Applications of Data Mining Techniques for Vehicular Ad hoc Networks

Due to the recent advances in vehicular ad hoc networks (VANETs), smart applications have been incorporating the data generated from these networks to provide quality of life services. In this paper, we have proposed taxonomy of data mining techniques that have been applied in this domain in addition to a classification of these techniques. Our contribution is to highlight the research methodologies in the literature and allow for comparing among them using different characteristics. The proposed taxonomy covers elementary data mining techniques such as: preprocessing, outlier detection, clustering, and classification of data. In addition, it covers centralized, distributed, offline, and online techniques from the literature.

[1]  Jian Pei,et al.  A dynamic clustering and scheduling approach to energy saving in data collection from wireless sensor networks , 2005, 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005..

[2]  O. Kachirski,et al.  Intrusion detection using mobile agents in wireless ad hoc networks , 2002, Proceedings. IEEE Workshop on Knowledge Media Networking.

[3]  Nirvana Meratnia,et al.  Outlier Detection Techniques for Wireless Sensor Networks: A Survey , 2008, IEEE Communications Surveys & Tutorials.

[4]  Mohamed Medhat Gaber,et al.  On-board Mining of Data Streams in Sensor Networks , 2005 .

[5]  Biming Tian,et al.  Anomaly detection in wireless sensor networks: A survey , 2011, J. Netw. Comput. Appl..

[6]  Wendi Heinzelman,et al.  Proceedings of the 33rd Hawaii International Conference on System Sciences- 2000 Energy-Efficient Communication Protocol for Wireless Microsensor Networks , 2022 .

[7]  Minyi Guo,et al.  Adaptive Forwarding Delay Control for VANET Data Aggregation , 2012, IEEE Transactions on Parallel and Distributed Systems.

[8]  José M. F. Moura,et al.  Estimation in sensor networks: a graph approach , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[9]  Ramakrishnan Srikant,et al.  Mining sequential patterns , 1995, Proceedings of the Eleventh International Conference on Data Engineering.

[10]  Jianwei Liu,et al.  Investigate key management and authentication models in VANETs , 2011, 2011 International Conference on Electronics, Communications and Control (ICECC).

[11]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[12]  Simon Fong,et al.  Optimizing Classification Decision Trees by Using Weighted Naïve Bayes Predictors to Reduce the Imbalanced Class Problem in Wireless Sensor Network , 2013, Int. J. Distributed Sens. Networks.

[13]  Miao Yu,et al.  A Mobility-Resistant Efficient Clustering Approach for ad hoc and sensor networks , 2006, MOCO.

[14]  Pan Liqiang and Li Jianzhong A Multiple-Regression-Model-Based Missing Values Imputation Algorithm in Wireless Sensor Network , 2009 .

[15]  Ossama Younis,et al.  HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.

[16]  Mohammed G. H. al Zamil Verifying Smart Sensory Systems on Cloud Computing Frameworks , 2015, ANT/SEIT.

[17]  Stephan Eidenbenz,et al.  Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents , 2003, MobiCom '03.

[18]  Shengrui Wang,et al.  A New Algorithm Based On Sequential Pattern Mining For Person Identification In Ubiquitous Environments , 2010 .

[19]  M. Shamim Hossain,et al.  An Annotation Technique for In-Home Smart Monitoring Environments , 2018, IEEE Access.

[20]  Mohammed Gh. I. Al Zamil,et al.  The Impact of Rate of Change on Object Oriented Paradigm , 2013 .

[21]  Weisong Shi,et al.  $RD^{4}$: Role-Differentiated Cooperative Deceptive Data Detection and Filtering in VANETs , 2010, IEEE Transactions on Vehicular Technology.

[22]  Izzat Alsmadi,et al.  Automatic Model Based Methods to Improve Test Effectiveness , 2010 .

[23]  M. A. Al Zamil,et al.  A model based on multi-features to enhance healthcare and medical document retrieval , 2011, Informatics for health & social care.

[24]  Simon Scheider,et al.  Nearest Neighbour Classification for Trajectory Data , 2010, ICT.

