{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T18:28:30Z","timestamp":1772303310924,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,12,12]],"date-time":"2019-12-12T00:00:00Z","timestamp":1576108800000},"content-version":"vor","delay-in-days":11,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Braz Comput Soc"],"published-print":{"date-parts":[[2019,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The reliability of wireless sensor networks (WSN) is getting increasing importance as this kind of networks are becoming the communication base for many cyber-physical systems (CPS). Such systems rely on sensor data correctness to make decisions; therefore, faulty data can lead such systems to take wrong actions. Errors can be originated by sensor\u2019s hardware failures or software bugs and also from the intentional interference of intruders. The gateways that connect such WSN to the Internet are natural intruders\u2019 targets as they usually run conventional operating systems and communication protocols. This work proposes a confidence attribution scheme, based on lightweight predictors running on the sensors. The solution also proposes a parameterizable formula, in order to stamp every value sent by a sensor with a<jats:italic>confidence level<\/jats:italic>, calculated upon the values of a subset of correlated sensors. This work also presents an algorithm that can identify a defective sensor into its subset. The use of predictors and confidence attribution are proposed as the basis of a mechanism that increases the WSN resilience against sensor failure or bad data injection by intruders. Several simulations were performed to evaluate the detection efficiency against different types of sensor errors. This work also analyses mechanisms to deal with concept drifts in the WSN lifetime.<\/jats:p>","DOI":"10.1186\/s13173-019-0094-6","type":"journal-article","created":{"date-parts":[[2019,12,13]],"date-time":"2019-12-13T23:03:40Z","timestamp":1576278220000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Increasing sensor reliability through confidence attribution"],"prefix":"10.1186","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7418-7918","authenticated-orcid":false,"given":"Roberto M.","family":"Scheffel","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4063-1339","authenticated-orcid":false,"given":"Ant\u00f4nio A.","family":"Fr\u00f6hlich","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,12]]},"reference":[{"key":"94_CR1","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1109\/LADC.2018.00025","volume-title":"2018 Eighth Latin-American Symposium on Dependable Computing (LADC)","author":"RM Scheffel","year":"2018","unstructured":"Scheffel RM, Fr\u00f6hlich AA (2018) WSN data confidence attribution using predictors In: 2018 Eighth Latin-American Symposium on Dependable Computing (LADC), 145\u2013154.. IEEE, Piscataway."},{"issue":"1","key":"94_CR2","first-page":"3","volume":"37","author":"MZ Khan","year":"2013","unstructured":"Khan MZ (2013) Fault management in wireless sensor networks. Comput Sci Telecommun 37(1):3\u201317.","journal-title":"Comput Sci Telecommun"},{"issue":"3","key":"94_CR3","first-page":"25","volume":"5","author":"K Ni","year":"2009","unstructured":"Ni K, Ramanathan N, Chehade MNH, Balzano L, Nair S, Zahedi S, Kohler E, Pottie G, Hansen M, Srivastava M (2009) Sensor network data fault types. ACM Trans Sensor Netw (TOSN) 5(3):25.","journal-title":"ACM Trans Sensor Netw (TOSN)"},{"issue":"3","key":"94_CR4","first-page":"23","volume":"6","author":"AB Sharma","year":"2010","unstructured":"Sharma AB, Golubchik L, Govindan R (2010) Sensor faults: detection methods and prevalence in real-world datasets. ACM Trans Sensor Netw (TOSN) 6(3):23.","journal-title":"ACM Trans Sensor Netw (TOSN)"},{"issue":"5","key":"94_CR5","doi-asserted-by":"publisher","first-page":"981","DOI":"10.1109\/TIM.2007.913803","volume":"57","author":"AI Moustapha","year":"2008","unstructured":"Moustapha AI, Selmic RR (2008) Wireless sensor