Detection of attacker and location in wireless sensor network as an application for border surveillance

Border surveillance is one of the high priority in the security of countries around the world. Typical and traditional border observations involve troops and checkpoints at borders, but these do not provide complete security. One effective solution is the addition of smart fencing to enhance surveil...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohammed Aseeri, Muhammad Ahmed, Mohammed Shakib, Oussama Ghorbel, Hussian Shaman
Format: Article
Language:English
Published: Wiley 2017-11-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1177/1550147717740072
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849468134643204096
author Mohammed Aseeri
Muhammad Ahmed
Mohammed Shakib
Oussama Ghorbel
Hussian Shaman
author_facet Mohammed Aseeri
Muhammad Ahmed
Mohammed Shakib
Oussama Ghorbel
Hussian Shaman
author_sort Mohammed Aseeri
collection DOAJ
description Border surveillance is one of the high priority in the security of countries around the world. Typical and traditional border observations involve troops and checkpoints at borders, but these do not provide complete security. One effective solution is the addition of smart fencing to enhance surveillance in a Border Patrol system. More specifically, effective border security can be achieved through the introduction of autonomous surveillance and the utilization of wireless sensor networks. Collectively, these wireless sensor networks will create a virtual fencing system comprising a large number of heterogeneous sensor devices. These devices are embedded with cameras and other sensors that provide a continuous monitor. However, to achieve an efficient wireless sensor network, its own security must be assured. This article focuses on the detection of attacks by unknown trespassers (perpetrators) on border surveillance sensor networks. We use both the Dempster–Shafer theory and the time difference of arrival method to identify and locate an attacked node. Simulation results show that the proposed scheme is both plausible and effective.
format Article
id doaj-art-fb2595a56dfd432fa9eb365878e08142
institution Kabale University
issn 1550-1477
language English
publishDate 2017-11-01
publisher Wiley
record_format Article
series International Journal of Distributed Sensor Networks
spelling doaj-art-fb2595a56dfd432fa9eb365878e081422025-08-20T03:25:56ZengWileyInternational Journal of Distributed Sensor Networks1550-14772017-11-011310.1177/1550147717740072Detection of attacker and location in wireless sensor network as an application for border surveillanceMohammed Aseeri0Muhammad Ahmed1Mohammed Shakib2Oussama Ghorbel3Hussian Shaman4King Abdulaziz City for Science and Technology, Riyadh, Saudi ArabiaUniversity of Portsmouth, Portsmouth, UKUniversity of Malaya, Kuala Lumpur, MalaysiaUniversity of Sfax, Sfax, TunisiaKing Abdulaziz City for Science and Technology, Riyadh, Saudi ArabiaBorder surveillance is one of the high priority in the security of countries around the world. Typical and traditional border observations involve troops and checkpoints at borders, but these do not provide complete security. One effective solution is the addition of smart fencing to enhance surveillance in a Border Patrol system. More specifically, effective border security can be achieved through the introduction of autonomous surveillance and the utilization of wireless sensor networks. Collectively, these wireless sensor networks will create a virtual fencing system comprising a large number of heterogeneous sensor devices. These devices are embedded with cameras and other sensors that provide a continuous monitor. However, to achieve an efficient wireless sensor network, its own security must be assured. This article focuses on the detection of attacks by unknown trespassers (perpetrators) on border surveillance sensor networks. We use both the Dempster–Shafer theory and the time difference of arrival method to identify and locate an attacked node. Simulation results show that the proposed scheme is both plausible and effective.https://doi.org/10.1177/1550147717740072
spellingShingle Mohammed Aseeri
Muhammad Ahmed
Mohammed Shakib
Oussama Ghorbel
Hussian Shaman
Detection of attacker and location in wireless sensor network as an application for border surveillance
International Journal of Distributed Sensor Networks
title Detection of attacker and location in wireless sensor network as an application for border surveillance
title_full Detection of attacker and location in wireless sensor network as an application for border surveillance
title_fullStr Detection of attacker and location in wireless sensor network as an application for border surveillance
title_full_unstemmed Detection of attacker and location in wireless sensor network as an application for border surveillance
title_short Detection of attacker and location in wireless sensor network as an application for border surveillance
title_sort detection of attacker and location in wireless sensor network as an application for border surveillance
url https://doi.org/10.1177/1550147717740072
work_keys_str_mv AT mohammedaseeri detectionofattackerandlocationinwirelesssensornetworkasanapplicationforbordersurveillance
AT muhammadahmed detectionofattackerandlocationinwirelesssensornetworkasanapplicationforbordersurveillance
AT mohammedshakib detectionofattackerandlocationinwirelesssensornetworkasanapplicationforbordersurveillance
AT oussamaghorbel detectionofattackerandlocationinwirelesssensornetworkasanapplicationforbordersurveillance
AT hussianshaman detectionofattackerandlocationinwirelesssensornetworkasanapplicationforbordersurveillance