Anomaly Detection in Social-Aware IoT Networks

被引:5
作者
Tang, Jine [1 ]
Qin, Taishan [1 ]
Kong, Deliang [1 ]
Zhou, Zhangbing [2 ,3 ]
Li, Xiaocui [2 ]
Wu, Yongdong [4 ,5 ]
Gu, Junhua [1 ,6 ]
机构
[1] Hebei Univ Technol, Sch Artificial Intelligence, Tianjin 300401, Peoples R China
[2] China Univ Geosci, Sch Informat Engn, Beijing 100083, Peoples R China
[3] TELECOM SudParis, Comp Sci Dept, F-91000 Evry, France
[4] Jinan Univ, Sch Informat Sci & Technol, Guangzhou 510632, Guangdong, Peoples R China
[5] Wuhan Univ, Sch Comp Sci, Wuhan 430072, Peoples R China
[6] Hebei Univ Technol, Hebei Prov Key Lab Big Data Calculat, Tianjin 300401, Peoples R China
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2023年 / 20卷 / 03期
基金
中国国家自然科学基金;
关键词
Anomaly detection; Internet of Things; aggregation behavior comparison detection; social behavior correlation detection; spatial index tree; WIRELESS SENSOR NETWORKS; INTERNET; THINGS; MODEL; EDGE;
D O I
10.1109/TNSM.2023.3242320
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anomaly event coverage is usually related to several attributes, among which the primary attribute dominates at the time of improving detection efficiency. In the case of Internet of Things (IoT) devices with complex social-aware relationships, IoT nodes with primary attributes should cooperate with each other through their social-aware interactions, to detect potential event anomalies and further determine the coverage of such anomalies. Existing research has put a lot of effort into designing IoT detection frameworks to discover anomalous sensor data, rarely caring about the social-aware interactions. This paper targets this important efficiency problem, and develops a novel anomaly detection mechanism in collaborative social-edge-cloud architecture. The focus of it is to first construct a vector space based Aggregation Behavior Comparison Detection Model, and quantify the change of monitoring behavior by defining the clustering threshold of vector space. This can quickly judge whether a local social network is abnormal and speed up the abnormal detection rate. If it is, a Social Behavior Correlation Detection Model is further designed based on the correlation of primary attributes derived from the dominating social-aware interaction behavior captured by (primary) edge nodes. This strategy can help detect specific "abnormal" areas managed by one or more edge devices with higher accuracy. In the process of anomaly detection, we also propose a spatial index tree to store the information of IoT nodes, so as to effectively collect and route the perceived data of IoT nodes for anomaly analysis. Experimental results demonstrate that our anomaly detection method promotes the detection efficiency and accuracy in comparison with the state of art's techniques.
引用
收藏
页码:3162 / 3176
页数:15
相关论文
共 43 条
[1]  
[Anonymous], 2013, P 2 ACM SIGSPATIAL I, DOI [10.1145/2534921, DOI 10.1145/2534921]
[2]   Smart Audio Sensors in the Internet of Things Edge for Anomaly Detection [J].
Antonini, Mattia ;
Vecchio, Massimo ;
Antonelli, Fabio ;
Ducange, Pietro ;
Perera, Charith .
IEEE ACCESS, 2018, 6 :67594-67610
[3]   Efficient Processing of Spatial Group Keyword Queries [J].
Cao, Xin ;
Cong, Gao ;
Guo, Tao ;
Jensen, Christian S. ;
Ooi, Beng Chin .
ACM TRANSACTIONS ON DATABASE SYSTEMS, 2015, 40 (02)
[4]  
Cho Eunjoon, 2011, P 17 ACM SIGKDD INT, P1082
[5]   Batch Processing of Top-k Spatial-Textual Queries [J].
Choudhury, Farhana M. ;
Culpepper, J. Shane ;
Bao, Zhifeng ;
Sellis, Timos .
ACM TRANSACTIONS ON SPATIAL ALGORITHMS AND SYSTEMS, 2018, 3 (04)
[6]  
Chung J., 2017, P INT C ADV IM PROC, P201
[7]  
db.csail.mit, 2004, Intel lab data
[8]   An Intelligent Outlier Detection Method With One Class Support Tucker Machine and Genetic Algorithm Toward Big Sensor Data in Internet of Things [J].
Deng, Xiaowu ;
Jiang, Peng ;
Peng, Xiaoning ;
Mi, Chunqiao .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2019, 66 (06) :4672-4683
[9]  
Förster A, 2010, L N INST COMP SCI SO, V28, P49
[10]   iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments [J].
Gupta, Harshit ;
Dastjerdi, Amir Vahid ;
Ghosh, Soumya K. ;
Buyya, Rajkumar .
SOFTWARE-PRACTICE & EXPERIENCE, 2017, 47 (09) :1275-1296