Sensor data validation and abnormal behavior detection in the Internet of Things

作者: Hunor Sándor , Béla Genge , Zoltán Szántó

DOI: 10.1109/ROEDUNET.2017.8123740

关键词:

摘要: Internet of Things (IoT) and its various application domains are radically changing the lives people, providing smart services which will ultimately constitute integral components living environment. The IoT operate based on data flows collected from different sensors actuators. In this respect, correctness security sensor transported over system is a crucial factor in ensuring correct functioning services. work, we present method that can detect abnormal events “apriori” knowledge behavior monitored process. main advantage proposed methodology it builds well-established theoretical works, while delivering practical technique with low computational requirements. As result, developed be hosted an system. approach evaluated through real-world use-cases.

参考文章(21)
Ismail Butun, Burak Kantarci, Melike Erol-Kantarci, Anomaly detection and privacy preservation in cloud-centric Internet of Things 2015 IEEE International Conference on Communication Workshop (ICCW). pp. 2610- 2615 ,(2015) , 10.1109/ICCW.2015.7247572
Istvan Kiss, Bela Genge, Piroska Haller, A clustering-based approach to detect cyber attacks in process control systems international conference on industrial informatics. pp. 142- 148 ,(2015) , 10.1109/INDIN.2015.7281725
U. A. B. U. A. Bakar, Hemant Ghayvat, S. F. Hasanm, S. C. Mukhopadhyay, Activity and Anomaly Detection in Smart Home: A Survey Smart Sensors, Measurement and Instrumentation. pp. 191- 220 ,(2016) , 10.1007/978-3-319-21671-3_9
Christof Störmann, Jan Kästner, Patrick Düssel, Christian Gehl, Pavel Laskov, Jens-Uwe Bußer, Cyber-Critical Infrastructure Protection Using Real-Time Payload-Based Anomaly Detection Critical Information Infrastructures Security. ,vol. 6027, pp. 85- 97 ,(2010) , 10.1007/978-3-642-14379-3_8
Hunor Sandor, Bela Genge, Gheorghe Sebestyen-Pal, Resilience in the Internet of Things: The Software Defined Networking approach international conference on intelligent computer communication and processing. pp. 545- 552 ,(2015) , 10.1109/ICCP.2015.7312717
Nauman Javed, Tilman Wolf, Automated Sensor Verification Using Outlier Detection in the Internet of Things international conference on distributed computing systems workshops. pp. 291- 296 ,(2012) , 10.1109/ICDCSW.2012.78
Shahid Raza, Linus Wallgren, Thiemo Voigt, SVELTE: Real-time intrusion detection in the Internet of Things ad hoc networks. ,vol. 11, pp. 2661- 2674 ,(2013) , 10.1016/J.ADHOC.2013.04.014
Yuan Jie Fan, Yue Hong Yin, Li Da Xu, Yan Zeng, Fan Wu, IoT-Based Smart Rehabilitation System IEEE Transactions on Industrial Informatics. ,vol. 10, pp. 1568- 1577 ,(2014) , 10.1109/TII.2014.2302583
Kai Zhao, Lina Ge, A Survey on the Internet of Things Security computational intelligence and security. pp. 663- 667 ,(2013) , 10.1109/CIS.2013.145
Eleonora Borgia, The Internet of Things vision: Key features, applications and open issues Computer Communications. ,vol. 54, pp. 1- 31 ,(2014) , 10.1016/J.COMCOM.2014.09.008