283
Views
0
CrossRef citations to date
0
Altmetric
Electrical & Electronic Engineering

Performance analysis of path selection routing protocol for UVANET based on geographical multicast routing algorithm

ORCID Icon &
Article: 2311526 | Received 21 Jan 2023, Accepted 24 Jan 2024, Published online: 22 Feb 2024

Abstract

Urban Vehicular Ad hoc Networks (UVANETs) are the most important form of mobile ad hoc networks (MANETs). It has been broadly used in intelligent transportation system (ITS) to supply safety and comfort services to the passengers and drivers and also provide security/privacy using vehicle-to-vehicle and vehicle-to-road side unit (RSU) communications. In UVANETs, this research which maintains the security of the sensitive information shared between vehicles and end-users and tested on different types of attacks and provide possible solutions. And different emerging open challenges along with the security threats are identified and detected and the power of each node are also managed. This research proposed geographical multi cast network mode to analysis the performance of path selection routing protocols (PSRP) for UVANET because geographical multicast network mode uses central coordinator or it constructs virtual central coordinates. Due to these benefits geographical multicast routing algorithm (GMRA) is used to handle security issue, fault detection technique and power management. To simulate the proposed scheme, for performance analysis network simulator-3(NS-3) version-3.23 is used. Simulation results show that, the PDR for five CBR connections, GMRA is 4% and 7% better than GPSR and AODV routing protocols, respectively. Similarly one can observe the same advantages of GMRA at 10 CBR and 15 number of CBR connections. The packet loss of GMRA is enhanced by 10% and 7% than GPSR and AODV routing protocols respectively. The delay of GMRA for the three CBR connections are lower than GPSR and AODV routing protocols.

PUBLIC INTEREST STATEMENT

Over the past few years, the technology of vehicular ad hoc networks (VANETs) has been a significant topic of research. The idea of creating a network of cars for a particular need gave rise to the ad-hoc nature of VANET networks. VANETs are widely recognized as dependable networks used by cars in urban settings for communication. Security for VANET should be prioritized on a par with security for other computing networks. All apps created for vehicular networks must be safeguarded from malicious manipulation because to the very sensitive nature of the information broadcast via VANET. Thus, creating a dynamic routing protocol that can assist in spreading information from one node (vehicle) to another is one of the key issues in the design of vehicular ad-hoc networks. This research presented Path Selection Routing Protocol for UVANET based on geographical multicast routing algorithm to overcome this problem and analyze UVANET performance.

1. Introduction

In the recent years, communication technology leads to the generation of new type of networks, to deploy in various environments (Bhoi et al., Citation2017). Urban vehicular ad hoc network (UVANET) is one part of such type of network, where the vehicles on the roads communicate to provide safety and comfort services for the drivers and passengers (Burger & Lauer, Citation2018). It has a hybrid network architecture, high speed node movement characteristics, and it can provide many applications like safety(traffic signal warning system, stop sign warning system, intelligent traffic flow control) and non-safety (file transfer, mailing, internet access and simple message transfer) and services like security and TCP/IP (Guan Lim et al., Citation2017). Nowadays, vehicles are implementing the communication technology using the wireless modules in the cars to communicate with other vehicles and stations. This helps the drivers and passengers to get many types of services, application, driver support, infotainment (it is a types of media which provides the combination of information and entertainment), and urban sensing (Wang et al., Citation2018). Government, private companies and academia are working to deploy and develop VANET all over the world. The communication between the vehicles said to be vehicular communication. Basically, the objective of deploying VANET is to decrease the level of accidents and has a great impact on passenger safety and the drivers can drive smoothly in the urban areas. When the vehicle population is increasing day-to-day, then the rate of accidents also increases, so it is necessary to communicate for the vehicles (Pal et al., Citation2019).

The main communication models in VANETs are classified into inter-vehicular communication, V2I communication and inter-roadside communication (Khan et al., Citation2021). In inter vehicular communication or V2V communication, the vehicle can communicate with each other to exchange the traffic-related information within the wireless range. For instance, when an incident occurs on the road, the vehicle can immediately send the traffic information to the other vehicles nearby, suggesting them to avoid that area that if a vehicle breaks down, immediately, the vehicle begins the information dissemination process using the multi cast communication mode. If one vehicle near to the other vehicle, in this way when the communication between them is broken down, then the message is re-transmit. In such way, vehicles are notified and can take alternative routes, avoiding traffic congestion problem. The V2I mode of communication describes the communication between vehicles and fixed infrastructure. In the V2I communication, the vehicle can exchange the safety information with the infrastructure such as RSUs which are deployed on the road. The V2I communication objective is to avoid the crashes and severe incidents, provide measures of multiple safety and precautions to the vehicles.

Many routing protocols are designed to provide faster data delivery to the destination. Mobile ad hoc network (MANET) routing protocols are used to implement VANET but it is difficult to implement in VANET using these routing protocols because of cost of product(i.e. expensive), mobility (i.e. high) and change in topology (i.e. frequent and fast) (Rizwan Ghori et al., Citation2018). Nowadays researchers are focusing on designing secure VANET systems to protect the genuine drivers from the malicious drivers. To give robust security against the attacks, many secure routing protocols are developed. Recently many researches and developments have been made under VANET (Thakur et al., Citation2017), and researchers are working on the issues like routing, broadcasting, security, traffic management, information fusion, etc. The major problems that affect the performance of path selection routing protocol (PSRP) for UVANETs are unstable routing to transfer data from source to destination. Mostly the challenge that face a routing protocol for UVANETs is not only distance but also security and power management. The fault vehicles or malicious vehicles reduce the performance of the system by affecting the QoS parameters, because routing in UVANET mainly depends on the correct information, so security is a challenging task due to lack of centralized coordinator that impede trust management for nodes i.e. no centralized secure server. Power management is the second challenge because of resource constraints. When the power of the nearest node is low ongoing process link failure occurred and then link breakages lead to frequent path failures. Thus in this research used to solve such challenges geographical multicast routing algorithm (GMRA) is proposed to enhance performance of PSRP for UVANET, this routing protocol can construct virtual central coordinator that preserve enough neighborhood information to be useful in geographic routing and do not require actual position determination. It uses polar coordinates from a center point, assign ‘virtual angle range’ to neighbors of a node, bigger radius and angles are recursively redistributed to children nodes.

The remainder of the article is structured as follows: The second section examines literature review on VANETs that has been done in order to route data on VANETs. The proposed system model for the development and implementation with the provided mathematical model is covered in detail in the third section. An extensive simulation investigation was described in Section 4. The conclusion and recommendations, as well as potential future directions for the work, are covered in Section 5.

2. Related works

Routing in ad hoc networks is an important task to send the data to the destination (Meng et al., Citation2015). Many routing protocols are proposed for VANET to provide efficient data delivery to the destination (Li et al., Citation2014; Youssef et al., Citation2014). Topology-based routing protocols are difficult to implement in VANET due to high dynamic activity of the vehicles. Position-based routing protocols, where path maintenance is not required, only destination position and neighbor position information is required to send the data (Li et al., Citation2019). So, VANET prefers GMRA, because it is not considering only distance but also consider power management and security to send the data. In the work by Al-Rabayah & Malaney (Citation2012) proposed a hybrid of reactive routing and location-based routing protocol to reduce the routing overhead for UVANET, and to increase the scalability for UVANET. The combination of reactive routing and location-based routing used to forward the data to the destination effectively. But it lacks the number of communication gaps that generated between the junctions. Taleb et al. (Citation2007) proposed routing protocol stability by grouping different vehicles according to their velocity vectors. The vehicles that have the same velocity gives stable communication. This decreases the link failure between the vehicles. It decreases the traffic by elongating the paths selected link times. It broadcasts only the best packets. But it lacks about the vehicles ahead connectivity. That implies to increases end-to-end delay. Gomides et al. (Citation2020) proposed a failure detection system that detects the crash and exit faults in vehicular communication system for vehicular networks. In exit fault, the vehicles that are out of range are considered as faulty vehicles. In crash fault, the equipment which is unable to send and receive the data. In the equipment this method only considers permanent fault. This decreases the delay and message loss in the network. In the OBU incorrect data generates due to noise because it does not focus on the soft-fault detection method. Harsch et al. (Citation2007) proposed secure position-based routing protocol that based on C2C-CC Project for UVANET. The malicious vehicles with false position information are detected by using plausibility checks and digital signature. That scheme increases the end-to-end delay because it has high computation, and it lacks the communication gaps ahead. Xiong and Li Citation2015) first proposed ad hoc routing protocols over a realistic vehicle mobility pattern for a city scenario, and presented a simulation study that compares a position-based routing (GSR) approach with classical ad hoc routing methods (AODV and DSR). The results of simulation also demonstrated that with respect to delivery rate and latency, Position-based routing outperforms topology-based approaches. Shastri et al. (Citation2011) also evaluated the performance of routing protocols (AODV, DSR, FSR, and TORA) in city traffic scenarios, and found out that TORA is completely unsuitable for vehicular environment, whereas AODV and FSR showed promising results, DSR suffered from very high end-to-end delay. Naumov et al. (Citation2006) studied the behavior of routing protocols (AODV and GPSR) in an inner city environment and on a highway segment by using realistic mobility traces obtained from a microscopic vehicular traffic simulation on real Switzerland road maps. In the investigated VANET scenarios, both exhibit serious performance problems. Position-based routing protocols methods have been proposed several times, besides conventional ad hoc routing protocols. But the comparison of between position-based and topology- based routing had been carried out in (Royer & Toh, Citation1999; Broch et al., Citation1998) and this study indicated that in highly mobile environment like VANET topology based routing is less suitable than position-based routing. As topology-based routing protocol delivery ratio is less than position based routing protocol. However, those protocols have their own drawbacks. This reason motivated us to select this algorithm and analyze its performance. Now in this work we try to solve some problems related to the routing issues, such as link breakage, fault vehicles, security and power management to enhance the performance of PSRP for UVANET geographical multi cast model used.

3. System model

This system model describes the way of the system about GMRA for UVANET which states that the way of communication between the vehicles, RSUs and V2R. As shown in , GMRA construct central virtual coordinator to monitor each node and each RSUs. This algorithm checked the power level of each nodes and RSUs. And also detect the malicious vehicles to protect the information (data packets) from the attacker. On this system model describes about the network model, security model, and power management model. Network model presents about topology of network and communication between the nodes. Security model describes about the security mechanism used to protect the information (data packets) from the attacker. Power management model describes these management schemes deal in the management of energy resources by controlling the early depletion of the battery, adjust the transmission power to decide the proper power level of each node and incorporate low power consumption strategies into the protocols.

Figure 1. General System Model of Routing Protocol for UVANET Using GMRA.

Figure 1. General System Model of Routing Protocol for UVANET Using GMRA.

3.1. Topology of network and communication between the nodes

For a RREQ, a node may receive multiple route reply (RREP) but a node selects a route with the shortest hop distance to the member of the multi cast group and discards the other routes as shown in . After that, the node enables the selected next hop in its routing protocol and unicasts an activation message to that node. In routing protocol Process there are three basic terms, which are: RREQ, RREP and route error (RERR). The source node broadcasting RREQ messages to other nodes to find the destination node. As shown in when RREQ received by nodes, then RREP messages are sent back to the source node in unicast communication. And when a communication break occurs, then it uses RERR messages to notify. Due to this reason, a new route discovery process should begin. For detecting and monitoring connectivity with neighbors, “hello” messages are permanently used. The principal stage of this routing protocol is route discovery and the process is route discovery process (Li et al., Citation2010). Routing process is composed of route discovery process and route maintenance process(route maintenance (Li et al., Citation2010) is the mechanism by which source node is able to detect, while using a source route to destination node, if the network topology has changed such that it can no longer use its route to destination node because a link along the route no longer works). The full path is formed by storing information in intermediate nodes along the route in local routing protocol. Whenever a source node desires a route to a destination node to which it does not already have a route, it broadcasts a RREQ message to all its neighbors. The neighbors update their information (RREP) for the source and create reverse route entries for the source node in their routing protocol. In this routing protocol there are two causes that are: a neighbor node receiving a RREQ and send a RREP, if it is the destination and a neighbor node receiving a RREQ and send a RREP, if it has an unexpired route to the destination. When any one of these two cases is satisfied, the neighbor node uni casts RREP back to the source node. Along the path back to the source, intermediate nodes that receive the RREP create forward route entries for the destination node in their routing protocol. But when any one of the two cases is not satisfied, the neighbor rebroadcasts (forwards) the RREQ. If the source node does not receive RREP, then it tries again and again to find a route to the destination node till the maximum RREQ retries times.

Figure 2. Topology of PSRP for UVANET (Li et al., Citation2010).

Figure 2. Topology of PSRP for UVANET (Li et al., Citation2010).

As shown in , source node ‘N0’ broadcasts a RREQ message to its neighboring nodes, i.e.‘N1’ ‘N2’ and ‘N4’, and those replayed RREP to ‘N0’ at this time ‘N0’ send data packets to the shortest one. And then by updating RREQ ‘N4’ further broadcasts to the next neighboring node ‘N7’ and it replayed RREP to‘N4’ at this time‘N4’ send data packets to‘N7’. But ‘N4’ did not broadcasts to ‘N3’ and ‘N5’ why because their power level is less than the normal threshold value or the nodes are malicious. And also by updating RREQ” N7” further broadcasts to ‘N6’, ‘N8’ and ‘N10’ and those replayed RREP to ‘N7’ at this time‘N7’ send data packets to the shortest one ‘N10’. Finally by updating RREQ ‘N10’ further broadcasts to the next neighboring node ‘N13’ or destination node and it replayed RREP to ‘N10’ at this time ‘N10’ send data packets to destination node or ‘N13’. But ‘N10’did not broadcasts to ‘N9’, ‘N11’ and ‘N12’ why because their power level is less than the normal threshold value or the nodes are malicious in the Ad hoc network. The solid (green) lines indicate the link in forward path (RREQ) and the solid (Red) lines indicate the link in reverse path (RREP) as shown in legend.

3.2. Flow chart of the information transferring from source to destination

describes the flow of information (RREQ-packet, RREP-packet, RERR-packet and data-packet) between the nodes or from source to destination. The information flow concerning with both power level and security not only shortest path. As shown in , before transfer the data packets first check the power level of in each nodes. If the power level of each node is less than that of normal power threshold value, then the data packets are not transfer from one node to other node. But if the power level of each node is greater than or equal to that of normal power threshold value (0.05 watt), then the data packets are transfer from one node to other node destination by using GMRA. Where, the received power threshold value can be derived from the SINR model as shown in EquationEquation (1) (Divya et al., Citation2015). (1) PRXTH=10log(10(PN/10)+10(PI/10)10(TH/10)).(1)

Figure 3. Flow chart of information (RREQ, RREP, RERR and Data-packet) from source to destination.

Figure 3. Flow chart of information (RREQ, RREP, RERR and Data-packet) from source to destination.

where PN and P1 describes the noise power and the interference power in dBm,ζTH is the SINR threshold for a successful reception in dB.

The schemes of power management which deal in the energy resources management by controlling the early battery depletion, adjust power of the transmission to decide a node proper power level and incorporate that strategies of low power consumption into the protocols (Zheng & Kravets, Citation2003). In ad hoc wireless network, the main reasons for power management are listed as Limited reserve energy, Lack of central coordination and Optimal transmission power selection. At the same time if the neighboring node is malicious, then the data packets are not transfer to that of neighboring node. But if the neighboring node is not malicious, then the data packets are transfer to that of neighboring node by using GMRA. To detect malicious nodes there are two ways: centralized and distributed. In this aricle, we used centralized detection because GMRA has centralized coordinator. When the vehicle contain valid certificate, the vehicle is genuine but when the vehicle contain an invalid certificate, then the vehicle is a malicious. Every vehicle sets a trust value for its neighbor. The certificate is signed and provided by the trusted central authority (CA).

3.3. Mathematical description of PSRP for UVANET

The urban road network contains junctions, roads, vehicles, and RSU. The roadways are single-lane or multi-lane. The urban road network model is considered as a graph G with as junction vertex V and as road connecting the two junctions edge E, i.e. (G = (V, E) = (RSU, J)) at a particular time interval RSU and vehicle beacons. In cause of that the beacon information contains identity, location, speed, and direction. To act as decision makers, RSUs are set at the junctions. For a particular time RSUs stores the vehicles beacon information that passes through the junction and it decides in which direction the data are to be forwarded next node and also if a new vehicle arrives, then updates the data. Because RSU has computing capability. Signifies a value calculated for a path using the road information to know the ability of a road to send the data from one junction to other in a minimum time as shown in (Bhoi et al., Citation2017).

Figure 4. Graphical Expression of Mathematical System Model for UVANET (Bhoi et al., Citation2017).

Figure 4. Graphical Expression of Mathematical System Model for UVANET (Bhoi et al., Citation2017).

The path value is calculated by basically three parameters that are: expected delay (texp) to send the message from one junction to other, shortest path, and number of communication gaps between the junctions. Communication gap between the two vehicles Vi and Vj is defined as the distance after the radio range of Vi to the position of Vj. These parameters are calculated by considering information, such as vehicle current position, speed, communication gaps, shortest paths, and expected delay to send the message from one junction to other. According to , RSU2 finds the current positions of the vehicles for the roads J2-J1, J2-J3 and J2-J6. The vehicles current positions are calculated as shown in EquationEquation (2) (Bhoi et al., Citation2017). (2) dcover=(tcurrenttlbeacon )×v(2) where dcover denotes the distance covered by a vehicle after the last beacon. tcurrent denotes the current time, tlbeacon denotes the time of the last beacon is received by the RSU (RSU2), and v is the speed of the vehicle.

In this process after finding the vehicles positions, RSU2 consider only those vehicles whose positions lie between the two junctions. By using the vehicles positions and the vehicles communication range, RSU2 finds data transmission logical path Pttr. by using the following formula i.e. RSU2=J2J1 or J2J3 or J2J6 which implies Pttr.. To estimate the delay from one junction to other Pttr is generated. Assumed for all vehicles and RSUs have the same Communication range. According to , RSU2 finds Vnext (v5) vehicle by using the positions and communication range of that vehicles.

Then this process continues until RSU3 is reached. After generating the Pttr (RSU2 V5V6 RSU3) from RSU2 to RSU3, RSU2 calculates the expected delay texp on path Pttr using EquationEquation (3) (Bhoi et al., Citation2017). (3) texp=(n1)IMr+p=1n1cgdfp+cg*crc+j=1n1trestj+k=1cgtck(3) where (n1)IMr denotes the total transmission delay and n denotes the number of vehicles or RSUs used to forward the data from one RSU to another. (n1) denotes the number of links between the vehicles to connect the two RSUs. lMr denotes the transmission delay, where l denotes the message length and r denotes the data rate.

p=1n1cgdfp+cg*crc denotes the total propagation delay, dfp describes the forwarding distance between the two vehicles, where p is number of forwarding distances. c denotes propagation speed. cg denotes the number of communication gaps formed due to high mobility of vehicles and presence of soft faulty vehicles, and Cr denotes the communication range, which signifies the forwarding distance established after carrying the data. cgcr denotes the total number of forwarding distances generated by multiplying the number of gaps with the range of the vehicle. This is done because if gap occurs, then it is assumed that the relay vehicle with the data overtakes the forward vehicle and when it reaches the forward vehicle, the forwarding distance is equal to the range (dfp=cr).

j=1n1trestj denotes the total processing and queuing delay, trest denotes the processing delay and queuing delay where j describes the number of rest delays.

k=1cgtck denotes the total carrying delay on the path or the total message carrying delay which signifies the delay a vehicle takes to carry the message until a new vehicle arrives and tck denotes the carrying delay taken by the relay vehicle until the forward vehicle is encountered. k denotes the number of times the data is carried when a gap is encountered In this protocol, we only consider the transmission delay, propagation delay, and carrying delay to approximate the texp. When a gap appears, the forward vehicle is travelling faster than the carrying delay, which is estimated by the amount of time it takes to convey the data while going forward or by the distance it travels before it reaches the junction, until a new vehicle arrives. If the forward vehicle is moving slowly, the carrying delay is estimated by the amount of time it takes to carry the data in the forward position or to get close to the junction until a new vehicle arrives (i.e. the forward vehicle is moving quickly and slowly estimates the carrying delay). The RSU2 calculates the ratio of SPtnext to SPtcurrent. where SPtnext denotes the shortest path from the next junction to the destination and SPtcurrent denotes the shortest path from the current junction to the destination. Note that Dijkstra’s algorithm is used to calculate the shortest paths. R describes the destination closeness from RSU2. Therefore, when the value of R is less, then the destination is nearer to that the RSU. After collecting the required information, such as texp , SPtnext and cg, RSU2 calculates the path value (Ptval ) for a path connected to the junction as shown in EquationEquation (4) (Bhoi et al., Citation2017). (4) Ptvali=w1texp+w2R+w3cg(4) let R=SPtnextSPtcurrent where, w1,w2and w3 are weight of the nodes and the summation of the weights w1, w2and w3 is 1. The weight of a node is the sum of the weights of the edges connected to the node or node weights are just the numbers associated with each nodes. The connections between the nodes are called edges or links. The degree centrality measure is applied to graphs where the weights in W represent similarities between the nodes. In this way, a high degree centrality value of a given node means that this node has a large number of neighbors and is closely connected to them. The degree centrality measure is applied to graphs where the weights in W represent similarities between the nodes. In this way, a high degree centrality value of a given node means that this node has a large number of neighbors and is closely connected to them. The weight of every node is calculated and then the highest weight node is determined. The weight wn(y) of an edge y is the sum of the degrees of its end nodes and wn(y) is defined as twice the degree of its unique end node.

In VANET node weight is leveled as high level, middle level, and low level nodes. The high level nodes report the information which has higher trustworthiness as compared with the other levels nodes. A node level is associated with the trust value in the entity-oriented trust model as shown in EquationEquation (5) (Masood et al., Citation2020). (5) wn(y)={1,y=Hn0.7,y=Mn0.5,y=Ln(5) where Hn, Mn and Ln denote high, middle and low level nodes, respectively, and also the subscript n indicates the number of link nodes (Masood et al., Citation2020). To send the data quickly to the next junction all the parameters used to calculate the path value should be minimum. To select the next path, RSU2 uses EquationEquation (6) to send the data (Bhoi et al., Citation2017). (6) Pts=min(Ptval 1,Ptval 2,Ptval 3,,Ptvalue i)(6)

The two path values are calculated by RSU2 and forward the message towards the junction J3, that has a minimum path value according to . From , it is observed that the path J2–J3 has high vehicle density than path J2–J6. After message reaches J3, using the same process the message is forwarded to junction J7 by RSU3 and then by using multi-hop communication (if not in the range) the RSU7 forwards the data to the receiver node or the destination.

4. Results and discussion

In this section, the performance of the proposed geographical multi cast routing protocol simulated on network simulator-3 (NS-3) version 3.23 software, are presented and disused. This software working on different platforms like Linux and Windows (using Cygwin) platforms. But for this work, we select a Linux platform (i.e. Ubuntu 18.04.2.0. LTS) because it supports a number of programming tools that can be used for the simulation processes. The performance of PSRP is identified by GMRA protocol comparing with GPSR and AODV routing protocols. Thus, the performance is evaluated by end-to-end delay, packet loss, throughput, packet overhead and PDR.

4.1. Simulation setup

Network simulator-3 (NS3) version 3.23 software is installed on Ubuntu 18.04.2.0. LTS, which supports a number of programming tools that can be used for the simulation processes and we added libraries like simulation urban mobility, netanim and Gnu plot library on NS3 software. (1) By adding simulation urban mobility (SUMO) (version 0.32) library in the network simulator software (version 3.23 or NS-3.23) we get the goggle map. From, the goggle map we adjust the track, the bus and the time and we get the trace file. From the trace file the maximum number of nodes and the maximum number of time are taken and then the maximum number of nodes and the number of time added on the code to connect the link path. (2) In other side by adding netanim (version 3.108) library in the NS3 software, the animation way is obtained by adjusting TCP/IP and UDP protocols and this helps to see the movement of the nodes. (3) Finally by adding Gnu plot library in the NS3 software the graph of the result is obtained. indicates work flow of the software for simulation system that has been discussed before.

Figure 5. Work flow of the software for simulation system.

Figure 5. Work flow of the software for simulation system.

4.2. Simulation parameter

shows that most of the simulation parameters with their own values.

Table 1. Simulation parameter.

4.3. Packet delivery ratio versus CBR connections

As shown in , as the number of CBR connections increases, then the packet transmissions are increases. So that, in the network the traffic is very high due to that packet delivery ratio PDR also increases in GMRA, GPSR and AODV protocols. The PDR increases as CBR connections increases and it depends upon the node movement and positions. But the GMRA protocol provides high PDR when we compare with GPSR and AODV protocols. According to the PDR test, when the two vehicles distance or the distance between them increase, PDR decreases or reduces. Thus explains the benefit of using GMRA protocol in terms of PDR with varying traffic loads. When the traffic load increases, the PDR of AODV and GPSR protocol also decreases, because of the increase in the routing and data packets due to the mobility nodes are very high that participate in the routing process, it causes channel contention and packet collision that leads to dropping in packet delivery. As one can see from Figure, GMRA protocol outperforms AODV and GPSR protocol at every traffic load. Because of this, GMRA protocol selects the routing way with the control packets reduction as well as the longest lifetime way. When the routing message rebroadcast is very less the bandwidth consumption will be small. So that when the PDR is better, then the routing protocol is more complete and correct. As a summary of , for five CBR connections, GMRA is 4% and 7% better than GPSR and AODV routing protocols respectively. Similarly at 10 CBR connections, GMRA is better 7.5% and 6.5% than GPSR and AODV routing protocols respectively. And one can observe the same advantages of GMRA at 15 number of CBR connections.

