This Article 
 Bibliographic References 
 Add to: 
Vulnerability of Sensor Networks to Unauthorized Traversal and Monitoring
March 2004 (vol. 53 no. 3)
pp. 364-369

Abstract—There is a growing interest in the use of wireless ad hoc sensor networks to monitor, detect, and track the movement of specified targets in a geographic region. A common concern in the deployment of such networks is whether or not a target can pass or intrude a sensor field without being detected. Recent papers in the literature have defined a measure called exposure to quantify the likelihood of a target passing through a sensor field without being detected. These papers differ in the definition of exposure. Also, the existing definitions of exposure are indicators of the likelihood of intrusion and not a direct measure of it. In this paper, we directly work with probability of detection instead of its indicators. We also probabilistically account for the presence of noise in the sensor readings. In the presence of noise, there is a trade off between the probability of a target passing through a sensor field without detection and the false alarm probability (i.e., the probability of falsely detecting the presence of target). We analytically characterize this trade off and illustrate the trade off for example deployments. We also introduce a variant of the traversal problem called unauthorized monitoring. This problem is of interest if sensor fields are used to secure an asset. We analytically characterize the probability of detecting unauthorized monitoring. We also show a trade off between this probability and the corresponding false alarm probability in the presence of noise.

[1] G.J. Pottie and W.J. Kaiser, Wireless Integrated Network Sensors Comm. ACM, vol. 43, pp. 51-66, May 2000.
[2], 2001.
[3] S. Meguerdichian, F. Koushanfar, M. Potkonjak, and M.B. Srivastava, Coverage Problems in Wireless Ad-Hoc Sensor Networks Proc. IEEE Infocom '01, pp. 1380-1387, 2001.
[4] S. Meguerdichian, F. Koushanfar, G. Qu, and M. Potkonjak, Exposure in Wireless Ad-Hoc Sensor Networks Proc. MOBICOM, pp. 139-150, July 2001.
[5] S. Meguerdichian, S. Slijepcevic, V. Karayan, and M. Potkonjak, Localized Algorithms in Wireless Ad-Hoc Networks: Location Discovery and Sensor Exposure Proc. MOBIHOC, pp. 106-116, Oct. 2001.
[6] M. Hata, Empirical Formula for Propagation Loss in Land Mobile Radio Services IEEE Trans. Vehicular Technology, vol. 29, pp. 317-325, Aug. 1980.
[7] T. Clouqueur, P. Ramanathan, K.K. Saluja, and K.-C. Wang, Value-Fusion versus Decision-Fusion for Fault-Tolerance in Collaborative Target Detection in Sensor Networks Proc. Fourth Int'l Conf. Information Fusion, Aug. 2001.
[8] S. Baase and A.V. Gelder, Computer Algorithms: Introduction to Design and Analysis. Addison-Wesley, 2000.

Index Terms:
Wireless ad hoc networks, sensor deployment, sensor exposure problem.
Veradej Phipatanasuphorn, Parameswaran Ramanathan, "Vulnerability of Sensor Networks to Unauthorized Traversal and Monitoring," IEEE Transactions on Computers, vol. 53, no. 3, pp. 364-369, March 2004, doi:10.1109/TC.2004.1261841
Usage of this product signifies your acceptance of the Terms of Use.