Denial of Service in Sensor Networks
Computer
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
JAM: A Jammed-Area Mapping Service for Sensor Networks
RTSS '03 Proceedings of the 24th IEEE International Real-Time Systems Symposium
Low-power DoS attacks in data wireless LANs and countermeasures
ACM SIGMOBILE Mobile Computing and Communications Review
The Security and Privacy of Smart Vehicles
IEEE Security and Privacy
Channel surfing and spatial retreats: defenses against wireless denial of service
Proceedings of the 3rd ACM workshop on Wireless security
Detecting and correcting malicious data in VANETs
Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks
The feasibility of launching and detecting jamming attacks in wireless networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Balancing auditability and privacy in vehicular networks
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Influence of falsified position data on geographic ad-hoc routing
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Privacy issues in vehicular ad hoc networks
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
SECURING VEHICULAR COMMUNICATIONS
IEEE Wireless Communications
IEEE Network: The Magazine of Global Internetworking
In VANETs we trust?: characterizing RF jamming in vehicular networks
Proceedings of the ninth ACM international workshop on Vehicular inter-networking, systems, and applications
Solution of detecting jamming attacks in vehicle ad hoc networks
Proceedings of the 16th ACM international conference on Modeling, analysis & simulation of wireless and mobile systems
Prevention of DoS Attacks in VANET
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Due to their nature, Vehicular Ad hoc NETwork (VANET) is vulnerable to Denial of Service (DoS) attacks, such as jamming attack. The objective of a jammer is to interfere with legitimate wireless communications, and to degrade the overall QoS of the network. In this paper, we propose a model to detect a particular class of Jamming attack, in which the jammer transmits only when valid radio activity is signaled from its radio hardware. This detection model is based upon the measurement of error distribution.