This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

11institutetext: Xincao Xu 22institutetext: Kai Liu 33institutetext: Ke Xiao 44institutetext: Liang Feng 55institutetext: Songtao Guo 66institutetext: Key Laboratory of Dependable Service Computing in Cyber Physical Society, Ministry of Education (Chongqing University), and also with the College of Computer Science, Chongqing University, Chongqing, China
66email: near, liukai0807, xiaoke317, liangf, [email protected]
77institutetext: Zhou Wu 88institutetext: College of Automation, Chongqing University, Chongqing, China
88email: [email protected]

Vehicular Fog Computing Enabled Real-time Collision Warning via Trajectory Calibration thanks: Corresponding author: Kai Liu

Xincao Xu    Kai Liu    Ke Xiao    Liang Feng    Zhou Wu    Songtao Guo
(Received: date / Accepted: date)
Abstract

Vehicular fog computing (VFC) has been envisioned as a promising paradigm for enabling a variety of emerging intelligent transportation systems (ITS). However, due to inevitable as well as non-negligible issues in wireless communication, including transmission latency and packet loss, it is still challenging in implementing safety-critical applications, such as real-time collision warning in vehicular networks. In this paper, we present a vehicular fog computing architecture, aiming at supporting effective and real-time collision warning by offloading computation and communication overheads to distributed fog nodes. With the system architecture, we further propose a trajectory calibration based collision warning (TCCW) algorithm along with tailored communication protocols. Specifically, an application-layer vehicular-to-infrastructure (V2I) communication delay is fitted by the Stable distribution with real-world field testing data. Then, a packet loss detection mechanism is designed. Finally, TCCW calibrates real-time vehicle trajectories based on received vehicle status including GPS coordinates, velocity, acceleration, heading direction, as well as the estimation of communication delay and the detection of packet loss. For performance evaluation, we build the simulation model and implement conventional solutions including cloud-based warning and fog-based warning without calibration for comparison. Real-vehicle trajectories are extracted as the input, and the simulation results demonstrate that the effectiveness of TCCW in terms of the highest precision and recall in a wide range of scenarios.

Keywords:
Vehicular fog computingCollision warningReal-timeTrajectory calibration

1 Introduction

Vehicular ad hoc networks (VANETs) have attracted great attention to enable a variety of intelligent transportation systems (ITS). Dedicated short range communication (DSRC) kenney2011dedicated is one of the well developed standards for vehicular communication, where vehicles equipped with on-board units (OBUs) can communicate with both vehicles and roadside units (RSUs) via vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications, respectively. Meanwhile, another mainstream of vehicular communication standard is based on the development of cellular networks agiwal2016next . The Long-Term Evolution-Vehicle (LTE-V) standard has been developed to enable V2X communication, which is evolving to the 5G based Cellular Vehicle-to-Everything (C-V2X) communication araniti2013lte . A number of studies ucar2015multihop dai2018bandwidth ahmed2018cooperative liu2019ahierarchical have investigated on information services in heterogeneous vehicular communication environments.

In view of the ever-increasing data and computation demands zhai2018 , the highly dynamic traffic status and network topology zhai2019 , and the various quality of service (QoS) requirements of different ITS applications liu2019ahierarchical , great efforts have been put into the designing of data scheduling algorithms liu2016cooperative dai2016adaptive wang2017dynamic , resource allocation mechanisms peng2017resource ahmed2018secure and emerging ITS applications liu2013improving dai2016quality . In addition, many studies have been focusing on the development of new service paradigms in VANETs based on software defined networking liu2016cooperative wang2019delay liu2017coding and fog computing liu2019ahierarchical hou2016vehicular wang2018offloading , which are envisioned as a promising solutions to enhancing system scalability and flexibility by decoupling control and data planes, as well as enabling low-latency and high-reliability information services by offloading computing, networking, storage, communication, and data resources closer to the end users. On this basis, different solutions have been proposed for computation offloading wang2019delay , distributed service scheduling sun2018cooperative and coordinated resource allocation zhou2019computation in VANETs.

However, it is still non-trivial to realize safety-critical applications in VANETs due to the stringent real-time requirements on communication and computation. Besides, intrinsic features such as transmission latency and packet loss in wireless communications are inevitable and also non-negligible for such applications, which make it even challenging for enabling real-time and reliable safety-critical services in VANETs.

With above motivations, this work presents a vehicular fog computing (VFC) based real-time collision warning architecture in VANETs. In particular, on the basis of the presented architecture, dedicated solutions are proposed to achieve real-time and accurate collision warning via VFC. Small-scale system prototype is built in realistic environments to give an insight into the system development. Large-scale simulation model is implemented with real vehicle trajectories to evaluate the effectiveness of the proposed architecture and corresponding algorithms. The main contributions of this work are outlined as follows:

  • We present a VFC based service architecture via DSRC, where RSUs are deployed as fog nodes along the road, which communicate with OBUs mounted on vehicles and process collision warning tasks locally based received vehicle status, including global position system (GPS) coordinates, velocity, acceleration, heading direction, etc. Compared with conventional cloud based system, such a service architecture not only reduces wireless communication delay, but also enhances system scalability and responsiveness by offloading the computation tasks to the distributed fog nodes.

  • We propose a trajectory calibration based collision warning algorithm (TCCW). Specifically, we first derive a packet transmission delay fitting model based on the Stable distribution to estimate the fog based communication latency. The fitting data are obtained by implementing a DSRC based system prototype in realistic vehicular communication environments. Second, we design a packet loss detection mechanism based on the historical information including data transmission frequency and locations of vehicles. Finally, we present detailed procedures of TCCW, which calibrates vehicle trajectories by combining communication latency estimation and packet loss detection, so as to improves the timeliness and accuracy of the collision warning system.

  • We give a comprehensive performance evaluation. First, we carry out a real-world field testing and obtain the sets of packet latency in both cloud and fog based systems. Second, we import real-world vehicle trajectories in several selected intersections with different features (e.g., traffic density, vehicle speed, vehicle acceleration) of Cologne, Germany. The simulation results have demonstrated the superiority of TCCW comparing with traditional methods (e.g., cloud-based warning and fog-based warning without trajectory calibration) in terms of both precision and recall on collision warning.

The rest of this paper is organized as follows: Section 2 reviews the related work. Section 3 presents the VFC enabled real-time collision warning system. Section 4 proposes a trajectory calibration based collision warning algorithm. Section 5 builds the simulation model and gives performance evaluation. Finally, Section 6 concludes this work.

2 Related Work

Great efforts have been devoted to improving the performance of VANETs. DSRC is considered as the de facto standard for vehicular communication. In America, 75MHz bandwidth of spectrum is allocated by the Federal Communications Commission (FCC) for DSRC. Based on the allocated spectrum, IEEE published the protocol stack called Wireless Access in Vehicular Environments (WAVE), which consists IEEE 802.11p and IEEE 1609.x. Although many studies have investigated on vehicular communications via DSRC, most of them only focused on the MAC layer performance. Yao et al. yao2013delay proposed an analytical model to evaluate the broadcast performance under IEEE 802.11p in terms of the mean, deviation and probability distribution of the MAC access delay, and numerical analysis indicated that IEEE 802.11p can provide relatively good performance for higher priority messages. Zheng et al. zheng2015performance analyzed the enhanced distributed channel access mechanism of IEEE 802.11p in terms of the transmission probability, normalized throughput, and average access delay, and simulation results verified the effectiveness of the derived performance models. Peng et al. peng2016performance proposed a general probabilistic performance of multiplatooning communication based on IEEE 802.11p and the simulation results indicated that multiplatooning communications can satisfy the delay requirements of platoon control and on-road safety.

Vehicular fog computing is an emerging paradigm in VANETs to better support low latency, high reliability and large scale ITS applications. Hou et al. hou2016vehicular first presented a viewpoint that vehicles are considered as fog nodes for service provision. The proposed architecture can better support real-time services and better exploit computation and communication capacities of individual vehicles. Huang et al. huang2017vehicular proposed the vehicular fog computing architecture which comprises three layers, namely, the data generation layer, the fog layer, and the cloud layer. A fog-assisted traffic control system illustrated the benefits of VFC, and the forensic challenges and potential solutions are discussed. Wang et al. wang2018offloading proposed a fog-enabled real-time traffic management system, aiming to minimize the average response time for events reported by vehicles. Performance evaluation based on a real-world taxi trajectory dataset demonstrated the effectiveness of the designed method. Liu et al. liu2019ahierarchical proposed a hierarchical system architecture to synthesize the paradigms of software defined networking and fog computing in Internet of Vehicles and comprehensive analysis with respect to the separation of control and data planes, network functions virtualization in heterogeneous resource environments, network slicing for services with different QoS requirements, and the offloading of computation, storage, control, and communication capacities with fog-based services.

Most existing vehicular collision warning systems are based on ranging sensors such as radar or lidar song2017real wu2019series . However, they all suffer from non-line-of-sight problems. With recent advances on computer vision, some studies focused on collision detection based on video camera wang2016vision song2018lane . Nevertheless, they may require intensive computation and massive data transmission, which render the system performance on real-time response. A few studies considered collision warning via vehicular communications hafner2013cooperative gelbar2017elastic xu2018design . Hafner et al. hafner2013cooperative leveraged V2V communication technology to implement computationally efficient decentralized algorithms for two-vehicle cooperative collision avoidance at intersections and provided an experimental validation of proposed method. Gelbar et al. gelbar2017elastic proposed a pedestrian collision warning and avoidance system for vehicles based on V2X communication, and demonstrated the effectiveness of the proposed method using hardware-in-the-loop simulations. Our previous work xu2018design designed and implemented a fog computing based collision warning system leveraging V2I communications and demonstrated the superiority of the fog computing based collision warning system in terms of enhancing system responsiveness.

3 VFC Based Real-time Collision Warning Architecture

Refer to caption
Figure 1: VFC based real-time collision warning architecture

In this section, we propose a VFC based real-time collision warning architecture as shown in Fig. 1. In the architecture, communication infrastructures with short radio coverages (e.g., RSUs, 5G small cells) are acted as fog nodes, since they are physically closer to vehicles. On the other hand, communication infrastructures with wide coverages (e.g., cellular network base stations) are considered as cloud nodes. Vehicles are able to communicate with fog and cloud nodes via vehicle-to-fog (V2F) and vehicle-to-cloud (V2C) communications, respectively. Fog nodes installed along the road have certain computation ability. Cloud nodes are assumed to have unlimited computation capacity, but it may suffer from severe bandwidth competition if all vehicles under its coverage are transmitting data concurrently.

We take the following scenario as an example to show the procedure of the designed architecture. Considering two vehicles (i.e., v1v_{1} and v2v_{2}) are approaching to a road intersection without traffic lights, then they may likely collide, especially if they are blind to each other. The potential collision can be avoided if the collision warning system, as a typical safety-critical ITS application, is implemented. Vehicles periodically upload their real-time status including GPS coordinates, velocity, acceleration, heading direction and so on, to the fog node via V2F communication. However, it is inevitable that the sensed data is inaccurate, such as the inaccuracy of the obtained GPS coordinates due to satellite clock bias, atmospheric delay, and errors in the broadcast ephemeris, etc liu2013improving . Furthermore, the packet loss in wireless communications makes it even challenging for the server to estimate real-time location of moving vehicles. Therefore, in this presented system, fog nodes will predict vehicle trajectories based on received information and designed algorithms. Then, a collision detection mechanism is incorporated to determine whether there is potential collisions. When a collision is detected based on certain headway threshold, the fog node will send the warning message to corresponding vehicles.

As analyzed above, even though fog node reduces communication delay over traditional centralized cloud computing, it still suffers from inaccurate vehicle information due to inevitable as well as non-negligible issues, including sensor errors, transmission latency and packet loss. The enlarged part in Fig. 1 shows an example of inaccurate vehicle location in the logical vehicles view of fog node comparing with the realistic traffic view. Specifically, assume that vehicle v1v_{1} is approaching to the intersection with the velocity s1s_{1} of 4040 kilometers per hour at time t1t_{1}, and the position of vehicle v1v_{1} is p1p_{1}. Meanwhile, vehicle v2v_{2} is located at p3p_{3} and approaching to the intersection at a speed s2s_{2} of 2525 kilometers per hour. Vehicles send their status to the fog node at time t1t_{1} simultaneously, however, the packet, which contains status of vehicle v2v_{2}, is lost in V2F communication. Fog node receives vehicle status at time t2t_{2} and forms a logical vehicles view about each vehicle location as shown in the top of Fig. 1. Suppose the data size is 500500 kB, which is sufficient for typical ITS applications liu2013improving . DSRC as a typical VANETs communication technology supports data rate from 33 to 2727 Mb/s kenney2011dedicated , where 33 Mb/s is recommended for transmitting safety-critical messages. Hence, the time taken to upload vehicle status is around 500 * 8 kb / 3 \approx 1.3 s, namely, t2t11.3{t_{2}}-{t_{1}}\approx 1.3 ss. Vehicle v1v_{1} is located at p1p_{1} at time t2t_{2}, and v2v_{2} dose not exist in the logical vehicles view of the fog node. Yet as shown in the realistic traffic view, the realistic positions of vehicles v1v_{1} and v2v_{2} are p2p_{2} and p4p_{4}, respectively. The distance error of vehicle v1v_{1}’s location between the logical vehicles view of fog node and the realistic traffic view is around 40 * 1000 / 3600 m/s * 1.3 \approx 14 m, in other words, dd \approx 14 m. With above example, obviously, it is imperative to design an efficient mechanism based on the presented VFC architecture to enhance system robustness.

4 Trajectory Calibration Based Collision Warning Algorithm

In this section, we propose an algorithm named TCCW, which calibrates vehicle trajectory with both transmission latency estimation and packet loss detection. First, application-layer V2I communication delay is fitted into the Stable distribution model with real-world field testing data. Then, we propose a packet loss detection mechanism based on the historical information including data transmission frequency and locations of vehicles. Finally, we give detailed procedures of TCCW. Primary notations are listed in Table. 1.

Table 1: Summary of notations
Notation Description
SS The Stable distribution
α\alpha The characteristic exponent of the SS
β\beta The skewness parameter of SS
μ\mu The location parameter of SS
σ\sigma The scale parameter of SS
EE The time slot set
ek{e_{k}} One time in set EE
VV The vehicle set
vi{v_{i}} The iith vehicle
lvier{{l}_{v_{i}}^{e_{r}}} The location of vehicle vi{v_{i}} at time ere_{r}
svier{{s}_{v_{i}}^{e_{r}}} The speed of vehicle vi{v_{i}} at time ere_{r}
avier{{a}_{v_{i}}^{e_{r}}} The acceleration of vehicle vi{v_{i}} at time ere_{r}
dvier{{d}_{v_{i}}^{e_{r}}} The driving direction of vehicle vi{v_{i}} at time ere_{r}
lfl_{f} The location of the fog node
dis(lvier,lf)dis({l_{v_{i}}^{e_{r}}},{l_{f}}) The distance between vehicle viv_{i} and fog node
at time er{e_{r}}
RR The communication range of DSRC
Mek{{M}_{e_{k}}} The received packets at time eke_{k}
HekH_{e_{k}} The packets records in fog node at time ek{e_{k}}
IDek{{ID}_{e_{k}}} The ID set of vehicles at time ek{e_{k}}
IDMek{{ID}_{M_{e_{k}}}} The ID set of MebM_{e_{b}} at time ek{e_{k}}
τ\tau The distance threshold
γ\gamma The time threshold
ı\imath The headway threshold
WekW_{e_{k}} The warning messages set at time ek{e_{k}}
wviekw_{v_{i}}^{e_{k}} The warning message indicator of vehicle vi{v_{i}}
at time ek{e_{k}}

4.1 Fitting of Application-layer Transmission Latency

Refer to caption
Figure 2: Real-world field testing scenario at an intersection without traffic lights

We analyze the application-layer transmission latency of DSRC based on real-world field-testing data. In Fig. 2, a field testing is carried out on a road intersection without traffic lights. Two vehicles equipped DSRC interfaces are able to communicate with RSU via V2I communication. In particular, we utilize Cohda Wireless MK5 RSU and OBU as DSRC communication interfaces. An RSU is installed at the intersection, which is connected with a notebook as a computation unit of fog node. Vehicles V1V_{1} and V2V_{2} are approaching the intersection, and they are sending vehicle status including GPS coordinates, velocity, acceleration, heading direction and timestamp via V2I communication periodically. Fog node receives the packet from vehicles and obtains the packet transmission latency of application-layer of V2I communication.

In the following, we model the data packet transmission latency model in real vehicular communication environments with DSRC. Based on the observation of transmission latency obtained by realistic field testing, we find that the Stable distribution that provides well-established model for non-Gaussian processes is suitable to fit the communication delay. (The fitting result shows it is convincing to fit the latency using the Stable distribution.) We fit the observed V2I communication delays with the Stable distribution, which can be described by characteristics function as follows samoradnitsky2017stable ,

Eexp(itX)={exp{σα|t|α[1iβtan(απ/2)sgn(t)]+iμt} for α1exp{σ|t[1+iβ(2/π)sgn(t)ln(|t|)]+iμt} for α=1,E\exp(itX)\!=\!\left\{\begin{array}[]{l}{\exp\left\{-\sigma^{\alpha}|t|^{\alpha}[1-i\beta\tan(\alpha\pi/2)\operatorname{sgn}(t)]+i\mu t\right\}\text{ for }\alpha\neq 1}\\ {\exp\{-\sigma|t[1+i\beta(2/\pi)\operatorname{sgn}(t)\ln(|t|)]+i\mu t\}\text{ for }\alpha=1}\end{array},\right.

(1)

where XX is a random variable and follows the Stable distribution XS(α,β,μ,σ)X\sim{S(\alpha,\beta,\mu,\sigma)}, and

0<α2,1β1,μ,σ>0,\begin{array}[]{l}{0<\alpha\leq 2},{-1\leq\beta\leq 1},{\mu\in\mathbb{R}},{\sigma>0},\end{array} (2)

α\alpha is an index of stability or characteristic exponent, when α=2\alpha=2, the relevant Stable distribution is Gaussian. β\beta is a skewness parameter, when β=0\beta=0, the relevant Stable distribution is symmetric about the center μ\mu, which is a location parameter. If α1\alpha\neq 1, the cases β>0\beta>0 and β<0\beta<0 correspond to left-skewness and right-skewness, respectively. σ\sigma is a scale parameter, and behaves like the variance. The characteristic function ϕ(t)=Eexp(itX)\phi(t)=E\exp(itX) completely determines the behavior and properties of the probability distribution of the random variable XX, where tt is a real number, ii is the imaginary unit and EE is the expected value. And sgn(t)\operatorname{sgn}(t) is a sign function as defined by

sgn(t)={1 for t>00 for t=01 for t<0\operatorname{sgn}(t)=\left\{\begin{array}[]{l}{1\text{ for }t>0}\\ {0\text{ for }t=0}\\ {-1\text{ for }t<0}\end{array}\right. (3)

We introduce the parameters estimation of the Stable distribution as follows.

We employ a regression-type estimation to estimate four parameters of the Stable distribution. First, given observation data as a random simple x1,x2,,xnx_{1},x_{2},\cdots,x_{n} of size nn, a simple characteristic function ϕ^(t)\hat{\phi}(t) is defined by

ϕ^(t)\displaystyle\hat{\phi}(t) =1nj=1nexp(itxj)\displaystyle\!=\!\frac{1}{n}\sum_{j=1}^{n}\exp\left(itx_{j}\right) (4)
=1nj=1n[cos(txj)+sin(txj)i]\displaystyle\!=\!\frac{1}{n}\sum_{j=1}^{n}\left[\cos\left(tx_{j}\right)+\sin\left(tx_{j}\right)i\right]
=1nj=1ncos(txj)+i1nj=1nsin(txj)\displaystyle\!=\!\frac{1}{n}\sum_{j=1}^{n}\cos\left(tx_{j}\right)+i\frac{1}{n}\sum_{j=1}^{n}\sin\left(tx_{j}\right)

when α1\alpha\neq 1, we denote:

ϕ(t)=Eexp(itX)=exp{σα|t|α[1iβtan(απ/2)sgn(t)]+iμt}=exp{σα|t|α+[μt+σα|t|αβtan(απ/2)sgn(t)]i}=exp(σα|t|α)exp[(μt+σα|t|αβtan(απ/2)sgn(t)]i}=exp(σα|t|α)cos[μt+σα|t|αβtan(απ/2)sgn(t)]+exp(σα|t|α)sin[μt+σα|t|αβtan(απ/2)sgn(t)]i\begin{aligned} \phi(t)&\!=\!E\exp(itX)\\ &\!=\!\exp\left\{-\sigma^{\alpha}|t|^{\alpha}[1\!-\!i\beta\tan(\alpha\pi/2)\operatorname{sgn}(t)]+i\mu t\right\}\\ &\!=\!\exp\left\{-\sigma^{\alpha}|t|^{\alpha}\!+\!\left[\mu t\!+\!\sigma^{\alpha}|t|^{\alpha}\beta\tan(\alpha\pi/2)\operatorname{sgn}(t)\right]i\right\}\\ &\!=\!\exp\left(-\sigma^{\alpha}|t|^{\alpha}\right)\exp\left[\left(\mu t\!+\!\sigma^{\alpha}|t|^{\alpha}\beta\tan(\alpha\pi/2)\operatorname{sgn}(t)\right]i\right\}\\ &\!=\!\exp\left(-\sigma^{\alpha}|t|^{\alpha}\right)\cos\left[\mu t\!+\!\sigma^{\alpha}|t|^{\alpha}\beta\tan(\alpha\pi/2)\operatorname{sgn}(t)\right]\\ &\!+\!\exp\left(-\sigma^{\alpha}|t|^{\alpha}\right)\sin\left[\mu t\!+\!\sigma^{\alpha}|t|^{\alpha}\beta\tan(\alpha\pi/2)\operatorname{sgn}(t)\right]i\end{aligned}

(5)

The distribution is assumed symmetric about the center 0 (β=0,μ=0\beta=0,\mu=0), then we can easily obtain:

ln|ϕ(t)|2=2σα|t|α-\ln|\phi(t)|^{2}=2\sigma^{\alpha}|t|^{\alpha} (6)
ln(ln|ϕ(t)2)\displaystyle\ln\left(-\ln|\phi(t)^{2}\right) =ln(2σα|t|α)\displaystyle=\ln\left(2\sigma^{\alpha}|t|^{\alpha}\right) (7)
=ln(2σα)+αln(|t|)\displaystyle=\ln\left(2\sigma^{\alpha}\right)+\alpha\ln(|t|)

We estimate α\alpha and σ\sigma by regressing yk=αωk+by_{k}=\alpha\omega_{k}+b, where b=ln(2σα){b=\ln\left(2\sigma^{\alpha}\right)} and ωk=ln(|tk|){\omega_{k}=\ln\left(\left|t_{k}\right|\right)}. We denote f(tk)=ln(ln|ϕ(tk)|2)f\left(t_{k}\right)=\ln\left(-\ln\left|\phi\left(t_{k}\right)\right|^{2}\right) and use linear regression to address estimation problem by minimizing the mean-square error.

(α,b)=argmin(α,b)k=1K(f(tk)yk)2=argmin(α,b)k=1K[ln(ln|ϕ(tk)|2)(αωk+b)]2\begin{aligned} \left(\alpha^{*},b^{*}\right)&=\underset{(\alpha,b)}{\arg\min}\sum_{k=1}^{K}\left(f\left(t_{k}\right)-y_{k}\right)^{2}\\ &=\underset{(\alpha,b)}{\arg\min}\sum_{k=1}^{K}\left[\ln\left(-\ln\left|\phi\left(t_{k}\right)\right|^{2}\right)-\left(\alpha\omega_{k}+b\right)\right]^{2}\end{aligned}

(8)

Then, we use the least square method to get estimation value α^\hat{\alpha} and σ^\hat{\sigma}. We denote E(α,b)=k=1K(f(tk)yk)2E_{(\alpha,b)}=\sum_{k=1}^{K}\left(f\left(t_{k}\right)-y_{k}\right)^{2} and the estimated parameters are obtained by resolving the following equations:

{E(α,b)α=2(αk=1Kωk2k=1K(f(tk)b)ωk)=0E(α,b)b=2(Kbk=1K(f(tk)αωk))=0\left\{\begin{aligned} \frac{\partial E_{(\alpha,b)}}{\partial\alpha}&=2\left(\alpha\sum_{k=1}^{K}\omega_{k}^{2}-\sum_{k=1}^{K}\left(f\left(t_{k}\right)-b\right)\omega_{k}\right)&=0\\ \frac{\partial E_{(\alpha,b)}}{\partial b}&=2\left(Kb-\sum_{k=1}^{K}\left(f\left(t_{k}\right)-\alpha\omega_{k}\right)\right)&=0\end{aligned}\right.

(9)

The estimated parameters α^\hat{\alpha} and σ^\hat{\sigma} are represented by:

{α^=k=1Kf(tk)(ωkω¯)/k=1Kωk21K(k=1Kωk)2σ^=(expb^)/2α^\left\{\begin{array}[]{l}{\hat{\alpha}={\sum_{k=1}^{K}f\left(t_{k}\right)\left(\omega_{k}-\bar{\omega}\right)}/{\sum_{k=1}^{K}\omega_{k}^{2}-\frac{1}{K}\left(\sum_{k=1}^{K}\omega_{k}\right)^{2}}}\\ {\hat{\sigma}=\sqrt[\hat{\alpha}]{(\exp\hat{b})/2}}\end{array}\right. (10)

where b^=1Kk=1K(f(tk)α^ωk){\hat{b}=\frac{1}{K}\sum_{k=1}^{K}\left(f\left(t_{k}\right)-\hat{\alpha}\omega_{k}\right)} and ω¯=1Kk=1Kωk\bar{\omega}=\frac{1}{K}\sum_{k=1}^{K}\omega_{k}.

It is easy to see that the real and imaginary parts of ϕ(t)\phi(t), Reϕ(t)\operatorname{Re}\phi(t) and Imϕ(t)\operatorname{Im}\phi(t), are implied from Equation. 5.

Reϕ(t)=exp(σα|t|α)cos[μt+σα|t|αβtan(απ/2)sgn(t)]\operatorname{Re}\phi(t)=\exp\left(-\sigma^{\alpha}|t|^{\alpha}\right)\cos\left[\mu t+\sigma^{\alpha}|t|^{\alpha}\beta\tan(\alpha\pi/2)\operatorname{sgn}(t)\right]

(11)

Imϕ(t)=exp(σα|t|α)sin[μt+σα|t|αβtan(απ/2)sgn(t)]\operatorname{Im}\phi(t)=\exp\left(-\sigma^{\alpha}|t|^{\alpha}\right)\sin\left[\mu t+\sigma^{\alpha}|t|^{\alpha}\beta\tan(\alpha\pi/2)\operatorname{sgn}(t)\right]

(12)

The last two equations lead to

arctan(Imϕ(t)Reϕ(t))=μt+σα|t|αβtan(απ/2)sgn(t).\arctan\left(\frac{\operatorname{Im}\phi(t)}{\operatorname{Re}\phi(t)}\right)=\mu t+\sigma^{\alpha}|t|^{\alpha}\beta\tan(\alpha\pi/2)\operatorname{sgn}(t).

(13)

As the estimated parameters α^\hat{\alpha} and σ^\hat{\sigma} are obtained according to Equation. 10, we estimate another two parameters β\beta and μ\mu by regressing ql=μ+cdlq_{l}=\mu+cd_{l}, where dl=sgn(tl)|tl|α1{d_{l}=\operatorname{sgn}\left(t_{l}\right)\left|t_{l}\right|^{\alpha-1}} and c=σαβtan(απ/2){c=\sigma^{\alpha}\beta\tan(\alpha\pi/2)}. And we denote φ(tl)=1tlarctan(Imϕ(tl)Reϕ(tl))\varphi\left(t_{l}\right)=\frac{1}{t_{l}}\arctan\left(\frac{\operatorname{Im}\phi\left(t_{l}\right)}{\operatorname{Re}\phi\left(t_{l}\right)}\right) and minimize the mean-square error between φ(tl)\varphi\left(t_{l}\right) and qlq_{l}.

(c,μ)=argmin(c,μ)l=1L(φ(tl)ql)2=argmin(c,μ)l=1L(1tlarctan(Imϕ(tl)Reϕ(tl))μcdl)2\begin{aligned} \left(c^{*},\mu^{*}\right)&=\underset{(c,\mu)}{\arg\min}\sum_{l=1}^{L}\left(\varphi\left(t_{l}\right)-q_{l}\right)^{2}\\ &=\underset{(c,\mu)}{\arg\min}\sum_{l=1}^{L}\left(\frac{1}{t_{l}}\arctan\left(\frac{\operatorname{Im}\phi\left(t_{l}\right)}{\operatorname{Re}\phi\left(t_{l}\right)}\right)-\mu-cd_{l}\right)^{2}\end{aligned}

(14)

We denote E(c,μ)=l=1L(φ(tl)ql)2E_{(c,\mu)}=\sum_{l=1}^{L}\left(\varphi\left(t_{l}\right)-q_{l}\right)^{2}, and the solution can obtained by resolving the follows:

{E(e,μ)c=2(cl=1Ldl2l=1L(φ(tl)μ)dl)=0E(c,μ)μ=2(Lμl=1L(φ(tl)cdl))=0\left\{\begin{aligned} \frac{\partial E_{(e,\mu)}}{\partial c}&=2\left(c\sum_{l=1}^{L}d_{l}^{2}-\sum_{l=1}^{L}\left(\varphi\left(t_{l}\right)-\mu\right)\cdot d_{l}\right)&=0\\ \frac{\partial E_{(c,\mu)}}{\partial\mu}&=2\left(L\mu-\sum_{l=1}^{L}\left(\varphi\left(t_{l}\right)-cd_{l}\right)\right)&=0\end{aligned}\right.

(15)

The estimated parameters β^\hat{\beta} and μ^\hat{\mu} are obtained by:

{β^=c^σ^α^tan(α^π/2)μ^=1Ll=1L(φ(tl)c^dl)\left\{\begin{aligned} \hat{\beta}=&\frac{\hat{c}}{\hat{\sigma}^{\hat{\alpha}}\tan(\hat{\alpha}\pi/2)}\\ \hat{\mu}=&\frac{1}{L}\sum_{l=1}^{L}\left(\varphi\left(t_{l}\right)-\hat{c}d_{l}\right)\end{aligned}\right. (16)

where

c^=l=1Lφ(tl)(dld¯)l=1Ldl21L(l=1Ldl)2,\hat{c}=\frac{\sum_{l=1}^{L}\varphi\left(t_{l}\right)\left(d_{l}-\bar{d}\right)}{\sum_{l=1}^{L}d_{l}^{2}-\frac{1}{L}\left(\sum_{l=1}^{L}d_{l}\right)^{2}}, (17)

and d¯=1Ll=1Ldl\bar{d}=\frac{1}{L}\sum_{l=1}^{L}d_{l}.

Refer to caption
Figure 3: Probability density function (PDF) of application-layer transmission delay of DSRC, where α=1.77395,β=1,μ=72.7343,σ=13.3685\alpha=1.77395,\beta=1,\mu=72.7343,\sigma=13.3685

With equations 10 and 16, and given the observed data set X(0)X^{(0)}, we obtain the four estimated parameter of the Stable distribution. First, the given observed data set is X(0)=(x1(0),x2(0),,xn(0))X^{(0)}=(x_{1}^{(0)},x_{2}^{(0)},\cdots,x_{n}^{(0)}). In the pthpth iteration, we standardize the data by:

xj(p)=(xj(p1)μp1)/σp1,p=1,2,x_{j}^{(p)}=\left(x_{j}^{(p-1)}-\mu_{p-1}\right)/\sigma_{p-1},p=1,2,\cdots (18)

where σ0=(x.72x.28)/1.654{\sigma_{0}=\left(x_{.72}-x_{.28}\right)/1.654} and μ0=25%\mu_{0}=25\% truncated mean of origin data, xfx_{f} is ff sample quantile fama1971parameter . We choose optimum K(p)K^{(p)} point tk=πk/25,k=1,2,,K(p)t_{k}=\pi k/25,k=1,2,\cdots,K^{(p)} koutrouvelis1980regression to estimate α^(p)\hat{\alpha}^{(p)} and σ^(p)\hat{\sigma}^{(p)} in Equation. 10.

α^(p)=k=1K(p)f(tk)(ωkω¯)k=1K(p)ωk21K(k=1K(p)ωk)2{\hat{\alpha}^{(p)}=\frac{\sum_{k=1}^{K^{(p)}}f\left(t_{k}\right)\left(\omega_{k}-\bar{\omega}\right)}{\sum_{k=1}^{K^{(p)}}\omega_{k}^{2}-\frac{1}{K}\left(\sum_{k=1}^{K^{(p)}}\omega_{k}\right)^{2}}} (19)
σ^(p)=(expb^(p))/2α^(p){\hat{\sigma}^{(p)}=\sqrt[\hat{\alpha}^{(p)}]{(\exp\hat{b}^{(p)})/2}} (20)

where f(tk)=ln(ln|1nj=1nexp(itkxj(p))|2)f\left(t_{k}\right)=\ln\left(-\ln\left|\frac{1}{n}\sum_{j=1}^{n}\exp\left(it_{k}x_{j}^{(p)}\right)\right|^{2}\right).

And these estimated parameters are in turns to obtains another two estimated parameters β^(p)\hat{\beta}^{(p)} and μ^(p)\hat{\mu}^{(p)} with optimum LpL^{p} points tl=πl/25,l=1,2,,L(p)t_{l}=\pi l/25,l=1,2,\cdots,L^{(p)} koutrouvelis1980regression in Equation. 16.

β^(p)=c^(p)σ¯α¯tan(α¯π/2)\hat{\beta}^{(p)}=\frac{\hat{c}^{(p)}}{\bar{\sigma}^{\bar{\alpha}}\tan(\bar{\alpha}\pi/2)} (21)
μ^(p)=1L(p)l=1L(p)(φ(tl)c^(p)dl)\hat{\mu}^{(p)}=\frac{1}{L^{(p)}}\sum_{l=1}^{L^{(p)}}\left(\varphi\left(t_{l}\right)-\hat{c}^{(p)}d_{l}\right) (22)

where α¯=α^(p)\bar{\alpha}={\hat{\alpha}^{(p)}} , σ¯=σ^(p)\bar{\sigma}={\hat{\sigma}^{(p)}} and

φ(tl)=1tlarctan(j=1nsin(tlxj(p))j=1ncos(tlxj(p))).\varphi\left(t_{l}\right)=\frac{1}{t_{l}}\arctan\left(\frac{\sum_{j=1}^{n}\sin\left(t_{l}x_{j}^{(p)}\right)}{\sum_{j=1}^{n}\cos\left(t_{l}x_{j}^{(p)}\right)}\right). (23)

After finite iteration, we obtain the four estimated parameters which are satisfy required accuracy. We estimate the Stable distribution model using 1804 data packet transmissions latency obtained by real-world field testing. Fig. 3 shows the probability density function (PDF) of the application-layer delay. The distribution of application-layer delay is almost symmetric (α=1.77395\alpha=1.77395) about the Mean (μ=72.7343\mu=72.7343). We are 95 percent confident that the true Mean lies within the interval 71.938471.9384 and 73.530173.5301. As can be seen, the resulting distribution is characterized by the left-skewness (β=1\beta=1) and the average of the not small squared differences from the Mean (σ=13.3685\sigma=13.3685).

4.2 Packet Loss Detection Method

We propose a packet loss detection method in fog nodes based on the historical information including data transmission frequency and locations of vehicles. The general idea is described as follows. Each fog node obtains the ID set of vehicles, which are supposed to report their status according to uploading frequency. If the fog node does not receive the packets which are expected. There are two possible cases. First, the vehicle is out of DSRC communication range, thus, the packet cannot be delivered successfully. Second, the vehicle is within the DSRC communication range, however, the packet is lost in the transmission. For those packets, fog node figures out whether the vehicle is out of communication range according its historical position, if not, fog node supposes that the packet is lost.

Without loss of generality, we consider that the system consists of one fog node and a number of vehicles. Note that it can be straightforwardly extended to the scenario of multiple fog nodes. In the concerned scenario, we use set E=(e1,e2,,e|E|)E=(e_{1},e_{2},\cdots,e_{|E|}) to denote the time slots, where ek+1ek=1ξe_{k+1}-e_{k}=\frac{1}{\xi}, k=1,2,,|E|k=1,2,\cdots,|E|, and |E||E| is the number of the time slot set. We use set V=(v1,v2,,v|V|)V=(v_{1},v_{2},\cdots,v_{|V|}) to denote vehicles, where |V||V| is the number of vehicles. At time ere_{r}, the position, velocity, acceleration, heading direction of vehicle viv_{i} are denoted by lvierl_{v_{i}}^{e_{r}}, sviers_{v_{i}}^{e_{r}}, aviera_{v_{i}}^{e_{r}} and dvierd_{v_{i}}^{e_{r}}, respectively. The location of the fog node is denoted by lf{l}_{f}. And the communication range of DSRC is denoted by RR. he distance between vehicle vi{v_{i}} and the fog node at time ere_{r} is denoted by dis(lvier,lf)dis({l_{v_{i}}^{e_{r}}},{l_{f}}). If dis(lvier,lf)Rdis({l_{v_{i}}^{e_{r}}},{l_{f}})\leq R, vehicle vi{v_{i}} can communicate with the fog node.

The fog node receives a number of packets denoted by Mek=(m1,m2,,m|Mek|)M_{e_{k}}={(m_{1},m_{2},\cdots,m_{|{M}_{e_{k}}|})} at time eke_{k}, ekEe_{k}\in E, where mq=(lvier,svier,avier,dvier)m_{q}=({{{l}_{v_{i}}^{e_{r}}},{{s}_{v_{i}}^{e_{r}}},{{a}_{v_{i}}^{e_{r}}},{{d}_{v_{i}}^{e_{r}}}}), mqMekm_{q}\in{M}_{e_{k}} and |Mek||{M}_{e_{k}}| is the number of the packets set. Meanwhile, fog node records the received packets of each time slot. At time eke_{k}, we use set Hek=(Me1,Me2,,Mek1){H_{e_{k}}}=({M_{e_{1}}},{M_{e_{2}}},\cdots,{M_{e_{k-1}}}) to denote the historical records. The packet loss detection method is departed into two steps.

Record):Record): Fog node maintains a vehicles ID set IDek{ID}_{e_{k}}, which records ID of all vehicles under the coverage of the fog node at time eke_{k}. IDek{{ID}_{e_{k}}} initialize as IDek=IDek1{{ID}_{e_{k}}}={{ID}_{e_{k-1}}}. When the fog node receives a number of packets MekM_{e_{k}} at time slot eke_{k}. For mq=(lvier,svier,avier,dvier)m_{q}=({{{l}_{v_{i}}^{e_{r}}},{{s}_{v_{i}}^{e_{r}}},{{a}_{v_{i}}^{e_{r}}},{{d}_{v_{i}}^{e_{r}}}}), mqMek{m_{q}}\in M_{e_{k}}, if the fog node receives the packet of vehicle viv_{i} at the first time, viIDek{v_{i}}\notin{ID}_{e_{k}}, then adds vi{{v_{i}}} into IDek{ID}_{e_{k}}, IDek=IDek{vi}{{ID}_{e_{k}}}={ID}_{e_{k}}\cup\{{v_{i}}\}. Fog node searches MekM_{e_{k}} and adds all vehicle ID into the set IDMek{ID}_{M_{e_{k}}}.

Detection):Detection): For the vehicle vi{v_{i}}, viIDekIDMek{v_{i}}\in{ID}_{e_{k}}\cup{{ID}_{M_{e_{k}}}}, there are two cases: a) viIDekIDMek{v_{i}}\in{{ID}_{e_{k}}}\setminus{{ID}_{M_{e_{k}}}}, vehicle viv_{i} can communicate with fog node, however, fog node does not receive the packet from it; b) viIDekIDMek{v_{i}}\in{{ID}_{e_{k}}}\cap{{ID}_{M_{e_{k}}}}, vehicle viv_{i} can communicate with fog node, and fog node receives its packet. Therefore, for case a, fog node searches Hek{H_{e_{k}}} to get its laster new position lvier{{l}_{v_{i}}^{e_{r}}}. Fog node use a distance threshold τ\tau and a time threshold γ\gamma to detect whether the vehicle is out of communication range. If the vehicle is within the communication range, fog node detects whether the packet is lost in transmission. If the distance between vehicle vi{v_{i}} and fog node dis(lvier,lf)Rτdis({l_{v_{i}}^{e_{r}}},{l_{f}})\geq R-\tau, that means vehicle vi{v_{i}} is leaving the communication range. So that, fog node remove vi{v_{i}} from IDek{{ID}_{e_{k}}}, IDek=IDek{vi}{{ID}_{e_{k}}}={{ID}_{e_{k}}}\setminus\{{v_{i}}\}. If dis(lvier,lf)<Rτdis({l_{v_{i}}^{e_{r}}},{l_{f}})<R-\tau, that means vehicle viv_{i} can communicate with fog node, however, fog node does not receive its packet. The estimated received time is er+1ξ{e_{r}}+\frac{1}{\xi}, if eker>1ξ+γ{e_{k}}-{e_{r}}>\frac{1}{\xi}+\gamma, fog node assume the packet is lost. Otherwise, vehicle viv_{i} does not send the packet yet, or the packet is delay due to the wireless communication.

4.3 Procedures of TCCW Algorithm

The general procedures of TCCW are described as follows. First, we estimate the transmission latency of each data packet and update their real-time status according to their velocity and acceleration. Second, we detect the lost packets and update their status using packets records in the fog node. Third, we calibrate vehicle trajectories using simulated transmission latency. Then, we predict the future trajectories based on calibrated trajectories. Finally, we predict the potential collisions by calculating the headway of each pair of vehicles and using the headway threshold. At time ek{e_{k}}, vehicle ID set IDek{ID}_{e_{k}}, received packets MekM_{e_{k}}, packets records HekH_{e_{k}} are known as the input of the algorithm. The output of TCCW is the warning message set WekW_{e_{k}}. The detailed procedures of TCCW are presented as follows and the pseudo-code is shown in Algorithm. 1.

Algorithm 1 TCCW
0:    Mek=(m1,m2,,m|Mek|)M_{e_{k}}={(m_{1},m_{2},\cdots,m_{|{M}_{e_{k}}|})}, the received packets set. Hek=(Me1,Me2,,Mek1){H_{e_{k}}}=({M_{{e_{1}}}},{M_{{e_{2}}}},\cdots,{M_{{e_{k-1}}}}), the historical packets set.IDek{{ID}_{e_{k}}}, vehicle ID set at time ek{e_{k}}.
0:  Wek={wekv1,wekv2,,wekv|V|}{W_{e_{k}}}=\{{w_{e_{k}}^{v_{1}}},{w_{e_{k}}^{v_{2}}},\cdots,{w_{e_{k}}^{v_{|V|}}}\}  
1:  IDek=IDek1{{ID}_{e_{k}}}={{ID}_{e_{k-1}}}
2:  IDMek={}{{ID}_{M_{e_{k}}}}=\{\}
3:  for mpMek{{m}_{p}}\in{M_{e_{k}}} do
4:     IDMek=IDMek{vi}{{ID}_{M_{e_{k}}}}={{ID}_{M_{e_{k}}}}\cup\{{v_{i}}\}
5:     if viIDek{{v_{i}}}\notin{{ID}_{e_{k}}} then
6:        IDek=IDek{vi}{{ID}_{e_{k}}}={{ID}_{e_{k}}}\cup\{{v_{i}}\}
7:     end if
8:  end for
9:  for viIDekIDMek{{v_{i}}}\in{{ID}_{e_{k}}}\cup{{ID}_{M_{e_{k}}}} do
10:     if viIDekIDMek{v_{i}}\in{{ID}_{e_{k}}}\setminus{{ID}_{M_{e_{k}}}} then
11:        Search Hek{H_{e_{k}}} and get latest new packet mqm_{q}
12:        if dis(lvier,lf)rτdis({{l}_{v_{i}}^{e_{r}}},{l_{f}})\geq r-\tau then
13:           IDek=IDek{vi}{{ID}_{e_{k}}}={{ID}_{e_{k}}}\setminus\{{v_{i}}\}
14:        else
15:           if eker>1ξ+γ{e_{k}}-{e_{r}}>\frac{1}{\xi}+\gamma then
16:              Mek=Mek{mq}{M_{e_{k}}}={M_{e_{k}}}\cup\{{{m}_{q}}\}
17:           end if
18:        end if
19:     end if
20:  end for
21:  for mvierpMeb{{m}_{v_{i}}^{e_{r_{p}}}}\in{M_{e_{b}}} do
22:     ets=eker+etvi{e_{ts}}={e_{k}}-{e_{r}}+{e_{t}^{v_{i}}}
23:     Update location of vehicle using Eq.24
24:  end for
25:  for mpMek{{m}_{p}}\in{M_{e_{k}}} do
26:     repeat
27:        ets=ets+1ξ{e_{ts}}={e_{ts}}+\frac{1}{\xi}
28:        Calculate lviets{{l}_{v_{i}}^{e_{ts}}} using Eq.24
29:        Travi=Travi{lviek}{{Tra}_{v_{i}}}={{Tra}_{v_{i}}}\cup\{{{l}_{v_{i}}^{e_{k}}}\}
30:     until ets>ek+epre{e_{ts}}>{{e_{k}}+{e_{pre}}}
31:     Tra=Tra{Travi}{Tra}={Tra}\cup\{{{Tra}_{v_{i}}}\}
32:  end for
33:  for TraviTra{{Tra}_{v_{i}}}\in{Tra} and TravjTra{Travi}{{Tra}_{v_{j}}}\in{Tra}\setminus\{{{Tra}_{v_{i}}}\} do
34:     for lvieuTravi{l_{v_{i}}^{e_{u}}}\in{{Tra}_{v_{i}}} and lvjevTravj{l_{v_{j}}^{e_{v}}}\in{{Tra}_{v_{j}}} do
35:        if dis(lvieu,lvjev)<dcoldis({l_{v_{i}}^{e_{u}}},{l_{v_{j}}^{e_{v}}})<d_{col} then
36:           hij=|euev|{h}_{ij}=|e_{u}-e_{v}|
37:           if hij<ı{h}_{ij}<\imath then
38:              wviek=wvjek=1{w_{v_{i}}^{e_{k}}}={w_{v_{j}}^{e_{k}}}=1
39:           end if
40:        end if
41:     end for
42:  end for

1)Updatingthevehicleset:1)\ Updating\ the\ vehicle\ set: The purpose of updating the vehicle set is to maintain the vehicle ID set IDek{{ID}_{e_{k}}}. We initialize vehicle ID set IDek{{ID}_{e_{k}}} at time ek{e_{k}} and the ID set IDMek{{ID}_{M_{e_{k}}}} of received packets Mek{M_{e_{k}}}. IDMek{{ID}_{M_{e_{k}}}} contains every vehicle ID in received packets, and if the vehicle ID is not contained by IDek{{ID}_{e_{k}}}, then fog node add the vehicle ID into IDek{{ID}_{e_{k}}}. The detailed procedure of updating the vehicle set is shown in lines 1-8 in Algorithm. 1.

2)Detectingpacketloss:2)\ Detecting\ packet\ loss: Fog node detects the packet loss in transmission using the method introduced in Section. 4.2. For those vehicles that fog node do not received from them, fog node searches packets records Hea{H}_{e_{a}} to get last new vehicle state information, and add it into Meb{M_{e_{b}}}. The detailed procedure of detecting packet loss is shown in lines 9-20 in Algorithm. 1.

3)Calibratingvehicletrajectories:3)\ Calibrating\ vehicle\ trajectories: For the packet mp{{m}_{p}}, mpMek{{m}_{p}}\in M_{e_{k}}, fog node estimates the transmission latency etvie_{t}^{v_{i}} of the packet by generating a random number using the Stable distribution. Fog node estimates the packet send time e^c=eretvi{\hat{e}_{c}}={e_{r}}-e_{t}^{v_{i}}. The interval between time ek{e_{k}} and packet send time e^c{\hat{e}_{c}} is ets=eker+etvi{e_{ts}}={e_{k}}-{e_{r}}+e_{t}^{v_{i}}. Fog node updates location information of vehicle vi{v_{i}} as follows:

{lxviek=lxvier+etssxvier+12ets2axvierplyviek=lyvier+etssyvier+12ets2ayvierp\left\{\begin{array}[]{ll}{{l_{x}}_{v_{i}}^{e_{k}}}={{l_{x}}_{v_{i}}^{e_{r}}}+{e_{ts}}{{s_{x}}_{v_{i}}^{e_{r}}}+\frac{1}{2}{e_{ts}^{2}}{{a_{x}}_{v_{i}}^{e_{r_{p}}}}\\ {{l_{y}}_{v_{i}}^{e_{k}}}={{l_{y}}_{v_{i}}^{e_{r}}}+{e_{ts}}{{s_{y}}_{v_{i}}^{e_{r}}}+\frac{1}{2}{e_{ts}^{2}}{{a_{y}}_{v_{i}}^{e_{r_{p}}}}\end{array}\right. (24)

where lxviek{l_{x}}_{v_{i}}^{e_{k}}, lyviek{l_{y}}_{v_{i}}^{e_{k}}, sxviek{s_{x}}_{v_{i}}^{e_{k}}, syviek{s_{y}}_{v_{i}}^{e_{k}}, axviek{a_{x}}_{v_{i}}^{e_{k}}, ayviek{a_{y}}_{v_{i}}^{e_{k}} are positions, speeds, accelerations of vehicle viv_{i} in X and Y coordinate respectively. Lines 21-24 in Algorithm. 1 show the detailed procedure of calibrating vehicle trajectories.

4)Predictingfuturetrajectories:4)\ Predicting\ future\ trajectories: For vehicle viv_{i}, fog node predicts the future trajectories in time slot (ek,ek+epre)({e_{k}},{e_{k}}+{e_{pre}}), where epre{e_{pre}} is fog node prediction time. Fog node calculates the vehicle position in every 1ξ\frac{1}{\xi} second, and appends the position into the trajectory set Travi{Tra}_{v_{i}} of vehicle viv_{i}. The detailed procedure of predicting future vehicle trajectories is shown in lines 25-32 in Algorithm. 1.

5)Predictingpotentialcollisions:5)\ Predicting\ potential\ collisions: Fog node use a set of warning message Wek={wv1ek,wv2ek,,wv|V|ek}{W_{e_{k}}}=\{{w_{v_{1}}^{e_{k}}},{w_{v_{2}}^{e_{k}}},\cdots,{w_{v_{|V|}}^{e_{k}}}\}, wviek{w_{v_{i}}^{e_{k}}} is a binary variable to indicate whether vehicle viv_{i} has the potential collision. For lvieuTravi{l_{v_{i}}^{e_{u}}}\in{{Tra}_{v_{i}}} and lvjevTravj{l_{v_{j}}^{e_{v}}}\in{{Tra}_{v_{j}}}, fog node calculates the distance of the two vehicles dis(lvieu,lvjev)dis({l_{v_{i}}^{e_{u}}},{l_{v_{j}}^{e_{v}}}). We assume that vehicle viv_{i} and vjv_{j} pass the same point if the distance dis(lvieu,lvjev)<dcoldis({l_{v_{i}}^{e_{u}}},{l_{v_{j}}^{e_{v}}})<d_{col}. The elapsed time between the front of the lead vehicle passing a point on the roadway and the front of the following vehicle passing the same point is defined as the headway vogel2003comparison . Fog node calculates the headway hij=|euev|{h}_{ij}=|e_{u}-e_{v}|, and if hij<ı{h}_{ij}<\imath, where ı\imath is the headway threshold, warning message will be triggered, wviek=wviek=1{w_{v_{i}}^{e_{k}}}={w_{v_{i}}^{e_{k}}}=1. Lines 32-42 in Algorithm. 1 show the detailed procedure of predicting potential collisions.

5 Performance Evaluation

5.1 Experiment Setup

Refer to caption
Figure 4: Transmission delay under different system architectures where average delay of packets transmission in cloud and fog computing is 120ms{ms} and 77ms{ms}, respectively

To further demonstrate the performance of our algorithm, we carry out another real-world field testing, and obtain 600 packet transmission delay via two different architectures, both fog computing and cloud computing architecture. In the field testing experiment, when a vehicle is approaching the road intersection, it uploads its status including GPS coordinates, velocity, acceleration, heading direction to fog node. In detail, the vehicle uploading frequency is 1 HZ, in another word, vehicles send packets in every one second. 600 packets, which are transmitted to fog node via DSRC and cloud node via 4G-LTE respectively, are collected and analyzed. Fig. 4 shows that the average delay of packets transmission in cloud computing architecture is 120ms{ms}, otherwise, the average delay of the fog computing architecture is 77ms{ms}. It is obvious that packet transmission latency in the fog computing based architecture is lower than that in the cloud computing based. Undoubtedly, the results conclusively demonstrate the superiority of vehicular fog computing enabled collision warning system for supporting low latency and safety-critical services. The real-world communication latency obtained by a field-testing experiment is utilized as transmission delay of each packets in the simulation experiment.

First, we employ a vehicle mobility dataset of real taxi trajectory in the experiment. The dataset is collected on an area of about 400 square kilometers from Cologne, Germany for a period of 24 hours in a typical working day uppoor2013 . There are more than 1.2 million individual vehicle trajectories, which contains 3.5 billion points of vehicular positions. The dataset contains vehicles positions in a broad range as a whole city, we choose some different road intersection to implement the system, therefore, the experiment scenarios have different traffic conditions. The features of five scenarios are listed in Table. 2. We evaluate the traffic features with different scenarios in terms of vehicle number, average speed, and average acceleration. Vehicle number is a variable to generally describe vehicular density of the scenario using a number of vehicles on the road or pass through in a period. Average speed is the average speed of vehicles in the scenario. As follows is specific data of vehicle number, average speed and average acceleration in five selected scenarios. In scenarios 1, 2 and 3, fog node is located in a road intersection shown in Fig. 5(a), and scenarios 1, 2, 3 start the experiment at 10 PM, 8 AM and 7 PM, respectively. The fog node is located in center of Fig. 5(b) in scenario 4 and 5. It starts the experiment at 4 PM and 6 PM. Fog node is installed in (10422.0,12465.3)(10422.0,12465.3) of the first three scenarios and in (6097.1,14870.0)(6097.1,14870.0) of the last two scenarios. X and Y coordinates represent location of vehicle with two-dimensional in meters.

Table 2: Different features in selected scenarios
      Scenario       1       2       3       4       5
      Vehicle Number       54       81       106       85       114
      Average Speed(km/hkm/h)       50.44       46.58       38.16       69.19       69.05
      Average Acceleration(m/s2m/s^{2})       0.203       0.007       0.075       0.165       0.060
Refer to caption
(a) Fog node located in (10422.0,12465.3)(10422.0,12465.3)
Refer to caption
(b) Fog node located in (6097.1,14870.0)(6097.1,14870.0)
Figure 5: Vehicular trajectory in two road intersections without traffic lights in 7 PM and 6 PM, respectively

Apart from the five selected scenarios, we also implement the system under different headway and packet loss rate. Headway is a time slot between two vehicles passes through one point, but in the experiment, there is a headway threshold to determine whether the potential collision warning happened. If the headway threshold is small, the prediction collision number will less. The duration of each experiment is 100 seconds, and DSRC communication range is 500 meters. We conduct three sets of experiments, for each set of experiments, we change different parameters including scenario, headway and packet loss rate. We can find that performance of proposed system in several scenarios where traffic conditions are different.

In specific, there are predicted collision warning message set Wp{W_{p}} and expected collision warning set Wd{W_{d}} in the experiment. The number of expected warnings |Wd|\left|{W_{d}}\right| is the number of expected collision warning according to experimental setup, the number of predicted collision warning message |Wp|\left|{W_{p}}\right| is the number of potential collisions predicted by the collision warning system. Further, |WdWp|\left|{{W_{d}}\cap{W_{p}}}\right| means the number of expected collision warnings which are actual predicted success, in another word, the number of successful predictions. |WdWp|\left|{{W_{d}}-{W_{p}}}\right| is the number of expected warnings which should be triggered but not be predicted successful by collision warning system, in a word, it is failed predictions in Wp{W_{p}}. In the same, |WpWd|\left|{{W_{p}}-{W_{d}}}\right| is the number of wrong predictions, namely, it is potential collision predicted by collision warning system, however, it is not expected collision warning. We define precision and recall as follows:

precision=|WdWp||WdWp|+|WpWd|precision=\frac{{\left|{{W_{d}}\cap{W_{p}}}\right|}}{{\left|{{W_{d}}\cap{W_{p}}}\right|+\left|{{W_{p}}-{W_{d}}}\right|}} (25)
recall=|WdWp||WdWp|+|WdWp|recall=\frac{{\left|{{W_{d}}\cap{W_{p}}}\right|}}{{\left|{{W_{d}}\cap{W_{p}}}\right|+\left|{{W_{d}}-{W_{p}}}\right|}} (26)
Refer to caption
(a) Precision with different scenarios
Refer to caption
(b) Recall with different scenarios
Figure 6: System performance with different scenarios, difference of scenarios are listed in Table. 2

Comparing the superiority of distributed fog computing architecture to centralized cloud computing, we implement the system in both cloud computing and fog computing architecture. To compare the performance of our algorithm, we implement the collision system with three different algorithms as below:

Cloud-Based Warning (CBW): The collision warning system is implemented in the centralized cloud computing architecture, specifically, vehicles upload their status information to a cloud server, which is far away from vehicles. In the experiment, we utilize a transmission latency obtained by a field testing experiment to simulate the communication delay between vehicles and cloud node. Cloud server predicts potential collision warning on the basis of vehicle status without trajectories calibration.

Fog-Based Without Calibration (FWC): The collision warning system is implemented in the traditional fog computing architecture. In the fog computing architecture, the majority system is implemented as same as CBW, expects the network architecture. Due to new network architecture, communication latency drastically reduces. Vehicles upload their status to nearby fog nodes, and we use transmission delay obtained in real-world field testing as transmission latency of each packets. The fog node predicts the potential collisions without trajectory calibration.

Trajectory Calibration based Collision Warning(TCCW): The details of TCCW are introduced in Section. 4. Fog node predicts potential collision by calibrating vehicle trajectory considering both transmission latency and packet loss.

5.2 Experiment Result and Analysis

Fig. 6 shows the precision and recall of three algorithms under different experiment scenarios. It is obvious that the trajectories calibration improve the performance in both precision and recall in no matter what traffic conditions. With the benefit of trajectory calibration in the fog node, vehicle status are much closer to the real-time status, in other words, vehicle positions with trajectories calibration are more closer to the real vehicle positions.

Refer to caption
(a) Precision with different headway
Refer to caption
(b) Recall with different headway
Figure 7: System performance with different headways, which increases from 1 to 5 seconds
Refer to caption
(a) Precision with different packet loss rate
Refer to caption
(b) Recall with different packet loss rate
Figure 8: System performance with different packet loss rate, which increases from 0% to 6%

Fig. 7 compares the precision and recall of three algorithms with different headway thresholds. Fig. 7 shows the headway threshold increases from 1 to 5 seconds. As the headway threshold increases, precision has improved. Since headway threshold turns large, the number of predicted collisions get larger, in another word, |W|\left|W\right| get bigger. Thus, the precision of proposed system is improved, on the other hand, recall reduces as headway threshold increased.

Fig. 8 compares the precision and recall of three algorithms with different packet loss rates. As shown in Fig. 8, when the packet loss rate increases from 0% up to 6%, performance of CBW and FWC become worse, however, performance of TCCW is better than the two algorithms with the help of trajectory calibration. The experiment result shows that due to the low communication latency supported by fog computing architecture, the performance of FWC is better than CBW. And we can also find that with the help of trajectory calibration, the performance of TCCW is better than both CBW and FWC.

6 Conclusion

In this paper, we present a VFC based real-time collision warning architecture to support safety-critical ITS applications. We propose a TCCW algorithm, which calibrates vehicle trajectories by combining transmission latency estimation and packet loss detection. We estimate the transmission latency by deriving a packet transmission delay fitting model in application-layer based on the Stable distribution, where the fitting data are obtained by implementing a DSRC based system in realistic field testing. Moreover, we detect the packet loss based on the historical information including data transmission frequency and locations of vehicles. We give a comprehensive simulation and the result demonstrates the superiority of TCCW comparing with cloud-based warning and fog-based warning without trajectory calibration in terms of both recall and precision on collision warning.

Acknowledgements.
This work was supported in part by the National Natural Science Foundation of China under Grant No.61872049, No.61876025 and No. 61803054; the Venture &\& Innovation Support Program for Chongqing Overseas Returnees (Project No. cx2018016), and the Fundamental Research Funds for the Central Universities (2019CDQYZDH030).

References

  • (1) Kenney JB (2011) Dedicated short-range communications (DSRC) standards in the united states. Proceedings of the IEEE 99(7):1162-1182
  • (2) Agiwal M, Roy A, Saxena N (2016) Next generation 5G wireless networks: A comprehensive survey. IEEE Communications Surveys & Tutorials 18(3):1617-1655
  • (3) Araniti G, Campolo C, Condoluci M, Iera A, Molinaro A (2013) LTE for vehicular networking: A survey. IEEE Communications Magazine 51(5):148-157
  • (4) Ucar S, Ergen SC, Ozkasap O (2015) Multihop-cluster-based IEEE 802.11 p and LTE hybrid architecture for VANET safety message dissemination. IEEE Transactions on Vehicular Technology 65(4):2621-2636
  • (5) Dai P, Liu K, Wu X, Liao Y, Lee VC, Son SH (2018) Bandwidth efficiency and service adaptiveness oriented data dissemination in heterogeneous vehicular networks. IEEE Transactions on Vehicular Technology, 67(7):6585-6598
  • (6) Ahmed E, Gharavi H (2018) Cooperative vehicular networking: A survey. IEEE Transactions on Intelligent Transportation Systems 19(3):996-1014
  • (7) Liu K, Xu X, Chen M, Liu B, Wu L, Lee VC (2019) A hierarchical architecture for the future internet of vehicles. IEEE Communications Magazine 57(7):41-47
  • (8) Zhai X, Guan X, Zhu C, Shu L, Yuan J (2018) Optimization algorithms for multiaccess green communications in internet of things. IEEE Internet of Things Journal 5(3):1739-1748
  • (9) Zhai X, Liu X, Zhu C, Zhu K, Chen B (2019) Fast admission control and power optimization with adaptive rates for communication fairness in wireless networks. IEEE Transactions on Mobile Computing https://doi.org/10.1109/TMC.2019.2954126
  • (10) Liu K, Ng J.K, Lee V, Son SH, Stojmenovic I (2016) Cooperative data scheduling in hybrid vehicular ad hoc networks: VANET as a software defined network. IEEE/ACM Transactions on Networking (TON) 24(3):1759-1773
  • (11) Dai P, Liu K, Feng L, Zhuge Q, Lee VC, Son SH (2016) Adaptive scheduling for real-time and temporal information services in vehicular networks. Transportation Research Part C: Emerging Technologies 71:313-332
  • (12) Wang J, Liu K, Xiao K, Chen C, Wu W, Lee VC, Son SH (2017) Dynamic clustering and cooperative scheduling for vehicle-to-vehicle communication in bidirectional road scenarios. IEEE Transactions on Intelligent Transportation Systems 19(6):1913-1924
  • (13) Peng H, Li D, Ye Q, Abboud K, Zhao H, Zhuang W, Shen X (2017) Resource allocation for cellular-based inter-vehicle communications in autonomous multiplatoons. IEEE Transactions on Vehicular Technology 66(12):11249-11263
  • (14) Ahmed KJ, Lee MJ (2018) Secure resource allocation for LTE-based V2X service. IEEE Transactions on Vehicular Technology 67(12):11324-11331
  • (15) Liu K, Lim HB, Frazzoli E, Ji H, Lee VC (2013) Improving positioning accuracy using gps pseudorange measurements for cooperative vehicular localization. IEEE Transactions on Vehicular Technology 63(6):2544-2556
  • (16) Dai P, Liu K, Zhuge Q, Sha EHM, Lee VC, Son SH (2016) Quality-of-experience-oriented autonomous intersection control in vehicular networks. IEEE Transactions on Intelligent Transportation Systems 17(7):1956-1967
  • (17) Wang J, Liu K, Xiao K, Wang X, Han Q, Lee VC (2019) Delay-constrained routing via heterogeneous vehicular communications in software defined BusNet. IEEE Transactions on Vehicular Technology 68(6):5957-5970
  • (18) Liu K, Feng L, Dai P, Lee VC, Son SH, Cao J (2017) Coding-assisted broadcast scheduling via memetic computing in SDN-based vehicular networks. IEEE Transactions on Intelligent Transportation Systems 19(8):2420-2431
  • (19) Hou X, Li Y, Chen M, Wu D, Jin D, Chen S (2016) Vehicular fog computing: A view point of vehicles as the infrastructures. IEEE Transactions on Vehicular Technology 65(6):3860-3873
  • (20) Wang X, Ning Z, Wang L (2018) Offloading in Internet of vehicles: A fog-enabled real-time traffic management system. IEEE Transactions on Industrial Informatics 14(10):4568-4578
  • (21) Sun F, Hou F, Cheng N, Wang M, Zhou H, Gui L, Shen X (2018) Cooperative task scheduling for computation offloading in vehicular cloud. IEEE Transactions on Vehicular Technology 67(11):11049-11061
  • (22) Zhou Z, Liu P, Feng J, Zhang Y, Mumtaz S, Rodriguez J (2019) Computation resource allocation and task assignment optimization in vehicular fog computing: A contract-matching approach. IEEE Transactions on Vehicular Technology 68(4):3113-3125
  • (23) Yao Y, Rao L, Liu X, Zhou X (2013) Delay analysis and study of ieee 802.11 p based dsrc safety communication in a highway environment. In: 2013 Proceedings IEEE INFOCOM. IEEE, pp 1591-1599
  • (24) Zheng J, Wu Q (2015) Performance modeling and analysis of the IEEE 802.11p EDCA mechanism for VANET. IEEE Transactions on Vehicular Technology 65(4):2673-2687
  • (25) Peng H, Li D, Abboud K, Zhou H, Zhao H, Zhuang W, Shen XS (2016) Performance analysis of IEEE 802.11p DCF for multiplatooning communications with autonomous vehicles. IEEE Transactions on Vehicular Technology, 66(3):2485-2498
  • (26) Huang C, Lu R, Choo KKR (2017) Vehicular fog computing: architecture, use case, and security and forensic challenges. IEEE Communications Magazine 55(11):105-111
  • (27) Song W, Yang Y, Fu M, Qiu F, Wang M (2017) Real-time obstacles detection and status classification for collision warning in a vehicle active safety system. IEEE Transactions on Intelligent Transportation Systems 19(3):758-773
  • (28) Wu KH, Lin DB, Wang CW, Chou HT (2019) Series feed broadband patch array antenna design for vehicle collision warning radar system. In: 2019 Joint International Symposium on Electromagnetic Compatibility, Sapporo and Asia-Pacific International Symposium on Electromagnetic Compatibility (EMC Sapporo/APEMC). IEEE, pp 490-493
  • (29) Wang X, Tang J, Niu J, Zhao X (2016) Vision-based two-step brake detection method for vehicle collision avoidance. Neurocomputing 173:450-461
  • (30) Song W, Yang Y, Fu M, Li Y, Wang M (2018) Lane detection and classification for forward collision warning system based on stereo vision. IEEE Sensors Journal 18(12):5151-5163
  • (31) Hafner MR, Cunningham D, Caminiti L, Del Vecchio D (2013) Cooperative collision avoidance at intersections: Algorithms and experiments. IEEE Transactions on Intelligent Transportation Systems 14(3):1162-1175
  • (32) Gelbal SY, Arslan S, Wang H, Aksun-Guvenc B, Guvenc L (2017) Elastic band based pedestrian collision avoidance using V2X communication. In: 2017 IEEE Intelligent Vehicles Symposium (IV). IEEE, pp 270-276
  • (33) Xu X, Liu K, Xiao K, Ren H, Feng L, Chen C (2018) Design and implementation of a fog computing based collision warning system in VANETs. In: 2018 IEEE Symposium on Product Compliance Engineering-Asia (ISPCE-CN). IEEE, pp 1-6
  • (34) Samoradnitsky G (2017) Stable non-Gaussian random processes: Stochastic models with infinite variance. Routledge
  • (35) Fama EF, Roll R (1971) Parameter estimates for symmetric stable distributions. Journal of the American Statistical Association 66(334):331-338
  • (36) Koutrouvelis IA (1980) Regression-type estimation of the parameters of stable laws. Journal of the American statistical association 75(372):918-928
  • (37) Vogel K (2003) A comparison of headway and time to collision as safety indicators. Accident Analysis and Prevention 35(3):427-433
  • (38) Uppoor S, Trullols-Cruces O, Fiore M, Barcelo-Ordinas JM (2013) Generation and analysis of a large-scale urban vehicular mobility dataset. IEEE Transactions on Mobile Computing 13(5):1061-1075