Submitted:
08 July 2025
Posted:
09 July 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Methods
2.1. Data Collection and Preprocessing
2.2. Deployment of Machine Learning Models
2.3. Anomaly Detection Using AID Systems
2.4. Encryption Protocol Implementation
2.5. Integrating Blockchain for Enhanced Security
3. Categorization of Adversarial Threats in Wireless Communication Systems
3.1. Network Compromise via Denial-of-Service (DoS) Attacks
3.2. Unauthorized Data Access in Man-in-the-Middle (MitM) Attacks
3.3. Exploitation Through Key Reinstallation Vulnerabilities (KRACK)
4. Innovative Defense Mechanisms Against Progressive Cyber Threats
4.1. Next-Generation Machine Learning for Enhanced Threat Detection
4.2. Adoption of Future-Ready Encryption Protocols
5. Frameworks for Analysis and Operational Assessment
5.1. Essential Metrics for Evaluating Security and Network Performance
5.2. Validation through Simulation Experiments
5.3. Insights from Field Implementations
6. Empirical Outcomes
6.1. Machine Learning-Based Threat Detection Assessment
6.2. Analysis of WPA3 Encryption’s Robustness Against Cyber Attacks
6.3. Blockchain’s Contribution to WiFi Authentication Security Enhancement
6.4. Comprehensive Security Framework Assessment
7. Discussion
7.1. Interpretation of Findings
7.2. Constraints and Challenges
7.3. Strategic Implications and Research Trajectories
References
- Ross Anderson and Markus Kuhn. Tamper Resistance: A Cautionary Note for Wireless Devices. In Proceedings of the 2nd USENIX Workshop on Electronic Commerce, 1996.
- Sandip Rayanchu and Sourabh Banerjee. AirShark: Detecting Non-WiFi RF Devices Using Commodity WiFi Hardware. In Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, 2009.
- John Bellardo and Stefan Savage. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. In Proceedings of the 12th USENIX Security Symposium, August 2003.
- Xin Cheng et al. Jigsaw-based Wireless Intrusion Detection. In Proceedings of the IEEE Conference on Communications, 2011.
- Weiyi Xu, Wade Trappe, Yanyong Zhang, and Tao Wood. The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. In Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2005.
- Mauro Conti, Ali Dehghantanha, Khaled Franke, and Sergio Watson. Internet of Things Security and Forensics: Challenges and Opportunities. Future Generation Computer Systems, 78:544–546, 2018.
- Debarun De, Md. Islam, Abu Rahman, et al. A Survey on Recent Trends in Intrusion Detection Systems for IoT. In International Conference on Computing, Networking and Communications, 2018.
- Subham Mukherjee and Samiran Chatterjee. Security and Privacy of IoT in Cloud. International Journal of Wireless and Mobile Computing, 14(3):311–327, 2018.
- Manuel Calderón, Veysel Güngör, and Thomas Ristenpart. An Experimental Study of the KRACK Attack. IEEE Transactions on Wireless Communications, 16(5):3498–3507, 2017.
- Mathy Vanhoef and Frank Piessens. Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. CCS, 2017.
- Alexander Biermann, Jonathan Perry, et al. Analysis of WPA3’s Dragonfly Handshake. USENIX Security Symposium, 2018.
- Alex Biryukov, Shaked Dolev, and Igor Pustogarov. Analysis of WPA3 SAE Implementation. IEEE Security & Privacy, 18(1):55–62, 2020.
- Kai Zeng, Kui Ren, Xiang Zhang, and Ya Zhang. WIDS: Wireless Intrusion Detection System using RSSI and Data Analysis. In International Conference on Wireless Communications and Signal Processing, 2016.
- X. Xu, Y. Chen, and W. Trappe. A Survey on Wireless Sensor Network Security. IEEE Communications Surveys & Tutorials, 10(3):6–26, 2007.
- Ismail Butun, Salil D. Morgera, and Radha Sankar. A Survey of Intrusion Detection Systems in Wireless Sensor Networks. IEEE Communications Surveys & Tutorials, 16(1):266–282, 2014.
- Rizwan Khan, Shahid Uddin Khan, Raza Zaheer, and Shah Khan. Network Security: Attacks and Defenses. Journal of Network and Computer Applications, 40:210–239, 2014.
- Fahd Alotaibi, Adel Bahattab, Yahya Haddad, et al. Machine Learning for Intrusion Detection in Internet of Things. In 2020 International Conference on Information Technology, 2020.
- Manuel Coronado, Juan García, and Carlos López. Multi-agent Intrusion Detection Systems: Architecture and Alert Correlation. In Proceedings of the International Conference on Artificial Intelligence and Security, 2019. Basato sul lavoro di Gorodetsky et al. (2005).
- Ahmad Hamza Lashkari, Draper Gil, et al. Characterization of Tor Traffic: User Identification via Encrypted Traffic Analysis. Proceedings of the 2014 IEEE Conference on Communications, 2014.
- Rakesh Kumar and Anuj Tripathi. Blockchain for Future Wireless Networks: A Decade Survey. Sensors, 22(11):4182, 2022.
- Ikram Ayub, Khudan Saeed, and Muhammad et al. Uddin. Internet of Things (IoT): A Survey on Architectures, Enabling Technologies, Security and Privacy. IEEE Access, 07:9600–9650, 2019.
- Eugênio Fernandes, Amin Rahmati, Jaihyun Jung, Apu Prakash, and Adam Prakash. Security Implications of One-Sided Network Communication in IoT. Proceedings of the 2016 IEEE Symposium on Security and Privacy, pages 36–51, 2016.
- Henning Christiansen and Davide Martinenghi. Simplification of database integrity constraints revisited: A transformational approach. In Logic Based Program Synthesis and Transformation, 13th International Symposium LOPSTR 2003, Uppsala, Sweden, August 25-27, 2003, Revised Selected Papers, pages 178–197. Springer, 2004.
- Paolo Ciaccia and Davide Martinenghi. FA + TA < fsa: Flexible score aggregation. Proceedings of the 27th ACM International Conference on Information and Knowledge Management, CIKM 2018, Torino, Italy, October 22-26, 2018, pages 57–66, 2018.
- Alessandro Bozzon, Ilio Catallo, Eleonora Ciceri, Piero Fraternali, Davide Martinenghi, and Marco Tagliasacchi. A framework for crowdsourced multimedia processing and querying. Proceedings of the First International Workshop on Crowdsourcing Web Search, Lyon, France, April 17, 2012, pages 42–47, 2012.
- Andrea Calì and Davide Martinenghi. Conjunctive Query Containment under Access Limitations. In Proceedings of Conceptual Modeling - ER 2008, 27th International Conference on Conceptual Modeling, Barcelona, Spain, October 20-24, 2008, pages 326–340, 2008.
- Florian Lutz, Marco Spoerndli, et al. Machine Learning Approaches for Wireless Intrusion Detection Systems. IEEE Transactions on Information Forensics and Security, 15:2–14, 2020.
- Dmitry Zuev et al. Network Anomaly Detection via Traffic Flow Analysis. In International Conference on Network Monitoring and Surveillance, 2011.
- Jing Li, Yang Wang, et al. Convolutional Neural Network Based Intrusion Detection in Wireless Networks. Journal of Communications and Networks, 22(4):315–325, 2020.







| Algorithm | Precision (%) | Recall (%) | F1-Score (%) | Threat Detection (%) |
|---|---|---|---|---|
| SVM | 85 | 80 | 82 | 79 |
| CNN | 90 | 88 | 89 | 87 |
| RF | 88 | 84 | 86 | 83 |
| Aspect | Prior to Implementation | Subsequent to Implementation |
|---|---|---|
| Spoofing Events | 120 | 30 |
| Reduction (%) | - | 75 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).