ArticlePDF Available

A Study to Enhance the Route Optimization Algorithm for the Internet of Vehicle

Authors:

Abstract and Figures

In the Internet of Things (IoT), the advancement of the new modern era of Internet-off driving, known as the Internet of Vehicles (IoV), is aimed at the Intelligent Transportation System (ITS) to improve road safety and traffic. Therefore, IoV is better for traffic management. But perhaps, the main challenges in this type of network are that timely decision to make adequate decisions by a driver under certain conditions of rapid change in topology, high vehicular mobility, and frequent link failures is hard to improve road safety. Therefore, an optimized and congestion-free route is required to collect real-time data from vehicles. Thus, some of the latest bioinspired optimization routing algorithms in the IoV environment are presented in this study. Hence, monitoring speed limits, pollution checks, and emergency responses to traffic accidents should also be considered while performing vehicle routing to avoid traffic problems. In the previous decades, many route-directing protocols for the IoV environment have been proposed that can handle the requirements of reliability and security. But such routing of protocols suffers from high complexity and scalability limitations in big-scale networks, routing overlays, etc. Therefore, their strengths, weaknesses, and critical characteristics are compared using various criteria for such algorithms. Then, a suggestion is made to propose a prescribed combined model of a multimodular bioinspired approach to IoV routing. Finally, the main future directions of research in this sector are highlighted.
This content is subject to copyright. Terms and conditions apply.
Review Article
A Study to Enhance the Route Optimization Algorithm for the
Internet of Vehicle
Ritesh Dhanare ,
1
Kapil Kumar Nagwanshi ,
1
and Sunita Varma
2
1
Department of CSE, Amity School of Engineering and Technology, Amity University Rajasthan, Jaipur, India
2
Department of Computer Engineering, Shri G. S. Institute of Technology and Science, Indore, India
Correspondence should be addressed to Kapil Kumar Nagwanshi; dr.kapil@ieee.org
Received 16 February 2022; Accepted 9 April 2022; Published 27 April 2022
Academic Editor: Nitish Pathak
Copyright © 2022 Ritesh Dhanare et al. This is an open access article distributed under the Creative Commons Attribution
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is
properly cited.
In the Internet of Things (IoT), the advancement of the new modern era of Internet-odriving, known as the Internet of Vehicles
(IoV), is aimed at the Intelligent Transportation System (ITS) to improve road safety and trac. Therefore, IoV is better for trac
management. But perhaps, the main challenges in this type of network are that timely decision to make adequate decisions by a
driver under certain conditions of rapid change in topology, high vehicular mobility, and frequent link failures is hard to improve
road safety. Therefore, an optimized and congestion-free route is required to collect real-time data from vehicles. Thus, some of
the latest bioinspired optimization routing algorithms in the IoV environment are presented in this study. Hence, monitoring
speed limits, pollution checks, and emergency responses to trac accidents should also be considered while performing vehicle
routing to avoid trac problems. In the previous decades, many route-directing protocols for the IoV environment have been
proposed that can handle the requirements of reliability and security. But such routing of protocols suers from high
complexity and scalability limitations in big-scale networks, routing overlays, etc. Therefore, their strengths, weaknesses, and
critical characteristics are compared using various criteria for such algorithms. Then, a suggestion is made to propose a
prescribed combined model of a multimodular bioinspired approach to IoV routing. Finally, the main future directions of
research in this sector are highlighted.
1. Introduction
In recent years, there has been a growing interest in the
transport industry and academic researchers in improving
road safety by delivering fast and reliable information to
vehicle drivers and navigation entities [1, 2]. Integrating
road trac data over mobile or wireless networks with the
minimum infrastructure oered by the Intelligent Transpor-
tation System (ITS) is one approach to enhancing road
safety. ITS provides a wide range of real-time applications
like real-time diversion route calculation; blind crossing;
tracow control; monitoring trac; collision avoidance;
vehicle safety; nding the nearby restaurant, gas station, or
hotel; and automatic toll payment [3, 4].
Despite much progress in sustainable development traf-
c, transmitting data to a broadcast medium like mobile gate-
ways has limitations like high asset prices and geographic
connes, particularly in rural areas such as deserts, moun-
tains, and islands. As a result, many telecommunication
services are severely limited in their ability to cover a wide
range of networks. Moreover, due to the speed of the trac,
the connections oered by these basic network connections
are aected by the unreliable connectivity of the network
and are more prone to interruptions [5]. Furthermore,
infrastructure-based vehicle networks have a signicant dis-
advantage in terms of the expense of deploying several xed
devices and units on the street.
Because of these vehicular network restrictions, all cars
must participate in a multihop or unicast routing procedure
with each other as well as with xed and stationary gateways.
Therefore, vehicular ad hoc networks (VANETs) have been
developed to provide trac users with reliable network cov-
erage, extensive connectivity, and minimum communication
costs [6].
Hindawi
Wireless Communications and Mobile Computing
Volume 2022, Article ID 1453187, 20 pages
https://doi.org/10.1155/2022/1453187
Several surveys addressing various elements of routing in
vehicular networks have been suggested in previous
research. The majority of them are concentrated based on
the density, velocity, direction of motion, and so on, whereas
other categorizations of VANET routing protocols are based
on information dissemination mode [7]. In particular, in [8],
the authors categorized the protocols devoted to VANETs
based on V2I and V2V structures, and they also discussed
the future potential of considering vehicle density in the
routing algorithm. But, they ignore the hybrid construction
that employs both V2I, V2V, and V2O, whereas in [9], the
authors proposed a conceptual taxonomy based on various
factors of the unicast protocol. They rst divide them into
two major categories. The route-dependent and route-
routing systems vary in data forwarding and path selection.
In addition, to highlight the advantages and shortcomings
of protocols, the authors proposed a conceptual taxonomy
based on fundamental functions such as relay selection,
recovery strategy, inference logic, probing objective, probing
scope, and routing techniques. In [10], a taxonomy of
VANET routing protocols is presented, with categorization
based on data fusion, opportunism, clustering, hybridity,
and geography.
The VANET routing protocols described in [11] are
divided into two primary categories: geographic-based rout-
ing and topology-based routing. In the paper presented here
[12], the authors are interested in position-based routing
methods for VANETs and examine position determination
issues. They present some relevant work on the advance-
ment of position assessment system solutions and list the
position-based protocols, along with their benets and a
worldwide qualitative comparison of the protocols. From
this study, the authors classify routing protocols that employ
decision metrics. Furthermore, they provided privacy, secu-
rity, and delay in view.
The network topology of VANETs is continually and
rapidly changing, which creates several challenges and
unclear instructions like bandwidth scarcity, channel insta-
bility, and communication delays when the network is
implemented on a broad scale. While a greater number of
nodes create a more stable route, a too dense population
might induce network congestion and packet collisions. To
reduce delays and enhance the eciency and dissemina-
tion distance, several techniques such as cluster-based
routing, geographic position, reactive, proactive, machine
learning, bioinspired, probabilistic, broadcast, and unicast
are utilized [13, 14].
However, due to a lack of processing capacity for global
information by VANET and vehicle telematics, there is a
need for an open-integrated network framework system.
So, nowadays, VANET, vehicle telematics, and other vehicle
networks are associated with IoV [15]. IoV is considered to
be a large network capable of providing services for large
cities and countries [16]. IoV is particularly an open and
incorporated network framework system that consists of
many more users, vehicles, network organizations, and
things in accommodation with controllability and high
management. The key goal of IoV is to interact with the
human-vehicle environments and things to limit social cost,
ensure human satisfaction, promote ecient transportation,
and improve the service levels in cities [17]. The basic model
of IoV is shown in Figure 1.
Advances in IoV technology can reduce the travel time
of passengers or drivers by nding a shorter route. There
are numerous routing protocols for a vehicle to nd a better
route path. But some of the paths become invalid as slight
changes occur in their topology. To mention the prediction
of a path failure, before nding a new path, a novel estima-
tion of the path duration routing protocol is necessary to
enhance the performance of the network [18]. Several
classic-type routing protocols and the vehicles properties
by some geographic-type protocols that come from MANET
studies are used, such as Destination Sequenced Distance
Vector (DSDV), Dynamic Source Routing (DSR), Ad hoc
On-Demand Distance Vector (AODV), Greedy Perimeter
Stateless Routing (GPSR), and Greedy Perimeter Coordina-
tor Routing (GPCR). However, it should be noted that the
majority of routing algorithms are only suitable for a limited
scale [19]. For such issues, an optimization algorithm is the
best way to nd the shortest path and the fastest conver-
gence speed. Many models inspired by nature have been
developed to solve optimization problems that arise in
dierent areas of life. Bioinspired approaches such as swarm
intelligence (SI), genetic algorithms (GA), and neural net-
works like articial neural network (ANN) are used to solve
complex optimization problems [20, 21]. An evolutionary
system deals with the collective behavior of groups of
worms, birds, ants, and bees. Individuals in the group
develop traits based on their specic characteristics, i.e.,
where to feed and where to breed. Bees and ants use this
information to nd new food sources. Cuckoo Search,
Bat Algorithm, rey algorithm (FA), etc. are swarm intel-
ligence established methods utilized to solve complex real-
life issues [2224]. Ant Colony Optimization (ACO)
makes extensive use of routing paths. The Quality of Ser-
vice (QoS) multicast problem is solved by the bee colony
routing optimization algorithm. All of evolutionary com-
puting has found a wide range of solutions to many
real-world problems that include graph colorization prob-
lems, vehicle routing problems (VRP), back-packing prob-
lems, and work-planning problems [25].
With the popularisation of nature-inspired optimization
algorithms over the last decade, our survey oers a solution
V2N V2V
V2I
V2P
Figure 1: Architecture of IoV.
2 Wireless Communications and Mobile Computing
to validate recent progress in the bioinspired VANET based
on emerging research issues that can be further expanded to
contribute to optimal routing in VANET.
The organization of this survey is structured in Figure 2.
In Section 2, we provide the existing review of IoV. The
preliminaries of review are explained in Section 3. The
taxonomy of optimization algorithms in IoV is discussed
in Section 4. We also discussed the challenges and applica-
tions of this survey there. Finally, at the end of the paper,
the conclusion to this review is provided in Section 6.
2. Literature Review
Numerous sorts of examinations have been conducted in the
eld of IoV in ITS. From that, a small portion of the overall
challenges of nding the shortest route path to reach the
endpoint by the existing routing algorithms is claried
underneath.
Hussain et al. [26] have reviewed the end-to-end service
in the IoV scenario and the quality service of IoV. The
agglomeration is critical in IoV for vehicle communication,
processing, integrating, and sensing. Due to the additional
devices connected and communicating, there will be a huge
vehicle load on the network. Hence, IoV needs accurate
end-to-end delivery without any compromise and with
QoS parameters such as latency, jitter, delay, and bandwidth.
In IoV, QoS is utilized to enhance the network service and
satisfy customer needs. The parameters of QoS provide ded-
icated bandwidth and reduce the characteristics of packet
loss, which are some of the main goals of IoV. In IoV, since
the vehicles are dynamic and move from one place to
another at a very high speed, the network requirements are
unpredictable. Yet, it is very dicult to manage and
IoV Study
Section1:
Introduction
Background
of IoV
Historical
evaluation of
optimization
algorithm
Section 2:
Literature
Review
Related work
of IoV
Section 3 :
preliminaries
Motivation
Signicant
contribution
Research
source
Section 4:
taxonomy of
optimization
techniques
Bio-inspired
algorithms
CI algorithm
Section 5:
challenges &
applications
Vehicle
Routing
mangemnet
Infotainment
and comfort
Safety
Section 6 :
conclusion
Figure 2: Organization of survey.
3Wireless Communications and Mobile Computing
integrate all these features into the network while providing
the IoV service, which is dynamic in nature. The main chal-
lenge in IoV is that when the vehicles move from one place
to another network, there could be packet loss when the
vehicle network is autonomous. The end-to-end services
are in collaboration with the IoV network. The vehicles are
treated as nodes and change dynamically with varying
conditions. From this review, they conclude that they can
develop the optimal solution using QoS parameters and
their measurements.
Cheng et al. [27] have surveyed the details of IoV-based
routing algorithms. For this purpose, the IoV uses a general
protocol for the horizontal networking process in order to
realise IoV. Initially, they categorize the transmission
scheme into three types, such as broadcast ones, unicast
ones, and geocast ones. In much of the work, they discussed
the routing protocols referring to the unicast category. The
application of this category is emergency vehicle preemption
and information about the road conditions. The balance
type of routing algorithms is used in the last category. Based
on these details, they classify the information into four cate-
gories: map, position, path-based one, and topology for the
communication process in vehicular networks. Yet, the
nature of the geographic nature of these protocols prevents
them from forecasting the topology holes in the distributing
nodes. Moreover, many routing protocols only work in
one- or two-dimensional scenarios and have the worst
performance in the real-time third-dimensional scenario.
They also discussed the reliability of the communication
between the vehicles. For this communication, a heteroge-
neous vehicular network process is needed. Therefore, the
researcher needs a set of well-dened routing protocols,
which are used to address the issues caused by the hetero-
geneous nature of IoV and large scale. Finally, they suggest
the researchers certify the studies in small-scale homoge-
neous networks. Furthermore, the large-scale heterogeneous
networks make the vehicles dependent on road information
after the social environment.
Kayarga and Kumar [28] presented the details of the IoV
network model, and they reviewed IoV technologies in dif-
ferent applications. Mostly, they concentrate on the bioin-
spired algorithms, which are used between vehicles, things,
and humans. For these dierent applications, the IoV con-
tains various steps to take the vehicles into the IoV inte-
grated network by using wireless access technology. To
maintain this technology, the IoV has aspects such as encod-
ing, virtual network, and data awareness that play the main
role in switching the control message to the IoV. With this
type of maintenance, each topology is also maintained in
intervehicle networks. The main routing topology is an ad
hoc network-based topology. This technology is more eec-
tive for wireless vehicle communication. It is also essential
for a credible and manageable IoV. The solution of IoV con-
siders vehicle communication in the complex city. Sophisti-
cated technology is utilized to develop the ability of IoV
communication by using a variety of technologies for IoV.
Hence, vehicular communication over big data can enhance
the network burden. Eective optimization techniques are
also needed to develop the service to enhance the suitability
of mobile nodes in the global network. Furthermore, many
challenges are focused on the VANET of IoV from multiple
vehicles, things, and users, because IoV goes beyond tele-
matics, intelligent transportation, and ad hoc networks by
integrating sensors, vehicles, and mobile devices to enable
dierent services.
Tuyisenge et al. [29] have surveyed the IoV on the mar-
ket opportunities in the eld of city transport communica-
tion systems. It faces huge challenges and problems such as
trac congestion, safety problems, pollution, and commer-
cialization. This is all forecasted, and it is evident that the
IoV component will create a huge amount of data and huge
real-time IoV applications and requires fast routing. They
also reviewed the existing protocols, namely, IEE, 3GPP,
and VANET, which are used for IoV vehicle communica-
tion, and further, they used protocol stack analysis. From
this survey, they nally provide some information about
the future work related to the mechanism of IoV between
various networks.
Ksouri et al. [30] conducted a review of suitable VANET
routing techniques and multioptimization algorithms. They
suggest new criteria for the routing process in the dynamic
environment. The survey shows that new innovations in
IoV applications and the presentation of autonomous vehi-
cles in networking provide new security and QoS challenges
in the VANET network. They classify the routing algorithms
based on the forward criteria to maintain the macro classi-
cation. In the routing protocol, the macro classication is a
third family. It is named hybrid routing,which is a combi-
nation of both geographically based routing and topology-
based modeling. The function of this process represents the
merging of both the routing processes. Secondly, they dis-
cussed the geographical routing techniques. This VANET
routing model is capable of taking specic route materials
based on the vehicles environment. This model is more
suitable for large-scale vehicular communication network
processes and the performance of improving the nodes
security and safety. Then, they survey the forward process.
It allows the packets to move from one node to another. This
stage is an important core part of the IoV routing process. It
has two substages, such as the forward selection stage and
the packet relaying stage. Then, they review the optimization
techniques used for routing to enhance the overall routing
process, such as relay, path discovery, cluster head selection,
and routing FR. The routing optimization algorithm is more
eective than the IoV routing algorithm. Finally, they dis-
cussed the large-scale IoV routing techniques, including
the marine domains, terrestrial and aerial, for future study.
Many traditional optimization algorithms for trac
management in IoV to optimize deterministic problems
have been proposed. But those algorithms have not shown
their ability to tackle the inherent randomness in trac
systems. Therefore, to handle such ecient and random
situations eciently, a better bioinspired optimization algo-
rithm is needed, because bioinspired optimization algorithm
has an ability to combine biological and natural characteris-
tics that can be easily adapted to frequently changing envi-
ronments. Table 1 provides the comparative analysis with
an existing survey on vehicular routing techniques.
4 Wireless Communications and Mobile Computing
3. Preliminary of the Survey
This section discusses the motivation for conducting this
review, as well as the contribution of the primary survey.
The main motivation of the review is to show the following
issues and challenges present in performing a vehicle routing
algorithm in the IoV: to achieve that, some sources of papers
are selected by using some string words to select papers
based on our work.
3.1. Motivation of the Study. The main motivation for this
study is as follows:
(i) To nd an optimal path between the network nodes
to nd the shortest routes, thus reducing the travel
time
(ii) To gain real-time road trac information for pro-
viding optimal routing to improve travel comfort
for drivers
(iii) Hence, the use of bioinspired optimization routing
algorithms for the IoV environment boosts the
robustness of the IoV network while performing
optimal path routing at the time of network disrup-
tions. The chosen path should satisfy the routing
constraints such as packet delivery ratio, distance,
congestion, connection probability, cost, transmis-
sion delay, and variance introduced by the algorithm
3.2. Contribution. The main contribution of this review is to
recognize the sorts of issues that occur when trying to nd
an optimized path to travel from a source to a destination,
and that chosen path should satisfy the following needs to
mitigate them: packet delivery ratio, distance, congestion,
connection probability, cost, transmission delay, and vari-
ance. The main purpose of IoV routing is to aord a correct
path of routing direction by a network in avoidance of trac
to their nal destination. So the contribution of the review
falls within a study of the IoV routing protocol in an extreme
or complex urban environment. This review paper addresses
the need for bioinspired optimization routing algorithms in
IoV, which can be able to tolerate low-/high-density trac
networks with little throughput and delay variation.
3.3. Search Criteria. The papers collected are manually
searched, particularly journal papers and conference pro-
ceedings since 2001.
3.3.1. Selection of Sources. For the systematic review of exist-
ing issues, we searched the Springer, IEEE, Elsevier, and
Wiley Online Library databases using the following search
string words: IoV, route optimization, challenges and issues,
VANET, and machine learning. The search engine selection
for this survey is listed in Table 2, and the search strategy is
illustrated in Figure 3.
3.3.2. Exclusion Criteria. The articles are excluded on the
following basis:
(i) Publication not related to IoV routing
(ii) If the entire content of the paper is not available
Table 1: Comparative analysis with existing survey.
Author Year Taxonomy Application Findings
Hussain et al. [26] 2019 QoS-based routing Multimedia application
It is critical to provide best end-to-end services
with networks because the cars treated as nodes
change constantly in response to changing
network circumstances. As a result, there is a need
to design ecient methods for dealing with
mobile nodes, such as automobiles.
Cheng et al. [27] 2015
Topology-based, position-
based, map-based, and,
path-based routing
Road condition, accident
warnings, and
infotainment applications
To make IoV function in the real world,
the authors recommend that researchers test
their ndings not just in small-scale
omogeneous systems but also in large-scale
heterogeneous networks.
Kayarga and
Kumar [28] 2021 Genetic algorithm
Trac message
management,
routing decision
The hybridization of machine learning and swarm
intelligence gives better routing eciency.
Tuyisenge et al. [29] 2018 Architecture-based
routing
It is projected and obvious that IoV components
would generate large amounts of data at high
rates, extremely sensitive to delay, and demand
rapid big data processing and dependable fast
response. As a result, ecient and dependable
network designs that support ecient IoV
installation in real-time are required.
Ksouri et al. [30] 2020
Geographical routing,
optimization-based
routing
Prediction-based
applications
Information interchange across the various IoV
domains like marine, aerial, and terrestrial should
be facilitated to allow for greater collaboration and
the adoption of innovative solutions.
5Wireless Communications and Mobile Computing
(iii) The papers published before 2001
(iv) Same papers available in dierent journals
(v) Papers not written in English
4. Taxonomy of Optimization
Techniques of IoV
This section holds the taxonomy of overall bioinspired
optimization techniques and solutions used to overcome
the issues in IoV routing. The overall taxonomy of IoV opti-
mization techniques is illustrated in Figure 4.
4.1. Taxonomy of Bioinspired Optimization Algorithms in
IoV. There are some optimization algorithms to handle such
problems, where the correct path is determined by the actual
solution rather than the best solution. Nature is such an
inspiring, immense set of solutions that deal with all real-
time problems. This has motivated many researchers to use
nature-inspired algorithms to solve such complex-related
issues. Therefore, algorithms inspired by nature are also
called bioinspired algorithms[31]. Such algorithms are
nowadays used to optimize the routing problem in network-
ing. Hence, these algorithms are considered to nd the
global optimal solution. Bioinspired route optimization algo-
rithms carry an assortment of optimization algorithms in
terms of using biological principles to cover a wide range
of networks. Such types of algorithms include Ant Colony
Optimization (ACO), Bat Algorithm (BA), Cuckoo Search
(CS), Particle Swarm Optimization (PSO), bee colony opti-
mization (BCO), rey algorithms (FA), Flower Pollination
Algorithm (FPA), and the Krill Herd (KH) algorithm.
Nowadays, a variety of new classes of algorithms are
applied, such as genetic algorithms (GA), evolutionary
algorithms (EA), neural networks (NN), and simulated
annealing (SA) [32].
The following types of optimization methods are used
for solving NP-hard and NP-complete optimization prob-
lems: the hard optimization approach presents a huge num-
ber of candidate solutions that can attain a global optimal
solution at a reasonable time. Hence, nding an optimal
solution by bioinspired means in the case of a substantial
solution is well known.
The bioinspired algorithms are extra exible in operating
larger-scale vehicular ad hoc networks because of some
similarity in the manner of nding routes to satisfy their
natural needs. As a result, one of its main advantages is that
it generates less complexity, making it suitable for use in
computational problems [33]. Also, it is improved to main-
tain a satisfactory routing performance over time despite
network disruptions [29]. As a result, bioinspired route opti-
mization techniques are bringing in more essentials in the
IoV. The classication and subclassication of algorithms
are shown in Figure 3. Accordingly, algorithms are classied
into three foremost categories: Swarm Intelligence Algo-
rithms (SIA), EA, and other biologically inspired algorithms.
Their detailed explanations are discussed below.
The rst category of routing algorithms is motivated
by swarm intelligence like birds, bees, and ants, and the
three subclasses of ACO, BCO, and PSO are explained.
Most of the VANET routing protocols use ACO routing,
inspired by the behavior of ants while searching for the
shortest route to reach the destination. This is done by a
chemical substance called pheromone. Ants communicate
with each other via pheromone trails. In [33], they intro-
duced a mobility-aware ACO routing protocol in VANET
to nd optimal routes between source and destination
nodes while estimating each vehiclesexibility in terms
of spot and speed [34].
The second category of the EA is inspired by the compu-
tational natural behavior of mutation, crossover, and inher-
itance, and aimed at nding the shortest route between the
transmitter and the receiver. From this, two subclasses are
carried out: Parallel Genetic Algorithms (PGA) and Sequen-
tial Genetic Algorithms (SGA). The SGA is aimed at evalu-
ating only one objective taken into consideration by the
geographical routing protocol based on intersection [31] to
increase the possibility of connection among vehicles and
the Internet. PGA optimizes multiobjective transmission
benchmarks such as power consumption and by performing
automatic conguration using the routing protocol of Opti-
mized Link State Routing (OLSR) to VANET. Evolution for
bioinspired-based vehicular routing algorithms is shown in
Figure 5.
4.1.1. Performance of Swarm Intelligence-Based Bioinspired
Algorithms in IoV for Vehicle Routing. The purpose of
bioinspired optimization algorithms is to exist in dierent
applications. This subsection is primarily concerned with
investigating its application in IoV at vehicle routing as
those discussed below.
(1) Grey Wolf Optimization Algorithm (GWO). The aim of
GWO is to follow the natural predation behavior of grey
wolves, such as hunting their food in a cooperative way.
GWO is based on the clustering algorithm in IoV. It copy-
cats fully the social and hunting performance of grey wolves.
Clustering is done in VANETs and IoV for certain features
such as vehicle location, speed, position, and direction. A
GWO-based clustering algorithm for VANETs is imple-
mented [35]. In this approach, the social behavior of the
wolves is pictured into four levels: alpha, beta, gamma, and
omega. An alpha is such a dimension that it has a position
of basic leadership in the pack. Beta, the subordinate wolfs
terms, as the second dimension, helps in settling a choice
for alpha. Delta is the subordinate wolfs term for the
Table 2: Selection of search engines for this study.
Search engine Source address
IEEE Xplore http://ieeexplore.ieee.org/
Springer http://link.springer.com/
Elsevier http://www.elsevier.com/
Wiley Online Library http://www.WileyOnlineLibrary.com/
Hindawi https://www.hindawi.com/
ACM https://dl.acm.org/
6 Wireless Communications and Mobile Computing
third dimension used for classication. Omega is the most
minimal dimension which helps the grey wolves remem-
ber the prey position capacity. Then, hunting for prob-
lems over the network is converted into a mathematical
model to easily understand the behavior of the algorithm.