network modeling using modified recurrent neural networks: application to fault detection. IEEE Trans Instrument Measure 57(5):981\u2013988.","journal-title":"IEEE Trans Instrument Measure"},{"key":"94_CR6","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1145\/2542050.2542080","volume-title":"Proceedings of the Fourth Symposium on Information and Communication Technology","author":"TA Nguyen","year":"2013","unstructured":"Nguyen TA, Bucur D, Aiello M, Tei K (2013) Applying time series analysis and neighbourhood voting in a decentralised approach for fault detection and classification in WSNs In: Proceedings of the Fourth Symposium on Information and Communication Technology, 234\u2013241.. ACM, New York."},{"key":"94_CR7","doi-asserted-by":"publisher","first-page":"6712","DOI":"10.1109\/ICC.2015.7249395","volume-title":"Communications (ICC), 2015 IEEE International Conference On","author":"W Li","year":"2015","unstructured":"Li W, Bassi F, Dardari D, Kieffer M, Pasolini G (2015) Low-complexity distributed fault detection for wireless sensor networks In: Communications (ICC), 2015 IEEE International Conference On, 6712\u20136718.. IEEE, Piscataway."},{"key":"94_CR8","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1109\/PDGC.2012.6449816","volume-title":"Parallel Distributed and Grid Computing (PDGC), 2012 2nd IEEE International Conference On","author":"M Panda","year":"2012","unstructured":"Panda M, Khilar PM (2012) Distributed soft fault detection algorithm in wireless sensor networks using statistical test In: Parallel Distributed and Grid Computing (PDGC), 2012 2nd IEEE International Conference On, 195\u2013198.. IEEE, Piscataway."},{"key":"94_CR9","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1016\/j.adhoc.2014.10.006","volume":"25","author":"M Panda","year":"2015","unstructured":"Panda M, Khilar PM (2015) Distributed self fault diagnosis algorithm for large scale wireless sensor networks using modified three sigma edit test. Ad Hoc Netw 25:170\u2013184.","journal-title":"Ad Hoc Netw"},{"key":"94_CR10","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/ICOIN.2015.7057858","volume-title":"Information Networking (ICOIN), 2015 International Conference On","author":"H Yuan","year":"2015","unstructured":"Yuan H, Zhao X, Yu L (2015) A distributed Bayesian algorithm for data fault detection in wireless sensor networks In: Information Networking (ICOIN), 2015 International Conference On, 63\u201368.. IEEE, Piscataway."},{"key":"94_CR11","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1109\/ICoSC.2015.7153274","volume-title":"Systems and Control (ICSC), 2015 4th International Conference On","author":"M Saihi","year":"2015","unstructured":"Saihi M, Boussaid B, Zouinkhi A, Abdelkrim N (2015) Distributed fault detection based on hmm for wireless sensor networks In: Systems and Control (ICSC), 2015 4th International Conference On, 189\u2013193.. IEEE, Piscataway."},{"issue":"10","key":"94_CR12","first-page":"643570","volume":"11","author":"K Liu","year":"2015","unstructured":"Liu K, Zhuang Y, Wang Z, Ma J (2015) Spatiotemporal correlation based fault-tolerant event detection in wireless sensor networks. Intl J Distrib Sensor Netw 11(10):643570.","journal-title":"Intl J Distrib Sensor Netw"},{"issue":"2","key":"94_CR13","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/s11277-015-2944-7","volume":"86","author":"C Titouna","year":"2016","unstructured":"Titouna C, Aliouat M, Gueroui M (2016) FDS: fault detection scheme for wireless sensor networks. Wirel Person Commun 86(2):549\u2013562.","journal-title":"Wirel Person Commun"},{"issue":"2","key":"94_CR14","first-page":"241","volume":"9","author":"C Titouna","year":"2017","unstructured":"Titouna C, Gueroui M, Aliouat M, Ari AAA, Amine A (2017) Distributed fault-tolerant algorithm for wireless sensor network. Int J Commun Netw Inf Secur 9(2):241.","journal-title":"Int J Commun Netw Inf Secur"},{"key":"94_CR15","first-page":"13","volume-title":"Distributed Computing Systems Workshops (ICDCSW), 2017 IEEE 37th International Conference On","author":"T Zhang","year":"2017","unstructured":"Zhang T, Zhao Q, Nakamoto Y (2017) Faulty sensor data detection in wireless sensor networks using logistical regression In: Distributed Computing Systems Workshops (ICDCSW), 2017 IEEE 37th International Conference On, 13\u201318.. IEEE, Piscataway."