GPSR: greedy perimeter stateless routing for wireless networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Fault Tolerance in Collaborative Sensor Networks for Target Detection
IEEE Transactions on Computers
The feasibility of launching and detecting jamming attacks in wireless networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Delay of intrusion detection in wireless sensor networks
Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing
Wormhole-Based Antijamming Techniques in Sensor Networks
IEEE Transactions on Mobile Computing
Distributed detection in a large wireless sensor network
Information Fusion
A survey on wireless multimedia sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks
Computer Communications
Wireless Communications & Mobile Computing - Advances in Resource-Constrained Device Networking
Using event detection latency to evaluate the coverage of a wireless sensor network
Computer Communications
Attack distribution modeling and its applications in sensor network security
EURASIP Journal on Wireless Communications and Networking
Wireless sensor network survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
ACM Transactions on Sensor Networks (TOSN)
Analytic evaluation of target detection in heterogeneous wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Analyzing object detection quality under probabilistic coverage in sensor networks
IWQoS'05 Proceedings of the 13th international conference on Quality of Service
Analysis of target detection performance for wireless sensor networks
DCOSS'05 Proceedings of the First IEEE international conference on Distributed Computing in Sensor Systems
Deployment guidelines for achieving maximum lifetime and avoiding energy holes in sensor network
Information Sciences: an International Journal
Hi-index | 0.00 |
The requirements of surveillance wireless sensor networks, such as latency and reliability provisions, are directly related to the deployment quality, which is an indicator of the sensing capability of the network. The determination of the deployment quality is hindered by various factors that cause coverage holes, such as the existence of jammers and destruction of sensors. This paper presents an analytical deployment quality measure in terms of network parameters, including the sensor count, sensing coverage, coverage hole count, coverage hole area size and deployment area size. Assuming a random deployment model for both sensors and holes, our method determines the probability of detection of a target following a linear trajectory by a single sensor and generalizes it to derive the probability of detection in a network with coverage holes. The overall probability of detection is used as the network quality measure and is proposed as a suitable metric under sensor loss assumptions. The proposed deployment quality metric (DQM) is based on the shortest path strategy to provide a conservative estimation for the intruder detection performance. We show that it provides a good estimation of the actual deployment quality with given coverage hole and jamming area properties. Our metric is suitable for real life and simulation scenarios and is computationally inexpensive compared to both simulation based and distributed quality measurements.