Abstract
Anomaly detection is an important challenge in wireless sensor networks (WSNs) for fault diagnosis and intrusion detection applications. Sensor nodes are usually designed to be small and inexpensive, so they have limited capabilities, such as limited computational power, memory and energy. This paper presents novel light-weight distributed anomaly detection and a foresight response strategy based on support vector data description (SVDD) for wireless sensor network. SVDD could sometimes generate such a loose decision boundary, when some noisy samples (outliers) exist in the training set. In addition, it requires the solution of a computationally intensive quadratic programming approach which is not applicable in WSNs. Hence, we modified the standard version of SVDD, and proposed the Linear Programming-based Fuzzy-Constraint SVDD (LP-FCSVDD) method to detect the outliers with more accuracy in acceptable time. Then we present a foresight response strategy to resist the intentional, unintentional and false anomalies. The overall experiments show prominence of our proposed method to achieve high detection accuracies on a variety of real and synthetic wireless sensor network datasets.












Similar content being viewed by others
References
Xie, M., Han, S., Tian, B., et al. (2011). Anomaly detection in wireless sensor networks: A survey. Journal of Network and Computer Applications, 34(4), 1302–1325.
Anwar, R. W., Bakhtiari, M., Zainal, A., et al. (2014). Security issues and attacks in wireless sensor network. World Applied Sciences Journal, 30(10), 1224–1227.
Alrajeh, N. A., Khan, S., & Shams, B. (2013). Intrusion detection systems in wireless sensor networks: A review. International Journal of Distributed Sensor Networks, 2013, 1–7.
Butun, I., & Sankar, R. (2011). A brief survey of access control in wireless sensor networks. In Consumer communications and networking conference (CCNC), pp. 11181119.
Scarfone, K., & Mell, P. (2007). Guide to intrusion detection and prevention systems (IDPS). NIST Special Publication, 800(2007), 94.
Abduvaliyev, A., Pathan, A.-S. K., Zhou, J., et al. (2013). On the vital areas of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys and Tutorials, 15(3), 1223–1237.
Khan, L., Awad, M., & Thuraisingham, B. (2007). A new intrusion detection system using support vector machines and hierarchical clustering. The VLDB Journal—The International Journal on Very Large Data Bases, 16(4), 507–521.
Zheng, J., & Hu, M.-Z. (2005). Intrusion detection of DoS/DDoS and probing attacks for web services. Advances in Web-Age Information Management (pp. 333–344). Berlin: Springer.
Ghosh, A. K. & Schwartzbard, A. (1999). A study in using neural networks for anomaly and misuse detection. Proceedings of the 8th conference on USENIX Security Symposium, Washington, DC.
Rajasegarar, S., Leckie, C., & Palaniswami, M. (2008). Anomaly detection in wireless sensor networks. IEEE Wireless Communications, 15(4), 34–40.
Zamani, M. (2013). Machine learning techniques for intrusion detection. arXiv preprint arXiv:1312.2177.
Dua, S., & Du, X. (2014). Data mining and machine learning in cybersecurity. Baco Racton: CRC Press.
Butun, I., Morgera, S., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE Communication Surveys & Tutorials, 16(1), 266–282.
Zhang, Y., Meratnia, N., & Havinga, P. (2010). Outlier detection techniques for wireless sensor networks: A survey. IEEE Communications Surveys & Tutorials, 12(2), 159–170.
Van Phuong, T., Hung, L. X., Cho, S. J., et al. (2006). An anomaly detection algorithm for detecting attacks in wireless sensor networks. Intelligence and Security Informatics, 3975, 735–736.
Tax, D. M., & Duin, R. P. (1999). Support vector domain description. Pattern Recognition Letters, 20(11), 1191–1199.
Guo, S.-M., Chen, L.-C., & Tsai, J. S. H. (2009). A boundary method for outlier detection based on support vector domain description. Pattern Recognition, 42(1), 77–83.
da Silva, A. P. R., Martins, M. H., Rocha, B. P. et al. (2005) Decentralized intrusion detection in wireless sensor networks In Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks. Montreal, Canada, pp. 16–23.
Ioannis, K., Dimitriou, T., & Freiling, F. C. (2007) Towards intrusion detection in wireless sensor networks. In Proceeding of the 13th European Wireless Conference, Paris, France.
Karapistoli, E., & Economides, A. A. (2014). ADLU: a novel anomaly detection and location-attribution algorithm for UWB wireless sensor networks. EURASIP Journal on Information Security, 2014(1), 1–12.
Palpanas, T., Papadopoulos, D., Kalogeraki, V., et al. (2003). Distributed deviation detection in sensor networks. ACM SIGMOD Record, 32(4), 77–82.
Ngai, E.-H., Liu, J., & Lyu, M. R. (2006). On the intruder detection for sinkhole attack in wireless sensor networks. In Proceedings of the 2006 IEEE international conference on communications (ICC’06). Istanbul, Turkey, pp. 3383–3389.
Onat, I., & Miri, A. (2005) A real-time node-based traffic anomaly detection algorithm for wireless sensor networks. In Proceedings of systems communications, Montreal, Canada, pp. 422–427.
Li, G., He, J., & Fu, Y. (2008). Group-based intrusion detection system in wireless sensor networks. Computer Communications, 31(18), 4324–4332.
Siripanadorn, S., Hattagam, W., & Teaumroong, N. (2010). Anomaly detection in wireless sensor networks using self-organizing map and wavelets. International Journal of Communications, 4(3), 74–83.
Branch, J. W., Giannella, C., Szymanski, B., et al. (2013). In-network outlier detection in wireless sensor networks. Knowledge and Information Systems, 34(1), 23–54.
OReilly, C., Gluhak, A., Imran, M., et al. (2014). Anomaly detection in wireless sensor networks in a non-stationary environment. IEEE Communications Surveys and Tutorials, 16(3), 1413–1432.
Moshtaghi, M., Leckie, C., Karunasekera, S., et al. (2014). An adaptive elliptical anomaly detection model for wireless sensor networks. Computer Networks, 64, 195–207.
Salem, O., Guerassimov, A., Mehaoua, A., et al. (2013). Anomaly detection scheme for medical wireless sensor networks. In B. Furht & A. Agarwal (Eds.), Handbook of medical and healthcare technologies (pp. 207–222). New York: Springer.
Zhang, Y., Meratnia, N., & Havinga, P. J. (2013). Distributed online outlier detection in wireless sensor networks using ellipsoidal support vector machine. Ad Hoc Networks, 11(3), 1062–1074.
Rajasegarar, S., Leckie, C., & Palaniswami, M. (2014). Hyperspherical cluster based distributed anomaly detection in wireless sensor networks. Journal of Parallel and Distributed Computing, 74(1), 1833–1847.
Salmon, H. M., de Farias, C. M., Loureiro, P., et al. (2013). Intrusion detection system for wireless sensor networks using danger theory immune-inspired techniques. International Journal of Wireless Information Networks, 20(1), 39–66.
Ahmadi Livani, M., & Abadi, M. (2011) A PCA-based distributed approach for intrusion detection in wireless sensor networks. In Proceedings of the 2011 international symposium on computer networks and distributed systems (CNDS), Tehran, Iran, pp. 55–60.
Wang, H.-B, Yuan, Z., Wang, C.-D. (2009). Intrusion detection for wireless sensor networks based on multi-agent and refined clustering. In International conference on communications and mobile computing, Kunming, Yunnan, China, pp. 450–454.
Rajasegarar, S., Leckie, C., Palaniswami, M. et al. (2006). Distributed anomaly detection in wireless sensor networks. In 10th IEEE singapore international conference on communication systems, Singapore, pp. 1–5.
S. Rajasegarar, C. Leckie, M. Palaniswami et al. (2007) Quarter sphere based distributed anomaly detection in wireless sensor networks. In: IEEE International Conference on Communications (ICC’07), Glasgow, Scotland, pp. 3864–3869.
Rajasegarar, S., Leckie, C., Bezdek, J. C., et al. (2010). Centered hyperspherical and hyperellipsoidal one-class support vector machines for anomaly detection in sensor networks. IEEE Transactions on Information Forensics and Security, 5(3), 518–533.
Tax, D. M. & Duin R. P. (2000) Data description in subspaces. In Proceedings of 15th international conference on pattern recognition, Barcelona, Spain, pp. 672–675.
Tax, D. M., & Duin, R. P. (2004). Support vector data description. Machine Learning, 54(1), 45–66.
Schölkopf, B., Smola, A., & Müller, K.-R. (1998). Nonlinear component analysis as a kernel eigenvalue problem. Neural Computation, 10(5), 1299–1319.
Laskov, P., Schäfer, C., Kotenko, I., et al. (2004). Intrusion detection in unlabeled data with quarter-sphere support vector machines. Praxis der Informationsverarbeitung und Kommunikation, 27(4), 228–236.
Song, M. & He, B. (2007). Capacity analysis for flat and clustered wireless sensor networks. In International conference on wireless algorithms, systems and applications, Chicago, Illinois, USA, pp. 249–253.
Khachiyan, L. G. (1980). Polynomial algorithms in linear programming. USSR Computational Mathematics and Mathematical Physics, 20(1), 53–72.
Griva, I., Nash, S. G., & Sofer, A. (2009). Linear and nonlinear optimization: Siam.
Megiddo, N. (1984). Linear programming in linear time when the dimension is fixed. Journal of the ACM (JACM), 31(1), 114–127.
IBRL dataset. (2012). http://db.lcs.mit.edu/labdata/labdata.html
Szewczyk, R., Mainwaring, A., Polastre, J. et al. (2004) An analysis of a large scale habitat monitoring application. In Proceedings of the 2nd international conference on Embedded networked sensor systems, Baltimore, Maryland, USA, pp. 214–226.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
GhasemiGol, M., Ghaemi-Bafghi, A., Yaghmaee-Moghaddam, M.H. et al. Anomaly detection and foresight response strategy for wireless sensor networks. Wireless Netw 21, 1425–1442 (2015). https://doi.org/10.1007/s11276-014-0858-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-014-0858-z