GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference 2009
DOI: 10.1109/glocom.2009.5425381
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Radio Interference Attacks in VANET

Abstract: Due to their nature, Vehicular Ad hoc NETwork (VANET) is vulnerable to Denial of Service (DoS) attacks, such as jamming attack. The objective of a jammer is to interfere with legitimate wireless communications, and to degrade the overall QoS of the network. In this paper, we propose a model to detect a particular class of Jamming attack, in which the jammer transmits only when valid radio activity is signaled from its radio hardware. This detection model is based upon the measurement of error distribution.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
39
0
2

Year Published

2013
2013
2021
2021

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 70 publications
(41 citation statements)
references
References 15 publications
(11 reference statements)
0
39
0
2
Order By: Relevance
“…This is not surprising, as these two important areas have traditionally been addressed separately in the literature. However, security is one of the main challenges for VANETs [11], and it is known that security always comes with a price in terms of QoS performance degradation, since securing communications against the adversary typically consumes network resources in terms of bandwidth and/or hardware capacities [12]. This price may be tolerable in wireline networks, but it may dominate the consumption of scarce network resources in VANETs.…”
Section: Introductionmentioning
confidence: 99%
“…This is not surprising, as these two important areas have traditionally been addressed separately in the literature. However, security is one of the main challenges for VANETs [11], and it is known that security always comes with a price in terms of QoS performance degradation, since securing communications against the adversary typically consumes network resources in terms of bandwidth and/or hardware capacities [12]. This price may be tolerable in wireline networks, but it may dominate the consumption of scarce network resources in VANETs.…”
Section: Introductionmentioning
confidence: 99%
“…The adversary can use different jamming techniques like one-channel jamming or swiping between all channels and trying to jam them all. We would need a system such as [10] to help detect and mitigate such attacks. Other countermeasures for DoS attack in CACC vehicle stream involve traditional solutions such as channel switching, technology switching, frequency hopping, or utilizing multiple radio transceivers.…”
Section: B Network Layer Attacksmentioning
confidence: 99%
“…A VANET can be utilized to offer following characteristics in the communication. [11] VANETs has its own separate characteristics given below. 1) High Mobility: -In VANETs, nodes are frequently moving at high speed.…”
Section: Characteristics Of Vehicular Ad Hoc Networkmentioning
confidence: 99%
“…The subsequent list presents some security challenges. [11] 1) Real time Constraint: Vehicular ad hoc network is time critical wherever safety connected message ought to be delivered with 100ms transmission delay. Therefore, to realize real time constraint, fastest cryptographic algorithmic rule ought to be used.…”
Section: B Security Challenges In Vanetsmentioning
confidence: 99%