Abstract
Aim: For a Wireless Sensor Network (WSN), the sensor node deployment is a critical issue since it reflects the coverage quality. It is the most fundamental issue in WSNs, and it has a great effect on the overall WSN application performance. When it is necessary to deploy randomly sensor nodes in a field of interest to form a WSN, ensuring a high coverage quality becomes difficult. In the random deployment scenario, the most difficult aspect of sensing coverage is to find how well the sensor nodes cover the field of interest. In this paper, we analyze the intrusion detection in a WSN which is defined as a mechanism for monitoring and detecting any intruder in a field of interest, with the objective of enhancing the detection quality in a random WSN. It is required to establish more specific measurements of node density and sensor range that impact the overall system performance especially in the intrusion detection application. To enhance the quality of intrusion detection, several probabilistic models are adopted for heterogeneous WSN in the random deployment scenario.
Methods: Multi-intrusion detection model probability in a heterogeneous wireless sensor network for random deployment was used.
Results and Discussion: In both homogeneous and heterogeneous WSNs, we analyzed our probabilistic model for multi-intrusion detection in single and multi-sensing detection.
Conclusion: Our probabilistic models are useful in selecting the critical parameters of WSN in order to meet the detection quality requirement.
Keywords: Intrusion detection probability, monitoring area, heterogeneous WSN, sensing range, node density, deployment.
Graphical Abstract
[http://dx.doi.org/10.1109/ACCESS.2019.2902072]
[http://dx.doi.org/10.1007/978-981-13-1217-5_16]
[http://dx.doi.org/10.14569/IJACSA.2018.090614]
[http://dx.doi.org/10.1002/dac.3283]
[http://dx.doi.org/10.1111/itor.12280]
[http://dx.doi.org/10.1016/j.pmcj.2016.08.005]
[http://dx.doi.org/10.1049/iet-wss.2015.0094]
[http://dx.doi.org/10.1007/s11277-017-5026-1]
[http://dx.doi.org/10.1111/itor.12615]
[http://dx.doi.org/10.2174/2210327909666190821101606]
[http://dx.doi.org/10.1049/iet-wss.2017.0090]
[http://dx.doi.org/10.1007/s12652-018-0868-2]
[http://dx.doi.org/10.1049/iet-wss.2018.5048]
[http://dx.doi.org/10.1016/j.pmcj.2018.06.007]
[http://dx.doi.org/10.1109/JCN.2019.000005]
[http://dx.doi.org/10.1049/iet-wss.2019.0083]
[http://dx.doi.org/10.1016/j.adhoc.2019.102037]
[http://dx.doi.org/10.1016/j.ins.2019.02.059]
[http://dx.doi.org/10.1109/ACCESS.2021.3053594]
[http://dx.doi.org/10.1007/s11276-008-0125-2]
[http://dx.doi.org/10.1002/net.21682]
[http://dx.doi.org/10.1109/TVT.2017.2681692]
[http://dx.doi.org/10.1109/ACCESS.2017.2740382]
[http://dx.doi.org/10.2174/2210327910999200710165007]
[http://dx.doi.org/10.1504/IJAACS.2017.088774]
[http://dx.doi.org/10.1145/3457408]
[http://dx.doi.org/10.1007/s11276-015-1015-z]
[http://dx.doi.org/10.1145/3010089.3010109]
[http://dx.doi.org/10.1109/TII.2013.2250910]
[http://dx.doi.org/10.1016/j.compeleceng.2015.11.009]
[http://dx.doi.org/10.1109/TNET.2016.2574563]
[http://dx.doi.org/10.1016/j.adhoc.2018.07.003]