Abstract
Wireless sensor networks (WSNs) grieve from a wide range of limitations and aberrations which hinder their smooth functioning. Detecting anomaly in WSNs is a decisive research area, which emphasizes making sensor nodes to be reliable in handling data. Owing to energy restrictions and less computation capability of sensor networks, anomaly detection ought to concentrate on the fundamental limitations of sensor networks. Anomaly detection and dipping noisy data transmission are essential to recover the network life span of sensor networks by promising data integrity. Henceforth, academicians and researchers are frequently getting motivated in finding methods to improve the accuracy of data held by the sensor nodes. In such surroundings, the investigators focus on semi-supervised anomaly detection which uses real data to distinguish incidences that are conflicting with the widely-held data. The proposed idea is acquainted with a fuzzy-based anomaly detection model for semi-supervised anomaly detection in an effort to recover accuracy. The proposed model is compared with other leading existing procedures and methodology over robustness and other substantial metrics. Comparatively, our proposed prototype achieves a high-performance score with 99.70% accuracy, 99.14% precision, 99.27% detection rate, 98.56% specificity, 98.78% F1 score, and 0.8 correlation coefficient. It is detected that our proposed model diminishes false alarms up to 1.20% through detection which is a key concern in WSNs.
Similar content being viewed by others
References
Can, O., Sahingoz, O.K.: A survey of intrusion detection systems in wireless sensor networks. In: 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO), Istanbul, Turkey, 27–29 May 2015, pp. 1–6
Xie, M., Han, S., Tian, B., Parvin, S.: Anomaly detection in wireless sensor networks: a survey. J. Netw. Comput. Appl. 34(4), 1302–1325 (2011)
Sheng, Z., Mahapatra, C., Zhu, C., Leung, V.: Recent advances in industrial wireless sensor networks towards efficient management in IoT. IEEE Access 3, 622–637 (2015)
Wang, D., Xu, R., Hu, X., Su, W.: Energy-efficient distributed compressed sensing data aggregation for cluster-based underwater acoustic sensor networks. Int. J. Distrib. Sens. Netw. 2016, 1–14 (2016)
Ramotsoela, D., Abu-Mahfouz, A., Hancke, G.: Survey of anomaly detection in industrial wireless sensor networks with critical water system infrastructure as a case study. Sensors 18, 2491 (2018)
Alsheikh, M.A., Lin, S., Niyato, D., Tan, H.P.: Machine learning in wireless sensor network: algorithm, strategies & application. IEEE Commun. Surv. Tutor. 16(4), 1996–2018 (2014)
Rajasegarar, S., Leckie, C., Palaniswami, M.: Anomaly detection in wireless sensor networks. IEEE Wirel. Commun. 15, 34–40 (2008)
Aggarwal, C.C., Yu, P.S.: Outlier detection for high dimensional data. ACM SIGMOD Rec. 30(2), 37–46 (2001)
Feng, H., Liang, L., Lei, H.: Distributed outlier detection algorithm based on credibility feedback in wireless sensor networks. IET Commun. 11(8), 1291–1296 (2017)
Abid, A., Kachouri, A., Mahfoudhi, A.: Outlier detection for wireless sensor networks using density-based clustering approach. IET Wirel. Sens. Syst. 7(4), 83–90 (2017)
Titouna, C., Aliouat, M., Gueroui, M.: Outlier detection approach using Bayes classifiers in wireless sensor networks. Wirel. Pers. Commun. 85(3), 1009–1023 (2015)
Chatzigiannakis, V., Papavassiliou, S., Grammatikou, M., Maglaris, B.: Hierarchical anomaly detection in distributed large-scale sensor networks. In: Proceedings of the 11th IEEE Symposia Computer Communications (ISCC), June 2006, pp. 761–767
Xie, M., Hu, J., Han, S., Chen, H.-H.: Scalable hypergrid k-NN-based online anomaly detection in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 24(8), 1661–1670 (2013)
Chen, S.-L., Fang, Y., Wu, Y.-D.: A new hybrid fuzzy clustering approach to Takagi–Sugeno fuzzy modeling. Int. J. Digit. Content Technol. Appl. 6(18), 341–348 (2012)
Barakkath Nisha, U., Uma Maheswari, N., Venkatesh, R., Yasir Abdullah, R.: Improving data accuracy using proactive correlated fuzzy system in wireless sensor networks. KSII Trans. Internet Inf. Syst. 9(9), 3515–3537 (2015)
