Smart City Gnosys

Smart city article details

Title Disruptions To V2V And V2I Lifi Communication In Traffic Lights For Smart City Applications
ID_Doc 20543
Authors Okunbo O.; Rivero-Angeles M.E.; Orea-Flores I.Y.
Year 2024
Published Communications in Computer and Information Science, 2249 CCIS
DOI http://dx.doi.org/10.1007/978-3-031-77290-0_9
Abstract In Smart City applications, we expect high amounts of information to be disseminated among nodes, people, and vehicles, among others. To this end, the use of conventional radio frequency (RF) communications may suffer in serving all data transmissions, considering already saturated channels (used by cellular systems, WiFi, and Bluetooth systems). To this end, the use of light-based communications such as LiFi (light fidelity) could be an adequate way to liberate some of those RF resources. Many forms of data transmission in smart cities have previously been explored, including vehicle-to-vehicle (V2V) communication. The idea encapsulated in this method of communication involves data, such as driving and road conditions, being transferred from one vehicle to another. One way this communication process has been studied is where the data is transmitted using vehicle-to-infrastructure communication, starting at the traffic light, and vehicle-to-vehicle communication, through the light sources on the vehicles. The data transmission process uses Li-Fi and existing light sources, making this form of communication energy efficient. However, the use of light links poses many potential vulnerabilities in case of cyber-attacks, i.e., a malicious agent actively trying to prevent or degrade the data dissemination process. In this work, we mathematically study the impact of an attack in light-based V2I and V2V communication systems using a continuous-time Markov chain. Specifically, we consider the presence of an attacker that is positioned in the queue such that all vehicles behind the attacker will not receive the data being transmitted, as the communication link would have been severed by the attacker. This work aims to investigate and understand the likelihood of this communication being severed and what the result of this disruption would look like. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.
Author Keywords Cyber-attack; LiFi Communication; V2I; V2V


Similar Articles


Id Similarity Authors Title Published
35160 View0.877Janjua J.I.; Khan T.A.; Khan M.S.; Nadeem M.Li-Fi Communications In Smart Cities For Truly Connected VehiclesProceedings of 2nd 2021 International Conference on Smart Cities, Automation and Intelligent Computing Systems, ICON-SONICS 2021 (2021)
31055 View0.87Gul B.; Ertam F.In-Vehicle Communication Cyber Security: A Comprehensive Review Of Challenges And SolutionsVehicular Communications, 50 (2024)
35161 View0.864Saravanan M.; Ajayan J.; Mamikandan P.; Naveen P.; Ashokkumar S.R.; Ramkumar K.Li-Fi Technology For Vehicle-To-Vehicle CommunicationInternational Conference on Edge Computing and Applications, ICECAA 2022 - Proceedings (2022)
35211 View0.859Sarkar A.; Chakraborty R.; Dutta H.Lifi-Based Energy-Efficient Traffic Sensing And Controlling System Management For Smart City ApplicationEnvironmental Informatics: Challenges and Solutions (2022)
58838 View0.854Ati M.; Jamil Y.; Qadir B.A.Transforming The Future: An Innovative Lifi Framework To Elevate Sustainability And Security In Uae Smart CitiesInternational Conference on Engineering and Emerging Technologies, ICEET, 2024 (2024)
14165 View0.851Yaseen Z.T.; Alghrairi M.City Lights Revolution: Next-Gen Optical Fibre For Smart CitiesOpto-Electronics Review, 32, 3 (2024)
28083 View0.851Alnasser A.; Sun H.Global Roaming Trust-Based Model For V2X CommunicationsINFOCOM 2019 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2019, 2019-January (2019)