2011
DOI: 10.1007/978-3-642-17931-0_12
|View full text |Cite
|
Sign up to set email alerts
|

Wireless Sensor Network Anomalies: Diagnosis and Detection Strategies

Abstract: Abstract. Wireless Sensor Networks (WSNs) can experience problems (anomalies) during deployment, due to dynamic environmental factors or node hardware and software failures. These anomalies demand reliable detection strategies for supporting long term and/or large scale WSN deployments. Several strategies have been proposed for detecting specific subsets of WSN anomalies, yet there is still a need for more comprehensive anomaly detection strategies that jointly address network, node, and data level anomalies. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
63
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 74 publications
(63 citation statements)
references
References 14 publications
0
63
0
Order By: Relevance
“…ESNs with a one-dimensional topography have been investigated in [9], and a topography where several (randomly connected) reservoirs are regularly connected in a grid-like fashion using a wireless sensor network is used in our previous work [10]. Despite these constraints on connectivity between hidden units, e.g., prediction of future states is possible with a reservoir computing method -in the case of sensor networks with one of the applications to detect anomalies [11]. Use of piecewise linear approximations of the hyperbolic tangent transfer function in individual units, similar to our nonlinearities in Figs.…”
Section: Simulation Of Reservoir Computing Approaches In Hardwarementioning
confidence: 99%
“…ESNs with a one-dimensional topography have been investigated in [9], and a topography where several (randomly connected) reservoirs are regularly connected in a grid-like fashion using a wireless sensor network is used in our previous work [10]. Despite these constraints on connectivity between hidden units, e.g., prediction of future states is possible with a reservoir computing method -in the case of sensor networks with one of the applications to detect anomalies [11]. Use of piecewise linear approximations of the hyperbolic tangent transfer function in individual units, similar to our nonlinearities in Figs.…”
Section: Simulation Of Reservoir Computing Approaches In Hardwarementioning
confidence: 99%
“…The closest survey to the one presented here is [Jurdak et al 2011]. It describes anomaly detection strategies for detecting faults due to environmental factors (e.g.…”
Section: Related Surveysmentioning
confidence: 99%
“…Their description of anomaly detection is similar to ours but the two surveys differ notably in the nature of the anomalies considered: attacks in our case, faults in theirs. Jurdak et al [2011] also claim that anomalies can be detected by spatial or temporal comparisons between sen-sors, since it is unlikely that many sensors will exhibit a calibration skew or failure at the same time (assuming there are no group failures). This assumption considers anomalies (faults) as independent but does not hold in the presence of malicious data injections, in particular when there is collusion between the compromised sensors.…”
Section: Related Surveysmentioning
confidence: 99%
“…Firstly, such approach leads to excessive communication load in the network which rapidly depletes the batteries [1]. Secondly, centralized decision making for CC results in slow reaction to changes in network and traffic conditions [3]. Thirdly, a centralized approach does not take advantage of the in-network processing capability of WSNs which permits simple processing and decisionmaking by individual nodes [4].…”
Section: Introductionmentioning
confidence: 99%