{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:43:29Z","timestamp":1740141809101,"version":"3.37.3"},"reference-count":28,"publisher":"SAGE Publications","issue":"10","license":[{"start":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T00:00:00Z","timestamp":1380585600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2013,10,1]]},"abstract":"<jats:p> Intrusion detection is a challenging problem in wireless networks due to the broadcast nature of the wireless medium. Physical layer information is increasingly used to protect these vulnerable networks. Meanwhile, reconfigurable antennas are gradually finding their way into wireless devices due to their ability to improve data throughput. In this paper, the capabilities of reconfigurable antennas are used to devise an intrusion detection scheme that operates at the physical layer. The detection problem is posed as a GLRT problem that operates on the channels corresponding to the different modes of a reconfigurable antenna. The performance of the scheme is quantified through field measurements taken in an indoor environment at the 802.11 frequency band. Based on the measured data, we study the achievable performance and the effect of the different control parameters on the performance of the intrusion detection scheme. The effect of pattern correlation between the different modes on the scheme's performance is also analyzed, based on which general guidelines on how to design the different antenna modes are provided. The results show that the proposed scheme can add an additional layer of security that can significantly alleviate many vulnerabilities and threats in current fixed wireless networks. <\/jats:p>","DOI":"10.1155\/2013\/564503","type":"journal-article","created":{"date-parts":[[2013,10,2]],"date-time":"2013-10-02T21:06:20Z","timestamp":1380747980000},"page":"564503","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["Reconfigurable Antenna Assisted Intrusion Detection in Wireless Networks"],"prefix":"10.1177","volume":"9","author":[{"given":"Prathaban","family":"Mookiah","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Drexel University, Philadelphia, PA 19104, USA"}]},{"given":"John M.","family":"Walsh","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Drexel University, Philadelphia, PA 19104, USA"}]},{"given":"Rachel","family":"Greenstadt","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Drexel University, Philadelphia, PA 19104, USA"}]},{"given":"Kapil R.","family":"Dandekar","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Drexel University, Philadelphia, PA 19104, USA"}]}],"member":"179","published-online":{"date-parts":[[2013,10,2]]},"reference":[{"volume-title":"Wireless Security: Models, Threats, and Solutions","year":"2001","author":"Nichols R. K.","key":"B1-2013-564503"},{"key":"B3-2013-564503","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2002.1160080"},{"first-page":"180","volume-title":"Proceedings of the 7th Annual International Conference on Mobile Computing and Networking (MobiCom '01)","author":"Borisov N.","key":"B2-2013-564503"},{"key":"B8-2013-564503","doi-asserted-by":"publisher","DOI":"10.1002\/ecjc.20167"},{"key":"B9-2013-564503","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.88"},{"key":"B5-2013-564503","doi-asserted-by":"publisher","DOI":"10.1109\/ISITA.2008.4895646"},{"key":"B6-2013-564503","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614356"},{"key":"B4-2013-564503","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315295"},{"key":"B7-2013-564503","doi-asserted-by":"publisher","DOI":"10.1109\/26.385951"},{"key":"B15-2013-564503","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2006.27"},{"key":"B11-2013-564503","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.070194"},{"key":"B10-2013-564503","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.767"},{"key":"B14-2013-564503","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161298"},{"key":"B16-2013-564503","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2008.4558602"},{"key":"B13-2013-564503","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287867"},{"key":"B12-2013-564503","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.12.081544"},{"key":"B17-2013-564503","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345958"},{"key":"B18-2013-564503","series-title":"Fundamentals of Statistical Signal Processing","volume-title":"Detection Theory","volume":"2","author":"Kay S. M.","year":"1998"},{"key":"B19-2013-564503","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2043275"},{"issue":"11","key":"B21-2013-564503","doi-asserted-by":"crossref","first-page":"3143","DOI":"10.1109\/TAP.2006.883962","volume":"54","author":"Oestges C.","year":"2006","journal-title":"IEEE Transactions on Antennas and Propagation"},{"issue":"11","key":"B22-2013-564503","doi-asserted-by":"crossref","first-page":"3198","DOI":"10.1109\/TAP.2006.883961","volume":"54","author":"Pagani P.","year":"2006","journal-title":"IEEE Transactions on Antennas and Propagation"},{"key":"B23-2013-564503","first-page":"91","volume-title":"Proceedings of the IEEE 60th Vehicular Technology Conference, Wireless Technologies for Global Security (VTC '04)","volume":"1","author":"Medbo J."},{"issue":"2","key":"B24-2013-564503","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1002\/(SICI)1098-1098(1999)10:2<109::AID-IMA2>3.0.CO;2-R","volume":"10","author":"Sijbers J.","year":"1999","journal-title":"International Journal of Imaging Systems and Technology"},{"key":"B25-2013-564503","doi-asserted-by":"publisher","DOI":"10.1109\/LAWP.2009.2026594"},{"issue":"3","key":"B26-2013-564503","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1109\/42.712125","volume":"17","author":"Sijbers J.","year":"1998","journal-title":"IEEE Transactions on Medical Imaging"},{"key":"B27-2013-564503","first-page":"1895","volume-title":"Proceedings of the 5th European Conference on Speech Communication and Technology (Eurospeech '97)","volume":"4","author":"Martin A."},{"key":"B28-2013-564503","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2006.873978"},{"first-page":"543","volume-title":"Proceedings of the 5th European Conference on Antennas and Propagation (EUCAP '11)","author":"Kountouriotis J.","key":"B29-2013-564503"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/564503","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2013\/564503","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/564503","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T19:05:56Z","timestamp":1621191956000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2013\/564503"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10,1]]},"references-count":28,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2013,10,1]]}},"alternative-id":["10.1155\/2013\/564503"],"URL":"https:\/\/doi.org\/10.1155\/2013\/564503","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2013,10,1]]}}}