Anomalous Cluster Heads and Nodes in Wireless Sensor Networks

Document Type : Original Article

Authors

Faculty of Electrical Engineering, Iran University of Science and Technology, Tehran, Iran

Abstract

The majority of wireless sensor network (WSN) security protocols state that a direct connection from an attacker can give them total control of a sensor node. A high level of security is necessary for the acceptance and adoption of sensor networks in a variety of applications. In order to clarify this issue, the current study focuses on identifying abnormalities in nodes and cluster heads as well as developing a method to identify new cluster heads and find anomalies in cluster heads and nodes. We simulated our suggested method using MATLAB tools and the Database of the Intel Research Laboratory. The purpose of the performed simulation is to identify the faulty sensor. Using the IBRL database, sensors that fail over time and their failure model is the form that shows the beats in the form of pulses, we find out that the sensor is broken and is of no value. Of course, this does not mean that the sensor is invasive or intrusive. We have tried by clustering through Euclidean distance that identify disturbing sensors. But in this part of the simulation, we didn't have any data that shows disturbing sensors, it only shows broken sensors. We have placed the sensors randomly in a 50 x 50 space and we want to identify the abnormal node.

Keywords

Main Subjects


  • E. K. Mamun, “Constraint-Minimizing Logical Topology for Wireless Sensor Networks,” Doctoral dissertation, Clayton School of Information Technology Monash University, vol. 2, no. 11, pp. 400-413, 2011.
  • Elhoseny, H. Elminir, and A. M. Riad, “Recent Advances of Secure Clustering Protocols in Wireless Sensor Networks,” International Journal of Computer Networks and Communications Security, 2014.
  • Y. Yu, E. Lee, S. R. Oh, Y. D. Seo, and Y. G. Kim, “A Survey on Security Requirements for WSNs: Focusing on the Characteristics Related to Security,” IEEE Access, vol. 8, pp. 45304-45324, 2020.
  • Zhou, Y. Fang, and Y. Zhang, “Securing wireless sensor networks: a survey,” IEEE Communications Surveys & Tutorials, vol. 10, no. 3, pp. 6-28, 2008.
  • Wu, X. Deng, R. Lu, and X. Shen, “Trust-based anomaly detection in wireless sensor networks,” 1st IEEE International Conference on Communications in China, ICCC, IEEE, 2012, pp. 203-207.
  • Jyothi, and N. G. Cholli, “New Approach to Secure Cluster Heads in Wireless Sensor Networks,” 5th International Conference on Advanced Computing & Communication Systems (ICACCS), IEEE, 2019, pp. 1097-1101.
  • W. Hussien, D. S. Qawasmeh, and M. Shurman, “MSCLP: Multi-Sinks Cluster-Based Location Privacy Protection scheme in WSNs for IoT,” 32nd International Conference on Microelectronics (ICM), IEEE, 2020, pp. 1-4.
  • Berjab, H. H. Le, C. M. Yu, S. Y. Kuo, and H. Yokota, “Abnormal-Node Detection Based on Spatio-Temporal and Multivariate-Attribute Correlation in Wireless Sensor Networks,” IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), IEEE, 2018, pp. 568-575.
  • Berjab, H. H. Le, and H. Yokota, “A Spatiotemporal and Multivariate Attribute Correlation Extraction Scheme for Detecting Abnormal Nodes in WSNs,” IEEE Access, vol. 9, pp. 135266-135284, 2021,
  • Kumar, and P. Rajpoot, “Optimized H-LEACH algorithm for clustering to improve lifetime of WSN,” 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), IEEE, 2018, pp. 2393-2398.
  • Khalil, M. R. Abid, D. Benhaddou, M. Gerndt, “Wireless sensors networks for Internet of Things,” IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) Symposium on Public Internet of Things, IEEE, 2014, pp.1-6.
  • Al-Riyami, N. Zhang, and J. Keane, “An adaptive early node compromise detection scheme for hierarchical WSNs,'' IEEE Access, vol. 4, pp. 4183-4206, 2016.
  • Wang, and J. Li, “Shortest path routing with risk control for compromised wireless sensor networks,'' IEEE Access, vol. 7, pp. 19303-19311, 2019.
  • Cao, Q. Wang, Y. Yuan, and J. Yu, “Anomaly Event Detection Method Based on Compressive Sensing and Iteration in Wireless Sensor Networks,” Journal of Networks, vol. 9, no. 3, p. 711, 2014.
  • E. Egilmez, and A. Ortega, “Spectral Anomaly Detection Using Graph-Based Filtering for Wireless Sensor Networks,” International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE, 2014, pp. 1085-1089.
  • A. Haque, S. M. Aziz, and M. Rahman, “Sensor Anomaly Detection in Wireless Sensor Networks for Healthcar,” National Center for Biotechnology Information, 2015.
  • Ahmad, E. A. Sundararajan, and T. Abu-Ain, “Analysis the Effect of Clustering and Lightweight Encryption Approaches on WSNs Lifetime,” International Conference on Electrical Engineering and Informatics (ICEEI), IEEE, 2021, pp. 1-6.
  • Quazi Mamun, Mohammed Kaosar, Md Rafiqul Islam, “Anomaly Detection in Wireless Sensor Network,” in Journal of Networks, vol. 10, no. 4, p. 217415, 2014.
  • Rana Jafri; Rakesh Kumar, “Outlier Detection in WSN,” 3rd International Conference on Inventive Computation Technologies (ICICT),
  • Muhammad Alfian Amrizal; Luis Guillen; Takuo Suganuma, “Toward an Optimal Anomaly Detection Pattern in Wireless Sensor Networks,” IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC),
  • Rajendra Kumar Dwivedi; Arun Kumar Rai; Rakesh Kumar, “A Study on Machine Learning Based Anomaly Detection Approaches in Wireless Sensor Network,” 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence),
  • Xuedan Miao; Ying Liu; Haiquan Zhao; Chunguang Li, “Distributed Online One-Class Support Vector Machine for Anomaly Detection Over Networks,” IEEE Transactions on Cybernetics, 2019.
  • Tie Luo; Sai G. Nagarajan, “Distributed Anomaly Detection Using Autoencoder Neural Networks in WSN for IoT,” IEEE International Conference on Communications (ICC),
  • Rajendra Kumar Dwivedi; Sonali Pandey; Rakesh Kumar, “A Study on Machine Learning Approaches for Outlier Detection in Wireless Sensor Network,” 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence),
  • Lingqiang Chen; Li Xu; Guanghui Li, “Anomaly Detection Using Spatio-Temporal Correlation and Information Entropy in Wireless Sensor Networks,” International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics),
  • Yihan Sun; Yunli Chen, “Detection of Wormhole Attacks in Wireless Sensor Networks Based on Anomaly Detection Algorithms,” 2nd International Conference on Consumer Electronics and Computer Engineering (ICCECE),
  •  
  • Sara Gorgbandi received the Bachelor's degree in Electrical-Electronic Engineering from Tuysarkan Azad University, Hamedan from 2005 to 2009. She received the Master's degree in information and communication technology engineering from Tehran University of Science and Technology from 2011 to 2015. She was representative of Nadco company in Arak from 2009 to 2015. She is data and switch expert of the General Department of Communication Infrastructure of Central Province from 2010 until now. She is working on Logic circuit training circuits using FPGA and VHDL language and She is interested in telecommunication networks and robotics.
  •  
  • Dr. Reza Berangi has (PhD) in Mobile Telecommunications from Victoria University of Technology, Melbourne, Australia, 1998. He received MS., Electronic Engineering, Iran University of Science and Technology, Tehran, Iran, 1989. He received BSc, Telecommunication Engineering, Iran University of Science and Technology, Tehran, Iran, 1985. He is Associate Professor, Faculty of Computer Engineering, Iran University of Science and Technology, Since Sept 2001. He was Research Fellow, Electrical Engineering Dept, Victoria University of Technology, Australia, 1997-2001. He was Sessional tutor, Electrical Engineering Dept, Melbourne University, Australia, 1994-1997. He was Sessional tutor, Electrical Engineering Dept, Victoria University of Technology, Australia, 1993-1997. He was Research staff, Jahad Daneshgahi, Iran University of Science and Technology,1979-1992.
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •