skip to main content
10.1145/1132905.1132923acmconferencesArticle/Chapter ViewAbstractPublication PagesmobihocConference Proceedingsconference-collections
Article

Delay of intrusion detection in wireless sensor networks

Published:22 May 2006Publication History

ABSTRACT

In this paper we consider sensor networks for intrusion detection, such that node deployment, node failures and node behavior result in coverage gaps and a fraction of disconnected nodes in an otherwise dense and well-connected network. We focus on the time delay for a mobile intruder to be detected by a sensor with a connected path to the sink, in contrast to existing results for the detection time by a sensor with arbitrary connectivity. We model our network using a supercritical percolation model on the plane, implying the existence of a unique unbounded connected component, and we assume that the sink belongs to this component. We analyze the distribution of the distance traveled by a moving target until it comes within sensing range of a node in the giant component, providing analytical bounds for linear intruder mobility and thorough simulation results for other mobility models. We show that the probability that the intruder proceeds undetected exhibits non-memoryless behavior over shorter distances and an exponentially decreasing tail. We also show that the time of contact with the giant component incurs considerably more delay than the time of first contact with any node, in networks with less than 10% of nodes without a path to the sink, which means that even a small percentage of node failures may have a drastic impact on the performance of intrusion detection by a wireless sensor networ.

References

  1. C. Bettstetter, Topology Properties of Ad Hoc Networks with Random Waypoint Mobility, Proc. MobiHoc, Anapolis, jun, 2003 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Q. Cao and T. Abdelzaher and T. He and J. Stankovic, "Towards optimal sleep scheduling in sensor networks for rare event detection", Proc. IPSN'05, apr, Los Angeles, 2005 Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Q. Cao and T. Abdelzaher and T. He and J. Stankovic, "Towards optimal sleep scheduling in sensor networks for rare event detection, Proc. IPSN'05, apr, Los Angeles, 2005 Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. O. Dousse and C. Tavoularis and P. Thiran, On the distance to the giant component along a straight line in a two-dimensional percolation model, Proc. SpaSWin, Riva del Garda, Italy, apr, 2005Google ScholarGoogle Scholar
  5. O. Dousse and P. Thiran and M. Hasler, "Connectivity in ad-hoc and hybrid networks", Proc. IEEE Infocom, New York, jun, 2002Google ScholarGoogle ScholarCross RefCross Ref
  6. M. Franceschetti and L. Booth and M. Cook and R. Meester and J. Bruck, "Continuum Percolation with unreliable and spread out connections", Journal of Statistical Physics, 2005, 118, 3/4, Feb. 2005.Google ScholarGoogle ScholarCross RefCross Ref
  7. R. Groenevelt and E. Altman and P. Nain", Relaying in mobile ad hoc networks: the Brownian motion mobility model, Proc. WiOpt, Cambridge, UK, sep, 2004 Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. C. Gui and P. Mohapatra, Power Conservation and Quality of Surveillance in Target Tracking Sensor Networks, Proc. Mobicom, Philadelphia, sep, 2004 Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. T. He et al, An Energy-Efficient Surveillance System for Sensor Networks, Proc. MobiSYS, jun, Boston, MA, 2004 Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. G. Kesidis and T. Konstantopoulos and S. Phoha, Surveillance coverage of sensor networks under a random mobility strategy, Proc. IEEE Sensors, oct, 2003Google ScholarGoogle ScholarCross RefCross Ref
  11. B. Liu and P. Brass and O. Dousse and P. Nain and D. Towsley, "Mobility improves coverage of sensor networks", 2005, Proc. Mobihoc, may, Urbana-Champaign, IL Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. B. Liu and D. Towsley, A study on the Coverage of Large-scale Sensor Networks", The 1st IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004Google ScholarGoogle Scholar
  13. J. Liu and P. Cheung and L. Guibas and F. Zhao, A Dual Space Approach to Tracking and Sensor Management in Sensor Networks, Proc. ACM WSNA'02, sep, 2002 Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. R. Meester and R. Roy, Continuum percolation, Cambridge University Press, 1996Google ScholarGoogle ScholarCross RefCross Ref
  15. S. Megerian and F. Koushanfar and M. Potkonjak and M. Srivastava, "Worst and Best-Case Coverage in Sensor Networks", IEEE Transactions on Mobile Computing, 4, 1, 84--92, 2005 Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. S. Meguerdichian and F. Koushanfar and G. Qu and M. Potkonjak", "Exposure in Wireless Ad Hoc Sensor Networks", Proc. MobiCom, Rome, jul, 2001 Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. S. Pattem and S. Poduri and B. Krishnamachari, "Energy-Quality Tradeoffs for Tagret Tracking in Wireless Sensor Networks", Proc. ISPN'03, apr, 2003 Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. P. Santi, "The critical transmitting range for connectivity in mobile ad hoc networks", IEEE Trans. Mobile Computing, 4, 3, 2005, may, 310--317 Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. D. Stoyan and W. Kendall and J. Mecke, "Stochastic Geometry and its Applications", Wiley, 1995Google ScholarGoogle Scholar
  20. X. Wu and W. Trappe and Y. Zhang and T. Wood, "The feasability of Launching and Detecting Attacks in Wireless Networks", Proc. Mobihoc, Urbana-Champaign, IL, apr, 2005 Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Delay of intrusion detection in wireless sensor networks

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          MobiHoc '06: Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing
          May 2006
          378 pages
          ISBN:1595933689
          DOI:10.1145/1132905

          Copyright © 2006 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 22 May 2006

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate296of1,843submissions,16%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader