# American Institute of Mathematical Sciences

August & September  2019, 12(4&5): 1371-1384. doi: 10.3934/dcdss.2019094

## An optimization detection algorithm for complex intrusion interference signal in mobile wireless network

 Modern Educational Technology Center, Pingdingshan University, Pingdingshan, China

* Corresponding author: Li Gang

Received  July 2017 Revised  November 2017 Published  November 2018

At present, when detecting intrusive interference signals in classified form, the effect of channel denoising is very poor, and the characteristics of the extracted signals are not clear, which can not achieve effective detection of intrusion signals. An algorithm based on wavelet packet frequency hopping estimation for complex network intrusion detection is proposed in this paper. The soft and hard threshold method is used for wavelet coefficient decomposition, threshold processing, and signal reconstruction; according to probability statistics, a new sequence is composed of the spectral amplitude corresponding to the same frequency of each random variable in a random process and the spectrum matrix of intrusion interference signal is formed, so as to extract the characteristic spectrum of intrusion interference signal; by using the energy balance method, Gauss stochastic wavelet characteristics of intrusion signal can be simulated. The results of network intrusion detection are obtained by the Gauss additivity of the high-order cumulants of the network intrusion. The three edge centroid positioning method is applied to achieve the high-precision location of the intrusion point. Experiments show that the algorithm effectively improves the network channel denoising and the feature extraction effect of the intrusion signal, and it is also better than the current algorithm for the detection and location of the interference signals.

Citation: Li Gang. An optimization detection algorithm for complex intrusion interference signal in mobile wireless network. Discrete & Continuous Dynamical Systems - S, 2019, 12 (4&5) : 1371-1384. doi: 10.3934/dcdss.2019094
##### References:

show all references

##### References:
hard and soft threshold functions
Improved threshold function
Selection rules of wavelet function and threshold
principle of TDOA distance measurement
Schematic diagram of three point location algorithm for network intrusion interference signal
Experimental model
Comparison of the effect of different algorithms on the denoising of wireless network
Comparison of the effect of different algorithms on the feature extraction of wireless network intrusion signal
Comparison of the effect of different algorithms on the location of intrusion signal
Comparison of the effect of different algorithms on the network intrusion detection
 [1] Keisuke Minami, Takahiro Matsuda, Tetsuya Takine, Taku Noguchi. Asynchronous multiple source network coding for wireless broadcasting. Numerical Algebra, Control & Optimization, 2011, 1 (4) : 577-592. doi: 10.3934/naco.2011.1.577 [2] Jason R. Scott, Stephen Campbell. Auxiliary signal design for failure detection in differential-algebraic equations. Numerical Algebra, Control & Optimization, 2014, 4 (2) : 151-179. doi: 10.3934/naco.2014.4.151 [3] Sebastià Galmés. Markovian characterization of node lifetime in a time-driven wireless sensor network. Numerical Algebra, Control & Optimization, 2011, 1 (4) : 763-780. doi: 10.3934/naco.2011.1.763 [4] Aiwan Fan, Qiming Wang, Joyati Debnath. A high precision data encryption algorithm in wireless network mobile communication. Discrete & Continuous Dynamical Systems - S, 2019, 12 (4&5) : 1327-1340. doi: 10.3934/dcdss.2019091 [5] Yinfei Li, Shuping Chen. Optimal traffic signal control for an $M\times N$ traffic network. Journal of Industrial & Management Optimization, 2008, 4 (4) : 661-672. doi: 10.3934/jimo.2008.4.661 [6] Sangkyu Baek, Bong Dae Choi. Performance analysis of power save mode in IEEE 802.11 infrastructure wireless local area network. Journal of Industrial & Management Optimization, 2009, 5 (3) : 481-492. doi: 10.3934/jimo.2009.5.481 [7] Hong Il Cho, Myungwoo Lee, Ganguk Hwang. A cross-layer relay selection scheme of a wireless network with multiple relays under Rayleigh fading. Journal of Industrial & Management Optimization, 2014, 10 (1) : 1-19. doi: 10.3934/jimo.2014.10.1 [8] Yang Chen, Xiaoguang Xu, Yong Wang. Wireless sensor network energy efficient coverage method based on intelligent optimization algorithm. Discrete & Continuous Dynamical Systems - S, 2019, 12 (4&5) : 887-900. doi: 10.3934/dcdss.2019059 [9] Birol Yüceoǧlu, ş. ilker Birbil, özgür Gürbüz. Dispersion with connectivity in wireless mesh networks. Journal of Industrial & Management Optimization, 2018, 14 (2) : 759-784. doi: 10.3934/jimo.2017074 [10] Robert Stephen Cantrell, Chris Cosner, Shigui Ruan. Intraspecific interference and consumer-resource dynamics. Discrete & Continuous Dynamical Systems - B, 2004, 4 (3) : 527-546. doi: 10.3934/dcdsb.2004.4.527 [11] Christopher Oballe, Alan Cherne, Dave Boothe, Scott Kerick, Piotr J. Franaszczuk, Vasileios Maroulas. Bayesian topological signal processing. Discrete & Continuous Dynamical Systems - S, 2021  doi: 10.3934/dcdss.2021084 [12] Monika Muszkieta. A variational approach to edge detection. Inverse Problems & Imaging, 2016, 10 (2) : 499-517. doi: 10.3934/ipi.2016009 [13] Michael Dellnitz, O. Junge, B Thiere. The numerical detection of connecting orbits. Discrete & Continuous Dynamical Systems - B, 2001, 1 (1) : 125-135. doi: 10.3934/dcdsb.2001.1.125 [14] Diego F. Aranha, Ricardo Dahab, Julio López, Leonardo B. Oliveira. Efficient implementation of elliptic curve cryptography in wireless sensors. Advances in Mathematics of Communications, 2010, 4 (2) : 169-187. doi: 10.3934/amc.2010.4.169 [15] Hayato Ushijima-Mwesigwa, MD Zadid Khan, Mashrur A. Chowdhury, Ilya Safro. Optimal Placement of wireless charging lanes in road networks. Journal of Industrial & Management Optimization, 2021, 17 (3) : 1315-1341. doi: 10.3934/jimo.2020023 [16] Ruwu Xiao, Geng Li, Yuping Zhao. On the design of full duplex wireless system with chaotic sequences. Discrete & Continuous Dynamical Systems - S, 2019, 12 (4&5) : 783-793. doi: 10.3934/dcdss.2019052 [17] Tzu-Hsin Liu, Jau-Chuan Ke, Ching-Chang Kuo. Machine interference problem involving unsuccessful switchover for a group of repairable servers with vacations. Journal of Industrial & Management Optimization, 2021, 17 (3) : 1411-1422. doi: 10.3934/jimo.2020027 [18] G.A.K. van Voorn, D. Stiefs, T. Gross, B. W. Kooi, Ulrike Feudel, S.A.L.M. Kooijman. Stabilization due to predator interference: comparison of different analysis approaches. Mathematical Biosciences & Engineering, 2008, 5 (3) : 567-583. doi: 10.3934/mbe.2008.5.567 [19] Zhong Li, Maoan Han, Fengde Chen. Global stability of a predator-prey system with stage structure and mutual interference. Discrete & Continuous Dynamical Systems - B, 2014, 19 (1) : 173-187. doi: 10.3934/dcdsb.2014.19.173 [20] Eudes. M. Barboza, Olimpio H. Miyagaki, Fábio R. Pereira, Cláudia R. Santana. Radial solutions for a class of Hénon type systems with partial interference with the spectrum. Communications on Pure & Applied Analysis, 2020, 19 (6) : 3159-3187. doi: 10.3934/cpaa.2020137

2020 Impact Factor: 2.425