Probabilistic Model for Single and Multi-Sensing Intrusion Detection in Wireless Sensor Networks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
Wireless Sensor Networks consists of tiny devices capable of processing, routing the sensed data and are capable of detecting the intruders. The process of detecting any suspected (anomalous) moving object(attacker) within the reach of a Wireless Sensor Network area is referred to as intrusion detection. In this paper, we propose an algorithm to detect the intruder by the cluster heads in a 2D and 3D homogeneous Wireless Sensor Networks. This algorithm overcomes the attacks on implementation and also, reduces the energy consumption. The proposed algorithm considers Single Sensing and Multi-Sensing Intrusion Detection using minimum number of sensor nodes and a probabilistic model has been developed for both 2D and 3D homogeneous networks. Simulation results show that the power analysis attack and energy consumption is minimized by activating only few sensor nodes for detection and using only few sensor nodes for processing of data. The performance of the proposed algorithm is better compared to using all the sensor nodes for detection where the energy consumption is more.
Authors and Affiliations
Shaila K
Use of Non Monetary Incentives to Improve Service Delivery in Public Institutions In Tharaka Nithi County
Abstract: Service delivery is of critical importance for the organisations which are offering services as their core product. It is what the clients pay for and determines their retention as well as growth and prof...
HDL Design for Exa Hertz Clock based 2e23-1 Exa Bits Per Second (Ebps) PRBS Design for Ultra High Speed Applications/Products
Abstract: The Design is mainly Intended for HDL Design for Exa Hertz Clock based 2e23 -1 Exa Bits Per Second (Ebps) PRBS Design for Ultra High Speed Applications/Products the estimation of HIGH Speed in terms of Ebps(Exa...
JTAG Architecture with Multi Level Security
For in–circuit testing and debugging JTAG (Joint Test Access Group) is one of the most powerful standard architecture of DFT (Design For Testability). But JTAG can also act as a tool for hacking and hence makes...
Cardiac Catheterization Procedure Prediction Using Machine Learning and Data Mining Techniques
Although catheterization is an important tool in the diagnosis and the treatment of cardiovascular diseases, it may cause different complications such as death or myocardial infarction during diagnosis. Data mining techn...
Cloud-Based Impact for Mobile and Pervasive Environments: A Survey
Mobile Cloud Computing (MCC) which combines mobile computing and cloud computing, has become one of the industry buzz words and a major discussion thread in the IT world since 2009. Despite increasing...