Skip to main content
Top
Published in: Wireless Personal Communications 4/2019

16-04-2018

Hybrid Anomaly Detection by Using Clustering for Wireless Sensor Network

Authors: Bilal Ahmad, Wang Jian, Zain Anwar Ali, Sania Tanvir, M. Sadiq Ali Khan

Published in: Wireless Personal Communications | Issue 4/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Performance of wireless sensor network are highly prone to network anomalies particularly to misdirection attacks and blackhole attacks. Therefor intrusion detection system has a key role in WSN and it’s essential in security application. However the identification of active attacks is cumbersome in many cases particularly for remote sensing applications. This paper proposes hybrid anomaly detection method for misdirection and blackhole attacks by employing K-medoid customized clustering technique. A synthetic dataset was established by defining network parameters and threshold values were obtained to detect the anomalies. Experimental work was performed on network simulator (NS-2) and R studio. The proposed algorithm successfully detect the hybrid anomalies with high accuracy. This work is suitable for hybrid anomaly detection including misdirection and blackhole attacks in wireless environment.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Nishani, L., & Biba, M. (2016). Machine learning for intrusion detection in MANET: A state-of-the-art survey. Journal of Intelligent Information Systems, 46(2), 391–407.CrossRef Nishani, L., & Biba, M. (2016). Machine learning for intrusion detection in MANET: A state-of-the-art survey. Journal of Intelligent Information Systems, 46(2), 391–407.CrossRef
2.
go back to reference Pachauria, G., & Sharma, S. (2015). Anomaly detection in medical wireless sensor networks using machine learning algorithms. Procedia Computer Science, 70, 325–333.CrossRef Pachauria, G., & Sharma, S. (2015). Anomaly detection in medical wireless sensor networks using machine learning algorithms. Procedia Computer Science, 70, 325–333.CrossRef
3.
go back to reference Alsheikh, M. A., Lin, S., Niyato, D., & Tan, H.-P. (2015). Machine learning in wireless sensor networks: Algorithms, strategies, and applications. Procedia Computer Science, 70, 325–333.CrossRef Alsheikh, M. A., Lin, S., Niyato, D., & Tan, H.-P. (2015). Machine learning in wireless sensor networks: Algorithms, strategies, and applications. Procedia Computer Science, 70, 325–333.CrossRef
4.
go back to reference Kavitha, P., & Usha, M. (2014). Cluster based anomaly detection in wireless LAN. International Journal of Computer Trends and Technology (IJCTT), 12(5), 227–230.CrossRef Kavitha, P., & Usha, M. (2014). Cluster based anomaly detection in wireless LAN. International Journal of Computer Trends and Technology (IJCTT), 12(5), 227–230.CrossRef
5.
go back to reference Kalaiselvan, K., & Singh, G. (2015). Detection and isolation of black hole attack in wireless sensor networks. International Journal of Innovative Research in Science, Engineering and Technology, 4(5), 3516–3524. Kalaiselvan, K., & Singh, G. (2015). Detection and isolation of black hole attack in wireless sensor networks. International Journal of Innovative Research in Science, Engineering and Technology, 4(5), 3516–3524.
6.
go back to reference Kaur, R., Sharma, D., & Kaur, N. (2013). Comparative analysis of leach and its descendant protocols in wireless sensor network. International Journal of P2P Network Trends and Technology, 3(1), 51–55. Kaur, R., Sharma, D., & Kaur, N. (2013). Comparative analysis of leach and its descendant protocols in wireless sensor network. International Journal of P2P Network Trends and Technology, 3(1), 51–55.
7.
go back to reference Almomani, I., Al-Kasasbeh, B., & AL-Akhras, M. (2016). WSN-DS: A dataset for intrusion detection systems in wireless sensor networks. Journal of Sensors, 2016, Article ID 4731953. Almomani, I., Al-Kasasbeh, B., & AL-Akhras, M. (2016). WSN-DS: A dataset for intrusion detection systems in wireless sensor networks. Journal of Sensors, 2016, Article ID 4731953.
8.
go back to reference Shi, Qiong, Qin, Li, Song, Lipeng, Zhang, Rongping, & Jia, Yanfeng. (2017). A dynamic programming model for internal attack detection in wireless sensor networks. Discrete Dynamics in Nature and Society, 2017, 1–9.CrossRefMATH Shi, Qiong, Qin, Li, Song, Lipeng, Zhang, Rongping, & Jia, Yanfeng. (2017). A dynamic programming model for internal attack detection in wireless sensor networks. Discrete Dynamics in Nature and Society, 2017, 1–9.CrossRefMATH
9.
go back to reference Hou, X., Lei, C.-U., & Kwok, Y.-K. (2017). OP-DCI: A riskless K-means clustering for influential user identification in MOOC forum. In 16th IEEE international conference on machine learning and applications (ICMLA) (pp. 936–939). Hou, X., Lei, C.-U., & Kwok, Y.-K. (2017). OP-DCI: A riskless K-means clustering for influential user identification in MOOC forum. In 16th IEEE international conference on machine learning and applications (ICMLA) (pp. 936–939).
10.
go back to reference Alipour, H., Al-Nashif, Y. B., Satam, P., & Hariri, S. (2015). Wireless anomaly detection based on IEEE 802.11 behavior analysis. IEEE Transactions on Information Forensics and Security, 10(10), 2158–2170.CrossRef Alipour, H., Al-Nashif, Y. B., Satam, P., & Hariri, S. (2015). Wireless anomaly detection based on IEEE 802.11 behavior analysis. IEEE Transactions on Information Forensics and Security, 10(10), 2158–2170.CrossRef
11.
go back to reference Garcia-Font, V., Garrigues, C., & Rifà-Pous, H. (2016). A comparative study of anomaly detection techniques for smart city wireless sensor networks. In Lu, R. (Ed.) Sensors, Vol. 16, no. 6, Basel, Switzerland. Garcia-Font, V., Garrigues, C., & Rifà-Pous, H. (2016). A comparative study of anomaly detection techniques for smart city wireless sensor networks. In Lu, R. (Ed.) Sensors, Vol. 16, no. 6, Basel, Switzerland.
12.
go back to reference Shah, Z., & Patel, R. (2016). Misdirection attack in wireless sensor network: A survey. International Journal for Technological Research in Engineering, 3(9), 2044–2047. Shah, Z., & Patel, R. (2016). Misdirection attack in wireless sensor network: A survey. International Journal for Technological Research in Engineering, 3(9), 2044–2047.
13.
go back to reference Gao, H., Wu, R., Cao, M., & Zhang, C. (2014). Detection and defense technology of blackhole attacks in wireless sensor network. In X. Sun et al. (Eds.), Algorithms and architectures for parallel processing (pp. 601–610). Cham: Springer.CrossRef Gao, H., Wu, R., Cao, M., & Zhang, C. (2014). Detection and defense technology of blackhole attacks in wireless sensor network. In X. Sun et al. (Eds.), Algorithms and architectures for parallel processing (pp. 601–610). Cham: Springer.CrossRef
14.
go back to reference Syarif, I., Prugel-Bennett, A., & Wills, G. (2012). Unsupervised clustering approach for network anomaly. In R. Benlamri (Ed.), Networked digital technologies. Communications in computer and information science (Vol. 293, pp. 135–145). Berlin: Springer. Syarif, I., Prugel-Bennett, A., & Wills, G. (2012). Unsupervised clustering approach for network anomaly. In R. Benlamri (Ed.), Networked digital technologies. Communications in computer and information science (Vol. 293, pp. 135–145). Berlin: Springer.
Metadata
Title
Hybrid Anomaly Detection by Using Clustering for Wireless Sensor Network
Authors
Bilal Ahmad
Wang Jian
Zain Anwar Ali
Sania Tanvir
M. Sadiq Ali Khan
Publication date
16-04-2018
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 4/2019
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-018-5721-6

Other articles of this Issue 4/2019

Wireless Personal Communications 4/2019 Go to the issue