Detection of jamming and interference attacks in wireless communication network using deep learning technique

S.V. Manikanthan, T. Padmapriya
2021 Proceedings of the First International Conference on Computing, Communication and Control System, I3CAC 2021, 7-8 June 2021, Bharath University, Chennai, India   unpublished
The Jamming and interference attacks aim to disable a wireless network, inducing a denial of service. Despite the resilience offered 5G is prone to these regarding the impact to the use of millimetre wave bands. In the last decade, several jamming detection techniques have been developed, including fuzzy logic, game theory, channel surfing, and some others statistical modeling. The plurality of these strategies are inadequate at detecting smart jammers. As a response, efficient and quick
more » ... and interference high-accuracy detection systems are all still in great demand. The usefulness of many deep learning models in detecting jamming and interference signals is analyzed in this paper. The types of signal features that could be used to diagnose jamming and interference signals are investigated, and a large dataset was created using these parameters. Deep learning algorithms are being kitted, tested, and sorely tested using this dataset. Logistic regression and naïve bayes are representations of these algorithms. The probability of detection, probability of false alarm and accuracy are being used to verify and validate the performance of these algorithms. The simulation results show that a logistic regression algorithm based on jamming detection and interference can detect jammers with perfect seating, a high possibility of detection, and a minimal probability of false alarm. and universal software radio peripherals are representations of proposed software radio units inexpensive, can be used to launch attacks. Jammers can readily find any frequency channel at a low cost. [10] . The four essential types of jamming attacks are constant jammers, random jammers, deceptive jammers, and reactive jammers. Constant jammers attack by sweeping a full capacity noise from one channel to the next as seen in a scheme and repeating the process over time. Random jammers operate at random, with no special method for moving from one channel to the next. To keep wireless channels distracted, manipulative jammers send illegitimate packets through them. Reactive jammers keep track of the number Also jam the channels that are used for communication out of all frequency channels [11] . Jammers could also be labeled as standard or smart. Daily jammers don't seem to be capable of distinguishing amongst continuously transmitted signals, so they all play at the same time. Smart jammers are likely to actually to understand, map, and determine how legitimate users transmit their signals, enabling them to develop their attack strategies or communication energy cause serious trouble to legitimate transmission. The fifth-generation (5G) cellular network period is rapidly approaching. The intensity of research is growing up in the region in readiness for the first suborbital flights. 5G networks are prepared to facilitate the energy sector as well as "vertical industries" such as automated driving, smart factories, and medical care. They will also provide multi-tenancy and micro support, as well as approaches for accelerating customer service delivery and presenting computing and networking modules to service providers [1] . The prime motive is to allow operators to provide vertical service providers with handmade solutions over the same network infrastructure. Beyond these approaches, slicing a 5G network offer a wealth of mobility and support for a variety of different performance criteria. Network functions are modularized and can be installed in a number of different ways achieves this. The network programmability rule can also be extended. Network functions virtualization (NFV) and software defined networking (SDN) are manifestations of enablers [4] . Through the latter, the former enables a flexible logical architecture and versatile location of NFs in the network virtualization of NFs. The figure 1. shows the block diagram of wireless communication. Figure 1. Wireless communication Block diagram We live in a golden age of technology. Without knowledge, would have been unable to think for a single moment. Science has made our life easier and more relaxed. Because of the advancement of technology, the modern world is being highly compressed. Due to various science and technology, the telecommunications industry has changed significantly over the past few decades. The term "5G" refers to the fifth generation of mobile technology. The use of handheld devices within very high bandwidth has changed thanks to 5G technology. 5G is a high-throughput, wide-coverage packet switched wireless system. 5G technologies use CDMA and BDMA, as well as inch wireless, to endorse seed speeds of more than 100Mbps at full movement and more than 1Gbps at low mobility. Many types of new features were included in the 5G technology, making it the in the near future, the most efficient and in high demand. It's not incredible that such a scientific treasure exists has indeed been squeezed into such a tiny device. Mobile phone subscribers get more features and performance to 5G technology. Many types of new features should be included in 5G technology, make it the most efficient and in high demand. It's not common with such a wide selection of technology to arise has also been jammed into such a tiny device. Mobile phone customers get even more features and performance to 5G technology. 5G is a new technology that will provide all conceivable devices with just one universal machine whereas interconnecting the majority of recent communication infrastructures. The 5G terminals will be multimode and cognitive radio efficient and portable. Software-defined radio modulation schemes is used. All of the required swappable software can be downloaded on the fly from the internet. The implementation of 5G mobile networks will be focused on the creation of user terminals, that will provide simultaneous access to the several wireless technologies and will consolidate numerous flows from various technologies. Moreover, the terminal will make the final decision among mobile network topology. Enhanced the role for data and control transport, as well as supporting activities for tools and other technologies networks, help compensate Next generation networks (NGN). In order to provide quality of service, traffic assessment is a basic control function. Moreover, the 5G connectivity program was made with the best service in mind (QoS). The potential of a network to increasing prevalence bandwidth while still dealing quality of service refers to the integration of effective leader elements such as latency, error rate, and uptime (QoS). Setting priorities for different data sources (video, audio, files) on the network enables them to setup and share network resources sometimes component of quality of service. Just QoS corresponds to network traffic developed for video on demand, IPTV, VoIP, streaming media, videoconferencing, and online gaming. Quality of service helps to offer priority to networks by delivering enthusiastic bandwidth, jitter power, low latency, and reduced loss characteristics. Its solutions provide the foundation for emerging campus, wide area network, and service provider networks business applications [12] .
doi:10.4108/eai.7-6-2021.2308599 fatcat:m6yd4oqm25hnlnkz47peqjlrgu