<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1870-9044</journal-id>
<journal-title><![CDATA[Polibits]]></journal-title>
<abbrev-journal-title><![CDATA[Polibits]]></abbrev-journal-title>
<issn>1870-9044</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Innovación y Desarrollo Tecnológico en Cómputo]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1870-90442016000200005</article-id>
<article-id pub-id-type="doi">10.17562/PB-54-1</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Filtering Compromised Environment Sensors Using Autoregressive Hidden Markov Model]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Anjum]]></surname>
<given-names><![CDATA[Bushra]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Sabharwal]]></surname>
<given-names><![CDATA[Chaman Lal]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Missouri University of Sci & Tech  ]]></institution>
<addr-line><![CDATA[Rolla MO]]></addr-line>
<country>USA</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2016</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2016</year>
</pub-date>
<numero>54</numero>
<fpage>5</fpage>
<lpage>10</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1870-90442016000200005&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1870-90442016000200005&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1870-90442016000200005&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: We propose a method based on autoregressive hidden Markov models (AR-HMM) for filtering out compromised nodes from a sensor network. We assume that sensors are healthy, self-healing and corrupted whereas each node submits a number of readings. A different AR-HMM (A, B, &#960;) is used to describe each of the three types of nodes. For each node, we train an AR-HMM based on the sensor's readings, and subsequently the B matrices of the trained AR-HMMs are clustered together into two groups: healthy and compromised (both self-healing and corrupted), which permits us to identify the group of healthy sensors. The existing algorithms are centralized and computation intensive. Our approach is a simple, decentralized model to identify compromised nodes at a low computational cost. Simulations using both synthetic and real datasets show greater than 90% accuracy in identifying healthy nodes with ten nodes datasets and as high as 97% accuracy with 500 or more nodes datasets.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Autoregressive hidden Markov models]]></kwd>
<kwd lng="en"><![CDATA[environment sensing]]></kwd>
<kwd lng="en"><![CDATA[filtering corrupted nodes]]></kwd>
<kwd lng="en"><![CDATA[sensor network]]></kwd>
<kwd lng="en"><![CDATA[clustering]]></kwd>
<kwd lng="en"><![CDATA[anomaly detection]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lawrence]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[First Hand: The Hidden Markov Model]]></source>
<year></year>
<publisher-name><![CDATA[IEEE Global History Network]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Y.T]]></given-names>
</name>
<name>
<surname><![CDATA[Bagrodia]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Com-Sen: A Detection System for Identifying Compromised Nodes in Wireless Sensor Networks]]></source>
<year>2012</year>
<conf-name><![CDATA[ SECURWARE]]></conf-name>
<conf-date>2012</conf-date>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hinds]]></surname>
<given-names><![CDATA[C.V.]]></given-names>
</name>
</person-group>
<source><![CDATA[Efficient detection of compromised nodes in wireless sensor networks]]></source>
<year>2012</year>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Song]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Alam]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Compromised Sensor Nodes Detection: A Quantitative Approach]]></source>
<year>2008</year>
<conf-name><![CDATA[ ICDCSW]]></conf-name>
<conf-date>2008</conf-date>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[A Framework for Identifying Compromised Nodes in Wireless Sensor Networks]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Yu]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Ning]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[ACM Transactions on Information and Systems Security]]></source>
<year>2008</year>
<volume>11</volume>
<numero>3</numero>
<issue>3</issue>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[An authentication scheme for locating compromised sensor nodes in WSNs]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhanga]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Yangb]]></surname>
<given-names><![CDATA[J. Jun]]></given-names>
</name>
<name>
<surname><![CDATA[Lia]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Wangc]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Jind]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of Network and Computer Applications]]></source>
<year>2010</year>
<volume>33</volume>
<numero>1</numero>
<issue>1</issue>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[The reputation evaluation based on optimized hidden Markov model in e-commerce]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Jiliu]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
</person-group>
<source><![CDATA[Mathematical Problems in Engineering]]></source>
<year>2013</year>
<volume>2013</volume>
<publisher-name><![CDATA[Hindawi]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Anjum]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Rajangam]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Perros]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Fan]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<source><![CDATA[Filtering Unfair Users: A Hidden Markov Model Approach]]></source>
<year>2015</year>
<conf-name><![CDATA[ ICISSP]]></conf-name>
<conf-date>2015</conf-date>
<conf-loc>Loire, France </conf-loc>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[A Probabilistic Distance Measure for Hidden Markov Models]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Juang]]></surname>
<given-names><![CDATA[B.H.]]></given-names>
</name>
<name>
<surname><![CDATA[Rabiner]]></surname>
<given-names><![CDATA[L.R.]]></given-names>
</name>
</person-group>
<source><![CDATA[AT&amp;T Tech. J.]]></source>
<year>1985</year>
<volume>64</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>391-408</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Mixture Autoregressive Hidden Markov Models for Speech Signals]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Juang]]></surname>
<given-names><![CDATA[B.H.]]></given-names>
</name>
<name>
<surname><![CDATA[Rabiner]]></surname>
<given-names><![CDATA[L.R.]]></given-names>
</name>
</person-group>
<source><![CDATA[IEEE Trans]]></source>
<year>1985</year>
<volume>ASSP-33</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>1404-13</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alexander]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Market Risk Analysis: Practical Financial Econometrics]]></source>
<year>2008</year>
<publisher-name><![CDATA[Wiley Books]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="">
<article-title xml:lang=""><![CDATA[Regime Switching Models]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hamilton]]></surname>
<given-names><![CDATA[J.D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Palgrave Dictionary of Economics]]></source>
<year>2005</year>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Hidden Markov processes]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ephraim]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Merhav]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<source><![CDATA[IEEE Trans. Inf. Theory]]></source>
<year>2002</year>
<volume>48</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>1518-69</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Stochastic simulation of daily precipitation, temperature, and solar radiation]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Richardson]]></surname>
<given-names><![CDATA[C.W.]]></given-names>
</name>
</person-group>
<source><![CDATA[Water Resour. Res.]]></source>
<year>1981</year>
<volume>17</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>182-90</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Perlin]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[MS Regress. The MATLAB Package for Markov Regime Switching Models]]></source>
<year>2014</year>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="">
<source><![CDATA[Intel Lab Data]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="">
<collab>UNC Greensboro</collab>
<source><![CDATA[Machine Learning Models and Algorithms for Big Data Classification]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Suthaharan]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Alzahrani]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Rajasegarar]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Leckie]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[La-belled Data Collection for Anomaly Detection in Wireless Sensor Networks]]></source>
<year>2010</year>
<conf-name><![CDATA[ SixthInternational Conference on Intelligent Sensors, Sensor Networks and Information Processing]]></conf-name>
<conf-loc>Brisbane, Australia </conf-loc>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
