Share Email Print

Proceedings Paper

Passive intrusion detection in wireless networks by exploiting clustering-based learning
Author(s): Jie Yang; Yingying Chen; Sachi Desai; Shafik Quoraishee
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

The large-scale wireless sensing data collected from wireless networks can be used for detecting intruders (e.g., enemies in tactical fields), and further facilitating real-time situation awareness in Army's networkcentric warfare applications such as intrusion detection, battlefield protection and emergency evacuation. In this work, we focus on exploiting Received Signal Strength (RSS) obtained from the existing wireless infrastructures for performing intrusion detection when the intruders or objects do not carry any radio devices. This is also known as passive intrusion detection. Passive intrusion detection based on the RSS data is an attractive approach as it reuses the existing wireless environmental data without requiring a specialized infrastructure. We propose a clustering-based learning mechanism for passive intrusion detection in wireless networks. Specifically, our detection scheme utilizes the clustering method to analyze the changes of RSS, caused by intrusions, at multiple devices to diagnose the presence of intrusions collaboratively. Our experimental results using an IEEE 802.15.4 (Zigbee) network in a real office environment show that our clustering-based learning can effectively detect the presence of intrusions.

Paper Details

Date Published: 28 April 2010
PDF: 8 pages
Proc. SPIE 7706, Wireless Sensing, Localization, and Processing V, 770604 (28 April 2010);
Show Author Affiliations
Jie Yang, Stevens Institute of Technology (United States)
Yingying Chen, Stevens Institute of Technology (United States)
Sachi Desai, U.S. Army Armament Research, Development and Engineering Ctr. (United States)
Shafik Quoraishee, U.S. Army Armament Research, Development and Engineering Ctr. (United States)

Published in SPIE Proceedings Vol. 7706:
Wireless Sensing, Localization, and Processing V
Sohail A. Dianat; Michael D. Zoltowski, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?