{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:31:34Z","timestamp":1761611494360,"version":"3.37.3"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,10,28]],"date-time":"2019-10-28T00:00:00Z","timestamp":1572220800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,10,28]],"date-time":"2019-10-28T00:00:00Z","timestamp":1572220800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2019,12]]},"abstract":"<jats:title>Abstract<\/jats:title>\n              <jats:p>Vehicular ad-hoc networks (VANETs) based on the IEEE 802.11p standard are receiving increasing attention for road safety provisioning. Hidden terminals, however, demonstrate a serious challenge in the performance of VANETs. In this paper, we investigate the effect of hidden terminals on the performance of one hop broadcast communication. The paper formulates an analytical model to analyze the effect of hidden terminals on the performance metrics such as packet reception probability (PRP), packet reception delay (PRD), and packet reception interval (PRI) for the 2-dimensional (2-D) VANET. To verify the accuracy of the proposed model, the analytical model-based results are compared with NS3 simulation results using 2-D highway scenarios. We also compare the analytical results with those from real vehicular network implemented using the commercial vehicle-to-everything (V2X) devices. The analytical results show high correlation with the results of both simulation and real network.<\/jats:p>","DOI":"10.1186\/s13638-019-1548-4","type":"journal-article","created":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T15:06:07Z","timestamp":1576508767000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Analysis of hidden terminal\u2019s effect on the performance of vehicular ad-hoc networks"],"prefix":"10.1186","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1925-8223","authenticated-orcid":false,"given":"Saurabh","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Sunghyun","family":"Choi","sequence":"additional","affiliation":[]},{"given":"HyungWon","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,28]]},"reference":[{"key":"1548_CR1","unstructured":"US Federal Communications Commission. Standard specification for telecommunications and information exchange between roadside and vehicle systems\u20145 ghz band dedicated short range communications (DSRC) medium access control (MAC) and physical layer (PHY) specifications. Washington, DC (2003)"},{"key":"1548_CR2","unstructured":"IEEE 802.11 Working Group, IEEE Standard for Information Technology\u2013Telecommunications and Information Exchange Between Systems\u2013Local and Metropolitan Area Networks\u2013Specific Requirements\u2013Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 6: Wireless Access in Vehicular Environments. IEEE Std 802(11) (2010)."},{"key":"1548_CR3","doi-asserted-by":"publisher","first-page":"817","DOI":"10.1109\/TMC.2007.70757","volume":"7","author":"A Tsertou","year":"2007","unstructured":"A. Tsertou, D.I. Laurenson, Revisiting the hidden terminal problem in a CSMA\/CA wireless network. IEEE Trans. Mob. Comput. 7, 817\u2013831 (2007)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"3","key":"1548_CR4","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1109\/49.840210","volume":"18","author":"G Bianchi","year":"2000","unstructured":"G. Bianchi, Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Selected Areas Commun. 18(3), 535\u2013547 (2000)","journal-title":"IEEE J. Selected Areas Commun."},{"issue":"12","key":"1548_CR5","doi-asserted-by":"publisher","first-page":"1417","DOI":"10.1109\/TCOM.1975.1092767","volume":"23","author":"F Tobagi","year":"1975","unstructured":"F. Tobagi, L. Kleinrock, Packet switching in radio channels: Part 2\u2014the hidden terminal problem in carrier sense multiple access and the busy-tone solution. IEEE Trans. Comm. 23(12), 1417\u20131433 (1975)","journal-title":"IEEE Trans. Comm."},{"issue":"10","key":"1548_CR6","doi-asserted-by":"publisher","first-page":"1179","DOI":"10.1016\/j.comcom.2004.07.024","volume":"28","author":"S Ray","year":"2005","unstructured":"S. Ray, D. Starobinski, J.B. Carruthers, Performance of wireless networks with hidden nodes: a queuing-theoretic analysis. Comput. Commun. 28(10), 1179\u20131192 (2005)","journal-title":"Comput. Commun."},{"issue":"6","key":"1548_CR7","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1109\/LCOMM.2008.080209","volume":"12","author":"O. Ekici","year":"2008","unstructured":"O. Ekici, A. Yongacoglu, IEEE 802.11 a throughput performance with hidden nodes. IEEE Commun. Lett. 12(6), 465\u2013467 (2008)","journal-title":"IEEE Communications Letters"},{"key":"1548_CR8","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1155\/2009\/969164","volume":"2009","author":"X Ma","year":"2009","unstructured":"X. Ma, X. Chen, H.H. Refai, Performance and reliability of DSRC vehicular safety communication: a formal analysis. EURASIP J. Wirel. Commun. Netw. 2009, 3 (2009)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"8","key":"1548_CR9","doi-asserted-by":"publisher","first-page":"3933","DOI":"10.1109\/TVT.2011.2165975","volume":"60","author":"X Ma","year":"2011","unstructured":"X. Ma, J. Zhang, W. Tong, Reliability analysis of one-hop safety-critical broadcast services in VANETs. IEEE Trans. Veh. Technol. 60(8), 3933\u20133946 (2011)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"10","key":"1548_CR10","doi-asserted-by":"publisher","first-page":"2322","DOI":"10.1109\/LCOMM.2017.2717878","volume":"21","author":"X Ma","year":"2017","unstructured":"X. Ma et al., Comments on \u201cinterference-based capacity analysis of vehicular ad-hoc networks\u201d. IEEE Commun. Lett. 21(10), 2322\u20132325 (2017)","journal-title":"IEEE Commun. Lett."},{"issue":"1","key":"1548_CR11","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1109\/TVT.2010.2085022","volume":"60","author":"YP Fallah","year":"2011","unstructured":"Y.P. Fallah, C.L. Huang, R. Sengupta, H. Krishnan, Analysis of information dissemination in vehicular ad-hoc networks with application to cooperative vehicle safety systems. IEEE Trans. Veh. Technol. 60(1), 233\u2013247 (2011)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"1","key":"1548_CR12","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/s11277-016-3252-6","volume":"89","author":"P Rathee","year":"2016","unstructured":"P. Rathee, R. Singh, S. Kumar, Performance analysis of IEEE 802.11 p in the presence of hidden terminals. Wirel. Pers. Commun. 89(1), 61\u201378 (2016)","journal-title":"Wirel. Pers. Commun."},{"issue":"12","key":"1548_CR13","doi-asserted-by":"publisher","first-page":"2890","DOI":"10.3390\/s17122890","volume":"17","author":"C Song","year":"2017","unstructured":"C. Song, Performance analysis of the IEEE 802.11 p multichannel MAC protocol in Vehicular Ad-Hoc Networks. Sensors 17(12), 2890 (2017)","journal-title":"Sensors"},{"key":"1548_CR14","doi-asserted-by":"crossref","unstructured":"X. Ma et al., Performance of VANET safety message broadcast at rural intersections. In 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC) (IWCMC) (pp. 1617\u20131622). IEEE.","DOI":"10.1109\/IWCMC.2013.6583798"},{"key":"1548_CR15","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.peva.2015.09.005","volume":"95","author":"X Ma","year":"2016","unstructured":"X. Ma, K.S. Trivedi, Reliability and performance of general two-dimensional broadcast wireless network. Perform. Eval. 95, 41\u201359 (2016)","journal-title":"Perform. Eval."},{"key":"1548_CR16","unstructured":"P. Wang et al., Performance analysis of EDCA with strict priorities broadcast in IEEE802. 11p VANETs. In 2014 International Conference on Computing, Networking and Communications (ICNC) (pp. 403\u2013407). IEEE."},{"key":"1548_CR17","doi-asserted-by":"crossref","unstructured":"K. Sjoberg, E. Uhlemann, E.G. Strom, How severe is the hidden terminal problem in VANETs when using CSMA and STDMA?. In 2011 IEEE Vehicular Technology Conference (VTC Fall) (pp. 1\u20135). IEEE.","DOI":"10.1109\/VETECF.2011.6093256"},{"key":"1548_CR18","doi-asserted-by":"publisher","first-page":"1199","DOI":"10.1007\/978-981-13-0761-4_111","volume-title":"Harmony Search and Nature Inspired Optimization Algorithms","author":"RS Tomar","year":"2019","unstructured":"R.S. Tomar et al., in Harmony Search and Nature Inspired Optimization Algorithms. Performance analysis of hidden terminal problem in VANET for safe transportation system (Springer, Singapore, 2019), pp. 1199\u20131208"},{"key":"1548_CR19","doi-asserted-by":"crossref","unstructured":"S. Bastani, B. Landfeldt, The effect of hidden terminal interference on safety-critical traffic in vehicular ad-hoc networks. In Proceedings of the 6th ACM symposium on development and analysis of intelligent vehicular networks and applications. (pp. 75\u201382) (ACM, 2016)","DOI":"10.1145\/2989275.2998180"},{"key":"1548_CR20","doi-asserted-by":"crossref","unstructured":"E. Bozkaya, K. Chowdhury, B. Canberk, in Proceedings of the 12th ACM Symposium on QoS and Security for Wireless and Mobile Networks. SINR and reliability based hidden terminal estimation for next generation vehicular Networks. (pp. 69\u201376) (ACM, 2016)","DOI":"10.1145\/2988272.2988283"},{"key":"1548_CR21","volume-title":"Proceedings of the 11th Space Syntax Symposium","author":"MI Serra","year":"2017","unstructured":"M.I. Serra, B.I. Hillier, in Proceedings of the 11th Space Syntax Symposium. Spatial configuration and vehicular movement (2017)"},{"key":"1548_CR22","unstructured":"K.S. Trivedi, Probability & statistics with reliability, queuing and computer science applications PHI Learning Pvt. Limited (2011)"},{"key":"1548_CR23","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-3-642-12331-3_2","volume-title":"Modeling and tools for network simulation","author":"GF Riley","year":"2010","unstructured":"G.F. Riley, T.R. Henderson, in Modeling and tools for network simulation. The ns-3 network simulator (Springer, Berlin, Heidelberg, 2010), pp. 15\u201334"},{"key":"1548_CR24","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.aap.2017.04.019","volume":"104","author":"S Mecheri","year":"2017","unstructured":"S. Mecheri, F. Rosey, R. Lobjois, The effects of lane width, shoulder width, and road cross-sectional reallocation on drivers\u2019 behavioral adaptations. Accid. Anal. Prev. 104, 65\u201373 (2017)","journal-title":"Accid. Anal. Prev."},{"key":"1548_CR25","doi-asserted-by":"crossref","unstructured":"M. Torrent-Moreno et al., in Proceedings of the 9th ACM International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems. IEEE 802.11-based one-hop broadcast communications: understanding transmission success and failure under different radio propagation environments (pp. 68\u201377) (ACM, 2006)","DOI":"10.1145\/1164717.1164731"},{"key":"1548_CR26","unstructured":"Cohda wireless MK5 device: description, Available At: \n                    https:\/\/cohdawireless.com\/solutions\/hardware\/mk5-obu\/\n                    \n                  . Accessed 18 Feb 2019"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1548-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-019-1548-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1548-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,27]],"date-time":"2020-10-27T00:06:55Z","timestamp":1603757215000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-019-1548-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,28]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["1548"],"URL":"https:\/\/doi.org\/10.1186\/s13638-019-1548-4","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2019,10,28]]},"assertion":[{"value":"14 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 September 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 October 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"240"}}