ABSTRACT
In this paper we consider sensor networks for intrusion detection, such that node deployment, node failures and node behavior result in coverage gaps and a fraction of disconnected nodes in an otherwise dense and well-connected network. We focus on the time delay for a mobile intruder to be detected by a sensor with a connected path to the sink, in contrast to existing results for the detection time by a sensor with arbitrary connectivity. We model our network using a supercritical percolation model on the plane, implying the existence of a unique unbounded connected component, and we assume that the sink belongs to this component. We analyze the distribution of the distance traveled by a moving target until it comes within sensing range of a node in the giant component, providing analytical bounds for linear intruder mobility and thorough simulation results for other mobility models. We show that the probability that the intruder proceeds undetected exhibits non-memoryless behavior over shorter distances and an exponentially decreasing tail. We also show that the time of contact with the giant component incurs considerably more delay than the time of first contact with any node, in networks with less than 10% of nodes without a path to the sink, which means that even a small percentage of node failures may have a drastic impact on the performance of intrusion detection by a wireless sensor networ.
- C. Bettstetter, Topology Properties of Ad Hoc Networks with Random Waypoint Mobility, Proc. MobiHoc, Anapolis, jun, 2003 Google ScholarDigital Library
- Q. Cao and T. Abdelzaher and T. He and J. Stankovic, "Towards optimal sleep scheduling in sensor networks for rare event detection", Proc. IPSN'05, apr, Los Angeles, 2005 Google ScholarDigital Library
- Q. Cao and T. Abdelzaher and T. He and J. Stankovic, "Towards optimal sleep scheduling in sensor networks for rare event detection, Proc. IPSN'05, apr, Los Angeles, 2005 Google ScholarDigital Library
- O. Dousse and C. Tavoularis and P. Thiran, On the distance to the giant component along a straight line in a two-dimensional percolation model, Proc. SpaSWin, Riva del Garda, Italy, apr, 2005Google Scholar
- O. Dousse and P. Thiran and M. Hasler, "Connectivity in ad-hoc and hybrid networks", Proc. IEEE Infocom, New York, jun, 2002Google ScholarCross Ref
- M. Franceschetti and L. Booth and M. Cook and R. Meester and J. Bruck, "Continuum Percolation with unreliable and spread out connections", Journal of Statistical Physics, 2005, 118, 3/4, Feb. 2005.Google ScholarCross Ref
- R. Groenevelt and E. Altman and P. Nain", Relaying in mobile ad hoc networks: the Brownian motion mobility model, Proc. WiOpt, Cambridge, UK, sep, 2004 Google ScholarDigital Library
- C. Gui and P. Mohapatra, Power Conservation and Quality of Surveillance in Target Tracking Sensor Networks, Proc. Mobicom, Philadelphia, sep, 2004 Google ScholarDigital Library
- T. He et al, An Energy-Efficient Surveillance System for Sensor Networks, Proc. MobiSYS, jun, Boston, MA, 2004 Google ScholarDigital Library
- G. Kesidis and T. Konstantopoulos and S. Phoha, Surveillance coverage of sensor networks under a random mobility strategy, Proc. IEEE Sensors, oct, 2003Google ScholarCross Ref
- B. Liu and P. Brass and O. Dousse and P. Nain and D. Towsley, "Mobility improves coverage of sensor networks", 2005, Proc. Mobihoc, may, Urbana-Champaign, IL Google ScholarDigital Library
- B. Liu and D. Towsley, A study on the Coverage of Large-scale Sensor Networks", The 1st IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004Google Scholar
- J. Liu and P. Cheung and L. Guibas and F. Zhao, A Dual Space Approach to Tracking and Sensor Management in Sensor Networks, Proc. ACM WSNA'02, sep, 2002 Google ScholarDigital Library
- R. Meester and R. Roy, Continuum percolation, Cambridge University Press, 1996Google ScholarCross Ref
- S. Megerian and F. Koushanfar and M. Potkonjak and M. Srivastava, "Worst and Best-Case Coverage in Sensor Networks", IEEE Transactions on Mobile Computing, 4, 1, 84--92, 2005 Google ScholarDigital Library
- S. Meguerdichian and F. Koushanfar and G. Qu and M. Potkonjak", "Exposure in Wireless Ad Hoc Sensor Networks", Proc. MobiCom, Rome, jul, 2001 Google ScholarDigital Library
- S. Pattem and S. Poduri and B. Krishnamachari, "Energy-Quality Tradeoffs for Tagret Tracking in Wireless Sensor Networks", Proc. ISPN'03, apr, 2003 Google ScholarDigital Library
- P. Santi, "The critical transmitting range for connectivity in mobile ad hoc networks", IEEE Trans. Mobile Computing, 4, 3, 2005, may, 310--317 Google ScholarDigital Library
- D. Stoyan and W. Kendall and J. Mecke, "Stochastic Geometry and its Applications", Wiley, 1995Google Scholar
- X. Wu and W. Trappe and Y. Zhang and T. Wood, "The feasability of Launching and Detecting Attacks in Wireless Networks", Proc. Mobihoc, Urbana-Champaign, IL, apr, 2005 Google ScholarDigital Library
Index Terms
- Delay of intrusion detection in wireless sensor networks
Recommendations
A new method for intrusion detection on hierarchical wireless sensor networks
ICUIMC '09: Proceedings of the 3rd International Conference on Ubiquitous Information Management and CommunicationWireless Sensor Network (WSN) is a novel technology in wireless field. The main function of this technology is to use sensor nodes to sense important information, just like battlefield data and personal health information, under the limited resources. ...
Query optimization based on user-specified delay item for wireless sensor networks
IWCMC '07: Proceedings of the 2007 international conference on Wireless communications and mobile computingSensor networks have recently attracted significant attention for many military and civil applications, such as environment monitoring, target tracking, and surveillance. A high-level abstraction of sensor networks forms the distributed database view, ...
An efficient cluster-based communication protocol for wireless sensor networks
A wireless sensor network is a network of large numbers of sensor nodes, where each sensor node is a tiny device that is equipped with a processing, sensing subsystem and a communication subsystem. The critical issue in wireless sensor networks is how ...
Comments