<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">CMC</journal-id>
<journal-id journal-id-type="nlm-ta">CMC</journal-id>
<journal-id journal-id-type="publisher-id">CMC</journal-id>
<journal-title-group>
<journal-title>Computers, Materials &#x0026; Continua</journal-title>
</journal-title-group>
<issn pub-type="epub">1546-2226</issn>
<issn pub-type="ppub">1546-2218</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">24571</article-id>
<article-id pub-id-type="doi">10.32604/cmc.2022.024571</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Dynamic Vehicular Clustering Enhancing Video on Demand Services Over Vehicular Ad-hoc Networks</article-title>
<alt-title alt-title-type="left-running-head">Dynamic Vehicular Clustering Enhancing Video on Demand Services Over Vehicular Ad-hoc Networks</alt-title>
<alt-title alt-title-type="right-running-head">Dynamic Vehicular Clustering Enhancing Video on Demand Services Over Vehicular Ad-hoc Networks</alt-title>
</title-group>
<contrib-group content-type="authors">
<contrib id="author-1" contrib-type="author">
<name name-style="western"><surname>Almutiq</surname><given-names>M.</given-names></name><xref ref-type="aff" rid="aff-1">1</xref></contrib>
<contrib id="author-2" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Sellami</surname><given-names>L.</given-names></name><xref ref-type="aff" rid="aff-1">1</xref><xref ref-type="aff" rid="aff-2">2</xref><email>l.sellami@qu.edu.sa</email><email>sellami_lamaa@yahoo.fr</email></contrib>
<contrib id="author-3" contrib-type="author">
<name name-style="western"><surname>Alaya</surname><given-names>B.</given-names></name><xref ref-type="aff" rid="aff-1">1</xref>
<xref ref-type="aff" rid="aff-3">3</xref></contrib>
<aff id="aff-1"><label>1</label><institution>Department of Management Information Systems and Production Management, College of Business and Economics, Qassim University</institution>, <addr-line>6633, Buraidah, 51452</addr-line>, <country>Saudi Arabia</country></aff>
<aff id="aff-2"><label>2</label><institution>CONPRI Laboratory, University of Gabes</institution>, <country>Tunisia</country></aff>
<aff id="aff-3"><label>3</label><institution>IResCoMath Laboratory, University of Gabes</institution>, <country>Tunisia</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>&#x002A;</label>Corresponding Author: L. Sellami. Email: <email>l.sellami@qu.edu.sa</email>; <email>sellami_lamaa@yahoo.fr</email></corresp>
</author-notes>
<pub-date pub-type="epub" date-type="pub" iso-8601-date="2022-03-26"><day>26</day>
<month>03</month>
<year>2022</year></pub-date>
<volume>72</volume>
<issue>2</issue>
<fpage>3493</fpage>
<lpage>3510</lpage>
<history>
<date date-type="received"><day>22</day><month>10</month><year>2021</year></date>
<date date-type="accepted"><day>15</day><month>12</month><year>2021</year></date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2022 Almutiq et al.</copyright-statement>
<copyright-year>2022</copyright-year>
<copyright-holder>Almutiq et al.</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_CMC_24571.pdf"></self-uri>
<abstract>
<p>Nowadays, video streaming applications are becoming one of the tendencies driving vehicular network users. In this work, considering the unpredictable vehicle density, the unexpected acceleration or deceleration of the different vehicles included in the vehicular traffic load, and the limited radio range of the employed communication scheme, we introduce the &#x201C;Dynamic Vehicular Clustering&#x201D; (DVC) algorithm as a new scheme for video streaming systems over vehicular ad-hoc networks (VANET). The proposed algorithm takes advantage of the small cells concept and the introduction of wireless backhauls, inspired by the different features and the performance of the Long Term Evolution (LTE)-Advanced network. Vehicles are clustered together to form dynamically ad-hoc sub-networks included in the vehicular network. The goal of our clustering algorithm is to take into account several characteristics, such as the vehicle&#x0027;s position and acceleration to reduce latency and packet loss. Therefore, each cluster is counted as a small cell containing vehicular nodes and an access point that is elected regarding some particular specifications. Based on the exceptional features of the LTE-Advanced network (small cells and wireless backhauls) the DVC algorithm is a promising scheme for video streaming services over VANET systems. Experiments were carried out with a virtual topology of the VANET network created with four clusters to implement the DVC algorithm. The results were compared with other algorithms such as Virtual Trust-ability Data transmission (VTD), Named Data Networking (NDN), and Socially Aware Security Message Forwarding (SASMF). Our algorithm can effectively improve the transmission rate of data packets at the expense of a slight increase in end-to-end delay and control overhead.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>5G</kwd>
<kwd>video-on-demand</kwd>
<kwd>vehicular ad-hoc network</kwd>
<kwd>mobility</kwd>
<kwd>vehicular traffic load</kwd>
<kwd>small cell</kwd>
<kwd>wireless backhaul</kwd>
<kwd>LTE-advanced</kwd>
<kwd>latency</kwd>
<kwd>packet loss</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1"><label>1</label><title>Introduction</title>
<p>Vehicular ad-hoc networks (VANET) is a new emerging technology of mobile ad hoc networks (MANETs), where mobile nodes are intelligent vehicles, equipped with very high technology equipment (computers, radars, geolocation systems (GPS), various types of sensors, and network devices). VANETs networks allow inter-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications [<xref ref-type="bibr" rid="ref-1">1</xref>,<xref ref-type="bibr" rid="ref-2">2</xref>]. The different nodes can exchange any alerts or useful information to improve road traffic safety. But also data (music, video, advertisements&#x2026;) to make the time spent on the road more pleasant and less boring. Generally, smart car designers have shown increasing attention for the employment of Dedicated Short Range Communication (DSRC) based on IEEE 802.11p [<xref ref-type="bibr" rid="ref-3">3</xref>&#x2013;<xref ref-type="bibr" rid="ref-5">5</xref>] due to its low cost as well as its easy deployment and features&#x2019; adaptability to support V2V communications. However, DSRC [<xref ref-type="bibr" rid="ref-6">6</xref>] is not a suitable solution for a vehicle to infrastructure communication because of its limited radio range [<xref ref-type="bibr" rid="ref-7">7</xref>]. Therefore, there have been various studies among the literature suggesting the deployment of the fourth-generation Long Term Evolution (LTE) systems [<xref ref-type="bibr" rid="ref-8">8</xref>,<xref ref-type="bibr" rid="ref-9">9</xref>] as well as the next generation LTE advanced [<xref ref-type="bibr" rid="ref-10">10</xref>] to deal with vehicular communications. The proposed algorithm solved so many issues regarding VANET networks due to their high range, large bandwidth capacity, low latency, etc. However, vehicular network features such as dynamic network topology, high mobility, and random density among cell coverage make it quite hard for LTE to respond to VANET&#x0027;s requirements [<xref ref-type="bibr" rid="ref-11">11</xref>,<xref ref-type="bibr" rid="ref-12">12</xref>].</p>
<p>Video streaming applications&#x2019; requirements in terms of network resources management and quality of service (QoS) specifications have been the main issue for numerous studies during the last decade [<xref ref-type="bibr" rid="ref-13">13</xref>,<xref ref-type="bibr" rid="ref-14">14</xref>]. The dynamic data flow exchange and the various size of transmitted content make it quite difficult to provide resource allocation, content consistency, and congestion avoidance. Hence, most of the proposed strategies confirmed that it is more appropriate to deal with video streaming traffic separately especially among mobile networks. Moreover, the more the mobility is higher the more the streaming quality is degraded due to frequent handover and high latency. On the other hand, video streaming applications such as video-on-demand (VoD) are becoming trendy services for users connected via various types of mobile devices (e.g., mobile phone, tablet, car, etc.). Vehicular networks are more concerned with video streaming issues due to their high mobility, dynamic topology, and unpredictable user density. Therefore, video streaming among vehicular networks raises more QoS requirements challenges. The wireless network supporting vehicular communication must deal carefully with interferences, frequent handover issues, and video storage locations to enhance the streaming quality [<xref ref-type="bibr" rid="ref-15">15</xref>] in terms of content availability, low latency, minimum frame loss, optimal use of bandwidth, the optimal time of packet transfer, and suitable transmission delay. Ensuring the video availability to end-users requires proper management of storage and caching location. The user must receive the video with a quality of his preference and this is the main role of the proposed algorithm.
