Skip to main content

Advertisement

Log in

Anomaly detection and foresight response strategy for wireless sensor networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Anomaly detection is an important challenge in wireless sensor networks (WSNs) for fault diagnosis and intrusion detection applications. Sensor nodes are usually designed to be small and inexpensive, so they have limited capabilities, such as limited computational power, memory and energy. This paper presents novel light-weight distributed anomaly detection and a foresight response strategy based on support vector data description (SVDD) for wireless sensor network. SVDD could sometimes generate such a loose decision boundary, when some noisy samples (outliers) exist in the training set. In addition, it requires the solution of a computationally intensive quadratic programming approach which is not applicable in WSNs. Hence, we modified the standard version of SVDD, and proposed the Linear Programming-based Fuzzy-Constraint SVDD (LP-FCSVDD) method to detect the outliers with more accuracy in acceptable time. Then we present a foresight response strategy to resist the intentional, unintentional and false anomalies. The overall experiments show prominence of our proposed method to achieve high detection accuracies on a variety of real and synthetic wireless sensor network datasets.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Xie, M., Han, S., Tian, B., et al. (2011). Anomaly detection in wireless sensor networks: A survey. Journal of Network and Computer Applications, 34(4), 1302–1325.

    Article  Google Scholar 

  2. Anwar, R. W., Bakhtiari, M., Zainal, A., et al. (2014). Security issues and attacks in wireless sensor network. World Applied Sciences Journal, 30(10), 1224–1227.

    Google Scholar 

  3. Alrajeh, N. A., Khan, S., & Shams, B. (2013). Intrusion detection systems in wireless sensor networks: A review. International Journal of Distributed Sensor Networks, 2013, 1–7.

  4. Butun, I., & Sankar, R. (2011). A brief survey of access control in wireless sensor networks. In Consumer communications and networking conference (CCNC), pp. 11181119.

  5. Scarfone, K., & Mell, P. (2007). Guide to intrusion detection and prevention systems (IDPS). NIST Special Publication, 800(2007), 94.

    Google Scholar 

  6. Abduvaliyev, A., Pathan, A.-S. K., Zhou, J., et al. (2013). On the vital areas of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys and Tutorials, 15(3), 1223–1237.

    Article  Google Scholar 

  7. Khan, L., Awad, M., & Thuraisingham, B. (2007). A new intrusion detection system using support vector machines and hierarchical clustering. The VLDB Journal—The International Journal on Very Large Data Bases, 16(4), 507–521.

    Article  Google Scholar 

  8. Zheng, J., & Hu, M.-Z. (2005). Intrusion detection of DoS/DDoS and probing attacks for web services. Advances in Web-Age Information Management (pp. 333–344). Berlin: Springer.

    Book  Google Scholar 

  9. Ghosh, A. K. & Schwartzbard, A. (1999). A study in using neural networks for anomaly and misuse detection. Proceedings of the 8th conference on USENIX Security Symposium, Washington, DC.

  10. Rajasegarar, S., Leckie, C., & Palaniswami, M. (2008). Anomaly detection in wireless sensor networks. IEEE Wireless Communications, 15(4), 34–40.

    Article  Google Scholar 

  11. Zamani, M. (2013). Machine learning techniques for intrusion detection. arXiv preprint arXiv:1312.2177.

  12. Dua, S., & Du, X. (2014). Data mining and machine learning in cybersecurity. Baco Racton: CRC Press.

    Google Scholar 

  13. Butun, I., Morgera, S., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE Communication Surveys & Tutorials, 16(1), 266–282.

    Article  Google Scholar 

  14. Zhang, Y., Meratnia, N., & Havinga, P. (2010). Outlier detection techniques for wireless sensor networks: A survey. IEEE Communications Surveys & Tutorials, 12(2), 159–170.

    Article  Google Scholar 

  15. Van Phuong, T., Hung, L. X., Cho, S. J., et al. (2006). An anomaly detection algorithm for detecting attacks in wireless sensor networks. Intelligence and Security Informatics, 3975, 735–736.

