QoS-Based Sequential Detection Algorithm for Jamming Attacks in VANET

  • Fatma SalemEmail author
  • Yassin Elhillali
  • Smail Niar
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 878)


As a key component of the future Vehicle-to-anything (V2X) communication technology, Vehicular Ad hoc Network (VANET) has a great potential of enabling real-time traffic safety and efficiency applications for people on roads. Therefore, attacking and misusing such network could cause destructive consequences. Wireless communication in VANET is based on IEEE 802.11p-based DSRC standard. Due to its inherited distributed contention resolution mechanism, the MAC protocol in IEEE 802.11p is more susceptible to jamming attacks. While preventing jamming attacks in VANET is not feasible, due to its unbounded scalability, detecting such attacks is primordial. First we develop optimization methodology for IEEE 802.11p MAC which defines its stability region under normal network conditions, this will allow us to determine detection threshold value to distinguish normal operation and attacks. Second, we implement the sequential detection of change method along with the developed methodology and we propose QoS-based Sequential Detection Algorithm (QoS-SDA). The important performance characteristics of QoS-SDA are accuracy and speed, while jamming attacks are detected with low probability of false alarms. Finally, we provide comprehensive analytical and simulation analyses to prove the validity of the develop methodology and the efficiency of the proposed algorithm.


Security Jamming VANET IEEE 802.11p MAC V2X 


  1. 1.
    3GPP. Study on LTE-Based V2X Services (Release 14), Technical Specification Group Services and System Aspects (TSG SA), 3GPP TR (2016)Google Scholar
  2. 2.
    Vehicle safety communications-applications (VSC-A). Final report CAMP Vehicle Safety Communications 2 Consortium, Washington, D.C., USA (2011)Google Scholar
  3. 3.
    IEEE: IEEE Standard for Wireless Access in Vehicular Environments (WAVE)-Multi-Channel Operation. IEEE Std 1609.4, pp. 1–94 (2016)Google Scholar
  4. 4.
    Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: 6th ACM MobiHoc, pp. 4657, USA (2005)Google Scholar
  5. 5.
    Bayraktaroglu, E., et al.: On the performance of IEEE 802.11 under jamming. In: IEEE INFOCOM, Phoenix, AZ, USA, pp. 1265–1273, April 2008Google Scholar
  6. 6.
    Li, M., Koutsopoulos, I., Poovendran, R.: Optimal jamming attacks and network defense policies in wireless sensor networks. In: IEEE INFOCOM (2007)Google Scholar
  7. 7.
    Wood, A., Stankovic, J., Son, S.: JAM: a jammed-area mapping service for sensor networks. In: 24th IEEE Real-Time Systems Symposium (2003)Google Scholar
  8. 8.
    Punal, O., Pereira, C., Aguiar, A., Gross, J.: Experimental characterization and modeling of RF jamming attacks on vanets. IEEE Trans. Veh. Technol. 64(2), 524540 (2015)CrossRefGoogle Scholar
  9. 9.
    Benslimane, A., Nguyen-Minh, H.: Jamming attack model and detection method for beacons under multichannel operation in vehicular networks. IEEE Trans. Veh. Technol. 66(7), 6475–6488 (2017)CrossRefGoogle Scholar
  10. 10.
    Singh, A., Sharma, P.: A novel mechanism for detecting DOS attack in VANET using enhanced attacked packet detection algorithm (EAPDA). In: 2nd International Conference on Recent Advances in Engineering and Computational Sciences (RAECS), Chandigarh, pp. 1–5 (2015)Google Scholar
  11. 11.
    Sufyan, N., Saqib, N., Zia, M.: Detection of jamming attacks in 802.11b wireless networks. EURASIP J. Wirel. Commun. Netw. 1, 118 (2013)Google Scholar
  12. 12.
    Roess, R., Prassas, E., McShane, W.: Traffic Engineering. Prentice-Hall, Englewood Cliffs (2004)Google Scholar
  13. 13.
    Mak, T., Laberteaux K., Sengupta, R.: A multi-channel VANET providing concurrent safety and commercial services. In: 2nd ACM International Workshop on Vehicular Ad Hoc Networks, pp. 1–9. ACM Press, New York (2005)Google Scholar
  14. 14.
    Bansal, R., Papantoni-Kazakos, P.: An algorithm for detecting a change in a stochastic process. IEEE Trans. Inf. Theory 32, 227235 (1986)MathSciNetCrossRefGoogle Scholar
  15. 15.
    Salem F., Elhillali, Y., Niar, S.: Efficient modeling of IEEE 802.11p MAC output process for V2X interworking enhancement. IET Netw. (2018).

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.University of Valenciennes, CNRS UMR 8201-LAMIHValenciennesFrance

Personalised recommendations