SlideShare a Scribd company logo
1 of 2
Download to read offline
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

GAUSSIAN VERSUS UNIFORM DISTRIBUTION FOR INTRUSION
DETECTION IN WIRELESS SENSOR NETWORKS

ABSTRACT:

In a Wireless Sensor Network (WSN), intrusion detection is of significant importance in many
applications in detecting malicious or unexpected intruder(s). The intruder can be an enemy in a
battlefield, or a malicious moving object in the area of interest. With uniform sensor deployment,
the detection probability is the same for any point in a WSN. However, some applications may
require different degrees of detection probability at different locations. For example, an intrusion
detection application may need improved detection probability around important entities.
Gaussian-distributed WSNs can provide differentiated detection capabilities at different locations
but related work is limited.

This paper analyzes the problem of intrusion detection in a Gaussian-distributed WSN by
characterizing the detection probability with respect to the application requirements and the
network parameters under both single-sensing detection and multiple-sensing detection
scenarios. Effects of different network parameters on the detection probability are examined in
detail. Furthermore, performance of Gaussian-distributed WSNs is compared with uniformly
distributed WSNs. This work allows us to analytically formulate detection probability in a
random WSN and provides guidelines in selecting an appropriate deployment strategy and
determining critical network parameters.
Gaussian versus uniform distribution for intrusion detection in wireless sensor networks

More Related Content

Viewers also liked

High performance resource allocation strategies for computational economies
High performance resource allocation strategies for computational economiesHigh performance resource allocation strategies for computational economies
High performance resource allocation strategies for computational economiesEcwaytech
 
Harvesting aware energy management for time-critical wireless sensor networks...
Harvesting aware energy management for time-critical wireless sensor networks...Harvesting aware energy management for time-critical wireless sensor networks...
Harvesting aware energy management for time-critical wireless sensor networks...Ecwaytech
 
Embedded based eb simcard
Embedded based eb simcardEmbedded based eb simcard
Embedded based eb simcardEcwaytech
 
High efficiency asymmetrical half-bridge converter without electrolytic
High efficiency asymmetrical half-bridge converter without electrolyticHigh efficiency asymmetrical half-bridge converter without electrolytic
High efficiency asymmetrical half-bridge converter without electrolyticEcwaytech
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEcwaytech
 
Fast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video deliveryFast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video deliveryEcwaytech
 
Hand movement based fan or light controlling
Hand movement based fan or light controllingHand movement based fan or light controlling
Hand movement based fan or light controllingEcwaytech
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEcwaytech
 
Enhanced control of a dfig based wind-power generation system with series gri...
Enhanced control of a dfig based wind-power generation system with series gri...Enhanced control of a dfig based wind-power generation system with series gri...
Enhanced control of a dfig based wind-power generation system with series gri...Ecwaytech
 
Gsm based vehicle theft control system
Gsm based vehicle theft control systemGsm based vehicle theft control system
Gsm based vehicle theft control systemEcwaytech
 
Helmet based vehicle safety system
Helmet based vehicle safety systemHelmet based vehicle safety system
Helmet based vehicle safety systemEcwaytech
 
Finding rare classes active learning with generative and discriminative models
Finding rare classes active learning with generative and discriminative modelsFinding rare classes active learning with generative and discriminative models
Finding rare classes active learning with generative and discriminative modelsEcwaytech
 
Electrical thermal plant boiler temperature and water level monitoring
Electrical thermal plant boiler temperature and water level monitoringElectrical thermal plant boiler temperature and water level monitoring
Electrical thermal plant boiler temperature and water level monitoringEcwaytech
 
High power factor ac–dc led driver with film capacitors
High power factor ac–dc led driver with film capacitorsHigh power factor ac–dc led driver with film capacitors
High power factor ac–dc led driver with film capacitorsEcwaytech
 
Embedded based electricity theft identification
Embedded based electricity theft identificationEmbedded based electricity theft identification
Embedded based electricity theft identificationEcwaytech
 
Exploiting ubiquitous data collection for mobile users in wireless sensor net...
Exploiting ubiquitous data collection for mobile users in wireless sensor net...Exploiting ubiquitous data collection for mobile users in wireless sensor net...
Exploiting ubiquitous data collection for mobile users in wireless sensor net...Ecwaytech
 
