2022 8th International Conference on Optimization and Applications (ICOA) 2022
DOI: 10.1109/icoa55659.2022.9934407
|View full text |Cite
|
Sign up to set email alerts
|

6G and V2X Communications: Applications, Features, and Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 31 publications
0
2
0
Order By: Relevance
“…Details of these challenges and potential solutions for 6G V2X sidelink resource allocation are provided in Table 16. [96], [97], [98], [99], [100], [101] [102] In addition to the traditional resource allocation techniques, several emerging techniques have been proposed to enhance the performance of V2X communication systems in the context of sidelink vehicular communication. These techniques are vital in paving the way for 6G V2X sidelink networks, offering improved efficiency, low-latency communication, and enhanced overall performance.…”
Section: J Heterogeneous Network Environmentsmentioning
confidence: 99%
See 1 more Smart Citation
“…Details of these challenges and potential solutions for 6G V2X sidelink resource allocation are provided in Table 16. [96], [97], [98], [99], [100], [101] [102] In addition to the traditional resource allocation techniques, several emerging techniques have been proposed to enhance the performance of V2X communication systems in the context of sidelink vehicular communication. These techniques are vital in paving the way for 6G V2X sidelink networks, offering improved efficiency, low-latency communication, and enhanced overall performance.…”
Section: J Heterogeneous Network Environmentsmentioning
confidence: 99%
“…In contrast, the second constraint (96) ensures that the interference from other vehicles is canceled at the receiver. The third constraint (97) ensures that the combining vector is normalized.…”
Section: A Vehicle-to-vehicle (V2v) Communication For Collision Avoid...mentioning
confidence: 99%
“…However, ensuring confidentiality in V2X has become extremely complex due to the heterogeneous nature of 6G network alongside unconventional technologies such as AI, quantum computing, fog computing etc. [77]. Anonymization is a technique used to protect the identity of users by removing any personally identifiable information (PII) from the data before transmitting it over the network [78].…”
Section: B Confidentiality In V2xmentioning
confidence: 99%