{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T16:15:35Z","timestamp":1726848935873},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,8,5]],"date-time":"2016-08-05T00:00:00Z","timestamp":1470355200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1186\/s13638-016-0680-7","type":"journal-article","created":{"date-parts":[[2016,8,5]],"date-time":"2016-08-05T06:05:13Z","timestamp":1470377113000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Understanding STDMA via computer simulation: feasibility to vehicular safety applications, configurations, and time synchronization errors"],"prefix":"10.1186","volume":"2016","author":[{"given":"Jae-Han","family":"Lim","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,5]]},"reference":[{"key":"680_CR1","volume-title":"Transportation National Highway Safety Admin","author":"U.S. Dept.","year":"2003","unstructured":"U.S. Dept., Transportation National Highway Safety Admin (Traffic Safety Facts, Washington, DC, USA, 2003)."},{"key":"680_CR2","unstructured":"IEEE Standard for Information Technology Telecommunications and Information Exchange Between Systems Local and Metropolitan Area Networks Specific Requirements; Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications; Amendment 6: Wireless Access in Vehicular Environments. IEEE Std, 802.11p (2010)."},{"key":"680_CR3","unstructured":"Ahmed-Zaid, et al., Vehicle Safety Communications\u2014Applications (VSC-A) Final Report. Technical Report (2011)."},{"key":"680_CR4","unstructured":"S Sharafkandi, et al., in Proc. of IEEE Vehicular Network Conference (VNC). Using EDCA to Improve Vehicle Safety Message, (2012), pp. 70\u201377."},{"key":"680_CR5","unstructured":"J-H Lim, et al., in Proc. of IEEE Globecom. Interaction between EDCA and HCCA: Simulation Study of DSRC for Work Zone Safety, (2013), pp. 42\u201347."},{"issue":"3","key":"680_CR6","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1109\/JSAC.2011.110305","volume":"29","author":"J-M Chung","year":"2011","unstructured":"J-M Chung, et al., Time Coordinated V2I Communications and Handover for WAVE Networks. IEEE J. Sel. Area Commun. 29(3), 545\u2013558 (2011).","journal-title":"IEEE J. Sel. Area Commun"},{"issue":"9","key":"680_CR7","doi-asserted-by":"publisher","first-page":"1724","DOI":"10.1109\/TMC.2012.142","volume":"12","author":"H Aboubakr","year":"2013","unstructured":"H Aboubakr, et al., VeMAC: A TDMA-based MAC protocol for reliable broadcast in VANETs. IEEE Trans. Mob. Comput. 12(9), 1724\u20131736 (2013).","journal-title":"IEEE Trans. Mob. Comput"},{"key":"680_CR8","unstructured":"Recommendations ITU-R M.1371-1. Technical characteristics for universal shipborne automatic identification system using time division multiple access in the VHF maritime mobile band."},{"key":"680_CR9","doi-asserted-by":"crossref","unstructured":"A Alonso, et al., in Proc. of IEEE VTC. Throughput of Self-Organizing Time Division Multiple Access MAC Layer for Vehicular Networks Based on Measured SNR Time-Series, (2011).","DOI":"10.1109\/VETECF.2011.6093019"},{"key":"680_CR10","doi-asserted-by":"crossref","unstructured":"K Bilstrup, in Proc. of ITS World Congress. On the Ability of the 802.11p MAC Method and STDMA to Provide Predictable Channel Access, (2009).","DOI":"10.1155\/2009\/902414"},{"key":"680_CR11","doi-asserted-by":"publisher","first-page":"88","DOI":"10.4236\/jtts.2013.31009","volume":"3","author":"VD Khainar","year":"2013","unstructured":"VD Khainar, et al., Simulation based evaluation of highway road scenario between DSRC\/802.11p MAC protocol and STDMA for vehicle-to-vehicle communication. J. Transp. Technol. 