TY - GEN
T1 - Tailor-Made Gaussian Distribution for Intrusion Detection in Wireless Sensor Networks
AU - Ghosal, Amrita
AU - Halder, Subir
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2014
Y1 - 2014
N2 - Intrusion detection is one of the primary applications in wireless sensor networks (WSNs) and has considerable importance in practice. Node deployment strategy plays a decisive role in determining the intrusion detection capability of a WSN. A uniform random deployment strategy fails to provide additional safety to sensitive areas within the network. However, a Gaussian deployment strategy provides additional safeguard to key areas within the network area. Moreover, both the deployment strategies suffer from energy-hole problem. In view of this, we consider energy-hole problem mitigating tailored-made Gaussian deployment strategy. Initially, we investigate the intrusion detection problem in a tailor-made Gaussian distributed network considering both single-sensing and multiple-sensing detection scenarios under a realistic probabilistic sensing model theoretically. Extensive simulation is performed mainly to validate the correctness of modeling and analysis. Effects of the different network parameters on detection probability are also observed in detail. Finally, the effectiveness of the proposed approach is confirmed by comparing with its counterpart Gaussian deployment strategy under the considered scenarios. The results clearly demonstrate our approach's dominance in terms of detection probability under various network parameters.
AB - Intrusion detection is one of the primary applications in wireless sensor networks (WSNs) and has considerable importance in practice. Node deployment strategy plays a decisive role in determining the intrusion detection capability of a WSN. A uniform random deployment strategy fails to provide additional safety to sensitive areas within the network. However, a Gaussian deployment strategy provides additional safeguard to key areas within the network area. Moreover, both the deployment strategies suffer from energy-hole problem. In view of this, we consider energy-hole problem mitigating tailored-made Gaussian deployment strategy. Initially, we investigate the intrusion detection problem in a tailor-made Gaussian distributed network considering both single-sensing and multiple-sensing detection scenarios under a realistic probabilistic sensing model theoretically. Extensive simulation is performed mainly to validate the correctness of modeling and analysis. Effects of the different network parameters on detection probability are also observed in detail. Finally, the effectiveness of the proposed approach is confirmed by comparing with its counterpart Gaussian deployment strategy under the considered scenarios. The results clearly demonstrate our approach's dominance in terms of detection probability under various network parameters.
KW - Energy-hole problem
KW - Gaussian distribution
KW - Intrusion detection
KW - Node deployment
KW - Wireless sensor network
UR - http://www.scopus.com/inward/record.url?scp=84949575580&partnerID=8YFLogxK
U2 - 10.1109/UIC-ATC-ScalCom.2014.133
DO - 10.1109/UIC-ATC-ScalCom.2014.133
M3 - Conference contribution
AN - SCOPUS:84949575580
T3 - Proceedings - 2014 IEEE International Conference on Ubiquitous Intelligence and Computing, 2014 IEEE International Conference on Autonomic and Trusted Computing, 2014 IEEE International Conference on Scalable Computing and Communications and Associated Symposia/Workshops, UIC-ATC-ScalCom 2014
SP - 406
EP - 411
BT - Proceedings - 2014 IEEE International Conference on Ubiquitous Intelligence and Computing, 2014 IEEE International Conference on Autonomic and Trusted Computing, 2014 IEEE International Conference on Scalable Computing and Communications and Associated Symposia/Workshops, UIC-ATC-ScalCom 2014
A2 - Zheng, Yu
A2 - Thulasiraman, Parimala
A2 - Apduhan, Bernady O.
A2 - Nakamoto, Yukikazu
A2 - Ning, Huansheng
A2 - Sun, Yuqing
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 11th IEEE International Conference on Ubiquitous Intelligence and Computing and 11th IEEE International Conference on Autonomic and Trusted Computing and 14th IEEE International Conference on Scalable Computing and Communications and Associated Symposia/Workshops, UIC-ATC-ScalCom 2014
Y2 - 9 December 2014 through 12 December 2014
ER -