    Google Scholar 

  16. Tax, D. M., & Duin, R. P. (1999). Support vector domain description. Pattern Recognition Letters, 20(11), 1191–1199.

    Article  Google Scholar 

  17. Guo, S.-M., Chen, L.-C., & Tsai, J. S. H. (2009). A boundary method for outlier detection based on support vector domain description. Pattern Recognition, 42(1), 77–83.

    Article  MATH  Google Scholar 

  18. da Silva, A. P. R., Martins, M. H., Rocha, B. P. et al. (2005) Decentralized intrusion detection in wireless sensor networks In Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks. Montreal, Canada, pp. 16–23.

  19. Ioannis, K., Dimitriou, T., & Freiling, F. C. (2007) Towards intrusion detection in wireless sensor networks. In Proceeding of the 13th European Wireless Conference, Paris, France.

  20. Karapistoli, E., & Economides, A. A. (2014). ADLU: a novel anomaly detection and location-attribution algorithm for UWB wireless sensor networks. EURASIP Journal on Information Security, 2014(1), 1–12.

    Article  Google Scholar 

  21. Palpanas, T., Papadopoulos, D., Kalogeraki, V., et al. (2003). Distributed deviation detection in sensor networks. ACM SIGMOD Record, 32(4), 77–82.

    Article  Google Scholar 

  22. Ngai, E.-H., Liu, J., & Lyu, M. R. (2006). On the intruder detection for sinkhole attack in wireless sensor networks. In Proceedings of the 2006 IEEE international conference on communications (ICC’06). Istanbul, Turkey, pp. 3383–3389.

  23. Onat, I., & Miri, A. (2005) A real-time node-based traffic anomaly detection algorithm for wireless sensor networks. In Proceedings of systems communications, Montreal, Canada, pp. 422–427.

  24. Li, G., He, J., & Fu, Y. (2008). Group-based intrusion detection system in wireless sensor networks. Computer Communications, 31(18), 4324–4332.

    Article  Google Scholar 

  25. Siripanadorn, S., Hattagam, W., & Teaumroong, N. (2010). Anomaly detection in wireless sensor networks using self-organizing map and wavelets. International Journal of Communications, 4(3), 74–83.

    Google Scholar 

  26. Branch, J. W., Giannella, C., Szymanski, B., et al. (2013). In-network outlier detection in wireless sensor networks. Knowledge and Information Systems, 34(1), 23–54.

    Article  Google Scholar 

  27. OReilly, C., Gluhak, A., Imran, M., et al. (2014). Anomaly detection in wireless sensor networks in a non-stationary environment. IEEE Communications Surveys and Tutorials, 16(3), 1413–1432.

    Article  Google Scholar 

  28. Moshtaghi, M., Leckie, C., Karunasekera, S., et al. (2014). An adaptive elliptical anomaly detection model for wireless sensor networks. Computer Networks, 64, 195–207.

    Article  Google Scholar 

  29. Salem, O., Guerassimov, A., Mehaoua, A., et al. (2013). Anomaly detection scheme for medical wireless sensor networks. In B. Furht & A. Agarwal (Eds.), Handbook of medical and healthcare technologies (pp. 207–222). New York: Springer.

    Chapter  Google Scholar 

  30. Zhang, Y., Meratnia, N., & Havinga, P. J. (2013). Distributed online outlier detection in wireless sensor networks using ellipsoidal support vector machine. Ad Hoc Networks, 11(3), 1062–1074.

    Article  Google Scholar 

  31. Rajasegarar, S., Leckie, C., & Palaniswami, M. (2014). Hyperspherical cluster based distributed anomaly detection in wireless sensor networks. Journal of Parallel and Distributed Computing, 74(1), 1833–1847.

    Article  Google Scholar 

  32. Salmon, H. M., de Farias, C. M., Loureiro, P., et al. (2013). Intrusion detection system for wireless sensor networks using danger theory immune-inspired techniques. International Journal of Wireless Information Networks, 20(1), 39–66.

    Article  Google Scholar 

  33. Ahmadi Livani, M., & Abadi, M. (2011) A PCA-based distributed approach for intrusion detection in wireless sensor networks. In Proceedings of the 2011 international symposium on computer networks and distributed systems (CNDS), Tehran, Iran, pp. 55–60.

  34. Wang, H.-B, Yuan, Z., Wang, C.-D. (2009). Intrusion detection for wireless sensor networks based on multi-agent and refined clustering. In International conference on communications and mobile computing, Kunming, Yunnan, China, pp. 450–454.

  35. Rajasegarar, S., Leckie, C., Palaniswami, M. et al. (2006). Distributed anomaly detection in wireless sensor networks. In 10th IEEE singapore international conference on communication systems, Singapore, pp. 1–5.

  36. S. Rajasegarar, C. Leckie, M. Palaniswami et al. (2007) Quarter sphere based distributed anomaly detection in wireless sensor networks. In: IEEE International Conference on Communications (ICC’07), Glasgow, Scotland, pp. 3864–3869.

  37. Rajasegarar, S., Leckie, C., Bezdek, J. C., et al. (2010). Centered hyperspherical and hyperellipsoidal one-class support vector machines for anomaly detection in sensor networks. IEEE Transactions on Information Forensics and Security, 5(3), 518–533.

    Article  Google Scholar 

  38. Tax, D. M. & Duin R. P. (2000) Data description in subspaces. In Proceedings of 15th international conference on pattern recognition, Barcelona, Spain, pp. 672–675.

  39. Tax, D. M., & Duin, R. P. (2004). Support vector data description. Machine Learning, 54(1), 45–66.

    Article  MATH  Google Scholar 

  40. Schölkopf, B., Smola, A., & Müller, K.-R. (1998). Nonlinear component analysis as a kernel eigenvalue problem. Neural Computation, 10(5), 1299–1319.

    Article  Google Scholar 

  41. Laskov, P., Schäfer, C., Kotenko, I., et al. (2004). Intrusion detection in unlabeled data with quarter-sphere support vector machines. Praxis der Informationsverarbeitung und Kommunikation, 27(4), 228–236.

    Article  Google Scholar 

  42. Song, M. & He, B. (2007). Capacity analysis for flat and clustered wireless sensor networks. In International conference on wireless algorithms, systems and applications, Chicago, Illinois, USA, pp. 249–253.

  43. Khachiyan, L. G. (1980). Polynomial algorithms in linear programming. USSR Computational Mathematics and Mathematical Physics, 20(1), 53–72.

    Article  MATH  MathSciNet  Google Scholar 

  44. Griva, I., Nash, S. G., & Sofer, A. (2009). Linear and nonlinear optimization: Siam.

  45. Megiddo, N. (1984). Linear programming in linear time when the dimension is fixed. Journal of the ACM (JACM), 31(1), 114–127.

    Article  MATH  MathSciNet  Google Scholar 

  46. IBRL dataset. (2012). http://db.lcs.mit.edu/labdata/labdata.html

  47. Szewczyk, R., Mainwaring, A., Polastre, J. et al. (2004) An analysis of a large scale habitat monitoring application. In Proceedings of the 2nd international conference on Embedded networked sensor systems, Baltimore, Maryland, USA, pp. 214–226.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammad GhasemiGol.

Appendix

Appendix

See Tables 7 and 8.

Table 7 LP-FCSVDD results for sensor node 1 in the IBRL dataset in each time window
Table 8 LP-FCSVDD results for sensor node 101 in the GDI dataset in each time window

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

GhasemiGol, M., Ghaemi-Bafghi, A., Yaghmaee-Moghaddam, M.H. et al. Anomaly detection and foresight response strategy for wireless sensor networks. Wireless Netw 21, 1425–1442 (2015). https://doi.org/10.1007/s11276-014-0858-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-014-0858-z

Keywords

Navigation