Review of TDMA-Based MAC protocols for vehicular Ad Hoc networks

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

A robust MAC protocol is required to provide Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) data traffic communication for Vehicular Ad Hoc Networks (VANETs). The data traffic in VANETs is classified as high priority safety messages, control messages and non-safety infotainment related messages. For this purpose, three regional standards have been proposed. However, their performance has been questioned because of their inability to ensure timely delivery of safety messages. Therefore, most of recent research work has been focused on designing an optimal MAC protocol. This paper surveys significant TDMA-based MAC protocols proposed for VANETs. The purpose of this survey is to outline the current status of research work in MAC for VANETs by evaluating the basic idea, operation and performance of these protocols. Furthermore, certain requirements which must be considered for future work in development of optimal TDMA-based MAC protocols for VANETs have also been proposed.

Original languageEnglish
Title of host publication2018 18th IEEE International Conference on Communication Technology, ICCT 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages459-467
Number of pages9
ISBN (Electronic)9781538676349
DOIs
StatePublished - 2 Jan 2019
Event2018 18th IEEE International Conference on Communication Technology, ICCT 2018 - Chongqing, China
Duration: 8 Oct 201811 Oct 2018

Publication series

NameInternational Conference on Communication Technology Proceedings, ICCT
Volume2019-October

Conference

Conference2018 18th IEEE International Conference on Communication Technology, ICCT 2018
Country/TerritoryChina
CityChongqing
Period8/10/1811/10/18

Keywords

  • DSRC
  • IEEE 802.11p
  • MAC protocol
  • TDMA
  • VANETs
  • WAVE

Fingerprint

Dive into the research topics of 'Review of TDMA-Based MAC protocols for vehicular Ad Hoc networks'. Together they form a unique fingerprint.

Cite this