Spatial anomaly detection in sensor networks using neighborhood information

Elsevier BV - Tập 33 - Trang 41-56 - 2017
Hedde HWJ Hedde HWJ, Giovanni Giovanni, Arturo Arturo, Heinrich J. Heinrich J., Antonio Antonio

Tài liệu tham khảo

Whitmore, 2015, The internet of thingsa survey of topics and trends, Inf. Syst. Front., 17, 261, 10.1007/s10796-014-9489-2 Fortino, 2012, A flexible building management framework based on wireless sensor and actuator networks, J. Netw. Comput. Appl., 35, 1934, 10.1016/j.jnca.2012.07.016 Othman, 2012, Wireless sensor network applications: a study in environment monitoring system, Proc. Eng., 41, 1204, 10.1016/j.proeng.2012.07.302 Demigha, 2013, On energy efficiency in collaborative target tracking in wireless sensor network: a review, Commun. Surv. Tut. IEEE, 15, 1210, 10.1109/SURV.2012.042512.00030 Sivavakeesar, 2004, Effective management through prediction-based clustering approach in the next-generation ad hoc networks, vol. 7, 4326 Menkovski, 2010, Machine learning approach for quality of experience aware networks, 461 N.N. Qadri, A. Liotta, Pervasive Computing: Innovations in Intelligent Multimedia and Applications, Springer, London, pp. 433–453. 10.1007/978-1-84882-599-4_19 Fortino, 2015, Collaborative wireless sensor networks: architectures, algorithms and applications, Inf. Fusion, 22, 1, 10.1016/j.inffus.2014.03.004 Liotta, 2012, A survey on networks for smartmetering systems, Int. J. Pervasive Comput.Commun., 8, 23, 10.1108/17427371211221072 Liotta, 2013, The cognitive net is coming, IEEE Spect., 50, 26, 10.1109/MSPEC.2013.6565557 Liotta, 2002, Exploiting agent mobility for large-scale network monitoring, IEEE Netw., 16, 7, 10.1109/MNET.2002.1002994 Liu, 2013, Volcanic earthquake timing using wireless sensor networks, 91 Fortino, 2013, Enabling effective programming and flexible management of efficient body sensor network applications, IEEE Trans. Human Machine Syst., 43, 115, 10.1109/TSMCC.2012.2215852 Alzghoul, 2012, Data stream forecasting for system fault prediction, Comput. Indus. Eng., 62, 972, 10.1016/j.cie.2011.12.023 Chandola, 2007, Anomaly detection: a survey, ACM Comput. Surv. (CSUR), 41, 1, 10.1145/1541880.1541882 Phua, 2010, A comprehensive survey of data mining-based fraud detection research, 1 Kao, 2009, Motivating complex dependence structures in data mining: a case study with anomaly detection in climate, 223 Modi, 2013, A survey of intrusion detection techniques in cloud, J. Netw. Comput. Appl., 36, 42, 10.1016/j.jnca.2012.05.003 Zeng, 2012, Distributed data mining: a survey, Inf. Technol. Manage., 13, 403, 10.1007/s10799-012-0124-y Liu, 2011, Does wireless sensor network scale? A measurement study on greenorbs, 873 Garcia-Teodoro, 2009, Anomaly-based network intrusion detection: techniques, systems and challenges, Comput.Secur., 28, 18, 10.1016/j.cose.2008.08.003 Wang, 2011, Statistical techniques for online anomaly detection in data centers, 385 Budalakoti, 2009, Anomaly detection and diagnosis algorithms for discrete symbol sequences with applications to airline safety, IEEE Trans. Systems Man Cybernetics Part C Appl. Rev., 39, 101, 10.1109/TSMCC.2008.2007248 Curiac, 2012, Ensemble based sensing anomaly detection in wireless sensor networks, Expert Systems with Applications, 39, 9087, 10.1016/j.eswa.2012.02.036 Serdio, 2014, Fault detection in multi-sensor networks based on multivariate time-series models and orthogonal transformations, Inf. Fusion, 20, 272, 10.1016/j.inffus.2014.03.006 Gaillard, 2009, Quality control of large argo datasets, J. Atm. Ocean. Technol., 26, 337, 10.1175/2008JTECHO552.1 Langendoen, 2006, Murphy loves potatoes: experiences from a pilot sensor network deployment in precision agriculture, 8 Abu Alsheikh, 2014, Machine learning in wireless sensor networks: algorithms, strategies, and applications, Commun. Surv. Tut. IEEE, 16, 1996, 10.1109/COMST.2014.2320099 Nguyen, 2013, Applying time series analysis and neighbourhood voting in a decentralised approach for fault detection and classification in wsns, 234 Chang, 2009, Mote-based online anomaly detection using echo state networks, 72 Fortino, 2015, A framework for collaborative computing and multi-sensor data fusion in body sensor networks, Inf. Fusion, 22, 50, 10.1016/j.inffus.2014.03.005 Luo, 2005, Energy efficient routing with adaptive data fusion in sensor networks, 80 Cabrera, 2008, Ensemble methods for anomaly detection and distributed intrusion detection in mobile ad-hoc networks, Inf. Fusion, 9, 96, 10.1016/j.inffus.2007.03.001 Kumarage, 2013, Distributed anomaly detection for industrial wireless sensor networks based on fuzzy data modelling, J. Parallel Distrib. Comput., 73, 790, 10.1016/j.jpdc.2013.02.004 Rajasegarar, 2006, Distributed anomaly detection in wireless sensor networks, 1 Spanos, 2005, Distributed sensor fusion using dynamic consensus Aysal, 2008, Distributed average consensus with dithered quantization, IEEE Trans. Signal Process., 56, 4905, 10.1109/TSP.2008.927071 LeBlanc, 2012, Consensus of multi-agent networks in the presence of adversaries using only local information, 1 Branch, 2013, In-network outlier detection in wireless sensor networks, Knowl.Info.Syst., 34, 23, 10.1007/s10115-011-0474-5 Flouri, 2008, Distributed consensus algorithms for svm training in wireless sensor networks, 1 Barbarossa, 2007, Achieving consensus in self-organizing wireless sensor networks: the impact of network topology on energy consumption, vol. 2, II Schubert, 2014, Local outlier detection reconsidered: a generalized view on locality with applications to spatial, video, and network outlier detection, Data Mining Knowl. Disc., 28, 190, 10.1007/s10618-012-0300-z Breunig, 2000, Lof: identifying density-based local outliers, vol. 29, 93 Chawla, 2006, Slom: a new measure for local spatial outliers, Knowl. Inf. Syst., 9, 412, 10.1007/s10115-005-0200-2 Chen, 2010, Gls-sod: a generalized local statistical approach for spatial outlier detection, 1069 McDonald, 2013, A survey of methods for finding outliers in wireless sensor networks, J. Netw. Sys. Manage., 1 Chitradevi, 2013, Efficient density based techniques for anomalous data detection in wireless sensor networks, J. Appl. Sci. Eng., 16, 211223 Xu, 2013, A hierarchical framework using approximated local outlier factor for efficient anomaly detection, Proc. Comput. Sci., 19, 1174, 10.1016/j.procs.2013.06.168 Wu, 2007, Localized outlying and boundary data detection in sensor networks, IEEE Trans.Knowl. Data Eng., 19, 1145, 10.1109/TKDE.2007.1067 Fang, 2014, Data collection with in-network fault detection based on spatial correlation, 56 Wang, 2006, Adaptive routing for sensor networks using reinforcement learning Zungeru, 2012, Classical and swarm intelligence based routing protocols for wireless sensor networks: a survey and comparison, J. Netw. Comput.r Appl., 35, 1508, 10.1016/j.jnca.2012.03.004 Zhang, 2013, Distributed online outlier detection in wireless sensor networks using ellipsoidal support vector machine, Ad hoc Netw., 11, 1062, 10.1016/j.adhoc.2012.11.001 Bosman, 2013, Anomaly detection in sensor systems using lightweight machine learning, 7 Bosman, 2013, Online extreme learning on fixed-point sensor networks, 319 Bosman, 2014, Online fusion of incremental learning for wireless sensor networks, 525 Bosman, 2015, Ensembles of incremental learners to detect anomalies in ad hoc sensor networks, Ad Hoc Netw., 35, 14, 10.1016/j.adhoc.2015.07.013 Birta, 2013, Modelling and Simulation, 10.1007/978-1-4471-2783-3 Basu, 2014, Modelling and Simulation of Diffusive Processes, 10.1007/978-3-319-05657-9 F. Cauteruccio, G. Fortino, A. Guerrieri, G. Terracina, Internet and Distributed Computing Systems: 7th International Conference, IDCS 2014, Calabria, Italy, September 22-24, 2014. Proceedings, Springer International Publishing, Cham, pp. 383–395. doi:10.1007/978-3-319-11692-1_33. Romer, 2008, Aggregating sensor data from overlapping multi-hop network neighborhoods: Push or pull?, 107 Lee Rodgers, 1988, Thirteen ways to look at the correlation coefficient, Am. Statist., 42, 59, 10.1080/00031305.1988.10475524 Silver, 1987, Averaging correlation coefficients: should fisher’s z transformation be used?, J. Appl. Psychol., 72, 146, 10.1037/0021-9010.72.1.146 Batty, 2014, Entropy, complexity, and spatial information, J. Geograph. Syst., 16, 363, 10.1007/s10109-014-0202-2 De Berg, 2000 Lee, 2007, Improving wireless simulation through noise modeling, 21 Huang, 2004, Extreme learning machine: a new learning scheme of feedforward neural networks, vol. 2, 985 Pao, 1994, Learning and generalization characteristics of the random vector functional-link net, Neurocomputing, 6, 163, 10.1016/0925-2312(94)90053-1 Fuchs, 2010, Online segmentation of time series based on polynomial least-squares approximations, IEEE Trans.Pattern Anal. Mach. Intell., 32, 2232, 10.1109/TPAMI.2010.44 Levis, 2003, Tossim: accurate and scalable simulation of entire tinyos applications, 126 Sharma, 2007, On the prevalence of sensor faults in real-world deployments, 213 Powers, 2007, Evaluation: from precision, recall and f-factor to roc, informedness, markedness & correlation, Evaluation Massey, 1951, The Kolmogorov–Smirnov test for goodness of fit, J. Am.Statist. Assoc., 46, 68, 10.1080/01621459.1951.10500769