Skip to main content
Log in

An Enhanced Anomaly Forecasting in Distributed Wireless Sensor Network Using Fuzzy Model

  • Published:
International Journal of Fuzzy Systems Aims and scope Submit manuscript

Abstract

Wireless sensor networks (WSNs) grieve from a wide range of limitations and aberrations which hinder their smooth functioning. Detecting anomaly in WSNs is a decisive research area, which emphasizes making sensor nodes to be reliable in handling data. Owing to energy restrictions and less computation capability of sensor networks, anomaly detection ought to concentrate on the fundamental limitations of sensor networks. Anomaly detection and dipping noisy data transmission are essential to recover the network life span of sensor networks by promising data integrity. Henceforth, academicians and researchers are frequently getting motivated in finding methods to improve the accuracy of data held by the sensor nodes. In such surroundings, the investigators focus on semi-supervised anomaly detection which uses real data to distinguish incidences that are conflicting with the widely-held data. The proposed idea is acquainted with a fuzzy-based anomaly detection model for semi-supervised anomaly detection in an effort to recover accuracy. The proposed model is compared with other leading existing procedures and methodology over robustness and other substantial metrics. Comparatively, our proposed prototype achieves a high-performance score with 99.70% accuracy, 99.14% precision, 99.27% detection rate, 98.56% specificity, 98.78% F1 score, and 0.8 correlation coefficient. It is detected that our proposed model diminishes false alarms up to 1.20% through detection which is a key concern in WSNs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  1. Can, O., Sahingoz, O.K.: A survey of intrusion detection systems in wireless sensor networks. In: 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO), Istanbul, Turkey, 27–29 May 2015, pp. 1–6

  2. Xie, M., Han, S., Tian, B., Parvin, S.: Anomaly detection in wireless sensor networks: a survey. J. Netw. Comput. Appl. 34(4), 1302–1325 (2011)

    Article  Google Scholar 

  3. Sheng, Z., Mahapatra, C., Zhu, C., Leung, V.: Recent advances in industrial wireless sensor networks towards efficient management in IoT. IEEE Access 3, 622–637 (2015)

    Article  Google Scholar 

  4. Wang, D., Xu, R., Hu, X., Su, W.: Energy-efficient distributed compressed sensing data aggregation for cluster-based underwater acoustic sensor networks. Int. J. Distrib. Sens. Netw. 2016, 1–14 (2016)

    Google Scholar 

  5. Ramotsoela, D., Abu-Mahfouz, A., Hancke, G.: Survey of anomaly detection in industrial wireless sensor networks with critical water system infrastructure as a case study. Sensors 18, 2491 (2018)

    Article  Google Scholar 

  6. Alsheikh, M.A., Lin, S., Niyato, D., Tan, H.P.: Machine learning in wireless sensor network: algorithm, strategies & application. IEEE Commun. Surv. Tutor. 16(4), 1996–2018 (2014)

    Article  Google Scholar 

  7. Rajasegarar, S., Leckie, C., Palaniswami, M.: Anomaly detection in wireless sensor networks. IEEE Wirel. Commun. 15, 34–40 (2008)

    Article  Google Scholar 

  8. Aggarwal, C.C., Yu, P.S.: Outlier detection for high dimensional data. ACM SIGMOD Rec. 30(2), 37–46 (2001)

    Article  Google Scholar 

  9. Feng, H., Liang, L., Lei, H.: Distributed outlier detection algorithm based on credibility feedback in wireless sensor networks. IET Commun. 11(8), 1291–1296 (2017)

    Article  Google Scholar 

  10. Abid, A., Kachouri, A., Mahfoudhi, A.: Outlier detection for wireless sensor networks using density-based clustering approach. IET Wirel. Sens. Syst. 7(4), 83–90 (2017)

    Article  Google Scholar 

  11. Titouna, C., Aliouat, M., Gueroui, M.: Outlier detection approach using Bayes classifiers in wireless sensor networks. Wirel. Pers. Commun. 85(3), 1009–1023 (2015)

    Article  Google Scholar 

  12. Chatzigiannakis, V., Papavassiliou, S., Grammatikou, M., Maglaris, B.: Hierarchical anomaly detection in distributed large-scale sensor networks. In: Proceedings of the 11th IEEE Symposia Computer Communications (ISCC), June 2006, pp. 761–767

  13. Xie, M., Hu, J., Han, S., Chen, H.-H.: Scalable hypergrid k-NN-based online anomaly detection in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 24(8), 1661–1670 (2013)

    Article  Google Scholar 

  14. Chen, S.-L., Fang, Y., Wu, Y.-D.: A new hybrid fuzzy clustering approach to Takagi–Sugeno fuzzy modeling. Int. J. Digit. Content Technol. Appl. 6(18), 341–348 (2012)

  15. Barakkath Nisha, U., Uma Maheswari, N., Venkatesh, R., Yasir Abdullah, R.: Improving data accuracy using proactive correlated fuzzy system in wireless sensor networks. KSII Trans. Internet Inf. Syst. 9(9), 3515–3537 (2015)

