2004
DOI: 10.1007/978-3-540-24643-5_2
|View full text |Cite
|
Sign up to set email alerts
|

CGGC: Cached Greedy Geocast

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
21
0

Year Published

2005
2005
2020
2020

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 30 publications
(22 citation statements)
references
References 7 publications
1
21
0
Order By: Relevance
“…We assume that the nodes in the VANET use a location-based routing protocol like the one described in Reference [9]. This implies that every node is able to determine its current position, for example, by using a (D)GPS receiver.…”
Section: Fig 2 Position Verification Sensors Overviewmentioning
confidence: 99%
See 2 more Smart Citations
“…We assume that the nodes in the VANET use a location-based routing protocol like the one described in Reference [9]. This implies that every node is able to determine its current position, for example, by using a (D)GPS receiver.…”
Section: Fig 2 Position Verification Sensors Overviewmentioning
confidence: 99%
“…In case that no suitable next hop is available when a packet has to be forwarded, the recovery strategy is based on caching, that is, packets are stored locally until either a suitable neighbor is reachable or until the node is forced to drop the packet due to packet queue overflow. Details of this geographic routing approach have been studied in Reference [9].…”
Section: Geographic Routingmentioning
confidence: 99%
See 1 more Smart Citation
“…We have based our analysis on the Cached Greedy Geocast (CGGC) routing protocol [12] which has been developed as part of the Fleetnet project. With CGGC, nodes periodically announce their identifier and current location using beacon messages.…”
Section: Effects Of Pseudonym Changes On Geographic Routing a Romentioning
confidence: 99%
“…The deployed recovery strategy is based on a caching approach, i.e. packets are stored locally until either a suitable neighbor is reachable or until the node decides to drop the packet (see [10]). Besides ordinary routing, we also have to integrate a model of maliciously acting nodes.…”
Section: Simulation Environmentmentioning
confidence: 99%