Keywords

1 Introduction

The technological development that has seen the world of today affects all areas, particularly the communication area which is experiencing a considerable evolution by the advances of wireless technology which has partially solved the problem of road accidents. Our work is coming in this context. In order to solve the problem of vehicle crashes, researchers think to exploit this technology enabling vehicles to establish direct (or indirect) links between them for being aware of potential critical situations like imminent accident or dangerous obstacles. This enabling technology is represented by VANET (Vehicular Ad hoc NETwork). Indeed, one of the promising applications of these networks is to allow vehicles equipped with specific sensors to detect the immediate environment, and alert drivers of vehicles around early in case of accident risks.

VANET as comfort communication can be made by two means: Periodic Safety Message (Referred in the sequel as Beacon) and Event Driven Message (referred as Emergency Message). Both message types share only one control channel. The Beacon messages are messages about status of sender vehicle. Status information includes position, speed, heading towards, etc \( \ldots \) about the sender. Beacons provide resent or latest information of the sender vehicle to all present vehicles in the network, which help to know the position in the current network and anticipate the movement of vehicles.

Beacon messages are sent antagonistically to neighboring vehicles every 10 s. Emergency Messages are messages sent by a vehicle that detects a potential dangerous situation on the road; this information should be dispersed as alarm or alert to other vehicles pointing out a prospective danger that could affect the incoming vehicles. VANET is a high mobile or volatile network where nodes are kept changing their positions, moving in speed, which means that these vehicles may be get influence, even if they are very far from the danger. They can reach a danger in short time, so a fraction of second should be very important to avoid a danger [5]. Because of the importance of these messages exchanged between vehicles, it is necessary to ensure that these messages attain the largest number of vehicles in a minimum delay. These emergency messages are delivered in broadcasting way, where all the vehicles within the coverage area of the sender should receive the messages. The communication range of sender is not enough, due to the fading effects and attenuation; it hardly reaches a 1000 m (which is the DSRC communication range). Critical information should be received by vehicles, in time, far from the danger for avoiding risks. The prospect of message reception can reach 99% in short distances and can be decreased up to 20% at half of the communication range [7]. Therefore, it is necessary to provide a technique for raising the emergency message reception with high reliability and availability. The dissemination of the emergency messages poses several problems such as collisions, the problem of broadcast storm, problem of the hidden node etc. Several works such as PCBB, CBB, and EMDV... have been proposed to solve the problem of broadcasting emergency messages in VANETs.

2 Related Works

In [2], authors proposed a Dynamic Search-Assisted Broadcast (DSAB) protocol to efficient broadcast of emergency messages in VANETs. It based on controlling dynamically the transmission power to estimate the vehicle density and the use of n-way search mechanism to find the farthest vehicle in VANETs. The problem of this protocol is the choose of one vehicle which is the farthest one to rebroadcast the message because in VANET, vehicles always change their position and the farthest vehicle may do not receive the message, it may become out of range transmission when sending the message or it cannot receive the message because of the channel problems. A Distribution-Adaptive Distance with Channel Quality (DADCQ) protocol for efficient multi-hop broadcast of VANET is presented in [6]. It combines local spatial distribution information and other factors with the distance method heuristic to select rebroadcasting nodes. Authors in [4] presented new distance-aware safety-related message broadcasting algorithm to enhance the propagation distance in the latency time of safety related message broadcasting. It generates the lenghts of backoff times by calculating the distances between the source node and its forwarding node. The farthest forwarding vehicle has the highest probability to forward messages. In [9], authors proposed an algorithm for data dissemination mechanism for motorway environment in VANETs. This protocol is based on an improved K-nearest neighbors prediction to predict the status of the nodes, and on construction of a forwarder set to avoid the broadcast storm problem. Limited Area-Based (LAB) scheme [3] adjusts the size of an area that contains the broadcasting nodes for obtaining a faster propagation time. Authors in [8] presented a counting-based broadcast model of emergency message dissemination in VANETs which is based on counting all possible cases of contention window assignments to all the vehicles simultaneously receiving a broadcast message. In [5], authors proposed Pso Contention Based Broadcast (PCBB) protocol that allows vehicles to increase the reception percentage of emergency information. In this protocol the network must be divided into several segments to help the sender to determine the next forwarder of the emergency message which is the furthest vehicle in the last non-empty segment.

