Abstract
In urban vehicular sensor networks, vehicles equipped with onboard sensors monitor some area, and the result can be shared to neighbor vehicles to correct their own sensing data. However, due to the frequent change of vehicle topology compared to the wireless sensor network, it is required for a vehicle to discover neighboring vehicles. Therefore, efficient neighbor discovery algorithm should be designed for vehicular sensor networks. In this paper, two efficient tree-based neighbor discovery algorithms in vehicular sensor networks are proposed and analyzed. After suggesting detailed scenario and its system model, we show that the expected value of neighbor discovery delay has different characteristics depending on neighbor discovery algorithms. An interesting observation of our result is that M-binary tree-based neighbor discovery shows better performance than M-ary tree-based neighbor discovery in the parking lot scenario, which is a counterintuitive result. We analyze why such result appears extensively.
1. Introduction
In recent years, wireless sensor networks (WSNs) [1], especially urban vehicular sensor networks [2], have inspired research and industry interests in various applications such as traffic engineering, environment monitoring, and civic and homeland security. A typical sensor network includes hundreds to thousands of sensor nodes, each of which is equipped with various kinds of sensors. In general, sensor nodes have stronger resource constraints than nodes in typical wireless ad hoc network, for example, battery power, memory, computation capability, and communication technology. However, vehicular sensor networks have different characteristics to typical sensor network. First, there is no battery constraint. Therefore, in vehicular sensor networks, communication between vehicles with less delay is one of the most important issues, compared to typical wireless sensor networks.
Especially, since vehicular sensor networks may have no infrastructure controlling the network environment, it is required for vehicles to autoconfigure the environment for establishing a communication network. For example, if sensor-occupied vehicles arrive at the same area, each vehicle would not know which other vehicles are in its transmission range, implying that the vehicle needs to discover its neighboring vehicles. Since information obtained during the discovery process is required by many network protocols, neighbor discovery of each vehicle in the vehicular sensor network is an important configuration process.
Currently, explicit neighbor discovery may not be performed in typical ad hoc networks [3], a superset of vehicular sensor network. That is, it is assumed that all transmissions are listened to by neighboring nodes in the medium access control layer level. This assumption is not suitable for practical vehicular sensor network implementation, because when many vehicles are in the one-hop transmission range, the delay of neighbor discovery increases dramatically. In addition, the delayed result for neighbor discovery process can be outdated since the neighboring vehicles move too fast to depart the transmission range. Therefore, an efficient neighbor discovery scheme for vehicular sensor networks is required, implying that average delay minimization of neighbor discovery schemes in vehicular sensor networks is an important problem.
Recently, numerous studies on neighbor discovery for wireless networks have been proposed in the literature [4– 6]. These studies mainly focus on applications of mobile robot networks, and the IEEE 802.11 network provides robot intercommunication, which is very similar to vehicle-to-vehicle communications in vehicular sensor networks. However, these approaches cannot be applied into the vehicular sensor networks without modification, because if there are many groups of vehicles, the performance of the network may be reduced significantly due to interference and collisions. Furthermore, the network load cannot be controlled by a group of nodes in general [5].
In Santos et al. work [4], an adaptive TDMA protocol for mobile autonomous nodes is proposed. This protocol is an adaptive TDMA protocol with new self-configuration capabilities according to the current number of active group members. This protocol operates over IEEE 802.11 networks in infrastructure and adhoc mode. However, it does not support a dynamic number of nodes. The improved protocol proposed in [5] has dynamic reconfiguration of the TDMA round, which supports changes of the number of nodes. But it is not suitable to assumption, because each node in a group maintains a state machine and the whole member information of the group.
Arai et al. [6] proposed an adaptive reservation-TDMA (AR-TRMA) MAC protocol, which focuses on real-time communication among nodes in a heterogeneous environment by using a reservation mechanism. This protocol supports dynamic time slot allocation schemes during node intercommunication. Furthermore, this protocol considers the packet collision avoidance method in the joining procedure, using the battery voltage level and ID of each node. However, when a packet collision occurs, the protocol uses fixed-size minislots to resolve the collision. This scheme suffers from lack of scalability, because it may not support dynamic situations of vehicular sensor network which include a situation that a large number of nodes and groups move around frequently.
With this motivation, we have studied tree-based neighbor discovery schemes in vehicular sensor networks, which guarantee the discovery of whole neighbors in each leader vehicle. In this study, our objective is to reduce the average delay of tree-based neighbor discovery. According to our study, the delay depends on the tree construction scheme. We focus on M-ary and M-binary tree-based neighbor discovery, because these algorithms have simplicity and optimality, respectively.
In summary, our contributions are twofold. First, we apply tree algorithm variations to neighbor discovery in vehicular sensor networks. To the best of our knowledge, our study is the first work applying tree algorithms to neighbor discovery in vehicular sensor networks. Second, we show that the M-Binary tree-based scheme with optimal M and N is suitable for the neighbor discovery process.
The reminder of this paper proceeds as follows. Our model for sensor-equipped vehicles is described in Section 2. The proposed join schemes are described in Section 3. In Section 4, determining the number of groups in each neighbor discovery process is discussed, and the performance results are also shown. Our conclusion is given in Section 5.
2. System Model
First of all, we explain our system model assumptions. We assume that numerous vehicles are uniformly distributed in a working field (e.g., road), and each vehicle may move freely. Though this assumption is not suitable for some vehicle sensor network applications, many mobile sensor network applications in dense-area monitoring scenario allow this assumption. It is also assumed that the carrier sensing range is twice the transmission range.
In this model, vehicles are classified into leaders and followers. The leader vehicle (LV) is the vehicle managing and controlling a group of vehicles. The other vehicles in the group are called follower vehicles (FVs) or members of the group. A vehicle which is not a follower vehicle and can communicate with a leader vehicle in onehop is called a neighboring vehicle. Note that follower vehicles do not need to identify other vehicles except for the leader vehicle, and a leader vehicle has the number of required vehicles for performing a cooperative sensing task.
A group following a leader vehicle uses TDMA with a channel distinct from the default channel when communication among nongroup members or between a member and nonmember is required. Because the TDMA frame structure guarantees a delay bound and transmission opportunities, each member of the group has a chance to transmit its packet fairly. Figure 1 shows an example of a TDMA frame.

An example of TDMA frame structure.
Each of the TDMA frames has several periods: beacon period, joining period, request/leave period, control period, and data period. LV notifies the beginning of a frame by beacon message broadcasting in a beacon period. Acknowledgment of the previous frame is also contained in the beacon message. In a joining period, LV requests its neighbor vehicles to join the group under the number of required vehicles via the proposed schemes. Note that neighboring vehicles which are already joined as follower vehicles do not participate in the joining period. In Figure 1, vehicle A is the follower vehicle which participated in the joining period before, and vehicles B and C are neighboring vehicles which are identified as follower vehicles after the joining period. After joining period, each follower vehicle can request a chance of data transmission or notify the leave itself in request/leave period. LV broadcasts a control message containing the follower vehicles data period schedules during the control period, and each of the follower vehicles can send its own data according to the schedule. This TDMA frame structure can be modified or redesigned given the application scenario and the system requirements.
In this system model, neighbor discovery is performed in the joining period. Depending on the neighbor discovery scheme, the time interval of the joining period may be variable, which causes a significant delay. Therefore, a joining scheme to minimize the total expected delay in the period is required. In this paper, it is called the delay-minimized neighbor discovery (DMND), and in the next section, two tree-based DMNDs are discussed.
Generally, the number of neighboring vehicles of LV affects the performance of DMND in our model. Therefore, LV may estimate and use this information to improve the performance. When LV has no follower vehicles, one of the easiest estimation techniques is to use the field size, the transmission range, and the total number of vehicles in the uniformly distributed working field
The other method that can be applied to estimate
3. Tree-Based DMNDs
We mainly focus on minimization of the expected delay in order to identify a required number of vehicles from a greater number of neighbor vehicles. The two kinds of tree-based DMNDs proposed are based on various splitting methods. The first one applies M-ary tree splitting for grouping collided vehicles, while the second one combines M-ary and binary tree splitting methods to improve the associated delay performance. The latter requires an algorithm to decide the value of M affecting the performance of the method, and we will derive the optimal
3.1. M-Ary Tree-Based DMND (MT-DMND)
In M-ary tree-based DMND, after LV sends a query, which includes the state information of the previous slot, each neighboring vehicle determines its joining operation using this information. If the state of the previous slot is “C (collision slot),” each of the vehicles which sent an ACK in the slot randomly chooses an integer in the interval
On the other hand, in M-ary tree-based DMND, the operation of LV is as follows. First, at the beginning slot of a joining period, LV sends a query requesting an anonymous ID. Then LV waits for a time slot to receive an ACK and recognize the state of the time slot. Based on the state, LV sends another query and waits for a time slot. This procedure repeats until LV identifies k follower vehicles. The policy that LV queries the IDs of neighboring vehicles in the procedure is conceptually similar to “depth-first-search (DFS)” algorithm. When LV recognizes that the state of the previous slot is “C,” it concatenates 0 to

The M-ary tree-based DMND (when
3.2. M-Binary Tree-Based DMND (M-BT-DMND)
M-binary tree-based DMND is a modification of M-ary tree-based DMND designed to reduce excessive collisions and idle slots. It is based on M-binary tree construction, just as 2-ary tree-based DMND is based on M-ary tree construction. An M-binary tree is a tree that each node has at most 2 nodes, except that the root node has at most M nodes. Therefore, LV and its neighboring vehicles choose either 0 or 1 for concatenation, except when LV sends a query with an anonymous ID. After LV sends a query with an anonymous ID and a collision slot has occurred, LV and its neighboring vehicles choose an integer in the interval

