The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - Feb. (2013 vol.24)
pp: 342-355
Yun Wang , Bradley University, Peoria
Weihuang Fu , University of Cincinnati, Cincinnati
Dharma P. Agrawal , University of Cincinnati, Cincinnati
ABSTRACT
In a Wireless Sensor Network (WSN), intrusion detection is of significant importance in many applications in detecting malicious or unexpected intruder(s). The intruder can be an enemy in a battlefield, or a malicious moving object in the area of interest. With uniform sensor deployment, the detection probability is the same for any point in a WSN. However, some applications may require different degrees of detection probability at different locations. For example, an intrusion detection application may need improved detection probability around important entities. Gaussian-distributed WSNs can provide differentiated detection capabilities at different locations but related work is limited. This paper analyzes the problem of intrusion detection in a Gaussian-distributed WSN by characterizing the detection probability with respect to the application requirements and the network parameters under both single-sensing detection and multiple-sensing detection scenarios. Effects of different network parameters on the detection probability are examined in detail. Furthermore, performance of Gaussian-distributed WSNs is compared with uniformly distributed WSNs. This work allows us to analytically formulate detection probability in a random WSN and provides guidelines in selecting an appropriate deployment strategy and determining critical network parameters.
INDEX TERMS
Wireless sensor networks, Intrusion detection, Sensors, Gaussian distribution, Analytical models, Mathematical model, Equations, wireless sensor network, Gaussian distribution, intrusion detection, network deployment, uniform distribution, sensing range
CITATION
Yun Wang, Weihuang Fu, Dharma P. Agrawal, "Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks", IEEE Transactions on Parallel & Distributed Systems, vol.24, no. 2, pp. 342-355, Feb. 2013, doi:10.1109/TPDS.2012.105
REFERENCES
[1] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A Survey on Wireless Sensor Networks," IEEE Comm. Magazine, vol. 40, no. 8, pp. 102-114, Aug. 2002.
[2] K. Sohraby, D. Minoli, and T. Znati, Wireless Sensor Networks: Technology, Protocols, and Applications. John Wiley and Sons, Inc., 2007.
[3] J.N. Al-Karaki and A.E. Kamal, "Routing Techniques in Wireless Sensor Networks: A Survey," IEEE Wireless Comm., vol. 11, no. 6, pp. 6-28, Dec. 2004.
[4] S. Tilak, N.B. Abu-Ghazaleh, and W. Heinzelman, "A Taxonomy of Wireless Micro-Sensor Network Models," ACM Mobile Computing and Comm. Rev., vol. 6, no. 2, pp. 28-36, Apr. 2002.
[5] A. Agah, S. Das, K. Basu, and M. Asadi, "Intrusion Detection in Sensor Networks: A Non-Cooperative Game Approach," Proc. Third IEEE Int'l Symp. Network Computing and Applications (NCA '04), pp. 343-346, 2004.
[6] A. Agah, S. Das, and K. Basu, "A Game Theory Based Approach for Security in Wireless Sensor Networks," Proc. IEEE Int'l Conf. Performance, Computing, and Comm., pp. 259-263, 2004.
[7] V. Giruka, M. Singhal, J. Royalty, and S. Varanasi, "Security in Wireless Sensor Networks," Wireless Comm. and Mobile Computing, vol. 8, no. 1, pp. 1-24, 2008.
[8] A. Arora, P. Dutta, S. Bapat, V. Kulathumani, H. Zhang, V. Naik, V. Mittal, H. Cao, M. Demirbas, and M. Gouda, "A Line in the Sand: A Wireless Sensor Network for Target Detection, Classification, and Tracking," Computer Networks, vol. 46, no. 5, pp. 605-634, 2004.
[9] Y. Wang, X. Wang, B. Xie, D. Wang, and D.P. Agrawal, "Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks," IEEE Trans. Mobile Computing, vol. 7, no. 6, pp. 698-711, June 2008.
[10] O. Dousse, C. Tavoularis, and P. Thiran, "Delay of Intrusion Detection in Wireless Sensor Networks," Proc. MobiHoc, 2006.
[11] H. Kung and D. Vlah, "Efficient Location Tracking Using Sensor Networks," Proc. IEEE Wireless Comm. and Networking Conf., vol. 3, pp. 1954-1961, Mar. 2003.
[12] C.-Y. Lin, W.-C. Peng, and Y.-C. Tseng, "Efficient In-Network Moving Object Tracking in Wireless Sensor Networks," IEEE Trans. Mobile Computing, vol. 5, no. 8, pp. 1044-1056, Aug. 2006.
[13] K. Chakrabarty, S. Iyengar, H. Qi, and E. Cho, "Grid Coverage for Surveillance and Target Location in Distributed Sensor Networks," IEEE Trans. Computers, vol. 51, no. 12, pp. 1448-1453, Dec. 2002.
[14] G.T.K. Xu and H. Hassanein, "On the Robustness of Grid-Based Deployment in Wireless Sensor Networks," Proc. Int'l Wireless Comm. and Mobile Computing Conf. (IWCMC), pp. 1183-1188, July 2006.
[15] S. Ren, Q. Li, H. Wang, X. Chen, and X. Zhang, "Design and Analysis of Sensing Scheduling Algorithms under Partial Coverage for Object Detection in Sensor Networks," IEEE Trans. Parallel and Distributed Systems, vol. 18, no. 3, pp. 334-350, Mar. 2007.
[16] B. Liu, P. Brass, O. Dousse, P. Nain, and D. Towsley, "Mobility Improves Coverage of Sensor Networks," Proc. MobiHoc, 2005.
[17] D. Wang, B. Xie, and D.P. Agrawal, "Coverage and Lifetime Optimization of Wireless Sensor Networks with Gaussian Distribution," IEEE Trans. Mobile Computing, vol. 7, no. 12, pp. 1444-1458, Dec. 2008.
[18] C.-f. Hsin and M. Liu, "Network Coverage Using Low Duty-Cycled Sensors: Random & Coordinated Sleep Algorithms," Proc. Third Int'l Symp. Information Processing in Sensor Networks, pp. 433-442, 2004.
[19] S. Banerjee, C. Grosan, A. Abraham, and P. Mahanti, "Intrusion Detection on Sensor Networks Using Emotional Ants," Int'l J. Applied Science and Computations, vol. 12, no. 3, pp. 152-173, 2005.
[20] L. Lazos, R. Poovendran, and J.A. Ritcey, "Probabilistic Detection of Mobile Targets in Heterogeneous Sensor Networks," IPSN '07: Proc. Sixth Int'l Conf. Information Processing in Sensor Networks, pp. 519-528, 2007.
[21] L. Lazos, R. Poovendran, and J. Ritcey, "Analytic Evaluation of Target Detection in Heterogeneous Wireless Sensor Networks," ACM Trans. Sensor Networks, vol. 5, no. 2,article 18, 2009.
[22] X. Bai, Z. Yun, D. Xuan, W. Jia, and W. Zhao, "Pattern Mutation in Wireless Sensor Deployment," Proc. IEEE INFOCOM, pp. 1-9, 2010.
[23] Y. Wang, W. Fu, and D.P. Agrawal, "Intrusion Detection in Gaussian Distributed Wireless Sensor Networks," Proc. Sixth IEEE Int'l Conf. Mobile Ad Hoc and Sensor Systems, 2009.
[24] Y. Li, Y. Song, Y. Zhu, and R. Schott, "Deploying Wireless Sensors for Differentiated Coverage and Probabilistic Connectivity," Proc. IEEE Wireless Comm. and Networking Conf. (WCNC), pp. 1-6, 2010.
[25] Y. Wang, Y. Leow, and J. Yin, "A Novel Sine-Curve Mobility Model for Intrusion Detection in Wireless Sensor Networks," Wireless Comm. and Mobile Computing, 2011.
[26] T. Clouqueur, K.K. Saluja, and P. Ramanathan, "Fault Tolerance in Collaborative Sensor Networks for Target Detection," IEEE Trans. Computers, vol. 53, no. 3, pp. 320-333, Mar. 2003.
[27] E. Yanmaz and H. Guclu, "Stationary and Mobile Target Detection Using Mobile Wireless Sensor Networks," Proc. IEEE INFOCOM, 2010.
[28] M. Zhu, S. Ding, Q. Wu, R.R. Brooks, N.S.V. Rao, and S.S. Iyengar, "Fusion of Threshold Rules for Target Detection in Wireless Sensor Networks," ACM Trans. Sensor Networks, vol. 6, pp. 18:1-18:7, Mar. 2010.
[29] T. Wimalajeewa and S.K. Jayaweera, "Impact of Mobile Node Density on Detection Performance Measures in a Hybrid Sensor Network," IEEE Trans. Wireless Comm., vol. 9, no. 5, pp. 1760-1769, May 2010.
[30] Q. Cao, T. Yan, J. Stankovic, and T. Abdelzaher, "Analysis of Target Detection Performance for Wireless Sensor Networks," Proc. First IEEE Int'l Conf. Distributed Computing in Sensor Systems, pp. 276-292, 2005.
[31] P. Medagliani, J. Leguay, V. Gay, M. Lopez-Ramos, and G. Ferrari, "Engineering Energy-Efficient Target Detection Applications in Wireless Sensor Networks," Proc. IEEE Int'l Conf. Pervasive Computing and Comm. (PerCom), pp. 31-39, 2010.
[32] Y. Wang, Y.K. Leow, and J. Yin, "Is Straight-Line Path Always the Best for Intrusion Detection in Wireless Sensor Networks," Proc. Int'l Conf. Parallel and Distributed Systems, pp. 564-571, 2009.
[33] G. Wang, M.Z.A. Bhuiyan, and L. Zhang, "Two-Level Cooperative and Energy-Efficient Tracking Algorithm in Wireless Sensor Networks," Concurrency and Computation: Practice and Experience, vol. 22, pp. 518-537, Mar. 2010.
[34] M. Guerriero, L. Svensson, and P. Willett, "Bayesian Data Fusion for Distributed Target Detection in Sensor Networks," IEEE Trans. Signal Processing, vol. 58, no. 6, pp. 3417-3421, June 2010.
[35] M. Zhu, S. Ding, Q. Wu, R. Brooks, N. Rao, and S. Iyengar, "Fusion of Threshold Rules for Target Detection in Wireless Sensor Networks," ACM Trans. Sensor Networks, vol. 6, no. 2,article 18, 2010.
[36] Y. Wang, F. Li, and F. Fang, "Poisson versus Gaussian Distribution for Object Tracking in Wireless Sensor Networks," Proc. Second Int'l Workshop Intelligent Systems and Applications (ISA), pp. 1-4, 2010.
54 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool