Skip to main content
Erschienen in: Wireless Personal Communications 4/2019

16.04.2018

Hybrid Anomaly Detection by Using Clustering for Wireless Sensor Network

verfasst von: Bilal Ahmad, Wang Jian, Zain Anwar Ali, Sania Tanvir, M. Sadiq Ali Khan

Erschienen in: Wireless Personal Communications | Ausgabe 4/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Performance of wireless sensor network are highly prone to network anomalies particularly to misdirection attacks and blackhole attacks. Therefor intrusion detection system has a key role in WSN and it’s essential in security application. However the identification of active attacks is cumbersome in many cases particularly for remote sensing applications. This paper proposes hybrid anomaly detection method for misdirection and blackhole attacks by employing K-medoid customized clustering technique. A synthetic dataset was established by defining network parameters and threshold values were obtained to detect the anomalies. Experimental work was performed on network simulator (NS-2) and R studio. The proposed algorithm successfully detect the hybrid anomalies with high accuracy. This work is suitable for hybrid anomaly detection including misdirection and blackhole attacks in wireless environment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Nishani, L., & Biba, M. (2016). Machine learning for intrusion detection in MANET: A state-of-the-art survey. Journal of Intelligent Information Systems, 46(2), 391–407.CrossRef Nishani, L., & Biba, M. (2016). Machine learning for intrusion detection in MANET: A state-of-the-art survey. Journal of Intelligent Information Systems, 46(2), 391–407.CrossRef
2.
Zurück zum Zitat Pachauria, G., & Sharma, S. (2015). Anomaly detection in medical wireless sensor networks using machine learning algorithms. Procedia Computer Science, 70, 325–333.CrossRef Pachauria, G., & Sharma, S. (2015). Anomaly detection in medical wireless sensor networks using machine learning algorithms. Procedia Computer Science, 70, 325–333.CrossRef
3.
Zurück zum Zitat Alsheikh, M. A., Lin, S., Niyato, D., & Tan, H.-P. (2015). Machine learning in wireless sensor networks: Algorithms, strategies, and applications. Procedia Computer Science, 70, 325–333.CrossRef Alsheikh, M. A., Lin, S., Niyato, D., & Tan, H.-P. (2015). Machine learning in wireless sensor networks: Algorithms, strategies, and applications. Procedia Computer Science, 70, 325–333.CrossRef
4.
Zurück zum Zitat Kavitha, P., & Usha, M. (2014). Cluster based anomaly detection in wireless LAN. International Journal of Computer Trends and Technology (IJCTT), 12(5), 227–230.CrossRef Kavitha, P., & Usha, M. (2014). Cluster based anomaly detection in wireless LAN. International Journal of Computer Trends and Technology (IJCTT), 12(5), 227–230.CrossRef
5.
Zurück zum Zitat Kalaiselvan, K., & Singh, G. (2015). Detection and isolation of black hole attack in wireless sensor networks. International Journal of Innovative Research in Science, Engineering and Technology, 4(5), 3516–3524. Kalaiselvan, K., & Singh, G. (2015). Detection and isolation of black hole attack in wireless sensor networks. International Journal of Innovative Research in Science, Engineering and Technology, 4(5), 3516–3524.
6.
Zurück zum Zitat Kaur, R., Sharma, D., & Kaur, N. (2013). Comparative analysis of leach and its descendant protocols in wireless sensor network. International Journal of P2P Network Trends and Technology, 3(1), 51–55. Kaur, R., Sharma, D., & Kaur, N. (2013). Comparative analysis of leach and its descendant protocols in wireless sensor network. International Journal of P2P Network Trends and Technology, 3(1), 51–55.
7.
