Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
The latest technologies in Mobile Ad-Hoc Network (MANET) allows networking infrastructure to be set up quickly and easily. Every node in MANET plays a role as a router that creates remote network access regardless of time or location. As such, the dynamic nature of the infrastructure opens MANET to...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2019
|
Subjects: | |
Online Access: | https://ir.uitm.edu.my/id/eprint/57290/2/57290.PDF https://ir.uitm.edu.my/id/eprint/57290/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Teknologi Mara |
Language: | English |
Summary: | The latest technologies in Mobile Ad-Hoc Network (MANET) allows networking infrastructure to be set up quickly and easily. Every node in MANET plays a role as a router that creates remote network access regardless of time or location. As such, the dynamic nature of the infrastructure opens MANET to being vulnerable to jamming attacks. A study found that eighty one percent of attacks occurs at the physical and MAC layers of the protocol stack. This happened due to inadequate guidelines using standard parameters to detect jamming attacks. In addition, the use of techniques such as watchdogs, routing and databases cannot solve problems which is detecting an important layer thoroughly, lack of parameters in the database and failure to detect some important jammers due to limited jammer detection methods. Therefore, knowing the types and characteristics of jammers will enable researchers to develop defence techniques that can prevent jammer attacks. However, due to limited study conducted in the field of jammer classification, the defence phase has become impossible. Presently, the classification accuracy of the assessment is proportional to the size of the data. Increasing the size of the data will make it more accurate. However, in many cases it is not possible to get such large amounts of data due to certain constraints. Therefore, there is a need to find a new valuation method that does not require large data sets yet yields the same results. Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. In addition, the methodology to determine the accuracy of the dataset based on limited amount of data will be evaluated. The methodology consists of five main stages. The first stage is to apply reverse engineering method to obtain the specific patterns of individual jammers. This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). The third stage is to classify individual jammers according to the specific pattern and characteristics design as defined in jamming identification and classification parameters. It involves development of Max-Min Rule-Based Classification Algorithm. The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. Finally, both algorithms are validated against the findings in various literatures. Two types of testing were conducted to evaluate the effectiveness of proposed algorithms, which is the performance and accuracy test. Performance tests were conducted against jammers' model at MAC and physical layer. The findings show a significant increase in the detection rate up to 96.26% and 69.15% of deceptive jammer and reactive jammer using ICLA compared to literature. In addition, methodologies for jamming classification to measure the accuracy for each classifier were developed and tested using SVM and WEKA. Results show that data with normalization and scaling for polynomial kernel with cross validation presented the highest accuracy assessment which is 76.142% compared to other classifiers. Therefore, jammer attack detection and classification, studies were provided with better knowledge and technology to develop more robust defence techniques. |
---|