Skip to main content

A Novel Framework to Detect Anomalous Nodes to Secure Wireless Sensor Networks

  • Conference paper
Applied Intelligence and Informatics (AII 2022)

Abstract

The application driven technology wireless sensor networks (WSNs) are developed substantially in the last decades. The technology has drawn the attention for application in the scientific as well as in industrial domains. The networks use multifunctional and cheap sensor nodes. The application of the networks ranges from military to the civilian application such as battlefield monitoring, environment monitoring and patient monitoring. The network goal is to collect the data from different environmental phenomenon in an unsupervised manner from unknown and hash environment using the resource constrained sensor nodes. The construction of the sensor nodes used in the network and the distributed nature of the network infrastructure is susceptible to various types of attacks. In order to assure the functional operation of WSNs and collecting the meaningful data from the network, detecting the anomalous node and mechanisms to secure the networks are vital. In this research paper, we have used machine learning based decision tree algorithm to determine the anomalous sensor node to provide security to the WSNs. The decision tree has the capability to deal with categorical and numerical data. The simulation work was carried out in python and the result shows the accurate detection of the anomalous node. In future, the hybrid approach combining two algorithms will be employed to further performance improvement of the model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ahmed, M., Huang, X., Sharma, D.: A novel framework for abnormal behaviour identification and detection for wireless sensor networks. Int. J. Comput. Commun. Eng. 6(2), 148–151 (2012)

    Google Scholar 

  2. Gurewitz, O., Shifrin, M., Dvir, E.: Data gathering techniques in WSN: a cross-layer view. Sensors 22(7), Art. no. 7 (2022). https://doi.org/10.3390/s22072650

  3. Kandris, D., Nakas, C., Vomvas, D., Koulouras, G.: Applications of wireless sensor networks: an Up-to-Date survey. Appl. Syst. Innov. 3(1), Art. no. 1 (2020). https://doi.org/10.3390/asi3010014

  4. Ahmed, M., Huang, X., Cui, H.: Smart decision making for internal attacks in wireless sensor network. Int. J. Comput. Sci. Netw. Secur. 12(12), 15–23 (2012)

    Google Scholar 

  5. Abdul-Qawy, A.S.H., Almurisi, N.M.S., Tadisetty, S.: Classification of energy saving techniques for IoT-based heterogeneous wireless nodes. Procedia Comput. Sci. 171, 2590–2599 (2020). https://doi.org/10.1016/j.procs.2020.04.281

    Article  Google Scholar 

  6. Ray, P.P.: A survey on Internet of Things architectures. J. King Saud Univ. Comput. Inf. Sci. 30(3), 291–319 (2018). https://doi.org/10.1016/j.jksuci.2016.10.003

  7. Ahmed, M.R., Huang, X., Sharma, D., Cui, H.: Protecing WSN from internal attack with multi-criteria evaluation using dempester-shafer Theory. In: Proceedings of International Conference on Information Systems, 2012, Penang, Malaysia, vol. 62, December 2012

    Google Scholar 

  8. Gautam, A.K., Kumar, R.: A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks. SN Appl. Sci. 3(1), 1–27 (2021). https://doi.org/10.1007/s42452-020-04089-9

    Article  MathSciNet  Google Scholar 

  9. Brijain, M., Patel, R., Kushik, M., Rana, K.: A survey on decision tree algorithm for classification.

    Google Scholar 

  10. Jin, C., De-lin, L., Fen-xiang, M.: An improved ID3 decision tree algorithm. In: 2009 4th International Conference on Computer Science & Education, pp. 127–130, July 2009. https://doi.org/10.1109/ICCSE.2009.5228509

  11. Samparthi, V.S.K., Verma, H.K.: Outlier detection of data in wireless sensor networks using kernel density estimation. Int. J. Comput. Appl. IJCA 5(7), 28–32 (2010)

    Google Scholar 

  12. Wu, W., Cheng, X., Ding, M., Xing, K., Liu, F., Deng, P.: Localized outlying and boundary data detection in sensor networks. IEEE Trans. Knowl. Data Eng. 19(8), 1145–1157 (2007). https://doi.org/10.1109/TKDE.2007.1067

