A new hierarchical and adaptive protocol for minimum-delay V2V communication

Mohammed Elbes*, Ala Al-Fuqaha, Mohsen Guizani, Ammar Rayes, Jun S. Oh

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

10 Citations (Scopus)

Abstract

The majority of Vehicle-to-Vehicle (V2V) protocols presented in the literature utilize a combination of controlled access techniques (e.g., TDMA, FDMA, CDMA) to provide prioritized access to the communication medium. While these protocols split the capacity of the communication link to support a maximum number of users with different priority levels, our work utilizes a combination of CDMA and TDMA techniques to increase the number of concurrent users sharing the bandwidth. The proposed protocol provides an adaptive scheme that classifies the vehicle's messages as "urgent" or "non-urgent" based on its statistical parameters (e.g., speed, acceleration, directional stability) and the state of its neighboring vehicles (e.g., normal or urgent) . Furthermore, the proposed protocol achieves intelligent scheduling and allocation of messages and the underlying bandwidth to minimize the end-to-end communication delay and the costs associated with the deployment of Vehicle Infrastructure Integration (VII) without the need for road-side equipment.

Original languageEnglish
Title of host publicationGLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference
DOIs
Publication statusPublished - 2009
Externally publishedYes
Event2009 IEEE Global Telecommunications Conference, GLOBECOM 2009 - Honolulu, HI, United States
Duration: 30 Nov 20094 Dec 2009

Publication series

NameGLOBECOM - IEEE Global Telecommunications Conference

Conference

Conference2009 IEEE Global Telecommunications Conference, GLOBECOM 2009
Country/TerritoryUnited States
CityHonolulu, HI
Period30/11/094/12/09

Fingerprint

Dive into the research topics of 'A new hierarchical and adaptive protocol for minimum-delay V2V communication'. Together they form a unique fingerprint.

Cite this