Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chin-Yi University of Technology Institute of Electronic Engineering Network E.M.U Application Lab Reporter : Huang-Wei Liu Advisor : Tsung-Hung Lin 1.

Similar presentations


Presentation on theme: "Chin-Yi University of Technology Institute of Electronic Engineering Network E.M.U Application Lab Reporter : Huang-Wei Liu Advisor : Tsung-Hung Lin 1."— Presentation transcript:

1 Chin-Yi University of Technology Institute of Electronic Engineering Network E.M.U Application Lab Reporter : Huang-Wei Liu Advisor : Tsung-Hung Lin 1

2 Network E.M.U Application Lab  IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 7, NO. 6, JUNE 2008  Yun Wang, Student Member, IEEE Xiaodong Wang, Student Member, IEEE Bin Xie, Senior Member, IEEE Demin Wang, Student Member,IEEE Dharma P. Agrawal, Fellow, IEEE 2

3 Network E.M.U Application Lab  Introduction  Intrusion detection model and definitions  Intrusion detection in a homogeneous wireless sensor network  Intrusion detection in a heterogeneous wireless sensor network  Network connectivity and broadcast reachability in a heterogeneous wireless sensor network  Simulation and Verification  Conclusion  Reference 3

4 Network E.M.U Application Lab  The intrusion detection application concerns how fast the intruder can be detected by the WSN.  A high-density deployment policy increases the network investment and may be even unaffordable for a large area.  A network with small and scattered void areas will also be able to detect a moving intruder within a certain intrusion distance. 4

5 Network E.M.U Application Lab  In this paper, the authors derive the expected intrusion distance and evaluate the detection probability in different application scenarios. 5

6 Network E.M.U Application Lab  The main contributions of this paper:  Developing an analytical model for intrusion detection in WSNs, and mathematically analyzing the detection probability with respect to various network parameters.  Applying the analytical model to single-sensing detection and multiple-sensing detection scenarios for homogeneous and heterogeneous WSNs. 6

7 Network E.M.U Application Lab  Defining and examining the network connectivity and broadcast reachability in a heterogeneous WSN. 7 Fig. Intrusion detection in a WSN

8 Network E.M.U Application Lab  Our intrusion detection model includes :  Network Model  Detection Model  Intrusion Strategy Model 8

9 Network E.M.U Application Lab  Network Model  Homogeneous (Fig.1(a))  Heterogeneous (Fig.1(b)) 9 sensor type I sensor type II Fig.1 Network model type : (a)Homogeneous WSNs(b)Heterogeneous WSNs (a) (b) intruder Sensor that has a smaller sensor range r s2 as well as a shorter transmission range r x2 Sensor that has a large sensor range r s1 as well as a longer transmission range r x1 L L λ1λ1 λ2λ2 λ : node density of the WSN AA A : square area L*L

10 Network E.M.U Application Lab  Detection Model  The detection model defines how the intruder can be detected.  Two detection models : ▪ single-sensing detection model ▪ multiple-sensing detection model  Three metrics (Fig.2) : ▪ Intrusion distance ▪ Detection probability ▪ Average intrusion distance 10

11 Network E.M.U Application Lab 11 D D : Intrusion detection distance Ρ % : detection probability Ρ % E(D): Average intrusion distance E(D) the expected distance that the intruder travels before it is detected by the WSN for the first time the probability that an intruder is detected within a certain intrusion distance the distance that the intruder travels before it is detected by a WSN for the first time. Fig.2 three metrics of WSNs

12 Network E.M.U Application Lab  Intrusion Strategy Model  The intrusion strategy illustrates the moving policy of the intruder.  Two intrusion strategies for the movement of the intruder in a WSN: the intrusion path is a straight line(Fig.3) and the intrusion area accordingly is a curved band(Fig.4). 12

13 Network E.M.U Application Lab 13 Fig. 3. Intrusion strategy 1. Fig. 4. Intrusion strategy 2. If D 1 =D 2, the corresponding intrusion detection areas approximately satisfy S 1 =S 2.

14 Network E.M.U Application Lab 14 Calculate S D : Fig. 5. The intruder starts from the boundary of the WSN. Fig. 6. The intruder starts form a random point in the WSN.

15 Network E.M.U Application Lab 15 Instrusion detection analytical items

16 Network E.M.U Application Lab  Single-Sensing Detection ( homogeneous ) 16 Thorem 1. Thorem 3. Thorem 2. Possion distributed: (1) (2) (3)

17 Network E.M.U Application Lab  K-Sensing Detection ( homogeneous ) 17 Thorem 4. Thorem 5. Thorem 6. (4) (5) (6)

18 Network E.M.U Application Lab  Detection Model: 18 Fig. 7. Intrusion detection at the start point (D h =0). Fig. 8. Intrusion detection in the heterogeneous WSN (D h = ξ). Intruder I Intruder II Intruder I

19 Network E.M.U Application Lab  Single-Sensing Detection ( heterogeneous ) 19 Thorem 7. Thorem 8. Thorem 9. (7) (8) (9)

20 Network E.M.U Application Lab  K-Sensing Detection ( heterogeneous ) 20 Thorem 12. Thorem 10. Thorem 11. (10) (11) (12)

21 Network E.M.U Application Lab  Incorporating Node Availability  RIS(Random Independent Sleeping) scheme.  The authors assume all sensors have the same availability probability, denoted by p a.  Therefore, the above analysis can be extended to incorporate RIS scheme with a node availability rate p a by replacing the previous node densities, λ, λ 1, and λ 2 with λp a, λ 1 p a1, and λ 2 p a2, respectively. 21

22 Network E.M.U Application Lab  A WSN must provide satisfactory connectivity so that sensors can communicate for data collaboration and reporting to the administrative center.  In a heterogeneous WSN, the deployment of sensors with different capability complicates the network operation with the asymmetric links. 22

23 Network E.M.U Application Lab  In a heterogeneous WSN, sensors mainly use a broadcast paradigm for communication and high-capacity sensors usually undertake more important tasks. 23

24 Network E.M.U Application Lab  Two fundamental characteristics of a heterogeneous WSN. The definitions are listed below:  Network connectivity ▪ The probability that a packet broadcasted from any sensor can reach all the other sensors in the network.  Broadcast reachability ▪ The probability that a packet broadcasted from any Type I sensor can reach all the other sensors in the network. 24 (13) (14)

25 Network E.M.U Application Lab  The results indicate that for a given heterogeneous WSN, the network connectivity and broadcast reachability is enhanced with the increase of node density and transmission range. 25

26 Network E.M.U Application Lab  The analytical and simulation results are compared by varying the sensing range, transmission range, node density, and node availability.  In the simulation, sensors are deployed in accordance with a uniform distribution in a squared network domain. 26

27 Network E.M.U Application Lab  The intruder moves into the network domain from a randomly selected point on the network boundary.  The simulation includes that:  Verification for Homogeneous WSNs  Verification for Heterogeneous WSNs  Verification for Network Connectivity and Broadcast Reachability 27

28 Network E.M.U Application Lab  Verification for Homogeneous WSNs 28 Simulation Parameters

29 Network E.M.U Application Lab 29 Fig. 10. Intrusion detection probability (single and three-sensing) in the homogeneous WSN. Fig. 11. Average intrusion distance (single and three-sensing in the homogeneous WSN.) Simulation results(Verification for Homogeneous WSNs) Sensing range : 0~30 meter r s, P r s, E(D)

30 Network E.M.U Application Lab  Verification for Heterogeneous WSNs 30 Simulation Parameters

31 Network E.M.U Application Lab 31 Fig. 12. Intrusion detection probability under heterogeneous case. Simulation results(Verification for Heterogeneous WSNs) Heter[k=1] Homo[k=1] Heter[k=3] Homo[k=3] Type I, P

32 Network E.M.U Application Lab  Verification for Network Connectivity and Broadcast Reachability 32 Simulation Parameters

33 Network E.M.U Application Lab 33 Fig. 14. Effects of Type I sensors on the broadcast reachability in heterogeneous WSN. Fig. 13. Effects of transmission range on the broadcast reachability in heterogeneous WSN. Simulation results(Verification for Network Connectivity and Broadcast Reachability) br(heter) con(heter) con(homo) con(heter) r x, P br, P con Type I, P br, P con

34 Network E.M.U Application Lab  This paper analyzes the intrusion detection problem in both homogeneous and heterogeneous WSNs by characterizing intrusion detection probability with respect to the intrusion distance and the network parameters. 34

35 Network E.M.U Application Lab 35 [1] D.P. Agrawal and Q.-A. Zeng, Introduction to Wireless and Mobile Systems. Brooks/Cole Publishing, Aug. 2003. [2] B. Liu and D. Towsley, “Coverage of Sensor Networks: Fundamental Limits,” Proc. Third IEEE Int’l Conf. Mobile Ad Hoc and Sensor Systems (MASS), Oct. 2004. [3] S. Ren, Q. Li, H. Wang, X. Chen, and X. Zhang, “Design and Analysis of Sensing Scheduling Algorithms under Partial Coverage for Object Detection in Sensor Networks,” IEEE Trans. Parallel and Distributed Systems, vol. 18, no. 3, pp. 334-350, Mar. 2007. [4] S. Banerjee, C. Grosan, A. Abraham, and P. Mahanti, “Intrusion Detection on Sensor Networks Using Emotional Ants,” Int’l J. Applied Science and Computations, vol. 12, no. 3, pp. 152-173, 2005. [5] S. Capkun, M. Hamdi, and J. Hubaux, “GPS-Free Positioning in Mobile Ad-Hoc Networks,” Proc. 34th Ann. Hawaii Int’l Conf. System Sciences, Jan. 2001. [6] N. Bulusu, J. Heidemann, and D. Estrin, “Gps-Less Low Cost Outdoor Localization for Very Small Devices,” IEEE Personal Comm. Magazine, special issue on smart spaces and environments, 2000. [7] D. Niculescu, “Positioning in Ad Hoc Sensor Networks,” IEEE Network, vol. 18, no. 4, pp. 24- 29, July-Aug. 2004.

36 Network E.M.U Application Lab 36 [8] Y. Wang, X. Wang, D. Wang, and D.P. Agrawal, “Localization Algorithm Using Expected Hop Progress in Wireless Sensor Networks,” Proc. Third IEEE Int’l Conf. Mobile Ad hoc and Sensor Systems (MASS ’06), Oct. 2006. [9] P. Traynor, R. Kumar, H. Choi, G. Cao, S. Zhu, and T.L. Porta, “Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks,” IEEE Trans. Mobile Computing, vol. 6, no. 6, June 2007. [10] J.-J. Lee, B. Krishnamachari, and C.J. Kuo, “Impact of Heterogeneous Deployment on Lifetime Sensing Coverage in Sensor Networks,” Proc. First Ann. IEEE Comm. Soc. Conf. Sensor and Ad Hoc Comm. and Networks, pp. 367-376, Oct. 2004. [11] V.P. Mhatre, C. Rosenberg, D. Kofman, R. Mazumdar, and N. Shroff, “A Minimum Cost Heterogeneous Sensor Network with a Lifetime Constraint,” IEEE Trans. Mobile Computing, vol. 4, no. 1, pp. 4-15, 2005. [12] M. Yarvis, N. Kushalnagar, H. Singh, A. Rangarajan, Y. Liu, and S. Singh, “Exploiting Heterogeneity in Sensor Networks,” Proc. IEEE INFOCOM, 2005. [13] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A Survey on Sensor Networks,” IEEE Comm. Magazine, vol. 40, no. 8, pp. 102-114, Aug. 2002. [14] H. Kung and D. Vlah, “Efficient Location Tracking Using Sensor Networks,” Proc. IEEE Wireless Comm. and Networking Conf., vol. 3, pp. 1954-1961, Mar. 2003.

37 Network E.M.U Application Lab 37


Download ppt "Chin-Yi University of Technology Institute of Electronic Engineering Network E.M.U Application Lab Reporter : Huang-Wei Liu Advisor : Tsung-Hung Lin 1."

Similar presentations


Ads by Google