A Novel Hybrid MAC Protocol For Basic Safety Message Broadcasting in Vehicular Networks
A Novel Hybrid MAC Protocol For Basic Safety Message Broadcasting in Vehicular Networks
Abstract— Basic Safety Messaging plays a crucial role to vehicles, while the latter is for disseminating emergency mes-
provide road safety in vehicular ad-hoc networks (VANETs). sages (e.g., traffic accidents and hazardous weather condition)
To avoid potential accidents, vehicles periodically broadcast to vehicles in a specific geographical area. A BSM generated
safety information to neighboring vehicles. However, due to trans-
mission collisions, fading channels and other factors, vehicular by each vehicle usually contains a vehicle’s instant status
networks usually suffer a low packet delivery ratio (PDR) and information, such as velocity, direction, acceleration, and posi-
a large delay, which are intolerant of many safety applications. tion. A periodic exchange of BSM packets can create mutual
To tackle these issues, this paper proposes a hybrid medium awareness in surrounding environment, thus avoiding potential
access control (MAC) protocol for basic safety message (BSM) accidents. Noticeable, safety beacon are massively generated
dissemination based on the framework of Dedicated Short-Range
Communication (DSRC). Its partially centralized and partially at all times, but emergency information only originates from
distributed characteristic not only can effectively suppress the a few sources sometimes.
collisions, but keep compatibility with IEEE 802.11p. In addition, In DSRC, vehicles access channels and broadcast BSMs
the integration of Physical-Layer Network Coding (PNC) and via carrier-sense multiple access with collision avoidance
Random Linear Network Coding (RLNC) further strengthens (CSMA/CA). However, this mechanism only works effectively
the reliability and efficiency for BSM dissemination. Both the
theoretical analysis and comprehensive simulations indicate that, in very sparse networks (e.g., less than 10 vehicles in a
compared with existing schemes, the proposed protocol can vehicular network) [2]. With the increase of traffic density,
significantly improve the PDR by a range of 20% to 300%. transmission collisions arise and result in a poor service for
Meanwhile, in terms of normalized throughput, it increases by safety message delivery. Unlike other unicast communications,
varying percent between 20% and 160% in different scenarios. there is no retransmission on the occasion of BSM loss.
Index Terms— Vehicular communications, BSM dissemination, Thus, such unreliability is unacceptable for many periodic
MAC protocol, PNC, RLNC. applications. Meanwhile, BSM packets delivery ratio (PDR)
is worsened by 1) highly dynamic topology; and 2) fading
I. I NTRODUCTION channels caused by buildings, bridges and other large objects
on road [3]. Moreover, another challenge comes from the
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY JALANDAR. Downloaded on August 27,2021 at 08:20:46 UTC from IEEE Xplore. Restrictions apply.
4270 IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 21, NO. 10, OCTOBER 2020
communications among vehicles and/or infrastructure. The nodes to transmit their BSMs via CSMA/CA. 2) It integrates
authors in [12] investigated how to get rid of certain BSMs PNC and random linear network coding (RLNC) [26] to
based on the observation of redundant and derivable infor- exchange BSMs efficiently and reliably. It can be widely
mation among consecutive messages. Although the proposed adopted because both roadway and intersection scenarios are
method is fully compatible with IEEE 802.11p, its applicable taken into account. 3) We provide an insight into the com-
scenarios are very limited. For instance, it cannot reduce munication complexity and theoretically analyze the proposed
BSMs in high-mobility networks. The utilization of protocol protocol. 4) A system model is built and comprehensive
sequence to access channels can reduce collisions, but it targets simulations are conducted to evaluate the performance of the
on optimizing the delivery delay, and the evaluation of PDR proposed protocol and validate the analytical results.
is missed [13]. In fact, all of the mentioned protocols work The rest of this paper is organized as follows. Section II
in a distributed manner and vehicles contend for accessing overviews the related works. Section III presents the system
channels. Consequently, transmission collisions are inevitable. model and defines performance metrics. Section IV describes
Works [14] and [15] try to make use of collisions by means the proposed MAC protocol in detail. Theoretical analysis and
of adopting physical-layer network coding (PNC), but both simulation results are included in Section V and Section VI,
schemes are only suitable for unicast communication rather respectively. Section VII indicates a multi-relay strategy to
than broadcast. Another alternative method [16], [17] that also further enhance the network performance. Finally, Section VIII
employs PNC for message broadcasting works in a partly dis- concludes the whole paper.
tributed way to restrain collisions. However, the performance
is volatile because BSM exchanging in the scheme mostly
II. R ELATED W ORKS
relies on a relay vehicle that may be highly dynamic and has
limited coverage. Diverse strategies proposed to tackle the aforementioned
To obviate contention for channel access, centralized MAC issues for BSM dissemination largely focus on innovation
protocols that employ time-division multiple access (TDMA) at MAC layer. They can be categorized into distributed,
have been proposed [18]–[20]. In [18], a road is divided into centralized and hybrid schemes.
multiple segments and a vehicle is selected in each segment A repetitive transmission approach was proposed in [4].
to assign time slots to other vehicles. Though the scheduling In this mechanism, a control channel (CCH) interval is slotted
can eliminate conflicts, the area of each segment is small and into L length-fixed time slots. Vehicles repeatedly broadcast
the inter-segment BSM dissemination is impossible due to each safety beacon several times to enlarge the likelihood of
simultaneous transmissions in adjacent segments. Paper [19] reception. This idea develops into two basic schemes: syn-
and [20] has the similar idea but the coordinator turns to be chronized fixed repetition (SFR) and synchronized persistent
a roadside unit (RSU). The delay is much larger than the repetition (SPR). In SFR, w (w < L) time slots are randomly
lifetime of the BSM under dense networks and it occupies an selected to broadcast a packet repeatedly, while in SPR a
extra service channel for time slot reservation. Liu et al. [21] packet is sent with a predetermined probability p at each
presented a network coding assisted scheduling algorithm for time slot. Although both schemes can diminish the reception
cooperative data dissemination via V2X communication, but failure, at the same time they increase the chance of concurrent
it is more suitable for non-safety information broadcasting. transmissions, especially in a network with a high density
More recently, in order to alleviate the broadcast storm of vehicles. To limit the number of collisions, a positive
and enhance the message delivery rate, some complicated orthogonal code is introduced in [5], while protocol sequence
broadcast protocols have been put forward. Protocols in [22] is adopted in [13]. A collision-recording based scheme is intro-
and [23] use fuzzy logic to determine the next hop relay duced to control the congestions in [27]. When the number
nodes. Comparably, a forwarding node selection scheme that of detected collisions increases, vehicles begin to decrease
integrates directional broadcast was presented in [24]. The the frequency of BSM transmission. By contrast, in [12],
authors in [25] even tried to use a service channel to relay the authors tried to reduce the number of packets by omitting
safety messages. Unfortunately, all of them are only suitable certain packets containing redundant or derivable informa-
for multi-hop dissemination of emergency messages rather tion in between consecutive sending packets. Y. Park et. al
than BSMs. proposed an application-level control scheme [6], in which
This study is dedicated to improving the reliability and the a CCH interval is divided into a number of asynchronous
efficiency for BSM dissemination in VANETs. We propose a epoches. To minimize the chance of transmission collisions,
hybrid MAC protocol that contains both distributed session the application layer hands over a BSM to the MAC layer in
and centralized session. It not only effectively suppresses the an epoch that is unlikely used by other vehicles.
transmission collisions, but shows compatibility with IEEE Additionally, some researchers also explored applying
802.11p and good robustness in dense networks. The main RLNC in distributed schemes to enhance the reliability. Based
contributions of this study include: 1) A novel MAC protocol on DSRC, paper [7] presented an application of RLNC for
is proposed for BSM broadcast. It consists of two centralized safety message dissemination among a cluster of nodes. Each
sessions and one distributed session. The BSM broadcasting, node has multiple opportunities to rebroadcast network coded
which is coordinated by an RSU mainly takes place in a packets that is produced by encoding its own packet with
centralized contention-free session, while a distributed session the ones overheard from its counterparts. A loss probability
is reserved for legacy vehicles using IEEE 802.11p and other upper bound was derived by using discrete phase type model.
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY JALANDAR. Downloaded on August 27,2021 at 08:20:46 UTC from IEEE Xplore. Restrictions apply.
ZHANG et al.: NOVEL HYBRID MAC PROTOCOL FOR BASIC SAFETY MESSAGE BROADCASTING IN VEHICULAR NETWORKS 4271
Fig. 1. Network model of BSM broadcasting in vehicular networks for two typical scenarios: (a) a roadway scenario; (b) an intersection scenario.
The dissemination of BSM packets at an intersection of two its system model and all vehicles being aware of each other’s
roads was investigated in [9] and [10]. The former only instant location in advance, etc) that it is far from feasible.
allows an intersection vehicle to carry out encoding buffered In addition, its PDR performance is prone to the location of
packets before broadcasting, while the latter integrates SPR [4] the relay.
with RLNC at each vehicle to repetitively transmit encoded
packets. Compared with DSRC, both schemes have improved III. S YSTEM M ODEL AND P ERFORMANCE M ETRICS
the packet delivery rate, but the packet reception rate plummets
when the number of vehicles in the network exceeds 40. A. System Model
Since the distributed schemes unlikely eliminate transmis- We are interested in one-hop BSM packets dissemination
sion collisions for the safety messages in a dense vehicular among vehicles in a vehicular network. In particular, each
networks, a few centralized protocols based on TDMA have vehicle is obliged to receive all BSM packets from neighboring
been designed. In [18], a road is divided into a number of vehicles within a time interval (also known as the lifetime of
segments and each segment has a fixed transmission period. a BSM packet).
