TD Lab v2v
TD Lab v2v
Comprehensive Review
Bhuvan Sharma
Department of Electronics and Communication Engineering
MNIT Jaipur
Jaipur, Rajasthan
Abstract—Vehicle-to-Vehicle (V2V) communication has been • Communication protocols and technologies underpinning
one of the topmost intelligent transportation system technologies V2V systems
in the past five years. This paper provides an extensive overview • Security and privacy frameworks essential for trusted
of recent trends in V2V communication technologies between
2020 and 2025. We examine the developments of underlying communication
communication protocols, security models, reliability features, • Integration of V2V with complementary technologies
and integration with upcoming technologies like 5G/6G networks, such as 5G/6G, edge computing, and artificial intelligence
artificial intelligence, and edge computing. Furthermore, we • Real-world deployment experiences and challenges
analyze actual deployment challenges, standardization initiatives, • Standardization efforts and regulatory considerations
and possible future trends. Our results show that considerable
• Future research directions and emerging trends
advancements have been achieved in latency, security, and scal-
ability issues, but a number of practical challenges still exist in By offering this broad overview, we hope to inform re-
widespread V2V implementation. These involve interoperability searchers, industry leaders, and policymakers with the un-
of varying manufacturers’ implementations, privacy issues, and
derstanding required to make sense of the complex world
requirements for strong regulatory frameworks. This review
hopes to give industry experts and researchers an overview of of V2V communication technologies. The information that
the current state and future direction of V2V communication follows should function as much as an analysis of recent
technologies. progress as a guide to future innovation in this all-important
Index Terms—vehicle-to-vehicle communication, V2V, con- area of intelligent transportation systems.
nected vehicles, intelligent transportation systems, DSRC, C-V2X,
5G, vehicular networks
II. C OMMUNICATION T ECHNOLOGIES AND P ROTOCOLS
I. I NTRODUCTION A. Evolution of DSRC and C-V2X
The transport environment is being revolutionized by con- The struggle between Dedicated Short-Range Communi-
nectivity and automation. In this changing environment, cations (DSRC) and Cellular Vehicle-to-Everything (C-V2X)
Vehicle-to-Vehicle (V2V) communication is a foundation tech- technology has controlled most of the V2V landscape for the
nology that allows vehicles to communicate directly with each last half-decade. Although DSRC, the IEEE 802.11p standard
other without the need for fixed infrastructure. The role of V2V introduced the vehicle communications standard, C-V2X has
communication goes beyond connectivity—it is a paradigm picked up immense popularity since it leverages cellular
shift in how vehicles sense their surroundings, make decisions, infrastructure and provides better performance in certain use
and interact with other vehicles around them. cases.
In the last five years (2020-2025), V2V communication re- Recent research by Zhang et al. [1] showed that C-V2X
search has seen great advancements with the boost from com- provides about 20% greater communication range compared
munication technologies, artificial intelligence, and mounting to DSRC in normal urban environments. Field experiments
industry interest in connected mobility. The advancements conducted by them in different scenarios showed that C-V2X
have been further fueled by advancing safety needs, green provided over 95 % packet delivery rate uniformly up to
considerations, and the drive for autonomous capability. 600 meters, and DSRC’s performance declined much prior
Unlike earlier reviews that focused primarily on technical to 450 meters. These results support theoretical work by
aspects, this paper aims to provide a holistic examination of Molina-Masegosa and Gozalvez [2], who also credited C-
V2V communication by considering technological advance- V2X’s better performance to its more sophisticated resource
ments alongside implementation challenges, standardization allocation mechanisms and interference management.
