We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Intrusion Detection: A Probability Model for 3D Heterogeneous WSN

by Mohamed Mubarak.T, Syed Abdul Sattar, Appa rao, Sajitha M
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 6 - Number 12
Year of Publication: 2010
Authors: Mohamed Mubarak.T, Syed Abdul Sattar, Appa rao, Sajitha M
10.5120/1125-1475

Mohamed Mubarak.T, Syed Abdul Sattar, Appa rao, Sajitha M . Intrusion Detection: A Probability Model for 3D Heterogeneous WSN. International Journal of Computer Applications. 6, 12 ( September 2010), 15-20. DOI=10.5120/1125-1475

@article{ 10.5120/1125-1475,
author = { Mohamed Mubarak.T, Syed Abdul Sattar, Appa rao, Sajitha M },
title = { Intrusion Detection: A Probability Model for 3D Heterogeneous WSN },
journal = { International Journal of Computer Applications },
issue_date = { September 2010 },
volume = { 6 },
number = { 12 },
month = { September },
year = { 2010 },
issn = { 0975-8887 },
pages = { 15-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume6/number12/1125-1475/ },
doi = { 10.5120/1125-1475 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:55:10.609316+05:30
%A Mohamed Mubarak.T
%A Syed Abdul Sattar
%A Appa rao
%A Sajitha M
%T Intrusion Detection: A Probability Model for 3D Heterogeneous WSN
%J International Journal of Computer Applications
%@ 0975-8887
%V 6
%N 12
%P 15-20
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

WSN in three dimensional space is common in different application areas such as space monitoring, cave monitoring under water eco system and so on. Intrusion is a common type of attack in such types of networks. In this paper, we analyze the intrusion detection probability which helps in deploying the sensors in efficient manner. Even though the sensors are throw away in nature, still the cost matters. And the intelligent deployment helps in reducing the redundancy in communication. Therefore this model can be beneficial in case of three dimensional WSN.Here we deal with heterogeneous WSN as such types of WSN are common in different applications. For the case of simplicity, in our analysis, we consider only two types of sensors named as Type 1 and Type 2. This model can be extended to any number of types. This paper is an extension of our previous work where intrusion detection on homogeneous networks was discussed.

References
  1. I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, vol. 40, no. 8, pp. 102-14, Aug. 2002 “A Survey on Sensor Networks”, IEEE Communication Magazine.
  2. A. Perrig, et al., 8(5):521- 534, Sep. 2002, “SPINS: Security Protocols for Sensor Networks”, Wireless Networks.
  3. S. Zhu, S. Setia, and S. Jajodia, Oct. 2003, “LEAP: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks”, Proc. of the 10th ACM Conference on Computer and Communications Security (CCS '03).
  4. J. Deng, R. Han, and S. Mishra, , Apr.2003. “A Performance Evaluation of Intrusion-tolerant Routing in Wireless Sensor Networks”, Proc. of the 2nd Int. IEEE Workshop on Information Processing in Sensor Networks
  5. Y. Wang, X. Wang, B. Xie, D. Wang, and D. P. Agrawal, vol. 7, no. 6, pp. 698–711, 2008.“Intrusion detection in homogeneous and heterogeneous wireless sensor networks,” IEEE Transactions on Mobile Computing.
  6. O. Dousse, C. Tavoularis, and P. Thiran, 2006, “Delay of intrusion detection in wireless sensor networks,” in Proceedings of the Seventh ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc).
  7. H. Kung and D. Vlah, , ser. 3, vol. 3, March 2003, pp. 1954– 1961, “Efficient location tracking using sensor networks,” in IEEE Wireless Communications and Networking Conference.
  8. C.-Y. Lin, W.-C. Peng, and Y.-C. Tseng, vol. 5, no. 8, pp. 1044– 1056, 2006.“Efficient in-network moving object tracking in wireless sensor networks,” IEEE Transactions on Mobile Computing.
  9. Y. Zhang and W, Lee. pages 275-283,2000, Intrusion Detection in Wireless Ad-Hoc Networks. In Proc. ACM MobiCom.
  10. B. Liu, P. Brass, O. Dousse, P. Nain, and D. Towsley, 2005 “Mobility improves coverage of sensor networks,” in Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc).
  11. Yun Wang, Yoon Kah Leow, and Jun Yin ,2009,” Is Straight-line Path Always the Best for Intrusion Detection in Wireless Sensor Networks,” in 15th International Conference on Parallel and Distributed Systems .
  12. Yang Xiao, Hui Chen, Yanping Zhang, Xiaojiang Du, Bo Sun, and Kui Wu, 2008,” Intrusion Objects with Shapes under Randomized Scheduling Algorithm in The 28th International Conference on Distributed Sensor Networks”,in Computing Systems Workshops.
  13. Tran Hoang Hai, Eui-Nam Huh,” Optimal Selection and Activation of Intrusion Detection Agents for WSN”.
  14. Xi Peng, Zheng Wu, Debao Xiao,Yang Yu, ,2009,” Study on Security Management Architecture for Sensor Network based on Intrusion Detection,” International Conference on Networks Security, Wireless Communications and Trusted Computing .
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion detection node density sensing range Wireless Sensor Network (WSN)