Blockchain and Anomaly Detection based Monitoring System for Enforcing Wastewater Reuse

被引:0
作者
Iyer, Sreerag [1 ]
Thakur, Snehal [1 ]
Dixit, Mihirraj [1 ]
Katkam, Rajneesh [1 ]
Agrawal, Ashish [1 ]
Kazi, Faruk [1 ]
机构
[1] Veermata Jijabai Technol Inst, Ctr Excellence CoE, CNDS, Mumbai, Maharashtra, India
来源
2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT) | 2019年
关键词
Wastewater Recycle and Reuse; IoT Meter; Blockchain; Anomaly Detection; Machine learning;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Industries, household communities consume a lot of water on regular basis, thereby increasing water crisis. There is continuous increase in water consumption by industries. Reusing wastewater can reduce water withdrawals from local water sources thus increasing water availability, lowering wastewater discharges and their pollutant load, reducing thermal energy consumption and, potentially, processing cost. Various ways have been implemented for recycling the generated wastewater. Wastewater must be reused for the benefit of mankind. In this paper we propose a wastewater recycle control system to efficiently manage the wastewater and coordinate it among the industries and the government. Blockchain technology has been deployed for storing data and developing an incentive model to encourage wastewater reuse. Tokens are provided to industries in proportion to quantity and quality of reused wastewater. Rules for issue and trade of these tokens are written as a smart contract. Unfortunately, providing such incentives also provides a motive for tampering the data on which these tokens are awarded. Anomaly detection algorithms are used to detect the potential frauds which take place in the system upon IoT meter data tampering. The system uses IoT meters that measure volume of wastewater generated and reused, along with quality metrics such as pH, hardness and oil content. Multiple machine learning algorithms are used to detect tampering-polynomial regression, DBSCAN, autoencoders and LSTM networks. Their performance has then been compared. A first implementation of this system and an evaluation of the system's performance are also presented.
引用
收藏
页数:7
相关论文
共 19 条
  • [1] Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains
    Androulaki, Elli
    Barger, Artem
    Bortnikov, Vita
    Cachin, Christian
    Christidis, Konstantinos
    De Caro, Angelo
    Enyeart, David
    Ferris, Christopher
    Laventman, Gennady
    Manevich, Yacov
    Muralidharan, Srinivasan
    Murthy, Chet
    Binh Nguyen
    Sethi, Manish
    Singh, Gari
    Smith, Keith
    Sorniotti, Alessandro
    Stathakopoulou, Chrysoula
    Vukolic, Marko
    Cocco, Sharon Weed
    Yellick, Jason
    [J]. EUROSYS '18: PROCEEDINGS OF THE THIRTEENTH EUROSYS CONFERENCE, 2018,
  • [2] Canedo Janice, 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST), P219, DOI 10.1109/PST.2016.7906930
  • [3] Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities
    Choo, Kim-Kwang Raymond
    Gritzalis, Stefanos
    Park, Jong Hyuk
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) : 3567 - 3569
  • [4] Coma-Puig B., FRAUD DETECTION ENER
  • [5] Fraud Detection in Energy Consumption: A Supervised Approach
    Coma-Puig, Bernat
    Carmona, Josep
    Gavalda, Ricard
    Alcoverro, Santiago
    Martin, Victor
    [J]. PROCEEDINGS OF 3RD IEEE/ACM INTERNATIONAL CONFERENCE ON DATA SCIENCE AND ADVANCED ANALYTICS, (DSAA 2016), 2016, : 120 - 129
  • [6] Blockchain Electricity Trading Under Demurrage
    Devine, Mel T.
    Cuffe, Paul
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (02) : 2323 - 2325
  • [7] Gaonkar P, 2014, 2014 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), P682, DOI 10.1109/ICIT.2014.6894913
  • [8] Anomaly Detection for a Water Treatment System Using Unsupervised Machine Learning
    Inoue, Jun
    Yamagata, Yoriyuki
    Chen, Yuqi
    Poskitt, Christopher M.
    Sun, Jun
    [J]. 2017 17TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2017), 2017, : 1058 - 1065
  • [9] MACHINE LEARNING PARADIGMS FOR NEXT-GENERATION WIRELESS NETWORKS
    Jiang, Chunxiao
    Zhang, Haijun
    Ren, Yong
    Han, Zhu
    Chen, Kwang-Cheng
    Hanzo, Lajos
    [J]. IEEE WIRELESS COMMUNICATIONS, 2017, 24 (02) : 98 - 105
  • [10] Outlier Detection using Kmeans and Fuzzy Min Max Neural Network in Network Data
    Kaur, Parmeet
    [J]. 2016 8TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2016, : 693 - 696