Anomaly Detection in Wireless Sensor Networks - A Survey
Anomaly Detection in Wireless Sensor Networks - A Survey
The attached
copy is furnished to the author for internal non-commercial research
and education use, including for instruction at the authors institution
and sharing with colleagues.
Other uses, including reproduction and distribution, or selling or
licensing copies, or posting to personal, institutional or third party
websites are prohibited.
In most cases authors are permitted to post their version of the
article (e.g. in Word or Tex form) to their personal website or
institutional repository. Authors requiring further information
regarding Elseviers archiving and manuscript policies are
encouraged to visit:
http://www.elsevier.com/copyright
a r t i c l e i n f o
a b s t r a c t
Article history:
Received 19 August 2010
Received in revised form
10 February 2011
Accepted 7 March 2011
Available online 21 March 2011
Since security threats to WSNs are increasingly being diversied and deliberate, prevention-based
techniques alone can no longer provide WSNs with adequate security. However, detection-based
techniques might be effective in collaboration with prevention-based techniques for securing WSNs. As
a signicant branch of detection-based techniques, the research of anomaly detection in wired
networks and wireless ad hoc networks is already quite mature, but such solutions can be rarely
applied to WSNs without any change, because WSNs are characterized by constrained resources, such
as limited energy, weak computation capability, poor memory, short communication range, etc. The
development of anomaly detection techniques suitable for WSNs is therefore regarded as an essential
research area, which will enable WSNs to be much more secure and reliable. In this survey paper, a few
of the key design principles relating to the development of anomaly detection techniques in WSNs are
discussed in particular. Then, the state-of-the-art techniques of anomaly detection in WSNs are
systematically introduced, according to WSNs architectures (Hierarchical/Flat) and detection technique
categories (statistical techniques, rule based, data mining, computational intelligence, game theory,
graph based, and hybrid, etc.). The analyses and comparisons of the approaches that belong to a similar
technique category are represented technically, followed by a brief discussion towards the potential
research areas in the near future and conclusion.
& 2011 Elsevier Ltd. All rights reserved.
Keywords:
Wireless sensor networks
Information security
Anomaly detection
1. Introduction
A wireless sensor network (WSN) is made up of a mass of
spatially distributed autonomous sensors, to jointly monitor
physical or environmental conditions, such as temperature,
sound, vibration, pressure, motion and pollutants (Yick et al.,
2008). To date, WSNs have been successfully applied to many
industrial and civil domains, including industrial process, monitoring and control, machine health monitoring, environment and
habitat monitoring, healthcare applications, home automation,
and trafc control. A typical WSN has little or no infrastructure. If
the deployment of a WSN is subject to an ad hoc manner, it is
categorized as unstructured. In contrast, the network deployed
with a pre-planned manner is categorized as structured. Each
sensor node is optionally built up with a variety of network
services such as localization, coverage, synchronization, data
compression and aggregation, and security, for the purpose of
enhancing the networks overall performance. Sensor nodes
communicate with each other, through following the typical
ve-layer communication protocol stack, which consists of
Corresponding authors.
communication attack;
denial of service attack;
node compromise;
impersonation attack;
protocol-specic attack.
Han et al. (2005) also propose a good taxonomy that surveys the
security threats according to a more detailed criteria.
Securing WSN is imperative and challenging accordingly.
Prevention-based techniques that fundamentally build upon
1303
non-parametric techniques. Nevertheless, a technology-concerned survey is yet absent to present the latest progress of
developing anomaly detection in WSN.
Moreover, our paper expects acting as a guideline of selecting
appropriate anomaly detection techniques. Through analyzing
and comparing those particular approaches that belong to a
similar technique category, the advantages and shortcomings of
each technique category can be identied. Accordingly, it further
extracts the key design principles to overcome possible aws.
The pattern of anomaly detection signicantly impacts on the
performance of a detection scheme, which basically relates to
who is mainly responsible for the data processing of detection.
The choice of detection pattern depends on the application
scenario. The fair understanding with regard to these available
anomaly detection patterns could facilitate the development of
detection schemes. In consequence, these anomaly detection
patterns are surveyed separately in this paper.
In our survey paper, all detection schemes are divided into two
types of detection method: prior-knowledge based, or priorknowledge free. The prior-knowledge-based detection schemes
are better suited to the applications which are biased to detection
speed; the prior-knowledge free schemes, on the contrary, are
capable of providing applications with stronger detection generality. This awareness is positive to optimally selecting anomaly
detection techniques. Attribute selection is traditionally a critical
issue in a detection system, as using less number of attributes is
able to conserve resource. Our paper emphasizes the importance
of this issue for developing anomaly detectors in WSNs, whereas a
detailed discussion is not given owing to space constraint.
Finally, the developing orientations in this area are examined,
and a number of potential research areas in the near future are
proposed.
1.1. Motivation
Other than anomaly detection, there are also misuse/signature detection and stateful protocol analysis in the category of
intrusion detection (Scarfone and Mell, 2007). Misuse/signature
detection is dened as a process of comparing signatures against
observed events to identify possible incidents, where each
signature is a pattern corresponding to a known threat. Stateful
protocol analysis is dened as the process of comparing predetermined proles of generally accepted denitions of benign
Table 1
Summary of the taxonomy.
Category
Techniques
Statistical
Data mining
Computational intelligence
Rule
Game theory
Graph
Hybrid
Distribution
Measure
Model
Clustering
SVM
Rule learner
SOM
ANN
GA
Assumption
Experience
Non-cooperative and non-zero-sum
Tree construction
Depth-rst search
Prevention and detection
target;
typical security threats;
detection pattern;
detection method;
attribute selection.
2.1. Target
The target implies what a detection scheme is expected to be
able to do. In order for ensuring the performance, a detection
scheme is suggested to achieve a target comprising of Ioannis
et al. (2007):
Effectiveness: The effectiveness of a detection scheme reect by
the detection accuracy and false alarm rate. The rate of detection
accuracy is the number of successfully detected anomalies divides
by the number of total anomalies. False alarm consists of false
positive and false negative, where a false positive signies a
legitimate activity is falsely identied as an anomaly, and a miss
of capturing a real anomaly results in a false negative. False alarm
rate is the number of false alarm divides by the number of
reported anomalies. A good scheme should reach at high detection accuracy rate while remaining false alarm rate down. On the
other hand, the ability of detecting unknown (new types of
anomaly) anomalies is also signicant as security threats to
WSN are more and more diversied and deliberate. This ability
is referred as detection generality in this paper.
Minimized resource: WSN characterizes by tremendously constrained resources, especially the availability of energy. As a
result, minimizing the energy cost is a priority. The less use of
resource partly determines faster detection speed, but probably
leads to the loss of effectiveness. In consequence, it is difcult to
trade off the effectiveness and resource usage. According to a
truth that the most of energy in a sensor node is drained by radio
communication rather than by computation (Roman et al., 2006),
activating in-network computing as much as possible, namely
using distributed manner for computing, might be a promising
way to address this issue. In addition, the resource conservation
may come with effort made to design lightweight detection
schemes as well as smart strategies.
Trust no node: Unlike wired networks or ad hoc networks, a
sensor node can be compromised easily due to its weakness.
Accordingly, a detection scheme has to meet the criterion
trust-no-node at any time. Based on a security foundation
(Zhang et al., 2008; Curiac et al., 2007; Su et al., 2005; Ngai
et al., 2006, 2007; Yu and Xiao, 2006; Ho et al., 2009), adding a
process of data ltering (Liu et al., 2007), and employing a vote
(or similar) mechanism (Liu et al., 2007; Li et al., 2008a,b;
Tiwari et al., 2009; Pires et al., 2004; Ioannis et al., 2007) might
be effective for directly ensuring the legitimate identity of a
sensor node or diluting the bad effects caused by the unattended malicious nodes.
Be secure: The detection schemes themselves must be secure,
because the line of defense would be destroyed to the ground if
sophisticated adversaries disable or jump over the detection
service before initiate thorough attacks. In theory, adversaries
could make use of analytical measures to speculate what a kind of
detection rules or algorithms is in employment by their targeted
schemes. Furthermore, adversaries perhaps wreck the detection
scheme with brute force. The survivability against malicious
activities is thus a signicant point to assess the security of
detection schemes themselves. Moreover, the optimal detection
scheme must own the capability to recover its detection service
immediately once being wrecked, which is referred as tolerability.
2.2. Typical security threats
The typical security threats to WSN which can be identied by
a detection scheme should be fully reviewed. Many surveys
regarding these security threats have been introduced (Lopez
and Zhou, 2008; Han et al., 2005) according to different criteria,
but detection is not effective against all of the mentioned threats,
such as eavesdropping attack only can be resisted by the built-in
1305
Table 2
The typical security threats and preferred countermeasures.
Security threats
Preferred countermeasures
Black-hole
Malicious node
Sinkhole
Selective forwarding
Wormhole
Replica node
Random failure
Statistical measure
Statistical distribution, data mining
Graph, rule
Statistical measure, data mining
Statistical measure, rule
Rule
Statistical distribution, data mining
Table 3
Popular detection patterns.
Hierarchical WSNs
Flat WSNs
Patterns
References
Patterns
References
CH
CH and CSNs
One-hop
Radio-range
Other
Base station
Base station
Grouping
or other (Dallas et al., 2007; Yu and Tsai, 2008; Yu and Xiao, 2006;
Ioannis et al., 2007; Ho et al., 2009). The active nodes take care of its
specied neighborhood by monitoring and accomplishing the procedure of data processing. The procedure of analysis and decision may
be resolved by the active nodes alone or a cooperative method.
Second, the base station conducts anomaly detection across the
network (Curiac et al., 2007; Ngai et al., 2006, 2007). Third, partition
the network into groups and then activate a part of sensor nodes in
each group to take charge of the monitoring and data processing
procedure (Li et al., 2008a,b). The common shortcoming of the rst
pattern is the redundancy of protection coverage, because there is no
mechanism capable of accurately measuring the maximal protection
coverage that the active nodes can afford. As far as the third pattern, it
provides at WSNs with a chance as employing advanced technique
as hierarchical WSNs. However, the grouping procedure certainly
brings a massive energy burden. Available detection patterns in at
WSNs are shown in Fig. 4.
2.4. Detection method
Detection method is a key point of a detection scheme, as the
method impacts on its usable scope. The applicable range of a
scheme is to be restricted by the preconditions, according to
which two detection methods are introduced: prior-knowledge
based and prior-knowledge free.
Pattern 1 CH
Base Station
A Cluster
Pattern 2 CH & CSNs
Base Station
Pattern 1 One-hop
Pattern 4 BS
Pattern 5 Grouping
A Group
Sensor Node
Pattern 3 Other
Working Node
Fig. 4. Available detection patterns (at).
1307
Fig. 5. Process of identifying detection techniques. DM: Data Mining; CI: Computational Intelligence; IDA: Intrusion Detection Agent; SF: Security Foundation;
VD: Verifying Dataset; Stat: Statistical Techniques and DAD: Distributed Anomaly Detection.
1X
kxti :
n t AS
i
1309
1X
kxti :
n t AS
i
N1 N2
m1 m2 2 ,
N1,2
VMnew VMi
,
VMnew VMi
namely the similarity between Mnew and Mi is less than a threshold, Mnew is identied as normal and its corresponding Wi
increases. Otherwise, Mnew is put into a new observing period to
eventually determine it is a new type of message or fake message.
If similar messages come from the other nodes during this period,
Mnew is a new type of normal message; on the contrary, Mnew is a
fake message rmly. The sender of Mnew is marked as malicious
immediately, and let the other common sensor nodes and base
station be informed.
As for the abnormal behavior detection mechanism (ABDM),
two measures are employed to identify anomaly. One is to
examine if a common sensor node sends too much or too less
messages in a turn. The other one is built upon a security
foundation. Each common sensor node records its one-hop
neighbors ID and N(IDi), where N(IDi) is the value of the abnormal
behavior of node IDi. Given
m
1X
NIDj ,
mj1
sIDx
v
u
m
u 1 X
t
NIDj mIDx ,
m1 j 1
jIDx
NIDj m
IDj
,
sIDj
where uIDx and sIDx denote the mean and standard deviation of
jIDx respectively, if jIDx is deviated from a normal value, node
IDj will be reported to the cluster head as suspicious node.
This detection scheme makes use of a comparatively simple
technique, such that a faster detection speed comes true. Because
EMDM and ABDM work together, the cluster head and common
sensor nodes activate to perform detection at the same time,
which may provide the network with stronger security. However,
an apparent aw exists in EMDM. If more than one malicious
node sends the same fake messages, EMDM is incapable of
sustaining its operation against such attacks.
lk el
k!
1311
k1
to the cluster head, where m stands for jXi j. After the global
normal prole
2
mG , dG ,xGmax ,xGmin
is computed, the cluster head sends it back to the common sensor
nodes. After received the global normal prole, each common
sensor node initiates detection locally, using a xed-width clustering algorithm. If the Euclidean distance between a data point
and its closest cluster centroid is larger than a user-specied
radius o, a new cluster is organized with this data point as
centroid. For reducing the number of resulting clusters, a cluster
merging process is then conducted, through measuring the innercluster distances. The clusters c1 and c2 merge if their innercluster distance d(c1,c2) is less than o. Finally, the average intercluster distance of K nearest neighbor (KNN) clusters is applied to
identify anomalous clusters. Let ICDi be the average inter-cluster
distance (KNN) of cluster i, AVG(ICD) and SD(ICD) be the mean and
standard deviation of all inter-cluster distances respectively. If
ICDi 4SDICD AVGICD,
cluster i is viewed as anomalous.
This detection scheme is subject to a distributed manner,
where the common sensor nodes are responsible for a part of the
global normalizing procedure, which is served for the core
K-means clustering algorithm. There is a four-parameter tuple
making up a normal prole, which conserves energy cost in
communications.
3.2.2. Distributed detection using SVM
One-class quarter-sphere SVM, as a representative algorithm
of SVM, is also suited to distribute anomaly detection (Rajasegarar
et al., 2007). First, the local quarter-sphere is computed at each
common sensor node. Second, the cluster heads collects these
min
R A R, e A Rn
R2
n
1X
x,
vni 1 i
s:t:
Jjxi J2 rR2 xi ,
xi Z 0,
~ ,x 4 R2 ,
normkx
i i
m
xi is identied as an anomaly.
This scheme may suffer from a more massive procedure of
data processing, as a result of the high complexity of SVM. But,
only one parameter as the normal prole is exchanged between
the cluster head and common sensor nodes, indicating mush less
communication cost.
3.2.3. Distributed detection using clustering ellipsoids
Across the entire network, a WSN probably contains multiple
types of data underlying distribution; accordingly, Moshtaghi
et al. propose a distributed detection scheme based on clustering
ellipsoids (Masud et al., 2009). The base station takes charge of
computing the global hyper-ellipsoid, to accommodate the nonhomogenous data underlying distributions. The common sensor
nodes are in charge of performing detection, on the other hand,
with the global hyper-ellipsoid.
The general form of the elliptical boundary is represented as
ella,A; t fx A Rp jxaT Axa t 2 g,
where a is the center of the ellipsoid and t is its effective radius.
The Mahalanobis distance of x is
q
JxmJV 1 xmT V 1 xm,
where m is the mean and V is the covariance matrix. Consequently, x is actually resided within a hyper-ellipsoidal boundary
if its Mahalanobis distance is t, i.e.:
Bm,V 1 ; t fx A Rp jJxmJ2V 1 t 2 g:
x is considered as a local anomaly if falling outside this boundary.
Hyper-ellipsoids are sent to the base station by the common
sensor nodes as local normal proles, where a global ellipsoid is
produced. In order to satisfy as many types of data underlying
distribution as possible, t is intentionally selected. In addition,
these ellipsoids reported by the common sensor nodes are
disposed off with clustering which reduces the redundancy
between them. Given a common sensor node Nj sending the
parameter tuple (mj, Vj, nj) regarding its local ellipse Ej to the base
station B, the similarity between two ellipsoids is measured as
SE1 ,E2 eJm1 m2 J :
Positive root eigenvalue (PRE) plot is employed to estimate the
number of clusters c. Ellipses merge as a pairwise manner when
the similarities and c are ready: Let (mu, Vu, nu) and (mv, Vv, nv) be
the parameter tuples of the ellipsoids Eu and Ev respectively, the
probability Pi, as
n nu nv ,
F
Pi PN i
nu
nv
mu mv ,
m
n
n
V
nu 1
nv 1
nu nv
Vu
Vv
mu mv mu mv T :
n1
n1
nn1
j0
Fj
if x LMN; x A ch,icr,
PR
IRicr
r1
IRricr
where IRch and IRicr are the integrity ranks of CH and ICR
respectively, R is the number of routes, and IRricr is the integrity
rank of the route r that includes icr as a router in its path. IR is
estimated by the base station according to
Rx,y
covx,y
; 1 o Rx,y o1,
varx vary
IDC var
k0
!,
lk
n
X
lk ,
k0
,
2
F1 N
F1 M
b1 b2 1,
where ci is the number of LMN agents that monitor malicious
node i, which is below the integrity rank threshold, cj is the
number of LMN agents that monitor non-malicious node j, which
1313
2
2
1
2
exxG yyG =2s ,
2ps2
1315
Pt Gt Gr h2t h2r
,
d4 L
1317
0
F 01,j x ffj xi jxi A N1 xg,
eA t xA tx^ A t:
0
where fj xi jfj xi m^ j =d^ j j. For each xi A N1 x, x seeks out the
maximum attribute component
Txjr Z Tmin ,
D
STB=P,
E
where NDTQ signies the set of the nodes listed in DTQ table,
jNDTQ j is the size of this set, qi is the DTQ value of node i, and
0 o r o1. When a node realizes one or multiple DTQ values are
below the threshold, it believes compromised nodes exist. In such
a case, this node broadcasts a message to its group members,
initiating a voting procedure. Since the DTQ values recorded by
the rest of nodes have unequal weights toward a node, it is unfair
to compare the number of votes directly. Apparently, the DTQ
values with late time stamps are more important than those with
old time stamps. Therefore, a variable o o A 0,1 is set up as the
weight of DTQ value, whose value decreases over time. The voting
result can be represented as
Vm
n
X
i1
where qim is the DTQ value of node m in the DTQ table located at
node i, wim is the weight of qim, and vim 1 if votes for m or vim 1 if
i votes against m. If V 5 0, m is denitely a compromised node; if
V b 0, m is a legitimate node and those nodes voting against m need
to update their DTQ values according to formula
f
qm qm 1
,
f a
where the rates of voting for and against stand at f:a. Malicious nodes
then are dismissed immediately from the network.
A DTQ function is developed to identify compromised nodes
quantitatively, which take many attributes into account, such as
energy cost, data transmission quality, slack variable, etc. The use
of weight-based voting mechanism advances the reliability of the
proposed scheme. However, the dependencies on a grouping
method and the assistance by ACK mechanism result in additional
complexity.
4.2.8. Detection using grouping and statistical distribution
Li et al. (2008a) propose a group-based detection scheme,
using a statistical distribution-based technique to identify anomaly. The entire network is partitioned into a set of groups above
all, where the nodes within same group are physically close to
each other and their sensed data are dissimilar by at most d. Each
d-group is further partitioned into equal-sized sub-groups. Each
and the simple variancecovariance may suffer from the distortion caused by outlying sensor nodes. Instead, OGK (orthogonalized GnanadesikanKettenring) algorithm is used for accomplishing the estimating of m and S.
Through leading the consideration of average amount into the
original d-group algorithm, an enhanced algorithm with stronger
resilience is proposed. Dependent on an interval estimation
technique derived from statistics as well as a weight-based voting
mechanism, the effectiveness of this scheme is sound. Moreover,
the employment of several typical attributes over the network
provides advanced detection generality with the proposed
scheme.
4.2.9. Research problems
In at WSN, statistical techniques-based detection schemes
are most popular. Taking advantage of a relatively complex
training procedure, these detection schemes can reach stronger
detection generality than rule-based schemes. In general, a part of
nodes are responsible for the main computing of the data
processing procedure. However, this may rapidly bleed these
working nodes out. Therefore, developing a strategy to averagely
make use of sensor nodes for anomaly detection is emergent.
The incorporation of a majority voting mechanism into the
detection scheme is very common, because a naked detection
based on statistics may generate a high false alarm rate. In fact,
this is caused by the natural inaccuracy of the statistical measures
themselves as well as the intervention by unattended malicious
nodes. Liu et al. (2007) deal this issue with an extra false
information ltering, but markedly rises up energy cost. Casting
about for a new scheme in collaboration with prevention-based
technique probably could mitigate the urgent need of plus
guarantee mechanism.
The invention of grouping-based schemes (Li et al., 2008a,b)
gives the opportunity of implementing advanced techniques as
strong as used for hierarchical WSNs to at WSNs. Nevertheless,
the weakness of these heads (elected from normal sensor nodes)
impedes the progress.
4.3. Graph-based techniques
4.3.1. Detection using routing pattern
Based on the routing pattern, a detection scheme is introduced
to mainly defense against sinkhole attacks (Ngai et al., 2006).
First, the base station collects the network ows information to
identify the attacked area with a low-overhead algorithm, where
it contains all the affected nodes. Second, the base station
localizes the intruders exactly by modeling the attracted area
with a graph, according to the routing pattern. Multiple malicious
nodes may be cooperative to prevent the base station from
collecting correct information. Therefore, this scheme is enhanced
by establishing a secret key-based security foundation, increasing
path redundancy, and an algorithm dealing with multiple malicious nodes using hop counts.
In this case, the base station estimates the suspicious area by
examining any missing or inconsistent data with
s
xj x2
f xj
,
x
where x1 ,y,xn are the sensed data collected in a sliding window,
and x is their mean. The base station broadcasts a request
message encrypted with its private secret key KBS, as
/TS,ID1 ,ID2 , . . . ,IDn SKBS , where IDi stands for the ID of node i,
and TS is the time stamp. For each node v receiving this request
the rst time, it should reply the base station a message
/IDv ,IDnexthop ,costS if its ID is called on, where the cost may be
1319
hop count, data rate, etc. Afterwards, the base station can realize
the routing pattern by constructing a tree using the next hop
information collected. In total, the base station may get more than
one tree. Finally, the number of nodes in these trees is computed
by a depth-rst search. The intruder should be the root who has
the biggest tree, which attracts most of the network trafc.
In addition to identify an intruder, two enhancements have
been made in order for preventing from concurrent attacks
launched by more than one malicious node: one is to establish
a security foundation, while the other one is to increase the
redundancy of the path forwarding reply messages. The base
station then localizes the real intruder through detecting the
inconsistency among the hop-count information.
In its extended journal publication (Ngai et al., 2007), a MAC
(message authentication code) mechanism is additionally introduced when a node sends replay messages, because the replay
messages can be tampered during the forwarding path if without
any protecting mechanism. Given node v sending a replay
message R, v actually sends /R,MAC Kv RS to the base station,
where the notation MACKv is the MAC computed over message R
with secret key Kv. Furthermore, a more elaborate evaluating
process for the performance of the scheme is described, covering
its detection accuracy, communication cost, and energy cost. In
terms of the simulation experiments, the performance of this
scheme is perfectly sound.
This scheme adopts routing patterns to detect sinkhole attacks
in WSNs. Any intruder can be identied through detecting the
inconsistency among the hop-count information. Security of this
scheme is enhanced by using a message authentication code
mechanism. In addition, graph-based techniques would have
been resource costly, but the participation of base station in the
computing process overcomes this problem.
4.3.2. Research problems
Graph-based technique is currently not very popular for the
anomaly detection in WSNs. But, the architecture of WSNs suits to
be modeled with a graph in nature. Establishing a graph commonly requires the followings: (A) the participation of routing
protocol, (B) arranging a global identication to each node, and
(C) the security convoy by a mechanism of secret key management; thus the applicability of graph-based techniques is diminished. If being supported by specically designed routing protocol
and security foundation, it would be realistic that the graphbased detection schemes can make greater sense.
4.4. Data mining and computational intelligence-based techniques
4.4.1. Detection using rule learner
Yu develops a detection scheme with association rule learning
(Yu and Tsai, 2008). Each sensor node is equipped with an intrusion
detection agent (IDA), which consists of a local intrusion detection
component (LIDC) monitoring its host node and a packet-based
intrusion detection component (PIDC) identifying malicious nodes
by the communication activities relating to its neighbors.
A machine learning algorithm called SLIPPER is applied to this
scheme, comprising multiple binary classiers each of which
contains a set of rules. CR is the prediction condence of rule
R in a binary classier, which is xed up during the training
phase. In a binary classier, the nal hypothesis sums up the
condence values of rules all together in accordance to
!
X
Hx sign
CRt ,
Rt :x A Rt
where sign stands for predicted class label and the degree of
prediction condence (PC). Because there are multiple binary
Table 4
Horizontal evaluation of statistical technique category.
Scheme
D3
MGDD
Chi
Stat M
DTQ
ACC
FAR
GENE
CC
94%
2%
1
OdjRj
Z 90%
r 5%
6
O(mn)
r 93:3%
r 0:032%
3
O(n)
Z 93%
r 2%
6
O(NDTQ) O(Nvote)
MEM
1
O djRj 2 logjWj
94%
1%
1
djRj
O
2ar
OdjRj
O(nw)
O(mn)
O(NDTQ n)
Table 5
Horizontal evaluation of data mining and computational intelligence technique
category.
Scheme
Clustering
SVM
SLIPPER
ACC
FAR
GENE
CC
MEM
N/A
4%
1
O(mNc)
O(Nc)
100%
r 10%
1
p
O nL Ol On
O(n)
N/A
N/A
Many
r Onlogn
N/A
1321
Table 6
Horizontal evaluation of rule-based technique category.
Scheme
Wide
Pac Drop
ACC
FAR
GENE
CC
MEM
480%
o 10%
Many
N/A
N/A
N/A
o 5%
2
O(n)
O(nw)
5.1.2. Conclusion
After reviewing these schemes, we know that D3 and MGDD
in Subramaniam et al. (2006) are carried out in hierarchical
WSNs, and Chi (Liu et al., 2007), Stat M (Onat and Miri, 2005a),
and DTQ (Li et al., 2008b) are developed in at WSNs. Seemingly
Stat M demands the least computation complexity and memory
use at each node. But, many nodes are active for monitoring at
the same time. Conversely, it is probably the most resourceexpensive scheme among others. Communication cost is a
signicant factor for the detection speed, whereas it is hardly
measurable as the detection related information exchange must
not occur explicitly. Despite fewer nodes are working simultaneously in Chi and DTQ schemes, a plenty of communication cost
is actually generated at Chi, because it has to collect a lengthy
data from each of its neighbor nodes. Schemes D3 and MGDD
seem to show the most stable performance but take up the
resource as same as the other ones. Because the use of a
distributed manner spreads their computation over the entire
network and therefore it is in effect to reduce the communication cost; moreover, the cluster head tightly holds the primary
computing tasks together with itself, accordingly alleviating the
computing pressure at common sensor nodes. Furthermore, we
can conclude that commonly stronger detection generality is
accomplished by taking advantage of more attributes.
5.2. Data mining and computational intelligence
5.2.1. Analysis and comparison
This survey paper provides the technique category of data mining
and computational intelligence with a few examples, the most of
which are based on hierarchical WSN. In this sub-section, a xedwidth clustering-based scheme (Rajasegarar et al., 2006) is in use on
behalf of clustering algorithm of data mining. The second example is
about SVM (Rajasegarar et al., 2007). In addition, the association rule
learning algorithm-based scheme is cited (Yu and Tsai, 2008). Table 5
shows the comparisons illustratively, where the abbreviated names
include clustering (Rajasegarar et al., 2006), SVM (Rajasegarar et al.,
2007), and SLIPPER (Yu and Tsai, 2008).
The xed-width clustering-based scheme (Rajasegarar et al.,
2006) highlights its advance on resource use because it is
operated in distributed manner. In contrast to its centralized
case, their average false alarm rates are comparable (distributed
case is 4%, centralized case is 3%), as well as their detection
accuracies. The point is that the decrease of communication
overhead is up to 98% in this scheme. The computation complexity is summed up by those generated at data normalizing,
clustering, merging, and detection separately, which is O(mNc)
exactly, where m is the number of the measurements during a
time window, and Nc Nc 5 m stands for the number of the
clusters. Beside, each sensor node costs O(Nc) memory use. The
sensed data, consisting of humidity, temperature and pressure in
detail, is used as the attribute set for detection. Hence, this
scheme is supposed to be effective against false information
attack and a majority of random failures.
Similarly, the quarter-sphere SVM-based detection scheme
(Rajasegarar et al., 2007) is established with distributed manner.
Given RBF kernel and the maximally optimized parameters n and
s, this scheme can reach at approximately 100% detection
accuracy astonishingly, with false alarm rate less than 10%. What
is more, there is a 357-fold reduction in communication overhead,
comparing with its centralized case. Solving the linear optimization problem of SVM requires a polynomial time algorithm such
5.2.2. Conclusion
Many aspects with regard to data mining and computational
intelligence-based detection schemes take on similarity: they are
all built in hierarchical WSNs except the one with help of IDA (Yu
and Tsai, 2008); they are independent on any prior-knowledge;
they tend to be operated in distributed manner, as these schemes
are often complicated; and they prefer multivariate attribute set,
in order to take hold of excellent detection generality. Thus, the
differences between these schemes merely come along with
various choices on the attribute set and probably added
strategies.
Table 7
Panoramic comparison of evaluations on popular detection techniques.
Techniques
ACC
CC
Remark
D3
94%
OdjRj
MGDD
94%
Chi
Stat M
DTQ
Z 90%
r 93:3%
Z 93%
djRj
O
2ar
O(mn)
O(n)
O(NDTQ) O(Nvote)
Clustering
SVM
SLIPPER
N/A
100%
N/A
O(mNc)
p
O nL Ol On
r Onlogn
Wide
Pac Drop
480%
N/A
N/A
O(n)
ACC: detection accuracy; CC: computation complexity; FAR: false alarm rate; GENE: detection generality.
D3: distributed detection of distance-based outliers; MGDD: outlier detection using multi-granular local metrics.
Chi: chi-square distribution-based detection; Stat M: statistical measure; DTQ: data transmission quality.
SVM: support vector machine; SLIPPER: rule-learning algorithm.
Table 8
Vertical evaluation of technique categories.
Tech. category
Generality
Speed
Distributed
Prior
knowledge
Statistical
techniques
DM/CI
Rule
Normal
Normal
Possible
Assumption
High
Low
Low
High
Necessary
Not
Not
Assumption,
experience
1323
which will get naked under the malicious behaviors without the
protection of secret keys (Yu and Xiao, 2006; Ho et al., 2009). In
fact, WSN should have been equipped with a security foundation
for the majority of safety-critical applications. There is however
only a case that really link detection with prevention, in which
the pairwise key established between two nodes are used for
localizing the compromised nodes. Consequently, we suggest
spending more attention on the cooperation between the detection service and security foundation.
6.1.6. Survivable and tolerable anomaly detection
This is another old problem derived from traditional intrusion
detection (Yu and Frincke, 2004; Frinckea et al., 2006). As a result
of the resource constraints of WSNs, simpler detection algorithms
are more likely to be employed, allowing adversary to break
through the detection service itself before initiating a thorough
attack. For example, an adversary can nd out the threshold easily
by analyzing the pattern of network trafc and alarm, if the
detection is based on measuring statistical mean/variance of the
network trafc. To date, this issue remains open in WSNs. We
have suggested a conceptual outline with regard to inventing
survivable and tolerable anomaly detection in WSNs in Section 2.1,
where the survivability implies the detection scheme is equipped
with the anti-analysis capability (Deng et al., 2004). In other words it
perturbs the detection algorithm of itself; on the other hand,
tolerability indicates that a detection service will be recovered or be
re-enabled immediately after failing to continue against external
disturbance.
6.1.7. Uniform performance evaluation standard
Currently, the performance metrics of intrusion detection are still
in use, which are mainly composed of detection accuracy, false alarm
rate, and complexity. But, we suppose it is not even close to evaluate
next generation of anomaly detection in WSNs. First, a detection
scheme is always expected to own powerful capability of addressing
a wider range of security issues with a comparable cost; therefore,
detection generality should be added to the new performance
metrics. Second, energy cost must be taken into account, as energy
is the most precious resource in WSNs. Finally, a metric has to be
involved to evaluate the security and robustness of detection schemes
themselves, where we supposedly dene survivability and tolerability
for doing such tasks.
6.2. Conclusion
The research of anomaly detection in WSNs attracts increasing
attention recently, whereas a survey paper that systematically
details the up-to-date anomaly detection techniques in WSNs and
advises a number of signicant research problems is not yet
available. In this paper, we have rstly presented the key design
principles of anomaly detection in WSNs. Then, many typical
examples are introduced according to WSNs architectures and
their technique categories. Moreover, a few of examples are
picked from three most popular technique categories to carry
out a particular comparison and analysis. Finally, the potential
research areas in the near future are suggested.
References
Agah A, et al. A non-cooperative game approach for intrusion detection in sensor
networks. Presented at the IEEE 60th vehicular technology conference,
September 2004.
Agah A, et al. Intrusion detection in sensor networks: a non-cooperative game
approach. Presented at the 3rd IEEE international symposium on network
computing and applications, 2004.
Akyildiz IF, et al. A survey on sensor networks. IEEE Communications Magazine
2002;40(August):102114.
Anderson JP. Computer security threat monitoring and surveillance. Fort Washington, Pennsylvania: James P Anderson Co; April 1980.
Axelsson S. Research in intrusion-detection systems: a survey; December 1998.
Cabrera JoBD, et al. Ensemble methods for anomaly detection and distributed intrusion detection in mobile ad-hoc networks. Information Fusion
2008;9(January).
Chandola V, et al. Anomaly detection: a survey. ACM Computing Surveys
2009;41(July).
Chebrolu S, et al. Feature deduction and ensemble design of intrusion detection
systems. Computers & Security 2005;24(June):295307.
Curiac D-I, et al. Malicious node detection in wireless sensor networks using an
autoregression technique. Presented at the 3rd international conference on
networking and services, June 2007.
Dallas D, et al. Hop-count monitoring: detecting sinkhole attacks in wireless
sensor networks. Presented at the 15th IEEE international conference on
networks, 2007.
