We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

The Mechanism of Anomaly Detection in Wireless Sensor Network: An Innovative Approach

by Deepak Prakash
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 83 - Number 3
Year of Publication: 2013
Authors: Deepak Prakash
10.5120/14427-2571

Deepak Prakash . The Mechanism of Anomaly Detection in Wireless Sensor Network: An Innovative Approach. International Journal of Computer Applications. 83, 3 ( December 2013), 14-17. DOI=10.5120/14427-2571

@article{ 10.5120/14427-2571,
author = { Deepak Prakash },
title = { The Mechanism of Anomaly Detection in Wireless Sensor Network: An Innovative Approach },
journal = { International Journal of Computer Applications },
issue_date = { December 2013 },
volume = { 83 },
number = { 3 },
month = { December },
year = { 2013 },
issn = { 0975-8887 },
pages = { 14-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume83/number3/14427-2571/ },
doi = { 10.5120/14427-2571 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:58:25.485454+05:30
%A Deepak Prakash
%T The Mechanism of Anomaly Detection in Wireless Sensor Network: An Innovative Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 83
%N 3
%P 14-17
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless Sensor Networks (WSNs) have emerged as one of the most important research areas, large numbers of limited resource sensor nodes are used to monitor the physical environment and report any significant information. Many different anomaly detection systems (ADS) have been proposed in the literature over the years. Now apply an algorithm to increase detection sensitivity. Detection of sensor data irregularities is useful for practical applications as well as for network management, because the patterns found can be used for both decision making in applications and system performance tuning. The problem of irregularities detection is to find those sensory values that deviate significantly from the norm. This problem is especially important in the sensor network setting because it can be used to identify abnormal or interesting events or faulty sensors. Dynamic detection model generated using a combination of di?erent data vectors are required to detect time variant anomalies in WSNs. Decentralized, Individual nodes should perform the anomaly detection independently in the local environment. The scope of this thesis is to develop and make the ADS scalable and robust against attacks. The communication cost can be reduced if only abnormal sensory values, as opposed to all values, need to be transmitted. It is essential to mine the sensor readings for patterns in real time in order to make intelligent decisions promptly.

References
  1. Yong Wang, Garhan Attebury and Byrav Ramamurthy "A Survey of security issues in Wireless Sensor Networks", IEEE Communication Survey 2006.
  2. V. Chandola, A. Banerjee, and V. Kumar. Anomaly Detection: A survey. ACM Computing Survey, 41(3):1{58, 2009.
  3. K. Ni, N. Ramanathan, M. Chehade, L. Balzano, S. Nair, S. Zahedi, E. Kohler, G. Pottie, M. Hansen, and M. Srivastava. Sensor network data fault types. ACM Transaction in Sensor Networks, 5(3):1{29, 2009.
  4. B. Parno, A. Perrig, and V. Gligor. Distributed detection of Node replication attacks in sensor networks. In Proceedings of the IEEE Symposium on Security and Privacy, pages 49{63, 2005}.
  5. G. Zhou, T. He, S. Krishnamurthy, and J. A. Stankovic. Impact of radio irregularity on wireless sensor networks. In Proceedings of the 2nd international conference on Mobile systems, applications, and services (MobiSys04), pages 125{138, 2004.
  6. C. Karlof and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. In Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications. Pages 113 {127, 2003.
  7. Design and Implementation of Mobile Robot for Nodes Replacement in Wireless Sensor Networks* JANG-PING SHEU, KUN-YING HSIEH+ AND PO-WEN CHENG, 200
  8. H. Zhang and H. Shen, "Balancing energy consumption to maximize network lifetime in data-gathering sensor networks," IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 10, pp. 1526–1539, 2009.
  9. Y. Revah and M. Segal, "Improved algorithms for data gathering time in sensor networks II: Ring, Tree, and Grid topologies," International Journal of Distributed Sensor Networks, vol. 5, no. 5, pp. 463–479, 2009.
  10. K. Yuen, B. Liang, and B. Li, "A distributed framework for correlated data gathering in sensor networks," IEEE Transactions on Vehicular Technology, vol. 57, no. 1, pp. 578–593, 2008.
  11. S. Susca, F. Bullo, and S. Martinez, "Monitoring environmental boundaries with a robotic sensor network," IEEE Transactions on Control Systems Technology, vol. 16, no. 2, pp. 288–296, 2008.
  12. M. Ma and Y. Yang, "Data gathering in wireless sensor networks with mobile collectors," in Proceedings of the 22nd IEEE International Parallel and Distributed Processing Symposium (IPDPS '08), April 2008.
  13. A. Boukerche and X. Fei, "Adaptive data-gathering protocols with mobile collectors for vehicular ad-hoc and sensor networks," in Proceedings of the 4th IEEE International Conference on Wireless and Mobile Computing, Networking and Communication (WiMob'08), pp. 7–12, 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Networks Anomaly Detection Systems (ADS) Detection Sensitivity Power Saver Simulation