    Google Scholar 

  16. Kumaragea, H., Khalil, I., Tari, Z., Zomaya, A.: Distributed anomaly detection for industrial wireless sensor networks based on fuzzy data modeling. J. Parallel Distrib. Comput. 73, 790–806 (2013)

    Article  Google Scholar 

  17. Chen, J.-J., Fan, X.-P., Qu, Z.-H., Yang, X., Liu, S.-Q.: Subtractive clustering based clustering routing algorithm for wireless sensor networks. Inf. Control 37(4), 201–219 (2008)

    Google Scholar 

  18. Barakkath Nisha, U., Uma Maheswari, N., Venkatesh, R., Yasir Abdullah, R.: Fuzzy based flat anomaly diagnosis and relief measures in distributed wireless sensor network. Int. J. Fuzzy Syst. 19, 1528–1545 (2017)

    Article  Google Scholar 

  19. Barakkath Nisha, U., Uma Maheswari, N., Venkatesh, R., Yasir Abdullah, R.: Robust estimation of incorrect data using relative correlation clustering technique in wireless sensor networks. In: IEEE International Conference on Communication and Network Technologies, 2014, Issue 1, pp. 314–318 (2014)

  20. Vesanto, J., Alhoniemi, E.: Clustering of the self-organizing map. IEEE Trans. Neural Netw. 11(3), 586–600 (2000)

    Article  Google Scholar 

  21. Larabi-Marie-Sainte, S.: Outlier detection based feature selection exploiting bio-inspired optimization algorithms. J. Appl. Sci. 11, 6769 (2021)

    Article  Google Scholar 

  22. Erfani, S.M., Rajasegarar, S., Karunasekera, S., Leckie, C.: High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning. Pattern Recognit. 58, 121–134 (2016)

    Article  Google Scholar 

  23. Yasir Abdullah, R., Mary Posonia, A, and Barakkath Nisha, U.: An Adaptive mountain clustering-based anomaly detection for distributed wireless sensor networks. In: International Conference on Communication, Control and Information Sciences (ICCISc), 2021, pp. 1–6 (2021)

  24. Cannady, J.: An adaptive neural swarm approach for intrusion defense in ad hoc networks. In: SPIE Defense, Security, and Sensing, p. 80590P. International Society for Optics and Photonics, Washington, DC (2011)

  25. Martins, H., Palma, L., Cardoso, A., Gil, P.: A support vector machine-based technique for online detection of outliers in transient time series. In: Proceedings of the 10th Asian Control Conference (ASCC), Kota Kinabalu, Malaysia, June 2015, pp. 1–6

  26. Saeedi Emadi, H., Mazinani, S.M.: A novel anomaly detection algorithm using DBSCAN and SVM in wireless sensor networks. Wirel. Pers. Commun. 98, 2025–2035 (2018)

    Article  Google Scholar 

  27. Li, M., Sharma, A.: Abnormal data detection in sensor networks based on DNN algorithm and cluster analysis. J. Sens. 2022, 1718436 (2022)

    Google Scholar 

  28. Samara, M.A., Bennis, I., Abouaissa, A., Lorenz, P.: A survey of outlier detection techniques in IoT: review and classification. J. Sens. Actuator Netw. 11, 4 (2022). https://doi.org/10.3390/jsan11010004

    Article  Google Scholar 

  29. Liu, F., Cheng, X., Chen, D.: Insider attacker detection in wireless sensor networks. In: Proceedings of the International Conference on Computer Communications; Honolulu, HI, USA, 13–16 August 2007, pp. 1937–1945 (2007)

  30. Jang, J.-S.R., Sun, C.-T., Mizutani, E.: Neuro-fuzzy and Soft Computing: A Computational Approach to Learning and Machine Intelligence, p. 26. Prentice-Hall, Upper Saddle River (1997)

    Google Scholar 

  31. Kaski, S., Honkela, T., Lagus, K., Kohonen, T.: Websom, “Self-organizing maps of document collections.” Neurocomputing 1998(21), 101–117 (1998)

    Article  Google Scholar 

  32. Chaudhary, V., Bhatia, R.S., Ahlawat, A.K.: A novel Self-Organizing Map (SOM) learning algorithm with nearest and farthest neurons. Alex. Eng. J. 53(4), 827–831 (2014)

    Article  Google Scholar 

  33. Shanmugam, B., Idris, N.B.: Improved intrusion detection system using fuzzy logic for detecting anomaly and misuse type of attacks. In: International Conference of Soft Computing and Pattern Recognition, 2009, pp. 212–217 (2009)

  34. IBRL Dataset. http://db.csail.mit.edu/labdata/labdata.html. Accessed 12 Nov 2021

  35. ISSNIP Dataset. https://home.uncg.edu/cmp/downloads/lwsndr.html. Accessed 23 Nov 2021

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Yasir Abdullah.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yasir Abdullah, R., Mary Posonia, A. & Barakkath Nisha, U. An Enhanced Anomaly Forecasting in Distributed Wireless Sensor Network Using Fuzzy Model. Int. J. Fuzzy Syst. 24, 3327–3347 (2022). https://doi.org/10.1007/s40815-022-01349-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s40815-022-01349-1

Keywords

Navigation