The M-binary tree-based DMND (when
4. Simulation Results
4.1. Simulation Environments
Some simulation experiments were performed to compare DMNDs. To validate each simulation result, we use the values of the IEEE 802.11 FHSS system parameters listed in Table 1 as in [8]. Note that Short Interframe Space (SIFS) is a fixed-size time period between frame transmission used for IEEE 802.11 nodes to detect the correct channel idle. As comparison targets, p-persistent DMNDs [9] with or without query are also simulated. Note that p is optimally chosen by the simulation with the precision of 0.001. We performed 1000 trials for each scheme, and the delay results are averaged over each scheme for the given (fixed) parameters. In addition, when we use query in a DMND, since success/collision slot needs one query (with 2-bit payloads for 3 slot types), 2 SIFSs, and 1 ACK message (with 32-bit ID), it takes about 532 μs, while the idle slot that includes one query and one
FHSS System Attributes (Parameters) and Additional Parameters Used to Obtain Numerical Results.
4.2. Optimal Value of M.
As mentioned, each of our DMNDs has triple parameters

Total average delay of M-ary tree-based DMND (MT-DMND) with fixed k (

Total average delay of M-ary tree-based DMND (MT-DMND) with fixed N (

Total average delay of M-binary tree-based DMND (M-BT-DMND) with fixed k (

Total average delay of M-Binary tree-based DMND (M-BT-DMND) with fixed N (
Figure 4 shows the delay of MT-DMND for M and N, where the number of required vehicles for a task, k, is fixed to 25. For a given task and value of M, as shown in the figure, the number of neighboring vehicles does not affect the delay. This result is quite different to the depth-first-search (DFS) of M-ary tree. In DFS problem, each node has a distinct key and when a key is given, the objective of this problem is to search the node with the same key. It is popular for DFS to have a time complexity of
However, in case of MT-DMND, the total delay can be calculated approximately. It is not a linear function of
Because (2) is a recursion formula, we find a number r such that
In this context, for a considerably large
On the other hand, for a given task (i.e., fixed k), the value of M has a considerable effect on the total delay, as shown in Figure 4. The explanation for this has already been described in the previous section: the number of idle and collision slots is important. If M increases, the number of collision slots decreases. But, if M is very large, the number of idle slots is so large that the delay increases. Therefore, we can determine the optimal value of M by considering the trade-off between the number of collision and idle slots. In the figure, the optimal value of M is 3, since we assume that the value of α in our protocol is 1.371. Note that a different α may lead to a different optimal value of M. Furthermore, it is observed in the figure that when M increases, the effect of the number of idle slots on the total delay is approximately linear.
Figure 5 shows the total average delay of MT-DMND for M and k when the number of neighboring vehicles N is fixed to 60. In this figure, the total delay increases linearly when the number of required vehicles k increases. It shows that if k increases, the respective number of collision and idle slots increases linearly. Especially, the slope of the delay for k is the minimum value in case that M is equal to 3, implying that the optimal value of M is not changed, even though the value of k is changed. Therefore, in M-ary tree-based DMND, the calculation of optimal value of M to minimize delay does not depend on N or k, but depends on the given MAC protocol parameters such as α.
Figures 6 and 7 show the total average delay of M-BT-DMND when k is fixed to 25 and N is fixed to 60, respectively. A comparison of Figures 4 and 6 shows that the number of neighboring vehicles N has a considerable effect on the optimal value of M in M-BT-DMND, compared to the case of MT-DMND. Furthermore, in many cases, M-BT-DMND has a smaller delay than MT-DMND. Therefore, this characteristic is a motivation of
4.3. Performance Comparison
In this section, we compare DMNDs. First, Figure 8 shows (N is fixed to 60) the average total delay for k, where

Performance comparison of MT-DMND and M-BT-DMND with
Figure 9 shows the average total delay for N with fixed

Performance comparison of DMNDs with
Figure 10 shows the average total delay for k with fixed

Performance comparison of DMNDs with
5. Conclusion
We have discussed the joining scheme of the TDMA MAC protocol for vehicular sensor networks. This paper proposed two joining schemes for minimizing the total delay of the joining period: MT-DMND and M-BT-DMND. Based on analyses of the proposed DMNDs and p-persistent DMNDs, we found that MT-DMND has better performance when M is fixed to 3 among MT-DMNDs, while in M-BT-DMND, the optimal value of M depends on the number of neighboring vehicles, N. Furthermore, when we choose M optimally, M-BT-DMND has the best performance than MT-DMND and p-persistent DMNDs. Therefore, when it is hard to estimate the number of neighbors and stability is important, MT-DMND is suitable, while for a small estimation error when quick joining is required, M-BT-DMND with dynamic M calculation is suitable. As a future work, we will study and analyze a scheme to solve the problem that arises from the estimation error.
Footnotes
Acknowledgments
This research was jointly sponsored by MEST, Korea, under WCU (R33-2008-000-10044-0), MEST, Korea under Basic Science Research Program (2011-0012216), MKE/KEIT, Korea under the IT R&D program [KI001810041244, SmartTV 2.0 Software Platform], NRF of Korea under the project of Global Ph.D. Fellowship, and MKE, Korea under ITRC NIPA-2011-(C1090-1121-0008).
