2010
DOI: 10.1049/iet-ifs.2009.0192
|View full text |Cite
|
Sign up to set email alerts
|

Outlier detection and countermeasure for hierarchical wireless sensor networks

Abstract: Outliers in wireless sensor networks (WSNs) are sensor nodes that issue attacks by abnormal behaviours and fake message dissemination. However, existing cryptographic techniques are hard to detect these inside attacks, which cause outlier recognition a critical and challenging issue for reliable and secure data dissemination in WSNs. To efficiently identify and isolate outliers, this study presents a novel outlier detection and countermeasure scheme (ODCS), which consists of three mechanisms: (i) abnormal even… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 39 publications
(15 citation statements)
references
References 23 publications
0
15
0
Order By: Relevance
“…However, most of them hardly sustain the Intrusion Detection . They are incapable of detecting whether “spy nodes” have been placed in a WSN topology.…”
Section: Related Workmentioning
confidence: 99%
“…However, most of them hardly sustain the Intrusion Detection . They are incapable of detecting whether “spy nodes” have been placed in a WSN topology.…”
Section: Related Workmentioning
confidence: 99%
“…Regarding nearest neighbour methods, they rely on particular metrics to compute distances among objects or samples with clear geometric interpretation, according to which a so-called outlier factor is calculated [10]. In clustering-based techniques [11] data sets are grouped into clusters consisting of similar attributes, being an object classified as an outlier when lying outside identified clusters. This kind of techniques is appealing in the sense that they do not require a priori knowledge of the data statistics, and can be used in an incremental model [4].…”
Section: Outliers Detection and Accommodationmentioning
confidence: 99%
“…Assume a random signal segment in Fig.1, where S(x) = (10,7,19,8,3,16,8,6,9,2,3,19,20,12,2) Step (a): Translating the original signal curve into step-function and calculate the entire subgraph area SG, then go to step (b).In this example, the subgraph area SG is 144. Fig.2 shows the original curve (the blue dot line) and its stepwise curve (the red line).…”
Section: Granulometric Size Distributionmentioning
confidence: 99%
“…However, most of them hardly sustain the Intrusion Detection [8] [9]. They are incapable of detecting whether the "spy nodes" have been placed in a WSN topology and they are unaware of which node and when the WSN topology has been intruded, which constrains the security of the entire WSN.…”
Section: Introductionmentioning
confidence: 99%