Tailor-Made Gaussian Distribution for Intrusion Detection in Wireless Sensor Networks

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Intrusion detection is one of the primary applications in wireless sensor networks (WSNs) and has considerable importance in practice. Node deployment strategy plays a decisive role in determining the intrusion detection capability of a WSN. A uniform random deployment strategy fails to provide additional safety to sensitive areas within the network. However, a Gaussian deployment strategy provides additional safeguard to key areas within the network area. Moreover, both the deployment strategies suffer from energy-hole problem. In view of this, we consider energy-hole problem mitigating tailored-made Gaussian deployment strategy. Initially, we investigate the intrusion detection problem in a tailor-made Gaussian distributed network considering both single-sensing and multiple-sensing detection scenarios under a realistic probabilistic sensing model theoretically. Extensive simulation is performed mainly to validate the correctness of modeling and analysis. Effects of the different network parameters on detection probability are also observed in detail. Finally, the effectiveness of the proposed approach is confirmed by comparing with its counterpart Gaussian deployment strategy under the considered scenarios. The results clearly demonstrate our approach's dominance in terms of detection probability under various network parameters.

Original languageEnglish
Title of host publicationProceedings - 2014 IEEE International Conference on Ubiquitous Intelligence and Computing, 2014 IEEE International Conference on Autonomic and Trusted Computing, 2014 IEEE International Conference on Scalable Computing and Communications and Associated Symposia/Workshops, UIC-ATC-ScalCom 2014
EditorsYu Zheng, Parimala Thulasiraman, Bernady O. Apduhan, Yukikazu Nakamoto, Huansheng Ning, Yuqing Sun
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages406-411
Number of pages6
ISBN (Electronic)9781479976461
DOIs
Publication statusPublished - 2014
Externally publishedYes
Event11th IEEE International Conference on Ubiquitous Intelligence and Computing and 11th IEEE International Conference on Autonomic and Trusted Computing and 14th IEEE International Conference on Scalable Computing and Communications and Associated Symposia/Workshops, UIC-ATC-ScalCom 2014 - Denpasar, Bali, Indonesia
Duration: 9 Dec 201412 Dec 2014

Publication series

NameProceedings - 2014 IEEE International Conference on Ubiquitous Intelligence and Computing, 2014 IEEE International Conference on Autonomic and Trusted Computing, 2014 IEEE International Conference on Scalable Computing and Communications and Associated Symposia/Workshops, UIC-ATC-ScalCom 2014

Conference

Conference11th IEEE International Conference on Ubiquitous Intelligence and Computing and 11th IEEE International Conference on Autonomic and Trusted Computing and 14th IEEE International Conference on Scalable Computing and Communications and Associated Symposia/Workshops, UIC-ATC-ScalCom 2014
Country/TerritoryIndonesia
CityDenpasar, Bali
Period9/12/1412/12/14

Keywords

  • Energy-hole problem
  • Gaussian distribution
  • Intrusion detection
  • Node deployment
  • Wireless sensor network

Fingerprint

Dive into the research topics of 'Tailor-Made Gaussian Distribution for Intrusion Detection in Wireless Sensor Networks'. Together they form a unique fingerprint.

Cite this