The MIN is the lower bound of the last non-empty segment it calculated using the fitness function [5].

This protocol has a serious problem because the MIN calculation by fitness function is not always correct. In some cases, the MIN is greater than the max, this algorithm can be applied only in dense areas where the number of vehicles is large and the distance between them is small.

In [1], the authors proposed that the reception probability of the broadcast message instantly decreases at a distance greater than 66% of the transmission range, then they choose the forwarder as the node that has a distance equal to 66% of the transmission range.

To resolve the problem of the Protocol PCBB, we tried to apply this algorithm which chooses the node that has a distance equal to 66% of the transmission range of the transmitter as forwarder

When we choose the node 66%, not the max (the farthest), the message takes a great reception time than that of the max. This algorithm does not use segmentation, so the forwarder has not potential nodes, and if the message fails to arrive to the forwarder it will be lost.

Table 1. Value notations table

3 The Proposed Protocol

As a first step in our approach, we will present the EBAM (Efficient Broadcast of Alert Messages) protocol that ensures safe transmission of alert messages. From the disadvantages noted during the study of the protocols proposed in the specialized literature, we were able to identify an approach to avoid some problems detected in these protocols. The approach also assured high reliability avoiding collisions, decreasing the channel load with minimal cost and low response time. EBAM protocol can be used in all areas (dense and sparse networks) contrary to PCBB algorithm which can be applied only in dense areas. (Table 1)

The main idea of our protocol is to transmit the message to the farthest node within the transmission range. This node is defined as a forwarder. If the forwarder does not receive the message we resort to using potential nodes, such as the min of these nodes represents 60% of the farthest node distance.

We choose 60% as a lower bound because in [1] authors suppose that the distance 66% is the most appropriate to increase the reception rate.

Our approach has four steps:

Fig. 1.
figure 1

Case of RSU further than forwarder.

3.1 Preparing to Send

Each node \( n_{i} \) knows the position of its neighbor nodes because of periodic security messages that are transmitted every second (beacon), allowing to calculate the distance between nodes to select the forwarder.

The selection of forwarder inspired from the PCBB protocol, which is the furthest vehicle in the last non-empty segment by using the formula (1):

$$\begin{aligned} F_{i,j} = j {\slash } {\text {max}} (Dist_{i,k}); k \in V_{i} \end{aligned}$$
(1)

The RSU sends its location to all nodes in its transmission range periodically, and each vehicle can calculate the distance between it and the RSU, for deciding which will receive the emergency message (forwarder or the RSU) by using the formula (2):

$$\begin{aligned} Dist_{i,j} = \min (Dist_{i,RSU}, Dist_{i,F_{i,j}}) \end{aligned}$$
(2)

In sparse area, we can found the case when the RSU is within transmission range of node (i) and it is farther than the forwarder as explain in example of Fig. 1. So, each vehicle must check if the RSU is within its transmission range, it will receive the message, else it sends the message to forwarder.

We calculate the min by using formula (3):

$$\begin{aligned} Bmin_{i} = Dist_{i,F_{i,j}} \times 60 \% \end{aligned}$$
(3)

When a vehicle detects an emergency (e.g. accident), it creates an alert message ADV-ALERT, the format of this message is represented in Table 2. The emergency message contains:

Source Identifier. To avoid the problem of broadcast storm, we use this identifier which prevents the sender to retransmit the same message.

Message Identifier. We use this identifier to differentiate messages transmitted by the same sender. If the transmitter detects various accidents, it must send a various emergency messages, and vehicles must differentiate if this message is a new emergency message or it is a broadcast storm problem.

Priority Identifier. This identifier is used to classify the messages according to their importance in order to make it easier for the receiving vehicle to know the importance of the messages.

Forwarder ID. We select the forwarder as the last vehicle in the last non-empty segment to avoid collisions and to transmit the message very quickly.

Transmission Time and Delay. The emergency message requires a short time, and the transmission of the emergency message after this time occupies the channel and loads the network without interest. The sender defines its message transmission time and the delay (Del) of this message.

Position. The absence of characterization of the emergency event causes network load problem and can cause collisions leading to message loss and delay in reception. To solve this problem, the vehicle that detects the event sends the position of that event using GPS.

Min. It is necessary to send the min in the message, for each vehicle that receives this message to know if it is a potential node or not.

Data. The emergency message must contain important data such as:

  • If there are victims or wounded persons.

  • The nature of the urgent case (accident, avalanche...).

Table 2. Format of the emergency message.

If a vehicle detects an event, it checks whether the same location exists in the emergency message table, if so, it does not creates the message, otherwise it creates the message and it adds the location of this event.

The use of the event position can help the emergency vehicles (ambulances) to intervene more quickly.

3.2 The Sending Step

After the creation of the emergency message ADV-ALERT and the selection of the forwarder, the sender broadcasts the message in the network to alert other vehicles about any potential danger.

3.3 Receiving Step

Each vehicle existing in the transmission range of the sender that receives the message ADV-ALERT, checks if it is a potential node by using formula (4):

$$\begin{aligned} S = Dist_{i,j} - Bmin_{j} ; \left\{ \begin{array}{ll} j \in P_{i}, &{} \quad S \geqslant 0 \\ j \in V_{i}, &{} \quad S < 0 \end{array} \right. \end{aligned}$$
(4)

The vehicles running in the last segment (potential nodes) initiate a contention time for waiting the forwarder to transmit a reply by using the formula (5) as explained in the example of Fig. 2.

$$\begin{aligned} CT = tt+ t_{1}+t_{2} + \varepsilon \end{aligned}$$
(5)
Fig. 2.
figure 2

Contention time illustration.

Then they detect the channel if no reply has been transmitted from the forwarder or other vehicles. It means that the forwarder has not received the message, so the first vehicle from the potential vehicles set that transmits the reply is defined as a forwarder. Once the reply is transmitted, the other vehicles stop the transmission to avoid collisions. Figure 3 depicts the receiving step.

Before sending the reply, the forwarder must check if it saved the ADV-ALERT in its emergency message table for sending the reply and for transmitting the ADV-ALERT to its forwarder. As shown in Fig. 4, it must check:

Priority ID: The forwarder checks the importance of the message if it is a big number, it does not save it, if none it checks the other indices (if they are acceptable) it saves the message in the table according to its priority level.

Transmission Time and Delay: In general, the alert message is urgent and it does not take much time. Each vehicle receiving this message must calculate Dm using formula (6). To decide saving the message or not, in its emergency message table for the retransmission, the node uses the formula (7):

$$\begin{aligned} D_{m} = Tr - Te \end{aligned}$$
(6)
$$\begin{aligned} h = Del - D_{m} , \left\{ \begin{array}{ll} m \in T[i], &{} \quad h \geqslant 0 \\ m \not \in T[i], &{} \quad h < 0 \\ \end{array} \right. \end{aligned}$$
(7)
Fig. 3.
figure 3

Alert message reception flowchart.

Fig. 4.
figure 4

Flowchart for checking message saving.

After each 30 s, each vehicle must update its table, the messages that exceed the delay will be deleted.

Source ID and Message ID are used to check if the message is transmitted before or not. If the forwarder found that the ADV-ALERT message has the same Source ID of a message stored in the emergency message table, it should check its message ID: if it found the same message ID then it does not save the message, otherwise the message will be saved.

3.4 Rebroadcasting Steps

After saving the ADV-ALERT in emergency message table, The forwarder must broadcast it in its transmission range to its forwarder and follow the same steps defined previously.

4 Simulation

4.1 Simulation Parameters

The simulation parameters are shown in Table 3.

Table 3. Simulation parameters.

Figure 5 shows the number of messages transmitted, lost and received over the time for the PCBB protocol. We note that only one message is received the rest of messages are lost (the Min is greater than the max) until the end of the simulation.

Figure 6 shows the number of messages transmitted, lost and received over the time for the 66% protocol. It is clear that the number of lost messages is great, only 8 messages among 307 sent messages are received and the rest is lost. This loss is due to the absence of potential nodes.

Figure 7 shows the number of messages transmitted, lost and received over the time for EBAM proposal.

We note that in the proposed protocol the time that the message reach the RSU and the number of messages transmitted is less than in the PCBB and 66% protocols, this is due to the absence of lost messages practically. So the vehicle does not need to retransmit the message. At any time of simulation a packet sent can be not yet received but at the end of simulation all packets sent reached the destination.

Fig. 5.
figure 5

Number of messages transmitted, received and lost in the PCBB protocol.

Fig. 6.
figure 6

Number of messages transmitted, received and lost in the 66% protocol

Fig. 7.
figure 7

Number of messages transmitted, received and lost in EBAM protocol.

Figure 8 shows messages loss rate according to the number of messages transmitted in the three protocols. We note that the messages loss rate in our protocol is approximately zero, and the two other protocols have a great loss rate compared to the EBAM, but the loss rate of the PCBB protocol is greater than in the 66% protocol.

Figure 9 shows the reception delay of alert messages according to the three protocols. We calculate the reception delay of alert message by using the expression (7). From Fig. 9, we note that in EBAM, a message is received after 40.63 s from its transmission, but in the other two protocols the message does not arrive at the RSU (the simulation time is exhausted and the message did not achieve its destination). The loss rate of the three protocols is calculated by (8):

$$\begin{aligned} Msg_{L} =\sum {Msg_{s}} - \sum { Msg_{r}} ; \qquad LR =\frac{ Msg_{L} }{\sum Msg_{s} } \end{aligned}$$
(8)

4.2 Evaluation of Protocol Performance

For evaluating our protocol performance, we tested various scenarios by changing the parameters.

Figure 10 represents the reception rate of the alert messages compared with the number of nodes according to the number of RSUs. In this figure we change the number of nodes and RSUs and the topology; we use, 50, 100, 200, 350 and 500 nodes, with 0, 1 or 2 RSUs in topology of 2000 * 2000 \(({\text {m}}^{2})\).

We remark that the reception rate is almost 20% when nodes broadcast the message between them. When one RSU broadcasts it, the reception rate is increased up to 80%, and in the case where two RSUs broadcast the message, the reception rate reach approximately 100%(the RSUs almost cover all the Topology).

Figure 11 represents the simulation result of reception delay in second compared with the number of nodes. In this scenario we change only the number of nodes we use, 50, 100, 200, 350 and 500 nodes.

Fig. 8.
figure 8

Messages loss in the three protocols

Fig. 9.
figure 9

Reception delay according to three protocols.

Fig. 10.
figure 10

Reception rate with 1 RSU, 2 RSU and without RSU.

Fig. 11.
figure 11

Reception delay according to number of nodes.

Fig. 12.
figure 12

Reception delay vs speed.

The reception delay is decreased with the increase of the number of nodes. This is due to the number of vehicles that transmit the message. When the number of vehicles becomes important, the message takes less reception time.

Figure 12 represent the simulation result of reception delay in second related to the changing in speed. In this figure we change the speed parametre; we test speed of 6, 12, 20, 40 and 100 m/s with fixed number of nodes (100 nodes).

The reception delay decreased up with the increase of speed due to the speeds of the vehicles transmitting the message. When the speed of the vehicles is important the message takes less time to be received.

5 Conclusion

In this paper, we studied the problem of efficient emergency message transmission in VANETs in order to propose a solution respecting dependable communications and specific time constraints of VANET environments. The EBAM proposed protocol showed an appreciable improvement of successfully delivered urgent messages in accordance with the real time constraint. This enhanced result obtained even at high network density and high node velocities is of great importance in order to well-timed reacting to crucial events (Like road accidents) by rescue services.

As a future work, it is desirable to increase the improvement of the proposal, by considering the vehicle directions using GPS.