{"id":"https://openalex.org/W2565764386","doi":"https://doi.org/10.1109/tvt.2016.2645478","title":"Jamming Attack Model and Detection Method for Beacons Under Multichannel Operation in Vehicular Networks","display_name":"Jamming Attack Model and Detection Method for Beacons Under Multichannel Operation in Vehicular Networks","publication_year":2016,"publication_date":"2016-12-26","ids":{"openalex":"https://openalex.org/W2565764386","doi":"https://doi.org/10.1109/tvt.2016.2645478","mag":"2565764386"},"language":"en","primary_location":{"id":"doi:10.1109/tvt.2016.2645478","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tvt.2016.2645478","pdf_url":null,"source":{"id":"https://openalex.org/S10936095","display_name":"IEEE Transactions on Vehicular Technology","issn_l":"0018-9545","issn":["0018-9545","1939-9359"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Vehicular Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060341203","display_name":"Abderrahim Benslimane","orcid":"https://orcid.org/0000-0001-9307-6132"},"institutions":[{"id":"https://openalex.org/I4210119991","display_name":"Laboratoire Informatique d'Avignon","ror":"https://ror.org/02n399288","country_code":"FR","type":"facility","lineage":["https://openalex.org/I198415970","https://openalex.org/I4210119991"]},{"id":"https://openalex.org/I198415970","display_name":"Universit\u00e9 d'Avignon et des Pays de Vaucluse","ror":"https://ror.org/00mfpxb84","country_code":"FR","type":"education","lineage":["https://openalex.org/I198415970"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Abderrahim Benslimane","raw_affiliation_strings":["Laboratoire Informatique d\u2019Avignon, University of Avignon, Avignon, France","Laboratoire Informatique d'Avignon, University of Avignon, Avignon, France"],"affiliations":[{"raw_affiliation_string":"Laboratoire Informatique d\u2019Avignon, University of Avignon, Avignon, France","institution_ids":["https://openalex.org/I4210119991","https://openalex.org/I198415970"]},{"raw_affiliation_string":"Laboratoire Informatique d'Avignon, University of Avignon, Avignon, France","institution_ids":["https://openalex.org/I4210119991","https://openalex.org/I198415970"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044449990","display_name":"Huong Nguyen-Minh","orcid":"https://orcid.org/0000-0001-6138-0287"},"institutions":[{"id":"https://openalex.org/I4210119991","display_name":"Laboratoire Informatique d'Avignon","ror":"https://ror.org/02n399288","country_code":"FR","type":"facility","lineage":["https://openalex.org/I198415970","https://openalex.org/I4210119991"]},{"id":"https://openalex.org/I198415970","display_name":"Universit\u00e9 d'Avignon et des Pays de Vaucluse","ror":"https://ror.org/00mfpxb84","country_code":"FR","type":"education","lineage":["https://openalex.org/I198415970"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Huong Nguyen-Minh","raw_affiliation_strings":["Laboratoire Informatique d\u2019Avignon, University of Avignon, Avignon, France","Laboratoire Informatique d'Avignon, University of Avignon, Avignon, France"],"affiliations":[{"raw_affiliation_string":"Laboratoire Informatique d\u2019Avignon, University of Avignon, Avignon, France","institution_ids":["https://openalex.org/I4210119991","https://openalex.org/I198415970"]},{"raw_affiliation_string":"Laboratoire Informatique d'Avignon, University of Avignon, Avignon, France","institution_ids":["https://openalex.org/I4210119991","https://openalex.org/I198415970"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5060341203"],"corresponding_institution_ids":["https://openalex.org/I198415970","https://openalex.org/I4210119991"],"apc_list":null,"apc_paid":null,"fwci":3.6433,"has_fulltext":false,"cited_by_count":60,"citation_normalized_percentile":{"value":0.93697817,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"66","issue":"7","first_page":"6475","last_page":"6488"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.8687232732772827},{"id":"https://openalex.org/keywords/beacon","display_name":"Beacon","score":0.8377805948257446},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7221555709838867},{"id":"https://openalex.org/keywords/broadcasting","display_name":"Broadcasting (networking)","score":0.5973626971244812},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5954757928848267},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.46513718366622925},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.41865095496177673},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40488287806510925}],"concepts":[{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.8687232732772827},{"id":"https://openalex.org/C102168758","wikidata":"https://www.wikidata.org/wiki/Q7321258","display_name":"Beacon","level":2,"score":0.8377805948257446},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7221555709838867},{"id":"https://openalex.org/C110157686","wikidata":"https://www.wikidata.org/wiki/Q922122","display_name":"Broadcasting (networking)","level":2,"score":0.5973626971244812},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5954757928848267},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.46513718366622925},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.41865095496177673},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40488287806510925},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tvt.2016.2645478","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tvt.2016.2645478","pdf_url":null,"source":{"id":"https://openalex.org/S10936095","display_name":"IEEE Transactions on Vehicular Technology","issn_l":"0018-9545","issn":["0018-9545","1939-9359"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Vehicular Technology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1573032046","https://openalex.org/W1968499534","https://openalex.org/W1977726193","https://openalex.org/W2008804290","https://openalex.org/W2020867565","https://openalex.org/W2079705392","https://openalex.org/W2116125350","https://openalex.org/W2124280970","https://openalex.org/W2126489637","https://openalex.org/W2152225112","https://openalex.org/W2153517355","https://openalex.org/W2164033372","https://openalex.org/W2164229844","https://openalex.org/W2167831805","https://openalex.org/W2170787788","https://openalex.org/W2211648482","https://openalex.org/W6684764765"],"related_works":["https://openalex.org/W2790129070","https://openalex.org/W4327782404","https://openalex.org/W1595208394","https://openalex.org/W3126968533","https://openalex.org/W4386078195","https://openalex.org/W160219479","https://openalex.org/W2902395630","https://openalex.org/W4306639617","https://openalex.org/W4315631125","https://openalex.org/W2900697557"],"abstract_inverted_index":{"Safety":[0],"applications":[1,160],"in":[2,9,84,94,129,161,215],"vehicular":[3,162],"networks":[4],"involve":[5],"real-time":[6,130,147],"information":[7],"included":[8],"periodical":[10],"exchanged":[11],"messages,":[12,52],"called":[13],"beacons.":[14],"Denial":[15],"of":[16,33,37,49,65,90,121,158,173,192],"Service":[17],"(DoS)":[18],"attacks,":[19],"especially":[20],"jamming,":[21],"may":[22],"have":[23],"high":[24,212],"impact":[25,64],"on":[26,68],"these":[27,50,135],"basic":[28],"safety":[29,51,141,159],"messages":[30],"mainly":[31],"because":[32],"the":[34,38,41,46,63,79,95,119,122,156,171],"adequate":[35],"condition":[36],"attack":[39,93],"at":[40,81],"lower":[42],"layers.":[43],"Due":[44],"to":[45,105,110,126,154],"important":[47],"role":[48],"securing":[53],"beacons":[54],"against":[55],"jamming":[56,66,92,128,182,185],"attacks":[57,67,186],"is":[58,87],"primordial.":[59],"First,":[60],"we":[61,117,144,196],"investigate":[62],"broadcasting":[69],"by":[70],"introducing":[71],"a":[72,91,146],"new":[73],"analytical":[74,203],"model.":[75],"We":[76],"show":[77],"that":[78],"degradation":[80],"certain":[82],"levels":[83],"network":[85,107,206],"performance":[86,108],"an":[88],"indication":[89],"network;":[96],"therefore,":[97],"results":[98],"from":[99],"this":[100],"analysis":[101,204],"will":[102],"allow":[103],"us":[104],"determine":[106],"thresholds":[109],"distinguish":[111,170],"normal":[112],"operation":[113],"and":[114,181,205],"attacks.":[115,183],"Second,":[116],"study":[118],"feasibility":[120],"existing":[123],"threshold-based":[124],"methods":[125,136],"detect":[127],"applications.":[131,142],"From":[132],"our":[133,198],"analysis,":[134],"are":[137,187,222],"not":[138],"suitable":[139],"for":[140],"Hence,":[143],"propose":[145],"Medium-Access-Control-based":[148],"(MAC-based)":[149],"detection":[150,152,165,199,209,213],"method":[151,153,166,200,210],"meet":[155],"requirements":[157],"networks.":[163],"Our":[164,208],"can":[167],"more":[168],"accurately":[169],"causes":[172],"failed":[174],"transmissions,":[175],"such":[176],"as":[177],"contention":[178],"collisions,":[179],"interferences,":[180],"The":[184],"detected":[188],"with":[189,201],"low":[190],"probability":[191,214],"false":[193,220],"alarms.":[194],"Finally,":[195],"evaluate":[197],"both":[202],"simulations.":[207],"performs":[211],"different":[216],"studied":[217],"scenarios":[218],"while":[219],"alarms":[221],"almost":[223],"avoided.":[224]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":14},{"year":2020,"cited_by_count":10},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":9}],"updated_date":"2026-03-13T16:22:10.518609","created_date":"2025-10-10T00:00:00"}
