READ-IoT: Reliable Event and Anomaly Detection Framework for the Internet of Things

被引:23
作者
Yahyaoui, Aymen [1 ,2 ]
Abdellatif, Takoua [1 ,4 ]
Yangui, Sami [3 ]
Attia, Rabah [1 ]
机构
[1] Univ Carthage, SERCOM Lab, Carthage 1054, Tunisia
[2] Mil Acad Fondouk Jedid, Nabeul 8012, Tunisia
[3] Univ Toulouse, INSA, LAAS CNRS, F-31400 Toulouse, France
[4] Univ Sousse, ENISo, Sousse 4002, Tunisia
关键词
Internet of Things; Cloud computing; Reliability; Surveillance; Anomaly detection; Sensors; Real-time systems; cloud computing; event detection; fog computing; intrusion detection; trust; reputation; INTRUSION DETECTION SYSTEM; CLOUD; FAILURE; EDGE;
D O I
10.1109/ACCESS.2021.3056149
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) enables a myriad of applications by interconnecting software to physical objects. The objects range from wireless sensors to robots and include surveillance cameras. The applications are often critical (e.g. physical intrusion detection, fire fighting) and latency-sensitive. On the one hand, such applications rely on specific protocols (e.g. MQTT, COAP) and the network to communicate with the objects under very tight timeframe. On the other hand, anomalies (e.g. communication noise, sensors' failures, security attacks) are likely to occur in open IoT systems and can result by sending false alerts or the failure to properly detect critical events. To address that, IoT systems have to be equipped with anomaly detection processing in addition to the required event detection capability. This is a key feature that enables reliability and efficiency in IoT. However, anomaly detection systems can be themselves object of failures and attacks, and then can easily fall short to accomplish their mission. This paper introduces a Reliable Event and Anomaly Detection Framework for the Internet of Things (READ-IoT for short). The designed framework integrates events and anomalies detection into a single and common system that centralizes the management of both concepts. To enforce its reliability, the system relies on a reputation-aware provisioning of detection capabilities that takes into account the vulnerability of the deployment hosts. As for validation, READ-IoT was implemented and evaluated using two real life applications, i.e. a fire detection and an unauthorized person detection applications. Several scenarios of anomalies and events were conducted using NSL-KDD public dataset, as well as, generated data to simulate routing attacks. The obtained results and performance measurements show the efficiency of READ-IoT in terms of event detection accuracy and real-time processing.
引用
收藏
页码:24168 / 24186
页数:19
相关论文
共 71 条
  • [41] Fog-Empowered Anomaly Detection in IoT Using Hyperellipsoidal Clustering
    Lyu, Lingjuan
    Jin, Jiong
    Rajasegarar, Sutharshan
    He, Xuanli
    Palaniswami, Marimuthu
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05): : 1174 - 1184
  • [42] A Global Hybrid Intrusion Detection System for Wireless Sensor Networks
    Maleh, Yassine
    Ezzati, Abdellah
    Qasmaoui, Youssef
    Mbida, Mohamed
    [J]. 6TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2015), THE 5TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2015), 2015, 52 : 1047 - 1052
  • [43] Maleki N, 2019, IEEE IND ELEC, P2792, DOI 10.1109/IECON.2019.8927065
  • [44] A Software-Defined IoT Device Management Framework for Edge and Cloud Computing
    Mavromatis, Alex
    Colman-Meixner, Carlos
    Silva, Aloizio P.
    Vasilakos, Xenofon
    Nejabati, Reza
    Simeonidou, Dimitra
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (03): : 1718 - 1735
  • [45] Predictable Low-Latency Event Detection With Parallel Complex Event Processing
    Mayer, Ruben
    Koldehofe, Boris
    Rothermel, Kurt
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2015, 2 (04): : 274 - 286
  • [46] Mell P, 2010, COMMUN ACM, V53, P50
  • [47] Morla R., 2014, ARXIV14063266
  • [48] A Comprehensive Survey on Fog Computing: State-of-the-Art and Research Challenges
    Mouradian, Carla
    Naboulsi, Diala
    Yangui, Sami
    Glitho, Roch H.
    Morrow, Monique J.
    Polakos, Paul A.
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (01): : 416 - 464
  • [49] An integrated multidomain functional failure and propagation analysis approach for safe system design
    Mutha, Chetan
    Jensen, David
    Tumer, Irem
    Smidts, Carol
    [J]. AI EDAM-ARTIFICIAL INTELLIGENCE FOR ENGINEERING DESIGN ANALYSIS AND MANUFACTURING, 2013, 27 (04): : 317 - 347
  • [50] Ozcelik MM, 2017, INT SYM NETWO COMP