2013 13th International Conference on ITS Telecommunications (ITST) 2013
DOI: 10.1109/itst.2013.6685531
|View full text |Cite
|
Sign up to set email alerts
|

Performance analysis of real-time streaming under TCP and UDP in VANET via OMNET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 13 publications
0
5
0
Order By: Relevance
“…In this step, requirements of each software are identified to ensure minimum hardware requirements are achieved. The simulation software found and gathered at this stage are iNetwork [4], Packet Tracer [5], GNS3 [6] and Omnet++ [7]. All of them are combined and integrated into the next step.…”
Section: Discussionmentioning
confidence: 99%
“…In this step, requirements of each software are identified to ensure minimum hardware requirements are achieved. The simulation software found and gathered at this stage are iNetwork [4], Packet Tracer [5], GNS3 [6] and Omnet++ [7]. All of them are combined and integrated into the next step.…”
Section: Discussionmentioning
confidence: 99%
“…A SYN flood attack in an IoV context exploits the TCP handshake mechanism, inundating the controller with SYN requests without completing the connection establishment [18], [19]. This flood of unresolved sessions can exhaust the victim's resources, causing legitimate connection requests to be ignored.…”
Section: Tcp Syn With Various Data Packet Types Dos Threat Modelmentioning
confidence: 99%
“…When SYN data packet size is varied, the controller's task of distinguishing and handling each connection type becomes more complex [18]. This complexity can cause additional strain, increasing the likelihood of system hang-ups or crashes and potentially isolating segments of the vehicular network [19]. The attack result below is triggered during interval 30-60 seconds and the impact is illustrated in Figure 2.…”
Section: Tcp Syn With Various Data Packet Types Dos Threat Modelmentioning
confidence: 99%
“…To develop reliable UAV systems and applications, it is important to be able to simulate UAV operations in a realistic way. So far, many network simulators have been developed, such as NS-2 [2], NS-3 [3], QualNet [4], and OMNet [5]. To use these simulators for mobile networks, either a mobility model like Gauss-Markov [6] is specified or trace files created by other software tools like SUMO [7] are given as inputs for the network simulators.…”
Section: Simulation Platformsmentioning
confidence: 99%