outlier detection in wireless sensor networks using distributed principal component analysis

نویسندگان

mohammad ahmadi livani

mahdi abadi

meysam alikhany

meisam yadollahzadeh tabari

چکیده

detecting anomalies is an important challenge for intrusion detection and fault diagnosis in wireless sensor networks (wsns). to address the problem of outlier detection in wireless sensor networks, in this paper we present a pca-based centralized approach and a dpca-based distributed energy-efficient approach for detecting outliers in sensed data in a wsn. the outliers in sensed data can be caused due to compromised or malfunctioning nodes. in the distributed approach, we use distributed principal component analysis (dpca) and fixed-width clustering (fwc) in order to establish a global normal pattern and to detect outlier. the process of establishing the global normal pattern is distributed among all sensor nodes. we also use weighted coefficients and a forgetting curve to periodically update the established normal profile. we demonstrate that the proposed distributed approach achieves comparable accuracy compared to the centralized approach, while the communication overhead in the network and energy consumption is significantly reduced.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Outlier Detection in Wireless Sensor Networks Using Distributed Principal Component Analysis

Detecting anomalies is an important challenge for intrusion detection and fault diagnosis in wireless sensor networks (WSNs). To address the problem of outlier detection in wireless sensor networks, in this paper we present a PCA-based centralized approach and a DPCA-based distributed energy-efficient approach for detecting outliers in sensed data in a WSN. The outliers in sensed data can be ca...

متن کامل

Distributed Principal Component Analysis for Wireless Sensor Networks

The Principal Component Analysis (PCA) is a data dimensionality reduction technique well-suited for processing data from sensor networks. It can be applied to tasks like compression, event detection, and event recognition. This technique is based on a linear transform where the sensor measurements are projected on a set of principal components. When sensor measurements are correlated, a small s...

متن کامل

Intrusion Detection in Wireless Sensor Networks using Genetic Algorithm

Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...

متن کامل

ENERGY AWARE DISTRIBUTED PARTITIONING DETECTION AND CONNECTIVITY RESTORATION ALGORITHM IN WIRELESS SENSOR NETWORKS

 Mobile sensor networks rely heavily on inter-sensor connectivity for collection of data. Nodes in these networks monitor different regions of an area of interest and collectively present a global overview of some monitored activities or phenomena. A failure of a sensor leads to loss of connectivity and may cause partitioning of the network into disjoint segments. A number of approaches have be...

متن کامل

Distributed online outlier detection in wireless sensor networks using ellipsoidal support vector machine

Low quality sensor data limits WSN capabilities for providing reliable real-time situationawareness. Outlier detection is a solution to ensure the quality of sensor data. An effective and efficient outlier detection technique for WSNs not only identifies outliers in a distributed and online manner with high detection accuracy and low false alarm, but also satisfies WSN constraints in terms of c...

متن کامل

intrusion detection in wireless sensor networks using genetic algorithm

wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. routing attacks on the networks, where a malicious node from sending data to the base station is perceived. in this article, a method that can be used to transfer the data securely to prevent attacks...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید


عنوان ژورنال:
journal of ai and data mining

ناشر: shahrood university of technology

ISSN 2322-5211

دوره 1

شماره 1 2013

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023