<list list-type="bullet">
<list-item><p>Low latency: One of the main issues for video streaming over mobile networks is how to minimize the time of transit from end to end. This parameter is highly related to the scheme used to support mobile communication.</p></list-item>
<list-item><p>Minimum frame loss: For the streaming continuity, the user should be able to perceive the demanded video without frequent disconnection. Therefore, his connection with the content provider must be stable (i.e., the link between source and destination should not be disturbed due to interferences or network congestion).</p></list-item>
</list></p>
<p>Nowadays, cellular networks are striving to serve a huge number of mobile users viewing videos over VoD services. Besides, video streaming services are easily influenced by network QoS parameter swings (e.g., bandwidth capacity, latency, packet loss rate, congestion, etc.). We have more communication challenges to report considering video streaming over vehicular networks [<xref ref-type="bibr" rid="ref-16">16</xref>]. High mobility and unpredictable users&#x2019; density make the process of delivering video content with the desired QoS, challenging in terms of resource allocation [<xref ref-type="bibr" rid="ref-17">17</xref>], content distribution, and interferences reduction. Therefore, the use of heterogeneous schemes to separate signaling traffic links and content flows seems to be a promising paradigm to reduce interferences among vehicular networks [<xref ref-type="bibr" rid="ref-18">18</xref>]. Most of the studies among the literature have studied connectivity issues, video content delivery, and signal interferences in static ad-hoc networks or networks with low mobility. However, mobile nodes among a VANET system are not restricted to a predefined traffic network since its multiple degrees of freedom (i.e., high mobile node) [<xref ref-type="bibr" rid="ref-19">19</xref>]. Furthermore, variable traffic density, unexpected acceleration or deceleration, and road capacity affect straightly cars mobility. Hence, the characteristics of vehicular networks influence user&#x0027;s connectivity (e.g., latency due to multiple handovers, unexpected disconnection due to roadside unit&#x0027;s low range, etc.). The exhibited results of static ad-hoc and low mobility networks cannot be directly applied to vehicular networks for the different features discussed above.</p>
<p>The problematic with this paper is to propose a dynamic algorithm called Dynamic Vehicular Clustering (DVC) to enhance both vehicle-to-vehicle and vehicle-to-Base station connectivity among high mobility networks. The proposed algorithm exhibits the impact of small cell deployment on connectivity and mobility performance in Long Term Evolution (LTE)-Advanced-based vehicular network. Furthermore, the introduction of 5G features into vehicular ad-hoc networks [<xref ref-type="bibr" rid="ref-20">20</xref>] such as the concept and communication of the small cell over wireless backhaul networks will enhance video content transmission due to its low latency and the utilized schemes to deal effectively with congestion and interferences issues.</p>
<p>The remainder of the paper is organized as follows: Section 2 introduces an overview of the related issues to video streaming and vehicular networks; Section 3 illustrates the proposed algorithm and highlights the different features of the clustering scheme; Section 4 evaluates the solution based on simulations results analysis and compares its performance to existing studies; Finally, Section 5 concludes the paper.</p>
</sec>
<sec id="s2"><label>2</label><title>Related Work</title>
<sec id="s2_1"><label>2.1</label><title>Vehicular Communication</title>
<p>In the literature, there are numerous schemes to boost vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications regarding their features [<xref ref-type="bibr" rid="ref-21">21</xref>,<xref ref-type="bibr" rid="ref-22">22</xref>]. The common strategy promotes the use of a separate solution for each type of link. V2V communication links two or more vehicles directly (i.e., without infrastructure&#x0027;s relaying) to minimize control traffic and cope with range limitation among the mobile network [<xref ref-type="bibr" rid="ref-23">23</xref>]. Moreover, smart vehicles are nowadays equipped with high-performance processors and large caches. Hence, short-range networks can perfectly support this type of vehicular link since data management and storage are available using the car&#x0027;s smart-board without infrastructure&#x0027;s involvement. Dedicated Short Range Communication (DSRC) has been a highly recommended scheme to be serving V2V communication with effective support, high throughput, low latency, and low cost. V2I communication needs a robust wireless network to deal properly with interferences between different vehicles communicating with the infrastructure. The devoted scheme must support long-range communications to manage the vehicle&#x0027;s high mobility. Therefore, Long Term Evolution (LTE) and LTE Advanced are becoming very popular as the most promising techniques for V2I communications. The next generation will be more attractive to be deployed in vehicular networks especially with its tendency to establish communication with almost no latency, no more concerns about bandwidth capacity, very high throughput, etc. [<xref ref-type="bibr" rid="ref-24">24</xref>]. However, the case of dense cells remains a critical concern for vehicular networks that need effective employment of the existing schemes.</p>
</sec>
<sec id="s2_2"><label>2.2</label><title>Device-To-Device Communication</title>
<p>It is considered a promising paradigm to have cooperative communication established directly between two or more wireless nearby devices (i.e., without having the base station involved). Device-to-Device communication shows major benefits in terms of reliability, spectral efficiency, storage capacity, and transmission range issues. A device-to-device (D2D) communication involves source, destination, and device relays which are the intermediate devices utilized as relaying nodes to transmit content over a massive ad-hoc mesh network. In the context of vehicular networks, video content relaying requires device dynamic location discovery to ensure durable communication within its neighbors to enhance content availability and minimize packet loss rate [<xref ref-type="bibr" rid="ref-25">25</xref>,<xref ref-type="bibr" rid="ref-26">26</xref>].</p>
<p>The base station (BS) will normally continue supervising and serving the devices through the macro cell regardless of the established D2D link. However, in the case of congested cells, the devices will create an ad-hoc mesh network and the BS services will be abolished. Therefore,device-to-device links can be whether controlled by the BS or in a decentralized mesh network. The BS can use devices among the cell to relay content to another device located at the edge of the concerned macrocell. This type of D2D link is established and supervised by the BS which continues its communication with the devices (<xref ref-type="fig" rid="fig-1">Fig. 1</xref>). Another possible scenario for D2D communication is when the BS control is replaced by device-controlled links (<xref ref-type="fig" rid="fig-2">Fig. 2</xref>). Hence, a direct link is established between devices from the source to destination to carry content over device relays without the BS control.</p>
<fig id="fig-1"><label>Figure 1</label><caption><title>Device-to-device (D2D) communication with the base station (BS) controlled link</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_24571-fig-1.png"/></fig>
<fig id="fig-2"><label>Figure 2</label><caption><title>Device-to-device (D2D) communication with self-controlled links</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_24571-fig-2.png"/></fig>
<p>Each device should be self-assisted to use effectively system resources. On the other hand, devices should exchange content using smart interference management schemes to reduce packet loss rate and performance degradation.</p>
</sec>
<sec id="s2_3"><label>2.3</label><title>Small Cells</title>
<p>The concept of mobile small cells is a part of the 5G next-generation cellular network (<xref ref-type="fig" rid="fig-3">Fig. 3</xref>) which contains 4G macro-cells, micro-cells, relays antenna, and small cells [<xref ref-type="bibr" rid="ref-27">27</xref>]. Small cells are also considered as mobile relays which have been proven effective and robust toward high mobility users such as communications among vehicular wireless networks [<xref ref-type="bibr" rid="ref-28">28</xref>].</p>
<fig id="fig-3"><label>Figure 3</label><caption><title>Small cells concept over 4G macrocell</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_24571-fig-3.png"/></fig>
<p>The concept of introducing small cells is to arrange a group of mobile users in the same cluster so that the macro base station (MBS) considers them as one unit. Hence, the MBS will have communication with a predefined number of users through an access point (AP) which will be charged with the splitting of data indoor and outdoor in the small cell [<xref ref-type="bibr" rid="ref-29">29</xref>,<xref ref-type="bibr" rid="ref-30">30</xref>]. This will considerably reduce the network&#x0027;s congestion and the signaling overhead between mobile users and the MBS. Additionally, the integration of the access points among small cells can improve intra-cell performance due to device self-organizing disabling, interferences reduction, and device power consumption decrease.</p>
</sec>
<sec id="s2_4"><label>2.4</label><title>Representative Approaches for Comparison</title>
<p>We discuss in this part some schemes which have dealt with similar vehicular ad-hoc networks (VANET) aspects (i.e., content distribution, clustering mode [<xref ref-type="bibr" rid="ref-31">31</xref>,<xref ref-type="bibr" rid="ref-32">32</xref>], interferences management, etc.) as the Dynamic Vehicular Clustering (DVC) algorithm proposed in this paper. In the following, both clustering-based approaches and non-clustering-based approaches are exhibited.</p>
<p>A clustering-based scheme [<xref ref-type="bibr" rid="ref-33">33</xref>&#x2013;<xref ref-type="bibr" rid="ref-36">36</xref>] consists of dividing each road into equitable segments, then grouping in one cluster vehicles in the same road segments and running in the same direction. For each cluster, the nearest vehicle to the cluster center is elected as &#x201C;cluster head&#x201D;. Hence, the incoming content flow is received by the cluster head, which forwards the message to its destination. This strategy seems to have a great impact on reducing inter-clusters interferences. However, the proposed process of cluster formation is based on static road partitioning [<xref ref-type="bibr" rid="ref-37">37</xref>], without considering road density and high mobility zones. The cluster members receive the content from an external source that needs to communicate with the &#x201C;cluster head&#x201D; for each exchange and any attempt to establish a direct link between source and destination is abolished. This can cause message receiving delay, extra-communication cost, and heavy load overhead in case of high mobility or dense roads when the cluster nodes have to change frequently. On the other hand, the approach imposes a fixed head node which establishes the message forwarding. As a result, the path between the &#x201C;cluster head&#x201D; and the destination does not tolerate the &#x201C;broken path&#x201D; issues when one of the selected nodes proceeds with message forwarding accelerates suddenly. This can lead to a severe delay especially when the distance between the &#x201C;cluster head&#x201D; and the destination is so far. In [<xref ref-type="bibr" rid="ref-38">38</xref>], the authors proposed an efficient clustering scheme in VANET. This scheme is based on a machine learning classifier for a prediction of driver behavior. This diagram (called Na&#x00EF;ve Bayes Prediction (NBP)) controls overtaking and driving speed decisions for an efficient analysis of a driver&#x0027;s habit. In [<xref ref-type="bibr" rid="ref-39">39</xref>], the authors developed a new method of identification of switched linear systems adapted to the urban VANET. This method allowed us to classify the nodes of the vehicle into a finite set of clusters. It is essentially based on an unsupervised and self-adapting node clustering algorithm combined with a regression technique. Based on a support kernel regression (SKR) technique, a multi-kernel regression function is identified for each cluster of vehicle nodes. They also adapted the learning rules to the proposed identification method.</p>
<p>For the non-clustering-based approaches [<xref ref-type="bibr" rid="ref-40">40</xref>,<xref ref-type="bibr" rid="ref-41">41</xref>] an optimal routing scheme is used to enhance message overhead problems that occur in the traditional broadcasting process [<xref ref-type="bibr" rid="ref-42">42</xref>,<xref ref-type="bibr" rid="ref-43">43</xref>]. The idea consists of sending the message to a &#x201C;forwarding vehicle&#x201D; which broadcasts it to all its nearest neighbors (1-hop) [<xref ref-type="bibr" rid="ref-44">44</xref>]. When receiving the content, the underlying neighbors send back a response message and stand by. The &#x201C;forwarding vehicle&#x201D; chooses a neighbor list considering the message response delay, to define the suitable nodes to establish the message delivery. Then a &#x201C;select message&#x201D; is sent to all the selected neighbors and the process of content delivery is triggered.</p>
<p>Compared to the schemes surveyed above, our objectives are to introduce a dynamic clustering process to deal with road load frequent updates and high mobility environments problems. Moreover, the advantage of our scheme is that it does not rely on dissemination, but it relies on more targeted communication. For each cluster, a head node is elected not as a &#x201C;forwarding node&#x201D; but as an access point to handle all exchanges between the cluster and the roadside units. In the following, section a detailed description of our proposed algorithm.</p>
</sec>
</sec>
<sec id="s3"><label>3</label><title>The Proposed Solution</title>
<p>The small cells concept is considered an unavoidable solution for the next-generation 5G network&#x0027;s architecture. Regardless of its drawbacks, we are developing in this paper an adaptive system model inspired by the features of small cells and a 5G wireless backhaul network&#x0027;s management in ultra-dense small cells.</p>
<sec id="s3_1"><label>3.1</label><title>System Model and Problem Formulation</title>
<p>To remedy the problems of unpredictable vehicle density, unexpected acceleration or deceleration of different cars included in the vehicle traffic load, and the limited radio range of the communication scheme used, we introduce a model of Dynamic Vehicle Clustering (DVC) for video content delivery over next-generation macrocells (MC).</p>
<p>A cluster contains the Client Vehicle (i.e., the car requiring the video content), the Peers having already stored the video, the Relaying Vehicles, and the Access Point (AP). Our goal is to enhance both vehicle-to-vehicle and vehicle-to-Base station connectivity among high mobility networks. It is a question to dynamically divide traffic into several clusters to guarantee a certain balance of load and resources available between the various VANET network vehicle nodes. The network&#x0027;s design that we introduce includes a single macro-cell with a Macro Base Station (MBS), a random number of clusters called &#x2018;Friendly Groups&#x2019; (FG), and car users (CU), the MBS coverage overlaps with all the other FG.</p>
<p><bold>Architecture.</bold> We consider a set <inline-formula id="ieqn-1"><mml:math id="mml-ieqn-1"><mml:mi>F</mml:mi><mml:mi>G</mml:mi><mml:mrow><mml:mover><mml:mo>=</mml:mo><mml:mi>&#x0394;</mml:mi></mml:mover></mml:mrow><mml:mo fence="false" stretchy="false">{</mml:mo><mml:mrow><mml:mi>f</mml:mi><mml:mi>g</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:mi>f</mml:mi><mml:mi>g</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>K</mml:mi><mml:mo>,</mml:mo><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>K</mml:mi></mml:msub></mml:mrow></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mo fence="false" stretchy="false">}</mml:mo></mml:math></inline-formula> of K Friendly Groups contained in the macro cell, a set <inline-formula id="ieqn-2"><mml:math id="mml-ieqn-2"><mml:mi>C</mml:mi><mml:mi>U</mml:mi><mml:mrow><mml:mover><mml:mo>=</mml:mo><mml:mi>&#x0394;</mml:mi></mml:mover></mml:mrow><mml:munderover><mml:mrow><mml:mo>&#x222A;</mml:mo></mml:mrow><mml:mrow><mml:mi>n</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mi>K</mml:mi></mml:munderover><mml:mo>&#x2061;</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>F</mml:mi><mml:mrow><mml:msub><mml:mi>G</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mrow></mml:mrow></mml:math></inline-formula> of car users, a set</p>
<p>AP <inline-formula id="ieqn-3"><mml:math id="mml-ieqn-3"><mml:mrow></mml:mrow><mml:mrow><mml:mover><mml:mo>=</mml:mo><mml:mi>&#x0394;</mml:mi></mml:mover></mml:mrow><mml:mo fence="false" stretchy="false">{</mml:mo><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>K</mml:mi></mml:msub></mml:mrow></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mo fence="false" stretchy="false">}</mml:mo><mml:mrow></mml:mrow></mml:math></inline-formula> of K selected access points and a set V <inline-formula id="ieqn-4"><mml:math id="mml-ieqn-4"><mml:mrow></mml:mrow><mml:mo>=</mml:mo><mml:munderover><mml:mrow><mml:mo movablelimits="false">&#x2211;</mml:mo></mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:mrow><mml:mi>n</mml:mi></mml:munderover><mml:mo>&#x2061;</mml:mo><mml:mrow><mml:msub><mml:mi>V</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mrow></mml:mrow></mml:math></inline-formula> of videos pre-stored in the Cloud data centers [<xref ref-type="bibr" rid="ref-45">45</xref>]. We take into account the use of disjoint sub-channel allocation among different APs while we are defining the friendly groups&#x2019; formation referring to the concept of small cells [<xref ref-type="bibr" rid="ref-46">46</xref>].</p>
<p>Interference Coordination Techniques (eICIC) proposed in Long Term Evolution (LTE) Rel. 10 to deal with interferences between neighboring APs. It offers resource partitioning between the macro cell and small cell to improve the offload of traffic to the small cell layer [<xref ref-type="bibr" rid="ref-47">47</xref>]. Hence, the technique optimizes the scheduling process by offering the possibility to coordinate the resource usage between the MBS and each AP.</p>
<p>Video requests. In this paper, user requests are modeled by <inline-formula id="ieqn-5"><mml:math id="mml-ieqn-5"><mml:mspace width="thickmathspace" /><mml:mi>R</mml:mi><mml:mrow><mml:msub><mml:mi>Q</mml:mi><mml:mi>m</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula>. We consider as well a set of users friendly lists FL <inline-formula id="ieqn-6"><mml:math id="mml-ieqn-6"><mml:mrow></mml:mrow><mml:mrow><mml:mover><mml:mo>=</mml:mo><mml:mi>&#x0394;</mml:mi></mml:mover></mml:mrow><mml:mrow></mml:mrow><mml:munderover><mml:mrow><mml:mo>&#x222A;</mml:mo></mml:mrow><mml:mrow><mml:mi>k</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mi>S</mml:mi></mml:munderover><mml:mo>&#x2061;</mml:mo><mml:mo stretchy="false">[</mml:mo><mml:mrow><mml:mi>f</mml:mi><mml:mi>l</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mrow><mml:msub><mml:mi>V</mml:mi><mml:mi>K</mml:mi></mml:msub></mml:mrow><mml:mo>,</mml:mo><mml:mrow><mml:msub><mml:mi>Z</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:mi>f</mml:mi><mml:mi>l</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mrow><mml:msub><mml:mi>V</mml:mi><mml:mi>k</mml:mi></mml:msub></mml:mrow><mml:mo>,</mml:mo><mml:mrow><mml:msub><mml:mi>Z</mml:mi><mml:mi>N</mml:mi></mml:msub></mml:mrow></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mo stretchy="false">]</mml:mo></mml:math></inline-formula> where:
<list list-type="bullet">
<list-item><p><inline-formula id="ieqn-7"><mml:math id="mml-ieqn-7"><mml:mrow><mml:msub><mml:mi mathvariant="bold-italic">Z</mml:mi><mml:mrow><mml:mi mathvariant="bold-italic">i</mml:mi><mml:mrow></mml:mrow></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mrow><mml:mtext>i</mml:mtext></mml:mrow><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>&#x2026;</mml:mo><mml:mrow><mml:mtext>N</mml:mtext></mml:mrow></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mrow></mml:mrow></mml:math></inline-formula>Z refers to a sub-region consisting of the subset of users in the same location as the user <inline-formula id="ieqn-8"><mml:math id="mml-ieqn-8"><mml:mi>C</mml:mi><mml:mrow><mml:msub><mml:mi>U</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula>.</p></list-item>
<list-item><p><inline-formula id="ieqn-9"><mml:math id="mml-ieqn-9"><mml:mrow><mml:mi mathvariant="bold-italic">f</mml:mi><mml:mi mathvariant="bold-italic">l</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="bold-italic">V</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="bold-italic">K</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="bold-italic">Z</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="bold-italic">i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mspace width="thickmathspace" /></mml:math></inline-formula>Z is the friendly list containing users nearby the user <inline-formula id="ieqn-10"><mml:math id="mml-ieqn-10"><mml:mi>C</mml:mi><mml:mrow><mml:msub><mml:mi>U</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> having already downloaded the requested video <inline-formula id="ieqn-11"><mml:math id="mml-ieqn-11"><mml:mrow><mml:msub><mml:mi>V</mml:mi><mml:mi>K</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> and having accepted to share it.</p></list-item>
<list-item><p><inline-formula id="ieqn-12"><mml:math id="mml-ieqn-12"><mml:mi mathvariant="bold-italic">S</mml:mi><mml:mrow></mml:mrow></mml:math></inline-formula>Z refers to the total number of videos having been delivered in the macro cell.</p></list-item>
</list></p>
<p>The main use of Dynamic Vehicles Clustering (<xref ref-type="fig" rid="fig-4">Fig. 4</xref>) is to reduce signalization messages exchanged among the macro cell. Therefore, this scheme can help reduce interferences, which will normally decrease the frame loss rate. On the other hand, it defines a heterogeneous scheme for vehicular communications, which deals separately with vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) links. Direct V2V communication can be ideally supported by the Dedicated Short Range Communication (DSRC) scheme described in the Section 2, while the next-generation 5G network&#x0027;s features will be used for AP to MBS backhaul link. Hence, combining these communication schemes can provide a streaming service with low latency and better performances.</p>
<fig id="fig-4"><label>Figure 4</label><caption><title>Dynamic vehicles clustering architecture</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_24571-fig-4.png"/></fig>
</sec>
<sec id="s3_2"><label>3.2</label><title>Dynamic Vehicles Clustering Features</title>
<p><bold><italic>Friendly List.</italic></bold> The macro base station (MBS) creates dynamic lists of vehicles storing each video to facilitate content location. The macrocell is subdivided into <inline-formula id="ieqn-13"><mml:math id="mml-ieqn-13"><mml:mrow><mml:mtext>N</mml:mtext></mml:mrow></mml:math></inline-formula> sub-region <inline-formula id="ieqn-14"><mml:math id="mml-ieqn-14"><mml:mrow><mml:msub><mml:mi mathvariant="bold-italic">Z</mml:mi><mml:mrow><mml:mi mathvariant="bold-italic">i</mml:mi><mml:mrow></mml:mrow></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mrow><mml:mtext>i</mml:mtext></mml:mrow><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>&#x2026;</mml:mo><mml:mrow><mml:mtext>N</mml:mtext></mml:mrow></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mrow></mml:mrow></mml:math></inline-formula> based on users&#x2019; density (i.e., a sub-region is a geographical zone where the number of users is upper than a predefined Density-Threshold DT). Among each sub-region where users have already downloaded the video <inline-formula id="ieqn-15"><mml:math id="mml-ieqn-15"><mml:mrow><mml:msub><mml:mi>V</mml:mi><mml:mi>K</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula>, all considered users are invited to join the friendly list of video <inline-formula id="ieqn-16"><mml:math id="mml-ieqn-16"><mml:mrow><mml:msub><mml:mi>V</mml:mi><mml:mi>K</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> corresponding to the sub-region <inline-formula id="ieqn-17"><mml:math id="mml-ieqn-17"><mml:mrow><mml:msub><mml:mi>Z</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula>. Hence, users who have sent back an acknowledgment to the MBS are automatically added to the concerned friendly list. Moreover, the idea of the deployment of friendly lists is used for security measurements besides its role in content location [<xref ref-type="bibr" rid="ref-48">48</xref>]. It makes sure that the MBS in charge is permanently aware of the identity of the members ensuring the content delivery among the macro cell.</p>
<p><bold><italic>Access Point Selection.</italic></bold> The definition of an AP among vehicles contained in a cluster aims mainly for the limitation of backhauls&#x2019; congestion. Therefore, the proposed strategy intends to discard all backhauls established between vehicles inside the cluster and the MBS, other than AP&#x0027;s backhaul (<xref ref-type="fig" rid="fig-5">Fig. 5</xref>). This scheme can be useful for backhauls congestion avoidance.</p>
<fig id="fig-5"><label>Figure 5</label><caption><title>Dynamic vehicles clustering architecture with backhaul establishment</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_24571-fig-5.png"/></fig>
<p>However, the selection of the appropriate AP in each cluster is a critical decision. The MBS should be permanently at the sight of the selected AP to maintain the best Signal-to-Interference-plus-Noise-Ratio (SINR) for the backhaul link. The base station should verify that the current SINR keeps not being below a predefined threshold (SINR_Back_Thresh). Otherwise, the MBS triggers a new AP selection process (i.e., When current SINR &#x003C; SINR_Back_Thresh).</p>
<p>Besides the V2V link&#x0027;s control inside the cluster, an AP has to define the best Relays Vector (RV) that ensures content transmission with low latency. An RV refers to the different relaying nodes transporting the video content from the destination source.</p>
</sec>
<sec id="s3_3"><label>3.3</label><title>Algorithm: Dynamic Vehicles Clustering</title>
<p>Based on the parameters described above, we introduce in the rest of this section a description of our Dynamic Vehicles Clustering scheme.</p>
<p>&#x2022; When a car user <inline-formula id="ieqn-18"><mml:math id="mml-ieqn-18"><mml:mi>C</mml:mi><mml:mrow><mml:msub><mml:mi>U</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> initializes a video request <inline-formula id="ieqn-19"><mml:math id="mml-ieqn-19"><mml:mi>R</mml:mi><mml:mrow><mml:msub><mml:mi>Q</mml:mi><mml:mi>m</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula>, the MBS defines the sub-region <inline-formula id="ieqn-20"><mml:math id="mml-ieqn-20"><mml:mrow><mml:msub><mml:mi>Z</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> where <inline-formula id="ieqn-21"><mml:math id="mml-ieqn-21"><mml:mi>C</mml:mi><mml:mrow><mml:msub><mml:mi>U</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> is located. Each macrocell is subdivided into many sub-regions based on the zone&#x0027;s density in terms of vehicle traffic. Moreover, the more the MBS receives video requests from a location X the more this area is considered as a zone of interest and added to the set of sub-regions Z&#x2009;&#x003D;&#x2009;&#x007B;<inline-formula id="ieqn-22"><mml:math id="mml-ieqn-22"><mml:mrow><mml:msub><mml:mi>Z</mml:mi><mml:mrow><mml:mn>1</mml:mn><mml:mrow></mml:mrow></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x2026;</mml:mo><mml:mrow></mml:mrow><mml:mrow><mml:msub><mml:mi>Z</mml:mi><mml:mi>N</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula>&#x007D;. For each video <inline-formula id="ieqn-23"><mml:math id="mml-ieqn-23"><mml:mrow><mml:msub><mml:mi>V</mml:mi><mml:mi>k</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> the MBS define a list of car users who have already downloaded and accepted to share the considered content and are located in the sub-region <inline-formula id="ieqn-24"><mml:math id="mml-ieqn-24"><mml:mrow><mml:msub><mml:mi>Z</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula>.</p>
<p>&#x2022; Then, the MBS checks the friendly list <inline-formula id="ieqn-25"><mml:math id="mml-ieqn-25"><mml:mi>f</mml:mi><mml:mi>l</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mrow><mml:msub><mml:mi>V</mml:mi><mml:mi>K</mml:mi></mml:msub></mml:mrow><mml:mo>,</mml:mo><mml:mrow><mml:msub><mml:mi>Z</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> which is a subset from FL <inline-formula id="ieqn-26"><mml:math id="mml-ieqn-26"><mml:mrow></mml:mrow><mml:mrow><mml:mover><mml:mo>=</mml:mo><mml:mi>&#x0394;</mml:mi></mml:mover></mml:mrow><mml:mrow></mml:mrow><mml:munderover><mml:mrow><mml:mo>&#x222A;</mml:mo></mml:mrow><mml:mrow><mml:mi>k</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mi>S</mml:mi></mml:munderover><mml:mo>&#x2061;</mml:mo><mml:mo stretchy="false">[</mml:mo><mml:mi>f</mml:mi><mml:mi>l</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mrow><mml:msub><mml:mi>V</mml:mi><mml:mi>K</mml:mi></mml:msub></mml:mrow><mml:mo>,</mml:mo><mml:mrow><mml:msub><mml:mi>Z</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:mi>f</mml:mi><mml:mi>l</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mrow><mml:msub><mml:mi>V</mml:mi><mml:mi>k</mml:mi></mml:msub></mml:mrow><mml:mo>,</mml:mo><mml:mrow><mml:msub><mml:mi>Z</mml:mi><mml:mi>N</mml:mi></mml:msub></mml:mrow></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mo stretchy="false">]</mml:mo><mml:mrow></mml:mrow></mml:math></inline-formula> to determine whether the video <inline-formula id="ieqn-27"><mml:math id="mml-ieqn-27"><mml:mrow><mml:msub><mml:mi>V</mml:mi><mml:mi>K</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> is available in the zone <inline-formula id="ieqn-28"><mml:math id="mml-ieqn-28"><mml:mrow><mml:msub><mml:mi>Z</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> (i.e., users possessing the video are still in the zone <inline-formula id="ieqn-29"><mml:math id="mml-ieqn-29"><mml:mrow><mml:msub><mml:mi>Z</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula>). In case that the requested video is no more obtainable in the user&#x0027;s neighboring, the MBS delivers the content itself over vehicle relays.</p>
<p>&#x2022; The other case is when the video is still available in the located area. The MBS sends the corresponding friendly list <inline-formula id="ieqn-30"><mml:math id="mml-ieqn-30"><mml:mi>f</mml:mi><mml:mi>l</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mrow><mml:msub><mml:mi>V</mml:mi><mml:mi>K</mml:mi></mml:msub></mml:mrow><mml:mo>,</mml:mo><mml:mrow><mml:msub><mml:mi>Z</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> to the <inline-formula id="ieqn-31"><mml:math id="mml-ieqn-31"><mml:mi>C</mml:mi><mml:mrow><mml:msub><mml:mi>U</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula>. The client vehicle establishes direct connections with vehicles of <inline-formula id="ieqn-32"><mml:math id="mml-ieqn-32"><mml:mi>f</mml:mi><mml:mi>l</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mrow><mml:msub><mml:mi>V</mml:mi><mml:mi>K</mml:mi></mml:msub></mml:mrow><mml:mo>,</mml:mo><mml:mrow><mml:msub><mml:mi>Z</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> via DSRC links. <inline-formula id="ieqn-33"><mml:math id="mml-ieqn-33"><mml:mi>C</mml:mi><mml:mrow><mml:msub><mml:mi>U</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> considers only vehicles moving around its acceleration and in the same direction.