Different vehicles transmit safety beacons in different time Fig. 1 shows the network model for a road segment scenario
slots assigned by a coordinator vehicle. In [19] and [20], and an intersection scenario. For each scenario, there are
an RSU measures the traffic in its coverage and manages the a number of moving vehicles but one RSU. Each vehicle
time slots for different nodes to ensure every vehicle have its is equipped with an onboard unit (OBU), which is able to
exclusive time slot to broadcast BSMs without contention. communicate with other OBUs and the RSU. Assume all
There are also hybrid MAC protocols for VANETs. The OBUs have the same communication range. Let R and r
authors in [21] developed a NC-assisted scheduling algorithm represent the communication range of the RSU and the OBU,
that fully exploits the joint effect of V2V and V2I com- respectively, where R > r > 0. The communication range
munication. Nodes in the network work in both centralized of the RSU is defined as a region of interest (ROI). In both
and distributed way. However, the algorithm only suits the scenarios, every vehicle disseminates its BSM to all other
non-safety data dissemination due to the large delay. Two vehicles in the same RoI via V2X communication. Some of the
papers [28] and [29] firstly proved the feasibility of imple- vehicles are within each other’s communication range (e.g., v 1
menting PNC at physical layer in vehicular environment. and v 6 in Fig. 1 (a)), but some of them are not (e.g., v 1 and v 3
The former examined the impact of motion-induced carrier in Fig. 1 (a)). In addition, all vehicles in the ROI can receive
frequency offset (CFO) and inter-carrier interference (ICI) by packets sent by the RSU. However, the RSU may not receive
applying conventional equalization methods, while the latter any information from certain vehicles (say v 2 in Fig. 1 (a))
delineated a belief propagation based algorithm to mitigate because it is out of the communication range of those vehicles.
the CFO/ICI effect on signal decoding. Ndih et. al designed A corresponding communication graph is explained in the
a PNC-based MAC protocol named VPNC-MAC [16], [17], next paragraph. To avoid confusion, throughout the whole
which consists of both centralized and distributed periods. paper, OBU, vehicle and node are interchangeable terms in
In VPNC-MAC, a relay vehicle is firstly determined, and then our discussion.
vehicles apply PNC to exchange their BSM packets with the We let S = {v 1 , v 2 , . . . , v N } and denote the set of all
coordination of the relay. However, the protocol is based on N vehicles in the ROI and the RSU, respectively. We further
so many unrealistic assumptions (e.g., one-dimension road in assume that a vehicle’s sensing range is 2r , and N vehicles
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY JALANDAR. Downloaded on August 27,2021 at 08:20:46 UTC from IEEE Xplore. Restrictions apply.
4272 IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 21, NO. 10, OCTOBER 2020
in the ROI follow a Poisson point process distribution and the delivery is usually intolerable. Let Td denote the time required
density of vehicles is α vehicles per kilometre. In addition, to get the BSMs from vehicles in a ROI for making a
d(x, y) is the Euclidean distance between any two points x neighbourhood map of a vehicle. Different number of vehicles
and y on the road, where x, y ∈ S ∪ . We define a hybrid may have different delivery latency.
communication graph HCG to characterize the topology of the 3) Throughput: Throughput is usually defined as how many
vehicular network, as follows: information bits are received by a node per time unit. With
Definition: H C G = G(V, E) is a communication graph regarding to a network, the network throughput is the sum of
with node set V = S ∪ and edge set E = E 1 ∪ E 2 ∪ E 3 ∪ per-node throughput over all nodes. This research investigates
E 4 . For any two vehicles v i, v j ∈ S, E 1 and E 2 contains
one-hop BSM packet dissemination in a vehicular network.
bidirected edge v i , v j if d v i , v j ≤ r and d v i , v j > r , Therefore, we evaluate the network throughput that exclusively
respectively. For ∀v x , v y ∈ S, E 3 includes bidirected edge involves BSM packet delivery at all vehicles. Let χ(i ) denote
x , ) if d (v x , ) ≤ r , while
(v E 4 comprises directed edge total number of BSM packets received at vehicle v i , since
v y , if and only if r < d v y , ≤ R. there are N vehicles in the network, the network throughput
In the HCG, pairwise vehicles in E 1 are able to communi- can be defined as
cate with each other directly, vehicles connected by E 2 are able
N
to receive/send signals from/to the RSU. By contrast, vehicles 8l χ(i )
i=1
involved in E 3 can only obtain signals from the RSU, but in TH = , (1)
the opposite direction, their signals cannot reach the RSU. T
We assume all OBUs and the RSU can access GPS signal where T is the overall time spent for all vehicles to complete
and have been synchronized by a mechanism shown in [30]. transmitting their BSM packets, and l is the predefined length
Besides, each vehicle generates a BSM packet at the beginning of a BSM packet in byte (one byte is equal to eight bits).
of every control channel (CCH) interval [1], and then the In DSRC, safety messages are disseminated during the CCH
dissemination process is conducted during the whole interval. interval (i.e., TCC H ). Further, we define a normalized through-
It is noteworthy that although vehicles may move at a high put to indicate the relative efficiency of a protocol while
speed, the network topology can be deemed unchanged during considering safety message broadcasting among all nodes in
a CCH interval. For example, for a vehicle is travelling a vehicular network, as follows:
at 100 km/h, its position change during one CCH interval
N
N
8l χ(i)
of 50ms will be no more than 1.4 meters, which is not i=1
χ(i )
l
T TCC H i=1
considered as significant. T Hnorm = = . (2)
In order to obtain a better performance, we consider adopt-
8N(N−1) T N(N − 1)
TCC H
ing three decoders at the physical layer of the RSU: one
PNC decoder, one multi-user detection (MUD) decoder and IV. P ROTOCOL D ESIGN AND P ERFORMANCE
one single user successive interference cancellation (SU-SIC) The proposed MAC protocol (called NC-PNC MAC) will
based decoder [31], [32]. The PNC decoder attempts to decode be explained in detail in this section. It consists of three
a packet like Pv a ⊕ Pv b based upon the overlapped signals from consecutive sessions, including MAC setup session, CSMA
two nodes, while the MUD decoder attempts to decode two session and PNC session, as shown in Fig. 2, in which the
individual packets, Pv a and Pv b , which are sent by two vehicles life time of BSM packets can be predefined, according to the
v a and v b , respectively. The SU-SIC decoder is for single-user number of vehicles in a ROI.
