Probabilistic intrusion detection based on an optimal strong K-barrier strategy in WSNs

被引:0
|
作者
Boualem, Adda [1 ]
De Runz, Cyril [2 ]
Ayaida, Marwane [3 ,4 ]
Kholidy, Hisham [5 ]
机构
[1] Ibn Khaldoun Univ, Comp Sci Dept, Tiaret 14000, Algeria
[2] Univ Tours, LIFAT, F-41000 Blois, France
[3] Univ Lille, UMR 8520, Polytech Hauts Defrance, CNRS,IEMN, F-59313 Valenciennes, France
[4] Univ Reims, CReSTIC EA 3804, F-51097 Reims, France
[5] SUNY Polytech Inst, Coll Engn, New York, NY USA
关键词
WSN; Strong K-barrier coverage; Connectivity; Power Consumption; Truth Table; Probability; SENSOR; COVERAGE; NETWORKS;
D O I
10.1007/s12083-024-01634-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ensuring better surveillance of borders with K-barrier coverage type via homogeneous wireless sensor networks (WSNs) remains a challenging task to be solved urgently since it influences the lifetime of the network. The main contribution of this paper is the proposal of a strong K-barrier coverage strategy based on the scheduling of state change combinations (0/1) in the truth table. The change of node state (Active/Passive) truth tables depends on a mathematical probability formula according which it makes impossible the crossing of the barriers (intrusion probability tends towards zero). Furthermore, the proposed probabilistic interference increases the vulnerability against any type of possible intrusion in the WSN regardless of the speed of the intruder. The proposed protocol is named; K-Barrier Coverage via Probabilistic Interference of Truth-Table states in Homogeneous Sensor Network (KBC-PITT). We have shown in two ways that our strategy is optimal compared to the proposed k-barrier coverage strategies in the literature; (a) by demonstrating that the probability of barrier intrusion tends towards zero; and (b) by simulations to confirm the effectiveness of KBC-PITT in terms of perfect coverage, connectivity, and power consumption with high reliability and simple architecture. The simulation results highlight the benefits of using KBC-PITT strategy to solve the intrusion detection problem by maintaining coverage and connectivity with minimal power consumption throughout the network's lifetime, reaching 100% of coverage, compared to other well-known strategies, namely WTBC, AND, HMB-SAA, PGSA, CHA, and QUEC.
引用
收藏
页码:1190 / 1207
页数:18
相关论文
共 50 条
  • [31] An Optimal Region Selection Strategy for WSNs Localization based on Voronoi Diagram
    Guan Zixiao
    Zhang Baihai
    Dong Lijing
    Chai Senchun
    2015 34TH CHINESE CONTROL CONFERENCE (CCC), 2015, : 7759 - 7764
  • [32] 2D k-barrier duty-cycle scheduling for intruder detection in Wireless Sensor Networks
    Tian, Jie
    Zhang, Wensheng
    Wang, Guiling
    Gao, Xin
    COMPUTER COMMUNICATIONS, 2014, 43 : 31 - 42
  • [33] PAID: A Probabilistic Agent-Based Intrusion Detection system
    Gowadia, V
    Farkas, C
    Valtorta, M
    COMPUTERS & SECURITY, 2005, 24 (07) : 529 - 545
  • [34] Probabilistic techniques for intrusion detection based on computer audit data
    Ye, N
    Li, XY
    Chen, Q
    Emran, SM
    Xu, MM
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2001, 31 (04): : 266 - 274
  • [35] Network Unbalanced Intrusion Detection Algorithm for WSNs Based on Local Density Descent Search
    Gong, Chang
    Wang, Hui
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2020, 126 : 233 - 233
  • [36] Deploy Efficiency Driven k-Barrier Construction Scheme Based on Target Circle in Directional Sensor Network
    Xing-Gang Fan
    Zhi-Cong Che
    Feng-Dan Hu
    Tao Liu
    Jin-Shan Xu
    Xiao-Long Zhou
    Journal of Computer Science and Technology, 2020, 35 : 647 - 664
  • [37] Detection of Network Intrusion Threat Based on the Probabilistic Neural Network Model
    Wang, Benyou
    Gu, Li
    INFORMATION TECHNOLOGY AND CONTROL, 2019, 48 (04): : 618 - 625
  • [38] Intrusion Detection Based on Parallel Intelligent Optimization Feature Extraction and Distributed Fuzzy Clustering in WSNs
    Liu, Zhouzhou
    Wei, Wei
    Wang, Hao
    Zhang, Yangmei
    Zhang, Qianyun
    Li, Shining
    IEEE ACCESS, 2018, 6 : 72201 - 72211
  • [39] Assessing degree of intrusion scope (DIS): a statistical strategy for anomaly based intrusion detection
    V. Jyothsna
    V. V. Rama Prasad
    CSI Transactions on ICT, 2018, 6 (2) : 99 - 127
  • [40] A Collaborative Intrusion Detection Model using a novel optimal weight strategy based on Genetic Algorithm for Ensemble Classifier
    Teng, Shaohua
    Zhang, Zhenhua
    Teng, Luyao
    Zhang, Wei
    Zhu, Haibin
    Fang, Xiaozhao
    Fei, Lunke
    PROCEEDINGS OF THE 2018 IEEE 22ND INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN ((CSCWD)), 2018, : 761 - 766