ICAD: Indirect correlation based anomaly detection in dynamic WSNs

Anomaly detection is an essential functionality of Wireless Sensor Networks (WSNs) due to their complex behaviors and the wireless dynamics. In dynamic WSNs, many characteristics such as network topology, locations of sensor nodes, change frequently over time. We observe that indirect correlations among multiple attributes of a sensor node can be utilized to capture and model the historical behaviors. Prior studies overlooked indirect correlations while in this study we exploit it for detecting anomaly efficiently and accurately. Therefore, we propose ICAD, an indirect correlation based anomaly detection approach. By applying the Markov chain, the state transition probability matrix is calculated and it is subsequently used to detect anomalies. Compared to prior approaches, ICAD can detect different types of anomalies simultaneously. Furthermore, ICAD is implemented based on TinyOS and evaluated in a test-bed with 17 TelosB motes. Evaluation results show that ICAD has high detection accuracy with acceptable overhead.

[1]  Nirvana Meratnia,et al.  Outlier Detection Techniques for Wireless Sensor Networks: A Survey , 2008, IEEE Communications Surveys & Tutorials.

[2]  Gustavo Alonso,et al.  Declarative Support for Sensor Data Cleaning , 2006, Pervasive.

[3]  Yunhao Liu,et al.  Passive diagnosis for wireless sensor networks , 2010, TNET.

[4]  D. Janakiram,et al.  Outlier Detection in Wireless Sensor Networks using Bayesian Belief Networks , 2006, 2006 1st International Conference on Communication Systems Software & Middleware.

[5]  Sheldon M. Ross Introduction to Probability Models. , 1995 .

[6]  Anne-Marie Kermarrec,et al.  Route in Mobile WSN and Get Self-deployment for Free , 2009, DCOSS.

[7]  Thomas G. Dietterich What is machine learning? , 2020, Archives of Disease in Childhood.

[8]  Tian He,et al.  FIND: faulty node detection for wireless sensor networks , 2009, SenSys '09.

[9]  Tarek F. Abdelzaher,et al.  Towards Diagnostic Simulation in Sensor Networks , 2008, DCOSS.

[10]  Cecilia Mascolo,et al.  Selective Reprogramming of Mobile Sensor Networks through Social Community Detection , 2010, EWSN.

[11]  Congduc Pham,et al.  Risk Management in Intrusion Detection Applications with Wireless Video Sensor Networks , 2009, WCNC 2009.

[12]  S. Kotsiantis,et al.  Discretization Techniques: A recent survey , 2006 .

[13]  Eric R. Zieyel Operations research : applications and algorithms , 1988 .

[14]  Jiawei Han,et al.  Dustminer: troubleshooting interactive complexity bugs in sensor networks , 2008, SenSys '08.

[15]  Philip Levis,et al.  Collection tree protocol , 2009, SenSys '09.

[16]  J. Kemeny,et al.  Introduction to finite mathematics , 1957 .

[17]  B. R. Badrinath,et al.  Context-Aware Sensors , 2004, EWSN.

[18]  Sheldon M. Ross,et al.  Introduction to probability models , 1975 .