Unauthenticated event detection in wireless sensor networks using sensors co-coverage
نویسندگان
چکیده مقاله:
Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN imposes network congestion, worsens the packet loss rate, and increases the network energy congestion. In the proposed method, the more the safe, the less the unsafe (MSLU) method, each secure occurred event must be confirmed by various sensor nodes; otherwise the event is dropped. Indeed, the proposed method tends to forward event occurrence reports that are detected by various sensor nodes. The proposed method is evaluated by means of simulation as well as analytical modeling. A wide range of simulations, which are carried out using NS-2, show that the proposed method detects more than 85% of unauthenticated events. This comes at the cost of the network end-to-end delay of 20% because the proposed method does not impose delay on incoming packets. In addition, the proposed method is evaluated by means of an analytical model based on queuing networks. The model accurately estimates the network performance utilizing the proposed unauthenticated event detection method.
منابع مشابه
Intrusion Detection in Wireless Sensor Networks using Genetic Algorithm
Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...
متن کاملCoverage for composite event detection in wireless sensor networks
A wireless sensor network can detect single (or atomic) events or composite events. Since sensors are battery powered and in general, it is hard to recharge them, energy management is always an important issue. In this paper, we study the SCED problem; given a wireless sensor network deployed for watching a composite event x1, x2, . . . , xM , design a sensor scheduling mechanism such that the ...
متن کاملintrusion detection in wireless sensor networks using genetic algorithm
wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. routing attacks on the networks, where a malicious node from sending data to the base station is perceived. in this article, a method that can be used to transfer the data securely to prevent attacks...
متن کاملCoverage Hole Detection in Wireless Sensor Networks
Wireless sensor network is the area where many researchers are focusing. The emerging technology of WSN is expected to provide a broad range of applications, such as battlefield surveillance, environmental monitoring and smart space and so on. Coverage is the important quality of service which is provided by the wireless sensor network. The coverage hole problem is a fundamental issue in WSN. T...
متن کاملEvent Coverage Detection and Event Source Determination in Underwater Wireless Sensor Networks
With the advent of the Internet of Underwater Things, smart things are deployed in the ocean space and establish underwater wireless sensor networks for the monitoring of vast and dynamic underwater environments. When events are found to have possibly occurred, accurate event coverage should be detected, and potential event sources should be determined for the enactment of prompt and proper res...
متن کاملEvent Detection In Wireless Sensor Networks∗
As the demand to explore the physical world increases and the sensing and activation tasks become more sophisticated, wireless sensor networks are expected to support more complicated applications. Regardless of the specific application running on the network, sensors should be able to individually or collaboratively provide diverse event services, i.e. report the occurrence of different events...
متن کاملمنابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ذخیره در منابع من قبلا به منابع من ذحیره شده{@ msg_add @}
عنوان ژورنال
دوره 8 شماره 1
صفحات 61- 71
تاریخ انتشار 2016-01-31
با دنبال کردن یک ژورنال هنگامی که شماره جدید این ژورنال منتشر می شود به شما از طریق ایمیل اطلاع داده می شود.
میزبانی شده توسط پلتفرم ابری doprax.com
copyright © 2015-2023