Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1157733.1157912guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Hierarchical Anomaly Detection in Distributed Large-Scale Sensor Networks

Published: 26 June 2006 Publication History

Abstract

In this paper, an anomaly detection approach that fuses data gathered from different nodes in a distributed wireless sensor network is proposed and evaluated. The emphasis of this work is placed on the data integrity and accuracy problem caused by compromised or malfunctioning nodes. One of the key features of the proposed approach is that it provides an integrated methodology of taking into consideration and combining effectively correlated sensor data, in a distributed fashion, in order to reveal anomalies that span through a number of neighboring sensors. Furthermore, it allows the integration of results from neighboring network areas to detect correlated anomalies/attacks that involve multiple groups of nodes. The efficiency and effectiveness of the proposed approach is demonstrated for a real use case that utilizes meteorological data collected from a distributed set of sensor nodes.

Cited By

View all
  • (2019)Blind bernoulli trialsProceedings of the 28th USENIX Conference on Security Symposium10.5555/3361338.3361441(1483-1500)Online publication date: 14-Aug-2019
  • (2019)Anomaly Detection Method for Chiller System of SupercomputerProceedings of the 2019 3rd High Performance Computing and Cluster Technologies Conference10.1145/3341069.3341076(21-24)Online publication date: 22-Jun-2019
  • (2016)DWT-based anomaly detection method for cyber security of wireless sensor networksSecurity and Communication Networks10.1002/sec.15509:15(2911-2922)Online publication date: 1-Oct-2016
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
ISCC '06: Proceedings of the 11th IEEE Symposium on Computers and Communications
June 2006
1039 pages
ISBN:0769525881

Publisher

IEEE Computer Society

United States

Publication History

Published: 26 June 2006

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2019)Blind bernoulli trialsProceedings of the 28th USENIX Conference on Security Symposium10.5555/3361338.3361441(1483-1500)Online publication date: 14-Aug-2019
  • (2019)Anomaly Detection Method for Chiller System of SupercomputerProceedings of the 2019 3rd High Performance Computing and Cluster Technologies Conference10.1145/3341069.3341076(21-24)Online publication date: 22-Jun-2019
  • (2016)DWT-based anomaly detection method for cyber security of wireless sensor networksSecurity and Communication Networks10.1002/sec.15509:15(2911-2922)Online publication date: 1-Oct-2016
  • (2011)Designing an efficient PCA based data model for wireless sensor networksProceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief10.1145/2185216.2185262(147-154)Online publication date: 18-Dec-2011
  • (2009)Anomaly detectionACM Computing Surveys10.1145/1541880.154188241:3(1-58)Online publication date: 30-Jul-2009

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media