Open Access   Article Go Back

A Comparative Analysis of Data Mining Techniques in Wireless Sensor Network

Shubhie Agarwal1 , Seema Maitrey2 , Pankaj Singh Yadav3

Section:Review Paper, Product Type: Journal Paper
Volume-4 , Issue-4 , Page no. 126-131, Apr-2016

Online published on Apr 27, 2016

Copyright © Shubhie Agarwal, Seema Maitrey, Pankaj Singh Yadav . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Shubhie Agarwal, Seema Maitrey, Pankaj Singh Yadav, “A Comparative Analysis of Data Mining Techniques in Wireless Sensor Network,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.126-131, 2016.

MLA Style Citation: Shubhie Agarwal, Seema Maitrey, Pankaj Singh Yadav "A Comparative Analysis of Data Mining Techniques in Wireless Sensor Network." International Journal of Computer Sciences and Engineering 4.4 (2016): 126-131.

APA Style Citation: Shubhie Agarwal, Seema Maitrey, Pankaj Singh Yadav, (2016). A Comparative Analysis of Data Mining Techniques in Wireless Sensor Network. International Journal of Computer Sciences and Engineering, 4(4), 126-131.

BibTex Style Citation:
@article{Agarwal_2016,
author = {Shubhie Agarwal, Seema Maitrey, Pankaj Singh Yadav},
title = {A Comparative Analysis of Data Mining Techniques in Wireless Sensor Network},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2016},
volume = {4},
Issue = {4},
month = {4},
year = {2016},
issn = {2347-2693},
pages = {126-131},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=872},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=872
TI - A Comparative Analysis of Data Mining Techniques in Wireless Sensor Network
T2 - International Journal of Computer Sciences and Engineering
AU - Shubhie Agarwal, Seema Maitrey, Pankaj Singh Yadav
PY - 2016
DA - 2016/04/27
PB - IJCSE, Indore, INDIA
SP - 126-131
IS - 4
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1501 1352 downloads 1448 downloads
  
  
           

Abstract

Data mining in WSN is the process of extracting model and pattern that are application oriented with possible accuracy from continuous, rapid flow of data. The whole huge amount of data cannot be stored and processed immediately. That is why the mining algorithm should be fast enough to process high speed arriving data. There are many conventional data mining techniques, but they are not able to handle dynamic amount of data. It is difficult to handle WSN data. There are several challenges that it has to face in WSN. The main aim of wireless sensor networks is to transmit data in such a manner that increased lifetime of the network and energy efficient routing can be done with significant accuracy. Data mining is the process of discovering interesting patterns (or knowledge) from large amounts of data. Knowledge discovery process attains several steps and can be interactive, iterative and user-driven. Data mining techniques of wireless sensor network are different from traditional techniques. Data mining techniques can be frequent pattern mining, sequential pattern mining, clustering and classification. All these techniques can use centralized or distributed approach, even after that the focus is decided that either you can focus on application or performance of wireless sensor network. Data mining techniques that work on sensor network-based application are still facing shortcomings in existing techniques. By seeing these shortcomings and special characteristics of WSNs, there is a need for data mining technique designed for WSNs.In this paper, we are finding the difference between traditional and sensor data processing. Also comparing the different data mining techniques used in wireless sensor network where all these methods have their own processing architecture and method of sensor distribution depending upon the attributes.

Key-Words / Index Term

Centralized Mining; Distributed Mining; Sequential Mining; Pattern Mining; WSN

References

[1] R. Agrawal, T. Imieli´nski, and A. Swami, “Mining association rules between sets of items in large databases,” in Proceeding of SIGMOD, pp. 207–216.
[2] J. Han, J. Pei, Y. Yin, and R. Mao, “Mining frequent patterns without candidate generation: a frequent-pattern tree approach,” Data Mining and Knowledge Discovery, vol. 8, no. 1. pp. 53–87, 2004.
[3] M. Halatchev and L. Gruenwald, “Estimating missing values in related sensor data streams,” in Proceedings of the 11th International Conference on Management of Data (COMAD’05), 2005.
[4] J N. Jiang, “Discovering association rules in data streams based on closed pattern mining,” in Proceedings of the SIGMOD Workshop on Innovative Database Research, 2007.
[5] N. Jiang and L. Gruenwald, “Estimating missing data in data streams,” Advances in Databases: Concepts, Systems and Applications,pp. 981–987, 2007.
[6] N. Jiang and L. Gruenwald, “CFI-stream: mining closed frequent item sets in data streams,” in Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD ’06), pp. 592–597, August 2006.
[7] K. Loo, I. Tong, and B. Kao, “Online algorithms for mining inter-stream associations from large sensor networks,” in Advances in Knowledge Discovery and Data Mining, pp. 291–302, 2005.
[8] G. S. Manku and R. Motwani, “Approximate frequency counts over data streams,” in Proceedings of the 28th International Conference on Very Large Data Bases, pp. 346–357, 2002.
[9] S. K. Tanbeer, C. F. Ahmed, B.-S. Jeong, and Y.-K. Lee, “Efficient mining of association rules from
[10] Er. Satish Kumar, "A Study of Wireless Sensor Networks- A Review", International Journal of Computer Sciences and Engineering, Volume-04, Issue-03, Page No (23-27), Mar -2016, E-ISSN: 2347-2693
[11] K. Romer,“Distributed mining of spatiotemporal event patterns in sensor networks,” in Proceedings of the 1st Euro-American Workshop on Middleware for Sensor Networks (EAWMS ’06), 2006.
[12] A. Boukerche and S. Samarah, “A novel algorithm for mining association rules in Wireless Ad Hoc Sensor Networks,” IEEE
[13] Transactions on Parallel and Distributed Systems, vol. 19, no. 7, pp. 865–877, 2008.
[14] F. Esposito, T. M. A. Basile, N. Di Mauro, and S. Ferilli, “A relational approach to sensor network data mining,” Information Retrieval and Mining in Distributed Environments, pp. 163–181, 2010.
[15] F. Esposito, N. Di Mauro, T. M. A. Basile, and S. Ferilli,“Multi-dimensional relational sequence mining,” Fundamenta Informaticae, vol. 89, no. 1, pp. 23–43, 2008.
[16] D. J. Cook, M. Youngblood, E. O. Heierman III et al., “MavHome: an agent-based smart home,” in Proceedings of the 1st IEEE International Conference on Pervasive Computing and Communications (PerCom ’03), pp. 521–524, March 2003.
[17] J. Rabatel, S. Bringay, and P. Poncelet, “SO MAD: sensor mining for anomaly detection in railway data,” in Advances in Data Mining. Applications andTheoretical Aspects, pp. 191–205, 2009.
[18] P. H. Wu, W. C. Peng, and M. S. Chen, “Mining sequential alarm patterns in a telecommunication database,” in Databases in Telecommunications II, pp. 37–51, 2001.
[19] V. S. Tseng and E. H.-C. Lu, “Energy-efficient real-time object tracking in multi-level sensor networks by mining and predicting movement patterns,” Journal of Systems and Software, vol.82, no. 4, pp. 697–706, 2009.
[20] V. S. Tseng and K.W. Lin, “Energy efficient strategies for object tracking in sensor networks: a data mining approach,” Journal of Systems and Software, vol. 80, no. 10, pp. 1678–1698, 2007.
[21] C. Liu, K.Wu, and J. Pei, “A dynamic clustering and scheduling approach to energy saving in data collection from wireless sensor networks,” in Proceedings of the 2nd Annual IEEE Communications Society Conference on Sensor and AdHoc Communications and Networks (SECON ’05), pp. 374–385, September 2005.
[22] Tuhin Das, "A Study on Identity Based Attack Detection and Localization by the Clustering in Wireless Sensor Network", International Journal of Computer Sciences and Engineering, Volume-04, Issue-02, Page No (96-99), Feb -2016, E-ISSN: 2347-2693
[23] M. H. Yeo, M. S. Lee, S. J. Lee, and J. S. Yoo, “Data correlation based clustering in sensor networks,” in Proceedings of the International Symposium on Computer Science and its Applications (CSA ’08), pp. 332–337, October 2008.
[24] S. Yoon and C. Shahabi, “The Clustered Aggregation (CAG) technique leveraging spatial and temporal correlations in wireless sensor networks,” ACM Transactions on Sensor Networks, vol. 3, no. 1, Article ID1210672, 2007.
[25] K.Wang, S. A. Ayyash, T. D. C. Little, and P. Basu, “Attribute based clustering for information dissemination in wireless sensor networks,” in Proceedings of the 2nd Annual IEEE Communications Society Conference on Sensor and AdHoc Communications and Networks (SECON ’05), pp. 498–509, Santa Clara, Calif, USA, September 2005.
[26] B. Chikhaoui, S. Wang, and H. Pigot, “A new algorithm based on sequential pattern mining for person identification in ubiquitous environments,” in Proceedings of the 4th International Workshop on Knowledge Discovery form Sensor Data (ACM SensorKDD ’10), pp. 20–28,Washington, DC, USA, 2010.
[27] K. Sharma, M. Rajpoot, and L. K. Sharma, “Nearest neighbour classification for wireless sensor network data,” International Journal of Computer Trends and Technology, no. 2, 2011.