Skip to main content
Top
Published in: Mobile Networks and Applications 1/2020

23-01-2019

Anomaly Detection in UASN Localization Based on Time Series Analysis and Fuzzy Logic

Authors: Anjana P. Das, Sabu M. Thampi, Jaime Lloret

Published in: Mobile Networks and Applications | Issue 1/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Underwater acoustic sensor network (UASN) offers a promising solution for exploring underwater resources remotely. For getting a better understanding of sensed data, accurate localization is essential. As the UASN acoustic channel is open and the environment is hostile, the risk of malicious activities is very high, particularly in time-critical military applications. Since the location estimation with false data ends up in wrong positioning, it is necessary to identify and ignore such data to ensure data integrity. Therefore, in this paper, we propose a novel anomaly detection system for UASN localization. To minimize computational power and storage, we designed separate anomaly detection schemes for sensor nodes and anchor nodes. We propose an auto-regressive prediction-based scheme for detecting anomalies at sensor nodes. For anchor nodes, a fuzzy inference system is designed to identify the presence of anomalous behavior. The detection schemes are implemented at every node for enabling identification of multiple and duplicate anomalies at its origin. We simulated the network, modeled anomalies and analyzed the performance of detection schemes at anchor nodes and sensor nodes. The results indicate that anomaly detection systems offer an acceptable accuracy with high true positive rate and F-Score.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Show more products
Footnotes
1
http://obinet.engr.uconn.edu/wiki/index.php/Aqua-Sim
 
Literature
2.
go back to reference Anjum F, Pandey S, Agrawal P (2005) Secure localization in sensor networks using transmission range variation. In: 2005. IEEE international conference on Mobile adhoc and sensor systems conference. IEEE, pp 9 Anjum F, Pandey S, Agrawal P (2005) Secure localization in sensor networks using transmission range variation. In: 2005. IEEE international conference on Mobile adhoc and sensor systems conference. IEEE, pp 9
3.
go back to reference Ateniese G, Capossele A, Gjanci P, Petrioli C, Spaccini D (2015) Secfun: Security framework for underwater acoustic sensor networks. In: OCEANS 2015-Genova. IEEE, pp 1–9 Ateniese G, Capossele A, Gjanci P, Petrioli C, Spaccini D (2015) Secfun: Security framework for underwater acoustic sensor networks. In: OCEANS 2015-Genova. IEEE, pp 1–9
4.
go back to reference Beniwal M, Singh RP, Sangwan A (2016) A localization scheme for underwater sensor networks without time synchronization. Wireless Personal Communications 88(3):537–552CrossRef Beniwal M, Singh RP, Sangwan A (2016) A localization scheme for underwater sensor networks without time synchronization. Wireless Personal Communications 88(3):537–552CrossRef
5.
go back to reference Chen P, Ma H, Gao S, Huang Y (2015) Ssl: Signal similarity-based localization for ocean sensor networks. Sensors 15(11):29702–29720CrossRef Chen P, Ma H, Gao S, Huang Y (2015) Ssl: Signal similarity-based localization for ocean sensor networks. Sensors 15(11):29702–29720CrossRef
6.
go back to reference Cong Y, Yang G, Wei Z, Zhou W (2010) Security in underwater sensor network. In: 2010 international conference on Communications and mobile computing (CMC). IEEE, vol 1, pp 162–168 Cong Y, Yang G, Wei Z, Zhou W (2010) Security in underwater sensor network. In: 2010 international conference on Communications and mobile computing (CMC). IEEE, vol 1, pp 162–168
7.
go back to reference Das AP, Thampi SM (2015) Secure communication in mobile underwater wireless sensor networks. In: Proceedings of the IEEE International Conference on Advances in Computing, Communications and Informatics, India, pp 2164–2173 Das AP, Thampi SM (2015) Secure communication in mobile underwater wireless sensor networks. In: Proceedings of the IEEE International Conference on Advances in Computing, Communications and Informatics, India, pp 2164–2173
8.
go back to reference Das AP, Thampi SM (2015) Single anchor node based localization in mobile underwater wireless sensor networks. In: Algorithms and architectures for parallel processing. Springer, pp 757– 770 Das AP, Thampi SM (2015) Single anchor node based localization in mobile underwater wireless sensor networks. In: Algorithms and architectures for parallel processing. Springer, pp 757– 770
9.
go back to reference Das AP, Thampi SM (2016) Fault-resilient localization for underwater sensor networks. Ad Hoc Networks Das AP, Thampi SM (2016) Fault-resilient localization for underwater sensor networks. Ad Hoc Networks
10.
go back to reference Das AP, Thampi SM (2016) Simulation tools for underwater sensor networks: a survey. Netw Protocol Algorithm 8(4):41–55CrossRef Das AP, Thampi SM (2016) Simulation tools for underwater sensor networks: a survey. Netw Protocol Algorithm 8(4):41–55CrossRef
11.
go back to reference Dini G, Duca AL (2011) Seflood: a secure network discovery protocol for underwater acoustic networks. In: 2011 IEEE symposium on Computers and communications (ISCC). IEEE, pp 636–638 Dini G, Duca AL (2011) Seflood: a secure network discovery protocol for underwater acoustic networks. In: 2011 IEEE symposium on Computers and communications (ISCC). IEEE, pp 636–638
12.
go back to reference Dini G, Lo Duca A (2012) A secure communication suite for underwater acoustic sensor networks. Sensors 12(11):15133–15158CrossRef Dini G, Lo Duca A (2012) A secure communication suite for underwater acoustic sensor networks. Sensors 12(11):15133–15158CrossRef
13.
go back to reference Garcia M, Sendra S, Atenas M, Lloret J (2011) Underwater wireless ad-hoc networks: a survey. Mobile ad hoc networks: Current status and future trends 379–411 Garcia M, Sendra S, Atenas M, Lloret J (2011) Underwater wireless ad-hoc networks: a survey. Mobile ad hoc networks: Current status and future trends 379–411
14.
go back to reference Gomez JV, Sandnes FE, Fernandez B (2012) Sunlight intensity based global positioning system for near-surface underwater sensors. Sensors 12(2):1930–1949CrossRef Gomez JV, Sandnes FE, Fernandez B (2012) Sunlight intensity based global positioning system for near-surface underwater sensors. Sensors 12(2):1930–1949CrossRef
15.
go back to reference Han G, Jiang J, Shu L, Guizani M (2015) An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network. IEEE Trans Mob Comput 14(12):2447–2459CrossRef Han G, Jiang J, Shu L, Guizani M (2015) An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network. IEEE Trans Mob Comput 14(12):2447–2459CrossRef
16.
go back to reference Han G, Jiang J, Shu L, Xu Y, Wang F (2012) Localization algorithms of underwater wireless sensor networks: a survey. Sensors 12(2):2026–2061CrossRef Han G, Jiang J, Shu L, Xu Y, Wang F (2012) Localization algorithms of underwater wireless sensor networks: a survey. Sensors 12(2):2026–2061CrossRef
17.
go back to reference Jiang J, Han G, Zhu C, Dong Y, Zhang N (2011) Secure localization in wireless sensor networks: a survey. JCM 6(6):460–470CrossRef Jiang J, Han G, Zhu C, Dong Y, Zhang N (2011) Secure localization in wireless sensor networks: a survey. JCM 6(6):460–470CrossRef
18.
go back to reference Kong J, Ji Z, Wang W, Gerla M, Bagrodia R, Bhargava B (2004) On wormhole attacks in under-water sensor networks: a two-tier localization approach. UCLA Computer Science Department Technical Report 4005 Kong J, Ji Z, Wang W, Gerla M, Bagrodia R, Bhargava B (2004) On wormhole attacks in under-water sensor networks: a two-tier localization approach. UCLA Computer Science Department Technical Report 4005
19.
go back to reference Kong J, Ji Z, Wang W, Gerla M, Bagrodia R, Bhargava B (2005) Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks. In: Proceedings of the 4th ACM workshop on Wireless security. ACM, pp 87–96 Kong J, Ji Z, Wang W, Gerla M, Bagrodia R, Bhargava B (2005) Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks. In: Proceedings of the 4th ACM workshop on Wireless security. ACM, pp 87–96
20.
go back to reference Liu J, Djurdjanovic D, Marko KA, Ni J (2009) A divide and conquer approach to anomaly detection, localization and diagnosis. Mech Syst Signal Process 23(8):2488–2499CrossRef Liu J, Djurdjanovic D, Marko KA, Ni J (2009) A divide and conquer approach to anomaly detection, localization and diagnosis. Mech Syst Signal Process 23(8):2488–2499CrossRef
21.
go back to reference Lloret J (2013) Underwater sensor nodes and networks. Sensors 13(9):11782–11796CrossRef Lloret J (2013) Underwater sensor nodes and networks. Sensors 13(9):11782–11796CrossRef
22.
go back to reference Mamdani EH, Assilian S (1975) An experiment in linguistic synthesis with a fuzzy logic controller. Int J Man-Mach Stud 7(1):1–13CrossRef Mamdani EH, Assilian S (1975) An experiment in linguistic synthesis with a fuzzy logic controller. Int J Man-Mach Stud 7(1):1–13CrossRef
23.
go back to reference Mamun Q, Islam MR, Kaosar M (2014) Anomaly detection in wireless sensor network. JNW 9(11):2914–2924 Mamun Q, Islam MR, Kaosar M (2014) Anomaly detection in wireless sensor network. JNW 9(11):2914–2924
24.
go back to reference Meiqin L, Xiaodong G, Senlin Z (2015) Localization based on best spatial correlation distance mobility prediction for underwater wireless sensor networks. In: 34Th chinese control conference, pp 7827–7832, Hangzhou Meiqin L, Xiaodong G, Senlin Z (2015) Localization based on best spatial correlation distance mobility prediction for underwater wireless sensor networks. In: 34Th chinese control conference, pp 7827–7832, Hangzhou
25.
go back to reference Miorandi D, Sicari S, De Pellegrini F, Chlamtac I (2012) Internet of things: vision, applications and research challenges. Ad Hoc Netw 10(7):1497–1516CrossRef Miorandi D, Sicari S, De Pellegrini F, Chlamtac I (2012) Internet of things: vision, applications and research challenges. Ad Hoc Netw 10(7):1497–1516CrossRef
26.
go back to reference Mirza D, Schurgers C (2008) Energy-efficient ranging for post-facto self-localization in mobile underwater networks. IEEE J Sel Areas Commun 26(9):1697–1707CrossRef Mirza D, Schurgers C (2008) Energy-efficient ranging for post-facto self-localization in mobile underwater networks. IEEE J Sel Areas Commun 26(9):1697–1707CrossRef
27.
go back to reference Ojha T, Misra S (2013) Mobil: a 3-dimensional localization scheme for mobile underwater sensor networks. In: Proceedings of the IEEE National Conference on Communications, pp1–5, New Delhi Ojha T, Misra S (2013) Mobil: a 3-dimensional localization scheme for mobile underwater sensor networks. In: Proceedings of the IEEE National Conference on Communications, pp1–5, New Delhi
28.
go back to reference Onat I, Miri A (2005) A real-time node-based traffic anomaly detection algorithm for wireless sensor networks. In: Systems communications, 2005. misc. IEEE, pp 422–427 Onat I, Miri A (2005) A real-time node-based traffic anomaly detection algorithm for wireless sensor networks. In: Systems communications, 2005. misc. IEEE, pp 422–427
29.
go back to reference Park D, Kwak K, Kim J, Chung WK (2015) Underwater sensor network using received signal strength of electromagnetic waves. In: Proceedings of the IEEE International Conference on Intelligent Robots and Systems,Hamburg, Germany Park D, Kwak K, Kim J, Chung WK (2015) Underwater sensor network using received signal strength of electromagnetic waves. In: Proceedings of the IEEE International Conference on Intelligent Robots and Systems,Hamburg, Germany
30.
go back to reference Pei G, Gerla M, Hong X, Chiang CC (1999) A wireless hierarchical routing protocol with group mobility. In: proceedings of the IEEE Wireless Communications and Networking Conference, pp 1538–1542, New Orleans Pei G, Gerla M, Hong X, Chiang CC (1999) A wireless hierarchical routing protocol with group mobility. In: proceedings of the IEEE Wireless Communications and Networking Conference, pp 1538–1542, New Orleans
31.
go back to reference Poovendran R, Wang C, Roy S (2007) Secure localization and time synchronization for wireless sensor and ad hoc networks, vol 30. Springer Science & Business Media, BerlinCrossRef Poovendran R, Wang C, Roy S (2007) Secure localization and time synchronization for wireless sensor and ad hoc networks, vol 30. Springer Science & Business Media, BerlinCrossRef
32.
go back to reference Qiu T, Chen N, Li K, Atiquzzaman M, Zhao W (2018) How can heterogeneous internet of things build our future: A survey. IEEE Communications Surveys & Tutorials Qiu T, Chen N, Li K, Atiquzzaman M, Zhao W (2018) How can heterogeneous internet of things build our future: A survey. IEEE Communications Surveys & Tutorials
33.
go back to reference Qiu T, Qiao R, Wu D (2018) Eabs: an event-aware backpressure scheduling scheme for emergency internet of things. IEEE Trans Mob Comput 17(1):72–84CrossRef Qiu T, Qiao R, Wu D (2018) Eabs: an event-aware backpressure scheduling scheme for emergency internet of things. IEEE Trans Mob Comput 17(1):72–84CrossRef
34.
go back to reference Qiu T, Zhao A, Xia F, Si W, Wu D, Qiu T, Zhao A, Xia F, Si W, Wu D (2017) Rose: Robustness strategy for scale-free wireless sensor networks. IEEE/ACM Trans Netw (TON) 25(5):2944–2959CrossRef Qiu T, Zhao A, Xia F, Si W, Wu D, Qiu T, Zhao A, Xia F, Si W, Wu D (2017) Rose: Robustness strategy for scale-free wireless sensor networks. IEEE/ACM Trans Netw (TON) 25(5):2944–2959CrossRef
35.
go back to reference Rajasegarar S, Leckie C, Palaniswami M (2008) Anomaly detection in wireless sensor networks. IEEE Wireless Communications 15(4):34–40CrossRef Rajasegarar S, Leckie C, Palaniswami M (2008) Anomaly detection in wireless sensor networks. IEEE Wireless Communications 15(4):34–40CrossRef
36.
go back to reference Rajasegarar S, Leckie C, Palaniswami M, Bezdek JC (2006) Distributed anomaly detection in wireless sensor networks. In: 2006. ICCS 2006. 10th IEEE Singapore international conference on Communication systems. IEEE, pp 1–5 Rajasegarar S, Leckie C, Palaniswami M, Bezdek JC (2006) Distributed anomaly detection in wireless sensor networks. In: 2006. ICCS 2006. 10th IEEE Singapore international conference on Communication systems. IEEE, pp 1–5
37.
go back to reference Rasmussen KB, Capkun S, Cagalj M (2007) Secnav: secure broadcast localization and time synchronization in wireless networks. In: Proceedings of the 13th annual ACM international conference on Mobile computing and networking. ACM, pp 310–313 Rasmussen KB, Capkun S, Cagalj M (2007) Secnav: secure broadcast localization and time synchronization in wireless networks. In: Proceedings of the 13th annual ACM international conference on Mobile computing and networking. ACM, pp 310–313
38.
go back to reference da Silva APR, Martins MH, Rocha BP, Loureiro AA, Ruiz LB, Wong HC (2005) Decentralized intrusion detection in wireless sensor networks. In: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks. ACM, pp 16–23 da Silva APR, Martins MH, Rocha BP, Loureiro AA, Ruiz LB, Wong HC (2005) Decentralized intrusion detection in wireless sensor networks. In: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks. ACM, pp 16–23
39.
go back to reference Srinivasan A, Wu J (2007) A survey on secure localization in wireless sensor networks. Encyclopedia of Wireless and Mobile communications Srinivasan A, Wu J (2007) A survey on secure localization in wireless sensor networks. Encyclopedia of Wireless and Mobile communications
40.
go back to reference Tariq M, Latiff MSA, Ayaz M, Coulibaly Y, Wahid A (2016) Pressure sensor based reliable (psbr) routing protocol for underwater acoustic sensor networks. Ad Hoc Sensor Wirel Netw 32(3-4):175–196 Tariq M, Latiff MSA, Ayaz M, Coulibaly Y, Wahid A (2016) Pressure sensor based reliable (psbr) routing protocol for underwater acoustic sensor networks. Ad Hoc Sensor Wirel Netw 32(3-4):175–196
41.
go back to reference Thurman HV, Trujillo AP, Abel DC, McConnell R (1999) Essentials of oceanography. Prentice Hall, Englewood Cliffs Thurman HV, Trujillo AP, Abel DC, McConnell R (1999) Essentials of oceanography. Prentice Hall, Englewood Cliffs
42.
go back to reference Wang W, Kong J, Bhargava B, Gerla M (2008) Visualisation of wormholes in underwater sensor networks: a distributed approach. Int J Secur Netw 3(1):10–23CrossRef Wang W, Kong J, Bhargava B, Gerla M (2008) Visualisation of wormholes in underwater sensor networks: a distributed approach. Int J Secur Netw 3(1):10–23CrossRef
44.
go back to reference Zhang S, Zhang Q, Liu M, Fan Z (2014) A top-down positioning scheme for underwater wireless sensor networks. Sci China Inf Sci 57(3):1–10 Zhang S, Zhang Q, Liu M, Fan Z (2014) A top-down positioning scheme for underwater wireless sensor networks. Sci China Inf Sci 57(3):1–10
45.
go back to reference Zhang Y, Liu W, Fang Y, Wu D (2006) Secure localization and authentication in ultra-wideband sensor networks. IEEE J Sel Areas Commun 24(4):829–835CrossRef Zhang Y, Liu W, Fang Y, Wu D (2006) Secure localization and authentication in ultra-wideband sensor networks. IEEE J Sel Areas Commun 24(4):829–835CrossRef
46.
go back to reference Zheng S, Baras JS (2011) Trust-assisted anomaly detection and localization in wireless sensor networks. In: 2011 8th annual IEEE communications society conference on Sensor, mesh and ad hoc communications and networks (SECON). IEEE, pp 386– 394 Zheng S, Baras JS (2011) Trust-assisted anomaly detection and localization in wireless sensor networks. In: 2011 8th annual IEEE communications society conference on Sensor, mesh and ad hoc communications and networks (SECON). IEEE, pp 386– 394
47.
go back to reference Zhou Z, Peng Z, Cui JH, Shi Z, Bagtzoglou A (2011) Scalable localization with mobility prediction for underwater sensor networks. IEEE Trans Mob Comput 10(3):335–348CrossRef Zhou Z, Peng Z, Cui JH, Shi Z, Bagtzoglou A (2011) Scalable localization with mobility prediction for underwater sensor networks. IEEE Trans Mob Comput 10(3):335–348CrossRef
Metadata
Title
Anomaly Detection in UASN Localization Based on Time Series Analysis and Fuzzy Logic
Authors
Anjana P. Das
Sabu M. Thampi
Jaime Lloret
Publication date
23-01-2019
Publisher
Springer US
Published in
Mobile Networks and Applications / Issue 1/2020
Print ISSN: 1383-469X
Electronic ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-018-1192-y

Other articles of this Issue 1/2020

Mobile Networks and Applications 1/2020 Go to the issue