 Research
 Open Access
A data dissemination mechanism for motorway environment in VANETs
 Yang Yang^{1}Email author,
 Qian Liu^{1},
 Zhipeng Gao^{1},
 Xuesong Qiu^{1},
 Lanlan Rui^{1} and
 Xin Li^{2}
https://doi.org/10.1186/s1363801503109
© Yang et al.; licensee Springer. 2015
 Received: 5 August 2014
 Accepted: 2 March 2015
 Published: 2 April 2015
Abstract
An efficient data dissemination mechanism is very critical for traffic safety and inquiring path information. All vehicles go straight and do not consider the effect of traffic lights during its running in the motorway. But in view of characteristic of motorway, the fast moving of vehicles will cause the frequent changes of network topology, which is a challenge for data dissemination for motorway environment in Vehicular ad hoc networks (VANETs). This paper proposes a novel data dissemination mechanism for VANETs which apply to broadcasting and ondemand unicast scenarios. We firstly propose a weighted Knearest neighbors prediction algorithm with selffeedback to predict the current speed of a vehicle and construct a set of forwarders for emergency message broadcasting. To satisfy users’ personal demands, the paper also designs a unicast mechanism based on information urgent level and the improved Greedy Perimeter Stateless Routing (GPSR) protocol. The simulation results show that our proposed method can achieve better performance with higher delivery ratio, lower number of forwarders, and less copies of messages.
Keywords
 VANETs
 Data dissemination
 On demand
 Delivery ratio
1 Introduction
Vehicular ad hoc networks (VANETs) are a special class of mobile ad hoc networks (MANETs) where nodes selforganize and selfmanage in a distributed way. The networks consist of vehicles and/or roadside infrastructures that communicate with each other. Apart from conventional ad hoc networks, VANETs possess some special characteristics, such as highly dynamic topology and frequent disconnection [1,2].
In recent years, increasing research efforts have been put into VANETs, such as routing protocol, data dissemination, information security, etc. Among these research fields, the data dissemination mechanism has gained more attention as it determines whether users acquire ondemand services timely. Data dissemination in VANETs is frequently used as a way to disseminate messages (i.e., emergency accident, traffic information services, and advertisement) among a group of vehicles. Vehicles are equipped with the radio devices which allow the vehicles to communicate with others located within onehop communication range. Then, the messages will be disseminated and shared among a group of moving vehicles [3].

Cooperative Awareness Messages (CAM). They contain basic status information like the current position, speed, acceleration, as well as the vehicle identifier. These parameter values are periodically exchanged by hello message between vehicles in one hop.

Decentralized Environmental Notification Messages (DENM). These messages may be related to traffic condition information, query/response message, emergency warning information, etc. It always uses the multihop mechanisms to efficiently deliver these messages.
Generally, the works of data dissemination in VANETs are mainly focused on DENM messages. Consequently, for emergency warning information, they are disseminated using broadcasting scheme. The main advantage of broadcasting scheme is that a vehicle does not need to know a route to a specific destination, and it spreads the emergency information rapidly. However, a large scale of broadcasting the same message will cause the problems of channel contention and packet collisions. Rebroadcasting due to transmission failure makes the problem even worse. This is called broadcast storm problem. To alleviate this problem, a common solution employed by most researchers is to reduce the number of redundant rebroadcast messages by only selecting part of vehicles for relaying messages. While as to simple user, he/she may have endtoend communication demands. So, unicast is a more appropriate way for information inquiry demands. But some mechanisms have lower data delivery ratio when only considering the minimum path or deadline priority.
As vehicles move at high speed in the motorway, the topology formed by vehicles is always changing. The highly dynamic topology results in a frequent disconnection of link between two vehicles. Based on this, the DENM messages are classified into two types in the paper: the emergency message and the inquiry message. This paper proposes a data Dissemination Service for Broadcasting and onDemand unicast in the VANETs (DSVBD). We use different transmission methods to deliver different types of messages. For emergency messages, a proposed broadcasting algorithm can make the emergency messages cover a limited network domain rapidly. On the other hand, if some vehicles request realtime messages of personal interest, an ondemand unicast mechanism is proposed to reduce network load.
The rest of the paper is organized as follows. In Section 2, we investigate previous related works on data dissemination protocols in VANETs. The broadcasting algorithm for emergency message and the ondemand unicast mechanism for inquiry message are proposed in Section 3 and Section 4. In these two parts, we give the assumption of our system and introduce several terminologies and key mechanisms. Section 5 validates the solution by simulations. Finally, we give the conclusions of this paper in Section 6.
2 Related work
Flooding is a fundamental mechanism to implement the data dissemination in VANETs. Unfortunately, flooding introduces significant communication overhead due to redundant rebroadcasting. This will cause the wellknown problem called broadcast storm problem. A common solution is to reduce the number of redundant rebroadcast packets. This is typically solved by selecting some special vehicles to relay the packet rather than rebroadcast it.
S.Y. Ni et al. [4] research five different classes of solutions: probabilistic schemes, counterbased schemes, distancebased schemes, locationbased schemes, and clusterbased schemes for broadcast storm problem. Simulation results show that a counterbased scheme can reduce some redundant rebroadcasts when the host distribution is dense. While locationbased scheme can achieve higher performance when GPS service is available. S. Panichpapiboon et al. [5] gave a review of variety data dissemination protocols for VANETs. The authors introduce a new metric called dissemination efficiency to discuss the performance evaluation of those protocols.
The urban multihop broadcast (UMB) protocol [6] is designed to solve the broadcast storm and the reliability in multihop broadcasting. The forward vehicle tries to select a far relay vehicle in the intended direction on a linear road through request to broadcast (RTB) packet and clear to broadcast (CTB) packet. In order to disseminate the message in all directions, a repeater vehicle is employed at the intersection to rebroadcast the message. UMB is inefficient in a sense that the next rebroadcast vehicle has to wait the longest before being able to transmit the CTB packet. This is because the longest blackburst duration is assigned to the next rebroadcast vehicle. G. Korkmaz et al. [7] proposed a fully ad hoc multihop broadcast protocol (AMB) for intervehicular networks. The AMB is an ad hoc extension of the UMB protocol. The protocol eliminates drawbacks of the UMB protocol by employing an efficient intersection broadcast mechanism. L. Wischof et al. [8] presented traffic information services. Road conditions and information on traffic jams are disseminated to vehicles and used for navigation and early warning.
Some researchers proposed a bioinspired metadata harvesting algorithm [9]. The main goal of this algorithm is to effectively cover large urban areas and favor agent movements towards information patches where the concentration of metadata is higher. Zhao et al. [10] proposed a carryandforward mechanism for sparsely connected network. It can disseminate vehicular traffic messages when there is no other node between source and destination vehicles. S. Lee et al. [11] proposed a hybrid communication protocol due to the need of exploiting network infrastructure to avoid disconnections in sparsetraffic scenarios. Moreover, the hybrid approach is particularly suitable for comforting applications that use network infrastructures for advertisement dissemination. A prioritized handling of events can be achieved, for instance, by a priority queue as it has been applied in [12]. The authors set different priorities for different events, and then the emergency events have the highest priority than other events. The feasibility is limited due to the excessive control overhead to collect neighbor position including vehicles traveling in the opposite direction.
Greedy Perimeter Stateless Routing (GPSR), a novel routing protocol for vehicle ad hoc network that utilizes the positions of routers and a packet’s destination to make packetforwarding decisions [13]. GPSR algorithm uses a greedy algorithm to establish the route. Greedy algorithm is a method that the upstream node chooses a node that is nearest to the destination from its neighbors as its next hop. When the node finds that its own distance to the destination is the shortest compared with the other distances between its neighbors and the destination node, the node goes into a local minimum problem. Then, the GPSR algorithm goes into perimeter forwarding mode [14]. During this process, the righthand rule combined with facerouting algorithm can solve the Local Minimum Problem. D.Q. Li et al. [15] proposed a new algorithm based on angle and distance (GPSRAD) for solving the problem which GPSR may produce excessive unwanted route hops when spatial neighbor exists in the ad hoc network.
Although the abovementioned data dissemination mechanisms can reduce some network overheads, they do not have an appropriate solution for emergency and personal interested information simultaneously. Based on this, we propose a data dissemination mechanism based on emergency broadcasting and ondemand unicast for inquiry message.
3 Broadcastingbased data dissemination
The advantage of our proposed broadcasting scheme is that it abandons the arbitrary method used in the traditional VANETs that might cause a broadcast storm. The arbitrary method causes not only network congestion and subsequent loss of data but also a waste of network resource. Despite some improvements in epidemic protocol and UMB protocol that introduce a probabilistic resilient multicast scheme to avoid broadcast storm, broadcasting messages must be repeated periodically to ensure the message coverage rate in the network. Some improved algorithms such as the topology discoverybased data dissemination algorithms need to transfer the messages and find the next forwarder at the same time. But they need to set the waiting timer for timeout so that the requirements of rapid transferring cannot be satisfied.
In this paper, vehicles get information of their neighbors via hello messages. Before broadcasting, source vehicle adjusts its broadcast radius according to the neighbors’ information, and then it chooses some appropriate neighbors to construct a forwarder set. The algorithm can effectively increase message coverage rate and avoid broadcast storm, as well as the network congestion.
3.1 Assumptions and definitions

Each vehicle knows its location through the global positioning system (GPS) service at any given time.

Each vehicle is equipped with several sensors for monitoring any events and a radio that is capable of shortrange wireless communication.

All vehicles broadcast the hello messages periodically, so that they can know the information (e.g., the current position, speed) of their neighboring vehicles.

No roadside infrastructure is available during the communication among the vehicles in motorway.

All vehicles go straight and do not consider the effect of traffic lights during its running in motorway.
As is shown in Figure 1, the source vehicle S broadcasts a hello message at time t _{1}. The hello message will be received by vehicles B, E, F, H, I, and J. In Figure 2, the vehicles that have received the hello messages send a response message to the source vehicle at time t _{2}. But the source vehicle S will only receive the response messages from vehicles B, E, F, H, and I, because vehicle J moves out of the communication range of vehicle S. So, the neighbors of vehicle S are vehicles B, E, F, H, and I, not containing vehicle J.
The hello message includes vehicle’s identity, position, velocity, broadcast radius, and time stamp. We define that the interval of broadcasting hello message behaves according to a uniform distribution U (0.5P, 1.5P). Here, the symbol P is an average of historical interval of broadcasting. Therefore, the time a vehicle node receives the hello message from other vehicle nodes is evenly distributed. By this way, each node can update their neighbors’ information in time and avoid the broadcast storm as well.
We assume that an emergency eventdriven message is generated by an observer vehicle when it passed by the spot where an emergency event occurs (e.g., car accident). The message includes the source vehicle ID, position, timestamp, event type, and forwarders’ IDs. The field position stores the geographical coordinates of event, and the field forwarders’ IDs indicates all the forwarders, and the emergency event message will be forwarded once it arrived at these nodes.
3.2 Prediction for vehicle state
 1.
The method for choosing the number of neighbors’ historical data depends on the neighbors’ corresponding historical coordinates. We assume that during a range of road, the road condition could be similar and the speed of vehicles could be stable.
 2.
The value of K is related to the number of neighbors that the being predicted node can detect. It is unreasonable to choose a fixed value of K because of the dynamic neighbors on different roads at different times. So, the principle taken in our algorithm is so long as the distance between neighbors’ historical data and the being predicted node’s historical data fluctuates within a certain scope, the corresponding neighbor can be regarded as a close neighbor.
 3.
Instead of using Euclidean distance or Mahalanobis distance, we adopt a new method that uses degree of dispersion to evaluate the distance between historical data, regardless of the dimension of historical velocity vectors.
 4.
A weighted prediction algorithm is adopted according to the distance between neighbors’ historical data and the predicted node’s historical data. A neighbor that is closer geographically to the predicted node would have a greater weight.
 5.
After prediction, the source node evaluates errors between the true value and the prediction value, so that it adaptively adjusts the judgment for being a close neighbor.
 1.
Extract the broadcast radius of node A from the latest hello message, called R _{ A }. Then, traverse the neighbor set of S (include S). For each node X with timely information in the neighbor set, if the distance between A and X is less than R _{ A }, and the velocity direction of X is the same as that of A, then regard X as a temporary neighbor of A and put it into a set called M.
 2.
For each node X in set M, node S extracts the historical velocity of X from its hello messages and maintains the historical records for a long term. It is considered in this paper that during a 100m long section of road, the road condition could be similar, and the speed of vehicles could be stable. So, we only focus on the historical velocity in a hello message that indicates the node’s historical coordinate is within 100 m from the node’s current location, and we call them valid historical velocity. Thus, the number of historical velocities extracted can be determined. Suppose there are i historical velocities S gets from node X’s hello messages, then the historical velocity vector of X is V _{ Xh } = (v _{ X1}, v _{ X2},…, v _{ Xi }). Accordingly, the historical velocity vector of node A is V _{ Ah } = (v _{ A1}, v _{ A2},…, v _{ Ai }). If S cannot get enough historical hello messages of node A, then the dimension of the two velocity vectors is min (i _{ X }, i _{ A }), where i _{ X } is the number of valid historical velocity of node X, and i _{ A } is the number of historical velocity of node A that S can get. Notice that, for different nodes in set M, the dimension of historical velocity vector is different.
 3.
Because historical velocity vectors have different dimensions, Euclidean distance between vectors that have high dimensions would be greater than that having low dimensions. In order to evaluate the distance between neighbors’ historical velocity and node A’s historical velocity, we introduce degree of dispersion. A high discrete degree means a greater distance to node A. We can calculate the distance between node X and A by the following formula.
 4.
All the nodes in set M that satisfy dis(X, A) ≤ r * V _{ A } will be regarded as close neighbors to node A. Assume that there are K close neighbors, then the weight assigned to a close neighbor is as follows.
 5.
The final prediction for the realtime velocity of node A is:
 6.
Define a variation factor δ = V _{ Ã }/V _{ A }, where V _{ A } represents the velocity of A in the latest hello message that S has received.
 7.
Predict the distance between A and S at time t.
 8.
The prediction broadcast radius of node A at time t can be calculated as R _{ Ã } = R _{ A } * δ, where R _{ A } is the broadcast radius of A in the latest hello message that S has received. In the worst case, there is no eligible node in step (1), and then the original values of \( {d}_{\tilde{SA}} \) and R _{ Ã } will be retained.
 9.
Before the next prediction, node S can get node A’s last hello message. Extract the velocity \( {\mathrm{V}}_{\mathrm{A}}^{\prime } \) and regard it as a true value at the prediction time. Define the relative error \( E=\left{V}_A^{\hbox{'}}{V}_{\tilde{A}}\right/{V}_A^{\hbox{'}} \) and adaptively adjusts the threshold factor r to reduce the relative error.
3.3 Construct the set of forwarders
 1.
Define the set of forwarders of S called F _{ S }, and then put the neighbor node of S which has the maximum distance to S into F _{ S }.
 2.
Define the rest neighbors of S as a sequence {X _{ i }  i = 1, 2,…, n − 1}, where n is the number of neighbors of S, and X _{ i } is sorted by the distance between X _{ i } and S from the greatest to smallest. The nodes in F _{ S } is called Y _{ j } (j = 1, 2,…, m, where m is the number of nodes in F _{ S }). For a given X _{ i }, if the distance between X _{ i } and Y _{ j } is greater than the latest broadcast radius R _{ Yj } for all Y _{ j } (j = 1, 2,…, m), then put X _{ i } into F _{ S }. Otherwise, abandon X _{ i }.
 3.
Traverse all neighbors of S, and eventually, F _{ S } contains all forwarders of S.
3.4 The algorithm for broadcasting emergency message
The source vehicle S receives hello messages from its neighbors at a random time and save the information into its neighbor list. If there is a new hello message from node A, then the information of A in the neighbor list will be updated. Since node S cannot obtain the future status of its neighbors, it will execute the prediction algorithm to make its neighbors’ information more accurate.
 1.
The source vehicle S traverses the neighbor list and extracts the information of its neighbors.
 2.
For each neighbor of S, if the difference between its timestamp (the timestamp field in its latest hello message) and current time is less than or equal to an overdue threshold dl, then the information of this neighbor node is considered as real time. Otherwise, S executes the prediction algorithm for this neighbor node. The threshold dl is recommended to be set to P/2, where P is an average of historical interval of broadcasting.
 3.
If all the neighbors’ information is real time or has been updated by the predicted value, then S calculates its broadcast radius and constructs the set of forwarders F _{ S }.
 4.
S constructs the emergency event message and fills the last field with the forwarder IDs in set F _{ S }, and then it broadcasts this message.
The forwarders also need to broadcast the emergency event messages of source node S, so that each forwarder will execute the broadcasting algorithm mentioned above. Then, the emergency event message can spread rapidly in the network.
In the proposed broadcasting algorithm, the broadcasting radius can be adjusted according to its surroundings. By this way, on the one hand, the situation that some nodes cannot be covered because of a small broadcast radius can be avoided. On the other hand, the problem of signal attenuation caused by a too large broadcast radius can also be solved. Therefore, the proposed broadcasting algorithm improves the coverage rate of nodes in the network. We construct the forwarders set F _{ S }, and the overall network can be covered using less nodes. The introduction of overdue threshold dl ensures that the information saved in neighbor lists can be closer to a true value. By analyzing the latest status of neighbors, we hope that the prediction can be more accurate.
4 The ondemand unicast algorithm for inquiry message
While as to simple user, he/she may have endtoend communication demands. As all of vehicles need not respond the request messages from a specific individual, we design an ondemand unicast scheme for these messages. The fields of information request message must include the type of information (e.g., parking place, gas station location, traffic congestion information, etc.) and deadline of receiving reply. The message should be broadcasted in order to acquire timely reply while the reply is sent by unicast.
4.1 Reply sorting
{P _{1}, P _{2},…, P _{ n }} is the set of destination nodes (requestors). For each node P _{ i }, T _{ ij } is the deadline for transmitting message j to node P _{ i } (i = 1,2,…,n). MT _{ ij } is the transmission time for message j to node P _{ i }. The source evaluates the transmission time for each requestor. The more the value E _{ ij }(t) is, the sooner the message j is sent. The overhead of this sorting process is related to the number of messages the source node needs to reply, and the time computational complexity of formula (9) is O(n), where n is the number of destination nodes. Through ranking the sequence for messages, the source vehicle can decide which message should be sent at first.
4.2 Data dissemination route protocol
 1.
Greedy mode. An upstream node selects some of its neighbor nodes which is nearest to the destination and regards it as the next hop. When the node finds that its own distance to the destination is the shortest path compared with the distance between each of neighbors and the destination node, then the algorithm turns into perimeter forwarding mode.
 2.
Perimeter forwarding mode. During this process, the righthand rule combined with facerouting algorithm is applied to find the next hop. Though the righthand rule can ensure the upstream node to find its next hop, the choice of the next hop is accompanied by arbitrariness, which may lead to more route hops.
In Figure 3b, we can observe the significant advantage of GPSRAD clearly. The arrows mean the information stream direction. Node D is the destination, and when the message reaches node C, there is no other node closer to node D than node C, so the algorithm turns into perimeter forwarding mode. The forward routing path is CKEFGHIJLD according to righthand rule in the original GPSR. But by formula (10), the forward routing path can be simplified to CHIJLD. It is obvious that GPSRAD algorithm reduces route hops and improves the efficiency.
4.3 Demanddriven data dissemination mechanism
 1.If a source node S receives more than one inquiry message, then S should calculate emergency level for each message and determine the order of message delivery. According to the locations of all the requestors, S classifies them into forward and backward groups. The former consists of the requestors locate in front of the source, and the latter includes nodes at the back (Figure 4 is an example of the location group). The angle θ is the angle between the positive Yaxis and the line from S to any requestors. If sinθ ≥ 0, then the requestor is a forward node, or else is a backward node. In Figure 4, node E, F, and G are forward nodes, and node A, B, C, and D are backward nodes.
 2.
Node S forms two destination address lists according to forward and backward groups, and then constructs two reply messages filled with the destination address lists and message types (specifically, parking place, gas station location, traffic congestion information, etc.). When S starts to transmit the reply messages, it selects the nearest requestor (e.g., A _{1}) from the address list as the destination and transmits the packet using improved GPSR algorithm.
 3.
When the reply message arrives to A _{1}, node A _{1} acquires the message content, deletes itself from the list, and selects a nearest requestor as next destination to forward the message.
