2019
DOI: 10.1109/temc.2019.2900262
|View full text |Cite
|
Sign up to set email alerts
|

EM Monitoring and Classification of IEMI and Protocol-Based Attacks on IEEE 802.11n Communication Networks

Abstract: The development of connected devices and their daily use are today at the origin of the omnipresence of Wi-Fi wireless networks. However, these Wi-Fi networks are often vulnerable, and can be used by malicious people to disturb services, intercept sensitive data or to gain access to system. In railways, trains are now equipped with wireless communication systems for operational purposes or for passenger services. In both cases, defense strategies have to be developed to prevent misuses of the networks. The fir… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 14 publications
0
7
0
Order By: Relevance
“…Previous works were performed in an anechoic chamber to analyse the feasibility of detecting jamming attacks by supervised classification approaches. These experiments were carried out without any other interferences in the Wi-Fi frequency band and showed that relatively low jamming signals could be detected by SVM classification [8]. However, the same supervised approach, of our previous works, applied on measurement under realistic conditions, i.e.…”
Section: A Motivationmentioning
confidence: 96%
See 2 more Smart Citations
“…Previous works were performed in an anechoic chamber to analyse the feasibility of detecting jamming attacks by supervised classification approaches. These experiments were carried out without any other interferences in the Wi-Fi frequency band and showed that relatively low jamming signals could be detected by SVM classification [8]. However, the same supervised approach, of our previous works, applied on measurement under realistic conditions, i.e.…”
Section: A Motivationmentioning
confidence: 96%
“…In the PCA representation, each point corresponds to one spectrum. In [8], the experiments were performed in a anechoic chamber (without any other emissions than the Wi-Fi communication and the jamming signal), the PCA and the representation in the two first components showed the separation of the situations with and without jamming. In this present article, we also calculate the PCA over the spectra obtained in a realistic environment with and without jamming signals.…”
Section: Analysis a Principal Component Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…The commercial jammers are generally based on voltage-controlled oscillators (VCO), which allow them to jam a given frequency band by emitting a radiofrequency signal that repetitively and quickly sweeps the targeted frequency band. The effects of this type of jammer on Wi-Fi networks were already analyzed and evaluated [12,13]. However, its impacts on LoRa communications are still unknown.…”
Section: Introductionmentioning
confidence: 99%
“…Standardization offers a certain protection level against standardized attacks but attackers may develop their own strategies according to their technological expertise and imagination [2]. This a major concern regarding advanced digital technologies within smart grids [3], wire communications [4] (introducing repetitive crosstalk disturbances), wireless communications [5] [6], autonomous vehicles [7]. From the point of view of risk analysis or attack optimization, evaluation of worse or more favorable configurations are also the subject of questions.…”
Section: Introductionmentioning
confidence: 99%