Elliptical Anomalies in Wireless Sensor Networks

被引:50
|
作者
Rajasegarar, Sutharshan [1 ]
Bezdek, James C. [1 ]
Leckie, Christopher [2 ]
Palaniswami, Marimuthu [1 ]
机构
[1] Univ Melbourne, Dept Elect & Elect Engn, Melbourne, Vic 3010, Australia
[2] Univ Melbourne, Dept Comp Sci & Software Engn, NICTA Victoria Res Lab, Melbourne, Vic 3010, Australia
基金
澳大利亚研究理事会;
关键词
Algorithms; Security; Design; Performance; Elliptical anomalies; anomaly detection; outlier detection; security; wireless sensor networks; multivariate analysis;
D O I
10.1145/1653760.1653767
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anomalies in wireless sensor networks can occur due to malicious attacks, faulty sensors, changes in the observed external phenomena, or errors in communication. Defining and detecting these interesting events in energy-constrained situations is an important task in managing these types of networks. A key challenge is how to detect anomalies with few false alarms while preserving the limited energy in the network. In this article, we define different types of anomalies that occur in wireless sensor networks and provide formal models for them. We illustrate the model using statistical parameters on a dataset gathered from a real wireless sensor network deployment at the Intel Berkeley Research Laboratory. Our experiments with a novel distributed anomaly detection algorithm show that it can detect elliptical anomalies with exactly the same accuracy as that of a centralized scheme, while achieving a significant reduction in energy consumption in the network. Finally, we demonstrate that our model compares favorably to four other well-known schemes on four datasets.
引用
收藏
页数:28
相关论文
共 50 条
  • [21] Granular Evaluation of Anomalies in Wireless Sensor Networks Using Dynamic Data Partitioning with an Entropy Criteria
    Kumarage, Heshan
    Khalil, Ibrahim
    Tari, Zahir
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (09) : 2573 - 2585
  • [22] Localization in wireless sensor networks and wireless multimedia sensor networks using clustering techniques
    Dipak W. Wajgi
    Jitendra V. Tembhurne
    Multimedia Tools and Applications, 2024, 83 : 6829 - 6879
  • [23] Management of Wireless Ad Hoc Networks and Wireless Sensor Networks
    Mehmet Ulema
    Jose Marcos Nogueira
    Barcin Kozbe
    Journal of Network and Systems Management, 2006, 14 : 327 - 333
  • [24] Management of wireless ad hoc networks and wireless sensor networks
    Ulema, Mehmet
    Nogueira, Jose Marcos
    Kozbe, Barcin
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2006, 14 (03) : 327 - 333
  • [25] Wireless Sensor Networks in Biomedical: Wireless Body Area Networks
    Abidi, Bahae
    Jilbab, Abdelillah
    Haziti, Mohamed E. L.
    EUROPE AND MENA COOPERATION ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGIES, 2017, 520 : 321 - 329
  • [26] Firewalling Wireless Sensor Networks: Security by Wireless
    Martinovic, Ivan
    Gollan, Nicos
    Schmitt, Jens B.
    2008 IEEE 33RD CONFERENCE ON LOCAL COMPUTER NETWORKS, VOLS 1 AND 2, 2008, : 753 - 760
  • [27] Environmental Wireless Sensor Networks
    Corke, Peter
    Wark, Tim
    Jurdak, Raja
    Hu, Wen
    Valencia, Philip
    Moore, Darren
    PROCEEDINGS OF THE IEEE, 2010, 98 (11) : 1903 - 1917
  • [28] Routing in Wireless Sensor Networks
    Ennaji, Rachid
    Boulmalf, Mohammed
    2009 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS 2009), 2009, : 494 - 499
  • [29] Wireless underground sensor networks
    Sardar M.S.
    Xuefen W.
    Yi Y.
    Kausar F.
    Akbar M.W.
    International Journal of Performability Engineering, 2019, 15 (11) : 3042 - 3051
  • [30] On the Planarization of Wireless Sensor Networks
    Fenghui Zhang
    Anxiao (Andrew) Jiang
    Jianer Chen
    Algorithmica, 2011, 60 : 593 - 608