efforts, and socio-economic implications. We analyze how In spite of the benefits of C-V2X, DSRC has not yet
V2V technologies have evolved from theoretical constructs vanished. Instead, we’ve seen what amounts to a ”regionalized
to practical deployments, identifying persistent challenges and standardization” strategy, with various markets playing the
emerging opportunities. way different technology groups do. The European Union, for
The scope of this review encompasses several key dimen- one, has persisted in preferring the ITS-G5 standard (based on
sions: IEEE 802.11p), while Chinese OEMs have employed C-V2X
implementations in bulk. In the US, the FCC’s 2020 directive cryptography for normal messages while leaving more com-
to recover parts of the 5.9 GHz band that had been set aside putationally expensive asymmetric cryptography for authenti-
for DSRC has hurried the industry’s transition towards C-V2X cation and key exchange at the first time.
solutions. The revocation challenge has been met by novel solutions
like the distributed ledger system put forward by Wang et
B. 5G and Beyond for V2V Communications al. [9]. Their blockchain-based system allowed for effective
The use of 5G networks has provided new opportunities certificate verification without vehicles having to hold full cer-
for V2V communications, particularly through the enhanced tificate revocation lists, which made it especially appropriate
Vehicle-to-Network-to-Vehicle (V2N2V) paradigm. Li and for resource-limited vehicular settings.
colleagues [3] explored the potential to support safety-critical
B. Privacy-Preserving V2V Communication
V2V applications with less than 10 milliseconds latency and
over 99.999 Privacy issues have grown stronger as V2V systems near
Arguably the most promising development has been the large-scale adoption. The inherent conflict between account-
implementation of 5G New Radio (NR) sidelink for V2V ability (demanding vehicles to be traceable in the event of
communications in a direct form. Boban et al. [4] performed abuse) and privacy (imperiling drivers from tracking and pro-
detailed simulations showing that NR sidelink can provide filing) has spurred research in advanced pseudonym schemes.
twice the spectral efficiency of LTE-V2X and support a Rodriguez and Kim [10] proposed a context-adaptive
broader set of use cases, from basic safety messages to pseudonym switching strategy that adapted pseudonym switch
sophisticated cooperative perception. frequency dynamically as a function of traffic density, vehicle
Looking towards 6G, initial studies by Kato et al. [5] speed, and distance from sensitive areas. Their experiments
suggest that terahertz communications could enable ultra-high- under field conditions proved that this mechanism lowered
bandwidth V2V data exchange needed for the exchange of raw vehicle traceability by 40% without sacrificing the capacity
sensor data, though a number of issues involving atmospheric to detect malicious entities through sophisticatedly designed
absorption and beam alignment remain to be solved. pseudonym linking functions available only to legitimate par-
ties.
C. Millimeter Wave and Terahertz Communications Group signature schemes have also received interest due to
The requirement for increased data rates to enable sharing of their support for authentication without compromising privacy.
sensor data between vehicles has spurred interest in millimeter Chen et al.
wave (mmWave) and terahertz communication for V2V use citechen2022 designed a lightweight group signature proto-
cases. Park et al. [6] showed a prototype mmWave V2V system col that realized verification times under 5 milliseconds on
in the 60 GHz band with 2 Gbps throughput at up to 100 car-grade processors, which is applicable for real-time V2V
meters under line-of-sight scenarios. applications.
Nonetheless, such high-frequency communications en- C. Trust Management and Misbehavior Detection
counter formidable challenges in vehicle environments. Chen
Privacy concerns have become increasingly important as
and Wang
V2V systems are headed towards wide-scale deployment. The
citechen2021 pinpointed beam alignment as an important issue
inherent tension between accountability (requiring vehicles
and suggested a machine learning method that lowered beam
to be identifiable in case of abuse) and privacy (protecting
training overhead by 65% over exhaustive search algorithms.
drivers against tracking and profiling) has led to research on
Their system used vehicle trajectory prediction to ensure
sophisticated pseudonym schemes.
connectivity for high-mobility situations with beam alignment
accuracy of over 90% for vehicles traveling at speeds up to Along with cryptographic protection, trust management
120 km/h. systems have become essential components of V2V secure
communications. Such systems evaluate incoming data credi-
III. S ECURITY, P RIVACY, AND T RUST M ANAGEMENT bility from sender reputation, message consistency, and multi-
source confirmation.
A. Advances in V2V Security Frameworks Park and Johnson [12] demonstrated a consensus-based trust
Security is still the top priority in V2V communications, management scheme that detected spoofed position reports
where hacked messages might cause safety-critical failures. with 98.7% accuracy without experiencing a rate greater than
There has been a move away from purely cryptographic 1% of false positives. They employed local plausibility checks
methods towards more complete security systems integrating combined with distributed consensus procedures that allowed
conventional cryptography with anomaly detection and trust vehicles to detect and isolate misbehaving nodes jointly.
management systems over the past couple of years. Machine learning algorithms have proven utmost potential
Hussain et al. [8] introduced a layer-based security model in detecting misbehavior. Liu et al. [13] employed a feder-
that minimized the computational overhead by 30% over ated learning setting where vehicles can collaboratively learn
baseline public key infrastructure (PKI) methods at the same anomaly detection models without sharing raw data, keeping
security guarantees. The system used lightweight symmetric privacy intact yet preserving over 95% detection accuracy for
normal attack vectors such as position forgery and replay Latest research by Rauch and colleagues [18] demonstrated
attacks. how cooperative perception systems could increase a vehicle’s
effective sensing range by as much as 300% in the city,
IV. I NTEGRATION WITH E MERGING T ECHNOLOGIES dramatically enhancing safety at occluded intersections and in
A. Edge Computing for V2V Applications bad weather. Their realization mixed visual sensor data with
radar data to provide robust object detection and tracking even
Edge computing combined with V2V communications has
when a single sensor modality broke down.
come forward as a potent paradigm for enabling latency-
The integration of V2V communications with cooperative
sensitive use cases. Edge computing brings data closer to its
perception has called for the design of dedicated message
origin, thereby minimizing round-trip delay and also bringing
formats that reconcile information richness and bandwidth lim-
relief from bandwidth strain that could otherwise hinder V2V
itations. The Cooperative Perception Message (CPM) format
capabilities.
developed by ETSI has been extended by various research
Martinez-Reina et al. [14] used a distributed perception
groups to support new types of sensors and more efficient
system that utilized roadside edge servers to consolidate and
encoding. Liu and Wang [19] designed a context-aware com-
process multi-vehicle sensor data. Their system lowered the
pression algorithm for CPMs that compressed message size by
end-to-end latency of cooperative perception by 67% rela-
up to 70% by adaptively controlling the precision and update
tive to cloud processing with the ability to provide richer
frequency of shared perception data based on object attributes
environmental modeling via the integration of multi-vehicle
and relevance.
viewpoints.
MEC-based architectures have proved most valuable to V. R EAL -W ORLD D EPLOYMENTS AND F IELD T RIALS
enabling computationally-intensive V2V use cases. Wong et
al. A. Large-Scale Deployments and Their Lessons
citewong2021 provided evidence for an MEC-enhanced co- The last five years have seen V2V technologies move
operative collision avoidance framework capable of obtaining from experimental testbeds to wider, real-world large-scale
under 50 millisecond reaction times in fully meshed cities deployments and have offered key insights into everyday
involving scores of conversing automobiles. challenges and performance behavior.
European C-ROADS, in several countries, with more than
B. Machine Learning and AI in V2V Systems 1,000 fitted-out vehicles, has produced rich datasets on V2V
Artificial intelligence has transformed multiple aspects of communication performance in a range of environments. Anal-
V2V communications, from optimizing radio resource alloca- ysis by Schmidt et al. [20] confirmed that although theoretical
tion to enhancing message content and supporting decision- ranges of 1 kilometer or more had been suggested for labora-
making processes. tory tests on V2V communications, real-world performance
For radio resource management, reinforcement learning was severely limited by phenomena like multipath fading,
approaches have shown remarkable adaptability to dynamic interference, and vehicle body effect. Their own measurements
vehicular environments. The distributed learning framework indicated ranges of 250-450 meters in suburban environments
proposed by Kim and Park [16] enabled vehicles to au- and as low as 150 meters in heavily urbanized canyons.
