TITLE

A Robust Outlier Detection Scheme for Collaborative Sensor Networks

AUTHOR(S)
Jayashree, L. S.; Arumugam, S.; Vijayalakshmi, K.
PUB. DATE
February 2007
SOURCE
Journal of Digital Information Management;Feb2007, Vol. 5 Issue 1, p12
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
In-networks, Data Aggregation is usually warranted for distributed wireless sensor networks, owing to reliability and energy efficiency reasons. Sensor nodes are usually deployed in unattended and unsafe environments and hence are vulnerable to intentional or unintentional damages. Individual nodes are prone to different type of faults such as hardware faults, crash faults etc and other security vulnerabilities wherein one or more nodes are compromised to produce bogus data so as to confuse the rest of the network in collaborative sensing applications. The availability of constrained resources and the presence of faulty nodes make designing fault tolerant information aggregation mechanisms in large sensor networks particularly challenging. In our work, we consider Byzantine type of faults, which encompasses most of the common sensor node faults [9]. Faulty nodes are assumed to send inconsistent and arbitrary values to other nodes during information exchange process. These values are termed as outliers and we use a statistical test called Modified Z-score method to reliably detect and remove outliers. We show by simulation that the proposed strategy works well for 2 major classes of collaborative sensor network applications viz. (i) Target/Event detection and (ii) Continuous data gathering.
ACCESSION #
24821548

 

Related Articles

  • To secure your PC, arm yourself with security alerts from vendors and industry groups. Livingston, Brian // InfoWorld;08/09/99, Vol. 21 Issue 32, p40 

    Presents information on several resources that can keep a user informed about threats before they affect personal computers and networks. Information offered by the Security Notification Service of Microsoft Corp.; Question raised by the security bulletins that Microsoft published on its Web...

  • Comparative Study of 1-D Chaotic Generators for Digital Data Encryption. Awad, Abir; El Assad, Safwan; Wang Qianxue; Vladeanu, Călin; Bakhache, Bassem // IAENG International Journal of Computer Science;Dec2008, Vol. 35 Issue 4, p1 

    The security of transmitted digital information through a channel, against passive or active attacks, becomes more and more important. The use of a 1-D chaotic signal to mask useful information and to make it unrecognizable by an eavesdropper is a field of research in full expansion. In order to...

  • When network security is not enough. Boichat, Paul // SC Magazine: For IT Security Professionals (UK Edition);Mar/Apr2011, p38 

    The author discusses the importance of information rights management (IRM) in organisations. It discusses the use of a traditional security model which offers protection through firewalls, perimeters and network monitoring. It also discourages reliance on third parties to manage risks and...

  • A Model of Network Security with Prevention Capability by Using Decoy Technique. Tangwongsan, Supachi; Pangphuthipong, Labhidhorn // Proceedings of World Academy of Science: Engineering & Technolog;2007, Vol. 23, p184 

    This research work proposes a model of network security systems aiming to prevent production system in a data center from being attacked by intrusions. Conceptually, we introduce a decoy system as a part of the security system for luring intrusions, and apply network intrusion detection (NIDS),...

  • Key Management Schemes in Wireless Sensor Networks. Soundarya, P.; Varalakshmi, L. M. // International Journal of Computer Science Engineering & Technolo;Feb2011, Vol. 1 Issue 1, p62 

    Key establishment in sensor networks is a challenging problem because existing security schemes are unsuitable for use in resource constrained sensor nodes, and also because the nodes could be physically compromised by an adversary. In this paper two key establishment scheme are presented using...

  • Cover-Free Family based Efficient Group Key Management Strategy in Wireless Sensor Network. Li Xu; Jianwei Chen; Xiaoding Wang // Journal of Communications;Nov2008, Vol. 3 Issue 6, p51 

    Secure group key distribution and efficient rekeying is one of the most challenging security issues in sensor networks at present. In this paper, Latin square is firstly used to construct orthogonal arrays in order to obtain t-packing designs quickly. Based on cover-free family properties,...

  • Scoping Out Security Scanner Wares. Phillips, Ken // PC Week;01/25/99, Vol. 16 Issue 4, p59 

    Discusses how to choose a computer network security scanner. Where most network attacks originate; Preventing denial-of-service attacks; Companies that offer network-based scanners; Host-based scanners; How the types of threat detectors are chosen for implementation; Special purpose scanners.

  • SIEM City. Stephenson, Peter // SC Magazine: For IT Security Professionals (15476693);Apr2013, Vol. 24 Issue 4, p33 

    The article focuses on the evaluation of security information and event management (SIEM) tools. It notes that the cornerstone of event management is cyber situational awareness. Users are advised to make sure the SIEM device can take input from everything on the enterprise network from which...

  • DELIVERABLES.  // PM Network;Jan2006, Vol. 20 Issue 1, p18 

    The article presents statistics on a variety of topics including the percentage of small- and medium-sized business that are concerned with computer messaging security, the proportion of reported network problems and the percent of respondents who identified reasons for infrastructure modernization.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics