FUZZY-LOGIC ALGORITHM FOR RISK ASSESSMENT IN WI-FI NETWORKS

Authors

  • I. Antipov Kharkiv National University of Radio Electronics,Kharkiv, Ukraine
  • T. Vasylenko Kharkiv National University of Radio Electronics, Kharkiv, Ukraine

DOI:

https://doi.org/10.15588/1607-3274-2026-1-1

Keywords:

Cybersecurity, Wi-Fi, intrusion detection systems, fuzzy logic, risk assessment

Abstract

Context. With the increasing use of Wi-Fi wireless networks, the risk of attacks specific to them is also rising. Traditional protection methods, which usually rely on precise thresholds, do not reflect the actual uncertainty of the conditions in which wireless networks operate. Due to the openness of the radio channel, its instability, dispersion, and the presence of noise, a promising direction is the use of fuzzy logic algorithms, which allow for taking into account the incompleteness and ambiguity of data when assessing the risks of Wi-Fi wireless networks.
Objective. Develop a fuzzy logic algorithm for assessing the state of Wi-Fi networks, which allows adaptively determining the level of risk by analyzing wireless network parameters and making decisions regarding security system actions.
Method. A fuzzy-logic-based algorithm for analyzing the operational state of a wireless Wi-Fi network is proposed. The algorithm is based on the integrated analysis of six network parameters using elements of fuzzy logic. It includes the construction of membership functions for the input variables, the formation of a fuzzy IF–THEN rule base, and a defuzzification mechanism that provides a continuous numerical assessment of the network risk level. To evaluate the effectiveness of the proposed approach, a comparative simulation study was conducted against the classical threshold-based decision-making method. The study was carried out in the MathCAD and MATLAB environments to enable cross-validation of the algorithm’s functionality. Three network operation scenarios were considered, with 100 network states simulated for each scenario.
Results. The simulation results obtained in the MathCAD and MATLAB environments coincide up to the third decimal place, confirming the correctness of the software implementation of the algorithm. Comparative analysis showed that the threshold-based method produces binary decisions and is highly sensitive to random fluctuations in network parameters, which leads to an increased number of false alarms. The proposed fuzzy-logic-based algorithm provides a continuous risk assessment, demonstrates lower result variance, and exhibits a stable response to changes in network conditions. Under unstable network operating conditions, the algorithm enables discrimination between noise and interference effects and the initial phases of attacks, while also ensuring a gradual increase in the risk level without abrupt transitions between linguistic levels. The obtained results confirm a reduction in Type I errors and an improvement in decision-making informativeness.
Conclusions. The fuzzy logic-based Wi-Fi network state analysis algorithm proposed in this work enables more adequate decision-making regarding the network’s condition. The use of fuzzy logic allows adjusting decisions depending on changes in network operating conditions in real time and can be integrated into intrusion detection systems or advanced wireless network cybersecurity tools.

Author Biographies

I. Antipov, Kharkiv National University of Radio Electronics,Kharkiv

Doctor of sciences, Professor of the Department of Computer Radio Engineering and Technical
Information Protection Systems

T. Vasylenko, Kharkiv National University of Radio Electronics, Kharkiv

PhD, Senior Lecturer of the Department of Computer Radio Engineering and Technical Information
Protection Systems

References

Natkaniec P., Bieńkowski P. Analysis of the Mixed IEEE 802.11ax Wireless Networks in the 5 GHz Band, Sensors, 2023, Vol. 23, № 10, P. 4964. DOI: 10.3390/s23104964.

Forenbacher I., Husnjak S., Jovović I. et al. Throughput of an IEEE 802.11 Wireless Network in the Presence of Wireless Audio Transmission: A Laboratory Analysis, Sensors, 2021, Vol. 21, № 8, P. 2620. DOI: 10.3390/s21082620

Wang K., Psounis K. Efficient scheduling and resource allocation in 802.11ax multiuser transmissions, Computer Communications, 2020, Vol. 152, pp. 171–186. DOI: 10.1016/j.comcom.2020.01.010

Natkaniec M., Kras M. An Optimization of Network Performance in IEEE 802.11ax Dense Networks , International Journal of Electronics and Telecommunications, 2023, Vol. 69, pp. 169–176. DOI: 10.24425/ijet.2023.144347

Faíscas D. (In)Security in Wi-Fi networks: a systematic review, Advanced Research on Information Systems Security, 2022, Vol. 2, № 2, pp. 17–23. DOI: 10.56394/aris2.v2i2.18

Lee B. Stateless Re-Association in WPA3 Using Paired Token, Electronics, 2021, Vol. 10, № 2, P. 215. DOI: 10.3390/electronics10020215

Kumar Y. A., Kumar V. Systematic Review on Intrusion Detection System in Wireless Networks: Variants, Attacks, and Applications, Wireless Personal Communications, 2023, Vol. 123, № 1, pp. 395–452. DOI: 10.1007/s11277- 023-10773-x

Dimakis D. A., Michael K. Survey of Wireless Intrusion Detection Systems: Threats, Swarm Intelligence and Machine Learning-Based Solutions, Wireless Networks, 2022, Vol. 23, № 10, P. 4964. DOI: 10.1007/s11276-022-02933-3

Kerimkhulle S., Dildebayeva Z., Tokhmetov A. et al. Fuzzy Logic and Its Application in the Assessment of Information Security Risk of Industrial Internet of Things, Symmetry, 2023, Vol. 15, № 10, P. 1958. DOI: 10.3390/sym15101958

Savva M., Ioannou I., Vassiliou V. Fuzzy-Logic Based IDS for Detecting Jamming Attacks in Wireless Mesh IoT Networks, Mediterranean Communication and Computer Networking Conference (MedComNet), Paphos, 1–3 June 2022: proceedings. Paphos, IEEE, 2022, pp. 54–63. DOI: 10.48550/arXiv.2205.03797

Ishaque M., Khatibi A., Yamin M.et al. A novel hybrid technique using fuzzy logic, neural networks and genetic algorithm for intrusion detection system, Sensors, 2023, Vol. 30, P. 100933. DOI: 10.1016/j.measen.2023.100933

Iantorno M. S., Beladda K. Fuzzy Logic for Cybersecurity: Intrusion Detection and Privacy Preservation with Synthetic Data, Agents and Artificial Intelligence : 17th International Conference (ICAART), Porto, 26–28 February 2025: proceedings. Porto, SCITEPRESS, 2025, Vol. 3, pp. 376–382. DOI: 10.5220/0013137300003890

Antipov I., Vasylenko T. Identification of mobile devices by correlation features of their signal spectra, Radio Electronics, Computer Science, Control, 2024, № 4, pp. 6–12. DOI: 10.15588/1607-3274-2024-4-1

Antipov I., Vasilenko T. Improving the model of decision making about abnormal network state using a positioning

system, Eastern-European Journal of Enterprise Technologies, 2019, Vol. 1, № 9 (97), pp. 6–11. DOI: 10.15587/1729-4061.2019.157001

Downloads

Published

2026-03-27

How to Cite

Antipov, I., & Vasylenko, T. (2026). FUZZY-LOGIC ALGORITHM FOR RISK ASSESSMENT IN WI-FI NETWORKS. Radio Electronics, Computer Science, Control, (1), 6–15. https://doi.org/10.15588/1607-3274-2026-1-1

Issue

Section

Radio electronics and telecommunications