2017
DOI: 10.1177/1550147717725698
|View full text |Cite
|
Sign up to set email alerts
|

Localization of multiple jamming attackers in vehicular ad hoc network

Abstract: In vehicular ad hoc network, wireless jamming attacks are easy to be launched in the control channel and can cause serious influence on the network performance which may cause further safety accidents. In order to address the issue of wireless jamming attacks, a new technique which localizes the jamming attackers and prevents vehicles from jamming through human intervention is proposed. In this article, we propose a range-free approach to localize the source of the attacker and determine the number of jamming … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 36 publications
0
6
0
Order By: Relevance
“…Many VANET features are used in the literature to recognize cases of intentional jamming, such as packet delivery rate 33 and GPS information. 34 The selection of features is made according to the context of detection solutions that could be deployed in different ways. Afterwards, certain machine learning method is selected to analyze the VANET data and classify the malicious nodes from benign nodes, as shown in Figure 1.…”
Section: Attack Detection Based On Machine Learningmentioning
confidence: 99%
“…Many VANET features are used in the literature to recognize cases of intentional jamming, such as packet delivery rate 33 and GPS information. 34 The selection of features is made according to the context of detection solutions that could be deployed in different ways. Afterwards, certain machine learning method is selected to analyze the VANET data and classify the malicious nodes from benign nodes, as shown in Figure 1.…”
Section: Attack Detection Based On Machine Learningmentioning
confidence: 99%
“…Jamming devices are better designed to provide the best possible network coverage to cause harm [16]. The jamming source will be easier to find if each node's coverage area is minimized.…”
Section: Mathematical Model For Detection Of Jamming Attackmentioning
confidence: 99%
“…In [34], the advantages of K-means were used to predict the number of multiple jamming attackers and ensure the preset functions of VANET. In [33], an anti-jamming method based on fuzzy c-means was proposed to determine the localization and number of jamming attackers. Accordingly, the cluster analysis process simplifies data manipulation by finding similar structures in the data and classifying each object according to its nature.…”
Section: Clustering For Anti-jamming Detectionmentioning
confidence: 99%
“…Figure 1 presents a general process of attack detection based on the application of data clustering, where a predefined list of features is extracted from vehicular data to detect the characteristics of jamming attacks. The selection of features is according to the context of the proposed anti-jamming solutions, for example, GPS information is used to recognize cases of intentional jamming [33]. After that, the clustering method can be used to analyze vehicular data and classify timely the malicious nodes from benign ones.…”
Section: Coresets-based Anti-jamming Detectionmentioning
confidence: 99%