skip to main content
research-article

Elliptical anomalies in wireless sensor networks

Published:05 January 2010Publication History
Skip Abstract Section

Abstract

Anomalies in wireless sensor networks can occur due to malicious attacks, faulty sensors, changes in the observed external phenomena, or errors in communication. Defining and detecting these interesting events in energy-constrained situations is an important task in managing these types of networks. A key challenge is how to detect anomalies with few false alarms while preserving the limited energy in the network. In this article, we define different types of anomalies that occur in wireless sensor networks and provide formal models for them. We illustrate the model using statistical parameters on a dataset gathered from a real wireless sensor network deployment at the Intel Berkeley Research Laboratory. Our experiments with a novel distributed anomaly detection algorithm show that it can detect elliptical anomalies with exactly the same accuracy as that of a centralized scheme, while achieving a significant reduction in energy consumption in the network. Finally, we demonstrate that our model compares favorably to four other well-known schemes on four datasets.

References

  1. Akyildiz, I., Su, W., Sankarasubramaniam, Y., and Cayirci, E. 2002. Wireless sensor networks: A survey. Comput. Netw. 38, 4, 393--422. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Barnett, V. and Lewis, T. 1994. Outliers in Statistical Data 3rd Ed. John Wiley and Sons.Google ScholarGoogle Scholar
  3. Bettencourt, L. M. A., Hagberg, A. A., and Larkey, L. B. 2007. Separating the wheat from the chaff: Practical anomaly detection schemes in ecological applications of distributed sensor networks. In Proceedings of the 3rd IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS). 223--239. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Bezdek, J. C., Pal, M. R., Keller, J., and Krisnapuram, R. 1999. Fuzzy Models and Algorithms for Pattern Recognition and Image Processing. Kluwer Academic Publishers, Norwell, MA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Bondarenko, O., Kininmonth, S., and Kingsford, M. 2007. Underwater sensor networks, oceanography and plankton assemblages. In Proceedings of the International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP). 657--662.Google ScholarGoogle Scholar
  6. Branch, J., Szymanski, B., Giannella, C., Wolff, R., and Kargupta, H. 2006. In-Network outlier detection in wireless sesnor networks. In Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Buonadonna, P., Gay, D., Hellerstein, J., Hong, W., and Madden, S. 2005. Task: Sensor network in a box. In Proceedings of the 2nd European Workshop on Wireless Sensor Networks. 133--144.Google ScholarGoogle Scholar
  8. CC2420-Web. 2008. http://focus.ti.com/lit/ds/symlink/cc2420.pdf.Google ScholarGoogle Scholar
  9. Chatzigiannakis, V. and Papavassiliou, S. 2007. Diagnosing anomalies and identifying faulty nodes in sensor networks. IEEE Sensors J. 7, 5, 637--645.Google ScholarGoogle ScholarCross RefCross Ref
  10. Chohan, N. 2007. Hardware assisted compression in wireless sensor networks. www.cs.ucsb.edu/~nchohan/docs/hadcwsnProgressReport.pdf.Google ScholarGoogle Scholar
  11. Crossbow-Web. 2008. http://www.xbow.com/Products/productdetails.aspx?sid=156.Google ScholarGoogle Scholar
  12. Dave, R. and Krishnapuram, R. 1997. Robust clustering methods: A unified view. IEEE Trans. Fuzzy Syst. 5, 2, 270--293. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Deshpande, A., Guestrin, C., and Madden, S. 2005. Using probabilistic models for data management in acquitional environment. In Proceedings of the 2nd Biennial Conference on Innovative Data Systems Research (CIDR). 317--328.Google ScholarGoogle Scholar
  14. Drozda, M., Schaust, S., and Szczerbicka., H. 2007a. Is AIS based misbehavior detection suitable for wireless sensor networks? In Proceedings of the IEEE Wireless Communications and Networking Conference.Google ScholarGoogle Scholar
  15. Drozda, M., Schaust, S., and Szczerbicka, H. 2007b. AIS for misbehavior detection in wireless sensor networks: Performance and design principles. In Proceedings of the IEEE Congress on Evolutionary Computation (CEC). 3719--3726.Google ScholarGoogle Scholar
  16. Du, W., Fang, L., and Peng, N. 2006. LAD: Localization anomaly detection for wireless sensor networks. J. Parallel Distrib. Comput. 66, 7, 874--886. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Duda, R. O., Hart, P. E., and Stork, D. G. 2001. Pattern Classification 2 Ed. John Wiley and Sons Inc. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Frigui, H. and Krishnapuram, R. 1997. Clustering by competitive agglomeration. Pattern Recogn. 30, 7, 1109--1119. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Frigui, H. and Krishnapuram, R. 1999. A robust competitive clustering algorithm with applications in computer vision. IEEE Trans. Pattern Anal. Mach. Intell. 21, 5, 450--465. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. GBR-Project. 2007. http://www.issnip.unimelb.edu.au/research_program/sensor_networks/core_%technologies/anomaly_detection/anomaly_detection_in_wsn.Google ScholarGoogle Scholar
  21. Hodge, V. and Austin, J. 2004. A survey of outlier detection methodologies. In Artificial Intelligence Review. Springer Netherlands, 85--126. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. IBRL-Web. 2006. http://db.lcs.mit.edu/labdata/labdata.html.Google ScholarGoogle Scholar
  23. IMote2-Web. 2008. http://www.xbow.com/Products/productdetails.aspx?sid=253.Google ScholarGoogle Scholar
  24. Johnson, R. A. and Wichern, D. W. 1988. Applied Multivariate Statistical Analysis. Prentice Hall. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Kelly, P. 1994. An algorithm for merging hyperellipsoidal clusters. Tech. rep. LA-UR-94-3306, Los Alamos National Laboratory.Google ScholarGoogle Scholar
  26. Kininmonth, S., Bainbridge, S., Atkinson, I., Gill, E., Barral, L., and Vidaud, R. 2004. Sensor networking the great barrier reef. Spatial Sci. QLD J. 34--38.Google ScholarGoogle Scholar
  27. Knorr, E. M. and Ng, R. T. 1998. Algorithms for mining distance based outliers in large datasets. In Proceedings of the 24th International Conference on Very Large Data Bases (VLDB). 392--403. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Kotidis, Y., Deligiannakis, A., Stoumpos, V., Vassalos, V., and Delis, A. 2007. Robust management of outliers in sensor nerwork aggregate queries. In Proceedings of the 6th International ACM Workshop on Data Engineering for Wireless and Mobile Access (MobiDE). Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Lazos, L. and Poovendran, R. 2005. Serloc: Robust localization for wireless sensor networks. ACM Trans. Sensor Netw. 1, 1, 73--100. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Liu, D., Ning, P., and Du, W. 2005. Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. In Proceedings of the 25th IEEE International Conference on Distributed Computing Systems. 609--619. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Loo, C., Ng, M., Leckie, C., and Palaniswami, M. 2006. Intrusion detection for routing attacks in sensor networks. Int. J. Distrib. Sensor Netw. 2, 4, 313--332.Google ScholarGoogle ScholarCross RefCross Ref
  32. Markos, M. and Sameer, S. 2003. Novelty detection: A review part 1: Statistical approaches. Signal Proc. 83, 12, 2481--2497. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Mathur, G., Desnoyers, P., Ganesan, D., and Shenoy, P. 2006. Ultra low power data storage for sensor networks. In Proceedings of the 5th Intlrnational Conference on Information Processing in Sensor Networks. ACM Press, New York, 374--381. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Paladugu, K., Santhanam, L., Xie, B., and Agrawal, D. P. 2007. Dclad: Distributed cluster based localization anomaly detection in wireless sensor networks using single mobile beacon. In Proceedings of the IEEE Military Communications Conference (MILCOM). 1--7.Google ScholarGoogle Scholar
  35. Papadimitriou, S., Kitagawa, H., Gibbons, P., and Faloutsos, C. 2003. LOCI: Fast outlier detection using the local correlation integral. In Proceedings of 19th International Conference on Data Engineering. 315--326.Google ScholarGoogle Scholar
