Identity-based attack detection using received signal strength in MIMO systems
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sher, Raees Ahmed | - |
dc.contributor.author | Cheema, Ahmad | - |
dc.contributor.author | Wakeel, Abdul | - |
dc.contributor.author | Iqbal, Waseem | - |
dc.contributor.author | Nisar, Shibli | - |
dc.contributor.author | Syed, Ikram | - |
dc.contributor.author | Choi, Jaehyuk | - |
dc.date.accessioned | 2023-09-15T14:40:46Z | - |
dc.date.available | 2023-09-15T14:40:46Z | - |
dc.date.created | 2023-09-15 | - |
dc.date.issued | 2023-08 | - |
dc.identifier.issn | 1434-8411 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/89094 | - |
dc.description.abstract | This paper proposes RSS-based multiple-input multiple-output (MIMO) receiver diversity-combining techniques for identity-based attack detection. The diversity-combining techniques considered for identity-based attack detection using MIMO systems include selection combining (SLC), equal gain combining (EGC), and maximal ratio combining (MRC). First, we exploit the spatial correlation of the RSS hereditary from wireless nodes to detect identity-based attacks. Analytical expressions of the proposed method for the spatial correlation of the RSS hereditary using MIMO-combining diversities are provided and validated through simulation results. Second, we propose unsupervised machine learning (ML) algorithms such as k-means and k-medoids for the detection of identity-based attacks using RSS with different MIMO-combining diversities. Complete statistical derivations for the detection of identity-based attacks using k-means and k-medoids algorithms were performed. The simulation results confirm that the proposed techniques exploiting MIMO diversity-combining techniques for identity-based attack detection using unsupervised ML algorithms outperform the previously proposed techniques in terms of the false positive rate (FPR) and detection rate (DR). Furthermore, the simulation showed that the EGC-combining diversity with k-means and k-medoids outperformed the SLC-and MRC-combining techniques. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER GMBH | - |
dc.relation.isPartOf | AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS | - |
dc.title | Identity-based attack detection using received signal strength in MIMO systems | - |
dc.type | Article | - |
dc.type.rims | ART | - |
dc.description.journalClass | 1 | - |
dc.identifier.wosid | 001053432800001 | - |
dc.identifier.doi | 10.1016/j.aeue.2023.154709 | - |
dc.identifier.bibliographicCitation | AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, v.168 | - |
dc.description.isOpenAccess | N | - |
dc.identifier.scopusid | 2-s2.0-85159776004 | - |
dc.citation.title | AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS | - |
dc.citation.volume | 168 | - |
dc.contributor.affiliatedAuthor | Syed, Ikram | - |
dc.contributor.affiliatedAuthor | Choi, Jaehyuk | - |
dc.type.docType | Article | - |
dc.subject.keywordAuthor | Identity-based spoofing | - |
dc.subject.keywordAuthor | MIMO | - |
dc.subject.keywordAuthor | RSS | - |
dc.subject.keywordAuthor | SLC | - |
dc.subject.keywordAuthor | MRC | - |
dc.subject.keywordAuthor | EGC | - |
dc.subject.keywordAuthor | k-means | - |
dc.subject.keywordAuthor | k-medoids | - |
dc.subject.keywordPlus | SPOOFING DETECTION | - |
dc.subject.keywordPlus | NETWORKS | - |
dc.subject.keywordPlus | SECURITY | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
1342, Seongnam-daero, Sujeong-gu, Seongnam-si, Gyeonggi-do, Republic of Korea(13120)031-750-5114
COPYRIGHT 2020 Gachon University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.