CFP last date
20 May 2024
Reseach Article

Optimizing Sensors Distribution for Enhancing WSN Intrusion Detection Probability in Euclidian's Space

by Omar Said, Alaa Elnashar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 105 - Number 15
Year of Publication: 2014
Authors: Omar Said, Alaa Elnashar
10.5120/18453-9498

Omar Said, Alaa Elnashar . Optimizing Sensors Distribution for Enhancing WSN Intrusion Detection Probability in Euclidian's Space. International Journal of Computer Applications. 105, 15 ( November 2014), 18-22. DOI=10.5120/18453-9498

@article{ 10.5120/18453-9498,
author = { Omar Said, Alaa Elnashar },
title = { Optimizing Sensors Distribution for Enhancing WSN Intrusion Detection Probability in Euclidian's Space },
journal = { International Journal of Computer Applications },
issue_date = { November 2014 },
volume = { 105 },
number = { 15 },
month = { November },
year = { 2014 },
issn = { 0975-8887 },
pages = { 18-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume105/number15/18453-9498/ },
doi = { 10.5120/18453-9498 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:37:47.212444+05:30
%A Omar Said
%A Alaa Elnashar
%T Optimizing Sensors Distribution for Enhancing WSN Intrusion Detection Probability in Euclidian's Space
%J International Journal of Computer Applications
%@ 0975-8887
%V 105
%N 15
%P 18-22
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Intrusion detection is one of the most important issues in Wireless Sensor Networks (WSNs). WSN sensors distribution plays an important role in intrusion detection process; uniform distribution of sensors yields the same intruder detection capability for all WSN points. Many applications require different levels of security (i. e. the security level should be increased around some specific locations in WSN. Most of the related works focus on using Normal and Uniform distributions in 2D WSN applications with homogenous sensors. Many applications may be applied in 3D such as space monitoring and underwater ecosystem which still need extensive studies for intruder success probability. Sensors heterogeneity is also another important issue that should be well studied since most of intrusion detection researches focus on using homogenous sensors. So, in this paper, the normal and the uniform distributions in 3D WSN applications with heterogeneous sensors are studied. This proposed study presents two situations for intrusion detection process. In the first situation, only one sensor is enough to detect the intruder. The second situation, uses multiple sensors (k, k>1), to detect the intruder. Furthermore, the probability of intrusion detection with Normal distribution, Uniform distribution, and a mixture between them are compared. Finally, the results proved that the performance of the Normal distribution is better than the Mixture and the Uniform distributions as regard the ability of intruder detection and the general WSN efficiency.

References
  1. YangXia Luo, et al, A Survey on Intrusion Detection of Wireless Sensor Network, IEEE 2nd International Conference on Information Science and Engineering (ICISE), China, pp: 1798 - 1802, 4-6 Dec. 2010.
  2. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A Survey on Wireless Sensor Networks," IEEE Comm. Magazine, vol. 40, no. 8, pp. 102-114, Aug. 2002.
  3. K. Sohraby, D. Minoli, and T. Znati, Wireless Sensor Networks: Technology, Protocols, and Applications. John Wiley and Sons, Inc. , 2007.
  4. J. N. Al-Karaki and A. E. Kamal, "Routing Techniques in Wireless Sensor Networks: A Survey," IEEE Wireless Comm. , vol. 11, no. 6, pp. 6-28, Dec. 2004.
  5. S. Tilak, N. B. Abu-Ghazaleh, and W. Heinzelman, "A Taxonomy of Wireless Micro-Sensor Network Models," ACM Mobile Computing and Comm. Rev. , vol. 6, no. 2, pp. 28-36, Apr. 2002.
  6. A. Agah, S. Das, K. Basu, and M. Asadi, "Intrusion Detection in Sensor Networks: A Non-Cooperative Game Approach," Proc. Third IEEE Int'l Symp. Network Computing and Applications (NCA '04), pp. 343-346, 2004.
  7. A. Agah, S. Das, and K. Basu, "A Game Theory Based Approach for Security in Wireless Sensor Networks," Proc. IEEE Int'l Conf. Performance, Computing, and Comm. , pp. 259-263, 2004.
  8. V. Giruka, M. Singhal, J. Royalty, and S. Varanasi, "Security in Wireless Sensor Networks," Wireless Comm. and Mobile Computing, vol. 8, no. 1, pp. 1-24, 2008.
  9. A. Arora, P. Dutta, S. Bapat, V. Kulathumani, H. Zhang, V. Naik, V. Mittal, H. Cao, M. Demirbas, and M. Gouda, "A Line in the Sand: A Wireless Sensor Network for Target Detection, Classification, and Tracking," Computer Networks, vol. 46, no. 5, pp. 605-634, 2004.
  10. Y. Wang, X. Wang, B. Xie, D. Wang, and D. P. Agrawal, "Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks," IEEE Trans. Mobile Computing, vol. 7, no. 6, pp. 698- 711, June 2008.
  11. O. Dousse, C. Tavoularis, and P. Thiran, "Delay of Intrusion Detection in Wireless Sensor Networks," Proc. MobiHoc, 2006.
  12. H. Kung and D. Vlah, "Efficient Location Tracking Using Sensor Networks," Proc. IEEE Wireless Comm. and Networking Conf. , vol. 3, pp. 1954-1961, Mar. 2003.
  13. C. -Y. Lin, W. -C. Peng, and Y. -C. Tseng, "Efficient In-Network Moving Object Tracking in Wireless Sensor Networks," IEEE Trans. Mobile Computing, vol. 5, no. 8, pp. 1044-1056, Aug. 2006.
  14. Y. Wang, X. Wang, B. Xie, D. Wang, and D. P. Agrawal, vol. 7, no. 6, pp. 698–711, 2008. "Intrusion detection in homogeneous and heterogeneous wireless sensor networks," IEEE Transactions on Mobile Computing.
  15. O. Dousse, C. Tavoularis, and P. Thiran, 2006, "Delay of intrusion detection in wireless sensor networks," in Proceedings of the Seventh ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc).
  16. H. Kung and D. Vlah, , ser. 3, vol. 3, March 2003, pp. 1954– 1961, "Efficient location tracking using sensor networks," in IEEE Wireless Communications and Networking Conference.
  17. C. -Y. Lin, W. -C. Peng, and Y. -C. Tseng, vol. 5, no. 8, pp. 1044– 1056, 2006. "Efficient in-network moving object tracking in wireless sensor networks," IEEE Transactions on Mobile Computing.
  18. Y. Zhang and W, Lee. pages 275-283,2000, Intrusion Detection in Wireless Ad-Hoc Networks. In Proc. ACM MobiCom.
  19. B. Liu, P. Brass, O. Dousse, P. Nain, and D. Towsley, 2005, "Mobility improves coverage of sensor networks," in proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc).
  20. Y. Wang, X. Wang, B. Xie, D. Wang, and D. P. Agrawal, vol. 7, no. 6, pp. 698–711, 2008. " Intrusion detection in homogeneous and heterogeneous wireless sensor networks," IEEE Transactions on Mobile Computing.
  21. Yun Wang, Yoon Kah Leow, and Jun Yin , 2009," Is Straight-line Path Always the Best for Intrusion Detection in Wireless Sensor Networks," in 15th International Conference on Parallel and Distributed Systems .
  22. Y. Wang, W. Fu, and D. P. Agrawal, "Intrusion detection in Gaussian distributed heterogeneous wireless sensor networks," 6th IEEE International Conference on Mobile Ad Hoc and Sensor Systems Oct. 2009.
  23. B. Liu, P. Brass, O. Dousse, P. Nain, and D. Towsley, "Mobility Improves Coverage of Sensor Networks," Proc. Sixth ACM Int'l Symp. Mobile Ad Hoc Networking and Computing (MobiHoc'05), pp. 300-308, 2005.
  24. Y. Wang, X. Wang, B. Xie, D. Wang, and D. P. Agrawal, "Intrusion detection in homogeneous and heterogeneous wireless sensor networks," IEEE Transactions on Mobile Computing, vol. 7, no. 6, pp. 698–711, 2008.
  25. O. Dousse, C. Tavoularis, P. Thiran "Delay of Intrusion Detection in Wireless Sensor Networks," MobiHoc '06 Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing ,New York, NY, USA 2006.
  26. Q. Shi, C. Comaniciu," Efficient cooperative detection for wireless sentinel networks" 44th Annual Conference on Information Sciences and Systems (CISS), March 2010.
  27. D. Turgut, B. U. Turgut, and L. Boloni, "Stealthy dissemination in intruder tracking sensor networks," IEEE 34th Conference on Local Computer Networks LCN, Oct. 2009.
  28. Yun Wang, Weihuang Fu, and Dharma P. Agrawal, "Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks", IEEE Transaction on Parallel and Distributed Systems, Vol. 24, No. 2, Feb. 2013.
  29. Maduri Chopde, Kimi Ramteke and Satish Kamble, "Probabilistic model for Intrusion Detection in Wireless Sensor Network", International Journal of Communication Network and Security (IJCNS), Vol-1, Issue-3, 2011.
  30. Mohamed Mubarak. T et al. ,"Intrusion Detection: A Probability Model for 3D Heterogeneous WSN", International Journal of Computer Applications, Volume 6– No. 12, September 2010.
  31. C. Ortiz, J. Puig, C. Palau, M. Esteve, "Wireless sensor network modeling and simulation, International Conference on Sensor Technologies and applications, Valencia, Spain, pp: 307-312, October 14-20, 2007.
  32. George Marsaglia, "Choosing a Point from the Surface of a Sphere," Ann. Math. Statist. Volume 43, Number 2, pp: 645-646, 1972.
  33. OPNET IT GURU: A tool for Networking Education, MSCIT Practicum Paper, REGIS UNIVERSITY, http://staff. ustc. edu. cn/~bhua/experiments/ITGAE_Tool_Ntwrk_Ed. pdf
  34. http://mathworld. wolfram. com/Sphere-SphereIntersection. html
  35. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, "Wireless Sensor Networks: a Survey," Elsevier Journal of Computer Networks, Vol N. 38, pp: 393–422, 2002.
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection WSNs Sensors WSNs Security.