Exploratory approach for network behavior clustering in LoRaWAN

被引:0
作者
Domenico Garlisi
Alessio Martino
Jad Zouwayhed
Reza Pourrahim
Francesca Cuomo
机构
[1] University of Palermo,Department of Engineering
[2] Consorzio Nazionale Interuniversitario per le Telecomunicazioni (CNIT),Department of Information Engineering, Electronics and Telecommunications
[3] University of Rome “La Sapienza”,undefined
[4] Institute of Cognitive Sciences and Technologies (ISTC-CNR) Italian National Research Council,undefined
来源
Journal of Ambient Intelligence and Humanized Computing | 2023年 / 14卷
关键词
IoT; LoRa; LoRaWAN; Machine Learning; -means; Anomaly Detection; Cluster Analysis;
D O I
暂无
中图分类号
学科分类号
摘要
The interest in the Internet of Things (IoT) is increasing both as for research and market perspectives. Worldwide, we are witnessing the deployment of several IoT networks for different applications, spanning from home automation to smart cities. The majority of these IoT deployments were quickly set up with the aim of providing connectivity without deeply engineering the infrastructure to optimize the network efficiency and scalability. The interest is now moving towards the analysis of the behavior of such systems in order to characterize and improve their functionality. In these IoT systems, many data related to device and human interactions are stored in databases, as well as IoT information related to the network level (wireless or wired) is gathered by the network operators. In this paper, we provide a systematic approach to process network data gathered from a wide area IoT wireless platform based on LoRaWAN (Long Range Wide Area Network). Our study can be used for profiling IoT devices, in order to group them according to their characteristics, as well as detecting network anomalies. Specifically, we use the k-means algorithm to group LoRaWAN packets according to their radio and network behavior. We tested our approach on a real LoRaWAN network where the entire captured traffic is stored in a proprietary database. Quite important is the fact that LoRaWAN captures, via the wireless interface, packets of multiple operators. Indeed our analysis was performed on 997, 183 packets with 2169 devices involved and only a subset of them were known by the considered operator, meaning that an operator cannot control the whole behavior of the system but on the contrary has to observe it. We were able to analyze clusters’ contents, revealing results both in line with the current network behavior and alerts on malfunctioning devices, remarking the reliability of the proposed approach.
引用
收藏
页码:15745 / 15759
页数:14
相关论文
共 21 条
[1]  
Aceto G(2019)Mobile encrypted traffic classification using deep learning: experimental evaluation, lessons learned, and challenges IEEE Trans Netw Serv Manag 16 445-458
[2]  
Ciuonzo D(1979)A cluster separation measure IEEE Trans Pattern Anal Mach Intell PAMI 2 224-227
[3]  
Montieri A(1999)Data clustering: a review ACM Comput Surv (CSUR) 31 264-323
[4]  
Pescapé A(2019)Data transmission using k-means clustering in low power wide area networks with mobile edge cloud Wirel Pers Commun 105 567-581
[5]  
Davies DL(1982)Least squares quantization in PCM IEEE Trans Inf theory 28 129-137
[6]  
Bouldin DW(2017)Low power wide area networks: an overview IEEE Commun Surv Tutor 19 855-873
[7]  
Jain AK(1953)Who belongs in the family? Psychometrika 18 267-276
[8]  
Murty MN(1999)A fast parallel clustering algorithm for large spatial databases Data Min Knowl Discov 3 263-290
[9]  
Flynn PJ(2019)An adaptive clustering algorithm for dynamic heterogeneous wireless sensor networks Wirel Netw 25 455-470
[10]  
Kim DY(undefined)undefined undefined undefined undefined-undefined