Filters








95 Hits in 8.3 sec

Experimental Characterization and Modeling of RF Jamming Attacks on VANETs

Oscar Punal, Carlos Pereira, Ana Aguiar, James Gross
2015 IEEE Transactions on Vehicular Technology  
Specifically, we characterize the transmission success rate of a car-to-car link subject to constant, periodic, and reactive RF jamming.  ...  In this work, we evaluate the performance of 802.11p-based vehicular communications in the presence of RF jamming attacks.  ...  Henrique Salgado and João Oliveira for the use of the spectrum analyzer and RF components.  ... 
doi:10.1109/tvt.2014.2325831 fatcat:mzfdygbsdzcehp2idltpaqkj3e

Estimating the Relative Speed of RF Jammers in VANETs

Dimitrios Kosmanos, Antonios Argyriou, Leandros Maglaras
2019 Security and Communication Networks  
and, secondly, to estimate the jamming signal and the relative speed between the jammer-receiver using the RF Doppler shift.  ...  optimal zero MAE value under different jamming attack scenarios.  ...  Conflicts of Interest e authors declare that there are no conflicts of interest regarding the publication of this paper.  ... 
doi:10.1155/2019/2064348 fatcat:oz2tokakcnfu5lvdlgdfm6amhy

Estimating the Relative Speed of RF Jammers in VANETs [article]

Dimitrios Kosmanos, Antonios Argyriou, Leandros Maglaras
2018 arXiv   pre-print
(RF) communication by conducting a Denial of Service (DoS) attack.  ...  - receiver and jammer - receiver and secondly, to estimate the jamming signal and the relative speed between the jammer - receiver using the RF Doppler shift.  ...  A lot of kinds of jamming attacks has been studied in VANETs [11] . The two most important kinds of jamming attacks are the constant jamming and the reactive jamming.  ... 
arXiv:1812.11811v1 fatcat:wgj7zcbhhjbirjx5wwvpdce34m

RF Jamming Classification using Relative Speed Estimation in Vehicular Wireless Networks [article]

Dimitrios Kosmanos, Dimitrios Karagiannis, Antonios Argyriou, Spyros Lalis, Leandros Maglaras
2018 arXiv   pre-print
Through offline training and the proposed KNN-VRS, RF-VRS classification algorithms, we are able to efficiently detect various cases of Denial of Service Attacks (DoS) jamming attacks, differentiate them  ...  A particular subset of wireless networks, vehicular ad-hoc networks (VANET) which incorporate a series of safety-critical applications, may be a potential target of RF jamming with detrimental safety effects  ...  In a VANET, RF attack detection is even more challenging due to the constant and rapid changes in topology and the high mobility of the nodes as well as due to the presence of a variety of different jammers  ... 
arXiv:1812.11886v1 fatcat:lkvktzp6mzfchpsayr2q3kzfb4

A Survey on the Current Security Landscape of Intelligent Transportation Systems

Ayyoub Lamssaggad, Nabil Benamar, Abdelhakim Senhaji Hafid, Mounira Msahli
2021 IEEE Access  
This article gives a short background tutorial on the main security issues and the different attacks that hinder Intelligent Transport Systems.  ...  However, this raises new security issues that make the whole system prone to cybersecurity attacks that threaten both the safety and privacy of all road-users.  ...  ACKNOWLEDGMENT The authors would like to thank the editors and the anonymous reviewers for their valuable and enriching comments and suggestions to improve the content of this article.  ... 
doi:10.1109/access.2021.3050038 fatcat:wagonasxpbetxdlrhxzadnpkw4

Comprehensive Survey of Machine Learning Approaches in Cognitive Radio-based Vehicular Ad Hoc Networks

Mohammad Asif Hossain, Rafidah Md Noor, Kok-Lim Alvin Yau, Saaidal Razalli Azzuhri, Muhammad Reza Zraba, Ismail Ahmedy
2020 IEEE Access  
This paper presents an overview of ML, CR, VANET, and CR-VANET, including their architectures, functions, challenges, and open issues.  ...  Nowadays, machine learning (ML), which is one of the most rapidly growing technical tools, is extensively used to solve critical challenges in various domains.  ...  ACKNOWLEDGEMENT The authors would like to thank the anonymous reviewers for their comments and constructive suggestions which helped them to improve this manuscript.  ... 
doi:10.1109/access.2020.2989870 fatcat:fpp3m3rts5gghcnlkyelzt3ykq

Multi-stage Jamming Attacks Detection using Deep Learning Combined with Kernelized Support Vector Machine in 5G Cloud Radio Access Networks [article]

Marouane Hachimi, Georges Kaddoum, Ghyslain Gagnon, Poulmanogo Illy
2020 arXiv   pre-print
This research focuses on deploying a multi-stage machine learning-based intrusion detection (ML-IDS) in 5G C-RAN that can detect and classify four types of jamming attacks: constant jamming, random jamming  ...  , deceptive jamming, and reactive jamming.  ...  [13] presented a method for detecting and clustering radio frequency (RF) jamming attacks based on the use of unsupervised machine learning. Thi et al.  ... 
arXiv:2004.06077v2 fatcat:qorlxum74vaqra5bbwovpnbqbi

Machine Learning for Security in Vehicular Networks: A Comprehensive Survey [article]

Anum Talpur, Mohan Gurusamy
2021 arXiv   pre-print
The use of wireless communication between vehicular nodes and/or infrastructure makes it vulnerable to different types of attacks.  ...  We propose a taxonomy of security attacks in vehicular networks and discuss various security challenges and requirements.  ...  [45] propose an unsupervised algorithm to detect RF-jamming in vehicular communications.  ... 
arXiv:2105.15035v2 fatcat:5z6aqlvosjgf3o3amts3k6toxu

