Skip to main content
Erschienen in: Wireless Personal Communications 3/2020

29.08.2020

Intrusion Detection in Mobile Sensor Networks: A Case Study for Different Intrusion Paths

verfasst von: Sandeep Sharma, Jaiprakash Nagar

Erschienen in: Wireless Personal Communications | Ausgabe 3/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Intrusion detection is a very sensitive and major concern in wireless sensor networks. In border areas, sensors are installed to discover the presence of enemies or any trace passing in a prohibited area or any vicious moving object in the region of interest. In order to gain access to a region of interest, an intruder can take various paths, i.e., it can move along a straight line, follow a zigzag path or a curved path and move at a particular angle to cross the region without being detected and to improve its attacking ability. This paper formulates and analyzes \(\kappa\)-barrier coverage probability which acts as the intrusion detection probability for an intruder when the intruder follows different paths at different path angles with respect to the shortest path to cross the region of interest in a mobile sensor network. Furthermore, the effect of different network variables such as node density, sensing range, intrusion path angle and the ratio of sensor to intruder velocity on intrusion detection probability are also investigated. It is believed that the proposed model renders an effective tool to incorporate the intruder’s movement pattern in the design of an advanced finite wireless sensor network.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Nagar, J., Chaturvedi, S. K., & Soh, S. (2020). An analytical model to estimate the performance metrics of a finite multihop network deployed in a rectangular region. Journal of Network and Computer Applications, 149, 102466.CrossRef Nagar, J., Chaturvedi, S. K., & Soh, S. (2020). An analytical model to estimate the performance metrics of a finite multihop network deployed in a rectangular region. Journal of Network and Computer Applications, 149, 102466.CrossRef
2.
Zurück zum Zitat Wang, Y., Wang, X., Xie, B., Wang, D., & Agrawal, D. P. (2008). Intrusion detection in homogeneous and heterogeneous wireless sensor networks. IEEE Transactions on Mobile Computing, 7(6), 698–711.CrossRef Wang, Y., Wang, X., Xie, B., Wang, D., & Agrawal, D. P. (2008). Intrusion detection in homogeneous and heterogeneous wireless sensor networks. IEEE Transactions on Mobile Computing, 7(6), 698–711.CrossRef
3.
Zurück zum Zitat Assad, N., Elbhiri, B., EL Fkihi, S., Faqihi, M. A., Ouadou, M., & Aboutajdine, D. (2014). Short: Intrusion detection quality analysis for homogeneous wireless sensor networks. In Networked systems, 8593, (pp. 324–329). Assad, N., Elbhiri, B., EL Fkihi, S., Faqihi, M. A., Ouadou, M., & Aboutajdine, D. (2014). Short: Intrusion detection quality analysis for homogeneous wireless sensor networks. In Networked systems, 8593, (pp. 324–329).
4.
Zurück zum Zitat Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys & Tutorials, 16(1), 266–282.CrossRef Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys & Tutorials, 16(1), 266–282.CrossRef
5.
Zurück zum Zitat Nagar, J., & Sharma, S. (2018). k-barrier coverage-based intrusion detection for wireless sensor networks. In M. Bokhari, N. Agrawal, & D. Saini (Eds.), Cyber security (Vol. 729)., Advances in intelligent systems and computing Singapore: Springer. Nagar, J., & Sharma, S. (2018). k-barrier coverage-based intrusion detection for wireless sensor networks. In M. Bokhari, N. Agrawal, & D. Saini (Eds.), Cyber security (Vol. 729)., Advances in intelligent systems and computing Singapore: Springer.
6.
Zurück zum Zitat Abdellatif, T., & Mosbah, M. (2018). Efficient monitoring for intrusion detection in wireless sensor networks. Concurrency and Computation: Practice and Experience, 32, 1–13. Abdellatif, T., & Mosbah, M. (2018). Efficient monitoring for intrusion detection in wireless sensor networks. Concurrency and Computation: Practice and Experience, 32, 1–13.
7.
Zurück zum Zitat Verma, A., & Ranga, V. (2020). Machine learning based intrusion detection systems for IoT applications. Wireless Personal Communications, 111, 2287–2310.CrossRef Verma, A., & Ranga, V. (2020). Machine learning based intrusion detection systems for IoT applications. Wireless Personal Communications, 111, 2287–2310.CrossRef
8.
Zurück zum Zitat Zhang, R., & Xiao, X. (2019). Intrusion Detection in wireless sensor networks with an improved NSA based on space division. Journal of Sensors, 2019, 1–20. Zhang, R., & Xiao, X. (2019). Intrusion Detection in wireless sensor networks with an improved NSA based on space division. Journal of Sensors, 2019, 1–20.
9.
Zurück zum Zitat Wang, Y., Weihuang, F., & Agrawal, D. P. (2013). Gaussian versus uniform distribution for intrusion detection in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 24(2), 342–355.CrossRef Wang, Y., Weihuang, F., & Agrawal, D. P. (2013). Gaussian versus uniform distribution for intrusion detection in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 24(2), 342–355.CrossRef
10.
Zurück zum Zitat Ghosh, K., Neogy, S., Das, P. K., & Mehta, M. (2018). Intrusion detection at international borders and large military barracks with multi-sink wireless sensor networks: An energy efficient solution. Wireless Personal Communication, 98, 1083–1101.CrossRef Ghosh, K., Neogy, S., Das, P. K., & Mehta, M. (2018). Intrusion detection at international borders and large military barracks with multi-sink wireless sensor networks: An energy efficient solution. Wireless Personal Communication, 98, 1083–1101.CrossRef
11.
Zurück zum Zitat Arjun, D., Indukala, P. K., & Unikrishna Menon K. A. (2017). border surveillance and intruder detection using wireless sensor networks: A brief survey. In International conference on communication and signal processing, April 6-8, 2017, India. Arjun, D., Indukala, P. K., & Unikrishna Menon K. A. (2017). border surveillance and intruder detection using wireless sensor networks: A brief survey. In International conference on communication and signal processing, April 6-8, 2017, India.
12.
Zurück zum Zitat Phipatanasuphorn, V., & Ramanathan, P. (2004). Vulnerability of sensor networks to unauthorized traversal and monitoring. IEEE Transactions on Computers, 53(3), 364–369.CrossRef Phipatanasuphorn, V., & Ramanathan, P. (2004). Vulnerability of sensor networks to unauthorized traversal and monitoring. IEEE Transactions on Computers, 53(3), 364–369.CrossRef
13.
Zurück zum Zitat Liu, B., Dousse, O., Nain, P., & Towsley, D. (2013). Dynamic coverage of mobile sensor networks. IEEE Transactions on Parallel and Distributed Systems, 24(2), 301–311.CrossRef Liu, B., Dousse, O., Nain, P., & Towsley, D. (2013). Dynamic coverage of mobile sensor networks. IEEE Transactions on Parallel and Distributed Systems, 24(2), 301–311.CrossRef
14.
Zurück zum Zitat Liu, B., Brass, P., Dousse, O., Nain, P., & Towsley, D. (2005). Mobility improves coverage of sensor networks. In Proceedings of the 6th ACM international symposium on mobile Ad Hoc networking and computing (Mobihoc), (pp. 300–308). Liu, B., Brass, P., Dousse, O., Nain, P., & Towsley, D. (2005). Mobility improves coverage of sensor networks. In Proceedings of the 6th ACM international symposium on mobile Ad Hoc networking and computing (Mobihoc), (pp. 300–308).
15.
Zurück zum Zitat Keung, G. Y., Li, B., & Zhang, Q. (2012). The intrusion detection in mobile sensor network. IEEE/ACM Transactions on Networking, 20(4), 1152–1161.CrossRef Keung, G. Y., Li, B., & Zhang, Q. (2012). The intrusion detection in mobile sensor network. IEEE/ACM Transactions on Networking, 20(4), 1152–1161.CrossRef
16.
Zurück zum Zitat Sagar, A. K., & Lobiyal, D. K. (2015). Probabilistic intrusion detection in randomly deployed wireless sensor networks. Wireless Personal Communications, 84(2), 1017–1037.CrossRef Sagar, A. K., & Lobiyal, D. K. (2015). Probabilistic intrusion detection in randomly deployed wireless sensor networks. Wireless Personal Communications, 84(2), 1017–1037.CrossRef
17.
Zurück zum Zitat Wang, Y. (2009). Intrusion detection in Gaussian distributed heterogeneous wireless sensor networks. In IEEE GLOBECOM, (pp. 1–6). Wang, Y. (2009). Intrusion detection in Gaussian distributed heterogeneous wireless sensor networks. In IEEE GLOBECOM, (pp. 1–6).
