Exploratory approach for network behavior clustering in LoRaWAN

被引:0
|
作者
Domenico Garlisi
Alessio Martino
Jad Zouwayhed
Reza Pourrahim
Francesca Cuomo
机构
[1] University of Palermo,Department of Engineering
[2] Consorzio Nazionale Interuniversitario per le Telecomunicazioni (CNIT),Department of Information Engineering, Electronics and Telecommunications
[3] University of Rome “La Sapienza”,undefined
[4] Institute of Cognitive Sciences and Technologies (ISTC-CNR) Italian National Research Council,undefined
来源
Journal of Ambient Intelligence and Humanized Computing | 2023年 / 14卷
关键词
IoT; LoRa; LoRaWAN; Machine Learning; -means; Anomaly Detection; Cluster Analysis;
D O I
暂无
中图分类号
学科分类号
摘要
The interest in the Internet of Things (IoT) is increasing both as for research and market perspectives. Worldwide, we are witnessing the deployment of several IoT networks for different applications, spanning from home automation to smart cities. The majority of these IoT deployments were quickly set up with the aim of providing connectivity without deeply engineering the infrastructure to optimize the network efficiency and scalability. The interest is now moving towards the analysis of the behavior of such systems in order to characterize and improve their functionality. In these IoT systems, many data related to device and human interactions are stored in databases, as well as IoT information related to the network level (wireless or wired) is gathered by the network operators. In this paper, we provide a systematic approach to process network data gathered from a wide area IoT wireless platform based on LoRaWAN (Long Range Wide Area Network). Our study can be used for profiling IoT devices, in order to group them according to their characteristics, as well as detecting network anomalies. Specifically, we use the k-means algorithm to group LoRaWAN packets according to their radio and network behavior. We tested our approach on a real LoRaWAN network where the entire captured traffic is stored in a proprietary database. Quite important is the fact that LoRaWAN captures, via the wireless interface, packets of multiple operators. Indeed our analysis was performed on 997, 183 packets with 2169 devices involved and only a subset of them were known by the considered operator, meaning that an operator cannot control the whole behavior of the system but on the contrary has to observe it. We were able to analyze clusters’ contents, revealing results both in line with the current network behavior and alerts on malfunctioning devices, remarking the reliability of the proposed approach.
引用
收藏
页码:15745 / 15759
页数:14
相关论文
共 50 条
  • [1] Exploratory approach for network behavior clustering in LoRaWAN
    Garlisi, Domenico
    Martino, Alessio
    Zouwayhed, Jad
    Pourrahim, Reza
    Cuomo, Francesca
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 14 (12) : 15745 - 15759
  • [2] A Clustering Approach for Profiling LoRaWAN IoT Devices
    Valtorta, Jacopo Maria
    Martino, Alessio
    Cuomo, Francesca
    Garlisi, Domenico
    AMBIENT INTELLIGENCE (AMI 2019), 2019, 11912 : 58 - 74
  • [3] Predicting LoRaWAN Behavior: How Machine Learning Can Help
    Cuomo, Francesca
    Garlisi, Domenico
    Martino, Alessio
    Martino, Antonio
    COMPUTERS, 2020, 9 (03) : 1 - 18
  • [4] Greedy Behavior Detection With Machine Learning for LoRaWAN Network
    Chen, Mi
    Ben-Othman, Jalel
    Mokdad, Lynda
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2024, 21 (03): : 2731 - 2740
  • [5] Analysis of the behavior of the public LoraWAN network in a city in southern Brazil
    Ferrigo, Samuel Francisco
    da Silva, Joel
    REVISTA BRASILEIRA DE COMPUTACAO APLICADA, 2021, 13 (02): : 38 - 47
  • [6] Secure Communication Planning in LoRaWAN Network
    Slavkovska, Julia
    Heglas, Patrik
    Zemko, Ladislav
    Cicak, Pavel
    2024 NEW TRENDS IN SIGNAL PROCESSING, NTSP 2024, 2024, : 153 - 159
  • [7] LoRaWAN Network Planning
    Paul, Biswajit
    Assi, Chadi
    Kaddoum, Georges
    IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2024, 8 (04): : 1413 - 1426
  • [8] Separate Session Key Generation Approach for Network and Application flows in LoRaWAN
    Bala, Suman
    Barthel, Dominique
    Gharout, Said
    SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING, 2019, : 870 - 879
  • [9] Energy Consumption of a LoRaWAN Network using Jarvis Algorithm
    Bermudez, Esau
    Sadok, Djamel F. H.
    INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST-2020), 2020, : 148 - 153
  • [10] Low-Cost Implementation of Reactive Jammer on LoRaWAN Network
    Perkovic, Toni
    Rudes, Hrvoje
    Damjanovic, Slaven
    Nakic, Antun
    ELECTRONICS, 2021, 10 (07)