نتایج جستجو برای: v2v

تعداد نتایج: 741  

Journal: :Ad Hoc & Sensor Wireless Networks 2016
Kanika Grover Alvin S. Lim Seungbae Lee Qing Yang

Vehicular Ad hoc Networks (VANETs) authentication schemes need to consider mobility and rapidly changing topologies in addition to an unreliable wireless channel communication. IEEE 1609.2, VANET security standard, suggests Elliptic Curve Digital Signature Algorithm (ECDSA) for the authentication of Vehicleto-Vehicle (V2V) messages. However, it has the drawback of expensive computations for ver...

2015
Walid Elbreiki Adib Habbal Suhaidi Hassan Suki Arif

Researchers have proposed several content dissemination techniques for addressing the massive growth in content exchange. Named Data Networking (NDN) is one of the novel ideas in which networks use named data for content dissemination instead of host identities. In NDN, the content itself is presented in the network layer based on user interests. The use of NDN in Vehicle-to-Vehicle (V2V) commu...

2018
Yiqiao Wei Jingjun Chen Seung-Hoon Hwang

For vehicle-to-vehicle (V2V) communication, such issues as continuity and reliability still have to be solved. Specifically, it is necessary to consider a more scalable physical layer due to the high-speed mobility of vehicles and the complex channel environment. Adaptive transmission has been adapted in channel-dependent scheduling. However, it has been neglected with regards to the physical t...

2012
Vishanth Weerakkody Ramzi El-Haddadeh Ioannis P. Chochliouros Donal Morris

The LiveCity Project effort intends to create a city-based “Living Lab” and associated ecosystem to pilot live interactive high-definition video-tovideo (v2v) on ultrafast wireless and wireline Internet infrastructure for the support of appropriate public service use cases among a number of city user communities initially in four major European cities. The essential aim is to empower the citize...

2016
Po-Jen Chuang Ming-Chun Liu

We present a new routing protocol in this paper to enhance junction-based routing for vehicle-to-vehicle (V2V) vehicular ad-hoc networks (VANETs). Employing effective routing table learning and maintenance, the new protocol is able to accomplish better transmission stability and lower transmission cost. In practice, the mechanism of routing table learning will help a vehicle establish its own s...

2014
Manjot Singh

VANETS is the most popular network which is called Vehicular Ad Hoc Network. The researchers make a lot of work in this network. From the Literature review, VANETs works on the basis of real time system where the vehicles are moving nodes and travel with a very high speed on the roads in the urban areas. There are many security issues like authentication, tunnel attacks, intelligent system appr...

2013
Ioannis P. Chochliouros Rod McCall Andrei Popleteev Tigran Avanesov Tomas Kamarauskas Anastasia S. Spiliopoulou Evangelos Sfakianakis Evangelia M. Georgiadou Nikoletta Liakostavrou Ioannis Kampourakis Ioannis M. Stephanakis

Based upon the core concept of the LiveCity Project we focus on the specific City Cultural Experiences v2v Pilot, designed to allow for visitors at two defined locations to interact with one another in a joint experience and to get educational/entertainment benefits, originating directly from the museum content delivery. We discuss a set of semi-pervasive games (the so-called “Twin Cities” game...

Journal: :Procedia Computer Science 2016

2015
Abhay Deep Seth

The Networks of vehicles moving on the road are considered as Vehicular Ad Hoc Networks (VANETs). The relative speed of the vehicles may be up to 300 km/hr and the number of nodes is very high. In Vehicular Ad Hoc Networks (VANETs) the nodes movement is bounded to road topology. In VANET the link breakage can be avoided with the help of the mobility pattern knowledge for neighbor nodes. In this...

2009
André Weimerskirch Kai Schramm Lars Wolleschensky Thomas Wollinger

It is foreseen that vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication systems will be deployed in the next decade. Data security is an enabler for V2V and V2I communication, because the authenticity, integrity and confidentiality of exchanged network traffic must be guaranteed, especially since these messages will certainly be used for safety applications. Furthermore, ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید