2020
DOI: 10.3390/sym12030328
|View full text |Cite
|
Sign up to set email alerts
|

A Systematic Literature Review on Outlier Detection in Wireless Sensor Networks

Abstract: A wireless sensor network (WSN) is defined as a set of spatially distributed and interconnected sensor nodes. WSNs allow one to monitor and recognize environmental phenomena such as soil moisture, air pollution, and health data. Because of the very limited resources available in sensors, the collected data from WSNs are often characterized as unreliable or uncertain. However, applications using WSNs demand precise readings, and uncertainty in data reading can cause serious damage (e.g., health monitoring data)… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
57
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 49 publications
(57 citation statements)
references
References 166 publications
0
57
0
Order By: Relevance
“…The problems pointed out previously are common when time-series are analyzed, and different approaches have been published for solving them [19,22,23]. The common characteristic of most of them is that their algorithms present one or more steps in which a classification model (e.g., a regression model) must be calculated before addressing the same problem found in the other, more general, outlier identification methods.…”
Section: Local Transilience Outlier Identification Methods (Lto)mentioning
confidence: 99%
“…The problems pointed out previously are common when time-series are analyzed, and different approaches have been published for solving them [19,22,23]. The common characteristic of most of them is that their algorithms present one or more steps in which a classification model (e.g., a regression model) must be calculated before addressing the same problem found in the other, more general, outlier identification methods.…”
Section: Local Transilience Outlier Identification Methods (Lto)mentioning
confidence: 99%
“…Their study presents different techniques related to intrusion detections. Some studies proposed several anomaly detection techniques based on supervised, unsupervised, and clustering methods [45][46][47][48][49]. The lack of discussion and research problems in the available datasets are one of the research gaps that need to be addressed.…”
Section: Related Workmentioning
confidence: 99%
“…While we have consistently followed the guidelines of Wolfswinkel et al [10] to search and select relevant articles to ensure the completeness of the data sample in this study, there may still be some publications that have not been included in our final selection. There are three limitations to consider.…”
Section: Limitations Of the Studymentioning
confidence: 99%
“…RQ3: What are the methods used to address these DQ issues in the SF context? In this study, the systematic literature review (SLR) approach was selected as it offers a method for the selection, analysis and interpretation of available literature in relation to addressing a specific research topic, a RQ or a phenomenon of interest [10] that best fits this study to study and understand the state of the art on the topic of interest. We followed the guidelines proposed by Wolfswinkel et al [11] to conduct an SLR of the empirical studies that have a focus on DQ affecting BDA in the SF context (up to 2020, inclusive), with well-defined steps to provide comprehensive information to the research community.…”
Section: Introductionmentioning
confidence: 99%