Paper
28 April 2010 Passive intrusion detection in wireless networks by exploiting clustering-based learning
Jie Yang, Yingying Chen, Sachi Desai, Shafik Quoraishee
Author Affiliations +
Abstract
The large-scale wireless sensing data collected from wireless networks can be used for detecting intruders (e.g., enemies in tactical fields), and further facilitating real-time situation awareness in Army's networkcentric warfare applications such as intrusion detection, battlefield protection and emergency evacuation. In this work, we focus on exploiting Received Signal Strength (RSS) obtained from the existing wireless infrastructures for performing intrusion detection when the intruders or objects do not carry any radio devices. This is also known as passive intrusion detection. Passive intrusion detection based on the RSS data is an attractive approach as it reuses the existing wireless environmental data without requiring a specialized infrastructure. We propose a clustering-based learning mechanism for passive intrusion detection in wireless networks. Specifically, our detection scheme utilizes the clustering method to analyze the changes of RSS, caused by intrusions, at multiple devices to diagnose the presence of intrusions collaboratively. Our experimental results using an IEEE 802.15.4 (Zigbee) network in a real office environment show that our clustering-based learning can effectively detect the presence of intrusions.
© (2010) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Jie Yang, Yingying Chen, Sachi Desai, and Shafik Quoraishee "Passive intrusion detection in wireless networks by exploiting clustering-based learning", Proc. SPIE 7706, Wireless Sensing, Localization, and Processing V, 770604 (28 April 2010); https://doi.org/10.1117/12.852676
Lens.org Logo
CITATIONS
Cited by 1 scholarly publication.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Received signal strength

Computer intrusion detection

Environmental sensing

Digital filtering

Statistical analysis

Transmitters

Receivers

RELATED CONTENT

Detection in networked radar
Proceedings of SPIE (May 23 2013)
Comparison of VLC-based indoor positioning techniques
Proceedings of SPIE (February 04 2013)
Aspects of reliable ultrasonic sensor system design
Proceedings of SPIE (January 02 1998)

Back to Top