Specific Anomaly Detection Method in Wireless Communication Networks

Wireless networks, especially the IEEE 802.11 standards family, are one of the main components of today’s communication. Addressing cybersecurity in these networks is crucial because of the ever-increasing number of attacks and newly discovered vulnerabilities. For this reason, the article deals with the vulnerability of security protocols used in IEEE 802.11. We concentrate on intrusion detection methods and detection of general security incidents. The presented results show that the methods may find application, among other things, in detection and prevention systems.

[1]  Heejo Lee,et al.  Online Detection of Fake Access Points Using Received Signal Strengths , 2012, 2012 IEEE 75th Vehicular Technology Conference (VTC Spring).

[2]  M. Durairaj,et al.  Interoperability in Smart Living Network—A Survey , 2020 .

[3]  송창익,et al.  IEEE 802.11p 기반 차량 간 통신 시스템에서 패킷 에러율 향상을 위한 반복적 채널 추정 기법 , 2016 .

[4]  Yu-Liang Hsu,et al.  A solution to detect the existence of a malicious rogue AP , 2019, Comput. Commun..

[5]  Ali Kashif Bashir,et al.  WLAN Aware Cognitive Medium Access Control Protocol for IoT Applications , 2020, Future Internet.

[6]  Wen-Ching Chen,et al.  An Accurate Fake Access Point Detection Method Based on Deviation of Beacon Time Interval , 2014, 2014 IEEE Eighth International Conference on Software Security and Reliability-Companion.

[7]  Gerhard P. Hancke,et al.  A Survey of Anomaly Detection in Industrial Wireless Sensor Networks with Critical Water System Infrastructure as a Case Study , 2018, Sensors.

[8]  Sunghyun Choi,et al.  Analysis of IEEE 802.11e for QoS support in wireless LANs , 2003, IEEE Wireless Communications.

[9]  Gundars Alksnis,et al.  Security Evaluation of Wireless Network Access Points , 2017, Appl. Comput. Syst..

[10]  A.K.M Fazlul Haque,et al.  A Detailed Exploration of Usability Statistics and Application Rating Based on Wireless Protocols , 2020 .

[11]  Pachamuthu Rajalakshmi,et al.  Saturated Throughput Analysis of IEEE 802.11ad EDCA For High Data Rate 5G-IoT Applications , 2019, IEEE Transactions on Vehicular Technology.

[12]  Santosh Biswas,et al.  Machine learning approach for detection of flooding DoS attacks in 802.11 networks and attacker localization , 2014, International Journal of Machine Learning and Cybernetics.