Next Article in Journal
Future Wireless Communication Technology towards 6G IoT: An Application-Based Analysis of IoT in Real-Time Location Monitoring of Employees Inside Underground Mines by Using BLE
Next Article in Special Issue
Towards a Security Reference Architecture for NFV
Previous Article in Journal
Electrocardiogram Biometrics Using Transformer’s Self-Attention Mechanism for Sequence Pair Feature Extractor and Flexible Enrollment Scope Identification
Previous Article in Special Issue
Real-Time Adaptive Modulation Schemes for Underwater Acoustic OFDM Communication
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Compacted Area with Effective Links (CAEL) for Data Dissemination in VANETs

Department of Computer Science and Information Technology, NED University of Engineering and Technology, Karachi 75270, Pakistan
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(9), 3448; https://doi.org/10.3390/s22093448
Submission received: 7 April 2022 / Revised: 25 April 2022 / Accepted: 27 April 2022 / Published: 30 April 2022
(This article belongs to the Special Issue Smart Systems for Wireless Communications and Networks)

Abstract

:
Vehicular ad hoc network (VANET) is a specialized form of wireless network that is solely intended for collaboration between vehicles. Several studies have shown that standard routing protocols cannot be implemented in VANETs because of their unique characteristics such as their significant count of vehicles on the network and the rapid evolution of the network’s design. Because VANET communication links are broken very frequently, it is necessary to address the routing consistency of these highly dynamic networks. The transmission of VANET data may result in a substantial amount of overhead in the routing process; thus, it is vital to address the issue of overhead to enhance the overall network performance. The proposed protocol named compacted area with effective links (CAEL) is designed to focus on decreasing overhead to achieve an enhancement in PDR performance inside the network. The communication between selected nodes that have been judged to be dependable in terms of geographical location and appropriate existing links between vehicles is focused on achieving this goal. With the inclusion of the reliability factor, it is possible to complete the important step of removing extraneous nodes, with the selection of the trustworthy nodes being made based on the link expiration time during the whole routing procedure. When compared to our previously published protocols, i.e., Dynamic Trilateral Enrollment (DyTE) and Reliable Group of Vehicles (RGoV), the results of the simulations demonstrate that CAEL has achieved an overall improvement in the performance of the network.

1. Introduction

Many people across the world are killed or injured every day due to traffic accidents [1]. These deaths and injuries could potentially be avoided if VANETs are used. Intelligent Transportation Systems (ITS) applications can benefit greatly from VANET’s support capabilities, which is why academics and researchers are interested in it [2,3,4,5]. VANETs are a cost effective means of providing communication amongst vehicles. Each vehicle on the road will be equipped with a wireless communication capability to facilitate the interconnection of wireless networks. A vehicle can receive or forward messages from nearby vehicles linked to the same network even if no supporting infrastructure is present. As a result, drivers will be able to keep track of changes in traffic conditions and other travel-related information as they are made accessible. VANETs have certain advantages in comparison to mobile ad hoc networks (MANETs), including enhanced computational power, increased transmission power, and a degree of projected mobility. The performance and quality of VANET generates major technical issues in existing systems which must be monitored to efficiently organize these types of connections. Frequent changes in network topology as well as the increased mobility of the network topology are likely to be the most difficult problems to solve [6]. When cars change their data rates or tracks in VANETs, the topology of the network also changes. Normally, the aforementioned modifications are not planned ahead of time and are entirely dependent on the road conditions and the actions of the drivers. VANET communication requires a routing mechanism that is both dependable and accurate in representing the topological needs of the network’s nodes, and development of such routing a mechanism is the major purpose of this research. Given that cars are driven at high speed on roads, disruptions in terms of data distribution facilities as a result of frequent interruptions in the connection are likely.
VANET’s architecture can be categorized as seen in Figure 1:
  • “Vehicle-to-Vehicle (V-2-V)”: The vehicles may directly communicate with other vehicles [7].
  • “Vehicle-to-Infrastructure (V-2-I)”: The local networks and cellular base towers make it possible for vehicles to communicate with one another at different geological locations.
  • “Infrastructure-to-Infrastructure (I-2-I)”: In addition to information being sent between many and distant sites, communication may take place among peer-to-peer infrastructures [8].
There is a cost associated with the implementation of vehicular communication systems. Primarily, hardware and software equipment, i.e., the vehicles must be equipped with an onboard unit (OBU) to support wireless communication and a sufficient amount of processing capability to process the information received from other nodes. VANET also require a proper capacity for storage, so that the data can be stored and processed before transmitting for wireless communication. The roadside units (RSU) must be upgraded to support intercommunication between vehicles on the road to enable the exchange of information related to road safety and infotainment.
VANET is different from traditional networks due to the absence of a centralized administrative authority that defines the rules for communication. This indicates that the node may act as a server and a client at the same time to share the information with other nodes. The following are some of the qualities of VANETs that make it more appealing:
  • Vehicles in VANET have a tremendous amount of power and storage.
  • Vehicles have an unlimited source of power, and their capacity to compute for the purposes of sensing and communicating is well supported.
  • Vehicle mobility can be predicted using velocity and coordinate information because of the presence of roadways.
The routing method for VANETs offers a substantial challenge because of the unique properties that must be addressed before these networks can be implemented. The data packets will be sent from the source to target node using the available intermediate vehicles. A high density of vehicles is not the only issue to address in the routing process, whereas crossing and traffic lights may generate a rupture in the network. In VANETs, routing protocol properties such as mobility restrictions and limited road patterns can be utilized using the Global Positioning System (GPS) coordinates and city maps to design an effective routing protocol.
The protocol proposed in the present study is an advancement of our previously published protocols, i.e., Reliable group of Vehicles(RGoV) [9] and Dynamic Trilateral Enrollment (DyTE) [10] through which the most reliable network pathways are taken into consideration while establishing a route.
The proposed protocol Compacted Area with Effective Links (CAEL) also uses the concept of minimizing the communication region as applied in DyTE and RGoV protocols. However, at the same time, CAEL calculates the expiration time for every connected link between the nodes to enhance the packet delivery rate (PDR) and reduce the routing overhead while keeping the latency time intact (if not minimized as compared to our previously published protocols). DyTE is based on minimizing the communication region of a node, only due to which the packet delivery performance increases; however, if the nodes get out of the minimized zone very quickly due to its high speed, then the performance of DyTE is affected—whereas RGoV first uses the suppression of the communication zone and then creates multiple clusters and each cluster contains a group of vehicles and selects only one cluster which is relatively closer to the destination vehicle. The shortcoming of RGoV lies in the selection process of a cluster group of vehicles that affects the network performance when it selects that cluster which is having few vehicles.
The remainder of this article is organized as follows: Section 2 contains a description of related work; Section 3 provides extensive information of the reliability model related to VANETs. The proposed routing method CAEL is discussed in Section 4; the performance of the proposed protocol CAEL is thoroughly evaluated as outlined in Section 5. Finally, Section 6 brings the paper to a conclusion.

2. Related Work

In VANET, the connection stability is a critical component to consider when creating a routing system. When developing routing algorithms, there are a variety of approaches that may be used to incorporate GPS coordinates and the route expiration time (RET) [11,12] to obtain the enhanced performance. An overview of the routing protocols is given where different techniques are applied to enhance the routing protocol’s efficiency. For the purpose of improving the quality of service (QoS), researchers devised a unique clustering-based technique [13] in which, instead of broadcasting the route request (RREQ) message to all cars, the algorithm is fitted with a clustering mechanism and the RREQ message is only communicated to the cluster head (CH). As a result, the CHs will be responsible for spreading routing information among the cluster participants. The route replay (RREP) message is transmitted to vehicles if a route is available; otherwise, the CH will send the RREQ message. It was projected that there would be less congestion and network overload as well as fewer connection failures because of this reduction in RREQ messages.
In order to establish the link with the most stable path, the authors of [14] proposed a routing protocol that integrates the direction and prediction of the path duration into the ad hoc on-demand distance vector (AODV) [15] protocol. The position of all vehicles is used to group them, and the route is chosen depending on the duration of the link. The authors did not account for the possibility of not having a sufficient number of nodes participating in a particular direction during the route finding process.
The authors [16] presented an improved QoS-based routing system that was dependent on the length of time a link has been in operation as well as the error rate experienced over the link. By synthesizing the network’s temporal, geographical, and environmental interactions, the article models and quantifies the robustness of links and routes, as well as their resilience to failure. In addition, a route selection method was provided on the basis of this information. The experiments conducted in this study showed that the ideal setting of the maximum routing hop count has not been taken into account throughout the routing process to date.
In [17], the authors proposed a QoS-based routing protocol that depends on the hop count, link duration, and connectivity, in order to deal with the dynamic topology and maintain the algorithm’s balance between stability and efficiency. However, the use of only global distance to represent the cumulative QoS of a routing path is insufficient.
The authors [18] proposed a routing protocol that makes use of software-defined network (SDN) and reinforcement learning to sense environmental data such as vehicle density and speed, and built the Q-learning-based cognitive routing algorithm to adopt alternative routing strategies depending on the environment.
The lifespan of a link was predicted using mobility and location data by the authors [19]. All node clocks are presumed to be synchronized using GPS. For instance, if two mobile nodes know their speed, direction, and position, then it is possible to predict the link’s lifespan. LET is calculated at each hop so that the time of the entire journey may be easily computed.
The authors in [20] proposed a new clustering technique to obtain a reliable low-latency multi-path routing scheme by incorporating the ant colony optimization (ACO) technique. However, even though the latency and RREQ messages are decreased, the technique does not determine the most stable path and does not take into account velocity fluctuations during direct engagement between the vehicles.
The authors of [10] devised a mechanism to focus on limiting the area of communication between the node. They created a trilateral zone which was is beneficial because it minimizes the participation of unnecessary nodes in the communication process. Since it only focuses on limiting the communication process, therefore, the nodes with high density can quickly go out of the trilateral zone and that drastically affects the performance of the network.
In another study, the authors [21] attained minimization in route disconnections. This was achieved because of the inclusion of a reliability factor and a route expiry period that takes hop counts into account. In order to discover the optimum communication routes, the most reliable paths between the source and the target are selected, whereas the authors in [22] achieved path reliability for data forwarding by identifying multiple roads at intersections.
A group of researchers [23] devised a protocol that determines the stability of a route based on the intensity of the signal being transmitted. In this protocol, the forwarding node adds the estimated intensity of the signal to the RREQ packets before sending them on to the next node. The only way to assess the overall signal strength of a route is to take the weakest signal strength of each of its individual connections. The response is sent back to the source node by the destination node, which chooses the path with the strongest predicted signal strength.
In [9], researchers have also reported that the following two techniques were combined to achieve the improved performance of the network: in the first technique, the area of communication is kept as small as possible in order to reduce unnecessary request traffic; in second technique, clusters of nodes were created based on their proximity to the centers of those clusters. At the end, whichever cluster was closest to the destination was selected for the communication. The problem arises when such a cluster is selected that has a very low number of nodes associated with it, and therefore the communication becomes disturbed when the node becomes unreachable. Furthermore, other important factors of a node such as speed and direction are neglected while making the cluster groups.
In an ad hoc network, a topology is used to create a temporary network and that topology is nothing more than a mix of mobile nodes and wireless networks [24]. In addition, it does not require any centralized management. The VANET is a cutting-edge technology that connects the automobiles of a new generation with the help of wireless networks [25]. It has the significance of research because of its potential to revolutionize the transportation system through the application of ITS [26]. With this technology, vehicles will be able to link to each other effectively [27] to make the transportation system more reliable. The creation of the VANET was motivated by the need to transmit information between cars on the road to avert accidents, hence increasing the overall safety of vehicles and drivers. Depending on the needs, all sensor data may be examined on the driver’s dashboard, sent to the RSU, or even broadcasted to nearby vehicles. Aside from providing road safety information, a wide variety of other uses for vehicular networks are listed, including gaming-related applications, traveling-related applications, multimedia-related applications, and access to the internet.

3. Reliability Model

The speed of vehicles on the road makes it difficult to maintain a reliable routing strategy in VANETs due to dynamic factors such as vehicle distribution and mobility patterns [28]. Therefore, to predict the duration of a steady route between vehicles, the vehicular characteristics must be determined which are discussed in the following sections.

3.1. Traffic Flow Foundation

There are two models used for traffic stream evaluation [29]. The first approach (known as the macroscopic approach) is based on a physical stream of traffic flow to describe traffic dynamics with the help of partial differential equations. The following correlations illustrate these aspects [30]:
d m = 1000 ( l m × p v e h ) p v e h
T m = d m v m
q m = 1 T m
where:
  • p v e h : Traffic density;
  • d m : average distance between vehicles;
  • v m : average velocity;
  • T m : average time gap;
  • q m : average traffic stream;
  • l m : average vehicle length.
However, the other approach (microscopic approach) defines the vehicle behavior such as the change of lane, speeding up or down on the road. The connectivity of the network is assessed in the next step by analyzing the diversity of velocity instead of the vehicular flow of traffic. Vehicle speed is the most important factor in determining network topology dynamics. It also plays a significant role in determining the maximum communication time between two vehicles.

3.2. Reliability Framework

It may be summed up as the likelihood that two vehicles will be able to continuously communicate for a specified amount of time. The link between any two vehicles at given time has an availability interval of T p ; then, following relation is used to explain the term reliability:
r ( l ) = P { A v a i l a b i l i t y u n t i l ( t + T p ) | a v a i l a b l e a t t }
The calculations of the connection’s reliability requires the vehicles’ speed to be in standard distribution [31]. In this case, G ( v ) would be the probability distribution and g ( v ) would be the probability density function:
g ( v ) = 1 σ 2 π e ( v μ ) 2 2 σ 2
G ( v V 0 ) = 1 σ 2 π 0 V 0 e ( v μ ) 2 2 σ 2 d v
where μ and σ 2 depicts the average and variance of velocity, respectively, [32]. The relative velocity Δ v and the time duration T is utilized to calculate the distance. Because the two arbitrary variables v 1 and v 2 are normally distributed, the difference between those two will be normally distributed as well. The greatest distance upon which two vehicles may still communicate is 2 H , while each vehicle’s communication range is given as H. The following equation may be used to compute the probability density function for the communication duration T:
f ( T ) = 4 H σ Δ v 2 π × T 2 e ( 2 H T μ Δ v ) 2 2 σ Δ v 2 f o r T 0
where μ Δ v and σ Δ v 2 depict the average and variance of relative velocity, respectively. Each vehicle should be fitted with a GPS device that can provide the speed, direction, and position information. Equation (8) provides a mathematical representation of the specific link’s continuity between two vehicles:
T p = H L i j v i j = H E u c l i d e a n d i s t v i v j
Euclidean distance formula is used to calculate the distance between vehicle i and j. The function f ( T ) can be integrated from time t to t + T p to calculate the possibility of a connection, reachable at t for a duration of T p . The following Equation (9) can be used to determine the reliability of a link at a specific point in time:
r t ( l ) = t t + T p f ( T ) d t if T p > 0 0 otherwise
The Gauss error function can be used to derive the integral in Equation (9) [33],
r t ( l ) = E r f ( 2 H t μ Δ v ) σ Δ v 2 E r f ( 2 H t + T p μ Δ v ) σ Δ v 2 w h e n T p > 0
where Erf stands for;
E r f ( T ) = 2 π 0 T e t 2 d t , < T < +

3.3. Route Reliability

Multiple possible routes exist between the origin and the destination node in VANETs, whereas all routes are a set of connected links. The number of connections that have been formed is shown as δ : l 1 = ( s , n 1 ) , l 2 = ( n 1 , n 2 ) , , l δ = ( n δ , d ) on any particular route by keeping the generality intact. Every single link l c ( c = 1 , 2 , , δ ) is represented by r t ( l c ) , whereas Equation (12) interprets the reliability of a link for a particular route X.
R ( X ( s , d ) ) = c = 1 δ r t ( l c ) , w h e r e l c X ( s , d )
The multiple reliability product over the existing links for any route is used to classify the route’s reliability. Assume that there are Ω numbers of routes between the source and the target node. The source node will choose the best possible route, i.e., Q ( s , d ) = X 1 , X 2 , , X Ω amongst them, using the relation represented in Equation (13).
a r g m a x X Q ( s , d ) R ( X )

4. Proposed Protocol

The proposed protocol CAEL is based on two mechanisms that work together, i.e., the suppression of the communication region and expiration details of the links to improve the performance. Therefore, the information about the process of creating a trilateral region and the mechanism is mentioned for the identification of any node whether it lies inside or outside the said zone is discussed and then the mechanism of RF, RET and LET is also explained.

4.1. Trilateral Region’s Construction

As mentioned in Figure 2, the communication region of node S is circular in shape, as the goal is to construct a trilateral region (highlighted as grey colored) so that only a limited number of reliable nodes may participate in the communication process. It is presumed that vehicles have an on-board navigation system. Each vehicle is considered to have GPS receivers and preloaded street maps. GPS receivers identify the location and direction, which is helpful for nodes in calculating vehicle density. The trilateral zone, A E F , must be constructed to limit the communication area (as illustrated in Figure 3). The last known coordinate information of the target node is utilized by the source node to compute the slope and the distance between them using Equations (14) and (15), respectively.
m s t r a i g h t = Δ y Δ x = y D y S x D x S
E u c l i d e a n d i s t = ( Δ y ) 2 + ( Δ x ) 2
Then, we can determine the coordinate information of the perpendicular points C and D by solving Equation (15) with Equation (16).
m p e r p e n d i c u l a r = 1 m s t r a i g h t
After calculating the perpendicular slope, we must use the Euclidean distance formula to obtain the distance between B C ¯ and B D ¯ . We may also obtain the coordinates of E by finding the slope of straight-line A C ¯ because that straight-line connects all three points; therefore, lines A C ¯ and C E ¯ have identical slopes. Similarly, we can calculate point A, D, and F as they are located on a straight-line by using the slope of line A D ¯ .

4.2. Members Identification Mechanism in Trilateral Region

The receiving node must be in the trilateral zone of the transmitting node to participate in the routing procedure. The sender node adds the list of neighbors that lies within its calculated trilateral region by computing the area of the triangle, A E F , as illustrated in Figure 4. The area of A E F is calculated using the Equation (17).
A r e a ( A E F ) = | y E ( x A x F ) y F ( x A x E ) y A ( x E x F ) 2 |
There are two possibilities shown in Figure 4 about the position of a random node T which lies inside and outside, respectively. The node T will be allowed to participate in the communication process if it lies inside the trilateral region or else it will be dropped. Equation (18) is used to determine whether a node is located inside or outside the trilateral region.
A r e a ( A E F ) = A r e a ( A E T + A F T + E F T )

4.3. Link Expiration

At this stage, the proposed protocol CAEL uses the GPS coordinates of the source and the destination node through which a limited area (in a triangular shape) is calculated, after this calculation, all the neighbor nodes will be identified inside the (limited) region. As a result, the list of neighbor nodes is created and link expiration time (LET) of each node in the list is also calculated. After this, the average of all nodes LET is calculated. Then, the list of nodes is further shrunken by comparing each LET of the node by the average LET (which has already been calculated). If the node’s LET is less than the average LET of the list, then that node is subtracted and only those nodes will be placed intact in the list whose LET is greater than the average of all LET nodes.
i f ( L E T n o d e L E T a v g . ) 0
The proposed protocol is different from our previously published protocols (DyTE) because it does not only rely on a limited zone but also does not use a clustering technique as RGoV. The link expiration in CAEL helps in the identification of the time duration for which the links would be available. The proposed protocol CAEL makes use of the node’s speed and direction to calculate the effective routes for the communications.
To understand how the reliability factor is calculated and which parameters are required for it, the details are as follows; the reliability factor (RF) is a technique to determine the most reliable route which considers the “Route Expiration Time (RET)” and “Hop Count (HC)” while choosing a routing path. The selection of a reliable route is based on the RF value; and a greater value of RF indicates higher route reliability than is appropriate for the transfer of data packets.

4.3.1. RF

When it comes to transmitting data from source to destination, RF selects the route with the shortest R E T and the least count of hops to obtain the most reliable path [34]. R F is essentially a discrepancy between the normalized values of R E T and H C which can be computed using Equation (20).
R F = R E T R E T m a x H C H C m a x
The calculation of R F requires the estimations of multiple necessary parameters such as R E T , H C , R E T m a x and H C m a x ; these important parameters and the method to calculate the R F are subsequently discussed.

4.3.2. RET

R E T specifies the minimum duration amongst all connections between the source and target node, whereas L E T specifies the estimated duration for which the connection between any two nodes stays active [35]. A route with a higher R E T is a considered a more dependable route. Figure 5 illustrates two nodes [36], i.e., where node N 1 has ( x N 1 , y N 1 ) coordinates along with the velocity v N 1 which moves at an angle θ N 1 whereas node N 2 have ( x N 2 , y N 2 ) coordinates along with the velocity v N 2 which moves at an angle θ N 2 . Furthermore, both nodes have same the communication range R. Then, the L E T between two nodes can be calculated using Equation (21).
L E T = ( ( α × β ) + ( γ × λ ) ) + ( α 2 + γ 2 ) × R 2 ( ( α × λ ) + ( γ × β ) ) 2 α 2 + γ 2
where,
  • α = v N 1 × c o s θ N 1 v N 2 × c o s θ N 2
  • β = x N 1 x N 2
  • γ = v N 1 × s i n θ N 1 v N 2 × s i n θ N 2
  • λ = y N 1 y N 2
The RET is actually the lowest LET of all possible network links, determined using Equation (22).
R E T = m i n ( L E T 1 , L E T 2 , L E T 3 , , L E T n )

4.3.3. R E T m a x

R E T m a x is the highest value of R E T across all possible routes at the destination (which can be calculated using Equation (23)). As explained earlier, the L E T between any two nodes can be acquired using Equation (21) and the minimum L E T in the possible route tagged as the R E T of that route. As depicted in Figure 6, multiple possible routes are available if node A aims to send data to node H. The connection between any two nodes signifies the L E T of both nodes, for example, the L E T between node A and node B is equal to 50.
R E T m a x = m a x ( R E T R o u t e 1 , R E T R o u t e 2 , , R E T R o u t e N )
Since R E T R o u t e 1 = 30 , R E T R o u t e 2 = 20 & R E T R o u t e 3 = 25
Therefore
R E T m a x = m a x ( R E T R o u t e 1 , R E T R o u t e 2 , R E T R o u t e 3 )
R E T m a x = m a x ( 30 , 20 , 25 )
R E T m a x = 30
Figure 7 summarizes Figure 6 for a better understanding of R E T m a x .

4.3.4. H C m a x

H C reflects the total number of hops it takes to go from one to another whereas H C m a x specifies the highest number count of hops from all possible routes between the source node and the target node (as mentioned in Figure 6):
H C m a x = m a x ( H C R o u t e 1 , H C R o u t e 2 , , H C R o u t e N )
Since H C R o u t e 1 = 3 , H C R o u t e 2 = 2 & H C R o u t e 3 = 4
Therefore
H C m a x = m a x ( H C R o u t e 1 , H C R o u t e 2 , H C R o u t e 3 )
H C m a x = m a x ( 3 , 2 , 4 )
H C m a x = 4

4.4. Route Discovery

The proposed protocol (CAEL) initiates the route discovery phase when node A sends an RREQ packet to all nearby nodes to send data packets to node H but does not have routing information for that specific node inside the trilateral zone. The node analyzes its routing table when it receives an RREQ packet to identify the reverse route to the source node. If a route to the source node already exists in the routing table, it is updated; otherwise, a reverse route is created. To find the shortest route to reach the target node, the receiving node first calculates LETs between RREQ sending nodes and its current node, and then selects the shortest one between the current node and its source node. After that, it increases the value of the hop count and transmits the RREQ packet to neighbor nodes. Intermediary nodes may receive several copies of the same RREQ message from different surrounding nodes, but it just drops the request. Intermediary nodes produce RREP messages if any of them have an active route to the target node, and it selects the most reliable route if any of the intermediate nodes are targets themselves.

4.5. Route Selection

When the very first RREQ packet is received at the target node H within the trilateral zone, a timer is started that waits for a specified amount of time. During this time, the target node begins the collection of all other RREQ packets that attempt to reach it. When the timeout event occurs, the target node computes the RF value for each path gathered from the source to the target and chooses the routing path with the highest value of RF.
To understand how CAEL’s route selection process works, consider the network design shown in Figure 6 where multiple paths are available to reach from the source to the target node. The calculation of the best possible RF is shown in Figure 7 and it can be observed that R F R o u t e 1 has the highest calculated RF value among all other viable routes. Therefore, Route#1 will be selected for the data transfer.

5. Settings for Performance Assessment

This section examines the effect on the performance of RGoV [9], DyTE [10], COOP [37], NCA(MPR) [38], CACA [39], and CAEL at various network densities. The network density has been demonstrated by deploying up to 300 nodes over an area of 2500 m × 2000 m. Every individual node in the network may travel at a maximum speed of 50 km per hour. Between random source–destination connections, a maximum of 100 connections are established with the packet 512 bytes in size.
The IEEE 802.11p standard is widely used for wireless connectivity in vehicular communication. IEEE 802.11p is considered the cross-layer standard for Physical Layer/Medium Access Control (PHY/MAC), incorporating orthogonal frequency-division multiple access (OFDMA) and a frequency spectrum specified for vehicular communication of 5.9 GHz. Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) is the foundation of the IEEE 802.11p MAC. A node initially senses the channel before transmission, and during the transmission process, the node and channel become inactive for a short period of time. The transmission only resumes when the channel is idle. If the wireless channel is busy, an arbitrary back-off mechanism is implemented with a contention window (CW) and only starts to transmit at the lapse of the back-off timer.
The performance of the proposed protocol is evaluated and compared with existing routing protocols using the NS-2 simulator, because it is an open source simulator designed specifically for research in computer communication networks based on discrete events [40] and object-oriented simulations. Since its inception, NS-2 has piqued the interest of industry, academia, and the government. It has been under constant investigation and enhancement for years. In fact, the NS-2 simulator was used in recent research [39,41,42,43,44,45,46]. NS-2 contains modules for numerous network components, such as routing, transport layer protocols (TCP and UDP), and applications; therefore, the researchers can simply use the scripting language to configure a network and observe the results generated by NS-2 to investigate network performance.
A realistic urban scenario is designed using the tool called the Simulation of Urban Mobility (SUMO) [47]. SUMO also delivers the most frequently used information regarding the traffic conditions via the use of road directions, edges information, and vehicle speed. Additionally, SUMO generates the mobility trace file that defines the wireless mobile network, which consists of various randomly distributed nodes that follow the road’s behavior. Furthermore, a piece of map is extracted using the OpenStreetMap (OSM) [48] containing a portion of the city Karachi (Pakistan), which is converted using SUMO [49] to implement the vehicular traffic scenario.
In each result (discussed in Section 5.1.1, Section 5.1.2 and Section 5.1.3), the x axis represents the variation in node density whereas the y axis represents the performance metric. The summary of the simulation settings and its parameters is given in Table 1.

5.1. Performance Metrics

The following metrics are used to evaluate the proposed routing protocol’s performance:
  • Packet delivery ratio (PDR): The ratio of packets that are transmitted from the source to the destination.
  • Routing overhead: This is defined as the additional number of routing packets sent across all nodes to reach the destination. A lower count of overhead packets indicates better performance.
  • Average end-to-end (E2E) delay: This indicates the average time interval between packet transmission and reception.

5.1.1. PDR

The impact of network density on the PDR performance of the protocols COOP, NCA(MPR), CACA, DyTE, RGoV, and CAEL is depicted in Figure 8. Due to the nature of wireless communication where no centralized administration is present, the higher the number of nodes, then the higher the number of route requests which is generated to reach the destination, causing network congestion. It can be observed in Figure 8 that when the number of nodes is low in density, the PDR achieved by every protocol is generally higher, and when the number of nodes starts getting higher, the PDR is drastically decreased. On the other hand, the proposed protocol CAEL delivers a 3.5% and 17% improved packet delivery ratio than RGoV and DyTE, respectively, and its performance becomes improved and stable, especially in dense networks. Because other protocols such as DyTE suppress the communication zone (only) and protocols such as COOP, NCA(MPR), CACA, and RGoV work on the principle of clusters, CAEL chooses the most dependable routes to minimize connection failures. While DyTE and RGoV both choose the shortest route between sources and destinations without regard for node speed or direction, the proposed protocol (CAEL) chooses the most reliable and efficient routing path by taking the node’s speed and direction into account and eventually increasing the data packet delivery. In addition, CAEL also considers the important factor of link expiration time while finding effective routes.

5.1.2. Overhead

The routing overhead of COOP, NCA(MPR), CACA, DyTE, RGoV, and CAEL is presented against different network densities in Figure 9 with nodes deployed in a 2500 m × 2000 m topological region. As the number of nodes rose, so did the routing burden. As seen in Figure 9, the CAEL’s network routing load is 16% less than that of RGoV and 50% less than the rest of the other mentioned protocols, especially in dense networks, because CAEL’s adoption of a dependable route resulted in a reduction in route disconnections. The reduced chances of route failures result in a decrease in the commencement of route rediscovery and maintenance procedures, and therefore CAEL’s reliable approach has a lower network routing burden than other aforementioned protocols.

5.1.3. E2E

The average E2E latency is depicted in Figure 10 for various node counts. Since the proposed protocol is based on the compaction of the communication region, when the node density is low, the number of nodes participating therefore also becomes very limited and even no node participates in the communication process, which leads to an increase the latency time. It can be seen that with the rise in nodes count, the E2E latency for all protocols increased but due to the dependable route selection, the CAEL took roughly the same amount of time on average to transport the data packet as the RGoV and DyTE. In contrast, CAEL easily outperformed the remaining COOP, NCA(MPR), and CACA protocol because CAEL works on the principle of minimizing the communication region of a node and also selects the best route based on the availability of the link before its expiration.
COOP, NCA (MPR), and CACA are solely based on improving the MPR selection to reduce the network overhead, whereas DyTE and RGoV control overhead packets using the time and distance information of the nodes, and RGoV also adds a clustering technique on top of that to improve the performance by adding a reliability factor. The proposed protocol (CAEL), on the other hand, not only minimizes the communication region but also checks the link expiration of each connected route to determine the best possible way to reach the destination. The results show that the overall performance of CAEL is far more effective than that of COOP, NCA (MPR), CACA, DyTE, and RGoV.
It is observed from the results that the performance of the proposed protocol is superior to the other mentioned protocols, but in some scenarios, the performance of CAEL may deteriorate and affect the computation performance. Those multiple scenarios are when very few nodes are identified in the trilateral region and those nodes appear to reside on the border of the trilateral region, which means that they can leave of the trilateral region very quickly. Secondly, when the calculated LETs between all nodes are very low, and third, due to the large number of HCs, since RF is based on RET and HC, if HC is very high, the reliability would be affected.

6. Conclusions

In this study, a novel routing system called the Compacted Area with Effective Links (CAEL) is proposed. This routing protocol first compacts the communication area and then determines the most reliable route inside the compacted region based on the RF. RF takes into account RET and HC to identify the most reliable routing path with the fewest hops. The value of RF is used to determine the most reliable path for data transfer; a higher value of RF implies a more reliable method of data transmission. Upon further research and the analysis of the simulation results, it was discovered that DyTE and RGoV impose a large amount of routing strain on the network as a result of the blind flooding of RREQ packets that occurs during the route discovery stage. This flooding process increases the number of times the RREQ packet is re-transmitted throughout the network, resulting in increased network congestion and significant network performance degradation. According to the reported literature, this re-transmission of RREQ packets is known as a ‘Broadcast Storm’. To re-establish the broken path, it was necessary to undertake route maintenance or route rediscovery method which resulted in higher network traffic and a detrimental impact on network performance.
We developed a routing method that is based on the dependability factor, which may select a highly stable route, hence boosting the longevity and performance, especially for high-density networks. In the future, we aimed to boost throughput and PDR while significantly reducing the latency time. This may be accomplished by tweaking the parameters of RET as well as by adding conditions to handle those nodes that reside near the border of the trilateral region to avoid link disconnections.

Author Contributions

Conceptualization, A.K.K. and S.M.K.; methodology, A.K.K. and S.M.K.; validation, A.K.K. and S.H.; formal analysis, A.K.K., Waseemullah, and U.F.; investigation, A.K.K. and S.M.K.; writing—original draft preparation, A.K.K. and S.H.; writing—review and editing, A.K.K., W. and U.F. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not Applicable.

Informed Consent Statement

Not Applicable.

Data Availability Statement

Not Applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
ACOAnt Colony Optimization
CAELCompacted Area with Effective Links
CHCluster Head
DyTEDynamic Trilateral Enrollment
HCHop Count
E2EEnd-to-End
GPSGlobal Positioning System
ITSIntelligent Transportation Systems
I-2-IInfrastructure-to-Infrastructure
LETLink Expiration Time
MANETMobile Ad Hoc Network
NS-2Network Simulator 2
OBUOnboard Unit
OSMOpenStreetMap
PDRPacket Delivery Ratio
QoSQuality of Service
RGoVReliable Group of Vehicles
RSURoadside Unit
RFReliability Factor
RETRoute Expiration Time
RREQRoute Request
RREPRoute Reply
SDNSoftware-Defined Network
SUMOSimulation of Urban Mobility
VANETVehicular Ad Hoc Network
V-2-VVehicle-to-Vehicle
V-2-IVehicle-to-Infrastructure

References

  1. Kaul, A.; Altaf, I. Vehicular adhoc network-traffic safety management approach: A traffic safety management approach for smart road transportation in vehicular ad hoc networks. Int. J. Commun. Syst. 2022, e5132. [Google Scholar] [CrossRef]
  2. Cavalcanti, E.R.; de Souza, J.A.R.; Spohn, M.A.; Gomes, R.C.D.M.; Costa, A.F.B.F.D. VANETs’ research over the past decade: Overview, credibility, and trends. ACM SIGCOMM Comput. Commun. Rev. 2018, 48, 31–39. [Google Scholar] [CrossRef]
  3. Zekri, A.; Jia, W. Heterogeneous vehicular communications: A comprehensive study. Ad. Hoc. Netw. 2018, 75, 52–79. [Google Scholar] [CrossRef]
  4. Schiegg, F.A.; Llatser, I.; Bischoff, D.; Volk, G. Collective perception: A safety perspective. Sensors 2021, 21, 159. [Google Scholar] [CrossRef] [PubMed]
  5. Moussaoui, B.; Djahel, S.; Smati, M.; Murphy, J. A cross layer approach for efficient multimedia data dissemination in VANETs. Veh. Commun. 2017, 9, 127–134. [Google Scholar] [CrossRef]
  6. Abdalla, G.M.; Abu-Rgheff, M.A.; Senouci, S.M. Current trends in vehicular ad hoc networks. Ubiquitous Comput. Commun. J. 2007, 1–9. [Google Scholar]
  7. Abbasi, I.A.; Shahid Khan, A. A review of vehicle to vehicle communication protocols for VANETs in the urban environment. Future Internet 2018, 10, 14. [Google Scholar] [CrossRef] [Green Version]
  8. Kazi, A.K.; Khan, S.M. Working of various routing protocols in Vehicular Ad-hoc Network: A Survey. Univ. Sindh J. Inf. Commun. Technol. 2020, 4, 278–286. [Google Scholar]
  9. Kazi, A.K.; Khan, S.M.; Haider, N.G. Reliable Group of Vehicles (RGoV) in VANET. IEEE Access 2021, 9, 111407–111416. [Google Scholar] [CrossRef]
  10. Kazi, A.K.; Khan, S.M. DyTE: An Effective Routing Protocol for VANET in Urban Scenarios. Eng. Technol. Appl. Sci. Res. 2021, 11, 6979–6985. [Google Scholar] [CrossRef]
  11. Liu, W.; Kim, W. A stability-considered density-adaptive routing protocol in MANETs. J. Syst. Archit. 2013, 59, 767–775. [Google Scholar] [CrossRef]
  12. Meghanathan, N. A MANET multicast routing protocol for stable trees based on the inverse of Link Expiration Times. In Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA, 14–17 January 2012; pp. 947–951. [Google Scholar]
  13. Ebadinezhad, S. Design and Analysis of An Improved AODV Protocol Based on Clustering Approach for Internet of Vehicles (AODV-CD). Int. J. Electron. Telecommun. 2021, 67, 13–22. [Google Scholar] [CrossRef]
  14. Liu, C.; Shu, Y.; Yang, O.; Xia, Z.; Xia, R. SDR: A stable direction-based routing for vehicular ad hoc networks. Wirel. Pers. Commun. 2013, 73, 1289–1308. [Google Scholar] [CrossRef]
  15. Perkins, C.; Belding-Royer, E.; Das, S. RFC3561: Ad Hoc On-Demand Distance Vector (AODV) Routing; RFC, Ed.; The Internet Society: Reston, VA, USA, 2003; Available online: https://dl.acm.org/doi/pdf/10.17487/rfc3561 (accessed on 2 February 2022).
  16. Rajput, N.S.; Banerjee, R.; Rajput, A.; Siwach, A. A new model for effective use of robustness as a measure of QoS in vehicular ad hoc networks. In Proceedings of the 2017 19th International Conference on Advanced Communication Technology (ICACT), Pyeongchang, Korea, 19–22 February 2017; pp. 388–398. [Google Scholar]
  17. Sun, Y.; Luo, S.; Dai, Q.; Ji, Y. An adaptive routing protocol based on QoS and vehicular density in urban VANETs. Int. J. Distrib. Sens. Netw. 2015, 11, 631092. [Google Scholar] [CrossRef]
  18. Wang, C.; Zhang, L.; Li, Z.; Jiang, C. SDCoR: Software defined cognitive routing for internet of vehicles. IEEE Internet Things J. 2018, 5, 3513–3520. [Google Scholar] [CrossRef]
  19. Yousefi, S.; Mousavi, M.S.; Fathy, M. Vehicular ad hoc networks (VANETs): Challenges and perspectives. In Proceedings of the 2006 6th International Conference on ITS Telecommunications, Chengdu, China, 21–23 June 2006; pp. 761–766. [Google Scholar]
  20. Abbas, F.; Fan, P. Clustering-based reliable low-latency routing scheme using ACO method for vehicular networks. Veh. Commun. 2018, 12, 66–74. [Google Scholar] [CrossRef]
  21. Khan, S.M.; Khan, M.M. Efficient and Reliable Reactive Routing Protocol for Mobile Ad-Hoc Network. Int. J. Comput. Sci. Netw. Secur. (IJCSNS) 2017, 17, 238. [Google Scholar]
  22. Abbasi, I.A.; Khan, A.S.; Ali, S. A reliable path selection and packet forwarding routing protocol for vehicular ad hoc networks. EURASIP J. Wirel. Commun. Netw. 2018, 2018, 1–19. [Google Scholar] [CrossRef] [Green Version]
  23. Mamoun, M.H. A novel technique for the route selection in DSR routing protocol. Int. J. Video Image Process. Netw. Secur. 2011, 11, 1–4. [Google Scholar]
  24. Sadakale, R.; Ramesh, N.; Patil, R. TAD-HOC routing protocol for efficient VANET and infrastructure-oriented communication network. J. Eng. 2020, 2020, 8505280. [Google Scholar] [CrossRef]
  25. Tariq, R.; Iqbal, Z.; Aadil, F. IMOC: Optimization Technique for Drone-Assisted VANET (DAV) Based on Moth Flame Optimization. Wirel. Commun. Mob. Comput. 2020, 2020, 8860646. [Google Scholar] [CrossRef]
  26. Sirohi, D.; Kumar, N.; Rana, P.S. Convolutional neural networks for 5G-enabled intelligent transportation system: A systematic review. Comput. Commun. 2020, 153, 459–498. [Google Scholar] [CrossRef]
  27. Divya, N.S.; Bobba, V.; Vatambeti, R. A novel hybrid Optimized vehicle routes to enhance the vehicular ad hoc network communication. Mater. Today Proc. 2021. [Google Scholar] [CrossRef]
  28. Ng, S.C.; Zhang, W.; Zhang, Y.; Yang, Y.; Mao, G. Analysis of access and connectivity probabilities in vehicular relay networks. IEEE J. Sel. Areas Commun. 2010, 29, 140–150. [Google Scholar] [CrossRef] [Green Version]
  29. Olariu, S.; Weigle, M.C. Vehicular Networks: From Theory to Practice; CRC Press: New York, NY, USA, 2009. [Google Scholar]
  30. Rudack, M.; Meincke, M.; Lott, M. On the dynamics of ad hoc networks for inter vehicle communications (IVC). In Proceedings ICWN; Citeseer: University Park, PA, USA, 2002; Volume 2. [Google Scholar]
  31. Niu, Z.; Yao, W.; Ni, Q.; Song, Y. Link reliability model for vehicle ad hoc networks. In Proceedings London Communications Symposium; Citeseer: University Park, PA, USA, 2006; pp. 1–4. [Google Scholar]
  32. Rudack, M.; Meincke, M.; Jobmann, K.; Lott, M. On traffic dynamical aspects of inter vehicle communications (IVC). In Proceedings of the 2003 IEEE 58th Vehicular Technology Conference, VTC 2003-Fall (IEEE Cat. No.03CH37484), Orlando, FL, USA, 6–9 October 2003; Volume 5, pp. 3368–3372. [Google Scholar]
  33. Andrews, L.C. Special Functions of Mathematics for Engineers; Spie Press: Bellingham, WA, USA, 1998; Volume 49. [Google Scholar]
