SlideShare une entreprise Scribd logo
1  sur  14
Télécharger pour lire hors ligne
Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4445676
Intrusion Detection in Homogeneous and Heterogeneous
Wireless Sensor Networks
Institute of Electrical and Electronics Engineering
Abstract:
Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such
as detecting an intruder in a battlefield. The intrusion detection is defined as a mechanism for a WSN to
detect the existence of inappropriate, incorrect, or anomalous moving attackers. In this paper, we
consider this issue according to heterogeneous WSN models. Furthermore, we consider two sensing
detection models: single-sensing detection and multiple-sensing detection... Our simulation results show
the advantage of multiple sensor heterogeneous WSNs.
Introduction:
A Wireless Sensor Network (WSN) is a collection of spatially deployed wireless sensors by which to
monitor various changes of environmental conditions (e.g., forest fire, air pollutant concentration, and
object moving) in a collaborative manner without relying on any underlying infrastructure support
.Recently, a number of research efforts have been made to develop sensor hardware and network
architectures in order to effectively deploy WSNs for a variety of applications. Due to a wide diversity of
WSN application requirements, however, a general-purpose WSN design cannot fulfill the needs of all
Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4445676
applications. Many network parameters such as sensing range, transmission range, and node density
have to be carefully considered at the network design stage, according to specific applications. To
achieve this, it is critical to capture the impacts of network parameters on network performance with
respect to application specifications. Intrusion detection (i.e., object tracking) in a WSN can be regarded
as a monitoring system for detecting the intruder that is invading the network domain.
The intrusion detection application concerns how fast the intruder can be detected by the WSN. If
sensors are deployed with a high density so that the union of all sensing ranges covers the entire
network area, the intruder can be immediately detected once it approaches the network area. However,
such a high-density deployment policy increases the network investment and may be even unaffordable
for a large area. In fact, it is not necessary to deploy so many sensors to cover the entire WSN area in
many applications, since a network with small and scattered void areas will also be able to detect a
moving intruder within a certain intrusion distance. In this case, the application can specify a required
intrusion distance within which the intruder should be detected. As shown in Fig. 1, the intrusion
distance is referred as D and defined as the distance between the points the intruder enters the WSN,
and the point the intruder is detected by the WSN system. This distance is of central interest to a WSN
used for intrusion detection. In this paper, we derive the expected intrusion distance and evaluate the
detection probability in different application scenarios.. For example, given an expected detection
distance EðDÞ, we can derive the node density with respect to sensors’ sensing range, thereby knowing
the total number of sensors required for WSN deployment.
In a WSN, there are two ways to detect an object (i.e., an intruder): single-sensing detection and
multiple-sensing detection. In the single-sensing detection, the intruder can be successfully detected by
a single sensor. On the contrary, in the multiple-sensing detection, the intruder can only be detected by
multiple collaborating sensors .In some applications, the sensed information provided by a single sensor
might be inadequate for recognizing the intruder. It is because individual sensors can only sense a
portion of the intruder. For example, the location of an intruder can only be determined from at least
three sensors’ sensing.
In view of this, we analyze the intrusion detection problem under two application scenarios: single-
sensing detection and multiple-sensing detection. According to the capability of sensors, we consider
two network types: homogeneous and heterogeneous WSNs We define the sensor capability in terms of
the sensing range and the transmission range. In a heterogeneous WSN some sensors have a larger
sensing range and more power to achieve a longer transmission range. In this paper, we show that the
heterogeneous WSN increases the detection probability for a given intrusion detection distance. This
motivates us to analyze the network connectivity in this paper. Furthermore, in a heterogeneous WSN,
Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4445676
high capability sensors usually undertake more important tasks (i.e., broadcasting power management
information or synchronization information to all the sensors in the network),it is also desirable to
define and examine the broadcast reachability from high-capability sensors. The network connectivity
and broadcast reachability are important conditions to ensure the detection probability in WSNs. They
are formally defined and analyzed in this paper. To the best of our knowledge, our effect is the first to
address this issue in a heterogeneous WSN.
Multiple Sensor:
Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4445676
Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4445676
Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4445676
Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4445676
Single Sensor:
Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4445676
Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4445676
Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4445676
Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4445676
Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4445676
Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4445676
Future Enhancements:
Our Future enhancements are intrusion detections in internet application and parallel computer
interconnection network.
Conclusions
This paper analyzes the intrusion detection problem by characterizing intrusion detection probability
with respect to the intrusion distance and the network parameters (i.e., node density, sensing range,
and transmission range).The analytical model for intrusion detection allows us to analytically formulate
intrusion detection probability within a certain intrusion distance under various application scenarios.
Bibliography or References
Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4445676
[1] R. Hemenway, R. Grzybowski, C. Minkenberg, and R. Luijten, “Optical-packet-switched interconnect
for supercomputer applications,”OSA J. Opt. Netw., vol. 3, no. 12, pp. 900–913, Dec. 2004.
[2] C. Minkenberg, F. Abel, P. Müller, R. Krishnamurthy, M. Gusat, P.Dill, I. Iliadis, R. Luijten, B. R.
Hemenway, R. Grzybowski, and E.Schiattarella, “Designing a crossbar scheduler for HPC
applications,”IEEE Micro, vol. 26, no. 3, pp. 58–71, May/Jun. 2006.
[3] E. Oki, R. Rojas-Cessa, and H. Chao, “A pipeline-based approach formaximal-sized matching
scheduling in input-buffered switches,” IEEE Commun. Lett., vol. 5, no. 6, pp. 263–265, Jun. 2001.
[4] C. Minkenberg, I. Iliadis, and F. Abel, “Low-latency pipelined crossbar arbitration,” in Proc. IEEE
GLOBECOM 2004, Dallas, TX, Dec. 2004, vol. 2, pp. 1174–1179.
[5] C. Minkenberg, R. Luijten, F. Abel, W. Denzel, and M. Gusat, “Current issues in packet switch design,”
ACM Comput. Commun. Rev., vol. 33, no. 1, pp. 119–124, Jan. 2003.
[6] C. Minkenberg, F. Abel, P. Müller, R. Krishnamurthy, and M. Gusat,“Control path implementation of a
low-latency optical HPC switch,” inProc. Hot Interconnects 13, Stanford, CA, Aug. 2005, pp. 29–35.
[7] C.-S. Chang, D.-S. Lee, and Y.-S. Jou, “Load-balanced Birkhoff-von Neumann switches, part I: One-
stage buffering,” Elsevier Comput.Commun., vol. 25, pp. 611–622, 2002.
[8] A. Tanenbaum, Computer Networks, 3rd ed. Englewood Cliffs, NJ: Prentice Hall, 1996.
[9] R. Krishnamurthy and P. Müller, “An input queuing implementation for low-latency speculative
optical switches,” in Proc. 2007 Int. Conf.Parallel Processing Techniques and Applications (PDPTA’07), Las
Vegas, NV, Jun. 2007, vol. 1, pp. 161–167.
[10] H. Takagi, Queueing Analysis, Volume 3: Discrete-Time Systems. Amsterdam: North-Holland, 1993.

Contenu connexe

Tendances

security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor networkRABIA ASHRAFI
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issuesMaha Saad
 
Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptsofiakhatoon
 
Wireless sensor network security
Wireless sensor network securityWireless sensor network security
Wireless sensor network securityargh61
 
Intrusion detection in wireless sensor network
Intrusion detection in wireless sensor networkIntrusion detection in wireless sensor network
Intrusion detection in wireless sensor networkVinayak Raja
 
Hetrogenous wireless sensor network
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor networkChinmoy Jena
 
11011 a0449 secure routing wsn
11011 a0449 secure routing wsn11011 a0449 secure routing wsn
11011 a0449 secure routing wsnMuqeed Abdul
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkIOSR Journals
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoksRushin Shah
 
Random key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networksRandom key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networksVarsha Anandani
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksEditor IJMTER
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networksRushin Shah
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014Tarek Gaber
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
 
Threats in wireless sensor networks
Threats in wireless sensor networksThreats in wireless sensor networks
Threats in wireless sensor networksPriya Kaushal
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKTejas Wasule
 

Tendances (20)

security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor network
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSN
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 
Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol ppt
 
Wireless sensor network security
Wireless sensor network securityWireless sensor network security
Wireless sensor network security
 
Intrusion detection in wireless sensor network
Intrusion detection in wireless sensor networkIntrusion detection in wireless sensor network
Intrusion detection in wireless sensor network
 
