Detection of attacker and location in wireless sensor network as an application for border surveillance

Border surveillance is one of the high priority in the security of countries around the world. Typical and traditional border observations involve troops and checkpoints at borders, but these do not provide complete security. One effective solution is the addition of smart fencing to enhance surveillance in a Border Patrol system. More specifically, effective border security can be achieved through the introduction of autonomous surveillance and the utilization of wireless sensor networks. Collectively, these wireless sensor networks will create a virtual fencing system comprising a large number of heterogeneous sensor devices. These devices are embedded with cameras and other sensors that provide a continuous monitor. However, to achieve an efficient wireless sensor network, its own security must be assured. This article focuses on the detection of attacks by unknown trespassers (perpetrators) on border surveillance sensor networks. We use both the Dempster–Shafer theory and the time difference of arrival method to identify and locate an attacked node. Simulation results show that the proposed scheme is both plausible and effective.

[1]  Subhash Challa,et al.  An Introduction to Bayesian and Dempster-Shafer Data Fusion , 2003 .

[2]  Valerio Formicola,et al.  Enhancing Intrusion Detection in Wireless Sensor Networks through Decision Trees , 2013, EWDC.

[3]  Mohiuddin Ahmed,et al.  Novel Approach for Network Traffic Pattern Analysis using Clustering-based Collective Anomaly Detection , 2015, Annals of Data Science.

[4]  WADE FOY,et al.  Position-Location Solutions by Taylor-Series Estimation , 1976, IEEE Transactions on Aerospace and Electronic Systems.

[5]  Alvin S. Lim,et al.  Interconnection between IP Networks and Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.

[6]  H. C. Schau,et al.  Passive source localization employing intersecting spherical surfaces from time-of-arrival differences , 1987, IEEE Trans. Acoust. Speech Signal Process..

[7]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[8]  Jianzhong Li,et al.  Compressing Information of Target Tracking in Wireless Sensor Networks , 2011, Wirel. Sens. Netw..

[9]  Rakowsky Uwe Kay,et al.  Fundamentals of the Dempster-Shafer theory and its applications to system safety and reliability modelling , 2007 .

[10]  Marine Minier,et al.  Hierarchical Node Replication Attacks Detection in Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.

[11]  Xu Huang,et al.  Wireless Sensor Network Internal Attacker Identification with Multiple Evidence by Dempster-Shafer Theory , 2012, ICA3PP.

[12]  Dharmendra Sharma,et al.  A Novel Framework for Abnormal Behaviour Identification and Detection for Wireless Sensor Networks , 2012 .

[13]  Kari Sentz,et al.  Combination of Evidence in Dempster-Shafer Theory , 2002 .

[14]  Reza Ebrahimpour,et al.  Combination of multiple diverse classifiers using belief functions for handling data with imperfect labels , 2012, Expert Syst. Appl..

[15]  John B. McKitterick Sensor deployment planning for unattended ground sensor networks , 2004, SPIE Defense + Commercial Sensing.

[16]  Hongyan Cui,et al.  Smart Decision Making Internal Attacks in Wireless Sensor Network , 2012 .

[17]  B. Friedlander A passive localization algorithm and its accuracy analysis , 1987 .

[18]  Wenke Lee,et al.  Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.

[19]  K. C. Ho,et al.  A simple and efficient estimator for hyperbolic location , 1994, IEEE Trans. Signal Process..

[20]  Dharmendra Sharma,et al.  A Taxonomy of Internal Attacks in Wireless Sensor Network , 2012 .

[21]  Jessica Staddon,et al.  Efficient tracing of failed nodes in sensor networks , 2002, WSNA '02.