2020 IEEE 25th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) 2020
DOI: 10.1109/camad50429.2020.9209259
|View full text |Cite
|
Sign up to set email alerts
|

Successful Delivery in VANETs with Damaged Infrastructures Based on Double Cluster Head Selection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…In this scheme, CM sends data packets to two CHs when away from the BS, and the packets will be carried until CH is within the range of any BS. The protocol proposed in [17] makes some improvements. When CM sends data to the node outside the cluster, it first sends the data to two cluster heads.…”
Section: Ralated Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In this scheme, CM sends data packets to two CHs when away from the BS, and the packets will be carried until CH is within the range of any BS. The protocol proposed in [17] makes some improvements. When CM sends data to the node outside the cluster, it first sends the data to two cluster heads.…”
Section: Ralated Workmentioning
confidence: 99%
“…However, these schemes are all rely on single CH in each cluster, which will inevitably lead to the increasing overload and premature death of CH when the number of CMs increased. Dual cluster head (DCH) scheme provides a light-weighted solution to implement load balancing, which can be used as a complementary method to improve throughput and energy efficiency [15][16][17][18][19]. Nevertheless, research in terms of this kind of scheme is mainly focused on terrestrial scenarios such as vehicular ad hoc network (VANET), which is not suitable for FANET.…”
Section: Introductionmentioning
confidence: 99%
“…They use coalitional graph game to support reliable data transmission. Khayat et al 8 use a clustering algorithm to cover the network area. They propose to have two different cluster heads; they are alternative for each other if one of them is disabled because of packet missing and failure decrease, it replace with second node.…”
Section: Introductionmentioning
confidence: 99%