Proceedings of the Second International ICST Conference on Simulation Tools and Techniques 2009
DOI: 10.4108/icst.simutools2009.5680
|View full text |Cite
|
Sign up to set email alerts
|

Modeling obstacles in INET/Mobility framework: motivation, integration, and performance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…The mobile node (Figure 3 Additionally, the building structure with network infrastructure was modeled in OMNeT++ (with Inet/Mixim extensions). The implemented WSN model takes into account Wi-Fi radio propagation [34] and obstacles. The simulation parameters were described in Table 1.…”
Section: Methodsmentioning
confidence: 99%
“…The mobile node (Figure 3 Additionally, the building structure with network infrastructure was modeled in OMNeT++ (with Inet/Mixim extensions). The implemented WSN model takes into account Wi-Fi radio propagation [34] and obstacles. The simulation parameters were described in Table 1.…”
Section: Methodsmentioning
confidence: 99%
“…Radio transmission in real world is heavily affected by the signal shadowing effects in urban areas, due to buildings and other vehicles on the road which block radio propagation. In our simulation, we have used a simple obstacle shadowing model 24 . This is a simplified simulation scenario that benefits the eavesdropper as it assumes all the safety messages, within the communication range, are delivered to the eavesdropper without significant packet loss.…”
Section: Simulation Setupmentioning
confidence: 99%
“…In our simulation, we have used a simple obstacle shadowing model. 24 This is a simplified simulation scenario that benefits the eavesdropper as it assumes all the safety messages, within the communication range, are delivered to the eavesdropper without significant packet loss. In the following sections, we will discuss the specific mobility and adversary models used in our simulations and the different PCS that we have considered.…”
Section: Simulation Setupmentioning
confidence: 99%
“…is used which was first proposed in [32] and later improved in conjunction with the obstacle model in [33]. The values of the above mentioned propagation models are used to calculate the SINR on the receiver side:…”
Section: Propagationmentioning
confidence: 99%