Detection of attacker and location in wireless sensor network as an application for border surveillance

Mohammed A. S. Aseeri, Muhammad Raisuddin Ahmed, M. Shakib, O. Ghorbel, H. Shaman

Research output: Contribution to journalArticlepeer-review

66 Downloads (Pure)

Abstract

Border surveillance is one of the high priority in the security of countries around the world. Typical and traditional border observations involve troops and checkpoints at borders, but these do not provide complete security. One effective solution is the addition of smart fencing to enhance surveillance in a Border Patrol system. More specifically, effective border security can be achieved through the introduction of autonomous surveillance and the utilization of wireless sensor networks. Collectively, these wireless sensor networks will create a virtual fencing system comprising a large number of heterogeneous sensor devices. These devices are embedded with cameras and other sensors that provide a continuous monitor. However, to achieve an efficient wireless sensor network, its own security must be assured. This article focuses on the detection of attacks by unknown trespassers (perpetrators) on border surveillance sensor networks. We use both the Dempster–Shafer theory and the time difference of arrival method to identify and locate an attacked node. Simulation results show that the proposed scheme is both plausible and effective.
Original languageEnglish
JournalInternational Journal of Distributed Sensor Networks
Volume13
Issue number11
DOIs
Publication statusPublished - 20 Nov 2017

Fingerprint

Dive into the research topics of 'Detection of attacker and location in wireless sensor network as an application for border surveillance'. Together they form a unique fingerprint.

Cite this