[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Anomaly Detection in UASN Localization Based on Time Series Analysis and Fuzzy Logic

Published: 01 February 2020 Publication History

Abstract

Underwater acoustic sensor network (UASN) offers a promising solution for exploring underwater resources remotely. For getting a better understanding of sensed data, accurate localization is essential. As the UASN acoustic channel is open and the environment is hostile, the risk of malicious activities is very high, particularly in time-critical military applications. Since the location estimation with false data ends up in wrong positioning, it is necessary to identify and ignore such data to ensure data integrity. Therefore, in this paper, we propose a novel anomaly detection system for UASN localization. To minimize computational power and storage, we designed separate anomaly detection schemes for sensor nodes and anchor nodes. We propose an auto-regressive prediction-based scheme for detecting anomalies at sensor nodes. For anchor nodes, a fuzzy inference system is designed to identify the presence of anomalous behavior. The detection schemes are implemented at every node for enabling identification of multiple and duplicate anomalies at its origin. We simulated the network, modeled anomalies and analyzed the performance of detection schemes at anchor nodes and sensor nodes. The results indicate that anomaly detection systems offer an acceptable accuracy with high true positive rate and F-Score.

References

[1]
Aqua-sim. [online] http://obinet.engr.uconn.edu/wiki/index.php/Aqua-Sim. (Accessed 5 November 2015)
[2]
Anjum F, Pandey S, Agrawal P (2005) Secure localization in sensor networks using transmission range variation. In: 2005. IEEE international conference on Mobile adhoc and sensor systems conference. IEEE, pp 9
[3]
Ateniese G, Capossele A, Gjanci P, Petrioli C, Spaccini D (2015) Secfun: Security framework for underwater acoustic sensor networks. In: OCEANS 2015-Genova. IEEE, pp 1–9
[4]
Beniwal M, Singh RP, and Sangwan A A localization scheme for underwater sensor networks without time synchronization Wireless Personal Communications 2016 88 3 537-552
[5]
Chen P, Ma H, Gao S, and Huang Y Ssl: Signal similarity-based localization for ocean sensor networks Sensors 2015 15 11 29702-29720
[6]
Cong Y, Yang G, Wei Z, Zhou W (2010) Security in underwater sensor network. In: 2010 international conference on Communications and mobile computing (CMC). IEEE, vol 1, pp 162–168
[7]
Das AP, Thampi SM (2015) Secure communication in mobile underwater wireless sensor networks. In: Proceedings of the IEEE International Conference on Advances in Computing, Communications and Informatics, India, pp 2164–2173
[8]
Das AP, Thampi SM (2015) Single anchor node based localization in mobile underwater wireless sensor networks. In: Algorithms and architectures for parallel processing. Springer, pp 757– 770
[9]
Das AP, Thampi SM (2016) Fault-resilient localization for underwater sensor networks. Ad Hoc Networks
[10]
Das AP and Thampi SM Simulation tools for underwater sensor networks: a survey Netw Protocol Algorithm 2016 8 4 41-55
[11]
Dini G, Duca AL (2011) Seflood: a secure network discovery protocol for underwater acoustic networks. In: 2011 IEEE symposium on Computers and communications (ISCC). IEEE, pp 636–638
[12]
Dini G and Lo Duca A A secure communication suite for underwater acoustic sensor networks Sensors 2012 12 11 15133-15158
[13]
Garcia M, Sendra S, Atenas M, Lloret J (2011) Underwater wireless ad-hoc networks: a survey. Mobile ad hoc networks: Current status and future trends 379–411
[14]
Gomez JV, Sandnes FE, and Fernandez B Sunlight intensity based global positioning system for near-surface underwater sensors Sensors 2012 12 2 1930-1949
[15]
Han G, Jiang J, Shu L, and Guizani M An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network IEEE Trans Mob Comput 2015 14 12 2447-2459
[16]
Han G, Jiang J, Shu L, Xu Y, and Wang F Localization algorithms of underwater wireless sensor networks: a survey Sensors 2012 12 2 2026-2061
[17]
Jiang J, Han G, Zhu C, Dong Y, and Zhang N Secure localization in wireless sensor networks: a survey JCM 2011 6 6 460-470
[18]
Kong J, Ji Z, Wang W, Gerla M, Bagrodia R, Bhargava B (2004) On wormhole attacks in under-water sensor networks: a two-tier localization approach. UCLA Computer Science Department Technical Report 4005
[19]
Kong J, Ji Z, Wang W, Gerla M, Bagrodia R, Bhargava B (2005) Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks. In: Proceedings of the 4th ACM workshop on Wireless security. ACM, pp 87–96
[20]
Liu J, Djurdjanovic D, Marko KA, and Ni J A divide and conquer approach to anomaly detection, localization and diagnosis Mech Syst Signal Process 2009 23 8 2488-2499
[21]
Lloret J Underwater sensor nodes and networks Sensors 2013 13 9 11782-11796
[22]
Mamdani EH and Assilian S An experiment in linguistic synthesis with a fuzzy logic controller Int J Man-Mach Stud 1975 7 1 1-13
[23]
Mamun Q, Islam MR, and Kaosar M Anomaly detection in wireless sensor network JNW 2014 9 11 2914-2924
[24]
Meiqin L, Xiaodong G, Senlin Z (2015) Localization based on best spatial correlation distance mobility prediction for underwater wireless sensor networks. In: 34Th chinese control conference, pp 7827–7832, Hangzhou
[25]
Miorandi D, Sicari S, De Pellegrini F, and Chlamtac I Internet of things: vision, applications and research challenges Ad Hoc Netw 2012 10 7 1497-1516
[26]
Mirza D and Schurgers C Energy-efficient ranging for post-facto self-localization in mobile underwater networks IEEE J Sel Areas Commun 2008 26 9 1697-1707
[27]
Ojha T, Misra S (2013) Mobil: a 3-dimensional localization scheme for mobile underwater sensor networks. In: Proceedings of the IEEE National Conference on Communications, pp1–5, New Delhi
[28]
Onat I, Miri A (2005) A real-time node-based traffic anomaly detection algorithm for wireless sensor networks. In: Systems communications, 2005. misc. IEEE, pp 422–427
[29]
Park D, Kwak K, Kim J, Chung WK (2015) Underwater sensor network using received signal strength of electromagnetic waves. In: Proceedings of the IEEE International Conference on Intelligent Robots and Systems,Hamburg, Germany
[30]
Pei G, Gerla M, Hong X, Chiang CC (1999) A wireless hierarchical routing protocol with group mobility. In: proceedings of the IEEE Wireless Communications and Networking Conference, pp 1538–1542, New Orleans
[31]
Poovendran R, Wang C, and Roy S Secure localization and time synchronization for wireless sensor and ad hoc networks, vol 30 2007 Berlin Springer Science & Business Media
[32]
Qiu T, Chen N, Li K, Atiquzzaman M, Zhao W (2018) How can heterogeneous internet of things build our future: A survey. IEEE Communications Surveys & Tutorials
[33]
Qiu T, Qiao R, and Wu D Eabs: an event-aware backpressure scheduling scheme for emergency internet of things IEEE Trans Mob Comput 2018 17 1 72-84
[34]
Qiu T, Zhao A, Xia F, Si W, Wu D, Qiu T, Zhao A, Xia F, Si W, and Wu D Rose: Robustness strategy for scale-free wireless sensor networks IEEE/ACM Trans Netw (TON) 2017 25 5 2944-2959
[35]
Rajasegarar S, Leckie C, and Palaniswami M Anomaly detection in wireless sensor networks IEEE Wireless Communications 2008 15 4 34-40
[36]
Rajasegarar S, Leckie C, Palaniswami M, Bezdek JC (2006) Distributed anomaly detection in wireless sensor networks. In: 2006. ICCS 2006. 10th IEEE Singapore international conference on Communication systems. IEEE, pp 1–5
[37]
Rasmussen KB, Capkun S, Cagalj M (2007) Secnav: secure broadcast localization and time synchronization in wireless networks. In: Proceedings of the 13th annual ACM international conference on Mobile computing and networking. ACM, pp 310–313
[38]
da Silva APR, Martins MH, Rocha BP, Loureiro AA, Ruiz LB, Wong HC (2005) Decentralized intrusion detection in wireless sensor networks. In: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks. ACM, pp 16–23
[39]
Srinivasan A, Wu J (2007) A survey on secure localization in wireless sensor networks. Encyclopedia of Wireless and Mobile communications
[40]
Tariq M, Latiff MSA, Ayaz M, Coulibaly Y, and Wahid A Pressure sensor based reliable (psbr) routing protocol for underwater acoustic sensor networks Ad Hoc Sensor Wirel Netw 2016 32 3-4 175-196
[41]
Thurman HV, Trujillo AP, Abel DC, and McConnell R Essentials of oceanography 1999 Englewood Cliffs Prentice Hall
[42]
Wang W, Kong J, Bhargava B, and Gerla M Visualisation of wormholes in underwater sensor networks: a distributed approach Int J Secur Netw 2008 3 1 10-23
[43]
Zhang R, Zhang Y (2010) Wormhole-resilient secure neighbor discovery in underwater acoustic networks. In: INFOCOM, 2010 Proceedings IEEE, pp 1–9. 10.1109/INFCOM.2010.5462093
[44]
Zhang S, Zhang Q, Liu M, and Fan Z A top-down positioning scheme for underwater wireless sensor networks Sci China Inf Sci 2014 57 3 1-10
[45]
Zhang Y, Liu W, Fang Y, and Wu D Secure localization and authentication in ultra-wideband sensor networks IEEE J Sel Areas Commun 2006 24 4 829-835
[46]
Zheng S, Baras JS (2011) Trust-assisted anomaly detection and localization in wireless sensor networks. In: 2011 8th annual IEEE communications society conference on Sensor, mesh and ad hoc communications and networks (SECON). IEEE, pp 386– 394
[47]
Zhou Z, Peng Z, Cui JH, Shi Z, and Bagtzoglou A Scalable localization with mobility prediction for underwater sensor networks IEEE Trans Mob Comput 2011 10 3 335-348

Cited By

View all

Index Terms

  1. Anomaly Detection in UASN Localization Based on Time Series Analysis and Fuzzy Logic
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Mobile Networks and Applications
      Mobile Networks and Applications  Volume 25, Issue 1
      Feb 2020
      364 pages

      Publisher

      Springer-Verlag

      Berlin, Heidelberg

      Publication History

      Published: 01 February 2020

      Author Tags

      1. Underwater sensor networks
      2. Localization
      3. Time series analysis
      4. Anomaly detection
      5. Fuzzy logic
      6. Auto-regression

      Qualifiers

      • Research-article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 03 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all

      View Options

      View options

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media