Skip to content
2000
Volume 18, Issue 5
  • ISSN: 2666-2558
  • E-ISSN: 2666-2566

Abstract

Introduction

Wireless networks are essential communication technologies that prevent cable installation prices and burdens. Because of this technology's pervasive usage, wireless network safety is a significant problem. Owing to distributed and open wireless medium aspects, attackers might use different jamming methods to exploit physical and MAC layer protocol vulnerabilities. In addition, jamming attacks require to be accurately grouped so that suitable countermeasures can be considered. Given the potential severity of such attacks, precisely identifying and classifying them is critical for implementing effective responses. The motivation for this paper is the need to improve the detection and categorization of jamming signals using modern machine learning algorithms, consequently enhancing wireless network security and reliability.

Objective

In this paper, we compare some machine learning models' efficiency for diagnosing jamming signals.

Methods

Such algorithms refer to support vector machine (SVM) and k-nearest neighbors (KNN). We checked the signal features that recognize jamming signals. After the jamming attack model, the developed grey wolf optimizer version known as IGWO (improved grey wolf optimizer) has been discussed for feature extraction of software usability. Four separate metrics were employed as features to detect jamming attacks in order to evaluate the machine learning models. This novel feature extraction method is crucial for improving the accuracy of jamming detection.

Results

The measurements of these parameters were gathered through a simulation of a real setting. And generated a large dataset using these parameters.

Conclusion

The simulation results illustrate that the KNN algorithm based on jamming detection could diagnose jammers having a minimal likelihood of false alarms and a high level of accuracy.

Loading

Article metrics loading...

/content/journals/rascs/10.2174/0126662558341873241016064323
2024-10-25
2025-11-02
Loading full text...

Full text loading...

References

  1. VillainJ. DeniauV. GransartC. Jamming detection in electromagnetic communication with machine learning: A Survey and Perspective.Machine Learning and Probabilistic Graphical Models for Decision Support Systems.CRC Press202225227110.1201/9781003189886‑10
    [Google Scholar]
  2. RappaportT.S. Wireless communications: Principles and practice, 2 Cambridge University Press202410.1017/9781009489843
    [Google Scholar]
  3. ParateS. JosyulaH.P. ReddiL.T. Digital identity verification: Transforming KYC processes in banking through advanced technology and enhanced security measures.IRJMETS202359128137
    [Google Scholar]
  4. DobricaV. DuškoL. LjV.S. Use of information technologies in higher education from the aspect of management.IJCRSEE2023111143151
    [Google Scholar]
  5. VillainJ. DeniauV. FleuryA. SimonE.P. GransartC. KousriR. EM monitoring and classification of IEMI and protocol-based attacks on IEEE 802.11 n communication networks.IEEE Trans. Electromagn. Compat.20196161771178110.1109/TEMC.2019.2900262
    [Google Scholar]
  6. VillainJ. FleuryA. DeniauV. GransartC. SimonE. "Online EM monitoring of 802.11 n networks using self adaptive kernel machine". 18th IEEE International Conference on Machine Learning and Applications (ICMLA)Boca Raton, FL, USA201911361142
    [Google Scholar]
  7. ZolfagharipourL. KadhimM.H. MandeelT.H. "Enhance the security of access to IoT-based equipment in fog", 2023 Al-Sadiq International Conference on Communication and Information Technology (AICCIT)Al-Muthana, Iraq 4-6 July202314214610.1109/AICCIT57614.2023.10218280
    [Google Scholar]
  8. AtlamH.F. WillsG.B. IoT security, privacy, safety and ethicsDigital Twin Technologies and Smart Cities.Springer Nature: Switzerland AG202010.1007/978‑3‑030‑18732‑3_8
    [Google Scholar]
  9. KhanR. KumarP. JayakodyD.N.K. LiyanageM. A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions.IEEE Commun. Surv. Tutor.202022119624810.1109/COMST.2019.2933899
    [Google Scholar]
  10. NaeemF. AliM. KaddoumG. HuangC. YuenC. Security and privacy for reconfigurable intelligent surface in 6G: A review of prospective applications and challenges.IEEE Open J. Commun. Soc.202341196121710.1109/OJCOMS.2023.3273507
    [Google Scholar]
  11. ArjouneY. SalahdineF. IslamM.S. GhribiE. KaabouchN. A novel jamming attacks detection approach based on machine learning for wireless communication2020 International Conference on Information Networking (ICOIN)Barcelona, Spain 07-10 January202045946410.1109/ICOIN48656.2020.9016462
    [Google Scholar]
  12. MpitziopoulosA. GavalasD. KonstantopoulosC. PantziouG. A survey on jamming attacks and countermeasures in WSNs.IEEE Commun. Surv. Tutor.2009114425610.1109/SURV.2009.090404
    [Google Scholar]
  13. ManikanthanS.V. PadmapriyaT. Detection of jamming and interference attacks in a wireless communication network using deep learning techniqueFirst International Conference on Computing, Communication and Control System I3CACBharath University, Chennai, India, 7-8 June202110.4108/eai.7‑6‑2021.2308599
    [Google Scholar]
  14. KadhimM.H. MardukhiF. A Novel IoT application recommendation system using Metaheuristic Multi-criteria analysis.Comput. Syst. Sci. Eng.2021372
    [Google Scholar]
  15. KasturiG.S. Detection and classification of radio frequency jamming attacks using machine learning.J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl.20201144962
    [Google Scholar]
  16. LiY. PawlakJ. PriceJ. Al ShamailehK. NiyazQ. PahedingS. DevabhaktuniV. Jamming detection and classification in OFDM-based UAVs via feature- and spectrogram-tailored machine learning.IEEE Access202210168591687010.1109/ACCESS.2022.3150020
    [Google Scholar]
  17. LeeS.J. LeeY.R. JeonS.E. LeeI.G. Machine learning-based jamming attack classification and effective defense technique.Comput. Secur.202312810316910.1016/j.cose.2023.103169
    [Google Scholar]
  18. SinghJ. WoungangI. DhurandherS.K. KhalidK. A jamming attack detection technique for opportunistic networks.Internet of Things20221710046410.1016/j.iot.2021.100464
    [Google Scholar]
  19. KaragiannisD. ArgyriouA. Jamming attack detection in a pair of RF communicating vehicles using unsupervised machine learning.Veh. Commun.201813566310.1016/j.vehcom.2018.05.001
    [Google Scholar]
  20. SivaprakashS. VenkatesanM. A design and development of an intelligent jammer and jamming detection methodologies using machine learning approach.Cluster Comput.20192219310110.1007/s10586‑018‑2822‑7
    [Google Scholar]
  21. JayabalanE. PugazendiR. Deep learning model-based detection of jamming attacks in low-power and lossy wireless networks.Soft Comput.20222623128931291410.1007/s00500‑021‑06111‑7
    [Google Scholar]
  22. TopalO.A. GecgelS. EksiogluE.M. Karabulut KurtG. Identification of smart jammers: Learning-based approaches using wavelet preprocessing.Phys. Commun.20203910102910.1016/j.phycom.2020.101029
    [Google Scholar]
  23. ZhangJ. LiY. LiQ. XiaoW. Variance-constrained local–global modeling for device-free localization under uncertainties.IEEE Trans. Industr. Inform.202320452295240
    [Google Scholar]
  24. ZhangJ. LiY. XiaoW. Integrated multiple kernel learning for device-free localization in cluttered environments using spatiotemporal information.IEEE Internet Things J.2021864749476110.1109/JIOT.2020.3028574
    [Google Scholar]
  25. MirjaliliS. MirjaliliS.M. LewisA. Grey wolf optimizer.Adv. Eng. Softw.201469466110.1016/j.advengsoft.2013.12.007
    [Google Scholar]
  26. Nadimi-ShahrakiM.H. TaghianS. MirjaliliS. An improved grey wolf optimizer for solving engineering problems.Expert Syst. Appl.202116611391710.1016/j.eswa.2020.113917
    [Google Scholar]
  27. KuraniA. DoshiP. VakhariaA. ShahM. A comprehensive comparative study of artificial neural network (ANN) and support vector machines (SVM) on stock forecasting.Annals Data Sci.202310118320810.1007/s40745‑021‑00344‑x
    [Google Scholar]
  28. KhodadadiN. KhodadadiE. Al-TashiQ. El-KenawyE.S.M. AbualigahL. AbdulkadirS.J. AlqushaibiA. MirjaliliS. BAOA: Binary arithmetic optimization algorithm with K-nearest neighbor classifier for feature selection.IEEE Access202311940949411510.1109/ACCESS.2023.3310429
    [Google Scholar]
/content/journals/rascs/10.2174/0126662558341873241016064323
Loading
/content/journals/rascs/10.2174/0126662558341873241016064323
Loading

Data & Media loading...

This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test