Cooperative Speed Estimation of an RF Jammer in Wireless Vehicular Networks [article]

Dimitrios Kosmanos, Savvas Chatzisavvas, Antonios Argyriou, Leandros Maglaras
2020 arXiv   pre-print
We develop analytical closed-form expressions that characterize the Mean Square Error (MSE) of the data and jamming signal estimates.  ...  Our numerical and simulation results for different system configurations prove the ability of our overall system to estimate with high accuracy and the RF jamming signals and the speed of the jammer.  ...  All of these works use additional hardware (e.g. more antennas) on the transmitter and receiver to detect a jamming attack.  ... 
arXiv:2004.09909v1 fatcat:betx33rtvrgglbpsd7qtlkps2u

VANET simulators: an updated review

Julia Silva Weber, Miguel Neves, Tiago Ferreto
2021 Journal of the Brazilian Computer Society  
Recently, with the advent of autonomous vehicles and the emergence of novel technologies (e.g., 5G and edge computing), new research challenges on VANETs are coming into sight.  ...  Research on VANETs (vehicular ad hoc networks) date back to the beginning of the 2000s.  ...  Within Netsim VANET modules, one of them worth taking note is RF Propagation Models.  ... 
doi:10.1186/s13173-021-00113-x doaj:0fe8f014806444f3aa58c18a9e1fffee fatcat:uiv72mxklzhdlcibamnfxyfpwm

A Robust Eco-Routing Protocol Against Malicious Data in Vehicular Networks [article]

Pavlos Basaras, Leandros Maglaras, Dimitrios Katsaros, Helge Janicke
2015 arXiv   pre-print
Vehicular networks have a diverse range of applications that vary from safety, to traffic management and comfort.  ...  Vehicular communications (VC) can assist in the ecorouting of vehicles in order to reduce the overall mileage and CO2 emissions by the exchange of data among vehicle-entities.  ...  The authors in [11] showed that RF jamming poses a serious threat to safety in VANETs, for according to their experimental study, jammers can severely disrupt communication up to 465m despite very short  ... 
arXiv:1506.05017v2 fatcat:ujogkoa3f5d6ngeyj4kov6h6g4

Practical Aspects of Physical and MAC Layer Security in Visible Light Communication Systems

Grzegorz J. Blinowski
2016 International Journal of Electronics and Telecommunications  
This paper is an extension of work originally reported in Proceedings of the 13th IFAC and IEEE Conference on Programmable Devices and Embedded Systems - PDES 2015  ...  We analyze the risks of signal jamming, data snooping and data modification. We also discuss MAC-level security mechanisms as defined in the IEEE 802.15.7 standard.  ...  The attacker may choose to use LOS or NLOS models, but due to power considerations a LOS model will be preferred.  ... 
doi:10.1515/eletel-2016-0001 fatcat:nx3gt3i4mzdypb76f44auigrv4

When Machine Learning Meets Spectrum Sharing Security: Methodologies and Challenges

Qun Wang, Haijian Sun, Rose Qingyang Hu, Arupjyoti Bhuyan
2022 IEEE Open Journal of the Communications Society  
(SSDF) attacks, jamming attacks, eavesdropping attacks, and privacy issues.  ...  This comprehensive review is intended to provide the foundation for and facilitate future studies on exploring the potential of emerging ML for coping with increasingly complex SS and their security problems  ...  State-of-the-Art Methods of Defense Against Jamming attacks A jamming attack is a common attack in wireless communication systems and there have been works on this subject. 1) ML Based Anti-Jamming Methods  ... 
doi:10.1109/ojcoms.2022.3146364 fatcat:ffx3xbq5qzb6hcserskljb4o7u

When Machine Learning Meets Spectrum Sharing Security: Methodologies and Challenges [article]

Qun Wang, Haijian Sun, Rose Qingyang Hu, Arupjyoti Bhuyan
2022 arXiv   pre-print
(SSDF) attacks, jamming attacks, eavesdropping attacks, and privacy issues.  ...  This comprehensive review is intended to provide the foundation for and facilitate future studies on exploring the potential of emerging ML for coping with increasingly complex SS and their security problems  ...  State-of-the-Art Methods of Defense Against Jamming attacks A jamming attack is a common attack in wireless communication systems and there have been many works on this subject. 1) ML Based Anti-Jamming  ... 
arXiv:2201.04677v1 fatcat:gb73bku37fatncamax67buwkea

Surveying pervasive public safety communication technologies in the context of terrorist attacks

Ali Masood, Davide Scazzoli, Navuday Sharma, Yannick Le Moullec, Rizwan Ahmad, Luca Reggiani, Maurizio Magarini, Muhammad Mahtab Alam
2020 Physical Communication  
technologies necessary for the given context including the point of view of direct communication between (i) on-ground devices, (ii) on-ground devices and UAVs, and (iii) UAVs.  ...  base-station) architectures, multi-hop D2D routing for PSN, and jamming and anti-jamming in mobile networks.  ...  cation strategy for UAV transmission based on reinforcement-learning, in order to resist smart jamming attacks without knowing their type and the channel model in the dynamic game.  ... 
doi:10.1016/j.phycom.2020.101109 fatcat:s74tzgwo6rfmbjyfqnytrdxece
« Previous Showing results 1 — 15 out of 95 results