Graduation Semester and Year
2013
Language
English
Document Type
Thesis
Degree Name
Master of Science in Computer Science
Department
Computer Science and Engineering
First Advisor
Matthew Wright
Abstract
Monitoring to detect unauthorized border crossing is very important for protecting national security. To accomplish this by continuous physical monitoring by border patrol agents is impractical. Networks of low-cost wireless sensors have been identified as a useful tool in monitoring with minimal human intervention. However, ensuring the effectiveness of unattended monitoring against an intelligent intruder is difficult, since the intruder can probe the system for weaknesses. To better understand the capabilities of such an intruder, we propose a model for an intelligent intruder whose purpose is to find a detection-free path across the border by which he could cross back and forth without the risk of detection. Our intruder model is composed of four agents, each with a specific task: Explore, Exploit, Evade, and Policy. The first three agents follow the best course for achieving their named goals. The Policy agent is an intelligent agent that learns on different maps whether to pick Explore or Exploit or Evade given the intruder's current knowledge about the map. We use Q-learning (QL) to train the Policy agent over various maps. In QL, the agent gets a positive reward for doing something right (e.g. moving to a detection-free zone closer to the goal) and a negative reward for doing something wrong (e.g. getting caught by a sentry). We investigated different factors that affect the intruder's behavior, like the effect of different rewards, different sensor coverage of the region, and faster and more effective sentries. Our results show that after getting trained on enough number maps, the agent becomes better at finding a detection-free path across the border region. In particular, it reduces the capture rate and the number of steps required to find a detection-free path. Therefore, an intelligent intruder like this can be used to build and test different defense mechanisms.
Disciplines
Computer Sciences | Physical Sciences and Mathematics
License
This work is licensed under a Creative Commons Attribution-NonCommercial-Share Alike 4.0 International License.
Recommended Citation
Srinivasan, Sriram, "Modeling An Intelligent Intruder In A Region Monitored By A Wireless Sensor Network" (2013). Computer Science and Engineering Theses. 203.
https://mavmatrix.uta.edu/cse_theses/203
Comments
Degree granted by The University of Texas at Arlington