Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(96.97KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distributed Wireless Sensor Networks
Muktikanta Sa, Manas Ranjan Nayak, Smiya Kumar Rath
Pages - 580 - 588     |    Revised - 31-01-2011     |    Published - 08-02-2011
Volume - 4   Issue - 6    |    Publication Date - January / February  Table of Contents
MORE INFORMATION
KEYWORDS
Wireless Sensor Network, Distributed data mining, Machine learning, Anomaly detection
ABSTRACT
Wireless Sensor networks (WSN) is a promising technology for current as well as future. There is vast use of WSN in different fields like military surveillance and target tracking, traffic management, weather forecasting, habitat monitoring, designing smart home, structural and seismic monitoring, etc. For success application of ubiquitous WSN it is important to maintain the basic security, both from external and internal attacks else entire network may collapse. Maintaining security in WSN network is not a simple job just like securing wireless networks because sensor nodes are deployed in randomize manner. Hence major challenges in WSN are security. In this paper we have discussed different attacks in WSN and how these attacks are efficiently detected by using our agent based mode. Our model identifies the abnormal event pattern sensor nodes in a largely deployed distributed sensor network under a common anomaly detection framework which will design by agent based learning and distributed data mining technique.
CITED BY (12)  
1 Priest, B., Vuksani, E., Wagner, N., Tello, B., Carter, K. M., & Streilein, W. W. Agent-Based Decision Support for Moving Target Technology Deployment.
2 Gunduz, S., Arslan, B., & Demirci, M. (2015, December).A Review of Machine Learning Solutions to Denial-of-Services Attacks in Wireless Sensor Networks. In 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA) (pp. 150-155). IEEE.
3 Priest, B. W., Vuksani, E., Wagner, N., Tello, B., Carter, K. M., & Streilein, W. W. (2015, April). Agent-based simulation in support of moving target cyber defense technology development and evaluation. In Proceedings of the 18th Symposium on Communications & Networking (pp. 16-23). Society for Computer Simulation International.
4 Singh, Y., & Chugh, U. Clustering, Information Fusion and Event Detection in Wireless Sensor Networks: A Review.
5 Wagner, N., Lippmann, R., Winterrose, M., Riordan, J., Yu, T., & Streilein, W. W. (2015, April).Agent-based simulation for assessing network security risk due to unauthorized hardware. In Proceedings of the Symposium on Agent-Directed Simulation (pp. 18-26). Society for Computer Simulation International.
6 Kansal, A., & Singh, Y. Survey on Machine Learning Techniques for Event Detection in Wireless Sensor Networks.
7 Xu, L., Yeh, Y. R., Lee, Y. J., & Li, J. (2013). A Hierarchical Framework Using Approximated Local Outlier Factor for Efficient Anomaly Detection. Procedia Computer Science, 19, 1174-1181.
8 Sladic, G., Vidakovic, M., & Konjovic, Z. (2013). Network Monitoring Using Intelligent Mobile Agents. In Intelligent Systems: Models and Applications (pp. 301-318). Springer Berlin Heidelberg.
9 Chaoyu, Y. A. N. G., Yerong, H. E., & Minli, S. O. N. G. (2013). Wireless Sensor Network Topology Control Based on Agent. Sensors & Transducers (1726-5479), 160(12).
10 Soliman, H. H., Hikal, N. A., & Sakr, N. A. (2012). A comparative performance evaluation of intrusion detection techniques for hierarchical wireless sensor networks. Egyptian Informatics Journal, 13(3), 225-238.
11 Fernandes, R., Li, B., Vadakkeveedu, K., Verma, A., Gustafson, P., & Hwang, J. (2012, May). Agent-based analysis of trustworthiness in wireless sensor networks. In SPIE Defense, Security, and Sensing (pp. 84070W-84070W). International Society for Optics and Photonics.
12 G. Sladic, M. Vidakovic and Z. Konjovic, “Agent Based System for Network Availability and Vulnerability Monitoring”, in Proceedings of Intelligent Systems and Informatics (SISY), 2011 IEEE 9th International Symposium, Subotica, 8-10 Sept. 2011, pp. 53 – 58.
1 Google Scholar
2 Academic Journals Database
3 CiteSeerX
4 Libsearch
5 Bielefeld Academic Search Engine (BASE)
6 Scribd
7 SlideShare
8 PdfSR
1 Bhaskar Krishnamachari “Networking Wireless Sensors”. published in the USA by CambridgeUnversity Press, New York in 2005.
2 T. G. LUPU “Main Types of Attacks in Wireless Sensor Networks” International Conference in "Recent Advances in Signals and Systems". in 2009, ISSN: 1790-5109, ISBN: 978-960-474-114-4.
3 Xiaojiang Du Hsiao-Hwa Chen North Dakota State Univ., Fargo, “Security in wireless sensor networks”. Wireless Communications, IEEE Publication Date: Aug. 2008 Volume: 15 , Issue:4 On page(s): 60 – 66.
4 R. Nakkeeran, T. Aruldoss Albert and R.Ezumalai “Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks”. IACSIT International Journal of Engineering and Technology Vol. 2, No.1, February, 2010, ISSN: 1793-8236.
5 Dr. G. Padmavathi and Mrs. D. Shanmugapriya, “A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks”. (IJCSIS) International Journal of Computer Science and Information Security, Vol. 4, No. 1 & 2, 2009.
6 K.Q. Yan, S.C. Wang, C.W. Liu, “A Hybrid Intrusion Detection System of Cluster-based Wireless Sensor Networks”. Proceedings of the International MultiConference of Engineers and Computer Scientists 2009 Vol I, IMECS 2009, March 18 - 20, 2009, Hong Kong.
7 P C Kishore Raja , Dr.M.Suganthi.M, R.Sunder, “Wireless node behavior based intrusion detection using genetic algorithm”. Ubiquitous Computing and Communication Journal, June 2010.
8 Guo Bin,Li Zhe, “United voting dynamic cluster routing algorithm based on residual-energy in wireless sensor networks”. Journal of Electronics & Information Technology.2007,29(12).pp:3006-3010.
9 Muruganathan S D, Ma DCF, Bhasin PI, et al. “A centralized energy-efficient routing protocol for wireless sensor networks”. IEEE Communications Magazine, 2005,43(3): 8 – 13.
10 Sooyeon Shin, Taekyoung Kwon, Member, IEEE, Gil-Yong Jo, Youngman Park, and Haekyu Rhy, “An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks”. IEEE Transactions on Industrial Informatics, Vol. 6, No. 4, Nov. 2010.
11 Snakar, K. Sundaraliga, S. Nalinsky, A. and Miller, D.(2005) “Cisco wireless LAN security”.Expert guidenace for securing year 802:11 networks Cisco Press:U.S.A.
12 Mohteshim Hussain, “passive and active attcaks against wireless lan's”. Unversity of Hertfordshire, England,U.K.
13 Sutharshan Rajasegarar, Christopher Leckie, James C. Bezdek and Marimuthu Palaniswami,“Centered Hyperspherical and Hyperellipsoidal One-Class Support Vector Machines for Anomaly Detection in Sensor Networks”. IEEE Transactions on Information Forensics and Security. Vol. 5, No. 3, Sept. 2010.
14 Masud Moshtaghi, TimothyC.Havens, JamesC.Bezdek, LaurencePark, ChristopherLeckie, Sutharshan Rajasegarar, JamesM.Keller, Marimuthu Palaniswami", “Clustering ellipses for anomaly detection”. Pattern Recognition 44,page 55–69,July 2010.
15 A. Perrig, J. Stankovic, and D. Wagner, “Security in wireless sensor networks,” in Communications of the ACM, Vol. 47, No. 6, June 2004, pp. 53–75.
16 C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: Attacks and countermeasures,” in Proc. of 1st IEEE International Workshop on Sensor Network Protocols and Applications, May 2003.
17 Y. C. Hu, A. Perrig, and D. B. Johnson, “Wormhole detection in wireless ad hoc networks,” in Tech. Rep. TR01-384, Department of Computer Science, Rice University, June 2002.
18 J. R. Douceur, “The sybil attack,” in Proc. of 1st International Workshop on Peer-to-Peer Systems, March 2002.
19 J. Newsome, E. Shi, D. Song, and A. Perrig, “The sybil attack in sensor networks: Analysis and defenses,” in Proc. of 3rd International Symposium on Information Processing in Sensor Networks, April 2004.
20 Y. C. Hu, A. Perrig, and D. B. Johnson, “Packet leashes: A defense against wormhole attacks in wireless ad hod networks,” in Proc. of 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), April 2003.
21 J. Deng, R. Han, and S. Mishra, “Insens: Intrusion-tolerant routing in wireless sensor networks,” in University of Colorado, Department of Computer Science Technical Report CUCS-9393-02,2002.
22 A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, “Spins: Security protocols for sensor networks,” in Proc. of 7th Annual International Conference on Mobile Computing and Networking (MobiCom), July 2001.
23 W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney, “A key management scheme for wireless sensor networks using deployment knowledge,” in Proc. of INFOCOM, March 2004.
24 J. Deng, R. Han, and S. Mishra, “Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks,” in Proc. of the 2004 IEEE International Conference on Dependable Systems and Networks (DSN), June 2004.
25 A. D. Wood and J. A. Stankovic, “Denial of service in sensor networks,” in IEEE Computer,October 2002, pp. 54–62.
26 A. D. Wood, J. A. Stankovic, and S. H. Son, “Jam: A jammed-area mapping service for sensor networks,” in Communications of the ACM, Vol. 47, No. 6, June 2004, pp. 53–75.
Mr. Muktikanta Sa
NIT Warangal - India
alicemukti@gmail.com
Dr. Manas Ranjan Nayak
- India
Professor Smiya Kumar Rath
CEB bhubaneswar - India