2010
DOI: 10.1007/978-3-642-13315-2_16
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly-Based Intrusion Detection Algorithms for Wireless Networks

Abstract: Abstract. In this paper we present and evaluate anomaly-based intrusion detection algorithms for detecting physical layer jamming attacks in wireless networks, by seeking changes in the statistical characteristics of the signal-to-noise ratio (SNR). Two types of algorithms are investigated: simple threshold algorithms and algorithms based on the cumulative sum change point detection procedure. The algorithms consider SNR-based metrics, which include the average SNR, minimum SNR, and max-minus-min SNR values in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
13
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 18 publications
(14 citation statements)
references
References 12 publications
1
13
0
Order By: Relevance
“…In a random jamming attack, the attack and sleep durations are both randomized, and in a periodic jamming attack the jammer uses a fixed period and duty cycle [10]. These attacks are most effective if information is known to the attacker about the error correction and error checks used by the legitimate communication.…”
Section: B Attack Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…In a random jamming attack, the attack and sleep durations are both randomized, and in a periodic jamming attack the jammer uses a fixed period and duty cycle [10]. These attacks are most effective if information is known to the attacker about the error correction and error checks used by the legitimate communication.…”
Section: B Attack Modelsmentioning
confidence: 99%
“…For example, attackers can target control channels to reduce energy expenditure by serveral orders of magnitude over jamming data channels [8,9]. To increase attack efficiency, a jammer can also alternate between jamming and sleeping, either with a constant period and duty cycle in a periodic jamming attack, or using randomized jamming and sleeping durations in a random jamming attack [10]. An illustration of random jamming is shown in Figure 1.…”
Section: Introductionmentioning
confidence: 99%
“…This code ensures the integrity of the MAC header and the attached payload data. On the other hand, jamming attacks can be detected using suitable algorithms based on dropped packets or the decrease of the signal to noise ratio [35]. In order to mitigate such attacks, two possible solutions may be applied: (i) an increase in the power level or (ii) a channel assignment procedure as described in [36].…”
Section: Security Challenges Due To Limited Resources and Energymentioning
confidence: 99%
“…In our previous works ( [6,7]), we investigated several algorithms for jamming detection, all based on the SINR. Among all, Cusum Max-Min (C mm ) has the best performance in terms of the DP, FAR, and robustness (the term robustness is analysed in Section 6).…”
Section: Jamming Detectionmentioning
confidence: 99%
“…In our previous studies [6,7], we investigated the performance of several algorithms for the detection of physical-layer jamming attacks. This type of attacks can be launched by adversaries through the generation of interference in neighbouring channels.…”
Section: Introductionmentioning
confidence: 99%