WSN in three dimensional space is common in different application areas such as space monitoring, cave monitoring under water eco system and so on. Intrusion is a common type of attack in such types of networks. In this paper, we analyze the intrusion detection probability which helps in deploying the sensors in efficient manner. Even though the sensors are throw away in nature, still the cost matters. And the intelligent deployment helps in reducing the redundancy in communication. Therefore this model can be beneficial in case of three dimensional WSN.Here we deal with heterogeneous WSN as such types of WSN are common in different applications. For the case of simplicity, in our analysis, we consider only two types of sensors named as Type 1 and Type 2. This model can be extended to any number of types. This paper is an extension of our previous work where intrusion detection on homogeneous networks was discussed. General TermsWireless sensor networks, security, internal and external intrusion detection. KeywordsIntrusion detection, node density, sensing range, Wireless Sensor Network (WSN). INTRODUCTIONA wireless sensor network (WSN) is a type of wireless network consist of small nodes with capabilities of sensing physical or environmental conditions, processing related data and send information wirelessly.WSN is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants, at different locations. The development of wireless sensor networks was originally motivated by military applications such as battlefield surveillance [1]. However, wireless sensor networks are now used in many industrial and civilian application areas, including industrial process monitoring and control, machine health monitoring, environment and habitat monitoring, healthcare applications, home automation and traffic control.The sensor nodes in WSNs are usually static after deployment, and communicate mainly through broadcast instead of point-topoint communication. Sensors are deployed in a variety of domains and some application should be secure from all types of attacks. A lot of security protocols or mechanisms have been designed for sensor networks. For example, SPINS (Sensor Protocol for Information via Negotiation), a set of protocols, provides secure data confidentiality, two-party data authentication, and data freshness and authenticated broadcast for sensor network [2]. LEAP (Localized Encryption and Authentication Protocol), is designed to support in-network processing bases on the different security requirements for different types of messages exchange [3]. INSENS is an intrusion tolerant routing protocol for wireless sensor networks [4]. In general, security solutions in the network can be divided into two categories: prevention and detection. Prevention techniques, such as encryption, authentication, firewalls, in WSNs, physical links may always be invaded, th...
Wireless sensor networks continue to grow. So the need for effective security mechanism is important. Because sensor networks may interact with sensitive data and operate in open and unprotected environment, security is a crucial concern.Trust management helps to improve the security of wireless sensor networks. Various methods have been proposed for trust management in wireless sensor networks. An energy efficient hierarchical trust management scheme is proposed here which reduces the energy consumption rate of sensor nodes by calculat ing the trust values on demand and also the system is not collapses even if the cluster head is compromised. The trust management scheme is applied to both trust based geographic routing and trust based intrusion detection. Trust based geographic routing increases the packet delivery ratio compared with normal routing and trust based intrusion detection helps to identify the malicious nodes effectively. Index Terms-Wireless sensor networks (WSN), Security, Quality of Service (QoS), Stochastic Petri Net (SPN), Trust management. 978-1-4799-6818-3/15/$31.00
Wireless Sensor Networks consists of tiny devices which processes and routes the sensed data. The process of detecting any external and internal intruders entering to a Wireless Sensor Network area is referred to as intrusion detection. An intruder is a moving attacker entering a particular area. In this paper, we propose an algorithm Secure and Energy Efficient Approach for Detection of Intruder (SEEDI) in homogeneous Wireless Sensor Networks. Single sensing and multi sensing intruder detection are considered in our algorithm. Simulation results showed that the proposed algorithm resulted in better performance.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.