  36. Perrig, A., Stankovic, J., and Wagner, D. 2004. Security in wireless sensor networks. Commun. ACM 47, 6, 53--57. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Petrovskiy, M. I. 2003. Outlier detection algorithms in data mining systems. Program. Comput. Softw. 29, 4, 228--237. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Pottie, G. J. and Kaiser, W. J. 2000. Wireless integrated network sensors. Comm. ACM 43, 5, 51--58. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Raghunathan, V., Schurgers, C., Park, S., and Srivastava, M.B. 2002. Energyaware wireless microsensor networks. IEEE Signal Proces. Mag.Google ScholarGoogle ScholarCross RefCross Ref
  40. Rajasegarar, S., Gubbi, J., Bondarenko, O., Kininmonth, S., Marusic, S., Bainbridge, S., Atkinson, I., and Palaniswami, M. 2008a. Sensor network implementation challenges in the great barrier reef marine environment. In Proceedings of the SENSEI-ISSNIP Workshop alongside ICT Mobile Summit.Google ScholarGoogle Scholar
  41. Rajasegarar, S., Leckie, C., and Palaniswami, M. 2008b. Anomaly detection in wireless sensor networks. IEEE Wirel. Commun. Mag. 15, 4, 34--40. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Rajasegarar, S., Leckie, C., and Palaniswami, M. 2008c. CESVM: Centered hyperellipsoidal support vector machine based anomaly detection. In Proceedings of the IEEE International Conference on Communications (ICC). 1610--1614.Google ScholarGoogle Scholar
  43. Rajasegarar, S., Leckie, C., Palaniswami, M., and Bezdek, J. 2006. Distributed anomaly detection in wireless sensor networks. In Proceedings of the IEEE International Conference on Communications Systems (ICCS).Google ScholarGoogle Scholar
  44. Rajasegarar, S., Leckie, C., Palaniswami, M., and Bezdek, J. C. 2007. Quarter sphere based distributed anomaly detection in wireless sensor networks. In Proceedings of the IEEE International Conference on Communications (ICC). 3864--3869.Google ScholarGoogle Scholar
  45. Srinivasan, A. and Wu, J. 2008. A survey on secure localization in wireless sensor networks. Encyclopedia of Wireless and Mobile Communications. To appear. http://www.cse.fau.edu/~jie/research/publications/Publication_files/BookChapter_SurveyOnSecureLocalizationInWirelessSensorNetworks.pdf.Google ScholarGoogle Scholar
  46. Subramaniam, S., Palpanas, T., Papadopoulos, D., Kalogeraki, V., and Gunopulos, D. 2006. Online outlier detection in sensor data using non-parametric models. In Proceedings of the 32nd International Conference on Very Large Data Bases (VLDB). 187--198. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Szewczyk, R., Osterweil, E., Polastre, J., Hamilton, M., Mainwaring, A., and Estrin, D. 2004. Habitat monitoring with sensor networks. Commun. ACM. 47, 34--40. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. TinyOS-Web. 2008. http://www.tinyos.net/tinyos-2.x/doc/html/tep126.html.Google ScholarGoogle Scholar
  49. Wark, T., Crossman, C., Hu, W., Guo, Y., Valencia, P., Sikka, P., Corke, P., Lee, C., Henshall, J., Prayaga, K., O'Grady, J., Reed, M., and Fisher, A. 2007. The design and evaluation of a mobile sensor/actuator network for autonomous animal control. In Proceedings of the 6th International Conference on Information Processing in Sensor Networks (IPSN). ACM Press, New York, 206--215. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Younis, O. and Fahmy, S. 2004. Distributed clustering in ad-hoc sensor networks: A hybrid, energy-efficient approach. In Proceedings of IEEE InfoCom. Vol. 1. 640.Google ScholarGoogle Scholar
  51. Zhao, F., Liu, J., Liu, J., Guibas, L., and Reich, J. 2003. Collaborative signal and information processing: An information-directed approach. Proc. IEEE 91, 8, 1199--1209.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Elliptical anomalies in wireless sensor networks

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM Transactions on Sensor Networks
            ACM Transactions on Sensor Networks  Volume 6, Issue 1
            December 2009
            258 pages
            ISSN:1550-4859
            EISSN:1550-4867
            DOI:10.1145/1653760
            Issue’s Table of Contents

            Copyright © 2010 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 5 January 2010
            • Revised: 1 December 2008
            • Accepted: 1 December 2008
            • Received: 1 October 2007
            Published in tosn Volume 6, Issue 1

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader