Next Article in Journal
Detection of Movement Events of Long-Track Speed Skating Using Wearable Inertial Sensors
Next Article in Special Issue
Privacy-Preserving and Lightweight Selective Aggregation with Fault-Tolerance for Edge Computing-Enhanced IoT
Previous Article in Journal
Review of Weed Detection Methods Based on Computer Vision
Previous Article in Special Issue
Privacy-Preserving IoT Data Aggregation Based on Blockchain and Homomorphic Encryption
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Channel Allocation for Connected Vehicles in Internet of Things Services

by
Ahmed Abdulhakim Al-Absi
1,
Mohammed Abdulhakim Al-Absi
2,
Mangal Sain
3,* and
Hoon Jae Lee
3,*
1
Department of Smart Computing, Kyungdong University, 46 4-gil, Bongpo, Gosung, Gangwon-do 24764, Korea
2
Department of Ubiquitous IT, Graduate School, Dongseo University, 47 Jurye-ro, Sasang-gu, Busan 47011, Korea
3
Division of Information and Communication Engineering, Dongseo University, 47 Jurye-ro, Sasang-gu, Busan 47011, Korea
*
Authors to whom correspondence should be addressed.
Sensors 2021, 21(11), 3646; https://doi.org/10.3390/s21113646
Submission received: 9 April 2021 / Revised: 8 May 2021 / Accepted: 8 May 2021 / Published: 24 May 2021
(This article belongs to the Special Issue Data Security and Privacy in the IoT)

Abstract

:
Based on the existing Internet of Vehicles communication protocol and multi-channel allocation strategy, this paper studies the key issues with vehicle communication. First, the traffic volume is relatively large which depends on the environment (city, highway, and rural). When many vehicles need to communicate, the communication is prone to collision. Secondly, because the traditional multi-channel allocation method divides the time into control time slots and transmission time slots when there are few vehicles, it will cause waste of channels, also when there are more vehicles, the channels will not be enough for more vehicles. However, to maximize the system throughput, the existing model Enhanced Non-Cooperative Cognitive division Multiple Access (ENCCMA) performs amazingly well by connected the Cognitive Radio with Frequency Division Multiple Access (FDMA) and Time Division Multiple Access (TDMA) for a multi-channel vehicular network.However, this model induces Medium Access Control (MAC) overhead and does not consider the performance evaluation in various environmental conditions.Therefore, this paper proposes a Distributed Medium Channel Allocation (DMCA) strategy, by dividing the control time slot into an appointmentand a safety period in the shared channel network. SIMITS simulator was used for experiment evaluation in terms of throughput, collision, and successful packet transmission. However, the outcome shows that our method significantly improved the channel utilizationand reduced the occurrence of communication overhead.

1. Introduction

The growth trend of global Internet of Things applications is obvious, and it is currently in a period of strategic opportunities before the industrial explosion [1]. There are multiple assets in the consumer space that benefit from connectivity. Lights and air purifiers can be turned off according to the occupancy of the room. Window shutters can be automatically closed based on weather conditions and occasions. Energy and other resource consumption can be fully utilized based on usage patterns and forecasts. Due to the overlapping nature of application scenarios, different vertical fields have similar use cases. For Instanece, smart factory, logistics and transportation, public equipment, oil and gas, insurance, agriculturem, health service, Environmental monitoring, smart city, smat building, drones, andconnected car..ect (Figure 1). According to the latest McKinsey report, the global IoT market is expected to reach USD 11.1 trillion in 2025 [2], which means that the Internet of Things will likely represent more than 11% of the global economy and the future IoT market has unlimited potential. The rise of an industry is not only the demand of the market but also the synchronization of capital accumulation and technology. The development of the Internet of Things in Korea in the future is immeasurable, but it is currently limited by technology and security issues and has not yet entered a stage of rapid development. It is undeniable that IoT development is the future trend, so in the IoT industry, what opportunities can we grasp? What are the common IoT mobile application development types? The smart home is no stranger to everyone. It is mainly to connect the product and the user through the app, which can realize the control, appointment, linkage, and other functions of the smart device. At present, the more popular products of the smart home include smart door locks, smart curtains, smart lighting, smart security, smart home appliances, and other solutions and supporting products. Shared bicycles and car services belong to the Internet of Vehicles [3], with supporting products such as shared bicycle Bluetooth locks, car tire pressure monitoring, and smart parking. Through wearable devices, the perception of human body signs, statistics of users’ heart rate, exercise steps, and other information, combined with the function of big data analysis, to make intelligent and accurate judgments and services for users, will undoubtedly become a fast-paced immediate need. Environmental monitoring, as people’s living standards are getting higher and higher, people are paying more and more attention to health and environmental protection. We can combine Bluetooth to make an app that monitors the environment’s Pollution Monitoring (PM) value, temperature, humidity, etc. in real-time [4]. However, if it exceeds the limit, it will send an alarm message to the app and prompt the user to prepare for prevention. It is also a very marketable product. Industrial buildings, with the rapid development of society, urban management has become increasingly important. If you can use the Internet of Things, how much labor and financial costs will this save! For example, sensors can be installed on buildings to maintain and repair buildings and monitor safety by sensing temperature and humidity, which is also very helpful for building safety [5]. Connect everything and apply technical architecture as the cornerstone, the Internet of Things will be the next outlet of the Internet, and the related application technology architecture cannot be ignored. The realization of products requires technology as the cornerstone. Common application technology architectures are mainly divided into the following three types. Two-party communication architecture, the mobile app communicates with the smart device directly. This two-party communication architecture requires a custom communication protocol between the mobile app and the smart device. The data of the smart device is directly reported to the client, and then the client’s control instructions for the device are directly sent to the smart device [6]. The current communication protocol supports two methods based on Bluetooth and Socket under Wi-Fi. Three-party communication architecture, smart devices, business servers, and clients. This three-party communication architecture needs to implement a custom communication protocol between the smart device and the business server [7]. A stable connection channel is established between the smart device and the business server through Socket, and data reporting and command control are realized through remote connections. The three-party communication framework also has Wi-Fi and GPRS mode and Bluetooth modes. Wi-Fi and General Packet Radio Service (GPRS) mode: When the clientsare controlling the smart device, it will send instructions to the business server via Hypertext Transfer Protocol (HTTP) or Socket protocol. After receiving the instruction, the server sends the instruction to the smart device, and the smart device receives the instruction and makes feedback, report the information to the business end through User Datagram Protocol (UDP) or Transmission Control Protocol (TCP), and the business end receives the feedback data and sends it to the client for display.
Bluetooth mode: The smart device establishes a connection channel with the client through the Bluetooth or Beacon protocol. The smart device reports data to the client through the connection channel. The client submits the data to the business server through HTTP or socket, and the business server performs analysis and processing, sends the data to the client for display, and the user can send instructions to the smart device through the data display on the client to control the device. Figure 2 shows the IoT layer architecture.
As concerns about the environment and sustainability are becoming more and more important to potential customers, the automotive industry is more inclined to electric vehicles than ever before. Today, automakers are also integrating connectivity and autonomous driving components in their vehicles to reduce travel time and improve the safety of drivers, passengers, vehicles, and the entire transportation system. However, from the perspective of the technological development path, smart cars are divided into three developments connected vehicles (CVs) [8], autonomous vehicles (AVs) [9], and electric vehicles (EVs) [10]. However, in this article, we are focus on connected vehicles. With the continuous increase in the number of connected vehicles, the traditional vehicular ad hoc networks (VANETs) are developed with the development of the Internet of Vehicles (IoV). In the autonomous electric vehicles environment [11], a new emerging application is found for enhancing traffic safety which can be categorized as a real-time system. Existing vehicle-to-vehicle safety systems and the new cooperative systems together withthe use of wireless data communication between vehicles helps in decreasing the number of accidents on the roads in the world i.e., before deadlines the messages are transmitted [12]. Moreover, in a wireless communication system, the requirements for high accuracy and low delay are imposed. For instance, lane departure warning messages combine assistance with emergency vehicle routing. In a traffic safety system, even after the delivery of information is correct, but later the deadline in the real-time communication system, not only unusable but can also have major consequences. This problem is pointed out in [13,14]. In most cases, the need for dedicated network architectures directly supports V2V communication when very low delays are required by traffic safety applications. For V2V ad-hoc communication in high-speed vehicular network environments, the IEEE 802.11p standard is meant, which states amongst other things that numerous data/packet exchanges within 50 milliseconds of time frame must be completed.
The original IEEE 802.11, meant for WLAN [15], contains two drawbacks within its medium access control (MAC) technique and carrier-sense multiple access (CSMA); which may cause unbounded delays before channel access and collisions on the channel. On the shared communication channel, the MAC protocol determines who has the correct data/packet to send next. In CSMA, the node will first know if a channel is free for a particular period, then the node will pass data/packets directly with the suggestion that the next node could have performed the same action, as an outcome in a collision on the channel. So due to the risk of the channel becoming occupied a node can experience very long channel delays. The whole IEEE 802.11 family uses CSMA, and it is a wired counterpart IEEE 802.3 Ethernet. Because of its direct implementation of the standard that results in affordable equipment, both WLAN and ethernet are successful. Because of this, WLANs and the ethernet are frequently applied to other domains than they are designed for. Even though CSMA is unsuitable because of the unbounded channel access delays for real-time V2V communication, ethernet has performed its way communication scene as there are many real-time systems are found [16]. By introducing more network equipment, the problems with the MAC protocol can be solved here, like switches and routers, and thereby the number of competing nodes on the shared channel is reduced, i.e., breaking down collision domains. But there is no such easy solution in the wireless domain because the wireless channel must be shared by all users. An interferer can easily confuse a geographical area when applying the CSMA algorithm in the wireless domain, although there is no real-time traffic, and the nodes in that area will delay their access. Since no access will occur if an activity is detected on the channel a wireless CSMA system is thus more susceptible to interference. The IEEE 802.11p is also called a dedicated short-range communication (DSRC) and is meant for VANETs [17]. Currently, DSRC is the only standard that supports direct V2V communication [18]. The original DSRC standard was a more application-specific standard, containing the entire protocol stack with (PHY) layers, MAC, and application layers found in Europe, Japan, and Korea. DSRC is used for hotspot communications such as electronic toll collection systems. PHY and its functions in 802.11p have been used in several articles [19,20,21]. System reliability (error probability) is mainly affected by PHY; However, if we cannot access the channel, we cannot take advantage of PHY. Although VANET cannot support deadlines in real-time, VANET uses CSMA as its MAC method. There are arguments that the CSMA problem is more evident under higher network load, and a traffic smoothing function that keeps the data traffic at an acceptable level can be introduced. In the centralized control network for restricted geographic areas, traffic facilitation [22] has been used. Due to its high dynamic characteristics and low latency requirements, VANETis not a geographically restricted area and cannot be predictable by a central controller.
The average delay can be reduced by traffic smoothing, but the main problem is with an unbounded worst-case delay which remains. While using CSMA [23], the issue with potentially access delays of an unbounded channel could be the use of self-organized time-division multiple access (STDMA), which is a decentralized, and yet predictable, MAC protocol with a limited channel access delay, making it fit for real-time ad-hoc vehicular networks [24]. In the system called automatic identification system, the STDMA algorithm is already in commercial use where it focuses on collision avoidance between vehicles [25].
In a VANET it is very important to reach the channel in a predictable time where the IEEE 802.11p medium access cannot guarantee that the channel will be accessed before the limited time has elapsed [26,27,28]. However, extensive investigations research has been conducted and the output showed that new MAC diagrams need to be designed for radio propagation in different environmental conditions, to maximize system throughput, reduce collisions, and use bandwidth more efficiently [29,30]. MAC designs future should consider these specifications when designing an effective MAC for VANET.
The contributions of this research work are as follows:
  • This work proposes an ideal access mechanism that considers the optimum target functionality of all traffic.
  • This work presents two algorithms with distributed MAC for channel allocation.
  • This model maximizes the throughput and reduces the overhead successfully compared with the existed model.
  • The proposed model considered varied environments such as city, highway, and rural areas.
The paper is organized as follows: The literature review is discussed in Section 2. The proposed distribution medium for channel allocation is described in Section 3. Experimental results are presented in the penultimate section. At the last, the conclusion and future work is presented in the last section.

2. Literature Review

A VANET is a wireless mobile communication network [31]. However, in this paper we have introduced work in VANET channel allocation in conditions of high density and mobility under different environments. In [32] an adaptive multichannel MAC protocol called dynamic interval division multi-channel MAC has been proposed. Enables full use and adaptation of CCH and SCH duration depending on the real-time traffic load. According to the different types of frameworks, DID-MMAC divided the CCHI into three phases, SAP, BP, and PRP. Moreover, they developed a distributed algorithm that can calculate and determine the duration of the PRP communication. The authors in [33] examined the problem of throughput maximization of multiple access units and multi-channel opportunistic spectrum access networks. To solve an efficient solution design problem in an unknown and dynamic environment, the authors characterize the optimization issue as a cooperative game, justifying that this is a potential structured game. To solve the issue of scarcity spectrum, in [34] the authors divided the cognitive radio technology VANET (CR-VANET) into two stages: HCR-VANET and LCR-VANET and design the corresponding system problem model according to different scenarios to maximize the throughput. Because the communication capacity of the main vehicle (Leader) is limited, the authors in [35] propose a distributed network where each vehicle determines its speed only by contacting a short-distance vehicle. To improve VANET reliability and delay, a V2V resource allocation method based on C-V2X technology, the authors idea in [36] is that V2V communication between vehicles based on V2X cellular technology eliminates competitive latency and facilitates long-distance communication where the problem with optimizing resource allocation for cellular eNodeBs is choosing the best receiver for V2V correlation identification and appropriate channel assignment to reduce overall latency. In [37], the authors’ objectives are to get the throughput to the maximum of the whole system and solve the channel allocation issue in multi-channel cognitive vehicular networks. They suggested three effective algorithms to show that the issue is a non-linear integer programming NP-hard problem. In [38], the main problem with cellular V2V resource allocation is how to appropriately allocate V2V user spectrum resources and broadcast opportunities to improve network performance without causing significant interference with cell phone users [39]. The model [40] allows mobile phone users to specify how to operate the cellular or V2V link to establish the transmission [41]. MAC Protocol (IEEE 802.11p) is a combination of CSMA/CAwhich is widely used to access the network or the internet [42]. The enhanced distributed channel access is an update of the IEEE 802.11a to improve the system performance and provide QoS [43]. Moreover, the same connection is required for all applications of an intelligent transport system. Therefore, applications of traffic safety required connecting with real-time which most data packages must be delivered successfully within a certain period [26,27,28,44].Routing protocols are needed for V2V communications. At the MAC layer, a routing metric combines retransmission counts and hop counts. MAC layer is recommended with consideration of delay reduction and link quality. A cross-layer R-AOMDV routing protocol that is based on the new transmitting metric, is considered to make use of benefits of multi-path routing protocol, such as reduction of route detection frequency. In [45], a new logical model is constructed to derive MAC and application-level reliability metrics of IEEE 802.11 established one-dimensional (1-D) VANETs in highways, which include packet reception ratio, packet reception probability, awareness probability, and t-window reliability. The evaluation of point-to-point reception possibility the metrics derivation starts. The impact of concurrent transmissions and terminal problem coverage area is computed. The recommended facilities effect analysis of distance application-level analysis and DSRC fading channel. The systematic model takes non-saturated message arrival interval, the model takes IEEE 802.11 MAC, 1-D highway geometry, and Nakagami fading channel. The recommended model is verified/validated by extensive simulations.In [46], the doppler spectrum in wideband V2V communication channels. The authors examine the influence of mobile and stationary scattering clusters. In channel in which they simulate the model is an urban canyon oncoming environment. The author’s developed equal-delay contours in the context of geometry-based stochastic channel models (GSCMs), for accurate modeling of the location of both stationary and moving, scatters in vehicular environments. Then, they use the developed model to simulate the taps’ doppler spectra. numeric results prove that the doppler power spectra produced using the presented model are close to the outcomes took from measurements of V2V channels in an urban oncoming environment.Distributed rate control algorithm (DRCV) [47] is a congestion control algorithm exactly considered for VANETs. To make sure the channel is free for safety-critical, messages are given different priority levels. The rate of the less significant messages, such as decreases as the used bandwidth increases position update. To increase the packet delivery ratio by 15%, however, the author compared DRCV against no method of congestion control. Several technologies have been developed with CR [48,49,50] which is involved in exploration spectrum [51,52,53] and access of dynamic spectrum [54,55,56]. However, in the process of searching for solutions that provide better performance than the traditional proposals, these approaches are applied to the design of MAC mechanisms. In [57], the authors proposed a MAC protocol (enhanced non-cooperative cognitive division multiple access or ENCCMA) that utilizes cognitive radio technology. To maximize the system throughput, they connected the cognitive radio (CR) with FDMA and TDMA and designed MAC for a multi-channel vehicular network. Compared to the latest models, ENCCMA performs amazingly well. However, this model induces MAC overhead and does not consider the performance evaluation in various environmental conditions. However, the performance of the proposed model is evaluated in terms of throughput, collision, and successful transmission. The overall result shows that our method significantly improved the channel throughput and reduce the communication overhead.

