Bandwidth Spoofing and Intrusion Detection System for Multistage 5G Wireless Communication Network

2018 ◽  
Vol 67 (1) ◽  
pp. 618-632 ◽  
Author(s):  
Akhil Gupta ◽  
Rakesh Kumar Jha ◽  
Pimmy Gandotra ◽  
Sanjeev Jain
2014 ◽  
Vol 556-562 ◽  
pp. 2711-2714
Author(s):  
Soo Young Shin ◽  
Isnan Arif Wicaksono

Wireless Networks suffer from many constraints including wireless communication channel, internal and external attacks, security becomes the main concern to deal with such kind of networks. Therefore, an intrusion detection system (IDS) is required that monitors the network, detects misbehavior or anomalies and notifies other nodes in the network to avoid or punish the misbehaving nodes. This paper describes the simple method to detect the intruder in wireless communication system based on physical layer characteristics. Channel prediction method is used in receiver part to predict the transmission channel for the next time slot. Then, in the next time slot the result is compared with the actual value of channel from the channel estimation. Number of detection and false alarm ratio is measured as performance matrices of the simulation. Based on simulation result, the proposed intrusion detection system give high detection ratio and low false alarm ratio for given threshold.


Today there are extraordinary attacks on all kind of networks. Security for Payload is considered one of the biggest agenda for all kind of organizations. To deal with new species if attacks like threat, which are blended in nature, no security platform can take guarantee for their intrusion protection. Among all security platforms, intrusion detection system (IDS) are being used to do the inspection of all the packets or data being transferred between two nodes, A software application , that is responsible doing the monitoring of any kind of unwanted or to monitor the activity which is malicious in nature. This research acquaints about handling unknown attacks through Intrusion Detection System. For improving security in wireless communication, Intrusion Detection System (IDS) plays significant role, which includes information about network and security scheme. Hence, this research paper focused on development of appropriate system architecture for IDS system


Sign in / Sign up

Export Citation Format

Share Document