<list list-type="simple">
<list-item><p>&#x21D2; A clustering process is triggered and <inline-formula id="ieqn-34"><mml:math id="mml-ieqn-34"><mml:mi>C</mml:mi><mml:mrow><mml:msub><mml:mi>U</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> forms a friendly group J gathering the vehicles providing video content, vehicles relying upon the delivered content, and the client <inline-formula id="ieqn-35"><mml:math id="mml-ieqn-35"><mml:mi>C</mml:mi><mml:mrow><mml:msub><mml:mi>U</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula>. A vehicle can take part in more than one friendly group/cluster and it can eventually be a receiver in group X and a source in a group Y (<xref ref-type="fig" rid="fig-6">Fig. 6</xref>). The user can initiate content share the moment it receives the first segment and it does not have to wait until downloading the totality of video content.</p></list-item>
</list></p>
<fig id="fig-6"><label>Figure 6</label><caption><title>Inter-cluster&#x0027;s exchange</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_24571-fig-6.png"/></fig>
<p>&#x2022; The MBS selects one of the clustered vehicles to be an access point <inline-formula id="ieqn-36"><mml:math id="mml-ieqn-36"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> regarding some special features (SINR, acceleration, availability, etc).</p>
<p>&#x2022; <inline-formula id="ieqn-37"><mml:math id="mml-ieqn-37"><mml:mi>C</mml:mi><mml:mrow><mml:msub><mml:mi>U</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> will be receiving the requested content via device-to-device (D2D) communication while the elected AP will ensure V2V links controlling and it will be exchanging signalization&#x0027;s traffic with the MBS through a backhaul connection.</p>
<p>A summary of the proposed approach is presented in the algorithm below:
</p>
<fig id="fig-14">
<graphic mimetype="image" mime-subtype="png" xlink:href="CMC_24571-fig-14.png"/>
</fig>
</sec>
</sec>
<sec id="s4"><label>4</label><title>Simulation Results and Analysis</title>
<sec id="s4_1"><label>4.1</label><title>Environment Setting</title>
<p>In the proposed study, the major intention is to develop a suitable technique based on the exceptional features of the Long Term Evolution-Advanced (LTE-Advanced) network (small cells and wireless backhauls) for the controlling of video streaming services over vehicular ad-hoc networks (VANET) systems and to providing trust-based communication. Dynamic Vehicular Clustering (DVC) algorithm is implemented using MATLAB in the windows platform on the PC with Intel Core i7 and 8 GB RAM. The proposed system is analyzed based on the performances such as packet failure, bandwidth utilization, response time, and network scalability. The simulation parameters of VANET using the DVC algorithm are given in <xref ref-type="table" rid="table-1">Tab. 1</xref>.</p>
<table-wrap id="table-1"><label>Table 1</label><caption><title>Simulation parameters</title></caption>
<table>
<colgroup>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left">Parameters</th>
<th align="left">Setting</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">Number of nodes/vehicle</td>
<td align="left">100</td>
</tr>
<tr>
<td align="left">Simulation area</td>
<td align="left">300&#x2005;m&#x2009;&#x00D7;&#x2009;300&#x2005;m</td>
</tr>
<tr>
<td align="left">Paquet Size</td>
<td align="left">512 bytes</td>
</tr>
<tr>
<td align="left">Transmission range</td>
<td align="left">50&#x2013;150&#x2005;m</td>
</tr>
<tr>
<td align="left">Traffic type</td>
<td align="left">Two ray ground</td>
</tr>
<tr>
<td align="left">Vehicle speed</td>
<td align="left">0-50&#x2005;km/h</td>
</tr>
<tr>
<td align="left">Number of clusters</td>
<td align="left">4</td>
</tr>
<tr>
<td align="left">PHY/MAC layer</td>
<td align="left">IEEE 802.11p</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The vehicle nodes (VN) act as 802.11p wireless access points (APs) to communicate between them in the coverage range in 100&#x2005;m x 100&#x2005;m and we set the bandwidth as 20&#x2005;Mbps. In created network given in <xref ref-type="fig" rid="fig-7">Fig. 7</xref>, we have included 100 vehicles moving on the paths in random directions and uniformly distributed and with a speed between 0-50&#x2005;km/h.</p>
<fig id="fig-7"><label>Figure 7</label><caption><title>Initial topology for the experiments</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_24571-fig-7.png"/></fig>
<p>The virtual topology of the VANET network is created with four clusters as given in <xref ref-type="fig" rid="fig-7">Fig. 7</xref> and each cluster has a node to analyze the trustability. The nodes are represented as &#x201C;&#x25CF;&#x201D; and the four clusters are differentiated by spotting different colors.</p>
</sec>
<sec id="s4_2"><label>4.2</label><title>Setting Analysis</title>
<p>The packets failure report without the application of a management algorithm is given in <xref ref-type="fig" rid="fig-8">Fig. 8</xref>. This report (packet loss) shows the measurement of the number of lost packets compared to the total number of transmitted packets. We can discover that packet loss randomly increases with the number of vehicle nodes.</p>
<fig id="fig-8"><label>Figure 8</label><caption><title>Packet failure ratio</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_24571-fig-8.png"/></fig>
<p>We then calculate the packet loss ratio, bandwidth utilization, responses times, system throughput, and transmission delay, which are presented as follows:
<list list-type="bullet">
<list-item><p>Packet loss ratio: this is the ratio of the number of packets lost to the number of packets sent. Unlike audio/video type applications, file transfer type applications do not tolerate data packet loss.</p></list-item>
<list-item><p>Bandwidth: this is the maximum volume of information per time unit that a link between two nodes can absorb without creating a queue. At any given time, the link must have enough bandwidth to absorb the traffic generated by the application.</p></list-item>
<list-item><p>Response time: This is the time taken to transfer a packet between a source node and a destination node.</p></list-item>
<list-item><p>The system throughput: is the sum of the data rates that are delivered to all terminals in the VANET network.</p></list-item>
<list-item><p>Transmission delay: is the time it takes to transmit a data packet onto the outgoing link.</p></list-item>
</list></p>
<p><xref ref-type="fig" rid="fig-9">Fig. 9</xref> illustrates the average probability of packet loss on the arrival rate of vehicle nodes with the application of our DVC algorithm and by comparing it with other algorithms such as Virtual Trust-ability Data transmission (VTD) [<xref ref-type="bibr" rid="ref-49">49</xref>], Named Data Networking (NDN) [<xref ref-type="bibr" rid="ref-50">50</xref>], and Socially Aware Security Message Forwarding (SASMF) [<xref ref-type="bibr" rid="ref-51">51</xref>]. The arrival rate of packets varies between 50 and 100 packets/s. It is clear that more than 80&#x0025; of packets are delivered so that the loss is reduced by less than 20&#x0025; with DVC in the interval from 0 to 50 vehicle nodes, also more than 50&#x0025; of packets are delivered, so that the loss is reduced by less than 50&#x0025; in the case of higher loads, in particular between 50 and 100 vehicle nodes. In cases where the arrival rate (n) of vehicle nodes is low (n&#x2009;&#x003C;&#x2009;20), the packet loss rates between DVC and VTD are almost similar. Indeed, with this low number of vehicle nodes, the collisions are limited. When n becomes big (n&#x2009;&#x003E;&#x2009;50), our algorithm gives better results to avoid excessive packets collisions and reduce the packet error rate. Take n&#x2009;&#x003D;&#x2009;100, the probability of packet loss decreases by more than 20&#x0025; with our proposed algorithm compared to the VTD algorithm, more than 25&#x0025; compared to the NDN algorithm, and more than 40&#x0025; compared to the SASMF algorithm. <xref ref-type="fig" rid="fig-9">Fig. 9</xref> clearly shows that the proposed DVC algorithm has reduced the average packet failure rate of normal VANET communication. Consequently, the proposed technique then improves the packet delivery rate. The use of bandwidth is shown in <xref ref-type="fig" rid="fig-10">Fig. 10</xref>.</p>
<fig id="fig-9"><label>Figure 9</label><caption><title>Average packet loss probability <italic>vs.</italic> the number of vehicle nodes</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_24571-fig-9.png"/></fig>
<fig id="fig-10"><label>Figure 10</label><caption><title>Bandwidth utilization with and without DVC algorithm</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_24571-fig-10.png"/></fig>
<p><xref ref-type="fig" rid="fig-10">Fig. 10</xref> clearly shows that the bandwidth with the DVC algorithm is efficiently used in our VANET network. Our VANET network uses around 98&#x0025; of the bandwidth, while the DVC algorithm reduces it and uses up to 92&#x0025;. Therefore, integrating the DVC algorithm into VANET has effectively managed bandwidth usage. We can see that our new algorithm gives better results of simulation in all the spectrum of n, notably, an average and equitable use of the bandwidth in all load situations.</p>
<p>On the other hand, the other algorithms give either a maximum or minimum use of the bandwidth which is not preferable for VANET networks.</p>
<p>As n increases, the use of bandwidth increases and decreases with DVC but in an interval of 89&#x0025; to 92&#x0025; which is still bearable by the VANET network. The figures also show that bandwidth usage increases and decreases randomly, rather than growing completely with n.</p>
<p>In <xref ref-type="fig" rid="fig-11">Fig. 11</xref>, we compare the scalability of our VANET network. We evaluate the scalability of the network according to the response time. As the rate of arrival of vehicle nodes increases, the average response time is calculated and illustrated in <xref ref-type="fig" rid="fig-11">Fig. 11</xref>.</p>
<fig id="fig-11"><label>Figure 11</label><caption><title>Response time with and without DVC algorithm</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_24571-fig-11.png"/></fig>
<p><xref ref-type="fig" rid="fig-11">Fig. 11</xref> shows the comparison results of response time for DVC, VTD, NDN, and SASMF algorithms under different numbers of vehicle nodes. <xref ref-type="fig" rid="fig-11">Fig. 11</xref> shows the network scalability by varying the number of vehicle nodes. We can observe that the DVC algorithm has reached between 0.2 and 4 ms response time in terms of 50 at 250 vehicle nodes. On the other hand, compared to the other algorithms, one can also observe that DVC reached between 10&#x0025; and 25&#x0025; of the value of response time less than VTD, NDN, and SASMF algorithms with the same density of traffic. However, in the scenario of 100 car knots or less, DVC produces better response time values with less than 1&#x2005;ms.</p>
<p>The comparison between the different algorithms shows that the performance degrades while increasing the number of vehicle nodes, among other techniques using the DVC
algorithm the performances are better and have reached better scalability. These results indicate that DVC is an algorithm well suited for an application that requires reliable delivery of video packets in a high traffic VANET network.</p>
<p><xref ref-type="fig" rid="fig-12">Fig. 12</xref> shows the system throughput as a function of the number n of nodes vehicles. It is confirmed with the application of our DVC algorithm that, traffic of size n&#x2009;&#x003D;&#x2009;50 has a maximum throughput. The difference between DVC and the other comparison algorithms increases with an increase in the value of n because the packet loss with DVC decreases compared to the other algorithms.</p>
<fig id="fig-12"><label>Figure 12</label><caption><title>System throughput <italic>vs.</italic> vehicle nodes arrival rate</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_24571-fig-12.png"/></fig>
