2011
DOI: 10.1016/j.jnca.2011.03.004
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly detection in wireless sensor networks: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
156
0
3

Year Published

2015
2015
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 282 publications
(159 citation statements)
references
References 37 publications
0
156
0
3
Order By: Relevance
“…The k-means algorithm is the most widely used algorithm for data mining applications [6,27]. It is simple, scalable, easily understood, and can be adopted to work with high-dimensional data [28][29][30].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The k-means algorithm is the most widely used algorithm for data mining applications [6,27]. It is simple, scalable, easily understood, and can be adopted to work with high-dimensional data [28][29][30].…”
Section: Related Workmentioning
confidence: 99%
“…The solution of the anomaly detection problem is not trivial [6,7]. Another reason is that several methods for anomaly detection require labeling of normal and/or abnormal behaviors that are not easy to archive [8,9].…”
Section: Introductionmentioning
confidence: 99%
“…For decades, researchers have been developing techniques and tools to identify security anomalies. For example, recent works have covered topics from the identification of anomalous user behaviour in social networks (Viswanath et al, 2014), anomalies in network traffic (Catania et al, 2012;Mahoney, 2003), anomaly detection in wireless networks (Islam and Rahman, 2011;Xie et al, 2011), and the anomaly detection in power station security (Ten et al, 2011). All these studies generate good results and demonstrate the potential of using machine learning and statistics to identify anomalies.…”
Section: Related Workmentioning
confidence: 99%
“…We cover a broader spectrum of papers since we include techniques other than anomaly detection, describe further steps for detecting malicious data and include a significant amount of literature published since then. Xie et al [2011] survey anomaly detection in WSNs, with a focus on the WSN architecture (Hirearchical/Flat) and the detection approach (statistical, rule based, data mining etc.). They describe the detection procedure in a similar way to us: definition of a "normal profile", which we refer to as normal or expected behaviour, and test to decide whether it is an anomaly or not, or to what extent.…”
Section: Related Surveysmentioning
confidence: 99%
“…They describe the detection procedure in a similar way to us: definition of a "normal profile", which we refer to as normal or expected behaviour, and test to decide whether it is an anomaly or not, or to what extent. However, our survey is structured based on the approach to both the definition of the normal behaviour and the detection based on it, while [Xie et al 2011] focus only on the latter. This choice allows us to pinpoint the motivation for the use of a particular detection technique, based on how the data normally looks like.…”
Section: Related Surveysmentioning
confidence: 99%