2020 International Conference on Information Networking (ICOIN) 2020
DOI: 10.1109/icoin48656.2020.9016420
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating Energy and Thermal Efficiency of Anomaly Detection Algorithms in Edge Devices

Abstract: Although IoT delivers several benefits, it also raises concerns regarding privacy and security, from revenue disruption in industrial facilities to life-threatening situations caused by smart houses hacking. As a consequence, anomaly detection algorithms stand out to improve data reliability. However, little has been said about the implications of running these computationally expensive programs in hardware-constrained edge devices. Therefore, in this paper, we present an evaluation of six anomaly detection al… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
3
0
2

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 28 publications
0
3
0
2
Order By: Relevance
“…Optimizing existing systems used to detect anomalies can greatly improve their performance [18]. On the other hand, on the basis of the analysis performed, the methods themselves can be optimized, as well as combined methods can be created that make it possible to level the existing costs according to the principle of complementarity.…”
Section: Discussionmentioning
confidence: 99%
“…Optimizing existing systems used to detect anomalies can greatly improve their performance [18]. On the other hand, on the basis of the analysis performed, the methods themselves can be optimized, as well as combined methods can be created that make it possible to level the existing costs according to the principle of complementarity.…”
Section: Discussionmentioning
confidence: 99%
“…We did perform an empirical evaluation of the proposed architecture using six unsupervised anomaly detection algorithms with support to the analysis of multivariate data sets [16]. An overview of these algorithms is presented next and a summary categorizing each algorithm is provided in Table 1.…”
Section: Evaluation and Discussionmentioning
confidence: 99%
“…This task is usually unsupervised, meaning the labels describing if a sample is anomalous, are few or totally absent. In this context the Isolation Forest (IF) is a very appealing algorithm due to its good detecting performances compared to its algorithmic complexity [8]. However, in the case of ultra-constrained devices, even small improvements in the algorithm can make a difference: the detection performance is only one of the factors that might be considered in the choice of an algorithm to be run on an edge device; other factor might be memory, latency, computational power and energy cost to run on battery power [8].…”
Section: Introductionmentioning
confidence: 99%