Outlier Detection Technique for Wireless Sensor Network Using GAN with Autoencoder to Increase the Network Lifetime

Full Text (PDF, 693KB), PP.26-38

Views: 0 Downloads: 0


Biswaranjan Sarangi 1,* Biswajit Tripathy 2

1. Biju Patnaik University of Technology (BPUT), Department of CSE, Rourkela, 769015, Odisha, India

2. GITA Autonomous College, Department of CST, Bhubaneswar, 752054, Odisha, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2023.01.03

Received: 17 Jul. 2022 / Revised: 6 Oct. 2022 / Accepted: 14 Nov. 2022 / Published: 8 Feb. 2023

Index Terms

WSN, Outlier, GAN, Autoencoder, Network-lifetime


In wireless sensor networks (WSN), sensor nodes are expected to operate autonomously in a human inaccessible and the hostile environment for which the sensor nodes and communication links are therefore, prone to faults and potential malicious attacks. Sensor readings that differ significantly from the usual pattern of sensed data due to faults in sensor nodes, unreliable communication links, and physical and logical malicious attacks are considered as outliers. This paper presents an outlier detection technique based on deep learning namely, generative adversarial networks (GANs) with autoencoder neural network. The two-level architecture proposed for WSN makes the proposed technique robust. The simulation result indicates improvement in detection accuracy compared to existing state-of-the-art techniques applied for WSNs and increase of the network lifetime. Robustness of outlier detection algorithm with respect to channel fault and robustness concerning different types of distribution of faulty communication channel is analyzed.

Cite This Paper

Biswaranjan Sarangi, Biswajit Tripathy, "Outlier Detection Technique for Wireless Sensor Network Using GAN with Autoencoder to Increase the Network Lifetime", International Journal of Computer Network and Information Security(IJCNIS), Vol.15, No.1, pp.26-38, 2023. DOI:10.5815/ijcnis.2023.01.03


[1]Sarangi, B., Mahapatro, A., & Tripathy, B. “Outlier Detection Using Convolutional Neural Network for Wireless Sensor Network”, International Journal of Business Data Communications and Networking (IJBDCN), 17(2), pp. 91-106. 2021. DOI: 10.4018/IJBDCN.286705.
[2]Sadia Anayat, Sheeza butt, Isma zulfiqar, Saher butt, "A Deep Analysis of Applications and Challenges of Wireless Sensor Network", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.10, No.3, pp. 32-44, 2020.DOI: 10.5815/ijwmt.2020.03.03
[3]Amir F. Mukeri, Dwarkoba P. Gaikwad, "Adversarial Machine Learning Attacks and Defenses in Network Intrusion Detection Systems", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.12, No.1, pp. 12-21, 2022.DOI: 10.5815/ijwmt.2022.01.02
[4]S. Rajasegarar, C. Leckie, M. Palaniswami, and J. C. Bezdek, “Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks”, Proc. IEEE International Conference on Communications, pp.3864-3869, 2007.
[5]Abid, A., Kachouri, A., & Mahfoudhi, A. “Anomaly detection through outlier and neighborhood data in wireless sensor networks” in Advanced Technologies for Signal and Image Processing (ATSIP), (pp. 26–30), 2016.
[6]Chen, Y., Li, S. “A Lightweight Anomaly Detection Method Based on SVDD for Wireless Sensor Networks”. Wireless Pers Commun, 105, pp.1235-1256, 2019.
[7]T. Luo and S. G. Nagarajan, “Distributed Anomaly Detection Using Autoencoder Neural Networks in WSN for IoT,” 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, pp. 1-6, 2018.
[8]Y. Hong, U. Hwang, J. Yoo, and S. Yoon, “How generative adversarial networks and their variants work: An overview,” ACM Computing Surveys (CSUR), vol. 52, no. 1, p. 10, 2019.
[9]Van Der Maaten, L., Postma, E., Van den Herik, J.: Dimensionality reduction: a comparative review. J Mach Learn Res 10, 66–71 (2009).
[10]D. Kingma and J. Ba. “Adam: A method for stochastic optimization”. ICLR, 2015.
[11]Ch Rambabu, V.V.K.D.V.Prasad, K.Satya Prasad, " Multipath Cluster-based Hybrid MAC Protocol for Wireless Sensor Networks ", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.10, No.1, pp. 1-16, 2020.DOI: 10.5815/ijwmt.2020.01.01
[12]Hitesh Mohapatra, Amiya Kumar Rath, "Survey on fault tolerance-based clustering evolution in WSN", IET Networks, vol.9, no.4, pp.145-155, 2020.
[13]G. Barrenetxea, Sensorscope Data. Zenodo. Dataset. 10.5281/zenodo.2654726. 2019.
[14]Hossin M, Sulaiman M. A review on evaluation metrics for data classification evaluations. Int J Data Min Knowl Manag Process. 2015;5(2):1.
[15]F. Shahzad “Pymote, 2.0: Development of an interactive python framework for wireless network simulations”, IEEE Internet of Things J., vol. 3, no. 6, pp. 1182-1188, 2016.
[16]Mohamed Sakr, Walid Atwa, Arabi Keshk, "Genetic-based Summarization for Local Outlier Detection in Data Stream", International Journal of Intelligent Systems and Applications(IJISA), Vol.13, No.1, pp.58-68, 2021. DOI: 10.5815/ijisa.2021.01.05