Please use this identifier to cite or link to this item: http://hdl.handle.net/10553/70079
|Title:||Performance Evaluation of Vehicle-to-Vehicle Visible Light Communications in the Presence of Denial of Service Attacks||Authors:||Marin-Garcia, Ignacio
|Keywords:||Denial Of Service
Vehicle To Vehicle
Visible Light Communication
|Issue Date:||2019||Journal:||2019 Global Lifi Congress, Glc 2019||Abstract:||© 2019 IEEE. Visible Light Communication (VLC) has been proposed as an efficient vehicle-to-vehicle (VLC) connectivity solution for Intelligent Transportation Systems. By using the preexisting hardware in vehicles (headlights and taillights), a VLC-based system could establish V2V communication link to convey warning signals and telemetry data. While there is an increasing literature on vehicular VLC, no study has been performed on the security aspects of these VLC-based V2V systems or how efficiently the VLC-based links could be jammed in Denial of Service (DoS)-alike attacks. In this paper, we consider DoS style jamming attack by either saturating the channel or making the original signal undistinguished from noise and present the performance of V2V VLC systems in the presence of such attacks.||URI:||http://hdl.handle.net/10553/70079||ISBN:||9781728150222||DOI:||10.1109/GLC.2019.8864123||Source:||2019 Global LIFI Congress, GLC 2019|
|Appears in Collections:||Actas de congresos|
Items in accedaCRIS are protected by copyright, with all rights reserved, unless otherwise indicated.