2013
DOI: 10.1002/wcm.2341
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly-based intrusion detection of jamming attacks, local versus collaborative detection

Abstract: We present intrusion detection algorithms to detect physical layer jamming attacks in wireless networks. We compare the performance of local algorithms on the basis of the signal-to-interference-plus-noise ratio (SINR) executing independently at several monitors, with a collaborative detection algorithm that fuses the outputs provided by these algorithms. The local algorithms fall into two categories: simple threshold that raise an alarm if the output of the SINR-based metrics we consider deviates from a prede… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 22 publications
(32 citation statements)
references
References 31 publications
0
30
0
Order By: Relevance
“…The DS theory does not require prior knowledge, enables a way of measuring ignorance, when the evaluated data cannot be allocated within the normal or abnormal hypothesis. Furthermore, it has also proved to be a viable solution in cases where it is impossible to apply classical sensor fusion techniques, such as Kalman filter or Bayesian networks, or even when it is virtually impossible to find a pattern in the system behaviour to build an appropriate model [15]. Although DS theory inflicts additional computational load when computing mass functions, reducing the number of hypothesis to three makes this theory applicable to a live detection system.…”
Section: B Attack Detection Methodologymentioning
confidence: 99%
See 1 more Smart Citation
“…The DS theory does not require prior knowledge, enables a way of measuring ignorance, when the evaluated data cannot be allocated within the normal or abnormal hypothesis. Furthermore, it has also proved to be a viable solution in cases where it is impossible to apply classical sensor fusion techniques, such as Kalman filter or Bayesian networks, or even when it is virtually impossible to find a pattern in the system behaviour to build an appropriate model [15]. Although DS theory inflicts additional computational load when computing mass functions, reducing the number of hypothesis to three makes this theory applicable to a live detection system.…”
Section: B Attack Detection Methodologymentioning
confidence: 99%
“…In [15] the authors propose a distributed solution to detect jamming attacks at the physical layer. In detail, the method is based on the detection of changes in the statistical characteristics of the Signal to Noise Ratio (SNR).…”
Section: Related Workmentioning
confidence: 99%
“…Based on this, we deploy a cumulative-sum (cusum) algorithm [14] able to detect abrupt changes of the SINR. In previous works [15,11,16,17] we show that maximum performance, in terms of false alarms/detection probability, is achieved when considering the maximum minus the minimum values of SINR within a short and long windows. Cusum is defined as:…”
Section: Attack Detectionmentioning
confidence: 61%
“…In [10], the authors use anomaly-based intrusion detection algorithm to investigate the presence of a jammer. The intrusion detection algorithm uses SINR based statistical analysis.…”
Section: Jammer and Cheater Detection In Ieee 80211 Wlansmentioning
confidence: 99%