IDEAS home Printed from https://ideas.repec.org/a/sae/intdis/v13y2017i11p1550147717740072.html
   My bibliography  Save this article

Detection of attacker and location in wireless sensor network as an application for border surveillance

Author

Listed:
  • Mohammed Aseeri
  • Muhammad Ahmed
  • Mohammed Shakib
  • Oussama Ghorbel
  • Hussian Shaman

Abstract

Border surveillance is one of the high priority in the security of countries around the world. Typical and traditional border observations involve troops and checkpoints at borders, but these do not provide complete security. One effective solution is the addition of smart fencing to enhance surveillance in a Border Patrol system. More specifically, effective border security can be achieved through the introduction of autonomous surveillance and the utilization of wireless sensor networks. Collectively, these wireless sensor networks will create a virtual fencing system comprising a large number of heterogeneous sensor devices. These devices are embedded with cameras and other sensors that provide a continuous monitor. However, to achieve an efficient wireless sensor network, its own security must be assured. This article focuses on the detection of attacks by unknown trespassers (perpetrators) on border surveillance sensor networks. We use both the Dempster–Shafer theory and the time difference of arrival method to identify and locate an attacked node. Simulation results show that the proposed scheme is both plausible and effective.

Suggested Citation

  • Mohammed Aseeri & Muhammad Ahmed & Mohammed Shakib & Oussama Ghorbel & Hussian Shaman, 2017. "Detection of attacker and location in wireless sensor network as an application for border surveillance," International Journal of Distributed Sensor Networks, , vol. 13(11), pages 15501477177, November.
  • Handle: RePEc:sae:intdis:v:13:y:2017:i:11:p:1550147717740072
    DOI: 10.1177/1550147717740072
    as

    Download full text from publisher

    File URL: https://journals.sagepub.com/doi/10.1177/1550147717740072
    Download Restriction: no

    File URL: https://libkey.io/10.1177/1550147717740072?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:sae:intdis:v:13:y:2017:i:11:p:1550147717740072. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: SAGE Publications (email available below). General contact details of provider: .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.