The University of Southampton
University of Southampton Institutional Repository

Intrusion detection based on k-coverage in mobile sensor networks with empowered intruders

Intrusion detection based on k-coverage in mobile sensor networks with empowered intruders
Intrusion detection based on k-coverage in mobile sensor networks with empowered intruders

Intrusion detection is one of the important applications of Wireless Sensor Networks (WSNs). Prior research indicated that the barrier coverage method combined with Mobile Sensor Networks (MSNs) can enhance the effectiveness of intrusion detection by mitigating coverage holes commonly appeared in stationary WSNs. However, the trajectories of moving sensors and moving intruders have not been investigated thoroughly, where the impact between two adjacent moving sensors and between a moving sensor and a moving intruder are still underdetermined. In order to address these open problems, in this paper, we firstly discuss the virtual potential field between sensors as well as between sensors and intruders. We then propose to formulate the mobility pattern of sensor node using elastic collision model and that of intruder using point charge model. The point charge model describes an hitherto-unexplored mobility pattern of empowered-intruders, which are capable of acting upon the virtual repulsive forces from sensors in order to hide them away from being detected. With the aid of the two models developed, analytical expressions and simulation results demonstrate that our proposed design achieves a higher k -barrier coverage probability in intrusion detection when compared to that of the conventional designs. It is also worth mentioning that these improvements are achieved with shorter average displacement distance and under the much more challenging MSNs settings.

Belts, empowered intruders, Intrusion detection, intrusion detection, k-barrier coverage, Mobile sensor networks, Monitoring, Robot sensing systems, Trajectory, Wireless sensor networks
0018-9545
Huang, Haiping
59ce5a98-06c2-45b5-87df-a18f50a9545a
Gong, Tianhe
e1653a0c-3dff-440b-b9b3-8d6cb9090cc5
Zhang, Rong
3be8f78f-f079-4a3f-a151-76ecd5f378f4
Yang, Lieliang
ae425648-d9a3-4b7d-8abd-b3cfea375bc7
Zhang, Jiancong
81ef8b45-6350-4abd-aae7-343f96594ced
Xiao, Fu
f7ae34fa-c9d8-457c-bdc2-abf97a17a890
Huang, Haiping
59ce5a98-06c2-45b5-87df-a18f50a9545a
Gong, Tianhe
e1653a0c-3dff-440b-b9b3-8d6cb9090cc5
Zhang, Rong
3be8f78f-f079-4a3f-a151-76ecd5f378f4
Yang, Lieliang
ae425648-d9a3-4b7d-8abd-b3cfea375bc7
Zhang, Jiancong
81ef8b45-6350-4abd-aae7-343f96594ced
Xiao, Fu
f7ae34fa-c9d8-457c-bdc2-abf97a17a890

Huang, Haiping, Gong, Tianhe, Zhang, Rong, Yang, Lieliang, Zhang, Jiancong and Xiao, Fu (2018) Intrusion detection based on k-coverage in mobile sensor networks with empowered intruders. IEEE Transactions on Vehicular Technology. (doi:10.1109/TVT.2018.2872848). (In Press)

Record type: Article

Abstract

Intrusion detection is one of the important applications of Wireless Sensor Networks (WSNs). Prior research indicated that the barrier coverage method combined with Mobile Sensor Networks (MSNs) can enhance the effectiveness of intrusion detection by mitigating coverage holes commonly appeared in stationary WSNs. However, the trajectories of moving sensors and moving intruders have not been investigated thoroughly, where the impact between two adjacent moving sensors and between a moving sensor and a moving intruder are still underdetermined. In order to address these open problems, in this paper, we firstly discuss the virtual potential field between sensors as well as between sensors and intruders. We then propose to formulate the mobility pattern of sensor node using elastic collision model and that of intruder using point charge model. The point charge model describes an hitherto-unexplored mobility pattern of empowered-intruders, which are capable of acting upon the virtual repulsive forces from sensors in order to hide them away from being detected. With the aid of the two models developed, analytical expressions and simulation results demonstrate that our proposed design achieves a higher k -barrier coverage probability in intrusion detection when compared to that of the conventional designs. It is also worth mentioning that these improvements are achieved with shorter average displacement distance and under the much more challenging MSNs settings.

Text
08477168 - Accepted Manuscript
Available under License Creative Commons Attribution.
Download (1MB)

More information

Accepted/In Press date: 1 October 2018
Keywords: Belts, empowered intruders, Intrusion detection, intrusion detection, k-barrier coverage, Mobile sensor networks, Monitoring, Robot sensing systems, Trajectory, Wireless sensor networks

Identifiers

Local EPrints ID: 425382
URI: http://eprints.soton.ac.uk/id/eprint/425382
ISSN: 0018-9545
PURE UUID: 86e90793-3a19-4a0f-95d8-f2c524aef9f2
ORCID for Lieliang Yang: ORCID iD orcid.org/0000-0002-2032-9327

Catalogue record

Date deposited: 17 Oct 2018 16:30
Last modified: 16 Mar 2024 03:00

Export record

Altmetrics

Contributors

Author: Haiping Huang
Author: Tianhe Gong
Author: Rong Zhang
Author: Lieliang Yang ORCID iD
Author: Jiancong Zhang
Author: Fu Xiao

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×