},{"issue":"5","key":"94_CR16","doi-asserted-by":"publisher","first-page":"983","DOI":"10.3390\/s17050983","volume":"17","author":"S Shao","year":"2017","unstructured":"Shao S, Guo S, Qiu X (2017) Distributed fault detection based on credibility and cooperation for WSNs in smart grids. Sensors 17(5):983.","journal-title":"Sensors"},{"issue":"3","key":"94_CR17","doi-asserted-by":"publisher","first-page":"2507","DOI":"10.1007\/s11277-016-3931-3","volume":"95","author":"RR Swain","year":"2017","unstructured":"Swain RR, Khilar PM (2017) Composite fault diagnosis in wireless sensor networks using neural networks. Wirel Person Commun 95(3):2507\u20132548.","journal-title":"Wirel Person Commun"},{"key":"94_CR18","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.inffus.2013.04.006","volume":"16","author":"M Wo\u017aniak","year":"2014","unstructured":"Wo\u017aniak M, Gra\u00f1a M, Corchado E (2014) A survey of multiple classifier systems as hybrid systems. Inf Fusion 16:3\u201317.","journal-title":"Inf Fusion"},{"issue":"10","key":"94_CR19","doi-asserted-by":"publisher","first-page":"9087","DOI":"10.1016\/j.eswa.2012.02.036","volume":"39","author":"D-I Curiac","year":"2012","unstructured":"Curiac D-I, Volosencu C (2012) Ensemble based sensing anomaly detection in wireless sensor networks. Expert Syst Appl 39(10):9087\u20139096.","journal-title":"Expert Syst Appl"},{"issue":"3","key":"94_CR20","doi-asserted-by":"publisher","first-page":"1413","DOI":"10.1109\/SURV.2013.112813.00168","volume":"16","author":"C O\u2019Reilly","year":"2014","unstructured":"O\u2019Reilly C, Gluhak A, Imran MA, Rajasegarar S (2014) Anomaly detection in wireless sensor networks in a non-stationary environment. IEEE Commun Surveys Tutor 16(3):1413\u20131432.","journal-title":"IEEE Commun Surveys Tutor"},{"issue":"4","key":"94_CR21","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MCI.2015.2471196","volume":"10","author":"G Ditzler","year":"2015","unstructured":"Ditzler G, Roveri M, Alippi C, Polikar R (2015) Learning in nonstationary environments: a survey. IEEE Comput Intell Mag 10(4):12\u201325.","journal-title":"IEEE Comput Intell Mag"},{"key":"94_CR22","first-page":"1","volume-title":"Computational Intelligence and Computing Research (ICCIC), 2014 IEEE International Conference On","author":"S Visalakshi","year":"2014","unstructured":"Visalakshi S, Radha V (2014) A literature review of feature selection techniques and applications: review of feature selection in data mining In: Computational Intelligence and Computing Research (ICCIC), 2014 IEEE International Conference On, 1\u20136.. IEEE, Piscataway."},{"key":"94_CR23","volume-title":"Data Mining - Practical Machine Learning Tools and Techniques","author":"E Frank","year":"2017","unstructured":"Frank E, Hall MA, Witten IH (2017) Data Mining - Practical Machine Learning Tools and Techniques. 4th ed.. Morgan Kaufmann, Cambridge. pp. 553\u2013571."},{"issue":"Oct","key":"94_CR24","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M, Prettenhofer P, Weiss R, Dubourg V, et al (2011) Scikit-learn: machine learning in python. J Mach Learn Res 12(Oct):2825\u20132830.","journal-title":"J Mach Learn Res"},{"issue":"5","key":"94_CR25","doi-asserted-by":"publisher","first-page":"836","DOI":"10.1109\/TNN.2007.912306","volume":"19","author":"S Trenn","year":"2008","unstructured":"Trenn S (2008) Multilayer perceptrons: Approximation order and necessary number of hidden units. IEEE Trans Neural Netw 19(5):836\u2013844.","journal-title":"IEEE Trans Neural Netw"},{"issue":"2","key":"94_CR26","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1007\/s11063-014-9366-5","volume":"42","author":"P Thomas","year":"2015","unstructured":"Thomas P, Suhner M-C (2015) A new multilayer perceptron pruning algorithm for classification and regression applications. Neural Process Lett 42(2):437\u2013458.","journal-title":"Neural Process Lett"},{"issue":"1","key":"94_CR27","doi-asserted-by":"publisher","first-page":"79","DOI":"10.3354\/cr030079","volume":"30","author":"CJ Willmott","year":"2005","unstructured":"Willmott CJ, Matsuura K (2005) Advantages of the mean absolute error (MAE) over the root mean square error (RMSE) in assessing average model performance. Climate Res 30(1):79\u201382.","journal-title":"Climate Res"},{"key":"94_CR28","first-page":"473","volume":"472","author":"R Al-Rfou","year":"2016","unstructured":"Al-Rfou R, Alain G, Almahairi A, Angermueller C, Bahdanau D, Ballas N, Bastien F, Bayer J, Belikov A, Belopolsky A, et al (2016) Theano: a python framework for fast computation of mathematical expressions. arXiv preprint arXiv:1605.02688 472:473.","journal-title":"arXiv preprint arXiv:1605.02688"},{"key":"94_CR29","unstructured":"Chollet F (2015) Keras: The Python Deep Learning library. https:\/\/keras.io. Accessed 27 Aug 2018."},{"key":"94_CR30","first-page":"332","volume-title":"Proceedings of the 7th International Conference on Information Processing in Sensor Networks","author":"G Barrenetxea","year":"2008","unstructured":"Barrenetxea G, Ingelrest F, Schaefer G, Vetterli M, Couach O, Parlange M (2008) Sensorscope: out-of-the-box environmental monitoring In: Proceedings of the 7th International Conference on Information Processing in Sensor Networks, 332\u2013343.. IEEE Computer Society, Piscataway."},{"key":"94_CR31","unstructured":"Sensor Scope Dataset. http:\/\/sensorscope.epfl.ch\/. Accessed 26 Feb 2019."},{"issue":"4","key":"94_CR32","doi-asserted-by":"publisher","first-page":"964","DOI":"10.1007\/s10618-015-0448-4","volume":"30","author":"GI Webb","year":"2016","unstructured":"Webb GI, Hyde R, Cao H, Nguyen HL, Petitjean F (2016) Characterizing concept drift. Data Mining Knowl Discovery 30(4):964\u2013994. https:\/\/doi.org\/10.1007\/s10618-015-0448-4.","journal-title":"Data Mining Knowl Discovery"},{"issue":"4","key":"94_CR33","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1145\/2523813","volume":"46","author":"J Gama","year":"2014","unstructured":"Gama J, \u017eliobait\u0117 I, Bifet A, Pechenizkiy M, Bouchachia A (2014) A survey on concept drift adaptation. ACM Comput Surv (CSUR) 46(4):44.","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"2","key":"94_CR34","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.patrec.2011.08.019","volume":"33","author":"GJ Ross","year":"2012","unstructured":"Ross GJ, Adams NM, Tasoulis DK, Hand DJ (2012) Exponentially weighted moving average charts for detecting concept drift. Pattern Recogn Lett 33(2):191\u2013198.","journal-title":"Pattern Recogn Lett"},{"key":"94_CR35","unstructured":"Heinen MR, Engel PM, Pinto RC (2011) Igmn: an incremental Gaussian mixture network that learns instantaneously from data flows. Proc VIII Encontro Nacional de Intelig\u00eancia Artificial (ENIA2011):488\u2013499."}],"container-title":["Journal of the Brazilian Computer Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13173-019-0094-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13173-019-0094-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13173-019-0094-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T10:46:09Z","timestamp":1723545969000},"score":1,"resource":{"primary":{"URL":"https:\/\/journal-bcs.springeropen.com\/articles\/10.1186\/s13173-019-0094-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["94"],"URL":"https:\/\/doi.org\/10.1186\/s13173-019-0094-6","relation":{},"ISSN":["0104-6500","1678-4804"],"issn-type":[{"value":"0104-6500","type":"print"},{"value":"1678-4804","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"5 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 November 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 December 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"13"}}