Skip to main content
Log in

Intrusion Detection in Mobile Sensor Networks: A Case Study for Different Intrusion Paths

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Intrusion detection is a very sensitive and major concern in wireless sensor networks. In border areas, sensors are installed to discover the presence of enemies or any trace passing in a prohibited area or any vicious moving object in the region of interest. In order to gain access to a region of interest, an intruder can take various paths, i.e., it can move along a straight line, follow a zigzag path or a curved path and move at a particular angle to cross the region without being detected and to improve its attacking ability. This paper formulates and analyzes \(\kappa\)-barrier coverage probability which acts as the intrusion detection probability for an intruder when the intruder follows different paths at different path angles with respect to the shortest path to cross the region of interest in a mobile sensor network. Furthermore, the effect of different network variables such as node density, sensing range, intrusion path angle and the ratio of sensor to intruder velocity on intrusion detection probability are also investigated. It is believed that the proposed model renders an effective tool to incorporate the intruder’s movement pattern in the design of an advanced finite wireless sensor network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Nagar, J., Chaturvedi, S. K., & Soh, S. (2020). An analytical model to estimate the performance metrics of a finite multihop network deployed in a rectangular region. Journal of Network and Computer Applications, 149, 102466.

    Article  Google Scholar 

  2. Wang, Y., Wang, X., Xie, B., Wang, D., & Agrawal, D. P. (2008). Intrusion detection in homogeneous and heterogeneous wireless sensor networks. IEEE Transactions on Mobile Computing, 7(6), 698–711.

    Article  Google Scholar 

  3. Assad, N., Elbhiri, B., EL Fkihi, S., Faqihi, M. A., Ouadou, M., & Aboutajdine, D. (2014). Short: Intrusion detection quality analysis for homogeneous wireless sensor networks. In Networked systems, 8593, (pp. 324–329).

  4. Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys & Tutorials, 16(1), 266–282.

    Article  Google Scholar 

  5. Nagar, J., & Sharma, S. (2018). k-barrier coverage-based intrusion detection for wireless sensor networks. In M. Bokhari, N. Agrawal, & D. Saini (Eds.), Cyber security (Vol. 729)., Advances in intelligent systems and computing Singapore: Springer.

    Google Scholar 

  6. Abdellatif, T., & Mosbah, M. (2018). Efficient monitoring for intrusion detection in wireless sensor networks. Concurrency and Computation: Practice and Experience, 32, 1–13.

    Google Scholar 

  7. Verma, A., & Ranga, V. (2020). Machine learning based intrusion detection systems for IoT applications. Wireless Personal Communications, 111, 2287–2310.

    Article  Google Scholar 

  8. Zhang, R., & Xiao, X. (2019). Intrusion Detection in wireless sensor networks with an improved NSA based on space division. Journal of Sensors, 2019, 1–20.

  9. Wang, Y., Weihuang, F., & Agrawal, D. P. (2013). Gaussian versus uniform distribution for intrusion detection in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 24(2), 342–355.

    Article  Google Scholar 

  10. Ghosh, K., Neogy, S., Das, P. K., & Mehta, M. (2018). Intrusion detection at international borders and large military barracks with multi-sink wireless sensor networks: An energy efficient solution. Wireless Personal Communication, 98, 1083–1101.

    Article  Google Scholar 

  11. Arjun, D., Indukala, P. K., & Unikrishna Menon K. A. (2017). border surveillance and intruder detection using wireless sensor networks: A brief survey. In International conference on communication and signal processing, April 6-8, 2017, India.

  12. Phipatanasuphorn, V., & Ramanathan, P. (2004). Vulnerability of sensor networks to unauthorized traversal and monitoring. IEEE Transactions on Computers, 53(3), 364–369.

    Article  Google Scholar 

  13. Liu, B., Dousse, O., Nain, P., & Towsley, D. (2013). Dynamic coverage of mobile sensor networks. IEEE Transactions on Parallel and Distributed Systems, 24(2), 301–311.

    Article  Google Scholar 

  14. Liu, B., Brass, P., Dousse, O., Nain, P., & Towsley, D. (2005). Mobility improves coverage of sensor networks. In Proceedings of the 6th ACM international symposium on mobile Ad Hoc networking and computing (Mobihoc), (pp. 300–308).

  15. Keung, G. Y., Li, B., & Zhang, Q. (2012). The intrusion detection in mobile sensor network. IEEE/ACM Transactions on Networking, 20(4), 1152–1161.

    Article  Google Scholar 

  16. Sagar, A. K., & Lobiyal, D. K. (2015). Probabilistic intrusion detection in randomly deployed wireless sensor networks. Wireless Personal Communications, 84(2), 1017–1037.

    Article  Google Scholar 

  17. Wang, Y. (2009). Intrusion detection in Gaussian distributed heterogeneous wireless sensor networks. In IEEE GLOBECOM, (pp. 1–6).

  18. Keramatpour, A., Nikanjam, A., & Ghaffarian, H. (2017). Deployment of wireless intrusion detection systems to provide the most possible coverage in wireless sensor networks without infrastructures. Wireless Personal Communication, 96, 3965–3978.

    Article  Google Scholar 

  19. Olteanu, A., Xiao, Y., Wu, K., & Xiaojiang, (2010). Weaving a proper net to catch large objects in wireless sensor networks. IEEE Transactions on Wireless Communication, 9(4), 1360–1369.

    Article  Google Scholar 

  20. Mostafaei, H., & Meybodi, M. R. (2014). An energy efficient barrier coverage algorithm for wireless sensor networks. Wireless Personal Communication, 77(3), 2099–2115.

    Article  Google Scholar 

  21. Wang, Y., Chu, W., Fields, S., Heinemann, C., & Reiter, Z. (2016). Detection of intelligent intruders in wireless sensor networks. Future Internet, 8(2), 1–18.

    Google Scholar 

  22. Wang, Y, Leow, Y. K., & Yin, J. (2009). Is straight-line path always the best for intrusion detection in wireless sensor networks?. In IEEE 15th ICPDS, (pp. 564–571).

  23. Hossain, A., Biswas, P. K., Chakrabarti, S. (2008). Sensing models and its impact on network coverage in wireless sensor network. In 3rd International Conference on Industrial and Information Systems (ICIIS), (pp. 1–5).

  24. Amutha, J., Sharma, S., & Nagar, J. (2020). WSN Strategies based on sensors, deployment, sensing models, coverage and energy efficiency: Review, approaches and open issues. Wireless Personal Communications, 111, 1089–1115.

    Article  Google Scholar 

  25. Camp, T., Boleng, J., & Davies, V. (2002). A survey of mobility models for ad hoc network research. Wireless Communications & Mobile Computing, 2(5), 483–502.

    Article  Google Scholar 

  26. Kabilan, K., Bhalaji, N., Selvaraj, C., Kumaar, M. B., & Karthikeyan, P. T. R. (2018). Performance analysis of IoT protocol under different mobility models. Computers & Electrical Engineering, 72, 154–168.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sandeep Sharma.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sharma, S., Nagar, J. Intrusion Detection in Mobile Sensor Networks: A Case Study for Different Intrusion Paths. Wireless Pers Commun 115, 2569–2589 (2020). https://doi.org/10.1007/s11277-020-07697-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07697-1

Keywords

Navigation