Dynamic wireless sensor networks for real time safeguard of workers exposed t...
Dynamic wireless sensor networks for real time safeguard of workers exposed t...Dynamic wireless sensor networks for real time safeguard of workers exposed t...
Dynamic wireless sensor networks for real time safeguard of workers exposed t...Ecwaytech
 
Dynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksDynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksEcwaytech
 
Dtmf based human less boat control for oceanic research applications
Dtmf based human less boat control for oceanic research applicationsDtmf based human less boat control for oceanic research applications
Dtmf based human less boat control for oceanic research applicationsEcwaytech
 

Viewers also liked (20)

High performance resource allocation strategies for computational economies
High performance resource allocation strategies for computational economiesHigh performance resource allocation strategies for computational economies
High performance resource allocation strategies for computational economies
 
Harvesting aware energy management for time-critical wireless sensor networks...
Harvesting aware energy management for time-critical wireless sensor networks...Harvesting aware energy management for time-critical wireless sensor networks...
Harvesting aware energy management for time-critical wireless sensor networks...
 
Embedded based eb simcard
Embedded based eb simcardEmbedded based eb simcard
Embedded based eb simcard
 
High efficiency asymmetrical half-bridge converter without electrolytic
High efficiency asymmetrical half-bridge converter without electrolyticHigh efficiency asymmetrical half-bridge converter without electrolytic
High efficiency asymmetrical half-bridge converter without electrolytic
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
irun dan fajar as
irun dan fajar asirun dan fajar as
irun dan fajar as
 
Fast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video deliveryFast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video delivery
 
Hand movement based fan or light controlling
Hand movement based fan or light controllingHand movement based fan or light controlling
Hand movement based fan or light controlling
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Enhanced control of a dfig based wind-power generation system with series gri...
Enhanced control of a dfig based wind-power generation system with series gri...Enhanced control of a dfig based wind-power generation system with series gri...
Enhanced control of a dfig based wind-power generation system with series gri...
 
Gsm based vehicle theft control system
Gsm based vehicle theft control systemGsm based vehicle theft control system
Gsm based vehicle theft control system
 
Helmet based vehicle safety system
Helmet based vehicle safety systemHelmet based vehicle safety system
Helmet based vehicle safety system
 
Finding rare classes active learning with generative and discriminative models
Finding rare classes active learning with generative and discriminative modelsFinding rare classes active learning with generative and discriminative models
Finding rare classes active learning with generative and discriminative models
 
Electrical thermal plant boiler temperature and water level monitoring
Electrical thermal plant boiler temperature and water level monitoringElectrical thermal plant boiler temperature and water level monitoring
Electrical thermal plant boiler temperature and water level monitoring
 
High power factor ac–dc led driver with film capacitors
High power factor ac–dc led driver with film capacitorsHigh power factor ac–dc led driver with film capacitors
High power factor ac–dc led driver with film capacitors
 
Embedded based electricity theft identification
Embedded based electricity theft identificationEmbedded based electricity theft identification
Embedded based electricity theft identification
 
Exploiting ubiquitous data collection for mobile users in wireless sensor net...
Exploiting ubiquitous data collection for mobile users in wireless sensor net...Exploiting ubiquitous data collection for mobile users in wireless sensor net...
Exploiting ubiquitous data collection for mobile users in wireless sensor net...
 
Dynamic wireless sensor networks for real time safeguard of workers exposed t...
Dynamic wireless sensor networks for real time safeguard of workers exposed t...Dynamic wireless sensor networks for real time safeguard of workers exposed t...
Dynamic wireless sensor networks for real time safeguard of workers exposed t...
 
Dynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksDynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networks
 
Dtmf based human less boat control for oceanic research applications
Dtmf based human less boat control for oceanic research applicationsDtmf based human less boat control for oceanic research applications
Dtmf based human less boat control for oceanic research applications
 

Similar to Gaussian versus uniform distribution for intrusion detection in wireless sensor networks

Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...ecway
 
Java gaussian versus uniform distribution for intrusion detection in wireles...
Java  gaussian versus uniform distribution for intrusion detection in wireles...Java  gaussian versus uniform distribution for intrusion detection in wireles...
Java gaussian versus uniform distribution for intrusion detection in wireles...ecwayerode
 
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKSCONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKSpharmaindexing
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...Mumbai Academisc
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksEcwayt
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksEcwayt
 
Dotnet detection and localization of multiple spoofing attackers in wireless...
Dotnet  detection and localization of multiple spoofing attackers in wireless...Dotnet  detection and localization of multiple spoofing attackers in wireless...
Dotnet detection and localization of multiple spoofing attackers in wireless...Ecwaytech
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksecwayprojects
 
Dotnet detection and localization of multiple spoofing attackers in wireless...
Dotnet  detection and localization of multiple spoofing attackers in wireless...Dotnet  detection and localization of multiple spoofing attackers in wireless...
Dotnet detection and localization of multiple spoofing attackers in wireless...Ecwayt
 
Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...ambitlick
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksEditor IJMTER
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
 
Dotnet dynamic coverage of mobile sensor networks
Dotnet  dynamic coverage of mobile sensor networksDotnet  dynamic coverage of mobile sensor networks
Dotnet dynamic coverage of mobile sensor networksEcwaytech
 
Dynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksDynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksEcwayt
 
Dotnet dynamic coverage of mobile sensor networks
Dotnet  dynamic coverage of mobile sensor networksDotnet  dynamic coverage of mobile sensor networks
Dotnet dynamic coverage of mobile sensor networksEcwaytech
 
Dotnet dynamic coverage of mobile sensor networks
Dotnet  dynamic coverage of mobile sensor networksDotnet  dynamic coverage of mobile sensor networks
Dotnet dynamic coverage of mobile sensor networksEcwayt
 
Dynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksDynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksecwayprojects
 

Similar to Gaussian versus uniform distribution for intrusion detection in wireless sensor networks (20)

Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...
 
Java gaussian versus uniform distribution for intrusion detection in wireles...
Java  gaussian versus uniform distribution for intrusion detection in wireles...Java  gaussian versus uniform distribution for intrusion detection in wireles...
Java gaussian versus uniform distribution for intrusion detection in wireles...
 
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKSCONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
 
C0511318
C0511318C0511318
C0511318
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
 
Dotnet detection and localization of multiple spoofing attackers in wireless...
Dotnet  detection and localization of multiple spoofing attackers in wireless...Dotnet  detection and localization of multiple spoofing attackers in wireless...
Dotnet detection and localization of multiple spoofing attackers in wireless...
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
 
Dotnet detection and localization of multiple spoofing attackers in wireless...
Dotnet  detection and localization of multiple spoofing attackers in wireless...Dotnet  detection and localization of multiple spoofing attackers in wireless...
Dotnet detection and localization of multiple spoofing attackers in wireless...
 
26
2626
26
 
Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor Networks
 
D0952126
D0952126D0952126
D0952126
 
Dotnet dynamic coverage of mobile sensor networks
Dotnet  dynamic coverage of mobile sensor networksDotnet  dynamic coverage of mobile sensor networks
Dotnet dynamic coverage of mobile sensor networks
 
Dynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksDynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networks
 
Dotnet dynamic coverage of mobile sensor networks
Dotnet  dynamic coverage of mobile sensor networksDotnet  dynamic coverage of mobile sensor networks
Dotnet dynamic coverage of mobile sensor networks
 
Dotnet dynamic coverage of mobile sensor networks
Dotnet  dynamic coverage of mobile sensor networksDotnet  dynamic coverage of mobile sensor networks
Dotnet dynamic coverage of mobile sensor networks
 
Dynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksDynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networks
 

Gaussian versus uniform distribution for intrusion detection in wireless sensor networks

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com GAUSSIAN VERSUS UNIFORM DISTRIBUTION FOR INTRUSION DETECTION IN WIRELESS SENSOR NETWORKS ABSTRACT: In a Wireless Sensor Network (WSN), intrusion detection is of significant importance in many applications in detecting malicious or unexpected intruder(s). The intruder can be an enemy in a battlefield, or a malicious moving object in the area of interest. With uniform sensor deployment, the detection probability is the same for any point in a WSN. However, some applications may require different degrees of detection probability at different locations. For example, an intrusion detection application may need improved detection probability around important entities. Gaussian-distributed WSNs can provide differentiated detection capabilities at different locations but related work is limited. This paper analyzes the problem of intrusion detection in a Gaussian-distributed WSN by characterizing the detection probability with respect to the application requirements and the network parameters under both single-sensing detection and multiple-sensing detection scenarios. Effects of different network parameters on the detection probability are examined in detail. Furthermore, performance of Gaussian-distributed WSNs is compared with uniformly distributed WSNs. This work allows us to analytically formulate detection probability in a random WSN and provides guidelines in selecting an appropriate deployment strategy and determining critical network parameters.