Efficient physical intrusion detection in Internet of Things: A Node deployment approach

被引:12
作者
Halder, Subir [1 ]
Ghosal, Amrita [1 ]
Conti, Mauro [1 ]
机构
[1] Univ Padua, Dept Math, Padua, Italy
关键词
Gaussian distribution; Internet of Things; Network connectivity; Node deployment; Physical intrusion detection; WIRELESS SENSOR NETWORKS; DEVICE-FREE LOCALIZATION; ENERGY; COVERAGE; LIFETIME; OPTIMIZATION; BARRIER; ATTACKS; IOT;
D O I
10.1016/j.comnet.2019.02.019
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In Internet of Things (IoT), intrusion detection plays an important role in many applications for detecting malicious intruders. The intruder can be, an unexpected physically moving entity, invading an area under surveillance, or an adversary in a battlefield. Node deployment strategy plays a crucial role in determining the intrusion detection capability of an loT network. With uniform deployment, the detection probability is the same for any location in the network area. Nevertheless, different applications may need diverse levels of detection probability at key areas within the network. For example, a battlefield surveillance application needs improved detection probability around the headquarter. On the contrary, a Gaussian deployment strategy provides improved detection probability to the key areas due to differentiated node density. However, it is neither energy-efficient nor provides a quick detection of the physical intruder. In this work, we introduce a novel deployment strategy to overcome the above said limitations of both uniform and Gaussian deployments for energy-efficient and quick detection. Initially, we investigate the problem of physical intrusion detection in our introduced deployment strategy considering a realistic sensing model. Furthermore, we examine the effects of different network parameters on the detection probability in details. We also derive the relationship between the different network parameters and connectivity to ensure fast detection. We perform exhaustive experiments on real datasets, primarily, in order to validate the correctness of modeling and analyses. Next, we examine the effects of different network parameters on the detection probability. The results clearly demonstrate that our approach improves the detection probability by more than 25% when compared to two well-known deployment strategies under various network parameters. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:28 / 46
页数:19
相关论文
共 51 条
  • [1] Optimal Control-Based Strategy for Sensor Deployment
    Ababnah, Ahmad
    Natarajan, Balasubramaniam
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2011, 41 (01): : 97 - 104
  • [2] A Distributed Fault-Tolerant Topology Control Algorithm for Heterogeneous Wireless Sensor Networks
    Bagci, Hakki
    Korpeoglu, Ibrahim
    Yazici, Adnan
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (04) : 914 - 923
  • [3] Random vs. Deterministic Deployment of Sensors in the Presence of Failures and Placement Errors
    Balister, Paul
    Kumar, Santosh
    [J]. IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 2896 - 2900
  • [4] A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Toward Universal and Resilient Systems
    Benkhelifa, Elhadj
    Welsh, Thomas
    Hamouda, Walaa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04): : 3496 - 3509
  • [5] FitLoc: Fine-Grained and Low-Cost Device-Free Localization for Multiple Targets Over Various Areas
    Chang, Liqiong
    Chen, Xiaojiang
    Wang, Yu
    Fang, Dingyi
    Wang, Ju
    Xing, Tianzhang
    Tang, Zhanyong
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2017, 25 (04) : 1994 - 2007
  • [6] Energy-Efficient Intrusion Detection with a Barrier of Probabilistic Sensors: Global and Local
    Chen, Jiming
    Li, Junkun
    Lai, Ten H.
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2013, 12 (09) : 4742 - 4755
  • [7] Beyond triplet loss: a deep quadruplet network for person re-identification
    Chen, Weihua
    Chen, Xiaotang
    Zhang, Jianguo
    Huang, Kaiqi
    [J]. 30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017), 2017, : 1320 - 1329
  • [8] Conti M, 2015, SECURE WIRELESS SENS
  • [9] WSN- and IOT-Based Smart Homes and Their Extension to Smart Buildings
    Ghayvat, Hemant
    Mukhopadhyay, Subhas
    Gui, Xiang
    Suryadevara, Nagender
    [J]. SENSORS, 2015, 15 (05): : 10350 - 10379
  • [10] Ghosal A., 2015, LNCS, V8956, P406