Heterogeneous polydentate mobile chelating node to detect breach in surveillance sensor network

Sudip Misra, Sumit Goswami, Chaynika Taneja, Pushpendu Kar
2021 Security and Privacy  
Nature inspired algorithms are common in routing and security in mobile wireless sensor networks (WSN). While most of the existing algorithms are bio-inspired, chemistry inspired security algorithms are rare. Chelation is a chemical process where a molecule forms two or more bonds with an atom or a molecule to hold it strongly. Analogous to this chemical process, a chelating node in a mobile WSN is defined as a mobile node that forms more than one logical association with another node. The
more » ... uses mobile polydentate chelating node, which uses multiple heterogeneous logical linkages with a rogue node, to ascertain non-friendly behavior of a node to ensure detection and removal. The multiple linkage processes are based on challenge-response using public key infrastructure, integrity of routing algorithm, routing table fidelity and data path tracking. This n-dentation ensures detection of captured nodes as well as nodes planted by adversaries. The paper demonstrates the applicability of this process for a mobile WSN-based border surveillance where the number of attacks is high and varied in its pattern. The proposed approach reduces false negative as well as false positive detection by its n-modular redundancy. Simulation results are presented to illustrate the effectiveness of this scheme. K E Y W O R D S barrier coverage, border surveillance, chelating node, public key infrastructure, sensor warfare 1 Security Privacy. 2021;e175. wileyonlinelibrary.com/journal/spy2 An important application of WSN is in the domain of defense. It includes surveillance, detection, identification and tracking. Due to variation in the movement pattern of the intruder, there are variations in the size and deployment pattern of a sensor network. For an effective all dimensional security, surveillance devices on the ground, sub-surface, underwater, airborne, and space-based sensors are required. The conventional wireless sensors, which are small in size and constrained of resources, are used as ground-based sensors or sea-surface sensors and have its known niche area of deployment. The ground based sensors are typically used to detect trespassing by humans or by wheeled or tracked vehicles. These sensors are classified as "on-route sensors" and "off-route sensors." The "on-route sensors" are deployed on the path of the intruder and come in direct contact (impact type sensor) with the intruder or placed very near (non-impact type sensor) to the path of intrusion. The on-route sensors generally deploy weight, pressure, seismic, acoustics, electromagnetic or magnetic transducers. The "off route sensors" do not lie in the expected intrusion path but keep a vigil on the territory from a distance to avoid detection by the intruder. The off-route sensors can be ground based or unmanned aerial vehicle mounted video sensor, electro-optical sensor or acoustic sensor. Different types of ground based sensors are deployed due to wide variation in the weight, pressure and acoustic features of intruding objects. The intruding objects can be foot soldiers (infantry), light/medium/heavy wheeled vehicles and tracked armored vehicles (tanks) and each requires a different type of sensor for its detection. As the size of a soldier is smallest among this set of intruding objects and the size of the armored vehicle is the biggest, the density of deployment of infantry-detection sensor is the maximum while the density of deployment of armored vehicle-detection sensor is minimum. The high density of the infantry-detection sensor is also mandatory due to unrestricted movement pattern of an infantry soldier. A number of non-impact type on-route sensors is deployed in between the impact type sensors to enhance the redundancy in detection by the sensor fence. The "red territory" refers to the territory of the adversary. "Blue territory" is the friendly territory secured by the border surveillance sensors. 11,12 The sensor warfare indicates various deployment pattern and communication strategies of the sensor in the blue territory and the doctrines adopted at the red territory to breach the sensor fencing deployed in blue territory and to evade detection.
doi:10.1002/spy2.175 fatcat:vt7hlnozffc2tadybc5dwtfu4a