Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2507924.2507927acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

Solution of detecting jamming attacks in vehicle ad hoc networks

Published: 03 November 2013 Publication History

Abstract

Vehicular ad hoc network (VANET) is currently researched and achieved by several organizers to develop the intelligent transportation system (ITS). Research on Vehicular Ad hoc Network (VANET) has been conducting for long time. Nowadays, several organizers has obtained remarkable achievements contributing to the development of the Intelligent transportation system, ITS. The communication protocol in VANET named 802.11p protocol, has been improved to adapt to the high-speed environment. However, the communication among vehicles can be interfered even by Denial of Service (DoS) attacks such as jamming attacks. The vehicles communicate with each other in the high-speed environment. The time of data exchange between them must be extremely short. Solutions for detection of jamming attacks must occur quickly to detect more precisely. In order to detect jamming attacks more precisely, solutions therefore must occur very fast. In this paper, we propose one solution to detect jamming attacks. The following solution is based on the combination of the packet delivery ratio and its diminution.

References

[1]
http://en.wikipedia.org/wiki/ieee 802.11p.
[2]
http://en.wikipedia.org/wiki/ieee 802.11e-2005.
[3]
Part 11: Wireless lan medium access control (mac) and physical layer (phy) specifications amendment 6: Wireless access in vehicular environments. Technical report, IEEE, 2010.
[4]
Lynda Mokdad Ali Hamieh, Jalel Ben-Othman. Detection of radio interference attacks in vanet. IEEE "GLOBECOM" 2009 proceedings, 2009.
[5]
Charalampos Konstantopoulos, Aristides Mpitziopoulos, Damianos Gavalas and Grammati Pantziou. A survey on jamming attacks and countermeasures in wsns. IEEE COMMUNICATIONS SURVEYS - TUTORIALS, 2009.
[6]
Christoph Sommery David Eckhoff and Falko Dressler. On the necessity of accurate ieee 802.11p models for ivc protocol simulation. 2011.
[7]
Sumita Mishra, Geethapriya Thamilarasu, and Ramalingam Sridhar. Improving reliability of jamming attack detection in ad hoc networks. International Journal of Communication Networks and Information Security (IJCNIS), 3, 2011.
[8]
Jamalul-lail Ab Manan Halabi Hasbullah, Irshad Ahmed Soomro. Denial of service (dos) attack and its possible solutions in vanet. World Academy of Science, Engineering and Technology 65, 2010.
[9]
Jamalul-lail Masood-ur-Rehman Irshad Ahmed Sumra, Halabi Hasbullah. Trust and trusted computing in vanet. Computer Science Journal, 2011.
[10]
Daniel Jiang and Luca Delgrossi. Ieee 802.11p: Towards an international standard for wireless access in vehicular environments. In VTC Spring'08, pages 2036--2040, 2008.
[11]
Barend J. van Wyk Lusheng Miao, Karim Djouani and Yskandar Hamam. A survey of ieee 802.11p mac protocol. Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), 2011.
[12]
Jean-Pierre Hubaux Maxim Raya, Panos Papadimitratos. Securing vehicular communications. 13:8--15, 2006.
[13]
Rajani Muraleedharan and Lisa Ann Osadciw. Jamming attack detection and countermeasures in wireless sensor network using ant system. Proceedings of SPIE, the International Society for Optical Engineering, 6248, 2006.
[14]
Yongho Seokt, Taekyoung Kwon, Nakjung Choi, Sungjoon Choi and Yanghee Choi. A solicitation-based ieee 802.11p mac protocol for roadside to vehicular networks. 2007.
[15]
Maxim Raya and JeanPierre Hubaux. The security of vehicular ad hoc networks. 2004.
[16]
Rohde and Schwarz. Wlan 802.11p measurements for vehicle to vehicle (v2v) dsrc.
[17]
Yuh-Shyan Chen, Angela Irwin-Aamir, Hassan Sherali Zeadally, Ray Hunt. Vehicular ad hoc networks (vanets): status, results, and challenges. 2010.
[18]
Y. Zhang W. Xu, W. Trappe and T. Wood. The feasibility of launching and detecting jamming attacks in wireless networks. 2005.
[19]
Bhaskar Krishnamachari Yi Wang, Akram Ahmed and Konstantinos Psounis. Ieee 802.11p performance evaluation and protocol enhancement. Proceedings of the 2008 IEEE International Conference on Vehicular Electronics and Safety Columbus, 2008.

Cited By

View all
  • (2024)A Dynamic Threat Prevention Framework for Autonomous Vehicle Networks based on Ruin-theoretic Security Risk AssessmentACM Journal on Autonomous Transportation Systems10.1145/36605271:4(1-28)Online publication date: 23-Apr-2024
  • (2022)Real-time Classification of Jamming Attacks against UAVs via on-board Software-defined Radio and Machine Learning-based Receiver Module2022 IEEE International Conference on Electro Information Technology (eIT)10.1109/eIT53891.2022.9813923(1-5)Online publication date: 19-May-2022
  • (2022)Jamming Attacks and Anti-Jamming Strategies in Wireless Networks: A Comprehensive SurveyIEEE Communications Surveys & Tutorials10.1109/COMST.2022.315918524:2(767-809)Online publication date: Oct-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
MSWiM '13: Proceedings of the 16th ACM international conference on Modeling, analysis & simulation of wireless and mobile systems
November 2013
468 pages
ISBN:9781450323536
DOI:10.1145/2507924
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 November 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. acm proceedings
  2. availability
  3. denial of service (dos)
  4. detect
  5. jamming attacks
  6. security
  7. security attack
  8. vehicular ad hoc network (vanet)

Qualifiers

  • Research-article

Conference

MSWiM '13
Sponsor:

Acceptance Rates

MSWiM '13 Paper Acceptance Rate 42 of 184 submissions, 23%;
Overall Acceptance Rate 398 of 1,577 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A Dynamic Threat Prevention Framework for Autonomous Vehicle Networks based on Ruin-theoretic Security Risk AssessmentACM Journal on Autonomous Transportation Systems10.1145/36605271:4(1-28)Online publication date: 23-Apr-2024
  • (2022)Real-time Classification of Jamming Attacks against UAVs via on-board Software-defined Radio and Machine Learning-based Receiver Module2022 IEEE International Conference on Electro Information Technology (eIT)10.1109/eIT53891.2022.9813923(1-5)Online publication date: 19-May-2022
  • (2022)Jamming Attacks and Anti-Jamming Strategies in Wireless Networks: A Comprehensive SurveyIEEE Communications Surveys & Tutorials10.1109/COMST.2022.315918524:2(767-809)Online publication date: Oct-2023
  • (2022)Jamming Detection and Classification in OFDM-Based UAVs via Feature- and Spectrogram-Tailored Machine LearningIEEE Access10.1109/ACCESS.2022.315002010(16859-16870)Online publication date: 2022
  • (2021)RF Jamming Classification Using Relative Speed Estimation in Vehicular Wireless NetworksSecurity and Communication Networks10.1155/2021/99593102021Online publication date: 1-Jan-2021
  • (2021)A Machine Learning Approach for Detecting and Classifying Jamming Attacks Against OFDM-based UAVsProceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning10.1145/3468218.3469049(1-6)Online publication date: 28-Jun-2021
  • (2021)JammingBird: Jamming-Resilient Communications for Vehicular Ad Hoc Networks2021 18th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)10.1109/SECON52354.2021.9491603(1-9)Online publication date: 6-Jul-2021
  • (2021)Reinforcement Algorithm based Jamming-Detection for Vehicular Ad Hoc Networks2021 IEEE Bombay Section Signature Conference (IBSSC)10.1109/IBSSC53889.2021.9673350(1-5)Online publication date: 18-Nov-2021
  • (2021)A Survey on Privacy-Preserving Authentication Schemes in VANETs: Attacks, Challenges and Open IssuesIEEE Access10.1109/ACCESS.2021.31255219(153701-153726)Online publication date: 2021
  • (2019)A Survey on Security Attacks in VANETs: Communication, Applications and ChallengesVehicular Communications10.1016/j.vehcom.2019.100179(100179)Online publication date: Sep-2019
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media