Performance evaluation of safety applications over DSRC vehicular ad hoc networks
Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks
Efficient coordination and transmission of data for cooperative vehicular safety applications
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
Overhaul of ieee 802.11 modeling and simulation in ns-2
Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems
The networking shape of vehicular mobility
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
Communication requirements for crash avoidance
Proceedings of the seventh ACM international workshop on VehiculAr InterNETworking
Low-cost mitigation of privacy loss due to radiometric identification
VANET '11 Proceedings of the Eighth ACM international workshop on Vehicular inter-networking
Global revocation for the intersection collision warning safety application
Proceedings of the ninth ACM international workshop on Vehicular inter-networking, systems, and applications
Hi-index | 0.00 |
Many results have been published in the literature based on performance measurements obtained from simulations of Vehicular Networks (VANETs). These simulations use as input traces of vehicle movements that have been generated by traffic simulators which are based on traffic theory models. To our knowledge, no one has published any work based on actual large-scale recordings of vehicle movements. We use recordings of actual vehicle movements on various roadways. In order to enable analysis on this scale, we have developed a new VANET simulator, which can handle many more vehicles than NS-2 [1]. To enable us to use our own simulator, we present results of a cross-validation between NS-2 and our simulator, showing that both simulators produce results that are statistically the same. We use our simulator to analyze the proposed authentication mechanism, which relies on ECDSA signatures [2], comparing it to broadcast authentication using TESLA [3]. We perform our evaluations using real vehicle mobility, which we believe to be the first simulations using real vehicle mobility. Our comparison shows strengths and weaknesses for each of these authentication schemes in terms of the resulting reception rates and latency of broadcast packets.