case. At the MAC layer, both the RSU and OBUs are capable
of encoding and decoding RLNC packets, as well as uncoded
original packets. A. MAC Setup Session
At the very beginning of each CCH interval, the RSU
broadcasts a polling message to invite vehicles to join in PNC
B. Performance Metrics session. Vehicles that successfully receive the polling message
1) Packet Delivery Ratio: We denote P D R(i ) the packet reply to the RSU after a short inter-frame space (SIFS) interval
delivery ratio for a vehicle i in the ROI. If the vehicle receives through an orthogonal frequency division multiple access
n packets during a CCH interval, we define P D R(i ) = (n + (OFDMA)-based scheme [33]. Each vehicle randomly and
1)/N, where N is the total number of generated BSM packets independently selects one subcarrier out of Nsub subcarriers.
in the interval. If a vehicle collects all N − 1 packets, it is In order to reduce the collision in subcarrier selection, each
able to construct a complete neighbourhood map based on the vehicle randomly chooses one out of Nb transmission batches
information contained in those packets. Since each node has to transmit its join packet, the length of which is very short and
had its own BSM packet, the upper bound and lower bound only includes its ID and current location. Apparently, if two
of the PDR for a vehicle should be 1 and 1/N, respectively. or more vehicles pick the same subcarrier and the same batch,
Different nodes may have different PDRs due to its location collisions will be inevitable.
and channels, so we take the average PDR to evaluate the Since each subcarrier is orthogonal in frequency to each
performance of the entire network. other, the RSU is able to know which node can take part in
2) Delivery Latency: Many safety applications in VANETs the PNC session if no transmission collision takes place. Then
need to update information timely, so a large delay in BSM the RSU broadcasts a coordination packet to notify all vehicles
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY JALANDAR. Downloaded on August 27,2021 at 08:20:46 UTC from IEEE Xplore. Restrictions apply.
ZHANG et al.: NOVEL HYBRID MAC PROTOCOL FOR BASIC SAFETY MESSAGE BROADCASTING IN VEHICULAR NETWORKS 4273
about which two vehicles form a PNC pair as well as the B. CSMA Session
total number of PNC pairs, according to their instant locations. Some nodes may not be able to participate the PNC session
Here, one PNC pair consists of two vehicles that exchange after the MAC setup session because the RSU fails to receive
their safety messages through the PNC scheme [34] during their join packets. The failure is casued by various of factors,
the PNC session. To form a PNC pair, the RSU prioritizes two including fading channels, long distance from the RSU, dis-
vehicles at different sides of the RSU. For instance, the left- ability of sending a join packet and so on. Therefore, the RSU
side node v 1 and the right-side node v 3 in Fig. 1 (a) can be a cannot arrange an opportunity for those vehicles in the PNC
PNC pair, but v 2 and v 3 is not a wise choice because both v 2 session. Among all factors, the dominant one is the subcarrier
and v 3 are at the right side of the RSU. collision, which means some nodes select the identical data
Assume all PNC pairs form a set Q, so Q ⊆ S. For the subcarrier at the same transmission batch during the OFDMA
roadway scenario, Q can be further divided into two subsets uplink stage. The probability of a certain subcarrier and a batch
Q L and Q R , which stands for vehicles on the left and right chosen by n (n ≥ 2) nodes is:
side of the RSU, respectively. Among all PNC pairs in Q, n
the RSU designates one pair as relay nodes. The relay nodes N Nsub Nb − 1 N−n 1
Pcoll (n) = . (5)
help those nodes, which lose the opportunity to take part in n Nsub Nb Nsub Nb
the PNC session, to forward their safety messages. Their role
Noticeably, it might be that more than one subcarrier and
will be elaborated in subsection IV-C. In order to have the
one batch are repeatedly selected (i.e., it may have multiple
best coverage of other vehicles, a pair of relay nodes v Relay
L
collisions). The overall collision probability will be considered
and v Relay
R must satisfy the following conditions: in Sec. V-A. For all unqualified nodes, the CSMA session
provides them with an opportunity to broadcast their BSM
v Relay
L
∈ Q L and v Relay
L
= arg max (d (v x , )) , packets, if T AI F S > TD I F S > TS I F S .
v x ∈Q L
R R R
During the CSMA session, all participants contend for
v Relay ∈ Q and v Relay = arg max d v y , . (3)
v y ∈Q R accessing channels and transmitting their safety messages by
using the CSMA/CA. Vehicles in the vicinity including the
The conditions above are proved in Appendix A. For the relay nodes can receive these BSM packets and buffer them
intersection scenario, four relays can be selected likewise. for further purpose of decoding the PNC packets or RLNC
Since the length of the poll packet, join packet and coor- packets, which will be illustrated in the next subsection. The
dination packet are very short (i.e., the length of a poll or time TC S M A spent on this session can be calculated by:
join packet is no more than twenty bytes, and the length of a n C
coordination packet is less than two hundred bytes), the total
SM A
TC S M A = n C S M A TB S M + tb f [i ] + TD I F S , (6)
time spent on the MAC setup session is also very short. The
i=1
duration can be estimated as follows:
where n C S M A is the number of vehicles participating in the
Tset up = T poll + Nb T j oin + Tcoord + Nb TS I F S + TD I F S , (4) CSMA session, TB S M is a BSM packet transmission time,
tb f [i ] denotes a random back off time in the i t h transmission.
where T poll , T j oin , and Tcoord are the transmission time for one
poll packet, join packet and coordination packet, respectively,
C. PNC Session
Nb is the total number of batches, and TS I F S (or TD I F S ) is
the waiting time before sending a join packet (or the waiting The RSU launches the PNC session after the CSMA session.
time before the next session). It waits for an arbitrary inter-frame space (AIFS) before
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY JALANDAR. Downloaded on August 27,2021 at 08:20:46 UTC from IEEE Xplore. Restrictions apply.
4274 IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 21, NO. 10, OCTOBER 2020
broadcasting a beacon packet, which requests the first PNC selected as relay nodes in Fig. 1, the k t h (1 ≤ k ≤ M) two
pair to transmit their BSM packets. After an interval of SIFS, compound uplink packets generated at two relay nodes are:
the first PNC pair send their BSM packets simultaneously. The
RSU tries to decode the overlapped signals by utilizing the
ML
MR
L
PRelay (k) = R
dki Pv i and PRelay (k) = ckj Pv j , (7)
three physical-layer decoders aforementioned in Section III. i=1 j =1
After decoding, the RSU will broadcast a downlink packet,
which also notifies the next PNC pair by piggybacking their respectively, where dk i (or ckj ) are random coefficients at
ID information. Upon receiving, the next PNC pair start node v 1 (or v 3 ), and Pv i (or Pv j ) are its own packet as well
the next round of BSM packet exchange, and this process as packets stored during the CSMA session. Based on the two
repeats for all PNC pairs until the last one. For the last RLNC uplink packets shown by (7), the PNC decoder of the
PNC pair, the process is slightly different from those before. RSU may generate a downlink packet also called a compound
The last pair comprises of two relays (or four relays at downlink packet as follows:
each direction for the intersection case). Each relay adopts comp
PRSU (k) = PRelay
L
(k) ⊕ PRelay
R
(k)
the RLNC to encode its own BSM packet with other BSM
packets buffered during the CSMA session. Being different
ML
MR
from other non-relay PNC pairs, the relay nodes work in a = ( dki Pv i ) ⊕ ( ckj Pv j ). (8)
i=1 j =1
burst mode: They consecutively conduct M rounds of exchange
but with different encoding coefficients for each round. Coding After receiving a downlink packet, each PNC pair is able
coefficients are randomly generated from Galois field (GF). to obtain their desired information by XORing the downlink
Here M = max(M L , M R ) + 1, where M L and M R is the packet with their own packets. Notably, nodes that have
number of BSM packets in the buffer of the left and right collected sufficient number of compound downlink packets can
relay, respectively, taking into account the roadway case. also obtain all individual packets Pv i ∀i (or Pv j ∀ j ) by carrying
In order to distinguish different signals, the notation Pv i , out the Gaussian Elimination.
PRelay and PR SU means a packet sent by a vehicle v i , a relay An interesting and remarkable phenomenon is that some
and the RSU, respectively. Considering the compatibility, other vehicles also possibly restore original packets when
we utilize the same MAC header of IEEE 802.11p [35] receiving downlink packets that belong to other PNC pairs if
but assign different values in Frame Control (FC) field for they can overhear their uplink packets. Moreover, for a relay
different types. More details about MAC header and FC values node, since it has the best coverage, most of the surrounding
assignment are in Appendix B. vehicles get benefits from decoding compound downlink pack-
According to three physical-layer decoders in the RSU, ets, since those nodes can overhear the compound uplink from
the decoding results based upon the superimposed uplink the relay. This characteristic is helpful to disseminate BSM
signals would be one of the following: packets. On the other hand, some vehicles may not overhear
1) One lone packet: e.g., only packet Pv 4 from the vehicle all uplink packets, so they cannot restore the original packets
v 4 is decoded by the MUD decoder or the SU-SIC decoder; even though they have received downlink packets from the
2) A bit-wise coded packet: e.g., Pv 4 ⊕ Pv 5 through the PNC RSU. This issue will be tackled by our extended multiple relay
decoder; scheme, which will be discussed in Section VII.
3) Two lone packets: e.g., both Pv 4 and Pv 5 through the The total time spent on PNC session is:
MUD decoder;
4) No packet is obtained.
M
T P NC = (n P NC − 1)(Tup + Tdown ) + Tup + Tdown
For case 2) and 3), the RSU will transmit a downlink i=1
packet such as PRPSU NC = P ⊕ P . For case 1), it will
v4 v5 + 2TS I F S (M + n P NC − 1) + T AI F S
buffer a lone packet at first, and then transmit an encoded
RLNC packet PRRSU L NC = h P , where P is a previously = 2(M + n P NC − 1)(TB S M + TS I F S ) + T AI F S . (9)
i vi vi
i
buffered lone packet and h i is a random coefficient generated where Tup = Tdown = TB S M are transmission time for one
in GF field. In case 4), the RSU will also send an encoded uplink packet or downlink packet, and n P NC is the total
packet by encoding the buffered lone packets but with different number of PNC pairs.
coefficients in case 1). To ensure vehicles can decode all lone To clearly show the methodologies applied in the PNC
packets, we conceive a lower triangular matrix for all h i . That session and the entire procedure of the protocol, a flow chart
is, when the RSU obtains a lone packet at the first time, is provided in Appendix C.
it just forwards it to all vehicles without encoding. Then,
V. T HEORETICAL A NALYSIS
at the second time, it encodes the two packets (one is the
packet stored at the first time) and broadcasts the encoded A. Collision Probability for Subcarrier Selection
packet. Similarly, at the t t h time when the RSU decodes a lone As aforementioned, when each vehicle randomly and inde-
packet, it encodes all t packets and broadcasts the encoded pendently chooses one batch and one subcarrier to transmit
packet for downlink. its join packet, it may lead to transmission collisions. In this
As pointed out above, relay nodes generate and transmit M section, we will firstly derive the proportion of vehicles that
distinct uplink packets. As a case in point, if v 1 and v 3 are involves in carrier collisions.
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY JALANDAR. Downloaded on August 27,2021 at 08:20:46 UTC from IEEE Xplore. Restrictions apply.
ZHANG et al.: NOVEL HYBRID MAC PROTOCOL FOR BASIC SAFETY MESSAGE BROADCASTING IN VEHICULAR NETWORKS 4275
In order to figure out how many vehicles involved in the Therefore, we deem PP NC ≈ pe in the following analysis.
subcarrier collision, we firstly calculate the repeated times Additionally, if a receiver v i locates within the coverage of a
of selected subcarriers. The whole process can be equivalent sender v j (i.e., 0 < D = d(v i , v j ) ≤ r ), we take pe = 0 (i.e.,
with the case that N vehicles randomly pick up subcarriers a reception can be guaranteed in the coverage). Otherwise,
out of S = Nb Nsub subcarriers, where Nb is the batch 0 < pe < 1 and can be calculated by [37]:
volume and Nsub is the number of data carriers at the physical m
−m 2 a Ns 1 kγt h
layer. Apparently, N subcarriers will be selected (including the pe = γ √ (t + , ), (14)
k 2(t + 1) π 2 2
repeated ones). Let denote the set of selected subcarriers
and x i is the i t h subcarrier in this set, where x i ∈ and where γ denotes the average signal to noise ratio during one
1 ≤ i ≤ N. We define an indicator Ixi as follows: frame, m is the fading figure in Nakagami fading model, k is
the number of bits persymbol,Ns
is the number of symbols
1, if x i has appeared in , 2
Ixi = (10) in a packet, γt h = 2k er f c−1 N2s and a = m m / (m).
0, otherwise. According to (14), pe is determined by multiple variables.
The probability for Ixi = 0 and Ixi = 1 are In terms of a specific data rate, a fixed transmission power
and the channel model, the erasure probability is a function
N −1 i−1 N −1 i−1
P(Ixi =0) = ( ) and P(Ixi =1) = 1 − ( ) . (11) of distance. Therefore, vehicles at different locations probably
N N have different data rates even if signals are from the same
Therefore, the expectation of repeated times for all subcar- transmitter. For simplicity, if D > r , we average pe over the
riers in is: distance:
D
N
n
1
E Nr p = E Ixi = P(Ixi =1) pe = pe (x)d x. (15)
D −r r
i=1 i=1
1 N C. Communication Complexity
= N −S 1− 1− . (12)
S The communication complexity of a MAC protocol is
In addition, the probability of choosing one usually defined by the total amount of packets sent by all
certain sub-
N S−1 N−1 1 nodes in a network. Since there are N vehicles in the ROI
carrier out of S subcarriers only once is S S, in our network model, let N T be the total number of packets
1
and
the probability of a certain subcarrier never chosen is sent by all vehicles and the RSU during one dissemination
N S−1 N interval, so N T = N T1 + N T2 + N T3 , in which three
S . Therefore, the proportion of vehicles associ-
0 right-side items represent the amount of packets sent in three
ated with subcarrier collisions is sessions respectively. Without loss of generality, we take the
N 1 S−1 N−1 N S−1 N roadway scenario to evaluate the communication complexity
S 1− − + E Nr p and PDR performance. Similar results can be acquired for the
1 S S 0 S
Pcoll = intersection scenario as it applies the same protocol.
N
1 During the first session, each vehicle sends a join packet
= 1 − (1 − ) N−1
. (13) following the polling packet. By adding the coordination
Nb Nsub
packet, we have N T1 = N + 2.
Fig. 3 (a) shows the trend of proportions of vehicles
In the second session, vehicles that are ineligible for the
involved in subcarrier collisions. According the PHY of
PNC session access the channel and broadcast BSMs by means
DSRC, the number of data subcarrier is 48. Thus, we take
of CSMA/CA. The ineligibility, on one hand, is the result of
Nsub = 48 in simulations and analysis. Apparently, more
subcarrier collisions caused by the random OFDMA scheme,
vehicles and fewer uplink batch Nb will cause more collisions,
and on the other hand, comes from the large distance between
which conforms to our expectation. In addition, it is evident
some vehicles and the RSU (i.e., vehicles associated with the
that the analytical model precisely predicts the collision pro-
edge set E 4 in H C G). According to the property of Poisson
portions as any two relevant curves are overlapped.
process, the probability of k vehicles involved in the E 3 is
(2αr )k −2αr
B. Channel Erasure Probability P (k, 2r ) = e . (16)
k!
It has been shown that Nakagami distribution with proper
The expected number of vehicles in this range is
parameters would be a realistic channel model [36]. To be ∞
more realistic, we assume that all channels in the network are
Nakagami fading channels with an erasure probability pe for E[K in ] = k P (k, 2r ) = 2αr . (17)
the point-to-point communication case. In addition, let PP NC k=0
decode a PNC packet from superposed signals sent by two unqualified to take part in the PNC session due to subcarrier
nodes simultaneously. Generally, under the same condition, collisions. Nevertheless, their counterparts involved in E 4 that
pe ≤ PP NC . However, by using some advanced algorithms in might have one or both issues mentioned above lose the
PHY [29], the gap between them can be greatly diminished. opportunity. Likewise, the total number of vehicles and the
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY JALANDAR. Downloaded on August 27,2021 at 08:20:46 UTC from IEEE Xplore. Restrictions apply.
4276 IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 21, NO. 10, OCTOBER 2020
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY JALANDAR. Downloaded on August 27,2021 at 08:20:46 UTC from IEEE Xplore. Restrictions apply.
ZHANG et al.: NOVEL HYBRID MAC PROTOCOL FOR BASIC SAFETY MESSAGE BROADCASTING IN VEHICULAR NETWORKS 4277
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY JALANDAR. Downloaded on August 27,2021 at 08:20:46 UTC from IEEE Xplore. Restrictions apply.
4278 IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 21, NO. 10, OCTOBER 2020
TABLE I
K EY P HYSICAL AND MAC L AYER PARAMETERS
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY JALANDAR. Downloaded on August 27,2021 at 08:20:46 UTC from IEEE Xplore. Restrictions apply.
ZHANG et al.: NOVEL HYBRID MAC PROTOCOL FOR BASIC SAFETY MESSAGE BROADCASTING IN VEHICULAR NETWORKS 4279
performance than IEEE 802.11p and even maintains the same v aux_L
Relay = arg max (d (v x , )) . (36)
level as the NC based scheme (see Fig. 6). v x ∈ Q L \v Relay
L
VII. NC-PNC MAC W ITH M ULTIPLE R ELAYS The remaining auxiliary relays can also be identified in a
Distinguishing from some distributed protocols like similar way. Once both the primary relays and the auxiliary
IEEE802.11p, the NC-PNC MAC is a hybrid protocol with relays are determined, the RSU also announces them in the
both centralized parts (MAC setup session and PNC session) coordination packet.
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY JALANDAR. Downloaded on August 27,2021 at 08:20:46 UTC from IEEE Xplore. Restrictions apply.
4280 IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 21, NO. 10, OCTOBER 2020
TABLE II
FC VALUES FOR D IFFERENT T YPES OF S IGNALS IN NC-PNC MAC
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY JALANDAR. Downloaded on August 27,2021 at 08:20:46 UTC from IEEE Xplore. Restrictions apply.
ZHANG et al.: NOVEL HYBRID MAC PROTOCOL FOR BASIC SAFETY MESSAGE BROADCASTING IN VEHICULAR NETWORKS 4281
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY JALANDAR. Downloaded on August 27,2021 at 08:20:46 UTC from IEEE Xplore. Restrictions apply.
4282 IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 21, NO. 10, OCTOBER 2020
[25] O. S. Eyobu, J. Joo, and D. S. Han, “Cooperative multi-channel G. G. Md. Nawaz Ali (S’11–M’16) received the
dissemination of safety messages in VANETs,” in Proc. IEEE Region B.Sc. degree in computer science and engineering
10 Conf. (TENCON), Nov. 2016, pp. 1867–1870. from the Khulna University of Engineering and
[26] T. Ho et al., “A random linear network coding approach to multicast,” Technology, Bangladesh, in 2006, and the Ph.D.
