Intelligent Control in Automation Based on Wireless Traffic Analysis
Abstract
Wireless technology is a central component of many factory automation infrastructures in both the commercial and government sectors, providing connectivity among various components in industrial realms (distributed sensors, machines, mobile process controllers). However wireless technologies provide more threats to computer security than wired environments. The advantageous features of Bluetooth technology resulted in Bluetooth units shipments climbing to five million per week at the end of 2005 [1, 2]. This is why the real-time interpretation and understanding of Bluetooth traffic behavior is critical in both maintaining the integrity of computer systems and increasing the efficient use of this technology in control type applications. Although neuro-fuzzy approaches have been applied to wireless 802.11 behavior analysis in the past, a significantly different Bluetooth protocol framework has not been extensively explored using this technology. This paper presents a new neurofuzzy traffic analysis algorithm of this still new territory of Bluetooth traffic. Further enhancements of this algorithm are presented along with the comparison against the traditional, numerical approach. Through test examples, interesting Bluetooth traffic behavior characteristics were captured, and the comparative elegance of this computationally inexpensive approach was demonstrated. This analysis can be used to provide directions for future development and use of this prevailingmore »
- Authors:
- Publication Date:
- Research Org.:
- Idaho National Lab. (INL), Idaho Falls, ID (United States)
- Sponsoring Org.:
- DOE - NE
- OSTI Identifier:
- 923502
- Report Number(s):
- INL/CON-07-12619
TRN: US200804%%1199
- DOE Contract Number:
- DE-AC07-99ID-13727
- Resource Type:
- Conference
- Resource Relation:
- Conference: 12th IEEE Conference on Emerging Technologies and Factory Automation,09/25/2007,09/28/2007
- Country of Publication:
- United States
- Language:
- English
- Subject:
- 99 GENERAL AND MISCELLANEOUS//MATHEMATICS, COMPUTING, AND INFORMATION SCIENCE; ALGORITHMS; AUTOMATION; COMPUTERS; SECURITY; Bluetooth traffic analysis; classification; computer security; data mining; fuzzy control; intrusion detection; neuro-fuzzy controller
Citation Formats
Derr, Kurt, and Manic, Milos. Intelligent Control in Automation Based on Wireless Traffic Analysis. United States: N. p., 2007.
Web.
Derr, Kurt, & Manic, Milos. Intelligent Control in Automation Based on Wireless Traffic Analysis. United States.
Derr, Kurt, and Manic, Milos. 2007.
"Intelligent Control in Automation Based on Wireless Traffic Analysis". United States. https://www.osti.gov/servlets/purl/923502.
@article{osti_923502,
title = {Intelligent Control in Automation Based on Wireless Traffic Analysis},
author = {Derr, Kurt and Manic, Milos},
abstractNote = {Wireless technology is a central component of many factory automation infrastructures in both the commercial and government sectors, providing connectivity among various components in industrial realms (distributed sensors, machines, mobile process controllers). However wireless technologies provide more threats to computer security than wired environments. The advantageous features of Bluetooth technology resulted in Bluetooth units shipments climbing to five million per week at the end of 2005 [1, 2]. This is why the real-time interpretation and understanding of Bluetooth traffic behavior is critical in both maintaining the integrity of computer systems and increasing the efficient use of this technology in control type applications. Although neuro-fuzzy approaches have been applied to wireless 802.11 behavior analysis in the past, a significantly different Bluetooth protocol framework has not been extensively explored using this technology. This paper presents a new neurofuzzy traffic analysis algorithm of this still new territory of Bluetooth traffic. Further enhancements of this algorithm are presented along with the comparison against the traditional, numerical approach. Through test examples, interesting Bluetooth traffic behavior characteristics were captured, and the comparative elegance of this computationally inexpensive approach was demonstrated. This analysis can be used to provide directions for future development and use of this prevailing technology in various control type applications, as well as making the use of it more secure.},
doi = {},
url = {https://www.osti.gov/biblio/923502},
journal = {},
number = ,
volume = ,
place = {United States},
year = {Sat Sep 01 00:00:00 EDT 2007},
month = {Sat Sep 01 00:00:00 EDT 2007}
}