SlideShare a Scribd company logo
1 of 2
Download to read offline
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

GAUSSIAN VERSUS UNIFORM DISTRIBUTION FOR INTRUSION
DETECTION IN WIRELESS SENSOR NETWORKS

ABSTRACT:

In a Wireless Sensor Network (WSN), intrusion detection is of significant importance in many
applications in detecting malicious or unexpected intruder(s). The intruder can be an enemy in a
battlefield, or a malicious moving object in the area of interest. With uniform sensor deployment,
the detection probability is the same for any point in a WSN. However, some applications may
require different degrees of detection probability at different locations. For example, an intrusion
detection application may need improved detection probability around important entities.
Gaussian-distributed WSNs can provide differentiated detection capabilities at different locations
but related work is limited.

This paper analyzes the problem of intrusion detection in a Gaussian-distributed WSN by
characterizing the detection probability with respect to the application requirements and the
network parameters under both single-sensing detection and multiple-sensing detection
scenarios. Effects of different network parameters on the detection probability are examined in
detail. Furthermore, performance of Gaussian-distributed WSNs is compared with uniformly
distributed WSNs. This work allows us to analytically formulate detection probability in a
random WSN and provides guidelines in selecting an appropriate deployment strategy and
determining critical network parameters.
Dotnet  gaussian versus uniform distribution for intrusion detection in wireless sensor networks

More Related Content

Viewers also liked

Projekt Kino Úsmev
Projekt Kino ÚsmevProjekt Kino Úsmev
Projekt Kino Úsmev
Lubos Bibig
 
Dotnet microarchitecture of a coarse-grain out-of-order superscalar processor
Dotnet  microarchitecture of a coarse-grain out-of-order superscalar processorDotnet  microarchitecture of a coarse-grain out-of-order superscalar processor
Dotnet microarchitecture of a coarse-grain out-of-order superscalar processor
Ecwaytech
 
Dotnet finding rare classes active learning with generative and discriminati...
Dotnet  finding rare classes active learning with generative and discriminati...Dotnet  finding rare classes active learning with generative and discriminati...
Dotnet finding rare classes active learning with generative and discriminati...
Ecwaytech
 
Dotnet simple hybrid and incremental postpruning techniques for rule induction
Dotnet  simple hybrid and incremental postpruning techniques for rule inductionDotnet  simple hybrid and incremental postpruning techniques for rule induction
Dotnet simple hybrid and incremental postpruning techniques for rule induction
Ecwaytech
 
Praveen Pandey_9526_LinkedIn
Praveen Pandey_9526_LinkedInPraveen Pandey_9526_LinkedIn
Praveen Pandey_9526_LinkedIn
pandaypraveen
 
Dotnet fast channel zapping with destination-oriented multicast for ip video...
Dotnet  fast channel zapping with destination-oriented multicast for ip video...Dotnet  fast channel zapping with destination-oriented multicast for ip video...
Dotnet fast channel zapping with destination-oriented multicast for ip video...
Ecwaytech
 
Mapa mental de la lectura y diapositivas de las normas de incontec
Mapa mental de la lectura y diapositivas de las normas de incontecMapa mental de la lectura y diapositivas de las normas de incontec
Mapa mental de la lectura y diapositivas de las normas de incontec
Nanita Pacasira
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
Ecwayt
 
Dotnet distributed processing of probabilistic top-k queries in wireless sen...
Dotnet  distributed processing of probabilistic top-k queries in wireless sen...Dotnet  distributed processing of probabilistic top-k queries in wireless sen...
Dotnet distributed processing of probabilistic top-k queries in wireless sen...
Ecwaytech
 
Fake reading
Fake readingFake reading
Fake reading
cswstyle
 
Dotnet discovery and verification of neighbor positions in mobile ad hoc net...
Dotnet  discovery and verification of neighbor positions in mobile ad hoc net...Dotnet  discovery and verification of neighbor positions in mobile ad hoc net...
Dotnet discovery and verification of neighbor positions in mobile ad hoc net...
Ecwaytech
 
Temporalización 2º evaluación 2º eso 2013 2014 (1)
Temporalización 2º evaluación 2º eso 2013 2014 (1)Temporalización 2º evaluación 2º eso 2013 2014 (1)
Temporalización 2º evaluación 2º eso 2013 2014 (1)
Agus_elipeja
 

Viewers also liked (20)

Projekt Kino Úsmev
Projekt Kino ÚsmevProjekt Kino Úsmev
Projekt Kino Úsmev
 
Dotnet microarchitecture of a coarse-grain out-of-order superscalar processor
Dotnet  microarchitecture of a coarse-grain out-of-order superscalar processorDotnet  microarchitecture of a coarse-grain out-of-order superscalar processor
Dotnet microarchitecture of a coarse-grain out-of-order superscalar processor
 
Dotnet finding rare classes active learning with generative and discriminati...
Dotnet  finding rare classes active learning with generative and discriminati...Dotnet  finding rare classes active learning with generative and discriminati...
Dotnet finding rare classes active learning with generative and discriminati...
 
Dotnet simple hybrid and incremental postpruning techniques for rule induction
Dotnet  simple hybrid and incremental postpruning techniques for rule inductionDotnet  simple hybrid and incremental postpruning techniques for rule induction
Dotnet simple hybrid and incremental postpruning techniques for rule induction
 
Psicopedagogìa
PsicopedagogìaPsicopedagogìa
Psicopedagogìa
 
Praveen Pandey_9526_LinkedIn
Praveen Pandey_9526_LinkedInPraveen Pandey_9526_LinkedIn
Praveen Pandey_9526_LinkedIn
 
Documento1
Documento1Documento1
Documento1
 
Neucon mailer-liberty-mutual-r1
Neucon mailer-liberty-mutual-r1Neucon mailer-liberty-mutual-r1
Neucon mailer-liberty-mutual-r1
 
Dotnet fast channel zapping with destination-oriented multicast for ip video...
Dotnet  fast channel zapping with destination-oriented multicast for ip video...Dotnet  fast channel zapping with destination-oriented multicast for ip video...
Dotnet fast channel zapping with destination-oriented multicast for ip video...
 
Mapa mental de la lectura y diapositivas de las normas de incontec
Mapa mental de la lectura y diapositivas de las normas de incontecMapa mental de la lectura y diapositivas de las normas de incontec
Mapa mental de la lectura y diapositivas de las normas de incontec
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Televicion tarea
Televicion tareaTelevicion tarea
Televicion tarea
 
Virus y vacunas
Virus y vacunasVirus y vacunas
Virus y vacunas
 
Dotnet distributed processing of probabilistic top-k queries in wireless sen...
Dotnet  distributed processing of probabilistic top-k queries in wireless sen...Dotnet  distributed processing of probabilistic top-k queries in wireless sen...
Dotnet distributed processing of probabilistic top-k queries in wireless sen...
 
DOC2015365076
DOC2015365076DOC2015365076
DOC2015365076
 
Tramas phillips
Tramas phillipsTramas phillips
Tramas phillips
 
Píramo y tisbe
Píramo y tisbePíramo y tisbe
Píramo y tisbe
 
Fake reading
Fake readingFake reading
Fake reading
 
Dotnet discovery and verification of neighbor positions in mobile ad hoc net...
Dotnet  discovery and verification of neighbor positions in mobile ad hoc net...Dotnet  discovery and verification of neighbor positions in mobile ad hoc net...
Dotnet discovery and verification of neighbor positions in mobile ad hoc net...
 
Temporalización 2º evaluación 2º eso 2013 2014 (1)
Temporalización 2º evaluación 2º eso 2013 2014 (1)Temporalización 2º evaluación 2º eso 2013 2014 (1)
Temporalización 2º evaluación 2º eso 2013 2014 (1)
 

Similar to Dotnet gaussian versus uniform distribution for intrusion detection in wireless sensor networks

Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...
ecway
 
Java gaussian versus uniform distribution for intrusion detection in wireles...
Java  gaussian versus uniform distribution for intrusion detection in wireles...Java  gaussian versus uniform distribution for intrusion detection in wireles...
Java gaussian versus uniform distribution for intrusion detection in wireles...
ecwayerode
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Mumbai Academisc
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
Ecwayt
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
Ecwayt
 
Dotnet detection and localization of multiple spoofing attackers in wireless...
Dotnet  detection and localization of multiple spoofing attackers in wireless...Dotnet  detection and localization of multiple spoofing attackers in wireless...
Dotnet detection and localization of multiple spoofing attackers in wireless...
Ecwaytech
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
ecwayprojects
 
Dotnet detection and localization of multiple spoofing attackers in wireless...
Dotnet  detection and localization of multiple spoofing attackers in wireless...Dotnet  detection and localization of multiple spoofing attackers in wireless...
Dotnet detection and localization of multiple spoofing attackers in wireless...
Ecwayt
 
Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...
ambitlick
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Editor IJMTER
 
Dynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksDynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networks
Ecwaytech
 
Dotnet dynamic coverage of mobile sensor networks
Dotnet  dynamic coverage of mobile sensor networksDotnet  dynamic coverage of mobile sensor networks
Dotnet dynamic coverage of mobile sensor networks
Ecwaytech
 
Dynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksDynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networks
Ecwayt
 
Dotnet dynamic coverage of mobile sensor networks
Dotnet  dynamic coverage of mobile sensor networksDotnet  dynamic coverage of mobile sensor networks
Dotnet dynamic coverage of mobile sensor networks
Ecwaytech
 
Dotnet dynamic coverage of mobile sensor networks
Dotnet  dynamic coverage of mobile sensor networksDotnet  dynamic coverage of mobile sensor networks
Dotnet dynamic coverage of mobile sensor networks
Ecwayt
 

Similar to Dotnet gaussian versus uniform distribution for intrusion detection in wireless sensor networks (20)

Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...
 
Java gaussian versus uniform distribution for intrusion detection in wireles...
Java  gaussian versus uniform distribution for intrusion detection in wireles...Java  gaussian versus uniform distribution for intrusion detection in wireles...
Java gaussian versus uniform distribution for intrusion detection in wireles...
 
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKSCONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
 
C0511318
C0511318C0511318
C0511318
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
 
Dotnet detection and localization of multiple spoofing attackers in wireless...
Dotnet  detection and localization of multiple spoofing attackers in wireless...Dotnet  detection and localization of multiple spoofing attackers in wireless...
Dotnet detection and localization of multiple spoofing attackers in wireless...
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
 
Dotnet detection and localization of multiple spoofing attackers in wireless...
Dotnet  detection and localization of multiple spoofing attackers in wireless...Dotnet  detection and localization of multiple spoofing attackers in wireless...
Dotnet detection and localization of multiple spoofing attackers in wireless...
 
26
2626
26
 
Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor Networks
 
D0952126
D0952126D0952126
D0952126
 
Dynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksDynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networks
 
Dotnet dynamic coverage of mobile sensor networks
Dotnet  dynamic coverage of mobile sensor networksDotnet  dynamic coverage of mobile sensor networks
Dotnet dynamic coverage of mobile sensor networks
 
Dynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksDynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networks
 
Dotnet dynamic coverage of mobile sensor networks
Dotnet  dynamic coverage of mobile sensor networksDotnet  dynamic coverage of mobile sensor networks
Dotnet dynamic coverage of mobile sensor networks
 
Dotnet dynamic coverage of mobile sensor networks
Dotnet  dynamic coverage of mobile sensor networksDotnet  dynamic coverage of mobile sensor networks
Dotnet dynamic coverage of mobile sensor networks
 

Dotnet gaussian versus uniform distribution for intrusion detection in wireless sensor networks

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com GAUSSIAN VERSUS UNIFORM DISTRIBUTION FOR INTRUSION DETECTION IN WIRELESS SENSOR NETWORKS ABSTRACT: In a Wireless Sensor Network (WSN), intrusion detection is of significant importance in many applications in detecting malicious or unexpected intruder(s). The intruder can be an enemy in a battlefield, or a malicious moving object in the area of interest. With uniform sensor deployment, the detection probability is the same for any point in a WSN. However, some applications may require different degrees of detection probability at different locations. For example, an intrusion detection application may need improved detection probability around important entities. Gaussian-distributed WSNs can provide differentiated detection capabilities at different locations but related work is limited. This paper analyzes the problem of intrusion detection in a Gaussian-distributed WSN by characterizing the detection probability with respect to the application requirements and the network parameters under both single-sensing detection and multiple-sensing detection scenarios. Effects of different network parameters on the detection probability are examined in detail. Furthermore, performance of Gaussian-distributed WSNs is compared with uniformly distributed WSNs. This work allows us to analytically formulate detection probability in a random WSN and provides guidelines in selecting an appropriate deployment strategy and determining critical network parameters.