Low-Latency Dimensional Expansion and Anomaly Detection Empowered Secure IoT Network

被引:2
|
作者
Shao, Wenhao [1 ]
Wei, Yanyan [2 ]
Rajapaksha, Praboda [3 ]
Li, Dun [4 ]
Luo, Zhigang
Crespi, Noel [3 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha 410073, Peoples R China
[2] Zhengzhou Inst Finance & Econ, Stat & Big Data Coll, Zhengzhou 450044, Peoples R China
[3] Inst Polytech Paris, Telecom SudParis, F-91120 Palaiseau, France
[4] Shanghai Maritime Univ, Coll Informat Engn, Shanghai 201308, Peoples R China
关键词
Internet of Things; system security; sensor devices; anomaly detection; bloom filter; INTRUSION DETECTION; BIG DATA; ALGORITHM; JOHNSON;
D O I
10.1109/TNSM.2023.3246798
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) consists of a myriad of smart devices and offers tremendous innovation opportunities in industry, homes, and businesses to enhance the productivity and the quality of life. However, ecosystem of infrastructures and the services associated with IoT devices have introduced a new set of vulnerabilities and threats, resulting in abnormal values of information collected by sensors, jeopardizing system security. To secure sensor networks, it must be possible to detect such anomalies or sequences of patterns in IoT devices that significantly deviate from normal behavior. To perform this task, this paper proposes a real-time streaming anomaly detection method based on a Bloom filter combined with hashing. This method expands the data dimensions through a hashing algorithm, and then adopts competitive learning (Winner-Take-All) to build a multi-layer Bloom Filter anomaly detection model. The feasibility of the proposed algorithm is verified theoretically using two datasets, KDD (to detect anomalies at the TCP/IP network level) and Credit (to detect anomalies during credit card transactions). The simulation results show that the proposed in this paper can effectively identify anomalies in the simulation data streams, with almost 9% accuracy for both datasets.
引用
收藏
页码:3865 / 3879
页数:15
相关论文
共 50 条
  • [31] The design and implementation of a low-latency on-chip network
    Mullins, Robert
    West, Andrew
    Moore, Simon
    ASP-DAC 2006: 11TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, PROCEEDINGS, 2006, : 164 - 169
  • [32] Special Issue on Low-Latency High-Reliability Communications for the IoT
    Ma, Zheng
    Xiao, Ming
    Xiao, Yue
    Pang, Zhibo
    Poor, H. Vincent
    Vucetic, Branka
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) : 7811 - 7815
  • [33] Optimal circulant graphs as low-latency network topologies
    Xiaolong Huang
    Alexandre F. Ramos
    Yuefan Deng
    The Journal of Supercomputing, 2022, 78 : 13491 - 13510
  • [34] Offloading Optimization for Low-Latency Secure Mobile Edge Computing Systems
    Zhou, Yi
    Yeoh, Phee Lep
    Pan, Cunhua
    Wang, Kezhi
    Elkashlan, Maged
    Wang, Zhongfeng
    Vucetic, Branka
    Li, Yonghui
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2020, 9 (04) : 480 - 484
  • [35] A Low-latency Secure Data Outsourcing Scheme for Cloud-WSN
    Li, Jing
    Guan, Zhitao
    Du, Xiaojiang
    Zhang, Zijian
    Zhou, Zhenyu
    2017 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2017,
  • [36] Low-Latency Routing Scheme for a Fronthaul Bridged Network
    Nakayama, Yu
    Hisano, Daisuke
    Kubo, Takahiro
    Fukada, Youichi
    Terada, Jun
    Otaka, Akihiro
    JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING, 2018, 10 (01) : 14 - 23
  • [37] Achieving Ultrareliable and Low-Latency Communications in IoT by FD-SCMA
    Zeng, Jie
    Lv, Tiejun
    Lin, Zhipeng
    Liu, Ren Ping
    Mei, Jiajia
    Ni, Wei
    Guo, Y. Jay
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (01) : 363 - 378
  • [38] Transparent Low-Latency Network Anonymisation for Mobile Devices
    Byrenheid, Martin
    Koepsell, Stefan
    Naumenko, Alexander
    Strufe, Thorsten
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT I, 2018, 254 : 193 - 209
  • [39] SCARF - A Low-Latency Block Cipher for Secure Cache-Randomization
    Canale, Federico
    Gueneysu, Tim
    Leander, Gregor
    Thoma, Jan Philipp
    Todo, Yosuke
    Ueno, Rei
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 1937 - 1954
  • [40] Analysing and Learning Low-Latency Network Coding Schemes
    Latzko, Vincent
    Vielhaus, Christian
    Mehrabi, Mahshid
    Fitzek, Frank H. P.
    2023 19TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, WIMOB, 2023, : 175 - 180