16
Views
3
CrossRef citations to date
0
Altmetric
Articles

Beacon inter-reception time based adaptive beaconing (BIRA) for congestion-aware vehicular networks

&

References

  • Campolo, C., Molinaro, A., Scopigno, R. (eds.): Vehicular Ad Hoc Networks - Standards, Solutions, and Research. Springer (2015)
  • Sattari, M.R.J., Noor, R.M., Keshavarz, H.: A taxonomy for congestion control algorithmsin vehicular ad hoc networks. In: 2012 IEEE International Conference on Communication,Networks and Satellite (ComNetSat), pp. 44–49. IEEE (2012)
  • Zhang, W., Festag, A., Baldessari, R., Le, L.: Congestion control for safety messages in vanets:concepts and framework. In: 8th International Conference on ITS Telecommunications, ITST2008, pp. 199–203. IEEE (2008)
  • Math, C.B.; Li, H.; de Groot, S.H.; Niemegeers, I.G. V2X Application-Reliability Analysis of Data-Rate andMessage-Rate Congestion Control Algorithms. IEEE Commun. Lett. 2017, 21, 1285–1288. doi: 10.1109/LCOMM.2017.2675899
  • Sepulcre, M.; Gozalvez, J.; Altintas, O.; Kremo, H. Integration of Congestion and Awareness Control in Vehicular Networks. Ad Hoc Netw. 2016, 37, 29–43. doi: 10.1016/j.adhoc.2015.09.010
  • Breu, J.; Brakemeier, A.; Menth, M. A Quantitative Study of Cooperative Awareness Messages in Production VANETs. EURASIP J. Wirel. Commun. Netw. 2014, 2014, 98.
  • Rostami, A.; Cheng, B.; Bansal, G.; Sjöberg, K.; Gruteser, M.; Kenney, J.B. Stability Challenges and Enhancements for Vehicular Channel Congestion Control Approaches. IEEE Trans. Intell. Transp. Syst. 2016,17, 2935–2948. doi: 10.1109/TITS.2016.2531048
  • Banani, S.; Gordon, S.; Thiemjarus, S.; Kittipiyakul, S. Verifying Safety Messages Using Relative-Time and Zone Priority in Vehicular Ad Hoc Networks. Sensors 2018, 18, 1195. doi: 10.3390/s18041195
  • Renda, M.E.; Resta, G.; Santi, P.; Martelli, F.; Franchini, A. IEEE 802.11p VANets: Experimental Evaluation of Packet Inter-Reception Time. Comput. Commun. 2016, 75, 26–38. doi: 10.1016/j.comcom.2015.06.003
  • Liu, X.; Jaekel, A. Congestion Control in V2V Safety Communication: Problem, Analysis, Approaches.Electronics 2019, 8, 540. doi: 10.3390/electronics8050540
  • Son, S., & Park, K. J. (2019). BEAT: Beacon Inter-Reception Time Ensured Adaptive Transmission for Vehicle-to-Vehicle Safety Communication. Sensors, 2019, 19(14), 3061. doi: 10.3390/s19143061
  • European Telecommunications Standards Institute (ETSI). ETSI-TR 101 612, Intelligent Transport Systems (ITS), Cross Layer DCC Management Entity for Operation in the ITS G5A and ITS G5B Medium, Report on CrossLayer DCC Algorithms and Performance Evaluation, V1.1.1; ETSI: Valbonne, France, 2014.
  • European Telecommunications Standards Institute (ETSI). ETSI-TS 102 687, Intelligent Transport Systems (ITS), Decentralized Congestion Control Mechanisms for Intelligent Transport Systems Operating in the 5 GHz Range, Access Layer Part, V1.1.1; ETSI: Valbonne, France, 2011.
  • Khan, Tayyab, Karan Singh, Mohamed Abdel-Basset, Hoang Viet Long, Satya P. Singh, and Manisha Manjul. “A Novel and Comprehensive Trust Estimation Clustering-Based Approach for Large Scale Wireless Sensor Networks.” IEEE Access, vol. 7, pp. 58221-58240, (2019). doi: 10.1109/ACCESS.2019.2914769
  • Mišić, J., & Udayshankar, R. (2008). Analysis of cluster interconnection schemes in 802.15. 4 beacon enabled networks. International Journal of Distributed Sensor Networks, 4(2), 155-175. doi: 10.1080/15501320802001200
  • Rashman, L., Downe, J., & Hartley, J. (2005). Knowledge creation and transfer in the beacon scheme: Improving services through sharing good practice. Local Government Studies, 31(5), 683-700. doi: 10.1080/03003930500293732
  • Kush, Ashwani, Phalguni Gupta, and Ram Kumar. “Performance evaluation of associative based routing in Adhoc networks.” Journal of Interdisciplinary Mathematics 9, no. 2 (2006): 347-361. doi: 10.1080/09720502.2006.10700448
  • Joshi, Ashish, and Amar Kumar Mohapatra. “Authentication protocols for wireless body area network with key management approach.” Journal of Discrete Mathematical Sciences and Cryptography 22, no. 2 (2019): 219-240. doi: 10.1080/09720529.2019.1582869
  • Kumar, Ankit, and Madhavi Sinha. “Design and analysis of an improved AODV protocol for black hole and flooding attack in vehicular ad-hoc network (VANET).” Journal of Discrete Mathematical Sciences and Cryptography 22, no. 4 (2019): 453-463. doi: 10.1080/09720529.2019.1637151
  • Bai, Ting. “Traffic assignment in a tolled network with heterogeneous values of time and budgets on toll.” Journal of Discrete Mathematical Sciences and Cryptography 21, no. 2 (2018): 493-499. doi: 10.1080/09720529.2018.1449331
  • Kumar, Vinod, J. N. Kapur, and O. Hawaleshka. “On Throughput and Congestion Measures for Closed and Semi-Open Network of Queues Models for Flexible Manufacturing Systems.” Journal of Information and Optimization Sciences 8, no. 2 (1987): 119-139. doi: 10.1080/02522667.1987.10698881

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.