Performance Evaluation of Vehicle-to-Vehicle Visible Light Communications in the Presence of Denial of Service Attacks

Ignacio Marin-Garcia, Farshad Miramirkhani, Murat Uysal, Rafael Perez-Jimenez

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Visible Light Communication (VLC) has been proposed as an efficient vehicle-to-vehicle (VLC) connectivity solution for Intelligent Transportation Systems. By using the preexisting hardware in vehicles (headlights and taillights), a VLC-based system could establish V2V communication link to convey warning signals and telemetry data. While there is an increasing literature on vehicular VLC, no study has been performed on the security aspects of these VLC-based V2V systems or how efficiently the VLC-based links could be jammed in Denial of Service (DoS)-alike attacks. In this paper, we consider DoS style jamming attack by either saturating the channel or making the original signal undistinguished from noise and present the performance of V2V VLC systems in the presence of such attacks.

Original languageEnglish (US)
Title of host publication2019 Global LIFI Congress, GLC 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728150222
DOIs
StatePublished - Jun 2019
Event2019 Global LIFI Congress, GLC 2019 - Paris, France
Duration: Jun 12 2019Jun 13 2019

Publication series

Name2019 Global LIFI Congress, GLC 2019

Conference

Conference2019 Global LIFI Congress, GLC 2019
Country/TerritoryFrance
CityParis
Period6/12/196/13/19

Keywords

  • Denial of Service
  • Information Security
  • Ray Tracing
  • Vehicle to Vehicle
  • Visible Light Communication

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Electronic, Optical and Magnetic Materials
  • Instrumentation
  • Atomic and Molecular Physics, and Optics

Fingerprint

Dive into the research topics of 'Performance Evaluation of Vehicle-to-Vehicle Visible Light Communications in the Presence of Denial of Service Attacks'. Together they form a unique fingerprint.

Cite this