Exposure in wireless Ad-Hoc sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
A dual-space approach to tracking and sensor management in wireless sensor networks
WSNA '02 Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications
Topology properties of Ad hoc networks with random waypoint mobility
ACM SIGMOBILE Mobile Computing and Communications Review
Energy-efficient surveillance system using wireless sensor networks
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Power conservation and quality of surveillance in target tracking sensor networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Worst and Best-Case Coverage in Sensor Networks
IEEE Transactions on Mobile Computing
The Critical Transmitting Range for Connectivity in Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
The feasibility of launching and detecting jamming attacks in wireless networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Mobility improves coverage of sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Towards optimal sleep scheduling in sensor networks for rare-event detection
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
Relaying in mobile ad hoc networks: the Brownian motion mobility model
Wireless Networks
Energy-quality tradeoffs for target tracking in wireless sensor networks
IPSN'03 Proceedings of the 2nd international conference on Information processing in sensor networks
Probabilistic detection of mobile targets in heterogeneous sensor networks
Proceedings of the 6th international conference on Information processing in sensor networks
High Performance Sleep-Wake Sensor Systems Based on Cyclic Cellular Automata
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Review: Coverage and connectivity issues in wireless sensor networks: A survey
Pervasive and Mobile Computing
Authenticated Directed Diffusion
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Analytic evaluation of target detection in heterogeneous wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Computer Networks: The International Journal of Computer and Telecommunications Networking
On the coverage process of a moving point target in a non-uniform dynamic sensor field
IEEE Journal on Selected Areas in Communications - Special issue on stochastic geometry and random graphs for the analysis and designof wireless networks
Modeling latency—lifetime trade-off for target detection in mobile sensor networks
ACM Transactions on Sensor Networks (TOSN)
Intrusion detection in Gaussian distributed heterogeneous wireless sensor networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Impact of mobile node density on detection performance measures in a hybrid sensor network
IEEE Transactions on Wireless Communications
Proceedings of the 3rd ACM workshop on Artificial intelligence and security
Computer Networks: The International Journal of Computer and Telecommunications Networking
Journal of Network and Computer Applications
Scheduling randomly-deployed heterogeneous video sensor nodes for reduced intrusion detection time
ICDCN'11 Proceedings of the 12th international conference on Distributed computing and networking
Mobile geometric graphs: detection, coverage and percolation
Proceedings of the twenty-second annual ACM-SIAM symposium on Discrete Algorithms
Coverage and activity management of wireless video sensor networks for surveillance applications
International Journal of Sensor Networks
Hi-index | 0.00 |
In this paper we consider sensor networks for intrusion detection, such that node deployment, node failures and node behavior result in coverage gaps and a fraction of disconnected nodes in an otherwise dense and well-connected network. We focus on the time delay for a mobile intruder to be detected by a sensor with a connected path to the sink, in contrast to existing results for the detection time by a sensor with arbitrary connectivity. We model our network using a supercritical percolation model on the plane, implying the existence of a unique unbounded connected component, and we assume that the sink belongs to this component. We analyze the distribution of the distance traveled by a moving target until it comes within sensing range of a node in the giant component, providing analytical bounds for linear intruder mobility and thorough simulation results for other mobility models. We show that the probability that the intruder proceeds undetected exhibits non-memoryless behavior over shorter distances and an exponentially decreasing tail. We also show that the time of contact with the giant component incurs considerably more delay than the time of first contact with any node, in networks with less than 10% of nodes without a path to the sink, which means that even a small percentage of node failures may have a drastic impact on the performance of intrusion detection by a wireless sensor networ.