Delay and Energy Optimized Safety Information Dissemination Scheme in V2I Networks

Full Text (PDF, 664KB), PP.34-51

Views: 0 Downloads: 0


Ramesh B. Koti 1,* Mahabaleshwar S. Kakkasageri 2

1. Electronics and Communication Engineering Department, Gogte Institute of Technology (Autonomous), Belagavi-590002 Karnataka, India

2. Electronics and Communication Engineering Department, Basaveshwar Engineering College (Autonomous), Bagalkot-587102, Karnataka, India

* Corresponding author.


Received: 5 Oct. 2021 / Revised: 1 Nov. 2021 / Accepted: 1 Dec. 2021 / Published: 8 Jun. 2022

Index Terms

V2I, Multi Agent, RSU Agency, Routing node (RN), High quality link, Link Quality Network, Protocol (LQNP), End to End Delay etc


Intelligent Transport System (ITS) is a transport system that uses communicating technologies such as cellular network communication, digital video broadcasting and adhoc wireless communication to link people on the road, vehicles with aim of solving various traffic related issues. Vehicle to infrastructure (V2I) communication is an important research area to develop cooperative self-driving support system using DSRC technology. V2I develops an environment friendly system that also accelerates the fuel efficiency by establishing high quality links between vehicles to roadside infrastructure. It is a system to prevent and help drivers to overlooking or missing the red lights at junctions. V2I system along the road side and intersections continuously transmit the traffic signal information to vehicles by warning the driver about red lights and thus help us to prevent road rule violations. ITS helps to prevent drivers’ oversight about signals right/left turn collision avoidance and timely activation of brake system. In the proposed work we used a three-layer Vehicle to Infrastructure (V2I) network architecture to collect and disseminate the safety information using static and dynamic agents. These methods help us to quickly selecting high quality error free links to forward the data packets. In a highway road scenario with moderate traffic density, the proposed system gives an improved performance in terms of coverage area, lossless transmission and reduced latency. Finally, qualitative comparison is made with present V2I system and found significance improvement in its performance metrics. The outcome of the proposed system improved by 23%, 13%, 15% compared to the existing system in terms of end-to-end delay, communication overhead and energy consumption respectively considering V2I network architecture.

Cite This Paper

Ramesh B. Koti, Mahabaleshwar S. Kakkasageri, "Delay and Energy Optimized Safety Information Dissemination Scheme in V2I Networks", International Journal of Information Technology and Computer Science(IJITCS), Vol.14, No.3, pp.34-51, 2022. DOI:10.5815/ijitcs.2022.03.04


