{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T13:47:58Z","timestamp":1777902478759,"version":"3.51.4"},"reference-count":37,"publisher":"SAGE Publications","issue":"12","license":[{"start":{"date-parts":[[2020,9,22]],"date-time":"2020-09-22T00:00:00Z","timestamp":1600732800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"publisher","award":["POCI-01-0145-FEDER-006961"],"award-info":[{"award-number":["POCI-01-0145-FEDER-006961"]}],"id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["SFRH\/BD\/99714\/2014"],"award-info":[{"award-number":["SFRH\/BD\/99714\/2014"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["SIMULATION"],"published-print":{"date-parts":[[2020,12]]},"abstract":"<jats:p>Despite the growing popularity of 802.11 wireless networks, users often suffer from connectivity problems and performance issues due to unstable radio conditions and dynamic user behavior, among other reasons. Anomaly detection and distinction are in the thick of major challenges that network managers encounter. The difficulty of monitoring broad and complex Wireless Local Area Networks, that often requires heavy instrumentation of the user devices, makes anomaly detection analysis even harder. In this paper we exploit 802.11 access point usage data and propose an anomaly detection technique based on Hidden Markov Model (HMM) and Universal Background Model (UBM) on data that is inexpensive to obtain. We then generate a number of network anomalous scenarios in OMNeT++\/INET network simulator and compare the detection outcomes with those in baseline approaches\u2014RawData and Principal Component Analysis. The experimental results show the superiority of HMM and HMM-UBM models in detection precision and sensitivity.<\/jats:p>","DOI":"10.1177\/0037549720958480","type":"journal-article","created":{"date-parts":[[2020,9,23]],"date-time":"2020-09-23T02:29:13Z","timestamp":1600828153000},"page":"939-956","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":3,"title":["802.11 wireless simulation and anomaly detection using HMM and UBM"],"prefix":"10.1177","volume":"96","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0834-4049","authenticated-orcid":false,"given":"Anisa","family":"Allahdadi","sequence":"first","affiliation":[{"name":"INESC TEC and Faculty of Engineering, University of Porto, Portugal"}]},{"given":"Ricardo","family":"Morla","sequence":"additional","affiliation":[{"name":"INESC TEC and Faculty of Engineering, University of Porto, Portugal"}]},{"given":"Jaime S","family":"Cardoso","sequence":"additional","affiliation":[{"name":"INESC TEC and Faculty of Engineering, University of Porto, Portugal"}]}],"member":"179","published-online":{"date-parts":[[2020,9,22]]},"reference":[{"key":"bibr1-0037549720958480","first-page":"39","volume-title":"Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications","author":"Cheng YC"},{"key":"bibr2-0037549720958480","first-page":"191","volume-title":"Proceedings of the 4th international conference on mobile systems, applications and services","author":"Sheth A"},{"key":"bibr3-0037549720958480","first-page":"25","volume-title":"Proceedings of the 4th ACM workshop on performance evaluation of wireless ad hoc, sensor, and ubiquitous networks","author":"Colesanti UM"},{"key":"bibr4-0037549720958480","first-page":"M48","volume-title":"International Conference on Mobile Communications, Networking and Applications (MobiCONA). Proceedings","author":"Qashi R"},{"key":"bibr5-0037549720958480","volume-title":"Australian Telecommunications, Networks and Applications Conference (ATNAC)","volume":"162","author":"Woon S"},{"key":"bibr6-0037549720958480","first-page":"1","volume-title":"2013 IEEE 38th Conference on Local Computer Networks Workshops (LCN Workshops)","author":"Allahdadi A"},{"key":"bibr7-0037549720958480","first-page":"1","volume-title":"2014 7th IFIP Wireless and Mobile Networking Conference (WMNC)","author":"Allahdadi A"},{"key":"bibr8-0037549720958480","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-018-9455-2"},{"key":"bibr9-0037549720958480","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.88"},{"key":"bibr10-0037549720958480","first-page":"532","volume-title":"Wireless Communications and Networking Conference, 2006. WCNC 2006. IEEE","volume":"1","author":"Pan H"},{"key":"bibr11-0037549720958480","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2031971"},{"key":"bibr12-0037549720958480","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282424"},{"key":"bibr13-0037549720958480","first-page":"000348","volume-title":"2013 IEEE Symposium on Computers and Communications (ISCC)","author":"Massa D"},{"key":"bibr14-0037549720958480","first-page":"1","volume-title":"Proceedings of the 2nd annual international workshop on wireless internet","author":"Hern\u00e1ndez-Campos F"},{"key":"bibr15-0037549720958480","first-page":"231","volume-title":"Global telecommunications conference, 2003. GLOBECOM\u201903. IEEE","volume":"1","author":"Chen J"},{"key":"bibr16-0037549720958480","first-page":"149","volume-title":"Proceedings of the 2010 ACM conference on information technology education","author":"Kulgachev V"},{"key":"bibr17-0037549720958480","first-page":"663","volume-title":"28th annual IEEE international conference on local computer networks, 2003. LCN\u201903. Proceedings","author":"Bai G"},{"key":"bibr18-0037549720958480","first-page":"81","volume-title":"Proceedings of the 2nd international conference on simulation tools and techniques","author":"Bredel M"},{"issue":"1","key":"bibr19-0037549720958480","first-page":"13","volume":"13","author":"Malekzadeh M","year":"2011","journal-title":"IJ Netw Secu"},{"key":"bibr20-0037549720958480","first-page":"72","volume-title":"Proceedings of the 1st international conference on simulation tools and techniques for communications, networks and systems & workshops","author":"Kuntz A"},{"key":"bibr21-0037549720958480","doi-asserted-by":"publisher","DOI":"10.22452\/mjcs.vol23no1.4"},{"key":"bibr22-0037549720958480","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.186"},{"key":"bibr23-0037549720958480","first-page":"100","volume-title":"Proceedings of the 6th ACM international workshop on modeling analysis and simulation of wireless and mobile systems","author":"Khayam SA"},{"key":"bibr24-0037549720958480","first-page":"57","volume-title":"Proceedings of the 7th ACM conference on embedded networked sensor systems","author":"Kamthe A"},{"key":"bibr25-0037549720958480","first-page":"1","volume-title":"IEEE international conference on pervasive computing and communications, 2009. PerCom 2009","author":"Ghosh C"},{"key":"bibr26-0037549720958480","first-page":"1","volume-title":"2010 7th IEEE consumer communications and networking conference (CCNC)","author":"Prasad PS"},{"key":"bibr27-0037549720958480","first-page":"3448","volume-title":"2015 IEEE international conference on communications (ICC)","author":"Cheikh AB"},{"key":"bibr28-0037549720958480","first-page":"1","volume-title":"2010 7th annual IEEE communications society conference on sensor mesh and ad hoc communications and networks (SECON)","author":"Kashyap A"},{"key":"bibr29-0037549720958480","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.259"},{"key":"bibr30-0037549720958480","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-7488-4_197"},{"key":"bibr31-0037549720958480","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.184"},{"key":"bibr32-0037549720958480","first-page":"611","volume-title":"IEEE computer society conference on computer vision and pattern recognition, 2005. CVPR 2005","volume":"1","author":"Zhang D"},{"key":"bibr33-0037549720958480","unstructured":"OMNeT++ Discrete Event Simulator. https:\/\/www.omnetpp.org\/. Accessed June 2020."},{"key":"bibr34-0037549720958480","unstructured":"INET Framework. https:\/\/inet.omnetpp.org\/. Accessed June 2020."},{"key":"bibr35-0037549720958480","first-page":"1","volume-title":"4th international conference on wireless communications, networking and mobile computing, 2008. WiCOM\u201908","author":"Fu B"},{"key":"bibr36-0037549720958480","unstructured":"INET Framework Documentation. https:\/\/inet.omnetpp.org\/docs\/index.html. Accessed June 2020."},{"key":"bibr37-0037549720958480","unstructured":"R: What is R. https:\/\/www.r-project.org\/about.html. Accessed June 2020."}],"container-title":["SIMULATION"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0037549720958480","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/0037549720958480","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0037549720958480","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T11:30:43Z","timestamp":1777635043000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/0037549720958480"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,22]]},"references-count":37,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["10.1177\/0037549720958480"],"URL":"https:\/\/doi.org\/10.1177\/0037549720958480","relation":{},"ISSN":["0037-5497","1741-3133"],"issn-type":[{"value":"0037-5497","type":"print"},{"value":"1741-3133","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,22]]}}}