<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                                                <journal-id>saujs</journal-id>
            <journal-title-group>
                                                                                    <journal-title>Sakarya University Journal of Science</journal-title>
            </journal-title-group>
                                        <issn pub-type="epub">2147-835X</issn>
                                                                                            <publisher>
                    <publisher-name>Sakarya University</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.16984/saufenbilder.670273</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Electrical Engineering</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Elektrik Mühendisliği</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                                                            <article-title>CSK based on Priority Call Algorithm for Detection and Securing Platoon from Inside Attacks</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0003-4694-152X</contrib-id>
                                                                <name>
                                    <surname>Al Sheıkhly</surname>
                                    <given-names>Mohammed</given-names>
                                </name>
                                                                    <aff>ALTINBAS UNIVERSITY</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-7666-2639</contrib-id>
                                                                <name>
                                    <surname>Kurnaz</surname>
                                    <given-names>Sefer</given-names>
                                </name>
                                                                    <aff>ALTINBAS UNIVERSITY</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20201001">
                    <day>10</day>
                    <month>01</month>
                    <year>2020</year>
                </pub-date>
                                        <volume>24</volume>
                                        <issue>5</issue>
                                        <fpage>936</fpage>
                                        <lpage>947</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20200104">
                        <day>01</day>
                        <month>04</month>
                        <year>2020</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20200708">
                        <day>07</day>
                        <month>08</month>
                        <year>2020</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 1997, Sakarya University Journal of Science</copyright-statement>
                    <copyright-year>1997</copyright-year>
                    <copyright-holder>Sakarya University Journal of Science</copyright-holder>
                </permissions>
            
                                                                                                                        <abstract><p>The platooning is an emerging concept in VANETS that involves a group of vehicles behaving as a single unit via the coordination of movement. The emergence of autonomous vehicles has bolstered the evolution of platooning as a trend in mobility and transportation. The autonomous vehicles and the elimination of individual and manual capabilities introduces new risks. The safety of the cargos, passenger and the advanced technology had increased the complication of the security concerns in platooning as it may attract malicious actors. In improving the security of the platoon, the threat and their potential impacts on the vehicular systems should be identified to ensure the development of security features that will secure against the identified risks. In this paper, two critical types of security breaches were identified those are Sybil attack and Delay attacks. Those security attacks can be somewhat disruptive and dangerous to the regular operation of the platoon leading to severe injuries, increased fuel consumption and delay the performance of the network. The research in this paper focuses on design, detection and the mitigation of attacks in a vehicle platoon. priority call algorithm in combination with color-shift keying modulation is used to protect the platoon alleviating the undesirable impacts such as collisions, oscillations and disintegration in the platoon caused by the attacks.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>VAENT</kwd>
                                                    <kwd>  Priority call</kwd>
                                                    <kwd>  Color-shift keying</kwd>
                                                    <kwd>  Inside and Outside Attacks</kwd>
                                            </kwd-group>
                            
                                                                                                                                                    </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">B. Chen, “A cooperative control method for platoon and intelligent vehicles management,” pp. 1–5, 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">F. Sakiz and S. Sen, “A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV,” Ad Hoc Networks, vol. 61, pp. 33–50, 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">S. Zhao, T. Zhang, N. Wu, H. Ogai, and S. Tateno, “Vehicle to Vehicle Communication and Platooning for EV with Wireless Sensor Network,” pp. 1435–1440, 2015.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">S. Rehman, M. A. Khan, T. A. Zia, and L. Zheng, “Vehicular Ad-Hoc Networks ( VANETs ) - An Overview and Challenges,” vol. 3, no. 3, pp. 29–38, 2013.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">V. L. Hybrid, “IEEE 802.11p and Visible Light Hybrid Communication Based Secure Autonomous Platoon,” IEEE Trans. Veh. Technol., vol. 67, no. 9, pp. 8667–8681, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">S. Ucar, S. C. Ergen, and O. Ozkasap, “Visible light communication in vehicular ad-hoc networks,” in 2016 24th Signal Processing and Communication Application Conference (SIU), 2016, pp. 881–884.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">S. Ucar, B. Turan, S. Colen, O. Ozkasap, and M. Ergen, “Dimming Support for Visible Light Communication in Intelligent Transportation and Traffic System,” pp. 1193–1196, 2016.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">A. Petrillo, A. Pescap, and S. Santini, “A collaborative control strategy for platoons of autonomous vehicles in the presence of message falsification attacks,” pp. 110–115, 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">H. Menouar, “Visible Light Communication,” no. december, pp. 45–53, 2015.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">Tseng, Y. Wei, A. Chen, H. Wu, H. Hsu, and H. Tsai, “Characterizing Link Asymmetry in Vehicle-to-Vehicle Visible Light Communications,”pp. 88–95, 2015.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">P. Luo, Z. Ghassemlooy, H. Le Minh, and E. Bentley, “Performance analysis of a car-to-car visible light communication system,” no. March, 2015.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">M. Y. Abualhoul, M. Marouf, O. Shagdar, and F.  Nashashibi, “Platooning Control Using Visible Light Communications : A Feasibility Study,” no. Itsc, pp. 1535–1540, 2013.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">W. Whyte, A. Weimerskirch, V. Kumar, and T. Hehn, “A Security Credential Management System for V2V Communications,” pp. 1–8, 2013.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">X. U. S. H. S. Hen and U. N. O. F. W. Aterloo, “Complementing Public Key Infrastructure To Secure Vehicular AD HOC Networks Albert Wasef And Rongxing L U , University Of Waterloo,” no. October, pp. 22–28, 2010.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">X. Bin, Y. Bo, and G. Chuanshan, “Detection and localization of sybil nodes in VANETs,” DIWANS 2006 - Proc. 2006 Work. Dependability Issues Wirel. Ad Hoc Networks Sens. Networks (part MobiCom 2006), vol. 2006, pp. 1–8, 2006.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">S. Chang, Y. Qi, H. Zhu, J. Zhao, and X. Shen, “Footprint: Detecting Sybil attacks in urban vehicular networks,” IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 6, pp. 1103–1114, 2012.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">M. Stehlik, V. Matyas and A. Stetsko “Towards Better Selective Forwarding And Delay Attacks Detection in Wireless Sensor Networks,” no. April, 2016.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">R. S. Sachan, M. Wazid, and R. H. Goudar, “Misdirection Attack in WSN: Topological Analysis and an Algorithm for Delay and Throughput Prediction.” Proceedings of7&#039;h International Conference on Intelligent Systems and Control (ISCO 2013)</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">Y. Zhang and G. Cao, &quot;V-PADA: Vehicle-Platoon-Aware Data Access in VANETs,&quot; IEEE Transactions on Vehicular Technology, vol. 60, no. 5, pp. 2326-2339, 2011.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">M. Su. and S. Ahn, &quot;Autonomous platoon formation for VANET-enabled vehicles,&quot; in 2016 International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Korea, 2016.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">[21] H. Hexmoor, S. Alsamaraee and M. Almaghshi,      &quot;BlockChain for Improved Platoon Security,&quot; International Journal of Information Systems and Computer Sciences,       vol. 7, no. 2, pp. 1-6, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">M El-Zaher, B. Dafflon, F. Gechter, and J.-M. Contet, &quot;Vehicle platoon control with multi-configuration ability,&quot; Procedia Computer Science, vol. 9, p. 1503 – 1512, 2012.</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">M. Amoozadeh, A. Raghuramu, C.-N. Chuah, D. Ghosal, M. H. Zhang, J. Rowe, and K. Levitt, &quot;Security vulnerabilities of connected vehicle streams and their impact on cooperative,&quot; IEEE Communications Magazine, vol. 53, no. 6, pp. 126-132, 2015.</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">J. Liu, D. Ma, A. Weimerskirch and H. Zhu, &quot;Secure and Safe Automated Vehicle Platooning,&quot; IEEE Reliability Society, Detroit, 2016.</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">MATLAB, R2019a (9.6.0.1072779), 64-bit(win 64), March 8, 2019, License Number 968398. Professional License.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
