High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Optimal Barrier Coverage Scheduling and Attack Detection under Mobile Sensors

Author(s):

T.Arunkumar , K.S.R College of Engineering; G.Nagarajan, K.S.R College of Engineering

Keywords:

CSP, DSP, G-DCSP

Abstract

Surveillance monitoring is performed using the sensor devices. Capture, store and transmission are the main operations of sensor devices. Temperature, humidity, density of carbon dioxide and pressure details are captured by sensor devices. Battery power is the main limitation of sensor devices. The intrusion detection system identifies the legitimate and attackers in the network area. The intrusion detection system is designed in two categories. In the first model a system component is used for monitoring the security of a WSN and diagnosing compromised/vulnerable. Second model is the monitoring or surveillance system for detecting a malicious intruder that invades the network domain. Sensor mobility schemes are applied with barrier coverage details. Dynamic Sensor Patrolling (DSP) mechanism is used to manage sensor mobility with availability levels. Periodic monitoring scheduling (PMS) algorithm is used to monitor each point along the barrier line periodically by mobile sensors. Coordinated sensor patrolling (CSP) algorithm is used to improve the barrier coverage. Sensor mobility and intruder arrival information are used to enhance the barrier coverage in CSP. In CSP each sensor’s current movement strategy is derived from the information of intruder arrivals in the past. Simple Distributed Coordinated sensor patrolling (S-DCSP) and General Distributed Coordinated sensor patrolling (G-DCSP) schemes are used in the scheduling process. Clustering process is used in the G-DCSP scheme. Optimal coverage scheme is introduced to manage scheduling of K barrier coverage environment. Distributed scheduling and intrusion detection is performed with predefined sensor count values. The system is enhanced to handle different intruder arrival models. Sensor movement is rescheduled with intruder arrival information.

Other Details

Paper ID: IJSRDV2I12133
Published in: Volume : 2, Issue : 12
Publication Date: 01/03/2015
Page(s): 188-192

Article Preview

Download Article