Skip to main content
Log in

Efficient deployment quality analysis for intrusion detection in wireless sensor networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

The intrusion detection in a Wireless Sensor Network is defined as a mechanism to monitor and detect any intruder in a sensing area. The sensor deployment quality is a critical issue since it reflects the cost and detection capability of a wireless sensor network. The quality of deterministic deployment can be determined sufficiently by a rigorous analysis before the deployment. However, when random deployment is required, determining the deployment quality becomes challenging. In the intrusion detection application, it is necessary to define more precise measures of sensing range, transmission range, and node density that impact overall system performance. The major question is centred around the quality of intrusion detection in WSN, how we can guarantee that each point of the sensing area is covered by at least one sensor node, and what a sufficient condition to guarantee the network connectivity? In this paper, we propose an appropriate probabilistic model which provides the coverage and connectivity in k-sensing detection of a wireless sensor network. We have proved the capability of our approach using a geometric analysis and a probabilistic model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Mulligan, R., & Ammari, H. M. (2010). Coverage in wireless sensor networks: A survey. Network Protocols and Algorithms, 2(2), 27–53.

    Google Scholar 

  2. Ravelomanana, V. (2004). Extremal properties of three-dimensional sensor networks with applications. IEEE Transactions on Mobile Computing, 3(3), 246–257.

    Article  Google Scholar 

  3. Yardibi, T., & Karasan, E. (2010). A distributed activity scheduling algorithm for wireless sensor networks with partial coverage. Wireless Networks, 16(1), 213–225.

    Article  Google Scholar 

  4. Ai, J., & Abouzeid, A. A. (2006). Coverage by directional sensors in randomly deployed wireless sensor networks. Journal of Combinatorial Optimization, 11(1), 21–41.

    Article  MathSciNet  MATH  Google Scholar 

  5. Onur, E., Ersoy, C., & Deliç, H. (2006). How many sensors for an acceptable breach detection probability? Computer Communications, 29(2), 173–182.

    Article  Google Scholar 

  6. Li, J., Andrew, L. L., Foh, C. H., Zukerman, M., & Chen, H. H. (2009). Connectivity, coverage and placement in wireless sensor networks. Sensors, 9(10), 7664–7693.

    Article  Google Scholar 

  7. Boegsted, M., Rasmussen, J. G., & Schwefel, H. P. (2011). Connectivity analysis of one-dimensional ad-hoc networks. Wireless Networks, 17(1), 87–101.

    Article  Google Scholar 

  8. Wang, P., Akyildiz, I. F., & Al-Dhelaan, A. M. (2011). Percolation theory based connectivity and latency analysis of cognitive radio ad hoc networks. Wireless Networks, 17(3), 659–669.

    Article  Google Scholar 

  9. Ye, F., Zhong, G., Cheng, J., Lu, S., & Zhang, L. (2003). Peas: A robust energy conserving protocol for long-lived sensor networks. In Proceedings of the 23rd international conference on distributed computing systems. IEEE, pp. 28–37.

  10. Cerpa, A., & Estrin, D. (2004). Ascent: adaptive self-configuring sensor networks topologies. IEEE Transactions on Mobile Computing, 3(3), 272–285.

    Article  Google Scholar 

  11. Zhao, T., & Zhao, Q. (2009). Lifetime maximization based on coverage and connectivity in wireless sensor networks. Journal of Signal Processing Systems, 57(3), 385–400.

    Article  Google Scholar 

  12. Xu, N., Huang, A., Hou, T. W., & Chen, H. H. (2012). Coverage and connectivity guaranteed topology control algorithm for cluster-based wireless sensor networks. Wireless Communications and Mobile Computing, 12(1), 23–32.

    Article  Google Scholar 

  13. Zeng, Y., Sreenan, C. J., Xiong, N., Yang, L. T., & Park, J. H. (2010). Connectivity and coverage maintenance in wireless sensor networks. The Journal of Supercomputing, 52(1), 23–46.

    Article  Google Scholar 

  14. Yang, S., Dai, F., Cardei, M., Wu, J., & Patterson, F. (2006). On connected multiple point coverage in wireless sensor networks. International Journal of Wireless Information Networks, 13(4), 289–301.

    Article  Google Scholar 

  15. Gupta, H., Zhou, Z., Das, S. R., & Gu, Q. (2006). Connected sensor cover: Self-organization of sensor networks for efficient query execution. IEEE/ACM Transactions on Networking, 14(1), 55–67.

    Article  Google Scholar 

  16. Kumar, S., Lai, T. H., & Balogh, J. (2004). On k-coverage in a mostly sleeping sensor network. In Proceedings of the 10th annual international conference on mobile computing and networking. ACM, pp. 144–158.

  17. Pishro-Nik, H., Chan, K., & Fekri, F. (2009). Connectivity properties of large-scale sensor networks. Wireless Networks, 15(7), 945–964.

    Article  Google Scholar 

  18. Huang, C. F., & Tseng, Y. C. (2005). The coverage problem in a wireless sensor network. Mobile Networks and Applications, 10(4), 519–528.

    Article  MathSciNet  Google Scholar 

  19. Wang, Y. (2008) Topology control for wireless sensor networks. In Wireless sensor networks and applications (pp. 113–147). Berlin: Springer.

  20. Assad, N., Elbhiri, B., El Fkihi, S., Faqihi, M. A., Ouadou, M., & Aboutajdine, D. (2014). Short: Intrusion detection quality analysis for homogeneous wireless sensor networks. In Networked systems (pp. 324–329). Berlin: Springer.

  21. Xing, G., Wang, X., Zhang, Y., Lu, C., Pless, R., & Gill, C. (2005). Integrated coverage and connectivity configuration for energy conservation in sensor networks. ACM Transactions on Sensor Networks (TOSN), 1(1), 36–72.

    Article  Google Scholar 

  22. Bettstetter, C. (2002) On the connectivity of wireless multihop networks with homogeneous and inhomogeneous range assignment. InProceedings of the 2002 IEEE 56th vehicular technology conference, VTC 2002-Fall, vol. 3. IEEE, pp. 1706–1710.

  23. Zhang, H., & Hou, J. C. (2005). Maintaining sensing coverage and connectivity in large sensor networks. Ad Hoc & Sensor Wireless Networks, 1(1–2), 89–124.

    Google Scholar 

  24. Liu, B., & Towsley, D. (2004) A study of the coverage of large-scale sensor networks. In 2004 IEEE international conference on mobile ad-hoc and sensor systems. IEEE, pp. 475–483.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Noureddine Assad.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Assad, N., Elbhiri, B., Faqihi, M.A. et al. Efficient deployment quality analysis for intrusion detection in wireless sensor networks. Wireless Netw 22, 991–1006 (2016). https://doi.org/10.1007/s11276-015-1015-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-015-1015-z

Keywords

Navigation