<p>For example, when n&#x2009;&#x003D;&#x2009;70 the difference is around 5 Mbit/s between DVC and the VTD algorithm that represents the closest results. <xref ref-type="fig" rid="fig-12">Fig. 12</xref> also indicates that when the number of n is small, the network can support a wider range of traffic demand (or in other words, packet arrival) rates with a limited loss of throughput. For example, with n&#x2208; [70, 100], the system can reach a throughput of more than 7 Mbits/s compared to the SASMF algorithm. On the other hand, n must be in a small region around 40 to 60 to allow the system to reach a throughput higher than 14 Mbits/s. In this sense, with a small to medium n number for our DVC algorithm becomes more robust in practical VANET systems.</p>
<p>As shown in <xref ref-type="fig" rid="fig-13">Fig. 13</xref> our VANET network will be busier when the rate of video requests from each vehicle node increases. From our results presented in <xref ref-type="fig" rid="fig-13">Fig. 13</xref>, we can conceive that the guarantee of optimal performances of transmission of real-time video packets requires a delay of at least 1.8&#x2005;ms with the DVC algorithm. Likewise, even in the case where the number n of vehicle nodes is 100, the transmission delay is also acceptable (no more than 3&#x2005;ms) mainly due to our algorithm and the high bandwidth of the VANET network. Increasing traffic generally leads to frequent changes in the network topology. Thus, the results show that the transmission delay increases in high-speed scenarios. The proposed algorithm allows a significant reduction in the transmission delay compared to other schemes. DVC creates stable clusters that can guarantee sufficient connectivity and a reliable link. As a result, the retransmission times and the transmission delay are reduced, which results in a reduction of the transmission delay. Another reason is that using stable connected clusters, packets can be delivered to the next hop with reduced conflict, which leads to short network latency.</p>
<fig id="fig-13"><label>Figure 13</label><caption><title>Transmission delay for varying vehicle node number</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_24571-fig-13.png"/></fig>
</sec>
</sec>
<sec id="s5"><label>5</label><title>Conclusion</title>
<p>In this paper, we have proposed a dynamic algorithm &#x201C;Dynamic Vehicle Clustering&#x201D; (DVC) as a new scheme for video streaming systems on vehicular ad-hoc networks (VANET) taking into account the unpredictable density of vehicles, unexpected acceleration or deceleration of different cars included in the vehicle traffic load and the limited radio range of the communication scheme used. We have introduced a wireless link inspired by the different functionalities and performance of the Long Term Evolved Network (LTE)-Advanced. Our algorithm is proposed to enhance both vehicle-to-vehicle and vehicle-to-Base station connectivity among high mobility networks.</p>
<p>Our policy has allowed us to dynamically divide traffic into several clusters. Another objective of this article is to guarantee a certain balance of load and resources available between the various VANET network vehicle nodes. We also noted that the cooperation and the distribution of the load between the various clusters simplify the calculations and accelerate the task of diffusion of the packets and also reduce the time of convergence of the VANET network towards the state of equilibrium.</p>
<p>The results of theoretical analysis and experiences illustrate the effectiveness of our application of the DVC algorithm due to the reduction of delays for the VANET network and the convergence towards a steady-state is greatly improved.</p>
</sec>
</body>
<back>
<fn-group>
<fn fn-type="other"><p><bold>Funding Statement:</bold> This work was supported by Qassim University.</p></fn>
<fn fn-type="conflict"><p><bold>Conflicts of Interest:</bold> The authors declare that they have no conflicts of interest to report regarding the present study.</p></fn>
</fn-group>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>[1]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>W.</given-names> <surname>Drira</surname></string-name>, <string-name><given-names>K. H.</given-names> <surname>Ahn</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Rakha</surname></string-name> and <string-name><given-names>F.</given-names> <surname>Filali</surname></string-name></person-group>, &#x201C;<article-title>Development and testing of a 3G/LTE adaptive data collection system in vehicular networks</article-title>,&#x201D; <source>IEEE Transactions on Intelligent Transportation Systems</source>, vol. <volume>17</volume>, no. <issue>1</issue>, pp. <fpage>240</fpage>&#x2013;<lpage>249</lpage>, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-2"><label>[2]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>G.</given-names> <surname>Araniti</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Campolo</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Condoluci</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Molinaro</surname></string-name></person-group>, &#x201C;<article-title>LTE for vehicular networking: A survey</article-title>,&#x201D; <source>IEEE Communications Magazine</source>, vol. <volume>51</volume>, no. <issue>5</issue>, pp. <fpage>148</fpage>&#x2013;<lpage>157</lpage>, <year>2013</year>.</mixed-citation></ref>
<ref id="ref-3"><label>[3]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S. J.</given-names> <surname>Yim</surname></string-name></person-group>, &#x201C;<article-title>Preview controller design for vehicle stability with v2v communication</article-title>,&#x201D; <source>IEEE Transactions on Intelligent Transportation Systems</source>, vol. <volume>18</volume>, no. <issue>6</issue>, pp. <fpage>1497</fpage>&#x2013;<lpage>1506</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-4"><label>[4]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Z. H.</given-names> <surname>Mir</surname></string-name> and <string-name><given-names>F.</given-names> <surname>Filali</surname></string-name></person-group>, &#x201C;<article-title>Large-scale simulations and performance evaluation of connected cars-A V2V communication perspective</article-title>,&#x201D; <source>Simulation Modeling Practice and Theory</source>, vol. <volume>72</volume>, pp. <fpage>88</fpage>&#x2013;<lpage>103</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-5"><label>[5]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>L.</given-names> <surname>Cao</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Bao</surname></string-name> and <string-name><given-names>J.</given-names> <surname>Tan</surname></string-name></person-group>, &#x201C;<article-title>A method for connected vehicle trajectory prediction and collision warning algorithm based on V2V communication</article-title>,&#x201D; <source>International Journal of Crashworthiness</source>, vol. <volume>22</volume>, no. <issue>1</issue>, pp. <fpage>15</fpage>&#x2013;<lpage>25</lpage>, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-6"><label>[6]</label><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><given-names>M. M. I.</given-names> <surname>Taha</surname></string-name> and <string-name><given-names>Y. M. Y.</given-names> <surname>Hasan</surname></string-name></person-group>, &#x201C;<article-title>VANET-DSRC protocol for reliable broadcasting of life safety messages</article-title>,&#x201D; <source>IEEE Int. Symp. on Signal Processing and Information Technology</source>, <comment>Giza, Egypt</comment>, pp. <fpage>104</fpage>&#x2013;<lpage>109</lpage>, <year>2007</year>.</mixed-citation></ref>
<ref id="ref-7"><label>[7]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Kenney</surname></string-name></person-group>, &#x201C;<article-title>Dedicated short-range communications (DSRC) standards in the United States</article-title>,&#x201D; in <conf-name>Proc. of the IEEE</conf-name>, vol. <volume>99</volume>, no. <issue>7</issue>, pp. <fpage>1162</fpage>&#x2013;<lpage>1182</lpage>, <year>2011</year>.</mixed-citation></ref>
<ref id="ref-8"><label>[8]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H.</given-names> <surname>Seo</surname></string-name>, <string-name><given-names>K. D.</given-names> <surname>Lee</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Yasukawa</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Peng</surname></string-name> and <string-name><given-names>P.</given-names> <surname>Sartori</surname></string-name></person-group>, &#x201C;<article-title>LTE evolution for vehicle-to-everything services</article-title>,&#x201D; <source>IEEE Communications Magazine</source>, vol. <volume>54</volume>, pp. <fpage>22</fpage>&#x2013;<lpage>28</lpage>, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-9"><label>[9]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Ucar</surname></string-name>, <string-name><given-names>S. C.</given-names> <surname>Ergen</surname></string-name> and <string-name><given-names>O.</given-names> <surname>Ozkasap</surname></string-name></person-group>, &#x201C;<article-title>Multihop-cluster-based IEEE 802.11p and LTE hybrid architecture for vanet safety message dissemination</article-title>,&#x201D; <source>IEEE Transactions on Vehicular Technology</source>, vol. <volume>65</volume>, pp. <fpage>2621</fpage>&#x2013;<lpage>2636</lpage>, <year>2015</year>.</mixed-citation></ref>
<ref id="ref-10"><label>[10]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A. S.</given-names> <surname>Chekkouri</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Ezzouhairi</surname></string-name> and <string-name><given-names>S.</given-names> <surname>Pierre</surname></string-name></person-group>, &#x201C;<article-title>A new integrated VANET-LTE-A architecture for enhanced mobility in small cells HetNet using dynamic gateway and traffic forwarding</article-title>,&#x201D; <source>Computer Networks</source>, vol. <volume>140</volume>, pp. <fpage>15</fpage>&#x2013;<lpage>27</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-11"><label>[11]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Vinel</surname></string-name></person-group>, &#x201C;<article-title>3GPP LTE versus IEEE 802.11p/WAVE: Which technology is able to support cooperative vehicular safety applications</article-title>,&#x201D; <source>IEEE Wireless Communications Letters</source>, vol. <volume>1</volume>, pp. <fpage>125</fpage>&#x2013;<lpage>128</lpage>, <year>2012</year>.</mixed-citation></ref>
<ref id="ref-12"><label>[12]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>E.</given-names> <surname>Yaacoub</surname></string-name>, <string-name><given-names>F.</given-names> <surname>Filali</surname></string-name> and <string-name><given-names>A. A.</given-names> <surname>Dayya</surname></string-name></person-group>, &#x201C;<article-title>QoE enhancement of SVC video streaming over vehicular networks using cooperative LTE/802.11p communications</article-title>,&#x201D; <source>IEEE Journal of Selected Topics in Signal Processing</source>, vol. <volume>9</volume>, no. <issue>1</issue>, pp. <fpage>37</fpage>&#x2013;<lpage>49</lpage>, <year>2015</year>.</mixed-citation></ref>
