Mostrar el registro sencillo del ítem
dc.contributor.author | Das, Anjana P.![]() |
es_ES |
dc.contributor.author | Thampi, Sabu M.![]() |
es_ES |
dc.contributor.author | Lloret, Jaime![]() |
es_ES |
dc.date.accessioned | 2022-11-07T16:34:41Z | |
dc.date.available | 2022-11-07T16:34:41Z | |
dc.date.issued | 2020-02 | es_ES |
dc.identifier.uri | http://hdl.handle.net/10251/189361 | |
dc.description.abstract | [EN] Underwater acoustic sensor network (UASN) offers a promising solution for exploring underwater resources remotely. For getting a better understanding of sensed data, accurate localization is essential. As the UASN acoustic channel is open and the environment is hostile, the risk of malicious activities is very high, particularly in time-critical military applications. Since the location estimation with false data ends up in wrong positioning, it is necessary to identify and ignore such data to ensure data integrity. Therefore, in this paper, we propose a novel anomaly detection system for UASN localization. To minimize computational power and storage, we designed separate anomaly detection schemes for sensor nodes and anchor nodes. We propose an auto-regressive prediction-based scheme for detecting anomalies at sensor nodes. For anchor nodes, a fuzzy inference system is designed to identify the presence of anomalous behavior. The detection schemes are implemented at every node for enabling identification of multiple and duplicate anomalies at its origin. We simulated the network, modeled anomalies and analyzed the performance of detection schemes at anchor nodes and sensor nodes. The results indicate that anomaly detection systems offer an acceptable accuracy with high true positive rate and F-Score. | es_ES |
dc.language | Inglés | es_ES |
dc.publisher | Springer-Verlag | es_ES |
dc.relation.ispartof | Mobile Networks and Applications (Online) | es_ES |
dc.rights | Reserva de todos los derechos | es_ES |
dc.subject | Underwater sensor networks | es_ES |
dc.subject | Localization | es_ES |
dc.subject | Time series analysis | es_ES |
dc.subject | Anomaly detection | es_ES |
dc.subject | Fuzzy logic | es_ES |
dc.subject | Auto-regression | es_ES |
dc.title | Anomaly Detection in UASN Localization Based on Time Series Analysis and Fuzzy Logic | es_ES |
dc.type | Artículo | es_ES |
dc.identifier.doi | 10.1007/s11036-018-1192-y | es_ES |
dc.rights.accessRights | Abierto | es_ES |
dc.description.bibliographicCitation | Das, AP.; Thampi, SM.; Lloret, J. (2020). Anomaly Detection in UASN Localization Based on Time Series Analysis and Fuzzy Logic. Mobile Networks and Applications (Online). 25(1):55-67. https://doi.org/10.1007/s11036-018-1192-y | es_ES |
dc.description.accrualMethod | S | es_ES |
dc.relation.publisherversion | https://doi.org/10.1007/s11036-018-1192-y | es_ES |
dc.description.upvformatpinicio | 55 | es_ES |
dc.description.upvformatpfin | 67 | es_ES |
dc.type.version | info:eu-repo/semantics/publishedVersion | es_ES |
dc.description.volume | 25 | es_ES |
dc.description.issue | 1 | es_ES |
dc.identifier.eissn | 1572-8153 | es_ES |
dc.relation.pasarela | S\473140 | es_ES |
dc.description.references | Aqua-sim. [online] http://obinet.engr.uconn.edu/wiki/index.php/Aqua-Sim . (Accessed 5 November 2015) | es_ES |
dc.description.references | Anjum F, Pandey S, Agrawal P (2005) Secure localization in sensor networks using transmission range variation. In: 2005. IEEE international conference on Mobile adhoc and sensor systems conference. IEEE, pp 9 | es_ES |
dc.description.references | Ateniese G, Capossele A, Gjanci P, Petrioli C, Spaccini D (2015) Secfun: Security framework for underwater acoustic sensor networks. In: OCEANS 2015-Genova. IEEE, pp 1–9 | es_ES |
dc.description.references | Beniwal M, Singh RP, Sangwan A (2016) A localization scheme for underwater sensor networks without time synchronization. Wireless Personal Communications 88(3):537–552 | es_ES |
dc.description.references | Chen P, Ma H, Gao S, Huang Y (2015) Ssl: Signal similarity-based localization for ocean sensor networks. Sensors 15(11):29702–29720 | es_ES |
dc.description.references | Cong Y, Yang G, Wei Z, Zhou W (2010) Security in underwater sensor network. In: 2010 international conference on Communications and mobile computing (CMC). IEEE, vol 1, pp 162–168 | es_ES |
dc.description.references | Das AP, Thampi SM (2015) Secure communication in mobile underwater wireless sensor networks. In: Proceedings of the IEEE International Conference on Advances in Computing, Communications and Informatics, India, pp 2164–2173 | es_ES |
dc.description.references | Das AP, Thampi SM (2015) Single anchor node based localization in mobile underwater wireless sensor networks. In: Algorithms and architectures for parallel processing. Springer, pp 757– 770 | es_ES |
dc.description.references | Das AP, Thampi SM (2016) Fault-resilient localization for underwater sensor networks. Ad Hoc Networks | es_ES |
dc.description.references | Das AP, Thampi SM (2016) Simulation tools for underwater sensor networks: a survey. Netw Protocol Algorithm 8(4):41–55 | es_ES |
dc.description.references | Dini G, Duca AL (2011) Seflood: a secure network discovery protocol for underwater acoustic networks. In: 2011 IEEE symposium on Computers and communications (ISCC). IEEE, pp 636–638 | es_ES |
dc.description.references | Dini G, Lo Duca A (2012) A secure communication suite for underwater acoustic sensor networks. Sensors 12(11):15133–15158 | es_ES |
dc.description.references | Garcia M, Sendra S, Atenas M, Lloret J (2011) Underwater wireless ad-hoc networks: a survey. Mobile ad hoc networks: Current status and future trends 379–411 | es_ES |
dc.description.references | Gomez JV, Sandnes FE, Fernandez B (2012) Sunlight intensity based global positioning system for near-surface underwater sensors. Sensors 12(2):1930–1949 | es_ES |
dc.description.references | Han G, Jiang J, Shu L, Guizani M (2015) An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network. IEEE Trans Mob Comput 14(12):2447–2459 | es_ES |
dc.description.references | Han G, Jiang J, Shu L, Xu Y, Wang F (2012) Localization algorithms of underwater wireless sensor networks: a survey. Sensors 12(2):2026–2061 | es_ES |
dc.description.references | Jiang J, Han G, Zhu C, Dong Y, Zhang N (2011) Secure localization in wireless sensor networks: a survey. JCM 6(6):460–470 | es_ES |
dc.description.references | Kong J, Ji Z, Wang W, Gerla M, Bagrodia R, Bhargava B (2004) On wormhole attacks in under-water sensor networks: a two-tier localization approach. UCLA Computer Science Department Technical Report 4005 | es_ES |
dc.description.references | Kong J, Ji Z, Wang W, Gerla M, Bagrodia R, Bhargava B (2005) Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks. In: Proceedings of the 4th ACM workshop on Wireless security. ACM, pp 87–96 | es_ES |
dc.description.references | Liu J, Djurdjanovic D, Marko KA, Ni J (2009) A divide and conquer approach to anomaly detection, localization and diagnosis. Mech Syst Signal Process 23(8):2488–2499 | es_ES |
dc.description.references | Lloret J (2013) Underwater sensor nodes and networks. Sensors 13(9):11782–11796 | es_ES |
dc.description.references | Mamdani EH, Assilian S (1975) An experiment in linguistic synthesis with a fuzzy logic controller. Int J Man-Mach Stud 7(1):1–13 | es_ES |
dc.description.references | Mamun Q, Islam MR, Kaosar M (2014) Anomaly detection in wireless sensor network. JNW 9(11):2914–2924 | es_ES |
dc.description.references | Meiqin L, Xiaodong G, Senlin Z (2015) Localization based on best spatial correlation distance mobility prediction for underwater wireless sensor networks. In: 34Th chinese control conference, pp 7827–7832, Hangzhou | es_ES |
dc.description.references | Miorandi D, Sicari S, De Pellegrini F, Chlamtac I (2012) Internet of things: vision, applications and research challenges. Ad Hoc Netw 10(7):1497–1516 | es_ES |
dc.description.references | Mirza D, Schurgers C (2008) Energy-efficient ranging for post-facto self-localization in mobile underwater networks. IEEE J Sel Areas Commun 26(9):1697–1707 | es_ES |
dc.description.references | Ojha T, Misra S (2013) Mobil: a 3-dimensional localization scheme for mobile underwater sensor networks. In: Proceedings of the IEEE National Conference on Communications, pp1–5, New Delhi | es_ES |
dc.description.references | Onat I, Miri A (2005) A real-time node-based traffic anomaly detection algorithm for wireless sensor networks. In: Systems communications, 2005. misc. IEEE, pp 422–427 | es_ES |
dc.description.references | Park D, Kwak K, Kim J, Chung WK (2015) Underwater sensor network using received signal strength of electromagnetic waves. In: Proceedings of the IEEE International Conference on Intelligent Robots and Systems,Hamburg, Germany | es_ES |
dc.description.references | Pei G, Gerla M, Hong X, Chiang CC (1999) A wireless hierarchical routing protocol with group mobility. In: proceedings of the IEEE Wireless Communications and Networking Conference, pp 1538–1542, New Orleans | es_ES |
dc.description.references | Poovendran R, Wang C, Roy S (2007) Secure localization and time synchronization for wireless sensor and ad hoc networks, vol 30. Springer Science & Business Media, Berlin | es_ES |
dc.description.references | Qiu T, Chen N, Li K, Atiquzzaman M, Zhao W (2018) How can heterogeneous internet of things build our future: A survey. IEEE Communications Surveys & Tutorials | es_ES |
dc.description.references | Qiu T, Qiao R, Wu D (2018) Eabs: an event-aware backpressure scheduling scheme for emergency internet of things. IEEE Trans Mob Comput 17(1):72–84 | es_ES |
dc.description.references | Qiu T, Zhao A, Xia F, Si W, Wu D, Qiu T, Zhao A, Xia F, Si W, Wu D (2017) Rose: Robustness strategy for scale-free wireless sensor networks. IEEE/ACM Trans Netw (TON) 25(5):2944–2959 | es_ES |
dc.description.references | Rajasegarar S, Leckie C, Palaniswami M (2008) Anomaly detection in wireless sensor networks. IEEE Wireless Communications 15(4):34–40 | es_ES |
dc.description.references | Rajasegarar S, Leckie C, Palaniswami M, Bezdek JC (2006) Distributed anomaly detection in wireless sensor networks. In: 2006. ICCS 2006. 10th IEEE Singapore international conference on Communication systems. IEEE, pp 1–5 | es_ES |
dc.description.references | Rasmussen KB, Capkun S, Cagalj M (2007) Secnav: secure broadcast localization and time synchronization in wireless networks. In: Proceedings of the 13th annual ACM international conference on Mobile computing and networking. ACM, pp 310–313 | es_ES |
dc.description.references | da Silva APR, Martins MH, Rocha BP, Loureiro AA, Ruiz LB, Wong HC (2005) Decentralized intrusion detection in wireless sensor networks. In: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks. ACM, pp 16–23 | es_ES |
dc.description.references | Srinivasan A, Wu J (2007) A survey on secure localization in wireless sensor networks. Encyclopedia of Wireless and Mobile communications | es_ES |
dc.description.references | Tariq M, Latiff MSA, Ayaz M, Coulibaly Y, Wahid A (2016) Pressure sensor based reliable (psbr) routing protocol for underwater acoustic sensor networks. Ad Hoc Sensor Wirel Netw 32(3-4):175–196 | es_ES |
dc.description.references | Thurman HV, Trujillo AP, Abel DC, McConnell R (1999) Essentials of oceanography. Prentice Hall, Englewood Cliffs | es_ES |
dc.description.references | Wang W, Kong J, Bhargava B, Gerla M (2008) Visualisation of wormholes in underwater sensor networks: a distributed approach. Int J Secur Netw 3(1):10–23 | es_ES |
dc.description.references | Zhang R, Zhang Y (2010) Wormhole-resilient secure neighbor discovery in underwater acoustic networks. In: INFOCOM, 2010 Proceedings IEEE, pp 1–9. https://doi.org/10.1109/INFCOM.2010.5462093 | es_ES |
dc.description.references | Zhang S, Zhang Q, Liu M, Fan Z (2014) A top-down positioning scheme for underwater wireless sensor networks. Sci China Inf Sci 57(3):1–10 | es_ES |
dc.description.references | Zhang Y, Liu W, Fang Y, Wu D (2006) Secure localization and authentication in ultra-wideband sensor networks. IEEE J Sel Areas Commun 24(4):829–835 | es_ES |
dc.description.references | Zheng S, Baras JS (2011) Trust-assisted anomaly detection and localization in wireless sensor networks. In: 2011 8th annual IEEE communications society conference on Sensor, mesh and ad hoc communications and networks (SECON). IEEE, pp 386– 394 | es_ES |
dc.description.references | Zhou Z, Peng Z, Cui JH, Shi Z, Bagtzoglou A (2011) Scalable localization with mobility prediction for underwater sensor networks. IEEE Trans Mob Comput 10(3):335–348 | es_ES |