SlideShare a Scribd company logo
1 of 2
Download to read offline
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

GAUSSIAN VERSUS UNIFORM DISTRIBUTION FOR INTRUSION
DETECTION IN WIRELESS SENSOR NETWORKS

ABSTRACT:

In a Wireless Sensor Network (WSN), intrusion detection is of significant importance in many
applications in detecting malicious or unexpected intruder(s). The intruder can be an enemy in a
battlefield, or a malicious moving object in the area of interest. With uniform sensor deployment,
the detection probability is the same for any point in a WSN. However, some applications may
require different degrees of detection probability at different locations. For example, an intrusion
detection application may need improved detection probability around important entities.
Gaussian-distributed WSNs can provide differentiated detection capabilities at different locations
but related work is limited.

This paper analyzes the problem of intrusion detection in a Gaussian-distributed WSN by
characterizing the detection probability with respect to the application requirements and the
network parameters under both single-sensing detection and multiple-sensing detection
scenarios. Effects of different network parameters on the detection probability are examined in
detail. Furthermore, performance of Gaussian-distributed WSNs is compared with uniformly
distributed WSNs. This work allows us to analytically formulate detection probability in a
random WSN and provides guidelines in selecting an appropriate deployment strategy and
determining critical network parameters.
Dotnet  gaussian versus uniform distribution for intrusion detection in wireless sensor networks

More Related Content

Viewers also liked

Dotnet in-network estimation with delay constraints in wireless sensor networks
Dotnet  in-network estimation with delay constraints in wireless sensor networksDotnet  in-network estimation with delay constraints in wireless sensor networks
Dotnet in-network estimation with delay constraints in wireless sensor networksEcwayt
 
Delta Zeta Epsilon Nu
Delta Zeta Epsilon NuDelta Zeta Epsilon Nu
Delta Zeta Epsilon NuMegan Roberts
 
Valor Econômico clipping
Valor Econômico clippingValor Econômico clipping
Valor Econômico clippingEduardo Miccolis
 
Comunicacion e internet en la sociedad
Comunicacion e internet en la sociedadComunicacion e internet en la sociedad
Comunicacion e internet en la sociedadMasquel
 
Alexis Bolin Negotiating Contract To Close
Alexis Bolin Negotiating Contract To CloseAlexis Bolin Negotiating Contract To Close
Alexis Bolin Negotiating Contract To CloseHomesPro from Homes.com
 
Corporate Counsel Recruitment patent attorney staffing
Corporate Counsel Recruitment patent attorney staffingCorporate Counsel Recruitment patent attorney staffing
Corporate Counsel Recruitment patent attorney staffingMark Thibodeau
 
Uso seguro de internet
Uso seguro de internetUso seguro de internet
Uso seguro de internetMasquel
 
La cuenta atrás
La cuenta atrásLa cuenta atrás
La cuenta atráscasiopeauca
 
τεχνολογία του πολέμου στην αρχαία ελλάδα
τεχνολογία του πολέμου στην αρχαία ελλάδατεχνολογία του πολέμου στην αρχαία ελλάδα
τεχνολογία του πολέμου στην αρχαία ελλάδαGeorgia Sofi
 
İzlenebilirlik nedir
İzlenebilirlik nedirİzlenebilirlik nedir
İzlenebilirlik nedirbilenbilir45
 
Private Dining Fact Sheet - Georgetown
Private Dining Fact Sheet - GeorgetownPrivate Dining Fact Sheet - Georgetown
Private Dining Fact Sheet - GeorgetownLily Cohen
 
Using Social Media To Enhance Employability
Using Social Media To Enhance EmployabilityUsing Social Media To Enhance Employability
Using Social Media To Enhance EmployabilityEllie Stringer
 
робота гуртка (1)
робота гуртка (1)робота гуртка (1)
робота гуртка (1)semyurihor
 

Viewers also liked (20)

