Probabilistic Intrusion Detection in Randomly Deployed Wireless Sensor Networks

被引:0
作者
Anil Kumar Sagar
D. K. Lobiyal
机构
[1] Jawaharlal Nehru University,School of Computer and Systems Sciences
来源
Wireless Personal Communications | 2015年 / 84卷
关键词
Wireless sensor networks; Detection probability; Detection latency; Sensing radius; Hop count;
D O I
暂无
中图分类号
学科分类号
摘要
Wireless sensor networks (WSNs) are commonly used in surveillance to sense the event of interest in the monitoring field and report it to the sink in a timely manner. In Area coverage, network monitors the Area of interest and recognizes any intruder attempting to cross the monitoring Area. In this paper, we have analyzed the intruder detection probability with respect to network parameters such as sensing radius, node density. We also investigated the detection probability related to speed of intruder, availability of sensor nodes along with the time frame required to identify the intruder. In addition, we also discussed the k-detection probability to make the system more reliable. Furthermore in this paper we have also developed the analytical framework for the expected hop count in multi-hop WSN .
引用
收藏
页码:1017 / 1037
页数:20
相关论文
共 32 条
  • [1] Akyildiz IF(2002)Wireless sensor networks: A survey Computer Networks 38 393-422
  • [2] Su W(2008)Intrusion detection in homogeneous and heterogeneous wireless sensor networks IEEE Transactions on Mobile Computing 7 698-711
  • [3] Sankarasubramaniam Y(2008)Path coverage properties of randomly deployed sensors with finite data-transmission ranges Computer Networks 53 1014-1026
  • [4] Cayirci E(2013)A study on one-dimensional k-coverage problem in wireless sensor networks Wireless Communications and Mobile Computing 13 1-11
  • [5] Wang Y(2011)Intrusion detection in a K-Gaussian distributed wireless sensor network Journal of Parallel and Distributed Computing 71 1598-1607
  • [6] Wang X(2010)Coverage and detection of a randomized scheduling algorithm in wireless sensor networks IEEE Transactions on Computers 59 507-521
  • [7] Xie B(2009)Two and three-dimensional intrusion object detection under randomized scheduling algorithms in sensor networks Computer Networks 53 2458-2475
  • [8] Wang D(2013)Maximizing lifetime of target coverage in wireless sensor networks using learning automata Wireless Personal Communications 71 1461-1477
  • [9] Agrawal DP(undefined)undefined undefined undefined undefined-undefined
  • [10] Harada J(undefined)undefined undefined undefined undefined-undefined