Visible Light Communication (VLC) has been proposed as an efficient vehicle-to-vehicle (VLC) connectivity solution for Intelligent Transportation Systems. By using the preexisting hardware in vehicles (headlights and taillights), a VLC-based system could establish V2V communication link to convey warning signals and telemetry data. While there is an increasing literature on vehicular VLC, no study has been performed on the security aspects of these VLC-based V2V systems or how efficiently the VLC-based links could be jammed in Denial of Service (DoS)-alike attacks. In this paper, we consider DoS style jamming attack by either saturating the channel or making the original signal undistinguished from noise and present the performance of V2V VLC systems in the presence of such attacks.
Performance Evaluation of Vehicle-to-Vehicle Visible Light Communications in the Presence of Denial of Service Attacks
Ignacio Marin-Garcia,Farshad Miramirkhani,M. Uysal,R. Pérez-Jiménez
Published 2019 in 2019 Global LIFI Congress (GLC)
ABSTRACT
PUBLICATION RECORD
- Publication year
2019
- Venue
2019 Global LIFI Congress (GLC)
- Publication date
2019-06-12
- Fields of study
Computer Science, Engineering
- Identifiers
- External record
- Source metadata
Semantic Scholar
CITATION MAP
EXTRACTION MAP
CLAIMS
- No claims are published for this paper.
CONCEPTS
- No concepts are published for this paper.
REFERENCES
Showing 1-22 of 22 references · Page 1 of 1
CITED BY
Showing 1-3 of 3 citing papers · Page 1 of 1