Wireless integrated network sensors
Communications of the ACM
Distributed clustering using collective principal component analysis
Knowledge and Information Systems
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Security in embedded systems: Design challenges
ACM Transactions on Embedded Computing Systems (TECS)
Multiresolution storage and search in sensor networks
ACM Transactions on Storage (TOS)
Decentralized intrusion detection in wireless sensor networks
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Journal of Parallel and Distributed Computing - Special issue: Algorithms for wireless and ad-hoc networks
The role of Wireless Sensor Networks in the area of Critical Information Infrastructure Protection
Information Security Tech. Report
Decentralized key generation scheme for cellular-based heterogeneous wireless ad hoc networks
Journal of Parallel and Distributed Computing
Link scheduling in wireless sensor networks: Distributed edge-coloring revisited
Journal of Parallel and Distributed Computing
Energy efficient and QoS based routing protocol for wireless sensor networks
Journal of Parallel and Distributed Computing
Private key agreement and secure communication for heterogeneous sensor networks
Journal of Parallel and Distributed Computing
Energy-efficient cooperative data aggregation for wireless sensor networks
Journal of Parallel and Distributed Computing
Anomaly detection in wireless sensor networks: A survey
Journal of Network and Computer Applications
Secure routing in sensor networks: security problem analysis and countermeasures
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
Distributed EM algorithms for density estimation and clustering in sensor networks
IEEE Transactions on Signal Processing
Outlier Detection Techniques for Wireless Sensor Networks: A Survey
IEEE Communications Surveys & Tutorials
A survey of security issues in mobile ad hoc and sensor networks
IEEE Communications Surveys & Tutorials
Designing secure sensor networks
IEEE Wireless Communications
The capacity of wireless networks
IEEE Transactions on Information Theory
Hi-index | 0.00 |
Modern infrastructure increasingly depends on large computerized systems for their reliable operation. Supervisory Control and Data Acquisition (SCADA) systems are being deployed to monitor and control large scale distributed infrastructures (e.g. power plants, water distribution systems). A recent trend is to incorporate Wireless Sensor Networks (WSNs) to sense and gather data. However, due to the broadcast nature of the network and inherent limitations in the sensor nodes themselves, they are vulnerable to different types of security attacks. Given the critical aspects of the underlying infrastructure it is an extremely important research challenge to provide effective methods to detect malicious activities on these networks. This paper proposes a robust and scalable mechanism that aims to detect malicious anomalies accurately and efficiently using distributed in-network processing in a hierarchical framework. Unsupervised data partitioning is performed distributively adapting fuzzy c-means clustering in an incremental model. Non-parametric and non-probabilistic anomaly detection is performed through fuzzy membership evaluations and thresholds on observed inter-cluster distances. Robust thresholds are determined adaptively using second order statistical knowledge at each evaluation stage. Extensive experiments were performed and the results demonstrate that the proposed framework achieves high detection accuracy compared to existing data clustering approaches with more than 96% less communication overheads opposed to a centralized approach.