Detection of attacker and location in wireless sensor network as an application for border surveillance

被引:7
作者
Aseeri, Mohammed [1 ]
Ahmed, Muhammad [2 ]
Shakib, Mohammed [3 ]
Ghorbel, Oussama [4 ]
Shaman, Hussian [1 ]
机构
[1] King Abdulaziz City Sci & Technol, PBO 6086, Riyadh 11442, Saudi Arabia
[2] Univ Portsmouth, Portsmouth, Hants, England
[3] Univ Malaya, Kuala Lumpur, Malaysia
[4] Univ Sfax, Sfax, Tunisia
来源
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS | 2017年 / 13卷 / 11期
关键词
Wireless sensor networks; border surveillance; Time difference of arrival; Dempster-Shafer theory;
D O I
10.1177/1550147717740072
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Border surveillance is one of the high priority in the security of countries around the world. Typical and traditional border observations involve troops and checkpoints at borders, but these do not provide complete security. One effective solution is the addition of smart fencing to enhance surveillance in a Border Patrol system. More specifically, effective border security can be achieved through the introduction of autonomous surveillance and the utilization of wireless sensor networks. Collectively, these wireless sensor networks will create a virtual fencing system comprising a large number of heterogeneous sensor devices. These devices are embedded with cameras and other sensors that provide a continuous monitor. However, to achieve an efficient wireless sensor network, its own security must be assured. This article focuses on the detection of attacks by unknown trespassers (perpetrators) on border surveillance sensor networks. We use both the Dempster-Shafer theory and the time difference of arrival method to identify and locate an attacked node. Simulation results show that the proposed scheme is both plausible and effective.
引用
收藏
页数:8
相关论文
共 50 条
[31]   Low Cost Wireless Sensor Network for Vibration Detection [J].
Ballestrin, Rogerio ;
Bender, Renar ;
Brusamarello, Valner ;
Mueller, Ivan .
2017 2ND INTERNATIONAL SYMPOSIUM ON INSTRUMENTATION SYSTEMS, CIRCUITS AND TRANSDUCERS (INSCIT), 2017, :82-87
[32]   Wireless Sensor Network Application Programming and Simulation System [J].
Zivanov, Zarko ;
Rakic, Predrag ;
Hajdukovic, Miroslav .
COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2008, 5 (01) :109-126
[33]   A wireless sensor network reliable architecture for intrusion detection [J].
Lanuendorfer, Peter ;
Grilo, Antonio, Jr. ;
Piotrowski, Krzysztof ;
Casaca, August .
2008 NEXT GENERATION INTERNET NETWORKS AND 4TH EURONGI CONFERENCE ON NEXT GENERATION INTERNET NETWORKS, PROCEEDINGS, 2008, :189-+
[34]   In-network outlier detection in wireless sensor networks [J].
Joel W. Branch ;
Chris Giannella ;
Boleslaw Szymanski ;
Ran Wolff ;
Hillol Kargupta .
Knowledge and Information Systems, 2013, 34 :23-54
[35]   A Wireless Sensor Network Architecture for Homeland Security Application [J].
Grilo, Antonio ;
Piotrowski, Krzysztof ;
Langendoerfer, Peter ;
Casaca, Augusto .
AD-HOC, MOBILE AND WIRELESS NETWORKS, PROCEEDINGS, 2009, 5793 :397-+
[36]   Routing Attacks Detection Method of Wireless Sensor Network [J].
Li, Yongzhong ;
Du, Miao ;
Li, Yi .
14TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM 2018), 2018, 306 :255-265
[37]   A smart wireless sensor network node for fire detection [J].
Khalid, Wajahat ;
Sattar, Asma ;
Qureshi, Muhammad Ali ;
Amin, Asjad ;
Malik, Mobeen Ahmed ;
Memon, Kashif Hussain .
TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2019, 27 (04) :2541-2556
[38]   A Framework for Application Centric Wireless Sensor Network Management [J].
Parameswaran, N. ;
Srivathsan, S. ;
Iyengar, S. S. .
2009 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS 2009), 2009, :17-+
[39]   In-network outlier detection in wireless sensor networks [J].
Branch, Joel W. ;
Giannella, Chris ;
Szymanski, Boleslaw ;
Wolff, Ran ;
Kargupta, Hillol .
KNOWLEDGE AND INFORMATION SYSTEMS, 2013, 34 (01) :23-54
[40]   Distributed Location and Trust Based Replica Detection in Wireless Sensor Networks [J].
G. Amudha ;
P. Narayanasamy .
Wireless Personal Communications, 2018, 102 :3303-3321