Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Elliptical anomalies in wireless sensor networks

Published: 05 January 2010 Publication History

Abstract

Anomalies in wireless sensor networks can occur due to malicious attacks, faulty sensors, changes in the observed external phenomena, or errors in communication. Defining and detecting these interesting events in energy-constrained situations is an important task in managing these types of networks. A key challenge is how to detect anomalies with few false alarms while preserving the limited energy in the network. In this article, we define different types of anomalies that occur in wireless sensor networks and provide formal models for them. We illustrate the model using statistical parameters on a dataset gathered from a real wireless sensor network deployment at the Intel Berkeley Research Laboratory. Our experiments with a novel distributed anomaly detection algorithm show that it can detect elliptical anomalies with exactly the same accuracy as that of a centralized scheme, while achieving a significant reduction in energy consumption in the network. Finally, we demonstrate that our model compares favorably to four other well-known schemes on four datasets.

References

[1]
Akyildiz, I., Su, W., Sankarasubramaniam, Y., and Cayirci, E. 2002. Wireless sensor networks: A survey. Comput. Netw. 38, 4, 393--422.
[2]
Barnett, V. and Lewis, T. 1994. Outliers in Statistical Data 3rd Ed. John Wiley and Sons.
[3]
Bettencourt, L. M. A., Hagberg, A. A., and Larkey, L. B. 2007. Separating the wheat from the chaff: Practical anomaly detection schemes in ecological applications of distributed sensor networks. In Proceedings of the 3rd IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS). 223--239.
[4]
Bezdek, J. C., Pal, M. R., Keller, J., and Krisnapuram, R. 1999. Fuzzy Models and Algorithms for Pattern Recognition and Image Processing. Kluwer Academic Publishers, Norwell, MA.
[5]
Bondarenko, O., Kininmonth, S., and Kingsford, M. 2007. Underwater sensor networks, oceanography and plankton assemblages. In Proceedings of the International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP). 657--662.
[6]
Branch, J., Szymanski, B., Giannella, C., Wolff, R., and Kargupta, H. 2006. In-Network outlier detection in wireless sesnor networks. In Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS).
[7]
Buonadonna, P., Gay, D., Hellerstein, J., Hong, W., and Madden, S. 2005. Task: Sensor network in a box. In Proceedings of the 2nd European Workshop on Wireless Sensor Networks. 133--144.
[8]
CC2420-Web. 2008. http://focus.ti.com/lit/ds/symlink/cc2420.pdf.
[9]
Chatzigiannakis, V. and Papavassiliou, S. 2007. Diagnosing anomalies and identifying faulty nodes in sensor networks. IEEE Sensors J. 7, 5, 637--645.
[10]
Chohan, N. 2007. Hardware assisted compression in wireless sensor networks. www.cs.ucsb.edu/~nchohan/docs/hadcwsnProgressReport.pdf.
[11]
Crossbow-Web. 2008. http://www.xbow.com/Products/productdetails.aspx?sid=156.
[12]
Dave, R. and Krishnapuram, R. 1997. Robust clustering methods: A unified view. IEEE Trans. Fuzzy Syst. 5, 2, 270--293.
[13]
Deshpande, A., Guestrin, C., and Madden, S. 2005. Using probabilistic models for data management in acquitional environment. In Proceedings of the 2nd Biennial Conference on Innovative Data Systems Research (CIDR). 317--328.
[14]
Drozda, M., Schaust, S., and Szczerbicka., H. 2007a. Is AIS based misbehavior detection suitable for wireless sensor networks? In Proceedings of the IEEE Wireless Communications and Networking Conference.
[15]
Drozda, M., Schaust, S., and Szczerbicka, H. 2007b. AIS for misbehavior detection in wireless sensor networks: Performance and design principles. In Proceedings of the IEEE Congress on Evolutionary Computation (CEC). 3719--3726.
[16]
Du, W., Fang, L., and Peng, N. 2006. LAD: Localization anomaly detection for wireless sensor networks. J. Parallel Distrib. Comput. 66, 7, 874--886.
[17]
Duda, R. O., Hart, P. E., and Stork, D. G. 2001. Pattern Classification 2 Ed. John Wiley and Sons Inc.
[18]
Frigui, H. and Krishnapuram, R. 1997. Clustering by competitive agglomeration. Pattern Recogn. 30, 7, 1109--1119.
[19]
Frigui, H. and Krishnapuram, R. 1999. A robust competitive clustering algorithm with applications in computer vision. IEEE Trans. Pattern Anal. Mach. Intell. 21, 5, 450--465.
[20]
GBR-Project. 2007. http://www.issnip.unimelb.edu.au/research_program/sensor_networks/core_%technologies/anomaly_detection/anomaly_detection_in_wsn.
[21]
Hodge, V. and Austin, J. 2004. A survey of outlier detection methodologies. In Artificial Intelligence Review. Springer Netherlands, 85--126.
[22]
IBRL-Web. 2006. http://db.lcs.mit.edu/labdata/labdata.html.
[23]
IMote2-Web. 2008. http://www.xbow.com/Products/productdetails.aspx?sid=253.
[24]
Johnson, R. A. and Wichern, D. W. 1988. Applied Multivariate Statistical Analysis. Prentice Hall.
[25]
Kelly, P. 1994. An algorithm for merging hyperellipsoidal clusters. Tech. rep. LA-UR-94-3306, Los Alamos National Laboratory.
[26]
