Skip to main content

Sequential Anomaly Detection Using Wireless Sensor Networks in Unknown Environment

  • Chapter
  • First Online:
  • 826 Accesses

Abstract

Anomaly detection is an important problem for environment, fault diagnosis and intruder detection in Wireless Sensor Networks (WSNs). A key challenge is to minimize the communication overhead and energy consumption in the network when identifying these abnormal events. We present a machine learning (ML) framework that is suitable for WSNs to sequentially detect sensory level anomalies and time-related anomalies in an unknown environment. Our system consists of a set of modular, unsupervised, machine learning algorithms that are adaptive. The modularity of the ML algorithms to maximize the use of resource constrains sensor nodes in different environmental monitoring tasks without reprogramming. The developed ML framework consists of the following modular components. First, an unsupervised neural network is used to map multi-dimensional sensor data into discrete environmental states/classes and detect sensor level anomalies. Over time, the labeled classes form a sequence of environmental states. Next, we use a variable length Markov model in the form of a Probabilistic Suffix Tree (PST) to model the relationship between temporal events. Depending on the types of applications, high order Markov models can be expensive. We use a symbol compression technique to bring down the cost of PST models by extracting the semantic meaning out of temporal sequences. Lastly, we use a likelihood-ratio test to verify whether there are anomalous events. We demonstrate the efficiency our approach by applying it in two real-world applications: volcano monitoring and traffic monitoring applications. Our experimental results show that the developed approach yields high performances based on different benchmarks compared to traditional fixed length Markov models.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Dongbing G (2011) A game theory approach to target tracking in sensor networks. IEEE Trans Syst Man Cybern Part B Cybern 41(1):2–13

    Google Scholar 

  2. Janakiram D, Reddy VA, Kumar AVUP (2006) Outlier detection in wireless sensor networks using Bayesian belief networks. In: First international conference on communication system software and middleware, pp 1–6

    Google Scholar 

  3. Kulakov A, Davcev D (2005) Tracking of unusual events in wireless sensor networks based on artificial neural-network algorithms. Inf Technol Coding Comput (ITCC) 2:534–539

    Article  Google Scholar 

  4. Kwon J, Chen C, Varaiya P (2004) Statistical methods for detecting spatial configuration errors in traffic surveillance sensors. Transp Res Record J Transp Res Board 1870(-1):124–132

    Google Scholar 

  5. Tsai H, Yang D, Peng W, Chen M (2007) Exploring group moving pattern for an energy-constrained object tracking sensor network. In: Pacific-Asia conference on knowledge discovery and data mining, Nanjing, May 2007. Springer, pp 825–832

    Google Scholar 

  6. Tulone D, Madden S (2006) PAQ: Time series forecasting for approximate query answering in sensor networks. In: The 3rd European workshop on wireless sensor networks (EWSN), ETH Zurich, vol 3868, Feb 2006. Springer, pp 21–37

    Google Scholar 

  7. Wang X, Ma J-J, Wang S, Bi D-W (2007) Time series forecasting energy-efficient organization of wireless sensor networks. Sensors 7:1766–1792

    Article  Google Scholar 

  8. Wang X, Wang S, Bi D (2009) Distributed visual-target-surveillance system in wireless sensor networks. IEEE Trans Syst Man Cybern B Cybern 39(5):1134–1146

    Google Scholar 

  9. Werner-Allen G, Lorincz K, Johnson J, Lees J, Welsh M (2006)  Fidelity and yield in a volcano monitoring sensor network. In: Proceedings of the 7th symposium on operating systems design and implementation (OSDI), Berkeley, Nov 2006. USENIX  Association, pp 381–396

    Google Scholar 

  10. Heinzelman W, Chandrakasan A, Balakrishnan H (2000) Energy-efficient communication protocols for wireless microsensor networks. In: International conference on system sciences, Maui

    Google Scholar 

  11. Li Y, Parker LE (2008) Detecting and monitoring time-related abnormal events using a wireless sensor network and mobile robot. In: IEEE/RSJ 2008 international conference on intelligent robots and systems (IROS), Nice, Sept 2008

    Google Scholar 

  12. Li YY, Thomason M, Parker LE (2010) Detecting time-related changes in wireless sensor networks using symbol compression and probabilistic suffix trees. In: IEEE/RSJ 2008 international conference on intelligent robots and systems (IROS), Taipei, Oct 2010

    Google Scholar 

  13. Jain A, Chang EY, Wang Y-F (2004) Adaptive stream management using Kalman filters. In: Proceedings of the 2004 ACM SIGMOD international conference on management of data, Paris. ACM, pp 11–22

    Google Scholar 

  14. Wang A, Krishnamurthy Vikram (2008) Signal interpretation of multifunction radars: modeling and statistical signal processing with stochastic context free grammar. IEEE Trans Signal Process 56(3):1106–1119

    Article  MathSciNet  Google Scholar 

  15. Liang Y-M, Shih S-W, Shih AC-C, Liao H-YM, Lin C-C (2009) Learning atomic human actions using variable-length markov models. IEEE Trans Syst Man Cybern B Cybern 39(1):268–280

    Google Scholar 

  16. Mazeroff G, Gregor J, Thomason M, Ford R (2008) Probabilistic suffix models for api sequence analysis of windows xp applications. Pattern Recognit 41(1):90–101

    Article  MATH  Google Scholar 

  17. Dana R, Yoram S, Naftali T (1996) The power of amnesia: learning probabilistic automata with variable memory length. Mach Learn 25(2–3):117–149

    MATH  Google Scholar 

  18. Apostolico A, Bejerano G (2000) Optimal amnesic probabilistic automata or how to learn and classify proteins in linear time and space. In: Proceedings of the fourth annual international conference on computational molecular biology, Tokyo. ACM, pp 25–32

    Google Scholar 

  19. Lin J, Keogh E, Lonardi S, Lankford JP, Nystrom DM (2004) Visually mining and monitoring massive time series. In: Proceedings of the 10th ACM international conference on Knowledge discovery and data mining. ACM, pp 460–469

    Google Scholar 

  20. Begleiter R, Yona G (2004) On prediction using variable order markov models. J Artif Intell Res 22:385–421

    MATH  MathSciNet  Google Scholar 

  21. Li Y, Parker LE (2008) A spatial-temporal imputation technique for classification with missing data in a wireless sensor network. In: IEEE/RSJ 2008 international conference on intelligent robots and systems (IROS), Nice, Sept 2008

    Google Scholar 

  22. Li Y, Parker LE (2014) Nearest neighbor imputation using spatialtemporal correlations in wireless sensor networks. Inf Fusion 15:64–79

    Google Scholar 

  23. Sayood K (2000) Introduction to data compression. Morgan Kaufmann, San Mateo

    Google Scholar 

  24. Reynolds DA, Quatieri TF, Dunn RB (2000) Speaker verification using adapted gaussian mixture models. Dig Signal Process 10:19–41

    Google Scholar 

  25. Caltrans performance measurement system (pems) (2010) http://pems.dot.ca.gov/

  26. Claudel CG, Nahoum M, Bayen AM (2009) Minimal error certificates for detection of faulty sensors using convex optimization. In: Proceedings of the 47th annual Allerton conference on communication, control, and computing, Piscataway. IEEE Press, pp 1177–1186

    Google Scholar 

  27. Varaiya P (2005) What we’ve learned about highway congestion. Access 27:2–10

    Google Scholar 

  28. Hoh B, Gruteser M, Herring R, Ban J, Work D, Herrera J-C, Bayen AM, Annavaram M, Jacobson Q (2008) Virtual trip lines for distributed privacy-preserving traffic monitoring. In: Proceeding of the 6th international conference on mobile systems, applications, and services, MobiSys’08, New York, ACM, pp 15–28

    Google Scholar 

  29. Jia Z, Chen C, Coifman B, Varaiya P (2001) The pems algorithms for accurate, real-time estimates of g-factors and speeds from single-loop detectors. In: Proceedings of the IEEE ITS council annual meeting, Oakland, Aug 2001, pp 536–541

    Google Scholar 

  30. Kwon J, Varaiya P, Skabardonis A (1856) Estimation of truck traffic volume from single loop detectors with lane-to-lane speed correlation. Transp Res Record J Transp Res Board 106–117:2003

    Google Scholar 

  31. Murphy K (2012) machine learning: a probabilistic perspective, in preparation, to be published by MIT Press

    Google Scholar 

Download references

Acknowledgments

We sincerely thank Dr. Matt Welsh, of Harvard University, who made the Reventador data from Volcano Tingurahua available to us. We also thank Dr. Nicholas Compin and Jane Berner, of California Department of Transportation, who made the PeMS data available to us.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuanyuan Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Li, Y., Thomason, M., Parker, L.E. (2014). Sequential Anomaly Detection Using Wireless Sensor Networks in Unknown Environment. In: Spagnolo, P., Mazzeo, P., Distante, C. (eds) Human Behavior Understanding in Networked Sensing. Springer, Cham. https://doi.org/10.1007/978-3-319-10807-0_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-10807-0_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-10806-3

  • Online ISBN: 978-3-319-10807-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics