Skip to main content

2019 | OriginalPaper | Buchkapitel

Integrated Redundant APs Reduction and Transfer Learning for Indoor WLAN Intrusion Detection via Link-Layer Data Transformation

verfasst von : Xinyue Li, Mu Zhou, Yaoping Li, Hui Yuan, Zengshan Tian

Erschienen in: Wireless Sensor Networks

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Indoor intrusion detection technology has been widely used in smart home management, public safety, disaster relief, and other fields. In recent years, with the rapid deployment of Wireless Local Area Network (WLAN) and general support of the IEEE 802.11 protocol by mobile devices, indoor intrusion detection can be realized conveniently. Most of the existing indoor intrusion detection algorithms have large computational and storage overheads and do not consider the instability of signals in the indoor environment. In response to this compelling problem, this paper proposes a new integrated redundant Access Points (APs) reduction and transfer learning for indoor WLAN intrusion detection via link-layer data transformation. First, the detection technology for mobile APs based on a fuzzy rough set is exploited to filter the redundant APs in the indoor environment. Second, the target domain and the source domain are constructed through the link-layer data of the online phase and the offline phase. Then, the Maximum Mean Deviation (MMD) minimum value corresponding to the two domains is worked out by the mathematical statistics method to obtain the optimized migration matrix, and the link-layer information of the two domains is transferred into the same subspace by using the matrix. Finally, the optimal intrusion detection classifiers are obtained by training the transferred link-layer data. This method not only has better robustness in the complex indoor environment but also reduces time and labor costs.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Moreau, J., Ambellouis, S., Ruichek, Y.: Fisheye-based method for GPS localization improvement in unknown semi-obstructed areas. Sensors 17(1), 119 (2017)CrossRef Moreau, J., Ambellouis, S., Ruichek, Y.: Fisheye-based method for GPS localization improvement in unknown semi-obstructed areas. Sensors 17(1), 119 (2017)CrossRef
2.
Zurück zum Zitat Nam, J.Y., Rao, K.R.: Image coding using a classified DCT/VQ based on two-channel conjugate vector quantization. IEEE Trans. Circuits Syst. Video Technol. 1(4), 325–336 (2015)CrossRef Nam, J.Y., Rao, K.R.: Image coding using a classified DCT/VQ based on two-channel conjugate vector quantization. IEEE Trans. Circuits Syst. Video Technol. 1(4), 325–336 (2015)CrossRef
3.
Zurück zum Zitat Yi, L., Zhao, H., Yue, H., et al.: Integration of vision and topological self-localization for intelligent vehicles. Mechatronics 51, 46–58 (2018)CrossRef Yi, L., Zhao, H., Yue, H., et al.: Integration of vision and topological self-localization for intelligent vehicles. Mechatronics 51, 46–58 (2018)CrossRef
4.
Zurück zum Zitat Cichon, D., Psiuk, R., Brauer, H., et al.: A hall-sensor-based localization method with six degrees of freedom using unscented Kalman filter. IEEE Sens. J. 99, 1 (2019) Cichon, D., Psiuk, R., Brauer, H., et al.: A hall-sensor-based localization method with six degrees of freedom using unscented Kalman filter. IEEE Sens. J. 99, 1 (2019)
5.
Zurück zum Zitat Fan, J., Awan, A.S.: Non-line-of-sight identification based on unsupervised machine learning in ultra wideband systems. IEEE Access 7(99), 1 (2019) Fan, J., Awan, A.S.: Non-line-of-sight identification based on unsupervised machine learning in ultra wideband systems. IEEE Access 7(99), 1 (2019)
6.
Zurück zum Zitat Musavi, S.A., Hashemi, M.R.: HPCgnature: a hardware-based application-level intrusion detection system. IET Inf. Secur. 13(1), 19–26 (2019)CrossRef Musavi, S.A., Hashemi, M.R.: HPCgnature: a hardware-based application-level intrusion detection system. IET Inf. Secur. 13(1), 19–26 (2019)CrossRef
7.
Zurück zum Zitat Beaubouef, T., Petry, F.E.: Fuzzy rough set techniques for uncertainty processing in a relational database. Int. J. Intell. Syst. 15(5), 389–424 (2000)CrossRef Beaubouef, T., Petry, F.E.: Fuzzy rough set techniques for uncertainty processing in a relational database. Int. J. Intell. Syst. 15(5), 389–424 (2000)CrossRef
8.
Zurück zum Zitat Tian, W., Qun, L., Bucci, D.J., et al.: K-medoids clustering of data sequences with composite distributions. IEEE Trans. Signal Process. 67(8), 2093–2106 (2019)MathSciNetCrossRef Tian, W., Qun, L., Bucci, D.J., et al.: K-medoids clustering of data sequences with composite distributions. IEEE Trans. Signal Process. 67(8), 2093–2106 (2019)MathSciNetCrossRef
9.
Zurück zum Zitat Yi, Z.: Optimized detection algorithm of complex intrusion interference signal in mobile wireless network. J. Discrete Math. Sci. Crypt. 21(3), 771–779 (2018)MathSciNet Yi, Z.: Optimized detection algorithm of complex intrusion interference signal in mobile wireless network. J. Discrete Math. Sci. Crypt. 21(3), 771–779 (2018)MathSciNet
10.
Zurück zum Zitat Dey, S., Hossain, A.: Session-key establishment and authentication in a smart home network using public key cryptography. IEEE Sensors Lett. 3(4), 1–4 (2019)CrossRef Dey, S., Hossain, A.: Session-key establishment and authentication in a smart home network using public key cryptography. IEEE Sensors Lett. 3(4), 1–4 (2019)CrossRef
11.
Zurück zum Zitat Qi, W., Yi, Z., Jing, G.: Target positioning algorithm based on WSN in perimeter intrusion detection. Comput. Eng. 39(9), 39–44 (2013) Qi, W., Yi, Z., Jing, G.: Target positioning algorithm based on WSN in perimeter intrusion detection. Comput. Eng. 39(9), 39–44 (2013)
12.
Zurück zum Zitat Singh, R., Kumar, H., Singla, R.K., et al.: Internet attacks and intrusion detection system. Online Inf. Rev. 41(2), 171–184 (2017)CrossRef Singh, R., Kumar, H., Singla, R.K., et al.: Internet attacks and intrusion detection system. Online Inf. Rev. 41(2), 171–184 (2017)CrossRef
13.
Zurück zum Zitat Shang, Z., Da, C., Qiao, X., et al.: Optimizing the Gaussian kernel function with the formulated kernel target alignment criterion for two-class pattern classification. Pattern Recogn. 46(7), 2045–2054 (2013)CrossRef Shang, Z., Da, C., Qiao, X., et al.: Optimizing the Gaussian kernel function with the formulated kernel target alignment criterion for two-class pattern classification. Pattern Recogn. 46(7), 2045–2054 (2013)CrossRef
14.
Zurück zum Zitat Kosba, A.E., Saeed, A., Youssef, M.: RASID: a robust WLAN device-free passive motion detection system. In: IEEE International Conference on Pervasive Computing and Communications, pp. 180–189, March 2012 Kosba, A.E., Saeed, A., Youssef, M.: RASID: a robust WLAN device-free passive motion detection system. In: IEEE International Conference on Pervasive Computing and Communications, pp. 180–189, March 2012
15.
Zurück zum Zitat Fattah, M.A., Ren, F.: GA, MR, FFNN, PNN and GMM based models for automatic text summarization. Comput. Speech Lang. 23(1), 126–144 (2009)CrossRef Fattah, M.A., Ren, F.: GA, MR, FFNN, PNN and GMM based models for automatic text summarization. Comput. Speech Lang. 23(1), 126–144 (2009)CrossRef
16.
Zurück zum Zitat Mandic, D.P., Chambers, J.A.: Toward an optimal PRNN-based nonlinear predictor. IEEE Trans. Neural Netw. 10(6), 1435–1442 (1999)CrossRef Mandic, D.P., Chambers, J.A.: Toward an optimal PRNN-based nonlinear predictor. IEEE Trans. Neural Netw. 10(6), 1435–1442 (1999)CrossRef
Metadaten
Titel
Integrated Redundant APs Reduction and Transfer Learning for Indoor WLAN Intrusion Detection via Link-Layer Data Transformation
verfasst von
Xinyue Li
Mu Zhou
Yaoping Li
Hui Yuan
Zengshan Tian
Copyright-Jahr
2019
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-1785-3_19