2019
DOI: 10.1109/tvt.2019.2902245
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting Resource Contention in Highly Mobile Environments and Its Application to Vehicular Ad-Hoc Networks

Abstract: Exploiting resource contention in highly mobile environments and its application to vehicular ad-hoc networks. IEEE Transactions on Vehicular Technology, 68 (4). pp. 3805-3819.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 28 publications
0
3
0
Order By: Relevance
“…At the same time, the life cycle of IoV data is short, and network resources are shared among more users, so more targeted strategies are needed for resource management and caching. In order to ensure the QoS of applications and servers, Paranthaman et al [ 83 ] used probabilistic mechanisms to improve resource management in public networks, thereby reducing user disputes over fairness. However, due to the limited storage at RSUs and soaring content size for distribution, RSUs can only selectively cache content replicas.…”
Section: Delivery Processmentioning
confidence: 99%
“…At the same time, the life cycle of IoV data is short, and network resources are shared among more users, so more targeted strategies are needed for resource management and caching. In order to ensure the QoS of applications and servers, Paranthaman et al [ 83 ] used probabilistic mechanisms to improve resource management in public networks, thereby reducing user disputes over fairness. However, due to the limited storage at RSUs and soaring content size for distribution, RSUs can only selectively cache content replicas.…”
Section: Delivery Processmentioning
confidence: 99%
“…In addition, these environments explore resource contention, thus resources must be quickly allocated to the requested and deallocated as users travel around. 4 Hence, a key enabling mechanism is proper resource allocation management to provide seamless connectivity. Even though these cloud services have already played a vital role in the computing world, cloud computing suffers from a lot of security concerns, challenges in resources allocation, and threat issues that can separate the entire cloud function.…”
Section: Introductionmentioning
confidence: 99%
“…The Y‐Comm Framework is one of the modern architectures that have been designed to provide seamless connectivity, mobility management, QoS, and security 3 in highly mobile environments. In addition, these environments explore resource contention, thus resources must be quickly allocated to the requested and deallocated as users travel around 4 . Hence, a key enabling mechanism is proper resource allocation management to provide seamless connectivity.…”
Section: Introductionmentioning
confidence: 99%
“…Most cryptographic algorithms require significant computational capability and energy consumption, in particular the asymmetrically encrypted procedure. The low cost sensor nodes, however, are generally resource-limited in memory, energy, and computer capabilities [10]. Several authentications and encryption schemes in routing protocols need a central authority or centralised management, which in WSNs is frequently unworkable.…”
Section: Introductionmentioning
confidence: 99%