Detection of attacker and location in wireless sensor network as an application for border surveillance

被引:7
作者
Aseeri, Mohammed [1 ]
Ahmed, Muhammad [2 ]
Shakib, Mohammed [3 ]
Ghorbel, Oussama [4 ]
Shaman, Hussian [1 ]
机构
[1] King Abdulaziz City Sci & Technol, PBO 6086, Riyadh 11442, Saudi Arabia
[2] Univ Portsmouth, Portsmouth, Hants, England
[3] Univ Malaya, Kuala Lumpur, Malaysia
[4] Univ Sfax, Sfax, Tunisia
关键词
Wireless sensor networks; border surveillance; Time difference of arrival; Dempster-Shafer theory;
D O I
10.1177/1550147717740072
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Border surveillance is one of the high priority in the security of countries around the world. Typical and traditional border observations involve troops and checkpoints at borders, but these do not provide complete security. One effective solution is the addition of smart fencing to enhance surveillance in a Border Patrol system. More specifically, effective border security can be achieved through the introduction of autonomous surveillance and the utilization of wireless sensor networks. Collectively, these wireless sensor networks will create a virtual fencing system comprising a large number of heterogeneous sensor devices. These devices are embedded with cameras and other sensors that provide a continuous monitor. However, to achieve an efficient wireless sensor network, its own security must be assured. This article focuses on the detection of attacks by unknown trespassers (perpetrators) on border surveillance sensor networks. We use both the Dempster-Shafer theory and the time difference of arrival method to identify and locate an attacked node. Simulation results show that the proposed scheme is both plausible and effective.
引用
收藏
页数:8
相关论文
共 50 条
[21]   A Distributed Border Surveillance (DBS) System for Rectangular and Circular Region of Interest with Wireless Sensor Networks in Shadowed Environments [J].
J. Amutha ;
Jaiprakash Nagar ;
Sandeep Sharma .
Wireless Personal Communications, 2021, 117 :2135-2155
[22]   A Distributed Border Surveillance (DBS) System for Rectangular and Circular Region of Interest with Wireless Sensor Networks in Shadowed Environments [J].
Amutha, J. ;
Nagar, Jaiprakash ;
Sharma, Sandeep .
WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (03) :2135-2155
[23]   Optimal Base Station Location for Network Lifetime Maximization in Wireless Sensor Network [J].
Mukase, Sandrine ;
Xia, Kewen ;
Umar, Abubakar .
ELECTRONICS, 2021, 10 (22)
[24]   Routing Protocols for Border Surveillance Using ZigBee-Based Wireless Sensor Networks [J].
Sharei-Amarghan, Hoda ;
Keshavarz-Haddad, Alireza ;
Garraux, Gaetan .
COMPUTER NETWORKS, CN 2013, 2013, 370 :114-123
[25]   Location estimation and detection in wireless sensor networks in the presence of fading [J].
Zhang, Xue ;
Tepedelenlioglu, Cihan ;
Banavar, Mahesh K. ;
Spanias, Andreas ;
Muniraju, Gowtham .
PHYSICAL COMMUNICATION, 2019, 32 :62-74
[26]   Location and Time Based Clone Detection in Wireless Sensor Networks [J].
Sivaraj, R. ;
Thangarajan, R. .
2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, :133-137
[27]   Finding location of fake and phantom source for source location privacy in wireless sensor network [J].
Rimjhim ;
Roy, Pradeep Kumar ;
Singh, Jyoti Prakash .
INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2021, 26 (01) :114-134
[28]   PLACE: Protocol for Location and Coordinate Estimation - a wireless sensor network approach [J].
Zhang, YC ;
Cheng, LN .
COMPUTER NETWORKS, 2004, 46 (05) :679-693
[29]   Wireless Sensor Network Location Algorithms Based on Kernel Adaptive Filtering [J].
Li J. ;
Zhao C. .
Nongye Jixie Xuebao/Transactions of the Chinese Society for Agricultural Machinery, 2018, 49 (04) :241-248
[30]   A Framework for Application Centric Wireless Sensor Network Management [J].
Parameswaran, N. ;
Srivathsan, S. ;
Iyengar, S. S. .
2009 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS 2009), 2009, :17-+