{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,29]],"date-time":"2022-06-29T15:33:05Z","timestamp":1656516785984},"reference-count":19,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,1,1]]},"abstract":"<p>With the flourish of Internet of Things, the security issues in wireless sensor network (WSN), especially traffic anomaly detections, have attracted researchers' attentions. As a distributed wireless network, WSN is vulnerable to many attacks. In this research, the authors investigate the traffic anomaly detections of a well-known attack, black hole attack, in WSNs. With limited computation capacity, sensor nodes are unable to perform sophisticated detection techniques. Therefore, the authors propose a profile based monitoring approach with a restricted feature set to supervise the network traffic. The proposed profile based monitoring approach contains two components, feature selection and anomaly detection. In order to complement the limited computing capacity of a sensor node, feature selection component will extract features with high contribution or high relevance for future monitoring. The anomaly detection component monitors the selected features and alarms the administrator when an anomaly is detected. Two types of combination are proposed, graphic and non-graphic based models. The graphic based approach seems to surpass the non-graphic based approach, but the graphic based approach takes much longer time to select the important features than non-graphic based approach.<\/p>","DOI":"10.4018\/ijghpc.2015010104","type":"journal-article","created":{"date-parts":[[2015,5,8]],"date-time":"2015-05-08T15:51:54Z","timestamp":1431100314000},"page":"42-51","source":"Crossref","is-referenced-by-count":4,"title":["Black Hole Traffic Anomaly Detections in Wireless Sensor Network"],"prefix":"10.4018","volume":"7","author":[{"given":"Tu-Liang","family":"Lin","sequence":"first","affiliation":[{"name":"Department of Management Information Systems, National Chiayi University, Chiayi City, Taiwan"}]},{"given":"Hong-Yi","family":"Chang","sequence":"additional","affiliation":[{"name":"Department of Management Information Systems, National Chiayi University, Chiayi City, Taiwan"}]}],"member":"2432","reference":[{"key":"ijghpc.2015010104-0","doi-asserted-by":"publisher","DOI":"10.5121\/ijcses.2012.3204"},{"key":"ijghpc.2015010104-1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0028180"},{"key":"ijghpc.2015010104-2","unstructured":"Cai, B., Bi, Q., Li, F., Wang, D., Yang, Y., & Yuan, C. (2010). Research and Design of Agricultural Environment Monitoring System Based on ZigBee Wireless Sensor Network. Acta Agriculturae Jiangxi, 11, 050."},{"key":"ijghpc.2015010104-3","author":"R.-C.Chen","year":"2010","journal-title":"Ranger intrusion detection system for wireless sensor networks with Sybil attack based on ontology"},{"issue":"3","key":"ijghpc.2015010104-4","first-page":"335","article-title":"An isolation intrusion detection system for hierarchical wireless sensor networks.","volume":"5","author":"R.-C.Chen","year":"2010","journal-title":"Journal of Networks"},{"key":"ijghpc.2015010104-5","doi-asserted-by":"publisher","DOI":"10.1016\/S0034-4257(97)00049-7"},{"issue":"10","key":"ijghpc.2015010104-6","first-page":"4258","article-title":"Industrial wireless sensor networks: Challenges, design principles, and technical approaches. Industrial Electronics","volume":"56","author":"V. C.Gungor","year":"2009","journal-title":"IEEE Transactions on"},{"key":"ijghpc.2015010104-7","doi-asserted-by":"crossref","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., & Witten, I. H. (2009). The WEKA data mining software: an update. ACM SIGKDD explorations newsletter, 11(1), 10-18.","DOI":"10.1145\/1656274.1656278"},{"key":"ijghpc.2015010104-8","doi-asserted-by":"crossref","unstructured":"Huang, Y.-a., Fan, W., Lee, W., & Yu, P. S. (2003). Cross-feature analysis for detecting ad-hoc routing anomalies. Paper presented at the Distributed Computing Systems, 2003. Proceedings. 23rd International Conference on.","DOI":"10.1109\/ICDCS.2003.1203498"},{"key":"ijghpc.2015010104-9","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-1406-3_2"},{"key":"ijghpc.2015010104-10","unstructured":"Kawadia, V., & Kumar, P. (2003). Power control and clustering in ad hoc networks. Paper presented at the INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies."},{"key":"ijghpc.2015010104-11","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729694"},{"key":"ijghpc.2015010104-12","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2010.2307"},{"key":"ijghpc.2015010104-13","unstructured":"Mao, Y. (2010). A semantic-based intrusion detection framework for wireless sensor network. Paper presented at the Networked Computing (INC), 2010 6th International Conference on."},{"issue":"1","key":"ijghpc.2015010104-14","first-page":"1","article-title":"A survey on wearable sensor-based systems for health monitoring and prognosis. Systems, Man, and Cybernetics, Part C: Applications and Reviews","volume":"40","author":"A.Pantelopoulos","year":"2010","journal-title":"IEEE Transactions on"},{"key":"ijghpc.2015010104-15","unstructured":"Tsamardinos, I., Aliferis, C. F., Statnikov, A. R., & Statnikov, E. (2003). Algorithms for Large Scale Markov Blanket Discovery. Paper presented at the FLAIRS Conference."},{"key":"ijghpc.2015010104-16","unstructured":"Wang, X., Lin, T.-l., & Wong, J. S. (2005). Feature selection in intrusion detection system over mobile ad-hoc network."},{"key":"ijghpc.2015010104-17","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.E95.D.532"},{"key":"ijghpc.2015010104-18","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024600519144"}],"container-title":["International Journal of Grid and High Performance Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=128360","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T20:58:19Z","timestamp":1654117099000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijghpc.2015010104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2015,1,1]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,1]]}},"URL":"https:\/\/doi.org\/10.4018\/ijghpc.2015010104","relation":{},"ISSN":["1938-0259","1938-0267"],"issn-type":[{"value":"1938-0259","type":"print"},{"value":"1938-0267","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,1,1]]}}}