Publication:
Security vulnerabilities of IEEE 802.11p and visible light communication based platoon

dc.contributor.departmentN/A
dc.contributor.departmentDepartment of Electrical and Electronics Engineering
dc.contributor.departmentDepartment of Computer Engineering
dc.contributor.kuauthorUçar, Seyhan
dc.contributor.kuauthorErgen, Sinem Çöleri
dc.contributor.kuauthorÖzkasap, Öznur
dc.contributor.kuprofilePhD Student
dc.contributor.kuprofileFaculty Member
dc.contributor.kuprofileFaculty Member
dc.contributor.otherDepartment of Electrical and Electronics Engineering
dc.contributor.otherDepartment of Computer Engineering
dc.contributor.schoolcollegeinstituteGraduate School of Sciences and Engineering
dc.contributor.schoolcollegeinstituteCollege of Engineering
dc.contributor.schoolcollegeinstituteCollege of Engineering
dc.contributor.yokidN/A
dc.contributor.yokid7211
dc.contributor.yokid113507
dc.date.accessioned2024-11-09T23:09:31Z
dc.date.issued2016
dc.description.abstractTechnology brings autonomous vehicles into the reality where vehicles become capable of cruising themselves. A vehicular platoon contains autonomous vehicles organized into groups with close proximity. It is envisioned that with the increased demand for autonomous vehicles, platoons would be the part of our lives in near future. From this perspective, vehicular platoon control using current dominant IEEE 802.11p (DSRC) is an active research field. However, DSRC suffers from problems of performance degradation due to congestion, the scarcity of radio-frequency (RF) and security. Visible Light Communication (VLC), on the other hand, is a promising complementary technology with the potential to address DSRC problems. In this paper, we investigate the security vulnerabilities of hybrid DSRC-VLC platoon in the presence of outside attackers. We develop a simulation platform to realize the hybrid platoon. We demonstrate that although VLC limits the effect of adversaries, hybrid architectures still suffer from the packet falsification and replay attacks.
dc.description.indexedbyWoS
dc.description.indexedbyScopus
dc.description.openaccessYES
dc.description.publisherscopeInternational
dc.description.volume0
dc.identifier.doi10.1109/VNC.2016.7835972
dc.identifier.isbn9781-5090-5197-7
dc.identifier.issn2157-9857
dc.identifier.linkhttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85013028676&doi=10.1109%2fVNC.2016.7835972&partnerID=40&md5=54417652ccff3fa830bcca96bef30e2a
dc.identifier.scopus2-s2.0-85013028676
dc.identifier.urihttp://dx.doi.org/10.1109/VNC.2016.7835972
dc.identifier.urihttps://hdl.handle.net/20.500.14288/9316
dc.identifier.wos401657700050
dc.keywordsAutonomous vehicles
dc.keywordsIEEE standards
dc.keywordsLight
dc.keywordsMilitary applications
dc.keywordsSecurity of data
dc.keywordsSimulation platform
dc.keywordsClose proximity
dc.keywordsHybrid architectures
dc.keywordsPerformance degradation
dc.keywordsRadio frequencies
dc.keywordsResearch fields
dc.keywordsSecurity vulnerabilities
dc.keywordsVehicular platoons
dc.keywordsVisible light communications (VLC)
dc.keywordsVisible light communication
dc.languageEnglish
dc.publisherIEEE Computer Society
dc.sourceIEEE Vehicular Networking Conference, VNC
dc.subjectComputer science
dc.subjectComputer architecture
dc.subjectElectrical electronics engineering
dc.titleSecurity vulnerabilities of IEEE 802.11p and visible light communication based platoon
dc.typeConference proceeding
dspace.entity.typePublication
local.contributor.authoridN/A
local.contributor.authorid0000-0002-7502-3122
local.contributor.authorid0000-0003-4343-0986
local.contributor.kuauthorUçar, Seyhan
local.contributor.kuauthorErgen, Sinem Çöleri
local.contributor.kuauthorÖzkasap, Öznur
relation.isOrgUnitOfPublication21598063-a7c5-420d-91ba-0cc9b2db0ea0
relation.isOrgUnitOfPublication89352e43-bf09-4ef4-82f6-6f9d0174ebae
relation.isOrgUnitOfPublication.latestForDiscovery21598063-a7c5-420d-91ba-0cc9b2db0ea0

Files