[25]  Yingshu Li,et al.  Data Estimation in Sensor Networks Using Physical and Statistical Methodologies , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[26]  M. Shamim Hossain,et al.  Reliable service delivery in Tele-health care systems , 2018, J. Netw. Comput. Appl..

[27]  Ann Nowé,et al.  High-density wireless sensor networks: a new clustering approach for prediction-based monitoring , 2005, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..

[28]  Dharma P. Agrawal,et al.  SVM-based intrusion detection system for wireless ad hoc networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[29]  Janelle J. Harms,et al.  Distributed classification of acoustic targets in wireless audio-sensor networks , 2008, Comput. Networks.

[30]  Cyrus Shahabi,et al.  The Clustered AGgregation (CAG) technique leveraging spatial and temporal correlations in wireless sensor networks , 2007, TOSN.

[31]  Rituparna Chaki,et al.  Intrusion Detection in Wireless Ad-Hoc Networks , 2014 .

[32]  Mohammed G. H. al Zamil,et al.  Dispersion-based prediction framework for estimating missing values in wireless sensor networks , 2012, Int. J. Sens. Networks.

[33]  Jun Wu,et al.  A New Data Aggregation Model for Intelligent Transportation System , 2013 .

[34]  Nan Jiang,et al.  Estimating Missing Data in Data Streams , 2007, DASFAA.

[35]  Frank Eliassen,et al.  A Communication-Efficient Distributed Clustering Algorithm for Sensor Networks , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).

[36]  Atif Alamri,et al.  An Efficient Activity Recognition Framework: Toward Privacy-Sensitive Health Data Sensing , 2017, IEEE Access.

[37]  Aysu Betin Can,et al.  ROLEX-SP: Rules of lexical syntactic patterns for free text categorization , 2011, Knowl. Based Syst..

[38]  Sadok Ben Yahia,et al.  Yet Another Approach for Completing Missing Values , 2006, CLA.

[39]  Samer Samarah,et al.  Model Checking Based Classification Technique for Wireless Sensor Networks , 2012 .

[40]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[41]  Zhe Yang,et al.  MCNC: Data Aggregation and Dissemination in Vehicular Ad hoc Networks Using Multicast Network Coding , 2013, Int. J. Distributed Sens. Networks.

[42]  Lokesh Kumar Sharma,et al.  Nearest Neighbour Classification for Wireless Sensor Network Data , 2011 .

[43]  Panagiotis Papadimitratos,et al.  On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[44]  Chris J. Mitchell,et al.  Security Vulnerabilities in Ad Hoc Networks , 2003 .

[45]  Ruwaida M Zuhairy,et al.  Energy-efficient load balancing in wireless sensor network: An application of multinomial regression analysis , 2018, Int. J. Distributed Sens. Networks.

[46]  Samuel Madden,et al.  PAQ: Time Series Forecasting for Approximate Query Answering in Sensor Networks , 2006, EWSN.

[47]  Diane J Cook,et al.  Assessing the Quality of Activities in a Smart Environment , 2009, Methods of Information in Medicine.

[48]  Ke Shi,et al.  Data Mining Techniques for Wireless Sensor Networks: A Survey , 2013, Int. J. Distributed Sens. Networks.

[49]  Sylvain Giroux,et al.  Pervasive assistance in smart homes for people with intellectual disabilities: A case study on meal preparation , 2008 .

[50]  Yi-Ming Chen,et al.  Efficient Self-organized Trust Management in Location Privacy Enhanced VANETs , 2012, WISA.

[51]  Marcel Abendroth,et al.  Data Mining Practical Machine Learning Tools And Techniques With Java Implementations , 2016 .

[52]  Riyad Al-Shalabi,et al.  Comparison between Ad-hoc Retrieval and Filtering Retrieval Using Arabic Documents , 2004, Int. J. Comput. Process. Orient. Lang..

[53]  Wang Ke,et al.  Attribute-based clustering for information dissemination in wireless sensor networks , 2005, 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005..

[54]  Qiong Luo,et al.  Distributed, Hierarchical Clustering and Summarization in Sensor Networks , 2007, APWeb/WAIM.

[55]  Jiawei Han,et al.  Data Mining: Concepts and Techniques , 2000 .

[56]  Mohammed G. H. al Zamil A verifiable framework for smart sensory systems , 2017, Int. J. Embed. Syst..

[57]  Mohammed G. H. al Zamil,et al.  Dynamic rough-based clustering for vehicular ad-hoc networks , 2015, Int. J. Inf. Decis. Sci..

[58]  Klara Nahrstedt,et al.  Providing Fault-Tolerant Ad hoc Routing Service in Adversarial Environments , 2004, Wirel. Pers. Commun..

[59]  Yingshu Li,et al.  Real time clustering of sensory data in wireless sensor networks , 2009, 2009 IEEE 28th International Performance Computing and Communications Conference.

[60]  Lin Sun,et al.  Data Aggregation and Information Type in Road Probing , 2012 .

[61]  Wenke Lee,et al.  A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.

[62]  Stephan Olariu,et al.  Cooperation as a service in VANET: Implementation and simulation results , 2012, Mob. Inf. Syst..

[63]  Mohammed G. H. al Zamil,et al.  Dynamic event classification for intrusion and false alarm detection in vehicular ad hoc networks , 2016, Int. J. Inf. Commun. Technol..

[64]  Thomas M. Chen,et al.  Dempster-Shafer theory for intrusion detection in ad hoc networks , 2005, IEEE Internet Computing.

[65]  Sagarika Mohanty,et al.  Secure Data Aggregation in Vehicular-Adhoc Networks: A Survey , 2012 .

[66]  Jinbao Li,et al.  A Novel Data Broadcast Strategy for Traffic Information Query in the VANETs , 2013, WAIM.

[67]  Kemal Akkaya,et al.  Group-based hybrid authentication scheme for cooperative collision warnings in VANETs , 2011, Secur. Commun. Networks.

[68]  David B. Skillicorn,et al.  A Distributed Approach for Prediction in Sensor Networks , 2005 .

[69]  M. Anwar Hossain,et al.  An ODT-based abstraction for mining closed sequential temporal patterns in IoT-cloud smart homes , 2017, Cluster Computing.

[70]  Samer Samarah,et al.  The application of semantic-based classification on big data , 2014, 2014 5th International Conference on Information and Communication Systems (ICICS).

[71]  Ahmad Khonsari,et al.  Misbehavior resilient multi-path data transmission in mobile ad-hoc networks , 2006, SASN '06.

[72]  T. J. Swamy,et al.  Link evaluation of uniform grid based wireless sensor networks to base station with leveling and clustering , 2013, 2013 International Conference on Computer Communication and Informatics.

[73]  Jing Zhao,et al.  Roadcast: A Popularity Aware Content Sharing Scheme in VANETs , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems.

[74]  Mohammed G. H. al Zamil,et al.  Application Of Design For Verification To Smart Sensory Systems , 2014 .

[75]  Yi-Ming Chen,et al.  An Efficient Trust Management System for Balancing the Safety and Location Privacy in VANETs , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[76]  Karl N. Levitt,et al.  A specification-based intrusion detection system for AODV , 2003, SASN '03.

[77]  Ahmad Lotfi,et al.  A fuzzy predictor model for the occupancy prediction of an intelligent inhabited environment , 2008, 2008 IEEE International Conference on Fuzzy Systems (IEEE World Congress on Computational Intelligence).

[78]  Baltasar Beferull-Lozano,et al.  Distributed consensus algorithms for SVM training in wireless sensor networks , 2008, 2008 16th European Signal Processing Conference.

[79]  Anupam Joshi,et al.  Security through Collaboration in MANETs , 2008, CollaborateCom.

[80]  Jae Soo Yoo,et al.  Data Correlation-Based Clustering in Sensor Networks , 2008, International Symposium on Computer Science and its Applications.

[81]  Aysu Betin Can,et al.  Toward effective medical search engines , 2010, 2010 5th International Symposium on Health Informatics and Bioinformatics.

[82]  M. Shamim Hossain,et al.  A knowledge-driven approach for activity recognition in smart homes based on activity profiling , 2020, Future Gener. Comput. Syst..