Abstract
The intrusion detection in a Wireless Sensor Network is defined as a mechanism to monitor and detect any intruder in a sensing area. The sensor deployment quality is a critical issue since it reflects the cost and detection capability of a wireless sensor network. The quality of deterministic deployment can be determined sufficiently by a rigorous analysis before the deployment. However, when random deployment is required, determining the deployment quality becomes challenging. In the intrusion detection application, it is necessary to define more precise measures of sensing range, transmission range, and node density that impact overall system performance. The major question is centred around the quality of intrusion detection in WSN, how we can guarantee that each point of the sensing area is covered by at least one sensor node, and what a sufficient condition to guarantee the network connectivity? In this paper, we propose an appropriate probabilistic model which provides the coverage and connectivity in k-sensing detection of a wireless sensor network. We have proved the capability of our approach using a geometric analysis and a probabilistic model.
Similar content being viewed by others
References
Mulligan, R., & Ammari, H. M. (2010). Coverage in wireless sensor networks: A survey. Network Protocols and Algorithms, 2(2), 27–53.
Ravelomanana, V. (2004). Extremal properties of three-dimensional sensor networks with applications. IEEE Transactions on Mobile Computing, 3(3), 246–257.
Yardibi, T., & Karasan, E. (2010). A distributed activity scheduling algorithm for wireless sensor networks with partial coverage. Wireless Networks, 16(1), 213–225.
Ai, J., & Abouzeid, A. A. (2006). Coverage by directional sensors in randomly deployed wireless sensor networks. Journal of Combinatorial Optimization, 11(1), 21–41.
Onur, E., Ersoy, C., & Deliç, H. (2006). How many sensors for an acceptable breach detection probability? Computer Communications, 29(2), 173–182.
Li, J., Andrew, L. L., Foh, C. H., Zukerman, M., & Chen, H. H. (2009). Connectivity, coverage and placement in wireless sensor networks. Sensors, 9(10), 7664–7693.
Boegsted, M., Rasmussen, J. G., & Schwefel, H. P. (2011). Connectivity analysis of one-dimensional ad-hoc networks. Wireless Networks, 17(1), 87–101.
Wang, P., Akyildiz, I. F., & Al-Dhelaan, A. M. (2011). Percolation theory based connectivity and latency analysis of cognitive radio ad hoc networks. Wireless Networks, 17(3), 659–669.
Ye, F., Zhong, G., Cheng, J., Lu, S., & Zhang, L. (2003). Peas: A robust energy conserving protocol for long-lived sensor networks. In Proceedings of the 23rd international conference on distributed computing systems. IEEE, pp. 28–37.
Cerpa, A., & Estrin, D. (2004). Ascent: adaptive self-configuring sensor networks topologies. IEEE Transactions on Mobile Computing, 3(3), 272–285.
Zhao, T., & Zhao, Q. (2009). Lifetime maximization based on coverage and connectivity in wireless sensor networks. Journal of Signal Processing Systems, 57(3), 385–400.
Xu, N., Huang, A., Hou, T. W., & Chen, H. H. (2012). Coverage and connectivity guaranteed topology control algorithm for cluster-based wireless sensor networks. Wireless Communications and Mobile Computing, 12(1), 23–32.
Zeng, Y., Sreenan, C. J., Xiong, N., Yang, L. T., & Park, J. H. (2010). Connectivity and coverage maintenance in wireless sensor networks. The Journal of Supercomputing, 52(1), 23–46.
Yang, S., Dai, F., Cardei, M., Wu, J., & Patterson, F. (2006). On connected multiple point coverage in wireless sensor networks. International Journal of Wireless Information Networks, 13(4), 289–301.
Gupta, H., Zhou, Z., Das, S. R., & Gu, Q. (2006). Connected sensor cover: Self-organization of sensor networks for efficient query execution. IEEE/ACM Transactions on Networking, 14(1), 55–67.
Kumar, S., Lai, T. H., & Balogh, J. (2004). On k-coverage in a mostly sleeping sensor network. In Proceedings of the 10th annual international conference on mobile computing and networking. ACM, pp. 144–158.
Pishro-Nik, H., Chan, K., & Fekri, F. (2009). Connectivity properties of large-scale sensor networks. Wireless Networks, 15(7), 945–964.
Huang, C. F., & Tseng, Y. C. (2005). The coverage problem in a wireless sensor network. Mobile Networks and Applications, 10(4), 519–528.
Wang, Y. (2008) Topology control for wireless sensor networks. In Wireless sensor networks and applications (pp. 113–147). Berlin: Springer.
Assad, N., Elbhiri, B., El Fkihi, S., Faqihi, M. A., Ouadou, M., & Aboutajdine, D. (2014). Short: Intrusion detection quality analysis for homogeneous wireless sensor networks. In Networked systems (pp. 324–329). Berlin: Springer.
Xing, G., Wang, X., Zhang, Y., Lu, C., Pless, R., & Gill, C. (2005). Integrated coverage and connectivity configuration for energy conservation in sensor networks. ACM Transactions on Sensor Networks (TOSN), 1(1), 36–72.
Bettstetter, C. (2002) On the connectivity of wireless multihop networks with homogeneous and inhomogeneous range assignment. InProceedings of the 2002 IEEE 56th vehicular technology conference, VTC 2002-Fall, vol. 3. IEEE, pp. 1706–1710.
Zhang, H., & Hou, J. C. (2005). Maintaining sensing coverage and connectivity in large sensor networks. Ad Hoc & Sensor Wireless Networks, 1(1–2), 89–124.
Liu, B., & Towsley, D. (2004) A study of the coverage of large-scale sensor networks. In 2004 IEEE international conference on mobile ad-hoc and sensor systems. IEEE, pp. 475–483.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Assad, N., Elbhiri, B., Faqihi, M.A. et al. Efficient deployment quality analysis for intrusion detection in wireless sensor networks. Wireless Netw 22, 991–1006 (2016). https://doi.org/10.1007/s11276-015-1015-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-015-1015-z