2015
DOI: 10.1155/2015/354292
|View full text |Cite
|
Sign up to set email alerts
|

Cognitive Self-Scheduled Mechanism for Access Control in Noisy Vehicular Ad Hoc Networks

Abstract: Within the challenging environment of intelligent transportation systems (ITS), networked control systems such as platooning guidance of autonomous vehicles require innovative mechanisms to provide real-time communications. Although several proposals are currently under discussion, the design of a rapid, efficient, flexible, and reliable medium access control mechanism which meets the specific constraints of such real-time communications applications remains unsolved in this highly dynamic environment. However… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(23 citation statements)
references
References 31 publications
0
23
0
Order By: Relevance
“…The SIMITS [13] simulator tool is used for experimental evaluation. The Proposed S − ENCCMA and existing ENCCMA [15] algorithm are written in C# object-oriented programing language using the Visual studio framework 4.5, 2012. The S − ENCCMA and city, highway, and rural radio propagating environment model [Ours] is incorporated into the SIMITS tool [16][17][18][19][20].…”
Section: Simulation Analysis and Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The SIMITS [13] simulator tool is used for experimental evaluation. The Proposed S − ENCCMA and existing ENCCMA [15] algorithm are written in C# object-oriented programing language using the Visual studio framework 4.5, 2012. The S − ENCCMA and city, highway, and rural radio propagating environment model [Ours] is incorporated into the SIMITS tool [16][17][18][19][20].…”
Section: Simulation Analysis and Resultsmentioning
confidence: 99%
“…This work presents a secure enhanced non-cooperative cognitive division multiple access (S − ENCCMA) model using a commutative RSA cryptography mechanism. This S − ENCCMA adopts the enhanced non-cooperative cognitive division multiple access (ENCCMA) [15] real-time MAC (Medium Access Control) communication protocol. To provision real-time access, the ENCCMA combines Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), and the Cognitive Radio (CR) technique.…”
Section: Proposed Secure Non-cooperative Cognitive Division Multiple mentioning
confidence: 99%
“…When considering topology changes for CSMA/CA the Slotted-Aloha prototype doesn't need signaling or reconfiguration, the drawback of this protocol is that collision level is high and it is not suitable for high priority services. In order to guarantee bounded medium access delay for SITS based application services there a several cognitive radio CR base MAC model that have been proposed such as NCCMA [12], here by applying CR techniques every automobile user stores information about the occupancy estimation of each slot. This info was then adopted to find the best slot to perform the data communication needs for various application services.…”
Section: Fig1 Architecture Of V2v Communicationmentioning
confidence: 99%
“…Our model can also be used to compute the frame loss due to Collison and noise. In next section the experiment are conducted to evaluate the performance of Proposed CEV-AMAC and the results are compared with exiting MAC [12] [16] [9] [4]. A comparison of these existing model is shown in Table.1.…”
Section: Adaptive Mac Schedular For Cev Enviroment Model For V2v In Vmentioning
confidence: 99%
See 1 more Smart Citation