Kumaragea, H., Khalil, I., Tari, Z., Zomaya, A.: Distributed anomaly detection for industrial wireless sensor networks based on fuzzy data modeling. J. Parallel Distrib. Comput. 73, 790–806 (2013)
Chen, J.-J., Fan, X.-P., Qu, Z.-H., Yang, X., Liu, S.-Q.: Subtractive clustering based clustering routing algorithm for wireless sensor networks. Inf. Control 37(4), 201–219 (2008)
Barakkath Nisha, U., Uma Maheswari, N., Venkatesh, R., Yasir Abdullah, R.: Fuzzy based flat anomaly diagnosis and relief measures in distributed wireless sensor network. Int. J. Fuzzy Syst. 19, 1528–1545 (2017)
Barakkath Nisha, U., Uma Maheswari, N., Venkatesh, R., Yasir Abdullah, R.: Robust estimation of incorrect data using relative correlation clustering technique in wireless sensor networks. In: IEEE International Conference on Communication and Network Technologies, 2014, Issue 1, pp. 314–318 (2014)
Vesanto, J., Alhoniemi, E.: Clustering of the self-organizing map. IEEE Trans. Neural Netw. 11(3), 586–600 (2000)
Larabi-Marie-Sainte, S.: Outlier detection based feature selection exploiting bio-inspired optimization algorithms. J. Appl. Sci. 11, 6769 (2021)
Erfani, S.M., Rajasegarar, S., Karunasekera, S., Leckie, C.: High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning. Pattern Recognit. 58, 121–134 (2016)
Yasir Abdullah, R., Mary Posonia, A, and Barakkath Nisha, U.: An Adaptive mountain clustering-based anomaly detection for distributed wireless sensor networks. In: International Conference on Communication, Control and Information Sciences (ICCISc), 2021, pp. 1–6 (2021)
Cannady, J.: An adaptive neural swarm approach for intrusion defense in ad hoc networks. In: SPIE Defense, Security, and Sensing, p. 80590P. International Society for Optics and Photonics, Washington, DC (2011)
Martins, H., Palma, L., Cardoso, A., Gil, P.: A support vector machine-based technique for online detection of outliers in transient time series. In: Proceedings of the 10th Asian Control Conference (ASCC), Kota Kinabalu, Malaysia, June 2015, pp. 1–6
Saeedi Emadi, H., Mazinani, S.M.: A novel anomaly detection algorithm using DBSCAN and SVM in wireless sensor networks. Wirel. Pers. Commun. 98, 2025–2035 (2018)
Li, M., Sharma, A.: Abnormal data detection in sensor networks based on DNN algorithm and cluster analysis. J. Sens. 2022, 1718436 (2022)
Samara, M.A., Bennis, I., Abouaissa, A., Lorenz, P.: A survey of outlier detection techniques in IoT: review and classification. J. Sens. Actuator Netw. 11, 4 (2022). https://doi.org/10.3390/jsan11010004
Liu, F., Cheng, X., Chen, D.: Insider attacker detection in wireless sensor networks. In: Proceedings of the International Conference on Computer Communications; Honolulu, HI, USA, 13–16 August 2007, pp. 1937–1945 (2007)
Jang, J.-S.R., Sun, C.-T., Mizutani, E.: Neuro-fuzzy and Soft Computing: A Computational Approach to Learning and Machine Intelligence, p. 26. Prentice-Hall, Upper Saddle River (1997)
Kaski, S., Honkela, T., Lagus, K., Kohonen, T.: Websom, “Self-organizing maps of document collections.” Neurocomputing 1998(21), 101–117 (1998)
Chaudhary, V., Bhatia, R.S., Ahlawat, A.K.: A novel Self-Organizing Map (SOM) learning algorithm with nearest and farthest neurons. Alex. Eng. J. 53(4), 827–831 (2014)
Shanmugam, B., Idris, N.B.: Improved intrusion detection system using fuzzy logic for detecting anomaly and misuse type of attacks. In: International Conference of Soft Computing and Pattern Recognition, 2009, pp. 212–217 (2009)
IBRL Dataset. http://db.csail.mit.edu/labdata/labdata.html. Accessed 12 Nov 2021
ISSNIP Dataset. https://home.uncg.edu/cmp/downloads/lwsndr.html. Accessed 23 Nov 2021
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yasir Abdullah, R., Mary Posonia, A. & Barakkath Nisha, U. An Enhanced Anomaly Forecasting in Distributed Wireless Sensor Network Using Fuzzy Model. Int. J. Fuzzy Syst. 24, 3327–3347 (2022). https://doi.org/10.1007/s40815-022-01349-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s40815-022-01349-1