Skip to main content

Intrusion Detection in a Tailor-Made Gaussian Distribution Wireless Sensor Networks

  • Conference paper
Distributed Computing and Internet Technology (ICDCIT 2015)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8956))

Abstract

Node deployment strategy plays a crucial role in determining the intrusion detection capability of a wireless sensor network (WSN). In this paper, we investigate the intrusion detection problem in a tailor-made Gaussian distributed network considering multiple-sensing detection scenario. Exhaustive simulation is performed primarily to validate the correctness of modeling and analysis. Effects of different network parameters on the detection probability are also examined. Finally, the effectiveness of the proposed approach is confirmed by comparing with its counterpart Gaussian deployment strategy under the considered scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wang, Y., Lun, Z.: Intrusion Detection in a K-Gaussian Distributed Wireless Sensor Network. Journal of Parallel and Distributed Computing 71(12), 1598–1607 (2011)

    Article  MATH  Google Scholar 

  2. Wang, Y., Wang, X., Xie, B., Wang, D., Agrawal, D.P.: Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks. IEEE Trans. on Mobile Computing 7(6), 698–711 (2008)

    Article  Google Scholar 

  3. Wang, Y., Fu, W., Agrawal, D.P.: Gaussian Versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks. IEEE Trans. on Parallel and Distributed Systems 24(2), 342–355 (2013)

    Article  Google Scholar 

  4. Halder, S., Ghosal, A.: Is Sensor Deployment using Gaussian Distribution Energy Balanced? In: Kołodziej, J., Di Martino, B., Talia, D., Xiong, K. (eds.) ICA3PP 2013, Part I. LNCS, vol. 8285, pp. 58–71. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  5. Ababnah, A., Natarajan, B.: Optimal Control-based Strategy for Sensor Deployment. IEEE Trans. on Systems, Man and Cybernetics, Part A: Systems and Humans 41(1), 97–104 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Ghosal, A., Halder, S. (2015). Intrusion Detection in a Tailor-Made Gaussian Distribution Wireless Sensor Networks. In: Natarajan, R., Barua, G., Patra, M.R. (eds) Distributed Computing and Internet Technology. ICDCIT 2015. Lecture Notes in Computer Science, vol 8956. Springer, Cham. https://doi.org/10.1007/978-3-319-14977-6_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-14977-6_32

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-14976-9

  • Online ISBN: 978-3-319-14977-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics