Skip to content
2000
image of Jamming Attacks Detection Based on IGWO for Optimization of Fast Correlation-Based Feature extraction in Wireless Communication

Abstract

Background

Wireless networks are essential communication technologies that prevent cable installation prices and burdens. Because of this technology's pervasive usage, wireless network safety is a significant problem. Owing to distributed and open wireless medium aspects, attackers might use different jamming methods to exploit physical and MAC layer protocol vulnerabilities. In addition, jamming attacks require to be accurately grouped so that suitable countermeasures can be considered. Given the potential severity of such attacks, precisely identifying and classifying them is critical for implementing effective responses. The motivation for this paper is the need to improve the detection and categorization of jamming signals using modern machine learning algorithms, consequently enhancing wireless network security and reliability.

Objective

In this paper, we compare some machine learning models' efficiency for diagnosing jamming signals.

Methods

Such algorithms refer to support vector machine (SVM) and k-nearest neighbors (KNN). We checked the signal features that recognize jamming signals. After the jamming attack model, the developed grey wolf optimizer version known as IGWO (improved grey wolf optimizer) has been discussed for feature extraction of software usability. Four separate metrics were employed as features to detect jamming attacks in order to evaluate the machine learning models. This novel feature extraction method is crucial for improving the accuracy of jamming detection.

Results

The measurements of these parameters were gathered through a simulation of a real setting. And generated a large dataset using these parameters.

Conclusion

The simulation results illustrate that the KNN algorithm based on jamming detection could diagnose jammers having a minimal likelihood of false alarms and a high level of accuracy.

Loading

Article metrics loading...

/content/journals/rascs/10.2174/0126662558341873241016064323
2024-10-25
2024-11-22
Loading full text...

Full text loading...

References

  1. Villain J. Deniau V. Gransart C. Jamming detection in electromagnetic communication with machine learning: A Survey and Perspective. Machine Learning and Probabilistic Graphical Models for Decision Support Systems. CRC Press 2022 252 271 10.1201/9781003189886‑10
    [Google Scholar]
  2. Rappaport TS Wireless communications: Principles and practice. Cambridge University Press 2 2024 10.1017/9781009489843
    [Google Scholar]
  3. Parate S. Josyula H.P. Reddi L.T. Digital identity verification: Transforming KYC processes in banking through advanced technology and enhanced security measures. IRJMETS 2023 5 9 128 137
    [Google Scholar]
  4. Dobrica V. Duško L. Lj V.S. Use of information technologies in higher education from the aspect of management. IJCRSEE 2023 11 1 143 151
    [Google Scholar]
  5. Villain J. Deniau V. Fleury A. Simon E.P. Gransart C. Kousri R. EM monitoring and classification of IEMI and protocol-based attacks on IEEE 802.11 n communication networks. IEEE Trans. Electromagn. Compat. 2019 61 6 1771 1781 10.1109/TEMC.2019.2900262
    [Google Scholar]
  6. Villain J. Fleury A. Deniau V. Gransart C. Simon E. Online EM monitoring of 802.11 n networks using self adaptive kernel machine. 18th IEEE International Conference On Machine Learning And Applications (ICMLA), Boca Raton, FL, USA, 2019, pp. 1136-1142.
    [Google Scholar]
  7. Zolfagharipour L. Kadhim M.H. Mandeel T.H. Enhance the security of access to iot-based equipment in fog. 2023 Al-Sadiq International Conference on Communication and Information Technology (AICCIT), Al-Muthana, Iraq, 4-6 July 2023, pp. 142-146. 10.1109/AICCIT57614.2023.10218280
    [Google Scholar]
  8. Atlam HF Wills GB IoT security, privacy, safety and ethics. Digital Twin Technologies and Smart Cities Springer Nature: Switzerland AG 2020 10.1007/978‑3‑030‑18732‑3_8
    [Google Scholar]
  9. Khan R. Kumar P. Jayakody D.N.K. Liyanage M. A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions. IEEE Commun. Surv. Tutor. 2020 22 1 196 248 10.1109/COMST.2019.2933899
    [Google Scholar]
  10. Naeem F. Ali M. Kaddoum G. Huang C. Yuen C. Security and privacy for reconfigurable intelligent surface in 6G: A review of prospective applications and challenges. IEEE Open J. Commun. Soc. 2023 4 1196 1217 10.1109/OJCOMS.2023.3273507
    [Google Scholar]
  11. Arjoune Y. Salahdine F. Islam M.S. Ghribi E. Kaabouch N. A novel jamming attacks detection approach based on machine learning for wireless communication. 2020 International Conference on Information Networking (ICOIN), Barcelona, Spain, 07-10 January 2020, pp. 459-464, 10.1109/ICOIN48656.2020.9016462
    [Google Scholar]
  12. Mpitziopoulos A. Gavalas D. Konstantopoulos C. Pantziou G. A survey on jamming attacks and countermeasures in WSNs. IEEE Commun. Surv. Tutor. 2009 11 4 42 56 10.1109/SURV.2009.090404
    [Google Scholar]
  13. Manikanthan S.V. Padmapriya T. Detection of jamming and interference attacks in a wireless communication network using deep learning technique. First International Conference on Computing, Communication and Control System I3CAC, Bharath University, Chennai, India, 7-8 June 2021. 10.4108/eai.7‑6‑2021.2308599
    [Google Scholar]
  14. Kadhim M.H. Mardukhi F. A Novel IoT application recommendation system using Metaheuristic Multi-criteria analysis. Comput. Syst. Sci. Eng. 2021 37 2
    [Google Scholar]
  15. Kasturi G.S. Detection and classification of radio frequency jamming attacks using machine learning. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 2020 11 4 49 62
    [Google Scholar]
  16. Li Y. Pawlak J. Price J. Al Shamaileh K. Niyaz Q. Paheding S. Devabhaktuni V. Jamming detection and classification in OFDM-based UAVs via feature- and spectrogram-tailored machine learning. IEEE Access 2022 10 16859 16870 10.1109/ACCESS.2022.3150020
    [Google Scholar]
  17. Lee S.J. Lee Y.R. Jeon S.E. Lee I.G. Machine learning-based jamming attack classification and effective defense technique. Comput. Secur. 2023 128 103169 10.1016/j.cose.2023.103169
    [Google Scholar]
  18. Singh J. Woungang I. Dhurandher S.K. Khalid K. A jamming attack detection technique for opportunistic networks. Internet of Things 2022 17 100464 10.1016/j.iot.2021.100464
    [Google Scholar]
  19. Karagiannis D. Argyriou A. Jamming attack detection in a pair of RF communicating vehicles using unsupervised machine learning. Veh. Commun. 2018 13 56 63 10.1016/j.vehcom.2018.05.001
    [Google Scholar]
  20. Sivaprakash S. Venkatesan M. A design and development of an intelligent jammer and jamming detection methodologies using machine learning approach. Cluster Comput. 2019 22 1 93 101 10.1007/s10586‑018‑2822‑7
    [Google Scholar]
  21. Jayabalan E. Pugazendi R. Deep learning model-based detection of jamming attacks in low-power and lossy wireless networks. Soft Comput. 2022 26 23 12893 12914 10.1007/s00500‑021‑06111‑7
    [Google Scholar]
  22. Topal O.A. Gecgel S. Eksioglu E.M. Karabulut Kurt G. Identification of smart jammers: Learning-based approaches using wavelet preprocessing. Phys. Commun. 2020 39 101029 10.1016/j.phycom.2020.101029
    [Google Scholar]
  23. Zhang J. Li Y. Li Q. Xiao W. Variance-constrained local–global modeling for device-free localization under uncertainties. IEEE Trans. Industr. Inform. 2023
    [Google Scholar]
  24. Zhang J. Li Y. Xiao W. Integrated multiple kernel learning for device-free localization in cluttered environments using spatiotemporal information. IEEE Internet Things J. 2021 8 6 4749 4761 10.1109/JIOT.2020.3028574
    [Google Scholar]
  25. Mirjalili S. Mirjalili S.M. Lewis A. Grey wolf optimizer. Adv. Eng. Softw. 2014 69 46 61 10.1016/j.advengsoft.2013.12.007
    [Google Scholar]
  26. Nadimi-Shahraki M.H. Taghian S. Mirjalili S. An improved grey wolf optimizer for solving engineering problems. Expert Syst. Appl. 2021 166 113917 10.1016/j.eswa.2020.113917
    [Google Scholar]
  27. Kurani A. Doshi P. Vakharia A. Shah M. A comprehensive comparative study of artificial neural network (ANN) and support vector machines (SVM) on stock forecasting. Annals of Data Science 2023 10 1 183 208 10.1007/s40745‑021‑00344‑x
    [Google Scholar]
  28. Khodadadi N. Khodadadi E. Al-Tashi Q. El-Kenawy E.S.M. Abualigah L. Abdulkadir S.J. Alqushaibi A. Mirjalili S. BAOA: Binary arithmetic optimization algorithm with K-nearest neighbor classifier for feature selection. IEEE Access 2023 11 94094 94115 10.1109/ACCESS.2023.3310429
    [Google Scholar]
/content/journals/rascs/10.2174/0126662558341873241016064323
Loading
/content/journals/rascs/10.2174/0126662558341873241016064323
Loading

Data & Media loading...

This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test