Skip to main content Accessibility help
×
Hostname: page-component-7c8c6479df-24hb2 Total loading time: 0 Render date: 2024-03-29T01:09:10.284Z Has data issue: false hasContentIssue false

References

Published online by Cambridge University Press:  18 December 2014

Christoph Sommer
Affiliation:
Universität Paderborn, Germany
Falko Dressler
Affiliation:
Universität Paderborn, Germany
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Vehicular Networking , pp. 325 - 347
Publisher: Cambridge University Press
Print publication year: 2014

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Abolhasan, M., Wysocki, T. & Dutkiewicz, E. (2004), ‘A review of routing protocols for mobile ad hoc networks’, Ad Hoc Networks 2(1), 1–22.CrossRefGoogle Scholar
Adams, C., Farrell, S., Krause, T. & Mononen, T. (2005), Internet X.509 Public Key Infrastructure Certificate Management Protocol (CMP), RFC 4210, IETF.
Ahmed, S., Karmakar, G. C. & Kamruzzaman, J. (2010), ‘An environment-aware mobility model for wireless ad hoc network’, Elsevier Computer Networks 54(9), 1470–1489.CrossRefGoogle Scholar
Ahn, J., Wang, Y., Yu, B., Bai, F. & Krishnamachari, B. (2012), RISA: Distributed road information sharing architecture, in 31st IEEE Conference on Computer Communications (INFOCOM 2012), IEEE, Orlando, FL, pp. 1494–1502.Google Scholar
Altintas, O., Seki, K., Kremo, H. et al. (2014), ‘Vehicles as information hubs during disasters: Glueing Wi-Fi to TV white space to cellular networks’, IEEE Intelligent Transportation Systems Magazine 6(1), 68–71.CrossRefGoogle Scholar
Amoroso, A., Marfia, G. & Roccetti, M. (2011), ‘Going realistic and optimal: A distributed multi-hop broadcast algorithm for vehicular safety’, Computer Networks 55(10), 2504–2519.CrossRefGoogle Scholar
Artimy, M. M., Robertson, W. & Phillips, W. J. (2005), Assignment of dynamic transmission range based on estimation of vehicle density, in 2nd ACM International Workshop on Vehicular Ad hoc Networks (VANET 2005), ACM, Cologne, p. 40.CrossRefGoogle Scholar
Asefi, M., Mark, J. & Shen, X. (2010), A cross-layer path selection scheme for video streaming over vehicular ad-hoc networks, in 72nd IEEE Vehicular Technology Conference (VTC2010-Fall), IEEE, Ottawa.Google Scholar
Aslam, B., Amjad, F. & Zou, C. (2012), Optimal roadside units placement in urban areas for vehicular networks, in IEEE Symposium on Computers and Communications (ISCC 2012), IEEE, Cappadocia pp. 423–429.Google Scholar
Atev, S., Masoud, O., Janardan, R. & Papanikolopoulos, N. P. (2004), Real-Time Collison Warning and Avoidance at Intersections, Technical Report Mn/DOT 2004-45, University of Minnesota, ITS Institute.
Atzori, L., Iera, A. & Morabito, G. (2010), ‘The Internet of Things: A survey’, Elsevier Computer Networks 54(15), 2787–2805.CrossRefGoogle Scholar
Autosar (2011), Specification of FlexRay Transport Layer, Specification R3.2 Rev 1 V2.4.0, Autosar.
Awad, A., German, R. & Dressler, F. (2009a), Efficient routing and service discovery in sensor networks using virtual cord routing, in 7th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys 2009), Demo Session, ACM, Kraków.
Awad, A., German, R. & Dressler, F. (2011), ‘Exploiting virtual coordinates for improved routing performance in sensor networks’, IEEE Transactions onMobile Computing 10(9), 1214–1226.Google Scholar
Awad, A., Shi, L. R., German, R. & Dressler, F. (2009b), Advantages of virtual addressing for efficient and failure tolerant routing in sensor networks, in 6th IEEE/IFIP Conference on Wireless on Demand Network Systems and Services (WONS 2009), IEEE, Snowbird, UT, pp. 111–118.Google Scholar
Awad, A., Sommer, C., German, R. & Dressler, F. (2008), Virtual Cord Protocol (VCP): A flexible DHT-like routing service for sensor networks, in 5th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2008), IEEE, Atlanta, GA, pp. 133–142.Google Scholar
Badescu, V. (2003), ‘Dynamic model of a complex system including PV cells, electric battery, electrical motor and water pump’, Elsevier Energy 28(12), 1165–1181.Google Scholar
Bahl, P., Chandra, R. & Dunagan, J. (2004), SSCH: Slotted Seeded Channel Hopping for capacity improvement in IEEE 802.11 ad-hoc wireless networks, in 10th Annual International Conference on Mobile Computing and Networking, ACM, Philadelphia, Pennsylvania, USA, pp. 216–230.Google Scholar
Bai, F. & Helmy, A. (2004), A survey of mobility models in wireless adhoc networks, in Wireless Ad Hoc and Sensor Networks, Kluwer Academic Publishers.Google Scholar
Barceló, J., ed. (2010), Fundamentals of Traffic Simulation, Springer.CrossRef
Barfield, W., Haselkorn, M., Spyridakis, J. & Conquest, L. (1989), Commuter behavior and decision-making: Designing motorist information systems, in 33rd Human Factors and Ergonomics Society Annual Meeting, Santa Monica, CA, pp. 611–614.Google Scholar
Barisani, A. & Daniele, B. (2007), Unusual car navigation tricks: Injecting RDS-TMC traffic information signals, in 8th CanSecWest Applied Technical Security Conference (CanSecWest 2007), Vancouver, BC.Google Scholar
Barr, R., Haas, Z. J. & van Renesse, R. (2005), ‘JiST: An efficient approach to simulation using virtual machines’, Software: Practice and Experience 35(6), 539–576.Google Scholar
Barrachina, J., Garrido, P., Fogue, M. & Martinez, F. J. (2012), D-RSU: A density-based approach for road side unit deployment in urban scenarios, in IEEE Intelligent Vehicles Symposium 2012, Workshops, IEEE, Alcala de Henares, Spain.Google Scholar
Basagni, S., Conti, M. & Stojmenovic, S. G. I., eds. (2004), Mobile Ad Hoc Networking, Wiley-IEEE.CrossRef
Bates, D. M. & Watts, D. G. (1988), Nonlinear Regression Analysis and Its Applications, Wiley.CrossRefGoogle Scholar
Bel Geddes, N. (1940), Magic Motorways, Random House.Google Scholar
Benslimane, A. (2004), Optimized dissemination of alarm messages in vehicular ad-hoc networks (VANET), in IEEE International Conference on High Speed Networks and Multimedia Communications (HSNMC 2004), Vol. LNCS 3079, Springer, Toulouse, pp. 655–666.Google Scholar
Bergenhem, C., Huang, Q., Benmimoun, A. & Robinson, T. (2010), Challenges of platooning on public motorways, in 17th World Congress on Intelligent Transport Systems, Busan.Google Scholar
Bloessl, B., Segata, M., Sommer, C. & Dressler, F. (2013a), An IEEE 802.11a/g/p OFDM receiver for GNU radio, in ACM SIGCOMM 2013, 2nd ACM SIGCOMM Workshop of Software Radio Implementation Forum (SRIF 2013), ACM, Hong Kong, pp. 9–16.Google Scholar
Bloessl, B., Segata, M., Sommer, C. & Dressler, F. (2013b), Decoding IEEE 802.11a/g/p OFDM in software using GNU radio, in 19th ACM International Conference on Mobile Computing and Networking (MobiCom 2013), Demo Session, ACM, Miami, FL, pp. 159–161.Google Scholar
Bloessl, B., Segata, M., Sommer, C. & Dressler, F. (2013c), Towards an open source IEEE 802.11p stack: A full SDR-based transceiver in GNU radio, in 5th IEEE Vehicular Networking Conference (VNC2013), IEEE, Boston, MA, pp. 143–149.Google Scholar
Bloom, B. H. (1970), ‘Space/time trade-offs in hash coding with allowable errors’, Communications of the ACM 13(7), 422–426.CrossRefGoogle Scholar
Boban, M., Meireles, R., Barros, J., Steenkiste, P. & Tonguz, O. (2014), ‘TVR – tall vehicle relaying in vehicular networks’, IEEE Transactions on Mobile Computing 13(5), 1118–1131.CrossRefGoogle Scholar
Boban, M., Vinhosa, T., Barros, J., Ferreira, M. & Tonguz, O. K. (2011), ‘Impact of vehicles as obstacles in vehicular networks’, IEEE Journal on Selected Areas in Communications (JSAC) 29(1), 15–28.CrossRefGoogle Scholar
Bosch (2012), CAN with Flexible Data-Rate, CAN FD Specification 1.0, Robert Bosch GmbH.
Bowyer, D. P., Akcelik, R. & Biggs, D. C. (1985), Guide to Fuel Consumption Analysis for Urban Traffic Management, ARRB Special Report 32, Australian Road Research Board.
Brannstrom, M., Coelingh, E. & Sjoberg, J. (2010), ‘Model-based threat assessment for avoiding arbitrary vehicle collisions’, IEEE Transactions on Intelligent Transportation Systems 11(3), 658–669.CrossRefGoogle Scholar
Braun, R., Busch, F., Kemper, C. et al. (2009), ‘TRAVOLUTION – Netzweite Optimierung der Lichtsignalsteuerung und LSA-Fahrzeug-Kommunikation’, Strassenverkehrstechnik 53, 365–374.Google Scholar
Brik, V., Banerjee, S., Gruteser, M. & Oh, S. (2008), Wireless device identification with radiometric signatures, in 13th ACM International Conference on Mobile Computing and Networking (MobiCom 2008), ACM, San Francisco, CA, pp. 116–127.Google Scholar
Buttyán, L., Holczer, T. & Vajda, I. (2007), On the effectiveness of changing pseudonyms to provide location privacy in VANETs, in 4th European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS 2007), Springer, Cambridge.Google Scholar
Cacciabue, P. C., ed. (2007), Modelling Driver Behaviour in Automotive Environments: Critical Issues in Driver Interactions with Intelligent Transport Systems, Springer.CrossRef
Caesar, M., Castro, M., Nightingale, E. B., O', Shea, G. & Rowstron, A. (2006), Virtual ring routing: Network routing inspired by DHTs, in ACM SIGCOMM2006, ACM, Pisa.Google Scholar
Cai, J. & Goodman, D. (1997), ‘General packet radio service in GSM’, IEEE Communications Magazine 35(10), 122–131.Google Scholar
Calandriello, G., Papadimitratos, P., Hubaux, J. P. & Lioy, A. (2007), Efficient and robust pseudonymous authentication in VANET, in 4th ACM International Workshop on Vehicular Ad Hoc Networks (VANET2007), ACM, Montreal, QC, pp. 19–28.Google Scholar
Caliskan, M., Graupner, D. & Mauve, M. (2006), Decentralized discovery of free parking places, in 3rd ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2006), ACM, Los Angeles, CA, pp. 30–39.Google Scholar
Camp, T., Boleng, J. & Davies, V. (2002), ‘A survey of mobility models for ad hoc network research’, Wireless Communications and Mobile Computing, Special Issue on Mobile Ad Hoc Networking: Research, rends and Applications 2(5), 483–502.Google Scholar
Cao, Y. & Sun, Z. (2013), ‘Routing in delay/disruption tolerant networks: A taxonomy, survey and challenges’, IEEE Communications Surveys and utorials 15(2), 654–677.Google Scholar
Capkun, S., Buttyan, L. & Hubaux, J.-P. (2003), SECTOR: Secure tracking of node encounters in multi-hop wireless networks, in 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN2003), ACM, Fairfax, VI, pp. 21–32.Google Scholar
Cappiello, A., Chabini, I., Nam, E., Lue, A. & Abou Zeid, M. (2002), A statistical model of vehicle emissions and fuel consumption, in IEEE Intelligent ransportation Systems Conference (I SC 2002), pp. 801–809.Google Scholar
Casetti, C., Dressler, F., Gerla, M. et al. (2013), Working Group on Heterogeneous Vehicular Networks, in Dagstuhl Seminar 13392 – Inter-Vehicular Communication – Quo Vadis, Wadern, pp. 201–204.Google Scholar
CCSDS (2010), Wireless Network Communications Overview for Space Mission Operations, Informational Report CCSDS 880.0-G-1, Consultative Committee for Space Data Systems.
Chang, S.-H., Lin, C.-Y., Hsu, C.-C., Fung, C.-P. & Hwang, J.-R. (2009), ‘The effect of a collision warning system on the driving performance of young drivers at intersections’, ransportation Research Part F: Traffic Psychology and Behaviour 12(5), 371–380.Google Scholar
Chau, C.-K., Crowcroft, J., Lee, K.-W. & Wong, S. H. Y. (2008), Inter-domain routing protocol for mobile ad hoc networks, in ACM SIGCOMM 2008, 3rd ACM International Workshop on Mobility in the Evolving Internet Architecture (MobiArch 2008), ACM, Seattle, WA, pp. 61–66.Google Scholar
Chaum, D. (1981), ‘Untraceable electronic mail, return addresses, and digital pseudonyms’, Communications ofthe ACM 24, 84–88.CrossRefGoogle Scholar
Chen, B. B. & Chan, M. C. (2009), MobTorrent: A framework for mobile internet access from vehicles, in 28th IEEE Conference on Computer Communications (INFOCOM 2009), IEEE, Rio de Janeiro.Google Scholar
Chen, H., Cao, L. & Logan, D. B. (2011a), ‘Investigation into the effect of an intersection crash warning system on driving performance in a simulator’, Traffic Injury Prevention 12(5), 529–537.CrossRefGoogle Scholar
Chen, K. & Ervin, R. D. (1990), ‘Intelligent vehicle-highway systems: U.S. activities and policy issues’, Technological Forecasting and Social Change 38(4), 363–374.CrossRefGoogle Scholar
Chen, S., Wyglinski, A. M., Pagadarai, S., Vuyyuru, R. & Altintas, O. (2011b), ‘Feasibility analysis of vehicular dynamic spectrum access via queueing theory model’, IEEE Communications Magazine 49(11), 156–163.CrossRefGoogle Scholar
Cheng, H., Cavedon, L., Dale, R. et al. (2008), Method and system for adaptive navigation using a driver's route knowledge, Patent US7424363 B2, Robert Bosch Corporation.
Chennikara-Varghese, J., Chen, W., Altintas, O. & Cai, S. (2006), Survey of routing protocols for inter-vehicle communications, in 3rd Annual International Conference on Mobile and Ubiquitous Systems: Networks and Services (MOBIQUITOUS 2006), pp. 1–5.Google Scholar
Chigan, C. & Li, J. (2007), A delay-bounded dynamic interactive power control algorithm for VANETs, in IEEE International Conference on Communications (ICC 2007), IEEE, Glasgow pp. 5849–5855.Google Scholar
Chu, Y.-C. & Huang, N.-F. (2007), Delivering of live video streaming for vehicular communication using peer-to-peer approach, in 26th IEEE Conference on Computer Communications (INFOCOM 2007): Mobile Networking for Vehicular Environments (MOVE 2007), pp. 1–6.Google Scholar
Collins, K. & Muntean, G.-M. (2008), A vehicle route management solution enabled by wireless vehicular networks, in 27th IEEE Conference on Computer Communications (INFO-COM 2008): Mobile Networking for Vehicular Environments (MOVE 2008), Poster Session, Phoenix, AZ.Google Scholar
Cooper, D., Santesson, S. et al. (2008), Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, Technical Report 5280, IETF.
Dahlman, E., Parkvall, S. & Sköld, J. (2011), 4G LTE/LTE-Advanced for Mobile Broadband, Academic Press.Google Scholar
Dahlman, E., Parkvall, S., Sköld, J. & Beming, P. (2008), 3G Evolution HSPA and LTE for Mobile Broadband, 2nd edn., Academic Press.Google Scholar
Davila, A. & Nombela, M. (2012), Platooning – Safe and eco-friendly mobility, in SAE 2012 World Congress & Exibition, SAE, Detroit, MI.Google Scholar
De, Couto, D. S. J., Aguayo, D., Chambers, B. A. & Morris, R. (2003), ‘Performance of multihop wireless networks: Shortest path is not enough’, ACM SIGCOMM Computer Communication Review 33(1), 83–88.Google Scholar
Dhoutaut, D., Régis, A. & Spies, F. (2006), Impact of radio propagation models in vehicular ad hoc networks simulations, in 3rd ACM International Workshop on Vehicular Ad Hoc Networks (VANET2006), ACM, Los Angeles, CA, pp. 40–49.Google Scholar
Di Felice, M., Doost-Mohammady, R., Chowdhury, K. & Bononi, L. (2012), ‘Smart radios for smart vehicles: Cognitive vehicular networks’, IEEE Vehicular Technology Magazine 7(2), 26–33.CrossRefGoogle Scholar
Dietrich, I. & Dressler, F. (2009), ‘On the lifetime of wireless sensor networks’, ACM Transactions on Sensor Networks 5(1), 1–39.CrossRefGoogle Scholar
Dingus, T., Hulse, M., Jahns, S. et al. (1996), Development of Human Factors Guidelines for Advanced Traveler Information Systems and Commercial Vehicle Operations: Literature Review, Report FHWA-RD-95-153, Federal Highway Administration.
Domazetovic, A., Greenstein, L. J., Mandayam, N. B. & Seskar, I. (2005), ‘Propagation models for short-range wireless channels with predictable path geometries’, IEEE Transactions on Communications 53(7), 1123–1126.CrossRefGoogle Scholar
Dressler, F. (2007), Self-Organization in Sensor and Actor Networks, John Wiley & Sons.CrossRefGoogle Scholar
Dressler, F., Awad, A. & Gerla, M. (2010), Inter-domain routing and data replication in virtual coordinate based networks, in IEEE International Conference on Communications (ICC 2010), IEEE, Cape Town.Google Scholar
Dressler, F., Awad, A., German, R. & Gerla, M. (2009), Enabling inter-domain routing in virtual coordinate based ad hoc and sensor networks, in 15th ACM International Conference on Mobile Computing and Networking (MobiCom 2009), Poster Session, ACM, Beijing.Google Scholar
Dressler, F., Gansen, T., Sommer, C. & Wischhof, L. (2008), Requirements and objectives for secure traffic information systems, in 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS 2008): 4th IEEE International Workshop on Wireless and Sensor Networks Security (WSNS 2008), IEEE, Atlanta, GA, pp. 808–814.Google Scholar
Dressler, F. & Gerla, M. (2013), ‘A framework for inter-domain routing in virtual coordinate based mobile networks’, ACM/Springer Wireless Networks 19(7), 1611–1626.CrossRefGoogle Scholar
Dressler, F., Hartenstein, H., Altintas, O. & Tonguz, O. K. (2014), ‘Inter-vehicle communication -quo vadis’, IEEE Communications Magazine 52(6), 170–177.CrossRefGoogle Scholar
Dressler, F., Kargl, F., Ott, J., Tonguz, O. K. & Wischhof, L. (2011a), ‘Research challenges in inter-vehicular communication – Lessons of the 2010 Dagstuhl Seminar’, IEEE Communications Magazine 49(5), 158–164.CrossRefGoogle Scholar
Dressler, F. & Sommer, C. (2010), On the impact of human driver behavior on intelligent transportation systems, in 71st IEEE Vehicular Technology Conference (VTC2010-Spring), IEEE, Taipei pp. 1–5.Google Scholar
Dressler, F., Sommer, C., Eckhoff, D. & Tonguz, O. K. (2011b), ‘Towards realistic simulation of inter-vehicle communication: Models, techniques and pitfalls’, IEEE Vehicular Technology Magazine 6(3), 43–51.CrossRefGoogle Scholar
Dupuy, A., Schwartz, J. & Yemini, Y. (1989), Nest: A network simulation prototyping testbed, in Winter Simulation Conference (WSC1989), IEEE, Washington, D.C., pp. 1058–1064.Google Scholar
Eckert, J., German, R. & Dressler, F. (2011), ‘An indoor localization framework for four-rotor flying robots using low-power sensor nodes’, IEEE Transactions on Instrumentation and Measurement 60(2), 336–344.CrossRefGoogle Scholar
Eckhoff, D., Dressler, F. & Sommer, C. (2013a), SmartRevoc: An efficient and privacy preserving revocation system using parked vehicles, in 38th IEEE Conference on Local Computer Networks (LCN2013), IEEE, Sydney pp. 855–862.Google Scholar
Eckhoff, D., Gansen, T., Mänz, R. et al. (2011a), Simulative performance evaluation of the simTD self organizing traffic information system, in 10th IFIP/IEEE Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2011), IEEE, Favignana Island, Sicily, pp. 79–86.Google Scholar
Eckhoff, D., Sofra, N. & German, R. (2013b), A performance study of cooperative awareness in ETSI ITS G5 and IEEE WAVE, in 10th IEEE/IFIP Conference on Wireless on Demand Network Systems and Services (WONS 2013), IEEE, Banff, pp. 196–200.Google Scholar
Eckhoff, D. & Sommer, C. (2014), ‘Driving for big data? Privacy concerns in vehicular networking’, IEEE Security and Privacy 12(1), 77–79.CrossRefGoogle Scholar
Eckhoff, D., Sommer, C. & Dressler, F. (2012), On the necessity of accurate IEEE 802.11p models for IVC protocol simulation, in 75th IEEE Vehicular Technology Conference (VTC2012-Spring), IEEE, Yokohama, pp. 1–5.Google Scholar
Eckhoff, D., Sommer, C., Gansen, T., German, R. & Dressler, F. (2010), Strong and affordable location privacy in VANETs: Identity diffusion using time-slots and swapping, in 2nd IEEE Vehicular Networking Conference (VNC 2010), IEEE, Jersey City, NJ, pp. 174–181.Google Scholar
Eckhoff, D., Sommer, C., Gansen, T., German, R. & Dressler, F. (2011b), ‘SlotSwap: Strong and affordable location privacy in intelligent transportation systems’, IEEE Communications Magazine 49(11), 126–133.CrossRefGoogle Scholar
Eckhoff, D., Sommer, C., German, R. & Dressler, F. (2011c), Cooperative awareness at low vehicle densities: How parked cars can help see through buildings, in IEEE Global Telecommunications Conference (GLOBECOM2011), IEEE, Houston, TX.Google Scholar
Egea-Lopez, E., Alcaraz, J., Vales-Alonso, J., Festag, A. & Garcia-Haro, J. (2013), ‘Statistical beaconing congestion control for vehicular networks’, IEEE Transactions on Vehicular Technology 62(9), 4162–4181.CrossRefGoogle Scholar
ETSI (1997), Selection Procedures for the Choice of Radio Transmission Technologies of the UMTS, TR 101 112 V3.1.0 (1997-11), European Telecommunications Standards Institute.
ETSI (2010a), Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 2: Specification of Cooperative Awareness Basic Service, TS 102 637-2 V1.1.1, European Telecommunications Standards Institute.
ETSI (2010b), Intelligent Transport Systems (ITS); Vehicular Communications; GeoNetworking; Part 1: Requirements, TS 102 636-1 V1.1.1, European Telecommunications Standards Institute.
ETSI (2011), Intelligent Transport Systems (ITS); Decentralized Congestion Control Mechanisms for Intelligent Transport Systems Operating in the 5 GHz Range; Access Layer Part, TS 102 687 V1.1.1, European Telecommunications Standards Institute.
ETSI (2012a), Intelligent Transport Systems (ITS); Framework for Public Mobile Networks in Cooperative ITS (C-ITS), Technical Report 102 962 V1.1.1, European Telecommunications Standards Institute.
ETSI (2012b), Introduction of the Multimedia Broadcast/Multicast Service (MBMS) in the Radio Access Network (RAN); Stage 2, TS 125 346 V11.0.0, European Telecommunications Standards Institute.
ETSI (2013a), Intelligent Transport Systems (ITS); Users and Applications Requirements; Part 1: Facility Layer Structure, Functional Requirements and Specifications, TS 102 894-1 V1.1.1, European Telecommunications Standards Institute.
ETSI (2013b), Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 2: Specification of Cooperative Awareness Basic Service, EN 302 637-2 V1.3.0, European Telecommunications Standards Institute.
ETSI (2013c), Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 3: Specification of Decentralized Environmental Notification Basic Service, Technical Report 302 637-3 V1.2.0, European Telecommunications Standards Institute.
Evans, L. (1991), Traffic Safety and the Driver, Van Nostrand Reinhold.Google Scholar
Fall, K. (2003), A delay-tolerant network architecture for challenged internets, in ACM SIGCOMM 2003, ACM, Karlsruhe pp. 27–34.Google Scholar
FCC (2002), Report, ET Docket 02-135, FCC Spectrum Policy Task Force.
Fellendorf, M. & Vortisch, P. (2010), Microscopic traffic flow simulator VISSIM, in J., Barceló, ed., Fundamentals of Traffic Simulation, Springer, pp. 63–93.Google Scholar
Fernandes, P. & Nunes, U. (2012), ‘Platooning with IVC-enabled autonomous vehicles: Strategies to mitigate communication delays, improve safety and traffic flow’, IEEE Transactions on Intelligent Transportation Systems 13(1), 91–106.CrossRefGoogle Scholar
Ferreira, M. & d'Orey, P. (2012), ‘On the impact of virtual traffic lights on carbon emissions mitigation’, IEEE Transactions on Intelligent Transportation Systems 13(1), 284–295.CrossRefGoogle Scholar
Ferreira, M., Fernandes, R., Conceição, H., Viriyasitavat, W. & Tonguz, O. K. (2010), Self-organized traffic control, in 7th ACM International Workshop on Vehicular Internetworking (VANET2010), ACM, Chicago, IL, pp. 85–90.Google Scholar
Ferreiro-Lage, J., Vazquez-Caderno, P., Galvez, J., Rubios, O. & Aguado-Agelet, F. (2010), Active safety evaluation in car-to-car networks, in 6th International Conference on Networking and Services (ICNS 2010), Cancún pp. 288–292.Google Scholar
Ferula, P. (2013), Assessing the impact of road-side units on distributed beacon-based traffic information systems, Master's thesis, University of Innsbruck.
Flury, R., Pemmaraju, S. V. & Wattenhofer, R. (2009), Greedy routing with bounded stretch, in 28th IEEE Conference on Computer Communications (INFOCOM 2009), IEEE, Rio de Janeiro.Google Scholar
Font, J., Iñigo, P., Domínguez, M., Sevillano, J. L. & Amaya, C. (2010), Architecture, design and source code comparison of ns-2 and ns-3 network simulators, in 2010 Spring Simulation Multiconference (SpringSim 2010), SCS, Orlando, FL.Google Scholar
Franklin, J., McCoy, D., Tabriz, P. et al. (2006), Passive data link layer 802.11 wireless device driver fingerprinting, in 15th USENIX Security Symposium, USENIX, Vancouver, BC, pp. 167–178.Google Scholar
Friis, H. (1946), ‘A note on a simple transmission formula’, Proceedings ofthe IRE 34(5), 254–256.Google Scholar
Gerlach, M. & Güttler, F. (2007), Privacy in VANETs using changing pseudonyms – ideal and real, in 65th IEEE Vehicular Technology Conference (VTC2007-Spring), Dublin, pp. 2521–2525.Google Scholar
Giordano, E., Frank, R., Ghosh, A., Pau, G. & Gerla, M. (2009), Two ray or not two ray this is the price to pay, in 6th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS 2009), Macau SAR, pp. 603–608.Google Scholar
Giordano, E., Frank, R., Pau, G. & Gerla, M. (2010), CORNER: A realistic urban propagation model for VANET, in 7th IEEE/IFIP Conference on Wireless On Demand Network Systems and Services (WONS 2010), Poster Session, IEEE, Kranjska Gora, Slovenia, pp. 57–60.Google Scholar
Gläser, S., Sommer, C., Gehlen, G. & Sories, S. (2008), ‘CoCar – Cooperative vehicle applications based on cellular communication systems’, ATZ Elektronik Worldwide 2008(5), 14–17.Google Scholar
Gozálvez, J., Sepulcre, M. & Bauza, R. (2012), ‘IEEE 802.11p vehicle to infrastructure communications in urban environments’, IEEE Communications Magazine 50(5), 176–183.CrossRefGoogle Scholar
Gradinescu, V., Gorgorin, C., Diaconescu, R., Cristea, V. & Iftode, L. (2007), Adaptive traffic lights using car-to-car communication, in 65th IEEE Vehicular Technology Conference (VTC2007-Spring), pp. 21–25.Google Scholar
Grossglauser, M. & Tse, D. N. C. (2002), ‘Mobility increases the capacity of ad hoc wireless networks’, IEEE/ACM Transations on Networking 10(4), 477–486.Google Scholar
Grossglauser, M. & Vetterli, M. (2006), ‘Locating mobile nodes with EASE: Learning efficient routes from encounter histories alone’, IEEE/ACM Transactions on Networking 14(3), 457–469.CrossRefGoogle Scholar
Guo, M., Ammar, M. H. & Zegura, E. W. (2005), ‘V3: A vehicle-to-vehicle live video streaming architecture’, Elsevier Pervasive and Mobile Computing 1(4), 404–424.Google Scholar
Gupta, P. & Kumar, P. (2000), ‘The capacity of wireless networks’, IEEE Transactions on Information Theory 46(2), 388–404.CrossRefGoogle Scholar
Haas, J. J., Hu, Y.-C. & Laberteaux, K. P. (2011), ‘Efficient certificate revocation list organization and distribution’, IEEE Journal on Selected Areas in Communications 29(3), 595–604.CrossRefGoogle Scholar
Härri, J., Cataldi, P., Krajzewicz, D. et al. (2011), Modeling and simulating ITS applications with iTETRIS, in 6th ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks (PM2HW2N 2011),ACM, Miami Beach, FL, pp. 33–40.Google Scholar
Härri, J., Filali, F. & Bonnet, C. (2009), ‘Mobility models for vehicular ad hoc networks: A survey and taxonomy’, IEEE Communications Surveys and Tutorials 11(4), 19–41.CrossRefGoogle Scholar
Hartenstein, H. & Laberteaux, K. P. (2008), ‘A tutorial survey on vehicular ad hoc networks’, IEEE Communications Magazine 46(6), 164–171.CrossRefGoogle Scholar
Hedrick, C. (1998), ‘Routing Information Protocol’, RFC 1058.
Hong, X., Xu, K. & Gerla, M. (2002), ‘Scalable routing protocols for mobile ad hoc networks’, IEEE Network 16, 11–21.Google Scholar
Housley, R. & Polk, T. (2001), Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure, 1st edn., John Wiley & Sons, Inc.
Huang, H.-Y., Luo, P.-E., Li, M. et al. (2007), ‘Performance evaluation of SUVnet with real-time traffic data’, IEEE Transactions on Vehicular Technology 56(6), 3381–3396.Google Scholar
Hubaux, J.-P., Čapkun, S. & Luo, J. (2004), ‘The security and privacy of smart vehicles’, IEEE Security and Privacy 2(3), 49–55.CrossRefGoogle Scholar
Hui, P., Chaintreau, A., Scott, J. et al. (2005), Pocket switched networks and human mobility in conference environments, in ACM SIGCOMM Workshop on Delay-Tolerant Networking (WDTN2005), ACM, Philadelphia, PA, pp. 244–251.Google Scholar
Hung, C.-C., Chan, H. & Wu, E.-K. (2008), Mobility pattern aware routing for heterogeneous vehicular networks, in IEEE Wireless Communications and Networking Conference (WCNC 2008), Las Vegas, NV, pp. 2200–2205.Google Scholar
Hwang, Y. & Varshney, P. (2003), An adaptive QoS routing protocol with dispersity for ad-hoc networks, in 36th Annual Hawaii International Conference on System Sciences (HICSS 2003), Big Island, Hawaii.Google Scholar
IEEE (2006), IEEE Trial-Use Standard for Wireless Access in Vehicular Environments (WAVE) – Resource Manager, Std 1609.1, IEEE.
IEEE (2007), Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Std 802.11-2007, IEEE.
IEEE (2010a), IEEE Standard for Wireless Access in Vehicular Environments (WAVE) – Networking Services, Std 1609.3, IEEE.
IEEE (2010b), Wireless Access in Vehicular Environments, Draft Standard P802.11p/D10.0, IEEE.
IEEE (2010c), Wireless Access in Vehicular Environments, Std 802.11p-2010, IEEE.
IEEE (2011), IEEE Standard for Wireless Access in Vehicular Environments (WAVE) – Multichannel Operation, Std 1609.4, IEEE.
IEEE (2013), IEEE Standard for Wireless Access in Vehicular Environments – Security Services for Applications and Management Messages, Technical Report 1609.2, IEEE.
ISO (2003a), Specification of the Radio Data System (RDS) for VHF/FM Sound Broadcasting in the Frequency Range from 87.5 to 108.0 MHz, Technical Report 62106, ISO.
ISO (2003b), Traffic and Traveller Information (TTI) – TTI Messages via Traffic Message Coding – Part 1: Coding Protocol for Radio Data System (RDS-TMC) using ALERT-C, Technical Report 14819-1, ISO.
ISO (2003c), Traffic and Traveller Information (TTI) – TTI Messages via Traffic Message Coding – Part 2: Event and Information Codes for Radio Data System – Traffic Message Channel (RDS-TMC), Technical Report 14819-2, ISO.
ITU (2013), The World in 2013, ICT Facts and Figures 2013, ITU Telecommunication Development Bureau.
ITU-R (2007), Propagation by Diffraction, Rec. P.526–10.
ITU-T (2000), Information Technology – Open Systems Interconnection – The Directory: Public-Key and Attribute Certificate Frameworks, Rec. X. 509.
Izal, M., Urvoy-Keller, G., Biersack, E. W. et al. (2004), Dissecting BitTorrent: Five months in a torrent's lifetime, in 10th International Workshop on Passive and Active Network Measurement (PAM2004), Vol. 3015 of LNCS, Antibes Juan-les-Pins.Google Scholar
Jetcheva, J. G., Hu, Y.-C., PalChaudhuri, S., Saha, A. K. & Johnson, D. B. (2003), Design and evaluation of a metropolitan area multitier wireless ad hoc network architecture, in 5th IEEE Workshop on Mobile Computing Systems and Applications, pp. 32–43.Google Scholar
Joerer, S., Dressler, F. & Sommer, C. (2012a), Comparing apples and oranges? Trends in IVC simulations, in 9th ACM International Workshop on Vehicular Internetworking (VANET 2012), ACM, Low Wood Bay, pp. 27–32.Google Scholar
Joerer, S., Segata, M., Bloessl, B. et al. (2012b), To crash or notto crash: Estimating its likelihood and potentials of beacon-based IVC Systems, in 4th IEEE Vehicular Networking Conference (VNC 2012), IEEE, Seoul, pp. 25–32.Google Scholar
Joerer, S., Segata, M., Bloessl, B. et al. (2014), ‘A vehicular networking perspective on estimating vehicle collision probability at intersections’, IEEE Transactions on Vehicular Technology 63(4), 1802–1812.CrossRefGoogle Scholar
Joerer, S., Sommer, C. & Dressler, F. (2012c), ‘Toward reproducibility and comparability of IVC simulation studies: A literature survey’, IEEE Communications Magazine 50(10), 82–88.CrossRefGoogle Scholar
Johnson, D. B., Hu, Y. & Maltz, D. A. (2007), ‘The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4’, RFC 4728.
Johnson, D. B. & Maltz, D. A. (1996), Dynamic source routing in ad hoc wireless networks, in T., Imielinski & H. F., Korth, eds., Mobile Computing, Kluwer Academic Publishers, pp. 152–181.Google Scholar
Johnson, D. B., Maltz, D. A. & Broch, J. (2001), DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks, in C. E., Perkins. ed., Ad Hoc Networking, Addison-Wesley, pp. 139–172.Google Scholar
Jootel, P. S. (2012), SAfe Road TRains for the Environment, final project report, SARTRE Project.
Jurgen, R. (1991), ‘Smart cars and highways go global’, IEEE Spectrum 28(5), 26–36.CrossRefGoogle Scholar
Kalman, R. (1960), ‘A new approach to linear filtering and prediction problems’, Transactions of the ASME Journal of Basic Engineering D(82), 35–45.Google Scholar
Karedal, J., Czink, N., Paier, A., Tufvesson, F. & Molisch, A. (2011), ‘Path loss modeling for vehicle-to-vehicle communications’, IEEE Transactions on Vehicular Technology 60(1), 323–328.CrossRefGoogle Scholar
Kargl, F., Ma, Z. & Schoch, E. (2006), Security engineering for VANETs, in 4th Workshop on Embedded Security in Cars (ESCAR 06), Berlin.Google Scholar
Kargl, F., Schoch, E., Wiedersheim, B. & Leinmüller, T. (2008), Secure and efficient beaconing for vehicular networks, in 5th ACM International Workshop on Vehicular Inter-Networking (VANET 2008), Poster Session, ACM, San Francisco, CA, pp. 82–83.Google Scholar
Karl, H. & Willig, A. (2005), Protocols and Architectures for Wireless Sensor Networks, John Wiley & Sons.CrossRefGoogle Scholar
Karp, B. & Kung, H. T. (2000), GPSR: Greedy perimeter stateless routing for wireless networks, in 6th ACM International Conference on Mobile Computing and Networking (MobiCom 2000), ACM, Boston, MA, pp. 243–254.Google Scholar
Kerner, B., Klenov, S. L. & Brakemeier, A. (2008), Testbed for wireless vehicle communication: A simulation approach based on three-phase traffic theory, in IEEE Intelligent Vehicles Symposium (IV2008), IEEE, Eindhoven pp. 180–185.Google Scholar
Khabbaz, M., Assi, C. & Fawaz, W. (2012), ‘Disruption-tolerant networking: A comprehensive survey on recent developments and persisting challenges’, IEEE Communications Surveys and Tutorials 14(2), 607–640.CrossRefGoogle Scholar
Kim, Y.-J., Govindan, R., Karp, B. & Shenker, S. (2005), Geographic routing made practical, in USENIX/ACM Symposium on Networked Systems Design and Implementation (NSDI 2005), USENIX, San Francisco, CA.Google Scholar
Klimin, N., Enkelmann, W., Karl, H. & Wolisz, A. (2004), A hybrid approach for location-based service discovery in vehicular ad hoc networks, in 1st International Workshop on Intelligent Transportation (WIT), Hamburg.Google Scholar
Klingler, F., Dressler, F., Cao, J. & Sommer, C. (2013), Use both lanes: Multi-channel beaconing for message dissemination in vehicular networks, in 10th IEEE/IFIP Conference on Wireless on Demand Network Systems and Services (WONS 2013), IEEE, Banff, pp. 162–169.Google Scholar
Kloiber, B., Härri, J. & Strang, T. (2012), Dice the TX power – Improving awareness quality in VANETs by random transmit power selection, in 4th IEEE Vehicular Networking Conference (VNC 2012), IEEE, Seoul, pp. 56–63.Google Scholar
Ko, Y.-B. & Vaidya, N. H. (2002), ‘Flooding-based geocasting protocols for mobile ad hoc networks’, Mobile Networks and Applications 7(6), 471–480.CrossRefGoogle Scholar
König, R., Saffran, A. & Breckle, H. (1994), Modelling of drivers’ behaviour, in Vehicle Navigation and Information Systems Conference, Yokohama-shi, pp. 371–376.Google Scholar
Köpke, A., Swigulski, M., Wessel, K. et al. (2008), Simulating wireless and mobile networks in OMNeT++ – The MiXiM vision, in 1st ACM/ICST International Conference on Simulation Tools and Techniques for Communications, Networks and Systems (SIMUTools 2008): 1st ACM/ICST International Workshop on OMNeT++ (OMNeT++ 2008), ACM, Marseille.Google Scholar
Korkmaz, G., Ekici, E. & Özgüner, F. (2006), An efficient fully ad-hoc multi-hop broadcast protocol for inter-vehicular communication systems, in IEEE International Conference on Communications (ICC 2006), Istanbul, pp. 423–428.Google Scholar
Koscher, K., Czeskis, A., Roesner, F. et al. (2010), Experimental security analysis of a modern automobile, in 2010 IEEE Symposium on Security and Privacy (SP 2010), Oakland, CA, pp. 447–462.Google Scholar
Krajzewicz, D., Erdmann, J., Behrisch, M. & Bieker, L. (2012), ‘Recent development and applications of SUMO – Simulation of Urban MObility’, International Journal on Advances in Systems and Measurements 5(3&4), 128–138.Google Scholar
Kunisch, J. & Pamp, J. (2008), Wideband car-to-car radio channel measurements and model at 5.9 GHz, in 68th IEEE Vehicular Technology Conference (VTC 2008-Fall), IEEE, Calgary, pp. 1–5.Google Scholar
Kurkowski, S., Camp, T. & Colagrosso, M. (2005), ‘MANET simulation studies: The incredibles’, ACM SIGMOBILE Mobile Computing and Communications Review 9(4), 50–61.CrossRefGoogle Scholar
Kwoczek, A., Raida, Z., Lacik, J. et al. (2011), Influence of car panorama glass roofs on car2car communication, in 3rd IEEE Vehicular Networking Conference (VNC 2011), Poster Session, IEEE, Amsterdam.Google Scholar
Kyasanur, P. & Vaidya, N. H. (2005), Capacity of multi-channel wireless networks: Impact of number of channels and interfaces, in 11th ACM International Conference on Mobile Computing and Networking (MobiCom 2005), ACM, Cologne, pp. 43–57.Google Scholar
Laberteaux, K. P., Haas, J. J. & Hu, Y.-C. (2008), Security certificate revocation list distribution for VANET, in 5th ACM International Workshop on Vehicular Inter-Networking (VANET 2008), ACM, San Francisco, CA, pp. 88–89.Google Scholar
Law, A. M. (2006), Simulation, Modeling and Analysis, 6th edn., McGraw-Hill.Google Scholar
Le, L., Festag, A., Baldessari, R. & Zhang, W. (2009), ‘Vehicular wireless short-range communication for improving intersection safety’, IEEE Communications Magazine 47(11), 104–110.Google Scholar
Lee, J. & Kim, C. M. (2010), A roadside unit placement scheme for vehicular telematics networks, in 2010 International Conference on Advances in Computer Science (ACS 2010), Springer, Berlin, pp. 196–202.Google Scholar
Lee, K. C., Lee, U. & Gerla, M. (2009), TO-GO: TOpology-assist Geo-Opportunistic routing in urban vehicular grids, in 6th IEEE/IFIP Conference on Wireless on Demand Network Systems and Services (WONS 2009), IEEE, Snowbird, UT, pp. 11–18.Google Scholar
Lee, K. C., Lee, U. & Gerla, M. (2010a), Survey of routing protocols in vehicular ad hoc networks, in M., Watfa, ed., Advances in Vehicular Ad-Hoc Networks: Developments and Challenges, IGIGlobal, pp. 149–170.Google Scholar
Lee, K., Haerri, J., Lee, U. & Gerla, M. (2007), Enhanced perimeter routing for geographic forwarding protocols in urban vehicular scenarios, in IEEE Global Telecommunications Conference (GLOBECOM 2007), 2nd IEEE Workshop on Automotive Networking and Applications (AutoNet 2007), IEEE, Washington, D.C., pp. 1–10.Google Scholar
Lee, K., Lee, U. & Gerla, M. (2010b), ‘Geo-opportunistic routing for vehicular networks’, IEEE Communications Magazine 48(5), 164–170.CrossRefGoogle Scholar
Lee, U., Lee, J., Park, J.-S. & Gerla, M. (2010c), ‘FleaNet: A virtual marketplace on vehicular networks’, IEEE Transactions on Vehicular Technology 59(1), 344–355.Google Scholar
Leen, G. & Heffernan, D. (2001), ‘Vehicles without wires’, Computing Control Engineering Journal 12(5), 205–211.CrossRefGoogle Scholar
Leinmüller, T., Maihöfer, C., Schoch, E. & Kargl, F. (2006), Improved security in geographic ad hoc routing through autonomous position verification, in 3rd ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2006), Los Angeles, CA, pp. 57–66.Google Scholar
Leong, B., Liskov, B. & Morris, R. (2007), Greedy virtual coordinates for geographic routing, in 15th IEEE International Conference on Network Protocols (ICNP 2007), Beijing, pp. 71–80.Google Scholar
Lequerica, I., Martinez, J. & Ruiz, P. (2010), Efficient certificate revocation in vehicular networks using NGN capabilities, in 72nd IEEE Vehicular Technology Conference Fall (VTC2010-Fall), IEEE, Ottawa, pp. 1–5.Google Scholar
Li, F. & Wang, Y. (2007), ‘Routing in vehicular ad hoc networks: A survey’, IEEE Vehicular Technology Magazine 2(2), 12–22.CrossRefGoogle Scholar
Li, M., Sampigethaya, K., Huang, L. & Poovendran, R. (2006), Swing & swap: User-centric approaches towards maximizing location privacy, in 5th ACM Workshop on Privacy in the Electronic Society, ACM, Alexandria, VA, pp. 19–28.Google Scholar
Lim, H.-T., Herrscher, D., Volker, L. & Waltl, M. (2011), IEEE 802.1AS time synchronization in a switched Ethernet based in-car network, in 3rd IEEE Vehicular Networking Conference (VNC2011), pp. 147–154.Google Scholar
Lim, J., Kim, W., Naito, K. et al. (2014), ‘Interplay between TVWS and DSRC: Optimal strategy for safety message dissemination in VANET’, IEEE Journal on Selected Areas in Communications 32(11), to be published.CrossRefGoogle Scholar
Lin, C.-H., Liu, B.-H., Yang, H.-Y., Kao, C.-Y. & Tasi, M.-J. (2008), Virtual-coordinate-based delivery-guaranteed routing protocol in wireless sensor networks with unidirectional links, in 27th IEEE Conference on Computer Communications (INFOCOM 2008), IEEE, Phoenix, AZ.Google Scholar
LIN Consortium (2010), Revision 2.2A, LIN Specification Package.
Litman, T. (2006), Parking management: Strategies, Evaluation and Planning, Victoria Transport Policy Institute.
Liu, K. & Abu-Ghazaleh, N. (2006), Aligned virtual coordinates for greedy routing in WSNs, in 3rd IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS 2006), IEEE, Vancouver, pp. 377–386.Google Scholar
Liu, N., Liu, M., Chen, G. & Cao, J. (2012), The sharing at roadside: Vehicular content distribution using parked vehicles, in 31st IEEE Conference on Computer Communications (INFOCOM 2012), Mini-Conference, IEEE, Orlando, FL.Google Scholar
Liu, N., Liu, M., Lou, W., Chen, G. & Cao, J. (2011), PVA in VANETs: Stopped cars are not silent, in 30th IEEE Conference on Computer Communications (INFOCOM2011), Mini-Conference, IEEE, Shanghai, pp. 431–435.Google Scholar
Liu, Y. & Ozguner, U. (2007), Human driver model and driver decision making for intersection driving, in IEEE Intelligent Vehicles Symposium (IV 07), IEEE, Istanbul, pp. 642–647.Google Scholar
Lochert, C., Mauve, M., Füssler, H. & Hartenstein, H. (2005), ‘Geographic routing in city scenarios’, ACM SIGMOBILE Mobile Computing and Communications Review 9(1), 69–72.CrossRefGoogle Scholar
Lochert, C., Scheuermann, B. & Mauve, M. (2007), Probabilistic aggregation for data dissemination in VANETs, in 4th ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2007), ACM, Montréal, Québec, pp. 1–8.Google Scholar
Lochert, C., Scheuermann, B., Wewetzer, C., Luebke, A. & Mauve, M. (2008), Data aggregation and roadside unit placement for a VANET traffic information system, in 5th ACM International Workshop on Vehicular Inter-Networking (VANET2008), ACM, San Francisco, CA, pp. 58–65.Google Scholar
Lownes, N. E. & Machemehl, R. B. (2006), VISSIM: A multi-parameter sensitivity analysis, in 38th Winter Simulation Conference (WSC '06), IEEE, Monterey, CA, pp. 1406–1413.Google Scholar
Loyola, L., Lichte, H., Aad, I., Widmer, J. & Valentin, S. (2008), Increasing the capacity of IEEE 802.11 wireless LAN through cooperative coded retransmissions, in 67th IEEE Vehicular Technology Conference (VTC2008-Spring), IEEE, Marina Bay, Singapore, pp. 1746–1750.Google Scholar
Lua, E. K., Crowcroft, J., Pias, M., Sharma, R. & Lim, S. (2005), ‘A survey and comparison of peer-to-peer overlay network schemes’, IEEE Communication Surveys and Tutorials 7(2), 72–93.Google Scholar
Luby, M. G., Mitzenmacher, M., Shokrollahi, M. A. & Spielman, D. A. (2001), ‘Efficient erasure correcting codes’, IEEE Transactions on Information Theory 47(2), 569–584.CrossRefGoogle Scholar
Ma, Z., Kargl, F. & Weber, M. (2009), Measuring location privacy in V2X communication systems with accumulated information, in 6th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS 2009), Macau SAR.Google Scholar
Malandrino, F., Casetti, C., Chiasserini, C.-F. & Fiore, M. (2011), Content downloading in vehicular networks: What really matters, in 30th IEEE Conference on Computer Communications (INFOCOM2011), Mini-Conference, IEEE, Shanghai, pp. 426–430.Google Scholar
Malandrino, F., Casetti, C. E., Chiasserini, C.-F., Sommer, C. & Dressler, F. (2012), Content downloading in vehicular networks: Bringing parked cars into the picture, in 23rd IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2012), IEEE, Sydney, pp. 1534–1539.Google Scholar
Mangel, T., Klemp, O. & Hartenstein, H. (2011a), A validated 5.9 GHz non-line-of-sight path-loss and fading model for inter-vehicle communication, in 11th International Conference on ITS Telecommunications (ITST 2011), IEEE, St. Petersburg, pp. 75–80.Google Scholar
Mangel, T., Schweizer, F., Kosch, T. & Hartenstein, H. (2011b), Vehicular safety communication at intersections: Buildings, non-line-of-sight and representative scenarios, in 8th IEEE/IFIP Conference on Wireless on Demand Network Systems and Services (WONS 2011), IEEE, Bardonecchia, pp. 35–41.Google Scholar
Mantler, A. & Snoeyink, J. (2000), Intersecting red and blue line segments in optimal time and precision, in Japanese Conference on Discrete and Computational Geometry (JCDCG 2000): Revised Papers, Springer, Tokyo.Google Scholar
Maraslis, K., Chatzimisios, P. & Boucouvalas, A. (2012), IEEE 802.11aa: Improvements on video transmission over wireless LANs, in IEEE International Conference on Communications (ICC 2012), IEEE, Ottawa, Ontario, pp. 115–119.Google Scholar
Matischek, R., Herndl, T., Grimm, C. & Haase, J. (2011), Real-time wireless communication in automotive applications, in IEEE/ACM Conference on Design, Automation, and Test in Europe (DATE 2011), IEEE, Grenoble.Google Scholar
Maurer, J., Fugen, T. & Wiesbeck, W. (2005), Physical layer simulations of IEEE802.11a for vehicle-to-vehicle communications, in 62th IEEE Vehicular Technology Conference (VTC2005-Fall), Dallas, TX, pp. 1849–1853.Google Scholar
Mauve, M., Widmer, J. & Hartenstein, H. (2001), ‘A survey on position-based routing in mobile ad-hoc networks’, IEEE Network 15(6), 30–39.CrossRefGoogle Scholar
Mecklenbräuker, C. F., Molisch, A. F., Karedal, J. et al. (2011), ‘Vehicular channel characterization and its implications for wireless system design and performance’, Proceedings of the IEEE 99(7), 1189–1212.CrossRefGoogle Scholar
Merali, Z. (2010), ‘Computational science: Error – Why scientific programming does not compute’, Nature 467(7317), 775–777.Google Scholar
Metcalfe, R. M. & Boggs, D. R. (1976), ‘Ethernet: Distributed packet switching for local computer networks’, Communications ofthe ACM 19(7), 395–404.CrossRefGoogle Scholar
Mitola, J. & Maguire, Jr., G. Q. (1999), ‘Cognitive radio: Making software radios more personal’, IEEE Personal Communications 6(4), 13–18.CrossRefGoogle Scholar
Morency, C. & Trépanier, M. (2008), Characterizing Parking Spaces Using Travel Survey Data, TR 2008-15, CIRRELT.
Moser, S., Kargl, F. & Keller, A. (2007), Interactive realistic simulation of wireless networks, in 2nd IEEE/EG Symposium on Interactive Ray Tracing 2007 (RT 07), IEEE, Ulm, pp. 161–166.Google Scholar
MOST Cooperation (2010), MOST Media Oriented Systems Transport Multimedia and Control Networking Technology, MOST Specification Rev. 3.0 E2.
Nagel, R. & Eichler, S. (2008), Efficient and realistic mobility and channel modeling for VANET scenarios using OMNeT++ and INET-framework, in 1st ACM/ICST International Conference on Simulation Tools and Techniques for Communications, Networks and Systems (SIMUTools 2008), ICST, Marseille pp. 1–8.Google Scholar
Nagurney, A., Qiang, Q. & Nagurney, L. S. (2008), Impact assessment of transportation networks with degradable links in an era of climate change, in 3rd International Conference on Funding Transportation Infrastructure, Paris.Google Scholar
Nakamura, R. & Kajiwara, A. (2012), Empirical study on 60 GHz in-vehicle radio channel, in 2012 IEEE Radio and Wireless Symposium (RWS 2012), IEEE, Santa Clara, CA, pp. 327–330.Google Scholar
Nash, Jr, J. (1950), ‘The bargaining problem’, Journal of the Economic Society (Econometrica) 18(2), 155–162.Google Scholar
Naumann, N., Schünemann, B., Radusch, I. & Meinel, C. (2009), Improving V2X simulation performance with optimistic synchronization, in 2009 IEEE Asia-Pacific Services Computing Conference (APSCC 2009), IEEE, Singapore pp. 52–57.Google Scholar
Naumov, V., Baumann, R. & Gross, T. (2006), An evaluation of inter-vehicle ad hoc networks based on realistic vehicular traces, in 7th ACM International Symposium on Mobile Ad Hoc Networking and Computing (Mobihoc 2006), ACM, Florence pp. 108–119.Google Scholar
Navas, J. C. & Imielinski, T. (1997), GeoCast – Geographic addressing and routing, in 3rd ACM International Conference on Mobile Computing and Networking (MobiCom 1997), Budapest pp. 66–76.Google Scholar
Negreira, J. A., Pereira, J., Pérez, S. & Belzarena, P. (2007), End-to-end measurements over GPRS-EDGE networks, in 4th International IFIP/ACM Latin American Conference on Networking (LANC ‘07), ACM pp. 121–131.Google Scholar
Neisser, U. (1976), Cognition and Reality: Principles and Implications of Cognitive Psychology, WH Freeman/Times Books/Henry Holt & Co.Google Scholar
Nekovee, M., Irnich, T. & Karlsson, J. (2012), ‘Worldwide trends in regulation of secondary access to white spaces using cognitive radio’, IEEE Wireless Communications 19(4), 32–40.CrossRefGoogle Scholar
Neudecker, T., An, N., Tonguz, O. K., Gaugel, T. & Mittag, J. (2012), Feasibility of virtual traffic lights in non-line-of-sight environments, in 9th ACM International Workshop on Vehicular Internetworking (VANET 2012), ACM, Low Wood Bay pp. 103–106.Google Scholar
Ni, S.-Y., Tseng, Y.-C., Chen, Y.-S. & Sheu, J.-P. (1999), The broadcast storm problem in a mobile ad hoc network, in 5th ACM International Conference on Mobile Computing and Networking (MobiCom 1999), Seattle, WA, pp. 151–162.Google Scholar
Noori, H. (2013), Modeling the impact of VANET-enabled traffic lights control on the response time of emergency vehicles in realistic large-scale urban area, in IEEE International Conference on Communications (ICC 2013), IEEE, Budapest.Google Scholar
Ott, J. & Kutscher, D. (2005), A disconnection-tolerant transport for drive-thru Internet environments, in 24th IEEE Conference on Computer Communications (INFOCOM 2005), Miami, FL.Google Scholar
Otto, J. S., Bustamante, F. E. & Berry, R. A. (2009), Down the block and around the corner – The impact of radio propagation on inter-vehicle wireless communication, in 29th International Conference on Distributed Computing Systems (ICDCS 2009), IEEE, Montréal, Québec pp. 605–614.Google Scholar
Palazzi, C. E., Roccetti, M., Ferretti, S., Pau, G. & Gerla, M. (2007), Online games on wheels: Fast game event delivery in vehicular ad-hoc networks, in IEEE Intelligent Vehicles Symposium 2007, 3rd International Workshop on Vehicle-to-Vehicle Communications, IEEE, Istanbul.Google Scholar
Papadimitratos, P., Buttyan, L., Holczer, T. et al. (2008a), ‘Secure vehicular communication systems: Design and architecture’, IEEE Communications Magazine 46(11), 100–109.CrossRefGoogle Scholar
Papadimitratos, P., Kung, A., Hubaux, J. & Kargl, F. (2006), Privacy and identity management for vehicular communication systems: A position paper, in 1st Workshop on Standards for Privacy in User-Centric Identity Management, Zurich.Google Scholar
Papadimitratos, P., Mezzour, G. & Hubaux, J.-P. (2008b), Certificate revocation list distribution in vehicular communication systems, in 5th ACM International Workshop on Vehicular InterNetworking (VANET 2008), ACM, San Francisco, CA, pp. 86–87.Google Scholar
Park, J.-S., Lee, U., Oh, S. Y., Gerla, M. & Lun, D. S. (2006), Emergency related video streaming in VANET using network coding, in 3rd ACM International Workshop on Vehicular Ad Hoc Networks (VANET2006), ACM, Los Angeles, CA, pp. 102–103.Google Scholar
Pawlikowski, K., Jeong, H.-D. & Lee, J.-S. R. (2002), ‘On credibility of simulation studies of telecommunication networks’, IEEE Communications Magazine 40(1), 132–139.CrossRefGoogle Scholar
Pecchia, E., Erman, D. & Popescu, A. (2009), Simulation and analysis of a combined mobility model with obstacles, in 2nd ACM/ICST International Conference on Simulation Tools and Techniques for Communications, Networks and Systems (SIMUTools 2009), ICST, Rome pp. 1–2.Google Scholar
Penny, T. (1999), Intersection Collision Warning System, Techbrief FHWA-RD-99-103, US DOT, Federal Highway Administration.