3. Distributed Medium for Channel Allocation

A VANET contains the characteristics of wireless ad-hoc networks, which make communication between vehicles, and communication between vehicles and roadside infrastructure. Channel allocation problems and channel access problems are the main differences between different MAC mechanisms. The channel allocation problem is mainly responsible for allocating corresponding communication channels for different vehicle nodes and eliminating the conflicts between communication links caused by channel switching; the access control problem is mainly responsible for solving the timing conflicts when different vehicle nodes access the channel. In the traditional single-channel MAC protocol, all nodes share a channel for transmission. In the vehicle environment, due to many vehicle nodes and roadside infrastructure, the single-channel allocation mode will greatly limit the network throughput. Therefore, the multi-channel allocation method is adopted on the Internet of Vehicles. Nodes can use multiple channels, and vehicles can work on different channels for data transmission, which can improve network throughput.
Here, we propose an uncomplicated, efficient, unshared, and shared channel for vehicular networks. This model aims to maximize system throughput and reduce MAC collisions (overhead). The list of notations and symbols used in this paper are given in Table 1.
  • Un-Shared Channel
Assume that T x is the set of channels for vehicle x . This technology frequently dedicates channels to vehicles to maximize network throughput. On each channel assignment iteration, each vehicle x computes the throughput gain if the optimum channel is set with the following condition:
y x = a r g m a x y T z l x , y ,
This productivity gain can be calculated as:
δ C x = S C x z C x q = [ 1 ( 1 l x y x ) y T x ( 1 l x y ) ] [ 1 y T x ( 1 l x y ) ] = l x y x y T x ( 1 l x y )
Algorithm 1 Unshared Channel
Step 1. Input set of accessible channel T z = { 1 , 2 , 3 , , T } & T x = for x = 1 , 2 , 3 , , R vehicles
Step 2. For x = 1 ; x < = R ; R + +
Step 3. y x = argmax y T z l x , y .
Step 4. If ( T x = ) then
Step 5. Obtain δ C x = C x z C x q , where C x q and C x z are the throughputs before and after channel allocation y x .
Step 6. Else
Step 7. Obtain δ C x = l xy x .
Step 8. End If
Step 9. End For
Step 10. x = argmax x δ C x .
Step 11. Allocate channel y x to vehicle x .
Step 12. Update T z = T z / y x .
Step 13. If T z is empty, terminate the process.
Step 14. Else, go to step 2.
It can be seen in the Equation (2) that T x , y T x ( 1 l x y ) tends to zero if the T x increases. δ C x will decrease with each iteration of the allocation.
  • Shared Channel
The channel allocation model consists of two steps. First, to calculate the channel allocation information for a single vehicle. Second, it then deals with multi-user channel allocation by assigning channels assigned to specific vehicles to other vehicles.
Determines the optimum channel available to the user based on productivity gain requirements. Users do not share channels here; users enter the channel during a specified period and leave the channel so that other users can access it. However, this bandwidth cannot be used efficiently. This is because the channels are not shared. To solve this problem, we present a novel MAC distribution for VANET environments as shown:
δ C x T , b ( y ) = ( 1 1 T ) ( 1 D ) l x y ( o T x l ¯ x o ) ( 1 o T S l ¯ x o ) n = 1 T [ l ¯ x n y ( m = 1 , m n T l x m y ) ]
Algorithm 2 Shared Channel
Step 1. Input set of assigned channels vehicles T x = for x = 1 , 2 , 3 , , R and D o
Step 2. Execute Algorithm 1 to get channel allocated for a single vehicle.
Step 3. Let the set of channels that are shared by j vehicles be P j and F y be the group of vehicles which share channel y and set F y T = F y   y = 1 , 2 , 3 , , T .
Step 4. Process = 1 ; o = 1 ; UpdateOvd = 0 .
Step 5. While Process = 1 do
Step 6. Obtain the set of channels P o shared by o vehicles
Step 7.  For y = 1 ; y | P o | ; y + +
Step 8.   For j = 1 ; j R ; J + +
Step 9.    If j F y then
Step 10.      δ C j o , b ( y ) = 0 .
Step 11.   Else
Step 12.     User j computes δ C j o , b ( y ) considering that channel y is assigned to vehicle j .
Step 13.   End If
Step 14.    End For
Step 15.    j y = arg max j δ C j o , b ( y ) .
Step 16.  End For
Step 17.  j y = arg max y δ C j y o , b ( y ) .
Step 18. If δ C j o , b ( y j ) ϵ and UpdateOvd = 1 then
Step 19.  Set Process = 0 .
Step 20.  Go to step 35.
Step 21. End If
Step 22. If δ C j o , b ( y j ) > ϵ then
Step 23.  Provisionally allocate channel y j to vehicle j , i.e., update F y j T = F y j { j } .
Step 24.  Compute A and D .
Step 25.  If | D D o | > ϵ D then
Step 26.    Set : Process = 1 .
Step 27.    Return to Step 7 using the updated D o = D .
Step 28.  Else
Step 29.   Update F y j = F y j T (i.e., allocate channel y j to vehicle j ),
compute A & D o with F y j , & update P o .
Step 30.   Update UpdateOvd = 0 .
Step 31.  End If.
Step 32. End If.
Step 33. Return to step 7.
Step 34.   o = o + 1 .
Step 35. End While
Usually, one does not need many channels to achieve maximum throughput. Assuming each vehicle has spectrum access with a probability of 0.8, and the return earned by a qualified vehicle with three dedicated channels is greater than 1 ( 1 0.8 ) 3 = 0.992 , which is rated at a maximum throughput of less than 1%. We can calculate the set of channels assigned to each vehicle using Equation (3) to calculate the throughput.
  • Contention window computation
Contention window A is computed to reduce the probability of a collision between vehicles. There is a trade-off between MAC protocol overhead and collision potential, and it is affected by A . That is, the smaller the value of A , the higher the collision probability, but less than the MAC load, vice versa. Each vehicle chooses some equal time to pull back. As a result, the probability of a first collision increases as the number of vehicles involved decreases the higher the probability of a collision.
Let L u be the probability of the first collision. Consider the constraint L u ϵ L , where ϵ L defines the trade-off between management overheads and collision probability to locate the contention window A . Given the presence of r vehicles in the contention stage, we evaluate L u as a function of A . Without losing generality, let us consider the back-off time of r vehicles as g 1 g 2 g 3 g r . Assuming, r vehicle is present in the contention stage, the conditional probability of the 1st collision can be indicated as:
L u ( r ) = y = 2 r L ( y v e h i c l e s c o l l i d e ) = y = 2 r x = 0 A 2 U r y ( 1 A ) y ( A x 1 A ) r y
As each term in double addition indicates the collision probability of y collision when determining back-off value concerning x . However, the probability of the first collision can be calculated as:
L u = r = 2 R L u ( r ) L { r v e h i c l e c o n t e n d }
where L { r v e h i c l e c o n t e n d } is the probability that r vehicles will participate in the contention stage, and L u ( r ) is calculated using Equation (4). To evaluate L u , we conclude L { r v e h i c l e c o n t e n d } .
We suggest a distributed medium access control that divides time into an identical time of length δ s . The total amount of time the user stays in x th   R S U range is obtained as:
N x = 2 K x l δ s
The N th time slot when the user in a range of g t h   R S U is obtained as follows:
B ( x , N ) = h = 0 x 1 N x + N ,   N { 1 , ,   N x }
where N 0 = 0. The set of time slots in x th   R S U for timeline representation is N x = { B ( x ,   1 ) ,   ,   B ( x ,   M x ) } . The communication optimal problem of users considered as a finite-horizon sequential quality specifies a problem. The time/iteration of the user is:
n = = x X N x = x X   { B ( x , 1 ) , . ,   B ( x , N x ) }
where represents the set of all slots within the x th range, and the method m M = [ 0 ,   M ] represents the effective size of the transmitted data packet. If we represent the number of users in x th   R S U coverage range as v V x = { 1 , ,   V ,   x } then g + v e G x = { z x ( v ) : v V x } .
The user has two possible states at any modes ( m ,   g + v e ) , that can be represented as:
a A = { 0 , 1 }
where states a = 1 indicates the user has agreed to send the request, and a = 0 indicates that the user does not approve the sent request.
The cost incurred at mode ( m ,   g + v e ) with instance a in the time slot n N x in the x th coverage area is:
b n ( m ,   g + v e , a ) = a z x   n N x
For example, when the user leaves the x th coverage area B ( X ,   N x + 1 ) , the overhead occurs for the user because the transmission packet is not complete. The packet transmission can be computed as:
b ^ B ( X , N x + 1 ) ( m , g + v e ) = r ( m ) ,
where r ( m ) 0 is the non-abbreviated parameter of m with r ( 0 ) 0 , which is related to the QoS of the application. Thus, the transmission costs resulting from the subscriber include two things.First, the cost of communication for each time slot in Equation (8). Second, in Equation (9) the overhead occurs after being out of the x th coverage range. The possibility of transitional mode ( ( m ¯ ,   g + v e ¯ ) | ( m ,   g + v e ) ,   a ) is the probability that the network will be in mode ( m ¯ ,   g + v e ¯ ) if sates a is obtained at mode ( m ,   g + v e ) at time slot n M . However, the transmission from g + v e to g + v e = is not a specified by m but specified by time n , so we have:
g n ( ( m ¯ ,   g + v e ¯ ) | ( m ,   g + v e ) ,   a ) = g n ( ( m ¯ ) | ( m , g + v e ) , a ) g n ( g + v e = |   g + v e )
With state a = 1 , we obtain:
g n ( m ¯ | ( m ,   g + v e ) ,   1 ) = { g + v e , i f   m ¯ = [ m d n δ n p a c k e t ] , 1 g + v e , i f   m ¯ = m , 0 , O t h e r w i s e ,
where [ y ] + = m a x { 0 , y } . The first and second cases show positive and negative data transfer, respectively. With states m = 0 , so we obtain:
g n ( m ¯ | ( m ,   g + v e ) , 0 ) = { 0 ,         i f   m =   m , 1 ,       O t h e r w i s e ,
where the remaining packets are not resized to be transmitted. In later subsection the derivation of g x ( g + v e = |   g + v e ) is discussed.
Let Δ n :   M G x K be the optimal QoS connection for the subscriber under the specified mode ( m , g + v e ) at slot time n N x in the x th coverage area. The objective functionnow expresses as QoS as ( Δ n ( m , g + v e ) ,     m M , g + v e G x , n N x x X ) . We consider D a realistic set of D . The time slot n can be performed as ( m n D ,   g n + v e , D ) if D is used. The participantsaim at reducing the cost and satisfying objective function as a problem of improvement:
m i n D D Y D ( M ,   g 1 + v e ) [ x = 1 X [ k = 1 N x b B ( x , N ) ( m B   ( x , N ) , D   g g ( x , N ) + v e , D ,   Δ B ( x , N ) ( m B ( x , N ) D ,   g B ( x , N ) + v e , D ) ) ] + b ^ B ( x , N x + 1 ) ( m B ( x , N x + 1 ) ,   D   g B ( x , N x + 1 )   ) + v e , D ] ,
where Y ( D ,   g 1 + v e ) is the likelihood with honor to probability distribution by function D with mode ( M ,   g 1 + v e ) at slottime n = B ( 1 , 1 ) = 1 .
Let us consider that there is only one   R S U and the user arrival of α is considered and not known the traffic pattern. The transitionprobability of g + v e is obtained as:
g n ( g + v e |   g + v e ) = g n ( g   ( v ¯ ) | g ( v ) ) = g n ( v ¯ | v ) = { ( α δ n ) v ¯ v + c n + 1 ( v ¯ v + c n + 1 ) ! β n ( v ) ,                                               i f   v c n + 1   v ¯   V   , 0 ,                                                                                                           O t h e r w i s e ,
where β n ( v ) = i = 0 V v + c n + 1 ( α δ n ) i i ! is the function of normalization since g + v e is a reduction function of v , and there is one-to-one assignment among g + v e and v as shows in the first two in Equation (11) and the third equality depicts the probability with v ¯ v + c n + 1 arrival because of the Poisson process and c n + 1 displacement is inevitable for instance n + 1 . v ¯ is bordered by the upper V and lower limited by v c n + 1 0 when there is no subscriber arrival.
Given the problem of RSU = { 1 } Equation (10) we can simplify it as follows:
m i n D D Y D , ( M ,   g 1 + v e ) [ n = 1 N b n ( ( m n D ,   g + v e , D ,   Δ n ( m n D ,   g n + v e , D ) ) ) + k ^ M + 1 ( m n + 1 D ,   g n + 1 + v e , D ) ]
Let l n ( m ,   g + v e ) be the minimum cost where the users sometimes must pay from time to time N + 1 when the coverage range is in mode ( m ,   g + v e ) before deciding time slot n N . The optimization of minimum entire cost at various modes for n N is as follows:
l n ( m ,   g + v e ) = m i n a A { γ n ( m ,   g + v e ,   a ) }
where:
γ n ( m ,   g + v e ,   a ) = b n ( m ,   g + v e ,   a ) + m ¯ ϵ M g + v e ,   ϵ G g n ( ( m ¯ ,   g + v e ) |   ( m ¯ ,   g + v e ) ,   o ) l n + 1 ( m ¯ ,   g + v e )
= o u + g + v e G g n ( g + v e |   g + v e ) [ o g + v e l n + 1 ( [ m ¯ d n δ n p a c k e t ] ,   g + v e ) + ( 1 o g + v e ) l n + 1 ( m ,   g + v e ) ]
Equation (16) gives the actual and projected future cost of choosing o for the remaining time slots of the coverage area. Using Equations (10)–(12) and (17) computes directly Equation (16). For example, the interval n = N + 1 , we possess the limiting factor as follows:
l n + 1 ( m ,   g + v e ) = b ^ n + 1 ( m ,   g + v e ) = r ( m )
However, for γ n ( m ,   g + v e ,   a ) ,   n N , the value is calculated as follows:
γ n ( m ,   g + v e ,   a ) = a u + j = 0 V c + n n + 1 ( α δ n ) j j ! β n ( v )   [ a g + v e l n + 1 ( [ m d n δ n p a c k e t ] ,   z ( v + j c n + 1 ) ) + ( 1 a g + v e ) l n + 1 ( m ,   z ( v + j c n + 1 ) ) ]
where v = z 1 ( g + v e ) is the density of vehicles in the coverage area of R S U . Using Equation (11), the result followed immediately by computing Equation (15). However, the packet size m must be minimal to be sent at a lower cost l n ( m ,   g + v e ) which can be confirmed if l n ( m ,   g + v e ) the parameter is not less than/equal to the previous one in m ,   g + v e G ,   n N . Therefore, the optimal target function D is achieve as follows:
D = ( Δ n ( m ,   g + v e ) ) ,   m M ,   g + v e G ,   n N ,
where:
Δ n ( m ,   g + v e ) = arg min a A { γ n ( m ,   g + v e ,   a ) } ,
However, the solution of problem Equation (17) is the objective parameter D . In the next section an experimental study is carried out to evaluate the performance of the existing model over the proposed model.