From this concept, an appropriate form of cluster is
extracted to optimize the mentioned problem. Finally,
the alpha, beta, and gamma direct the hunting while
their position ought to be by the omega wolves by three
best-arrangement considerations [36].
Articles
Included n = 107 Excluded n = 94
Exclusion criteria
Publication not
related to IoV
routing.
Papers not written
in English
If the entire content
of the paper is not
available.
e papers
published before
2001.
Same papers that
are available in
different journals.
Search source
IEEE xplore Springer Elsevier Wiley online
library Hindawi ACM
Search criteria: 2001-2022
Keyword: IoV
Route
optimization,
challenges
Issues VANET Machine
learning n = 8180
Database
Google scholar
Figure 3: Search strategy.
7Wireless Communications and Mobile Computing
(2) Honey Bee Algorithm (HBA). HBA admits to being inter-
ested in the nature of bees. In a period of looking for food,
the bees leave their hives. When the food is situated at the
hour of voyaging, it passes on the message to dierent honey
bees in a type of waggle movement. This cycle of passing on
is considered a neighborhood (shifty) and worldwide
(explorative) look. Researchers in [37] have developed a
HBA-propelled QoS directing convention for VANETs and
taught about the value transmission of data among convey-
ing hubs and vehicles to suggest honey bees versatility.
There are four unique types of honey bee-roused calcula-
tions in tackling vehicle directing issues [38]. Such calcula-
tions are isolated into two subclasses dependent on honey
bee conduct and are depicted as follows. Among them, one
is the Articial Bee Colony (ABC) calculation, and later,
some adjustments have been made by Basturk and Karaboga
in order to tackle numeric capacity streamlining issues. The
ABC model derives full motivation for planning from the
scavenging conduct of bees. The rst ABC to tackle vehicle
steering issues was nished by Banharnsakun, who picked
the Traveling Salesman Problem as the fundamental issue.
Then, at that point, Karaboga utilized the ABC approach
as a universally useful streamlining model to take care of
the vehicle directing issue [3942]. The accompanying
ABC calculation works by utilizing three sorts of specialists
(honey bees, for example, are passerby honey bees, utilized
honey bees, and scout honey bees). Each one of them is
utilized for explicit stages in the calculation. Next, honey
bee-roused calculation of BCO is proposed by Nakrani and
Tovey. To take care of a way portion issue in the
Taxonomy of IoV optimization
algorithm
Bio-inspired algorithms
(31-34)
Computational intelligence
(76)
Swarm
intelligence
(34)
Evaluation
optimization
(57)
Bacterial foraging
optimization
(72-73)
Ant colony algorithm
(54-56)
Firey optimization
algorithm
(47-53)
Bee optimization algorithm
(37-46)
Grey wolf algorithm
(35-36)
Genetic algorithm
(58-69)
Genetic
programming
(70-71)
Computing system of
microbial interaction and
communication (COSMIC)
(74)
Rule based bacterial
modelling (RUBAM)
(75)
ANN
(77-78)
Fuzzy
(79-81)
Machine learning
(82-83)
Supervised
(82)
Unsupervised
(60)
SVM
(84)
Neural network
(85)
Naïve bayesian
(87) (88)
HMM
(89)
Figure 4: Taxonomy of various vehicle routing optimization algorithm used in IoV (give the complete types for the taxonomy).
8 Wireless Communications and Mobile Computing
organization and a little alteration made in the rst calcula-
tion to tackle the directing issue by Wong and Zhou later,
the Marriage in Honeybee Optimization (MHBO) model is
presented by Abbass. The MHBO conveys four types of spe-
cialists at performing enhancement, including sovereigns,
robots, broods, and workers [4346].
(3) Firey Algorithm. Fireies are otherwise called lightning
bugs. The function of the rey approach depends on the
conduct of reies. Fireies act as a sign, and they deliver
short and cadenced blazes to speak with dierent reies.
The protocol for each group is based on the routing in IoV
and was planned by researchers in [47] dependent on the
rey model. The rey approach is used for spreading
messages among vehicles during a crisis, so reasonable con-
nections are chosen for quick message dissemination.
The FA is a BI algorithm dependent on the social mating
conduct of reies [48]. This approach has a place in the
class of multitudes of knowledge procedures that depend
on the bioluminescence blazing conduct of reies, which
goes about as a agging framework to draw in dierent re-
ies created by Yang [49]. With this approach, each of the
reies streaks a certain level of brilliance. This makes other
reies adjoin, and each of their fascinations is impacted by
their distance [50]. The two reies that are near one
another are considered to have a higher appreciation of
one another. Each rey represents having a certain point
in a pursuit space, and therefore, the target work is indicated
by the engaging quality level of every rey. The real natural
behavior of each rey needs to be moved towards its neigh-
bors by its most noteworthy fascination. One of the funda-
mental parts of FA is the distinction of light force, and the
other is by means of their drawing quality. From this view,
the fascination of every rey is estimated by its light
intensity [5153].
(4) Ant Colony Optimization (ACO). This kind of ACO algo-
rithm is a type of bioinspired algorithm, used to mimic the
natural behavior of ants. An ant can nd a small path from
the source location to the food location by discharging a
2020
2018
2016
2014
2012
Genetic algorithm
2010
Ant colony algorithm
Firey algorithm
Evolutionary algorithm
Swarm intelligence algorithm
Bacterial foraging
algorithm
Honey bee algorithm
Computational intelligence
2022
Genetic programming
Grey wolf algorithm
Supervised learning
Unsupervised learning
Fuzzy
Articial neural network
Firey+levy distribution
Advanced greedy algorithm
Modied ACO+rey algorithm
Figure 5: Evolution of bioinspired and CI algorithms in vehicular routing.
9Wireless Communications and Mobile Computing
pheromone along the path. The ACO technique for optimiza-
tion can be used to improve vehicle routing problems in IoV.
The function of ACO is based on the routing algorithm
eciency for VANET and IoV. It depends on the nature of
ants. Their behavior is based on evaporation and pheromone
redeposition. Ants are not interested in traveling along sim-
ilar paths more than once, so circular dependence between
vehicles is developed. The main benet of ACO is that it
can reduce the overall delay and also increase the packet
delivery.
Kumar et al. [54] have proposed the IoV-based trac
management method, which is used to prevent trac con-
gestion and accidents. Here, they separate the street map
into small submaps. Initially, they used the ACO algorithm
for each submap to nd the optimal route path. The optimal
solution is based on the rod length and moving vehicles with
the help of IoV technology. In ACO, the forward ants pro-
cess is utilized to nd the optimal solution. Its functional
equation is given below:
where IJ denotes the pheromone value of ant in nodes I
and J,ηIJ denotes the instantaneous fuzzy function, A
denotes the weight value of IJ,Bis the weight value of
ηIJ,nJdenotes the number of the nearest node, TABUK
denotes the node set not visited by the ant. Then, the
fuzzy function is designed to calculate the intensity of
the vehicle in heavy trac. The experimental result of this
method is compared with some existing methods.
Nguyen et al. [55] have proposed addressing the dynamic
IoV trac routing issues with multisource and multidestina-
tion in an IoV environment. This proposed model is
designed to solve the vehicle trac in the IoV. Initially, they
proposed the decentralized ACO routing model to connect
the vehicles. By using this algorithm, the coloured ants are
utilized for tracow between the sources and destination.
This ACO algorithm design is used to develop communica-
tion and is also proposed to exchange data among infrastruc-
ture and connected vehicles. The functional equation of ACO
is given below:
ΔυλD
tIJ T
ðÞ
=1
lυλD
IJ T
ðÞ
+1
kυλD
IJ T
ðÞ
+1
dυλD
IJ T
ðÞ
,ð2Þ
where lυλD
IJ ðTÞis the length of each edge, kυλD
IJ ðTÞis the vehicle
traveling time, and DυλD
IJ ðTÞrepresents the density of vehi-
cles. The simulation result of this proposed method was per-
formed with a multi-intersection scenario in the NetLogo
platform. This result shows that the ACO algorithm is better
for the routing process than the non-ACO algorithms.
In the IoV model, Jabri et al. [56] present multiaccess
edge-based vehicular fog computing. The goal of this model
is to exploit both the infrastructure equipment and vehicles
to bring the users close to the cloud. The function of this
proposed model has two main steps. Firstly, the Multiaccess
Edge Computing (MEC) technology is used to provide
centralized control of the vehicular fog. They used various
modules in this architecture. But here, they particularly
focus on the selection gateway module. Then, in the context
of the vehicular cloud, they access the MEC server. It will
allow all vehicles to connect directly to the cloud, increasing
radio resources and increasing trac congestion and colli-
sion rates. Initially, they utilized fuzzy logic for the gateway
selection process based on some parameters. The values of
each parameter are collected through the IoV communica-
tion between vehicles. Then, they use the ACO algorithm
to solve the gateway selection with the uncovered vehicles.
Therefore, the issues are divided into two steps: rst, the
connection of the covered node to the gateways and sec-
ondly, connecting the uncovered nodes to the covered node.
This proposed model provides an important node ratio, par-
ticularly for static vehicles. The functional comparison of
SIA is discussed in Table 3.
(5) Hybrid Algorithm. To address the multicast routing
problem, a rey with Levy distribution (FF-L) technique
was proposed by [57]. The Levy distribution is used in the
FF algorithm to prevent it from being trapped in local
optima. A set of tests on three distinct scenarios is used to
validate the FF-L algorithm in VANET. This method
showed less cost, jitter, and delay compared to other
methods. To improve the performance of IoV, a bioinspired
advanced greedy hybrid routing protocol was proposed in
[58], where a bee colony optimization combined with a
greedy algorithm is used to choose the best route with high
service quality and select a route with the minimum over-
ow. The simulation outcomes show that this protocol
works well in both V2I and V2V environments and has a
signicant impact on enhancing delay and packet delivery
ratio while maintaining a minimum hop count across all
vehicles and reasonable overhead. However, various chal-
lenges exist, such as determining the quickest path between
the source and the nal destination, excessive delays, poor
connection, congestion, and low packet delivery ratios. To
overcome these issues, the work presented in [59] provides
a hybrid optimization strategy that combines rey optimi-
zation and modied ant colony to determine the average
K
IJ T
ðÞ
=AIJ

+B1ηIJ

HTABU KAIJ

+B1ηIJ

×1
1+ 1/nJ

!
,
(if JTABU K,
0, otherwise,
ð1Þ
10 Wireless Communications and Mobile Computing
speed and discover the optimum path to the destination.
Here, the algorithm used pheromones and attractiveness to
select the best path and cut trip time.
4.1.2. Performance of Evolutionary Algorithm-Based
Bioinspired Algorithms in IoV for Vehicle Routing. In the
taxonomy of bioinspired algorithms, the evolutionary algo-
rithm is the rst type of approach. It is utilized to solve prob-
lems in the diverse domain of science and real-time
applications. It is used to obtain an exact optimal solution
for a multimodal function. The function of evolutionary
algorithms is loosely based on the metaphors of biological
processes. The function of EA is based on a random search
approach with some metaheuristics. This technique consists
of population-based functions; it represents the search point
and feasible solution, and it is unprotected from the collec-
tive learning process, which is performed from one genera-
tion to the next. The EA population is randomly initialised
and subjected to selection; then, the recombination process
and mutation process will be performed over several gener-
ations [60]. The classication techniques of EA are discussed
below.
(1) Genetic Algorithm. Because the vehicle routing problem
(VRP) is a complex NP-hard problem, it has attracted the
attention of many scholars from various elds. Using a
traditional method is unsatisfactory for VRP to get a global
optimal solution. Hence, a global method based on genetic
theory and selection theory of genetic algorithms has been
introduced. GA is a natural selection-based process that
carries out three operations: selection, crossover, and muta-
tion [61]. Therefore, the researchers presented a genetic-
based routing protocol for IoV to forward the data with
the least amount of rate from source to destination vehicle.
But GA itself has some problems, such as slow convergence
and premature termination. Hence, improving its conver-
gence speed and, at the same time, maintaining population
diversity in solving VRP are considered a main goal
[62, 63]. Therefore, they proposed an improved GA to
solve VRP by including SA into the GA in terms to avoid pre-
mature and convergence issues. Zirour introduced a GA to
solve the vehicle routing problem with time windows
(VRPTW) to reduce the aggregate distance and delay time
of each customers vehicle path under time violation, whereas
utilizing GA algorithms to solve such a problem includes two
steps. First, they use the initial solution to reduce the
expenses in two steps, and then, the expenses in the next step
will fail. Hence, this research proved the solutions that are
close to the best solutions. Then, GA with a crossover opera-
tor was used to solve the VRPTW problem. Then, the same
improved GA-based crossover operator algorithm was used
[64] that was used there. The crossover operator chooses an
individual from the whole population to generate ospring.
Rather than using a traditional method of presenting o-
spring, the swap node operator has been used for random
selection. After testing with other algorithms, the improved
GA algorithm presented the best optimal solution and illus-
trated that their outcomes were competitive. There have been
multiple objective functions in VRPTW. From the following
objective function, some of the common considerations of
the objective function used for minimization are (i) total
travel distance of the vehicles, (ii) total number of vehicles,
(iii) total travel time, and (iv) maximum QoS. In [65], we
chose ve objective functions for multiobjective routing
problems, such as total delay time, total waiting time, total
travel distance, and makespan. To deal with such problems,
nondominated sorting GA (NSGA-II) will be introduced
to deal with vehicle routing problems (VRP). Then,
Zhong-yue et al. and Castro-Gutierrez [66, 67] applied
such an optimization algorithm in VRP with two kinds
of demand, focusing on the number of vehicles and make-
span. The optimization process considers the similarity set
of nondominated solutions. Later, Jozefowiez proposed an
improved version of NSGA-II optimization by including
two enhancement processes: parallelization and elitist
diversication. This type of approach is applied in VRP
problems to tackle where to limit the travel distance
between the shortest and longest routes. Next, Wei passed
this algorithm in a real-world test case in the USA, con-
sidering three objectives: distribution time, travel distance,
and set of vehicles. Bullinaria and Garcia-Najera used
NSGA-II performance, which is related to another algo-
rithm, an MOEA that includes two of the same measures:
edit distance and Jaccard parallel coecient [6870]. The
Table 3: SI-based bioinspired algorithm advantage, simulation tool, evaluation parameter, and application.
Swarm intelligence-based
bioinspired optimization
algorithm
Advantage Simulation
tool Evaluation parameter Application
ACO It provides highly optimized routing and is
fault-tolerant NS2 Packet delivery ratio, loss,
and throughput Routing
FA The delivery ratio of each packet proposed
protocol is quite improved NS2 End-to-end delay and
propagation delay Routing
HBA Outperformance of this approach is better
than the protocols like AODV and DSR NCTUns6.0 Throughput and packet loss Routing
GWO The outcome of this model illustrates that
performance of cluster heads is good MATLAB Transmission range, grid
size, and number of nodes Routing
Hybrid Selects the best path and cut trip time MATLAB Delay, packet delivery ratio,
connectivity Routing
11Wireless Communications and Mobile Computing
performance was assessed using the travel distance and
number of vehicles. A GA-based parallelization method
for the Traveling Salesman Problem (TSP) in VRP is
presented. The approach has been used to solve time-
constrained issues of IoV routing and autonomous vehi-
cle control in IoV [71, 72].
(2) Genetic Programming (GP). GP is a populace-based
inquiry calculation propelled by normal development. It
begins with creating a populace of people (as a rule, indis-
criminately) who are IoV for the target issue [73]. Then, at
that point, every individual is assessed and doled out with
a wellness score that demonstrates how well this up-and-
comer tackles or verges on taking care of the current issue.
Until an end standard is fullled, new populations are cre-
ated iteratively by utilizing determination, hybrid, and trans-
formation administrators, as in normal advancement. These
hereditary administrators are used to provide better services
to the new population. The vast majority of bioadvanced cal-
culations used in impromptu organizations are classied
into two types: centralized with global (online) information
and decentralized with local (oine) information. The exec-
utives of every vehicle handled by VANETs assess the trust
esteem dependent on the neighborhood data while continu-
ing on with the organization. The most trusted board models
are fundamentally used in impromptu organizations to
ensure secure and solid correspondence. As a result, the
GP for introducing trust in the executive model in VANET
deals with the powerful changing geography and events [74].
4.1.3. Performance of Bacterial Foraging-Based Bioinspired
Algorithms in IoV for Vehicle Routing. Bacterial foraging
optimization (BFO) utilizes the regular scavenging proce-
dures of Escherichia coli bacterium cells and makes an
essential move to augment the energy used per unit of time
spent on searching. From that point forward, BFO has been
applied eectively to multitarget issues. A versatile BFO is
introduced for addressing VRPTW. The VRPTW is dened
as a collection of vehicles used to collect the users time win-
dows [75]. It starts at the warehouse and ends at the station.
Thus, every one of the clients ought to be served precisely
once. In the event that vehicles show up before the time
window opensor after the time window closes,there will
be hanging tight for costs and late expenses to limit the total
expense of fullling all correspondence and disparity
requirements.
The objective function of total cost is taken into consid-
eration. The variables have various pieces of information,
such as distribution strategist, vehicle routing, and the
arrival time for every customer. The dimension of each
variable is based on the vehicles [76].
(1) Computing System of Microbial Interactions and Com-
munication (COSMIC). COSMIC was created in 2004 by
Saunders et al. The guidelines for this model are based on
the processing framework. It was mainly introduced for the
bacterial simulation process for COSMIC-Rules by Saunders
et al. in the year of 2006. The models of the following devel-
opment changes occur in cells while utilizing discrete time
waves and a pseudoconstant space model. Each of the cells
contains genomes that are associated with real time, etc.
COSMIC contains three remarkable levels of stages, includ-
ing the genome, the cell, and the climate occupied by cells.
The fundamental aim is to contemplate the advancement
or variation of microscopic organisms and to foresee the
conduct of pathogenic microorganisms [77].
(2) Rule-Based Bacterial Modeling (RUBAM). RUBAM was
designed by [78]. The function of RUBAM is a combination
of GA and GP algorithms. The function of RUBAM is based
on the bacteria. It acts as a data unit process which maps
action and message. The data from the real-time applica-
tions is mapped to take them again. This process is not static
because it makes it possible to continuously change the envi-
ronment, ensure real life, and also enhance the reproduction
process. The main goal of this model is to grasp the bacteria
and their behavior and features. The model can balance the
computational demands and complexity. Moreover, it has a
set of interconnection mechanisms and a collection of arti-
cial organisms that also set the operators for the evolution
process. The overall knowledge contains articial organisms.
In multimodal search space, this model can get optimal
results. But the other optimization algorithms can interact
with the real-time environment applications and also calcu-
late the tness value. The best outcomes are shared with var-
ious processes [79]. The feature comparison of bioinspired
algorithms is illustrated in Table 4.
4.2. Taxonomy of Computational Intelligence-Based IOV
Algorithms. Computational intelligence (CI) is based on arti-
cial intelligence and computer systems. The methodology
of CI is a biooriented computation model. It is used for some
real-time applications in dynamic and static environments
in which mathematical or traditional modeling and reason-
ing are too complex and are uncertain, and the process will
be stochastic in nature [80]. The CI process is controlled in
a modied way. The main principles of the CI technique
are listed in Figure 3.
4.2.1. Articial Neural Network (ANN). ANN is a CI-based
technique; its functions are based on biological networks.
Data ows through the aected ANNs as a neural network
(NN) changesor learns in a certain waybased on the
input and output. ANN is a framework to design a biologi-
cally inspired algorithm. Various kinds of networks have
been used, including self-organizing networks, single-layer
networks, recurrent networks, and multilayer networks. It
is eectively applied in many elds to nd vehicular com-
munication details such as predictions, pattern classica-
tions, trac density estimations, and robotics. In addition,
this is one of the most eective methods for nonlinear,
uncertain, and time-based models. However, it is also uti-
lized for short-term route forecasting systems [81]. The
NN has the ability to predict various trac routing parame-
ters, as well as these parameters are based on the minimum
and maximum changes in the lane, length of the road seg-
ment, vehicle ow, etc. The ANN has been applied success-
fully to reduce and solve several problems in the IoV [82].
12 Wireless Communications and Mobile Computing
Table 4: Summarize of bioinspired algorithm features.
Author/year Bioinspired algorithm Features Protocol
Mobility Scalability Delay Packet delivery ratio Energy awareness
Fahad et al. [35] (2018) GWO algorithm ✓✓___
De Rango et al. [36] (2020) GWO algorithm __ _ Routing protocol
Jung and Muazu [37] (2014) Bee optimization algorithm _✓✓ _ Routing protocol
Sachdev et al. [47] (2016) Firey algorithm _✓✓ _
Ramachandran Pillai and Arock [53] (2021) Firey algorithm _ _ _ _ Routing protocol
Nguyen and Jung [55] 2020 ACO algorithm _ _ ✓✓ __
Jabri et al. [56] 2019 ACO algorithm _✓✓ ✓Routing protocol
Khan et al. [69] (2019) Genetic algorithm _ _ ✓✓ ✓Routing protocol
Hadded et al. [71] (2015) Genetic algorithm __ _ Routing protocol
Aslan and Sen [74] (2019) Genetic programming ____
Mehta et al. [76] (2016) Bacterial foraging _✓✓ _ Routing protocol
13Wireless Communications and Mobile Computing
4.2.2. Fuzzy. Fuzzyis an uncertainty within crisp logicin
which it has two reasons, i.e., true or false, while fuzzy
logicreasons approximately or to a degree of true or false.
Fuzzy logic has arisen from the growth of the fuzzy set. A
fuzzy system is a type of CI technology that uses fuzzy theory
to solve issues in many elds [83].
It is applied for the successful control system, home
applications, vehicle communication, etc. Nowadays, it is
mainly used for IoV prediction and density estimation.
Fuzzy logic is often utilized to address dierent issues in
control, system identication, and signal processing. Fuzzy
modeling is one of the most crucial issues in blazing
research. In the previous years, research and theoretical
study focused on research systems from the application-
original perspective [84].
Figure 6 illustrates the functional structure of a fuzzy
system. It has four stages: fuzzication, fuzzy rule base, fuzzy
inference engine, and defuzzication. In the fuzzication
phase, each section of the input data converts one or more
member functions into member degrees by one view. There
are rules that are based on unclear logic, including inappro-
priate relationships between inputs and outputs. These fuzzy
rules are based on IF-THEN statements. The fuzzy release
engine takes into consideration all the intricate rules of the
zero rule base and learns how to change a set of measures
for the relevant results [48]. In the end, the resulting fuzzy
logic outows are transformed from an incomplete exhaust
engine to a series of defuzzication processes [85].
4.2.3. Machine Learning (ML). Machine learning is an
important learning technique that is utilized in a real-time
environment. It is the subsection of AI for the development
and understanding of techniques and algorithms that allow
machines to learn [86]. The learning method provides good
IoV, with high-density dependencies of explicit variables
and dramatic downtime for vehicle communication on
major networks. Thus, it outperforms and makes better
predictions than other learning methods. ML is categorized
into supervised and unsupervised learning [87]. The func-
tional overview of ML algorithms and the features of each
algorithm are compared in Tables 5 and 6.
(1) Supervised Learning (SL). SL inputs and their required
outputs and a general rule that maps the entries to outputs.
SL is widely used for classication problems. The SL
methods are divided into classication and regression. It is
one of the important techniques for decision tree networks
and NN training processes. The SL method is broadly used
for IoV. SL involves introducing extra layers between input
and output that change the manual functions with some
algorithms and the extraction of hierarchical properties
[86]. The taxonomy method determines an error in the
NN and minimizes it. The SL algorithm takes a set of IoV
routing input data and trains the model to make forecasts
for responding to new data.
(2) Support Vector Machine (SVM). An SVM is a supervised
technique used for classication. SVM denes the dimen-
sional hyperplane to separate the dataset into two sets.
Network weight can be achieved by solving a quadrature
programmatic problem that has simple limitations, rather
than removing arbitrary migration problems, as well as
training for basic neural networks. The SVM model has a
large amount of memory usage and terms of time. In
contrast, the converting approaches NN, SVM, and non-
parametric regression are utilized for IoV routing path fore-
casting because of their complex arcades and self-learning
characteristics. SVM can also achieve a globally optimal
solution without limiting it to a local minimum point, which
gives strong resistance to unnecessary problems and high
alert performance [88].
(3) Neural Network (NN). Neural networks have been widely
utilized in the IoV area. In many cases, the trac network
will have a single output variable, although, in the case of
multistate classication issues, this may relate to multiple
output units. There are various applications of NN in the
IoV forecasting area: multilayer perceptrons, time-delayed
recurrent neural networks, multirecurrent neural networks,
state-space neural networks, etc. There are also some hybrid
neural network applications in the eld of trac forecasting.
Neural networks are the most widely applied models to the
trac prediction problem because they are capable of
modeling nonlinear and dynamic processes well. Many
extensions of the basic concept have been implemented to
improve prediction accuracy and/or reduce computational
eort [89]. Among NN, backpropagation networks are
widely applied because of their ability to model complex
nonlinear relationships among continuous variables. These
multilayer networks perform supervised learning. NNs
architecture is based on models and predictions of the evolu-
tion of trac congestion based on global positioning system
Fuzzification Defuzzification
Interference
Rules
Input
data
Fuzzy input sets
Fuzzy output
sets
Outpu
t
data
Figure 6: Block diagram of the fuzzy system.
14 Wireless Communications and Mobile Computing
data. The backpropagation (BP) algorithm is an eective
algorithm, but it has some issues that can be resolved by it.
The backpropagation model has become one of the vital
NN models [90].
(4) Naive Bayesian Network (NBN). The NBN is classied
using Bayes theory and forecasting and is frequently obvious
to the problem solver. This method is widely used in practice
due to its low computational eort and ease of use. A small
amount of training data is required to estimate the parame-
ters required for classication. NBN can be trained in a
controlled learning system. In a number of real-time appli-
cations, the IoV routing paths are predicted for the NBN
model, which uses the highest probability method [91]. In
the NBN, the data from adjacent links is considered infor-
mative for the link currently under investigation. However,
this method is used in the real-time IoV system. The process
of NBN is related to the adjacent road links and statistical
data. From this NBN, the nearest node can be used in rea-
soning about some features of the present node. The NBN
explicitly adopts the data from the adjacent links to provide
IoV communication and prediction. The tracow forecast
here can be considered as a reference to the Bayesian net-
work [92].
(5) Unsupervised Learning (UL). UL is the training of a CI
algorithm using IoV data that is neither categorized nor
labeled and allows the algorithm to act on that information
without guidance. If it has no results given to the UL algo-
rithms, then it nds the structure in its input. The aim of
UL is to detect hidden patterns in the data. In todays envi-
ronment, ML approaches are mainly applicable to transpor-
tation issues. In this review, we divided the techniques under
the UL base algorithm for the IoV routing process [63].
(6) Hidden Markov Model (HMM). An HMM is based on a
Markov chain, which is only partially noticeable in the state.
Observation functions are associated with the state of the
system, but they are usually not enough to accurately deter-
mine the state. In HMM-based IoV estimation approaches,
the communication state on a road segment is a latent state
that can be estimated in accordance with the conditions of
road sections having similar trac characteristics. The
HMM was developed and calibrated using a large amount
of real-world IoV vehicle communication surveillance data.
It is broadly used for the routing process. The IoV has been
dened as the rst- and second-rate statistics on vehicular
communication observations, as well as within the shortest
time frame, local variations, and trac trends [93].
Table 5: Comparison of machine learning algorithms.
Techniques Overview Limitation Application
SVM
The SVM performs the coordination of individual
observation. The result of this model creates an
optimal hyperplane that separates classes.
The training and testing function of
SVM is slow.
Context-aware
security of IoV
Neural network It is an ANN biological NN and is organized in layers
that are made up of several interconnected nodes.
It takes a large time to process and
requires a large dataset.
Speed forecasting
in IoV
Naive Bayesian It is a bioinspired neural system organized in layers
that are connected with each other node.
The function of Bayesian is dependent
on hardware and is repeatedly faced
with inexplicable behavior.
Fast vehicular
communication
K-nearest
neighbor (KNN)
This algorithm is used to utilize a database to
categorize into several classes for forecasting the
sample point.
Its learning process is low. Communication
of IoV is fast
HMM The function of HMM is processed only on the
partially observable.
It needs a large amount of
computational time.
Best routing
process
Table 6: Summary of CI algorithm features.
Author/year Bioinspired
algorithm
Features
Protocol
Mobility Scalability Delay Packet delivery
ratio
Energy
awareness
Karabulut et al. [82] (2019) ANN algorithm _ _ ✓✓ __
Alsarhan et al. [84] (2019) Fuzzy model _ ✓✓ ✓ _Routing
protocol
Bylykbashi et al. [85] 2019 Fuzzy model _ _ _Routing
protocol
Wu et al. [88] (2018) SVM algorithm ____
Xu et al. [89] (2020) Neural network __ _ _
Yin et al. [90] (2020) Neural network ____
Yao et al. [93] (2017) HMM _✓✓ __
15Wireless Communications and Mobile Computing
5. Challenges and Application of This Survey
IoV is the combination of hardware pieces with dierent
types of networks, which is used to allow pedestrians, cars,
and other units under RSU to interchange real-time infor-
mation. IoV is one of the super versions of VANET. In
general, conventional VANET allows cars to form a wireless
connection with other vehicles. Therefore, all vehicles
nearby IoV have a reliable connection to the local infrastruc-
ture. The main working principle of IoV technology is to
form a social IoV with smart infrastructure. The ve types
of IoV infrastructure are vehicle-to-roadside (V2R) unit,
vehicle-to-human (V2H), vehicle-to-sensors (V2S), vehicle-
to-vehicle (V2V), and vehicle-to-infrastructure (V2I). In
addition, in IoV, many issues are encountered when the
routing protocols for vehicular communication and trac
enhancement are created. Some of these challenges are quick
variation of topology, high mobility, and network fragmen-
tation. Other issues are related to IoV, such as storage, as
the huge number of connected vehicles and the large volume
of data processing take place; thus, managing the network is
a challenging task, which can be solved [94].
The application of IoV is categorized into three types:
safety applications, infotainment and comfort, and manage-
ment of vehicle routing and eciency.
5.1. Safety-Related Application. The aim of the IoV applica-
tion is to be utilized to reduce and avoid road accidents.
The safety application is used to provide a head warning to
the vehicle drivers. Also, this application is utilized to avoid
mishaps from occurring in any case.
(i) Trac signal violation warning: it is used to manage
the infrastructure for vehiclesrouting to pass the
message between vehicles in any hazard case
(ii) Intersection collision avoidance: based on dedicated
short-range communication, it is used to reduce
accidents and improve road safety. Moreover, it
establishes secure links to provide prior information
in any accident, thus alerting the driver to take
appropriate action
5.2. Management of Vehicle Routing and Eciency (MVRE).
The MVRE application is designed to prevent road mishaps
by optimizing the tracow and ignoring the trac conges-
tion. In this application, the vehicles forward the notication
about the trac situation based on the Roadside Unit (RSU)
and On-Board Unit (OBU), and accordingly, the drivers
might change their vehicle routes.
(i) Intersection management: this is a technique for
improving the eciency of vehicle intersections. In
smart cities, vehicles passing through the intersec-
tion area are dangerous. During that period, spared
roadside-to-vehicle communication will provide
more notications about the tracow prediction
and the current trac situation
(ii) Vehicle routing trac management: this manage-
ment is used to manage the ow of vehicle trac
and reduce congestion in trac routing. In this turn,
it increases the capacity of routing eciency and
prevents vehicle trac jams
5.3. Infotainment and Comfort. The comfort and infotain-
ment applications are designed to improve the vehicles driv-
ing comfort. This IoV application can be tolerated for
information losses and delays. In IoV, the unicast routing
is used for infotainment applications, which are used to
search for the nearest locations and pass the information
between vehicles to vehicles, etc. [5759, 95, 96].
6. Conclusion
In the new era of IoT, the evolution of Internet-based
driving, named IoV, supports ITS, telematics, and ad hoc
vehicular networks. The bioinspired approach in IoV has
proven to be more ecient for large-scale vehicular net-
works in performing routing in terms of greater scalability
and less complexity. In addition, it is more robust and
exible and ensures better routing performance even when
the networks drop down. Therefore, this article will dis-
cuss a comparative study of various bioinspired algorithm
techniques in IoV routing to support ITS applications.
After discussing the background of the IoV routing, the
basic concept and operations of some recently imple-
mented bioinspired algorithms are mentioned in the tax-
onomy section, which is classied into three categories:
evolutionary algorithms, swarm intelligence, and bacterial
foraging. These three categories include some subclasses
of algorithms such as PSO, BCO, fuzzy logic, ACO, and
GA. Research projects were reviewed, classied, and com-
pared for each category using the essential scheme and
routing criteria, such as complexity, robustness, scalability,
and mobility model employed QoS. To nd the conver-
gence in bioinspired applications in the IoV, a suggestion
to propose a unied formal model for managing multiple
solutions is discussed. From this consideration, the sug-
gested model is better suited for a bioinspired approach
than the existing procedures, which can address dierent
routing aspects. The nal part of the review ends with
some lessons learned, future trends, and opportunities for
the IoV route.
Notations
A: Weight of IJ
B: Weight value of ηIJ
IJ: Pheromone value of ant in nodes Iand J
ηIJ: The instantaneous state of fuzzy
nJ: Number of nearest nodes
TABUK: Node set not visited by the ant
ΔυλD
tIJ ðTÞ:Pheromone dropped by the vehicle
lυλD
IJ ðTÞ:Length of the edge
kυλD
IJ ðTÞ:Traveling time of vehicle
DυλD
IJ ðTÞ:Density of vehicles.
16 Wireless Communications and Mobile Computing
Data Availability
No data were used to support this study.
Conflicts of Interest
The authors declare that they have no conicts of interest.
References
[1] N. Omar, N. Yaakob, Z. Husin, and M. Elshaikh, Design and
development of GreedLea routing protocol for Internet of
Vehicle (IoV),IOP Conference Series: Materials Science and
Engineering, vol. 767, no. 1, article 012034, 2020.
[2] Z. Guo, Y. Zhang, J. Lv, Y. Liu, and Y. Liu, An online learning
collaborative method for trac forecasting and routing opti-
mization,IEEE Transactions on Intelligent Transportation
Systems, vol. 22, 2021.
[3] M. A. Gawas and S. S. Govekar, A novel selective cross layer
based routing scheme using ACO method for vehicular net-
works,Journal of Network and Computer Applications,
vol. 143, pp. 3446, 2019.
[4] F. Yang, S. Wang, J. Li, Z. Liu, and Q. Sun, An overview of
internet of vehicles,China Communications, vol. 11, no. 10,
pp. 15, 2014.
[5] L. Sumi and V. Ranga, An IoT-VANET-based trac manage-
ment system for emergency vehicles in a smart city, Springer,
2018.
[6] U. Z. Hamid, H. Zamzuri, and D. K. Limbu, Internet of Vehicle
(IoV) applications in expediting the implementation of smart
highway of autonomous vehicle: a survey, Springer, 2019.
[7] A. Awang, K. Husain, N. Kamel, and S. Aissa, Routing in
vehicular ad-hoc networks: a survey on single-and cross-
layer design techniques, and perspectives,IEEE Access,
vol. 5, pp. 94979517, 2017.
[8] B. T. Sharef, R. A. Alsaqour, and M. Ismail, Vehicular com-
munication ad hoc routing protocols: a survey,Journal of Net-
work and Computer Applications, vol. 40, pp. 363396, 2014.
[9] S. A. Shah, M. Shiraz, M. K. Nasir, and R. B. Noor, Unicast
routing protocols for urban vehicular networks: review, taxon-
omy, and open research issues,Journal of Zhejiang University
SCIENCE C, vol. 15, no. 7, pp. 489513, 2014.
[10] A. Dua, N. Kumar, and S. Bawa, A systematic review on rout-
ing protocols for vehicular ad hoc networks,Vehicular Com-
munications, vol. 1, no. 1, pp. 3352, 2014.
[11] I. Wahid, A. A. Ikram, M. Ahmad, S. Ali, and A. Ali, State of
the art routing protocols in VANETs: a review,Procedia
Computer Science, vol. 130, pp. 689694, 2018.
[12] J. Liu, J. Wan, Q. Wang, P. Deng, K. Zhou, and Y. Qiao, A sur-
vey on position-based routing for vehicular ad hoc networks,
Telecommunication Systems, vol. 62, no. 1, pp. 1530, 2016.
[13] R. Brendha and V. S. Prakash, A survey on routing protocols
for vehicular ad hoc networks,in 2017 4th International Con-
ference on Advanced Computing and Communication Systems
(ICACCS), Coimbatore, India, 2017.
[14] H. H. Saleh and S. T. Hasson, A survey of routing algorithms
in vehicular networks,in 2019 International Conference on
Advanced Science and Engineering (ICOASE), Zakho, Duhok,
Iraq, 2019.
[15] A. Ghaari, Hybrid opportunistic and position-based routing
protocol in vehicular ad hoc networks,Journal of Ambient
Intelligence and Humanized Computing, vol. 11, no. 4,
pp. 15931603, 2020.
[16] M. T. Abbas, A. Muhammad, and W. C. Song, SD-IoV: SDN
enabled routing for internet of vehicles in road-aware
approach,Journal of Ambient Intelligence and Humanized
Computing, vol. 11, no. 3, pp. 12651280, 2020.
[17] A. Baykasoğlu and Ş. Akpinar, Weighted superposition
attraction (WSA): a swarm intelligence algorithm for optimi-
zation problems - part 1: unconstrained optimization,
Applied Soft Computing, vol. 56, pp. 520540, 2017.
[18] H. Fatemidokht and M. K. Rafsanjani, F-Ant: an eective
routing protocol for ant colony optimization based on fuzzy
logic in vehicular ad hoc networks,Neural Computing and
Applications, vol. 29, no. 11, pp. 11271137, 2018.
[19] S. Yaqoob, A. Ullah, M. Akbar, M. Imran, and M. Shoaib,
Congestion avoidance through fog computing in internet of
vehicles,Journal of Ambient Intelligence and Humanized
Computing, vol. 10, no. 10, pp. 38633877, 2019.
[20] C. Archetti, F. Guerriero, and G. Macrina, The online vehicle
routing problem with occasional drivers,Computers & Oper-
ations Research, vol. 127, article 105144, 2021.
[21] H. Liu, Z. Guo, and Z. Zhang, A hybrid multi-level opti-
misation framework for integrated production scheduling
and vehicle routing with exible departure time,Interna-
tional Journal of Production Research, vol. 30, pp. 18,
2020.
[22] D. Zhang, D. Li, H. Sun, and L. Hou, A vehicle routing prob-
lem with distribution uncertainty in deadlines,European
Journal of Operational Research, vol. 292, 2021.
[23] S. Kaur, T. C. Aseri, and S. Rani, QoS-aware routing in vehicu-
lar ad hoc networks using ant colony optimization and bee col-
ony optimization, Springer, 2019.
[24] M. Elhoseny and K. Shankar, Energy ecient optimal routing
for communication in VANETs via clustering Model, Springer,
2020.
[25] W. Wang, F. Xia, H. Nie et al., Vehicle trajectory clustering
based on dynamic representation learning of internet of vehi-
cles,IEEE Transactions on Intelligent Transportation Systems,
vol. 22, 2020.
[26] S. A. Hussain, K. M. Yusof, S. M. Hussain, and A. V. Singh, A
review of quality of service issues in Internet of Vehicles
(IoV),in 2019 Amity International Conference on Articial
Intelligence (AICAI), Amity University Dubai, 2019.
[27] J. Cheng, J. Cheng, M. Zhou, F. Liu, S. Gao, and C. Liu, Rout-
ing in Internet of Vehicles: a review,IEEE Transactions on
Intelligent Transportation Systems, vol. 16, no. 5, pp. 2339
2352, 2015.
[28] T. Kayarga and S. A. Kumar, A study on various technologies
to solve the routing problem in Internet of Vehicles (IoV),
Wireless Personal Communications, vol. 119, no. 1, pp. 459
487, 2021.
[29] L. Tuyisenge, M. Ayaida, S. Tohme, and L. E. Alal, Network
architectures in internet of vehicles (IoV): review, protocols
analysis, challenges and issues,in International Conference
on Internet of Vehicles, Paris, France, 2018.
[30] C. Ksouri, I. Jemili, M. Mosbah, and A. Belghith, Towards
general Internet of Vehicles networking: routing protocols sur-
vey,Concurrency and Computation: Practice and Experience,
vol. 21, article e5994, 2022.
[31] X. S. Yang, Ed., Nature-Inspired Algorithms and Applied Opti-
mization, Springer, 2017.
17Wireless Communications and Mobile Computing
[32] P. Agarwal and S. Mehta, Nature-inspired algorithms: state-
of-art, problems and prospects,International Journal of Com-
puter Applications, vol. 100, no. 14, pp. 1421, 2014.
[33] H. Zang, S. Zhang, and K. Hapeshi, A review of nature-
inspired algorithms,Journal of Bionic Engineering, vol. 7,
no. S4, pp. S232S237, 2010.
[34] D. Rai and K. Tyagi, Bio-inspired optimization techniques,
ACM SIGSOFT Software Engineering Notes, vol. 38, no. 4,
pp. 17, 2013.
[35] M. Fahad, F. Aadil, S. Khan et al., Grey wolf optimization
based clustering algorithm for vehicular ad-hoc networks,
Computers & Electrical Engineering, vol. 70, pp. 853870,
2018.
[36] F. De Rango, M. Tropea, P. Raimondo, and A. F. Santamaria,
Grey wolf optimization in vanet to manage platooning of
future autonomous electrical vehicles,in 2020 IEEE 17th
Annual Consumer Communications & Networking Conference
(CCNC), Las Vegas, NV, USA, 2020.
[37] L. T. Jung and A. A. Mu'azu, Bee inspired QoS routing in
VANET,in 2014 4th World Congress on Information and
Communication Technologies (WICT 2014), Melaka, Malaysia,
2014.
[38] T. A. Masutti and L. N. de Castro, Bee-inspired algorithms
applied to vehicle routing problems: a survey and a proposal,
Mathematical Problems in Engineering, vol. 2017, Article ID
3046830, 20 pages, 2017.
[39] D. Karaboga, An idea based on honey bee swarm for numer-
ical optimization,Tech. Rep. tr06, Erciyes University, Engi-
neering Faculty, Computer Engineering Department, 2005.
[40] B. Basturk and D. Karaboga, On the performance of articial
bee colony (ABC) algorithm,Applied Soft Computing Journal,
vol. 8, no. 1, pp. 687697, 2008.
[41] A. Banharnsakun, T. Achalakul, and B. Sirinaovakul,
ABCGSX: a hybrid method for solving the traveling salesman
problem,in Proceedings of the 2010 2nd World Congress on
Nature and Biologically Inspired Computing, NaBIC 2010,
Kitakyushu, Japan, 2010.
[42] D. Karaboga, B. Gorkemli, C. Ozturk, and N. Karaboga, A
comprehensive survey: articial bee colony (ABC) algorithm
and applications,Articial Intelligence Review, vol. 42, no. 1,
pp. 2157, 2014.
[43] S. Nakrani and C. Tovey, On honey bees and dynamic server
allocation in internet hosting centers,Adaptive Behavior,
vol. 12, no. 3-4, pp. 223240, 2004.
[44] L. P. Wong, M. Y. H. Low, and C. S. Chong, A bee colony
optimization algorithm for traveling salesman problem,in
Proceedings of the Second Asia International Conference on
Modelling & Simulation, pp. 818823, Kuala Lumpur, Malay-
sia, 2008.
[45] X. Lu and Y. Zhou, A novel global convergence algorithm: bee
collecting pollen algorithm,in Advanced Intelligent Comput-
ing Theories and Applications. With Aspects of Articial Intel-
ligence. ICIC 2008, D. S. Huang, D. C. Wunsch, D. S. Levine,
and K. H. Jo, Eds., vol. 5227 of Lecture Notes in Computer Sci-
ence, Springer, Berlin, Heidelberg, 2008.
[46] H. Abbass, MHBO: marriage in honey bees optimization-a
haplometrosis polygynous swarming approach,in Proceed-
ings of the 2001 IEEE Congress on Evolutionary Computation,
Seoul, Korea (South), 2001.
[47] A. Sachdev, K. Mehta, and L. Malik, Design of protocol for
cluster based routing in VANET using re y algorithm,in
2016 IEEE international conference on engineering and tech-
nology (ICETECH), Coimbatore, India, 2016.
[48] S. Łukasik and S. Zak, Firey algorithm for continuous con-
strained optimization tasks,in Computational Collective
Intelligence Semantic Web, Social Networks and Multiagent
Systems, Springer, Berlin/Heidelberg, Germany, 2009.
[49] X. S. Yang, Nature-Inspired Metaheuristic Algorithms, Luniver
Press, Beckington, UK, 2010.
[50] A. M. Altabeeb, A. M. Mohsen, and A. Ghallab, An improved
hybrid rey algorithm for capacitated vehicle routing prob-
lem,Applied Soft Computing, vol. 84, article 105728, 2019.
[51] D. Trachanatzi, M. Rigakis, M. Marinaki, and Y. Marinakis, A
reyalgorithm for the environmental prize-collecting vehicle
routing problem,Swarm and Evolutionary Computation,
vol. 57, article 100712, 2020.
[52] A. M. Altabeeb, A. M. Mohsen, L. Abualigah, and A. Ghallab,
Solving capacitated vehicle routing problem using coopera-
tive rey algorithm,Applied Soft Computing, vol. 108, article
107403, 2021.
[53] R. Ramachandran Pillai and M. Arock, Spiking neural rey
optimization scheme for the capacitated dynamic vehicle rout-
ing problem with time windows,Neural Computing and
Applications, vol. 33, no. 1, pp. 409432, 2021.
[54] P. M. Kumar, G. Manogaran, R. Sundarasekar,
N. Chilamkurti, and R. Varatharajan, Ant colony optimiza-
tion algorithm with internet of vehicles for intelligent trac
control system,Computer Networks, vol. 144, pp. 154162,
2018.
[55] T. H. Nguyen and J. J. Jung, ACO-based approach on
dynamic MSMD routing in IoV environment,in 2020 16th
International Conference on Intelligent Environments (IE),
Madrid, Spain, 2020.
[56] I. Jabri, T. Mekki, A. Rachedi, and M. B. Jemaa, Vehicular fog
gateways selection on the internet of vehicles: a fuzzy logic
with ant colony optimization based approach,Ad Hoc Net-
works, vol. 91, article 101879, 2019.
[57] M. Elhoseny, Intelligent rey-based algorithm with Levy
distribution (FF-L) for multicast routing in vehicular commu-
nications,Expert Systems with Applications, vol. 140, article
112889, 2020.
[58] R. Attia, A. Hassaan, and R. Rizk, Advanced greedy hybrid
bio-inspired routing protocol to improve IoV,IEEE Access,
vol. 9, pp. 131260131272, 2021.
[59] R. Dhanare, K. K. Nagwanshi, and S. Varma, Enhancing the
route optimization using hybrid MAF optimization algorithm
for the internet of vehicle,Wireless Personal Communica-
tions, vol. 2, pp. 121, 2022.
[60] J. Cheng, C. Cao, M. Zhou, C. Liu, S. Grao, and C. Jiang, A
dynamic evolution mechanism for IoV community in an
urban scene,IEEE Internet of Things Journal, vol. 8, no. 9,
pp. 75217530, 2020.
[61] S. Sivanandam and S. Deepa, Genetic algorithms,in Intro-
duction to Genetic Algorithms, pp. 1537, Springer, 2008.
[62] D. Gupta and R. Kumar, An improved genetic based routing
protocol for VANETs,in 2014 5th International Conference
Conuence The Next Generation Information Technology
Summit (Conuence), pp. 347353, Noida, India, 2014.
[63] J. Zhang, An improved genetic algorithm for vehicle routing
problem,in International Conference on Machine Learning
and Big Data Analytics for IoT Security and Privacy, Shanghai,
China, 2020.
18 Wireless Communications and Mobile Computing
[64] M. Zirour, Vehicle routing problem: models and solutions,
Journal of Quality Measurement and Analysis JQMA, vol. 4,
no. 1, pp. 205218, 2008.
[65] H. Nazif and L. S. Lee, Optimized crossover genetic algorithm
for vehicle routing problem with time windows,American
Journal of Applied Sciences, vol. 7, no. 1, pp. 95101, 2010.
[66] S. Zhong-yue, G. Zhong-liang, and W. Qin, An improved
adaptive genetic algorithm for vehicle routing problem,in
2010 International Conference on Logistics Systems and Intelli-
gent Management, Harbin, China, 2010.
[67] J. Castro-Gutierrez, D. Landa-Silva, and J. M. Pérez, Nature of
real-world multi-objective vehicle routing with evolutionary
algorithms,in 2011 IEEE International Conference on Sys-
tems, Man, and Cybernetics, Anchorage, AK, USA, 2011.
[68] T. Murata and R. Itai, Multi-objective vehicle routing prob-
lems using twofold emo algorithms to enhance solution simi-
larity on non-dominated solutions,in Evolutionary Multi-
Criterion Optimization, vol. 3410 of LNCS, pp. 885896,
Springer, Berlin/Heidelberg, 2005.
[69] A. A. Khan, M. Abolhasan, W. Ni, J. Lipman, and
A. Jamalipour, A hybrid-fuzzy logic guided genetic algorithm
(H-FLGA) approach for resource optimization in 5G
VANETs,IEEE Transactions on Vehicular Technology,
vol. 68, no. 7, pp. 69646974, 2019.
[70] C. H. Lee, K. G. Lim, M. K. Tan, R. K. Chin, and K. T. Teo, A
genetic algorithm for management of coding resources in
VANET,in 2017 IEEE 2nd International Conference on Auto-
matic Control and Intelligent Systems (I2CACIS), Kota Kina-
balu, Malaysia, 2017.
[71] M. Hadded, R. Zagrouba, A. Laouiti, P. Muhlethaler, and L. A.
Saidane, A multi-objective genetic algorithm-based adaptive
weighted clustering protocol in vanet,in 2015 IEEE congress
on evolutionary computation (CEC), 2015.
[72] M. Abbasi, M. Raee, M. R. Khosravi, A. Jolfaei, V. G. Menon,
and J. M. Koushyar, An ecient parallel genetic algorithm
solution for vehicle routing problem in cloud implementation
of the intelligent transportation systems,Journal of Cloud
Computing, vol. 9, no. 1, pp. 14, 2020.
[73] K. C. Huang, Y. W. Wen, and C. K. Ting, Enhancing
k-nearest neighbors through learning transformation func-
tions by genetic programming,in 2019 IEEE Congress on Evo-
lutionary Computation (CEC),Wellington, New Zealand,
2019.
