An Optimal Sensor Architecture for Wi-Fi Intrusion Detection

نویسندگان

  • Zhiqi Tao
  • Baikunth Nath
  • Andrew Lonie
چکیده

This paper presents a novel approach to identifying illegitimate nodes in wireless networks. We demonstrate that, given a sufficiently dense sensor network, we are able to discriminate all network nodes based solely on signal strength datasets. Further, we demonstrate that within the dense sensor network, only a small subset of available sensors are required to effectively discriminate between nodes, and that this subset can be readily identified. Finally, we propose that duplicated network nodes may be identified by unsupervised, real-time analysis of signal strength datasets.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving Detection of Wi-Fi Impersonation by Fully Unsupervised Deep Learning

Intrusion Detection System (IDS) has been becoming a vital measure in any networks, especially Wi-Fi networks. Wi-Fi networks growth is undeniable due to a huge amount of tiny devices connected via Wi-Fi networks. Regrettably, adversaries may take advantage by launching an impersonation attack, a common wireless network attack. Any IDS usually depends on classification capabilities of machine l...

متن کامل

An Anomaly Behavior Analysis Intrusion Detection System for Wireless Networks

Wireless networks have become ubiquitous, where a wide range of mobile devices are connected to a larger network like the Internet via wireless communications. One widely used wireless communication standard is the IEEE 802.11 protocol, popularly called Wi-Fi. Over the years, the 802.11 has been upgraded to different versions. But most of these upgrades have been focused on the improvement of t...

متن کامل

Intrusion Detection in Wireless Sensor Networks using Genetic Algorithm

Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...

متن کامل

A Wi-Fi Cluster Based Wireless Sensor Network Application and Deployment for Wildfire Detection

We introduce the wireless sensor network (WSN) data harvesting application we developed for wildfire detection and the experiments we have performed.The sensor nodes are equippedwith temperature and relative humidity sensors.They are organized into clusters and they communicate with the cluster heads using 802.15.4/ZigBee wireless links. The cluster heads report the harvested data to the contro...

متن کامل

Evaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks

Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008