Kininmonth, S., Bainbridge, S., Atkinson, I., Gill, E., Barral, L., and Vidaud, R. 2004. Sensor networking the great barrier reef. Spatial Sci. QLD J. 34--38.
[27]
Knorr, E. M. and Ng, R. T. 1998. Algorithms for mining distance based outliers in large datasets. In Proceedings of the 24th International Conference on Very Large Data Bases (VLDB). 392--403.
[28]
Kotidis, Y., Deligiannakis, A., Stoumpos, V., Vassalos, V., and Delis, A. 2007. Robust management of outliers in sensor nerwork aggregate queries. In Proceedings of the 6th International ACM Workshop on Data Engineering for Wireless and Mobile Access (MobiDE).
[29]
Lazos, L. and Poovendran, R. 2005. Serloc: Robust localization for wireless sensor networks. ACM Trans. Sensor Netw. 1, 1, 73--100.
[30]
Liu, D., Ning, P., and Du, W. 2005. Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. In Proceedings of the 25th IEEE International Conference on Distributed Computing Systems. 609--619.
[31]
Loo, C., Ng, M., Leckie, C., and Palaniswami, M. 2006. Intrusion detection for routing attacks in sensor networks. Int. J. Distrib. Sensor Netw. 2, 4, 313--332.
[32]
Markos, M. and Sameer, S. 2003. Novelty detection: A review part 1: Statistical approaches. Signal Proc. 83, 12, 2481--2497.
[33]
Mathur, G., Desnoyers, P., Ganesan, D., and Shenoy, P. 2006. Ultra low power data storage for sensor networks. In Proceedings of the 5th Intlrnational Conference on Information Processing in Sensor Networks. ACM Press, New York, 374--381.
[34]
Paladugu, K., Santhanam, L., Xie, B., and Agrawal, D. P. 2007. Dclad: Distributed cluster based localization anomaly detection in wireless sensor networks using single mobile beacon. In Proceedings of the IEEE Military Communications Conference (MILCOM). 1--7.
[35]
Papadimitriou, S., Kitagawa, H., Gibbons, P., and Faloutsos, C. 2003. LOCI: Fast outlier detection using the local correlation integral. In Proceedings of 19th International Conference on Data Engineering. 315--326.
[36]
Perrig, A., Stankovic, J., and Wagner, D. 2004. Security in wireless sensor networks. Commun. ACM 47, 6, 53--57.
[37]
Petrovskiy, M. I. 2003. Outlier detection algorithms in data mining systems. Program. Comput. Softw. 29, 4, 228--237.
[38]
Pottie, G. J. and Kaiser, W. J. 2000. Wireless integrated network sensors. Comm. ACM 43, 5, 51--58.
[39]
Raghunathan, V., Schurgers, C., Park, S., and Srivastava, M.B. 2002. Energyaware wireless microsensor networks. IEEE Signal Proces. Mag.
[40]
Rajasegarar, S., Gubbi, J., Bondarenko, O., Kininmonth, S., Marusic, S., Bainbridge, S., Atkinson, I., and Palaniswami, M. 2008a. Sensor network implementation challenges in the great barrier reef marine environment. In Proceedings of the SENSEI-ISSNIP Workshop alongside ICT Mobile Summit.
[41]
Rajasegarar, S., Leckie, C., and Palaniswami, M. 2008b. Anomaly detection in wireless sensor networks. IEEE Wirel. Commun. Mag. 15, 4, 34--40.
[42]
Rajasegarar, S., Leckie, C., and Palaniswami, M. 2008c. CESVM: Centered hyperellipsoidal support vector machine based anomaly detection. In Proceedings of the IEEE International Conference on Communications (ICC). 1610--1614.
[43]
Rajasegarar, S., Leckie, C., Palaniswami, M., and Bezdek, J. 2006. Distributed anomaly detection in wireless sensor networks. In Proceedings of the IEEE International Conference on Communications Systems (ICCS).
[44]
Rajasegarar, S., Leckie, C., Palaniswami, M., and Bezdek, J. C. 2007. Quarter sphere based distributed anomaly detection in wireless sensor networks. In Proceedings of the IEEE International Conference on Communications (ICC). 3864--3869.
[45]
Srinivasan, A. and Wu, J. 2008. A survey on secure localization in wireless sensor networks. Encyclopedia of Wireless and Mobile Communications. To appear. http://www.cse.fau.edu/~jie/research/publications/Publication_files/BookChapter_SurveyOnSecureLocalizationInWirelessSensorNetworks.pdf.
[46]
Subramaniam, S., Palpanas, T., Papadopoulos, D., Kalogeraki, V., and Gunopulos, D. 2006. Online outlier detection in sensor data using non-parametric models. In Proceedings of the 32nd International Conference on Very Large Data Bases (VLDB). 187--198.
[47]
Szewczyk, R., Osterweil, E., Polastre, J., Hamilton, M., Mainwaring, A., and Estrin, D. 2004. Habitat monitoring with sensor networks. Commun. ACM. 47, 34--40.
[48]
TinyOS-Web. 2008. http://www.tinyos.net/tinyos-2.x/doc/html/tep126.html.
[49]
Wark, T., Crossman, C., Hu, W., Guo, Y., Valencia, P., Sikka, P., Corke, P., Lee, C., Henshall, J., Prayaga, K., O'Grady, J., Reed, M., and Fisher, A. 2007. The design and evaluation of a mobile sensor/actuator network for autonomous animal control. In Proceedings of the 6th International Conference on Information Processing in Sensor Networks (IPSN). ACM Press, New York, 206--215.
[50]
Younis, O. and Fahmy, S. 2004. Distributed clustering in ad-hoc sensor networks: A hybrid, energy-efficient approach. In Proceedings of IEEE InfoCom. Vol. 1. 640.
[51]
Zhao, F., Liu, J., Liu, J., Guibas, L., and Reich, J. 2003. Collaborative signal and information processing: An information-directed approach. Proc. IEEE 91, 8, 1199--1209.

Cited By

View all
  • (2023)Research on Machine Learning Algorithm-Based Approach for Detecting Abnormal Data from Environmental Sensors in Different DimensionsProceedings of the 2023 International Joint Conference on Robotics and Artificial Intelligence10.1145/3632971.3632990(26-33)Online publication date: 7-Jul-2023
  • (2021)Anomaly Detection in Urban Water Distribution Grids Using Fog Computing Architecture2021 29th Iranian Conference on Electrical Engineering (ICEE)10.1109/ICEE52715.2021.9544486(591-595)Online publication date: 18-May-2021
  • (2020)A Systematic Literature Review on Outlier Detection in Wireless Sensor NetworksSymmetry10.3390/sym1203032812:3(328)Online publication date: 25-Feb-2020
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on Sensor Networks
ACM Transactions on Sensor Networks  Volume 6, Issue 1
December 2009
258 pages
ISSN:1550-4859
EISSN:1550-4867
DOI:10.1145/1653760
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Journal Family

Publication History

Published: 05 January 2010
Accepted: 01 December 2008
Revised: 01 December 2008
Received: 01 October 2007
Published in TOSN Volume 6, Issue 1

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Elliptical anomalies
  2. anomaly detection
  3. multivariate analysis
  4. outlier detection
  5. security
  6. wireless sensor networks

Qualifiers

  • Research-article
  • Research
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)17
  • Downloads (Last 6 weeks)2
Reflects downloads up to 09 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Research on Machine Learning Algorithm-Based Approach for Detecting Abnormal Data from Environmental Sensors in Different DimensionsProceedings of the 2023 International Joint Conference on Robotics and Artificial Intelligence10.1145/3632971.3632990(26-33)Online publication date: 7-Jul-2023
  • (2021)Anomaly Detection in Urban Water Distribution Grids Using Fog Computing Architecture2021 29th Iranian Conference on Electrical Engineering (ICEE)10.1109/ICEE52715.2021.9544486(591-595)Online publication date: 18-May-2021
  • (2020)A Systematic Literature Review on Outlier Detection in Wireless Sensor NetworksSymmetry10.3390/sym1203032812:3(328)Online publication date: 25-Feb-2020
  • (2020)Automatic optimization of outlier detection ensembles using a limited number of outlier examplesInternational Journal of Data Science and Analytics10.1007/s41060-020-00222-4Online publication date: 8-Jun-2020
  • (2019)A comprehensive survey of anomaly detection in banking, wireless sensor networks, social networks, and healthcareIntelligent Decision Technologies10.3233/IDT-17015513:2(229-270)Online publication date: 17-May-2019
  • (2018)A distributed anomaly detection model for wireless sensor networks based on the one-class principal component classifierInternational Journal of Sensor Networks10.5555/3272279.327228527:3(200-214)Online publication date: 1-Jan-2018
  • (2018)A distributed anomaly detection model for wireless sensor networks based on the one?class principal component classifierInternational Journal of Sensor Networks10.5555/3272272.327227827:3(200-214)Online publication date: 1-Jan-2018
  • (2018)A distributed anomaly detection model for wireless sensor networks based on the one?class principal component classifierInternational Journal of Sensor Networks10.5555/3272258.327226427:3(200-214)Online publication date: 1-Jan-2018
  • (2018)A WSN for Monitoring and Event Reporting in Underground Mine EnvironmentsIEEE Systems Journal10.1109/JSYST.2016.264410912:1(485-496)Online publication date: Mar-2018
  • (2018)Online Clustering for Evolving Data Streams with Online Anomaly DetectionAdvances in Knowledge Discovery and Data Mining10.1007/978-3-319-93037-4_40(508-521)Online publication date: 3-Jun-2018
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media