Skip to main content

Table 2 Results summarization and final recommendation

From: Scaling of wireless sensor network intrusion detection probability: 3D sensors, 3D intruders, and 3D environments

Distribution

WSN efficiency evaluation

Intruder detection evaluation

Final recommendation

Gaussian

Control data size

HP

   
 

Number of hops

HP

Without considering distant

HP

 
 

Packet loss HP

    
 

End-to-end delay

LPR2

   
 

Throughput

HP

With considering distant

HP

 
 

General efficiency

HP

   

Uniform

Control data size

LPR2

  

Using Gaussian

 

Number of hops

LPR2

Without considering distant

LPR2

to distribute the

 

Packet loss

LPR2

  

sensors in WSN

 

End-to-end delay

HP

  

gives the best

 

Throughput

LPR2

With considering distant

LPR2

performance as

 

General efficiency

LPR2

  

regards intruder detection

Beta

Control data size

LPR3

  

probability and overall

 

Number of hops

LPR3

Without considering distant

LPR3

WSN efficiency,

 

Packet loss

LPR3

  

then uniform, beta,

 

End-to-end delay

LPR3

  

and chi-square

 

Throughput

LPR3

With considering distant

LPR3

 
 

General efficiency

LP

   

Chi-square

Control data size

LP

   
 

Number of hops

LP

Without considering distant

LP

 
 

Packet loss

LP

   
 

End-to-end delay

LP

   
 

Throughput

LP

With considering distant

LP

 
 

General efficiency

LP

   
  1. HP: highest performance. LPR2: lower performance-rank2. LPR3: lower performance-rank3. LP: lowest performance.