Hetrogenous wireless sensor network
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor network
 
11011 a0449 secure routing wsn
11011 a0449 secure routing wsn11011 a0449 secure routing wsn
11011 a0449 secure routing wsn
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor Network
 
Security issues
Security issuesSecurity issues
Security issues
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
 
Random key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networksRandom key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networks
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
 
Wsn
WsnWsn
Wsn
 
Threats in wireless sensor networks
Threats in wireless sensor networksThreats in wireless sensor networks
Threats in wireless sensor networks
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 

En vedette

Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksBala Lavanya
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksZaahir Salam
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 
State of the Word 2011
State of the Word 2011State of the Word 2011
State of the Word 2011photomatt
 

En vedette (8)

Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
 
3ppt
3ppt3ppt
3ppt
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
RFID & WSN Applications for u-City
RFID & WSN Applications for u-CityRFID & WSN Applications for u-City
RFID & WSN Applications for u-City
 
Zigbee Presentation
Zigbee PresentationZigbee Presentation
Zigbee Presentation
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
State of the Word 2011
State of the Word 2011State of the Word 2011
State of the Word 2011
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similaire à Detecting Intruders in Heterogeneous Wireless Sensor Networks (WSNs

Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
 
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...IJCSIS Research Publications
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
 
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...IJMER
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A Review On Reactive And Proactive Wireless Sensor Networks Protocols
A Review On Reactive And Proactive Wireless Sensor Networks ProtocolsA Review On Reactive And Proactive Wireless Sensor Networks Protocols
A Review On Reactive And Proactive Wireless Sensor Networks ProtocolsMary Montoya
 
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...Alexander Decker
 
5.a robust frame of wsn utilizing localization technique 36-46
5.a robust frame of wsn utilizing localization technique  36-465.a robust frame of wsn utilizing localization technique  36-46
5.a robust frame of wsn utilizing localization technique 36-46Alexander Decker
 
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...iosrjce
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 
Range Free Localization using Expected Hop Progress in Wireless Sensor Network
Range Free Localization using Expected Hop Progress in Wireless Sensor NetworkRange Free Localization using Expected Hop Progress in Wireless Sensor Network
Range Free Localization using Expected Hop Progress in Wireless Sensor NetworkAM Publications
 

Similaire à Detecting Intruders in Heterogeneous Wireless Sensor Networks (WSNs (20)

O010528791
O010528791O010528791
O010528791
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
 
Dd4301605614
Dd4301605614Dd4301605614
Dd4301605614
 
50120140505014
5012014050501450120140505014
50120140505014
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
 
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A Review On Reactive And Proactive Wireless Sensor Networks Protocols
A Review On Reactive And Proactive Wireless Sensor Networks ProtocolsA Review On Reactive And Proactive Wireless Sensor Networks Protocols
A Review On Reactive And Proactive Wireless Sensor Networks Protocols
 
F33022028
F33022028F33022028
F33022028
 
F33022028
F33022028F33022028
F33022028
 
Ii2414621475
Ii2414621475Ii2414621475
Ii2414621475
 
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...
 
5.a robust frame of wsn utilizing localization technique 36-46
5.a robust frame of wsn utilizing localization technique  36-465.a robust frame of wsn utilizing localization technique  36-46
5.a robust frame of wsn utilizing localization technique 36-46
 
G017644454
G017644454G017644454
G017644454
 
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 
Range Free Localization using Expected Hop Progress in Wireless Sensor Network
Range Free Localization using Expected Hop Progress in Wireless Sensor NetworkRange Free Localization using Expected Hop Progress in Wireless Sensor Network
Range Free Localization using Expected Hop Progress in Wireless Sensor Network
 

Plus de Harshal Ladhe

RGB Image Compression using Two-dimensional Discrete Cosine Transform
RGB Image Compression using Two-dimensional Discrete Cosine TransformRGB Image Compression using Two-dimensional Discrete Cosine Transform
RGB Image Compression using Two-dimensional Discrete Cosine TransformHarshal Ladhe
 
A robust watermarking algorithm based on image normalization and dc coefficients
A robust watermarking algorithm based on image normalization and dc coefficientsA robust watermarking algorithm based on image normalization and dc coefficients
A robust watermarking algorithm based on image normalization and dc coefficientsHarshal Ladhe
 
Image compression using discrete wavelet transform
Image compression using discrete wavelet transformImage compression using discrete wavelet transform
Image compression using discrete wavelet transformHarshal Ladhe
 
Adaptive noise estimation algorithm for speech enhancement
Adaptive noise estimation algorithm for speech enhancementAdaptive noise estimation algorithm for speech enhancement
Adaptive noise estimation algorithm for speech enhancementHarshal Ladhe
 
Bilateral filtering for gray and color images
Bilateral filtering for gray and color imagesBilateral filtering for gray and color images
Bilateral filtering for gray and color imagesHarshal Ladhe
 
Phase locked loop techniques for fm demodulation and modulation
Phase locked loop techniques for fm demodulation and modulationPhase locked loop techniques for fm demodulation and modulation
Phase locked loop techniques for fm demodulation and modulationHarshal Ladhe
 
Design of iir notch filters and narrow and wide band filters
Design of iir notch filters and narrow and wide band filtersDesign of iir notch filters and narrow and wide band filters
Design of iir notch filters and narrow and wide band filtersHarshal Ladhe
 
A geometric approach to improving active packet loss measurement
A geometric approach to improving active packet loss measurementA geometric approach to improving active packet loss measurement
A geometric approach to improving active packet loss measurementHarshal Ladhe
 
Genetic algorithm for the design of optimal iir digital filters
Genetic algorithm for the design of optimal iir digital filtersGenetic algorithm for the design of optimal iir digital filters
Genetic algorithm for the design of optimal iir digital filtersHarshal Ladhe
 
Study & simulation of O.F.D.M. system
Study & simulation of O.F.D.M. systemStudy & simulation of O.F.D.M. system
Study & simulation of O.F.D.M. systemHarshal Ladhe
 
A simulation and analysis of ofdm system for 4 g communications
A simulation and analysis of ofdm system for 4 g communicationsA simulation and analysis of ofdm system for 4 g communications
A simulation and analysis of ofdm system for 4 g communicationsHarshal Ladhe
 
Speech compression using voiced excited loosy predictive coding (lpc)
Speech compression using voiced excited loosy predictive coding (lpc)Speech compression using voiced excited loosy predictive coding (lpc)
Speech compression using voiced excited loosy predictive coding (lpc)Harshal Ladhe
 
Speech compression using loosy predictive coding (lpc)
Speech compression using loosy predictive coding (lpc)Speech compression using loosy predictive coding (lpc)
Speech compression using loosy predictive coding (lpc)Harshal Ladhe
 
Noise analysis & qrs detection in ecg signals
Noise analysis & qrs detection in ecg signalsNoise analysis & qrs detection in ecg signals
Noise analysis & qrs detection in ecg signalsHarshal Ladhe
 

Plus de Harshal Ladhe (15)

RGB Image Compression using Two-dimensional Discrete Cosine Transform
RGB Image Compression using Two-dimensional Discrete Cosine TransformRGB Image Compression using Two-dimensional Discrete Cosine Transform
RGB Image Compression using Two-dimensional Discrete Cosine Transform
 
A robust watermarking algorithm based on image normalization and dc coefficients
A robust watermarking algorithm based on image normalization and dc coefficientsA robust watermarking algorithm based on image normalization and dc coefficients
A robust watermarking algorithm based on image normalization and dc coefficients
 
Image compression using discrete wavelet transform
Image compression using discrete wavelet transformImage compression using discrete wavelet transform
Image compression using discrete wavelet transform
 
Adaptive noise estimation algorithm for speech enhancement
Adaptive noise estimation algorithm for speech enhancementAdaptive noise estimation algorithm for speech enhancement
Adaptive noise estimation algorithm for speech enhancement
 
Bilateral filtering for gray and color images
Bilateral filtering for gray and color imagesBilateral filtering for gray and color images
Bilateral filtering for gray and color images
 
Phase locked loop techniques for fm demodulation and modulation
Phase locked loop techniques for fm demodulation and modulationPhase locked loop techniques for fm demodulation and modulation
Phase locked loop techniques for fm demodulation and modulation
 
Design of iir notch filters and narrow and wide band filters
Design of iir notch filters and narrow and wide band filtersDesign of iir notch filters and narrow and wide band filters
Design of iir notch filters and narrow and wide band filters
 
A geometric approach to improving active packet loss measurement
A geometric approach to improving active packet loss measurementA geometric approach to improving active packet loss measurement
A geometric approach to improving active packet loss measurement
 
Genetic algorithm for the design of optimal iir digital filters
Genetic algorithm for the design of optimal iir digital filtersGenetic algorithm for the design of optimal iir digital filters
Genetic algorithm for the design of optimal iir digital filters
 
Study & simulation of O.F.D.M. system
Study & simulation of O.F.D.M. systemStudy & simulation of O.F.D.M. system
Study & simulation of O.F.D.M. system
 
A simulation and analysis of ofdm system for 4 g communications
A simulation and analysis of ofdm system for 4 g communicationsA simulation and analysis of ofdm system for 4 g communications
A simulation and analysis of ofdm system for 4 g communications
 
Speech compression using voiced excited loosy predictive coding (lpc)
Speech compression using voiced excited loosy predictive coding (lpc)Speech compression using voiced excited loosy predictive coding (lpc)
Speech compression using voiced excited loosy predictive coding (lpc)
 
Speech compression using loosy predictive coding (lpc)
Speech compression using loosy predictive coding (lpc)Speech compression using loosy predictive coding (lpc)
Speech compression using loosy predictive coding (lpc)
 
Noise analysis & qrs detection in ecg signals
Noise analysis & qrs detection in ecg signalsNoise analysis & qrs detection in ecg signals
Noise analysis & qrs detection in ecg signals
 
GIS
GISGIS
GIS
 

Dernier

Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 

Dernier (20)

Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 

Detecting Intruders in Heterogeneous Wireless Sensor Networks (WSNs

  • 1. Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4445676 Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks Institute of Electrical and Electronics Engineering Abstract: Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is defined as a mechanism for a WSN to detect the existence of inappropriate, incorrect, or anomalous moving attackers. In this paper, we consider this issue according to heterogeneous WSN models. Furthermore, we consider two sensing detection models: single-sensing detection and multiple-sensing detection... Our simulation results show the advantage of multiple sensor heterogeneous WSNs. Introduction: A Wireless Sensor Network (WSN) is a collection of spatially deployed wireless sensors by which to monitor various changes of environmental conditions (e.g., forest fire, air pollutant concentration, and object moving) in a collaborative manner without relying on any underlying infrastructure support .Recently, a number of research efforts have been made to develop sensor hardware and network architectures in order to effectively deploy WSNs for a variety of applications. Due to a wide diversity of WSN application requirements, however, a general-purpose WSN design cannot fulfill the needs of all
  • 2. Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4445676 applications. Many network parameters such as sensing range, transmission range, and node density have to be carefully considered at the network design stage, according to specific applications. To achieve this, it is critical to capture the impacts of network parameters on network performance with respect to application specifications. Intrusion detection (i.e., object tracking) in a WSN can be regarded as a monitoring system for detecting the intruder that is invading the network domain. The intrusion detection application concerns how fast the intruder can be detected by the WSN. If sensors are deployed with a high density so that the union of all sensing ranges covers the entire network area, the intruder can be immediately detected once it approaches the network area. However, such a high-density deployment policy increases the network investment and may be even unaffordable for a large area. In fact, it is not necessary to deploy so many sensors to cover the entire WSN area in many applications, since a network with small and scattered void areas will also be able to detect a moving intruder within a certain intrusion distance. In this case, the application can specify a required intrusion distance within which the intruder should be detected. As shown in Fig. 1, the intrusion distance is referred as D and defined as the distance between the points the intruder enters the WSN, and the point the intruder is detected by the WSN system. This distance is of central interest to a WSN used for intrusion detection. In this paper, we derive the expected intrusion distance and evaluate the detection probability in different application scenarios.. For example, given an expected detection distance EðDÞ, we can derive the node density with respect to sensors’ sensing range, thereby knowing the total number of sensors required for WSN deployment. In a WSN, there are two ways to detect an object (i.e., an intruder): single-sensing detection and multiple-sensing detection. In the single-sensing detection, the intruder can be successfully detected by a single sensor. On the contrary, in the multiple-sensing detection, the intruder can only be detected by multiple collaborating sensors .In some applications, the sensed information provided by a single sensor might be inadequate for recognizing the intruder. It is because individual sensors can only sense a portion of the intruder. For example, the location of an intruder can only be determined from at least three sensors’ sensing. In view of this, we analyze the intrusion detection problem under two application scenarios: single- sensing detection and multiple-sensing detection. According to the capability of sensors, we consider two network types: homogeneous and heterogeneous WSNs We define the sensor capability in terms of the sensing range and the transmission range. In a heterogeneous WSN some sensors have a larger sensing range and more power to achieve a longer transmission range. In this paper, we show that the heterogeneous WSN increases the detection probability for a given intrusion detection distance. This motivates us to analyze the network connectivity in this paper. Furthermore, in a heterogeneous WSN,
  • 3. Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4445676 high capability sensors usually undertake more important tasks (i.e., broadcasting power management information or synchronization information to all the sensors in the network),it is also desirable to define and examine the broadcast reachability from high-capability sensors. The network connectivity and broadcast reachability are important conditions to ensure the detection probability in WSNs. They are formally defined and analyzed in this paper. To the best of our knowledge, our effect is the first to address this issue in a heterogeneous WSN. Multiple Sensor:
  • 4. Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4445676
  • 5. Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4445676
  • 6. Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4445676
  • 7. Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4445676 Single Sensor:
  • 8. Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4445676
  • 9. Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4445676
  • 10. Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4445676
  • 11. Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4445676
  • 12. Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4445676
  • 13. Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4445676 Future Enhancements: Our Future enhancements are intrusion detections in internet application and parallel computer interconnection network. Conclusions This paper analyzes the intrusion detection problem by characterizing intrusion detection probability with respect to the intrusion distance and the network parameters (i.e., node density, sensing range, and transmission range).The analytical model for intrusion detection allows us to analytically formulate intrusion detection probability within a certain intrusion distance under various application scenarios. Bibliography or References
  • 14. Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4445676 [1] R. Hemenway, R. Grzybowski, C. Minkenberg, and R. Luijten, “Optical-packet-switched interconnect for supercomputer applications,”OSA J. Opt. Netw., vol. 3, no. 12, pp. 900–913, Dec. 2004. [2] C. Minkenberg, F. Abel, P. Müller, R. Krishnamurthy, M. Gusat, P.Dill, I. Iliadis, R. Luijten, B. R. Hemenway, R. Grzybowski, and E.Schiattarella, “Designing a crossbar scheduler for HPC applications,”IEEE Micro, vol. 26, no. 3, pp. 58–71, May/Jun. 2006. [3] E. Oki, R. Rojas-Cessa, and H. Chao, “A pipeline-based approach formaximal-sized matching scheduling in input-buffered switches,” IEEE Commun. Lett., vol. 5, no. 6, pp. 263–265, Jun. 2001. [4] C. Minkenberg, I. Iliadis, and F. Abel, “Low-latency pipelined crossbar arbitration,” in Proc. IEEE GLOBECOM 2004, Dallas, TX, Dec. 2004, vol. 2, pp. 1174–1179. [5] C. Minkenberg, R. Luijten, F. Abel, W. Denzel, and M. Gusat, “Current issues in packet switch design,” ACM Comput. Commun. Rev., vol. 33, no. 1, pp. 119–124, Jan. 2003. [6] C. Minkenberg, F. Abel, P. Müller, R. Krishnamurthy, and M. Gusat,“Control path implementation of a low-latency optical HPC switch,” inProc. Hot Interconnects 13, Stanford, CA, Aug. 2005, pp. 29–35. [7] C.-S. Chang, D.-S. Lee, and Y.-S. Jou, “Load-balanced Birkhoff-von Neumann switches, part I: One- stage buffering,” Elsevier Comput.Commun., vol. 25, pp. 611–622, 2002. [8] A. Tanenbaum, Computer Networks, 3rd ed. Englewood Cliffs, NJ: Prentice Hall, 1996. [9] R. Krishnamurthy and P. Müller, “An input queuing implementation for low-latency speculative optical switches,” in Proc. 2007 Int. Conf.Parallel Processing Techniques and Applications (PDPTA’07), Las Vegas, NV, Jun. 2007, vol. 1, pp. 161–167. [10] H. Takagi, Queueing Analysis, Volume 3: Discrete-Time Systems. Amsterdam: North-Holland, 1993.