Wireless Sensor Networks (WSNs) provide a low cost option for monitoring different environments such as farms, forests and water and electricity networks. However, the restricted energy resources of the network impede the collection of raw monitoring data from all the nodes to a single location for analysis. This has stimulated research into efficient anomaly detection techniques to extract information about unusual events such as malicious attacks or faulty sensors at each node. Many previous anomaly detection methods have relied on centralized processing of measurement data, which is highly communication intensive. In this paper, we present an efficient algorithm to detect anomalies in a decentralized manner. In particular, we propose a n...
In the past couple of years, sensor networks have evolved into an important infrastructure component...
Wireless sensor networks (WSN) are fundamental to the Internet of Things (IoT) by bridging the gap b...
This paper presents a model for ensuring data integrity using anomalous node identification in non-h...
Anomalies in wireless sensor networks can occur due to malicious attacks, faulty sensors, changes in...
© 2013 Dr. Masud MoshtaghiWireless Sensor Networks (WSNs) provide a cost-effective platform for moni...
Abstract—Sensor nodes in wireless sensor networks have limited energy resources and this hinders the...
Anomaly detection in a WSN is an important aspect of data analysis in order to identify data items t...
Abstract Anomaly detection is an important problem for environment, fault diag-nosis and intruder de...
Wireless Sensor Network can be defined as a network of integrated sensors responsible for environmen...
ii In sustainable environments, efficient anomaly (outlier) detection is essential to help monitor a...
Wireless Sensor Networks (WSNs) can experience problems (anomalies) during deployment, due to dynami...
Wireless Sensor Networks (WSNs) can experience problems (anomalies) during deployment, due to dynami...
Wireless sensor networks (WSNs) are vulnerable to attacks and faults which are often linked to abnor...
Wireless sensor networks (WSNs) are increasingly used as platforms for collecting data from unattend...
International audienceKnowledge discovery and data analysis in resource constrained wireless sensor ...
In the past couple of years, sensor networks have evolved into an important infrastructure component...
Wireless sensor networks (WSN) are fundamental to the Internet of Things (IoT) by bridging the gap b...
This paper presents a model for ensuring data integrity using anomalous node identification in non-h...
Anomalies in wireless sensor networks can occur due to malicious attacks, faulty sensors, changes in...
© 2013 Dr. Masud MoshtaghiWireless Sensor Networks (WSNs) provide a cost-effective platform for moni...
Abstract—Sensor nodes in wireless sensor networks have limited energy resources and this hinders the...
Anomaly detection in a WSN is an important aspect of data analysis in order to identify data items t...
Abstract Anomaly detection is an important problem for environment, fault diag-nosis and intruder de...
Wireless Sensor Network can be defined as a network of integrated sensors responsible for environmen...
ii In sustainable environments, efficient anomaly (outlier) detection is essential to help monitor a...
Wireless Sensor Networks (WSNs) can experience problems (anomalies) during deployment, due to dynami...
Wireless Sensor Networks (WSNs) can experience problems (anomalies) during deployment, due to dynami...
Wireless sensor networks (WSNs) are vulnerable to attacks and faults which are often linked to abnor...
Wireless sensor networks (WSNs) are increasingly used as platforms for collecting data from unattend...
International audienceKnowledge discovery and data analysis in resource constrained wireless sensor ...
In the past couple of years, sensor networks have evolved into an important infrastructure component...
Wireless sensor networks (WSN) are fundamental to the Internet of Things (IoT) by bridging the gap b...
This paper presents a model for ensuring data integrity using anomalous node identification in non-h...