Anomaly IoT Node Detection Based on Local Outlier Factor and Time Series

被引:7
作者
Wang, Fang [1 ]
Wei, Zhe [1 ]
Zuo, Xu [2 ]
机构
[1] Civil Aviat Flight Univ China, Sch Comp Sci, Deyang 618307, Sichuan, Peoples R China
[2] Anzina PTY Ltd, Sydney, NSW 2118, Australia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2020年 / 64卷 / 02期
关键词
Local outlier factor; time series; Internet of Things; anomaly node detection; INTERNET;
D O I
10.32604/cmc.2020.09774
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The heterogeneous nodes in the Internet of Things (IoT) are relatively weak in the computing power and storage capacity. Therefore, traditional algorithms of network security are not suitable for the IoT. Once these nodes alternate between normal behavior and anomaly behavior, it is difficult to identify and isolate them by the network system in a short time, thus the data transmission accuracy and the integrity of the network function will be affected negatively. Based on the characteristics of IoT, a lightweight local outlier factor detection method is used for node detection. In order to further determine whether the nodes are an anomaly or not, the varying behavior of those nodes in terms of time is considered in this research, and a time series method is used to make the system respond to the randomness and selectiveness of anomaly behavior nodes effectively in a short period of time. Simulation results show that the proposed method can improve the accuracy of the data transmitted by the network and achieve better performance.
引用
收藏
页码:1063 / 1073
页数:11
相关论文
共 18 条
[1]  
Amouri A., 2018, 2018 IEEE 19 WIR MIC, P1
[2]  
[Anonymous], 2018, ADV CONDENS MATTER P, DOI DOI 10.1109/ISCAS.2018.8351098
[3]   Smart Security Framework for Educational Institutions Using Internet of Things (IoT) [J].
Badshah, Afzal ;
Ghani, Anwar ;
Qureshi, Muhammad Ahsan ;
Shamshirband, Shahaboddin .
CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 61 (01) :81-101
[4]   Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach [J].
Bostani, Hamid ;
Sheikhan, Mansour .
COMPUTER COMMUNICATIONS, 2017, 98 :52-71
[5]   Middleware for Internet of Things: Survey and Challenges [J].
Chelloug, Samia Allaoua ;
Ei-Zawawy, Mohamed A. .
INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2018, 24 (02) :309-317
[6]  
Kumar SS, 2017, INT CONF ADV COMPU, P287, DOI 10.1109/ICoAC.2017.8441322
[7]   Parallel distributed computing based wireless sensor network anomaly data detection in IoT framework [J].
Li, Qian ;
Sun, Ruizhi ;
Wu, Huiling ;
Zhang, Qianqian .
COGNITIVE SYSTEMS RESEARCH, 2018, 52 :342-350
[8]   Fog-Empowered Anomaly Detection in IoT Using Hyperellipsoidal Clustering [J].
Lyu, Lingjuan ;
Jin, Jiong ;
Rajasegarar, Sutharshan ;
He, Xuanli ;
Palaniswami, Marimuthu .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05) :1174-1184
[9]   Incentive Mechanism of Data Storage Based on Blockchain for Wireless Sensor Networks [J].
Ren, Yongjun ;
Liu, Yepeng ;
Ji, Sai ;
Sangaiah, Arun Kumar ;
Wang, Jin .
MOBILE INFORMATION SYSTEMS, 2018, 2018
[10]  
Sedjelmaci Hichem., 2016, P 2016 IEEE INT C CO, P1