[1]R. Ghebleh, “A comparative classification of information dissemination approaches in vehicular ad hoc networks from distinctive viewpoints: A survey,” Computer Networks, vol. 131, pp. 15–37, 2018.
[2]N. Pothirasan and M. P. Rajasekaran, “Automatic vehicle to vehicle communication and vehicle to infrastructure communication using NRF24L01 module,” 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), Kumaracoil, 2016, pp. 400-405, doi: 10.1109/ICCI- CCT.2016.7987982.
[3]R. Azimi and H. Sajedi, “A decentralized gossip-based approach for data clustering in peer-to-peer networks,” Journal of Parallel and Distributed Computing, vol. 119, pp. 64–80, 2018.
[4]P. Markus, G. Matt and N. Sielen, "Real-time traffic management analyzing V2I communication at the edge of the network," 2018 IEEE International Smart Cities Conference (ISC2), Kansas City, MO, USA, 2018, pp. 1-2, doi: 10.1109/ISC2.2018.8656899.
[5]Kakkasageri, M. and Manvi, Sunil. (2011). “Safety Information Gathering and Dissemination in Vehicular Ad hoc Networks: Cognitive Agent Based Approach”. Wireless Personal Communications. 69. 10.1007/978- 3-642-17878-8-26.
[6]Manvi, Sunil and Kakkasageri, M. and Pitt, Jeremy. (2009). “Multiagent Based Information Dissemination in Vehicular Ad Hoc Networks”, Mobile Information Systems. 5. 363-389. 10.1155/2009/518042.
[7]J. Chen, G. Mao, C. Li and D. Zhang, "A Topological Approach to Secure Message Dissemination in Vehicular Networks," in IEEE Transactions on Intelligent Transportation Systems, vol. 21, no. 1, pp. 135-148, Jan. 2020, doi: 10.1109/TITS.2018.2889746.
[8]Dey, Kakan C. et al. “Vehicle-to-vehicle (V2V) and vehicle-to infrastructure (V2I) communication in a heterogeneous wireless network – Performance evaluation.” Transportation Research Part C-emerging Technologies 68 (2016): 168-184.
[9]R. Azimi, M. Ghayekhloo, M. Ghofrani, H. Sajedi, A novel clustering algorithm based on data transformation approaches, Expert Syst. Appl. 76 (2017) 59–70.
[10]Malik, Rami and Alsattar, H. and Ramli, K.N.Bin and Bahaa, Bilal and Zaidan, A. and Hashim, Zahraa and Ameen, Hussein and Garfan, Salem and Mohammed, Ali and Zaidan, R.. (2019). “Mapping and Deep Analysis of Vehicle-to-Infrastructure Communication Systems: Coherent Taxonomy, Datasets, Evaluation and Performance Measurements, Motivations, Open Challenges, Recommendations, and Methodological Aspects”, IEEE Access. PP. 1-1. 10.1109/ACCESS.2019.2927611.
[11]Li, T.-H., Khandaker, M. R. A., Tariq, F., Wong, K.-K., and Khan, R. T., “Learning the Wireless V2I Channels Using Deep Neural Networks”, <i>arXiv e-prints</i>, 2019.
[12]Paranjothi, Anirudh and Atiquzzaman, Mohammed and Khan, Mohammad Shoeb. (2020). Message Dissemination in Connected Vehicles. 10.1201/9780429329401-7.
[13]Anubhuti Roda, mohindra and Charu Gandhi,” A Secure Cryptography Based Clustering Mechanism for Improving the Data Transmission in MANET “, Walailak J Sci & Tech 2021;18(6):8987.
[14]P.-Y. Chen, S.-M. Cheng, and M.-H. Sung, “Analysis of data dissemination and control in social internet of vehicles,” IEEE Internet of Tings Journal, vol. 5, no. 4, pp. 2466–2477, 2018.
[15]Mudengudi, Shailaja and Kakkasageri, Mahabaleshwar. (2019),” Agent Based Trust Establishment between Vehicle in Vehicular Cloud Networks”. International Journal of Computer Network and Information Security. 11. 29-36. 10.5815/ijcnis.2019.07.05.
[16]Q. Dang and M. Yoo, "Handover Procedure and Algorithm in Vehicle to Infrastructure Visible Light Communication," in IEEE Access, vol. 5, pp. 26466-26475, 2017, doi: 10.1109/ACCESS.2017.2771199.
[17]A.Demba and D. P. F. Möller, "Vehicle-to-Vehicle Communication Technology," 2018 IEEE International Conference on Electro/Information Technology (EIT), Rochester, MI, 2018, pp. 0459-0464, doi: 10.1109/EIT.2018.8500189.
[18]M. Jenkins, D. Duggan and A. Negri, "Towards a connected bicycle to communicate with vehicles and infrastructure: Multimodal alerting interface with Networked Short-Range Transmissions (MAIN-ST)," 2017 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA), Savannah, GA, 2017, pp. 1-3, doi: 10.1109/COGSIMA.2017.7929602.
[19]J. Zhou, D. Tian, Y. Wang, Z. Sheng, X. Duan and V. C. M. Leung, "Reliability-Optimal Cooperative Communication and Computing in Connected Vehicle Systems," in IEEE Transactions on Mobile Computing, vol. 19, no. 5, pp. 1216-1232, 1 May 2020, doi: 10.1109/TMC.2019.2907491.
[20]H. Xiong, Z. Tan, R. Zhang and S. He, "A New Dual Axle Drive Optimization Control Strategy for Electric Vehicles Using Vehicle to-Infrastructure Communications," in IEEE Transactions on Industrial Informatics, vol. 16, no. 4, pp. 2574-2582, April 2020, doi: 10.1109/TII.2019.2944850.
[21]Jiayi Lu, Wenjing Xiao, Enmin Song, Mohammad Mehedi Hassan, Ahmad Almogren, Ayman Altameem, "iAgent: When AI Meets Mobile Agent", Access IEEE, vol. 7, pp. 97032-97040, 2019.
[22]Muhammad AwaisJaved, Nazmus Shaker Nafi, Shakila Basheer, Mariyam Aysha Bivi, Ali Kashif Bashir, "Fog-Assisted Cooperative Protocol for Traffic Message Transmission in Vehicular Networks", Access IEEE, vol. 7, pp. 166148-166156, 2019.
[23]Yongchan Kim, Jongkun Lee, "A secure analysis of vehicular authentication security scheme of RSUs in VANET", Journal of Computer Virology and Hacking Techniques, vol. 12, pp. 145, 2016.
[24]J. Chen, G. Mao, C. Li, A. Zafar and A.Y. Zomaya, "Throughput of infrastructure-based cooperative vehicular networks", IEEE Trans. Intell. Transp. Syst, vol. 18, no. 11, pp. 2964-2979, Nov. 2017.
[25]Leonid Bondarenko, Mykola Masesov, Katerina Buzayeva, Iryna Hurzhii, Oksana Ilienko, Viktor Gnatyuk, "Method of Calculation the Accessibility of the Information and Telecommunication Networks of the Tactical Link of Management", International Journal of Computer Network and Information Security (IJCNIS), Vol.13, No.5, pp.68-78, 2021. DOI: 10.5815/ijcnis.2021.05.06.
[26]Lal Pratap Verma, Varun Kumar Sharma, Mahesh Kumar "New Delay-based Fast Retransmission Policy for CMT-SCTP", International Journal of Intelligent Systems and Applications (IJISA), Vol.10, No.3, pp.59-66, 2018. DOI: 10.5815/ijisa.2018.03.07
[27]S. Ullah, G. Abbas, Z. H. Abbas, M. Waqas and M. Ahmed, "RBOEM: Reduced Broadcast Overhead Scheme for Emergency Message Dissemination in VANETs," in IEEE Access, vol. 8, pp. 175205-175219, 2020, doi: 10.1109/ACCESS.2020.3025212.