Detecting Interference in Wireless Sensor Network Received Samples: A Machine Learning Approach

Wireless Sensor Network (WSN) technology has developed substantially over the past decade or so and now numerous solutions exist across a diverse range of innovative applications. The expanding Internet of Things (IoT) sector is becoming an ever more important aspect of modern technology and a key m...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:2020 IEEE 6th World Forum on Internet of Things (WF-IoT) s. 1 - 6
Hlavní autori: O'Mahony, George D., Harris, Philip J., Murphy, Colin C.
Médium: Konferenčný príspevok..
Jazyk:English
Vydavateľské údaje: IEEE 01.06.2020
Predmet:
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract Wireless Sensor Network (WSN) technology has developed substantially over the past decade or so and now numerous solutions exist across a diverse range of innovative applications. The expanding Internet of Things (IoT) sector is becoming an ever more important aspect of modern technology and a key motivator for improving security and privacy in WSNs. Typically, WSN protocols form an integral part of the overall IoT infrastructure by enabling the sensor to access point communication links. These wireless links inherently encompass security challenges, frequently due to external interference and intrusions. As IoT applications incorporate WSNs in their architecture, the incentive to attack and compromise these WSNs escalates. Often, commercial off the shelf devices and standardized open-access protocols combine to achieve specific WSN deployments. Numerous WSN vulnerabilities exist, whilst attack approaches are abundant and change frequently. Thus, to ensure acceptable performance, safety and privacy in many IoT applications, the adopted WSN must be secure. This paper discusses IoT security and privacy, by evaluating a machine learning approach for interference detection focused entirely on analyzing received In-phase (I) and Quadrature-phase (Q) samples. Significantly, once an intrusion is detected, mitigation strategies can be implemented, thus emphasizing the requirement for interference detection. Random Forest is chosen as the machine learning classifier as it consists of a large number of individual decision trees operating as an ensemble. An intrusion detection system (IDS) is developed based on Matlab simulated ZigBee data as an initial insight into whether a real wireless data approach may be viable.
AbstractList Wireless Sensor Network (WSN) technology has developed substantially over the past decade or so and now numerous solutions exist across a diverse range of innovative applications. The expanding Internet of Things (IoT) sector is becoming an ever more important aspect of modern technology and a key motivator for improving security and privacy in WSNs. Typically, WSN protocols form an integral part of the overall IoT infrastructure by enabling the sensor to access point communication links. These wireless links inherently encompass security challenges, frequently due to external interference and intrusions. As IoT applications incorporate WSNs in their architecture, the incentive to attack and compromise these WSNs escalates. Often, commercial off the shelf devices and standardized open-access protocols combine to achieve specific WSN deployments. Numerous WSN vulnerabilities exist, whilst attack approaches are abundant and change frequently. Thus, to ensure acceptable performance, safety and privacy in many IoT applications, the adopted WSN must be secure. This paper discusses IoT security and privacy, by evaluating a machine learning approach for interference detection focused entirely on analyzing received In-phase (I) and Quadrature-phase (Q) samples. Significantly, once an intrusion is detected, mitigation strategies can be implemented, thus emphasizing the requirement for interference detection. Random Forest is chosen as the machine learning classifier as it consists of a large number of individual decision trees operating as an ensemble. An intrusion detection system (IDS) is developed based on Matlab simulated ZigBee data as an initial insight into whether a real wireless data approach may be viable.
Author Harris, Philip J.
O'Mahony, George D.
Murphy, Colin C.
Author_xml – sequence: 1
  givenname: George D.
  surname: O'Mahony
  fullname: O'Mahony, George D.
  organization: University College Cork,Dept. of Electrical and Electronic Engineering,Cork,Ireland
– sequence: 2
  givenname: Philip J.
  surname: Harris
  fullname: Harris, Philip J.
  organization: Center Ireland (UTRC-I),United Technologies Research,Cork,Ireland
– sequence: 3
  givenname: Colin C.
  surname: Murphy
  fullname: Murphy, Colin C.
  organization: University College Cork,Dept. of Electrical and Electronic Engineering,Cork,Ireland
BookMark eNotj99KwzAcRiPohZs-gTd5gdYkv_5JvSvT6aAquMkuS0y_aHBLS1oU396Ju_rgcDjwzdhp6AMY41KkUorqertMVv0m05JEqoQSaaWUJFInbCZLpWWeCyrPWXuLCXby4Z2vwoToEBEsuA986yN2GEe-Rhj7yJ8wfffxk7_Awn-h42uzHw7CDa_5o7EfPoA3MDH8xephiP0BXrAzZ3YjLo87Z6_Lu83iIWme71eLukm8ymlKJEFXRNaWZWVVJ4zKnatkZmCyt87awhWg3FKmnIB1RhutVVkUsEpkVUY0Z1f_XQ-gHaLfm_jTHj_TL740Uuw
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/WF-IoT48130.2020.9221332
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1728155037
9781728155036
EndPage 6
ExternalDocumentID 9221332
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i253t-13e8933cc779c2d0a25ff914aea4bdcc6f6e35c342f0ecfa8a882766ec2049433
IEDL.DBID RIE
ISICitedReferencesCount 15
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000627822200107&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
IngestDate Thu Jun 29 18:37:47 EDT 2023
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i253t-13e8933cc779c2d0a25ff914aea4bdcc6f6e35c342f0ecfa8a882766ec2049433
OpenAccessLink https://cora.ucc.ie/bitstreams/3bb8a642-b8e8-4333-8389-34d925ceca4f/download
PageCount 6
ParticipantIDs ieee_primary_9221332
PublicationCentury 2000
PublicationDate 2020-June
PublicationDateYYYYMMDD 2020-06-01
PublicationDate_xml – month: 06
  year: 2020
  text: 2020-June
PublicationDecade 2020
PublicationTitle 2020 IEEE 6th World Forum on Internet of Things (WF-IoT)
PublicationTitleAbbrev WF-IoT
PublicationYear 2020
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.8464369
Snippet Wireless Sensor Network (WSN) technology has developed substantially over the past decade or so and now numerous solutions exist across a diverse range of...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms IEEE802.15.4
Interference
Internet of Things
Intrusion
IoT
Machine Learning
Privacy
Protocols
Random Forest
Security
Wireless communication
Wireless sensor networks
WSN and ZigBee
Zigbee
Title Detecting Interference in Wireless Sensor Network Received Samples: A Machine Learning Approach
URI https://ieeexplore.ieee.org/document/9221332
WOSCitedRecordID wos000627822200107&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEA61ePCk0opvcvDotts8Nom3ohY9WAqt2FvJYyIF2ZVt6-832d1WBC_ewhAYmMC88s03CN1oy5xyUiciji0zTllijEoTbgyxQloHQlfLJsR4LOdzNWmh290sDABU4DPoxWP1l-8Ku4mtsr4iJJRUweHuCZHVs1pbcE6q-m-j5LmYMRm8cqj7SNprrv_am1KFjdHh_xQeoe7P_B2e7CLLMWpB3kGLB4gN_yDAVRtve3GZ4whh_QguC09DUVqUeFxju3HICSF4M4enOpIAr-7wEL9U6EnADbHqOx42rOJd9Dp6nN0_Jc16hGRJOI1L5CEkG9RaIZQlLtWEe68GTINmxlmb-Qwot5QRn4L1WuqQTYssA0siKQylJ6idFzmcIgzGSm685pxqpqyXfmAYCCFd0JQadoY60TiLz5oBY9HY5fxv8QU6iPavAVWXqL0uN3CF9u3Xerkqr6tn-waYlJww
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEA6lCnpSacW3OXh0220em423opYW26XQir2VPGalILvSh7_fZHdbEbx4CyEhMAPzyjffIHSnDLPSxioQvm2ZccoCrWUYcK2JEbGxIFQxbEIkSTybyXEN3e96YQCgAJ9Byy-Lv3ybm40vlbUlIS6lcgZ3jzNGwrJbawvPCWX7rRcM8imLnV12mR8JW9WFX5NTCsfRO_rfk8eo-dOBh8c733KCapA10PwJfMnfbeCikLc9uMiwB7F-OKOFJy4tzZc4KdHd2EWF4OyZxRPlaYBXD7iLRwV-EnBFrfqOuxWveBO99p6nj_2gGpAQLAinfow8uHCDGiOENMSGivA0lR2mQDFtjYnSCCg3lJE0BJOqWLl4WkQRGOJpYSg9RfUsz-AMYdAm5jpVnFPFpEnjtKMZCBFb91Ko2TlqeOHMP0sOjHkll4u_t2_RQX86Gs6Hg-TlEh16XZTwqitUXy83cI32zdd6sVreFCr8BuW3n3c
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2020+IEEE+6th+World+Forum+on+Internet+of+Things+%28WF-IoT%29&rft.atitle=Detecting+Interference+in+Wireless+Sensor+Network+Received+Samples%3A+A+Machine+Learning+Approach&rft.au=O%27Mahony%2C+George+D.&rft.au=Harris%2C+Philip+J.&rft.au=Murphy%2C+Colin+C.&rft.date=2020-06-01&rft.pub=IEEE&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FWF-IoT48130.2020.9221332&rft.externalDocID=9221332