Solution of detecting jamming attacks in vehicle ad hoc networks

被引:0
|
作者
Nguyen, Anh Tuan [1 ]
Mokdad, Lynda [1 ]
Ben-Othman, Jalel [2 ]
机构
[1] Laboratoire LACL, University of Paris-Est, Créteil, France
[2] Laboratoire L2TI, University of Paris 13, Villetaneuse, France
关键词
acm proceedings - Denial of Service - detect - Jamming attacks - security - Security attacks;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:405 / 410
相关论文
共 50 条
  • [21] From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks
    Xing, Kai
    Cheng, Xiuzhen
    [J]. 2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [22] Detection of black hole attacks in vehicle-to-vehicle communications using ad hoc networks and on demand protocols
    Bharanidharan, C.
    Malathi, S.
    Manoharan, Hariprasath
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT UNMANNED SYSTEMS, 2024, 12 (03) : 245 - +
  • [23] Detecting node misbehavior in ad hoc networks
    Refaei, M. Tamer
    Rong, Yanxia
    DaSilva, Luiz A.
    Choi, Hyeong-Ah
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 3425 - +
  • [24] Privacy Preserving Solution for the Protection Against Sybil Attacks in Vehicular Ad Hoc Networks
    Triki, Bayrem
    Rekhis, Slim
    Chammem, Mhamed
    Boudriga, Noureddine
    [J]. 2013 6TH JOINT IFIP WIRELESS AND MOBILE NETWORKING CONFERENCE (WMNC 2013), 2013,
  • [25] Routing to preserve energy in ad hoc networks subject to jamming
    Block, FJ
    Baum, CW
    [J]. MILCOM 2004 - 2004 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1- 3, 2004, : 1213 - 1219
  • [26] Effect of Jamming Signals on Wireless Ad Hoc and Sensor Networks
    Sarker, Jahangir H.
    Mouftah, Hussein T.
    [J]. GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 5629 - 5634
  • [27] Attacks on the Vehicle Ad-hoc Network from Cyberspace
    Alwasel, Anas
    Mishra, Shailendra
    AlShehri, Mohammed
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (07) : 257 - 267
  • [28] Routing attacks and solutions in mobile ad hoc networks
    Geng Peng
    Zou Chuanyun
    [J]. 2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 806 - +
  • [29] Impact of denial of service attacks on ad hoc networks
    Aad, Imad
    Hubaux, Jean-Pierre
    Knightly, Edward W.
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2008, 16 (04) : 791 - 802
  • [30] Masquerading Attacks Detection in Mobile Ad Hoc Networks
    Abbas, Sohail
    Faisal, Mohammad
    Rahman, Haseeb Ur
    Khan, Muhammad Zahid
    Merabti, Madjid
    Khan, Atta Ur Rehman
    [J]. IEEE ACCESS, 2018, 6 : 55013 - 55025