Detection of attacker and location in wireless sensor network as an application for border surveillance

被引:7
作者
Aseeri, Mohammed [1 ]
Ahmed, Muhammad [2 ]
Shakib, Mohammed [3 ]
Ghorbel, Oussama [4 ]
Shaman, Hussian [1 ]
机构
[1] King Abdulaziz City Sci & Technol, PBO 6086, Riyadh 11442, Saudi Arabia
[2] Univ Portsmouth, Portsmouth, Hants, England
[3] Univ Malaya, Kuala Lumpur, Malaysia
[4] Univ Sfax, Sfax, Tunisia
来源
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS | 2017年 / 13卷 / 11期
关键词
Wireless sensor networks; border surveillance; Time difference of arrival; Dempster-Shafer theory;
D O I
10.1177/1550147717740072
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Border surveillance is one of the high priority in the security of countries around the world. Typical and traditional border observations involve troops and checkpoints at borders, but these do not provide complete security. One effective solution is the addition of smart fencing to enhance surveillance in a Border Patrol system. More specifically, effective border security can be achieved through the introduction of autonomous surveillance and the utilization of wireless sensor networks. Collectively, these wireless sensor networks will create a virtual fencing system comprising a large number of heterogeneous sensor devices. These devices are embedded with cameras and other sensors that provide a continuous monitor. However, to achieve an efficient wireless sensor network, its own security must be assured. This article focuses on the detection of attacks by unknown trespassers (perpetrators) on border surveillance sensor networks. We use both the Dempster-Shafer theory and the time difference of arrival method to identify and locate an attacked node. Simulation results show that the proposed scheme is both plausible and effective.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] Optimal Base Station Location for Network Lifetime Maximization in Wireless Sensor Network
    Mukase, Sandrine
    Xia, Kewen
    Umar, Abubakar
    ELECTRONICS, 2021, 10 (22)
  • [22] A Distributed Border Surveillance (DBS) System for Rectangular and Circular Region of Interest with Wireless Sensor Networks in Shadowed Environments
    Amutha, J.
    Nagar, Jaiprakash
    Sharma, Sandeep
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (03) : 2135 - 2155
  • [23] A Distributed Border Surveillance (DBS) System for Rectangular and Circular Region of Interest with Wireless Sensor Networks in Shadowed Environments
    J. Amutha
    Jaiprakash Nagar
    Sandeep Sharma
    Wireless Personal Communications, 2021, 117 : 2135 - 2155
  • [24] Location estimation and detection in wireless sensor networks in the presence of fading
    Zhang, Xue
    Tepedelenlioglu, Cihan
    Banavar, Mahesh K.
    Spanias, Andreas
    Muniraju, Gowtham
    PHYSICAL COMMUNICATION, 2019, 32 : 62 - 74
  • [25] Location and Time Based Clone Detection in Wireless Sensor Networks
    Sivaraj, R.
    Thangarajan, R.
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 133 - 137
  • [26] Sensor Fusion for Distributed Detection of Mobile Intruders in Surveillance Wireless Sensor Networks
    Sharma, Anamika
    Chauhan, Siddhartha
    IEEE SENSORS JOURNAL, 2020, 20 (24) : 15224 - 15231
  • [27] Finding location of fake and phantom source for source location privacy in wireless sensor network
    Rimjhim
    Roy, Pradeep Kumar
    Singh, Jyoti Prakash
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2021, 26 (01) : 114 - 134
  • [28] Wireless Sensor Network Location Algorithms Based on Kernel Adaptive Filtering
    Li J.
    Zhao C.
    Nongye Jixie Xuebao/Transactions of the Chinese Society for Agricultural Machinery, 2018, 49 (04): : 241 - 248
  • [29] PLACE: Protocol for Location and Coordinate Estimation - a wireless sensor network approach
    Zhang, YC
    Cheng, LN
    COMPUTER NETWORKS, 2004, 46 (05) : 679 - 693
  • [30] In-network outlier detection in wireless sensor networks
    Joel W. Branch
    Chris Giannella
    Boleslaw Szymanski
    Ran Wolff
    Hillol Kargupta
    Knowledge and Information Systems, 2013, 34 : 23 - 54