2016
DOI: 10.1109/tvt.2015.2422753
|View full text |Cite
|
Sign up to set email alerts
|

Understanding Spurious Message Forwarding in VANET Beaconless Dissemination Protocols: An Analytical Approach

Abstract: Message dissemination is a key component of Vehicular Ad hoc Networks (VANETs). It enables the capability of Intelligent Transportation Systems to support safety and infotainment services for vehicles and people on travel. Dissemination in VANETs typically relies on the intelligent election of selected vehicles to act as relay nodes, a critical element that serves to avoid broadcasting storm issues. This paper presents an analytical model for evaluating the performance of a class of distributed, beacon-less, d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
31
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 45 publications
(31 citation statements)
references
References 25 publications
0
31
0
Order By: Relevance
“…These approaches usually have a side channel with neighborhood state information, such as position and speed of close-by vehicles. Baiocchi et al [27] proposed a model to evaluate the performance of schemes that do not require any side channel, and thus are completely autonomous.…”
Section: Reliabilitymentioning
confidence: 99%
“…These approaches usually have a side channel with neighborhood state information, such as position and speed of close-by vehicles. Baiocchi et al [27] proposed a model to evaluate the performance of schemes that do not require any side channel, and thus are completely autonomous.…”
Section: Reliabilitymentioning
confidence: 99%
“…Many researchers preferred designing beacon-less routing protocol for VANETs because of its low overhead on the routing decision process [3,4,5]. While a beacon-less routing protocol can reduce the wireless service cost in neighbors’ information maintenance, it will introduce delay in the neighbors competition for serving as the next-hop relay.…”
Section: Introductionmentioning
confidence: 99%
“…The traditional routing protocol always tried to extend the one-hop transmission range for reducing the end-to-end delay [3,4,5,6], leaving the path lifetime out of consideration. However, for large volume content delivery, the end-to-end path will need being re-built one or more times with high probability during the data download.…”
Section: Introductionmentioning
confidence: 99%
“…In our work in [7] we set up a model to identify the interplay between MAC procedures and dissemination protocols that may give rise to spurious forwarding and to analytically quantify this phenomenon at low data rate regime. Differently from the paper [7] we here quantify how the data dissemination performance exhibit collapse under heavy load due to these spurious re-transmissions (also known as unsuppressed message duplicates); to this aim we investigate then performance limits of timer-based dissemination protocols under heavy load.…”
Section: Introductionmentioning
confidence: 99%
“…Differently from the paper [7] we here quantify how the data dissemination performance exhibit collapse under heavy load due to these spurious re-transmissions (also known as unsuppressed message duplicates); to this aim we investigate then performance limits of timer-based dissemination protocols under heavy load. Moreover, we also extend the study to the case where multiple nodes are responsible for generating flows that must be broadcasted across the network system.…”
Section: Introductionmentioning
confidence: 99%