2014
DOI: 10.1016/j.vehcom.2014.09.001
|View full text |Cite
|
Sign up to set email alerts
|

A survey on data dissemination in vehicular ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
73
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 126 publications
(73 citation statements)
references
References 14 publications
0
73
0
Order By: Relevance
“…There are two sigmoid functions which calculate the trust by comparing reporting vehicle's MDS value with the threshold value λ. If the vehicle believes that the event has happened, then it calculates the trust using Equation (1).…”
Section: Trust Based On Deviation From Threshold Valuementioning
confidence: 99%
See 1 more Smart Citation
“…There are two sigmoid functions which calculate the trust by comparing reporting vehicle's MDS value with the threshold value λ. If the vehicle believes that the event has happened, then it calculates the trust using Equation (1).…”
Section: Trust Based On Deviation From Threshold Valuementioning
confidence: 99%
“…Majority of the safety applications, developed for Vehicular Adhoc Network (VANET), work by exchange of relevant information or data dissemination [1] among the peers in observing vehicle's close proximity. Several cryptographic primitives [2] have been proposed to provide message integrity, entity authentication and non-repudiation.…”
Section: Introductionmentioning
confidence: 99%
“…Query Based Data Expiry Model: This model is used to delete or update the data by using the queries [14]. By just sending a query to the client storage, the routing information can be removed that was updated.…”
Section: A Data Expiration Modelmentioning
confidence: 99%
“…By exploiting the moderately delay-tolerant nature of traffic message propagation, an analytical model based on a traditional bidirectional highway scene was presented by Agarwal et al [14]. Furthermore, Chaqfeh et al [15], surveyed the family of information broadcasting techniques relying both on data caching and on redundancy reduction. In [16], Panichpapiboon et al reduced the delivery overhead by selecting only a subset of relay nodes for rebroadcasting information based on positioning information.…”
Section: Introductionmentioning
confidence: 99%