Computer Science ›› 2017, Vol. 44 ›› Issue (10): 117-121.doi: 10.11896/j.issn.1002-137X.2017.10.023

Previous Articles     Next Articles

Research on Cooperative Clustering-based MAC Protocol for Vehicular Ad Hoc Network

YE Xiang, ZHANG Guo-an, JIN Xi-long and CHEN Feng   

  • Online:2018-12-01 Published:2018-12-01

Abstract: Owing to the advancement of wireless communication technologies,vehicular Ad Hoc networks (VANETs) have become an emerging field of research.According to the characteristics of VANET and the strict delay constrains and high reliability requirement of safety messages,we presented a cooperative clustering-based MAC (CCB-MAC) protocol for safety messages.In CCB-MAC,the selected helpers relay the safety message to the nodes that have failed in reception during the broadcast period.In addition,cooperation is conducted in idle slots,without interrupting the normal transmission.Both numerical analysis and simulation results show that the proposed protocol improves the probability of successful packet transmission,reduces the transmission delay and packet loss rate significantly.

Key words: VANET,MAC,Cluster head,Cluster members,Cooperative communication

[1] ZHANG X F,ZHANG G A,JI Y C.Research on Cooperative Transmission Based on Cross-Layer Routing Design in VANET[J].Video Engineering,2014,8(15):140-143.(in Chinese) 张雪飞,章国安,季彦呈.VANET中基于跨层路由设计的协作通信研究[J].电视技术,2014,8(15):140-143.
[2] HE P,YAN B P,LI Z.CM-MAC:A Cluster-Based Multi-Channel MAC Protocol for VANET[J].Journal of Computer Research and Development,2014,51(3):502-510.(in Chinese) 何鹏,阎保平,李志.CM-MAC:一种基于分簇的多信道车载网MAC协议[J].计算机研究与发展,2014,51(3):502-510.
[3] WANG W J,LUO T.The minimum delay relay optimizationbased on nakagami distribution for safety message broadcasting in urban VANET[C]∥Wireless Communication & Networking Conference.2016:1-6.
[4] ZHANG X F,ZHANG G A,JI Y C.Detection Algorithm of Alarm Messages Based on Linear Cooperative Strategy in VAENT[J].Telecommunications Science,2014,30(5):120-125.(in Chinese) 张雪飞,章国安,季彦呈.VANET中基于线性协作策略的预警信息检测算法[J].电信科学,2014,30(5):120-125.
[5] JIN Y H.Research on Media Acess Control Protocol of Vehicular Ad Hoc Network[D].Chongqing:Chongqing Jiaotong University,2010.(in Chinese) 金艳华.车载无线自组织网MAC协议研究[D].重庆:重庆交通大学,2010.
[6] LI S.Research on Vehicular Ad Hoc Network MAC Mechanism for Traffic safety messages[D].Chongqing:Chongqing Jiaotong University,2012.(in Chinese) 李帅.面向交通信息安全传输的车联网MAC机制研究[D].重庆:重庆交通大学,2012.
[7] HALL R,CHIN C.Vehicle sorting for platoon formation:Impacts on highway entry and throughput:UCB-ITS-PRR-2002-7[R].Los Angeles:Hangzhou Dianzi,2002.
[8] ZHANG Y.The Research of Relay Selection and Power Allocation of Cooperative Communication[D].Hangzhou:Hangzhou Dianzi University,2013.(in Chinese) 张玉.协作通信中关于中继选择和功率分配的研究[D].杭州:杭州电子科技大学,2013.
[9] HANG S,XI Z.Clustering-based multichannel MAC protocolsfor QoS provisioning over vehicular ad hoc networks[J].IEEE Transactions on Vehicular Technology,2007,56(6):3309-3323.
[10] DING W,WANG J,LI Y.Time synchronization error and calibration in integrated GPS/INS systems[J].ETRI Journal,2008,0(1):59-67.
[11] YE X,ZHANG G A,CHENG D Y.Research on cooperativeMAC protocol for Vehicular Ad Hoc Network[J].Computer Science,2015,42(11):174-177.(in Chinese) 叶翔,章国安,程黛月.车载自组织网络协作MAC协议研究[J].计算机科学,2015,42(11):174-177.
[12] BHARATI S,BAI F,ZHUANG W H.Effects of time slot rese-rvation in cooperative Ad Hoc MAC for vehicular networks[C]∥2013 IEEE International Conference on Communications (ICC).2013:6371-6375.

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .