LOF: identifying density-based local outliers
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Efficient algorithms for mining outliers from large data sets
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Leader election algorithms for mobile ad hoc networks
DIALM '00 Proceedings of the 4th international workshop on Discrete algorithms and methods for mobile computing and communications
GPSR: greedy perimeter stateless routing for wireless networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
The Byzantine Generals Problem
ACM Transactions on Programming Languages and Systems (TOPLAS)
System architecture directions for networked sensors
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
Distance-based outliers: algorithms and applications
The VLDB Journal — The International Journal on Very Large Data Bases
Learning nonstationary models of normal network traffic for detecting novel attacks
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
TOSSIM: accurate and scalable simulation of entire TinyOS applications
Proceedings of the 1st international conference on Embedded networked sensor systems
ASCENT: Adaptive Self-Configuring sEnsor Networks Topologies
IEEE Transactions on Mobile Computing
Detecting outlying subspaces for high-dimensional data: the new task, algorithms, and performance
Knowledge and Information Systems
Detecting cuts in sensor networks
ACM Transactions on Sensor Networks (TOSN)
Hi-index | 0.00 |
Reliable network connectivity in wireless sensor networks (WSN) is difficult to achieve. Harsh, unattended, low-security environments and resource-constrained nodes exacerbate the problem. An ability to detect connectivity disruptions, due to either security or environmental problems, allows WSN to conserve power and memory while reducing network congestion. We propose RE2-CD, an integrated solution incorporating both robustness to attack and energy-efficiency. To enhance security, a robust outlier detection algorithm assists nodes in detecting a specific threat in their environment. To improve energy-efficiency, a cluster-based cut detection algorithm recognizes and reacts to disrupted connectivity. Extensive simulations across a range of network sizes and densities indicate that energy-efficiency can be improved by an order of magnitude in denser networks while malicious nodes are detected at deviations of 1% from expected behavior.