4. Results

Experiments were conducted on a 64-bit I-5 processor with 32GB RAM, windows 10. The SIMITS simulator [57] tool is used for experimental evaluation. SIMITS is a software communication in the field of the intelligent transport system (IST), allow us to measure the performance of different MAC (RR-Aloha, Slotted-Aloha, and ENCCMA) and change the parameters (number of vehicles). The proposed model and the existing model are written in a C# object-oriented programming language using Visual Studio framework 4.5, 2012. In this experiment, vehicle speed varies at 20 per frame, and stationary vehicles of 30, 60, and 90. The performance of city, highway, and rural environments is calculated in both DMCA and ENCCMA. For simulating and modeling the C.H.R [58,59,60,61,62,63,64] environmental conditions, we considered the parameters presented in [65]. Table 2 is illustrating the evaluation simulation parameters. The simulation parameter being considered for evaluation is shown in Table 3.

4.1. Throughput, Data Transmission, and Collision Performance of the DMCA Model

An experiment is performed to check the performance of DMCA and ENCCMA, considering the processing speed of each channel in city, highway, and rural areas with different vehicle densities. In Figure 3, compared to ENCCMA, DMCA throughput increases by 17.17%, 10.25%, and 9.26% respectively. Compared to other environments, the average productivity of DMCA in the city environment increases by 12.23%. In Figure 4, compared to ENCCMA, DMCA productivity increases by 15.12%, 19.01%, and 22.93%, using 30, 60, 90 vehicles, respectively. Therefore, compared to ENCCMA, the average productivity of DMCA in highway environments increases by 19.026%. Figure 4 illustrates the processing performance for a rural environment. In Figure 5, compared to ENCCMA, DMCA increased productivity by 17.42%, 41.38%, and 17.17% of varied vehicles 30, 60 and 90, respectively. Compared to the rural environment, the average productivity of DMCA is 25.32% higher than that of the ENCCMA average. Figure 6, considering that there are 30, 60 and 90 vehicles respectively and compared to ENCCMA, DMCA increases the data transmission by 15.58%, 12.06%, and 7.54%, respectively. In Figure 7, compared to ENCCMA, DMCA studies 30, 60 and 90 vehicles and improve the data packets for highway environment by 15.89%, 29.00% and 22.90%, respectively.
Figure 8 illustrates the performance of packet transmission in a rural environment. Looking at 30, 60 and 90 different vehicles in Figure 7, DMCA increases by 24.25%, 20.60%, and 12.62% compared to the ENCCMA. In Figure 9, DMCA provided 30, 60, and 90 vehicles, respectively, resulting in reductions of 65.70%, 27.66%, and 6.3% in data collisions for the city environment. As shown in Figure 10, given that there are 30, 60 and 90 vehicles and compared to ENCCMA, DMCA reduces collisions in the highway environment by 28.77%, 33.81%, and 16.58%, respectively. Figure 11 shows that DMCA reduces the collisions in the rural area by 52.51%, 34.76%, and 9.53% compared to the ENCCMA. The overall results show that DMCA performs well outperforming ENCCMA in different varied vehicles and different environmental conditions. This indicates that the proposed model is adaptable.

4.2. State of the Art Technology Comparison

Table 4 shows the comparison between DMCA with the state-of-the-art technology. To improve the system efficiency, DMCA supports the distribution channel sharing mechanism in V2V environments and helps the system to achieve maximum throughput and minimum overhead. The ENCCMA adopts the enhanced non-cooperative cognitive division multiple access ( ENCCMA ) [57] real-time MAC communication protocol. To provision real-time access, the ENCCMA combines time division multiple access ( TDMA ), frequency division multiple access ( FDMA ), and CR techniques. The ENCCMA medium access control protocol avoids signaling, this aids in enhancing the system’s efficiency. However, ENCCMA did not consider message authentication and security for personal user information. Reference [66] evaluated the performance of transmission of packet data considering different environments. However, they did not consider the movement and the numbers of the vehicles. In [67,68], the author performed an experimental analysis that considers different speeds for collision performance evaluation. However, performance evaluation under other environmental conditions is not considered. Our model considers different environmental conditions with varied density, and speeds considering throughput, collision, and transmission success performance. A comprehensive survey reveals the model’s effectiveness compared to the state-of-the-art technology. Table 5 shows the comparison of resource allocation techniques with our model for the V2X network. However, compared to other existing works, our model is the only scheme uses different environment and significantlymaximize the throughput and minimized the collision. In [69], the RA Scenario system was studied outside the scope in which the network infrastructure allocates resources to vehicles according to the vehicle’s estimated location. The performance of the resource allocation plan is analyzed for unexpected and planned services. In [70], the RA algorithm has been proposed to improve network connectivity. The authors of [70] assessed the performance of the proposed scheme using NS-3. This takes into account road of two-way, four-lane, and randomly 1 km vehicles distributed. The vehicle’s transportation radius is 50 meters, and the driving speed ranges from 20 to 60 km/h with the change of the number of vehicles. In [71], a simulation was performed considering the layout of a 20 m × 500 m road with the base station positioned in the center of the long side. Vehicles are randomly placed on the road and have a random speed from 0 to 100 km/h. In [72], the scheme proposed an optimization problem aimed at reducing computational complexity and maximizing the overall network percentage. The authers in [73] proposed a scheme for communiaton support of V2X in a D2D cellular system. Here, the existing cellular link strategy supported the V2I communication is by a traditional cellular uplink strategy aand V2V communication takes effect through the reuse of D2D communications [74]. An optimization problem was proposed to increase the overall navigation area of the V2I links in the vehicle while meeting the latency of the V2V links requirements.