  34. Wu, D.; Wang, R.; Zhen, Y. Link stability-aware reliable packet transmitting mechanism in mobile ad hoc network. Int. J. Commun. Syst. 2012, 25, 1568–1584. [Google Scholar] [CrossRef]
  35. Su, W.; Gerla, M. IPv6 flow handoff in ad hoc wireless networks using mobility prediction. In Proceedings of the Seamless Interconnection for Universal Services, Global Telecommunications Conference, GLOBECOM’99, (Cat. No.99CH37042), Rio de Janeiro, Brazil, 5–9 December 1999; Volume 1, pp. 271–275. [Google Scholar]
  36. Su, W.; Lee, S.J.; Gerla, M. Mobility prediction and routing in ad hoc wireless networks. Int. J. Netw. Manag. 2001, 11, 3–30. [Google Scholar] [CrossRef]
  37. Yamada, K.; Itokawa, T.; Kitasuka, T.; Aritsugi, M. Cooperative MPR selection to reduce topology control packets in OLSR. In Proceedings of the TENCON 2010—2010 IEEE Region 10 Conference, Fukuoka, Japan, 21–24 November 2010; pp. 293–298. [Google Scholar]
  38. Benabbou, A.; Boushaba, A.; Zahi, A.; Benabbou, R.; Oumsis, M.; Ouatik, S.E.A. NCA: New Cooperative Algorithm for Reducing Topology Control Packets in OLSR. J. Netw. 2015, 10, 125–133. [Google Scholar] [CrossRef]
  39. Al-Kharasani, N.M.; Zukarnain, Z.A.; Subramaniam, S.K.; Hanapi, Z.M. An Adaptive Relay Selection Scheme for Enhancing Network Stability in VANETs. IEEE Access 2020, 8, 128757–128765. [Google Scholar] [CrossRef]
  40. Sangaiah, A.K.; Rostami, A.S.; Hosseinabadi, A.A.R.; Shareh, M.B.; Javadpour, A.; Bargh, S.H.; Hassan, M.M. Energy-aware geographic routing for real-time workforce monitoring in industrial informatics. IEEE Internet Things J. 2021, 8, 9753–9762. [Google Scholar] [CrossRef]
  41. Kandali, K.; Bennis, H. A Routing Scheme Using an Adaptive K-Harmonic Means Clustering for VANETs. In Proceedings of the 2020 International Conference on Intelligent Systems and Computer Vision (ISCV), Fez, Morocco, 9–11 June 2020; pp. 1–5. [Google Scholar]
  42. Kandali, K.; Bennis, L.; Bennis, H. A new hybrid routing protocol using a modified K-means clustering algorithm and continuous hopfield network for VANET. IEEE Access 2021, 9, 47169–47183. [Google Scholar] [CrossRef]
  43. Smiri, S.; Abbou, A.B.; Boushaba, A.; Zahi, A.; Abbou, R.B. WA-GPSR: Weight-Aware GPSR-Based Routing Protocol for VANET. Int. J. Interact. Mob. Technol. 2021, 15. [Google Scholar] [CrossRef]
  44. More, S.; Naik, U. Optimal Multipath routing for video transmission in VANETs. Wirel. Pers. Commun. 2021, 116, 805–827. [Google Scholar] [CrossRef]
  45. Zhou, S.; Li, D.; Tang, Q.; Fu, Y.; Guo, C.; Chen, X. Multiple intersection selection routing protocol based on road section connectivity probability for urban VANETs. Comput. Commun. 2021, 177, 255–264. [Google Scholar] [CrossRef]
  46. Guo, C.; Li, D.; Chen, X.; Zhang, G. An adaptive V2R communication strategy based on data delivery delay estimation in VANETs. Veh. Commun. 2022, 34, 100444. [Google Scholar] [CrossRef]
  47. Santana, S.R.; Sanchez-Medina, J.J.; Rubio-Royo, E. How to simulate traffic with SUMO. In Proceedings of the International Conference on Computer Aided Systems Theory, Las Palmas de Gran Canaria, Spain, 8–13 February 2015; Springer: Berlin/Heidelberg, Germany, 2015; pp. 773–778. [Google Scholar]
  48. Thebault-Spieker, J.; Hecht, B.; Terveen, L. Geographic Biases are’Born, not Made’ Exploring Contributors’ Spatiotemporal Behavior in OpenStreetMap. In Proceedings of the 2018 ACM Conference on Supporting Groupwork, Sanibel Island, FL, USA, 7–10 January 2018; pp. 71–82. [Google Scholar]
  49. Codeca, L.; Frank, R.; Engel, T. Luxembourg SUMO Traffic (LuST) Scenario: 24 h of mobility for vehicular networking research. In Proceedings of the 2015 IEEE Vehicular Networking Conference (VNC), Kyoto, Japan, 16–18 December 2015; pp. 1–8. [Google Scholar] [CrossRef] [Green Version]
Figure 1. VANET’s architecture.
Figure 1. VANET’s architecture.
Sensors 22 03448 g001
Figure 2. Clipped communication zone.
Figure 2. Clipped communication zone.
Sensors 22 03448 g002
Figure 3. Trilateral zone.
Figure 3. Trilateral zone.
Sensors 22 03448 g003
Figure 4. Random node T (a) lies inside the region; and (b) lies outside the region.
Figure 4. Random node T (a) lies inside the region; and (b) lies outside the region.
Sensors 22 03448 g004
Figure 5. Parameters used for calculating Link Expiration Time (LET) between two nodes.
Figure 5. Parameters used for calculating Link Expiration Time (LET) between two nodes.
Sensors 22 03448 g005
Figure 6. Route Expiration Time (RET) and Hop Count (HC) for all possible routes.
Figure 6. Route Expiration Time (RET) and Hop Count (HC) for all possible routes.
Sensors 22 03448 g006
Figure 7. Tabular explanation and calculation of the best possible Reliability Factor (RF).
Figure 7. Tabular explanation and calculation of the best possible Reliability Factor (RF).
Sensors 22 03448 g007
Figure 8. Packet delivery ratio against various number of nodes.
Figure 8. Packet delivery ratio against various number of nodes.
Sensors 22 03448 g008
Figure 9. Routing overhead against various number of nodes.
Figure 9. Routing overhead against various number of nodes.
Sensors 22 03448 g009
Figure 10. End-to-end delay against various number of nodes.
Figure 10. End-to-end delay against various number of nodes.
Sensors 22 03448 g010
Table 1. Simulation Settings.
Table 1. Simulation Settings.
ParameterSettings
MobilityManhattan
MAC ProtocolIEEE 802.11p
Network SimulatorNS-2
Channel TypeWireless
Propagation ModelTwo Ray Ground
AntennaOmni-Antenna
Transmission Range250 m
Traffic TypeCBR
Protocol TypeUDP
Max. Speed50 Km/h
Buffer Length50 packets
Number of Vehicles25, 50, 75, 100, 125, 150, 175, 200, 225, 250, 275, 300
Number of Simulations15
Simulation Area2500 m × 2000 m
Simulation Time300 s
Routing ProtocolsCOOP, NCA(MPR), CACA, DyTE, RGoV, and CAEL
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Kazi, A.K.; Khan, S.M.; Waseemullah; Farooq, U.; Hina, S. Compacted Area with Effective Links (CAEL) for Data Dissemination in VANETs. Sensors 2022, 22, 3448. https://doi.org/10.3390/s22093448

AMA Style

Kazi AK, Khan SM, Waseemullah, Farooq U, Hina S. Compacted Area with Effective Links (CAEL) for Data Dissemination in VANETs. Sensors. 2022; 22(9):3448. https://doi.org/10.3390/s22093448

Chicago/Turabian Style

Kazi, Abdul Karim, Shariq Mahmood Khan, Waseemullah, Umer Farooq, and Saman Hina. 2022. "Compacted Area with Effective Links (CAEL) for Data Dissemination in VANETs" Sensors 22, no. 9: 3448. https://doi.org/10.3390/s22093448

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop