Efficient deployment quality analysis for intrusion detection in wireless sensor networks

被引:0
|
作者
Noureddine Assad
Brahim Elbhiri
Moulay Ahmed Faqihi
Mohamed Ouadou
Driss Aboutajdine
机构
[1] Mohammed V University,LRIT, Associated Unit to CNRST (URAC 29)
[2] EMSI Rabat,undefined
[3] ENSIAS Mohammed V University,undefined
来源
Wireless Networks | 2016年 / 22卷
关键词
Intrusion detection probability; Network coverage; Network connectivity; Sensing range; Transmission range;
D O I
暂无
中图分类号
学科分类号
摘要
The intrusion detection in a Wireless Sensor Network is defined as a mechanism to monitor and detect any intruder in a sensing area. The sensor deployment quality is a critical issue since it reflects the cost and detection capability of a wireless sensor network. The quality of deterministic deployment can be determined sufficiently by a rigorous analysis before the deployment. However, when random deployment is required, determining the deployment quality becomes challenging. In the intrusion detection application, it is necessary to define more precise measures of sensing range, transmission range, and node density that impact overall system performance. The major question is centred around the quality of intrusion detection in WSN, how we can guarantee that each point of the sensing area is covered by at least one sensor node, and what a sufficient condition to guarantee the network connectivity? In this paper, we propose an appropriate probabilistic model which provides the coverage and connectivity in k-sensing detection of a wireless sensor network. We have proved the capability of our approach using a geometric analysis and a probabilistic model.
引用
收藏
页码:991 / 1006
页数:15
相关论文
共 50 条
  • [1] Efficient deployment quality analysis for intrusion detection in wireless sensor networks
    Assad, Noureddine
    Elbhiri, Brahim
    Faqihi, Moulay Ahmed
    Ouadou, Mohamed
    Aboutajdine, Driss
    [J]. WIRELESS NETWORKS, 2016, 22 (03) : 991 - 1006
  • [2] Analysis of the Deployment Quality for Intrusion Detection in Wireless Sensor Networks
    Assad, Noureddine
    Elbhiri, Brahim
    Faqihi, Moulay Ahmed
    Ouadou, Mohamed
    Aboutajdine, Driss
    [J]. JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2015, 2015
  • [3] On the Deployment Quality for Multi-intrusion Detection in Wireless Sensor Networks
    Assad, Noureddine
    Elbhiri, Brahim
    Faqihi, My Ahmed
    Ouadou, Mohamed
    Aboutajdine, Driss
    [J]. PROCEEDINGS OF THE MEDITERRANEAN CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES 2015 (MEDCT 2015), VOL 2, 2016, 381 : 469 - 478
  • [4] Quality analysis of multi-sensor intrusion detection node deployment in homogeneous wireless sensor networks
    Li Weizheng
    Tu Xiumei
    [J]. JOURNAL OF SUPERCOMPUTING, 2020, 76 (02): : 1331 - 1341
  • [5] RETRACTED ARTICLE: Quality analysis of multi-sensor intrusion detection node deployment in homogeneous wireless sensor networks
    Li Weizheng
    Tu Xiumei
    [J]. The Journal of Supercomputing, 2020, 76 : 1331 - 1341
  • [6] Design and analysis of efficient neural intrusion detection for wireless sensor networks
    Batiha, Tarek
    Kromer, Pavel
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (23):
  • [7] An Efficient Intrusion Detection Scheme for Wireless Sensor Networks
    Rong, Chunming
    Eggen, Skjalg
    Cheng, Hongbing
    [J]. SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 187 : 116 - +
  • [8] Efficient monitoring for intrusion detection in wireless sensor networks
    Abdellatif, Takoua
    Mosbah, Mohamed
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (15):
  • [9] A Reverse Gaussian Deployment Strategy for Intrusion Detection in Wireless Sensor Networks
    Li, Hailong
    Pandit, Vaibhav
    Katneni, Narendranad
    Agrawal, Dharma P.
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012, : 6678 - 6682
  • [10] A survey on energy efficient intrusion detection in wireless sensor networks
    Ghosal, Amrita
    Halder, Subir
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND SMART ENVIRONMENTS, 2017, 9 (02) : 239 - 261