Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1866423.1866425acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Towards modeling the behavior of physical intruders in a region monitored by a wireless sensor network

Published: 08 October 2010 Publication History

Abstract

A priority task for homeland security is the coverage of large spans of open border that cannot be continuously physically monitored for intrusion. Low-cost monitoring solutions based on wireless sensor networks have been identified as an effective means to perform perimeter monitoring. An ad-hoc wireless sensor network scattered near a border could be used to perform surveillance over a large area with relatively little human intervention. Determining the effectiveness of such an autonomous network in detecting and thwarting an intelligent intruder is a difficult task. We propose a model for an intelligent attacker that attempts to find a detection-free path in a region with sparse sensing coverage. In particular, we apply reinforcement learning (RL) - a machine learning approach - for our model. RL algorithms are well suited for scenarios in which specifying and finding an optimal solution is difficult. By using RL, our attacker can easily adapt to new scenarios by translating constraints into rewards. We compare our RL-based technique to a reasonable heuristic in simulation. Our results suggest that our RL-based attacker model is significantly more effective, and therefore more realistic, than the heuristic approach.

References

[1]
}}M. Abadi and J. Jürjens. Formal eavesdropping and its computational interpretation. In Naoki Kobayashi and Benjamin Pierce, editors, Theoretical Aspects of Computer Software, volume 2215 of Lecture Notes in Computer Science, pages 82--94. Springer Berlin / Heidelberg, 2001.
[2]
}}I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. Wireless sensor networks: a survey. Comput. Netw., 38(4):393--422, 2002.
[3]
}}Archana Bharathidasan, Vijay An, and Sai Ponduru. Sensor networks: An overview. Technical report, Department of Computer Science, University of California, Davis, 2002.
[4]
}}Mihaela Cardei and Jie Wu. Energy-efficient coverage problems in wireless ad-hoc sensor networks, 2006.
[5]
}}Scott Dejmal, Alan Fern, and Thinh Nguyen. Reinforcement learning for vulnerability assessment in peer-to-peer networks. In IAAI'08: Proceedings of the 20th national conference on Innovative applications of artificial intelligence, pages 1655--1662. AAAI Press, 2008.
[6]
}}Jing Deng, R. Han, and S. Mishra. Countermeasures against traffic analysis attacks in wireless sensor networks. In Security and Privacy for Emerging Areas in Communications Networks, 2005. SecureComm 2005. First International Conference on, pages 113--126, 2005.
[7]
}}Olivier Dousse, Christina Tavoularis, and Patrick Thiran. Delay of intrusion detection in wireless sensor networks. In MobiHoc '06: Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing, pages 155--165, New York, NY, USA, 2006. ACM.
[8]
}}Chandana Gamage, Kemal Bicakci, Bruno Crispo, and Andrew S. Tanenbaum. Security for the mythical air-dropped sensor network. In Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006.
[9]
}}Tian He, Sudha Krishnamurthy, John A. Stankovic, Tarek Abdelzaher, Liqian Luo, Radu Stoleru, Ting Yan, and Lin Gu. Energy-efficient surveillance system using wireless sensor networks. In In Mobisys, pages 270--283. ACM Press, 2004.
[10]
}}Chris Karlof and David Wagner. Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks, 1(2-3):293--315, 2003. Sensor Network Protocols and Applications.
[11]
}}Jon Kleinberg and Eva Tardos. Algorithm Design. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 2005.
[12]
}}Pat Langley. Elements of machine learning. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 1995.
[13]
}}Jason H. Li and Miao Yu. Sensor coverage in wireless ad hoc sensor networks. Int. J. Sen. Netw., 2(3/4):218--229, 2007.
[14]
}}Yuzhen Liu and Weifa Liang. Approximate coverage in wireless sensor networks. In LCN '05: Proceedings of the The IEEE Conference on Local Computer Networks 30th Anniversary, pages 68--75, Washington, DC, USA, 2005. IEEE Computer Society.
[15]
}}Tom Mitchell. Machine Learning. McGraw Hill, 1997.
[16]
}}Nils J. Nilsson. Introduction to machine learning. Draft of Incomplete Notes.
[17]
}}Richard S. Sutton and Andrew G. Barto. Introduction to Reinforcement Learning. MIT Press, Cambridge, MA, USA, 1998.
[18]
}}Andrew S. Tanenbaum, Chandana Gamage, and Bruno Crispo. Taking sensor networks from the lab to the jungle. Computer, 39(8):98--100, 2006.
[19]
}}C. Watkins. Learning from Delayed Rewards. PhD thesis, University of Cambridge, England, 1989.
[20]
}}Christopher J. Watkins and Peter Dayan. Q-learning. Machine Learning, 8(3):279--292, May 1992.
[21]
}}Xin Xu and Tao Xie 0005. A reinforcement learning approach for host-based intrusion detection using sequences of system calls. In ICIC (1), pages 995--1003, 2005.
[22]
}}H. Zhang and J. Hou. Maintaining sensing coverage and connectivity in large sensor networks. Ad Hoc & Sensor Wireless Networks, 1(1--2), 2005.

Cited By

View all
  • (2012)Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks2012 Proceedings IEEE INFOCOM10.1109/INFCOM.2012.6195801(585-593)Online publication date: Mar-2012

Index Terms

  1. Towards modeling the behavior of physical intruders in a region monitored by a wireless sensor network

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    AISec '10: Proceedings of the 3rd ACM workshop on Artificial intelligence and security
    October 2010
    78 pages
    ISBN:9781450300889
    DOI:10.1145/1866423
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 08 October 2010

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. border monitoring
    2. reinforcement learning
    3. wireless sensor network

    Qualifiers

    • Research-article

    Conference

    CCS '10
    Sponsor:

    Acceptance Rates

    AISec '10 Paper Acceptance Rate 10 of 15 submissions, 67%;
    Overall Acceptance Rate 94 of 231 submissions, 41%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 04 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2012)Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks2012 Proceedings IEEE INFOCOM10.1109/INFCOM.2012.6195801(585-593)Online publication date: Mar-2012

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media