Publication:
Security vulnerabilities of IEEE 802.11p and visible light communication based platoon

dc.contributor.departmentDepartment of Electrical and Electronics Engineering
dc.contributor.departmentDepartment of Computer Engineering
dc.contributor.departmentGraduate School of Sciences and Engineering
dc.contributor.kuauthorErgen, Sinem Çöleri
dc.contributor.kuauthorÖzkasap, Öznur
dc.contributor.kuauthorUçar, Seyhan
dc.contributor.schoolcollegeinstituteCollege of Engineering
dc.contributor.schoolcollegeinstituteGRADUATE SCHOOL OF SCIENCES AND ENGINEERING
dc.date.accessioned2024-11-09T23:09:31Z
dc.date.issued2016
dc.description.abstractTechnology brings autonomous vehicles into the reality where vehicles become capable of cruising themselves. A vehicular platoon contains autonomous vehicles organized into groups with close proximity. It is envisioned that with the increased demand for autonomous vehicles, platoons would be the part of our lives in near future. From this perspective, vehicular platoon control using current dominant IEEE 802.11p (DSRC) is an active research field. However, DSRC suffers from problems of performance degradation due to congestion, the scarcity of radio-frequency (RF) and security. Visible Light Communication (VLC), on the other hand, is a promising complementary technology with the potential to address DSRC problems. In this paper, we investigate the security vulnerabilities of hybrid DSRC-VLC platoon in the presence of outside attackers. We develop a simulation platform to realize the hybrid platoon. We demonstrate that although VLC limits the effect of adversaries, hybrid architectures still suffer from the packet falsification and replay attacks.
dc.description.indexedbyWOS
dc.description.indexedbyScopus
dc.description.openaccessYES
dc.description.publisherscopeInternational
dc.description.sponsoredbyTubitakEuN/A
dc.description.volume0
dc.identifier.doi10.1109/VNC.2016.7835972
dc.identifier.isbn9781-5090-5197-7
dc.identifier.issn2157-9857
dc.identifier.scopus2-s2.0-85013028676
dc.identifier.urihttps://doi.org/10.1109/VNC.2016.7835972
dc.identifier.urihttps://hdl.handle.net/20.500.14288/9316
dc.identifier.wos401657700050
dc.keywordsAutonomous vehicles
dc.keywordsIEEE standards
dc.keywordsLight
dc.keywordsMilitary applications
dc.keywordsSecurity of data
dc.keywordsSimulation platform
dc.keywordsClose proximity
dc.keywordsHybrid architectures
dc.keywordsPerformance degradation
dc.keywordsRadio frequencies
dc.keywordsResearch fields
dc.keywordsSecurity vulnerabilities
dc.keywordsVehicular platoons
dc.keywordsVisible light communications (VLC)
dc.keywordsVisible light communication
dc.language.isoeng
dc.publisherIEEE Computer Society
dc.relation.ispartofIEEE Vehicular Networking Conference, VNC
dc.subjectComputer science
dc.subjectComputer architecture
dc.subjectElectrical electronics engineering
dc.titleSecurity vulnerabilities of IEEE 802.11p and visible light communication based platoon
dc.typeConference Proceeding
dspace.entity.typePublication
local.contributor.kuauthorUçar, Seyhan
local.contributor.kuauthorErgen, Sinem Çöleri
local.contributor.kuauthorÖzkasap, Öznur
local.publication.orgunit1GRADUATE SCHOOL OF SCIENCES AND ENGINEERING
local.publication.orgunit1College of Engineering
local.publication.orgunit2Department of Electrical and Electronics Engineering
local.publication.orgunit2Department of Computer Engineering
local.publication.orgunit2Graduate School of Sciences and Engineering
relation.isOrgUnitOfPublication21598063-a7c5-420d-91ba-0cc9b2db0ea0
relation.isOrgUnitOfPublication89352e43-bf09-4ef4-82f6-6f9d0174ebae
relation.isOrgUnitOfPublication3fc31c89-e803-4eb1-af6b-6258bc42c3d8
relation.isOrgUnitOfPublication.latestForDiscovery21598063-a7c5-420d-91ba-0cc9b2db0ea0
relation.isParentOrgUnitOfPublication8e756b23-2d4a-4ce8-b1b3-62c794a8c164
relation.isParentOrgUnitOfPublication434c9663-2b11-4e66-9399-c863e2ebae43
relation.isParentOrgUnitOfPublication.latestForDiscovery8e756b23-2d4a-4ce8-b1b3-62c794a8c164

Files