Applications of Data Mining Techniques for Vehicular Ad hoc Networks

Mohammed GH. AL Zamil, Samer Samarah

Abstract


Due to the recent advances in vehicular ad hoc networks (VANETs), smart applications have been incorporating the data generated from these networks to provide quality of life services. In this paper, we have proposed taxonomy of data mining techniques that have been applied in this domain in addition to a classification of these techniques. Our contribution is to highlight the research methodologies in the literature and allow for comparing among them using different characteristics. The proposed taxonomy covers elementary data mining techniques such as: preprocessing, outlier detection, clustering, and classification of data. In addition, it covers centralized, distributed, offline, and online techniques from the literature.


Full Text:

PDF

References


Al Zamil, Mohammed GH, and Aysu Betin Can. "A model based on multi-features to enhance healthcare and medical document retrieval." Informatics for Health and Social Care 36.2 (2011): 100-115.

Zamil, Mohammed AL, and Aysu Betin Can. "Toward effective medical search engines." Health Informatics and Bioinformatics (HIBIT), 2010 5th International Symposium on. IEEE, 2010.

Al Zamil, Mohammed GH, and Aysu Betin Can. "ROLEX-SP: Rules of lexical syntactic patterns for free text categorization." Knowledge-Based Systems 24.1 (2011): 58-65.

ALZamil, Mohammed GH, Aysu Betin Can, and Nazife Baykal. A Framework for Ranking and Categorizaing Medical Documents. Diss. Middle East Technical University, 2014.

Samarah, Samer, et al. "An Efficient Activity Recognition Framework: Toward Privacy-Sensitive Health Data Sensing." IEEE Access 5 (2017): 3848-3859.

Wang, Y. Review of Vehicular Networks, from theory to practice, edited by Stephan Olariu and Michele C. Weigle. ACM SIGACT News, 2012, 43(4), pp. 25-29.

Zamil, Mohammed GH AL, and Samer Samarah. "Dynamic rough-based clustering for vehicular ad-hoc networks." International Journal of Information and Decision Sciences 7.3 (2015): 265-285.

Zamil, Mohammed GH Al, and Samer Samarah. "Dynamic event classification for intrusion and false alarm detection in vehicular ad hoc networks." International Journal of Information and Communication Technology 8.2-3 (2016): 140-164.

Al Zamil, Mohammed GH, et al. "An ODT-based abstraction for mining closed sequential temporal patterns in IoT-cloud smart homes." Cluster Computing 20.2 (2017): 1815-1829.

Al Zamil, Mohammed GH, and Samer Samarah. "The application of semantic-based classification on big data." Information and Communication Systems (ICICS), 2014 5th International Conference on. IEEE, 2014.

Samarah, Samer, Mohammed Al Zamil, and Ahmad Saifan. "Model checking based classification technique for wireless sensor networks." New Review of Information Networking 17.2 (2012): 93-107.

M. Xie, S. Han, B. Tian, and S. Parvin, “Anomaly detection in wireless sensor networks: a survey,” Journal of Network and Computer Applications, vol. 34, no. 4, pp. 1302–1325, 2011. View at Publisher • View at Google Scholar • View at Scopus

Y. Zhang, N. Meratnia, and P. Havinga, “Outlier detection techniques for wireless sensor networks: a survey,” IEEE Communications Surveys and Tutorials, vol. 12, no. 2, pp. 159–170, 2010. View at Publisher • View at Google Scholar • View at Scopus

V. Chandola, A. Banerjee, and V. Kumar, “Anomaly detection: a survey,” ACM Computing Surveys, vol. 41, no. 3, article 15, 2009

Yang, Hang, et al. "Optimizing Classification Decision Trees by Using Weighted Naïve Bayes Predictors to Reduce the Imbalanced Class Problem in Wireless Sensor Network." International Journal of Distributed Sensor Networks 2013 (2013).

B. Malhotra, I. Nikolaidis, and J. Harms, “Distributed classification of acoustic targets in wireless audio-sensor networks,” Computer Networks, vol. 52, no. 13, pp. 2582–2593, 2008

Swamy, Tata Jagannadha, Thaskani Sandhya, and Garimella Ramamurthy. "Link evaluation of uniform grid based wireless sensor networks to base station with leveling and clustering." Computer Communication and Informatics (ICCCI), 2013 International Conference on. IEEE, 2013.

B. Chikhaoui, S. Wang, and H. Pigot, “A new algorithm based on sequential pattern mining for person identification in ubiquitous environments,” in Proceedings of the 4th International Workshop on Knowledge Discovery form Sensor Data (ACM SensorKDD '10), pp. 20–28, Washington, DC, USA, 2010.

R. Agrawal and R. Srikant, “Mining sequential patterns,” in Proceedings of the IEEE 11th International Conference on Data Engineering, pp. 3–14, March 1995

J. R. M. Bauchet, S. Giroux, H. Pigot, et al., “Pervasive assistance in smart homes for people with intellectual disabilities: a case study on meal preparation,” International Journal of Assistive Robotics and Mechatronics, vol. 9, no. 4, pp. 42–54, 2008.

D. J. Cook and M. Schmitter-Edgecombe, “Assessing the quality of activities in a smart environment,” Methods of Information in Medicine, vol. 48, no. 5, pp. 480–485, 2009

I. H. Witten and E. Frank, Data Mining: Practical Machine Learning Tools and Techniques With Java Implementation, Morgan Kaufmann, 2000.

K. Sharma, M. Rajpoot, and L. K. Sharma, “Nearest neighbour classification for wireless sensor network data,” International Journal of Computer Trends and Technology, no. 2, 2011.

Alsmadi, Izzat, et al. "Automatic model based methods to improve test effectiveness." Universal Journal of Computer Science and Engineering Technology 1.1 (2010): 41-49.

Al-Shawakfa, Emad, and Mohammed Al Zamil. "Optimizing STRIPS Algorithm using AI Planning." ABHATH AL-YARMOUK (2008): 333.

Kanaan, Ghassan, et al. "Comparison between ad-hoc retrieval and filtering retrieval using arabic documents." International Journal of Computer Processing of Oriental Languages 17.03 (2004): 181-199.

Zamil, Mohammed GH I. AL, and Eman AL Momani. "The Impact of Rate of Change on Object Oriented Paradigm." International Journal of Software Engineering and Its Applications 7.5: 25-38.

Zamil, Mohammed GH Al. "A verifiable framework for smart sensory systems." International Journal of Embedded Systems 9.5 (2017): 413-425.

Zamil, Mohammed GH AL. "Verifying smart sensory systems on cloud computing frameworks." Procedia Computer Science 52 (2015): 1126-1132.

Gh Al Zamil, Mohammed, and Samer Samarah. "Application of design for verification to smart sensory systems." Qatar Foundation Annual Research Conference. No. 1. 2014.

Al Zamil, Mohammed Gh, et al. "An Annotation Technique for In-Home Smart Monitoring Environments." IEEE Access 6 (2018): 1471-1479.

Rawashdeh, Majdi, et al. "A knowledge-driven approach for activity recognition in smart homes based on activity profiling." Future Generation Computer Systems (2017). https://doi.org/10.1016/j.future.2017.10.031.

Zuhairy, Ruwaida M., and Mohammed GH Al Zamil. "Energy-efficient load balancing in wireless sensor network: An application of multinomial regression analysis." International Journal of Distributed Sensor Networks 14.3 (2018): 1550147718764641.

Mahmood, Azhar, et al. "Data Mining Techniques for Wireless Sensor Networks: A Survey." International Journal of Distributed Sensor Networks 2013 (2013).

Han, Jiawei, Micheline Kamber, and Jian Pei. Data mining: concepts and techniques. Morgan kaufmann, 2006.

Riley, Marshall, Kemal Akkaya, and Kenny Fong. "Group‐based hybrid authentication scheme for cooperative collision warnings in VANETs." Security and Communication Networks 4.12 (2011): 1469-1482.

Zhang, Yang, Jing Zhao, and Guohong Cao. "Roadcast: a popularity aware content sharing scheme in vanets." ACM SIGMOBILE Mobile Computing and Communications Review 13.4 (2010): 1-14.

Sha, Kewei, Shinan Wang, and Weisong Shi. "RD4: role-differentiated cooperative deceptive data detection and filtering in VANETs." IEEE Transactions on Vehicular Technology 59.3 (2010): 1183.

Zamil, M. Al, et al. "Dispersion–based prediction framework for estimating missing values in wireless sensor networks." International Journal of Sensor Networks 12.3 (2012): 149-159.

Jiang, Nan, and Le Gruenwald. "Estimating missing data in data streams." Advances in Databases: Concepts, Systems and Applications. Springer Berlin Heidelberg, 2007. 981-987.

Li, Yingshu, et al. "Data estimation in sensor networks using physical and statistical methodologies." Distributed Computing Systems, 2008. ICDCS'08. The 28th International Conference on. IEEE, 2008.

Zhang, Haotian, José MF Moura, and Bruce Krogh. "Estimation in sensor networks: A graph approach." Proceedings of the 4th international symposium on Information processing in sensor networks. IEEE Press, 2005.

Othman, Leila Ben, and Sadok Ben Yahia. "Yet another approach for completing missing values." Concept Lattices and Their Applications. Springer Berlin Heidelberg, 2008. 155-169.

Liqiang, Pan, and Li Jianzhong. "A Multiple-Regression-Model-Based Missing Values Imputation Algorithm in Wireless Sensor Network." Journal of Computer Research and Development 46.12 (2009): 2101-2110.

Wang, Xinjing, et al. "A novel data broadcast strategy for traffic information query in the VANETs." Web-Age Information Management. Springer Berlin Heidelberg, 2013. 453-464.

Wu, Jun, and Luo Zhong. "A New Data Aggregation Model for Intelligent Transportation System." Advanced Materials Research 671 (2013): 2855-2859.

Mousannif, Hajar, Ismail Khalil, and Stephan Olariu. "Cooperation as a service in VANET: implementation and simulation results." Mobile Information Systems 8.2 (2012): 153-172.

Song, Lu, Qingtong Han, and Jianwei Liu. "Investigate key management and authentication models in VANETs." Electronics, Communications and Control (ICECC), 2011 International Conference on. IEEE, 2011.

Yu, Bo, Cheng-Zhong Xu, and Minyi Guo. "Adaptive forwarding delay control for VANET data aggregation." Parallel and Distributed Systems, IEEE Transactions on 23.1 (2012): 11-18.

Li, Lingzhi, et al. "MCNC: Data Aggregation and Dissemination in Vehicular Ad hoc Networks Using Multicast Network Coding." International Journal of Distributed Sensor Networks 2013 (2013).

Sun, Lin, et al. "Data Aggregation and Information Type in Road Probing." Internet of Things. Springer Berlin Heidelberg, 2012. 529-534.

Mohanty, Sagarika, and Debasish Jena. "Secure Data Aggregation in Vehicular-Adhoc Networks: A Survey." Procedia Technology 6 (2012): 922-929.

P. W. Yau and C. J. Mitchell, "Security Vulnerabilities in Ad hoc Networks", Proceedings of the 7th International Symposium on Communication Theory and Applications , pp. 99–104, 2003.

Y. Zhang and W. Lee, “Intrusion Detection in Wireless Ad-hoc Networks”, in Proceedings of the 6th Annual international Conference on Mobile Computing and Networking (MOBICOM00) , Boston, MA, USA, pp. 275-283, 2000.

H. Deng, Q. Zeng, and D. P. Agrawal, “SVM-based Intrusion Detection System for Wireless Ad Hoc Networks”, in Proceedings of the IEEE VTC03 , vol. 3, pp. 2147–2151, Orlando, FL, USA, 2003.

O.Kachirski and R. Guha, “Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks”, in Proceedings of the IEEE Workshop on Knowledge Media Networking , pp. 153–158, Kyoto, Japan, 2002.

C. Tseng, P. Balasubramanyam, C. Ko, R. Limprasittiporn, J. Rowe, and K. Levitt, “A Specification-based Intrusion Detection System for AODV”, in Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks(SASN03) , Fairfax, VA, USA, pp. 125–134, 2003.

Huang, Yi-an, and Wenke Lee. "A cooperative intrusion detection system for ad hoc networks." Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks. ACM, 2003.

S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks”, in Proceedings of the 6th Annual international Conference on Mobile Computing and Networking (MOBICOM00) , Boston, MA, USA, pp. 255-265, 2000.

M. Kefayati, H. R. Rabiee, S. G. Miremadi, and A. Khonsari, “Misbehavior Resilient Multi-path Data Transmission in Mobile Ad-hoc Networks”, in Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN06), Alexandria, VA, USA, pp. 91-100, 2006.

Y. Xue and K. Nahrstedt, “Providing Fault-Tolerant Ad hoc Routing Service in Adversarial Environments”, Wireless Personal Communication, vol. 29, issue 3-4, pp. 367-388, 2004.

L. Anderegg and S. Eidenbenz, “Ad hoc-VCG: A Truthful and Cost-efficient Routing Protocol for Mobile Ad Hoc Networks with Selfish Agents”, in Proceedings of the 9th Annual international Conference on Mobile Computing and Networking (MOBICOM03), San Diego, CA, USA, pp. 245-259, 2003.

M. Raya, P. Papadimitratos, V.D. Gligor, J.-P. Hubaux, “On data-centric trust establishment in ephemeral ad hoc networks”, in Proceedings of 27th IEEE Conference on Computer Communication (INFOCOM2008), Phoenix, AZ, USA, pp. 1238-1246, 2008.

T. M. Chen and V. Venkataramanan, “Dempster-Shafer theory for intrusion detection in ad hoc networks”, IEEE Internet Computing , 9(6):35–41, Nov.– Dec. 2005.

W. Li, J. Parker and A. Joshi, “Security through Collaboration in MANETs”, in Proceedings of the 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), Orlando, FL, USA, Nov 2008

D.Tulone, S. Madden, "PAQ: time series forecasting for approximate query answering in sensor networks", 3rd European Conference on Wireless Sensor Networks ,2008

Wei, Yu-Chih, and Yi-Ming Chen. "An Efficient Trust Management System for Balancing the Safety and Location Privacy in VANETs." Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. IEEE, 2012.

Wei, Yu-Chih, and Yi-Ming Chen. "Efficient Self-organized Trust Management in Location Privacy Enhanced VANETs." Information Security Applications. Springer Berlin Heidelberg, 2012. 328-344.

A. Taherkordi, R. Mohammadi, and F. Eliassen, “A communication-efficient distributed clustering algorithm for sensor networks,” in Proceedings of the 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia (AINA '08), pp. 634–638, March 2008

L. Guo, C. Ai, X. Wang, Z. Cai, and Y. Li, “Real time clustering of sensory data in wireless sensor networks,” in Proceedings of the IEEE 28th International Performance Computing and Communications Conference (IPCCC '09), pp. 33–40, December 2009

C. Liu, K. Wu, and J. Pei, “A dynamic clustering and scheduling approach to energy saving in data collection from wireless sensor networks,” in Proceedings of the 2nd Annual IEEE Communications Society Conference on Sensor and AdHoc Communications and Networks (SECON '05), pp. 374–385, September 2005

W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient communication protocol for wireless microsensor networks,” in Proceedings of the 33rd Annual Hawaii International Conference on System Siences (HICSS '00), vol. 2, p. 223, January 2000

O. Younis and S. Fahmy, “HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks,” IEEE Transactions on Mobile Computing, vol. 3, no. 4, pp. 366–379, 2004

Li, Jason H., Renato Levy, and Anna Teittinen. "A mobility-resistant efficient clustering approach for ad hoc and sensor networks." ACM SIGMOBILE Mobile Computing and Communications Review 10.2 (2006): 1-12.

P. Beyens, A. Nowé, and K. Steenhaut, “High-density wireless sensor networks: a new clustering approach for prediction-based monitoring,” in Proceedings of the 2nd European Workshop on Wireless Sensor Networks (EWSN '05), pp. 188–196, February 2005.

M. H. Yeo, M. S. Lee, S. J. Lee, and J. S. Yoo, “Data correlation-based clustering in sensor networks,” in Proceedings of the International Symposium on Computer Science and its Applications (CSA '08), pp. 332–337, October 2008

S. Yoon and C. Shahabi, “The Clustered AGgregation (CAG) technique leveraging spatial and temporal correlations in wireless sensor networks,” ACM Transactions on Sensor Networks, vol. 3, no. 1, Article ID 1210672, 2007

K. Wang, S. A. Ayyash, T. D. C. Little, and P. Basu, “Attribute-based clustering for information dissemination in wireless sensor networks,” in Proceedings of the 2nd Annual IEEE Communications Society Conference on Sensor and AdHoc Communications and Networks (SECON '05), pp. 498–509, Santa Clara, Calif, USA, September 2005.

X. Ma, S. Li, Q. Luo, et al., “Distributed, hierarchical clustering and summarization in sensor networks,” in Advances in Data and Web Management, pp. 168–175, 2007

L. K. Sharma, O. P. Vyas, S. Schieder, et al., “Nearest neighbour classification for trajectory data,” Information and Communication Technologies, vol. 101, pp. 180–185, 2010

M. J. Akhlaghinia, A. Lotfi, C. Langensiepen, and N. Sherkat, “A fuzzy predictor model for the occupancy prediction of an intelligent inhabited environment,” in Proceedings of the IEEE International Conference on Fuzzy Systems (FUZZ '08), pp. 939–946, June 2008. View at Publisher • View at Google Scholar • View at Scopus

M. Gaber, S. Krishnaswamy, and A. Zaslavsky, “On-board mining of data streams in sensor networks,” in Advanced Methods for Knowledge Discovery from Complex Data, pp. 307–335, 2005

S. M. McConnell and D. B. Skillicorn, “A distributed approach for prediction in sensor networks,” in Proceedings of the Workshop on Data Mining in Sensor Networks, Newport Beach, Calif, USA, 2005.

K. Flouri, B. Beferull-Lozano, and T. Tsakalides, “Distributed consensus algorithms for SVM training in wireless sensor networks,” in Proceedings of the 16th European Signal Processing Conference (EUSIPCO '09), 2008.




DOI: http://dx.doi.org/10.24294/csma.v0i0.685

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

Creative Commons License

This site is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.