2018
DOI: 10.1002/ett.3282
|View full text |Cite
|
Sign up to set email alerts
|

A hybrid V2V system for collision‐free high‐speed internet access in intelligent transportation system

Abstract: Vehicle‐to‐vehicle communication can be effective in avoiding accident and traffic collision using dedicated short‐range communication (DSRC) in intelligent transportation systems. The problem of DSRC is it works in a short range of 1000 m and its frequency band cannot support a large number of users simultaneously, which leads to multiaccess interference, (MAI) noise, and low transmission rate. Multiaccess interference is referred as the overlapping of signals from different users in the network. A combinatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 20 publications
0
7
0
Order By: Relevance
“…Irrespective of these evaluations, it is recommended that solutions should conduct certain case studies while presenting outputs of their proposed schemes and should demonstrate the effects on the performance of the system and the network. Behaviour-based [102], [103] Hybrid [104], [105] Prediction-based [106] Probability-based [107], [108] Standard-based [109] Primary [110], [111] Secondary [112] Grouped [108] Time-bound [103], [113] Resource-bound [97], [100], [114] Hybrid [102] On-site [115]- [117] Off-site [65], [116], [118] securing the content in wearable IoT devices, which are considered as an important part of M-IoT systems. The authors developed an innovative testbed setup for evaluating the security policies of dynamic IoT devices.…”
Section: F Methodologies For Analyses Of Security Privacy and Trust In Smart M-iotmentioning
confidence: 99%
See 1 more Smart Citation
“…Irrespective of these evaluations, it is recommended that solutions should conduct certain case studies while presenting outputs of their proposed schemes and should demonstrate the effects on the performance of the system and the network. Behaviour-based [102], [103] Hybrid [104], [105] Prediction-based [106] Probability-based [107], [108] Standard-based [109] Primary [110], [111] Secondary [112] Grouped [108] Time-bound [103], [113] Resource-bound [97], [100], [114] Hybrid [102] On-site [115]- [117] Off-site [65], [116], [118] securing the content in wearable IoT devices, which are considered as an important part of M-IoT systems. The authors developed an innovative testbed setup for evaluating the security policies of dynamic IoT devices.…”
Section: F Methodologies For Analyses Of Security Privacy and Trust In Smart M-iotmentioning
confidence: 99%
“…Content may change prior to final publication. mechanism for ensuring security in a network [104], [105].…”
Section: A Access Control and Authorization-based Frameworkmentioning
confidence: 99%
“…Recent technology advances have significantly pushed forward the development of ITS. The realistic influences and development prospects of ITS have been studied extensively [8][9][10][11][12][13][14][15][16][35][36][37]. Specifically, the adaptive cruise control (ACC) strategy and the Vehicle to Vehicle (V2V) communication have attracted considerable attention.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Traffic problems such as traffic accidents, congestion, and energy consumption have aroused wide concern in modern society [1][2][3][4][5][6][7]. Intelligent Transportation System (ITS) is considered to have great potential for solving these problems [8][9][10][11][12][13][14]. As an integral component of future ITS, Internet of Vehicles (IoV) enables the information exchange among vehicles, infrastructures and environment [15][16][17].…”
Section: Introductionmentioning
confidence: 99%
“…Assume that all sensors are acoustic sensors, that the observation of the sensor is the superposition of sound signals from multiple targets with ambient noise [9], and the observations of the individual sensors are independent of each other. Then, at time t, the energy of the sound signal received by the sensor s at position rs = [xs , ys] is:…”
Section: Measurement Modelmentioning
confidence: 99%