Mobility support to change the connection from one access point(AP)to the next(i.e.,handover)becomes one of the important issues in IEEE 802.11 wireless local area networks(WLANs).During handover,the channel scanning ...Mobility support to change the connection from one access point(AP)to the next(i.e.,handover)becomes one of the important issues in IEEE 802.11 wireless local area networks(WLANs).During handover,the channel scanning procedure,which aims to collect neighbor AP(NAP)information on all available channels,accounts for most of the delay time.To reduce the channel scanning procedure,a neighbor beacon frame transmission scheme(N-BTS)was proposed for a seamless handover.N-BTS can provide a seamless handover by removing the channel scanning procedure.However,N-BTS always requires operating overhead even if there are few mobile stations(MSs)for the handover.Therefore,this paper proposes a reinforcement learning-based handover scheme with neighbor beacon frame transmission(MAN-BTS)to properly consider the use of N-BTS.The optimization equation is defined to maximize the expected reward tofind the optimal policy and is solved using Q-learning.Simulation results show that the proposed scheme outperforms the comparison schemes in terms of the expected reward.展开更多
IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 protocol.Due to the data transmission nature of the wireless local ...IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 protocol.Due to the data transmission nature of the wireless local area network(WLAN)through radio waves,its communication is exposed to the possibility of being attacked by illegitimate users.Moreover,the security design of the wireless structure is vulnerable to versatile attacks.For example,the attacker can imitate genuine features,rendering classificationbased methods inaccurate in differentiating between real and false messages.Althoughmany security standards have been proposed over the last decades to overcome many wireless network attacks,effectively detecting such attacks is crucial in today’s real-world applications.This paper presents a novel resource exhaustion attack detection scheme(READS)to detect resource exhaustion attacks effectively.The proposed scheme can differentiate between the genuine and fake management frames in the early stages of the attack such that access points can effectively mitigate the consequences of the attack.The scheme is built through learning from clustered samples using artificial neural networks to identify the genuine and rogue resource exhaustion management frames effectively and efficiently in theWLAN.The proposed scheme consists of four modules whichmake it capable to alleviates the attack impact more effectively than the related work.The experimental results show the effectiveness of the proposed technique by gaining an 89.11%improvement compared to the existing works in terms of detection.展开更多
基金supported by the National Research Foundation of Korea(NRF)grant funded by the Korea Government(MSIT)(No.2020R1G1A1100493).
文摘Mobility support to change the connection from one access point(AP)to the next(i.e.,handover)becomes one of the important issues in IEEE 802.11 wireless local area networks(WLANs).During handover,the channel scanning procedure,which aims to collect neighbor AP(NAP)information on all available channels,accounts for most of the delay time.To reduce the channel scanning procedure,a neighbor beacon frame transmission scheme(N-BTS)was proposed for a seamless handover.N-BTS can provide a seamless handover by removing the channel scanning procedure.However,N-BTS always requires operating overhead even if there are few mobile stations(MSs)for the handover.Therefore,this paper proposes a reinforcement learning-based handover scheme with neighbor beacon frame transmission(MAN-BTS)to properly consider the use of N-BTS.The optimization equation is defined to maximize the expected reward tofind the optimal policy and is solved using Q-learning.Simulation results show that the proposed scheme outperforms the comparison schemes in terms of the expected reward.
基金The manuscript APC is supported by the grant name(UMS No.DFK2005)“Smart Vertical farming Technology for Temperate vegetable cultivation in Sabah:practising smart automation system using IR and AI technology in agriculture 4.0”.
文摘IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 protocol.Due to the data transmission nature of the wireless local area network(WLAN)through radio waves,its communication is exposed to the possibility of being attacked by illegitimate users.Moreover,the security design of the wireless structure is vulnerable to versatile attacks.For example,the attacker can imitate genuine features,rendering classificationbased methods inaccurate in differentiating between real and false messages.Althoughmany security standards have been proposed over the last decades to overcome many wireless network attacks,effectively detecting such attacks is crucial in today’s real-world applications.This paper presents a novel resource exhaustion attack detection scheme(READS)to detect resource exhaustion attacks effectively.The proposed scheme can differentiate between the genuine and fake management frames in the early stages of the attack such that access points can effectively mitigate the consequences of the attack.The scheme is built through learning from clustered samples using artificial neural networks to identify the genuine and rogue resource exhaustion management frames effectively and efficiently in theWLAN.The proposed scheme consists of four modules whichmake it capable to alleviates the attack impact more effectively than the related work.The experimental results show the effectiveness of the proposed technique by gaining an 89.11%improvement compared to the existing works in terms of detection.