18.
Zurück zum Zitat Keramatpour, A., Nikanjam, A., & Ghaffarian, H. (2017). Deployment of wireless intrusion detection systems to provide the most possible coverage in wireless sensor networks without infrastructures. Wireless Personal Communication, 96, 3965–3978.CrossRef Keramatpour, A., Nikanjam, A., & Ghaffarian, H. (2017). Deployment of wireless intrusion detection systems to provide the most possible coverage in wireless sensor networks without infrastructures. Wireless Personal Communication, 96, 3965–3978.CrossRef
19.
Zurück zum Zitat Olteanu, A., Xiao, Y., Wu, K., & Xiaojiang, (2010). Weaving a proper net to catch large objects in wireless sensor networks. IEEE Transactions on Wireless Communication, 9(4), 1360–1369.CrossRef Olteanu, A., Xiao, Y., Wu, K., & Xiaojiang, (2010). Weaving a proper net to catch large objects in wireless sensor networks. IEEE Transactions on Wireless Communication, 9(4), 1360–1369.CrossRef
20.
Zurück zum Zitat Mostafaei, H., & Meybodi, M. R. (2014). An energy efficient barrier coverage algorithm for wireless sensor networks. Wireless Personal Communication, 77(3), 2099–2115.CrossRef Mostafaei, H., & Meybodi, M. R. (2014). An energy efficient barrier coverage algorithm for wireless sensor networks. Wireless Personal Communication, 77(3), 2099–2115.CrossRef
21.
Zurück zum Zitat Wang, Y., Chu, W., Fields, S., Heinemann, C., & Reiter, Z. (2016). Detection of intelligent intruders in wireless sensor networks. Future Internet, 8(2), 1–18. Wang, Y., Chu, W., Fields, S., Heinemann, C., & Reiter, Z. (2016). Detection of intelligent intruders in wireless sensor networks. Future Internet, 8(2), 1–18.
22.
Zurück zum Zitat Wang, Y, Leow, Y. K., & Yin, J. (2009). Is straight-line path always the best for intrusion detection in wireless sensor networks?. In IEEE 15th ICPDS, (pp. 564–571). Wang, Y, Leow, Y. K., & Yin, J. (2009). Is straight-line path always the best for intrusion detection in wireless sensor networks?. In IEEE 15th ICPDS, (pp. 564–571).
23.
Zurück zum Zitat Hossain, A., Biswas, P. K., Chakrabarti, S. (2008). Sensing models and its impact on network coverage in wireless sensor network. In 3rd International Conference on Industrial and Information Systems (ICIIS), (pp. 1–5). Hossain, A., Biswas, P. K., Chakrabarti, S. (2008). Sensing models and its impact on network coverage in wireless sensor network. In 3rd International Conference on Industrial and Information Systems (ICIIS), (pp. 1–5).
24.
Zurück zum Zitat Amutha, J., Sharma, S., & Nagar, J. (2020). WSN Strategies based on sensors, deployment, sensing models, coverage and energy efficiency: Review, approaches and open issues. Wireless Personal Communications, 111, 1089–1115.CrossRef Amutha, J., Sharma, S., & Nagar, J. (2020). WSN Strategies based on sensors, deployment, sensing models, coverage and energy efficiency: Review, approaches and open issues. Wireless Personal Communications, 111, 1089–1115.CrossRef
25.
Zurück zum Zitat Camp, T., Boleng, J., & Davies, V. (2002). A survey of mobility models for ad hoc network research. Wireless Communications & Mobile Computing, 2(5), 483–502.CrossRef Camp, T., Boleng, J., & Davies, V. (2002). A survey of mobility models for ad hoc network research. Wireless Communications & Mobile Computing, 2(5), 483–502.CrossRef
26.
Zurück zum Zitat Kabilan, K., Bhalaji, N., Selvaraj, C., Kumaar, M. B., & Karthikeyan, P. T. R. (2018). Performance analysis of IoT protocol under different mobility models. Computers & Electrical Engineering, 72, 154–168.CrossRef Kabilan, K., Bhalaji, N., Selvaraj, C., Kumaar, M. B., & Karthikeyan, P. T. R. (2018). Performance analysis of IoT protocol under different mobility models. Computers & Electrical Engineering, 72, 154–168.CrossRef
Metadaten
Titel
Intrusion Detection in Mobile Sensor Networks: A Case Study for Different Intrusion Paths
verfasst von
Sandeep Sharma
Jaiprakash Nagar
Publikationsdatum
29.08.2020
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2020
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07697-1

Weitere Artikel der Ausgabe 3/2020

Wireless Personal Communications 3/2020 Zur Ausgabe

Neuer Inhalt