A Novel Jamming Attacks Detection Approach Based on Machine Learning for Wireless Communication

Jamming attacks target a wireless network creating an unwanted denial of service. 5G is vulnerable to these attacks despite its resilience prompted by the use of millimeter wave bands. Over the last decade, several types of jamming detection techniques have been proposed, including fuzzy logic, game theory, channel surfing, and time series. Most of these techniques are inefficient in detecting smart jammers. Thus, there is a great need for efficient and fast jamming detection techniques with high accuracy. In this paper, we compare the efficiency of several machine learning models in detecting jamming signals. We investigated the types of signal features that identify jamming signals, and generated a large dataset using these parameters. Using this dataset, the machine learning algorithms were trained, evaluated, and tested. These algorithms are random forest, support vector machine, and neural network. The performance of these algorithms was evaluated and compared using the probability of detection, probability of false alarm, probability of miss detection, and accuracy. The simulation results show that jamming detection based random forest algorithm can detect jammers with a high accuracy, high detection probability and low probability of false alarm.

[1]  Saewoong Bahk,et al.  Mitigating stealthy jamming attacks in low-power and lossy wireless networks , 2018, Journal of Communications and Networks.

[2]  Xiqi Gao,et al.  A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.

[3]  Ying Lin,et al.  Distributed detection of jamming and defense in wireless sensor networks , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.

[4]  Yuanqing Xia,et al.  Security Research on Wireless Networked Control Systems Subject to Jamming Attacks , 2019, IEEE Transactions on Cybernetics.

[5]  Carlo S. Regazzoni,et al.  Jammer detection algorithm for wide-band radios using spectral correlation and neural networks , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[6]  Naima Kaabouch,et al.  Social Engineering Attacks: A Survey , 2019, Future Internet.

[7]  Naima Kaabouch,et al.  RSS-Based Localization with Maximum Likelihood Estimation for PUE Attacker Detection in Cognitive Radio Networks , 2019, 2019 IEEE International Conference on Electro Information Technology (EIT).

[8]  Faissal El Bouanani,et al.  Network layer attacks and countermeasures in cognitive radio networks: A survey , 2018, J. Inf. Secur. Appl..

[9]  Rami G. Melhem,et al.  Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks , 2008, MobiQuitous.

[10]  M. Velempini,et al.  The detection of the spectrum sensing data falsification attack in cognitive radio ad hoc networks , 2018, 2018 Conference on Information Communications Technology and Society (ICTAS).

[11]  César Cárdenas,et al.  Epidemic routing in vehicular delay-tolerant networks: The use of heterogeneous conditions to increase packet delivery ratio , 2015, 2015 IEEE First International Smart Cities Conference (ISC2).

[12]  Roberto Di Pietro,et al.  Jamming mitigation in cognitive radio networks , 2013, IEEE Network.

[13]  Manjunath R. Kounte,et al.  PHY-layer key exchange for wireless communication , 2015, 2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT).

[14]  Alvin S. Lim,et al.  Jamming and anti-jamming techniques in wireless networks: a survey , 2014, Int. J. Ad Hoc Ubiquitous Comput..

[15]  Tae-Gyu Chang,et al.  Segmentized Clear Channel Assessment for IEEE 802.15.4 Networks , 2016, Sensors.

[16]  Zhuo Lu,et al.  Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications , 2014, IEEE Transactions on Mobile Computing.

[17]  Bharat Bhushan,et al.  Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey , 2017, 2017 International Conference on Signal Processing and Communication (ICSPC).

[18]  Nazar Abbas Saqib,et al.  Detection of jamming attacks in 802.11b wireless networks , 2013, EURASIP Journal on Wireless Communications and Networking.

[19]  Rose Qingyang Hu,et al.  Security for 5G Mobile Wireless Networks , 2018, IEEE Access.

[20]  Yi Ling,et al.  Time Series Analysis for Jamming Attack Detection in Wireless Networks , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[21]  George K. Karagiannidis,et al.  Neural network based PHY-layer key exchange for wireless communications , 2011, 2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications.

[22]  Klaus Wehrle,et al.  Machine learning-based jamming detection for IEEE 802.11: Design and experimental evaluation , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.

[23]  Naima Kaabouch,et al.  Jamming and Lost Link Detection in Wireless Networks with Fuzzy Logic , 2013 .

[24]  Wajdi Alhakami,et al.  Spectrum sharing security and attacks in CRNs: a review , 2014 .