Computer Science ›› 2022, Vol. 49 ›› Issue (12): 319-325.doi: 10.11896/jsjkx.220200155

• Computer Network • Previous Articles     Next Articles

Fault Detection Based on Dead Reckoning in VANETs

LIU Jia-xi1,2,3, WU Na1,2, DING Fei1,2   

  1. 1 School of Internet of Things,Nanjing University of Posts and Telecommunication,Nanjing 210003,China
    2 Jiangsu Key Laboratory of Broadband Wireless Communication and Internet of Things,Nanjing 210003,China
    3 State Key Laboratory for Novel Software Technology,Nanjing University,Nanjing 210023,China
  • Received:2022-02-24 Revised:2022-05-13 Published:2022-12-14
  • About author:LIU Jia-xi,born in 1988,Ph.D,lecturer,is a member of China Computer Federation.His main research interests include fault detection and VANETs.DING Fei,born in 1981,Ph.D,associate professor,is a member of China Computer Federation.His main research interests include VANETs,distributed systems,big data modeling and analysis.
  • Supported by:
    Open Project of State Key Laboratory of Novel Software Technology(KFKT2021B21),Foundation of Jiangsu Provincial Double-Innovation Doctor Program(CZ016SC20010),Six Talent Peaks Project of Jiangsu Province(DZXX-008),China Postdoctoral Science Foundation(2019M661900),Jiangsu Postdoctoral Science Foundation,China(2019K026) and Nanjing University of Posts and Telecommunication Startup Foundation(NY219134,NY220028,NY219133).

Abstract: Fault detection is one of the basic components of fault-tolerant system,which can ensure the safe and reliable implementation of applications on vehicular ad hoc networks.However,vehicular ad hoc networks are different from traditional mobile ad hoc networks.On the one hand,vehicles have high-speed mobility and may join or leave the system at any time,which is likely to make the network environment to be changeable.On the other hand,the links between vehicles are often interrupted due to environmental and equipment factors,which is likely to cause message loss.In order to solve the above problems,a hierarchical fault detection method based on dead reckoning is proposed.In this fault detection method,the dead reckoning model is used to predict the transmission time of heartbeat messages,and the roadside unit is considered as a static node to build a hierarchical detection architecture,so as to improve the performance of fault detection in the vehicular ad hoc networks.Using the NS2 to build the si-mulation experimental platform for performance verification,experimental results show that the proposed fault detection method is better than the comparative fault detection method in terms of detection speed,detection accuracy and detection overhead.

Key words: Vehicular ad hoc networks, Fault detection, Dead reckoning, High mobility, Fault tolerance

CLC Number: 

  • TP391
[1]BHOI S,KHILAR P.Self soft fault detection based routing protocol for vehicular ad hoc network in city environment[J].Wireless Networks,2016,22(1),1-21.
[2]KHAN A,ABOLHASAN M,WEI N,et al.A hybrid-fuzzy logic guided genetic algorithm(H-FLGA) approach for resource optimization in 5G VANETs[J].IEEE Transactions on Vehicular Technology,2019,68(7):6964-6974.
[3]ZHAO Z,GUARDALBEN L,KAIMZADEH M,et al.Mobility prediction-assisted over-the-top edge prefetching for hierarchical VANETs[J].IEEE Journal on Selected Areas in Communications,2018,36(8):1786-1801.
[4]CUI J,WEI L,ZHONG H,et al.Edge computing in VANETs-an efficient and privacy-preserving cooperative downloading scheme[J].IEEE Journal on Selected Areas in Communications,2020,38(6):1191-1204.
[5]CAO S,LEE V.A novel adaptive TDMA-based MAC protocol for VANETs[J].IEEE Communications Letters,2018,22(3):614-617.
[6]SINGH R,SALUJA K S.Graphical approach for V2V connectivity enhancement in clustering-based VANET[J].IEEE Wireless Communication Letters,2021,10(6):1217-1221.
[7]PATRA M,MURTHY C.Performance evaluation of jointplacement and sleep scheduling of grid-connected solar powered road side units in vehicular networks[J].IEEE Transactions on Green Communications and Networking,2018,2(4):1197-1209.
[8]XIAO L,LU X,XU D,et al.UAV relay in VANETs against smart jamming with reinforcement learning[J].IEEE Transactions on Vehicular Technology,2018,67(5):4087-4097.
[9]YANG F,HAN J,DING X,et al.Spectral efficiency optimization and interference management for multi-Hop D2D communications in VANETs[J].IEEE Transactions on Vehicular Technology,2020,69(6):6422-6436.
[10]LIN N,FU L,ZHAO L,et al.A novel multimodal collaborative drone-assisted VANET net-working model[J].IEEE Transactions on Wireless Communications,2020,19(7):4919-4933.
[11]CHEN J,WANG Z.Topology control in hybrid VLC/RF vehi-cular ad-hoc network[J].IEEE Transactions on Wireless Communications,2020,19(3):1965-1976.
[12]CHANDRA T,TOUEG S.Unreliable failure detectors for reliable distributed systems[J].Journal of the ACM,1996,43(2):225-267.
[13]CHEN W,TOUEG S,AGUILERA M K.On the quality of ser-vice of failure detectors[J].IEEE Transactions on Computers,2002,51(1):13-32.
[14]BENHAMIDA F Z,CHALLAL Y,KOUDIL M.Adaptive fai-lure detection in low power lossy wireless sensor networks[J].Journal of Network and Computer Applications,2014,45(4):168-180.
[15]ZHANG H,QIAN Z,LIU J,et al.Fault detection and repairing for intelligent connected vehicles based on dynamic bayesian network model[J].IEEE Internet of Things Journal,2018,5(4):2431-2440.
[16]LI F,SONG X,CHEN H,et al.Hierarchical routing for vehicular ad hoc networks via reinforcement learning[J].IEEE Transa-ctions on Vehicular Technology,2019,68(2):1852-1865.
[17]SHAREF T,ALSAQOURl A,ISMAIL M.Vehicular communication ad hoc routing protocols:A survey[J].Journal of Network and Computer Applications,2014,40(1):363-396.
[18]YU N,ZHAN X,ZHAO S,et al.A precise dead reckoning algorithm based on bluetooth and multiple sensors[J].IEEE Internet of Things Journal,2017,5(1):336-351.
[19]CHEN H,LI F,WANG Y.SoundMark:accurate indoor localization via peer-assisted dead reckoning[J].IEEE Internet of Things Journal,2018,5(6):4803-4815.
[20]SOTOMA I,MADEIRA E R.ADAPTATION-Algorithms toadaptive fault monitoring and their implementation on CORBA[C]//Proceedings of 3rd International Symposium on Distributed Objects and Applications.2001:219-228.
[21]FETZER C,RAYNAL M,TRONEL F.An adaptive failure detection protocol[C]//Proceedings of 2001 Pacific Rim International Symposium on Dependable Computing.2001:146-153.
[22]TOMSIC A,SENS P,GARCIA J,et al.2W-FD:A Failure Detector Algorithm with QoS[C]//Proceedings of 2015 IEEE International Parallel and Distributed Proceedingsessing Sympo-sium.2015:85-893.
[23]ALJERI N,ALMULLA M,BOUKERCHE A.An efficient fault detection and diagnosis protocol for vehicular networks[C]//Proceedings of ACM International Symposium on Design &Analysis of Intelligent Vehicular Networks & Applications.2013:23-29.
[24]SALFNER F,LENK M,MALEK M.A survey of online failure prediction methods[J].ACM Computing Surveys,2010,42(3):1-42.
[25]FELBER P,DEFAGO X,GUERRAOUI R,et al.Failure detectors as first class objects[C]//Proceedings of the International Symposium on Distributed Objects and Applications.1999:132-141.
[26]VAN R,MINSKY Y,HAYDEN M.A gossip-style failure detection service[C]//Proceedings of the IFIP International Conference on Distributed Systems Platforms and Open Distributed Proceedings.2009:55-70.
[27]SNYDER S,CARNS P,JENKINS J,et al.A case for epidemic fault detection and group membership in HPC storage systems[C]//Proceedings of International Workshop on Performance Modeling,Benchmarking and Simulation of High Performance Computer Systems.2014:237-248.
[28]CAMBRUZZI E,FARINES J,MACEDO J,et al.An adaptivefailure detection system for vehicular ad-hoc networks[C]//Processing of IEEE Intelligent Vehicles Symposium.2010:603-608.
[29]CHEN H,LI F,WANG Y.Sound mark:accurate Indoor localization via peer-assisted dead reckoning[J].IEEE Internet of Things Journal,2018,5(6):4803-4815.
[30]PASK V.A magnetic ranging-aided dead-reckoning positioning system for pedestrian applications[J].IEEE Transactions on Instrumentation And Measurement,2017,66(5):953-963.
[1] TANG Qing-hua, WANG Mei, TANG Chao-chen, LIU Xin, LIANG Wen. PDR Indoor Positioning Method Based on M2M Encounter Region [J]. Computer Science, 2022, 49(9): 283-287.
[2] CHEN Yan-bing, ZHONG Chao-ran, ZHOU Chao-ran, XUE Ling-yan, HUANG Hai-ping. Design of Cross-domain Authentication Scheme Based on Medical Consortium Chain [J]. Computer Science, 2022, 49(6A): 537-543.
[3] ZHOU Chu-lin, CHEN Jing-dong, HUANG Fan. WiFi-PDR Fusion Indoor Positioning Technology Based on Unscented Particle Filter [J]. Computer Science, 2022, 49(6A): 606-611.
[4] LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728.
[5] WANG Xian-sheng, YAN Ke. Fault Detection and Diagnosis of HVAC System Based on Federated Learning [J]. Computer Science, 2022, 49(12): 74-80.
[6] JI Yu-xiang, HUANG Jian-hua, WANG Zhe, ZHENG Hong, TANG Rui-cong. Improved PBFT Consensus Algorithm Based on Trust Matching [J]. Computer Science, 2021, 48(2): 303-310.
[7] WEN Jin, ZHANG Xing-yu, SHA Chao-feng, LIU Yan-jun. Test Suite Reduction via Submodular Function Maximization [J]. Computer Science, 2021, 48(12): 75-84.
[8] LIU Xin, HUANG Qin-yuan, LI Qiang, RAN Mao-xia, ZHOU Ying, YANG Tian. Fault Detection for Arc Magnet Based on Convolutional Neural Network and Acoustic VibrationImage [J]. Computer Science, 2021, 48(11A): 648-654.
[9] LIU Yun,YIN Chuan-huan,HU Di,ZHAO Tian,LIANG Yu. Communication Satellite Fault Detection Based on Recurrent Neural Network [J]. Computer Science, 2020, 47(2): 227-232.
[10] XIONG Ling, LI Fa-gen, LIU Zhi-cai. Conditional Privacy-preserving Authentication Scheme Based on Blockchain for Vehicular Ad Hoc Networks [J]. Computer Science, 2020, 47(11): 55-59.
[11] ZHOU Wan-kai, LONG Min. Secure Transmission Scheme for Environmental Monitoring Data Based on Blockchain [J]. Computer Science, 2020, 47(1): 315-320.
[12] XIAO Zhen-hua, LIANG Yi-wen, TAN Cheng-yu, ZHOU Wen. Fault Detection Method Based on Immune Homeostasis Mechanism [J]. Computer Science, 2019, 46(8): 337-341.
[13] CHEN Jing, SHU Qiang, XIE Hao-fei. Priority Ranking Method of Test Cases Based on Fault Location [J]. Computer Science, 2019, 46(8): 239-243.
[14] HUANG De-ling,YAN Yu-song,PENG Da-qin. Geographic Routing Protocol Based on Prediction for Urban Vehicular Ad Hoc Networks [J]. Computer Science, 2019, 46(7): 74-80.
[15] WANG Qing-long, QIAO Rui, DUAN Zong-tao. Security Analysis on VANETs Authentication Schemes:CPAV and ABV [J]. Computer Science, 2019, 46(4): 177-182.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!