Skip to main content
Log in

A Novel Anomaly Detection Algorithm Using DBSCAN and SVM in Wireless Sensor Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Anomaly is an important and influential element in Wireless Sensor Networks that affects the integrity of data. On account of the fact that these networks cannot be supervised, this paper, therefore, deals with the problem of anomaly detection. First, the three features of temperature, humidity, and voltage are extracted from the network traffic. Then, network data are clustered using the density-based spatial clustering of applications with noise (DBSCAN) algorithm. It also analyzes the accuracy of DBSCAN algorithm input data with the help of density-based detection techniques. This algorithm detects the points in regions with low density as anomaly. By using normal data, it trains support vector machine. And, finally, it removes anomalies from network data. The proposed algorithm is evaluated by the standard and general data set of Intel Berkeley Research lab (IRLB). In this paper, we could obliterate DBSCAN’s problem in selecting input parameters by benefiting from coefficient correlation. The advantage of the proposed algorithm over previous ones is in using soft computing methods, simple implementation, and improving detection accuracy through simultaneous analysis of those three features.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Yick, J., Mukherjee, B., & Ghosal, D. (2008). Wireless sensor network survey. Computer Networks, 52(12), 2292–2330.

    Article  Google Scholar 

  2. Xie, M., Han, S., Tian, B., & Parvin, S. (2011). Anomaly detection in wireless sensor networks: A survey. Journal of Network and Computer Applications, 34(4), 1302–1325.

    Article  Google Scholar 

  3. Liu, F., Cheng, X., & Chen, D. (2007). Insider attacker detection in wireless sensor networks. In Proceedings INFOCOM’07 (pp. 1937–1945).

  4. Xie, M., Hu, J., & Tian, B. (2012). Histogram-based online anomaly detection in hierarchical wireless sensor networks. In Proceedings of IEEE 11th international conference trust, security and privacy in computing and communications (TrustCom) (pp. 751–759).

  5. Xie, M., Hu, J., Han, S., & Chen, H.-H. (2013). Scalable hypergrid KNN-based online anomaly detection in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 24(8), 1661–1670.

    Article  Google Scholar 

  6. Subramaniam, S, Palpanas, T., Papadopoulos, D., Kalogeraki, V., & Gunopulos, D. (2006) Online outlier detection in sensor data using non-parametric models. In Proceedings 32nd international conference very large data bases (pp. 187–198).

  7. Rajasegarar, S., Leckie, C., Bezdek, J. C., & Palaniswami, M. (2010). Centered hyperspherical and hyperellipsoidal one-class support vector machines for anomaly detection in sensor networks. IEEE Transactions on Information Forensics and Security, 5(3), 518–533.

    Article  Google Scholar 

  8. Xie, M., Hu, H., & Guo, S. (2015). Segment-based anomaly detection with approximated sample covariance matrix in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 26(2), 574–583.

    Article  Google Scholar 

  9. Parimala, M., Lopez, D., & Senthilkumar, N. C. (2011). A survey on density based clustering algorithms for mining large spatial databases. International Journal of Advanced Science and Technology, 31(1), 59–66.

    Google Scholar 

  10. http://db.csail.mit.edu/labdata/labdata.html.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sayyed Majid Mazinani.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Saeedi Emadi, H., Mazinani, S.M. A Novel Anomaly Detection Algorithm Using DBSCAN and SVM in Wireless Sensor Networks. Wireless Pers Commun 98, 2025–2035 (2018). https://doi.org/10.1007/s11277-017-4961-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-4961-1

Keywords

Navigation