Secure and Efficient Mechanism for quick transmission of Safety Critical Information in VANET

DOI : 10.17577/IJERTV2IS111108

Download Full-Text PDF Cite this Publication

Text Only Version

Secure and Efficient Mechanism for quick transmission of Safety Critical Information in VANET

Neethu C Sekhar Neenu R

Department of Computer Science,

Amal Jyothi College of Engineering, Kanjirapally, Kerala, India, November 19, 2013

Abstract

Vanet integrates components of Wi-Fi, Blue- tooth and other mobile connectivity protocols to facilitate data transfer betweencarsand between roadside equipment andautomobiletraffic. Imme- diate benefits of vanet are preventing accidents and avoiding traffic jam. If a car spots a danger- ous road situation, such as an accident, it trans- mits the information to cars behind it that might be heading in the direction of the danger. A ma- jor research area is how to control such disbursing of data and how to ensure safety delivery of such messages. It should not be transmitted to cars that are driving away from the danger or to cars on the other side of town. This is the kind of problem that need to be addressed when choos- ing the protocol that will be used. The protocol will need to invisibly ensure the necessary data is transmitted or disseminated with high probability and less delay. We are going to develop an algo- rithm that modifies an existing protocol, that is well suited for quick transmission of traffic alerts or congestions to every vehicle that passes through an emergency zone.

Index Terms: Active safety, contention, fairness, information dissemination, power control, vehicle- to-vehicle communication.

1 Introduction

Vehicular Ad-Hoc Networks (VANETS), being the real life application of wireless and mobile ad hoc networks. In VANETs (Vehicular Ad-hoc

NETworks), RSUs (Road Side Units) and vehi- cles disseminate safety and non safety messages.In VANET, each vehicle is equipped with the technol- ogy that allows the drivers to communicate with each other as well as with roadside infrastructure, e.g., base stations also known as Roadside Units (RSUs), located in some critical sections of the road, such as at every traffic light or any intersec- tion or any stop sign, in order to improve the driv- ing experience and making driving safer. By using those communication devices known as On-Board Units (OBUs),vehicles can communicate with each other as well as with RSUs. VANET is a self- organized network that connecting the vehicles and RSUs, and the RSUs can be connected to a backbone network, so that many other network ap- plications and services, including Internet access, can be provided to the vehicles.Vanet integrates components of Wi-Fi, Bluetooth and other mobile connectivity protocols to facilitate data transfer betweencarsand between roadside equipment an- dautomobiletraffic. Immediate benefits of vanet are preventing accidents and avoiding traffic jam.

When considering safety-related communica- tion, two types of messages can be identified: 1) periodic and 2) event driven. Periodic exchange of status messages that contain the vehicles position, speed, etc. (also called beacons) can be used by safety applications to detect potentially dangerous situations for the driver (e.g., a highway entrance with poor visibility).On the other hand, when an abnormal condition (e.g., an airbag explosion) or an imminent peril is detected by a vehicle, an

event-driven message (also called emergency mes- sage) is generated and disseminated through parts of the vehicular network with the highest prior- ity.To counter the issue of channel saturation, we proposed to make use of packet-level interference management based on per- packet transmit power control to give packets relative weights that con- trol the introduced interferences and, implicitly, the ability to capture packets.

In this paper, we analyze vehicle-to-vehicle com- munication from an active-safety perspective and identify the challenges and required strategies to improve performance through packet-level inter- ference management. With the proposed technol- ogy, i.e., the IEEE 802.11p, the load on the wire- less medium that results from periodic message exchange should carefully be controlled to prevent deterioration of the quality of reception of safety- related information. To this purpose,a distributed transmission power control strategy called dis- tributed fair power adjustment for vehicular envi- ronments (D-FPAV) that controls the beaconing load under a strict fairness criterion that has to be met for safety reasons. D-FPAV also allows a clear prioritization of event-driven over periodic messages. We then turn our attention to a fast and effective dissemination of event-driven emer- gency messages. We modifies a contention-based strategy called emergency message dissemination for vehicular environments (EMDV) that ensures a fast effective dissemination of alerts in a target geographical area in cooperation with D-FPAV, by incorporating ADEM algorithm. Finally, we eval- uate the performance of the protocols in a highway traffic scenario with the use of a significantly ex- tended version of the ns-2 [6] simulator.

