Abstract
The application driven technology wireless sensor networks (WSNs) are developed substantially in the last decades. The technology has drawn the attention for application in the scientific as well as in industrial domains. The networks use multifunctional and cheap sensor nodes. The application of the networks ranges from military to the civilian application such as battlefield monitoring, environment monitoring and patient monitoring. The network goal is to collect the data from different environmental phenomenon in an unsupervised manner from unknown and hash environment using the resource constrained sensor nodes. The construction of the sensor nodes used in the network and the distributed nature of the network infrastructure is susceptible to various types of attacks. In order to assure the functional operation of WSNs and collecting the meaningful data from the network, detecting the anomalous node and mechanisms to secure the networks are vital. In this research paper, we have used machine learning based decision tree algorithm to determine the anomalous sensor node to provide security to the WSNs. The decision tree has the capability to deal with categorical and numerical data. The simulation work was carried out in python and the result shows the accurate detection of the anomalous node. In future, the hybrid approach combining two algorithms will be employed to further performance improvement of the model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ahmed, M., Huang, X., Sharma, D.: A novel framework for abnormal behaviour identification and detection for wireless sensor networks. Int. J. Comput. Commun. Eng. 6(2), 148–151 (2012)
Gurewitz, O., Shifrin, M., Dvir, E.: Data gathering techniques in WSN: a cross-layer view. Sensors 22(7), Art. no. 7 (2022). https://doi.org/10.3390/s22072650
Kandris, D., Nakas, C., Vomvas, D., Koulouras, G.: Applications of wireless sensor networks: an Up-to-Date survey. Appl. Syst. Innov. 3(1), Art. no. 1 (2020). https://doi.org/10.3390/asi3010014
Ahmed, M., Huang, X., Cui, H.: Smart decision making for internal attacks in wireless sensor network. Int. J. Comput. Sci. Netw. Secur. 12(12), 15–23 (2012)
Abdul-Qawy, A.S.H., Almurisi, N.M.S., Tadisetty, S.: Classification of energy saving techniques for IoT-based heterogeneous wireless nodes. Procedia Comput. Sci. 171, 2590–2599 (2020). https://doi.org/10.1016/j.procs.2020.04.281
Ray, P.P.: A survey on Internet of Things architectures. J. King Saud Univ. Comput. Inf. Sci. 30(3), 291–319 (2018). https://doi.org/10.1016/j.jksuci.2016.10.003
Ahmed, M.R., Huang, X., Sharma, D., Cui, H.: Protecing WSN from internal attack with multi-criteria evaluation using dempester-shafer Theory. In: Proceedings of International Conference on Information Systems, 2012, Penang, Malaysia, vol. 62, December 2012
Gautam, A.K., Kumar, R.: A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks. SN Appl. Sci. 3(1), 1–27 (2021). https://doi.org/10.1007/s42452-020-04089-9
Brijain, M., Patel, R., Kushik, M., Rana, K.: A survey on decision tree algorithm for classification.
Jin, C., De-lin, L., Fen-xiang, M.: An improved ID3 decision tree algorithm. In: 2009 4th International Conference on Computer Science & Education, pp. 127–130, July 2009. https://doi.org/10.1109/ICCSE.2009.5228509
Samparthi, V.S.K., Verma, H.K.: Outlier detection of data in wireless sensor networks using kernel density estimation. Int. J. Comput. Appl. IJCA 5(7), 28–32 (2010)
Wu, W., Cheng, X., Ding, M., Xing, K., Liu, F., Deng, P.: Localized outlying and boundary data detection in sensor networks. IEEE Trans. Knowl. Data Eng. 19(8), 1145–1157 (2007). https://doi.org/10.1109/TKDE.2007.1067
Poornima, I.G.A., Paramasivan, B.: Anomaly detection in wireless sensor network using machine learning algorithm. Comput. Commun. 151, 331–337 (2020). https://doi.org/10.1016/j.comcom.2020.01.005
Munoz-Organero, M.: Outlier detection in wearable sensor data for human activity recognition (HAR) based on DRNNs. IEEE Access 7, 74422–74436 (2019). https://doi.org/10.1109/ACCESS.2019.2921096
Thangaramya, K., et al.: Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN. Soft. Comput. 24(21), 16483–16497 (2020).https://doi.org/10.1007/s00500-020-04955-z
Shahid, N., Naqvi, I.H., Qaisar, S.B.: Quarter-Sphere SVM: attribute and spatio-temporal correlations based outlier & event detection in wireless sensor networks. In: 2012 IEEE Wireless Communications and Networking Conference (WCNC), pp. 2048–2053, April 2012. https://doi.org/10.1109/WCNC.2012.6214127
Arfaoui, A., Kribeche, A., Senouci, S.M., Hamdi, M.: Game-based adaptive anomaly detection in wireless body area networks. Comput. Netw. 163, 106870 (2019). https://doi.org/10.1016/j.comnet.2019.106870
Dai, T., Ding, Z.: Online distributed distance-based outlier clearance approaches for wireless sensor networks. Pervasive Mob. Comput. 63, 101130 (2020). https://doi.org/10.1016/j.pmcj.2020.101130
Fawzy, A., Mokhtar, H.M.O., Hegazy, O.: Outliers detection and classification in wireless sensor networks. Egypt. Inform. J. 14(2), 157–164 (2013). https://doi.org/10.1016/j.eij.2013.06.001
Yu, X., et al.: An adaptive method based on contextual anomaly detection in Internet of Things through wireless sensor networks. Int. J. Distrib. Sens. Netw. 16(5), 1550147720920478 (2020). https://doi.org/10.1177/1550147720920478
Giatrakos, N., Deligiannakis, A., Garofalakis, M., Kotidis, Y.: Omnibus outlier detection in sensor networks using windowed locality sensitive hashing. Future Gener. Comput. Syst. 110, 587–609 (2020). https://doi.org/10.1016/j.future.2018.04.046
Holder, C., Boyles, R., Robinson, P., Raman, S., Fishel, G.: Calculating a daily normal temperature range that reflects daily temperature variability. Bull. Am. Meteorol. Soc. 87(6), 769–774 (2006). https://doi.org/10.1175/BAMS-87-6-769
Kretowski, M.: Evolutionary Decision Trees in Large-Scale Data Mining. Springer, Heidelberg (2019). https://doi.org/10.1007/978-3-030-21851-5
Molnar, C.: Interpretable machine learning. Lulu.com (2020)
Rokach, L.: Data mining with decision trees: theory and applications. World Scientific (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Ahmed, M.R., Myo, T., Al Baroomi, B., Marhaban, M.H., Kaiser, M.S., Mahmud, M. (2022). A Novel Framework to Detect Anomalous Nodes to Secure Wireless Sensor Networks. In: Mahmud, M., Ieracitano, C., Kaiser, M.S., Mammone, N., Morabito, F.C. (eds) Applied Intelligence and Informatics. AII 2022. Communications in Computer and Information Science, vol 1724. Springer, Cham. https://doi.org/10.1007/978-3-031-24801-6_35
Download citation
DOI: https://doi.org/10.1007/978-3-031-24801-6_35
Publisher Name: Springer, Cham
Online ISBN: 978-3-031-24801-6
eBook Packages: Computer ScienceComputer Science (R0)