Distributed Anomaly Detection in Wireless Sensor Networks Ksutharshan Rajasegarar, Christopher Leckie, Marimutha Palaniswami, James C. Bezdek IEEE ICCS2006(Institutions.

Slides:



Advertisements
Similar presentations
Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection Presented by: Vijay Kumar.
Advertisements

Clustering.
A Hierarchical Multiple Target Tracking Algorithm for Sensor Networks Songhwai Oh and Shankar Sastry EECS, Berkeley Nest Retreat, Jan
Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
CLUSTERING IN WIRELESS SENSOR NETWORKS B Y K ALYAN S ASIDHAR.
Movement-Assisted Sensor Deployment Author : Guiling Wang, Guohong Cao, Tom La Porta Presenter : Young-Hwan Kim.
Onur G. Guleryuz & Ulas C.Kozat DoCoMo USA Labs, San Jose, CA 95110
KAIST Adaptive Triangular Deployment Algorithm for Unattended Mobile Sensor Networks Suho Yang (September 4, 2008) Ming Ma, Yuanyuan Yang IEEE Transactions.
An Energy Efficient Hierarchical Heterogeneous Wireless Sensor Network
Adaptive Data Collection Strategies for Lifetime-Constrained Wireless Sensor Networks Xueyan Tang Jianliang Xu Sch. of Comput. Eng., Nanyang Technol. Univ.,
Clustering over Multiple Evolving Streams by Events and Correlations Mi-Yen Yeh, Bi-Ru Dai, Ming-Syan Chen Electrical Engineering, National Taiwan University.
Self-Correlating Predictive Information Tracking for Large-Scale Production Systems Zhao, Tan, Gong, Gu, Wambolt Presented by: Andrew Hahn.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
A Hierarchical Energy-Efficient Framework for Data Aggregation in Wireless Sensor Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 3, MAY.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Extending Network Lifetime for Precision-Constrained Data Aggregation in Wireless Sensor Networks Xueyan Tang School of Computer Engineering Nanyang Technological.
Probability Grid: A Location Estimation Scheme for Wireless Sensor Networks Presented by cychen Date : 3/7 In Secon (Sensor and Ad Hoc Communications and.
Distributed and Efficient Classifiers for Wireless Audio-Sensor Networks Baljeet Malhotra Ioanis Nikolaidis Mario A. Nascimento University of Alberta Canada.
Adaptive Traffic Light Control with Wireless Sensor Networks Presented by Khaled Mohammed Ali Hassan.
SECURING NETWORKS USING SDN AND MACHINE LEARNING DRAGOS COMANECI –
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
OPTIMAL SERVER PROVISIONING AND FREQUENCY ADJUSTMENT IN SERVER CLUSTERS Presented by: Xinying Zheng 09/13/ XINYING ZHENG, YU CAI MICHIGAN TECHNOLOGICAL.
IPCCC’111 Assessing the Comparative Effectiveness of Map Construction Protocols in Wireless Sensor Networks Abdelmajid Khelil, Hanbin Chang, Neeraj Suri.
A novel gossip-based sensing coverage algorithm for dense wireless sensor networks Vinh Tran-Quang a, Takumi Miyoshi a,b a Graduate School of Engineering,
Grammati Pantziou 1, Aristides Mpitziopoulos 2, Damianos Gavalas 2, Charalampos Konstantopoulos 3, and Basilis Mamalis 1 1 Department of Informatics, Technological.
Security in Wireless Sensor Networks using Cryptographic Techniques By, Delson T R, Assistant Professor, DEC, RSET 123rd August 2014Department seminar.
Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Maximum Network Lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Cardei, M.; Jie Wu; Mingming Lu; Pervaiz, M.O.; Wireless And Mobile.
Algorithms for Wireless Sensor Networks Marcela Boboila, George Iordache Computer Science Department Stony Brook University.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
REECH ME: Regional Energy Efficient Cluster Heads based on Maximum Energy Routing Protocol Prepared by: Arslan Haider. 1.
A new Ad Hoc Positioning System 컴퓨터 공학과 오영준.
Bounded relay hop mobile data gathering in wireless sensor networks
APL: Autonomous Passive Localization for Wireless Sensors Deployed in Road Networks IEEE INFOCOM 2008, Phoenix, AZ, USA Jaehoon Jeong, Shuo Guo, Tian He.
Secure In-Network Aggregation for Wireless Sensor Networks
Central China Normal University A Cluster-based and Range Free Multidimensional Scaling-MAP Localization Scheme in WSN 1 Ke Xu, Yuhua Liu ( ), Cui Xu School.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 7: Naming & Addressing Holger Karl.
University “Ss. Cyril and Methodus” SKOPJE Cluster-based MDS Algorithm for Nodes Localization in Wireless Sensor Networks Ass. Biljana Stojkoska.
Copyright © 2011, Scalable and Energy-Efficient Broadcasting in Multi-hop Cluster-Based Wireless Sensor Networks Long Cheng ∗ †, Sajal K. Das†,
Variable Bandwidth Allocation Scheme for Energy Efficient Wireless Sensor Network SeongHwan Cho, Kee-Eung Kim Korea Advanced Institute of Science and Technology.
A Multi-Channel Cooperative MIMO MAC Protocol for Wireless Sensor Networks(MCCMIMO) MASS 2010.
Energy-Efficient Wake-Up Scheduling for Data Collection and Aggregation Yanwei Wu, Member, IEEE, Xiang-Yang Li, Senior Member, IEEE, YunHao Liu, Senior.
Adaptive Tracking in Distributed Wireless Sensor Networks Lizhi Yang, Chuan Feng, Jerzy W. Rozenblit, Haiyan Qiao The University of Arizona Electrical.
Ahmad Salam AlRefai.  Introduction  System Features  General Overview (general process)  Details of each component  Simulation Results  Considerations.
Data Gathering in Wireless Sensor Networks with Mobile Collectors Ming Ma and Yuanyuan Yang State University of New York, Stony Brook 1 IEEE Parallel and.
Centralized Transmission Power Scheduling in Wireless Sensor Networks Qin Wang Computer Depart., U. of Science & Technology Beijing Edward Y. Hua Wireless.
Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection Wenhai Sun & Ruide Zhang.
Bing Wang, Wei Wei, Hieu Dinh, Wei Zeng, Krishna R. Pattipati (Fellow IEEE) IEEE Transactions on Mobile Computing, March 2012.
FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions Young-Mi Song, Sung-Hee Lee and Young- Bae Ko Ajou University.
Xiaoyuan Liang, Jie Tian, Guiling Wang New Jersey Institute of Technology Deploying Mobile Survivability-Heterogeneous Sensor Networks for Barrier Coverage.
I-Hsin Liu1 Event-to-Sink Directed Clustering in Wireless Sensor Networks Alper Bereketli and Ozgur B. Akan Department of Electrical and Electronics Engineering.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
Event query processing based on data-centric storage in wireless sensor networks Longjian Guo, Yingshu Li, and Jianzhong Li IEEE GLOBECOM Technical Conference.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Load-Balanced Clustering in Wireless Sensor Networks Gaurav Gupta and Mohamed Younis IEEE International Conference on Communications, (ICC 2003)
Network Anomaly Detection Using Autonomous System Flow Aggregates Thienne Johnson 1,2 and Loukas Lazos 1 1 Department of Electrical and Computer Engineering.
Construction of Optimal Data Aggregation Trees for Wireless Sensor Networks Deying Li, Jiannong Cao, Ming Liu, and Yuan Zheng Computer Communications and.
Wireless Access and Networking Technology (WANT) Lab. An Efficient Data Aggregation Approach for Large Scale Wireless Sensor Networks Globecom 2010 Lutful.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
In the name of God.
Presented by Edith Ngai MPhil Term 3 Presentation
Presented by: Saurav Kumar Bengani
Xiaobing Wu, Guihai Chen and Sajal K. Das
Energy-Efficient Communication Protocol for Wireless Microsensor Networks by Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Presented.
Seema Bandyopadhyay and Edward J. Coyle
Motion-Aware Routing in Vehicular Ad-hoc Networks
Edinburgh Napier University
Presentation transcript:

Distributed Anomaly Detection in Wireless Sensor Networks Ksutharshan Rajasegarar, Christopher Leckie, Marimutha Palaniswami, James C. Bezdek IEEE ICCS2006(Institutions of Communications and Computer Systems)

Contents 1.Overview 2.Introduction 3.Problem statement 4.Anomaly Detection 5.Evaluation 6.Conclusion

Overview Identifying misbehaviors is important in sensor networks – Monitoring – Fault diagnosis – Intrusion detection Key problems is minimization – Communication overhead – Energy consumption This paper propose anomaly detection based on below, – Distributed operation in sensors – Cluster based algorithm

Introduction  WSN is vulnerable by fault and malici ous attack due to the facts  Large number of tiny sensor nodes in WSN  Limited power, bandwidth, memory, CPU power  The distribution of misbehaviors  May not be known a priori  Can be identified by sensor or traffic measurem ents

Problem statement A set of sensor node: At time interval each sensor measures a feature vector, each vector is composed of features or attributes where, and After a window size of m measurements each sensor has collected a set of measurements An anomaly is defined as an observation that is appears to be inconsistent with other data in the combined set of measurements

Hierarchical Network Topology

Anomaly Detection Clustering (fixed width clustering) based –Finding groups of similar data points by Euclidian distance as a similarity measure between pair of data Fixed width clustering Detection algorithm –Use nearest neighbor algorithm Detection Approaches –Centralized –Distributed

Centralized approach

Distributed approach

Basic data conditioning 1.Standardization for the values of the feature in different range for using as a distance 2. Feature data scaling into range [0,1] :

Data conditioning in Sensor node

Data conditioning in Gateway Gateway collect linear sum, linear sum of square, number of local data vectors, vector of maximum and minimum values for each attribute from each sensor node and computes the global data below.

Gateway node distributes global data to sensors

Anomaly detection 1.Merging of clusters –Compare each Ci with all other Cj where i!=j and merges Ci with Cj where d(Ci, Cj) i  Eg) a pair of cluster c1 and c2 are similar if inter- cluster distance d(C1, C2) < = w (width) Then new cluster C3 is produced –Center is the mean of the centers of C1 and C2 –Number of data vectors is the sum of those in C1 and C2

Anomaly detection 2.Classify clusters as normal or anomaly –Use KNN(K nearest neighbor) algorithm For each cluster Ci, a set of inter cluster distances DCi={d(Ci, Cj): j=1…(|C|-1), j != i} is computed between centroids of them Among the set of DCi for cluster Ci, the shorest K distances are selected, and computes average inter-cluster distance ICDi of cluster Ci is computed

Anomaly detection 3.Ci is anomalous if ICDi > one standard deviation of the inter-cluster distance SD(ICD) from the mean inter-cluster distance AVG(ICD) –anomaly Ca :

Experiments

Complexity Each sensor node send once the data – Gateway send to each sensor – Computational complexity of each sensor –O(m), m is the number of measurement during time window Fix width clustering algorithm. where is it done ? –For each data vectors, computes distance to each exsiting cluster : O(mNc) Cluster merging. where is it done? And for what? –O(Nc^2), Nc is number of cluster

Conclusion Presented anomaly detection algorithm –distributed based on the data clustering Simulation –using real data gathered from Great Duck Island Evaluation results –Distributed approach achieves comparable performance with centralized approach –Significant reduction in communication overhead Future research in distributed approach –Using multiple KNN parameters –Different kind of anomaly (network attack)