Finding abnormal events in home sensor network environment using correlation graph

Anomaly detection in sensor network seems a challenge when encountering the limitation of the energy requirement and dynamics environments. It is to rapidly analyze and identify the abnormal events among the extreme volume data. Using correlation graph representation to correlate the events generated by sensor networks is capable to find the intentional dependency behavior's insight for detecting home sensor network abnormal events. In this study, we proposed an anomaly detection mechanism based on correlation graphs of sensor networks for rapidly identifying abnormal home events. The proposed mechanism which makes the following contributions: (a) it is automatically identify the abnormal event under home sensor network environment (b) it eliminates irrelevant events for saving the computation power (c) it is easily to apply on different machine learning classifiers for enhancement. The evaluation from Intel Berkeley Research lab sensor network data set. The proposed mechanism performs well in sensor events elimination and abnormal event detection.

[1]  A. Siva Sangari Anomaly detection in wireless sensor networks , 2010 .

[2]  Mehmet Kaya,et al.  Determination of fuzzy logic membership functions using genetic algorithms , 2001, Fuzzy Sets Syst..

[3]  Marimuthu Palaniswami,et al.  Anomaly detection in wireless sensor networks , 2008, IEEE Wireless Communications.

[4]  M. S. Ju,et al.  Design of adaptive fuzzy controls based on natural control laws , 1996, Fuzzy Sets Syst..

[5]  Patrik D'haeseleer,et al.  An immunological approach to change detection: theoretical results , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.

[6]  F. Gomide,et al.  Ten years of genetic fuzzy systems: current framework and new trends , 2001, Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569).

[7]  Francisco Herrera,et al.  Tuning fuzzy logic controllers by genetic algorithms , 1995, Int. J. Approx. Reason..

[8]  Zbigniew Michalewicz,et al.  Genetic Algorithms + Data Structures = Evolution Programs , 1992, Artificial Intelligence.

[9]  Randy L. Haupt,et al.  Practical Genetic Algorithms , 1998 .

[10]  B. Noble,et al.  On certain integrals of Lipschitz-Hankel type involving products of bessel functions , 1955, Philosophical Transactions of the Royal Society of London. Series A, Mathematical and Physical Sciences.

[11]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[12]  Ralph B. L. Gwatkin The technical writer's handbook, by Matt Young, University Science Books, Mill Valley, California, 1989, 232 pp, $22.50 , 1990 .

[13]  Huey-Ming Lee,et al.  An Emergency Model of Home Network Environment Based on Genetic Algorithm , 2005, KES.

[14]  Francisco Herrera,et al.  A three-stage evolutionary process for learning descriptive and approximate fuzzy-logic-controller knowledge bases from examples , 1997, Int. J. Approx. Reason..

[15]  Kuhn-Il Lee,et al.  A real-time self-tuning fuzzy controller through scaling factor adjustment for the steam generator of NPP , 1995, Fuzzy Sets Syst..

[16]  Stephanie Forrest,et al.  Infect Recognize Destroy , 1996 .

[17]  Huey-Ming Lee,et al.  A Self-adaptive Evolutionary Negative Selection Approach for Home Anomaly Events Detection , 2007, KES.

[18]  J. Maxwell A Treatise on Electricity and Magnetism , 1873, Nature.

[19]  Huey-Ming Lee,et al.  Intelligent Control Model of Information Appliances , 2004, KES.

[20]  Elaine Shi,et al.  Designing secure sensor networks , 2004, IEEE Wireless Communications.