    Article  Google Scholar 

  13. Poornima, I.G.A., Paramasivan, B.: Anomaly detection in wireless sensor network using machine learning algorithm. Comput. Commun. 151, 331–337 (2020). https://doi.org/10.1016/j.comcom.2020.01.005

    Article  Google Scholar 

  14. Munoz-Organero, M.: Outlier detection in wearable sensor data for human activity recognition (HAR) based on DRNNs. IEEE Access 7, 74422–74436 (2019). https://doi.org/10.1109/ACCESS.2019.2921096

    Article  Google Scholar 

  15. Thangaramya, K., et al.: Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN. Soft. Comput. 24(21), 16483–16497 (2020).https://doi.org/10.1007/s00500-020-04955-z

  16. Shahid, N., Naqvi, I.H., Qaisar, S.B.: Quarter-Sphere SVM: attribute and spatio-temporal correlations based outlier & event detection in wireless sensor networks. In: 2012 IEEE Wireless Communications and Networking Conference (WCNC), pp. 2048–2053, April 2012. https://doi.org/10.1109/WCNC.2012.6214127

  17. Arfaoui, A., Kribeche, A., Senouci, S.M., Hamdi, M.: Game-based adaptive anomaly detection in wireless body area networks. Comput. Netw. 163, 106870 (2019). https://doi.org/10.1016/j.comnet.2019.106870

    Article  Google Scholar 

  18. Dai, T., Ding, Z.: Online distributed distance-based outlier clearance approaches for wireless sensor networks. Pervasive Mob. Comput. 63, 101130 (2020). https://doi.org/10.1016/j.pmcj.2020.101130

    Article  Google Scholar 

  19. Fawzy, A., Mokhtar, H.M.O., Hegazy, O.: Outliers detection and classification in wireless sensor networks. Egypt. Inform. J. 14(2), 157–164 (2013). https://doi.org/10.1016/j.eij.2013.06.001

    Article  Google Scholar 

  20. Yu, X., et al.: An adaptive method based on contextual anomaly detection in Internet of Things through wireless sensor networks. Int. J. Distrib. Sens. Netw. 16(5), 1550147720920478 (2020). https://doi.org/10.1177/1550147720920478

    Article  Google Scholar 

  21. Giatrakos, N., Deligiannakis, A., Garofalakis, M., Kotidis, Y.: Omnibus outlier detection in sensor networks using windowed locality sensitive hashing. Future Gener. Comput. Syst. 110, 587–609 (2020). https://doi.org/10.1016/j.future.2018.04.046

    Article  Google Scholar 

  22. Holder, C., Boyles, R., Robinson, P., Raman, S., Fishel, G.: Calculating a daily normal temperature range that reflects daily temperature variability. Bull. Am. Meteorol. Soc. 87(6), 769–774 (2006). https://doi.org/10.1175/BAMS-87-6-769

    Article  Google Scholar 

  23. Kretowski, M.: Evolutionary Decision Trees in Large-Scale Data Mining. Springer, Heidelberg (2019). https://doi.org/10.1007/978-3-030-21851-5

  24. Molnar, C.: Interpretable machine learning. Lulu.com (2020)

    Google Scholar 

  25. Rokach, L.: Data mining with decision trees: theory and applications. World Scientific (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muhammad R. Ahmed .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Cite this paper

Ahmed, M.R., Myo, T., Al Baroomi, B., Marhaban, M.H., Kaiser, M.S., Mahmud, M. (2022). A Novel Framework to Detect Anomalous Nodes to Secure Wireless Sensor Networks. In: Mahmud, M., Ieracitano, C., Kaiser, M.S., Mammone, N., Morabito, F.C. (eds) Applied Intelligence and Informatics. AII 2022. Communications in Computer and Information Science, vol 1724. Springer, Cham. https://doi.org/10.1007/978-3-031-24801-6_35

Download citation

Publish with us

Policies and ethics