Zurück zum Zitat Almomani, I., Al-Kasasbeh, B., & AL-Akhras, M. (2016). WSN-DS: A dataset for intrusion detection systems in wireless sensor networks. Journal of Sensors, 2016, Article ID 4731953. Almomani, I., Al-Kasasbeh, B., & AL-Akhras, M. (2016). WSN-DS: A dataset for intrusion detection systems in wireless sensor networks. Journal of Sensors, 2016, Article ID 4731953.
8.
Zurück zum Zitat Shi, Qiong, Qin, Li, Song, Lipeng, Zhang, Rongping, & Jia, Yanfeng. (2017). A dynamic programming model for internal attack detection in wireless sensor networks. Discrete Dynamics in Nature and Society, 2017, 1–9.CrossRefMATH Shi, Qiong, Qin, Li, Song, Lipeng, Zhang, Rongping, & Jia, Yanfeng. (2017). A dynamic programming model for internal attack detection in wireless sensor networks. Discrete Dynamics in Nature and Society, 2017, 1–9.CrossRefMATH
9.
Zurück zum Zitat Hou, X., Lei, C.-U., & Kwok, Y.-K. (2017). OP-DCI: A riskless K-means clustering for influential user identification in MOOC forum. In 16th IEEE international conference on machine learning and applications (ICMLA) (pp. 936–939). Hou, X., Lei, C.-U., & Kwok, Y.-K. (2017). OP-DCI: A riskless K-means clustering for influential user identification in MOOC forum. In 16th IEEE international conference on machine learning and applications (ICMLA) (pp. 936–939).
10.
Zurück zum Zitat Alipour, H., Al-Nashif, Y. B., Satam, P., & Hariri, S. (2015). Wireless anomaly detection based on IEEE 802.11 behavior analysis. IEEE Transactions on Information Forensics and Security, 10(10), 2158–2170.CrossRef Alipour, H., Al-Nashif, Y. B., Satam, P., & Hariri, S. (2015). Wireless anomaly detection based on IEEE 802.11 behavior analysis. IEEE Transactions on Information Forensics and Security, 10(10), 2158–2170.CrossRef
11.
Zurück zum Zitat Garcia-Font, V., Garrigues, C., & Rifà-Pous, H. (2016). A comparative study of anomaly detection techniques for smart city wireless sensor networks. In Lu, R. (Ed.) Sensors, Vol. 16, no. 6, Basel, Switzerland. Garcia-Font, V., Garrigues, C., & Rifà-Pous, H. (2016). A comparative study of anomaly detection techniques for smart city wireless sensor networks. In Lu, R. (Ed.) Sensors, Vol. 16, no. 6, Basel, Switzerland.
12.
Zurück zum Zitat Shah, Z., & Patel, R. (2016). Misdirection attack in wireless sensor network: A survey. International Journal for Technological Research in Engineering, 3(9), 2044–2047. Shah, Z., & Patel, R. (2016). Misdirection attack in wireless sensor network: A survey. International Journal for Technological Research in Engineering, 3(9), 2044–2047.
13.
Zurück zum Zitat Gao, H., Wu, R., Cao, M., & Zhang, C. (2014). Detection and defense technology of blackhole attacks in wireless sensor network. In X. Sun et al. (Eds.), Algorithms and architectures for parallel processing (pp. 601–610). Cham: Springer.CrossRef Gao, H., Wu, R., Cao, M., & Zhang, C. (2014). Detection and defense technology of blackhole attacks in wireless sensor network. In X. Sun et al. (Eds.), Algorithms and architectures for parallel processing (pp. 601–610). Cham: Springer.CrossRef
14.
Zurück zum Zitat Syarif, I., Prugel-Bennett, A., & Wills, G. (2012). Unsupervised clustering approach for network anomaly. In R. Benlamri (Ed.), Networked digital technologies. Communications in computer and information science (Vol. 293, pp. 135–145). Berlin: Springer. Syarif, I., Prugel-Bennett, A., & Wills, G. (2012). Unsupervised clustering approach for network anomaly. In R. Benlamri (Ed.), Networked digital technologies. Communications in computer and information science (Vol. 293, pp. 135–145). Berlin: Springer.
Metadaten
Titel
Hybrid Anomaly Detection by Using Clustering for Wireless Sensor Network
verfasst von
Bilal Ahmad
Wang Jian
Zain Anwar Ali
Sania Tanvir
M. Sadiq Ali Khan
Publikationsdatum
16.04.2018
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2019
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-018-5721-6

Weitere Artikel der Ausgabe 4/2019

Wireless Personal Communications 4/2019 Zur Ausgabe

Neuer Inhalt