Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/978-3-540-73871-8_16guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Unsupervised Outlier Detection in Sensor Networks Using Aggregation Tree

Published: 06 August 2007 Publication History

Abstract

In the applications of sensor networks, outlier detection has attracted more and more attention. The identification of outliers can be used to filter false data, find faulty nodes and discover interesting events. A few papers have been published for this issue. However some of them consume too much communication, some of them need user to pre-set correct thresholds, some of them generate approximate results rather than exact ones. In this paper, a new unsupervised approach is proposed to detect global top n outliers in the network. This approach can be used to answer both snapshot queries and continuous queries. Two novel concepts, modifier set and candidate set for the global outliers, are defined in the paper. Also a commit-disseminate-verify mechanism for outlier detection in aggregation tree is provided. Using this mechanism and the these two concepts, the global top n outliers can be detected through exchanging short messages in the whole tree. Theoretically, we prove that the results generated by our approach are exact. The experimental results show that our approach is the most communication-efficient one compared with other existing methods. Moreover, our approach does not need any pre-specified threshold. It can be easily extended to multi-dimensional data, and is suitable for detecting outliers of various definitions.

References

[1]
Shnayder, V., Hempstead, M., Chen, B.R., Allen, G.W., Welsh, M.: Simulating the Power Consumption of Large-scale Sensor Network Applications. In: SenSys (2004).
[2]
Gupta, P., Kumar, P.R.: The Capacity of Wireless Networks. IEEETrans. Information Theory 46(2), 388-404 (2000).
[3]
Warneke, B., Last, M., Liebowitz, B., Pister, K.: Smart Dust: Communicating with A Cubic-millimeter Computer. IEEE Computer Magazine, pp. 44-51 (January 2001).
[4]
Gunopulos, D., Kollios, G., Tsotras, J., Domeniconi, C.: Approximating Multi-Dimensional Aggregate Range Queries over Real Attributes. In: SIGMOD (2000).
[5]
Madden, S., Franklin, M.J., Hellerstein, J.M., Hong, W.: The Design of An Acquisitional Query Processor for Sensor Networks. In: SIGMOD (2003).
[6]
Ramaswamy, S., Rastogi, R., Shim, K.: Efficient Algorithms for Mining Outliers from Large Datasets. In: SIGMOD (2000).
[7]
Knorr, E., Ng, R.: Algorithms for Mining Distance-Based Outliers in Large Datasets. In: VLDB, 24-27 (1998).
[8]
Branch, J., Szymanski, B., Giannella, C., Wolff, R.: In-Network Outlier Detection in Wireless Sensor Networks. In: ICDCS (2006).
[9]
Subramaniam, S., Palpanas, T., Papadopoulos, D., Kalogeraki, V., Gunopulos, D.: Online Outlier Detection in Sensor Data Using Non-Parametric Models. In: VLDB (2006).
[10]
Palpanas, T., Papadopoulos, D., Kalogeraki, V., Gunopulos, D.: Distributed Deviation Detection in Sensor Networks. ACM SIGMOD 32(4), 77-82 (2003).
[11]
Zhuang, Y., Chen, L.: In-network Outlier Cleaning for Data Collection in Sensor Networks. In: CleanDB (2006).
[12]
Intel Berkeley Research Lab. http://db.lcs.mit.edu/labdata/labdata.html.
[13]
Crossbow Technology Inc. http://www.xbow.com/.
[14]
Ash, J.N., Moses, R.L.: Outlier Compensation in Sensor Network Self-localization via the EM Algorithm. In: ICASSP (2005).
[15]
Jun, M.C., Jeong, H., Kuo, C.J.: Distributed Spatio-temporal Outlier Detection in Sensor Networks. In: SPIE (2005).
[16]
Janakiram, D., Reddy, A.M., Kumar, A.P.: Outlier Detection in Wireless Sensor Networks using Bayesian Belief Networks. In: Comsware (2006).

Cited By

View all
  • (2019)Blind bernoulli trialsProceedings of the 28th USENIX Conference on Security Symposium10.5555/3361338.3361441(1483-1500)Online publication date: 14-Aug-2019
  • (2019)A Lightweight Anomaly Detection Method Based on SVDD for Wireless Sensor NetworksWireless Personal Communications: An International Journal10.1007/s11277-019-06143-1105:4(1235-1256)Online publication date: 1-Apr-2019
  • (2016)DWT-based anomaly detection method for cyber security of wireless sensor networksSecurity and Communication Networks10.1002/sec.15509:15(2911-2922)Online publication date: 1-Oct-2016
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
ADMA '07: Proceedings of the 3rd international conference on Advanced Data Mining and Applications
August 2007
632 pages

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 06 August 2007

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 04 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2019)Blind bernoulli trialsProceedings of the 28th USENIX Conference on Security Symposium10.5555/3361338.3361441(1483-1500)Online publication date: 14-Aug-2019
  • (2019)A Lightweight Anomaly Detection Method Based on SVDD for Wireless Sensor NetworksWireless Personal Communications: An International Journal10.1007/s11277-019-06143-1105:4(1235-1256)Online publication date: 1-Apr-2019
  • (2016)DWT-based anomaly detection method for cyber security of wireless sensor networksSecurity and Communication Networks10.1002/sec.15509:15(2911-2922)Online publication date: 1-Oct-2016
  • (2015)Outlier Detection Approach Using Bayes Classifiers in Wireless Sensor NetworksWireless Personal Communications: An International Journal10.1007/s11277-015-2822-385:3(1009-1023)Online publication date: 1-Dec-2015
  • (2015)To catch a fakeStatistical Analysis and Data Mining10.1002/sam.112648:3(147-161)Online publication date: 1-Jun-2015
  • (2013)Image analysis of histological features in molar pregnanciesExpert Systems with Applications: An International Journal10.1016/j.eswa.2013.06.03440:17(7151-7158)Online publication date: 1-Dec-2013
  • (2012)Multi-level relationship outlier detectionInternational Journal of Business Intelligence and Data Mining10.1504/IJBIDM.2012.0517137:4(253-273)Online publication date: 1-Jan-2012
  • (2012)CTODProceedings of the 10th ACM international symposium on Mobility management and wireless access10.1145/2386995.2386997(1-10)Online publication date: 24-Oct-2012
  • (2009)Anomaly detectionACM Computing Surveys10.1145/1541880.154188241:3(1-58)Online publication date: 30-Jul-2009

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media