Characterization of IEEE 802.11 Communications and Detection of Low-Power Jamming Attacks in Noncontrolled Environment Based on a Clustering Study

Wireless connections are more and more used in different applications and in public areas for services to consumers but also for handling (sometimes) sensitive communications (for instance, in railway systems or for remote video monitoring systems). Such systems can have to face different kind of at...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE systems journal 2022-03, Vol.16 (1), p.683-692
Hauptverfasser: Villain, Jonathan, Deniau, Virginie, Gransart, Christophe, Fleury, Anthony, Simon, Eric Pierre
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 692
container_issue 1
container_start_page 683
container_title IEEE systems journal
container_volume 16
creator Villain, Jonathan
Deniau, Virginie
Gransart, Christophe
Fleury, Anthony
Simon, Eric Pierre
description Wireless connections are more and more used in different applications and in public areas for services to consumers but also for handling (sometimes) sensitive communications (for instance, in railway systems or for remote video monitoring systems). Such systems can have to face different kind of attacks that target the behind service. Our article aims to detect, as soon as possible and online, attacks that can occur on wireless networks, to be able to react very quickly. In this article, we present some results of data analysis methods, on Wi-Fi signals, to differentiate the ones with attacks from the ones without. This study focuses on low-power jamming attacks with a slight or even no impact on Wi-Fi communications. This is more challenging than detecting high-power jamming attacks, which have already been addressed in the literature. Being able to detect a low-impact attack is a crucial issue in a global security strategy, making it possible to launch countermeasures before the interruption of the communication. The Wi-Fi bands are also in the Industrial, Scientific and Medical (ISM) frequencies, making the environment complicated to analyze. Clustering methods such as agglomerative hierarchical clustering are used to identify some clusters and then to map them to the real classes (with or without attacks). A deep analysis of the clusters obtained in a dataset acquired in uncontrolled conditions is carried out. This is done in order to understand what is responsible of the clustering assignment of the different points and to extract the clusters, which can be used to design a detection attack strategy.
doi_str_mv 10.1109/JSYST.2020.3045365
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_9317778</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9317778</ieee_id><sourcerecordid>2643028126</sourcerecordid><originalsourceid>FETCH-LOGICAL-c373t-4dcd89d78be0889de89987810ffcb5bdf3c90ce4a1577c5ef6758bd992af6d033</originalsourceid><addsrcrecordid>eNo9kc1O3DAUhaOqSKXAC7QbS6y6yNQ_cWwvhzQtoBEgDV10ZXlsp5gmNrUdEH2MPnE9M5TVvbr-zrnWPVX1AcEFQlB8vlz_WN8uMMRwQWBDSUvfVIdIEFYLTJq3ux7XHPHmXfU-pXsIKadMHFZ_uzsVlc42uj8qu-BBGMBF3_eAQ1y8QRemafZO7x4TUN6ALzZb_Z9dhaf6JjzZCC7VNDn_EyxzVvpXAs6Dq-B18DmGcbQG9P7RxeAn6zM4U6lMioUC3Tin7f4iXefZPB9XB4Makz15qUfV96_9bXder66_XXTLVa0JI7lujDZcGMY3FvLSWC4EZxzBYdAbujED0QJq2yhEGdPUDi2jfGOEwGpoDSTkqPq0971To3yIblLxWQbl5PlyJbczSHBbbkkfUWFP9-xDDL9nm7K8D3P05XuyMARijnBbKLyndAwpRTu82iIotznJXU5ym5N8yamIPu5Fzlr7KhAEMcY4-QcNZo-E</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2643028126</pqid></control><display><type>article</type><title>Characterization of IEEE 802.11 Communications and Detection of Low-Power Jamming Attacks in Noncontrolled Environment Based on a Clustering Study</title><source>IEEE Electronic Library (IEL)</source><creator>Villain, Jonathan ; Deniau, Virginie ; Gransart, Christophe ; Fleury, Anthony ; Simon, Eric Pierre</creator><creatorcontrib>Villain, Jonathan ; Deniau, Virginie ; Gransart, Christophe ; Fleury, Anthony ; Simon, Eric Pierre</creatorcontrib><description>Wireless connections are more and more used in different applications and in public areas for services to consumers but also for handling (sometimes) sensitive communications (for instance, in railway systems or for remote video monitoring systems). Such systems can have to face different kind of attacks that target the behind service. Our article aims to detect, as soon as possible and online, attacks that can occur on wireless networks, to be able to react very quickly. In this article, we present some results of data analysis methods, on Wi-Fi signals, to differentiate the ones with attacks from the ones without. This study focuses on low-power jamming attacks with a slight or even no impact on Wi-Fi communications. This is more challenging than detecting high-power jamming attacks, which have already been addressed in the literature. Being able to detect a low-impact attack is a crucial issue in a global security strategy, making it possible to launch countermeasures before the interruption of the communication. The Wi-Fi bands are also in the Industrial, Scientific and Medical (ISM) frequencies, making the environment complicated to analyze. Clustering methods such as agglomerative hierarchical clustering are used to identify some clusters and then to map them to the real classes (with or without attacks). A deep analysis of the clusters obtained in a dataset acquired in uncontrolled conditions is carried out. This is done in order to understand what is responsible of the clustering assignment of the different points and to extract the clusters, which can be used to design a detection attack strategy.</description><identifier>ISSN: 1932-8184</identifier><identifier>ISSN: 1937-9234</identifier><identifier>EISSN: 1937-9234</identifier><identifier>EISSN: 1932-8184</identifier><identifier>DOI: 10.1109/JSYST.2020.3045365</identifier><identifier>CODEN: ISJEB2</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Classification ; Classification algorithms ; Cluster analysis ; Clustering ; communication network journal ; Data analysis ; Engineering Sciences ; Frequency measurement ; IEEE 802.11n ; intentional electromagnetic (EM) interference ; intentional electromagnetic interference (IEMI) ; Interference ; Jamming ; Monitoring ; Railways ; Remote monitoring ; Signal and Image processing ; Support vector machines ; Wi-Fi ; Wireless fidelity ; Wireless networks ; WLAN</subject><ispartof>IEEE systems journal, 2022-03, Vol.16 (1), p.683-692</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022</rights><rights>Distributed under a Creative Commons Attribution 4.0 International License</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c373t-4dcd89d78be0889de89987810ffcb5bdf3c90ce4a1577c5ef6758bd992af6d033</citedby><cites>FETCH-LOGICAL-c373t-4dcd89d78be0889de89987810ffcb5bdf3c90ce4a1577c5ef6758bd992af6d033</cites><orcidid>0000-0002-4430-3121 ; 0000-0002-0175-3181 ; 0000-0002-6833-7588 ; 0000-0002-8802-911X ; 0000-0003-4781-8654</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9317778$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>230,314,776,780,792,881,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9317778$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttps://hal.science/hal-03264535$$DView record in HAL$$Hfree_for_read</backlink></links><search><creatorcontrib>Villain, Jonathan</creatorcontrib><creatorcontrib>Deniau, Virginie</creatorcontrib><creatorcontrib>Gransart, Christophe</creatorcontrib><creatorcontrib>Fleury, Anthony</creatorcontrib><creatorcontrib>Simon, Eric Pierre</creatorcontrib><title>Characterization of IEEE 802.11 Communications and Detection of Low-Power Jamming Attacks in Noncontrolled Environment Based on a Clustering Study</title><title>IEEE systems journal</title><addtitle>JSYST</addtitle><description>Wireless connections are more and more used in different applications and in public areas for services to consumers but also for handling (sometimes) sensitive communications (for instance, in railway systems or for remote video monitoring systems). Such systems can have to face different kind of attacks that target the behind service. Our article aims to detect, as soon as possible and online, attacks that can occur on wireless networks, to be able to react very quickly. In this article, we present some results of data analysis methods, on Wi-Fi signals, to differentiate the ones with attacks from the ones without. This study focuses on low-power jamming attacks with a slight or even no impact on Wi-Fi communications. This is more challenging than detecting high-power jamming attacks, which have already been addressed in the literature. Being able to detect a low-impact attack is a crucial issue in a global security strategy, making it possible to launch countermeasures before the interruption of the communication. The Wi-Fi bands are also in the Industrial, Scientific and Medical (ISM) frequencies, making the environment complicated to analyze. Clustering methods such as agglomerative hierarchical clustering are used to identify some clusters and then to map them to the real classes (with or without attacks). A deep analysis of the clusters obtained in a dataset acquired in uncontrolled conditions is carried out. This is done in order to understand what is responsible of the clustering assignment of the different points and to extract the clusters, which can be used to design a detection attack strategy.</description><subject>Classification</subject><subject>Classification algorithms</subject><subject>Cluster analysis</subject><subject>Clustering</subject><subject>communication network journal</subject><subject>Data analysis</subject><subject>Engineering Sciences</subject><subject>Frequency measurement</subject><subject>IEEE 802.11n</subject><subject>intentional electromagnetic (EM) interference</subject><subject>intentional electromagnetic interference (IEMI)</subject><subject>Interference</subject><subject>Jamming</subject><subject>Monitoring</subject><subject>Railways</subject><subject>Remote monitoring</subject><subject>Signal and Image processing</subject><subject>Support vector machines</subject><subject>Wi-Fi</subject><subject>Wireless fidelity</subject><subject>Wireless networks</subject><subject>WLAN</subject><issn>1932-8184</issn><issn>1937-9234</issn><issn>1937-9234</issn><issn>1932-8184</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kc1O3DAUhaOqSKXAC7QbS6y6yNQ_cWwvhzQtoBEgDV10ZXlsp5gmNrUdEH2MPnE9M5TVvbr-zrnWPVX1AcEFQlB8vlz_WN8uMMRwQWBDSUvfVIdIEFYLTJq3ux7XHPHmXfU-pXsIKadMHFZ_uzsVlc42uj8qu-BBGMBF3_eAQ1y8QRemafZO7x4TUN6ALzZb_Z9dhaf6JjzZCC7VNDn_EyxzVvpXAs6Dq-B18DmGcbQG9P7RxeAn6zM4U6lMioUC3Tin7f4iXefZPB9XB4Makz15qUfV96_9bXder66_XXTLVa0JI7lujDZcGMY3FvLSWC4EZxzBYdAbujED0QJq2yhEGdPUDi2jfGOEwGpoDSTkqPq0971To3yIblLxWQbl5PlyJbczSHBbbkkfUWFP9-xDDL9nm7K8D3P05XuyMARijnBbKLyndAwpRTu82iIotznJXU5ym5N8yamIPu5Fzlr7KhAEMcY4-QcNZo-E</recordid><startdate>202203</startdate><enddate>202203</enddate><creator>Villain, Jonathan</creator><creator>Deniau, Virginie</creator><creator>Gransart, Christophe</creator><creator>Fleury, Anthony</creator><creator>Simon, Eric Pierre</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>1XC</scope><scope>VOOES</scope><orcidid>https://orcid.org/0000-0002-4430-3121</orcidid><orcidid>https://orcid.org/0000-0002-0175-3181</orcidid><orcidid>https://orcid.org/0000-0002-6833-7588</orcidid><orcidid>https://orcid.org/0000-0002-8802-911X</orcidid><orcidid>https://orcid.org/0000-0003-4781-8654</orcidid></search><sort><creationdate>202203</creationdate><title>Characterization of IEEE 802.11 Communications and Detection of Low-Power Jamming Attacks in Noncontrolled Environment Based on a Clustering Study</title><author>Villain, Jonathan ; Deniau, Virginie ; Gransart, Christophe ; Fleury, Anthony ; Simon, Eric Pierre</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c373t-4dcd89d78be0889de89987810ffcb5bdf3c90ce4a1577c5ef6758bd992af6d033</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Classification</topic><topic>Classification algorithms</topic><topic>Cluster analysis</topic><topic>Clustering</topic><topic>communication network journal</topic><topic>Data analysis</topic><topic>Engineering Sciences</topic><topic>Frequency measurement</topic><topic>IEEE 802.11n</topic><topic>intentional electromagnetic (EM) interference</topic><topic>intentional electromagnetic interference (IEMI)</topic><topic>Interference</topic><topic>Jamming</topic><topic>Monitoring</topic><topic>Railways</topic><topic>Remote monitoring</topic><topic>Signal and Image processing</topic><topic>Support vector machines</topic><topic>Wi-Fi</topic><topic>Wireless fidelity</topic><topic>Wireless networks</topic><topic>WLAN</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Villain, Jonathan</creatorcontrib><creatorcontrib>Deniau, Virginie</creatorcontrib><creatorcontrib>Gransart, Christophe</creatorcontrib><creatorcontrib>Fleury, Anthony</creatorcontrib><creatorcontrib>Simon, Eric Pierre</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Hyper Article en Ligne (HAL)</collection><collection>Hyper Article en Ligne (HAL) (Open Access)</collection><jtitle>IEEE systems journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Villain, Jonathan</au><au>Deniau, Virginie</au><au>Gransart, Christophe</au><au>Fleury, Anthony</au><au>Simon, Eric Pierre</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Characterization of IEEE 802.11 Communications and Detection of Low-Power Jamming Attacks in Noncontrolled Environment Based on a Clustering Study</atitle><jtitle>IEEE systems journal</jtitle><stitle>JSYST</stitle><date>2022-03</date><risdate>2022</risdate><volume>16</volume><issue>1</issue><spage>683</spage><epage>692</epage><pages>683-692</pages><issn>1932-8184</issn><issn>1937-9234</issn><eissn>1937-9234</eissn><eissn>1932-8184</eissn><coden>ISJEB2</coden><abstract>Wireless connections are more and more used in different applications and in public areas for services to consumers but also for handling (sometimes) sensitive communications (for instance, in railway systems or for remote video monitoring systems). Such systems can have to face different kind of attacks that target the behind service. Our article aims to detect, as soon as possible and online, attacks that can occur on wireless networks, to be able to react very quickly. In this article, we present some results of data analysis methods, on Wi-Fi signals, to differentiate the ones with attacks from the ones without. This study focuses on low-power jamming attacks with a slight or even no impact on Wi-Fi communications. This is more challenging than detecting high-power jamming attacks, which have already been addressed in the literature. Being able to detect a low-impact attack is a crucial issue in a global security strategy, making it possible to launch countermeasures before the interruption of the communication. The Wi-Fi bands are also in the Industrial, Scientific and Medical (ISM) frequencies, making the environment complicated to analyze. Clustering methods such as agglomerative hierarchical clustering are used to identify some clusters and then to map them to the real classes (with or without attacks). A deep analysis of the clusters obtained in a dataset acquired in uncontrolled conditions is carried out. This is done in order to understand what is responsible of the clustering assignment of the different points and to extract the clusters, which can be used to design a detection attack strategy.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/JSYST.2020.3045365</doi><tpages>10</tpages><orcidid>https://orcid.org/0000-0002-4430-3121</orcidid><orcidid>https://orcid.org/0000-0002-0175-3181</orcidid><orcidid>https://orcid.org/0000-0002-6833-7588</orcidid><orcidid>https://orcid.org/0000-0002-8802-911X</orcidid><orcidid>https://orcid.org/0000-0003-4781-8654</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1932-8184
ispartof IEEE systems journal, 2022-03, Vol.16 (1), p.683-692
issn 1932-8184
1937-9234
1937-9234
1932-8184
language eng
recordid cdi_ieee_primary_9317778
source IEEE Electronic Library (IEL)
subjects Classification
Classification algorithms
Cluster analysis
Clustering
communication network journal
Data analysis
Engineering Sciences
Frequency measurement
IEEE 802.11n
intentional electromagnetic (EM) interference
intentional electromagnetic interference (IEMI)
Interference
Jamming
Monitoring
Railways
Remote monitoring
Signal and Image processing
Support vector machines
Wi-Fi
Wireless fidelity
Wireless networks
WLAN
title Characterization of IEEE 802.11 Communications and Detection of Low-Power Jamming Attacks in Noncontrolled Environment Based on a Clustering Study
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-11T02%3A50%3A37IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Characterization%20of%20IEEE%20802.11%20Communications%20and%20Detection%20of%20Low-Power%20Jamming%20Attacks%20in%20Noncontrolled%20Environment%20Based%20on%20a%20Clustering%20Study&rft.jtitle=IEEE%20systems%20journal&rft.au=Villain,%20Jonathan&rft.date=2022-03&rft.volume=16&rft.issue=1&rft.spage=683&rft.epage=692&rft.pages=683-692&rft.issn=1932-8184&rft.eissn=1937-9234&rft.coden=ISJEB2&rft_id=info:doi/10.1109/JSYST.2020.3045365&rft_dat=%3Cproquest_RIE%3E2643028126%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2643028126&rft_id=info:pmid/&rft_ieee_id=9317778&rfr_iscdi=true