SlideShare a Scribd company logo
1 of 2
Download to read offline
GAUSSIAN VERSUS UNIFORM DISTRIBUTION FOR INTRUSION
DETECTION IN WIRELESS SENSOR NETWORKS
ABSTRACT:
In a Wireless Sensor Network (WSN), intrusion detection is of significant importance in many
applications in detecting malicious or unexpected intruder(s). The intruder can be an enemy in a
battlefield, or a malicious moving object in the area of interest. With uniform sensor deployment,
the detection probability is the same for any point in a WSN. However, some applications may
require different degrees of detection probability at different locations. For example, an intrusion
detection application may need improved detection probability around important entities.
Gaussian-distributed WSNs can provide differentiated detection capabilities at different locations
but related work is limited.
This paper analyzes the problem of intrusion detection in a Gaussian-distributed WSN by
characterizing the detection probability with respect to the application requirements and the
network parameters under both single-sensing detection and multiple-sensing detection
scenarios. Effects of different network parameters on the detection probability are examined in
detail. Furthermore, performance of Gaussian-distributed WSNs is compared with uniformly
distributed WSNs. This work allows us to analytically formulate detection probability in a
random WSN and provides guidelines in selecting an appropriate deployment strategy and
determining critical network parameters.
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com
Gaussian versus uniform distribution for intrusion detection in wireless sensor networks

More Related Content

What's hot

Calibrate without calibrating an iterative approach in participatory sensing ...
Calibrate without calibrating an iterative approach in participatory sensing ...Calibrate without calibrating an iterative approach in participatory sensing ...
Calibrate without calibrating an iterative approach in participatory sensing ...
ieeeprojectsbangalore
 
Detecting proximity events in sensor networks
Detecting proximity events in sensor networksDetecting proximity events in sensor networks
Detecting proximity events in sensor networks
BalaSuresh AsaiThambi
 
Cross layer design of distributed sensing-estimation with quality feedback— p...
Cross layer design of distributed sensing-estimation with quality feedback— p...Cross layer design of distributed sensing-estimation with quality feedback— p...
Cross layer design of distributed sensing-estimation with quality feedback— p...
ieeeprojectsbangalore
 
Modeling and automated containment of worms (synopsis)
Modeling and automated containment of worms (synopsis)Modeling and automated containment of worms (synopsis)
Modeling and automated containment of worms (synopsis)
Mumbai Academisc
 

What's hot (15)

50120140506007 2
50120140506007 250120140506007 2
50120140506007 2
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
O010528791
O010528791O010528791
O010528791
 
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...
 
Calibrate without calibrating an iterative approach in participatory sensing ...
Calibrate without calibrating an iterative approach in participatory sensing ...Calibrate without calibrating an iterative approach in participatory sensing ...
Calibrate without calibrating an iterative approach in participatory sensing ...
 
SPal_Cooperative_WSNs
SPal_Cooperative_WSNsSPal_Cooperative_WSNs
SPal_Cooperative_WSNs
 
26
2626
26
 
A detection & prevention of wormhole attack in wsn project abstract
A detection & prevention of wormhole attack in wsn project abstractA detection & prevention of wormhole attack in wsn project abstract
A detection & prevention of wormhole attack in wsn project abstract
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor network
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
 
ON THE VULNERABILITIES OF VORONOI-BASED APPROACHES TO MOBILE SENSOR DEPLOYMENT
ON THE VULNERABILITIES OF VORONOI-BASED  APPROACHES TO MOBILE SENSOR DEPLOYMENTON THE VULNERABILITIES OF VORONOI-BASED  APPROACHES TO MOBILE SENSOR DEPLOYMENT
ON THE VULNERABILITIES OF VORONOI-BASED APPROACHES TO MOBILE SENSOR DEPLOYMENT
 
Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol ppt
 
Detecting proximity events in sensor networks
Detecting proximity events in sensor networksDetecting proximity events in sensor networks
Detecting proximity events in sensor networks
 
Cross layer design of distributed sensing-estimation with quality feedback— p...
Cross layer design of distributed sensing-estimation with quality feedback— p...Cross layer design of distributed sensing-estimation with quality feedback— p...
Cross layer design of distributed sensing-estimation with quality feedback— p...
 
Modeling and automated containment of worms (synopsis)
Modeling and automated containment of worms (synopsis)Modeling and automated containment of worms (synopsis)
Modeling and automated containment of worms (synopsis)
 

Viewers also liked

Cook fuel cell presentation
Cook fuel cell presentationCook fuel cell presentation
Cook fuel cell presentation
cookk15
 
Understand All About Hydrogen Gas Techniques
Understand All About Hydrogen Gas TechniquesUnderstand All About Hydrogen Gas Techniques
Understand All About Hydrogen Gas Techniques
italykale68
 
John Bryan E3 2009 Impact Of Electrification
John Bryan E3 2009 Impact Of ElectrificationJohn Bryan E3 2009 Impact Of Electrification
John Bryan E3 2009 Impact Of Electrification
John Bryan
 

Viewers also liked (9)

Monitoring of posture allocations and activities by a shoe based wearable sensor
Monitoring of posture allocations and activities by a shoe based wearable sensorMonitoring of posture allocations and activities by a shoe based wearable sensor
Monitoring of posture allocations and activities by a shoe based wearable sensor
 
Cook fuel cell presentation
Cook fuel cell presentationCook fuel cell presentation
Cook fuel cell presentation
 
Understand All About Hydrogen Gas Techniques
Understand All About Hydrogen Gas TechniquesUnderstand All About Hydrogen Gas Techniques
Understand All About Hydrogen Gas Techniques
 
Graham Brennan - SEI - Renewable Energy and Transport Developments in Ireland
Graham Brennan - SEI - Renewable Energy and Transport Developments in IrelandGraham Brennan - SEI - Renewable Energy and Transport Developments in Ireland
Graham Brennan - SEI - Renewable Energy and Transport Developments in Ireland
 
John Bryan E3 2009 Impact Of Electrification
John Bryan E3 2009 Impact Of ElectrificationJohn Bryan E3 2009 Impact Of Electrification
John Bryan E3 2009 Impact Of Electrification
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Similar to Gaussian versus uniform distribution for intrusion detection in wireless sensor networks

Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...
Ecwayt
 
Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...
ecwayprojects
 
Dotnet gaussian versus uniform distribution for intrusion detection in wirel...
Dotnet  gaussian versus uniform distribution for intrusion detection in wirel...Dotnet  gaussian versus uniform distribution for intrusion detection in wirel...
Dotnet gaussian versus uniform distribution for intrusion detection in wirel...
Ecwayt
 
Dotnet gaussian versus uniform distribution for intrusion detection in wirel...
Dotnet  gaussian versus uniform distribution for intrusion detection in wirel...Dotnet  gaussian versus uniform distribution for intrusion detection in wirel...
Dotnet gaussian versus uniform distribution for intrusion detection in wirel...
Ecwaytech
 
Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...
Ecwaytech
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksIntrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Harshal Ladhe
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
nagibtech
 
High uncertainty aware localization and error optimization of mobile nodes fo...
High uncertainty aware localization and error optimization of mobile nodes fo...High uncertainty aware localization and error optimization of mobile nodes fo...
High uncertainty aware localization and error optimization of mobile nodes fo...
IAESIJAI
 
Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...
ambitlick
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Editor IJMTER
 
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
IJCSIS Research Publications
 

Similar to Gaussian versus uniform distribution for intrusion detection in wireless sensor networks (20)

Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...
 
Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...
 
Dotnet gaussian versus uniform distribution for intrusion detection in wirel...
Dotnet  gaussian versus uniform distribution for intrusion detection in wirel...Dotnet  gaussian versus uniform distribution for intrusion detection in wirel...
Dotnet gaussian versus uniform distribution for intrusion detection in wirel...
 
Dotnet gaussian versus uniform distribution for intrusion detection in wirel...
Dotnet  gaussian versus uniform distribution for intrusion detection in wirel...Dotnet  gaussian versus uniform distribution for intrusion detection in wirel...
Dotnet gaussian versus uniform distribution for intrusion detection in wirel...
 
Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksIntrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
 
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 
50120140505014
5012014050501450120140505014
50120140505014
 
Security Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor NetworksSecurity Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor Networks
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...
 
C0511318
C0511318C0511318
C0511318
 
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
 
Ao03402350245
Ao03402350245Ao03402350245
Ao03402350245
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Bm32410415
Bm32410415Bm32410415
Bm32410415
 
High uncertainty aware localization and error optimization of mobile nodes fo...
High uncertainty aware localization and error optimization of mobile nodes fo...High uncertainty aware localization and error optimization of mobile nodes fo...
High uncertainty aware localization and error optimization of mobile nodes fo...
 
Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
 
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
 

Recently uploaded

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Recently uploaded (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 

Gaussian versus uniform distribution for intrusion detection in wireless sensor networks

  • 1. GAUSSIAN VERSUS UNIFORM DISTRIBUTION FOR INTRUSION DETECTION IN WIRELESS SENSOR NETWORKS ABSTRACT: In a Wireless Sensor Network (WSN), intrusion detection is of significant importance in many applications in detecting malicious or unexpected intruder(s). The intruder can be an enemy in a battlefield, or a malicious moving object in the area of interest. With uniform sensor deployment, the detection probability is the same for any point in a WSN. However, some applications may require different degrees of detection probability at different locations. For example, an intrusion detection application may need improved detection probability around important entities. Gaussian-distributed WSNs can provide differentiated detection capabilities at different locations but related work is limited. This paper analyzes the problem of intrusion detection in a Gaussian-distributed WSN by characterizing the detection probability with respect to the application requirements and the network parameters under both single-sensing detection and multiple-sensing detection scenarios. Effects of different network parameters on the detection probability are examined in detail. Furthermore, performance of Gaussian-distributed WSNs is compared with uniformly distributed WSNs. This work allows us to analytically formulate detection probability in a random WSN and provides guidelines in selecting an appropriate deployment strategy and determining critical network parameters. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com