2008
DOI: 10.1109/comst.2008.4625806
|View full text |Cite
|
Sign up to set email alerts
|

Vehicle Ad Hoc networks: applications and related technical issues

Abstract: International audienceThis article presents a comprehensive survey of the state-of-the-art for vehicle ad hoc networks. We start by reviewing the possible applications that can be used in VANETs, namely, safety and user applications, and by identifying their requirements. Then, we classify the solutions proposed in the literature according to their location in the open system interconnection reference model and their relationship to safety or user applications. We analyze their advantages and shortcomings and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
235
0
5

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 580 publications
(240 citation statements)
references
References 52 publications
0
235
0
5
Order By: Relevance
“…As this would be unsafe for human drivers, autonomous vehicular cooperative control will be required. The platoons of autonomous vehicles have attracted extensive interests in intelligent vehicle highway systems (IVHS) or automated highway/vehicle systems (AHVS) due to its potential to largely benefit the road traffic [1][2][3]. Up to now, control of platoon of vehicles has been researched in different aspects and from different viewpoints [4].…”
Section: Introductionmentioning
confidence: 99%
“…As this would be unsafe for human drivers, autonomous vehicular cooperative control will be required. The platoons of autonomous vehicles have attracted extensive interests in intelligent vehicle highway systems (IVHS) or automated highway/vehicle systems (AHVS) due to its potential to largely benefit the road traffic [1][2][3]. Up to now, control of platoon of vehicles has been researched in different aspects and from different viewpoints [4].…”
Section: Introductionmentioning
confidence: 99%
“…Receivers need to be assured that received information is from a trusted source and message content is not tampered with. Although certificate authorities can be used to secure VANETs, this may compete with privacy issues (Toor et al, 2008). From the application and economic perspective, there are other issues to be addressed.…”
Section: A Brief Review Of Vehicular Ad Hoc Networkmentioning
confidence: 99%
“…Typically, applications are categorized as safety, traffic efficiency, and infotainment (Hartenstein and Laberteaux, 2008;Toor et al, 2008;Yousefi et al, 2006). In this section, some of these applications and their requirements are briefly discussed.…”
Section: Applications and Their Technical Requirementsmentioning
confidence: 99%
“…Authenticating a sender with checking duplicate received data prevents replay attacks. Assuring the message confidentiality can be the countermeasure against tracking when an attacker does not have a valid wireless device [5]- [7].…”
Section: Introductionmentioning
confidence: 99%
“…ITS applications transmit the data by road-to-vehicle communication (RVC) and inter-vehicle communication (IVC) [1]- [3]. The RVC and IVC suffer from the potential security threats such as forgery [4], [5], sending invalid data [4]- [7], replay attacks [4], and tracking [5]- [7]. The countermeasures against forgery and sending invalid data are to authenticate a sender and to provide message integrity.…”
Section: Introductionmentioning
confidence: 99%