Abstract | ||
---|---|---|
In this paper we explore the prospect of using friendly jamming for the secure localization of vehicles. In friendly jamming confidential information is obscured from eavesdroppers through the use of opportunistic jamming on the part of the parties engaged in communication. We analyze the effectiveness of friendly jamming and compare it to the traditional localization approaches of distance bounding and verifiable trilateration for similar highway infrastructures. We present our results in terms of the probability of spoofing a given position by maliciously-controlled vehicles. |
Year | DOI | Venue |
---|---|---|
2014 | 10.1007/978-3-319-23829-6_16 | Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering |
Keywords | Field | DocType |
Intelligent transportation,Friendly jamming,Secure localization,Automated vehicles | Confidentiality,Spoofing attack,Computer science,Computer security,Computer network,Verifiable secret sharing,Intelligent transportation system,Jamming,Bounding overwatch,Trilateration | Conference |
Volume | ISSN | Citations |
152 | 1867-8211 | 3 |
PageRank | References | Authors |
0.42 | 9 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Bhaswati Deka | 1 | 3 | 1.10 |
Ryan M. Gerdes | 2 | 15 | 1.60 |
Ming Li | 3 | 1770 | 84.74 |
Kevin Heaslip | 4 | 43 | 5.36 |