IEEE Trans. Inf. Theory, vol. 52, no. 10, pp. 4413–4430, Oct. 2006. degree in computer science from The City University
[27] N. Chaabouni, A. Hafid, and P. K. Sahu, “A collision-based beacon rate of Hong Kong, Hong Kong, in 2013, with the
adaptation scheme (CBA) for VANETs,” in Proc. IEEE Int. Conf. Adv. Outstanding Academic Performance Award. From
Netw. Telecommun. Syst. (ANTS), Dec. 2013, pp. 1–6. October 2015 to March 2018, he was a Postdoc-
[28] I. W.-H. Ho, S. C. Liew, and L. Lu, “Feasibility study of physical-layer toral Research Fellow with the School of Electrical
network coding in 802.11p VANETs,” in Proc. IEEE Int. Symp. Inf. and Electronic Engineering, Nanyang Technological
Theory, Jun. 2014, pp. 646–650. University (NTU), Singapore. He is currently a
[29] L. F. Xie, I. W.-H. Ho, S. C. Liew, L. Lu, and F. C. M. Lau, “Mitigating Post-Doctoral Fellow with The Clemson University International Center for
Doppler effects on physical-layer network coding in VANET,” in Proc. Automotive Research (CU-ICAR), Department of Automotive Engineering,
IEEE Int. Symp. Person Indoor Mobile Radio Commun. (PIMRC), Greenville, SC, USA. His current research interests include vehicular cyber
Aug. 2014, pp. 121–126. physical system (VCPS), wireless broadcasting, mobile computing, and net-
work coding. He is a reviewer of a number of international journals, including
[30] IEEE Standard for Wireless Access in Vehicular Environments (WAVE)
the IEEE T RANSACTIONS ON I NTELLIGENT T RANSPORTATION S YSTEMS ,
Multi-Channel Operation, IEEE Standard 1609.4, 2011. IEEE Intelligent Transportation Systems Magazine, IEEE T RANSACTIONS
[31] M. Zhang, L. Lu, and S. C. Liew, “An optimal decoding strategy for ON V EHICULAR T ECHNOLOGY , and Wireless Networks.
physical-layer network coding over multipath fading channel,” IEEE
Trans. Veh. Technol., vol. 64, no. 9, pp. 4365–4372, Sep. 2015.
[32] L. Lu, L. You, and S. C. Liew, “Network-coded multiple access,” IEEE
Trans. Mobile Comput., vol. 13, no. 12, pp. 2853–2869, Dec. 2014. Peter Han Joo Chong (M’01–SM’19) received
[33] S. Sen, R. R. Choudhury, and S. Nelakuditi, “No time to countdown: the Ph.D. degree from The University of British
Migrating backoff to the frequency domain,” in Proc. ACM Int. Conf. Columbia, Canada, in 2000. He was an Associate
Mobile Comput. Netw., Sep. 2011, pp. 241–252. Professor (tenured) with the School of Electrical
[34] S. Zhang, S. C. Liew, and P. P. Lam, “Hot topic: Physical-layer and Electronic Engineering, Nanyang Technological
network coding,” in Proc. ACM Int. Conf. Mobile Comput. Netw., 2006, University (NTU), Singapore. From 2011 to 2013,
pp. 358–365. he was an Assistant Head of the Division of Com-
[35] IEEE Standard for Information Technology—Local and Metropolitan munication Engineering. From 2013 to 2016, he was
Area Networks—Specific Requirements—Part 11: Wireless LAN Medium the Director of INFINITUS, Centre for Infocomm
Access Control (MAC) and Physical Layer (PHY) Specifications Amend- Technology. He is currently a Professor and the Head
of the Department of Electrical and Electronic Engi-
ment 6: Wireless Access in Vehicular Environments, IEEE Standard
802.11p-2010, 2011. neering, Auckland University of Technology, Auckland, New Zealand. He is
also an Adjunct Professor with the Department of Information Engineering,
[36] J. Yin, G. Holland, T. ElBatt, F. Bai, and H. Krishnan, “DSRC channel The Chinese University of Hong Kong, Hong Kong. His research interests are
fading analysis from empirical measurement,” in Proc. IEEE 1st Int. in the areas of mobile communications systems, including MANETs/VANETs,
Conf. Commun. Netw. China, Oct. 2006, pp. 1–5. multihop cellular networks, and the Internet of Things/Vehicles.
[37] P. Ferrand, J.-M. Gorce, and C. Goursaud, “Approximations of the packet
error rate under quasi-static fading in direct and relayed links,” EURASIP
J. Wireless Commun. Netw., vol. 1, no. 7, p. 12, Dec. 2015.
[38] Q. Yang, J. Zheng, and L. Shen, “Modeling and performance analysis of Boon-Chong Seet (M’03–SM’11) received the
periodic broadcast in vehicular ad hoc networks,” in Proc. IEEE Glob. Ph.D. degree in computer communication engi-
Telecommun. Conf. (GLOBECOM), Dec. 2011, pp. 1–5. neering from Nanyang Technological University,
[39] Network Simulator Tools NS3. Accessed: Oct. 1, 2017. [Online]. Avail- Singapore, in 2005. Upon graduation, he worked as a
able: https://www.nsnam.org/ Research Fellow under the Singapore–Massachusetts
[40] L. Cheng, B. E. Henty, D. D. Stancil, F. Bai, and P. Mudalige, Institute of Technology Alliance (SMA) Program at
“Mobile vehicle-to-vehicle narrow-band channel measurement and char- the National University of Singapore. Since Decem-
acterization of the 5.9 GHz dedicated short range communication ber 2007, he has been with the Department of
(DSRC) frequency band,” IEEE J. Sel. Areas Commun., vol. 25, no. 8, Electrical and Electronic Engineering, Auckland
pp. 1501–1516, Oct. 2007. University of Technology, New Zealand, where he is
currently an Associate Professor and a Leader of the
Wireless Innovations in Engineering Research Group. His research activities
span the fields of information and communication technologies, including
vehicular communications and networking.
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY JALANDAR. Downloaded on August 27,2021 at 08:20:46 UTC from IEEE Xplore. Restrictions apply.