2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS) 2019
DOI: 10.1109/ntms.2019.8763783
|View full text |Cite
|
Sign up to set email alerts
|

Wave Performance Analysis and Enhancement for Safety Applications in Vehicular Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…The process performance was conducted based on two attributes, the message delivery and the delay of transmission. In Reference 9, the authors focused on the back‐off parameters to propose a new process that will assure urgent safety messages delivery. They were able to regulate the number of beacon messages in the control channel through acclimating the contention window and Arbitration Inter‐Frame Spacing.…”
Section: Related Workmentioning
confidence: 99%
“…The process performance was conducted based on two attributes, the message delivery and the delay of transmission. In Reference 9, the authors focused on the back‐off parameters to propose a new process that will assure urgent safety messages delivery. They were able to regulate the number of beacon messages in the control channel through acclimating the contention window and Arbitration Inter‐Frame Spacing.…”
Section: Related Workmentioning
confidence: 99%
“…We consider a reactive routing alternative which relies on the route discovery process by flooding a specific request message (i.e., RREQ) to neighbors in order to find a route from source to destination. This message contains the source address and destination address when the node reaches the destination then sends a reply message (i.e., RREP) that determines the optimal path between the source and the destination according to bandwidth or traffic load [19]. In this section, we propose a new source attack algorithm that fabricates the source address of the input route request at the intermediate node.…”
Section: B Source Fabrication Attackmentioning
confidence: 99%
“…In our simulation, we download Hamra file from OpenStreetMap (OSM), then we used this map file in SUMO 0.22 simulator to create a real-time scenario as shown in Fig.3, The mobility of traffic data is generated in SUMO trace exporter [20], [21], [22], [23] [24], [25], [26]; then it is exported to NS2 simulator to study the performance evaluation of our proposed algorithms as depicted in Fig.4. Table I shows a summary of the parameters that have been adopted in this simulation.…”
Section: A Simulation Scenariomentioning
confidence: 99%