2015
DOI: 10.1109/tce.2015.7150594
|View full text |Cite
|
Sign up to set email alerts
|

Mobile agent-based cross-layer anomaly detection in smart home sensor networks using fuzzy logic

Abstract: Despite the rapid advancements in consumer electronics, the data transmitted by sensing devices in a smart home environment are still vulnerable to anomalies due to node faults, transmission errors, or attacks. This affects the reliability of the received sensed data and may lead to the incorrect decision making at both local (i.e., smart home) and global (i.e., smart city) levels. This study introduces a novel mobile agent-based cross-layer anomaly detection scheme, which takes into account stochastic variabi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 43 publications
(11 citation statements)
references
References 14 publications
0
9
0
Order By: Relevance
“…After learning, the reasoning module determines which service to provide by observing the user behaviors and the environment up to the decision making point. The learning and reasoning algorithms reported in the literature include the rule-based system [13], hidden Markov model (HMM) [14]- [16], computational intelligence (CI) [17]- [20], and reinforcement learning (RL) [21]- [23]. Rule-based algorithms encode expert knowledge and use the engineered knowledge to reason services for given situations.…”
Section: A Learning and Reasoning Algorithmsmentioning
confidence: 99%
“…After learning, the reasoning module determines which service to provide by observing the user behaviors and the environment up to the decision making point. The learning and reasoning algorithms reported in the literature include the rule-based system [13], hidden Markov model (HMM) [14]- [16], computational intelligence (CI) [17]- [20], and reinforcement learning (RL) [21]- [23]. Rule-based algorithms encode expert knowledge and use the engineered knowledge to reason services for given situations.…”
Section: A Learning and Reasoning Algorithmsmentioning
confidence: 99%
“…With respect to the publication year, 63% of the identified articles were published during the last 5 years. The authors of these scientific articles made use in their analyses of different types of sensors, including sensors and actuators related to the primary heating circuits and power generation systems [24]; telecare medicine information systems (TMIS) comprising specialized sensors that provide key health data parameters [99]; distributed sensors [100]; temperature, humidity and flame sensors [101]; string-type strain gauges [49]; temperature and occupancy sensors [54]; wireless sensors [47,102]; environment sensors for measuring indoor illuminance, temperature-humidity, carbon dioxide concentration and outdoor rain and wind direction [103]; sensors for measuring the indoor and outdoor temperature and the humidity [39]; vision sensors [55]; sensor networks [56,104]; binary infrared sensors [83]; motion detectors, light sensors, meteorological sensors for the wind and solar radiation data [105]; light and motion sensors [106]; environmental sensors [107]; in-house and city sensors [108]; meteorological stations [46]; smart home sensors, remote monitoring systems, and data and video review systems [102]; temperature and infrared sensors [109]; temperature sensors [110]; inside and outside home sensors [111]; different sensors and effectors [112]; smart systems for controlling the vibration of building structures by means of smart dampers [113]; virtual sensor based on a fisheye video camera [48]; and indoor and outdoor light sensors [114]. In these papers, the reasons for using the Fuzzy C-Means with the sensor devices in smart buildings were mainly related to monitoring and controlling energy management processes [24,39,46,47,…”
Section: Unsupervised Learningmentioning
confidence: 99%
“…The performance metrics considered in the scientific papers that use the Fuzzy C-Means integrated with sensor devices in smart buildings were evaluated based on experiments and simulations [46,47,103,[107][108][109]111,114]; Root Mean Square Error (RMSE) [24]; computational cost, user anonymity, mutual authentication, off-line password guessing attacks, impersonation attacks, replay attacks, and the assurance of formal security [99]; Inaccuracy Rate, experiment environment dimension and Root-Mean-Square Error (RMSE), and the dependency of the localization approach on the number of wireless nodes (topology) employed to locate the objects [100]; Accuracy [101,110]; Coefficient of Determination (R 2 ) [49]; energy consumption, Electricity Cost, Peak-to-Average Ratio (PAR) [54]; energy saving percentage in different working scenarios [39]; Standard Error of Mean (SEM), Horizontal Illuminance, Daylight Glare Probability, paper-based Landolt test, Freiburg Visual Acuity Test (FrACT), Electric Lighting Energy Consumption, total number of shading and lighting commands [55]; turbulence intensity, draught rates, operative temperature, Predicted Mean Vote (PMV) and Percentage of People Dissatisfied (PPD) [56]; Identification Rate [83]; Energy Consumption and illumination level [105]; energy savings [106]; Detection Accuracy, Energy Consumption, Memory Consumption, Processing Time Estimation [104]; True Positive, False Positive, True Negative, False Negative, and Accuracy [102]; Accuracy and a comparison with the results presented in related works (based on Ultrasonic, Ultrasonic/RFID, ZigBee, Active RFID, Passive RFID) [112]; Fault Detection Index values for certain fault magnitudes, residual values for individual sensors corresponding to different fault magnitudes [113]; and comfort level [48].…”
Section: Unsupervised Learningmentioning
confidence: 99%
“…Researchers use topologies that are designed to meet the research needs, for example: a topology of 2 domains, 28 nodes, 55 bidirectional links and each link provides 2.5 Gbps bandwidth [30]. Authors in [70] While other researchers use data sources captured from traffic in the specific network. Such as in [14] research, they capture wireless traffic from the ECE department at the University of Arizona.…”
Section: Data Repositoriesmentioning
confidence: 99%
“…This survey work concludes that error and event as a type of anomalies, however are also considered as source of anomaly. As shown in Table 4, the researchers identify error [45], [70], [76] and event [43], [47], [34]. Research in [76] identifies error sensor in WSN, while researchers in [5], identifies network errors or failures in large-scale networks by evaluating traffic flow.…”
Section: Outlier/ Anomaly Identitymentioning
confidence: 99%