Non-parametric sequence-based learning approach for outlier detection in IoT

Published on Nov 1, 2017in Future Generation Computer Systems6.125
路 DOI :10.1016/J.FUTURE.2017.11.021
Nashreen Nesa5
Estimated H-index: 5
(Indian Institute of Engineering Science and Technology, Shibpur),
Tania Ghosh3
Estimated H-index: 3
(Indian Institute of Engineering Science and Technology, Shibpur),
Indrajit Banerjee18
Estimated H-index: 18
(Indian Institute of Engineering Science and Technology, Shibpur)
Sources
Abstract
Abstract Although study on outlier detection techniques has long been an area of much research, few of those works relate to an Internet of Things (IoT) environment. In the last few years, with the advent of IoT and its numerous smart objects, data generated from sensors have increased exponentially. Since on the basis of these data many critical decisions are taken, it is therefore necessary to absolutely ensure its accuracy, correctness and integrity before any processing starts. Most algorithms in the past assumes outliers to be always an Error, that is caused by a malfunctioning sensor. However, this is not always true because an outlier could also be an important event that should not be neglected. This stresses the need to devise algorithms that is suited for an IoT environment which considers both Error, that is a result of faulty sensors or an Event, which is an indication of an abnormal phenomenon. This paper proposes a sequence based learning approach for outlier detection that works for both Error and Event. Simulations are performed on few benchmark datasets, a medical dataset and a real world dataset obtained through an experimental test bed. The results reveal exceptionally high accuracies with up to 99.65% for Error detection and 98.53% for Event detection.
馃摉 Papers frequently viewed together
2017
References21
Newest
#1Vikram Narayandas (Maturi Venkata Subba Rao Engineering College)H-Index: 1
This chapter presents the development of anomaly detection system (ADS) for locating a malicious node in a cluster based Manet. ADS makes use of AODV protocol that performs route discovery and data forwarding. Each node responds to root request (RREQ) messages and sends root reply (RREP) messages back to the source node. In a cluster based topology a threshold is applied to see if this root reply number is more than the threshold value. If so the node is malicious. Then each node sends an alert ...
Source
#1Sahar Kamal (El Shorouk Academy)H-Index: 1
#2Rabie A. Ramadan (Cairo University)H-Index: 13
Last. Fawzy EL-Refai (Al-Azhar University)H-Index: 1
view all 3 authors...
Data sets collected from wireless sensor networks (WSN) are usually considered unreliable and subject to errors due to limited sensor capabilities and hard environmental resulting in a subset of the sensors data called outlier data. This paper proposes a technique to detect outlier data base on spatial-temporal similarity among data collected by geographically distributed sensors. The proposed technique is able to identify an abnormal subset of data collected by sensor node as outlier data. More...
Source
#1Fabrizio Angiulli (University of Calabria)H-Index: 19
#2Fabio Fassetti (University of Calabria)H-Index: 12
We present a novel definition of outlier whose aim is to embed an available domain knowledge in the process of discovering outliers. Specifically, given a background knowledge, encoded by means of a set of first-order rules, and a set of positive and negative examples, our approach aims at singling out the examples showing abnormal behavior. The technique here proposed is unsupervised, since there are no examples of normal or abnormal behavior, even if it has connections with supervised learning...
Source
#1Shancang Li (UoB: University of Bristol)H-Index: 26
#2George Oikonomou (UoB: University of Bristol)H-Index: 21
Last. Li Da XuH-Index: 73
view all 5 authors...
In a service-oriented Internet of things (IoT) deployment, it is difficult to make consensus decisions for services at different IoT edge nodes where available information might be insufficient or overloaded. Existing statistical methods attempt to resolve the inconsistency, which requires adequate information to make decisions. Distributed consensus decision making (CDM) methods can provide an efficient and reliable means of synthesizing information by using a wider range of information than ex...
