ε+=
ε+=
oldnew
oldnew
pp
uww
(10)
The above perceptron rule is proven to converge
on a solution in a finite number of iterations.
The error obtained after iterative trainings is
presented in figure 6.
Figure 6: The training error.
The neural network was tested with impulse
trains as test sets. The output accurately estimates
the impulse trains for simulated trajectories.
An important result is that the neural network
could be generalized for different possible
trajectories. If the sensor node A is attacked, it is
possible for its output value S
Ac
to be different from
the estimate. So, the sensor’s estimated value,
predicted by the neural network, differs from the
actual value of the malicious sensor A, proving that
something wrong happened to sensor A. In these
circumstances, the decision block will exclude the
sensor A from the network.
5 CONCLUSION
The goal of our research was to design a secure
architecture for a sensor network used for perimeter
protection. For this, we used a knowledge-based
system based on hardware and analytical
redundancy. Considering the detection of anomalies
and intruders in binary sensor networks to be a very
important issue, we relied on two coupled
stratagems: a) a CWV based algorithm; and b) a
perceptron predictor based on the past values of
neighbouring sensors to solve this problem. After
detection, the sensor network can take decisions to
investigate, find and remove malicious nodes if
possible. Being localized on a base station level,
with a reduced amount of computation our method is
suitable even for large-scale sensor networks.
REFERENCES
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci,
E., 2002. Wireless Sensor Networks: A Survey. In
Computer Networks, 38(4), March.
Aslam, J., Butler, Z., Constantin, F., Crespi, V., Cybenko,
G., Rus, D., 2005. Tracking a Moving Object with a
Binary Sensor Network. In Proceeding of the 1
st
International Conference on Embedded Networked
Sensor Systems.
Avancha, S., Undercoffer, J., Joshi, A., Pinkston, J., 2003.
Secure sensor networks for perimeter protection. In
Computer Networks 43, Elsevier Press.
Brooks, R., Ramanathan, P., Sayeed, A., 2003. Distributed
target classification and tracking in sensor networks,
In Proceedings of the IEEE, vol. 91, no. 8.
Cao, Q., Yan, T., Abdelzaher, T., Stankovic, J., 2005.
Analysis of Target Detection Performance for
Wireless Sensor Networks, In Proceeding of the
International Conference on Distributed Computing in
Sensor Networks, CA.
Clouqueur, T., Ramanathan, P, Saluja, K.K., Wang., K.C.,
2001. Value fusion versus decision-fusion for fault
tolerance in collaborative target detection in sensor
networks, In Proceedings of Fusion 2001, Montreal.
Gao, Y., Wu, K., Li, F., 2003. Analysis on the
Redundancy of Wireless Sensor Networks, In ACM
WSNA Proceedings, San Diego, USA.
Feng J., Koushanfar F., Potkonjak M., 2002, System-
Architectures for Sensor Networks Issues,
Alternatives, and Directions, In Proceedings. of the
2002 IEEE International Conference on Computer
Design (ICCD’02), Freiburg, Germany.
Hagan, M.T.; Demuth, H.B.; Beale, M.H., 1996. Neural
Network Design, PWS Publishing, Boston.
Intanagonwiwat, C., Govindan, R., Estrin, D., 2000.
Directed Diffusion: A Scalable and Robust
Communication Paradigm for Sensor Networks. In
ACM International Conference on Mobile Computing
and Networking (MOBICOM’00).
Li, D., Wong, K., Hu, Y.H., Sayeed, A.M., 2002.
Detection, classification, and tracking of targets in
distributed sensor networks. In Signal Processing
Magazine, IEEE, Vol. 19, No. 2.
Nowak, R., Mitra, U., 2003. Boundary Estimation in
Sensor Networks: Theory and Methods. In
Proceedings of the First International Workshop on
Information Processing in Sensor Networks.
Pottie G.J., W.J. Kaiser, W.J., 2000. Wireless Integrated
Network Sensors. In Communications of the ACM,
vol. 43.
Sun, T., Chen, L.-J., Han, C-C., Gerla, M., 2005, Reliable
Sensor Networks for Planet Exploration, ICNSC.
Xu, Y., Heidemann J., Estrin, D., 2001. Georgraph-
informed Energy Conservation for Ad Hoc Routing, In
Proceeding of ACM Mobicom, Rome, Italy.
WINSYS 2007 - International Conference on Wireless Information Networks and Systems
56