The paper is organised as follows: Section II represents recent studies most relevant to this work. Section III formally defines the techniques used, i.e.,the basis of our strategy to maintain the beaconing load under control, i.e., D- FPAV, which is also formally proven to achieve fairness among sending vehicles,the EMDV method to quickly and effec- tively disseminate emergency information within a geographi- cal area using the proposed ADEM algorithm.Section IV defines details of pro- posed methodology and the proposed algorithm ADEM. Section V presents a proposed Implemen- tation Methodology and Section VI gives the con- clusion and remarks.

  1. Related Works

    The authors of [12] and [13] propose interesting schemes to disseminate the emergency information in a certain direction by making use of contention periods, i.e., after a message trans- mission, all re- ceivers wait for a certain time before forwarding the message. Briesmeister et al. [13] favor the retransmission of receivers located at farther dis- tances from the sender by the selection of shorter waiting times. Biswas et al. [12] select random waiting times and utilize an implicit acknowledg- ment scheme to cancel retransmissions from nodes closer to the danger (where the message origi- nated).

    Our proposal for information dissemination de- scribed in Section V makes use of the two latter principles (from [12] and [13]) and further comple- ments them with mechanisms that were aimed at reducing dissemination delay and improving relia- bility, particularly in high channel load conditions.

  2. Fair Congestion Control

    A distributed transmit power control method based on a strict fairness criterion, i.e., Distributed Fair Power Adjustment for Vehicular Environ- ments (D-FPAV), to control the load of periodic messages on the channel. Its assumed that two types of messages are used for traffic safety related communication:

    1. Periodic messages (beacons) that are sent by all vehicles to inform their neighbors about their current status (i.e., position) and

    2. event-driven messages that are sent whenever a hazard has been detected. D-FPAV also al- lows a clear prioritization of event-driven over periodic messages

    The benefits are twofold:

    • The bandwidth is made available for higher priority data like dissemination of warnings, and

    • Beacons from different vehicles are treated with equal rights, and therefore, the best pos- sible reception under the available bandwidth constraints is ensured.

      The fairness of the proposed approach is also proved.

      D-FPAV algorithm, which makes use of trans- mit power control to achieve the following design goals.

      1. Congestion control: Limit the load on the medium pro- duced by periodic beacon ex- change.

      2. Fairness: Maximize the minimum transmit power value over all transmission power lev- els assigned to nodes that form the vehicular network under Constraint 1.

      3. Prioritization: Give event-driven emergency messages higher priority compared to the pri- ority of periodic beacons.

      D-FPAV is based on the following factors:

      1. executing the FPAV algorithm at each node with the information gathered from received beacons;

      2. exchanging the locally computed transmit power control values among surrounding ve- hicles;

      3. selecting the minimum power level among the one locally computed and those computed by the surrounding vehicles.

      Figure 1: D-FPAV algorithm

      The D-FPAV algorithm is summarized in Fig.

      2. A node ui continuously collects information about the status (e.g., current position, velocity, and direction) of all the nodes within its CSM AX (i ) range. These nodes are the only ones that

      node ui can affect when sending its beacon. The communication range is typically smaller than the CS range; thus, a strategy based on multihop information propagation is needed to obtain the information from nodes outside the communi- cation range. Based on the status of all nodes within CSM AX range, node ui makes use of FPAV to compute the maximum common value Pi of the transmit power for all nodes in CSM AX (i ) such that the condition on the MBL is not violated (Step 1). Note that this computation is based only on local information (i.e., the status of all the nodes in CSM AX (i ), and it might globally be infeasible (i.e., it might violate the con- dition on the MBL at some node). To account for this case, node ui delivers the computed common power level Pi to all nodes in CSM AX (i ) (see Step 2a). Meanwhile, node ui collects the same information from the nodes uj such that ui CSM AX (j ) (see Step 2b). Knowing the power levels computed by the nodes in its vicinity, node ui can assign the final transmit power level, which is set to the minimum among the value Pi computed by the node itself and the values computed by nodes in the vicinity (see Step 3). Setting the final power level to the minimum possible level is necessary to guarantee the feasibility of the computed PA

      Figure 2: Relevant area for dissemination of emer- gency information

  3. Proposed Methodology

    1. Dissemination of Emergency In- formation

      A vehicle that detects a hazard issues an event- driven emergency message to warn the drivers that approach the danger. The originating node, ac- cording to the corresponding safety application, specifies the relevant area for dissemination of the

      alert (dissemination area). The alert must be dis- tributed in the complete area, i.e., up to the bor- der of the dissemination area , possibly via multi- hop transmissions, with high reliability and short delay. In this paper, we study the case where roads do not comprise any intersection (or highway entry/exit) and make the reasonable assumption that the communication range of an emergency message is larger than the roads width. The main purpose of dissemination strategy is to select the appropriate nodes to efficiently forward the mes- sage in the direction of dissemination to cover the entire dissemination area. The proposed strategy needs to overcome the different challenges that ex- ist in a vehicular environment, such as deal- ing with uncertainties that result from node mobility, fading phenomena, and packet collisions. Further- more, the wireless channel is also utilized for pe- riodic beacon exchange.

      Emergency Message Dissemination for Vehicu- lar Environments (EMDV) strategy for the dis- semination of safety-critical information is pro- posed. EMDV is based on the following three de- sign principles

      1. A contention scheme is used after the broad- cast transmission of the message to deal with uncertainties in terms of reception failure caused by node mobility, fading phenomena, and collisions.

      2. To minimize the delay, the contention strat- egy is complemented with the selection of one specific forwarder made at transmission time, referred to as the next hop. This step is pos- sible due to the status information acquired from safety beacons. The specific forwarder, in case of correct reception, immediately for- wards the message.

      3. The reliability of the dissemination process is increased by the following factors:

        • assuming a forwarding range shorter than the communication range

        • a controlled message retransmission scheme within the dissemination area.

          Fig.shows a sketch of a sender perspective, which must preselect a next hop among known nodes and then broadcast the message. The forwarding area, which is limited by the forward- ing range, identifies the area where potential

          Figure 3: Sender perspective when utilizing the EMDV protocol

          next forwarders can be located, i.e., both the preselected next hop and the group of nodes that will start the contention period upon the reception of the message. A forwarding range shorter than the communication range is selected to improve the efficiency of the process.To decide which node actually forwards the message, a contention period is started.To favor the speed of the process, each receiving node select a timeout value inversely proportional to the progressed distance in the direction of dissemination with respect to the actual sender. The node(s) whose timeout fires first will rebroadcast the packet. Nodes that stil wait for their timeout to fire land that receive a rebroadcasted packet will cancel their rebroadcast attempts. The advantages of using a contention-based approach for forwarding is that, compared to unicast-based forwarding, the probability that at least one node forwards the message is significantly increased. There is a chance for redundant (duplicate) rebroadcast, however,and when appropriately controlled, these duplicates increase robustness.EMDV works with the following algorithm(ADEM)

    2. ADEM Algorithm

      Procedure: PrepareMsg() Begin

      For any Msg do

      If no.of.Msg < maxMsg then Call FindNextHop() No.of.Msg = No.of.Msg + 1 PrepareContention(sent) End

      Procedure: FindNextHop() Begin

      If no neighbor in senders forwarding area then

      Set NextHop to broadcast address Return NextHop

      Else

      Set farthest neighbor in senders forwarding area to pre-selected NextHop

      End

      Procedure : SendMsg() Begin

      If d is the pre-selected NextHop in the forwarding area then

      Check connectivity of d with all vehicles in the forwarding area and direction of dissemination Calculate time required by any vehicle, a to reach destination area

      x < findtime(a,d)

      Calculate time required by source s to reach destination area

      y < findtime(s,d)

      If x > y then

      s forwards the packet else

      a forwards the packet End

      Procedure: ReceiveMsg() Begin

      If sendernode pre-selected NextHop then Begin

      PrepareMsg()

      If receivernodepos dissemination area then If sendernodepos forwarding area then no.of.msg = no.of.msg + 1

      else PrepareContention() End

      If no.of.Msgs >= maxMsgs then CancelContention()

      End

      Procedure: PrepareContention(sent) Begin

      Time = maxContentionTime + ChannelAc- cessTime

      Contend(time); End

      ADEM is composed of 5 main procedures. Pre- pareMsg() procedure is invoked by any node that transmits emergency message This procedure first checks whether the message has already been transmitted for the maximum number of times (maxMsgs) ie no.of.Msg < maxMsg ,If not, the

      FindNextHop() procedureis invoked . After trans- mitting the message, the message counter is in- creased, and inorder to verify at least one neigh- bor forwards the message, a contention period is started.

      The FindNextHop() procedure scans the neigh- bor table of the sender to check if there is any neighbor in the senders forwarding area with the highest progress in the direction of dissemination. If yes set the farthest neighbor as the NextHop. If no neighbor can be found in the dissemination direction or if the senders forwarding area is at the border of the dissemination area, NextHop is set to broadcastAddress.

      In SendMsg() procedure, check the connectivity of all vehicles in the forwarding area with the pre- selected NextHop d. Compare the time taken by source vehicle and any other vehicle to reach the destination, select the vehicle that takes less time.

      The ReceiveMsg() procedure is invoked when a node receives an emergency message and first make sure that the node lies inside the dissemina- tion area to proceed. Then, it is checked whether the received message has been sent by a node that is farther in the direction of dissemination and lies inside its own forwardingArea.If the receiving node is indicated as the intended forwarder in the NextHop field, then the message is forwarded with no contention by invoking the PrepareMsg() pro- cedure; otherwise, a contention period is started by invoking the PrepareContention() procedure To account for this case, the contention time is set to maxContentionTime + maxChannelAc- cessTime when flag = sent.

  1. Proposed Implementation Methodology

    The proposed implementation methodology evaluate the performance of the two proposed protocols, i.e., D-FPAV and EMDV using ADEM algorithm, with the use of the network simulator ns-2.28[6].

    Figure 4: xgraph showing bandwidth

    Figure 5: xgraph showing Performance

  2. Conclusion

To satisfy the requirements of active-safety com- munication in vehicular networks also under these stressed conditions, two communication strategies are proposed that can separately be used but show synergistic effects when combined.Synergy is gained when using both protocols together, be- cause D-FPAV can ensure that the channel load, in particular the channel busy time, is kept at a level where EMDV (or other dissemination pro- tocols) can successfully operate. The procedure described in this paper works in two phases.In the first phase A distributed transmission power con- trol strategy called Distributed Fair Power Ad- justment for Vehicular environments (D-FPAV) that controls the beaconing loadis described.D- FPAV also allows a clear prioritization of event- driven over periodic messages.Once messeges are prioritized,second phase is dissemination of those prioritized messages.For that,a contention-based strategy for fast and effective dissemination of event-driven emergency messages called Emer- gency Message Dissemination for Vehicular en- vironments (EMDV)is proposed.EMDV uses the proposed ADEM algorithm. EMDV ensures a fast

effective dissemination of alerts in a target geo- graphical area in cooperation with D-FPAV.The proposed suite of protocols provides a comprehen- sive solution for active-safety communications in IEEE 802.11-based vehicular networks.

The performance of the proposed protocols has been analyzed via simulator ns2.28.The protocol proposed in this paper can be extended to dissem- inate the emergency message in two opposite di- rections and to support road junctions, e.g., with smart strategies such as those proposed in [17] or with the use of digital maps, which is left to our future work.

References

  1. Pratibha Tomar, Brijesh Kumar Chaurasia and G. S. Tomar, State of the Art of Data Dissemination in VANETs Interna- tional Journal of Computer Theory and En- gineering Vol.2, No.6, December, 2010.

  2. Marc Torrent-Moreno, Jens Mittag, Paolo Santi,Vehicle-to-Vehicle Communication: Fair Transmit Power Control for Safety- Critical Information,ACM IEEE Trans- actions on Vehicular Technology September 2010

  3. M. Bilal, P.M.L. Chan and P. Pillai,A Fastest Multi-Hop Routing Scheme for Information Dissemination in Vehicular Communication Systems,IEEE,Proceedings of the 18th Inter- national Conference on Advanced Information Networking and Application (AINA04), 2004.

