Font Size: a A A

Mitigation Strategies for Safety Applications in Vehicular Ad Hoc Networks Subjected to Jamming

Posted on:2017-02-20Degree:Ph.DType:Dissertation
University:University of IdahoCandidate:Alturkostani, Hani EftikharFull Text:PDF
GTID:1458390005982841Subject:Computer Science
Abstract/Summary:
The term Intelligent Transportation Systems (ITS) refers to the technologies, services, and applications that allow vehicles to communicate with each other (V2V) and also with fixed infrastructures (V2I) and (I2V). This collaborative communication forms a Vehicular Ad-Hoc Network (VANET) that enables the deployment of a wide range of useful applications to address some of transportation's most critical elements, such as mobility, environment, and safety. A key technology to facilitate such communication is called Dedicated Short Range Communications (DSRC), which operates in the 5.9 GHz band. One of the most important applications in ITS, furthermore, are DSRC Safety Applications, which aim to enhance safety and reduce traffic accidents. The reliability of any Safety Application is crucial; any disturbance, whether benign or malicious, could lead to catastrophic consequences like injury or loss of life. Wireless jamming is considered to be a serious threat to Safety Applications due to its simple implementation and severe impact on ongoing communications. In fact, wireless jamming is capable of blocking the communication between nodes entirely and creating a Wireless Denial of Service (WDoS) attack.;In this dissertation, we propose a new series of mitigation strategies for DSRC Safety Applications in VANETs to enhance their overall reliability in the presence of jamming attacks. These mitigation strategies are as follows: 1) an adaptive threshold-based agreement algorithm, 2) a detection algorithm that enables jamming-aware Safety Applications, and 3) a recovery strategy that uses dynamic transmission and power rates. Throughout this dissertation, we discuss these mitigation strategies and investigate their usefulness using mathematical models, simulations, and field experiments. Our test results show that the mitigation strategies will help to enhance the reliability of Safety Applications in the presence of wireless jamming. In addition, the techniques recommended by this dissertation are in line with current institutional and governmental standardization efforts and will not overwhelm the communication media.
Keywords/Search Tags:Applications, Mitigation strategies, Jamming, Communication
Related items