Reduction Jammer Detection and Recovery Algorithms for DSRC Safety Application in VANET

Main Article Content

Gaith Khalil
Ayoob Aziz
Zozan Ayoub


Intelligent Transportation Systems (ITS) encompasses technologies, services, and applications facilitating communication between vehicles (V2V) and between vehicles and fixed infrastructure (V2I and I2V). This mutual interaction constitutes a Vehicular Ad-Hoc Network (VANET) which supports a plethora of applications targeting critical transportation aspects, such as safety, mobility, and environmental considerations. Dedicated Short Range Communications (DSRC), operating on the 5.9 GHz band, is pivotal for such exchanges. We introduced an innovative algorithm designed to identify jamming attacks and transition the Safety Application to a secure fail-safe mode. This algorithm leverages a dual-metric strategy, incorporating both distance and PDR measurements. Field tests confirm that our algorithm adeptly recognizes the activities of deceptive jammers, ensuring a prompt shift of the safety application into its fail-safe state. This paper delves into these countermeasures, evaluating their efficiency via mathematical modeling, simulations, and on-ground testing. Findings acknowledge that these strategies bolster the reliability of safety applications in jamming scenarios. Furthermore, the approaches propounded align with ongoing standardization endeavors by relevant authorities, ensuring communication mediums remain unhindered.



Download data is not yet available.


Metrics Loading ...

Article Details

How to Cite
Khalil, G., Aziz, A. ., & Ayoub, Z. . (2024). Reduction Jammer Detection and Recovery Algorithms for DSRC Safety Application in VANET . Turkish Journal of Computer and Mathematics Education (TURCOMAT), 15(2), 30–64.
Research Articles


N. 2015. ] Traffic Safety Facts: Crash Stats, U.S. Department of Transportation, National Highway Traffic Safety Administration, DOT HS 812 219, “No Title.”

“J. B. Kenney, Dedicated Short-Range Communications (DSRC) Standards in the United States, Proceedings of the IEEE, vol. 99, no. 7, pp. 1162-1182, 2011.”

“No TitleIEEE Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages, IEEE Std 1609.2TM, 2018.”

Mahmood A. Al-Shareeda; Selvakumar Manickam, “A Systematic Literature Review on Security of Vehicular Ad-Hoc Network (VANET) Based on VEINS Framework,” IEEE 66th Veh. Technol. Conf., vol. 11, pp. 46218–46228, 2023.

S. Blessy, A.M.C., Brindha, “Energy-efficient fuzzy management system using tri-parametric methodology in vanet,” IEEE, vol. 14, 2023.

G. Ayoob, A., Su, G. and Al, “Hierarchical Growing Neural Gas Network (HGNG)-Based Semi cooperative Feature Classifier for IDS in Vehicular Ad Hoc Network (VANET,” J. Sens. Actuator Networks, vol. 7, no. 3, p. 41, 2018.

Jinsong Zhang; Kangfeng Zheng; Dongmei Zhang; Bo Yan, “AATMS: An Anti-Attack Trust Management Scheme in VANET,” IEEE Access, vol. 8, no. 10, 2020.

M. Hadded, P. Muhlethaler, A. Laouiti, R. Zagrouba, and L. A. Saidane, “TDMA-Based MAC Protocols for Vehicular Ad Hoc Networks: A Survey, Qualitative Analysis, and Open Research Issues,” IEEE Commun. Surv. Tutorials, vol. 17, no. 4, pp. 2461–2492, 2015.

G. Lu, Vasukidevi, “A Survey on Security and Key Management in,” IJIRST –International J. Innov. Res. Sci. Technol., vol. 3, no. 08, pp. 107–111, 2017.

Y. Hu, A. Perrig, and D. B. Johnson, “Ariadne : A Secure On-Demand Routing Protocol for Ad Hoc Networks,” Wirel. Networks 11, vol. 5, pp. 21–38, 2015.

F. , Xu Hao , J. Hortelano , Sakiz and S. Sen, “Ad Hoc Networks Survey paper A survey of attacks and detection mechanisms on intelligent transportation systems : VANETs and IoV,” Ad Hoc Networks, vol. 61, pp. 33–50, 2017.

H. M. Maier, “Florida State University Libraries Nutritional Status and the Relationship of Dietary and Serum Advanced Glycation End-Products with Inflammation , Oxidative Stress and Healing of Diabetic Foot Ulcers,” 2013.

S. I. Sou and O. K. Tonguz, “Enhancing VANET connectivity through roadside units on highways,” IEEE Trans. Veh. Technol., vol. 60, no. 8, pp. 3586–3602, 2017.

E. F. Ahmed Elsmany, M. A. Omar, T. C. Wan, and A. A. Altahir, “EESRA: Energy efficient scalable routing algorithm for wireless sensor networks,” IEEE Access, vol. 7, pp. 96974–96983, 2019.

J. Puñal, Ó., Pereira, C., Aguiar, A., & Gross, “Experimental characterization and modeling of RF jamming attacks on VANETs.,” IEEE Trans. Veh. Technol., vol. 64, no. 2, pp. 524–540, 2015.

Y. Shi, “LTE-V: A Cellular-Assisted V2X Communication Technology,” 2019.

F. B. and A. P. A. Studer, E. Shi, “TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs, in Sensor, Mesh and Ad Hoc Communications and Networks,” Access IEEE, pp. 1–9, 2018.

H. L. and M. G. Jie Li, “A Novel Authentication Framework with Conditional Privacy-Preservation and Non-Repudiation for VANETs,” IEEE Trans. Parallel Distrib. Syst., vol. 26, pp. 938–948, 2019.

J. P. and Z. Mammeri, “Authentication and Consensus Overhead in Vehicular Ad Hoc Networks, in Telecommunication systems,” IEEE 66th Veh. Technol. Conf., vol. 52, no. 4, pp. 2699–2712, 2015.

M. G. and Z. C. Z. Cao, J. Kong, U. Lee, “Proof-of-relevance: Filtering False Data via Authentic Consensus in Vehicle Ad-hoc Networks, in IEEE INFOCOM,” Workshops, vol. 20815, pp. 1–6.

U. Rajput, F. Abbas, H. Eun, and H. Oh, “A Hybrid Approach for Efficient Privacy Preserving Authentication in VANET,” IEEE Access, vol. 3536, no. c, pp. 1–1, 2017.

P. Donadio, A. Cimmino, and G. Ventre, “Enhanced Intrusion Detection Systems in ad hoc networks using a Grid based agnostic middleware,” Proc. Int. Conf. Pervasive Serv. ICPS 2008 2nd Int. Work. Agent-Oriented Softw., pp. 15–19, 2008.

R. G. Engoulou, M. Bellaïche, S. Pierre, and A. Quintero, “VANET security surveys,” Comput. Commun., vol. 44, 2014.

F. Anjum, D. Subhadrabandhu, and S. Sarkar, “Signature based intrusion detection for wireless ad-hoc networks: a comparative study of various routing protocols,” 2003 IEEE 58th Veh. Technol. Conf., vol. 3, 2003.

Y. Hu, A. Perrig, and D. B. Johnson, “Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols,” [Computer Commun. Networks, vol. 3.

T. O. Address, U. In, and H. Times, “by Maria Isabel Portal Palomo A Thesis Submitted to the Faculty of The College of Engineering and Computer Science in Partial Fulfillment of the Requirements for the Degree of Master of Science Florida Atlantic University Boca Raton , Florida,” no. May, 2013.

and C. S. B. Awerbuch, A. Richa, “A Jamming-Resistant MAC Protocol for Single-Hop Wireless Networks, in Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing,” ACM/Springer Mob. Networks Appl., vol. 2015.

Y. P. and K. H. R. C.D. Jung, C. Sur, “A Robust Conditional Privacy-Preserving Authentication Protocol in VANET, in Security and Privacy in Mobile Information and Communication Systems,” Springer Berlin Heidelb., p. 35-45, 2014.

A. H. and J. Ben-Othman, “IEEE International Conference on Communications, Dresden,” in Detection of Jamming Attacks in Wireless Ad Hoc Networks Using Error Distribution, 2015, pp. 877–889.

A. K. Sampigethaya, M. Li, L. Huang and R. Poovendran, “Robust Location Privacy Scheme for VANET,” IEEE J. Sel. Areas Commun., vol. 25, no. 8, pp. 569–1589.

A. Mokdad, L., Ben-Othman, J., & Nguyen, “DJAVAN: Detecting jamming attacks in Vehicle Ad hoc Networks,” Perform. Eval., vol. 87, pp. 47–59, 2015.

M. I. A. S., “Radio Jamming Attacks Against Two Popular Mobile Networks.,” Semin. Netw. Secur., vol. 11( 2), pp. 135–142, 2000.

Alasmary, W.; Zhuang, “Public safety application for approaching emergency vehicle alert and accident reporting in VANETs using WAVE,” Ad Hoc Netwowking, vol. 10, p. 90, 2012.

W. Chen, R. K. Guha, T. J. Kwon, J. Lee, and Y. Hsu, “A survey and challenges in routing and data dissemination in vehicular ad hoc networks,” Wirel. Commun. Mob. Comput., vol. 15, no. October 2009, pp. 787–795, 2011.