Skip to main content
Top

2019 | OriginalPaper | Chapter

Integrated Redundant APs Reduction and Transfer Learning for Indoor WLAN Intrusion Detection via Link-Layer Data Transformation

Authors : Xinyue Li, Mu Zhou, Yaoping Li, Hui Yuan, Zengshan Tian

Published in: Wireless Sensor Networks

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Indoor intrusion detection technology has been widely used in smart home management, public safety, disaster relief, and other fields. In recent years, with the rapid deployment of Wireless Local Area Network (WLAN) and general support of the IEEE 802.11 protocol by mobile devices, indoor intrusion detection can be realized conveniently. Most of the existing indoor intrusion detection algorithms have large computational and storage overheads and do not consider the instability of signals in the indoor environment. In response to this compelling problem, this paper proposes a new integrated redundant Access Points (APs) reduction and transfer learning for indoor WLAN intrusion detection via link-layer data transformation. First, the detection technology for mobile APs based on a fuzzy rough set is exploited to filter the redundant APs in the indoor environment. Second, the target domain and the source domain are constructed through the link-layer data of the online phase and the offline phase. Then, the Maximum Mean Deviation (MMD) minimum value corresponding to the two domains is worked out by the mathematical statistics method to obtain the optimized migration matrix, and the link-layer information of the two domains is transferred into the same subspace by using the matrix. Finally, the optimal intrusion detection classifiers are obtained by training the transferred link-layer data. This method not only has better robustness in the complex indoor environment but also reduces time and labor costs.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Moreau, J., Ambellouis, S., Ruichek, Y.: Fisheye-based method for GPS localization improvement in unknown semi-obstructed areas. Sensors 17(1), 119 (2017)CrossRef Moreau, J., Ambellouis, S., Ruichek, Y.: Fisheye-based method for GPS localization improvement in unknown semi-obstructed areas. Sensors 17(1), 119 (2017)CrossRef
2.
go back to reference Nam, J.Y., Rao, K.R.: Image coding using a classified DCT/VQ based on two-channel conjugate vector quantization. IEEE Trans. Circuits Syst. Video Technol. 1(4), 325–336 (2015)CrossRef Nam, J.Y., Rao, K.R.: Image coding using a classified DCT/VQ based on two-channel conjugate vector quantization. IEEE Trans. Circuits Syst. Video Technol. 1(4), 325–336 (2015)CrossRef
3.
go back to reference Yi, L., Zhao, H., Yue, H., et al.: Integration of vision and topological self-localization for intelligent vehicles. Mechatronics 51, 46–58 (2018)CrossRef Yi, L., Zhao, H., Yue, H., et al.: Integration of vision and topological self-localization for intelligent vehicles. Mechatronics 51, 46–58 (2018)CrossRef
4.
go back to reference Cichon, D., Psiuk, R., Brauer, H., et al.: A hall-sensor-based localization method with six degrees of freedom using unscented Kalman filter. IEEE Sens. J. 99, 1 (2019) Cichon, D., Psiuk, R., Brauer, H., et al.: A hall-sensor-based localization method with six degrees of freedom using unscented Kalman filter. IEEE Sens. J. 99, 1 (2019)
5.
go back to reference Fan, J., Awan, A.S.: Non-line-of-sight identification based on unsupervised machine learning in ultra wideband systems. IEEE Access 7(99), 1 (2019) Fan, J., Awan, A.S.: Non-line-of-sight identification based on unsupervised machine learning in ultra wideband systems. IEEE Access 7(99), 1 (2019)
6.
go back to reference Musavi, S.A., Hashemi, M.R.: HPCgnature: a hardware-based application-level intrusion detection system. IET Inf. Secur. 13(1), 19–26 (2019)CrossRef Musavi, S.A., Hashemi, M.R.: HPCgnature: a hardware-based application-level intrusion detection system. IET Inf. Secur. 13(1), 19–26 (2019)CrossRef
7.
go back to reference Beaubouef, T., Petry, F.E.: Fuzzy rough set techniques for uncertainty processing in a relational database. Int. J. Intell. Syst. 15(5), 389–424 (2000)CrossRef Beaubouef, T., Petry, F.E.: Fuzzy rough set techniques for uncertainty processing in a relational database. Int. J. Intell. Syst. 15(5), 389–424 (2000)CrossRef
8.
go back to reference Tian, W., Qun, L., Bucci, D.J., et al.: K-medoids clustering of data sequences with composite distributions. IEEE Trans. Signal Process. 67(8), 2093–2106 (2019)MathSciNetCrossRef Tian, W., Qun, L., Bucci, D.J., et al.: K-medoids clustering of data sequences with composite distributions. IEEE Trans. Signal Process. 67(8), 2093–2106 (2019)MathSciNetCrossRef
9.
go back to reference Yi, Z.: Optimized detection algorithm of complex intrusion interference signal in mobile wireless network. J. Discrete Math. Sci. Crypt. 21(3), 771–779 (2018)MathSciNet Yi, Z.: Optimized detection algorithm of complex intrusion interference signal in mobile wireless network. J. Discrete Math. Sci. Crypt. 21(3), 771–779 (2018)MathSciNet
10.
go back to reference Dey, S., Hossain, A.: Session-key establishment and authentication in a smart home network using public key cryptography. IEEE Sensors Lett. 3(4), 1–4 (2019)CrossRef Dey, S., Hossain, A.: Session-key establishment and authentication in a smart home network using public key cryptography. IEEE Sensors Lett. 3(4), 1–4 (2019)CrossRef
11.
go back to reference Qi, W., Yi, Z., Jing, G.: Target positioning algorithm based on WSN in perimeter intrusion detection. Comput. Eng. 39(9), 39–44 (2013) Qi, W., Yi, Z., Jing, G.: Target positioning algorithm based on WSN in perimeter intrusion detection. Comput. Eng. 39(9), 39–44 (2013)
12.
go back to reference Singh, R., Kumar, H., Singla, R.K., et al.: Internet attacks and intrusion detection system. Online Inf. Rev. 41(2), 171–184 (2017)CrossRef Singh, R., Kumar, H., Singla, R.K., et al.: Internet attacks and intrusion detection system. Online Inf. Rev. 41(2), 171–184 (2017)CrossRef
13.
go back to reference Shang, Z., Da, C., Qiao, X., et al.: Optimizing the Gaussian kernel function with the formulated kernel target alignment criterion for two-class pattern classification. Pattern Recogn. 46(7), 2045–2054 (2013)CrossRef Shang, Z., Da, C., Qiao, X., et al.: Optimizing the Gaussian kernel function with the formulated kernel target alignment criterion for two-class pattern classification. Pattern Recogn. 46(7), 2045–2054 (2013)CrossRef
14.
go back to reference Kosba, A.E., Saeed, A., Youssef, M.: RASID: a robust WLAN device-free passive motion detection system. In: IEEE International Conference on Pervasive Computing and Communications, pp. 180–189, March 2012 Kosba, A.E., Saeed, A., Youssef, M.: RASID: a robust WLAN device-free passive motion detection system. In: IEEE International Conference on Pervasive Computing and Communications, pp. 180–189, March 2012
15.
go back to reference Fattah, M.A., Ren, F.: GA, MR, FFNN, PNN and GMM based models for automatic text summarization. Comput. Speech Lang. 23(1), 126–144 (2009)CrossRef Fattah, M.A., Ren, F.: GA, MR, FFNN, PNN and GMM based models for automatic text summarization. Comput. Speech Lang. 23(1), 126–144 (2009)CrossRef
16.
go back to reference Mandic, D.P., Chambers, J.A.: Toward an optimal PRNN-based nonlinear predictor. IEEE Trans. Neural Netw. 10(6), 1435–1442 (1999)CrossRef Mandic, D.P., Chambers, J.A.: Toward an optimal PRNN-based nonlinear predictor. IEEE Trans. Neural Netw. 10(6), 1435–1442 (1999)CrossRef
Metadata
Title
Integrated Redundant APs Reduction and Transfer Learning for Indoor WLAN Intrusion Detection via Link-Layer Data Transformation
Authors
Xinyue Li
Mu Zhou
Yaoping Li
Hui Yuan
Zengshan Tian
Copyright Year
2019
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-1785-3_19

Premium Partner