2018
DOI: 10.1109/mvt.2017.2781539
|View full text |Cite
|
Sign up to set email alerts
|

The Battle of Technologies or the Battle of Business Models? [Connected Vehicles]

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 7 publications
0
10
0
Order By: Relevance
“…In prior work [1], [4], [27]- [31] researchers study and compare the adhoc V2X communications (e.g., DSRC/C-ITS) with LTE-V2X in terms of radio resource allocation, performance, standardization, use-cases, deployment issues, interoperability, etc. It is worth noting that, unlike the mature DSRC/C-ITS platforms, LTE-V2X technologies are still under development and the necessary trials/testing to support large number of vehicles in real environments for safety applications is not yet available [30], [32]. In this paper, we primarily focus on the security issues for the V2X communications based on DSRC/C-ITS -although we believe that many of those schemes can be transferred to LTE-V2X with limited (or no) modifications.…”
Section: B Network and Communication Modelmentioning
confidence: 99%
“…In prior work [1], [4], [27]- [31] researchers study and compare the adhoc V2X communications (e.g., DSRC/C-ITS) with LTE-V2X in terms of radio resource allocation, performance, standardization, use-cases, deployment issues, interoperability, etc. It is worth noting that, unlike the mature DSRC/C-ITS platforms, LTE-V2X technologies are still under development and the necessary trials/testing to support large number of vehicles in real environments for safety applications is not yet available [30], [32]. In this paper, we primarily focus on the security issues for the V2X communications based on DSRC/C-ITS -although we believe that many of those schemes can be transferred to LTE-V2X with limited (or no) modifications.…”
Section: B Network and Communication Modelmentioning
confidence: 99%
“…In this case, we consider at time instant n, vehicle l can acquire the time-of-arrival (ToA) measurement τ (l ) n from the signal delay and the angle-of-arrival (AoA) measurement θ (l ) n from the directional beam of the ULA. 5 The state variable u (l ) n = [u (l ) x,n , u (l ) y,n ] T denotes the location of vehicle l at time n. Thus, the observation r (l ) n can be written as…”
Section: A Case I: Target Trackingmentioning
confidence: 99%
“…Different from the target tracking problem where the target location is a continuous random variable, using the MMSE estimation for discrete random variables is generally suboptimal. Therefore, we consider the MAP estimator in (5) that the estimate of the message is given bŷ…”
Section: B Case Ii: Network Decodingmentioning
confidence: 99%
See 1 more Smart Citation
“…Cooperative Intelligent Transport Systems are networks designed to provide a variety of benefits [5], [6]. These include improved road-safety, greener driving through improved traffic management, support for partially autonomous vehicles, and infotainment services such as traffic information services.…”
Section: Introductionmentioning
confidence: 99%