Advertisement

An isolation principle based distributed anomaly detection method in wireless sensor networks

  • Zhi-Guo Ding
  • Da-Jun Du
  • Min-Rui Fei
Regular Paper

Abstract

Anomaly detection plays an important role in ensuring the data quality in wireless sensor networks (WSNs). The main objective of the paper is to design a light-weight and distributed algorithm to detect the data collected from WSNs effectively. This is achieved by proposing a distributed anomaly detection algorithm based on ensemble isolation principle. The new method offers distinctive advantages over the existing methods. Firstly, it does not require any distance or density measurement, which reduces computational burdens significantly. Secondly, considering the spatial correlation characteristic of node deployment in WSNs, local sub-detector is built in each sensor node, which is broadcasted simultaneously to neighbor sensor nodes. A global detector model is then constructed by using the local detector model and the neighbor detector model, which possesses a distributed nature and decreases communication burden. The experiment results on the labeled dataset confirm the effectiveness of the proposed method.

Keywords

Distributed anomaly detection isolation principle light-weight method ensemble learning wireless sensor networks (WSNs) 

References

  1. [1]
    I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci. Wireless sensor networks: A survey. Computer Networks, vol. 38, no. 4, pp. 393–422, 2002.CrossRefGoogle Scholar
  2. [2]
    J. Y. Huang, I. E. Liao, Y. F. Chung, K. T. Chen. Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining. Information Sciences, vol. 231, pp. 32–44, 2013.MathSciNetCrossRefGoogle Scholar
  3. [3]
    S. Rajasegarar, C. Leckie, M. Palaniswami, Anomaly detection in wireless sensor networks. IEEE Wireless Communications, vol. 15, no. 4, pp. 34–40, 2008.CrossRefGoogle Scholar
  4. [4]
    Y. Zhang. Observing the Unobservable: Distributed Online Outlier Detection in Wireless Sensor Networks, Ph.D. dissertation, University of Twente, The Netherlands, 2010.Google Scholar
  5. [5]
    Y. Zhang, N. Meratnia, P. Havinga. Outlier detection techniques for wireless sensor networks: A survey. IEEE Communications Surveys & Tutorials, vol. 12, no. 2, pp. 159–170, 2010.CrossRefGoogle Scholar
  6. [6]
    W. J. Zhou, M. R. Fei, H. Y. Zhou, Z. Li. A fast detection method for bottle caps surface defect based on sparse representation. Intelligent Computing for Sustainable Energy and Environment, Communications in Computer and Information Science, Berlin, Germany: Springer, pp. 76–84, 2013.Google Scholar
  7. [7]
    Y. Zhang, N. Meratnia, P. Havinga. An online outlier detection technique for wireless sensor networks using unsupervised quarter-sphere support vector machine. In Proceedings of IEEE Intelligent Sensors, Sensor Networks and Information Processing, IEEE, Sydney, NSW, Australia, pp. 151–156, 2008.Google Scholar
  8. [8]
    J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, K. Pister. System architecture directions for networked sensors. In Proceedings of International Conference on Architectural Support for Programming Language and Operating Systems, ACM, Cambrige, Massachusetts, USA, vol. 34, pp. 93–104, 2000.Google Scholar
  9. [9]
    V. Chandola, A. Banerjee, V. Kumar. Anomaly detection: A survey. ACM Computing Surveys, vol. 41, no. 3, pp. 1–58, 2009.CrossRefGoogle Scholar
  10. [10]
    V. Hodge, J. Austin. A survey of outlier detection methodologies. Artificial Intelligence Review, vol. 22, no. 2, pp. 85–126, 2004.CrossRefzbMATHGoogle Scholar
  11. [11]
    Y. Zhang, N. A. S. Hamm, N. Meratnia, A. Stein, M. V. D. Voort, P. J. M. Havinga. Statistics-based outlier detection for wireless sensor networks. International Journal of Geographical Information Science, vol. 26, no. 8, pp. 1373–1392, 2012.CrossRefGoogle Scholar
  12. [12]
    S. Suthaharan, M. Alzahrani, S. Rajasegarar, C. Leckie, M. Palaniswami. Labelled data collection for anomaly detection in wireless sensor networks. In Proceedings of the 6th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, IEEE, Brisbane, QLD, Australia, pp. 269–274, 2010.Google Scholar
  13. [13]
    M. Xie, S. Han, B. M. Tian, S. Parvin. Anomaly detection in wireless sensor networks: A survey. Journal of Network and Computer Applications, vol. 34, no. 4, pp. 1302–1325, 2011.CrossRefGoogle Scholar
  14. [14]
    L. J. Zhao, T. Y. Chai, D. C. Yuan. Selective ensemble extreme learning machine modeling of effluent quality in wastewater treatment plants. International Journal of Automation and Computing, vol. 9, no. 6, pp. 627–633, 2012.CrossRefGoogle Scholar
  15. [15]
    F. T. Liu, K. M. Ting, Z. H. Zhou. Isolation-based anomaly detection. ACM Transactions on Knowledge Discovery from Data, vol. 6, no. 1, Article 3, 2012.Google Scholar
  16. [16]
    Z. G. Ding, M. R. Fei. An anomaly detection approach based on isolation forest algorithm for streaming data using sliding window. In Proceedings of the 3rd IFAC International Conference on Intelligent Control and Automation Science, IFAC, Chengdu, China, vol. 3, pp. 12–17, 2013.Google Scholar
  17. [17]
    M. M. Breunig, H. P. Kriegel, R. T. Ng, J. Sander. LOF: Identifying density-based local outliers. In Proceedings of ACM SIGMOD Record on Management of Data, ACM, Dallas, USA, vol. 29, pp. 93–104, 2000.Google Scholar
  18. [18]
    W. G. Yi, J. Duan, M. Y. Lu. Double-layer bayesian classifier ensembles based on frequent itemsets. International Journal of Automation and Computing, vol. 9, no. 2, pp. 215–220, 2012.CrossRefGoogle Scholar
  19. [19]
    D. E. Knuth. Art of Computer Programming, vol. 4, fascicle 4: The Generating All Trees-History of Combinatorial Generation, AddisonWesley Professional, pp. 83–98, 2006.Google Scholar
  20. [20]
    S. C. Tan, K. M. Ting, T. F. Liu. Fast anomaly detection for streaming data. In Proceedings of the 22nd International Joint Conference on Artificial Intelligence, vol. 2, pp. 1511–1516, 2011.Google Scholar
  21. [21]
    D. J. Hand, R. J. Till. A simple generalisation of the area under the ROC curve for multiple class classification problems. Machine Learning, vol. 45, no. 2, pp. 171–186, 2001.CrossRefzbMATHGoogle Scholar

Copyright information

© Institute of Automation, Chinese Academy of Sciences and Springer-Verlag Berlin Heidelberg 2015

Authors and Affiliations

  1. 1.Shanghai Key Laboratory of Power Station Automation Technology, School of Mechatronics Engineering and AutomationShanghai UniversityShanghaiChina
  2. 2.College of Mathematics, Physics and Information EngineeringZhejiang Normal UniversityJinhuaChina

Personalised recommendations