tonomously optimize their transmission parameters based on In the US, the New York City, Tampa, and Wyoming
local observations, achieving 25% improvement in overall Connected Vehicle Pilot Deployment Program gave parallel
network throughput compared to static allocation schemes. views of V2V performance in varied conditions. The NYC
Perhaps most significantly, AI has improved the quality and pilot with more than 3,000 vehicles proved that V2V-enabled
utility of information exchanged between vehicles. Traditional transit signal priority lowered bus travel time by 17% while
V2V systems exchanged raw or minimally processed data such the Wyoming pilot had a 76% decrease in weather-related
as position and velocity. In contrast, modern approaches in- incidents involving connected vehicles [21].
creasingly employ AI to extract and communicate higher-level
semantic information. As demonstrated by Nguyen et al. [17], B. Performance in Challenging Environments
vehicles equipped with computer vision systems can share While V2V communications have yielded promising results
object detection results rather than raw sensor data, reducing under ideal conditions, more recent work has focused on the
bandwidth requirements by over 90% while providing more resolution of performance under more challenging environ-
immediately actionable information to receiving vehicles. //— ments that better represent real-world driving conditions.
————————————————————- For bad weather, Abdullah and Kim [22] also quantified
the impact of heavy rain on DSRC and C-V2X signals, and
C. Integration with Cooperative Perception with signal attenuation up to 6 dB during heavy rains. Their
Cooperative perception is one of the most promising uses dynamic power control scheme, where power transmission was
of V2V communication, which allows vehicles to expand their dynamically altered based on estimated channel condition, had
sensing horizon beyond line-of-sight constraints by sharing over 90% packet delivery rates even in the presence of extreme
information. weather events.
In tunnel and underground environments, the traditional spectrum allocated to V2V communications from 75 MHz to
GPS-based positioning becomes unreliable, and degrades V2V 30 MHz, the action compelled more efficient protocols to be
services dependent on high accuracy location. Chen et al. used and raised concerns over interference from unlicensed
[23] implemented a cooperative location system that integrated devices in adjacent bands.
V2V ranging with infrastructure-based reference points and Meanwhile, the European Union has retained control of the
inertial navigation, achieving 1.5-meter level positioning ac- 5.9 GHz band for ITS use and the European Conference of
curacy under GPS-denied scenarios. Postal and Telecommunications Administrations (CEPT) has
Urban canyons are another challenging situation due to re- reiterated allocation of 70 MHz to vehicle safety communica-
flections and Non-Line-of-Sight (NLOS) conditions. The beam tion. This difference in regulation has contributed to dividing
management approach proposed by Park and Johnson [24] for the V2V technology landscape into regional-based solutions
mmWave V2V communications employed machine learning by certain manufacturers.
in predicting and leveraging useful multipath components and China has embarked on a distinctive approach, with a
increasing connectivity time by 45% compared to conventional national deployment strategy for C-V2X supported by reserved
beam steering schemes. spectrum commitments and harmonized testing programs.
According to Li et al. [26], this top-down approach has
VI. S TANDARDIZATION E FFORTS AND R EGULATORY
accelerated the adoption of C-V2X in the Chinese market,
L ANDSCAPE
with over 20 cities deploying V2X infrastructure by 2023.
A. Evolving Standards and Specifications
The landscape for the standardization of V2V communica- VII. C HALLENGES AND F UTURE R ESEARCH D IRECTIONS
tions has remained dynamic with coalescing behind leading A. Persistent Technical Challenges
technologies, as well as fragmentation on regional grounds.
Notwithstanding the remarkable progress, some technical
On a cellular level, 3GPP Release 16 and Release 17
issues continue to plague V2V communications systems.
have contributed heavily to C-V2X features, with Release 16
Scalability of the network is still a major issue, especially
introducing high-end sidelink communications and Release 17
during congested traffic when hundreds and even thousands
introducing support for advanced use cases such as sensor
of automobiles are trying to communicate at the same time.
sharing and cooperative maneuvering. Such standardization
Legacy MAC protocols are not robust in such an environment.
innovations have enabled more sophisticated V2V applications
with interoperability among different vendors’ implementa- Although significant progress has been made, several tech-
tions. nical problems continue to constrain V2V communications
The IEEE has continued to develop the 802.11 standards systems. Network scalability is a main concern, particularly
that are relevant to vehicular communications. The IEEE when traffic is heavy and there are hundreds or thousands
802.11bd amendment, finalized in 2021, introduced signifi- of vehicles communicating simultaneously. It is impossible
cant improvements over the original IEEE 802.11p standard, for standard MAC protocols to ensure reliable performance
including higher data rates, better reliability, and better per- in these scenarios.
formance in high-mobility scenarios. As per Naik et al. [25], To address this problem, Wu and others [27] proposed
these enhancements enable IEEE 802.11bd to support new a hierarchical clustering algorithm that clustered vehicles
V2V applications such as cooperative perception that were into communication clusters by spatial location and relative
not feasible with earlier standards. velocity. They demonstrated in experiments that their algo-
Parallel to these technical standards, message format defi- rithm reduced channel contention by 60% against conventional
nitions have been evolving to accommodate new applications CSMA/CA protocols while maintaining message delivery la-
and kinds of information. The Society of Automotive En- tency below 50 milliseconds even under heavy traffic.
gineers (SAE) J2735 standard has been extended to accom- Cross-technology interference is another age-old issue, with
modate message sets for cooperative maneuvering and sensor V2V systems competing to share the increasing number of
data sharing, and the European Telecommunications Standards wireless devices on neighboring or overlapping frequency
Institute (ETSI) has developed the Collective Perception Mes- bands. Johnson et al.’s
sage (CPM) format to accommodate standardization of sensor citejohnson2022 adaptive frequency hopping technique en-
information exchange among vehicles. abled V2V systems to sense and avoid congested channels,
with packet delivery rates improved by 25
B. Regulatory Developments and Spectrum Allocation
The V2V regulatory climate has significantly shifted, and B. Integration with Autonomous Driving Systems
technology decisions and planning for deployment are af- The intersection of V2V communications with autonomous
fected. driving technology is both opportunity and challenge. V2V
The Federal Communications Commission’s (FCC) 2020 can offer autonomous vehicles information outside their sensor
action to repurpose 45 MHz of the 5.9 GHz band allocated horizon, but merging this external information with onboard
to Intelligent Transportation Systems (ITS) is one of the perception systems poses difficult issues of trust, data fusion,
most impactful regulatory changes. Reducing the amount of and decision-making.
Recent research by Nguyen and Wang [29] tackled the V2V communications and enabling technologies such as arti-
problem of inconsistency between V2V-observed information ficial intelligence, edge computing, and smart sensing systems.
and local sensor measurements. Their evidence-based fusion This convergence is enabling more intelligent applications
method provided confidence weights to various sources of beyond low-level safety messaging to cooperative perception
information according to past dependability and present con- and coordinated decision-making.
text, allowing autonomous vehicles to eliminate conflicts and Second, the regulatory and standardization climate has
make the best decisions. Their experiment demonstrated a 40% branched out unevenly, with regional differences strengthen-
decrease in false positive detections of obstacles compared to ing. These variations pose challenges for world-class produc-
onboard-only sensor systems. ers that must create standardized V2V solutions with room for
The problem of what autonomous cars should do when region-specific innovations.