Figure 6. Packet delivery ratio vs. no. of CBR connection.

Figure 6. Packet delivery ratio vs. no. of CBR connection.

4.4. Packet loss versus CBR connections

shows the packet loss for different number of CBR connections. As it as shown from the figure, the packet loss increase as CBR connections and it depends upon the node movement and positions where the GMRA protocol provides less packet loss than GPSR and AODV protocols. The packet loss at five CBR connections, the packet loss of GMRA is enhanced by 3% and 3.5% than GPSR and AODV routing protocols, respectively. And one can observe the same advantages of GMRA at 10 CBR and 15 number of CBR connections.

Figure 7. Packet loss vs. no. of CBR connection.

Figure 7. Packet loss vs. no. of CBR connection.

4.5. End-to-end delay versus CBR connections

illustrates the end to end delay for different number of CBR connections. As the CBR connections increase, the packet transmissions increases gradually leads to very high traffic in the network. Thus, the route discovery may take long path and the end-to-end delay will increases too. Therefore, the end-to-end delay increases as CBR connection increases and it depends upon the node movement and positions. But, the proposed GMRA protocol provides low end-to-end delay as compared with the GPSR and AODV protocols. The numerical comparison of the three protocols, let at 15 CBR connection, the delay of GMRA is at 15 CBR connections GMRA is 5.65% and 4.55% lower than GPSR and AODV routing protocols respectively.

Figure 8. End to end delay vs. no. of CBR connection.

Figure 8. End to end delay vs. no. of CBR connection.

4.6. Throughput versus number of nodes

To measure the network connection performance, throughput which is a good way because it tells that at their destination how many messages are arriving successfully. When majority of the data or the messages are delivered successfully, then the throughput is very high that will be considered. So, throughput increases as node increases and it depends upon the node movement and positions. But in some causes the network traffic throughput decreases with an increase in the number of nodes between the source and the destination because the packet error probability increases with an increase in the number of nodes. The GMRA protocol provides high throughput when compared with that of GPSR and AODV protocols because GMRA has central virtual coordinator that monitors the packet error probability. The simulation result in , shows that the GMRA protocol gives higher throughput than the GPSR and AODV protocols. Because to select the best routing way in the GMRA protocol the node mobility that has fewer probabilities to break the link for the data transmission considered. However, the existing AODV protocols selects the shortest route and do not consider the node’s mobility rather selecting the route that may cause the frequent link breakage which affects the overall network throughput. In addition, the fewer rebroadcasts result in less degree of collision and contention, which leads the GMRA protocol to get higher throughput. In a proposed algorithm in cause of the route discovery process, it consume less time when we compared to AODV protocols and GMRA, due to the reduction of a link breakage problem. Throughput for PSRP as shown in , GMRA protocol is better than GPSR and AODV routing protocols. But from around 7–15 nodes and from 25 to 30 nodes are not consistent or decreases because of power level. So we considered the average throughput value or the maximum threshold value.

Figure 9. Throughput vs. no. of nodes.

Figure 9. Throughput vs. no. of nodes.

4.7. Packet loss rate versus number of vehicles

As shown in , as the number of nodes increases the network connectivity increases, which leads that the packet loss rate decreases. So, the packet loss rate is decreases as the number of nodes increases for the three (i.e. GMRA, GPSR and AODV) routing protocols. The proposed GMRA is lower packet loss rate than GPSR and AODV routing protocols due to the power level and security. But, the AODV protocol is crossing smoothly the GPSR and GMRA routing protocols starting from around 75 nodes and 87 nodes, respectively. And it has low packet loss rate at higher nodes because the AODV routing protocol considers only distance but not power level to reach destination. But GMRA protocol selects the shortest pass and monitors its power level and security by increasing number of nodes and by reducing the number of hops to send the data to the destination.

Figure 10. Packet lost rate vs. no. of vehicles.

Figure 10. Packet lost rate vs. no. of vehicles.

4.8. Average end-to-end delay vs. number of vehicles

illustrates that the proposed GMRA routing protocol is lower end-to-end delay than GPSR and AODV routing protocols. When the number of vehicle is low, the protocols is encounter network gaps in the path which increases the end-to-end delay due to increase the carrying delay. So GMRA routing protocol shows less end-to-end delay because it construct virtual central coordinator that manage the nodes in terms of power and security. When the density of the node is increased to 40, 50, 60, 70, 80 and 90, at shown in , it is observed that no gaps are encountered by the protocols due to high availability of vehicles in the radio range. So that, all the protocols perform similar in high density scenarios by showing less end-to-end delay.

Figure 11. Average end-to-end delay vs. number of nodes.

Figure 11. Average end-to-end delay vs. number of nodes.

4.9. Packet overhead versus number of vehicles

Network overhead is calculated by sending a fixed-size data transmission across the network and observing the number of extra bytes of data transmitted for the action to be completed. The overhead of a packet type is the amount of wasted bandwidth that is required to transmit the payload. The packet header is extra information put on top of the payload of the packet to ensure it gets to its destination. But there are the factors that affecting network performance like bandwidth of the transmission medium, type of network traffic and the number of transmission errors. Within the network, overhead can be happen in packets exchange process. So that when the packet overhead is very high, then the traffic is also very high which required high bandwidth. Due to that packet overhead influence the network because of the factors that affecting network performance. In ad-hoc network there is a continuous exchange of data packets, acknowledgment packet, data request packet and other packets. Hence, this work evaluated how efficient cooperative re-transmission is in avoiding excessive overhead that could be created within an ad-hoc network. As shown in , because of GMRA control all the nodes, its packet overhead is less as compared with GPSR and AODV.

Figure 12. Packet overhead vs. no. of vehicles.

Figure 12. Packet overhead vs. no. of vehicles.

5. Conclusion

In this research, for UVANET in urban environment a PSRP based on GMRA is proposed to send the data to the destination. It uses GV2GV communication to increase the performances of the result. And also improved the power management in each node by checking the power level of each node (i.e. the power level of each node must be less than the power threshold value) and detect the impact of malicious node to secure the data in each node using GMRA. The proposed algorithm was simulated successfully in an urban sparse scenario in NS-3. The experiments demonstrate that the proposed GMRA protocol shows better performance over GPSR and AODV protocols as far as packet loss rate, PDR, end-to-end delay, throughput and packet overhead are concerned. The PDR for five CBR connections, GMRA is 4% and 7% better than GPSR and AODV routing protocols respectively. Similarly one can observe the same advantages of GMRA at 10 CBR and 15 number of CBR connections. The packet loss of GMRA is enhanced by 10% and 7% than GPSR and AODV routing protocols, respectively. And one can observe the same advantages of GMRA at 5 and 15 number of CBR connections. The delay of GMRA for the three CBR connections are lower than GPSR and AODV routing protocols. Finally, the proposed protocol also enhanced throughput, good put and packet overhead by reducing the number of hops used and by increasing number of nodes to send the data to the destination. In this research, for UVANET in urban environment a PSRP based on GMRA is proposed to send the data to the destination. And improved the power management in each node by checking the power level of each node (i.e. the power level of each node must be less than the power threshold value) and detect the impact of malicious node to secure the data in each node using GMRA. The proposed algorithm was simulated successfully in an urban sparse scenario in NS-3. The experiments demonstrate that the proposed GMRA protocol shows better performance over GPSR and AODV protocols as far as packet loss rate, good put, PDR, end-to-end delay, throughput and packet overhead are concerned. The PDR for five CBR connections, GMRA is 4% and 7% better than GPSR and AODV routing protocols respectively. Similarly one can observe the same advantages of GMRA at 10 CBR and 15 number of CBR connections. The packet loss of GMRA is enhanced by 10% and 7% than GPSR and AODV routing protocols respectively. And one can observe the same advantages of GMRA at 5 and 15 number of CBR connections. The delay of GMRA for the three CBR connections are lower than GPSR and AODV routing protocols. Finally, the proposed protocol also enhanced throughput and packet overhead by reducing the number of hops used and by increasing number of nodes to send the data to the destination.

Future study should alter the GMR algorithm to take into account many factors including speed, direction, and node density. It should also compare the GMR method in both a highway and a dense urban situation to produce simulations that are more accurate.

Supplemental material

Supplemental Material

Download (397 KB)

Disclosure statement

No potential conflict of interest was reported by the authors.

Additional information

Notes on contributors

Fikreselam Gared Mengistu

Fikreselam Gared Mengistu received his PhD from Taiwan National University of Science and Technology (NTUST), Taiwan, in Communication Engineering. He received his MSc and BSc from Addis Ababa University and Bahir Dar University, Ethiopia, respectively. Hiruy Daricha Yihunie received her MSC from Bahir Dar University, Ethiopia and his research interests are in the areas of wireless networks and security.