5. Conclusions

In the traditional single-channel MAC protocol, all nodes share a channel for transmission. In a vehicle-mounted environment, due to the many vehicle nodes and roadside facilities, the single-channel allocation mode will greatly limit the network throughput. Therefore, a multi-channel allocation method is adopted on the Internet of Vehicles. Each node can use multiple channels, and vehicles can work on different channels for data transmission, which can improve network throughput. However, due to the highspeed of vehicle movement, the connection status between the vehicles changes rapidly, the signal is sometimes missing, the communication effect is not ideal, and the channel allocation is particularly difficult. Therefore, a more reasonable channel allocation strategy is needed for this high-speed mobile environment or even Some special places.
The existing proposed MAC protocol ENCCMA utilizes CR technology. The CR connected with FDMA and TDMA to design MAC for multi-channel vehicular networks. Compared to the latest models, ENCCMA performs amazingly well. However, performance evaluation is not considered in various environmental conditions. Extensive research has been conducted that a new MAC needs to be designed for radio propagation in different environmental conditions, to maximize system throughput, reduce collisions, and use bandwidth more efficiently. However, MAC designs future should consider these specifications when designing an effective MAC for VANETs.
This paper proposes a distributed channel allocation strategy, by dividing the control time slot into an appointment period and a safety period. In the appointment period, the time is divided into multiple time slices and allocated to each vehicle. The vehicle belongs to itself. Channel reservations are made within the time slice, which can reduce the occurrence of reservation information collisions. Then when the vehicles are dense and the transmission time slot is not enough for vehicle transmission, the reservation can be made without affecting other vehicle reservations and safety message transmission. Data transmission is carried out regularly, thereby improving channel utilization. By implementing the protocol proposed in this paper in the SIMIT simulator, the outcome shows that our method improved the channel utilization throughput and reduce the collisions. Experiments were performed to evaluate performance in terms of channel utilization, overhead, and successful data transmission, given in a high vehicle congested network. Experiments have shown that the proposed MAC design is adaptable to various environments (city, highway, and rural).
As there are a few challenges for vehicular communication, the future deployment of VANET remains unpredictable. Information dissemination, security the privacy, and Internet integration are the challenges included in it. Efficient wireless communication is the most important key factor; therefore, the employed protocols and mechanism should be robust, reliable, and scalable to numerous vehicles.
VANETs differ from traditional ad hoc networks by possessing not only rapid changes in wireless links but also different network densities. For example, vehicular networks in urban areas are more often to form more dense networks during more traffic. In other words, in less populated rural highways or during the late-night hour the vehicular networks experience more frequent network disconnections. VANET is meant to satisfy a wide range of applications which are ranging from safety to leisure. As an outcome, the routing algorithm must be efficient and capable of adjustable to vehicular network characteristics and applications. Till now, a lot of research has been taken place to focus on an analyzing routing algorithm in many dense networks with the supposition that a typical vehicular network is well-connected. The combination of penetration of vehicles and wireless communication capacity remains poor, so a VANET must be dependent on existing infrastructure supports for large-scale deployment. Though in the future to observe high penetration with lesser infrastructures VANETs are expected more, and for this reason, it is important to regard the disconnected work problem. In VANET the decisive research challenge for developing a reliable and better performing routing protocol is a network disconnection.
Thirdly, low QoS performance. To keep the best QoS for packets forwarding is very important but difficult in urban scenarios. The achievable reasons are given as follows: (1) urban environments are normally large-scale scenarios but the communication distance from a source to its destination may be very large, (2) global QoS of candidate routing paths are not so easy to be known by a source vehicle, so in largescale networks, the routing exploration processes are always based on local traffic information with random characteristics, which provides an outcome in the end-to-end routes and also contains network-partitioned/congested road segments, (3) the process of packets forwarding can be disturbed by most of the long-established VANET routing protocols lack self-adaptation features and cannot cope with topology changes availably, and (4) verity of communication pairs are normally absent of cooperation and they do not utilize the traversed routing paths, so large number of routing exploration processes are implemented, which may lead in the outcome of redundant overhead and higher transmission delay.
Fourthly, scalability and stability. The most important and necessary step toward the realization of effective vehicular communications is to guarantee a stable and scalable routing mechanism over VANETs. Therefore, the routing paths are disrupted frequently due to varying vehicle mobility and network topologies, and it is also very difficult to ensure their stability. Moreover, in large-size urban environments, the end-to-end node-based or intersection-based source-driven routing paths are not available as they cannot handle the scalability issue.
Therefore, the future work would consider developing an adaptive MAC that incorporates the proposed channel model into the adaptive MAC for better performance.

Author Contributions

A.A.A.-A. and M.A.A.-A. contributed to the main idea and the methodology of the research. M.A.A.-A. designed the experiment, performed the simulations, and wrote the original manuscript. A.A.A.-A., M.S., and H.J.L. contributed significantly to improving the technical and grammatical contents of the manuscript. A.A.A.-A., M.A.A.-A., M.S. and H.J.L. reviewed the manuscript and provided valuable suggestions to further refine the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by Basic Science Research Program through the National siResearch Foundation of Korea(NRF) funded by the Ministry of Education, Science and Technology (grant number: NRF-2016R1D1A1B01011908).

Institutional Review Board Statement

Not Applicable.

Informed Consent Statement

Note Applicable.

