2016
DOI: 10.3390/fi8010002
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Intelligent Intruders in Wireless Sensor Networks

Abstract: Most of the existing research works on the intrusion detection problem in a wireless sensor network (WSN) assume linear or random mobility patterns in abstracting intruders' models in traversing the WSN field. However, in real-life WSN applications, an intruder is usually an intelligent mobile robot with environment learning and detection avoidance capability (i.e., the capability to avoid surrounding sensors). Due to this, the literature results based on the linear or random mobility models may not be applied… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(14 citation statements)
references
References 26 publications
0
14
0
Order By: Relevance
“…[1][2][3] The sensor nodes are characterized by being limited in resources, among them is the capability of processing, the capacity of memorizing, and the bandwidth of communication and energy. The sensors can generally be deployed in hostile environments in the purpose to monitor and track some phenomena, we can find this in several kinds of applications, such as battlefield surveillance, border surveillance, intruder detection, vehicle tracking, etc.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…[1][2][3] The sensor nodes are characterized by being limited in resources, among them is the capability of processing, the capacity of memorizing, and the bandwidth of communication and energy. The sensors can generally be deployed in hostile environments in the purpose to monitor and track some phenomena, we can find this in several kinds of applications, such as battlefield surveillance, border surveillance, intruder detection, vehicle tracking, etc.…”
Section: Introductionmentioning
confidence: 99%
“…The sensors can generally be deployed in hostile environments in the purpose to monitor and track some phenomena, we can find this in several kinds of applications, such as battlefield surveillance, border surveillance, intruder detection, vehicle tracking, etc. [1][2][3] The sensor nodes are characterized by being limited in resources, among them is the capability of processing, the capacity of memorizing, and the bandwidth of communication and energy. The nodes are usually powered by a battery.…”
Section: Introductionmentioning
confidence: 99%
“…A wireless sensor network is a set of sensors that can detect a specific event, process it and send the information. The sensors can generally deploy in hostile environments in the purpose to monitor and truck some phenomena, we can found this in several kind of applications, such as battlefield surveillance, border surveillance, intruder detection, vehicle tracking, etc., [1,2,3]. The sensor nodes are characterized by being limited in resources in the capability of processing, capacity of memorizing, bandwidth of communication and energy.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, range of communication, density of nodes, sensing algorithms, etc. play a crucial role in intrusion and its detection [90]. More research work is required against intelligent intrusion algorithms in order to maintain security, confidentiality and reliability of WSN.…”
Section: Hybrid Detectionmentioning
confidence: 99%
“…Apart from cryptographic approach, WSN can be designed in such a way that their topologies have specific connectivity properties [89]. Topology control can be a practical solution for WSN nodes with limited computational and communication capabilities [90][91][92][93]. An overview of various topology control schemes is described below.…”
Section: Topology Controlmentioning
confidence: 99%