Wednesday 02 May 2018
Wireless Telecommunications Symposium

Dr. Roger Achkar, Chairperson of the Department of Computer & Communications Engineering at AUST participated in the 17th Wireless Telecommunications Symposium –WTS 2018, which was held in Phoenix, Arizona, USA from April 18 to April 20, 2018.

Dr. Achkar, represented AUST at the conference, and presented his paper entitled “A Self Organizing Map Intrusion Detection System for RPL Protocol Attacks”. The paper presents the work of an MS Neural Networks project done at AUST- Ashrafieh. It is co-authored by Elie Kfoury, Julien Saab and Paul Younes.
The importance of this conference was in the exchange of information on advances in mobile communications and wireless networking technology, management, policy, applications, and security in the United States, with leaders and experts from industry, governmental agencies, and universities around the world. The theme of WTS 2018 was centered on the theory and practice of the Global Wireless Communications.
Planned highlights of WTS 2018 included:


  • Addresses and presentations by some of the most respected executives and researchers in the wireless communications industry
  • Panel discussions
  • Tutorials and workshops
  • Presentations of accepted academic and practitioner research papers; a poster paper session; a doctoral students session
  • Mini-Symposia

Abstract - Routing over Low Power and Lossy Networks (RPL) is a standardized routing protocol for constrained Wireless Sensor Network (WSN) environments. The main node’s constraints include processing capability, power, memory, and energy. RPL defines how the nodes in a WSN form a Mesh topology enabling them to route messages. Unfortunately, various attacks exist on the RPL protocol that can disrupt the topology and consume nodes’ energy. In this paper, we propose an Intrusion Detection System (IDS) based on Self-Organizing Map (SOM) Neural Network to cluster the WSN routing attacks, and hence notify the system administrator at an early stage, reducing the risk of interrupting the network and consume nodes power. Results showed that the SOM is able to cluster routing packets with three different types of attacks, as well as clean data.

The paper is included in the CD distributed to conference participants, listed on the WTS 2018 website, and will be published in the International Journal of Interdisciplinary telecommunications & Networking (IJITN).

Official AUST Website
All rights reserved. © 2019