skip to main content
10.1145/2448556.2448609acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

BIMAS: a prototype for intrusion detection system using motion sensors and ZigBee

Published: 17 January 2013 Publication History

Abstract

Wireless sensors nodes are broadly used in the area of remote monitoring such as habitat tracking, wild life monitoring, weather and tsunami alert. These nodes require less administration since they are placed in remote locations, and battery power is needed for them to sustain their lifetime. Since the nodes are placed in remote location, powering up the nodes is often impossible. Autonomic computing is needed in these situations so that sensor nodes can supervise themselves without being monitored by human. Hence a mobile agent assisted self-healing sensor network is proposed in our work. Simulation results are presented to validate our protocol in terms of energy efficiency and self-healing. The idea then further expanded into in a real world prototype specifically into intrusion detection system within buildings. Preliminary results of the prototype exhibit that the system is feasible to be deployed in a real world scenario with the energy efficient routing protocol. This gives innovation into energy efficient routing protocol in wireless sensor areas.

References

[1]
Li, J. and Mohapatra, P. Analytical modeling and mitigation techniques for the energy hole problems in sensor networks, Pervasive and Mobile Computing 3(8) (2007) 233--254.
[2]
Tong, L. Zhao, Q. and Adireddy, S. Sensor Networks with Mobile Agents, In Proceedings of the Military Communications Intl Symp., (Boston, MA), Oct 2007.
[3]
Sha, K. Du,. J. and Shi. W. Wear: A balanced, fault-tolerant, energy-aware routing protocol for wireless sensor networks. Technical Report MIST-TR-2005-001, Wayne State University, Jan. 2005
[4]
Yu, Estrin, D. and. Govindan, R Geographical and Energy-Aware Routing: A Recursive Data Dissemination Protocol for Wireless Sensor Networks, UCLA Computer Science Department Technical Report, UCLA-CSD TR-01-0023, May 2001.
[5]
Akkaya, K. and Younis, M. Energy-Aware Routing to a Mobile Gateway in Wireless Sensor Networks. In Proceedings of the IEEE Globecom Wireless Ad Hoc and Sensor Networks Workshop, Dallas, TX, November, 2004
[6]
Mieso and Denko, K. The use of Mobile Agents for Clustering in Mobile Ad Hoc Networks, In Proceedings of the 2003 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology September 2003
[7]
Alan. Amis, D Ravi Prakash, Thai H. P. Voung, Dung T. Huynh Max-Min D-cluster Formation in Wireless Ad Hoc Networks, In Proceedings of the IEEE INFOCOM 2000 -- The Conference on Computer Communications, no. 1, March 2000, pp. 32--41.
[8]
Estrin, D. Culler, D. Pister, K. and Sukhatme, G. S. Connecting the physical world with pervasive networks, IEEE Pervasive Computing, vol. 1, no. 1, pp. 59--69, 2002.
[9]
Chandrakasan, A. Heinzelman, W. and Balakrishnan, H. Energy-Efficient communication protocol for wireless microsensor networks, In Proceedings of the Hawaii ICSS, 2000
[10]
Dressler, F. and Carreras, I. Advances in Biologically Inspired Information Systems - Models, Methods, and Tools, Studies in Computational Intelligence (SCI), vol. 69, Berlin, Heidelberg, New York, Springer, 2007
[11]
Boonma, P. and Suzuki, J. BiSNET: A biologically-inspired middleware architecture for self-managing wireless sensor networks, Elsevier J. of Computer Networks. 2007
[12]
"TheZigBeeAlliance". Zigbee.org. http://www.zigbee.org/About/AboutAlliance/TheAlliance.aspx. Retrieved 2012--1018
[13]
Network simulator 2: http://www.isi.edu/nsnam/ns/.
[14]
Juang P. et. al. Energy-efficient computing for wildlife tracking: Design tradeoffs and early experiences with zebranet. In Proceedings of the Architectural support for programming languages and operating systems (ASPLOS), 2002.

Index Terms

  1. BIMAS: a prototype for intrusion detection system using motion sensors and ZigBee

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ICUIMC '13: Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
    January 2013
    772 pages
    ISBN:9781450319584
    DOI:10.1145/2448556
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 17 January 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. intrusion detection
    2. mobile node
    3. self-healing
    4. sensor network

    Qualifiers

    • Research-article

    Conference

    ICUIMC '13
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 251 of 941 submissions, 27%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 241
      Total Downloads
    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media