Deng J, et al. Intrusion tolerance and anti-trafc analysis strategies for wireless
sensor networks. Presented at the 2004 international conference on dependable systems and networks, July 2004.
Denning DE. An intrusion-detection model. IEEE Transactions on Software
Engineering 1987;SE-13:22232.
Frinckea D, et al. From intrusion detection to self-protection. Computer Networks
2006;11(November):12338.
Han S, et al. Taxonomy of attacks on wireless sensor networks. Presented at the 1st
European conference on computer network defence, 2005.
Hodge VJ, Justin J. A survey of outlier detection methodologies. Articial Intelligence Review 2004;22:85126.
Ho J-W, et al. Distributed detection of replica node attacks with group
deployment knowledge in wireless sensor networks. Ad Hoc Networks
2009;7(November):147688.
Hu J. Host-based anomaly IDS. In: Springer handbook of information and communication security. Springer Verlag; 2010.
Huang L, et al. Distributed PCA and network anomaly detection; July 2006.
Ioannis K, et al. Towards intrusion detection in wireless sensor networks.
Presented at the 13th European wireless conference, April 2007.
Jensen R, Shen Q. New approaches to fuzzy-rough feature selection. IEEE Transactions on Fuzzy Systems 2009;17(August):82438.
Kloft M, et al. Automatic feature selection for anomaly detection. Presented at the
1st ACM workshop on AISec, 2008.
Li G, et al. Group-based intrusion detection system in wireless sensor networks.
Computer Communications 2008a;31(December):432432.
Li T, et al. Compromised sensor nodes detection: a quantitative approach.
Presented at the 28th international conference on distributed computing
systems workshops, June 2008.
Liu F, et al. Insider attacker detection in wireless sensor networks. Presented
at the 26th IEEE international conference on computer communications,
May 2007.
Lopez J, Zhou J. Overview of wireless sensor network security. In: Wireless sensor
network security. IOS Press, incorporated; May 2008. p. 121.
Masud M, et al. Anomaly detection by clustering ellipsoids in wireless sensor
networks. Presented at the 5th international conference on intelligent sensors,
sensor networks and information processing, 2009.
Ngai ECH, et al. On the intruder detection for sinkhole attack in wireless sensor
networks. Presented at the IEEE international conference on communications,
June 2006.
Ngai ECH, et al. An efcient intruder detection algorithm against sinkhole attacks in
wireless sensor networks. Computer Communications 2007;30(September):
235364.
Onat I, Miri A. A real-time node-based trafc anomaly detection algorithm for
wireless sensor networks. Presented at the 2005 systems communications,
August 2005.
Onat I, Miri A. An intrusion detection system for wireless sensor networks.
Presented at the 2005 IEEE international conference on wireless and mobile
computing, networking and communications, August 2005.
Palpanas T, et al. Distributed deviation detection in sensor networks. SIGMOD
Record 2003;32(December):7782.
Perrig A, et al. SPINS: security protocols for sensor networks. Presented at the
17th ACM international conference on mobile computing and networks,
2001.
Pires WR, et al. Malicious node detection in wireless sensor networks. Presented at
the 18th international parallel and distributed processing symposium,
April 2004.
Qian L, et al. Detection of wormhole attacks in multi-path routed wireless ad hoc
networks: a statistical analysis approach. Journal of Network and Computer
Applications 2007;30:30830.
Rahul K, et al. Reduced complexity intrusion detection in sensor networks using
genetic algorithm. Presented at the IEEE international conference on communications, 2009.
Rajasegarar S, et al. Distributed anomaly detection in wireless sensor networks.
Presented at the 10th IEEE Singapore international conference on communication systems, October 2006.
Rajasegarar S, et al. Quarter sphere based distributed anomaly detection in
wireless sensor networks. Presented at the IEEE international conference on
communications, June 2007.
Rajasegarar S, et al. Anomaly detection in wireless sensor networks. IEEE Wireless
Communications 2008;15:3440.
1325
Wang H, et al. Intrusion detection for wireless sensor networks based on multiagent and rened clustering. Presented at the international conference on
communications and mobile computing, January 2009.
Wu B, et al. Secure and efcient key management in mobile ad hoc networks.
Journal of Network and Computer Applications 2007;30:93754.
Yick J, Mukherjee B, Ghosal D. Wireless sensor network survey. Computer
Networks 2008;52(August):2292330.
Yu D, Frincke D. Towards survivable intrusion detection system. Presented at the
37th annual Hawaii international conference on system sciences, January
2004.
Yu Z, Tsai JJP. A framework of machine learning based intrusion detection for
wireless sensor networks. Presented at the IEEE international conference on
sensor networks, ubiquitous and trustworthy computing, June 2008.
Yu B, Xiao B. Detecting selective forwarding attacks in wireless sensor
networks. Presented at the 20th international parallel and distributed processing, 2006.
Zhang Y-Y, et al. Inside attacker detection in hierarchical wireless sensor network.
Presented at the 3rd international conference on innovative computing
information and control, June 2008.
All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately.