skip to main content
10.1145/2185216.2185262acmconferencesArticle/Chapter ViewAbstractPublication PagesacwrConference Proceedingsconference-collections
research-article

Designing an efficient PCA based data model for wireless sensor networks

Authors Info & Claims
Published:18 December 2011Publication History

ABSTRACT

Recent technology in wireless communication has enabled the development of low-cost sensor networks. Sensors at different locations can generate streaming data, which can be analyzed in real-time to identify events of interest. Wireless sensor networks (WSNs) usually have limited energy and transmission capacity, which cannot match the transmission of a large number of data collected by sensor nodes. So, it is necessary to perform in-network data aggregation in the WSN which is performed by aggregator node. Since, the nodes in WSN are vulnerable to malicious attackers and physical impairment; the data collected in WSNs may be unreliable. So, in this paper, we propose an efficient model based technique to detect the unreliable data. Data model is designed using the sound statistical multivariate technique called Principal Component Analysis (PCA). But as a drawback, it is not robust to outliers. Hence, if the input data is corrupted, an arbitrarily wrong representation is obtained. To overcome this problem, we propose two approaches namely Minimum Volume Ellipsoid (MVE) and Minimum Covariance Determinant (MCD) to design robust PCA which aids in design of a noise-free data model. The performance of proposed approach is evaluated and compared with previous approaches and found that our approach is effective and efficient.

References

  1. B. Przydatek, D. Song, and A. Perrig, "SIA: Secure information aggregation in sensor networks," in Proc. 1st Int. Conf. Embedded Networked Sensor Syst., 2003, pp. 255--265. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Chitradevi, N.; Palanisamy, V.; Baskaran, K.; Nisha, U. B.; "Outlier aware Data Aggregation in Distributed Wireless Sensor Network using Robust Principal Component Analysis" Computing Communication and Networking Technologies (ICCCNT), 2010 IEEE International Conference, pp: 1--9, 2010.Google ScholarGoogle Scholar
  3. E. Shi and A. Perrig "Designing secure sensor networks," Wireless Commun. vol. 11, no. 6, pp. 38--43, Dec 2004 Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Fenxiong Chen; Fei Wen; Hongdong Jia;" Algorithm of Data Compression Based on Multiple Principal Component Analysis over the WSN" Wireless Communications Networking and Mobile Computing (WiCOM), IEEE Conference pp: 1--4, 2010.Google ScholarGoogle Scholar
  5. F. Y. Luo, H. S. Lu, and L. Zhang, "Statistical en-route filtering of injected false data in sensor networks," IEEE J. Sel. Areas Commun., vol. 23, no. 4, pp. 839--850, Apr. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. G. Wang, W. Zhang, G. Cao, and T. La Porta, "On supporting distributed collaboration in sensor networks," in Proc. IEEE MilitaryCommun. Conf., Oct. 2003, vol. 2, pp. 752--757. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Harkat M. F., Mourot G. and Ragot J., "Sensor Failure Detection of Air Quality Monitoring Network", IFAC Symposium on Fault Detection, SAFERPROCESS, Hungary, June 14--16, 2000.Google ScholarGoogle ScholarCross RefCross Ref
  8. I. T. Jollife, Principal Component Analysis, 2nd ed. New York: Springer, 2002.Google ScholarGoogle Scholar
  9. J. E. Jackson and G. S. Mudholkar, "Control procedures for residuals associated with principal component analysis," Technometrics, pp. 341--349, 1979.Google ScholarGoogle ScholarCross RefCross Ref
  10. J. E. Jackson, A User's Guide to Principal Components. New York:Wiley, 2003.Google ScholarGoogle Scholar
  11. J. Newsome, E. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: Analysis & defenses," in Proc. 3rd Int. Symp. Inf. Process. Sensor Netw., 2004, pp. 259--268. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Livani, M. A.; Abadi, M, "A PCA-based Distributed Approach for Intrusion Detection in Wireless Sensor Networks" Computer Networks and Distributed Systems (CNDS), International Symposium, IEEE, 2011, pp: 55--60, 2011.Google ScholarGoogle Scholar
  13. M. C. Vuran, B. Akan, and I. F. Akyildiz, "Spatio-temporal correlation: Theory and applications for wireless sensor networks," Compute Networks:Int. J. Comput. Telecommun. Netw., vol. 45, no. 3, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. P.J. Rousseeuw, K. Van Driessen, A fast algorithm for minimum covariance determinant estimator, Technometrics 41 (1999) pp:212--223 Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. R. Dunia and S. J. Qin, "A subspace approach to multidimensional fault identification and reconstruction," Amer. Inst. Chem. Eng. J., pp. 1813--1831, 1998.Google ScholarGoogle ScholarCross RefCross Ref
  16. Rooshenas, A.; Rabiee, H. R.; Movaghar, A.; Naderi, M. Y.; "Reducing the data transmission in wireless sensor networks using the Principal Component Analysis" Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp: 133--138, 2011.Google ScholarGoogle Scholar
  17. Rousseeuw, P. J., and Leory, A. M. "Robust Regression and Outlier Detection", New York: Wiley, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Rousseeuw, P. J, "Multivariate estimation with hig breakdown point", In Matematical Statistics and Applications, pp: 283--297, 1985.Google ScholarGoogle ScholarCross RefCross Ref
  19. S. Pattem, B. Krishnmachari, and R. Govindan, "The Impact of spatial correlation on routing with compression in wireless sensor networks," in Proc. 3rd Int.Symp.Inf. Processi.SensorNetw., 2004, pp. 28--35. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. S. Tanachaiwiwat and A. Helmy, "Correlation analysis for alleviating effects of inserted data in wireless sensor networks," in Proc. Mobileand Ubiquitous Syst.: Networking Services, 2005, pp. 97--108. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Silva, O.; Aquino, A. L. L.; Mini, R. A. F.; Figueiredo, C. M. S.; "Multivariate Reduction in Wireless Sensor Networks" Computers and Communications, IEEE Symposium pp: 726--729, 2009Google ScholarGoogle Scholar
  22. T. Palpamas, "Distributed deviation detection in sensor networks," in Proc.ACM SIGMOD, 2003, vol. 32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. V. Chatzigiannakis and S. Papavassiliou, "Diagnosing anomalies and identifYing faulty nodes in sensor networks," IEEE Sensors Journal, vol. 7, no. 5, pp. 637--645, May 2007.Google ScholarGoogle ScholarCross RefCross Ref
  24. V. Chatzigiannakis, S. Papavassiliou, Grammatikou, Maglaris, "Hierarchical Anomaly Detection in Distributed Large-scale Sensor Networks" Computers and Communications, IEEE Conference, 2006, pp:761--767. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    ACWR '11: Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief
    December 2011
    517 pages
    ISBN:9781450310116
    DOI:10.1145/2185216

    Copyright © 2011 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 18 December 2011

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader