Skip to main content
Erschienen in: Mobile Networks and Applications 1/2020

23.01.2019

Anomaly Detection in UASN Localization Based on Time Series Analysis and Fuzzy Logic

verfasst von: Anjana P. Das, Sabu M. Thampi, Jaime Lloret

Erschienen in: Mobile Networks and Applications | Ausgabe 1/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Underwater acoustic sensor network (UASN) offers a promising solution for exploring underwater resources remotely. For getting a better understanding of sensed data, accurate localization is essential. As the UASN acoustic channel is open and the environment is hostile, the risk of malicious activities is very high, particularly in time-critical military applications. Since the location estimation with false data ends up in wrong positioning, it is necessary to identify and ignore such data to ensure data integrity. Therefore, in this paper, we propose a novel anomaly detection system for UASN localization. To minimize computational power and storage, we designed separate anomaly detection schemes for sensor nodes and anchor nodes. We propose an auto-regressive prediction-based scheme for detecting anomalies at sensor nodes. For anchor nodes, a fuzzy inference system is designed to identify the presence of anomalous behavior. The detection schemes are implemented at every node for enabling identification of multiple and duplicate anomalies at its origin. We simulated the network, modeled anomalies and analyzed the performance of detection schemes at anchor nodes and sensor nodes. The results indicate that anomaly detection systems offer an acceptable accuracy with high true positive rate and F-Score.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Fußnoten
1
http://obinet.engr.uconn.edu/wiki/index.php/Aqua-Sim
 
Literatur
2.
Zurück zum Zitat Anjum F, Pandey S, Agrawal P (2005) Secure localization in sensor networks using transmission range variation. In: 2005. IEEE international conference on Mobile adhoc and sensor systems conference. IEEE, pp 9 Anjum F, Pandey S, Agrawal P (2005) Secure localization in sensor networks using transmission range variation. In: 2005. IEEE international conference on Mobile adhoc and sensor systems conference. IEEE, pp 9
3.
Zurück zum Zitat Ateniese G, Capossele A, Gjanci P, Petrioli C, Spaccini D (2015) Secfun: Security framework for underwater acoustic sensor networks. In: OCEANS 2015-Genova. IEEE, pp 1–9 Ateniese G, Capossele A, Gjanci P, Petrioli C, Spaccini D (2015) Secfun: Security framework for underwater acoustic sensor networks. In: OCEANS 2015-Genova. IEEE, pp 1–9
4.
Zurück zum Zitat Beniwal M, Singh RP, Sangwan A (2016) A localization scheme for underwater sensor networks without time synchronization. Wireless Personal Communications 88(3):537–552CrossRef Beniwal M, Singh RP, Sangwan A (2016) A localization scheme for underwater sensor networks without time synchronization. Wireless Personal Communications 88(3):537–552CrossRef
5.
Zurück zum Zitat Chen P, Ma H, Gao S, Huang Y (2015) Ssl: Signal similarity-based localization for ocean sensor networks. Sensors 15(11):29702–29720CrossRef Chen P, Ma H, Gao S, Huang Y (2015) Ssl: Signal similarity-based localization for ocean sensor networks. Sensors 15(11):29702–29720CrossRef
6.
Zurück zum Zitat Cong Y, Yang G, Wei Z, Zhou W (2010) Security in underwater sensor network. In: 2010 international conference on Communications and mobile computing (CMC). IEEE, vol 1, pp 162–168 Cong Y, Yang G, Wei Z, Zhou W (2010) Security in underwater sensor network. In: 2010 international conference on Communications and mobile computing (CMC). IEEE, vol 1, pp 162–168
7.
Zurück zum Zitat Das AP, Thampi SM (2015) Secure communication in mobile underwater wireless sensor networks. In: Proceedings of the IEEE International Conference on Advances in Computing, Communications and Informatics, India, pp 2164–2173 Das AP, Thampi SM (2015) Secure communication in mobile underwater wireless sensor networks. In: Proceedings of the IEEE International Conference on Advances in Computing, Communications and Informatics, India, pp 2164–2173
8.
Zurück zum Zitat Das AP, Thampi SM (2015) Single anchor node based localization in mobile underwater wireless sensor networks. In: Algorithms and architectures for parallel processing. Springer, pp 757– 770 Das AP, Thampi SM (2015) Single anchor node based localization in mobile underwater wireless sensor networks. In: Algorithms and architectures for parallel processing. Springer, pp 757– 770
9.
Zurück zum Zitat Das AP, Thampi SM (2016) Fault-resilient localization for underwater sensor networks. Ad Hoc Networks Das AP, Thampi SM (2016) Fault-resilient localization for underwater sensor networks. Ad Hoc Networks
10.
Zurück zum Zitat Das AP, Thampi SM (2016) Simulation tools for underwater sensor networks: a survey. Netw Protocol Algorithm 8(4):41–55CrossRef Das AP, Thampi SM (2016) Simulation tools for underwater sensor networks: a survey. Netw Protocol Algorithm 8(4):41–55CrossRef
11.
Zurück zum Zitat Dini G, Duca AL (2011) Seflood: a secure network discovery protocol for underwater acoustic networks. In: 2011 IEEE symposium on Computers and communications (ISCC). IEEE, pp 636–638 Dini G, Duca AL (2011) Seflood: a secure network discovery protocol for underwater acoustic networks. In: 2011 IEEE symposium on Computers and communications (ISCC). IEEE, pp 636–638
12.
Zurück zum Zitat Dini G, Lo Duca A (2012) A secure communication suite for underwater acoustic sensor networks. Sensors 12(11):15133–15158CrossRef Dini G, Lo Duca A (2012) A secure communication suite for underwater acoustic sensor networks. Sensors 12(11):15133–15158CrossRef
13.
Zurück zum Zitat Garcia M, Sendra S, Atenas M, Lloret J (2011) Underwater wireless ad-hoc networks: a survey. Mobile ad hoc networks: Current status and future trends 379–411 Garcia M, Sendra S, Atenas M, Lloret J (2011) Underwater wireless ad-hoc networks: a survey. Mobile ad hoc networks: Current status and future trends 379–411
14.
Zurück zum Zitat Gomez JV, Sandnes FE, Fernandez B (2012) Sunlight intensity based global positioning system for near-surface underwater sensors. Sensors 12(2):1930–1949CrossRef Gomez JV, Sandnes FE, Fernandez B (2012) Sunlight intensity based global positioning system for near-surface underwater sensors. Sensors 12(2):1930–1949CrossRef
15.
Zurück zum Zitat Han G, Jiang J, Shu L, Guizani M (2015) An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network. IEEE Trans Mob Comput 14(12):2447–2459CrossRef Han G, Jiang J, Shu L, Guizani M (2015) An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network. IEEE Trans Mob Comput 14(12):2447–2459CrossRef
16.
Zurück zum Zitat Han G, Jiang J, Shu L, Xu Y, Wang F (2012) Localization algorithms of underwater wireless sensor networks: a survey. Sensors 12(2):2026–2061CrossRef Han G, Jiang J, Shu L, Xu Y, Wang F (2012) Localization algorithms of underwater wireless sensor networks: a survey. Sensors 12(2):2026–2061CrossRef
17.
Zurück zum Zitat Jiang J, Han G, Zhu C, Dong Y, Zhang N (2011) Secure localization in wireless sensor networks: a survey. JCM 6(6):460–470CrossRef Jiang J, Han G, Zhu C, Dong Y, Zhang N (2011) Secure localization in wireless sensor networks: a survey. JCM 6(6):460–470CrossRef
18.
Zurück zum Zitat Kong J, Ji Z, Wang W, Gerla M, Bagrodia R, Bhargava B (2004) On wormhole attacks in under-water sensor networks: a two-tier localization approach. UCLA Computer Science Department Technical Report 4005 Kong J, Ji Z, Wang W, Gerla M, Bagrodia R, Bhargava B (2004) On wormhole attacks in under-water sensor networks: a two-tier localization approach. UCLA Computer Science Department Technical Report 4005
19.
Zurück zum Zitat Kong J, Ji Z, Wang W, Gerla M, Bagrodia R, Bhargava B (2005) Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks. In: Proceedings of the 4th ACM workshop on Wireless security. ACM, pp 87–96 Kong J, Ji Z, Wang W, Gerla M, Bagrodia R, Bhargava B (2005) Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks. In: Proceedings of the 4th ACM workshop on Wireless security. ACM, pp 87–96
20.
Zurück zum Zitat Liu J, Djurdjanovic D, Marko KA, Ni J (2009) A divide and conquer approach to anomaly detection, localization and diagnosis. Mech Syst Signal Process 23(8):2488–2499CrossRef Liu J, Djurdjanovic D, Marko KA, Ni J (2009) A divide and conquer approach to anomaly detection, localization and diagnosis. Mech Syst Signal Process 23(8):2488–2499CrossRef
21.
Zurück zum Zitat Lloret J (2013) Underwater sensor nodes and networks. Sensors 13(9):11782–11796CrossRef Lloret J (2013) Underwater sensor nodes and networks. Sensors 13(9):11782–11796CrossRef
22.
Zurück zum Zitat Mamdani EH, Assilian S (1975) An experiment in linguistic synthesis with a fuzzy logic controller. Int J Man-Mach Stud 7(1):1–13CrossRef Mamdani EH, Assilian S (1975) An experiment in linguistic synthesis with a fuzzy logic controller. Int J Man-Mach Stud 7(1):1–13CrossRef
23.
Zurück zum Zitat Mamun Q, Islam MR, Kaosar M (2014) Anomaly detection in wireless sensor network. JNW 9(11):2914–2924 Mamun Q, Islam MR, Kaosar M (2014) Anomaly detection in wireless sensor network. JNW 9(11):2914–2924
24.
Zurück zum Zitat Meiqin L, Xiaodong G, Senlin Z (2015) Localization based on best spatial correlation distance mobility prediction for underwater wireless sensor networks. In: 34Th chinese control conference, pp 7827–7832, Hangzhou Meiqin L, Xiaodong G, Senlin Z (2015) Localization based on best spatial correlation distance mobility prediction for underwater wireless sensor networks. In: 34Th chinese control conference, pp 7827–7832, Hangzhou
25.
Zurück zum Zitat Miorandi D, Sicari S, De Pellegrini F, Chlamtac I (2012) Internet of things: vision, applications and research challenges. Ad Hoc Netw 10(7):1497–1516CrossRef Miorandi D, Sicari S, De Pellegrini F, Chlamtac I (2012) Internet of things: vision, applications and research challenges. Ad Hoc Netw 10(7):1497–1516CrossRef
26.
Zurück zum Zitat Mirza D, Schurgers C (2008) Energy-efficient ranging for post-facto self-localization in mobile underwater networks. IEEE J Sel Areas Commun 26(9):1697–1707CrossRef Mirza D, Schurgers C (2008) Energy-efficient ranging for post-facto self-localization in mobile underwater networks. IEEE J Sel Areas Commun 26(9):1697–1707CrossRef
27.
Zurück zum Zitat Ojha T, Misra S (2013) Mobil: a 3-dimensional localization scheme for mobile underwater sensor networks. In: Proceedings of the IEEE National Conference on Communications, pp1–5, New Delhi Ojha T, Misra S (2013) Mobil: a 3-dimensional localization scheme for mobile underwater sensor networks. In: Proceedings of the IEEE National Conference on Communications, pp1–5, New Delhi
28.
Zurück zum Zitat Onat I, Miri A (2005) A real-time node-based traffic anomaly detection algorithm for wireless sensor networks. In: Systems communications, 2005. misc. IEEE, pp 422–427 Onat I, Miri A (2005) A real-time node-based traffic anomaly detection algorithm for wireless sensor networks. In: Systems communications, 2005. misc. IEEE, pp 422–427
29.
Zurück zum Zitat Park D, Kwak K, Kim J, Chung WK (2015) Underwater sensor network using received signal strength of electromagnetic waves. In: Proceedings of the IEEE International Conference on Intelligent Robots and Systems,Hamburg, Germany Park D, Kwak K, Kim J, Chung WK (2015) Underwater sensor network using received signal strength of electromagnetic waves. In: Proceedings of the IEEE International Conference on Intelligent Robots and Systems,Hamburg, Germany
30.
Zurück zum Zitat Pei G, Gerla M, Hong X, Chiang CC (1999) A wireless hierarchical routing protocol with group mobility. In: proceedings of the IEEE Wireless Communications and Networking Conference, pp 1538–1542, New Orleans Pei G, Gerla M, Hong X, Chiang CC (1999) A wireless hierarchical routing protocol with group mobility. In: proceedings of the IEEE Wireless Communications and Networking Conference, pp 1538–1542, New Orleans
31.
Zurück zum Zitat Poovendran R, Wang C, Roy S (2007) Secure localization and time synchronization for wireless sensor and ad hoc networks, vol 30. Springer Science & Business Media, BerlinCrossRef Poovendran R, Wang C, Roy S (2007) Secure localization and time synchronization for wireless sensor and ad hoc networks, vol 30. Springer Science & Business Media, BerlinCrossRef
32.
Zurück zum Zitat Qiu T, Chen N, Li K, Atiquzzaman M, Zhao W (2018) How can heterogeneous internet of things build our future: A survey. IEEE Communications Surveys & Tutorials Qiu T, Chen N, Li K, Atiquzzaman M, Zhao W (2018) How can heterogeneous internet of things build our future: A survey. IEEE Communications Surveys & Tutorials
33.
Zurück zum Zitat Qiu T, Qiao R, Wu D (2018) Eabs: an event-aware backpressure scheduling scheme for emergency internet of things. IEEE Trans Mob Comput 17(1):72–84CrossRef Qiu T, Qiao R, Wu D (2018) Eabs: an event-aware backpressure scheduling scheme for emergency internet of things. IEEE Trans Mob Comput 17(1):72–84CrossRef
34.
Zurück zum Zitat Qiu T, Zhao A, Xia F, Si W, Wu D, Qiu T, Zhao A, Xia F, Si W, Wu D (2017) Rose: Robustness strategy for scale-free wireless sensor networks. IEEE/ACM Trans Netw (TON) 25(5):2944–2959CrossRef Qiu T, Zhao A, Xia F, Si W, Wu D, Qiu T, Zhao A, Xia F, Si W, Wu D (2017) Rose: Robustness strategy for scale-free wireless sensor networks. IEEE/ACM Trans Netw (TON) 25(5):2944–2959CrossRef
35.
Zurück zum Zitat Rajasegarar S, Leckie C, Palaniswami M (2008) Anomaly detection in wireless sensor networks. IEEE Wireless Communications 15(4):34–40CrossRef Rajasegarar S, Leckie C, Palaniswami M (2008) Anomaly detection in wireless sensor networks. IEEE Wireless Communications 15(4):34–40CrossRef
36.
Zurück zum Zitat Rajasegarar S, Leckie C, Palaniswami M, Bezdek JC (2006) Distributed anomaly detection in wireless sensor networks. In: 2006. ICCS 2006. 10th IEEE Singapore international conference on Communication systems. IEEE, pp 1–5 Rajasegarar S, Leckie C, Palaniswami M, Bezdek JC (2006) Distributed anomaly detection in wireless sensor networks. In: 2006. ICCS 2006. 10th IEEE Singapore international conference on Communication systems. IEEE, pp 1–5
37.
Zurück zum Zitat Rasmussen KB, Capkun S, Cagalj M (2007) Secnav: secure broadcast localization and time synchronization in wireless networks. In: Proceedings of the 13th annual ACM international conference on Mobile computing and networking. ACM, pp 310–313 Rasmussen KB, Capkun S, Cagalj M (2007) Secnav: secure broadcast localization and time synchronization in wireless networks. In: Proceedings of the 13th annual ACM international conference on Mobile computing and networking. ACM, pp 310–313
38.
Zurück zum Zitat da Silva APR, Martins MH, Rocha BP, Loureiro AA, Ruiz LB, Wong HC (2005) Decentralized intrusion detection in wireless sensor networks. In: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks. ACM, pp 16–23 da Silva APR, Martins MH, Rocha BP, Loureiro AA, Ruiz LB, Wong HC (2005) Decentralized intrusion detection in wireless sensor networks. In: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks. ACM, pp 16–23
39.
Zurück zum Zitat Srinivasan A, Wu J (2007) A survey on secure localization in wireless sensor networks. Encyclopedia of Wireless and Mobile communications Srinivasan A, Wu J (2007) A survey on secure localization in wireless sensor networks. Encyclopedia of Wireless and Mobile communications
40.
Zurück zum Zitat Tariq M, Latiff MSA, Ayaz M, Coulibaly Y, Wahid A (2016) Pressure sensor based reliable (psbr) routing protocol for underwater acoustic sensor networks. Ad Hoc Sensor Wirel Netw 32(3-4):175–196 Tariq M, Latiff MSA, Ayaz M, Coulibaly Y, Wahid A (2016) Pressure sensor based reliable (psbr) routing protocol for underwater acoustic sensor networks. Ad Hoc Sensor Wirel Netw 32(3-4):175–196
41.
Zurück zum Zitat Thurman HV, Trujillo AP, Abel DC, McConnell R (1999) Essentials of oceanography. Prentice Hall, Englewood Cliffs Thurman HV, Trujillo AP, Abel DC, McConnell R (1999) Essentials of oceanography. Prentice Hall, Englewood Cliffs
42.
Zurück zum Zitat Wang W, Kong J, Bhargava B, Gerla M (2008) Visualisation of wormholes in underwater sensor networks: a distributed approach. Int J Secur Netw 3(1):10–23CrossRef Wang W, Kong J, Bhargava B, Gerla M (2008) Visualisation of wormholes in underwater sensor networks: a distributed approach. Int J Secur Netw 3(1):10–23CrossRef
44.
Zurück zum Zitat Zhang S, Zhang Q, Liu M, Fan Z (2014) A top-down positioning scheme for underwater wireless sensor networks. Sci China Inf Sci 57(3):1–10 Zhang S, Zhang Q, Liu M, Fan Z (2014) A top-down positioning scheme for underwater wireless sensor networks. Sci China Inf Sci 57(3):1–10
45.
Zurück zum Zitat Zhang Y, Liu W, Fang Y, Wu D (2006) Secure localization and authentication in ultra-wideband sensor networks. IEEE J Sel Areas Commun 24(4):829–835CrossRef Zhang Y, Liu W, Fang Y, Wu D (2006) Secure localization and authentication in ultra-wideband sensor networks. IEEE J Sel Areas Commun 24(4):829–835CrossRef
46.
Zurück zum Zitat Zheng S, Baras JS (2011) Trust-assisted anomaly detection and localization in wireless sensor networks. In: 2011 8th annual IEEE communications society conference on Sensor, mesh and ad hoc communications and networks (SECON). IEEE, pp 386– 394 Zheng S, Baras JS (2011) Trust-assisted anomaly detection and localization in wireless sensor networks. In: 2011 8th annual IEEE communications society conference on Sensor, mesh and ad hoc communications and networks (SECON). IEEE, pp 386– 394
47.
Zurück zum Zitat Zhou Z, Peng Z, Cui JH, Shi Z, Bagtzoglou A (2011) Scalable localization with mobility prediction for underwater sensor networks. IEEE Trans Mob Comput 10(3):335–348CrossRef Zhou Z, Peng Z, Cui JH, Shi Z, Bagtzoglou A (2011) Scalable localization with mobility prediction for underwater sensor networks. IEEE Trans Mob Comput 10(3):335–348CrossRef
Metadaten
Titel
Anomaly Detection in UASN Localization Based on Time Series Analysis and Fuzzy Logic
verfasst von
Anjana P. Das
Sabu M. Thampi
Jaime Lloret
Publikationsdatum
23.01.2019
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 1/2020
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-018-1192-y

Weitere Artikel der Ausgabe 1/2020

Mobile Networks and Applications 1/2020 Zur Ausgabe

Neuer Inhalt