group, VANETs projects, “Malaga 49, 2011.
urban scenario, Available: http://neo.lcc.uma.es/ staff/ jamal /portal/ [133] R. Reynolds, and M. Ali, “Embedding a social fabric component into
?q=content/ malaga-scenario/. cultural algorithms toolkit for an enhanced knowledge-driven
[106] C. E. Perkins, and P. Bhagwat, “Highly dynamic destination-sequenced engineering optimization,” Int. J. Intelligent Comput. and Cybern., vol.
distance-vector routing (DSDV) for mobile computers,” Comput. 1, no. 4, pp. 563-597, 2008.
Commun. Review 24, no. 4, pp. 234-244, 1994.
[107] K. Z. Ghafoor, K. A. Bakar, M. van Eenennaam, R. H. Khokhar, and A.
J. Gonzalez, “A fuzzy logic approach to beaconing for vehicular ad hoc
networks,” Telecommun. Syst., pp. 1-11, 2011, pp. 139-149.
[108] S. Bitam, and A. Mellouk, “Bee life-based multi constraints multicast
routing optimization for vehicular Ad hoc networks,” J. Netw. Comput.
Applications, vol. 36, no. 3, pp. 981-991, 2013.
[109] D. T. Pham, E. Kog, A. Ghanbarzadeh, S. Otri, S. Rahim, and M. Zaidi,
“The bees algorithm – A novel tool for complex optimisation problems,”
in Proc. 2nd Int. Virtual Conf. Intelligent PROduction Machines and
Syst., Oxford, 2006, pp. 454-459.
[110] H. A. Abbass, “A single queen single worker honey-bees approach to 3-
SAT,” in Proc. ACM GECCO, San Francisco, USA, 2001, pp. 807-814.
25
1553-877X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.