2019
DOI: 10.1109/tvt.2018.2880238
|View full text |Cite
|
Sign up to set email alerts
|

BENBI: Scalable and Dynamic Access Control on the Northbound Interface of SDN-Based VANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 58 publications
(22 citation statements)
references
References 47 publications
0
22
0
Order By: Relevance
“…Different techniques have been used to design different routing protocols in VANET such as genetic algorithms [30], opportunistic algorithms [33], heuristic algorithms [7], probabilistic algorithms [19], game theory [21], network coding [10] [25] and network clustering [16] [9]. Furthermore, different protocols have been designed for network layer to attain different QoS services such as minimizing delay [8] [21] [23] [30], increasing link stability [15], minimizing communication cost [4], increasing delivery ratio [33], and security issues [24]. Regardless of techniques employed to infer the routing decision, the routing protocols are broadly classified into distributed protocols and centralized protocols.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Different techniques have been used to design different routing protocols in VANET such as genetic algorithms [30], opportunistic algorithms [33], heuristic algorithms [7], probabilistic algorithms [19], game theory [21], network coding [10] [25] and network clustering [16] [9]. Furthermore, different protocols have been designed for network layer to attain different QoS services such as minimizing delay [8] [21] [23] [30], increasing link stability [15], minimizing communication cost [4], increasing delivery ratio [33], and security issues [24]. Regardless of techniques employed to infer the routing decision, the routing protocols are broadly classified into distributed protocols and centralized protocols.…”
Section: Related Workmentioning
confidence: 99%
“…The probability that the packet has been received successfully is derived from the probability that the receiving power of the signal is greater than the threshold value , formulated in Eq. (24).…”
Section: Relay Vehicle Selection Attributes A) Transmission Distance mentioning
confidence: 99%
“…Besides, Reference [26] explains that SDN can be applied to safety surveillance and virtualization services. As the SDN controller requires to centralize global knowledge and configure the network, Reference [27] proposes a scalable and dynamic access control scheme to ensure the security of north bound interface. In order to support the cloud computing at the edge of network, Reference [28] proposes a networking architecture in which not only SDN technology is used but also fog computing is added to provide security services, traffic management, delay reduction and location aware functions.…”
Section: Sdn-based Vanetsmentioning
confidence: 99%
“…An SDN-based VANET, known as an SDVN, explores the potential flexibility and management capabilities achieved by deploying SDN-controllers in vehicles [3]. Data transmission in SDVN is applicable for multi-hop routing with the objective of minimizing end-to-end delays [4].…”
Section: Introductionmentioning
confidence: 99%