Physical Security Assessments using Worst-Case Coverage in Wireless Sensor Networks
DOI:
https://doi.org/10.48165/jntas.2025.13.1.6Keywords:
Clifford algebra, Wireless sensor network, Worst coverage, Plane target, Physical security assess-ments, Risk model, SAVI modelAbstract
Most of the nuclear and radiological facilities have physical security systems which include different types of intrusion detection cluster sensors. They should be kept active, valid and updated and follow the requirements of the nuclear regu latory authority at the national level and meet the recommendations of IAEA at the international level. Wireless sensor networks are crucial to many applications. Nuclear facilities security systems are one of the major uses for wireless sensor networks. The majority of studies conducted on wireless sensor networks con centrate on improving target coverage to save energy consumption and network costs. One of the most important issues to take into account, when researching the coverage problem of sensor networks is the problem of planar target analysis. This study presents a new coordinate-free sensor network coverage model for the plane target issue, based on Clifford algebra which is a strong tool. Additionally, the Clifford Algebra computations of the node coverage rate for the plane target in the sensor network are illustrated. After that, the sensor network’s worst-case coverage (maximum clearance path) for a plane target is provided which is used to provide security for nuclear facilities to prevent and find any intruders from making any troubles. Through simulation, the suggested algorithm’s dependability and optimality have been demonstrated. Furthermore, a comparison is given between the point target’s and the plane target’s breach weight. In this work, a hypothetical nuclear site was assumed for both security system analysis and sys tem effectiveness evaluation. The systematic analysis of vulnerability to intrusion (SAVI) program was used for evaluation process. SAVI determines the 10 vulner able paths as a measure of system effectiveness. A SAVI output result shows that the effectiveness of the security system, PE, along the worst vulnerability path was 82%. The System probability of detection PD was 94% of nuclear facility. This analysis concludes that the security system of HNRC facility is winning against the worst path of the terrorists attack and achieved its objective.
References
Abo-Bakr, O., Abdel-Rahman, M.A.E., & El-Mongy, S.A. (2019). Validation and Correction for 208Tl Activity to Assay 232Th in Equilibrium with Its Daughters. Phys. Part. Nucl. Lett., 16(6), 835.
Akkaya, K., & Younis, M. (2005). A survey on routing protocols for wireless sensor networks. J. Ad Hoc Networks, 3(3), 325.
Bonnah, E., Ju, S., & Cai, W. (2019). Coverage Maximization in Wireless Sensor Networks Using Minimal Exposure Path and Particle Swarm Optimization. Sens. Imaging, 21(1), 4.
Breuils, S., Tachibana, K., & Hitzer, E. (2022). New Applications of Clifford’s Geometric Algebra. Adv. Appl. Clifford Algebr., 32(2), 17.
El-Kafas, A.E., Wadood, A.A., & Mansour, A.E. (2008). Evaluation and Upgrading of the Physical Protection System of a Hypothetical Nuclear Facility against Sabotage and Threat. Arab J. Nucl. Sci. Appl., 41(3), 313.
Elsamahy, M., Nagla, T.F., & Abdel-Rahman, M.A.E. (2021). Continuous online monitoring in pressurized water reactors during flexible operation using PLSR-based technique – Case study: Load following test. Ann. Nucl. Energy, 161, 108473.
Franchini, S., Vassallo, G., & Sorbello, F. (2017). A brief introduction to Clifford algebra. Retrieved from https://www.researchgate.net/publication/228955605
Garcia, M.L. (2007). Design and Evaluation of Physical Protection Systems (2nd ed.). Butterworth-Heinemann.
Garcia, M.L. (2005). Vulnerability Assessment of Physical Protection Systems. Elsevier Science, Butterworth-Heinemann.
Gau, R.H., & Peng, Y.Y. (2006). A Dual Approach for the Worst-Case-Coverage Deployment Problem in Ad-Hoc Wireless Sensor Networks. In IEEE Int. Conf. MASS.
Gorain, B., & Mandal, P.S. (2019). Approximation Algorithms for Barrier Sweep Coverage. Int. J. Found. Comput. Sci., 30(3), 425.
Hao, Z., Dang, J., & Wang, X. (2021). A node localization algorithm based on Voronoi diagram and support vector machine for wireless sensor networks. Int. J. Distrib. Sens. Netw., 17(2), 1550147721993410.
Hong, Y., Yan, R., Zhu, Y., Li, D., & Chen, W. (2017). Finding best and worst-case coverage paths in camera sensor networks for complex regions. J. Ad Hoc Netw., 56, 202.
IAEA. (2011). Nuclear Security Recommendations on Physical Protection of Nuclear Material and Nuclear Facilities (INFCIRC/225/Revision 5). Nuclear Security Series No. 13, IAEA, Vienna, Austria.
Jondhale, S.R., Maheswar, R., & Lioret, J. (2022). Fundamentals of Wireless Sensor Networks. In Received Signal Strength Based Target Localization and Tracking Using Wireless Sensor Networks. Springer: Cham, 1.
Chang, J., Yu, J., Ke, J., & Jingsong, H. (2010). Simulation of worst and best-case coverage for wireless sensor networks. Int. Conf. ICINA 2010.
Kim, K., & Lee, S. (2021). Algorithms for Finding Vulnerabilities and Deploying Additional Sensors in a Region with Obstacles. Electronics, 10(12), 1504.
Lee, C., Shin, D., Bae, S.W., & Choi, S. (2013). Best and worst-case coverage problems for arbitrary paths in wireless sensor networks. In 7th IEEE Int. Conf. MASS.
Macdonald, A. (2010). A Survey of Geometric Algebra and Geometric Calculus. Adv. Appl. Clifford Algebr., 27(1), 853.
Mahfouz, A.M., Ismail, A.S., El Sobky, W.I., & Nasry, H. (2023). A novel model for representing a plan target and finding the worst-case coverage in wireless sensor network based on Clifford algebra. EURASIP J. Wirel. Commun. Netw., 2023(1), 95.
Mahfouz, A., Zaky, H., Ismail, A., & Dahab, E. (2022). Mathematical Model for Omnidirectional Sensor Network Using Clifford Algebra. J. Phys.: Conf. Ser., 2304, 012001.
Mahfouz, A.M., Ismail, A.S., Zaky, H., & Alsobky, W.I. (2022). Path Detection for a Moving Target in Wireless Sensor Network Based on Clifford Algebra. Int. Conf. ITC-Egypt, 1–5.
Mann, S., & Dorst, L. (2002). Geometric algebra: a computational framework for geometrical applications. IEEE Comput. Graph. Appl., 22(4), 58.
Matter, J.C. (1988). SAVI: A PC-Based Vulnerability Assessment Program. SNL Lab., Albuquerque, New Mexico, USA.
Meguerdichian, S., Koushanfar, F., Qu, G., & Potkonjak, M. (2001). Exposure in wireless ad-hoc sensor networks. In Proceedings of the 7th Annual Int. Conf. MobiCom, Rome, Italy, 139.
Megerian, S., Koushanfar, F., Potkonjak, M., & Srivastava, M.B. (2005). Worst and best-case coverage in sensor networks. IEEE Trans. Mob. Comput., 4(1), 84.
Nasry, H., Xu, W., Gong, J.W., & Chen, H.Y. (2014). Teleoperation Transparency Using Model Predictive Control. Appl. Math. Model., 446–447, 115.
Nasry, H. (2019). Coordinate Transformation in Unmanned Systems Using Clifford Algebra. Proc. 5th Int. Conf. ICMRE’19.
Norichika, T., & Mitsutoshi, S. (2014). A probabilistic extension of the EASI model. J. Probab. Stat., 7(2), 12.
Oyeyinka, O.D., Dim, L.A., Echeta, M.C., & Kuye, A.O. (2014). Determination of System Effectiveness for Physical Protection Systems of a Nuclear Energy. J. Sci. Technol., 4(2), 9.
Ribeiro, M.G., Neves, L.A., Pinto, A.S.R., & Nascimento, M.Z. (2015). Surface Coverage in Wireless Sensor Networks Based on Delaunay Tetrahedralization. J. Phys. Conf. Ser., 574, 012083.
Rother, F.C., Rebello, W.F., Healy, M.J.F., Silva, M.M., Cabral, P.A.M., Vital, H.C., & Andrade, E.R. (2016). Radiological Risk Assessment by Convergence Methodology Model in RDD Scenarios. Risk Anal., 36(11), 2039.
Taylor, M.D. (2021). An Introduction to Geometric Algebra and Geometric Calculus. Retrieved from https://books.google.com.eg/books?id=ajmWzgEACAAJ
Temene, N., Sergiou, C., Georgiou, C., & Vassiliou, V. (2022). A Survey on Mobility in Wireless Sensor Networks. J. Ad Hoc Netw., 125, 102726.
Veltri, G., Huang, Q., Gang Qu, G., & Potkonjak, M. (2003). Minimal and maximal exposure path algorithms for wireless embedded sensor networks. Int. J. Sens. Netw., 40–50.
Wadoud, A.A., Adail, A.S., & Saleh, A.A. (2018). Physical protection evaluation process for nuclear facility via sabotage scenarios. Alex. Eng. J., 57(2), 831.
Wadoud, A.A., El Eissawi, H.M., & Saleh, A.A. (2017). Protection of high ceiling nuclear facilities using photoelectric sensors and infrared fire detectors. Arab J. Nucl. Sci. Appl., 50(1), 194.
Wadoud, A.A., Agamy, S., Gabal, H.A., & Trabelsi, M. (2019). Physical Protection System Evaluation and Consequences Analysis at Research Reactor Facility via Sabotage Scenarios. J. Electr. Eng. Korea., 15, 61.
Xie, W., Cao, W., & Meng, S. (2008). Coverage analysis for sensor networks based on Clifford algebra. Sci. China Ser. F: Inf. Sci., 51(5), 460.
Yi, Z., & Chakrabarty, K. (2005). A distributed coverage and connectivity-centric technique for selecting active nodes in wireless sensor networks. IEEE Trans. Comput., 54(8), 978.
Zaky, H.N., Abd Elfatah, G., El-Mongy, S.A., & Abdel-Rahman, M.A.E. (2023). Euler–Maruyama algorithm in estimating UGV path and location in nuclear emergency and security applications. Kerntechnik, 88(3), 361.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

