Computer Science ›› 2021, Vol. 48 ›› Issue (5): 254-262.doi: 10.11896/jsjkx.200700064

• Computer Network • Previous Articles     Next Articles

Performance Analysis Model of 802.11p Based Platooning Communication at Traffic Intersection

XIA Si-yang, WU Qiong, NI Yuan-zhi, WU Gui-lu, LI Zheng-quan   

  1. School of Internet of Things Engineering,Jiangnan University,Wuxi,Jiangsu 214122,China
  • Received:2020-07-09 Revised:2020-10-03 Online:2021-05-15 Published:2021-05-09
  • About author:XIA Si-yang,born in 1996,postgra-duate.His main research interests include VANETs and communication protocols in autonomous driving.(siyangxia@stu.jiangnan.edu.cn)
    WU Qiong,born in 1986,Ph.D,associate professor,master supervisor.His main research interests include autonomous driving communication technology and so on.
  • Supported by:
    National Natural Science Foundation of China(61701197) and Wuxi Science and Technology Development Fund(H20191001).

Abstract: As one of the key technologies of automated driving,platooning strategy has been extensively studied and tested in practice.When platoons pass through the traffic intersection controlled by traffic light,kinetic parameters such as traffic light time,intra/inter-platoon spacing,speed,and moving direction are severely affected.At this time,since the platooning communication connectivity network is complex and variable,the driving stability of platoons is difficult to maintain,thus resulting in that the vehicles in platoons that communicate through 802.11p protocols cannot receive the complete important information within the specified delay limit,which finally leads to road safety issues.To solve this problem,considering the Enhanced Distributed Channel Access (EDCA) mechanism of the 802.11p protocol,which supports data of 4 transmission priorities to access channel,a novel communication performance analysis model for automated driving platoons under traffic intersection scenario is proposed.First,we build a connectivity network of vehicular communication at the traffic intersection and obtain the network communication performance through constructing the platoon moving model.Then,the classic Markov model that describes the 802.11p EDCA mechanism is transformed into a z-domain linear model by utilizing the method of probability generating function,and the platooning communication delay and packet delivery ratio (PDR) analysis model is deduced according to the priority differences of the 4 access categories.Finally,iterative method is used to calculate the platooning communication delay.The simulation results verify the accuracy of the analysis model,and it can be found that when passing through the intersection,the communication delay of platoons is lower than the 100ms specified by the 802.11p protocols and the packet delivery ratio is higher than 0.95,which ensures the timeliness and completeness of the platoon communication.

Key words: 802.11p EDCA, Automated driving, Platooning communication, Traffic intersection

CLC Number: 

  • TP393
[1]MEI J,ZHENG K,ZHAO L,et al.Joint Radio Resource Allocation and Control for Vehicle Platooning in LTE-V2V Network[J].IEEE Transactions on Vehicular Technology,2018,67(12):12218-12230.
[2]WANG R,WU J,YAN J.Resource Allocation for D2D-Enabled Communications in Vehicle Platooning[J].IEEE Access,2018,6:50526-50537.
[3]MARZBANI H,KHAYYAM H,CHING N T,et al.Autonomous Vehicles:Autodriver Algorithm and Vehicle Dynamics[J].IEEE Transactions on Vehicular Technology,2019,68(4):3201-3211.
[4]CHAE H,YI K.Virtual Target-Based Overtaking Decision,Motion Planning,and Control of Autonomous Vehicles[J].IEEE Access,2020,8:51363-51376.
[5]HYUNG J K,JI H Y.Takeover Requests in Simulated Partially Autonomous Vehicles Considering Human Factors[J].IEEE Transactions on Human-Machine Systems,2017,47(5):735-740.
[6]LIU B B,LIU W W,MAO X G,et al.Correctness Verification of Rules for Unmanned Vehicles' Decision System[J].Computer Science,2017,44(4):72-74,113.
[7]OKUYAMA T,GONSALVES T,UPADHAY J.AutonomousDriving System based on Deep Q Learnig[C]//2018 International Conference on Intelligent Autonomous Systems (ICoIAS).2018:201-205.
[8]XU W,ZHOU H,CHENG N,et al.Internetof vehicles in big data era[J].IEEE/CAA Journal of Automatica Sinica,2018,5(1):19-35.
[9]WU Q,LIU H,WANG R,et al.Delay Sensitive TaskOffloading in the 802.11p Based Vehicular Fog Computing Systems[J].IEEE Internet of Things Journal,2020,7(1):773-785.
[10]LIU Y,ZONG C,ZHANG D.Lateral control system for vehicle platoon considering vehicle dynamic characteristics[J].IET Intelligent Transport Systems,2019,13(9):1356-1364.
[11]KIM H J,YANG J H.Takeover Requests in Simulated Partially Autonomous Vehicles Considering Human Factors[J].IEEE Transactions on Human-Machine Systems,2017,47(5):735-740.
[12]NI Y,HE J,CAI L,et al.Data Uploading in Hybrid V2V/V2I Vehicular Networks:Modeling and Cooperative Strategy[J].IEEE Transactions on Vehicular Technology,2018,67(5):4602-4614.
[13]HAN C,DIANATI M,TAFAZOLLI R,et al.Analytical Study of the IEEE 802.11p MAC Sublayer in Vehicular Networks[J].IEEE Transactions on Intelligent Transportation Systems,2012,13(2):873-886.
[14]PENG H,LI D,YE Q,et al.Resource Allocation for Cellular-based Inter-Vehicle Communicationsin Autonomous Multiplatoons[J].IEEE Transactions on Vehicular Technology,2017,66(12):11249-11263.
[15]LIU B,JIA D,LU K,et al.A Joint Control Communication Design for Reliable Vehicle Platooning in Hybrid Traffic[J].IEEE Transactions on Vehicular Technology,2017,66(10):9394-9409.
[16]FENG Y,HE D,GUAN Y.Composite Platoon Trajectory Planning Strategy for Intersection Throughput Maximization[J].IEEE Transactions on Vehicular Technology,2019,68(7):6305-6319.
[17]PENG H,LI D,ABBOUD K,et al.Performance Analysis ofIEEE 802.11p DCF for Multiplatooning Communications With Autonomous Vehicles[J].IEEE Transactions on Vehicular Technology,2017,66(3):2485-2498.
[18]JIA D,LU K,WANG J.A Disturbance-Adaptive Design forVANET Enabled Vehicle Platoon[J].IEEE Transactions on Vehicular Technology,2014,63(2):527-539.
[19]BIANCHI G.Performance Analysis of the IEEE 802.11 Distri-buted Coordination Function[J].IEEE Journal on Selected Areas in Communications,2000,18(3):535-547.
[20]YAO Y,RAO L,LIU X.Performance and Reliability Analysis of IEEE 802.11p Safety Communication in a Highway Environment[J].IEEE Transactions on Vehicular Technology,2013,62(9):4198-4212.
[21]XU K,TIPPER D,QIAN Y,et al.Time-Dependent Performance Analysis of IEEE 802.11p Vehicular Networks[J].IEEE Transactions on Vehicular Technology,2016,65(7):5637-5651.
[22]ZHENG J,WU Q.Performance Modeling and Analysis of the IEEE802.11p EDCA Mechanism for VANET[J].IEEE Transactions on Vehicular Technology 2016,65(4):2673-2689.
[1] LIU Xin, WANG Jun, SONG Qiao-feng, LIU Jia-hao. Collaborative Multicast Proactive Caching Scheme Based on AAE [J]. Computer Science, 2022, 49(9): 260-267.
[2] GUO Peng-jun, ZHANG Jing-zhou, YANG Yuan-fan, YANG Shen-xiang. Study on Wireless Communication Network Architecture and Access Control Algorithm in Aircraft [J]. Computer Science, 2022, 49(9): 268-274.
[3] HU An-xiang, YIN Xiao-kang, ZHU Xiao-ya, LIU Sheng-li. Strcmp-like Function Identification Method Based on Data Flow Feature Matching [J]. Computer Science, 2022, 49(9): 326-332.
[4] JIANG Yang-yang, SONG Li-hua, XING Chang-you, ZHANG Guo-min, ZENG Qing-wei. Belief Driven Attack and Defense Policy Optimization Mechanism in Honeypot Game [J]. Computer Science, 2022, 49(9): 333-339.
[5] WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354.
[6] WANG Xing-wei, XIN Jun-chang, SHAO An-lin, BI Yuan-guo, YI Xiu-shuang. Study on Development Status and Countermeasures of Industrial Intranet in Enterprises [J]. Computer Science, 2022, 49(7): 1-9.
[7] ZHANG Chong-yu, CHEN Yan-ming, LI Wei. Task Offloading Online Algorithm for Data Stream Edge Computing [J]. Computer Science, 2022, 49(7): 263-270.
[8] FEI Xing-rui, XIE Yi. Click Streams Recognition for Web Users Based on HMM-NN [J]. Computer Science, 2022, 49(7): 340-349.
[9] ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362.
[10] WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38.
[11] Ran WANG, Jiang-tian NIE, Yang ZHANG, Kun ZHU. Clustering-based Demand Response for Intelligent Energy Management in 6G-enabled Smart Grids [J]. Computer Science, 2022, 49(6): 44-54.
[12] WEI Hui, CHEN Ze-mao, ZHANG Li-qiang. Anomaly Detection Framework of System Call Trace Based on Sequence and Frequency Patterns [J]. Computer Science, 2022, 49(6): 350-355.
[13] TAO Li-jing, QIU Han, ZHU Jun-hu, LI Hang-tian. Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment [J]. Computer Science, 2022, 49(6A): 480-484.
[14] HE Xi, HE Ke-tai, WANG Jin-shan, LIN Shen-wen, YANG Jing-lin, FENG Yu-chao. Analysis of Bitcoin Entity Transaction Patterns [J]. Computer Science, 2022, 49(6A): 502-507.
[15] GAO Wen-long, ZHOU Tian-yang, ZHU Jun-hu, ZHAO Zi-heng. Network Attack Path Discovery Method Based on Bidirectional Ant Colony Algorithm [J]. Computer Science, 2022, 49(6A): 516-522.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!