2016
DOI: 10.1155/2016/8141204
|View full text |Cite
|
Sign up to set email alerts
|

MIMO Techniques for Jamming Threat Suppression in Vehicular Networks

Abstract: properly cited.Vehicular ad hoc networks have emerged as a promising field of research and development, since they will be able to accommodate a variety of applications, ranging from infotainment to traffic management and road safety. A specific security-related concern that vehicular ad hoc networks face is how to keep communication alive in the presence of radio frequency jamming, especially during emergency situations. Multiple Input Multiple Output techniques are proven to be able to improve some crucial p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…CR research teams should be focusing on improving various aspects of their testbeds. In addition, modern CRs should be enriched with novel features, such as various telecom-munication capabilities, emulated Banking systems, hospitals [81], simulated smart grids, automated vehicles [82], Virtual Cyber Centres of Operation, wireless sensor networks, real time Intrusion Detection Systems [83], honeypots [84], novel authentication mechanisms [85], mobile security scenarios, and several privacy mechanisms. By adding these features, new attack scenarios can be easily deployed on a testbed, revealing vulnerabilities of the various systems and thus giving the researchers the opportunity of developing innovative defence mechanisms.…”
Section: Challenges and Future Directionsmentioning
confidence: 99%
“…CR research teams should be focusing on improving various aspects of their testbeds. In addition, modern CRs should be enriched with novel features, such as various telecom-munication capabilities, emulated Banking systems, hospitals [81], simulated smart grids, automated vehicles [82], Virtual Cyber Centres of Operation, wireless sensor networks, real time Intrusion Detection Systems [83], honeypots [84], novel authentication mechanisms [85], mobile security scenarios, and several privacy mechanisms. By adding these features, new attack scenarios can be easily deployed on a testbed, revealing vulnerabilities of the various systems and thus giving the researchers the opportunity of developing innovative defence mechanisms.…”
Section: Challenges and Future Directionsmentioning
confidence: 99%
“…Finally other novel methods can be used as defence mechanisms for smart cars. Recently the authors in [16] proved that multiple input multiple output techniques can be used in vehicular ad hoc networks as active defense mechanisms in order to avoid jamming threats. Combined with novel techniques that can estimate the speed of a jammer [15]and thus calculate the area where the communication is blocked and take appropriate routing decisions can further improve OTA performance.…”
Section: Internal Protectionmentioning
confidence: 99%
“…For the evaluation of the jamming attack scenario, a reactive radio frequency jammer has been implemented [18]. The RF jamming targets the IEEE 802.11p Orthogonal Frequency Division Multiplexing (OFDM) based PHY layer operating in the 5.85-5.925 GHz unlicensed national information infrastructure band, with 10 MHz bandwidth.…”
Section: Jamming Attack In V2v Communicationsmentioning
confidence: 99%