By Topic

Vulnerability of sensor networks to unauthorized traversal and monitoring

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Phipatanasuphorn, V. ; Dept. of Electr. & Comput. Eng., Wisconsin Univ., Madison, WI, USA ; Ramanathan, P.

There is a growing interest in the use of wireless ad hoc sensor networks to monitor, detect, and track the movement of specified targets in a geographic region. A common concern in the deployment of such networks is whether or not a target can pass or intrude a sensor field without being detected. Recent papers in the literature have defined a measure called exposure to quantify the likelihood of a target passing through a sensor field without being detected. These papers differ in the definition of exposure. Also, the existing definitions of exposure are indicators of the likelihood of intrusion and not a direct measure of it. We directly work with probability of detection instead of its indicators. We also probabilistically account for the presence of noise in the sensor readings. In the presence of noise, there is a trade off between the probability of a target passing through a sensor field without detection and the false alarm probability (i.e., the probability of falsely detecting the presence of target). We analytically characterize this trade off and illustrate the trade off for example deployments. We also introduce a variant of the traversal problem called unauthorized monitoring. This problem is of interest if sensor fields are used to secure an asset. We analytically characterize the probability of detecting unauthorized monitoring. We also show a trade off between this probability and the corresponding false alarm probability in the presence of noise.

Published in:

Computers, IEEE Transactions on  (Volume:53 ,  Issue: 3 )