IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2018
DOI: 10.1109/infcomw.2018.8406819
|View full text |Cite
|
Sign up to set email alerts
|

On latency-aware tree topology construction for emergency responding VANET applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…Some researchers have selected a set of relay vehicles to rebroadcast EMs via multi-hop communications [10]- [23]. In addition, probabilistic flooding [26] and constructing tree topology [27], [28] have also been adopted as alternative schemes to mitigate the redundant message problem in VANETs.…”
Section: Related Workmentioning
confidence: 99%
“…Some researchers have selected a set of relay vehicles to rebroadcast EMs via multi-hop communications [10]- [23]. In addition, probabilistic flooding [26] and constructing tree topology [27], [28] have also been adopted as alternative schemes to mitigate the redundant message problem in VANETs.…”
Section: Related Workmentioning
confidence: 99%
“…VANETs offers many types of applications such as effective management applications [9][10][11] (route planning and urban traffic monitoring), cost-effective applications 12,13 (vehicle location-based services, shortest route planning, and so on), entertainment applications (audio and video sharing, Internet facility, social networking, and so on) and security applications [14][15][16][17] (rear vehicle warning, road status information, road ice testing, and so on). Moreover, the communications among vehicles in the wireless environment are simply targeted when they are sharing sensitive information with other vehicles in that group.…”
Section: Related Workmentioning
confidence: 99%
“…), information entertainment applications (video sharing, social networks, etc. ), and security applications [12,13,14,15] (rear end warning, road ice testing, etc.). However, the vehicles communicating in the wireless network are easily attacked, particularly when the vehicles have private messages to be shared with others in the same group.…”
Section: Related Workmentioning
confidence: 99%