Formal Verification of Congestion Control Algorithm in VANETs
نویسندگان
چکیده
منابع مشابه
Formal Verification of Congestion Control Algorithm in VANETs
A Vehicular Ad-Hoc Networks (VANETs) is the technology that uses moving cars as nodes in a network to create a mobile network. VANETs turn every participating car into a wireless router, allowing cars of each other to connect and create a network with a wide range. VANETs are developed for enhancing the driving safety and comfort of automotive users. The VANETs can provide wide variety of servi...
متن کاملCongestion Control Algorithm In Vanets
A Vehicular Ad-Hoc Networks (VANETs) are technology that uses moving cars as nodes in a network to create a mobile network. VANET turns every participating car into a wireless router, allowing cars of each other to connect and create a network with a wide range. VANETs are developed for enhancing the driving safety and comfort of automotive users. The VANETs can provide wide variety of services...
متن کاملFormal Verification of Surgical Robot Control Algorithm
With the ever-growing interest in the usage of minimally-invasive surgery, surgical robots are also being extensively used in the operation theaters. Given the safety-critical nature of these surgeries, ensuring the accuracy and safety of the control algorithms of these surgical robots is an absolute requirement. However, traditionally these algorithms have been analyzed using simulations and t...
متن کاملFormal Verification of Safety Message Dissemination Protocol for Vanets
This paper presents a formal verification of a safety message dissemination protocol used in vehicular adhoc networks. It is proposed to use Road Side Units to broadcast road hazard information to vehicles travelling on highways. Quick dissemination of road hazard information, like road blocks, slippery roads and other obstacles can help to prevent road accidents and improve passenger safety. F...
متن کاملDesign and formal verification of DZMBE+
In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Network and Information Security
سال: 2013
ISSN: 2074-9090,2074-9104
DOI: 10.5815/ijcnis.2013.04.01