2015
DOI: 10.1109/tvt.2014.2325831
|View full text |Cite
|
Sign up to set email alerts
|

Experimental Characterization and Modeling of RF Jamming Attacks on VANETs

Abstract: Abstract-In this work, we evaluate the performance of 802.11p-based vehicular communications in the presence of RF jamming attacks. Specifically, we characterize the transmission success rate of a car-to-car link subject to constant, periodic, and reactive RF jamming. First, we conduct extensive measurements in an anechoic chamber, where we study the benefits of built-in techniques for interference mitigation. In addition, we identify that the periodic transmission of preamblelike jamming signals can hinder su… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
45
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 67 publications
(45 citation statements)
references
References 23 publications
0
45
0
Order By: Relevance
“…Jamming attack does not require any particular knowledge of the semantics of the exchanged messages [58]. Although jamming attacks are not specific to V2X systems (i.e., can be a threat for any wireless network), such attacks can increase the latency in the V2X communications and reduce the reliability of the network [62].…”
Section: B V2x Attack Classificationsmentioning
confidence: 99%
“…Jamming attack does not require any particular knowledge of the semantics of the exchanged messages [58]. Although jamming attacks are not specific to V2X systems (i.e., can be a threat for any wireless network), such attacks can increase the latency in the V2X communications and reduce the reliability of the network [62].…”
Section: B V2x Attack Classificationsmentioning
confidence: 99%
“…Today, PC-based or FPGA based software radio platforms such as GNU Radio/USRP [8] and Wireless Open-Access Research Platform (WARP) [9] are not difficult to obtain and quickly implement wireless jamming attacking tools. Puñalet al have developed some jamming attacking tools using WARP board to evaluate the risk of various jamming attacking methods using real cars [10]. The risk of jamming attack is inevitable.…”
Section: Fig 1 Autonomous Platoonmentioning
confidence: 99%
“…In this paper, we focus on the effect of the periodical jammer because [10] presented the periodical jammer is effective even if the SINR of the jammer at the receiver (victim) is small, and thus it can be a strong candidate that attackers will use. …”
Section: B Jamming Attack Modelsmentioning
confidence: 99%
“…It has been characterized and modelled in [40], whereas a detection mechanism has been proposed in [41]. It is clear that diminishing the effect of jamming is not easy, specially because there's only one safety channel on the 802.11p protocol.…”
Section: F Securitymentioning
confidence: 99%