 4.
Any forwarding node should calculate the urgent level to determine the order of message delivery if it needs to forward more than one inquiry message. If any request exists in the destination list, the algorithm returns to step (3), or else this type of message is sent completed.
 5.
If a requestor receives the reply before the deadline, then the procedure of requestresponse is successful, or else it repeats the request in view of its demands.
5 Performance evaluation
The number of vehicles in actual world is various, and the road structure is complex, so we choose a type of motorway model as shown in Figure 4. All vehicles go straight and cannot change driveway during its running. The vehicle velocity is randomly set but still limited by traffic density. In addition, the traffic lights are not considered in motorway. In our simulation, the number of vehicles ranges from 100 to 700 and the velocity from 60 to 100 km/h. The MAC protocol is 2 Mbps 802.11p. The proposed algorithms are coded in MATLAB.
5.1 Simulation of broadcasting of emergency message

Delivery ratio: a probability defined as the number of message receivers divided by the total number of vehicles in the networks.

Number of forwarders: the number of vehicles which forward the message in a round of broadcasting. Generally, a smaller number of forwarders indicate less delay of message and lower network loads.

Number of message copies: the number of message copies in a round of broadcasting. Once a forwarder receives a message, it generates a copy. This indicator reflects the network congestion level and influences the delivery ratio and transmission delays.
It is known that the traffic density is varying by different roadsides and different times. So, we study the performance of the algorithm for various traffic densities by varying the total number of vehicles in the network. The size of this simulation scenario is 1,000 m × 50 m. We assume that the number of vehicles increases from 100 to 700.
Also, message coverage area has an influence on three abovementioned indicators. It reflects the distribution and spreading ability of emergency messages. We adjust the length of road from 500 to 3,500 m to simulate the change of message coverage area. In this simulation scenario, the number of vehicles is set to 500 and remains unchanged.
5.1.1 Delivery ratio
Figure 5b shows the comparison of data delivery ratio in the three algorithms in the case of different message coverage area. From the chart, we can see that data delivery ratio has a sharp decrease due to data collisions. This is because as the length of road increases, the message coverage area increases accordingly. So, that delay of messages increases and leads to message dropping. By comparison, the delivery ratio of DSVBD has the slowest descending speed and is 7.90% higher than that of epidemic and 8.91% higher than that of UMB on average.
5.1.2 Number of forwarders
In Figure 6b, with increasing length of road, the number of forwarders increases linearly. The fitting calculations for the three slopes of the line are DSVBD 0.143, epidemic 0.488, and UMB 0.854. It is obvious that our algorithm has fewer forwarders than the other two algorithms, so the transmission time and network loads can be reduced.
5.1.3 Number of message copies
In Figure 7b, the number of message copies increases as the length of road increases. By comparison, the growth rates are rapidly increasing in epidemic and UMB, but slowly in our algorithm. The number changes from 2.2% to 5.1%. So our method can reduce the network load effectively.
5.2 Simulation of ondemand unicast algorithm

Greedy: the upstream forwarders always choose the requestor which has the shortest distance to them, and the reply messages will be sent according to this order.

Deadlinepri: the upstream forwarders always choose the requestor which has a smaller deadline, and the reply messages will be sent according to this order.
As the number of requestors increases, the delivery ratios of three algorithms decrease generally. In terms of the two compared algorithms, the more the requestors, the higher the queuing time is. This leads to higher probability of timeout. As to DSVBD, the increase of requestors means the increase of hops in the delivery path and more timeout happens due to increasing delivery time. As is shown from the figure above, the delivery ratio of DSVBD is 17.3% higher than that of greedy and 15.9% higher than that of deadlinepri, which shows the higher delivery reliability with various numbers of requestors.
6 Conclusions
The highspeed moving of the vehicles in motorway environment results in the highly dynamic topology of networks, which brings out challenges for data dissemination of VANETs. In this paper, we propose a new broadcasting algorithm and an ondemand unicast algorithm for VANETs. In the proposed broadcasting algorithm, there are two innovation points: 1) predict the status of nodes by an improved Knearest neighbors’ prediction and 2) construct the set of forwarders to alleviate the influence of broadcast storm. In the ondemand unicast algorithm, the source vehicle node only sends at most two messages, and all the requestors can receive the messages they need. The results show that our method can achieve better performance with higher delivery ratio and less number of message copies.
