A Context-Aware MAC Protocol for VANETs

  • Qiu Xu
  • Haikuan Fan
  • Shuangfei Guo
  • Xiaoqiang Xiao
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7992)


Collision-free transmission is important for reliable and delay-bounded wireless communication, which is required by many safety-related applications in vehicular ad-hoc networks (VANETs). However, with the increase of the vehicle node density, the channel contention collision of IEEE 802.11p known as the media access control (MAC) protocol standard for VANETs increases as well. Aiming at this problem, we propose a context-aware MAC protocol for VANETs with the basic idea of ensuring only one vehicle node access the channel initiatively while others conceal their contend intentions. According to the context message, we use the hamming competing network to decide which node will access the channel. Simulation results show that the proposed protocol has a considerably low collision probability and high transmission reliability while keeping a low access delay even in high dense scenario.


VANETs 802.11p MAC hamming network fuzzy logic 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Hiertz, G., Denteneer, D., Stibor, L., Zang, Y., Costa, X.P., Walke, B.: The IEEE 802.11 universe. IEEE Communications Magazine 48(1), 62–70 (2010)CrossRefGoogle Scholar
  2. 2.
    Strom, E.G.: On Medium Access and Physical Layer Standards for Cooperative Intelligent Transport Systems in Europe. Proceedings of the IEEE 99(7), 1183–1188 (2011)CrossRefGoogle Scholar
  3. 3.
    Jian, Y., Chen, S.: Can CSMA/CA networks be made fair? In: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, pp. 235–246 (2008)Google Scholar
  4. 4.
    Acatauassu, D., Couto, I., Alves, P., Dias, K.: Performance Evaluation of Inter-Vehicle Communications Based on the Proposed IEEE 802.11 p Physical and MAC Layers Specifications. In: The Tenth International Conference on Networks, pp. 170–174 (2011)Google Scholar
  5. 5.
    Balon, N., Guo, J.: Increasing broadcast reliability in vehicular ad hoc networks. In: Proceedings of the 3rd International Workshop on Vehicular Ad hoc Networks, pp. 104–105 (2006)Google Scholar
  6. 6.
    Lans, H.: Position indicating system. Google Patents (1996)Google Scholar
  7. 7.
    Zhang, S., Cahill, V.: Towards collision-free medium access control in vehicular ad-hoc networks. In: Proceedings of the Eighth ACM International Workshop on Vehicular Inter-Networking, pp. 83–84 (2011)Google Scholar
  8. 8.
    Yu, F., Biswas, S.: A self reorganizing MAC protocol for inter-vehicle data transfer applications in vehicular ad hoc networks. In: 10th International Conference on Information Technology (ICIT 2007), pp. 110–115 (2007)Google Scholar
  9. 9.
    Lu, N., Wang, X., Wang, P., Lai, P., Liu, F.: A distributed reliable multi-channel MAC protocol for vehicular ad hoc networks. In: IEEE Intelligent Vehicles Symposium, pp. 1078–1082 (2009)Google Scholar
  10. 10.
    Wang, Y., Ahmed, A., Krishnamachari, B., Psounis, K.: IEEE 802.11 p performance evaluation and protocol enhancement. In: IEEE International Conference on Vehicular Electronics and Safety, ICVES 2008, pp. 317–322 (2008)Google Scholar
  11. 11.
    Karamad, E., Ashtiani, F.: A modified 802.11-based MAC scheme to assure fair access for vehicle-to-roadside communications. Computer Communications 31(12), 2898–2906 (2008)CrossRefGoogle Scholar
  12. 12.
    Abdel Hafeez, K., Zhao, L., Liao, Z., Ngok-Wah Ma, B.: Clustering and OFDMA-based MAC protocol (COMAC) for vehicular ad hoc networks. EURASIP Journal on Wireless Communications and Networking 2011(1), 1–16 (2011)CrossRefGoogle Scholar
  13. 13.
    Henderson, T.R., Lacage, M., Riley, G.F., Dowell, C., Kopena, J.B.: Network simulations with the ns-3 simulator. In: SIGCOMM Demonstration (2008)Google Scholar
  14. 14.
    Arbabi, H., Weigle, M.C.: Highway mobility and vehicular ad-hoc networks in ns-3. In: Proceedings of the 2010 Winter Simulation Conference (WSC), pp. 2991–3003 (2010)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Qiu Xu
    • 1
  • Haikuan Fan
    • 1
  • Shuangfei Guo
    • 1
  • Xiaoqiang Xiao
    • 1
  1. 1.Computer SchoolNational University of Defense TechnologyChangshaChina

Personalised recommendations