Data Availability Statement

Note applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Kostrzewski, M.; Varjan, P.; Gnap, J. Solutions Dedicated to Internal Logistics 4.0. In The Energy Consumption in Refrigerated Warehouses; J.B. Metzler: Stuttgart, Germany, 2019; pp. 243–262. [Google Scholar]
  2. Manyika, J.; Chui, M. By 2025, Internet of Things Applications Could have $11 Trillion Impact; McKinsey Global Institute: San Francisco, CA, USA, 2015. [Google Scholar]
  3. Shen, S.; Wei, Z.-Q.; Sun, L.-J.; Su, Y.-Q.; Wang, R.-C.; Jiang, H.-M. The Shared Bicycle and Its Network—Internet of Shared Bicycle (IoSB): A Review and Survey. Sensors 2018, 18, 2581. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  4. Rodrigues, M.J.; Postolache, O.; Cercas, F. Physiological and Behavior Monitoring Systems for Smart Healthcare Environments: A Review. Sensors 2020, 20, 2186. [Google Scholar] [CrossRef] [Green Version]
  5. Urban Infrastructure: Keeping Economies and People Healthy. Available online: https://theonebrief.com/urban-infrastructure-keeping-economies-and-people-healthy/ (accessed on 15 February 2021).
  6. Tawalbeh, L.; Muheidat, F.; Tawalbeh, M.; Quwaider, M. IoT Privacy and Security: Challenges and Solutions. Appl. Sci. 2020, 10, 4102. [Google Scholar] [CrossRef]
  7. Burhan, M.; Rehman, R.A.; Khan, B.; Kim, B.-S. IoT Elements, Layered Architectures and Security Issues: A Comprehensive Survey. Sensors 2018, 18, 2796. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  8. Masood, A.; Lakew, D.S.; Cho, S. Security and Privacy Challenges in Connected Vehicular Cloud Computing. IEEE Commun. Surv. Tutor. 2020, 22, 2725–2764. [Google Scholar] [CrossRef]
  9. Chen, X.; Xu, B.; Qin, X.; Bian, Y.; Hu, M.; Sun, N. Non-Signalized Intersection Network Management With Connected and Automated Vehicles. IEEE Access 2020, 8, 122065–122077. [Google Scholar] [CrossRef]
  10. Nimalsiri, N.I.; Mediwaththe, C.P.; Ratnam, E.L.; Shaw, M.; Smith, D.B.; Halgamuge, S.K. A Survey of Algorithms for Distributed Charging Control of Electric Vehicles in Smart Grid. IEEE Trans. Intell. Transp. Syst. 2020, 21, 4497–4515. [Google Scholar] [CrossRef] [Green Version]
  11. Chatzikomis, C.; Sorniotti, A.; Gruber, P.; Zanchetta, M.; Willans, D.; Balcombe, B. Comparison of Path Tracking and Torque-Vectoring Controllers for Autonomous Electric Vehicles. IEEE Trans. Intell. Veh. 2018, 3, 559–570. [Google Scholar] [CrossRef] [Green Version]
  12. Thunberg, J.; Lyamin, N.; Sjoberg, K.; Vinel, A. Vehicle-to-Vehicle Communications for Platooning: Safety Analysis. IEEE Netw. Lett. 2019, 1, 168–172. [Google Scholar] [CrossRef]
  13. Bisoy, S.K.; Pattnaik, P.K.; Sain, M.; Jeong, D.-U. A Self-Tuning Congestion Tracking Control for TCP/AQM Network for Single and Multiple Bottleneck Topology. IEEE Access 2021, 9, 27723–27735. [Google Scholar] [CrossRef]
  14. Bilstrup, K.; Uhlemann, E.; Storm, E.G. Medium access control in vehicular networks based-on the upcoming IEEE 802.11p standard. In Proceedings of the 15th World Congress on Intelligent Transport Systems (ITS’08), New York, NY, USA, 20 November 2008; pp. 1–12. [Google Scholar]
  15. Seijo, O.; Lopez-Fernandez, J.A.; Bernhard, H.-P.; Val, I. Enhanced Timestamping Method for Subnanosecond Time Synchronization in IEEE 802.11 Over WLAN Standard Conditions. IEEE Trans. Ind. Inform. 2020, 16, 5792–5805. [Google Scholar] [CrossRef] [Green Version]
  16. Khairnar, V.D.; Kotecha, K. Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicular Ad-hoc Network Environment. Int. J. Netw. Secur. Its Appl. 2013, 5, 143–170. [Google Scholar] [CrossRef]
  17. Sheikh, M.S.; Liang, J.; Wang, W. A Survey of Security Services, Attacks, and Applications for Vehicular Ad Hoc Networks (VANETs). Sensors 2019, 19, 3589. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  18. Bilstrup, K. A Survey Regarding Wireless Communication Standards Intended Fora High-Speed Vehicle Environment; Technical Report IDE 0712; Halmstad University: Halmstad, Sweden, 2007. [Google Scholar]
  19. Stibor, L.; Zang, Y.; Reumerman, H.-J. Evaluation of communicationdistance of broadcast messages in a vehicular ad-hoc network using IEEE 802.11p. In Proceedings of the IEEE Wireless Communications Networking Conference, Hong Kong, China, 11–15 March 2007; pp. 254–257. [Google Scholar]
  20. Wellen, M.; Westphal, B.; Mahonen, P. Performance evaluation of IEEE 802.11based WLANs in vehicular scenarios. In Proceedings of the IEEE Vehicular Technology, Dublin, Ireland, 22–25 April 2007; pp. 1167–1171. [Google Scholar]
  21. Xiang, W.; Richardson, P.; Guo, J. Introduction andpreliminary experimental results of wireless access for vehicular environments (WAVE) systems. In Proceedings of the International Confrance Mobile and Ubiquitous Systems: Network and Services, San Jose, CA, USA, 22–24 July 2007; pp. 1–8. [Google Scholar]
  22. Qureshi, K.N.; Islam, F.U.; Kaiwartya, O.; Kumar, A.; Lloret, J. Improved Road Segment-Based Geographical Routing Protocol for Vehicular Ad-hoc Networks. Electronics 2020, 9, 1248. [Google Scholar] [CrossRef]
  23. Al-Absi, M.A.; Al-Absi, A.A.; Lee, H.J. Varied density of vehicles under city, highway, rural environments in V2V communication. Int. J. Sens. Netw. 2020, 33, 148–158. [Google Scholar] [CrossRef]
  24. Mohammed, A.A.; Ahmed, A.A.; R’bigui, H.; Lee, H.J. A Novel Throughput andCollision for City Environment in V2V Communication. In Proceedings of the 10th IEEE International Conf ICTC Convergence, Jeju Island, Korea, 16–18 October 2019; pp. 1413–1415. [Google Scholar]
  25. Al-Absi, M.A.; Al-Absi, A.A.; Sain, M.; Lee, H.J. A State of the Art: Future Possibility of 5G with IoT and Other Challenges. In Smart Healthcare Analytics in IoT Enabled Environment; Pattnaik, P., Mohanty, S., Mohanty, S., Eds.; Springer: Cham, Switzerland, 2020; Volume 178, pp. 35–65. [Google Scholar] [CrossRef]
  26. Bilstrup, K.; Uhlemann, E.; Strom, E.G.; Bilstrup, U. On the ability of the 802.11p MAC method and STDMA to support realtime vehicle-to-vehicle communication. EURASIP J. Wirel. Commun. Netw. 2009, 2009, 902414. [Google Scholar]
  27. Bilstrup, K.; Uhlemann, E.; Strom, E.G.; Bilstrup, U. Evaluation of the IEEE 802.11p MAC method for vehicleto-vehicle communication. In Proceedings of the IEEE 68th Vehicular Technology Conference (VTC ’08), Calgary, AB, Canada, 21–24 September 2008; pp. 1–5. [Google Scholar]
  28. Sjoberg-Bilstrup, K.; Uhlemann, E.; Strom, E.G. Scalability issues of the MAC methods STDMA and CSMA of IEEE 802.11p when used in VANETs. In Proceedings of the IEEE International Conference on Communications Workshops (ICC ’10), Capetown, South Africa, 23–27 May 2010; pp. 1–5. [Google Scholar]
  29. Gomez, A.A.; Mecklenbrauker, C.F. Dependability of Decentralized Congestion Control for Varying VANET Density. IEEE Trans. Veh. Technol. 2016, 65, 9153–9167. [Google Scholar] [CrossRef]
  30. Paier, A.; Karedal, J.; Czink, N.; Hofstetter, H.; Dumard, C.; Zemen, T.; Tufvesson, F.; Molisch, A.F.; Mecklenbrauker, C.F. Car-to-car radio channel measurements at 5 GHz: Pathloss, power-delay profile, and delay-Doppler spectrum. In Proceedings of the 2007 4th International Symposium on Wireless Communication Systems, Trondheim, Norway, 16–19 October 2007; pp. 224–228. [Google Scholar]
  31. Research and Innovative Technology Administration (Intelligent Transportation Systems). 2020. Available online: https://www.its.dot.gov/ (accessed on 10 December 2020).
  32. Liu, L.; Xia, W.; Shen, L. An adaptive multi-channelMAC Protocol with Dynamic interval division in vehicular environment. In Proceedings of the 2009 First International Conference on Information Science and Engineering, Nanjing, China, 26–28 December 2009; pp. 2534–2537. [Google Scholar]
  33. Cao, H.; Cai, J. Distributed opportunistic spectrum access in anunknown and dynamic environment: A stochastic learning approach. IEEE Trans. Veh. Technol. 2018, 67, 4454–4465. [Google Scholar] [CrossRef]
  34. Li, R.; Zhu, P. Spectrum Allocation Strategies Basedon QoS in Cognitive Vehicle Networks. IEEE Access 2020, 8, 99922–99933. [Google Scholar] [CrossRef]
  35. Sarker, A.; Qiu, C.; Shen, H. Connectivity Maintenance for Next-Generation Decentralized Vehicle Platoon Networks. IEEE/ACM Trans. Netw. 2020, 28, 1449–1462. [Google Scholar] [CrossRef]
  36. Abbas, F.; Fan, P.; Khan, Z. A Novel Low-Latency V2V Resource Allocation Scheme Based on Cellular V2X Communications. IEEE Trans. Intell. Transp. Syst. 2019, 20, 2185–2197. [Google Scholar] [CrossRef]
  37. You, H.; Ekici, E.; Kremo, H.; Altintas, O. Throughput-Efficient ChannelAllocation Algorithms in Multi-Channel Cognitive Vehicular Networks. IEEE Trans. Wirel. Commun. 2017, 16, 757–770. [Google Scholar]
  38. Hossain, E.; Rasti, M.; Tabassum, H.; Abdelnasser, A. Evolution toward 5G multi-tier cellular wireless networks: An interference management perspective. IEEE Wirel. Commun. 2014, 21, 118–127. [Google Scholar] [CrossRef] [Green Version]
  39. Zeng, F.; Zhang, R.; Cheng, X.; Yang, L. Channel prediction based scheduling fordata dissemination in VANETs. IEEE Commun. Lett. 2017, 21, 1409–1412. [Google Scholar] [CrossRef]
  40. Abboud, K.; Zhuang, W. Stochastic analysis of a single-hop communication link invehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 2014, 5, 2297–2307. [Google Scholar] [CrossRef]
  41. Al-Absi, M.A.; Kamolov, A.; Al-Absi, A.A.; Sain, M.; Lee, H.J. IoT Technology with Marine Environment Protection and Monitoring. In Proceedings of the International Conference on Smart Computing and Cyber Security; Pattnaik, P.K., Sain, M., Al-Absi, A.A., Kumar, P., Eds.; Springer: Singapore, 2021; pp. 81–89. [Google Scholar] [CrossRef]
  42. Zhang, Y.; Ye, M.; Guan, L. QoS-aware Link Scheduling Strategy for Data Transmission in SDVN. arXiv 2021, arXiv:2102.00953. [Google Scholar]
  43. Sehrawat, S.; Bora, R.P.; Harihar, D. Performance analysis of QoS supported by Enhanced Distributed Channel Access (EDCA) mechanism in IEEE 802.11e. IAENG Int. J. Comput. Sci. 2007, 33, 943–948. [Google Scholar]
  44. Manzano, M.; Bravo-Santos, Á.M.; Santiso, E.; Espinosa, F.; Bravo, I.; Garcia, D. Dynamic Cognitive Self-Organized TDMA for Medium Access Control in Real-Time Vehicle to Vehicle Communications. Math. Probl. Eng. 2013, 2013, 1–13. [Google Scholar] [CrossRef]
  45. Ma, X.; Yin, X.; Wilson, M.; Trivedi, K.S. MAC and application-level broadcast reliability in vanets with channel fading. In Proceedings of the 2013 International Conference on Computing, Networking and Communications (ICNC), San Diego, CA, USA, 28–31 January 2013; pp. 756–761. [Google Scholar]
  46. Soltani, M.D.; Alimadadi, M.; Seyedi, Y.; Amindavar, H. Modeling of Doppler spectrum in V2V urban canyon oncoming environment. In Proceedings of the 7’th International Symposium on Telecommunications (IST’2014), Tehran, Iran, 9–11 September 2014; pp. 1155–1160. [Google Scholar]
  47. Drigo, M.; Zhang, W.; Baldessari, R.; Le, L.; Festag, A.; Zorzi, M. Distributed rate control algorithm for VANETs (DRCV). In Proceedings of the Sixth ACM International Workshop on Underwater Networks—WUWNet ’11, Berkeley, CA, USA, 3 November 2009; pp. 119–120. [Google Scholar] [CrossRef]
  48. Mitola, J.; Maguire, G. Cognitive radio: Making software radios more personal. IEEE Wirel. Commun. 1999, 6, 13–18. [Google Scholar] [CrossRef] [Green Version]
  49. Di Felice, M.; Chowdhury, K.R.; Bononi, L. Analyzing the potential of cooperative Cognitive Radio technology on inter-vehicle communication. 2010 IFIP Wirel. Days 2010, 1–6. [Google Scholar] [CrossRef]
  50. Chung, S.-E.; Yoo, J.; Kim, C.-K. A cognitive MAC for VANET based on the WAVE systems. In Proceedings of the 11th International Conference on (ICACT ’09), Dublin, Ireland, 1 February 2009; pp. 41–46. [Google Scholar]
  51. Gräfling, S.; Mähönen, P.; Riihijärvi, J. Performance evaluation of IEEE 1609 WAVE and IEEE 802.11p for vehicular communications. In Proceedings of the 2010 Second International Conference on Ubiquitous and Future Networks (ICUFN), Jeju, Korea, 16–18 June 2010; pp. 344–348. [Google Scholar]
  52. Krishna, P.V.; Misra, S.; Obaidat, M.S.; Saritha, V. Virtual Backoff Algorithm: An Enhancement to 802.11 Medium-Access Control to Improve the Performance of Wireless Networks. IEEE Trans. Veh. Technol. 2010, 59, 1068–1075. [Google Scholar] [CrossRef]
  53. Roberts, L.G. ALOHA packet system with and without slots and capture. ACM SIGCOMM Comput. Commun. Rev. 1975, 5, 28–42. [Google Scholar] [CrossRef]
  54. Hossain, E.; Niyato, D.; Han, Z. Dynamic Spectrum Access and Management in Cognitive Radio Networks; Cambridge University Press: Cambridge, UK, 2009. [Google Scholar]
  55. Yuan, Y.; Bahl, P.; Chandra, R.; Moscibroda, T.; Wu, Y. Allocating dynamic time-spectrum blocks in cognitive radio networks. In Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc ’07), Montreal, QC, Canada, 9–14 September 2007; pp. 130–139. [Google Scholar]
  56. Parsapoor, M.; Bilstrup, U. Imperialist competitive algorithm for DSA in cognitive radio networks. In Proceedings of the 8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM ’12), Shanghai, China, 21–23 September 2012; pp. 1–4. [Google Scholar]
  57. Manzano, M.; Espinosa, F.; Bravo-Santos, Á.M.; Gardel-Vicente, A. Cognitive Self-Scheduled Mechanism forAccess Control in Noisy Vehicular Ad Hoc Networks. Mathemarical Probl. Eng. 2015, 2015, 354292. [Google Scholar]
  58. Lee, J.; Al-Absi, M.A.; Al-Absi, A.A. Performance Enriching Channel Allocation Algorithm for Vehicle-to-Vehicle City, Highway and Rural Network. Sensors 2019, 19, 3283. [Google Scholar] [CrossRef] [Green Version]
  59. Al-Absi, M.A.; Lee, H.J.; Al-Absi, A.A. A Secure Enhanced Non-Cooperative Cognitive Division Multiple Access for Vehicle-to-Vehicle Communication. Sensors 2020, 20, 1000. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  60. Mohammed, A.A.; Ahmed, A.A.; Kim, T.; Lee, H.J. An Environmental Channel Throughput and Radio Propagation Modeling for Vehicle-to-Vehicle Communication. Int. J. Distrib. Sens. Netw. 2018, 14, 1–10. [Google Scholar]
  61. Mohammed, A.A.; Ahmed, A.A.; Lee, H.J. V2V communication modeling for environmental channel throughput and radio propagation. In Proceedings of the 8th IEEE International Conference on ICTC Convergence, Jeju Island, Korea, 18–20 October 2017; pp. 507–512. [Google Scholar]
  62. Mohammed, A.A.; Ahmed, A.A.; Kang, Y.J.; Lee, H.J. Obstacles Effects on Signal Attenuation in Line of Sight for Different Environments in V2V. In Proceedings of the 20th International Conference on Advanced Communication Technology (ICACT), Chuncheon-si, Korea, 11–14 February 2018; pp. 17–20. [Google Scholar]
  63. Mohammed, A.A.; Ahmed, A.A.; Lee, H.J. Performance Analysis for City, Highway and Rural Area in Vehicle-to-Vehicle Network. In Proceedings of the 8th IEEE International Conference on ICTC Convergence, Jeju Island, Korea, 18–20 October 2017. [Google Scholar]
  64. Mohammed, A.A.; Ahmed, A.A.; Lee, H.J. Comparison between DSRC and other Short-Range Wireless Communication Technologies. In Proceedings of the 2020 22nd International Conference on Advanced Communication Technology (ICACT) Phoenix Park, PyeongChang, Korea, 16–19 February 2020; pp. 1–5. [Google Scholar]
  65. Bilgin, B.E.; Gungor, V.C. Performance Comparison of IEEE 802.11p and IEEE 802.11b for Vehicle-to-Vehicle Communications in Highway, Rural, and Urban Areas. Int. J. Veh. Technol. 2013, 2013, 1–10. [Google Scholar] [CrossRef]
  66. Bazzi, A.; Zanella, A.; Masini, B.M. An OFDMA-Based MAC Protocol for Next-Generation VANETs. IEEE Trans. Veh. Technol. 2015, 64, 4088–4100. [Google Scholar] [CrossRef]
  67. Ferreira, N.F.G.C.; Fonseca, J.A.G. Improving safety message delivery through RSU’s coordination in vehicular networks. In Proceedings of theFactory Communication Systems (WFCS), Palma de Mallorca, Spain, 27–29 May 2015; pp. 1–8. [Google Scholar]
  68. Chang, C.-Y.; Yen, H.-C.; Deng, D.-J. V2V QoS Guaranteed Channel Access in IEEE 802.11p VANETs. Veh. Technol. IEEE Trans. 2015, 13, 5–17. [Google Scholar] [CrossRef]
  69. Meng, Y.; Dong, Y.; Liu, X.; Zhao, Y. An Interference-Aware Resource Allocation Scheme for Connectivity Improvement in Vehicular Networks. IEEE Access 2018, 6, 51319–51328. [Google Scholar] [CrossRef]
  70. Zhang, R.; Cheng, X.; Yao, Q.; Wang, C.-X.; Yang, Y.; Jiao, B. Interference Graph-Based Resource-Sharing Schemes for Vehicular Networks. IEEE Trans. Veh. Technol. 2013, 62, 4028–4039. [Google Scholar] [CrossRef] [Green Version]
  71. Lin, F.; Zhou, Y.; Pau, G.; Collotta, M. Optimization-Oriented Resource Allocation Management for Vehicular Fog Computing. IEEE Access 2018, 6, 69294–69303. [Google Scholar] [CrossRef]
  72. Sun, W.; Strom, E.G.; Brannstrom, F.; Sou, K.C.; Sui, Y. Radio Resource Management for D2D-Based V2V Communication. IEEE Trans. Veh. Technol. 2015, 65, 6636–6650. [Google Scholar] [CrossRef] [Green Version]
  73. Wang, R.; Wu, J.; Yan, J. Resource Allocation for D2D-Enabled Communications in Vehicle Platooning. IEEE Access 2018, 6, 50526–50537. [Google Scholar] [CrossRef]
  74. Liang, L.; Li, G.Y.; Xu, W. Resource Allocation for D2D-Enabled Vehicular Communications. IEEE Trans. Commun. 2017, 65, 3186–3197. [Google Scholar] [CrossRef]
  75. Sahin, T.; Boban, M. Radio Resource Allocation for Reliable Out-of-Coverage V2V Communications. In Proceedings of the 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), Porto, Portugal, 3–6 June 2018; pp. 1–5. [Google Scholar]
  76. Zhang, S.; Hou, Y.; Xu, X.; Tao, X. Resource allocation in D2D-based V2V communication for maximizing the number of concurrent transmissions. In Proceedings of the 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Valencia, Spain, 4–7 September 2016; pp. 1–6. [Google Scholar]
  77. Guo, C.; Liang, L.; Li, G.Y. Resource Allocation for Low-Latency Vehicular Communications: An Effective Capacity Perspective. IEEE J. Sel. Areas Commun. 2019, 37, 905–917. [Google Scholar] [CrossRef]
  78. Lin, C.-C.; Deng, D.-J.; Yao, C.-C. Resource Allocation in Vehicular Cloud Computing Systems With Heterogeneous Vehicles and Roadside Units. IEEE Internet Things J. 2017, 5, 3692–3700. [Google Scholar] [CrossRef]
  79. Noor-A-Rahim, M.; Ali, G.M.N.; Guan, Y.L.; Ayalew, B.; Chong, P.H.J.; Pesch, D. Dirk, Broadcast performance analysis and improvements of the LTE-V2V autonomous mode at road intersection. IEEE Trans. Veh. Technol. 2019, 68, 1. [Google Scholar] [CrossRef]
  80. Yang, W.; Zhang, R.; Chen, C.; Cheng, X. Secrecy-Based Resource Allocation for Vehicular Communication Networks with Outdated CSI. In Proceedings of the 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), Toronto, ON, Canada, 24–27 September 2017; pp. 1–5. [Google Scholar]
  81. Ahmed, K.J.; Lee, M.J. Secure Resource Allocation for LTE-Based V2X Service. IEEE Trans. Veh. Technol. 2018, 67, 11324–11331. [Google Scholar] [CrossRef]
  82. Meng, Y.; Dong, Y.; Wu, C.; Liu, X. A Low-Cost Resource Re-Allocation Scheme for Increasing the Number of Guaranteed Services in Resource-Limited Vehicular Networks. Sensors 2018, 18, 3846. [Google Scholar] [CrossRef] [Green Version]
  83. Hung, S.-C.; Zhang, X.; Festag, A.; Chen, K.-C.; Fettweis, G. An Efficient Radio Resource Re-Allocation Scheme for Delay Guaranteed Vehicle-to-Vehicle Network. In Proceedings of the 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall), Montreal, QC, Canada, 18–21 September 2016; pp. 1–6. [Google Scholar]
  84. González, A.; Franchi, N.; Fettweis, G. A feasibility study of LTE-V2X semi-persistent scheduling for string stable CACC. In Proceedings of the IEEE Wireless Communications and Networking Conference, Marrakesh, Morocco, 15–19 April 2019. [Google Scholar]
  85. Scheuvens, L.; Hobler, T.; Barreto, A.N.; Fettweis, G.P. Wireless Control Communications Co-Design via Application-Adaptive Resource Management. In Proceedings of the 2019 IEEE 2nd 5G World Forum (5GWF), Dresden, Germany, 30 September–2 October 2019; pp. 298–303. [Google Scholar]
  86. Peng, H.; Li, D.; Ye, Q.; Abboud, K.; Zhao, H.; Zhuang, W.; Shen, X. Resource Allocation for Cellular-based Inter-Vehicle Communications in Autonomous Multiplatoons. IEEE Trans. Veh. Technol. 2017, 66, 11249–11263. [Google Scholar] [CrossRef]
Figure 1. IoT application domains.
Figure 1. IoT application domains.
Sensors 21 03646 g001
Figure 2. IoT Layer Architecture.
Figure 2. IoT Layer Architecture.
Sensors 21 03646 g002
Figure 3. Throughput for the city environment.
Figure 3. Throughput for the city environment.
Sensors 21 03646 g003
Figure 4. Throughput for the highway environment.
Figure 4. Throughput for the highway environment.
Sensors 21 03646 g004
Figure 5. Throughput for the rural environment.
Figure 5. Throughput for the rural environment.
Sensors 21 03646 g005
Figure 6. Data transmission for the city environment.
Figure 6. Data transmission for the city environment.
Sensors 21 03646 g006
Figure 7. Data transmission for the highway environment.
Figure 7. Data transmission for the highway environment.
Sensors 21 03646 g007
Figure 8. Data transmission for the rural environment.
Figure 8. Data transmission for the rural environment.
Sensors 21 03646 g008
Figure 9. Data collision for the city environment.
Figure 9. Data collision for the city environment.
Sensors 21 03646 g009
Figure 10. Data collision for highway environment.
Figure 10. Data collision for highway environment.
Sensors 21 03646 g010
Figure 11. Data collision for the rural environment.
Figure 11. Data collision for the rural environment.
Sensors 21 03646 g011
Table 1. Variable Notation.
Table 1. Variable Notation.
NotationMeaning
x Vehicle
C x Throughput Achieved
y Channel
V x Channel   set   allocated   to   vehicle   x
l x y Likelihood   for   channel   y accessibility
1 y V x l x y Likelihood   for   channel   y accessibility for atmost one channel
l x y Likelihood   that   channel   y is not accessible
δ C x Throughput increment
V z Input set of accessible channels
C x z Throughput before channel allocation y x .
C x q Throughput   after   channel   allocation   y x .
y x channel allocation
D MAC Overhead
T Number of vehicles
j Vehicle
P j A   set   of   channels   shared   by   j
F y Group   of   vehicles   who   share   channel   y
P o A   set   of   channels   shared   by   o vehicle
A contention window
l n ( m ,   g + v e ) User minimum pay cost from time to time
g + v e Reduction function of v
T total number of channels in the network
N th time slot
x th   R S U Roadside unit x
g th   R S U Roadside unit after x
M Data packet
Table 2. Evaluation Simulation Parameters.
Table 2. Evaluation Simulation Parameters.
ParametersNetworkMACModulation SchemeMobility BandwidthFrequency ChannelsVehiclesTime SlotsEnvironment
Value10 km × 10 kmENCCMA & DMCA64-QAM20 Per Frame27 Mbps730, 60 & 908 μsRural, city & highway
Table 3. Channel parameters [65].
Table 3. Channel parameters [65].
EnvironmentCityHighwayRural
Path loss1.611.851.79
Shadowing deviation3.43.23.3
Table 4. State-of-the-art-techniques comparison.
Table 4. State-of-the-art-techniques comparison.
DMCA (Ours)ENCCMA MS-ALOHA SLOP EDF-CSMA
EnvironmentC.H.Rflowing vehicles freelyhighway and urban driver intelligent NA
AlgorithmDMCA(NCC-FDMA-TDMA)MS-ALOHAWave-Slotted alohaEDF-CSMA
Vehicle varied DensityYesNoNoNoNo
Simulator usedSIMITSSIMITSVISSIMYES (NA)NS-3
MAC USED802.11p MAC802.11p MAC802.11p MAC802.11p MAC802.11p MAC
MobilityYesYesYesYesYes
Channel sharing availableYesYesNoNoNo
Reference(Ours)[57][66][67][68]
Table 5. Comparison of resource allocation techniques for V2X networks.
Table 5. Comparison of resource allocation techniques for V2X networks.
Use CaseObjectivesMethodRSU/BS AssistedParametersScenarioMobilityReference
Sheared and Un-sheared nodes channelsMaximizing throughput, Minimizing collisionDistributed Medium Channel Allocation (DMCA)yesBandwidthCity, Highway, RoralYesOurs
GenericInterference Minimizing Subpool sensing-based algorithmNoBandwidthUrban grid layoutYes[69]
GenericMaximizing ConnectivityGraph theoryYesBandwidthSingle-Lane HighwayNo[70]
GenericMaximizing throughputGraph theoryYesBandwidthSingle-Lane HighwayYes[71]
GenericMaximizing sum rateHungarian methodYesBandwidth PowerTwo-way urban roadwayYes[72]
GenericMaximizing sum-rate; minimize latencyKarush-Kuhn-Tucker theoryYesBandwidth PowerUrban grid layoutNo[73]
SecurityMaximizing secrecy rateGreedy algorithmYesBandwidthSingle-lane HighwayYes[74]
GenericMaximizing ergodic capacity, reliabilityHungarian methodYesBandwidth PowerMulti-Lane HighwayYes[75]
GenericReliability maximizing Pre-schedulingNoBandwidthSingle-lane HighwayYes[76]
GenericMaximizing concurrent reusesPerron-Frobenius theoryYesBandwidthUrban grid layout; Single-lane HighwayNo[77]
Fog ComputingMaximizing utility modelLangranign algorithmYesBandwidthMulti-RSU networkNo[78]
Basic Safety Message relayinginterference Minimizing Exhaustive search algorithmNoBandwidthIntersectionNo[79]
SecurityMaximizing resource utilizationDynamic semi-persistent methodYesBandwidthHighwayYes[80]
Cloud ComputingMaximizing discount valueSemi-Markov decision processYesComputing resourceUrban areaNo[81]
Vehicle PlatooningMaximizing sum rateWeight matching theoryYesBandwidthSingle-lane HighwayYes[82]
Automated guided vehicleQoS Maximizing Lyapunov optimizationYesBandwidthHighwayYes[83]
Vehicle PlatooningMaximizing service guaranteed usersConflict-Free SPSYesBandwidthHighwayYes[84]
Platooning Vehicle stability Maximizing Application-adaptive algorithmYesBandwidthHighwayYes[85]
multi platooning Vehiclereallocation rate, Minimizing delayLyapunov optimizationYesBandwidth PowerHighwayYes[86]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Al-Absi, A.A.; Al-Absi, M.A.; Sain, M.; Lee, H.J. Channel Allocation for Connected Vehicles in Internet of Things Services. Sensors 2021, 21, 3646. https://doi.org/10.3390/s21113646

AMA Style

Al-Absi AA, Al-Absi MA, Sain M, Lee HJ. Channel Allocation for Connected Vehicles in Internet of Things Services. Sensors. 2021; 21(11):3646. https://doi.org/10.3390/s21113646

Chicago/Turabian Style

Al-Absi, Ahmed Abdulhakim, Mohammed Abdulhakim Al-Absi, Mangal Sain, and Hoon Jae Lee. 2021. "Channel Allocation for Connected Vehicles in Internet of Things Services" Sensors 21, no. 11: 3646. https://doi.org/10.3390/s21113646

APA Style

Al-Absi, A. A., Al-Absi, M. A., Sain, M., & Lee, H. J. (2021). Channel Allocation for Connected Vehicles in Internet of Things Services. Sensors, 21(11), 3646. https://doi.org/10.3390/s21113646

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop