{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:41:59Z","timestamp":1742913719150,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031270406"},{"type":"electronic","value":"9783031270413"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-27041-3_11","type":"book-chapter","created":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T16:34:55Z","timestamp":1676651695000},"page":"144-155","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Emergency Information Broadcast Routing in VANET"],"prefix":"10.1007","author":[{"given":"Liya","family":"Xu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5168-0611","authenticated-orcid":false,"given":"Mingzhu","family":"Ge","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Anyuan","family":"Deng","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jiaoli","family":"Shi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shimao","family":"Yao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,2,18]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Kaur, R., Singh, T.P., Khajuria, V.: Security issues in vehicular ad-hoc network (VANET). In: 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI), Tirunelveli, India, pp. 884\u2013889. IEEE (2018)","DOI":"10.1109\/ICOEI.2018.8553852"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Zhou, M., Wu, M., Ding, Z., Liu, Z., Zhao, F.: performance evaluation of hybrid distributed-centralized TDMA in high-density vehicular networks. IEEE Commun. Lett. 26(4), 952\u2013956 (2022)","DOI":"10.1109\/LCOMM.2022.3144793"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Singh, P.K., Agarwal, A., Nakum, G., Rawat, D.B., Nandi, S.: MPFSLP: masqueraded probabilistic flooding for source-location privacy in VANETs. IEEE Trans. Veh. Technol. 69(10), 11383\u201311393 (2020)","DOI":"10.1109\/TVT.2020.3009763"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Zeng, X., Yu, M., Wang, D.: A new probabilistic multi-hop broadcast protocol for vehicular networks. IEEE Trans. Veh. Technol. 67(12), 12165\u201312176 (2018)","DOI":"10.1109\/TVT.2018.2872998"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Chou, Y., Chu, T.-H., Kuo, S.-Yu., Chen, C.-Y.: An adaptive emergency broadcast strategy for vehicular ad hoc networks. IEEE Sens. J. 18(12), 4814\u20134821 (2018)","DOI":"10.1109\/JSEN.2017.2757698"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Dong, W., Lin, F., Zhang, H., Yin, Y.: A cluster-based recursive broadcast routing algorithm to propagate emergency messages in city VANETs. In: IEEE 9th International Conference on Communication Software and Networks (ICCSN), Guangzhou, China, pp. 187\u2013190. IEEE (2017)","DOI":"10.1109\/ICCSN.2017.8230103"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Virdaus, I.K., Kang, M., Shin, S., Kwon, G.-R.: A simulation study: is the broadcast storming really harmful for emergency delivery in VANETs?. In: Proceedings of International Conference on Advanced Technologies for Communication (ATC), Ho Chi Minh City, Vietnam, pp. 666\u2013670. IEEE (2015)","DOI":"10.1109\/ATC.2015.7388415"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Li, P., Zeng, Y., Li, C., Chen, L., Wang, H., Chen, C.: A probabilistic broadcasting scheme for emergent message dissemination in Urban internet of vehicles. IEEE Access 9, 113187\u2013113198 (2021)","DOI":"10.1109\/ACCESS.2021.3103843"},{"key":"11_CR9","unstructured":"Wu, J., Luo, C., Luo Y., Li, K.: Distributed UAV swarm formation and collision avoidance strategies over fixed and switching topologies. IEEE Trans. Cybern. 1\u201311 (2021)"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Han, R., Shi, J., Guan, Q., Banoori, F., Shen, W.: Speed and position aware dynamic routing for emergency message dissemination in VANETs. IEEE Access 10, 1376\u20131385 (2022)","DOI":"10.1109\/ACCESS.2021.3138960"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Liu, Z., et al.: PPTM: a privacy-preserving trust management scheme for emergency message dissemination in space\u2013air\u2013ground-integrated vehicular networks. IEEE Internet Things J. 9(8), 5943\u20135956 (2022)","DOI":"10.1109\/JIOT.2021.3060751"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Fayyad, O.B., Mangoud, M.A.: Multi-hop broadcast protocol based on smart fuzzy inference for vehicular ad-hoc network. In: 3rd Smart Cities Symposium (SCS 2020), IET, online (2020)","DOI":"10.1049\/icp.2021.0970"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Luo, Y., Su, X., Yu, Y., Cao, Q., Ni, Z.: Real-time successful broadcasting ratio and distance based broadcast for vehicular ad hoc networks. In: 2020 International Conference on Wireless Communications and Signal Processing (WCSP), Nanjing, China, pp. 1046\u20131051. IEEE (2020)","DOI":"10.1109\/WCSP49889.2020.9299727"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Arsalan, A., Rehman, R.A.: Distance-based scheme for broadcast storm mitigation in named software defined vehicular networks (NSDVN). In: 2019 16th IEEE Annual Consumer Communications and Networking Conference (CCNC). Las Vegas, NV, USA, pp. 1\u20134. IEEE (2019)","DOI":"10.1109\/CCNC.2019.8651700"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Zhang, H., Zhang, X.: An adaptive control structure based fast broadcast protocol for vehicular ad hoc networks. IEEE Commun. Lett. 21(8), 1835\u20131838 (2017)","DOI":"10.1109\/LCOMM.2017.2699173"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Borgonovo, F., Capone, A., Cesana, M., Fratta, L.: ADHOC MAC: a new, flexible and reliable MAC architecture for ad-hoc networks. In: Proceedings of the IEEE Wireless Communications and Networking. New York, USA, pp. 965\u2013970. IEEE (2003)","DOI":"10.1109\/WCNC.2003.1200502"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Marathe, M.V., Breu, H., Hunt, H.B., Ravi, S.S., Rosenkrantz, D.J.: Simple heuristics for unit disk graphs. J. Netw. 25(2), 59\u201368 (1995)","DOI":"10.1002\/net.3230250205"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Garey, M.R., Johnson, D.S.: Computers and intractability-a guide to the theory of NP-completeness. SIAM Rev. 24(1), 90\u201391 (1979)","DOI":"10.1137\/1024022"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Gao W.: Novel connected dominating set algorithm based on minimum spanning tree. J. Comput. Appl. 29(6), 1489\u20131493 (2009)","DOI":"10.3724\/SP.J.1087.2009.01490"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Xue, F., Kumar, P.R.: The number of neighbors needed for connectivity of wireless networks. wireless networks. 10(2), 169\u2013181 (2004)","DOI":"10.1023\/B:WINE.0000013081.09837.c0"},{"key":"11_CR21","unstructured":"Abdulai, J.D., Ould-Khaoua, M., Mackenzie, L.M., Mohammed, A.: Neighbour coverage: a dynamic probabilistic route discovery for mobile ad hoc networks. In: 2008 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS). Edinburgh, UK, pp. 165\u2013172. IEEE (2008)"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Briesemeister, L., Hommel, G.: Role-based multicast in highly mobile but sparsely connected ad hoc networks. In: 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing, Boston, MA, USA, pp. 45\u201350. IEEE (2000)","DOI":"10.1109\/MOBHOC.2000.869212"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Fasolo, E., Zanella, A., Zorzi, M.: An effective broadcast scheme for alert message propagation in vehicular ad hoc networks. In: 2006 IEEE International Conference on Communications, Istanbul, Turkey, pp. 3960\u20133965. IEEE (2006)","DOI":"10.1109\/ICC.2006.255700"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Wireless Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-27041-3_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,14]],"date-time":"2024-10-14T15:17:37Z","timestamp":1728919057000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-27041-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031270406","9783031270413"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-27041-3_11","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"18 February 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WiCON","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Wireless Internet Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wicon2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"ConfyPlus","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"45","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}