Source
Large variation in electrocardiogram (ECG) waveforms continues to present challenges in defining R-wave locations in ECG signals. This research presents a procedure to extract the R-wave locations by forward-backward (FB) algorithm and classify the arrhythmic beat conditions by using RR intervals. The FB algorithm shows forward and backward searching rules from QRS onset and eliminates lower-amplitude signals near the baseline using a statistical process control concept. The proposed algorithm w...
Source
#1Asmaa Fawzy (Northern Borders University)H-Index: 1
#2Hoda M. O. Mokhtar (Cairo University)H-Index: 7
Last. Osman Hegazy (Cairo University)H-Index: 8
view all 3 authors...
Abstract In the past few years, many wireless sensor networks had been deployed in the real world to collect large amounts of raw sensed data. However, the key challenge is to extract high-level knowledge from such raw data. In the applications of sensor networks, outlier/anomaly detection has been paid more and more attention. Outlier detection can be used to filter noisy data, find faulty nodes, and discover interesting events. In this paper we propose a novel in-network knowledge discovery ap...
Source
#1Charu C. AggarwalH-Index: 107
With the increasing advances in hardware technology for data collection, and advances in software technology (databases) for data organization, computer scientists have increasingly participated in the latest advancements of the outlier analysis field. Computer scientists, specifically, approach this field based on their practical experiences in managing large amounts of data, and with far fewer assumptions the data can be of any type, structured or unstructured, and may be extremely large. Outl...
Jan 1, 2013 in ADHOCNETS (Ad Hoc Networks)
#1Aikaterini Mitrokotsa (EPFL: 脡cole Polytechnique F茅d茅rale de Lausanne)H-Index: 22
#2Christos Dimitrakakis (EPFL: 脡cole Polytechnique F茅d茅rale de Lausanne)H-Index: 22
Intrusion detection is frequently used as a second line of defense in Mobile Ad-hoc Networks (MANETs). In this paper we examine how to properly use classification methods in intrusion detection for MANETs. In order to do so we evaluate five supervised classification algorithms for intrusion detection on a number of metrics. We measure their performance on a dataset, described in this paper, which includes varied traffic conditions and mobility patterns for multiple attacks. One of our goals is t...
Source
#2Natarajan Jaisankar (College of Engineering, Guindy)H-Index: 7
Recently, many Intrusion Detection Systems (IDS) have been proposed to detect and report about malicious nodes in Mobile Ad Hoc Networks (MANETs) by using various outlier detection algorithms. All these algorithms have limitations in terms of accuracy and speed. In this paper, we propose a new outlier detection algorithm called Weighted Distance Based Outlier Detection (WDBOD) algorithm to detect the intruders in wireless environment. The experimental results show that the proposed algorithm imp...
Source
#1Yang Zhang (UT: University of Twente)H-Index: 8
#2Nirvana Meratnia (UT: University of Twente)H-Index: 26
Last. Paul J.M. Havinga (UT: University of Twente)H-Index: 59
view all 3 authors...
In the field of wireless sensor networks, those measurements that significantly deviate from the normal pattern of sensed data are considered as outliers. The potential sources of outliers include noise and errors, events, and malicious attacks on the network. Traditional outlier detection techniques are not directly applicable to wireless sensor networks due to the nature of sensor data and specific requirements and limitations of the wireless sensor networks. This survey provides a comprehensi...
Source
Cited By21
Newest
#1Yang Fei (PLA Information Engineering University)
#2Yixin Hua (PLA Information Engineering University)
Last. Teng Fei (WHU: Wuhan University)H-Index: 17
view all 6 authors...
Abstract null null Urban sensors are an important part of urban infrastructures and are usually heterogeneous. Urban sensors with different uses vary greatly in hardware structure, communication protocols, data formats, interaction modes, sampling frequencies, data accuracy and service quality, thus posing an enormous challenge to the unified integration and sharing of massive sensor information resources. Consequently, access and data management methods for these multisource heterogeneous urban...
Source
#1Zhong-Yang Xiong (Chongqing University)H-Index: 5
#2Gao Qinqin (Chongqing University)
Last. Min Zhang (Chongqing University)
view all 6 authors...
Outlier detection is of vital importance in data mining tasks, with numerous applications, including video surveillance and credit card fraud detection. Quite a few outlier detection algorithms have been developed and have received considerable attention, and most existing methods are classified as distance-based algorithms and density-based algorithms. However, both of these approaches have some flaws. The former has difficulty detecting local outliers, and the latter cannot handle low-density ...
Source
#1Fengxian GuoH-Index: 8
#2F. Richard YuH-Index: 82
Last. Victor C. M. LeungH-Index: 103
view all 6 authors...
Nowadays, many disruptive Internet of things (IoT) applications emerge, such as augmented/virtual reality (AR/VR) online games, autonomous driving, and smart everything, which are massive in number, data-intensive, computation-intensive, and delay-sensitive. Due to the mismatch between the fifth generation (5G) and the requirements of such massive IoT-enabled applications, there is a need for technological advancements and evolutions for wireless communications and networking toward the sixth ge...
Source
Source
#1Chang Jie (EPRI: Electric Power Research Institute)H-Index: 1
#2Xiaojun Zuo (EPRI: Electric Power Research Institute)H-Index: 1
Last. Guanghua Zhang (HEBUST: Hebei University of Science and Technology)H-Index: 1
view all 5 authors...
This paper analyzes the current real-time monitoring system based on grey-related IoT security sensors for the detection of risk factors in the production environment of the Internet of Things and proposes a design plan for the Internet of Things environment monitoring based on the grey-related Internet of Things security sensor network, and according to the reliability guarantee mechanism of the system, a three-dimensional uniform IoT node deployment method suitable for IoT security monitoring ...
Source
Although research on outlier detection methods has been an investigation area for long, few of those studies relate to an Internet of Things (IoT) domain. Several critical decisions taken on daily business operations depend on various data collected over time. Therefore, it is mandatory to guarantee its correctness, integrity, and accuracy before any further processing can commence. Outliers are often assumed to be Error by most algorithms in the past, which is always attributed to faulty sensor...
Source
#1Asma BelhadiH-Index: 13
#2Youcef Djenouri (SINTEF)H-Index: 20
Last. Jerry Chun-Wei LinH-Index: 35
view all 4 authors...
This paper introduces a secure and scalable intelligent transportation and human behavior system to accurately discover knowledge from urban traffic data. The data are secured using blockchain learning technology, where the scalability is ensured by a threaded GPU. In addition, different optimizations are provided to efficiently process data on the GPU. A reinforcement deep learning algorithm is also established to merge local knowledge discovered on each site into global knowledge. To demonstra...
Source
#7Claudio Savaglio (University of Calabria)H-Index: 23
#9Giancarlo Fortino (University of Calabria)H-Index: 65
Abstract The investigation of anomalies is an important element in many scientific research fields. In recent years, this activity has been also extended to social networking and social internetworking, where different networks interact with each other. In these research fields, we have recently witnessed an important evolution because, beside networks of people, networks of things are becoming increasingly common. IoT and Multiple IoT scenarios are thus more and more studied. This paper represe...
Source
Source
#1A. A. Zaidan (UPSI: Sultan Idris University of Education)H-Index: 57
#2B. B. Zaidan (UPSI: Sultan Idris University of Education)H-Index: 58
Last. M. Y. Qahtan (UPSI: Sultan Idris University of Education)H-Index: 3
view all 6 authors...
This study aimed to develop a new methodology for evaluating and benchmarking a multi-agent learning neural network and Bayesian model for real-time skin detectors based on Internet of things (IoT) by using multi-criteria decision-making (MCDM). The novelty of this work is in the use of an evaluation matrix for the performance evaluation of real-time skin detectors that are based on IoT. Nevertheless, an issue with the performance evaluation of real-time skin detector approaches is the determina...
Source
This website uses cookies.
We use cookies to improve your online experience. By continuing to use our website we assume you agree to the placement of these cookies.
To learn more, you can find in our Privacy Policy.