{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:27:51Z","timestamp":1755998871046,"version":"3.41.0"},"reference-count":51,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2009,12,1]],"date-time":"2009-12-01T00:00:00Z","timestamp":1259625600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2009,12]]},"abstract":"<jats:p>Anomalies in wireless sensor networks can occur due to malicious attacks, faulty sensors, changes in the observed external phenomena, or errors in communication. Defining and detecting these interesting events in energy-constrained situations is an important task in managing these types of networks. A key challenge is how to detect anomalies with few false alarms while preserving the limited energy in the network. In this article, we define different types of anomalies that occur in wireless sensor networks and provide formal models for them. We illustrate the model using statistical parameters on a dataset gathered from a real wireless sensor network deployment at the Intel Berkeley Research Laboratory. Our experiments with a novel distributed anomaly detection algorithm show that it can detect elliptical anomalies with exactly the same accuracy as that of a centralized scheme, while achieving a significant reduction in energy consumption in the network. Finally, we demonstrate that our model compares favorably to four other well-known schemes on four datasets.<\/jats:p>","DOI":"10.1145\/1653760.1653767","type":"journal-article","created":{"date-parts":[[2010,1,5]],"date-time":"2010-01-05T15:05:08Z","timestamp":1262703908000},"page":"1-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":52,"title":["Elliptical anomalies in wireless sensor networks"],"prefix":"10.1145","volume":"6","author":[{"given":"Sutharshan","family":"Rajasegarar","sequence":"first","affiliation":[{"name":"The University of Melbourne, Australia"}]},{"given":"James C.","family":"Bezdek","sequence":"additional","affiliation":[{"name":"The University of Melbourne, Australia"}]},{"given":"Christopher","family":"Leckie","sequence":"additional","affiliation":[{"name":"The University of Melbourne, Australia"}]},{"given":"Marimuthu","family":"Palaniswami","sequence":"additional","affiliation":[{"name":"The University of Melbourne, Australia"}]}],"member":"320","published-online":{"date-parts":[[2010,1,5]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"key":"e_1_2_1_2_1","unstructured":"Barnett V. and Lewis T. 1994. Outliers in Statistical Data 3rd Ed. John Wiley and Sons.  Barnett V. and Lewis T. 1994. Outliers in Statistical Data 3rd Ed. John Wiley and Sons."},{"volume-title":"Proceedings of the 3rd IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS). 223--239","author":"Bettencourt L. M. A.","key":"e_1_2_1_3_1"},{"key":"e_1_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Bezdek J. C. Pal M. R. Keller J. and Krisnapuram R. 1999. Fuzzy Models and Algorithms for Pattern Recognition and Image Processing. Kluwer Academic Publishers Norwell MA.   Bezdek J. C. Pal M. R. Keller J. and Krisnapuram R. 1999. Fuzzy Models and Algorithms for Pattern Recognition and Image Processing. Kluwer Academic Publishers Norwell MA.","DOI":"10.1007\/b106267"},{"volume-title":"Proceedings of the International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP). 657--662","author":"Bondarenko O.","key":"e_1_2_1_5_1"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.49"},{"volume-title":"Proceedings of the 2nd European Workshop on Wireless Sensor Networks. 133--144","author":"Buonadonna P.","key":"e_1_2_1_7_1"},{"key":"e_1_2_1_8_1","unstructured":"CC2420-Web. 2008. http:\/\/focus.ti.com\/lit\/ds\/symlink\/cc2420.pdf.  CC2420-Web. 2008. http:\/\/focus.ti.com\/lit\/ds\/symlink\/cc2420.pdf."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2007.894147"},{"key":"e_1_2_1_10_1","unstructured":"Chohan N. 2007. Hardware assisted compression in wireless sensor networks. www.cs.ucsb.edu\/~nchohan\/docs\/hadcwsnProgressReport.pdf.  Chohan N. 2007. Hardware assisted compression in wireless sensor networks. www.cs.ucsb.edu\/~nchohan\/docs\/hadcwsnProgressReport.pdf."},{"key":"e_1_2_1_11_1","unstructured":"Crossbow-Web. 2008. http:\/\/www.xbow.com\/Products\/productdetails.aspx?sid=156.  Crossbow-Web. 2008. http:\/\/www.xbow.com\/Products\/productdetails.aspx?sid=156."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/91.580801"},{"volume-title":"Proceedings of the 2nd Biennial Conference on Innovative Data Systems Research (CIDR). 317--328","author":"Deshpande A.","key":"e_1_2_1_13_1"},{"key":"e_1_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Drozda M. Schaust S. and Szczerbicka. H. 2007a. Is AIS based misbehavior detection suitable for wireless sensor networks&quest; In Proceedings of the IEEE Wireless Communications and Networking Conference.  Drozda M. Schaust S. and Szczerbicka. H. 2007a. Is AIS based misbehavior detection suitable for wireless sensor networks&quest; In Proceedings of the IEEE Wireless Communications and Networking Conference.","DOI":"10.1109\/WCNC.2007.578"},{"volume-title":"Proceedings of the IEEE Congress on Evolutionary Computation (CEC). 3719--3726","author":"Drozda M.","key":"e_1_2_1_15_1"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2005.12.011"},{"key":"e_1_2_1_17_1","unstructured":"Duda R. O. Hart P. E. and Stork D. G. 2001. Pattern Classification 2 Ed. John Wiley and Sons Inc.   Duda R. O. Hart P. E. and Stork D. G. 2001. Pattern Classification 2 Ed. John Wiley and Sons Inc."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(96)00140-9"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.765656"},{"key":"e_1_2_1_20_1","unstructured":"GBR-Project. 2007. http:\/\/www.issnip.unimelb.edu.au\/research_program\/sensor_networks\/core_%technologies\/anomaly_detection\/anomaly_detection_in_wsn.  GBR-Project. 2007. http:\/\/www.issnip.unimelb.edu.au\/research_program\/sensor_networks\/core_%technologies\/anomaly_detection\/anomaly_detection_in_wsn."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:AIRE.0000045502.10941.a9"},{"key":"e_1_2_1_22_1","unstructured":"IBRL-Web. 2006. http:\/\/db.lcs.mit.edu\/labdata\/labdata.html.  IBRL-Web. 2006. http:\/\/db.lcs.mit.edu\/labdata\/labdata.html."},{"key":"e_1_2_1_23_1","unstructured":"IMote2-Web. 2008. http:\/\/www.xbow.com\/Products\/productdetails.aspx?sid=253.  IMote2-Web. 2008. http:\/\/www.xbow.com\/Products\/productdetails.aspx?sid=253."},{"key":"e_1_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Johnson R. A. and Wichern D. W. 1988. Applied Multivariate Statistical Analysis. Prentice Hall.   Johnson R. A. and Wichern D. W. 1988. Applied Multivariate Statistical Analysis. Prentice Hall.","DOI":"10.2307\/2531616"},{"key":"e_1_2_1_25_1","unstructured":"Kelly P. 1994. An algorithm for merging hyperellipsoidal clusters. Tech. rep. LA-UR-94-3306 Los Alamos National Laboratory.  Kelly P. 1994. An algorithm for merging hyperellipsoidal clusters. Tech. rep. LA-UR-94-3306 Los Alamos National Laboratory."},{"key":"e_1_2_1_26_1","unstructured":"Kininmonth S. Bainbridge S. Atkinson I. Gill E. Barral L. and Vidaud R. 2004. Sensor networking the great barrier reef. Spatial Sci. QLD J. 34--38.  Kininmonth S. Bainbridge S. Atkinson I. Gill E. Barral L. and Vidaud R. 2004. Sensor networking the great barrier reef. Spatial Sci. QLD J. 34--38."},{"volume-title":"Proceedings of the 24th International Conference on Very Large Data Bases (VLDB). 392--403","author":"Knorr E. M.","key":"e_1_2_1_27_1"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1254850.1254854"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1077391.1077395"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.21"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1080\/15501320600692044"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2003.07.018"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1127777.1127833"},{"volume-title":"Proceedings of the IEEE Military Communications Conference (MILCOM). 1--7.","author":"Paladugu K.","key":"e_1_2_1_34_1"},{"volume-title":"Proceedings of 19th International Conference on Data Engineering. 315--326","author":"Papadimitriou S.","key":"e_1_2_1_35_1"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/990680.990707"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024974810270"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/332833.332838"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/79.985679"},{"volume-title":"Proceedings of the SENSEI-ISSNIP Workshop alongside ICT Mobile Summit.","author":"Rajasegarar S.","key":"e_1_2_1_40_1"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2008.4599219"},{"volume-title":"Proceedings of the IEEE International Conference on Communications (ICC). 1610--1614","author":"Rajasegarar S.","key":"e_1_2_1_42_1"},{"volume-title":"Proceedings of the IEEE International Conference on Communications Systems (ICCS).","author":"Rajasegarar S.","key":"e_1_2_1_43_1"},{"volume-title":"Proceedings of the IEEE International Conference on Communications (ICC). 3864--3869","author":"Rajasegarar S.","key":"e_1_2_1_44_1"},{"key":"e_1_2_1_45_1","unstructured":"Srinivasan A. and Wu J. 2008. A survey on secure localization in wireless sensor networks. Encyclopedia of Wireless and Mobile Communications. To appear. http:\/\/www.cse.fau.edu\/~jie\/research\/publications\/Publication_files\/BookChapter_SurveyOnSecureLocalizationInWirelessSensorNetworks.pdf.  Srinivasan A. and Wu J. 2008. A survey on secure localization in wireless sensor networks. Encyclopedia of Wireless and Mobile Communications. To appear. http:\/\/www.cse.fau.edu\/~jie\/research\/publications\/Publication_files\/BookChapter_SurveyOnSecureLocalizationInWirelessSensorNetworks.pdf."},{"volume-title":"Proceedings of the 32nd International Conference on Very Large Data Bases (VLDB). 187--198","author":"Subramaniam S.","key":"e_1_2_1_46_1"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/990680.990704"},{"key":"e_1_2_1_48_1","unstructured":"TinyOS-Web. 2008. http:\/\/www.tinyos.net\/tinyos-2.x\/doc\/html\/tep126.html.  TinyOS-Web. 2008. http:\/\/www.tinyos.net\/tinyos-2.x\/doc\/html\/tep126.html."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1236360.1236389"},{"volume":"1","volume-title":"Proceedings of IEEE InfoCom.","author":"Younis O.","key":"e_1_2_1_50_1"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.814921"}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1653760.1653767","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1653760.1653767","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:23:37Z","timestamp":1750249417000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1653760.1653767"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12]]},"references-count":51,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2009,12]]}},"alternative-id":["10.1145\/1653760.1653767"],"URL":"https:\/\/doi.org\/10.1145\/1653760.1653767","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"type":"print","value":"1550-4859"},{"type":"electronic","value":"1550-4867"}],"subject":[],"published":{"date-parts":[[2009,12]]},"assertion":[{"value":"2007-10-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2008-12-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2010-01-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}