  4. Giovanni Resta, Paolo Santi, Janos Si- mon,Analysis of Multi-Hop Emergency Mes- sage Propagation in Vehicular Ad Hoc Net- works, Proceedings 8th ACM international symposium on Mobile ad hoc networking and computing pp,140-149, 2007

  5. Brij Bihari Dubey , Naveen Chauhan

    , Prashant Kumar, A Survey on Data Dissemination Techniques used in VANETsInternational Journal of Computer Applications (0975 8887) Volume 10 No.7,

    November 2010

  6. Network Simulator ns-2, http :

    //wwww.isi.edu/nsnam/ns/

  7. M.Raya and J.Hubaux,The security of Vanet ad hoc networks Proc,3rd ACM Workshop SASN,Alexandria, VA,Nov 2005,pp 11-21

  8. T. Little and A. Agarwal, An informa- tion propagation scheme for VANETs, in Proc. Int. IEEE ITSC, Vienna, Austria, Sep. 2005,pp. 155160.

  9. L. Wischhof, A. Ebner, and H. Rohling,Information dissemination in self-organizing intervehicle networks,IEEE Trans. Intell. Transp. Syst., vol. 6, no. 1, pp. 90101, Mar. 2005

  10. T. Nadeem, P. Shankar, and L. Iftode, A comparative study of data dissemination mod- els for VANETs, in Proc. 3rd Annu. Int. Conf. MOBIQUITOUS, San Jose, CA, Jul. 2006, pp. 110.

  11. M. Durresi, A. Durresi, and L. Barolli, Emergency broadcast protocol for intervehi- cle communications, in Proc. 11th ICPADS, Fukuoka, Japan,Jul. 2005, vol. 2, pp. 402406.

  12. S. Biswas, R. Tatchikou, and F. Dion,Vehicle-to-vehicle wireless commu- nication protocols for enhancing highway traffic safety IEEE Commun. Mag., vol. 44, no. 1, pp. 7482, Jan. 2006.

  13. L. Briesemeister, L. Schfers, and G. Hommel, Disseminating messages among highly mobile hosts based on intervehicle communication, in Proc. IEEE IVS, Dearborn, MI, Oct. 2000, pp. 522527.

  14. M. Torrent-Moreno, P. Santi, and H. Harten- stein, Fair sharing of band-width in VANET, in Proc. 2nd ACM Int. Workshop VANET, Cologne,Germany, Sep. 2005, pp. 4958.

  15. M. Torrent-Moreno, P. Santi, and H. Harten- stein, Distributed fair transmit power assign- ment for vehicular ad hoc networks, inProc. 3rd Annu.IEEE Conf. Sens., Mesh Ad Hoc Commun. Netw. SECON, Reston, VA,Sep. 2006, vol. 2, pp. 479488.

  16. J. Mittag, F. Schmidt-Eisenlohr, M. Killat,

    J. Hrri, and H. Hartenstein,Analysis and de- sign of effective and low-overhead transmission power control for VANETs, in Proc. 5th ACM Int. Workshop VANET, 2008, pp. 3948.

  17. C. Lochert, M. Mauve, H. Fler, and H. Hartenstein, Geographic routing in city sce- narios, ACM SIGMOBILE Mob. Comput. Commun. Rev., vol. 9, no. 1, pp. 6972, Jan. 2005.

  18. M. Sun, W. Feng, T. Lai, K. Yamada, and H. Okada, GPS-based message broadcasting for intervehicle communication, in Proc. ICPP, Toronto, ON, Canada, Aug. 2000, pp. 279286.

  19. H. Wu, R. Fujimoto, R. Guensler, and M. Hunter, MDDV: A mobility- centric data dis- semination algorithm for vehicular networks, in Proc. 1st ACM Int. Workshop VANET, Philadelphia, PA Oct. 2004, pp. 4756.

  20. W. Li, H. Zhang, and T. Gulliver, Error probability for maximal ratio combining on correlated Nakagami fading channels, in Proc. 60th IEEE VTCFall, Los Angeles, CA, Sep. 2004, vol. 3, pp. 17861790.

Leave a Reply