2016
DOI: 10.1007/s11277-016-3252-6
|View full text |Cite
|
Sign up to set email alerts
|

Performance Analysis of IEEE 802.11p in the Presence of Hidden Terminals

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
9
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 13 publications
0
9
0
Order By: Relevance
“…Hidden terminal collision in broadcast communication has been studied by many researchers such as [6], [10], and [13]- [18]. Sjoberg et al demonstrated the effect of hidden terminals on packet reception rate by using simulation [6].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Hidden terminal collision in broadcast communication has been studied by many researchers such as [6], [10], and [13]- [18]. Sjoberg et al demonstrated the effect of hidden terminals on packet reception rate by using simulation [6].…”
Section: Related Workmentioning
confidence: 99%
“…That results in high collision probability at the receiver. With the increase in the traffic density and channel congestion, the probability of hidden terminal collision increases faster than the access collisions [10]. The earlier literature [11] and [12] proposed algorithms to adapt the packet generation rate (beacon rate) to maintain fairness among the nodes and keep the channel busy ratio (CBR) under a threshold.…”
mentioning
confidence: 99%
“…For the broadcast analysis in VANETs, several works such as [12][13][14] have evaluated the saturation performance of safety messages broadcast in VANETs to calculate the throughput and delay for emergency and routine messages. Different from broadcast analysis in VANETs, the unicast performance analysis of IEEE 802.11p in the presence of hidden terminals under both saturated and unsaturated traffics was presented in [15]. The analytical model of VANETs including both broadcast and unicast analysis for safety and service applications, respectively, based on Markov chain model were introduced in [16].…”
Section: Introductionmentioning
confidence: 99%
“…The authors of [8][9][10][11][12][13][14][15][16] analyzed the performance of hidden terminals for IEEE 802.11p broadcast communication. [8,9].…”
Section: Introductionmentioning
confidence: 99%
“…Similarly, Fallah et al analyzed the hidden node interference for the performance of cooperative vehicle safety system in 1-D network [11]. Rathee et al analyzed the throughput of VANET with hidden terminals in smaller networks of 5 or 10 nodes [12]. Furthermore, Song presented an analytical model for the performance analysis of multichannel MAC in 1-D VANET with hidden terminals [13].…”
Section: Introductionmentioning
confidence: 99%