Dotnet in-network estimation with delay constraints in wireless sensor networks
Dotnet  in-network estimation with delay constraints in wireless sensor networksDotnet  in-network estimation with delay constraints in wireless sensor networks
Dotnet in-network estimation with delay constraints in wireless sensor networks
 
Delta Zeta Epsilon Nu
Delta Zeta Epsilon NuDelta Zeta Epsilon Nu
Delta Zeta Epsilon Nu
 
Valor Econômico clipping
Valor Econômico clippingValor Econômico clipping
Valor Econômico clipping
 
Comunicacion e internet en la sociedad
Comunicacion e internet en la sociedadComunicacion e internet en la sociedad
Comunicacion e internet en la sociedad
 
Alexis Bolin Negotiating Contract To Close
Alexis Bolin Negotiating Contract To CloseAlexis Bolin Negotiating Contract To Close
Alexis Bolin Negotiating Contract To Close
 
Codis 6è a
Codis 6è aCodis 6è a
Codis 6è a
 
Ekzamen
EkzamenEkzamen
Ekzamen
 
Power point
Power pointPower point
Power point
 
El pecado.
El pecado.El pecado.
El pecado.
 
Corporate Counsel Recruitment patent attorney staffing
Corporate Counsel Recruitment patent attorney staffingCorporate Counsel Recruitment patent attorney staffing
Corporate Counsel Recruitment patent attorney staffing
 
Business Day 8 October 2015
Business Day 8 October 2015Business Day 8 October 2015
Business Day 8 October 2015
 
Uso seguro de internet
Uso seguro de internetUso seguro de internet
Uso seguro de internet
 
La cuenta atrás
La cuenta atrásLa cuenta atrás
La cuenta atrás
 
τεχνολογία του πολέμου στην αρχαία ελλάδα
τεχνολογία του πολέμου στην αρχαία ελλάδατεχνολογία του πολέμου στην αρχαία ελλάδα
τεχνολογία του πολέμου στην αρχαία ελλάδα
 
La vida
La vidaLa vida
La vida
 
Private Client - March Edition
Private Client - March EditionPrivate Client - March Edition
Private Client - March Edition
 
İzlenebilirlik nedir
İzlenebilirlik nedirİzlenebilirlik nedir
İzlenebilirlik nedir
 
Private Dining Fact Sheet - Georgetown
Private Dining Fact Sheet - GeorgetownPrivate Dining Fact Sheet - Georgetown
Private Dining Fact Sheet - Georgetown
 
Using Social Media To Enhance Employability
Using Social Media To Enhance EmployabilityUsing Social Media To Enhance Employability
Using Social Media To Enhance Employability
 
робота гуртка (1)
робота гуртка (1)робота гуртка (1)
робота гуртка (1)
 

Similar to Dotnet gaussian versus uniform distribution for intrusion detection in wireless sensor networks

Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...ecway
 
Java gaussian versus uniform distribution for intrusion detection in wireles...
Java  gaussian versus uniform distribution for intrusion detection in wireles...Java  gaussian versus uniform distribution for intrusion detection in wireles...
Java gaussian versus uniform distribution for intrusion detection in wireles...ecwayerode
 
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKSCONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKSpharmaindexing
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...Mumbai Academisc
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksEcwayt
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksEcwayt
 
Dotnet detection and localization of multiple spoofing attackers in wireless...
Dotnet  detection and localization of multiple spoofing attackers in wireless...Dotnet  detection and localization of multiple spoofing attackers in wireless...
Dotnet detection and localization of multiple spoofing attackers in wireless...Ecwaytech
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksecwayprojects
 
Dotnet detection and localization of multiple spoofing attackers in wireless...
Dotnet  detection and localization of multiple spoofing attackers in wireless...Dotnet  detection and localization of multiple spoofing attackers in wireless...
Dotnet detection and localization of multiple spoofing attackers in wireless...Ecwayt
 
Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...ambitlick
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksEditor IJMTER
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
 
Dotnet dynamic coverage of mobile sensor networks
Dotnet  dynamic coverage of mobile sensor networksDotnet  dynamic coverage of mobile sensor networks
Dotnet dynamic coverage of mobile sensor networksEcwaytech
 
Dynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksDynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksEcwayt
 
Dotnet dynamic coverage of mobile sensor networks
Dotnet  dynamic coverage of mobile sensor networksDotnet  dynamic coverage of mobile sensor networks
Dotnet dynamic coverage of mobile sensor networksEcwaytech
 
Dotnet dynamic coverage of mobile sensor networks
Dotnet  dynamic coverage of mobile sensor networksDotnet  dynamic coverage of mobile sensor networks
Dotnet dynamic coverage of mobile sensor networksEcwayt
 
Dynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksDynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksecwayprojects
 

Similar to Dotnet gaussian versus uniform distribution for intrusion detection in wireless sensor networks (20)

Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...
 
Java gaussian versus uniform distribution for intrusion detection in wireles...
Java  gaussian versus uniform distribution for intrusion detection in wireles...Java  gaussian versus uniform distribution for intrusion detection in wireles...
Java gaussian versus uniform distribution for intrusion detection in wireles...
 
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKSCONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
 
C0511318
C0511318C0511318
C0511318
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
 
Dotnet detection and localization of multiple spoofing attackers in wireless...
Dotnet  detection and localization of multiple spoofing attackers in wireless...Dotnet  detection and localization of multiple spoofing attackers in wireless...
Dotnet detection and localization of multiple spoofing attackers in wireless...
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
 
Dotnet detection and localization of multiple spoofing attackers in wireless...
Dotnet  detection and localization of multiple spoofing attackers in wireless...Dotnet  detection and localization of multiple spoofing attackers in wireless...
Dotnet detection and localization of multiple spoofing attackers in wireless...
 
26
2626
26
 
Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor Networks
 
D0952126
D0952126D0952126
D0952126
 
Dotnet dynamic coverage of mobile sensor networks
Dotnet  dynamic coverage of mobile sensor networksDotnet  dynamic coverage of mobile sensor networks
Dotnet dynamic coverage of mobile sensor networks
 
Dynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksDynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networks
 
Dotnet dynamic coverage of mobile sensor networks
Dotnet  dynamic coverage of mobile sensor networksDotnet  dynamic coverage of mobile sensor networks
Dotnet dynamic coverage of mobile sensor networks
 
Dotnet dynamic coverage of mobile sensor networks
Dotnet  dynamic coverage of mobile sensor networksDotnet  dynamic coverage of mobile sensor networks
Dotnet dynamic coverage of mobile sensor networks
 
Dynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksDynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networks
 

More from Ecwayt

Covering points of interest with mobile sensors
Covering points of interest with mobile sensorsCovering points of interest with mobile sensors
Covering points of interest with mobile sensorsEcwayt
 
Coloring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksColoring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksEcwayt
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Ecwayt
 
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Ecwayt
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphsEcwayt
 
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim  t-drive enhancing driving directions with taxi drivers’ intelligenceCloudsim  t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligenceEcwayt
 
Cloudsim ranking on data manifold with sink points
Cloudsim  ranking on data manifold with sink pointsCloudsim  ranking on data manifold with sink points
Cloudsim ranking on data manifold with sink pointsEcwayt
 
Cloudsim quality-differentiated video multicast in multirate wireless networks
Cloudsim  quality-differentiated video multicast in multirate wireless networksCloudsim  quality-differentiated video multicast in multirate wireless networks
Cloudsim quality-differentiated video multicast in multirate wireless networksEcwayt
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...Ecwayt
 
Cloudsim distributed web systems performance forecasting using turning bands...
Cloudsim  distributed web systems performance forecasting using turning bands...Cloudsim  distributed web systems performance forecasting using turning bands...
Cloudsim distributed web systems performance forecasting using turning bands...Ecwayt
 
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Cloudsim  distributed processing of probabilistic top-k queries in wireless s...Cloudsim  distributed processing of probabilistic top-k queries in wireless s...
Cloudsim distributed processing of probabilistic top-k queries in wireless s...Ecwayt
 
Civil 2013 titles
Civil 2013 titlesCivil 2013 titles
Civil 2013 titlesEcwayt
 
Chopper based dc motor speed control
Chopper based dc motor speed controlChopper based dc motor speed control
Chopper based dc motor speed controlEcwayt
 
Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Ecwayt
 
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Ecwayt
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoringEcwayt
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoringEcwayt
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psEcwayt
 
Bomb detection robot with wireless camera
Bomb detection robot with wireless cameraBomb detection robot with wireless camera
Bomb detection robot with wireless cameraEcwayt
 
Bed side patients monitoring system with emergency alert
Bed side patients monitoring system with  emergency alertBed side patients monitoring system with  emergency alert
Bed side patients monitoring system with emergency alertEcwayt
 

More from Ecwayt (20)

Covering points of interest with mobile sensors
Covering points of interest with mobile sensorsCovering points of interest with mobile sensors
Covering points of interest with mobile sensors
 
Coloring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksColoring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networks
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...
 
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphs
 
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim  t-drive enhancing driving directions with taxi drivers’ intelligenceCloudsim  t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
 
Cloudsim ranking on data manifold with sink points
Cloudsim  ranking on data manifold with sink pointsCloudsim  ranking on data manifold with sink points
Cloudsim ranking on data manifold with sink points
 
Cloudsim quality-differentiated video multicast in multirate wireless networks
Cloudsim  quality-differentiated video multicast in multirate wireless networksCloudsim  quality-differentiated video multicast in multirate wireless networks
Cloudsim quality-differentiated video multicast in multirate wireless networks
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
 
Cloudsim distributed web systems performance forecasting using turning bands...
Cloudsim  distributed web systems performance forecasting using turning bands...Cloudsim  distributed web systems performance forecasting using turning bands...
Cloudsim distributed web systems performance forecasting using turning bands...
 
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Cloudsim  distributed processing of probabilistic top-k queries in wireless s...Cloudsim  distributed processing of probabilistic top-k queries in wireless s...
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
 
Civil 2013 titles
Civil 2013 titlesCivil 2013 titles
Civil 2013 titles
 
Chopper based dc motor speed control
Chopper based dc motor speed controlChopper based dc motor speed control
Chopper based dc motor speed control
 
Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...
 
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a ps
 
Bomb detection robot with wireless camera
Bomb detection robot with wireless cameraBomb detection robot with wireless camera
Bomb detection robot with wireless camera
 
Bed side patients monitoring system with emergency alert
Bed side patients monitoring system with  emergency alertBed side patients monitoring system with  emergency alert
Bed side patients monitoring system with emergency alert
 

Dotnet gaussian versus uniform distribution for intrusion detection in wireless sensor networks

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com GAUSSIAN VERSUS UNIFORM DISTRIBUTION FOR INTRUSION DETECTION IN WIRELESS SENSOR NETWORKS ABSTRACT: In a Wireless Sensor Network (WSN), intrusion detection is of significant importance in many applications in detecting malicious or unexpected intruder(s). The intruder can be an enemy in a battlefield, or a malicious moving object in the area of interest. With uniform sensor deployment, the detection probability is the same for any point in a WSN. However, some applications may require different degrees of detection probability at different locations. For example, an intrusion detection application may need improved detection probability around important entities. Gaussian-distributed WSNs can provide differentiated detection capabilities at different locations but related work is limited. This paper analyzes the problem of intrusion detection in a Gaussian-distributed WSN by characterizing the detection probability with respect to the application requirements and the network parameters under both single-sensing detection and multiple-sensing detection scenarios. Effects of different network parameters on the detection probability are examined in detail. Furthermore, performance of Gaussian-distributed WSNs is compared with uniformly distributed WSNs. This work allows us to analytically formulate detection probability in a random WSN and provides guidelines in selecting an appropriate deployment strategy and determining critical network parameters.