Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Machine learning-based jamming attack classification and effective defense technique

Published: 01 May 2023 Publication History

Highlights

Novel jammer classification and effective defense (JCED) algorithm is proposed.
Jammer types are effectively classified and suitable countermeasures are initiated.
JCED achieves Higher effective throughput and lower energy consumption than CDCA.
JCED responds using BSS secure coloring, battery-draining attacks, and avoidance.
Impact of selective jamming attacks is reduced and forgery attacks are prevented.

Abstract

The fourth industrial revolution has resulted in the intelligent Internet of Things being widely used for home networking applications and smart infrastructure. Consequently, wireless connectivity has become essential in industrial and daily-life applications. Wireless communication is a continuously evolving technology that satisfies high-speed and ultra-low latency requirements. However, as multiple users utilize a single channel by sharing frequency and time, the service quality cannot be ensured owing to the interference from a congested network. Additionally, malicious attackers can compromise communication availability or destroy data integrity through jamming attacks, threatening human life and safety. Conventional jamming attack detection and response technology respond to attacks without detecting the type of jammer, exhibiting certain limitations in detecting and defending against an intelligent attack. This study proposes a novel jammer classification and effective defense (JCED) algorithm that can classify jamming attack types using machine learning (ML) and provide differential responses based on the jamming types. Depending on the jammer type, the JCED algorithm can adaptively select various response methods, ranging from simple retransmission to active battery-draining attacks. The experimental results verify that JCED exhibits 24.9% higher effective throughput and 23.4% lower energy consumption than the countermeasure detection and consistency algorithm (CDCA). Moreover, JCED improves the effective throughput by an average of approximately three times compared to CDCA in an environment with integrity violation attacks. Thus, the JCED is an effective defense mechanism against jamming attacks, ensuring digital information safety and high throughput.

References

[1]
I. Almomani, B. Al-Kasasbeh, M. AL-Akhras, WSN-DS: a dataset for intrusion detection systems in wireless sensor networks, J. Sens. 2016 (2016),.
[2]
Y. Arjoune, F. Salahdine, M.S. Islam, E. Ghribi, N. Kaabouch, A novel jamming attacks detection approach based on machine learning for wireless communication, in: 2020 International Conference on Information Networking (ICOIN), 2020, pp. 459–464,.
[3]
Commscope, Wi-Fi 6 fundamentals: Basic Service Set Coloring (BSS Coloring), https://www.commscope.com/blog/2018/wi-fi-6-fundamentals-basic-service-set-coloring-bss-coloring, 2018. (Accessed 31 August 2022).
[4]
S. Djuraev, J.G. Choi, K.S. Sohn, S.Y. Nam, Channel hopping scheme to mitigate jamming attacks in wireless LANs, EURASIP J. Wirel. Com. Netw. 11 (2017),. 2017.
[5]
Extreme Networks, Learn About BSS Color in 802.11ax: Background, Definition, Set-up, https://www.extremenetworks.com/extreme-networks-blog/what-is-bss-color-in-802-11ax, 2021. (Accessed 1 September 2022).
[6]
A.A. Fadele, M. Othman, I.A. Hashem, I. Yaqoob, M. Imran, M. Shoaib, A novel countermeasure technique for reactive jamming attack in internet of things, Multimed. Tools Appl. 78 (2019) 29899–29920,.
[7]
K. Grover, A. Lim, Q. Yang, Jamming and anti-jamming techniques in wireless networks: a survey, Int. J. Ad Hoc Ubiquitous Comput. 17 (2014) 197–215,.
[8]
M. Hachimi, G. Kaddoum, G. Gagnon, P. Illy, Multi-stage jamming attacks detection using deep learning combined with kernelized support vector machine in 5G cloud radio access networks, in: International Symposium on Networks, Computers and Communications (ISNCC), 2020, pp. 1–5,.
[9]
K. Ibrahim, A.M. Alnajim, A. Naveed Malik, A. Waseem, S. Alyahya, M. Islam, S. Khan, Entice to trap: enhanced protection against a rate-aware intelligent jammer in cognitive radio networks, Sustainability 14 (2022) 2957,.
[10]
S. Joshi, R. Roy, R.V. Bhat, P. Hathi, N. Akhtar, Dynamic distributed threshold control for spatial reuse in IEEE 802.11 ax, in: 2022 National Conference on Communications (NCC), 2022, pp. 373–378,.
[11]
G.S. Kasturi, A. Jain, J. Singh, Detection and classification of radio frequency jamming attacks using machine learning, J. Wirel. Mob. Netw. Ubiquitous Comput. Depend. Appl. 11 (2020) 49–62,.
[12]
Y. Kim, Channel-hopping scheme for enhancing fairness performance under smart jammer attacks in tactical WLANs, J. Kor. Inst. Commun. Inf. Sci. 40 (2015) 2188–2195,.
[13]
I.G. Lee, M. Kim, Persistent jamming in wireless local area networks: attack and defense, Comput. Netw. 109 (2016) 67–83,.
[14]
I.G. Lee, K. Go, G.H. Lee, Battery draining attack and defense against power saving wireless lan devices, Sensors 20 (2020) 2043,.
[15]
S. Liu, Y. Xu, X. Chen, X. Wang, M. Wang, W. Li, Y. Li, Y. Xu, Pattern-aware intelligent anti-jamming communication: a sequential deep reinforcement learning approach, IEEE Access 7 (2019) 169204–169216,.
[16]
Y. Liu, Q. Zeng, Y. Zhao, K. Wu, Y. Hao, Novel channel-hopping pattern-based wireless IoT networks in smart cities for reducing multi-access interference and jamming attacks, EURASIP J. Wirel. Com. Netw. 152 (2021),. 2021.
[17]
MarketsandMarkets, Wi-Fi Market by Component (Hardware, Solution, and Services), Density (High-density Wi-Fi and Enterprise-class Wi-Fi), Location Type (Indoor and Outdoor), Organization Size, Vertical (Education, Retail and eCommerce), and Region (2022 - 2026), 2021. https://www.marketsandmarkets.com/Market-Reports/global-wi-fi-market-994.html (Accessed 31 August 2022).
[18]
S.H. Park, S. Joo, I.G. Lee, Secure visible light communication system via cooperative attack detection techniques, IEEE Access 10 (2022) 20473–20485,.
[19]
H. Pirayesh, H. Zeng, Jamming attacks and anti-jamming strategies in wireless networks: a comprehensive survey, IEEE Commun. Surv. Tutor. 24 (2022) 767–809,.
[20]
B. Priya, J. Malhotra, QAAs: QoS provisioned artificial intelligence framework for AP selection in next-generation wireless networks, Telecommun. Syst. 76 (2021) 233–249,.
[21]
ShareTechnote, Wi-Fi, Frame Structure, http://sharetechnote.com/html/WLAN_FrameStructure.html (Accessed 31 August 2022).
[22]
Z. Su, N. Qi, Y. Yan, Z. Du, J. Chen, Z. Feng, Q. Wu, Guarding legal communication with smart jammer: Stackelberg game based power control analysis, China Commun. 18 (2021) 126–136,.
[23]
Tabbaa, H., Ifzarne, S., Imad, H. An online ensemble learning model for detecting attacks inwireless sensor networks. Arxiv. https://doi.org/10.48550/arXiv.2204.13814.
[24]
V. Tsiatsis, S. Karnouskos, J. Höller, D. Boyle, C. Mulligan, Chapter 6-Security, in: Internet of Things (Second Edition), Academic Press, 2019, pp. 127–142,.
[25]
S. Vadlamani, B. Eksioglu, H Medal, A. Nandi, Jamming attacks on wireless networks: a taxonomic survey, Int. J. Prod. Econ. 172 (2016) 76–94,.
[26]
J. Xu, H. Lou, W. Zhang, G. Sang, An intelligent anti-jamming scheme for cognitive radio based on deep reinforcement learning, IEEE Access 8 (2020) 202563–202572,.

Index Terms

  1. Machine learning-based jamming attack classification and effective defense technique
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image Computers and Security
        Computers and Security  Volume 128, Issue C
        May 2023
        739 pages

        Publisher

        Elsevier Advanced Technology Publications

        United Kingdom

        Publication History

        Published: 01 May 2023

        Author Tags

        1. Wi-Fi
        2. Jamming attack
        3. Jammer classification
        4. Jammer defense
        5. Basic service set coloring
        6. Battery draining

        Qualifiers

        • Research-article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 0
          Total Downloads
        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 23 Feb 2025

        Other Metrics

        Citations

        View Options

        View options

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media