Probabilistic intrusion detection based on an optimal strong K-barrier strategy in WSNs

被引:0
|
作者
Boualem, Adda [1 ]
De Runz, Cyril [2 ]
Ayaida, Marwane [3 ,4 ]
Kholidy, Hisham [5 ]
机构
[1] Ibn Khaldoun Univ, Comp Sci Dept, Tiaret 14000, Algeria
[2] Univ Tours, LIFAT, F-41000 Blois, France
[3] Univ Lille, UMR 8520, Polytech Hauts Defrance, CNRS,IEMN, F-59313 Valenciennes, France
[4] Univ Reims, CReSTIC EA 3804, F-51097 Reims, France
[5] SUNY Polytech Inst, Coll Engn, New York, NY USA
关键词
WSN; Strong K-barrier coverage; Connectivity; Power Consumption; Truth Table; Probability; SENSOR; COVERAGE; NETWORKS;
D O I
10.1007/s12083-024-01634-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ensuring better surveillance of borders with K-barrier coverage type via homogeneous wireless sensor networks (WSNs) remains a challenging task to be solved urgently since it influences the lifetime of the network. The main contribution of this paper is the proposal of a strong K-barrier coverage strategy based on the scheduling of state change combinations (0/1) in the truth table. The change of node state (Active/Passive) truth tables depends on a mathematical probability formula according which it makes impossible the crossing of the barriers (intrusion probability tends towards zero). Furthermore, the proposed probabilistic interference increases the vulnerability against any type of possible intrusion in the WSN regardless of the speed of the intruder. The proposed protocol is named; K-Barrier Coverage via Probabilistic Interference of Truth-Table states in Homogeneous Sensor Network (KBC-PITT). We have shown in two ways that our strategy is optimal compared to the proposed k-barrier coverage strategies in the literature; (a) by demonstrating that the probability of barrier intrusion tends towards zero; and (b) by simulations to confirm the effectiveness of KBC-PITT in terms of perfect coverage, connectivity, and power consumption with high reliability and simple architecture. The simulation results highlight the benefits of using KBC-PITT strategy to solve the intrusion detection problem by maintaining coverage and connectivity with minimal power consumption throughout the network's lifetime, reaching 100% of coverage, compared to other well-known strategies, namely WTBC, AND, HMB-SAA, PGSA, CHA, and QUEC.
引用
收藏
页码:1190 / 1207
页数:18
相关论文
共 50 条
  • [41] An Intrusion Detection System for Selective Forwarding Attack in IPv6-based Mobile WSNs
    Gara, Fatma
    Ben Saad, Leila
    Ben Ayed, Rahma
    2017 13TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2017, : 276 - 281
  • [42] MLSTL-WSN: machine learning-based intrusion detection using SMOTETomek in WSNs
    Talukder, Md. Alamin
    Sharmin, Selina
    Uddin, Md Ashraf
    Islam, Md Manowarul
    Aryal, Sunil
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (03) : 2139 - 2158
  • [43] Decision Tree based AIS strategy for Intrusion Detection in MANET
    Jim, Lincy Elizebeth
    Chacko, Jim
    PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY, 2019, : 1191 - 1195
  • [44] Research on the Strategy of Drones Intrusion Detection Based on Game Theory
    Wang, Dinghua
    Feng, Dongqin
    2018 IEEE 9TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), 2018, : 613 - 619
  • [45] ANN Based Whale Sine Algorithm for Optimal Intrusion Detection
    Aldabash, Omar Abdulkhaleq
    Akay, Mehmet Fatih
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (09) : 1628 - 1634
  • [46] Optimal Feature Selection Based on Evolutionary Algorithm for Intrusion Detection
    Prashanth S.K.
    Shitharth S.
    Praveen Kumar B.
    Subedha V.
    Sangeetha K.
    SN Computer Science, 3 (6)
  • [47] A Hybrid Approach for Intrusion-Detection Based on Fuzzy GNP and Probabilistic Classification
    Shinde, S. B.
    Kshirsagar, V. P.
    Deshmukh, M. K.
    INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2012), 2013, 8768
  • [48] Integrated Rule Mining Based on Fuzzy GNP and Probabilistic Classification for Intrusion Detection
    Lu, Nannan
    Mabu, Shingo
    Hirasawa, Kotaro
    JOURNAL OF ADVANCED COMPUTATIONAL INTELLIGENCE AND INTELLIGENT INFORMATICS, 2011, 15 (05) : 495 - 505
  • [49] Intrusion Detection Method Based on Denoising Diffusion Probabilistic Models for UAV Networks
    Wang, Yingshu
    Ding, Jian
    He, Xiaomeng
    Wei, Qian
    Yuan, Shu
    Zhang, Jun
    MOBILE NETWORKS & APPLICATIONS, 2023, 28 (06): : 2149 - 2161
  • [50] Community Intrusion Detection System Based on Radial Basic Probabilistic Neural Network
    Gao, Meijuan
    Tian, Jingwen
    Zhou, Shiru
    ADVANCES IN NEURAL NETWORKS - ISNN 2009, PT 2, PROCEEDINGS, 2009, 5552 : 745 - 752