The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Innovative ways to use ad hoc networking between vehicles are an active research topic and numerous proposals have been made for applications that make use of it. Due to the bandwidth-limited wireless communication medium, scalability is one crucial factor for the success of these future protocols. Data aggregation is one solution to accomplish such scalability. The goal of aggregation is to semantically...
One often cited use case for vehicular networks are applications that relate to emergency vehicles. In addition to the traditional siren, they could use radio communication to warn other vehicles or to preempt traffic lights. Such an application can reduce accident risks during emergency response trips and also help save valuable time. We outline a comprehensive design of such an emergency vehicle...
Vehicle-to-vehicle/vehicle-to-infrastructure (V2X) communication systems are envisioned to greatly improve road safety, traffic efficiency, and driver convenience. However, many V2X applications rely on continuous and detailed location information, which raises location privacy concerns. A multitude of privacy-protection mechanisms have been proposed in recent years. However, few efforts have been...
The emerging vehicle-to-vehicle/vehicle-to-infrastructure (V2X) communication systems enable a new way of collaboration among the vehicles, the operators of transportation systems, and the service providers. However, many functionalities of V2X systems rely on detailed location information. This raises concerns on location privacy of the users of such systems. Although privacy protection mechanisms...
Efficient information dissemination is one of the challenging tasks in most ad-hoc network application domains, be it in wireless sensor networks, mobile ad-hoc networks, or vehicular ad-hoc networks. It is obvious, that flooding has a high communication overhead, leading to channel congestion and packet collisions. Therefore, more efficient dissemination mechanisms were investigated and proposed...
Mechanisms for information dissemination are essential for many applications in vehicular ad-hoc networks (VANETs). Currently, simple flooding is often supposed to broadcast information within a geographic region, as for example in many geocast protocols. However, simple flooding has several drawbacks: every node rebroadcasting a message leads to redundancy, contention, and collision, to which is...
Pseudonyms are pseudonymous certificates, which are regarded as a silver bullet to meet the security and privacy requirements of vehicular communications. Most works so far assume that pseudonyms are readily available when they are needed. In this paper, we identify and compare two strategies to refill pseudonyms. We then propose the pseudonym-on-demand scheme, which is an implementation of one of...
This paper has shown that U2VAS fulfills all requirements of a truly modular and flexible communication stack for VANETs. Beyond the framework, the current implementation already contains several forms of communication, positioning and security mechanisms. We invite interested developers to join our effort and contribute to the further development of U2VAS.
One major issue in vehicular ad-hoc networks (VANETs) is efficient information dissemination. Flooding is widely used in VANETs for this task, but it has severe drawbacks due to the high communication complexity. One class of algorithms to overcome these problems is gossiping, where each node forwards a message with a certain probability. The main challenge in gossiping is the proper determination...
This article presents mobile encounter networks (MENs), which emerge when mobile devices come across each other and form a temporary connection between them using a common short-range radio technology. Local information exchanges between mobile devices results in a broadcast diffusion of information to other users of the network with a delay. Gasoline price comparison system (GPCS), which delivers...
Geocast refers to the distribution of messages within a geographic destination region. This makes it an important paradigm for the application to vehicular ad hoc networks (VANETs), because most safety-related information needs to be delivered to all vehicles in a certain area. As a central requirement for such safety applications, the protocol must be very robust against faults, regardless if caused...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.