<ref id="ref-13"><label>[13]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>L.</given-names> <surname>Mendiboure</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Chalouf</surname></string-name> and <string-name><given-names>F.</given-names> <surname>Krief</surname></string-name></person-group>, &#x201C;<article-title>Edge computing based applications in vehicular environments: Comparative study and main issues</article-title>,&#x201D; <source>Journal of Computer Science and Technology</source>, vol. <volume>34</volume>, pp. <fpage>869</fpage>&#x2013;<lpage>886</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-14"><label>[14]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>M. S.</given-names> <surname>Mushtaq</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Fowler</surname></string-name>, <string-name><given-names>B.</given-names> <surname>Augustin</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Mellouk</surname></string-name></person-group>, &#x201C;<article-title>QoE in 5G cloud networks using multimedia services</article-title>,&#x201D; in <conf-name>IEEE Wireless Communications and Networking Conf. (WCNC)</conf-name>, <conf-loc>Doha, Qatar</conf-loc>, pp. <fpage>1</fpage>&#x2013;<lpage>6</lpage>, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-15"><label>[15]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>I.</given-names> <surname>Wahid</surname></string-name>, <string-name><given-names>F.</given-names> <surname>Ullah</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Ahmad</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Khan</surname></string-name>, <string-name><given-names>M. I.</given-names> <surname>Uddin</surname></string-name> <etal>et al.,</etal></person-group> &#x201C;<article-title>Quality of service aware cluster routing in vehicular ad hoc networks</article-title>,&#x201D; <source>Computers, Materials &#x0026; Continua</source>, vol. <volume>67</volume>, no. <issue>3</issue>, pp. <fpage>3949</fpage>&#x2013;<lpage>3965</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-16"><label>[16]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Jeon</surname></string-name>, <string-name><given-names>G.</given-names> <surname>Kim</surname></string-name> and <string-name><given-names>B.</given-names> <surname>Kim</surname></string-name></person-group>, &#x201C;<article-title>Study on V2V-based AEB system performance analysis in various road conditions at an intersection</article-title>,&#x201D; <source>International Journal of Software Engineering and Its Applications</source>, vol. <volume>9</volume>, no. <issue>7</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>10</lpage>, <year>2015</year>.</mixed-citation></ref>
<ref id="ref-17"><label>[17]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>G. G.</given-names> <surname>Deverajan</surname></string-name> and <string-name><given-names>R.</given-names> <surname>Saravanan</surname></string-name></person-group>, &#x201C;<article-title>Selfish node detection based on evidence by trust authority and selfish replica allocation in DANET</article-title>,&#x201D; <source>International Journal of Information and Communication Technology</source>, vol. <volume>9</volume>, no. <issue>4</issue>, pp. <fpage>473</fpage>&#x2013;<lpage>491</lpage>, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-18"><label>[18]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>X.</given-names> <surname>Ge</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Cheng</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Guizani</surname></string-name> and <string-name><given-names>T.</given-names> <surname>Han</surname></string-name></person-group>, &#x201C;<article-title>5G wireless backhaul networks: Challenges and research advances</article-title>,&#x201D; <source>IEEE Network</source>, vol. <volume>28</volume>, no. <issue>6</issue>, pp. <fpage>6</fpage>&#x2013;<lpage>11</lpage>, <year>2014</year>.</mixed-citation></ref>
<ref id="ref-19"><label>[19]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M. T.</given-names> <surname>Abbas</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Muhammad</surname></string-name> and <string-name><given-names>W. C.</given-names> <surname>Song</surname></string-name></person-group>, &#x201C;<article-title>Road-aware estimation model for path duration in internet of vehicles (iov)</article-title>,&#x201D; <source>Wireless Personal Communications</source>, vol. <volume>109</volume>, no. <issue>2</issue>, pp. <fpage>715</fpage>&#x2013;<lpage>738</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-20"><label>[20]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Afaq</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Iqbal</surname></string-name>, <string-name><given-names>T.</given-names> <surname>Ahmed</surname></string-name>, <string-name><given-names>I. U.</given-names> <surname>Islam</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Khan</surname></string-name> <etal>et al.,</etal></person-group> &#x201C;<article-title>Towards 5G network slicing for vehicular ad-hoc networks: An end-to-end approach</article-title>,&#x201D; <source>Computer Communications</source>, vol. <volume>149</volume>, pp. <fpage>252</fpage>&#x2013;<lpage>258</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-21"><label>[21]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>C. R.</given-names> <surname>Storck</surname></string-name> and <string-name><given-names>F. D.</given-names> <surname>Figueiredo</surname></string-name></person-group>, &#x201C;<article-title>A 5G v2x ecosystem providing internet of vehicles</article-title>,&#x201D; <source>Sensors</source>, vol. <volume>19</volume>, no. <issue>550</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>20</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-22"><label>[22]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>D.</given-names> <surname>Lin</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Kang</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Squicciarini</surname></string-name>, <string-name><given-names>Y. W.</given-names> <surname>Gurung</surname></string-name> and <string-name><given-names>O.</given-names> <surname>Tonguz</surname></string-name></person-group>, &#x201C;<article-title>MoZo: A moving zone based routing protocol using pure v2v communication in vanets</article-title>,&#x201D; <source>IEEE Transactions on Mobile Computing</source>, vol. <volume>16</volume>, no. <issue>5</issue>, pp. <fpage>1357</fpage>&#x2013;<lpage>1370</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-23"><label>[23]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Zheng</surname></string-name>, <string-name><given-names>L.</given-names> <surname>Hou</surname></string-name> and <string-name><given-names>H.</given-names> <surname>Meng</surname></string-name></person-group>, &#x201C;<article-title>Soft-defined heterogeneous vehicular network: Architecture and challenges</article-title>,&#x201D; <source>IEEE Network</source>, vol. <volume>30</volume>, no. <issue>4</issue>, pp. <fpage>72</fpage>&#x2013;<lpage>80</lpage>, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-24"><label>[24]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Montero</surname></string-name>, <string-name><given-names>F.</given-names> <surname>Agraz</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Pag&#x00E8;s</surname></string-name> and <string-name><given-names>S.</given-names> <surname>Spadaro</surname></string-name></person-group>, &#x201C;<article-title>Enabling multi-segment 5 g service provisioning and maintenance through network slicing</article-title>,&#x201D; <source>Journal of Network and Systems Management</source>, vol. <volume>28</volume>, pp. <fpage>340</fpage>&#x2013;<lpage>366</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-25"><label>[25]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Wang</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Shao</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Ge</surname></string-name> and <string-name><given-names>R.</given-names> <surname>Yu</surname></string-name></person-group>, &#x201C;<article-title>A survey of vehicle to everything (v2x) testing</article-title>,&#x201D; <source>Sensors</source>, vol. <volume>19</volume>, no. <issue>2</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>20</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-26"><label>[26]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>D. V.</given-names> <surname>Khairnar</surname></string-name> and <string-name><given-names>S. N.</given-names> <surname>Pradhan</surname></string-name></person-group>, &#x201C;<article-title>V2v communication survey-(wireless technology)</article-title>,&#x201D; <source>International Journal on Computer Technology &#x0026; Applications</source>, vol. <volume>3</volume>, no. <issue>1</issue>, pp. <fpage>370</fpage>&#x2013;<lpage>373</lpage>, <year>2012</year>.</mixed-citation></ref>
<ref id="ref-27"><label>[27]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>D.</given-names> <surname>Minolim</surname></string-name> and <string-name><given-names>B.</given-names> <surname>Occhiogrosso1</surname></string-name></person-group>, &#x201C;<article-title>Practical aspects for the integration of 5&#x2005;g networks and iot applications in smart cities environments</article-title>,&#x201D; <source>Wireless Communications and Mobile Computing</source>, vol. <volume>2019</volume>, pp. <fpage>1</fpage>&#x2013;<lpage>30</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-28"><label>[28]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Kumar</surname></string-name> and <string-name><given-names>M.</given-names> <surname>Gupta</surname></string-name></person-group>, &#x201C;<article-title>A review on activities of fifth generation mobile communication system</article-title>,&#x201D; <source>Alexandria Engineering Journal</source>, vol. <volume>57</volume>, no. <issue>2</issue>, pp. <fpage>1125</fpage>&#x2013;<lpage>1135</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-29"><label>[29]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Liu</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Lin</surname></string-name> and <string-name><given-names>H.</given-names> <surname>Huang</surname></string-name></person-group>, &#x201C;<article-title>Joint congestion control and resource allocation for energy-efficient transmission in 5G heterogeneous networks</article-title>,&#x201D; <source>EURASIP Journal on Wireless Communications and Networking</source>, vol. <volume>2019</volume>, no. <issue>227</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>16</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-30"><label>[30]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Peng</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Wang</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Li</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Xiang</surname></string-name> and <string-name><given-names>V.</given-names> <surname>Lau</surname></string-name></person-group>, &#x201C;<article-title>Recent advances in underlay heterogeneous networks: Interference control, resource allocation, and self-organization</article-title>,&#x201D; <source>IEEE Communications Surveys &#x0026; Tutorials</source>, vol. <volume>17</volume>, no. <issue>2</issue>, pp. <fpage>700</fpage>&#x2013;<lpage>729</lpage>, <year>2015</year>.</mixed-citation></ref>
