2023
DOI: 10.1155/2023/8080669
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning-Based Jamming Detection for Safety Applications in Vehicular Networks: Individual Detection?

Huong Nguyen-Minh,
Tung Tran Hoang,
Giang Pham Thanh

Abstract: Intelligent transportation system (ITS) refers to advanced applications to make transportation safer and more intelligent. The dynamic and diverse natures of the system have been creating many challenges in ITS deployment and security. The progression in recent years of machine learning provides potentially strong methods to exploit data sources from transportation networks. Machine learning-based approaches promise to deal with various challenges in networks thanks to their ability to adapt to the changing ne… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 34 publications
(58 reference statements)
0
1
0
Order By: Relevance
“…There are several studies [6 -11] in the literature seeking how to effectively tackle jamming attacks on wireless networks. In recent times, a jamming detection attack [12] was designed based on machine learning algorithms for vehicular networks [13]. Study [12] investigated the use of hidden rules and how it affects the observation changes under a reactive jamming attack while the latter classified the different jamming attacks based on the techniques employed by the attackers [14].…”
Section: Related Workmentioning
confidence: 99%
“…There are several studies [6 -11] in the literature seeking how to effectively tackle jamming attacks on wireless networks. In recent times, a jamming detection attack [12] was designed based on machine learning algorithms for vehicular networks [13]. Study [12] investigated the use of hidden rules and how it affects the observation changes under a reactive jamming attack while the latter classified the different jamming attacks based on the techniques employed by the attackers [14].…”
Section: Related Workmentioning
confidence: 99%