Abstract
IoT environments are typically composed of hundreds of geographically distributed sensors. Usually, these sensors are not physically protected from unauthorized access, which makes them vulnerable to exploitation where they can be manipulated to send incorrect data. The identification of such compromised sensors can be helpful in the process of exclusion or verification by administrators. To perform the detection of anomalous sensors, several algorithms can be used. However, based on the algorithm used, this evaluation may be delayed or can be inaccurate. Therefore, to detect sensors with different behavior compared to others, we evaluated the trade-off between performance and accuracy of different anomalies detection algorithms. The results showed that Mahalanobis Distance could improve the trade-off between detecting multiple anomalous sensors at execution time and accuracy to avoid false-positives.
Original language | English |
---|---|
Title of host publication | Proceedings of the 31st International Conference on Information Networking (ICOIN 2017): 11-13 Januray 2017, Da Nang, Vietnam |
Publisher | IEEE |
Pages | 486-491 |
Number of pages | 6 |
ISBN (Print) | 9781509051243 |
DOIs | |
Publication status | Published - 2017 |
Event | International Conference on Information Networking - Duration: 11 Jan 2017 → … |
Conference
Conference | International Conference on Information Networking |
---|---|
Period | 11/01/17 → … |
Keywords
- Internet of things
- anomaly detection (computer security)
- computer algorithms
- sensor networks