- -

Anomaly Detection in UASN Localization Based on Time Series Analysis and Fuzzy Logic

RiuNet: Repositorio Institucional de la Universidad Politécnica de Valencia

Compartir/Enviar a

Citas

Estadísticas

  • Estadisticas de Uso

Anomaly Detection in UASN Localization Based on Time Series Analysis and Fuzzy Logic

Mostrar el registro completo del ítem

Das, AP.; Thampi, SM.; Lloret, J. (2020). Anomaly Detection in UASN Localization Based on Time Series Analysis and Fuzzy Logic. Mobile Networks and Applications (Online). 25(1):55-67. https://doi.org/10.1007/s11036-018-1192-y

Por favor, use este identificador para citar o enlazar este ítem: http://hdl.handle.net/10251/189361

Ficheros en el ítem

Metadatos del ítem

Título: Anomaly Detection in UASN Localization Based on Time Series Analysis and Fuzzy Logic
Autor: Das, Anjana P. Thampi, Sabu M. Lloret, Jaime
Fecha difusión:
Resumen:
[EN] Underwater acoustic sensor network (UASN) offers a promising solution for exploring underwater resources remotely. For getting a better understanding of sensed data, accurate localization is essential. As the UASN ...[+]
Palabras clave: Underwater sensor networks , Localization , Time series analysis , Anomaly detection , Fuzzy logic , Auto-regression
Derechos de uso: Reserva de todos los derechos
Fuente:
Mobile Networks and Applications (Online). (eissn: 1572-8153 )
DOI: 10.1007/s11036-018-1192-y
Editorial:
Springer-Verlag
Versión del editor: https://doi.org/10.1007/s11036-018-1192-y
Tipo: Artículo

References

Aqua-sim. [online] http://obinet.engr.uconn.edu/wiki/index.php/Aqua-Sim . (Accessed 5 November 2015)

Anjum F, Pandey S, Agrawal P (2005) Secure localization in sensor networks using transmission range variation. In: 2005. IEEE international conference on Mobile adhoc and sensor systems conference. IEEE, pp 9

Ateniese G, Capossele A, Gjanci P, Petrioli C, Spaccini D (2015) Secfun: Security framework for underwater acoustic sensor networks. In: OCEANS 2015-Genova. IEEE, pp 1–9 [+]
Aqua-sim. [online] http://obinet.engr.uconn.edu/wiki/index.php/Aqua-Sim . (Accessed 5 November 2015)

Anjum F, Pandey S, Agrawal P (2005) Secure localization in sensor networks using transmission range variation. In: 2005. IEEE international conference on Mobile adhoc and sensor systems conference. IEEE, pp 9

Ateniese G, Capossele A, Gjanci P, Petrioli C, Spaccini D (2015) Secfun: Security framework for underwater acoustic sensor networks. In: OCEANS 2015-Genova. IEEE, pp 1–9

Beniwal M, Singh RP, Sangwan A (2016) A localization scheme for underwater sensor networks without time synchronization. Wireless Personal Communications 88(3):537–552

Chen P, Ma H, Gao S, Huang Y (2015) Ssl: Signal similarity-based localization for ocean sensor networks. Sensors 15(11):29702–29720

Cong Y, Yang G, Wei Z, Zhou W (2010) Security in underwater sensor network. In: 2010 international conference on Communications and mobile computing (CMC). IEEE, vol 1, pp 162–168

Das AP, Thampi SM (2015) Secure communication in mobile underwater wireless sensor networks. In: Proceedings of the IEEE International Conference on Advances in Computing, Communications and Informatics, India, pp 2164–2173

Das AP, Thampi SM (2015) Single anchor node based localization in mobile underwater wireless sensor networks. In: Algorithms and architectures for parallel processing. Springer, pp 757– 770

Das AP, Thampi SM (2016) Fault-resilient localization for underwater sensor networks. Ad Hoc Networks

Das AP, Thampi SM (2016) Simulation tools for underwater sensor networks: a survey. Netw Protocol Algorithm 8(4):41–55

Dini G, Duca AL (2011) Seflood: a secure network discovery protocol for underwater acoustic networks. In: 2011 IEEE symposium on Computers and communications (ISCC). IEEE, pp 636–638

Dini G, Lo Duca A (2012) A secure communication suite for underwater acoustic sensor networks. Sensors 12(11):15133–15158

Garcia M, Sendra S, Atenas M, Lloret J (2011) Underwater wireless ad-hoc networks: a survey. Mobile ad hoc networks: Current status and future trends 379–411

Gomez JV, Sandnes FE, Fernandez B (2012) Sunlight intensity based global positioning system for near-surface underwater sensors. Sensors 12(2):1930–1949

Han G, Jiang J, Shu L, Guizani M (2015) An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network. IEEE Trans Mob Comput 14(12):2447–2459

Han G, Jiang J, Shu L, Xu Y, Wang F (2012) Localization algorithms of underwater wireless sensor networks: a survey. Sensors 12(2):2026–2061

Jiang J, Han G, Zhu C, Dong Y, Zhang N (2011) Secure localization in wireless sensor networks: a survey. JCM 6(6):460–470

Kong J, Ji Z, Wang W, Gerla M, Bagrodia R, Bhargava B (2004) On wormhole attacks in under-water sensor networks: a two-tier localization approach. UCLA Computer Science Department Technical Report 4005

Kong J, Ji Z, Wang W, Gerla M, Bagrodia R, Bhargava B (2005) Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks. In: Proceedings of the 4th ACM workshop on Wireless security. ACM, pp 87–96

Liu J, Djurdjanovic D, Marko KA, Ni J (2009) A divide and conquer approach to anomaly detection, localization and diagnosis. Mech Syst Signal Process 23(8):2488–2499

Lloret J (2013) Underwater sensor nodes and networks. Sensors 13(9):11782–11796

Mamdani EH, Assilian S (1975) An experiment in linguistic synthesis with a fuzzy logic controller. Int J Man-Mach Stud 7(1):1–13

Mamun Q, Islam MR, Kaosar M (2014) Anomaly detection in wireless sensor network. JNW 9(11):2914–2924

Meiqin L, Xiaodong G, Senlin Z (2015) Localization based on best spatial correlation distance mobility prediction for underwater wireless sensor networks. In: 34Th chinese control conference, pp 7827–7832, Hangzhou

Miorandi D, Sicari S, De Pellegrini F, Chlamtac I (2012) Internet of things: vision, applications and research challenges. Ad Hoc Netw 10(7):1497–1516

Mirza D, Schurgers C (2008) Energy-efficient ranging for post-facto self-localization in mobile underwater networks. IEEE J Sel Areas Commun 26(9):1697–1707

Ojha T, Misra S (2013) Mobil: a 3-dimensional localization scheme for mobile underwater sensor networks. In: Proceedings of the IEEE National Conference on Communications, pp1–5, New Delhi

Onat I, Miri A (2005) A real-time node-based traffic anomaly detection algorithm for wireless sensor networks. In: Systems communications, 2005. misc. IEEE, pp 422–427

Park D, Kwak K, Kim J, Chung WK (2015) Underwater sensor network using received signal strength of electromagnetic waves. In: Proceedings of the IEEE International Conference on Intelligent Robots and Systems,Hamburg, Germany

Pei G, Gerla M, Hong X, Chiang CC (1999) A wireless hierarchical routing protocol with group mobility. In: proceedings of the IEEE Wireless Communications and Networking Conference, pp 1538–1542, New Orleans

Poovendran R, Wang C, Roy S (2007) Secure localization and time synchronization for wireless sensor and ad hoc networks, vol 30. Springer Science & Business Media, Berlin

Qiu T, Chen N, Li K, Atiquzzaman M, Zhao W (2018) How can heterogeneous internet of things build our future: A survey. IEEE Communications Surveys & Tutorials

Qiu T, Qiao R, Wu D (2018) Eabs: an event-aware backpressure scheduling scheme for emergency internet of things. IEEE Trans Mob Comput 17(1):72–84

Qiu T, Zhao A, Xia F, Si W, Wu D, Qiu T, Zhao A, Xia F, Si W, Wu D (2017) Rose: Robustness strategy for scale-free wireless sensor networks. IEEE/ACM Trans Netw (TON) 25(5):2944–2959

Rajasegarar S, Leckie C, Palaniswami M (2008) Anomaly detection in wireless sensor networks. IEEE Wireless Communications 15(4):34–40

Rajasegarar S, Leckie C, Palaniswami M, Bezdek JC (2006) Distributed anomaly detection in wireless sensor networks. In: 2006. ICCS 2006. 10th IEEE Singapore international conference on Communication systems. IEEE, pp 1–5

Rasmussen KB, Capkun S, Cagalj M (2007) Secnav: secure broadcast localization and time synchronization in wireless networks. In: Proceedings of the 13th annual ACM international conference on Mobile computing and networking. ACM, pp 310–313

da Silva APR, Martins MH, Rocha BP, Loureiro AA, Ruiz LB, Wong HC (2005) Decentralized intrusion detection in wireless sensor networks. In: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks. ACM, pp 16–23

Srinivasan A, Wu J (2007) A survey on secure localization in wireless sensor networks. Encyclopedia of Wireless and Mobile communications

Tariq M, Latiff MSA, Ayaz M, Coulibaly Y, Wahid A (2016) Pressure sensor based reliable (psbr) routing protocol for underwater acoustic sensor networks. Ad Hoc Sensor Wirel Netw 32(3-4):175–196

Thurman HV, Trujillo AP, Abel DC, McConnell R (1999) Essentials of oceanography. Prentice Hall, Englewood Cliffs

Wang W, Kong J, Bhargava B, Gerla M (2008) Visualisation of wormholes in underwater sensor networks: a distributed approach. Int J Secur Netw 3(1):10–23

Zhang R, Zhang Y (2010) Wormhole-resilient secure neighbor discovery in underwater acoustic networks. In: INFOCOM, 2010 Proceedings IEEE, pp 1–9. https://doi.org/10.1109/INFCOM.2010.5462093

Zhang S, Zhang Q, Liu M, Fan Z (2014) A top-down positioning scheme for underwater wireless sensor networks. Sci China Inf Sci 57(3):1–10

Zhang Y, Liu W, Fang Y, Wu D (2006) Secure localization and authentication in ultra-wideband sensor networks. IEEE J Sel Areas Commun 24(4):829–835

Zheng S, Baras JS (2011) Trust-assisted anomaly detection and localization in wireless sensor networks. In: 2011 8th annual IEEE communications society conference on Sensor, mesh and ad hoc communications and networks (SECON). IEEE, pp 386– 394

Zhou Z, Peng Z, Cui JH, Shi Z, Bagtzoglou A (2011) Scalable localization with mobility prediction for underwater sensor networks. IEEE Trans Mob Comput 10(3):335–348

[-]

recommendations

 

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro completo del ítem