<ref id="ref-31"><label>[31]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Hajlaoui</surname></string-name>, <string-name><given-names>E.</given-names> <surname>Alsolami</surname></string-name>, <string-name><given-names>T.</given-names> <surname>Moulahi</surname></string-name> and <string-name><given-names>H.</given-names> <surname>Guyennet</surname></string-name></person-group>, &#x201C;<article-title>An adjusted K-medoids clustering algorithm for effective stability in vehicular ad hoc networks</article-title>,&#x201D; <source>International Journal of Communication Systems</source>, vol. <volume>32</volume>, no. <issue>12</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>16</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-32"><label>[32]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>B.</given-names> <surname>Alaya</surname></string-name> and <string-name><given-names>L.</given-names> <surname>Sellami</surname></string-name></person-group>, &#x201C;<article-title>Clustering method and symmetric/asymmetric cryptography scheme adapted to securing urban VANET networks</article-title>,&#x201D; <source>Journal of Information Security and Applications</source>, vol. <volume>58</volume>, pp. <fpage>102779</fpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-33"><label>[33]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Hajlaoui</surname></string-name>, <string-name><given-names>E.</given-names> <surname>Alsolami</surname></string-name>, <string-name><given-names>T.</given-names> <surname>Moulahi</surname></string-name> and <string-name><given-names>H.</given-names> <surname>Guyennet</surname></string-name></person-group>, &#x201C;<article-title>Construction of a stable vehicular ad hoc network based on hybrid genetic algorithm</article-title>,&#x201D; <source>Telecommunication Systems</source>, vol. <volume>71</volume>, pp. <fpage>433</fpage>&#x2013;<lpage>445</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-34"><label>[34]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>B.</given-names> <surname>Alaya</surname></string-name></person-group>, &#x201C;<article-title>Efficient privacy-preservation scheme for securing urban P2P VANET networks</article-title>,&#x201D; <source>Egyptian Informatics Journal</source>, vol. <volume>22</volume>, no. <issue>3</issue>, pp. <fpage>317</fpage>&#x2013;<lpage>328</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-35"><label>[35]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>T.</given-names> <surname>Song</surname></string-name>, <string-name><given-names>W.</given-names> <surname>Xia</surname></string-name>, <string-name><given-names>T.</given-names> <surname>Song</surname></string-name> and <string-name><given-names>L.</given-names> <surname>Shen</surname></string-name></person-group>, &#x201C;<article-title>A Cluster-based directional routing protocol in vanet</article-title>,&#x201D; in <conf-name>IEEE Int. Conf. on Communication Technology</conf-name>, <conf-loc>Nanjing, China</conf-loc>, pp. <fpage>1172</fpage>&#x2013;<lpage>1175</lpage>, <year>2010</year>.</mixed-citation></ref>
<ref id="ref-36"><label>[36]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>B.</given-names> <surname>Alaya</surname></string-name></person-group>, &#x201C;<article-title>Payoff-based dynamic segment replication and graph classification method with attribute vectors adapted to urban vanet</article-title>,&#x201D; <source>ACM Transactions on Multimedia Computing, Communications, and Applications</source>, vol. <volume>17</volume>, no. <issue>85</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>22</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-37"><label>[37]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Luo</surname></string-name>, <string-name><given-names>W.</given-names> <surname>Zhang</surname></string-name> and <string-name><given-names>Y.</given-names> <surname>Hu</surname></string-name></person-group>, &#x201C;<article-title>A new cluster based routing protocol for vanet</article-title>,&#x201D; in <conf-name>Int. Conf. on Networks Security Wireless Communications and Trusted Computing</conf-name>, <conf-loc>Wuhan, China</conf-loc>, pp. <fpage>176</fpage>&#x2013;<lpage>180</lpage>, <year>2010</year>.</mixed-citation></ref>
<ref id="ref-38"><label>[38]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>T.</given-names> <surname>Liu</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Shi</surname></string-name> and <string-name><given-names>X.</given-names> <surname>Gu</surname></string-name></person-group>, &#x201C;<article-title>Naive Bayes classifier based driving habit prediction scheme for vanet stable clustering</article-title>,&#x201D; <source>Mobile Networks and Applications</source>, vol. <volume>25</volume>, pp. <fpage>1708</fpage>&#x2013;<lpage>1714</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-39"><label>[39]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>S. T.</given-names> <surname>Hasson</surname></string-name> and <string-name><given-names>A. T.</given-names> <surname>Abbas</surname></string-name></person-group>, &#x201C;<article-title>A clustering approach to model the data dissemination in vanets</article-title>,&#x201D; in <conf-name>Babylon Int. Conf. on Information Technology and Science (BICITS)</conf-name>, <conf-loc>Babil, Iraq</conf-loc>, pp. <fpage>337</fpage>&#x2013;<lpage>342</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-40"><label>[40]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>H. H.</given-names> <surname>Saleh</surname></string-name> and <string-name><given-names>S. T.</given-names> <surname>Hasson</surname></string-name></person-group>, &#x201C;<article-title>A survey of routing algorithms in vehicular networks</article-title>,&#x201D; in <conf-name>Int. Conf. on Advanced Science and Engineering (ICOASE)</conf-name>, <conf-loc>Zakho, Duhok, Iraq</conf-loc>, pp. <fpage>159</fpage>&#x2013;<lpage>164</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-41"><label>[41]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>P.</given-names> <surname>Ruiz</surname></string-name>, <string-name><given-names>V.</given-names> <surname>Cabrera</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Martinez</surname></string-name> and <string-name><given-names>F.</given-names> <surname>Ros</surname></string-name></person-group>, &#x201C;<article-title>Brave: Beacon-less routing algorithm for vehicular environments</article-title>,&#x201D; in <conf-name>IEEE Int. Conf. on Mobile Adhoc and Sensor Systems (MASS)</conf-name>, <conf-loc>San Francisco, CA, USA</conf-loc>, pp. <fpage>709</fpage>&#x2013;<lpage>714</lpage>, <year>2010</year>.</mixed-citation></ref>
<ref id="ref-42"><label>[42]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A. J.</given-names> <surname>Manuel</surname></string-name>, <string-name><given-names>G. G.</given-names> <surname>Deverajan</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Patan</surname></string-name> and <string-name><given-names>A. H.</given-names> <surname>Gandomi</surname></string-name></person-group>, &#x201C;<article-title>Optimization of routing-based clustering approaches in wireless sensor network: Review and open research issues</article-title>,&#x201D; <source>Electronics</source>, vol. <volume>9</volume>, pp. <fpage>1630</fpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-43"><label>[43]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Palanisamy</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Sankar</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Somula</surname></string-name> and <string-name><given-names>G. G.</given-names> <surname>Deverajan</surname></string-name></person-group>, &#x201C;<article-title>Communication trust and energy-aware routing protocol for wsn using d-s theory</article-title>,&#x201D; <source>International Journal of Grid and High Performance Computing (IJGHPC)</source>, vol. <volume>13</volume>, no. <issue>4</issue>, pp. <fpage>24</fpage>&#x2013;<lpage>36</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-44"><label>[44]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Tian</surname></string-name>, <string-name><given-names>L.</given-names> <surname>Han</surname></string-name> and <string-name><given-names>K.</given-names> <surname>Rothermel</surname></string-name></person-group>, &#x201C;<article-title>Spatially aware packet routing for mobile ad hoc inter-vehicle radio networks</article-title>,&#x201D; <source>IEEE Intelligent Transportation Systems Proceedings</source>, vol. <volume>2</volume>, pp. <fpage>1546</fpage>&#x2013;<lpage>1551</lpage>, <year>2003</year>.</mixed-citation></ref>
<ref id="ref-45"><label>[45]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J. R.</given-names> <surname>Mart&#x00ED;n</surname></string-name>, <string-name><given-names>R. P.</given-names> <surname>Leal</surname></string-name> and <string-name><given-names>J. N.</given-names> <surname>Marco</surname></string-name></person-group>, &#x201C;<article-title>Towards 5G: Techno-economic analysis of suitable use cases</article-title>,&#x201D; <source>Netnomics</source>, vol. <volume>20</volume>, pp. <fpage>153</fpage>&#x2013;<lpage>175</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-46"><label>[46]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Kishiyama</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Benjebbour</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Ishii</surname></string-name> and <string-name><given-names>T.</given-names> <surname>Nakamura</surname></string-name></person-group>, &#x201C;<article-title>Evolution concept and candidate technologies for future steps of lte-a</article-title>,&#x201D; in <conf-name>IEEE Int. Conf. on Communication Systems (ICCS)</conf-name>, <conf-loc>Singapore</conf-loc>, pp. <fpage>473</fpage>&#x2013;<lpage>477</lpage>, <year>2012</year>.</mixed-citation></ref>
<ref id="ref-47"><label>[47]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>N.</given-names> <surname>Noorani</surname></string-name> and <string-name><given-names>S. A. H.</given-names> <surname>Seno</surname></string-name></person-group>, &#x201C;<article-title>SDN-and fog computing-based switchable routing using path stability estimation for vehicular ad hoc networks</article-title>,&#x201D; <source>Peer-to-Peer Networking and Applications</source>, vol. <volume>13</volume>, pp. <fpage>948</fpage>&#x2013;<lpage>964</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-48"><label>[48]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>L.</given-names> <surname>Krishnasamy</surname></string-name>, <string-name><given-names>R. K.</given-names> <surname>Dhanaraj</surname></string-name>, <string-name><given-names>G. G.</given-names> <surname>Deverajan</surname></string-name>, <string-name><given-names>G. T.</given-names> <surname>Reddy</surname></string-name>, <string-name><given-names>M. K.</given-names> <surname>Aboudaif</surname></string-name> <etal>et al.,</etal></person-group> &#x201C;<article-title>A heuristic angular clustering framework for secured statistical data aggregation in sensor networks</article-title>,&#x201D; <source>Sensors</source>, vol. <volume>20</volume>, no. <issue>17</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>15</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-49"><label>[49]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Charles</surname></string-name> and <string-name><given-names>P.</given-names> <surname>Balasubramanian</surname></string-name></person-group>, &#x201C;<article-title>VTD protocol: A cluster based trust model for secure communication in vanet</article-title>,&#x201D; <source>International Journal of Intelligent Engineering and Systems</source>, vol. <volume>13</volume>, pp. <fpage>35</fpage>&#x2013;<lpage>45</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-50"><label>[50]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>V.</given-names> <surname>Jain</surname></string-name>, <string-name><given-names>R. S.</given-names> <surname>Kushwah</surname></string-name> and <string-name><given-names>R. S.</given-names> <surname>Tomar</surname></string-name></person-group>, &#x201C;<article-title>Named data network using trust function for securing vehicular ad hoc network</article-title>,&#x201D; <source>Proceeding of Soft Computing: Theories and Applications</source>, SoCRA2017, pp. <fpage>463</fpage>&#x2013;<lpage>471</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-51"><label>[51]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H.</given-names> <surname>Xia</surname></string-name>, <string-name><given-names>S. S.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>B. X.</given-names> <surname>Li</surname></string-name>, <string-name><given-names>L.</given-names> <surname>Li</surname></string-name> and <string-name><given-names>X. G.</given-names> <surname>Cheng</surname></string-name></person-group>, &#x201C;<article-title>Towards a novel trust-based multicast routing for VANET</article-title>,&#x201D; <source>Security and Communication Networks</source>, vol. <volume>2018</volume>, no. <issue>1</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>12</lpage>, <year>2018</year>.</mixed-citation></ref>
</ref-list>
</back>
</article>