2015 XVIII International Conference on Soft Computing and Measurements (SCM) 2015
DOI: 10.1109/scm.2015.7190452
|View full text |Cite
|
Sign up to set email alerts
|

Detection of anomalies in data for monitoring of security components in the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(15 citation statements)
references
References 5 publications
0
13
0
Order By: Relevance
“…When comparing energy consumption, however, the study found that it was possible to save up to 6000 mJ of energy when running the lightweight technique, which represents a worthwhile energy saving given the low-resource nature of IoT. Desnitsky et al (2015) proposed a method for detecting anomalies in IoT applications using domain-specific knowledge to create a list of constraints for the application. For example, the temperature in a home should not exceed 30 degrees Celsius, or the constraints could be drawn from the history of the data, for example a motion sensor in an office stops providing data.…”
Section: Anomaly Detectionmentioning
confidence: 99%
“…When comparing energy consumption, however, the study found that it was possible to save up to 6000 mJ of energy when running the lightweight technique, which represents a worthwhile energy saving given the low-resource nature of IoT. Desnitsky et al (2015) proposed a method for detecting anomalies in IoT applications using domain-specific knowledge to create a list of constraints for the application. For example, the temperature in a home should not exceed 30 degrees Celsius, or the constraints could be drawn from the history of the data, for example a motion sensor in an office stops providing data.…”
Section: Anomaly Detectionmentioning
confidence: 99%
“…Therefore, researchers from academia and industry are analysing the security aspects of IoT systems [48]. Current research directions are mainly focusing on anomaly detection for security components in IoT systems [16,46,60] and penetration testing for IoT systems [12]. However, with the rapid growth of the IoT/IIoT systems, security analysis and manual security testing of an IoT system can often not cope with large scale IoT networks.…”
Section: Research Gap and Related Workmentioning
confidence: 99%
“…Today, it is commonly observed that trust status is never static, but may change to another, which may be initiated by changes of surrounding services and environments. Dynamic trust status transitions have been analyzed in a number of scenarios including multiple assurance levels [1], dynamic trust level elevation [18], creation of trust by Self-Issued IdP [19], reflection of security monitoring [20], [21] and continuous authentication by behavior monitoring and analysis [22], [23].…”
Section: Related Workmentioning
confidence: 99%