Intruder Activity Analysis under Unreliable Sensor Networks

This paper addresses the problem of counting intruder activities within a monitored domain by a sensor network. The deployed sensors are unreliable. We characterize imperfect sensors with misdetection and false-alarm probabilities. We model intruder activities with Markov Chains. A set of Hidden Markov Models (HMM) models the imperfect sensors and intruder activities to be monitored. A novel sequential change detection/isolation algorithm is developed to detect and isolate a change from an HMM representing no intruder activity to another HMM representing some intruder activities. Procedures for estimating the entry time and the trace of intruder activities are developed. A domain monitoring example is given to illustrate the presented concepts and computational procedures.

[1]  Feng Zhao,et al.  Scalable Information-Driven Sensor Querying and Routing for Ad Hoc Heterogeneous Sensor Networks , 2002, Int. J. High Perform. Comput. Appl..

[2]  T. C. Shermer,et al.  Recent results in art galleries (geometry) , 1992, Proc. IEEE.

[3]  Miodrag Potkonjak,et al.  Exposure in wireless Ad-Hoc sensor networks , 2001, MobiCom '01.

[4]  D. T. Lee,et al.  Computational complexity of art gallery problems , 1986, IEEE Trans. Inf. Theory.

[5]  Parameswaran Ramanathan,et al.  Sensor deployment strategy for target detection , 2002, WSNA '02.

[6]  Gaurav S. Sukhatme,et al.  Mobile Sensor Network Deployment using Potential Fields : A Distributed , Scalable Solution to the Area Coverage Problem , 2002 .

[7]  H. Vincent Poor,et al.  Online activity detection in a multiuser environment using the matrix CUSUM Algorithm , 2002, IEEE Trans. Inf. Theory.

[8]  Andrew J. Viterbi,et al.  Error bounds for convolutional codes and an asymptotically optimum decoding algorithm , 1967, IEEE Trans. Inf. Theory.

[9]  Miodrag Potkonjak,et al.  Coverage problems in wireless ad-hoc sensor networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[10]  Lawrence R. Rabiner,et al.  A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.

[11]  Nael B. Abu-Ghazaleh,et al.  A taxonomy of wireless micro-sensor network models , 2002, MOCO.

[12]  Vinayak S. Naik,et al.  A line in the sand: a wireless sensor network for target detection, classification, and tracking , 2004, Comput. Networks.

[13]  J. Andel Sequential Analysis , 2022, The SAGE Encyclopedia of Research Design.

[14]  Peter Willett,et al.  Detection of hidden Markov model transient signals , 2000, IEEE Trans. Aerosp. Electron. Syst..

[15]  Meng-Chang Lee Top 100 Documents Browse Search Ieee Xplore Guide Support Top 100 Documents Accessed: Nov 2005 a Tutorial on Hidden Markov Models and Selected Applications Inspeech Recognition , 2005 .

[16]  Krishnendu Chakrabarty,et al.  Sensor deployment and target localization in distributed sensor networks , 2004, TECS.

[17]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[18]  Héctor H. González-Baños,et al.  A randomized art-gallery algorithm for sensor placement , 2001, SCG '01.

[19]  Igor V. Nikiforov,et al.  A generalized change detection problem , 1995, IEEE Trans. Inf. Theory.

[20]  G. Lorden PROCEDURES FOR REACTING TO A CHANGE IN DISTRIBUTION , 1971 .

[21]  J. O'Rourke Art gallery theorems and algorithms , 1987 .

[22]  E. S. Page CONTINUOUS INSPECTION SCHEMES , 1954 .

[23]  Sonia Martínez,et al.  Coverage control for mobile sensing networks , 2002, IEEE Transactions on Robotics and Automation.

[24]  T. Shermer Recent Results in Art Galleries , 1992 .