Detection of attacker and location in wireless sensor network as an application for border surveillance
Border surveillance is one of the high priority in the security of countries around the world. Typical and traditional border observations involve troops and checkpoints at borders, but these do not provide complete security. One effective solution is the addition of smart fencing to enhance surveil...
Saved in:
| Main Authors: | , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2017-11-01
|
| Series: | International Journal of Distributed Sensor Networks |
| Online Access: | https://doi.org/10.1177/1550147717740072 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849468134643204096 |
|---|---|
| author | Mohammed Aseeri Muhammad Ahmed Mohammed Shakib Oussama Ghorbel Hussian Shaman |
| author_facet | Mohammed Aseeri Muhammad Ahmed Mohammed Shakib Oussama Ghorbel Hussian Shaman |
| author_sort | Mohammed Aseeri |
| collection | DOAJ |
| description | Border surveillance is one of the high priority in the security of countries around the world. Typical and traditional border observations involve troops and checkpoints at borders, but these do not provide complete security. One effective solution is the addition of smart fencing to enhance surveillance in a Border Patrol system. More specifically, effective border security can be achieved through the introduction of autonomous surveillance and the utilization of wireless sensor networks. Collectively, these wireless sensor networks will create a virtual fencing system comprising a large number of heterogeneous sensor devices. These devices are embedded with cameras and other sensors that provide a continuous monitor. However, to achieve an efficient wireless sensor network, its own security must be assured. This article focuses on the detection of attacks by unknown trespassers (perpetrators) on border surveillance sensor networks. We use both the Dempster–Shafer theory and the time difference of arrival method to identify and locate an attacked node. Simulation results show that the proposed scheme is both plausible and effective. |
| format | Article |
| id | doaj-art-fb2595a56dfd432fa9eb365878e08142 |
| institution | Kabale University |
| issn | 1550-1477 |
| language | English |
| publishDate | 2017-11-01 |
| publisher | Wiley |
| record_format | Article |
| series | International Journal of Distributed Sensor Networks |
| spelling | doaj-art-fb2595a56dfd432fa9eb365878e081422025-08-20T03:25:56ZengWileyInternational Journal of Distributed Sensor Networks1550-14772017-11-011310.1177/1550147717740072Detection of attacker and location in wireless sensor network as an application for border surveillanceMohammed Aseeri0Muhammad Ahmed1Mohammed Shakib2Oussama Ghorbel3Hussian Shaman4King Abdulaziz City for Science and Technology, Riyadh, Saudi ArabiaUniversity of Portsmouth, Portsmouth, UKUniversity of Malaya, Kuala Lumpur, MalaysiaUniversity of Sfax, Sfax, TunisiaKing Abdulaziz City for Science and Technology, Riyadh, Saudi ArabiaBorder surveillance is one of the high priority in the security of countries around the world. Typical and traditional border observations involve troops and checkpoints at borders, but these do not provide complete security. One effective solution is the addition of smart fencing to enhance surveillance in a Border Patrol system. More specifically, effective border security can be achieved through the introduction of autonomous surveillance and the utilization of wireless sensor networks. Collectively, these wireless sensor networks will create a virtual fencing system comprising a large number of heterogeneous sensor devices. These devices are embedded with cameras and other sensors that provide a continuous monitor. However, to achieve an efficient wireless sensor network, its own security must be assured. This article focuses on the detection of attacks by unknown trespassers (perpetrators) on border surveillance sensor networks. We use both the Dempster–Shafer theory and the time difference of arrival method to identify and locate an attacked node. Simulation results show that the proposed scheme is both plausible and effective.https://doi.org/10.1177/1550147717740072 |
| spellingShingle | Mohammed Aseeri Muhammad Ahmed Mohammed Shakib Oussama Ghorbel Hussian Shaman Detection of attacker and location in wireless sensor network as an application for border surveillance International Journal of Distributed Sensor Networks |
| title | Detection of attacker and location in wireless sensor network as an application for border surveillance |
| title_full | Detection of attacker and location in wireless sensor network as an application for border surveillance |
| title_fullStr | Detection of attacker and location in wireless sensor network as an application for border surveillance |
| title_full_unstemmed | Detection of attacker and location in wireless sensor network as an application for border surveillance |
| title_short | Detection of attacker and location in wireless sensor network as an application for border surveillance |
| title_sort | detection of attacker and location in wireless sensor network as an application for border surveillance |
| url | https://doi.org/10.1177/1550147717740072 |
| work_keys_str_mv | AT mohammedaseeri detectionofattackerandlocationinwirelesssensornetworkasanapplicationforbordersurveillance AT muhammadahmed detectionofattackerandlocationinwirelesssensornetworkasanapplicationforbordersurveillance AT mohammedshakib detectionofattackerandlocationinwirelesssensornetworkasanapplicationforbordersurveillance AT oussamaghorbel detectionofattackerandlocationinwirelesssensornetworkasanapplicationforbordersurveillance AT hussianshaman detectionofattackerandlocationinwirelesssensornetworkasanapplicationforbordersurveillance |