Skip to main content
Top
Published in: Wireless Personal Communications 2/2015

01-09-2015

Probabilistic Intrusion Detection in Randomly Deployed Wireless Sensor Networks

Authors: Anil Kumar Sagar, D. K. Lobiyal

Published in: Wireless Personal Communications | Issue 2/2015

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Wireless sensor networks (WSNs) are commonly used in surveillance to sense the event of interest in the monitoring field and report it to the sink in a timely manner. In Area coverage, network monitors the Area of interest and recognizes any intruder attempting to cross the monitoring Area. In this paper, we have analyzed the intruder detection probability with respect to network parameters such as sensing radius, node density. We also investigated the detection probability related to speed of intruder, availability of sensor nodes along with the time frame required to identify the intruder. In addition, we also discussed the k-detection probability to make the system more reliable. Furthermore in this paper we have also developed the analytical framework for the expected hop count in multi-hop WSN .

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38, 393–422.CrossRef Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38, 393–422.CrossRef
2.
go back to reference Wang, Y., Wang, X., Xie, B., Wang, D., & Agrawal, D. P. (2008). Intrusion detection in homogeneous and heterogeneous wireless sensor networks. IEEE Transactions on Mobile Computing, 7(6), 698–711.CrossRef Wang, Y., Wang, X., Xie, B., Wang, D., & Agrawal, D. P. (2008). Intrusion detection in homogeneous and heterogeneous wireless sensor networks. IEEE Transactions on Mobile Computing, 7(6), 698–711.CrossRef
3.
go back to reference Harada, J., Shioda, S., & Saito, H. (2008). Path coverage properties of randomly deployed sensors with finite data-transmission ranges. Computer Networks, 53, 1014–1026.CrossRef Harada, J., Shioda, S., & Saito, H. (2008). Path coverage properties of randomly deployed sensors with finite data-transmission ranges. Computer Networks, 53, 1014–1026.CrossRef
4.
go back to reference Chen, A., Lai, T. H., & Xuan, D. (2008). Measuring and guaranteeing quality of barrier-coverage in wireless sensor networks. In Proceedings of the 9th ACM international symposium on mobile ad hoc networking and computing, pp. 421–430. Chen, A., Lai, T. H., & Xuan, D. (2008). Measuring and guaranteeing quality of barrier-coverage in wireless sensor networks. In Proceedings of the 9th ACM international symposium on mobile ad hoc networking and computing, pp. 421–430.
5.
go back to reference Kumar, S., Lai, T. H., & Arora, A. (2005). Barrier coverage with wireless sensors. In Proceedings of the 11th annual international conference on Mobile computing and networking, pp. 284–298. Kumar, S., Lai, T. H., & Arora, A. (2005). Barrier coverage with wireless sensors. In Proceedings of the 11th annual international conference on Mobile computing and networking, pp. 284–298.
6.
go back to reference Li, L., Zhang, B., & Zheng, J. (2013). A study on one-dimensional k-coverage problem in wireless sensor networks. Wireless Communications and Mobile Computing, 13, 1–11.CrossRef Li, L., Zhang, B., & Zheng, J. (2013). A study on one-dimensional k-coverage problem in wireless sensor networks. Wireless Communications and Mobile Computing, 13, 1–11.CrossRef
7.
go back to reference Wang, Y., & Lun, Z. (2011). Intrusion detection in a K-Gaussian distributed wireless sensor network. Journal of Parallel and Distributed Computing, 71, 1598–1607.MATHCrossRef Wang, Y., & Lun, Z. (2011). Intrusion detection in a K-Gaussian distributed wireless sensor network. Journal of Parallel and Distributed Computing, 71, 1598–1607.MATHCrossRef
8.
go back to reference Xiao, Y., Chen, H., Wu, K., Sun, B., Zhang, Y., Sun, X., et al. (2010). Coverage and detection of a randomized scheduling algorithm in wireless sensor networks. IEEE Transactions on Computers, 59, 507–521.MathSciNetCrossRef Xiao, Y., Chen, H., Wu, K., Sun, B., Zhang, Y., Sun, X., et al. (2010). Coverage and detection of a randomized scheduling algorithm in wireless sensor networks. IEEE Transactions on Computers, 59, 507–521.MathSciNetCrossRef
9.
go back to reference Xiao, Y., Zhang, Y., Peng, M., Chen, H., Du, X., Sun, B., et al. (2009). Two and three-dimensional intrusion object detection under randomized scheduling algorithms in sensor networks. Computer Networks, 53, 2458–2475.MATHCrossRef Xiao, Y., Zhang, Y., Peng, M., Chen, H., Du, X., Sun, B., et al. (2009). Two and three-dimensional intrusion object detection under randomized scheduling algorithms in sensor networks. Computer Networks, 53, 2458–2475.MATHCrossRef
10.
go back to reference Mostafaei, H., & Meybodi, M. R. (2013). Maximizing lifetime of target coverage in wireless sensor networks using learning automata. Wireless Personal Communications, 71, 1461–1477.CrossRef Mostafaei, H., & Meybodi, M. R. (2013). Maximizing lifetime of target coverage in wireless sensor networks using learning automata. Wireless Personal Communications, 71, 1461–1477.CrossRef
11.
go back to reference Kumar, S., Lai, T. H., Andbalogh, J. (2004). On k-coverage in a mostly sleeping sensor network. InProceedings of MobiCom’04, pp. 144–158. Kumar, S., Lai, T. H., Andbalogh, J. (2004). On k-coverage in a mostly sleeping sensor network. InProceedings of MobiCom’04, pp. 144–158.
12.
go back to reference Harb, S. M., & McNair, J. (2008). Analytical study of the expected number of hops in wireless ad hoc network. WASA 2008, LNCS 5258, pp. 63–71. Harb, S. M., & McNair, J. (2008). Analytical study of the expected number of hops in wireless ad hoc network. WASA 2008, LNCS 5258, pp. 63–71.
13.
go back to reference Bettstetter, C. (2002). On the minimum node degree and connectivity of a wireless multihop network. In Proceedings of MOBIHOC’02, pp. 80–91. Bettstetter, C. (2002). On the minimum node degree and connectivity of a wireless multihop network. In Proceedings of MOBIHOC’02, pp. 80–91.
14.
go back to reference Ewens, W., & Grant, G. (2004). tatistical methods in bioinformatics: An introduction. Berlin: Springer. Ewens, W., & Grant, G. (2004). tatistical methods in bioinformatics: An introduction. Berlin: Springer.
Metadata
Title
Probabilistic Intrusion Detection in Randomly Deployed Wireless Sensor Networks
Authors
Anil Kumar Sagar
D. K. Lobiyal
Publication date
01-09-2015
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2015
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-2673-y

Other articles of this Issue 2/2015

Wireless Personal Communications 2/2015 Go to the issue