1. IEEE Signal Processing Magazine
2. Signal Processing Digital Library*
3. Inside Signal Processing Newsletter
4. SPS Resource Center
5. Career advancement & recognition
6. Discounts on conferences and publications
7. Professional networking
8. Communities for students, young professionals, and women
9. Volunteer opportunities
10. Coming soon! PDH/CEU credits
Click here to learn more.
10 years of news and resources for members of the IEEE Signal Processing Society
Alturkostani, Hani Eftikhar (University of Idaho), “Mitigation Strategies for Safety Applications in Vehicular Ad Hoc Networks Subjected to Jamming” (2016) Advisor: Krings, Axel
The term Intelligent Transportation Systems (ITS) refers to the technologies, services, and applications that allow vehicles to communicate with each other (V2V) and also with fixed infrastructures (V2I) and (I2V). This collaborative communication forms a Vehicular Ad-Hoc Network (VANET) that enables the deployment of a wide range of useful applications to address some of transportation’s most critical elements, such as mobility, environment, and safety. A key technology to facilitate such communication is called Dedicated Short Range Communications (DSRC), which operates in the 5.9 GHz band. One of the most important applications in ITS, furthermore, are DSRC Safety Applications, which aim to enhance safety and reduce traffic accidents. The reliability of any Safety Application is crucial; any disturbance, whether benign or malicious, could lead to catastrophic consequences like injury or loss of life. Wireless jamming is considered to be a serious threat to Safety Applications due to its simple implementation and severe impact on ongoing communications. In fact, wireless jamming is capable of blocking the communication between nodes entirely and creating a Wireless Denial of Service (WDoS) attack.
In this dissertation, the authors propose a new series of mitigation strategies for DSRC Safety Applications in VANETs to enhance their overall reliability in the presence of jamming attacks. These mitigation strategies are as follows: 1) an adaptive threshold-based agreement algorithm, 2) a detection algorithm that enables jamming-aware Safety Applications, and 3) a recovery strategy that uses dynamic transmission and power rates. Throughout this dissertation, the authors discuss these mitigation strategies and investigate their usefulness using mathematical models, simulations, and field experiments. Their test results show that the mitigation strategies will help to enhance the reliability of Safety Applications in the presence of wireless jamming. In addition, the techniques recommended by this dissertation are in line with current institutional and governmental standardization efforts and will not overwhelm the communication media.
|Nominate an IEEE Fellow today!||1 March 2021|
|Deadline Extended - Call for Officer Nominations: President-Elect and Vice President-Technical Directions||5 March 2021|
|Call for Nominations: Chief Editor, SigPort and Chief Editor, Resource Center||5 April 2021|
|Call for Nominations for Editor-in-Chief||5 April 2021|
© Copyright 2021 IEEE – All rights reserved. Use of this website signifies your agreement to the IEEE Terms and Conditions.
A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity.