Intrusion Detection in Mobile Sensor Networks: A Case Study for Different Intrusion Paths
- PDF / 2,222,475 Bytes
- 21 Pages / 439.37 x 666.142 pts Page_size
- 72 Downloads / 223 Views
Intrusion Detection in Mobile Sensor Networks: A Case Study for Different Intrusion Paths Sandeep Sharma1 · Jaiprakash Nagar1
© Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract Intrusion detection is a very sensitive and major concern in wireless sensor networks. In border areas, sensors are installed to discover the presence of enemies or any trace passing in a prohibited area or any vicious moving object in the region of interest. In order to gain access to a region of interest, an intruder can take various paths, i.e., it can move along a straight line, follow a zigzag path or a curved path and move at a particular angle to cross the region without being detected and to improve its attacking ability. This paper formulates and analyzes 𝜅-barrier coverage probability which acts as the intrusion detection probability for an intruder when the intruder follows different paths at different path angles with respect to the shortest path to cross the region of interest in a mobile sensor network. Furthermore, the effect of different network variables such as node density, sensing range, intrusion path angle and the ratio of sensor to intruder velocity on intrusion detection probability are also investigated. It is believed that the proposed model renders an effective tool to incorporate the intruder’s movement pattern in the design of an advanced finite wireless sensor network. Keywords Barrier coverage · Field of interest (FOI) · Gaussian distribution · Intrusion detection · Intrusion path · Mobility · Poisson distribution · Sensing range · Uniform distribution
1 Introduction Wireless Sensor Networks (WSNs) are formed by spreading a large number of cheap, tiny, low power sensors inside the region of interest (RoI). These sensors do not require any permanent infrastructure and function in a self-organized and decentralized fashion [1–3]. Nowadays, WSNs are being deployed for various civil and military applications like patient monitoring, environmental monitoring, processes monitoring in industries, object tracking * Sandeep Sharma [email protected] Jaiprakash Nagar [email protected] 1
School of Information and Communication Technology, Gautam Buddha University, Greater Noida, Uttar Pradesh 201308, India
13
Vol.:(0123456789)
S. Sharma, J. Nagar
and for surveillance, reconnaissance and intrusion detection [4, 5]. This is possible because of the fact that sensors are cheap, easily available, requires less power for their intended functions, and can be deployed ‘on the fly’ very easily in various remote, emergency and/ or hazardous scenarios. WSNs have numerous applications, intrusion detection is one of them which supports industrial monitoring and military surveillance; hence, it has been one of the major research topic for the research community. The literature on intrusion detection in WSNs is based on two broad categories. First, it is taken as a system element to monitor and diagnose the vulnerable/compromised sensor nodes to ensure the security of a WSN [6–8]. Secondl
Data Loading...