Advancements of Data Anomaly Detection Research in Wireless Sensor Networks: A Survey and Open Issues

Wireless Sensor Networks (WSNs) are important and necessary platforms for the future as the concept “Internet of Things” has emerged lately. They are used for monitoring, tracking, or controlling of many applications in industry, health care, habitat, and military. However, the quality of data collected by sensor nodes is affected by anomalies that occur due to various reasons, such as node failures, reading errors, unusual events, and malicious attacks. Therefore, anomaly detection is a necessary process to ensure the quality of sensor data before it is utilized for making decisions. In this review, we present the challenges of anomaly detection in WSNs and state the requirements to design efficient and effective anomaly detection models. We then review the latest advancements of data anomaly detection research in WSNs and classify current detection approaches in five main classes based on the detection methods used to design these approaches. Varieties of the state-of-the-art models for each class are covered and their limitations are highlighted to provide ideas for potential future works. Furthermore, the reviewed approaches are compared and evaluated based on how well they meet the stated requirements. Finally, the general limitations of current approaches are mentioned and further research opportunities are suggested and discussed.

[1]  Saad B. Qaisar,et al.  Quarter-Sphere SVM: Attribute and Spatio-Temporal correlations based Outlier & Event Detection in wireless sensor networks , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[2]  Sugata Sanyal,et al.  Adaptive neuro-fuzzy intrusion detection systems , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[3]  Keith Marzullo,et al.  Tolerating failures of continuous-valued sensors , 1990, TOCS.

[4]  Ralf Steinmetz,et al.  Wireless Sensor Networks and the Internet of Things: Selected Challenges , 2009 .

[5]  M. Palaniswami,et al.  Distributed Anomaly Detection in Wireless Sensor Networks , 2006, 2006 10th IEEE Singapore International Conference on Communication Systems.

[6]  JAMAL N. AL-KARAKI,et al.  Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.

[7]  Xiangyang Wang,et al.  Feature selection based on rough sets and particle swarm optimization , 2007, Pattern Recognit. Lett..

[8]  Raimir Holanda Filho,et al.  A New Collaborative Approach for Intrusion Detection System on Wireless Sensor Networks , 2008, TeNe.

[9]  Philip S. Yu,et al.  Outlier detection for high dimensional data , 2001, SIGMOD '01.

[10]  YuanYuan Li,et al.  Anomaly detection in unknown environments using wireless sensor networks , 2010 .

[11]  Biming Tian,et al.  Anomaly detection in wireless sensor networks: A survey , 2011, J. Netw. Comput. Appl..

[12]  Anazida Zainal,et al.  A Survey of Intrusion Detection Schemes in Wireless Sensor Networks , 2012 .

[13]  Ramesh Govindan,et al.  Sensor faults: Detection methods and prevalence in real-world datasets , 2010, TOSN.

[14]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[15]  Marimuthu Palaniswami,et al.  Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.

[16]  Gustavo Alonso,et al.  Declarative Support for Sensor Data Cleaning , 2006, Pervasive.

[17]  Victoria J. Hodge,et al.  A Survey of Outlier Detection Methodologies , 2004, Artificial Intelligence Review.

[18]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[19]  Supakit Siripanadorn,et al.  Anomaly detection in wireless sensor networks using self-organizing map and wavelets , 2010 .

[20]  Gregory J. Pottie,et al.  Sensor network data fault types , 2007, TOSN.

[21]  Marimuthu Palaniswami,et al.  Clustering ellipses for anomaly detection , 2011, Pattern Recognit..

[22]  Dimitrios Gunopulos,et al.  Distributed deviation detection in sensor networks , 2003, SGMD.

[23]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[24]  Marimuthu Palaniswami,et al.  Incremental Elliptical Boundary Estimation for Anomaly Detection in Wireless Sensor Networks , 2011, 2011 IEEE 11th International Conference on Data Mining.

[25]  Song Han,et al.  Highly Efficient Distance-Based Anomaly Detection through Univariate with PCA in Wireless Sensor Networks , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[26]  Dimitrios Gunopulos,et al.  Online outlier detection in sensor data using non-parametric models , 2006, VLDB.

[27]  Muhammad Ali Imran,et al.  Online anomaly rate parameter tracking for anomaly detection in wireless sensor networks , 2012, 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).

[28]  Thomas G. Dietterich,et al.  Spatiotemporal Models for Data-Anomaly Detection in Dynamic Environmental Monitoring Campaigns , 2011, TOSN.

[29]  Simin Nadjm-Tehrani,et al.  Adaptive real-time anomaly detection with incremental clustering , 2007, Inf. Secur. Tech. Rep..

[30]  Miao Xie,et al.  Anomaly Detection in Wireless Sensor Networks , 2013 .

[31]  Peter Anderson,et al.  A roadmap to the future. , 2014, Canadian Urological Association journal = Journal de l'Association des urologues du Canada.

[32]  Zheng Yuan,et al.  Intrusion Detection for Wireless Sensor Networks Based on Multi-agent and Refined Clustering , 2009, 2009 WRI International Conference on Communications and Mobile Computing.

[33]  Vipin Kumar,et al.  Introduction to Data Mining , 2022, Data Mining and Machine Learning Applications.

[34]  Marimuthu Palaniswami,et al.  Streaming analysis in wireless sensor networks , 2014, Wirel. Commun. Mob. Comput..

[35]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[36]  Lei Chen,et al.  In-network Outlier Cleaning for Data Collection in Sensor Networks , 2006, CleanDB.

[37]  Antonio Alfredo Ferreira Loureiro,et al.  Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.

[38]  SzczerbickiEdward SMART SYSTEMS INTEGRATION , 2008 .

[39]  Y.A. Sekercioglu,et al.  Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.

[40]  Harshal A. Arolkar,et al.  Ant colony based approach for intrusion detection on cluster heads in WSN , 2011, ICCCS '11.

[41]  Eyal Amir,et al.  Real-time Bayesian Anomaly Detection for Environmental Sensor Data , 2007 .

[42]  Kieu-Xuan Thuc,et al.  A collaborative event detection scheme using fuzzy logic in clustered wireless sensor networks , 2011 .

[43]  H. S. Wolff,et al.  iRun: Horizontal and Vertical Shape of a Region-Based Graph Compression , 2022, Sensors.

[44]  Michael R. Lyu,et al.  An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks , 2007, Comput. Commun..

[45]  Farrukh Aslam Khan,et al.  Intrusion Detection Systems for Wireless Sensor Networks: A Survey , 2009, FGIT-FGCN.

[46]  Nirvana Meratnia,et al.  Ensuring high sensor data quality through use of online outlier detection techniques , 2010, Int. J. Sens. Networks.

[47]  Fang Liu,et al.  Insider Attacker Detection in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[48]  E. Elnahrawy Directions in Sensor Data Streams : Solutions and Challenges , 2003 .

[49]  Lidan Wang,et al.  Predictive Modeling-Based Data Collection in Wireless Sensor Networks , 2008, EWSN.

[50]  Rekha Jain,et al.  Wireless Sensor Network -A Survey , 2013 .

[51]  Anazida Zainal,et al.  One-Class Principal Component Classifier for anomaly detection in wireless sensor network , 2012, 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN).

[52]  Nirvana Meratnia,et al.  Outlier Detection Techniques for Wireless Sensor Networks: A Survey , 2008, IEEE Communications Surveys & Tutorials.

[53]  S. Manesis,et al.  A Survey of Applications of Wireless Sensors and Wireless Sensor Networks , 2005, Proceedings of the 2005 IEEE International Symposium on, Mediterrean Conference on Control and Automation Intelligent Control, 2005..

[54]  Mohamed Medhat Gaber,et al.  Learning from Data Streams: Processing Techniques in Sensor Networks , 2007 .

[55]  Marimuthu Palaniswami,et al.  Elliptical anomalies in wireless sensor networks , 2009, TOSN.

[56]  Daniel Curiac,et al.  Ensemble based sensing anomaly detection in wireless sensor networks , 2012, Expert Syst. Appl..

[57]  Zubair A. Baig Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks , 2011, Comput. Commun..

[58]  Kay Römer,et al.  The design space of wireless sensor networks , 2004, IEEE Wireless Communications.

[59]  Sajal K. Das,et al.  Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks , 2009, Ad Hoc Networks.

[60]  Christopher Leckie,et al.  Sensor data boundary estimation for anomaly detection in wireless sensor networks , 2010, The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2010).

[61]  F. Freiling,et al.  Towards Intrusion Detection in Wireless Sensor Networks , 2007 .

[62]  Mohamed Medhat Gaber,et al.  Data Stream Processing in Sensor Networks , 2007 .

[63]  Kang G. Shin,et al.  Detecting SYN flooding attacks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[64]  Jiawei Han,et al.  Data Mining: Concepts and Techniques , 2000 .

[65]  Bo Sheng,et al.  Outlier detection in sensor networks , 2007, MobiHoc '07.

[66]  Oliver Obst,et al.  Wireless Sensor Network Anomalies: Diagnosis and Detection Strategies , 2011 .

[67]  Young-Koo Lee,et al.  An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks , 2006, ISI.

[68]  Satish Kumar,et al.  Next century challenges: scalable coordination in sensor networks , 1999, MobiCom.

[69]  Tae Ho Cho,et al.  Fuzzy Logic Anomaly Detection Scheme for Directed Diffusion Based Sensor Networks , 2006, FSKD.

[70]  Yongwha Chung,et al.  An Adaptive Intrusion Detection Algorithm Based on Clustering and Kernel-Method , 2006, PAKDD.

[71]  D. P. Agrawal,et al.  Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..

[72]  Cristina Alcaraz,et al.  Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration? , 2010, IWSEC 2010.

[73]  Dimple Juneja,et al.  An Ant Based Framework for Preventing DDoS Attack in Wireless Sensor Networks , 2010, ArXiv.

[74]  Saad B. Qaisar,et al.  Real time energy efficient approach to Outlier & event detection in wireless sensor networks , 2012, 2012 IEEE International Conference on Communication Systems (ICCS).

[75]  Wipawee Usaha,et al.  Discrete Wavelet Transform and One-Class Support Vector Machines for anomaly detection in wireless sensor networks , 2011, 2011 International Symposium on Intelligent Signal Processing and Communications Systems (ISPACS).

[76]  Zahra Taghikhaki,et al.  Distributed Event Detection in Wireless Sensor Networks for Disaster Management , 2010, 2010 International Conference on Intelligent Networking and Collaborative Systems.

[77]  Vashek Matyas,et al.  Neighbor-Based Intrusion Detection for Wireless Sensor Networks , 2010, 2010 6th International Conference on Wireless and Mobile Communications.

[78]  Salman Ahmad Khan,et al.  Fuzzy Logic-Based Decision Making for Detecting Distributed Node Exhaustion Attacks in Wireless Sensor Networks , 2010, 2010 Second International Conference on Future Networks.

[79]  Robert Szewczyk,et al.  System architecture directions for networked sensors , 2000, ASPLOS IX.

[80]  Murali S. Kodialam,et al.  Detecting network intrusions via sampling: a game theoretic approach , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[81]  Marimuthu Palaniswami,et al.  Anomaly Detection in Environmental Monitoring Networks [Application Notes] , 2011, IEEE Computational Intelligence Magazine.

[82]  Nirvana Meratnia,et al.  Adaptive and Online One-Class Support Vector Machine-Based Outlier Detection Techniques for Wireless Sensor Networks , 2009, 2009 International Conference on Advanced Information Networking and Applications Workshops.

[83]  Saad B. Qaisar,et al.  One-class support vector machines: analysis of outlier detection for wireless sensor networks in harsh environments , 2013, Artificial Intelligence Review.

[84]  Ajith Abraham,et al.  IDEAS: intrusion detection based on emotional ants for sensors , 2005, 5th International Conference on Intelligent Systems Design and Applications (ISDA'05).

[85]  Jiankun Hu,et al.  Histogram-Based Online Anomaly Detection in Hierarchical Wireless Sensor Networks , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[86]  Makoto Takizawa,et al.  A Survey on Clustering Algorithms for Wireless Sensor Networks , 2010, 2010 13th International Conference on Network-Based Information Systems.

[87]  Felix C. Freiling,et al.  Cooperative Intrusion Detection in Wireless Sensor Networks , 2009, EWSN.

[88]  Hsiao-Hwa Chen,et al.  Scalable Hyper-Grid k-NN-based Online Anomaly Detection in Wireless Sensor Networks , 2012 .

[89]  Anazida Zainal,et al.  An adaptive and efficient dimension reduction model for multivariate wireless sensor networks applications , 2013, Appl. Soft Comput..

[90]  Zhang Yang,et al.  An online outlier detection technique for wireless sensor networks using unsupervised quarter-sphere support vector machine , 2008, 2008 International Conference on Intelligent Sensors, Sensor Networks and Information Processing.

[91]  Jeffrey J. P. Tsai,et al.  A Framework of Machine Learning Based Intrusion Detection for Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).

[92]  Jiankun Hu,et al.  Scalable Hypergrid k-NN-Based Online Anomaly Detection in Wireless Sensor Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.

[93]  Yuan Yao,et al.  Online anomaly detection for sensor systems: A simple and efficient approach , 2010, Perform. Evaluation.

[94]  Marimuthu Palaniswami,et al.  Detecting data anomalies in wireless sensor networks , 2010 .

[95]  N. Shahid,et al.  Energy efficient outlier detection in WSNs based on temporal and attribute correlations , 2011, 2011 7th International Conference on Emerging Technologies.

[96]  Sutharshan Rajasegarar,et al.  Anomaly detection by clustering ellipsoids in wireless sensor networks , 2009, 2009 International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).

[97]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[98]  Y. Zhang,et al.  – 20 Statistics-based outlier detection for wireless sensor networks , 2012 .

[99]  Nirvana Meratnia,et al.  Distributed online outlier detection in wireless sensor networks using ellipsoidal support vector machine , 2013, Ad Hoc Networks.

[100]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[101]  Tassos Dimitriou,et al.  Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks , 2007, ALGOSENSORS.

[102]  Ran Wolff,et al.  Noname manuscript No. (will be inserted by the editor) In-Network Outlier Detection in Wireless Sensor Networks , 2022 .

[103]  Antonio Alfredo Ferreira Loureiro,et al.  Malicious node detection in wireless sensor networks , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..

[104]  Daniel Curiac,et al.  Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique , 2007, International Conference on Networking and Services (ICNS '07).

[105]  Marimuthu Palaniswami,et al.  Centered Hyperspherical and Hyperellipsoidal One-Class Support Vector Machines for Anomaly Detection in Sensor Networks , 2010, IEEE Transactions on Information Forensics and Security.

[106]  Loren Schwiebert,et al.  Distributed Event Detection in Sensor Networks , 2006, 2006 International Conference on Systems and Networks Communications (ICSNC'06).

[107]  Wei Hong,et al.  Model-Driven Data Acquisition in Sensor Networks , 2004, VLDB.

[108]  S. Papavassiliou,et al.  Diagnosing Anomalies and Identifying Faulty Nodes in Sensor Networks , 2007, IEEE Sensors Journal.

[109]  Aric A. Hagberg,et al.  Separating the Wheat from the Chaff: Practical Anomaly Detection Schemes in Ecological Applications of Distributed Sensor Networks , 2007, DCOSS.

[110]  D. Janakiram,et al.  Outlier Detection in Wireless Sensor Networks using Bayesian Belief Networks , 2006, 2006 1st International Conference on Communication Systems Software & Middleware.