Declarations
Acknowledgements
This work was partly supported by the NSFC (61372108), Ph.D. Programs Foundation of Ministry of Education of China (No. 20110005110011), Fundamental Research Funds for the Central Universities (No. 2014RC1102), and Beijing Higher Education Young Elite Teacher Project(YETP0474).
Authors’ Affiliations
References
 K Rakesh, D Mayank, A Framework for Handling Local Broadcast Storm Using Probabilistic Data Aggregation in VANET. Wireless Personal Communication 72, 315–341 (2013)View ArticleGoogle Scholar
 W Shangguang, F Cunqun, H ChingHsien, S Qibo, Y Fangchun, A Vertical Handoff Method via Selfselection Decision Tree for Internet of Vehicles, in IEEE System Journal, 2014. doi: 10.1109/JSYST.2014.2306210Google Scholar
 S Michael, M Imad, Spatial distribution and channel quality adaptive protocol for multihop wireless broadcast routing in VANET. IEEE Trans Mobile Comput 12(4), 722–734 (2013)View ArticleGoogle Scholar
 SY Ni, YC Tseng, YS Chen, JP Sheu, The Broadcast Storm Problem in a Mobile Ad Hoc Network. Wireless Networks 8, 153–167 (2002)View ArticleMATHGoogle Scholar
 S Panichpapiboon, W Pattaraatikom, A Review of Information Dissemination Protocols for Vehicular Ad Hoc Networks. Communications Surveys & Tutorials IEEE 99, 1–15 (2011)Google Scholar
 Korkmaz, G., Ekici, E., Ozguner, F., and Ozguner, U.: Urban Multihop Broadcast Protocol for Intervehicle Communication Systems. In: Proc. 1st ACM International Workshop on Vehicular Ad Hoc Networks. (VANET’04), Philadelphia, USA, pp. 76–85 (2004)Google Scholar
 Korkmaz, G., Ekici, E., and Ozguner, F.: An Efficient Fully Adhoc Multihop Broadcast Protocol for Intervehicular Communication Systems. In: Proc. IEEE International Conference on Communications. (ICC’06), Istanbul, Turkey, pp. 423428 (2006)Google Scholar
 L Wischof, A Ebner, H Rohling, Information Dissemination in Self Organizing Intervehicle Networks. Intelligent Transportation Systems, IEEE Transactions on 6, 90–101 (2005)View ArticleGoogle Scholar
 L Uichin, M Eugenio, G Mario, B Paolo, L Pietro, L KangWon, Bioinspired multiagent data harvesting in a proactive urban monitoring environment. Ad Hoc Networks 7(4), 725–741 (2009)View ArticleGoogle Scholar
 J Zhao, G Cao, VADD: VehicleAssisted Data Delivery in Vehicular Ad Hoc Networks. Proceedings of IEEE International Conference on Computer Communications (INFOCOM’06), 2006, pp. 1–12Google Scholar
 Lee, S., Pan, G., Park, J., Gerla, M., and Lu, S.: Secure Incentives for Commercial Ad Dissemination in Vehicular Networks. In: ACM international symposium on Mobile ad hoc networking and computing (Mobihoc), New York, NY, USA, pp. 150–159 (2007)Google Scholar
 M Röckl, P Robertson, Data Dissemination in Cooperative ITS from an InformationCentric Perspective. International Conference on Communications (ICC), Cape Town, South Africa, pp. 1–6 (2010)Google Scholar
 Karp, B., and Kung, H.T.: GPSR: Greedy Perimeter Stateless Routing for Wireless Networks. In: Proceedings of the Annual International Conference on Mobile Computing and Networking (MobiCom’00), Boston, USA, pp. 243–254 (2000)Google Scholar
 Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., and Pister, K.: System Architecture Directions for Networked Sensors. In: International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), New York, NY, USA, pp. 93–104 (2000)Google Scholar
 L Daoquan, L Haiyan, C Qiguang, W Huaicai, New routing algorithm based on geographical location: GPSRAD. J Comput Appl 29(12), 3215–3217 (2009)Google Scholar
Copyright
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited.