Probabilistic intrusion detection based on an optimal strong K-barrier strategy in WSNs

被引:0
|
作者
Boualem, Adda [1 ]
De Runz, Cyril [2 ]
Ayaida, Marwane [3 ,4 ]
Kholidy, Hisham [5 ]
机构
[1] Ibn Khaldoun Univ, Comp Sci Dept, Tiaret 14000, Algeria
[2] Univ Tours, LIFAT, F-41000 Blois, France
[3] Univ Lille, UMR 8520, Polytech Hauts Defrance, CNRS,IEMN, F-59313 Valenciennes, France
[4] Univ Reims, CReSTIC EA 3804, F-51097 Reims, France
[5] SUNY Polytech Inst, Coll Engn, New York, NY USA
关键词
WSN; Strong K-barrier coverage; Connectivity; Power Consumption; Truth Table; Probability; SENSOR; COVERAGE; NETWORKS;
D O I
10.1007/s12083-024-01634-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ensuring better surveillance of borders with K-barrier coverage type via homogeneous wireless sensor networks (WSNs) remains a challenging task to be solved urgently since it influences the lifetime of the network. The main contribution of this paper is the proposal of a strong K-barrier coverage strategy based on the scheduling of state change combinations (0/1) in the truth table. The change of node state (Active/Passive) truth tables depends on a mathematical probability formula according which it makes impossible the crossing of the barriers (intrusion probability tends towards zero). Furthermore, the proposed probabilistic interference increases the vulnerability against any type of possible intrusion in the WSN regardless of the speed of the intruder. The proposed protocol is named; K-Barrier Coverage via Probabilistic Interference of Truth-Table states in Homogeneous Sensor Network (KBC-PITT). We have shown in two ways that our strategy is optimal compared to the proposed k-barrier coverage strategies in the literature; (a) by demonstrating that the probability of barrier intrusion tends towards zero; and (b) by simulations to confirm the effectiveness of KBC-PITT in terms of perfect coverage, connectivity, and power consumption with high reliability and simple architecture. The simulation results highlight the benefits of using KBC-PITT strategy to solve the intrusion detection problem by maintaining coverage and connectivity with minimal power consumption throughout the network's lifetime, reaching 100% of coverage, compared to other well-known strategies, namely WTBC, AND, HMB-SAA, PGSA, CHA, and QUEC.
引用
收藏
页码:1190 / 1207
页数:18
相关论文
共 50 条
  • [11] A lightweight approach for intrusion detection in WSNs based on DCGAN
    Manu Devi
    Priyanka Nandal
    Harkesh Sehrawat
    International Journal of Information Technology, 2025, 17 (2) : 951 - 957
  • [12] Probabilistic inference strategy in distributed intrusion detection systems
    Ding, JG
    Xu, SH
    Krämer, B
    Bai, YC
    Chen, HS
    Zhang, J
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, PROCEEDINGS, 2004, 3358 : 835 - 844
  • [13] A Hierarchical Architecture and Probabilistic Strategy for Collaborative Intrusion Detection
    Hardegen, Christoph
    Petersen, Mike
    Ezelu, Chukwuebuka
    Geier, Timo
    Rieger, Sebastian
    Buehler, Ulrich
    2021 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2021, : 128 - 136
  • [14] A fully distributed deployment algorithm for underwater strong k-barrier coverage using mobile sensors
    Shen, Weiqiang
    Zhang, Chuanlin
    Zhang, Xiaona
    Shi, Jinglun
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (04)
  • [15] Energy-Efficient Intrusion Detection with a Barrier of Probabilistic Sensors
    Li, Junkun
    Chen, Jiming
    Lai, Ten H.
    2012 PROCEEDINGS IEEE INFOCOM, 2012, : 118 - 126
  • [16] Efficient Algorithm for K-Barrier Coverage Based on Integer Linear Programming
    Zhang, Yanhua
    Sun, Xingming
    Wang, Baowei
    CHINA COMMUNICATIONS, 2016, 13 (07) : 16 - 23
  • [17] Strong Barrier Coverage for Intrusion Detection in Wireless Sensor Network
    Li, Jianbo
    Jiang, Shang
    Pan, Zhenkuan
    PROCEEDINGS OF INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2009), 2009, : 62 - 65
  • [18] An Enhanced Intrusion Detection Model Based on Improved kNN in WSNs
    Liu, Gaoyuan
    Zhao, Huiqi
    Fan, Fang
    Liu, Gang
    Xu, Qiang
    Nazir, Shah
    SENSORS, 2022, 22 (04)
  • [19] Intrusion detection scheme based node trust value in WSNs
    Tong, Wei-Ming
    Liang, Jian-Quan
    Lu, Lei
    Jin, Xian-Ji
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2015, 37 (07): : 1644 - 1649
  • [20] A routing and positioning algorithm based on a K-barrier for use in an underground wireless sensor network
    Wang K.
    Wang Q.
    Jiang D.
    Xu Q.
    Mining Science and Technology, 2011, 21 (06): : 773 - 779