[74] M. Aslan and S. Sen, Evolving trust formula to evaluate data
trustworthiness in VANETs using genetic programming,in
International Conference on the Applications of Evolutionary
Computation (Part of Evo Star), Leipzig, Germany, 2019.
[75] B. Niu, H. Wang, L. J. Tan, L. Li, and J. W. Wang, Vehicle
routing problem with time windows based on adaptive bacte-
rial foraging optimization,in International Conference on
Intelligent Computing, Huangshan, China, 2012.
[76] K. Mehta, P. R. Bajaj, and L. G. Malik, Fuzzy bacterial forag-
ing optimization zone based routing (FBFOZBR) protocol for
VANET,in 2016 International Conference on ICT in Business
Industry & Government (ICTBIG), Indore, India, 2016.
[77] V. A. Saunders, R. Gregory, and J. R. Saunders, Individual-
based modeling of bacterial genetic elements, IGI Global,
2009.
[78] C. Vlachos, R. C. Paton, J. R. Saunders, and Q. H. Wu, A rule-
based approach to the modelling of bacterial ecosystems,Bio-
systems, vol. 84, no. 1, pp. 4972, 2006.
[79] J. R. Faeder, M. L. Blinov, B. Goldstein, and W. S. Hlavacek,
Rule-based modeling of biochemical networks,Complexity,
vol. 10, no. 4, pp. 2241, 2005.
[80] N. Hegde and S. S. Manvi, Implementation of VANET rout-
ing using computational intelligence,in 2016 International
Conference on Communication and Signal Processing (ICCSP),
Melmaruvathur, India, 2016.
[81] C. Dutta and D. Singhal, A hybridization of articial neural
network and support vector machine for prevention of road
accidents in VANET,Engineering and Technology, vol. 10,
no. 1, 2019.
[82] M. A. Karabulut, A. F. M. Shahen Shah, and H. Ilhan, Perfor-
mance Optimization by Using Articial Neural Network Algo-
rithms in VANETs,in 2019 42nd International conference on
telecommunications and signal processing (TSP), pp. 633636,
Budapest, Hungary, 2019.
[83] K. Ozera, K. Bylykbashi, Y. Liu, and L. Barolli, A fuzzy-based
approach for cluster management in VANETs: performance
evaluation for two fuzzy-based systems,Internet of Things,
vol. 3-4, pp. 120133, 2018.
[84] A. Alsarhan, Y. Kilani, A. Al-Dubai, A. Y. Zomaya, and
A. Hussain, Novel fuzzy and game theory based clustering
and decision making for VANETs,IEEE Transactions on
Vehicular Technology, vol. 69, no. 2, pp. 15681581, 2019.
[85] K. Bylykbashi, D. Elmazi, K. Matsuo, M. Ikeda, and L. Barolli,
Eect of security and trustworthiness for a fuzzy cluster man-
agement system in VANETs,Cognitive Systems Research,
vol. 55, pp. 153163, 2019.
[86] A. Uprety, D. B. Rawat, and J. Li, Privacy preserving misbe-
havior detection in IoV using federated machine learning,
in 2021 IEEE 18th Annual Consumer Communications & Net-
working Conference (CCNC), Las Vegas, NV, USA, 2021.
[87] S. A. Siddiqui, A. Mahmood, W. E. Zhang, and Q. Z.
Sheng, Machine learning based trust model for misbeha-
viour detection in Internet-of-Vehicles,in International
Conference on Neural Information Processing, Sydney, NSW,
Australia, 2019.
[88] S. Wu, W. Xia, W. Cui et al., An ecient ooading algorithm
based on support vector machine for mobile edge computing
in vehicular networks,in 2018 10th International Conference
on Wireless Communications and Signal Processing (WCSP),
Hangzhou, China, 2018.
[89] L. Xu, H. Wang, and T. A. Gulliver, Outage probability per-
formance analysis and prediction for mobile IoV networks
based on ICS-BP neural network,IEEE Internet of Things
Journal, vol. 8, no. 5, pp. 35243533, 2020.
[90] K. L. Yin, Y. F. Pu, and L. Lu, Hermite functional link arti-
cial-neural-network-assisted adaptive algorithms for IoV non-
linear active noise control,IEEE Internet of Things Journal,
vol. 7, no. 9, pp. 83728383, 2020.
[91] P. Gu, R. Khatoun, Y. Begriche, and A. Serhrouchni, k-nearest
neighbours classication based Sybil attack detection in vehic-
ular networks,in 2017 Third International Conference on
Mobile and Secure Services (Mobi Sec Serv), Miami Beach, FL,
USA, 2017.
[92] X. Guo, Y. Chen, L. Cao, D. Zhang, and Y. Jiang, A
receiver-forwarding decision scheme based on Bayesian for
NDN-VANET,China Communications, vol. 17, no. 8,
pp. 106120, 2020.
[93] L. Yao, J. Wang, X. Wang, A. Chen, and Y. Wang, V2X rout-
ing in a VANET based on the hidden Markov model,IEEE
19Wireless Communications and Mobile Computing
Transactions on Intelligent Transportation Systems, vol. 19,
no. 3, pp. 889899, 2017.
[94] T. T. Dandala, V. Krishnamurthy, and R. Alwan, Internet of
Vehicles (IoV) for trac management,in 2017 International
conference on computer, communication and signal processing
(ICCCSP), Chennai, India, 2017.
[95] X. Wang, Z. Ning, and L. Wang, Ooading in Internet of
Vehicles: a fog-enabled real-time trac management system,
IEEE Transactions on Industrial Informatics, vol. 14, no. 10,
pp. 45684578, 2018.
[96] S. Ansari and K. K. Nagwanshi, An empirical study of soft
computing approaches in wireless sensor networks,Journal
of Cases on Information Technology (JCIT), vol. 24, 2022.
20 Wireless Communications and Mobile Computing
... Besides, the focus of this research will be on route optimization and vehicle need optimization (Dhanare, Nagwanshi, & Varma, 2022). Conventional waste management systems collect waste daily, while smarter systems collect waste when there is an overflow of bins, which is ineffective. ...
Article
Full-text available
This research proposes an innovative approach to model and optimize a waste disposal management system using Dijkstra's algorithm. The goal is to find the shortest routes for proper waste disposal in order to reduce pollution and costs. The intention is to minimize expenses and pollution by discovering the most efficient routes for disposing of garbage. The trash disposal pathways were modeled and optimized using Dijkstra's algorithm. This allows the waste management board to find the most efficient routes, minimizing distance, time and costs. The results show Dijkstra's algorithm can be effectively applied to improve the waste disposal process in Ebonyi state. Optimized waste disposal routing in Abakaliki, Ebonyi State. Modeled an equation to calculate the shortest paths between dumpsites. Applied Dijkstra's algorithm to design the optimization model. The system is a scalable and adaptable model, it advances the integration of technology in municipal services, promoting the use of Geographic Information Service (GIS) and real-time data for dynamic route optimization. The paper recommends further research on integrating a user-friendly interface and alerts for the system. It also discusses the broader applications of this Dijkstra-based route optimization approach beyond just waste management, such as in traffic management, urban planning, and other logistics/transportation domains. The work presents a practical application of Dijkstra's algorithm to enhance the efficiency and sustainability of waste disposal systems, with potential for wider impact across different sectors.
... One branch of economic theory is game theory, which aims to help understand decision-makers' interactions [12]. It is widely used in telecom business models to determine the economic incentives of agents, whether users or providers [13,14], in telecom and computer networks to optimize routing and resource allocation [15,16] and resource sharing [16,17]. Our work analyzes business models proposed based on game theory, and optimization schemes that are part of the NS taxonomy described in [18,19]. ...
Article
Full-text available
This research work analyzes economic alternatives for the provision of ultra-reliable low latency communication (URLLC) and enhanced mobile broadband (eMBB) services by mobile network operators over the same fifth-generation (5G) network. Two business models are proposed to provide the two services to end users. Concretely, a monopoly is a single operator who offers both services, and a duopoly is two different operators that share network resources and offer one service each. In addition, two types of network scenarios for resource sharing are studied. Specifically, a shared network (SN) is a type of network scenario allowing resources to be shared between the two services without priority. A differentiated network (DN) is a type of network scenario that allows resources to be shared between the two services with a priority to URLLC service using network slicing (NS). Regarding the economic aspects, the incentive is modeled through the user’s utility and the operator’s benefit. At the same time, game theory is used to model the strategic interaction between users and operators, and queuing theory is used to model the interaction between the two services. We conclude that the monopoly social welfare (SW) is closer to the SW of the social optimum than the duopoly SW. In addition, the DN scenario to offer the services through NS is more suitable than the SN scenario since the point of view of service prices, user utilities, and operator benefit.
... Second, it dynamically allocates 5G network and computing resources ( and ) based on the QoS value, Risk Distance (RD), and Vehicle Speed (VS). Third, it traces the 3 best route (best gNB) for routing ESMs from SV to DV. Algorithm 2 handles each ESM independently in an efficient manner, which controls the network congestion. ...
Article
Full-text available
The emerging fifth-generation (5G) technology towards Internet of Vehicles (IoV) provides numerous advantages, such as lower levels of latency, stable link connections and supporting high mobility. However, avoiding vehicle collisions in IoV is a challenging task due to routing Emergency Safety Messages (ESMs) without strict delay and reliability requirements. To address this issue, we propose a novel intelligent Software-Defined Networking-based Collision Avoidance (SDNCA) framework assisted 5G. Primarily, SDNCA performs the first algorithm that estimates accurately the Risk Severity (RS) value for each vehicle via training the proposed Risk Severity-Artificial Neural Network (RS-ANN) model through the implementation of federated learning among vehicles. The SDNCA framework applies the second algorithm to achieve three main objectives. First, calculating Quality of Service (QoS) of the ESM based on RS, Vehicle Speed (VS), and Risk Distance (RD). Second, allocating dynamically 5G network and computing resources ( gNB<sub>nri</sub> and gNB<sub>cri</sub> ) for three Virtual Networks (VNs) based on QoS, RD, and VS. Third, selecting the best route (best gNB) for routing the ESMs from the Source Vehicle (SV) to the Destination Vehicle (DV). To ensure effective forwarding for each ESM, SDNCA deploys the third algorithm at the selected gNB to schedule the ESMs considering their priorities and configures the gNB<sub>nri</sub> and gNB<sub>cri</sub> based on the OpenFlow control message received from the SDN. The real time simulation results demonstrate that SDNCA framework achieves the ideal values of less than 20% Network Overhead (NO) and Computational Complexity (CC), a remarkable 0% Collision Rate (CR), less than 25ms End-to-End (E2E) Delay, and 89%–90% Packet (ESM) Transmission Reliability (TR) compared with the existing related research.
... It has extensive applications in the telecommunications industry to determine the economic incentives of agents such as users and providers [15,16]. It is also employed in telecommunications and computer networks to optimize routing, resource allocation [17,18], and resource sharing [18,19]. In this study, we employ game theory and optimization schemes [20,21] within the framework of the network slicing taxonomy to analyze the proposed business models. ...
Article
Full-text available
The objective of this paper is to analyze economic alternatives for the provision of ultra-reliable low-latency communication (URLLC) and massive machine-type communication (mMTC) services over a fifth-generation (5G) network. Two business models, a monopoly and a duopoly, are studied and two 5G network scenarios are analyzed: a 5G network where the network resources are shared between the two services without service priority, and a 5G network with network slicing that allows for URLLC traffic to have a higher priority. Microeconomics is used to model the behavior of users and operators, and game theory is used to model the strategic interaction between users and operators. The results show that a monopoly over a 5G network with network slicing is the most efficient way to provide both URLLC and mMTC services.
... IoV systems detect shortcomings and analyze data to make informed decisions for driving vehicles. Intelligent devices equipped with embedded processors and wireless technologies are utilized in IoV to facilitate vehicle communication [37]. By leveraging various forms of communication, such as device-to-device and machine-tomachine, IoV environments aim to enhance traffic safety in urban areas. ...
... Therefore, it is impossible to construct completely independent routes. At least the first and the last sites should always be considered common because simultaneous transmission to them is possible only by one of the routes [20]. Figure 1 shows a graphical interpretation of the multipath routing model between the source node s and the destination node t. ...
Article
Full-text available
The Internet of Things (IoT) is an emerging technology that has recently gained significant interest, especially with the dramatic increase in connected devices. However, IoT networks are not yet standardized, and the design of such networks faces many challenges, including scalability, flexibility, reliability, and availability of such networks. Routing is among the significant problems facing IoT network design because of the dramatic increase in connected devices and the network requirements regarding availability, reliability, latency, and flexibility. To this end, this work investigates deploying a multipath routing scheme for dense IoT networks. The proposed method selects a group of routes from all available routes to forward data at a maximum rate. The choice of data transmission routes is a complex problem for which numerical optimization methods can be used. A novel method for selecting the optimum group of routes and coefficients of traffic distribution along them is proposed. The proposed method is implemented using dynamic programming. The proposed method outperforms the traditional route selection methods, e.g., random route selection, especially for dense IoT networks. The model significantly reduced the number of intermediate nodes involved in routing paths over dense IoT networks by 34%. Moreover, it effectively demonstrated a significant decrease of 52% in communication overhead and 40% in data delivery time in dense IoT networks compared to traditional models.
... With the advent of the Internet of Vehicles (IoV) in smart cities, the applications have diverse network requirements that need to be satisfied [6]. One of the key issues in IoV is path organization, to forward the data on optimal paths considering the dynamic and mobile nature of the network [7]. ...
Article
Full-text available
The content-centric networking (CCN) architecture allows access to the content through name, instead of the physical location where the content is stored, which makes it a more robust and flexible content-based architecture. Nevertheless, in CCN, the broadcast nature of vehicles on the Internet of Vehicles (IoV) results in latency and network congestion. The IoVbased content distribution is an emerging concept in which all the vehicles are connected via the internet. Due to the high mobility of vehicles, however, IoV applications have different network requirements that differ from those of many other networks, posing new challenges. Considering this, a novel strategy mediator framework is presented in this paper for managing the network resources efficiently. Software-defined network (SDN) controller is deployed for improving the routing flexibility and facilitating in the inter-interoperability of heterogeneous devices within the network. Due to the limited memory of edge devices, the delectable bloom filters are used for caching and storage. Finally, the proposed scheme is compared with the existing variants for validating its effectiveness.
... The Raccoon Optimization Algorithm-based Accurate Positioning Scheme (ROA-APS) had presented in [36] for enhancing the accuracy of range measurement estimates to establish the actual position of nodes. Apart from this, we have reviewed the recently presented various security solutions [37][38][39][40][41][42][43] using trust-based and AI-based approaches for wireless communications. ...
Article
Full-text available
The position-based routing of Vehicular Ad hoc Network (VANET) vulnerable to various security attacks because of dependency on computing, control, and communication technologies. The Internet of Things (IoT)-enabled VANET application leads to the challenges such as integrity, access control, availability, privacy protection, non-repudiation, and confidentiality. Several security solutions have been introduced for two decades in two categories as cryptography-based and trust-based. Due to the high computation complexity, cryptography-based solutions are outperformed by recent intelligent trust-based mechanisms. The trust-based techniques are lightweight and effective against the well-known security threats in VANET. The objective of this paper has to design a novel position-based routing in which the conduct of vehicles assessed to accomplish reliable VANET communications. Attack Resilient Position-based VANET Protocol (ARPVP) proposed to detect and prevent malicious vehicles in the network using the trust evaluation technique and artificial intelligence (AI). In the first phase of ARPVP, the periodic self-trust assessment algorithm has designed using various trust parameters to detect unreliable vehicles in the network. In the second phase of ARPVP, the position-based route formation algorithm has designed using the AI technique Ant Colony Optimization (ACO). ACO solves the problem of reliable route formation by neglecting the attacker's using a trust-based fitness function. The trust parameters of each vehicle as mobility, buffer occupancy, and link quality parameters had measured in both phases of ARPVP. Simulation outcomes of the proposed model outperformed state-of-art protocols in terms of average throughput, communication delay, overhead, and Packet Delivery Ratio (PDR).
Chapter
Recent developments in communication technologies, intelligent transportation systems, and computer systems have created many opportunities for intelligent traffic solutions that improve efficiency, ease, and safety. Researchers have recently used AI techniques in many application fields because it can improve data-driven networks. Moreover, The IoV reduces a lot of data from various sources that can be used to choose the best routes, improve driver awareness and passenger comfort and safety, optimize road time, and avoid breakdowns. In this study, we evaluate AI methods from various IoV research projects including their advantages and limitation. In the light of these limitations, we discuss open challenges and future research perspectives related to IoV networks using AI methods.
Article
Full-text available
In recent years, fog and mobile edge computing have grown rapidly due to the large amount of data generated by the Internet of Thing (IoT) devices. It provides a variety of services within the end user IoT environment, but suffers from inefficient scheduling, which results in more significant delays than cloud computing. In this research we propose a data migration procedure that beats the metrics of delay, response time, and load balancing rate in the fog computing paradigm. It is possible to reduce the amount of replicated and integrated data by using Sequence Cover Cat Swarm Optimization (SCCSO) and Sequence Cover Particle Swarm Optimization (SCPSO) by using appropriate Virtual machines (VMs) which lock highly used machines and give service to low used machines in cloud communication storage.; this allows us to obtain resources efficiently in the fog environment. After being tested in the iFogsim climate, The protocols performed better in the iFogsim climate in terms of response time, scheduling time load balancing rate and delay than the other scheduling algorithms.
Article
Full-text available
The optimal CH selection for finding the shortest path among the CHs is improved by developing the hybrid K-means with Particle Swarm Optimization (PSO) based hybrid Ad-hoc On-demand Distance Vector (AODV) channelling algorithms. The alive nodes, total packet sending time, throughput, and NL are increased using this hybrid technique, whereas dead nodes and EC are minimized in the network. The proposed algorithm utilizes a rotational method of utilization of cluster head (CH) to ensure that all member nodes are utilized uniformly based on the incoming traffic. The proposed algorithm has been implemented, experimented with, and compared in performance with LEACH, DLBA and GLBA algorithms. The proposed hybrid approach outperforms the existing techniques regarding average energy consumption and load distribution.
Article
Full-text available
A smart city involves different types of sensors and electronic devices that collect data to develop sustainable growth in the urban area. The development of internet-based driving is referred to as the IoV in the new modern era of the IoT. In IoV, real-time data is collected and the vehicles communicate with each other to transmit the data. However, there are some issues, like finding the shortest route between a travelling source and a destination, high packet delivery ratios, congestion, low connectivity probability, and high delays. To overcome these parameter issues, this paper proposes a hybrid optimization approach that combines modified Ant Colony and Firefly optimization techniques (MAF) to calculate the average speed and find the best route to the destination. The MAF algorithm combined attractiveness and pheromones to find the optimal path and reduce the travelling time. The proposed MAF algorithm for shortest route selection is compared to recent state-of-the-art methods such as RAVP, ECRA, EECM, and AISM. Two simulators, NS2 and SUMO, were used to conduct this experiment. These simulation findings reveal that the performance of the proposed MAF optimization is increased in terms of increased connectivity probability, reduced delays, and increased packet delivery ratio of the vehicles when the entire system was considered.
Article
Full-text available
New vehicles are now expected to be involved in the rapid development of Intelligent Transport Systems (ITS). Vehicular Ad hoc NETwork (VANET) is the basic equipment used for the production of ITSs with a rapid and dynamic network topology. The increasing number of connected vehicles and the need for real-time data processing has created a growing demand for turning real VANETs into an automotive Internet of Vehicle (IoV) for achieving a goal of an effective and smart future transportation system. In this paper, an Advanced Greedy Hybrid Bio-Inspired (AGHBI) routing protocol with a greedy forwarding system is proposed to improve the performance of IoV, where a modified hybrid routing scheme with the help of a bee colony optimization is used to select the highest quality of service route and maintain the path with minimum overflow. Simulation results confirm that the proposed protocol can cope well with both Vehicle to Vehicle (V2V), and Vehicle to Infrastructure (V2I) environments and has a great impact on improving the packet delivery ratio, and the delay, while attaining acceptable overhead and hops count among all vehicles.
Conference Paper
Full-text available
Data falsification attack in Vehicular Ad hoc Networks (VANET) for the Internet of Vehicles (IoV) is achieved by corrupting the data exchanged between nodes with false information. Data is the most valuable asset these days from which many analyses and results can be drawn out. But the privacy concern raised by users has become the greatest hindrance in performing data analysis. In IoV, misbehavior detection can be performed by creating a machine learning model from basic safety message (BSM) dataset of vehicles. We propose a privacy-preserving misbehavior detecting system for IoV using Federated Machine Learning. Vehicles in VANET for IoV are given the initial dull model to locally train using their own local data. On doing this we get a collective smart model that can classify Position Falsification attack in VANET using the data generated by each vehicle. All this is done without actually sharing the data with any third party to perform analysis. In this paper, we compare the performance of the attack detection model trained by using a federated and central approach. This training method trains the model on a different kind of position falsification attack by using local BSM data generated on each vehicle.
Article
Full-text available
Internet of Vehicles (IoV) can be pivotal factor towards realization of Intelligent Transportation Systems. IoV principle focus is to have time decisive safety applications, optimize traffic flow, infotainment and Vehicular network with the intention to improve road safety through deployment of application allowing drivers to anticipate danger on the road. One of the important challenges of IoV is timely, reliable, and consistent propagation of messages among vehicles which enable drivers to take appropriate decisions to have improved road safety. Many proposals has been put forward by researchers to identify the traffic jam and routing the vehicular nodes in urban and highway roads for consistent, safe and secured driving environment. Even though the protocols have several limitations including lack of scalability to larger networks, routing overheads, etc. To overcome these limitations bio-inspired, big data, genetic algorithm, machine learning approaches have been proposed to identify and route packets among vehicular nodes in an optimized manner. The paper contains the survey of already proposed method and new approach to identify and route the vehicular node for the IoV environment.
Article
The capacitated vehicle routing problem (CVRP) is a classical combinatorial optimization problem, which has received much attention due to its main challenges as distribution, logistics, and transportation. This proposed attempts to find the vehicle routes with minimizing traveling distance, in which the excellent solution delivers a set of customers in one visit by capacitated vehicle. For solving the CVRP problem, a cooperative hybrid firefly algorithm (CVRP-CHFA) is proposed in this paper with multiple firefly algorithm (FA) populations. Each FA is hybridized with two types of local search (i.e., Improved 2-opt as a local search and 2-h-opt as a mutation operator) and genetic operators. The proposed algorithms (FAs) communicate from time to time for exchanging some solutions (fireflies). The main aim of the hybridization and communication strategies is to maintain the diversity of populations to prevent the proposed algorithm from falling into local optima and overcome the drawbacks of a single swarm FA. The experiments are conducted on 108 instances from eight standard benchmarks. The results revealed that the proposed CVRP-CHFA got promising results compared to other well-known methods. Moreover, the proposed CVRP-CHFA significantly outperformed the recent three hybrid firefly algorithms.
Article
We investigate a vehicle routing problem in which customer requests are either known in advance with respect to the planning of the distribution, or they arrive online during the distribution process. Each request is associated with a time window. The company managing the distribution has a given fleet of vehicles to serve the customers, and, in addition, occasional drivers are available to perform the service, i.e., private citizens who are willing to distribute some customer orders in exchange for a compensation. Each occasional driver specifies the time window in which he/she is available. A penalty is incurred when violating time windows as well as when a request is not served. The objective of the company is to determine the distribution plan that minimises the distribution cost, which is given by the sum of the cost of regular vehicles, the compensation paid to the occasional drivers and the penalty cost. In addition, we design and implement a solution method which is based on an insertion algorithm evaluating each request singularly. Albeit being simple, this approach allows to handle dynamic requests and to adjust the distribution plan in real-time. Then, we propose a re-optimisation approach in which the solution constructed through the insertion algorithm is periodically passed to a variable neighborhood search algorithm. In a detailed computational study, we analyse the behavior of the proposed solution approaches. In addition, we evaluate the impact of dynamic information through a comparison of online approaches with an a priori information scenario.
Article
Existing work on Internet of Vehicles (IoV) community mainly focuses on the detection of IoV community using static network detection and evolution methods of complex networks. These methods are prone to over-centralization, high computational complexity, and poor stability during the evolution of a community. In this work, we present an IoV community model and its evolution mechanism in an urban scene. More specifically, we first propose an IoV community detection model based on node similarity merging. Then, we use a network increment-based strategy to analyze node increment, edge increment, and weight increment. Finally, we give a dynamic evolution mechanism of an IoV community. Simulation-based experimental evaluation results show that the proposed mechanism achieves better real-time performance and accuracy than existing methods.
Article
Named Data Network (NDN) has caused wide concerns in VANET community because NDN uses a content-centric mechanism that naming content rather than the host. However, integrating NDN into VANET (NDN-VANET) also faces several challenges including consumer/provider mobile, broadcast storm problem and so on. In this paper, we propose a Bayesian-based Receiver Forwarding Decision (BRFD) scheme to mitigate the broadcast storm problem incurred by interest packets in NDN-VANET. In the BRFD, vehicles received an interest packet are required to make forwarding decisions based on Bayesian decision theory according to current network conditions obtained by neighbor interaction. However, the receiver-forwarding decision in BRFD can also cause a conflict issue because multiple vehicles forward copies of the same packet at the same time. So a back-off mechanism is introduced in BRFD. Experimental results show that the BRFD algorithm has better performance in several aspects in contrast to probability-based forwarding scheme and "bread crumb" routing.