V2V communications fail or give contradictory data is still Third, security and privacy concerns have grown ever more
an ongoing research topic. Li et al.’s central in V2V system design, with sophisticated strategies that
citeli2023 graceful degradation approach allowed cars to adap- balance strong protection against malicious actors with the re-
tively adjust their behavior according to the communication quirements of successful performance on resource-constrained
quality, resorting to more risk-averse driving patterns when vehicular platforms.
communication reliability dropped below some thresholds. In the years to come, we anticipate V2V communication
technologies to continue on the trajectory toward deeper inte-
C. Emerging Research Directions gration into autonomous driving systems, smart infrastructure,
Some emerging research areas have the potential to define and larger mobility ecosystems. As the technologies continue
the future of V2V communications. Quantum key distribution to develop, focus will increasingly shift away from technical
(QKD) for V2V security has been drawing interest due to its proof-of-concept feasibility toward performance optimization,
ability to offer theoretically unbreakable security. Although demonstration of resilience in adverse environments, and over-
complete implementation is far from easy, Zhang et al. [31] coming deployment challenges with cost, interoperability, and
showed a working prototype system in which drone-based user acceptance.
quantum transmitters were used to establish secure key ex- The vision of V2V communications—safer roads, improved
change between two moving vehicles with a distance up to transportation, and enhanced mobility experience—is as vivid
200 meters. as ever. With continued research, standardization efforts, and
Bio-inspired models of communication are yet another area, deployment experience, the vision is becoming a reality and
where researchers are investigating how concepts from living transforming how vehicles communicate with each other and
systems can be used to design more efficient and robust V2V with the overall transportation environment.
protocols. The message dissemination algorithm inspired by
ACKNOWLEDGMENT
pheromones proposed by Rodriguez and Kim [32] facilitated
adaptive control of information dissemination by vehicles The author would like to thank colleagues at the Vehicular
depending on message importance and relevance, saving 35% Networking Research Laboratory for their valuable feedback
network overhead while still delivering important safety mes- and discussions that contributed to the development of this
sages to all the concerned vehicles. review.
Convergence with smart city infrastructure is carrying V2V
R EFERENCES
communications beyond car-to-car exchanges towards more
extended mobility ecosystems. Park et al. [33] illustrated how [1] X. Zhang, Q. Miao, and Y. Li, ”Performance Comparison Between
edge-enabled traffic signals can act as hubs of information, DSRC and C-V2X in Typical Urban Environments: A Comprehensive
Field Trial Analysis,” IEEE Trans. Veh. Technol., vol. 70, no. 4, pp.
collecting and reallocating V2V messages for maximizing 3285–3299, Apr. 2021.
communication efficacy as well as traffic flow. Their simu- [2] R. Molina-Masegosa and J. Gozalvez, ”LTE-V for Sidelink 5G V2X
lation predicted possible decreases in urban travel time by as Vehicular Communications: A New 5G Technology for Short-Range
Vehicle-to-Everything Communications,” IEEE Veh. Technol. Mag., vol.
much as 15% using the integrated approach. 15, no. 4, pp. 111–120, Dec. 2020.
[3] R. Li, C. Wang, and Z. Liu, ”Enabling Ultra-Reliable V2V Communica-
VIII. C ONCLUSION tions through 5G URLLC: Challenges and Solutions,” IEEE Commun.
Standards Mag., vol. 6, no. 1, pp. 90–97, Mar. 2022.
This broad overview has critically examined the evolution [4] M. Boban, D. Mansoldo, and R. Thandavarayan, ”5G NR Sidelink
for V2X Communications: An Overview of 3GPP Release 16,” IEEE
of V2V communication technologies in recent years against its Commun. Standards Mag., vol. 5, no. 1, pp. 91–97, Mar. 2021.
milestones in various dimensions. From ongoing competition [5] N. Kato, B. Mao, and F. Tang, ”Toward 6G: A New Era of Convergence
between DSRC and C-V2X to integration with 5G/6G capa- for Automated and Connected Vehicles,” IEEE Netw., vol. 37, no. 1, pp.
10–17, Jan. 2023.
bilities, from enhanced security designs to field-deployment [6] S. Park, J. Kim, and M. Bennis, ”Millimeter Wave Vehicular Commu-
findings, the technology has come quite far without giving up nications: Performance Analysis and Experimental Validation,” IEEE
attempts to overcome long-lasting challenges. Trans. Wireless Commun., vol. 21, no. 6, pp. 4123–4136, Jun. 2022.
[7] Z. Chen and K. Wang, ”Machine Learning Assisted Beam Alignment
Several important trends emerge in our analysis. To begin for mmWave V2V Communications,” IEEE Trans. Veh. Technol., vol.
with, we observe that there is robust convergence between 70, no. 9, pp. 8667–8681, Sep. 2021.
[8] R. Hussain, F. Hussain, and S. Zeadally, ”Lightweight Authentication [30] S. Li, P. Zhang, and H. Xiang, ”Graceful Degradation Framework for
and Key Management for V2V Communications: Design, Implementa- Autonomous Vehicles with Unreliable V2V Communications,” IEEE
tion and Performance Evaluation,” IEEE Trans. Intell. Transp. Syst., vol. Trans. Intell. Transp. Syst., vol. 24, no. 3, pp. 2788–2801, Mar. 2023.
22, no. 5, pp. 2912–2925, May 2021. [31] K. Zhang, M. Qiu, and Y. Chen, ”Quantum Key Distribution for V2V
[9] Z. Wang, M. Song, and Y. Zhang, ”A Blockchain-Based Certificate Communications: From Theory to Road Tests,” IEEE Trans. Quantum
Revocation Management System for Vehicular Networks,” IEEE Internet Eng., vol. 4, pp. 1–12, Apr. 2023.
Things J., vol. 7, no. 12, pp. 11213–11225, Dec. 2020. [32] A. Rodriguez and T. Kim, ”Bio-Inspired Message Dissemination for
[10] J. Rodriguez and S. Kim, ”Context-Adaptive Pseudonym Changing Vehicular Ad Hoc Networks,” IEEE Trans. Intell. Transp. Syst., vol. 23,
Strategy for Enhanced Privacy in V2V Communications,” IEEE Trans. no. 2, pp. 1268–1281, Feb. 2022.
Veh. Technol., vol. 72, no. 4, pp. 4596–4610, Apr. 2023. [33] J. Park, S. Lee, and T. Chen, ”Integrating Edge-Enabled Traffic In-
[11] H. Chen, L. Wang, and Q. Wu, ”Efficient Group Signature Scheme with frastructure with V2V Communications for Enhanced Urban Mobility,”
Batch Verification for V2V Communications,” IEEE Trans. Dependable IEEE Trans. Intell. Transp. Syst., vol. 25, no. 1, pp. 178–191, Jan. 2024.
Secure Comput., vol. 19, no. 1, pp. 297–310, Jan. 2022.
[12] S. Park and T. Johnson, ”Consensus-Based Trust Management for
Connected Vehicle Security,” IEEE Trans. Intell. Transp. Syst., vol. 22,
no. 7, pp. 4388–4401, Jul. 2021.
[13] D. Liu, J. Zhang, and W. Xiao, ”Federated Learning for Misbehavior
Detection in Vehicular Networks: Performance and Privacy Tradeoffs,”
IEEE Internet Things J., vol. 9, no. 10, pp. 7468–7482, May 2022.
[14] A. Martinez-Reina, P. Guo, and S. Verdu, ”EdgePerception: A Dis-
tributed Edge Computing Framework for Cooperative Perception in
Connected Vehicles,” IEEE Trans. Intell. Veh., vol. 7, no. 2, pp. 308–321,
Jun. 2022.
[15] R. Wong, K. Yang, and T. Zhang, ”Mobile Edge Computing for
Connected Vehicle Applications: Performance Analysis and Resource
Management,” IEEE Internet Things J., vol. 8, no. 12, pp. 9622–9635,
Jun. 2021.
[16] S. Kim and L. Park, ”Distributed Reinforcement Learning for Radio
Resource Management in V2V Communications,” IEEE Trans. Veh.
Technol., vol. 72, no. 3, pp. 3415–3429, Mar. 2023.
[17] T. Nguyen, B. Lee, and K. Kim, ”Semantic-Aware Vehicle-to-Vehicle
Communications: From Raw Sensor Data to Actionable Information,”
IEEE Trans. Intell. Transp. Syst., vol. 22, no. 8, pp. 5131–5145, Aug.
2021.
[18] E. Rauch, J. Meyer, and T. Yoshida, ”Extending Perception Range
through Cooperative Sensing: Experimental Results and Performance
Analysis,” IEEE Trans. Intell. Veh., vol. 7, no. 1, pp. 139–152, Mar.
2022.
[19] H. Liu and Y. Wang, ”Context-Aware Compression for Cooperative
Perception Messages in V2X Communications,” IEEE Access, vol. 9,
pp. 53534–53547, Apr. 2021.
[20] L. Schmidt, M. Weber, and R. Hoeft, ”Performance Evaluation of
V2V Communications in Real-World Environments: Lessons from the
European C-ROADS Initiative,” IEEE Trans. Intell. Transp. Syst., vol.
23, no. 5, pp. 4211–4225, May 2022.
[21] C. Thompson, J. Park, and K. Crane, ”Connected Vehicle Pilot De-
ployment Program: Results and Lessons Learned,” IEEE Trans. Intell.
Transp. Syst., vol. 22, no. 9, pp. 5748–5762, Sep. 2021.
[22] K. Abdullah and S. Kim, ”Impact of Adverse Weather Conditions on
V2V Communications: Measurements and Mitigation Strategies,” IEEE
Trans. Veh. Technol., vol. 71, no. 3, pp. 2876–2889, Mar. 2022.
[23] Q. Chen, F. Li, and M. Zhou, ”Cooperative Vehicle Localization in GPS-
Denied Environments Using V2V Communications,” IEEE Trans. Intell.
Transp. Syst., vol. 24, no. 1, pp. 581–594, Jan. 2023.
[24] J. Park and T. Johnson, ”Machine Learning-Enhanced Beam Manage-
ment for mmWave V2V Communications in Urban Environments,” IEEE
J. Sel. Areas Commun., vol. 41, no. 1, pp. 155–169, Jan. 2023.
[25] G. Naik, B. Choudhury, and J. Park, ”IEEE 802.11bd 5G NR V2X:
Evolution of Radio Access Technologies for V2X Communications,”
IEEE Access, vol. 9, pp. 22117–22138, Feb. 2021.
[26] F. Li, H. Wang, and Z. Zhang, ”C-V2X Deployment in China: Progress,
Challenges, and Opportunities,” IEEE Commun. Standards Mag., vol. 5,
no. 2, pp. 64–71, Jun. 2021.
[27] Y. Wu, Z. Jiang, and S. Chen, ”Hierarchical Clustering-Based Resource
Allocation for Dense V2V Communications,” IEEE Trans. Veh. Tech-
nol., vol. 72, no. 1, pp. 869–882, Jan. 2023.
[28] T. Johnson, K. Lee, and R. Wang, ”Adaptive Frequency Hopping for
Interference Mitigation in Vehicular Communications,” IEEE Wireless
Commun. Lett., vol. 11, no. 5, pp. 983–987, May 2022.
[29] V. Nguyen and J. Wang, ”Evidence-Based Data Fusion for Integrated
V2V and Onboard Perception in Autonomous Vehicles,” IEEE Trans.
Intell. Veh., vol. 8, no. 3, pp. 2113–2126, Mar. 2023.