Perkins, C. E., Belding-Royer, E. M. & Das, S. R. (2003), Ad Hoc On-Demand Distance Vector (AODV) Routing, RFC 3561.
Perkins, C. E. & Bhagwat, P. (1994), ‘Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers’, Computer Communications Review pp. 234–244.Google Scholar
Perkins, C. E. & Royer, E. M. (1999), Ad hoc on-demand distance vector routing, in 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA pp. 90–100.Google Scholar
Perkins, C., Ratliff, S. & Dowdell, J. (2013), Dynamic MANET On-Demand (DYMO) Routing, Technical report, IETF.
Pfitzmann, A. & Köhntopp, M. (2000), Anonymity, unobservability, and pseudonymity – A proposal for terminology, in International Workshop on Design Issues in Anonymity and Unobservability, Vol. LNCS 2009, Springer, Berkeley, CA, pp. 1–9.Google Scholar
Piorkowski, M., Raya, M., Lugo, A. L. et al. (2007), TraNS: Joint traffic and network simulator, in 13th ACM International Conference on Mobile Computing and Networking (MobiCom 2007), Montréal, Quebec.Google Scholar
Ploeg, J., Scheepers, B., van Nunen, E., van de Wouw, N. & Nijmeijer, H. (2011), Design and experimental evaluation of cooperative adaptive cruise control, in IEEE International Conference on Intelligent Transportation Systems (ITSC 2011), IEEE, Washington, DC pp. 260–265.Google Scholar
Qiu, D. & Srikant, R. (2004), Modeling and performance analysis of BitTorrent-like peer-to-peer networks, in ACM SIGCOMM 2004, ACM, Portland, OR, pp. 367–378.Google Scholar
Rahmani, M., Pfannenstein, M., Steinbach, E., Giordano, G. & Biersack, E. (2009), Wireless media streaming over IP-based in-vehicle networks, in IEEE International Conference on Communications Workshops (ICC Workshops 2009), Dresden, pp. 1–6.Google Scholar
Rajamani, R., Tan, H.-S., Law, B. K. & Zhang, W.-B. (2000), ‘Demonstration of integrated longitudinal and lateral control for the operation of automated vehicles in platoons’, IEEE Transactions on Control Systems Technology 8(4), 695–708.CrossRefGoogle Scholar
Rakouth, H., Alexander, P., Brown, Jr., A. et al. (2012), V2X communication technology: Field experience and comparative analysis, in FISITA World Automotive Congress, Vol. LNEE 200, Springer, Beijing pp. 113–129.Google Scholar
Ranjan, R., Harwood, A. & Buyya, R. (2008), ‘Peer-to-peer-based resource discovery in global grids: A tutorial’, IEEE Communication Surveys and Tutorials 10(2), 6–33.CrossRefGoogle Scholar
Rao, A., Ratnasamy, S., Papadimitriou, C., Shenker, S. & Stoica, I. (2003), Geographic routing without location information, in 9th ACM International Conference on Mobile Computing and Networking (MobiCom 2003), San Diego, CA.Google Scholar
Rappaport, T. S. (2009), Wireless Communications: Principles and Practice, 2nd edn., Prentice Hall.Google Scholar
Ratnasamy, S., Francis, P., Handley, M., Karp, R. & Shenker, S. (2001), A scalable content-addressable network, in ACM SIGCOMM 2001, ACM, San Diego, CA, pp. 161–172.Google Scholar
Ratnasamy, S., Karp, B., Shenker, S. et al. (2003), ‘Data-centric storage in sensornets with GHT, a geographic hash table’, ACM/Springer Mobile Networks and Applications, Special Issue on Wireless Sensor Networks 8(4), 427–442.Google Scholar
Ratnasamy, S., Karp, B., Yin, L. et al. (2002), GHT: A geographic hash table for data-centric storage, in 1st ACM International Workshop on Wireless Sensor Networks and Applications (WSNA 2002), Atlanta, GA.Google Scholar
Raya, M., Papadimitratos, P., Aad, I., Jungels, D. & Hubaux, J.-P. (2007), ‘Eviction of misbehaving and faulty nodes in vehicular networks’, IEEE Journal on Selected Areas in Communications 25(8), 1557–1568.CrossRefGoogle Scholar
Raya, M., Shokri, R. & Hubaux, J.-P. (2010), On the tradeoff between trust and privacy in wireless ad hoc networks, in 3rd ACM Conference on Wireless Network Security (WiSec 2010), ACM, Hoboken, NJ pp. 75–80.Google Scholar
Rekhter, Y. & Li, T. (1995), ‘A Border Gateway Protocol 4 (BGP-4)’, RFC 1771.
Riaz, Z., Edwards, D. & Thorpe, A. (2006), ‘SightSafety: A hybrid information and communication technology system for reducing vehicle/pedestrian collisions’, Elsevier Automation in Construction 15(6), 719–728.CrossRefGoogle Scholar
Rivera-Lara, E. J., Herrerias-Hernandez, R., Perez-Diaz, J. A. & Garcia-Hernandez, C. F. (2008), Analysis of the relationship between QoS and SNR for an 802.11g WLAN, in International Conference on Communication Theory, Reliability, and Quality of Service (CTRQ 2008), IEEE, Bucharest pp. 103–107.Google Scholar
Rizzo, L. (1997), ‘Effective erasure codes for reliable computer communication protocols’, ACM SIGCOMM Computer Communication Review 27(2), 24–36.CrossRefGoogle Scholar
Rondinone, M., Maneros, J., Krajzewicz, D. et al. (2013), ‘iTETRIS: A modular simulation platform for the large scale evaluation of cooperative ITS applications’, Simulation Modelling Practice and Theory 34, 99–125.CrossRefGoogle Scholar
Rouf, I., Miller, R., Mustafa, H. et al. (2010), Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study, in 19th USENIX Security Symposium, USENIX Association, Washington, D.C.Google Scholar
Rybicki, J., Scheuermann, B., Kiess, W. et al. (2007), Challenge: Peers on wheels – A road to new traffic information systems, in 13th ACM International Conference on Mobile Computing and Networking (MobiCom 2007), Montreal, Quebec pp. 215–221.Google Scholar
Rybicki, J., Scheuermann, B., Koegel, M. & Mauve, M. (2009), PeerTIS – A peer-to-peer traffic information system, in 6th ACM International Workshop on Vehicular Inter-Networking (VANET2009), ACM, Beijing pp. 23–32.Google Scholar
SAE (2011), DSRC Message Communication Minimum Performance Requirements: Basic Safety Message for Vehicle Safety Applications, Draft Std. J2945.1 Revision 2.2, SAE Int. DSRC Committee.
Saha, A. K. & Johnson, D. B. (2004), Modeling mobility for vehicular ad-hoc networks, in 1st ACM Workshop on Vehicular Ad Hoc Networks (VANET 2004), Philadelphia, PA, pp. 91–92.Google Scholar
Salvo, P., Cuomo, F., Baiocchi, A. & Bragagnini, A. (2012), Road side unit coverage extension for data dissemination in VANETs, in 9th IEEE/IFIP Conference on Wireless on Demand Network Systems and Services (WONS 2012), IEEE, Courmayeur, Italy, pp. 47–50.Google Scholar
Sampigethaya, K., Huang, L., Li, M. et al. (2005), CARAVAN: Providing location privacy for VANET, in Embedded Security in Cars (ESCAR 2005), Tallinn.Google Scholar
Sarafijanovic-Djukic, N. & Grossglauser, M. (2004), Last encounter routing under random waypoint mobility, in IFIP NETWORKING 2004, Vol. LNCS 3042, Springer, Athens pp. 974–988.Google Scholar
Sastry, N., Shankar, U. & Wagner, D. (2003), Secure verification of location claims, in 2nd ACM Workshop on Wireless Security (WiSe 2003), ACM, San Diego, CA, pp. 1–10.Google Scholar
Schaub, F., Kargl, F., Ma, Z. & Weber, M. (2010), V-tokens for conditional pseudonymity in VANETs, in IEEE Wireless Communications and Networking Conference (WCNC 2010), IEEE, Sydney.Google Scholar
Scheuermann, B., Lochert, C., Rybicki, J. & Mauve, M. (2009), A fundamental scalability criterion for data aggregation in VANETs, in 15th ACM International Conference on Mobile Computing and Networking (MobiCom 2009), ACM, Beijing pp. 285–296.Google Scholar
Schmidt, R. K., Leinmüller, T., Schoch, E., Kargl, F. & Schäfer, G. (2010), ‘Exploration of adaptive beaconing for efficient intervehicle safety communication’, IEEE Network Magazine 24(1), 14–19.CrossRefGoogle Scholar
Schmitz, A. & Wenig, M. (2006), The effect of the radio wave propagation model in mobile ad hoc networks, in 9th ACM International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM 2006), ACM, Torremolinos, pp. 61–67.Google Scholar
Schneier, B. (1996), Applied Cryptography, 2nd edn., John Wiley & Sons.Google Scholar
Schoch, E. & Kargl, F. (2010), On the efficiency of secure beaconing in VANETs, in 3rd ACM Conference on Wireless Network Security (WiSec 2010), ACM, Hoboken, NJ pp. 111–116.Google Scholar
Schoch, E., Kargl, F., Leinmüller, T., Schlott, S. & Papadimitratos, P. (2006), Impact of pseudonym changes on geographic routing in VANETS, in 3rd European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS 2006), Vol. LNCS 4357, Springer, Hamburg.Google Scholar
Schünemann, B. (2011), ‘V2X simulation runtime infrastructure VSimRTI: An assessment tool to design smart traffic management systems’, Elsevier Computer Networks 55(14), 3189–3198.CrossRefGoogle Scholar
Schwartz, R. S., Ohazulike, A. E. & Scholten, H. (2012a), Achieving data utility fairness in periodic dissemination for VANETs, in 75th IEEE Vehicular Technology Conference (VTC2012-Spring), IEEE, Yokohama.Google Scholar
Schwartz, R. S., Ohazulike, A. E., Sommer, C. et al. (2012b), Fair and adaptive data dissemination for traffic information systems, in 4th IEEE Vehicular Networking Conference (VNC 2012), IEEE, Seoul pp. 1–8.Google Scholar
Schwartz, R. S., Ohazulike, A. E., Sommer, C. et al. (2014), ‘On the applicability of fair and adaptive data dissemination in traffic information systems’, Elsevier Ad Hoc Networks 13B, 428–443.Google Scholar
Segata, M. (2013), Novel communication strategies for platooning and their simulative performance analysis, in 1st GI/ITG KuVS Fachgesprach Inter-Vehicle Communication (FG-IVC 2013), Innsbruck.Google Scholar
Segata, M., Bloessl, B., Joerer, S. et al. (2014), Towards inter-vehicle communication strategies for platooning support, in 7th International Workshop on Communication Technologies for Vehicles, IEEE, Saint Petersburg, Russia.Google Scholar
Segata, M., Bloessl, B., Joerer, S. et al. (2013), Vehicle shadowing distribution depends on vehicle type: Results of an experimental study, in 5th IEEE Vehicular Networking Conference (VNC 2013), IEEE, Boston, MA, pp. 242–245.Google Scholar
Segata, M., Dressler, F., Lo Cigno, R. & Gerla, M. (2012), ‘A simulation tool for automated platooning in mixed highway scenarios’, ACM SIGMOBILE Mobile Computing and Communications Review 16(4), 46–49.Google Scholar
Serjantov, A. & Danezis, G. (2002), Towards an information theoretic metric for anonymity, in 2nd International Workshop on Privacy Enhancing Technologies (PET 2002), San Francisco, CA, pp. 259–263.Google Scholar
Shenker, S., Ratnasamy, S., Karp, B., Govindan, R. & Estrin, D. (2003), ‘Data-centric storage in sensornets’, ACM SIGCOMM Computer Communication Review 33(1), 137–142.CrossRefGoogle Scholar
Shenpei, Z. & Xinping, Y. (2008), Driver's route choice model based on traffic signal control, in 3rd IEEE Conference on Industrial Electronics and Applications (ICIEA 2008), IEEE, Singapore pp. 2331–2334.Google Scholar
Shladover, S. (2006), PATH at 20 – History and major milestones, in IEEE Intelligent Transportation Systems Conference (ITSC 2006), Toronto pp. 22–29.Google Scholar
simTD (2013), Final Report of Subproject 5, Deliverable D5.5 Part A.
Skordylis, A. & Trigoni, N. (2008), Delay-bounded routing in vehicular ad-hoc networks, in 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing (Mobihoc 2008), ACM, Hong Kong pp. 341–350.Google Scholar
Sommer, C., Dietrich, I. & Dressler, F. (2007), Realistic simulation of network protocols in VANET scenarios, in 26th IEEE Conference on Computer Communications (INFOCOM 2007): IEEE Workshop on Mobile Networking for Vehicular Environments (MOVE 2007), Poster Session, IEEE, Anchorage, AK pp. 139–143.Google Scholar
Sommer, C. & Dressler, F. (2007), The DYMO routing protocol in VANET scenarios, in 66th IEEE Vehicular Technology Conference (VTC2007-Fall), IEEE, Baltimore, MD, pp. 16–20.Google Scholar
Sommer, C. & Dressler, F. (2008), ‘Progressing toward realistic mobility models in VANET simulations’, IEEE Communications Magazine 46(11), 132–137.CrossRefGoogle Scholar
Sommer, C. & Dressler, F. (2011), Using the right two-ray model? A measurement based evaluation of PHY models in VANETs, in 17th ACM International Conference on Mobile Computing and Networking (MobiCom 2011), Poster Session, ACM, Las Vegas, NV.Google Scholar
Sommer, C., Eckhoff, D. & Dressler, F. (2010a), ‘Improving the accuracy of IVC simulation using crowd-sourced geodata’, Praxis der Informationsverarbeitung und Kommunikation (PIK) 33(4), 278–283.Google Scholar
Sommer, C., Eckhoff, D. & Dressler, F. (2014a), ‘IVC in cities: Signal attenuation by buildings and how parked cars can improve the situation’, IEEE Transactions on Mobile Computing, 13(8), 1733–1745.CrossRefGoogle Scholar
Sommer, C., Eckhoff, D., German, R. & Dressler, F. (2011a), A computationally inexpensive empirical model of IEEE 802.11p radio shadowing in urban environments, in 8th IEEE/IFIP Conference on Wireless on Demand Network Systems and Services (WONS 2011), IEEE, Bardonecchia, pp. 84–90.Google Scholar
Sommer, C., German, R. & Dressler, F. (2010b), Adaptive Beaconing for Delay-Sensitive and Congestion-Aware Traffic Information Systems, Technical Report CS-2010-01, University of Erlangen, Department of Computer Science.
Sommer, C., German, R. & Dressler, F. (2011b), ‘Bidirectionally coupled network and road traffic simulation for improved IVC analysis’, IEEE Transactions on Mobile Computing 10(1), 3–15.CrossRefGoogle Scholar
Sommer, C., Hagenauer, F. & Dressler, F. (2014b), A networking perspective on self-organizing intersection management, in IEEE World Forum on Internet ofThings (WF-IoT 2014), IEEE, Seoul pp. 230–234.Google Scholar
Sommer, C., Joerer, S. & Dressler, F. (2012), On the applicability of two-ray path loss models for vehicular network simulation, in 4th IEEE Vehicular Networking Conference (VNC 2012), IEEE, Seoul pp. 64–69.Google Scholar
Sommer, C., Joerer, S., Segata, M. et al. (2013), How shadowing hurts vehicular communications and how dynamic beaconing can help, in 32nd IEEE Conference on Computer Communications (INFOCOM 2013), Mini-Conference, IEEE, Turin pp. 110–114.Google Scholar
Sommer, C., Krul, R., German, R. & Dressler, F. (2010c), Emissions vs. travel time: Simulative evaluation of the environmental impact of ITS, in 71st IEEE Vehicular Technology Conference (VTC2010-Spring), IEEE, Taipei pp. 1–5.Google Scholar
Sommer, C., Schmidt, A., Chen, Y. et al. (2010d), ‘On the feasibility of UMTS-based traffic information systems’, Elsevier Ad Hoc Networks, Special Issue on Vehicular Networks 8(5), 506–517.Google Scholar
Sommer, C., Tonguz, O. K. & Dressler, F. (2010e), Adaptive beaconing for delay-sensitive and congestion-aware traffic information systems, in 2nd IEEE Vehicular Networking Conference (VNC 2010), IEEE, Jersey City, NJ, pp. 1–8.Google Scholar
Sommer, C., Tonguz, O. K. & Dressler, F. (2011c), ‘Traffic information systems: Efficient message dissemination via adaptive beaconing’, IEEE Communications Magazine 49(5), 173–179.CrossRefGoogle Scholar
Sommer, C., Yao, Z., German, R. & Dressler, F. (2008), Simulating the influence of IVC on road traffic using bidirectionally coupled simulators, in 27th IEEE Conference on Computer Communications (INFOCOM 2008): IEEE Workshop on Mobile Networking for Vehicular Environments (MOVE 2008), IEEE, Phoenix, AZ, pp. 1–6.Google Scholar
Souley, A.-K. H. & Cherkaoui, S. (2005), Realistic urban scenarios simulation for ad hoc networks, in 2nd International Conference on Innovations in Information Technology (IIT'05), Dubai.Google Scholar
Stallings, W. (2013), Cryptography and Network Security: Principles and Practice, 6th edn., Pearson Prentice Hall.Google Scholar
Steinmetz, R. & Wehrle, K., eds. (2005), Peer-to-Peer Systems and Applications, Springer.CrossRef
Stepanov, I. & Rothermel, K. (2008), ‘On the impact of a more realistic physical layer on MANET simulations results’, Elsevier Ad Hoc Networks 6(1), 61–78.CrossRefGoogle Scholar
Stoica, I., Morris, R., Karger, D. R., Kaashoek, M. F. & Balakrishnan, H. (2001), Chord: A scalable peer-to-peer lookup service for internet applications, in ACM SIGCOMM 2001, ACM, San Diego, CA, pp. 149–160.Google Scholar
Stoica, I., Morris, R., Liben-Nowell, D. et al. (2003), ‘Chord: A scalable peer-to-peer lookup protocol for internet applications’, IEEE/ACM Transactions on Networking 11(1), 17–32.CrossRefGoogle Scholar
Stübing, H., Bechler, M., Heussner, D. et al. (2010), ‘simTD: A car-to-X system architecture for field operational tests’, IEEE Communications Magazine 48(5), 148–154.CrossRefGoogle Scholar
Stutts, J. C., Stewart, J. R. & Martell, C. (1998), ‘Cognitive test performance and crash risk in an older driver population’, Accident Analysis and Prevention 30(3), 337–346.CrossRefGoogle Scholar
Sugimoto, C., Nakamura, Y. & Hashimoto, T. (2008), Prototype of pedestrian-to-vehicle communication system for the prevention of pedestrian accidents using both 3G wireless and WLAN communication, in 3rd IEEE International Symposium on Wireless Pervasive Computing (ISWPC 2008), IEEE, Santorini pp. 764–767.Google Scholar
Suzuki, H. (1977), ‘A statistical model for urban radio propagation’, IEEE Transactions on Communications 25(7), 673–680.CrossRefGoogle Scholar
Tan, G., Bertier, M. & Kermarrec, A.-M. (2009), Convex partition of sensor networks and its use in virtual coordinate geographic routing, in 28th IEEE Conference on Computer Communications (INFOCOM 2009), IEEE, Rio de Janeiro.Google Scholar
Tanenbaum, A. S. & Wetherall, D. J. (2011), Computer Networks, 5th edn., Prentice Hall.Google Scholar
Tang, A. & Yip, A. (2010), ‘Collision avoidance timing analysis of DSRC-based vehicles’, Accident Analysis and Prevention 42(1), 182–195.CrossRefGoogle Scholar
Tielert, T., Jiang, D., Hartenstein, H. & Delgrossi, L. (2013), Joint power/rate congestion control optimizing packet reception in vehicle safety communications, in 10th ACM International Workshop on Vehicular Internetworking (VANET 2013), ACM, Taipei pp. 51–60.Google Scholar
Tonguz, O. K. & Boban, M. (2010), ‘Multiplayer games over vehicular ad hoc networks: A new application’, Elsevier Ad Hoc Networks 8(5), 531–543.CrossRefGoogle Scholar
Tonguz, O. K., Wisitpongphan, N. & Bai, F. (2010), ‘DV-CAST: A distributed vehicular broadcast protocol for vehicular ad hoc networks’, IEEE Wireless Communications 17(2), 47–57.CrossRefGoogle Scholar
Tonguz, O., Wisitpongphan, N., Bai, F., Mudalige, P. & Sadekart, V. (2007), Broadcasting in VANET, in 26th IEEE Conference on Computer Communications (INFOCOM 2007): Mobile Networking for Vehicular Environments (MOVE 2007), IEEE, Anchorage, AK pp. 7–12.Google Scholar
Tonguz, O., Wisitpongphan, N., Parikh, J. et al. (2006), On the broadcast storm problem in ad hoc wireless networks, in 3rd International Conference on Broadband Communications, Networks, and Systems (BROADNETS), San Jose, CA.Google Scholar
Torrent-Moreno, M., Santi, P. & Hartenstein, H. (2006), Distributed fair transmit power adjustment for vehicular ad hoc networks, in 3rd IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON 2006), Vol. 2, IEEE, Reston, VA, pp. 479–488.Google Scholar
TPEG (2006a), Traffic and Travel Information (TTI) – TTI via Transport Protocol Expert Group (TPEG) Data-streams – Part 1: Introduction, Numbering and Versions, TS 18234-1, ISO.
TPEG (2006b), Traffic and Travel Information (TTI) – TTI via Transport Protocol Expert Group (TPEG) Data-streams – Part 4: Road Traffic Message (RTM) Application, TS 18234-4, ISO.
TPEG (2006c), Traffic and Travel Information (TTI) – TTI via Transport Protocol Experts Group (TPEG) Extensible Markup Language (XML) – Part 1: Introduction, Common Data Types and tpegML, TS 24530-1, ISO.
Train, J., Bannister, J. & Raghavendra, C. (2011), Routing fountains: Leveraging wide-area broad-cast to improve mobile inter-domain routing, in IEEE Military Communications Conference (MILCOM 2011), Baltimore, MD, pp. 842–848.Google Scholar
Treiber, M., Hennecke, A. & Helbing, D. (2000), Microscopic simulation of congested traffic, in D., Helbing, H., Herrmann, M., Schreckenberg & D., Wolf, eds. Traffic and Granular Flow '99, Springer, Heidelberg.Google Scholar
Tsai, H.-M., Tonguz, O., Saraydar, C. et al. (2007), ‘Zigbee-based intra-car wireless sensor networks: A case study’, IEEE Wireless Communications 14(6), 67–77.Google Scholar
Tsai, M.-J., Wang, F.-R., Yang, H.-Y. & Cheng, Y.-P. (2009), VirtualFace: An algorithm to guarantee packet delivery of virtual-coordinate-based routing protocols in wireless sensor networks, in 28th IEEE Conference on Computer Communications (INFOCOM 2009), IEEE, Rio de Janeiro.Google Scholar
Tubaishat, M., Shang, Y. & Shi, H. (2007), Adaptive traffic light control with wireless sensor networks, in 4th IEEE Consumer Communications and Networking Conference (CCNC 2007), IEEE, Las Vegas, NV, pp. 187–191.Google Scholar
Tung, L.-C., Mena, J., Gerla, M. & Sommer, C. (2013), A cluster based architecture for intersection collision avoidance using heterogeneous networks, in 12th IFIP/IEEE Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net2013), IEEE, Ajaccio, Corsica.Google Scholar
Uang, S.-T. & Hwang, S.-L. (2003), ‘Effects on driving behavior of congestion information and of scale of in-vehicle navigation systems’, Transportation Research Part C: Emerging Technologies 11(6), 423–438.CrossRefGoogle Scholar
Uzcátegui, R. A. & Acosta-Marum, G. (2009), ‘WAVE: A tutorial’, IEEE Communications Magazine 47(5), 126–133.CrossRefGoogle Scholar
Valerio, D., Ricciato, F., Belanovic, P. & Zemen, T. (2008), UMTS on the road: Broadcasting intelligent road safety information via MBMS, in 67th IEEE Vehicular Technology Conference (VTC2008-Spring), pp. 3026–3030.Google Scholar
van Arem, B., van Driel, C. & Visser, R. (2006), ‘The impact of cooperative adaptive cruise control on traffic-flow characteristics’, IEEE Transactions on Intelligent Transportation Systems 7(4), 429–436.CrossRefGoogle Scholar
Varga, A. & Hornig, R. (2008), An overview of the OMNeT++ simulation environment, in 1st ACM/ICST International Conference on Simulation Tools and Techniques for Communications, Networks and Systems (SIMUTools 2008), ACM, Marseille.Google Scholar
Vasudevan, S., Kurose, J. & Towsley, D. (2004), Design and analysis of a leader election algorithm for mobile ad hoc networks, in 12th IEEE International Conference on Network Protocols (ICNP 2004), pp. 350–360.Google Scholar
Vesco, A., Scopigno, R., Casetti, C. & Chiasserini, C.-F. (2013), Investigating the effectiveness of decentralized congestion control in vehicular networks, in IEEE Global Telecommunications Conference (GLOBECOM 2013), IEEE, Atlanta, GA.Google Scholar
Vinel, A. (2012), ‘3GPP. LTE Versus IEEE 802.11p/WAVE: Which technology is able to support cooperative vehicular safety applications?’, Wireless Communications Letters 1(2), 125–128.Google Scholar
Viriyasitavat, W., Bai, F. & Tonguz, O. (2010), UV-CAST: An urban vehicular broadcast protocol, in 2nd IEEE Vehicular Networking Conference (VNC 2010), IEEE, Jersey City, NJ, pp. 25–32.Google Scholar
Viriyasitavat, W., Tonguz, O. K. & Bai, F. (2009), Network connectivity of VANETs in urban areas, in 6th IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON 2009), IEEE, Rome.Google Scholar
Vogels, W., van Renesse, R. & Briman, K. (2003), ‘The power of epidemics: Robust communication for large-scale distributed systems’, ACM SIGCOMM Computer Communication Review 33(1), 131–135.Google Scholar
Vora, A. & Nesterenko, M. (2006), ‘Secure location verification using radio broadcast’, IEEE Transactions on Dependable and Secure Computing 3(4), 377–385.CrossRefGoogle Scholar
Wang, Y., Ahmed, A., Krishnamachari, B. & Psounis, K. (2008), IEEE 802.11p performance evaluation and protocol enhancement, in IEEE International Conference on Vehicular Electronics and Safety (ICVES), Columbus, OH, pp. 317–322.Google Scholar
Watteyne, T., Molinaro, A., Richichi, M. G. & Dohler, M. (2011), ‘From MANET To IETF ROLL standardization: A paradigm shift in WSN routing protocols’, IEEE Communications Surveys and Tutorials 13(4), 688–707.CrossRefGoogle Scholar
Watteyne, T., Simplot-Ryl, D., Augé-Blum, I. & Dohler, M. (2007), On using virtual coordinates for routing in the context of wireless sensor networks, in 18th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2007), IEEE, Athens, pp. 1–5.Google Scholar
Wegener, A., Piorkowski, M., Raya, M. et al. (2008), TraCI: An interface for coupling road traffic and network simulators, in 11th Communications and Networking Simulation Symposium (CNS'08), Ottawa.Google Scholar
Wehrle, K., Günes, M. & Gross, J. (2010), Modeling and Tools for Network Simulation, Springer.CrossRefGoogle Scholar
Wei#x00EF;, C. (2011), ‘V2X communication in europe – From research projects towards standardization and field testing of vehicle communication technology’, Elsevier Computer Networks 55(14), 3103–3119.Google Scholar
Wenger, M., Spyridakis, J., Haselkorn, M., Barfield, W. & Conquest, L. (1990), ‘Motorist behavior and the design of motorist information systems. Human factors and safety research related to highway design and operation’, Transportation Research Record 1281, 159–167.Google Scholar
Werner, M., Lupoaie, R., Subramanian, S. & Jose, J. (2012), MAC layer performance ofITS G5 – optimized DCC and advanced transmitter coordination, in 4th ETSI TC ITS Workshop, Doha, Qatar.Google Scholar
Wiedemann, R. (1974), Simulation des Straßenverkehrsflusses, Habilitation, University of Karlsruhe.
Wiedersheim, B., Ma, Z., Kargl, F. & Papadimitratos, P. (2010), Privacy in inter-vehicular networks: Why simple pseudonym change is not enough, in 7th IEEE/IFIP Conference on Wireless on Demand Network Systems and Services (WONS 2010), Kranjska Gora, Slovenia.Google Scholar
Williams, B. (2008), Intelligent Transport Systems Standards, Artech House.Google Scholar
Willke, T. L., Tientrakool, P. & Maxemchuk, N. F. (2009), ‘A survey of inter-vehicle communication protocols and their applications’, IEEE Communications Surveys and Tutorials 11(2), 3–20.CrossRefGoogle Scholar
Wischhof, L., Ebner, A. & Rohling, H. (2005), ‘Information dissemination in self-organizing intervehicle networks’, IEEE Transactions on Intelligent Transportation Systems 6(1), 90–101.CrossRefGoogle Scholar
Wischhof, L., Ebner, A. & Rohling, H. (2006), Self-generated road status maps based on vehicular ad hoc communication, in 3rd International Workshop on Intelligent Transportation (WIT 2006), Hamburg.Google Scholar
Wischhof, L., Ebner, A., Rohling, H., Lott, M. & Halfmann, R. (2003), SOTIS – A self-organizing traffic information system, in 57th IEEE Vehicular Technology Conference (VTC2003-Spring), Jeju, South Korea.Google Scholar
Wisitpongphan, N. & Bai, F. (2013), Microscopic experimental evaluation of multi-hop video streaming protocol in vehicular networks, in 5th IEEE Vehicular Networking Conference (VNC 2013), IEEE, Boston, MA.Google Scholar
Wisitpongphan, N., Bai, F., Mudalige, P., Sadekar, V. & Tonguz, O. (2007a), ‘Routing in sparse vehicular ad hoc wireless networks’, IEEE Journal on Selected Areas in Communications 25(8), 1538–1556.CrossRefGoogle Scholar
Wisitpongphan, N., Tonguz, O. K., Parikh, J. S. et al. (2007b), ‘Broadcast storm mitigation techniques in vehicular ad hoc networks’, IEEE Wireless Communications 14(6), 84–94.CrossRefGoogle Scholar
Wright, A. (2011), ‘Hacking cars’, Communications of the ACM 54(11), 18–19.CrossRefGoogle Scholar
Xue, Q. & Ganz, A. (2003), ‘Ad hoc QoS on-demand routing (AQOR) in mobile ad hoc networks’, Journal of Parallel and Distributed Computing 63(2), 154–165.CrossRefGoogle Scholar
Yoon, J., Liu, M. & Noble, B. (2003), Random waypoint considered harmful, in 22nd IEEE Conference on Computer Communications (INFOCOM 2003), IEEE, San Francisco, CA, pp. 1312–1321.Google Scholar
Zhang, H. & Hou, J. C. (2005), ‘On the upper bound of α-lifetime for large sensor networks’, ACM Transactions on Sensor Networks 1(2), 272–300.CrossRefGoogle Scholar
Zhao, Y., Chen, Y., Li, B. & Zhang, Q. (2007), ‘Hop ID: A virtual coordinate-based routing for sparse mobile ad hoc networks’, IEEE Transactions on Mobile Computing 6(9), 1075–1089.CrossRefGoogle Scholar
Zheng, Z., Lu, Z., Sinha, P. & Kumar, S. (2010), Maximizing the contact opportunity for vehicular internet access, in 29th IEEE Conference on Computer Communications (INFOCOM 2010), IEEE, San Diego, CA, pp. 1–9.Google Scholar
Zhou, B., Tiwari, A., Zhu, K. et al. (2009), Geo-based inter-domain routing (GIDR) protocol for MANETs, in IEEE Military Communications Conference (MILCOM 2009), IEEE, BBoston, MA, pp. 1–7.Google Scholar
Zhou, L., Zhang, Y., Song, K., Jing, W. & Vasilakos, A. (2011), ‘Distributed media services in P2P-based vehicular networks’, IEEE Transactions on Vehicular Technology 60(2), 692–703.CrossRefGoogle Scholar
Zhu, Y., Xu, B., Shi, X. & Wang, Y. (2013), ‘A survey of social-based routing in delay tolerant networks: Positive and negative social effects’, IEEE Communications Surveys and Tutorials 15(1), 387–401.CrossRefGoogle Scholar
Ziomek, J., Tedesco, L. & Coughlin, T. (2013), ‘My car, my way: Why not? I paid for it!’, Consumer Electronics Magazine 2(3), 25–29.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • References
  • Christoph Sommer, Universität Paderborn, Germany, Falko Dressler, Universität Paderborn, Germany
  • Book: Vehicular Networking
  • Online publication: 18 December 2014
  • Chapter DOI: https://doi.org/10.1017/CBO9781107110649.009
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • References
  • Christoph Sommer, Universität Paderborn, Germany, Falko Dressler, Universität Paderborn, Germany
  • Book: Vehicular Networking
  • Online publication: 18 December 2014
  • Chapter DOI: https://doi.org/10.1017/CBO9781107110649.009
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • References
  • Christoph Sommer, Universität Paderborn, Germany, Falko Dressler, Universität Paderborn, Germany
  • Book: Vehicular Networking
  • Online publication: 18 December 2014
  • Chapter DOI: https://doi.org/10.1017/CBO9781107110649.009
Available formats
×