3:, 88\u2013104 (2013).","journal-title":"J. Transp. Technol"},{"key":"680_CR12","doi-asserted-by":"crossref","unstructured":"K Sjoberg, et al., in Proc.of IEEE VTC. How Severe is the Hidden Terminal Problem in VANETs when Using CSMA and STDMA? (2011).","DOI":"10.1109\/VETECF.2011.6093256"},{"key":"680_CR13","unstructured":"K Sjoberg, et al., in Proc. of IEEE IWCMC. Delay and Interference Comparison of CSMA and Self-Organizing TDMA when Used in VANETs, (2011), pp. 1488\u20131493."},{"key":"680_CR14","unstructured":"T Gaugel, et al., in Proc.of IEEE VNC. In-Depth Analysis and Evaluation of Self-Organizing TDMA, (2013), pp. 79\u201386."},{"key":"680_CR15","unstructured":"The Network Simulator, ns-2. http:\/\/www.isi.edu\/nsnam\/ns ."},{"key":"680_CR16","unstructured":"DRAFT SAE J2735 Dedicated Short Range Communications (DSRC) Message Set Dictionary. Rev 0.7, Jam (2006)."},{"key":"680_CR17","unstructured":"MC Taylor, et al., The effects of drivers\u2019 speed on the frequency of road accidents, Transport Research Lab (TRL) Report 421, Crowthorn, Berkshire, England, TRL Limited (2000)."},{"key":"680_CR18","volume-title":"TRB 86th Annual Meeting Compendium of Papers CD-ROM","author":"D Sun","year":"2007","unstructured":"D Sun, et al., in TRB 86th Annual Meeting Compendium of Papers CD-ROM. An In-Depth Analysis on Vehicle Following Gaps in Highway Work Zones: The Direct and Interdependent Impact of Leading Vehicle (Transportation Research Board of the National AcademiesWashington, D.C., 2007)."},{"key":"680_CR19","volume-title":"Measurement Study of Path Capacity in 802.11b Based Wireless Networks","author":"T Sun","year":"2005","unstructured":"T Sun, et al., Measurement Study of Path Capacity in 802.11b Based Wireless Networks (The Wireless Traffic Measurements and Modeling Workshop, Seattle, USA, 2005)."},{"key":"680_CR20","unstructured":"F Bai, et al., in Proc. of ACM MOBICOM. Toward Understanding Characteristics of Dedicated Short Range Communications (DSRC) From a Perspective of Vehicular Network Engineers, (2010), pp. 329\u2013340."},{"key":"680_CR21","unstructured":"R Stanica, et al., in Proc. of IEEE MASS. Physical Carrier Sense in Vehicular Ad-Hoc Networks, (2011), pp. 580\u2013589."},{"issue":"11","key":"680_CR22","doi-asserted-by":"publisher","first-page":"2117","DOI":"10.1109\/JSAC.2014.1411RP02","volume":"32","author":"J-H Lim","year":"2014","unstructured":"J-H Lim, et al., Interplay between DSRC and TVWS: optimal strategy for safety message dissemination. IEEE J. Sel. Area Commun. (JSAC). 32(11), 2117\u20132133 (2014).","journal-title":"IEEE J. Sel. Area Commun. (JSAC)"},{"key":"680_CR23","unstructured":"J-H Lim, et al., in Proc. of IEEE ICNC 2015. Safety Message Dissemination in NLOS Environments of Intersection Using TV White Space, (2015), pp. 451\u2013455."},{"key":"680_CR24","unstructured":"Z Wanget, et al., in Proc.of ACM VANET. How Much of DSRC is Available for Non-Safety User? (2008), pp. 23\u201329."},{"key":"680_CR25","unstructured":"J Yin, et al., in Proc.of ACM VANET. Performance Evaluation of Safety Applications over DSRC Vehicular Ad Hoc Networks, (2004), pp. 1\u20139."},{"key":"680_CR26","unstructured":"JJ Olstam, et al., Comparison of Car-Following Models, VTI Meddelande 960A (Swedish National Road and Transport Research Institute, Linkping, Sweden, 2004)."},{"issue":"7","key":"680_CR27","doi-asserted-by":"publisher","first-page":"1162","DOI":"10.1109\/JPROC.2011.2132790","volume":"99","author":"J Kenney","year":"2011","unstructured":"J Kenney, Dedicated Short-Range Communications (DSRC) Standards in the United States. Proc. IEEE. 99(7), 1162\u20131182 (2011).","journal-title":"Proc. IEEE"},{"issue":"1","key":"680_CR28","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1109\/TC.2015.2417543","volume":"65","author":"T Meng","year":"2016","unstructured":"T Meng, et al., Spatial reusability-aware routing in multi-hop wireless networks. IEEE Trans. Comput. 65(1), 244\u2013255 (2016).","journal-title":"IEEE Trans. Comput"},{"issue":"4","key":"680_CR29","doi-asserted-by":"publisher","first-page":"742","DOI":"10.1109\/TMC.2014.2331966","volume":"14","author":"XM Zhang","year":"2015","unstructured":"XM Zhang, et al., Interference-based topology control algorithm for delay-constrained mobile Ad hoc networks. IEEE Trans. Mob. Comput. 14(4), 742\u2013754 (2015).","journal-title":"IEEE Trans. Mob. Comput"},{"issue":"12","key":"680_CR30","doi-asserted-by":"publisher","first-page":"3264","DOI":"10.1109\/TPDS.2013.2297105","volume":"25","author":"P Li","year":"2014","unstructured":"P Li, et al., Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Trans. Parallel Distrib. Syst. 25(12), 3264\u20133273 (2014).","journal-title":"IEEE Trans. Parallel Distrib. Syst"},{"issue":"8","key":"680_CR31","doi-asserted-by":"publisher","first-page":"2481","DOI":"10.1007\/s11276-014-0761-7","volume":"20","author":"Q Jing","year":"2014","unstructured":"Q Jing, et al., Security of the Internet of Things: perspectives and challenges. Springer Wirel. Netw. 20(8), 2481\u20132501 (2014).","journal-title":"Springer Wirel. Netw"},{"issue":"4","key":"680_CR32","doi-asserted-by":"publisher","first-page":"1145","DOI":"10.1109\/TNET.2012.2218124","volume":"21","author":"D L\u00f3pez-P\u00e9rez","year":"2013","unstructured":"D L\u00f3pez-P\u00e9rez, et al., On distributed and coordinated resource allocation for interference mitigation in self-organizing LTE networks. IEEE\/ACM Trans. Networking. 21(4), 1145\u20131158 (2013).","journal-title":"IEEE\/ACM Trans. Networking"},{"issue":"2","key":"680_CR33","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s11276-012-0457-9","volume":"19","author":"Y Zeng","year":"2013","unstructured":"Y Zeng, et al., Directional routing and scheduling for green vehicular delay tolerant networks. Springer Wirel. Netw. 19(2), 161\u2013173 (2013).","journal-title":"Springer Wirel. Netw"},{"issue":"1","key":"680_CR34","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/SURV.2013.082713.00184","volume":"16","author":"M Youssef","year":"2014","unstructured":"M Youssef, et al., Routing metrics of cognitive radio networks: a survey. IEEE Commun. Surv. Tutor. 16(1), 92\u2013109 (2014).","journal-title":"IEEE Commun. Surv. Tutor"},{"issue":"3","key":"680_CR35","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MITS.2015.2417974","volume":"7","author":"M-K Jiau","year":"2015","unstructured":"M-K Jiau, et al., Multimedia services in cloud-based vehicular networks. IEEE Intell. Transp. Syst. Mag. 7(3), 62\u201379 (2015).","journal-title":"IEEE Intell. Transp. Syst. Mag"},{"issue":"2","key":"680_CR36","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/s11036-014-0499-6","volume":"19","author":"J Wan","year":"2014","unstructured":"J Wan, et al., VCMIA: a novel architecture for integrating vehicular cyber-physical systems and mobile cloud computing. ACM\/Springer Mob. Netw. Appl. 19(2), 153\u2013160 (2014).","journal-title":"ACM\/Springer Mob. Netw. Appl"},{"issue":"6","key":"680_CR37","doi-asserted-by":"publisher","first-page":"1835","DOI":"10.1007\/s11276-014-0841-8","volume":"21","author":"T Wang","year":"2015","unstructured":"T Wang, et al., Survey on channel reciprocity based key establishment techniques for wireless systems. Springer Wirel. Netw. 21(6), 1835\u20131846 (2015).","journal-title":"Springer Wirel. Netw"},{"issue":"6","key":"680_CR38","doi-asserted-by":"publisher","first-page":"1299","DOI":"10.1109\/TIFS.2015.2407326","volume":"10","author":"J Zhou","year":"2015","unstructured":"J Zhou, et al., Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Trans. Inf. Forensics Secur. 10(6), 1299\u20131314 (2015).","journal-title":"IEEE Trans. Inf. Forensics Secur"},{"issue":"1","key":"680_CR39","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s11235-015-9979-7","volume":"62","author":"J Liu","year":"2016","unstructured":"J Liu, et al., A survey on position-based routing for vehicular ad hoc networks. Springer Telecommun. Syst. 62(1), 15\u201330 (2016).","journal-title":"Springer Telecommun. Syst"},{"issue":"2","key":"680_CR40","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MVT.2015.2410341","volume":"10","author":"W Viriyasitavat","year":"2015","unstructured":"W Viriyasitavat, et al., Vehicular communications: survey and challenges of channel and propagation models. IEEE Veh. Technol. Mag. 10(2), 55\u201366 (2015).","journal-title":"IEEE Veh. Technol. Mag"},{"key":"680_CR41","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.comnet.2013.08.020","volume":"58","author":"H Yang","year":"2014","unstructured":"H Yang, et al., Provably secure three-party authenticated key agreement protocol using smart cards. Elsevier Comput. Netw. 58:, 29\u201338 (2014).","journal-title":"Elsevier Comput. Netw"},{"issue":"3","key":"680_CR42","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/s10660-014-9147-2","volume":"14","author":"J Wan","year":"2014","unstructured":"J Wan, et al., IoT Sensing framework with inter-cloud computing capability in vehicular networking. Electron. Commer. Res. 14(3), 389\u2013416 (2014).","journal-title":"Electron. Commer. Res"},{"issue":"3","key":"680_CR43","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1109\/TIFS.2013.2296437","volume":"9","author":"B Liu","year":"2014","unstructured":"B Liu, et al., Toward incentivizing anti-spoofing deployment. IEEE Trans. Inf. Forensics Secur. 9(3), 436\u2013450 (2014).","journal-title":"IEEE Trans. Inf. Forensics Secur"},{"key":"680_CR44","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1016\/j.ins.2015.08.019","volume":"327","author":"J Liu","year":"2016","unstructured":"J Liu, et al., Leveraging software-defined networking for security policy enforcement. Elsevier Inf. Sci.327:, 288\u2013299 (2016).","journal-title":"Elsevier Inf. Sci."},{"issue":"8","key":"680_CR45","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/MCOM.2014.6871677","volume":"52","author":"J Wan","year":"2014","unstructured":"J Wan, et al., Context-aware vehicular cyber-physical systems with cloud support: architecture, challenges and solutions. IEEE Commun. Mag. 52(8), 106\u2013113 (2014).","journal-title":"IEEE Commun. Mag"},{"key":"680_CR46","unstructured":"Z Yan, et al., A security and trust framework for virtualized networks and software defined networking. Wiley Secur. Commun. Netw. (2015). http:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.1243\/full ."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0680-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-016-0680-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0680-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0680-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T02:50:24Z","timestamp":1568256624000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-016-0680-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,5]]},"references-count":46,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["680"],"URL":"https:\/\/doi.org\/10.1186\/s13638-016-0680-7","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,8,5]]},"article-number":"181"}}