scholarly journals Analysis of the Deployment Quality for Intrusion Detection in Wireless Sensor Networks

2015 ◽  
Vol 2015 ◽  
pp. 1-7 ◽  
Author(s):  
Noureddine Assad ◽  
Brahim Elbhiri ◽  
Moulay Ahmed Faqihi ◽  
Mohamed Ouadou ◽  
Driss Aboutajdine

The intrusion detection application in a homogeneous wireless sensor network is defined as a mechanism to detect unauthorized intrusions or anomalous moving attackers in a field of interest. The quality of deterministic sensor nodes deployment can be determined sufficiently by a rigorous analysis before the deployment. However, when random deployment is required, determining the deployment quality becomes challenging. An area may require that multiple nodes monitor each point from the sensing area; this constraint is known ask-coverage wherekis the number of nodes. The deployment quality of sensor nodes depends directly on node density and sensing range; mainly a random sensor nodes deployment is required. The major question is centred around the problem of network coverage, how can we guarantee that each point of the sensing area is covered by the required number of sensor nodes and what a sufficient condition to guarantee the network coverage? To deal with this, probabilistic intrusion detection models are adopted, called single/multi-sensing detection, and the deployment quality issue is surveyed and analysed in terms of coverage. We evaluate the capability of our probabilistic model in homogeneous wireless sensor network, in terms of sensing range, node density, and intrusion distance.

2017 ◽  
Vol 7 (1.1) ◽  
pp. 426
Author(s):  
V Jayaraj ◽  
S Alonshia

Although data collection has received much attention by effectively minimizing delay, computational complexity and increasing the total data transmitted, the transience of sensor nodes for multiple data collection of sensed node in wireless sensor network (WSN) renders quality of service a great challenge. To circumvent transience of sensor nodes for multiple data collection, Quality based Drip-Drag-Match Data Collection (QDDM-DC) scheme have been proposed. In Drip-Drag-Match data collection scheme, initially dripping of data is done on the sink by applying Equidistant-based Optimum Communication Path from the sensor nodes which reduces the data loss. Next the drag operation pulls out the required sensed data using Neighbourhood-based model from multiple locations to reduce the delay for storage. Finally, the matching operation, compares the sensed data received by the dragging operation to that of the corresponding sender sensor node (drip stage) and stores the sensed data accurately which in turn improves the throughput and quality of data collection. Simulation is carried for the QDDM-DC scheme with multiple scenarios (size of data, number of sinks, storage capacity) in WSN with both random and deterministic models. Simulation results show that QDDM-DC provides better performance than other data collection schemes, especially with high throughput, ensuring minimum delay and data loss for effective multiple data collection of sensed data in WSN.


2013 ◽  
Vol 774-776 ◽  
pp. 1556-1559 ◽  
Author(s):  
Kai Guo Qian ◽  
Li Mui ◽  
Tian Ma Zuo ◽  
Zhi Qiang Xu

Deployment and coverage, studied how to effectively place and control of sensor nodes and to make WSN covered the monitoring area with the purpose of minimum the energy consumption and prolonging the network life cycle under the premise of guarantee the quality of service (QOS),are the primary problems for construction wireless sensor network. This paper analyzes important factors for resolve the coverage problem such as sensing models and deployment way, followed survey the state-of-the art coverage contro1 techniques and presents an overview and analysis of the solution proposed in recent research literature, Further research directions are pointed out in the end.


21st century is considered as the era of communication, and Wireless Sensor Networks (WSN) have assumed an extremely essential job in the correspondence period. A wireless sensor network is defined as a homogeneous or heterogeneous system contains a large number of sensors, namely called nodes used to monitor different environments in cooperatives. WSN is composed of sensor nodes (S.N.), base stations (B.S.), and cluster head (C.H.). The popularity of wireless sensor networks has been increased day by day exponentially because of its wide scope of utilizations. The applications of wireless sensor networks are air traffic control, healthcare systems, home services, military services, industrial & building automation, network communications, VAN, etc. Thus the wide range of applications attracts attackers. To secure from different types of attacks, mainly intruder, intrusion detection based on dynamic state context and hierarchical trust in WSNs (IDSHT) is proposed. The trust evaluation is carried out in hierarchical way. The trust of sensor nodes is evaluated by cluster head (C.H.), whereas the trust of the cluster head is evaluated by a neighbor cluster head or base station. Hence the content trust, honest trust, and interactive trust are put forward by combining direct evaluation and feedback based evaluation in the fixed hop range. In this way, the complexity of trust management is carried in a hierarchical manner, and trust evaluation overhead is minimized.


2018 ◽  
Vol 14 (06) ◽  
pp. 58 ◽  
Author(s):  
Ren Song ◽  
Zhichao Xu ◽  
Yang Liu

<p class="0abstract"><span lang="EN-US">To solve the defect of traditional node deployment strategy, the improved <a name="_Hlk502130691"></a>fruit fly algorithm was combined with wireless sensor network. The optimization of network coverage was implemented. </span><span lang="EN-US">Based on a new type of intelligent algorithm, the change step of fruit fly optimization algorithm (CSFOA)</span><span lang="EN-US">was proposed. At the same time, the mathematical modeling of two network models was carried out respectively. The grid coverage model was used. The network coverage and redundancy were transformed into corresponding mathematical variables by means of grid partition.</span><span lang="EN-US">Among them, the maximum effective radius of sensor nodes was fixed in mobile node wireless sensor network. The location of nodes was randomly cast. The location of sensor nodes was placed in fixed position nodes. The effective radius of nodes can be changed dynamically.</span><span lang="EN-US">Finally, combined with the corresponding network model, the improved algorithm was applied to wireless sensor network.</span><span lang="EN-US">The combination of the optimal solution of the node position and the perceptual radius was found through the algorithm. The maximum network coverage was achieved.</span><span lang="EN-US">The two models were simulated and verified. The results showed that the improved algorithm was effective and superior to the coverage optimization of wireless sensor networks.</span></p>


Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Guojun Chen ◽  
Xiangdong Qin ◽  
Ningsheng Fang ◽  
Wenbo Xu

Path selection is one of the key technologies of wireless sensor network (WSN). A reasonable choice of coverage path can improve the service quality of WSN and extend the life cycle of WSN. Biogeography-based optimization (BBO) is widely used in the field of cluster intelligent optimization because its search method has a better incentive mechanism for population evolution. In this paper, the move-in and move-out operation and mutation operation of the BBO algorithm enable WSN to find an efficient routing path. In this paper, simulation experiments are carried out in two scenarios of regular deployment and random deployment of WSN nodes. The experimental results show that the quality of the WSN coverage path solution optimized by the BBO algorithm in the two scenarios is better than that of the particle swarm algorithm and genetic algorithm.


Author(s):  
Li Zhu ◽  
Chunxiao Fan ◽  
Zhigang Wen ◽  
Huarun Wu

In order to optimize the wireless sensor network coverage, this paper designs a coverage optimization strategy for wireless sensor network (EACS) based on energy-aware. Under the assumption that the geographic positions of sensor nodes are available, the proposed strategy consists of energy-aware and network coverage adjustment. It is restricted to conditions such as path loss, residual capacity and monitored area and according to awareness ability of sensors, it would adjust the monitored area, repair network hole and kick out the redundant coverage. The purpose is to balance the energy distribution of working nodes, reduce the number of “dead” nodes and balance network energy consumption. As a result, the network lifetime is expanded. Simulation results show that: EACS effectively reduces the number of working nodes, improves network coverage, lowers network energy consumption while ensuring the wireless sensor network coverage and connectivity, so as to balance network energy consumption.


Sensors ◽  
2019 ◽  
Vol 19 (12) ◽  
pp. 2735 ◽  
Author(s):  
Shipeng Wang ◽  
Xiaoping Yang ◽  
Xingqiao Wang ◽  
Zhihong Qian

The random placement of a large-scale sensor network in an outdoor environment often causes low coverage. In order to effectively improve the coverage of a wireless sensor network in the monitoring area, a coverage optimization algorithm for wireless sensor networks with a Virtual Force-Lévy-embedded Grey Wolf Optimization (VFLGWO) algorithm is proposed. The simulation results show that the VFLGWO algorithm has a better optimization effect on the coverage rate, uniformity, and average moving distance of sensor nodes than a wireless sensor network coverage optimization algorithm using Lévy-embedded Grey Wolf Optimizer, Cuckoo Search algorithm, and Chaotic Particle Swarm Optimization. The VFLGWO algorithm has good adaptability with respect to changes of the number of sensor nodes and the size of the monitoring area.


2018 ◽  
Vol 7 (2.21) ◽  
pp. 405
Author(s):  
T Karthik Krishnan ◽  
S Sridevi ◽  
G Bindu ◽  
R Anandan

Wireless sensor network is emanating technology in the field of telecommunications. WSNs can be applied in many fields like machine surveillance, precision agriculture, home automation and intelligent building environments. However the major aspect of WSN is the security as the sensor nodes are limited because of these facing several security threats such as black hole attack, worm hole attack, flooding etc. which is finally affecting the functioning of the whole network. These attacks are maximizing the consumption of power in the node and also it decreases life of the battery. In this paper, we discuss several types of security attacks in wireless sensor networks and also it introduces various intrusion detection systems to detect these attacks and prevent the compromised nodes in the WSN. And also we discuss about the different intrusion detection methods with the help of machine learning algorithms. In future these techniques can be helpful to create a safe and sophisticated network.  


Author(s):  
Md Alauddin Rezvi ◽  
Sidratul Moontaha ◽  
Khadija Akter Trisha ◽  
Shamse Tasnim Cynthia ◽  
Shamim Ripon

<span>Wireless sensor network (WSN) is a collection of wireless sensor nodes which are distributed in nature and a base station where the dispersed nodes are used to monitor and the physical conditions of the environment is recorded and then these data are organized into the base. Its application has been reached out from critical military application such as battlefield surveillance to traffic, health, industrial areas, intruder detection, security and surveillance. Due to various features in WSN it is very prone to various types external attacks. Preventing such attacks, intrusion detection system (IDS) is very important so that attacker cannot steal or manipulate data. Data mining is a technique that can help to discover patterns in large dataset. This paper proposed a data mining technique for different types of classification algorithms to detect denial of service (DoS) attacks which is of four types. They are Grayhole, Blackhole, Flooding and TDMA. A number of data mining techniques, such as KNN, Naïve Bayes, Logistic Regression, support vector machine (SVM) and ANN algorithms are applied on the dataset and analyze their performance in detecting the attacks. The analysis reveals the applicability of these algorithms for detecting and predicting such attacks and can be recommended for network specialist and analysts. </span>


Sign in / Sign up

Export Citation Format

Share Document