READ-IoT: Reliable Event and Anomaly Detection Framework for the Internet of Things

被引:23
作者
Yahyaoui, Aymen [1 ,2 ]
Abdellatif, Takoua [1 ,4 ]
Yangui, Sami [3 ]
Attia, Rabah [1 ]
机构
[1] Univ Carthage, SERCOM Lab, Carthage 1054, Tunisia
[2] Mil Acad Fondouk Jedid, Nabeul 8012, Tunisia
[3] Univ Toulouse, INSA, LAAS CNRS, F-31400 Toulouse, France
[4] Univ Sousse, ENISo, Sousse 4002, Tunisia
关键词
Internet of Things; Cloud computing; Reliability; Surveillance; Anomaly detection; Sensors; Real-time systems; cloud computing; event detection; fog computing; intrusion detection; trust; reputation; INTRUSION DETECTION SYSTEM; CLOUD; FAILURE; EDGE;
D O I
10.1109/ACCESS.2021.3056149
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) enables a myriad of applications by interconnecting software to physical objects. The objects range from wireless sensors to robots and include surveillance cameras. The applications are often critical (e.g. physical intrusion detection, fire fighting) and latency-sensitive. On the one hand, such applications rely on specific protocols (e.g. MQTT, COAP) and the network to communicate with the objects under very tight timeframe. On the other hand, anomalies (e.g. communication noise, sensors' failures, security attacks) are likely to occur in open IoT systems and can result by sending false alerts or the failure to properly detect critical events. To address that, IoT systems have to be equipped with anomaly detection processing in addition to the required event detection capability. This is a key feature that enables reliability and efficiency in IoT. However, anomaly detection systems can be themselves object of failures and attacks, and then can easily fall short to accomplish their mission. This paper introduces a Reliable Event and Anomaly Detection Framework for the Internet of Things (READ-IoT for short). The designed framework integrates events and anomalies detection into a single and common system that centralizes the management of both concepts. To enforce its reliability, the system relies on a reputation-aware provisioning of detection capabilities that takes into account the vulnerability of the deployment hosts. As for validation, READ-IoT was implemented and evaluated using two real life applications, i.e. a fire detection and an unauthorized person detection applications. Several scenarios of anomalies and events were conducted using NSL-KDD public dataset, as well as, generated data to simulate routing attacks. The obtained results and performance measurements show the efficiency of READ-IoT in terms of event detection accuracy and real-time processing.
引用
收藏
页码:24168 / 24186
页数:19
相关论文
共 71 条
  • [51] Pahl C, 2018, 2018 THIRD INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), P63, DOI 10.1109/FMEC.2018.8364046
  • [52] Panwar Shailesh Singh, 2020, Intelligent Communication, Control and Devices. Proceedings of ICICCD 2018. Advances in Intelligent Systems and Computing (AISC 989), P497, DOI 10.1007/978-981-13-8618-3_52
  • [53] SVELTE: Real-time intrusion detection in the Internet of Things
    Raza, Shahid
    Wallgren, Linus
    Voigt, Thiemo
    [J]. AD HOC NETWORKS, 2013, 11 (08) : 2661 - 2674
  • [54] Razzaq M, 2018, 2018 THIRD INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), P246, DOI 10.1109/FMEC.2018.8364074
  • [55] Rettig L, 2015, PROCEEDINGS 2015 IEEE INTERNATIONAL CONFERENCE ON BIG DATA, P1113, DOI 10.1109/BigData.2015.7363865
  • [56] Survey of combined hardware-software reliability prediction approaches from architectural and system failure viewpoint
    Sinha, Sourav
    Goyal, Neeraj Kumar
    Mall, Rajib
    [J]. INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2019, 10 (04) : 453 - 474
  • [57] IoT-Guard: Event-Driven Fog-Based Video Surveillance System for Real-Time Security Management
    Sultana, Tanin
    Wahid, Khan A.
    [J]. IEEE ACCESS, 2019, 7 : 134881 - 134894
  • [58] A Capillary Computing Architecture for Dynamic Internet of Things: Orchestration of Microservices from Edge Devices to Fog and Cloud Providers
    Taherizadeh, Salman
    Stankovski, Vlado
    Grobelnik, Marko
    [J]. SENSORS, 2018, 18 (09)
  • [59] Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things
    Thamilarasu, Geethapriya
    Chawla, Shiven
    [J]. SENSORS, 2019, 19 (09)
  • [60] Generalized support vector data description for anomaly detection
    Turkoz, Mehmet
    Kim, Sangahn
    Son, Youngdoo
    Jeong, Myong K.
    Elsayed, Elsayed A.
    [J]. PATTERN RECOGNITION, 2020, 100