2,967 research outputs found

    Intrusion-aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    Get PDF
    Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.Comment: 19 pages, 7 figure

    An Adaptive Fault-Tolerant Event Detection Scheme for Wireless Sensor Networks

    Get PDF
    In this paper, we present an adaptive fault-tolerant event detection scheme for wireless sensor networks. Each sensor node detects an event locally in a distributed manner by using the sensor readings of its neighboring nodes. Confidence levels of sensor nodes are used to dynamically adjust the threshold for decision making, resulting in consistent performance even with increasing number of faulty nodes. In addition, the scheme employs a moving average filter to tolerate most transient faults in sensor readings, reducing the effective fault probability. Only three bits of data are exchanged to reduce the communication overhead in detecting events. Simulation results show that event detection accuracy and false alarm rate are kept very high and low, respectively, even in the case where 50% of the sensor nodes are faulty

    Automatic Fire Detection: A Survey from Wireless Sensor Network Perspective

    Get PDF
    Automatic fire detection is important for early detection and promptly extinguishing fire. There are ample studies investigating the best sensor combinations and appropriate techniques for early fire detection. In the previous studies fire detection has either been considered as an application of a certain field (e.g., event detection for wireless sensor networks) or the main concern for which techniques have been specifically designed (e.g., fire detection using remote sensing techniques). These different approaches stem from different backgrounds of researchers dealing with fire, such as computer science, geography and earth observation, and fire safety. In this report we survey previous studies from three perspectives: (1) fire detection techniques for residential areas, (2) fire detection techniques for forests, and (3) contributions of sensor networks to early fire detection

    A Grid-Based Distributed Event Detection Scheme for Wireless Sensor Networks

    Get PDF
    This paper presents a grid-based distributed event detection scheme for wireless sensor networks. The network is divided into square-shaped grids of predefined grid size, where sensor nodes in each grid form a cluster with a cluster head. Event detection at each grid alone based on the readings of its member nodes is limited in event detection performance, especially for a small event region compared to the grid size. To improve the performance, each grid is further divided into 2 × 2 sub-grids of equal size. The decision on an event is made by finding a square region of 2 × 2 sub-grids, not necessarily in the same grid, that passed a predefined threshold. This process is conducted at each cluster head in a distributed manner by inter-cluster communications. Event detection is initiated when a cluster head receives an alarm from its member nodes. The cluster-head communicates with its neighboring cluster heads to exchange the number of nodes reporting an alarm. The threshold for event detection can be dynamically adjusted to reflect the number of sensor nodes in a grid and event size, if known. High event detection accuracy is achieved with a relatively low threshold without sacrificing false alarm rate by filtering most errors due to transient faults and isolating nodes with permanent faults. Experimental results show that the proposed scheme can achieve high detection accuracy, while maintaining low false alarm rate

    A Survey on Wireless Sensor Network Security

    Full text link
    Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Security in sensor networks is, therefore, a particularly challenging task. This paper discusses the current state of the art in security mechanisms for WSNs. Various types of attacks are discussed and their countermeasures presented. A brief discussion on the future direction of research in WSN security is also included.Comment: 24 pages, 4 figures, 2 table

    Trust models in wireless sensor networks: A survey

    Full text link
    This paper introduces the security and trust concepts in wireless sensor networks and explains the difference between them, stating that even though both terms are used interchangeably when defining a secure system, they are not the same. The difference between reputation and trust is also explained, highlighting that reputation partially affects trust. The methodologies used to model trust and their references are presented. The factors affecting trust updating are summarised and some examples of the systems in which these factors have been implemented are given. The survey states that, even though researchers have started to explore the issue of trust in wireless sensor networks, they are still examining the trust associated with routing messages between nodes (binary events). However, wireless sensor networks are mainly deployed to monitor events and report data, both continuous and discrete. This leads to the development of new trust models addressing the continuous data issue and also to combine the data trust and the communication trust to infer the total trust. © 2010 Springer-Verlag Berlin Heidelberg
    corecore