References

  • Al-Rabayah, M., & Malaney, R. (2012). A new scalable hybrid routing protocol for vanets. IEEE Transactions on Vehicular Technology, 61(6), 2625–2635. https://doi.org/10.1109/TVT.2012.2198837
  • Bhoi, S. K., Khilar, P. M., & Singh, M. (2017). A path selection based routing protocol for urban vehicular ad hoc network (uvan) environment. Wireless Networks, 23(2), 311–322. https://doi.org/10.1007/s11276-015-1155-1
  • Broch, J., Maltz, D. A., Johnson, D. B., Hu, Y. C., & Jetcheva, J. (1998). A performance comparison of multi-hop wireless ad hoc network routing protocols. proceedings of the MOBICOM 98. 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking (pp. 85–97). Dallas, Texas. https://doi.org/10.1145/288235.288256
  • Burger, C., & Lauer, M. (2018) Cooperative multiple vehicle trajectory planning using miqp [Paper presentation]. 2018 21st International Conference on Intelligent Transportation Systems (ITSC) (pp. 602–607). IEEE. https://doi.org/10.1109/ITSC.2018.8569776
  • Divya, M., Subasree, S., & Sakthivel, N. K. (2015). Performance analysis of efficient energy routing protocols in manet. Procedia Computer Science, 57, 890–897. https://doi.org/10.1016/j.procs.2015.07.504
  • Gomides, T. S., Robson, E., de Souza, A. M., Souza, F. S. H., Villas, L. A., & Guidoni, D. L. (2020). An adaptive and distributed traffic management system using vehicular ad-hoc networks. Computer Communications, 159, 317–330. https://doi.org/10.1016/j.comcom.2020.05.027
  • Guan Lim, K., Lee, C. H., Chin, R. K. Y., Beng Yeo, K., & Teo, K. T. K. (2017). Sumo enhancement for vehicular ad hoc network (vanet) simulation [Paper presentation]. 2017 IEEE 2nd International Conference on Automatic Control and Intelligent Systems (I2CACIS) (pp. 86–91). IEEE.
  • Harsch, C., Festag, A., & Papadimitratos, P. (2007). Secure position-based routing for vanets [Paper presentation]. 2007 IEEE 66th Vehicular Technology Conference (pp. 26–30). IEEE. https://doi.org/10.1109/VETECF.2007.22
  • Khan, S., Sharma, I., Aslam, M., Khan, M. Z., & Khan, S. (2021). Security challenges of location privacy in vanets and state-of-the art solutions: A survey. Future Internet, 13(4), 96. https://doi.org/10.3390/fi13040096
  • Li, F., Song, X., Chen, H., Li, X., & Wang, Y. (2019). Hierarchical routing for vehicular ad hoc networks via reinforcement learning. IEEE Transactions on Vehicular Technology, 68(2), 1852–1865. https://doi.org/10.1109/TVT.2018.2887282
  • Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel and Distributed Systems, 25(12), 3264–3273. https://doi.org/10.1109/TPDS.2013.2297105
  • Li, X., Jia, Z., Zhang, P., Zhang, R., & Wang, H. (2010). Trust-based on-demand multipath routing in mobile ad hoc networks. IET Information Security, 4(4), 212–232. https://doi.org/10.1049/iet-ifs.2009.0140
  • Masood, A., Lakew, D. S., & Cho, S. (2020). Security and privacy challenges in connected vehicular cloud computing. IEEE Communications Surveys & Tutorials, 22(4), 2725–2764. https://doi.org/10.1109/COMST.2020.3012961
  • Meng, T., Wu, F., Yang, Z., Chen, G., & Vasilakos, A. (2015). Spatial reusability-aware routing in multi-hop wireless networks. IEEE Transactions on Computers, 65(1), 244–255.
  • Naumov, V., Baumann, R., & Gross, T. (2006). An evaluation of intervehicle ad hoc networks based on realistic vehicular traces. Proceedings of the 7th ACM International Symposium on Mobile Ad Hoc Networking and Computing (pp. 108–119).
  • Pal, R., Ghosh, A., Kumar, R., Galwankar, S., Kumar Paul, S., Pal, S., Sinha, D., Jaiswal, A. K., Moscote-Salazar, L. R., & Agrawal, A. (2019). Public health crisis of road traffic accidents in india: Risk factor assessment and recommendations on prevention on the behalf of the academy of family physicians of india. Journal of Family Medicine and Primary Care, 8(3), 775–783. https://doi.org/10.4103/jfmpc.jfmpc_214_18
  • Rizwan Ghori, M., Sadiq, A. S., & Ghani, A. (2018). Vanet routing protocols: review, implementation and analysis. Journal of Physics: Conference Series, 1049, 012064. https://doi.org/10.1088/1742-6596/1049/1/012064
  • Royer, E. M., & Toh, C. K. (1999). A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications, 6(2):46–55. https://doi.org/10.1109/98.760423
  • Shastri, A., Dadhich, R., & Poonia, R. C. (2011). Performance analysis of on-demand routing protocols for vehicular ad-hoc networks. International Journal of Wireless & Mobile Networks, 3(4), 103–111. https://doi.org/10.5121/ijwmn.2011.3407
  • Silva, A., Reza, N., & Oliveira, A. (2019). Improvement and performance evaluation of gpsr-based routing techniques for vehicular ad hoc networks. IEEE Access, 7, 21722–21733. https://doi.org/10.1109/ACCESS.2019.2898776
  • Taleb, T., Sakhaee, E., Jamalipour, A., Hashimoto, K., Kato, N., & Nemoto, Y. (2007). A stable routing protocol to support its services in vanet networks. IEEE Transactions on Vehicular Technology, 56(6), 3337–3347. https://doi.org/10.1109/TVT.2007.906873
  • Thakur, A., Mishra, R. C., Codeca, L., & Härri, J. (2017). Towards multimodal mobility simulation of c-its: The monaco sumo traffic scenario [Paper presentation]. 2017 IEEE Vehicular Networking Conference (VNC) (pp. 97–100). IEEE.
  • Wang, J., Jiang, C., Han, Z., Ren, Y., & Hanzo, L. (2018). Internet of vehicles: Sensing-aided transportation information collection and diffusion. IEEE Transactions on Vehicular Technology, 67(5), 3813–3825. https://doi.org/10.1109/TVT.2018.2796443
  • Xiong, W., & Li, Q. Q. (2015). Performance evaluation of data disseminations for vehicular ad hoc networks in highway scenarios. The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 37, 1015–1020.
  • Youssef, M., Ibrahim, M., Abdelatif, M., Chen, L., & Vasilakos, A. V. (2014). Routing metrics of cognitive radio networks: A survey. IEEE Communications Surveys & Tutorials, 16(1), 92–109. https://doi.org/10.1109/SURV.2013.082713.00184
  • Zheng, R., & Kravets, R. (2003). On-demand power management for ad hoc networks [Paper presentation]. IEEE INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No. 03CH37428) (Vol. 1, pp. 481–491. IEEE.