Smart Anomaly Detection in Sensor Systems

Anomaly detection is concerned with identifying data patterns that deviate remarkably from the expected behaviour. This is an important research problem, due to its broad set of application domains, from data analysis to e-health, cybersecurity, predictive maintenance, fault prevention, and industrial automation. Herein, we review state-of-the-art methods that may be employed to detect anomalies in the specific area of sensor systems, which poses hard challenges in terms of information fusion, data volumes, data speed, and network/energy efficiency, to mention but the most pressing ones. In this context, anomaly detection is a particularly hard problem, given the need to find computing-energy accuracy trade-offs in a constrained environment. We taxonomize methods ranging from conventional techniques (statistical methods, time-series analysis, signal processing, etc.) to data-driven techniques (supervised learning, reinforcement learning, deep learning, etc.). We also look at the impact that different architectural environments (Cloud, Fog, Edge) can have on the sensors ecosystem. The review points to the most promising intelligent-sensing methods, and pinpoints a set of interesting open issues and challenges.

[1]  Pedro M. Domingos MetaCost: a general method for making classifiers cost-sensitive , 1999, KDD '99.

[2]  Martin May,et al.  A Signal Processing View on Packet Sampling and Anomaly Detection , 2010, 2010 Proceedings IEEE INFOCOM.

[3]  Benjamin M. Marlin,et al.  Missing Data Problems in Machine Learning , 2008 .

[4]  Yuan Zuo,et al.  Towards Experienced Anomaly Detector Through Reinforcement Learning , 2018, AAAI.

[5]  Mikael Gidlund,et al.  Future research challenges in wireless sensor and actuator networks targeting industrial automation , 2011, 2011 9th IEEE International Conference on Industrial Informatics.

[6]  Samaneh Hoghooghi,et al.  Proposing a new method for improving RPL to support mobility in the Internet of things , 2020, IET Networks.

[7]  Anahita Khojandi,et al.  Real-Time Sensor Anomaly Detection and Recovery in Connected Automated Vehicle Sensors , 2021, IEEE Transactions on Intelligent Transportation Systems.

[8]  Steven Verstockt,et al.  Convolutional Neural Network Based Fault Detection for Rotating Machinery , 2016 .

[9]  Hao Deng,et al.  Fog Computing Architecture-Based Data Reduction Scheme for WSN , 2019, 2019 1st International Conference on Industrial Artificial Intelligence (IAI).

[10]  Giancarlo Fortino,et al.  Short-long term anomaly detection in wireless sensor networks based on machine learning and multi-parameterized edit distance , 2019, Inf. Fusion.

[11]  Yuan Yao,et al.  Online anomaly detection for sensor systems: A simple and efficient approach , 2010, Perform. Evaluation.

[12]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[13]  Asok Ray,et al.  Symbolic time series analysis via wavelet-based partitioning , 2006, Signal Process..

[14]  Antonio Liotta,et al.  Impact of Transmission Power Control in multi-hop networks , 2017, Future Gener. Comput. Syst..

[15]  Pierre Baldi,et al.  Autoencoders, Unsupervised Learning, and Deep Architectures , 2011, ICML Unsupervised and Transfer Learning.

[16]  Sameer Singh,et al.  Novelty detection: a review - part 1: statistical approaches , 2003, Signal Process..

[17]  Apoorva Nandini Saridena,et al.  Adversarial Learning-Based On-Line Anomaly Monitoring for Assured Autonomy , 2018, 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).

[18]  Nawaz Mohamudally,et al.  Building An Anomaly Detection Engine (ADE) For IoT Smart Applications , 2018, FNC/MobiSPC.

[19]  Angelos Antonopoulos,et al.  Online VNF Lifecycle Management in an MEC-Enabled 5G IoT Architecture , 2020, IEEE Internet of Things Journal.

[20]  Min-hwan Oh,et al.  Sequential Anomaly Detection using Inverse Reinforcement Learning , 2019, KDD.

[21]  Sudip Misra,et al.  Blockchain-Enabled Safety-as-a-Service for Industrial IoT Applications , 2020, IEEE Internet of Things Magazine.

[22]  Li-Qing Zhang,et al.  Abnormal Event Detection Using Recurrent Neural Network , 2015, 2015 International Conference on Computer Science and Applications (CSA).

[23]  Tingting Zhang,et al.  Combining Fog Computing with Sensor Mote Machine Learning for Industrial IoT , 2018, Sensors.

[24]  Gregory J. Pottie,et al.  Sensor network data fault types , 2007, TOSN.

[25]  Antonio Liotta,et al.  Ensembles of incremental learners to detect anomalies in ad hoc sensor networks , 2015, Ad Hoc Networks.

[26]  Sameer Singh,et al.  Novelty detection: a review - part 2: : neural network based approaches , 2003, Signal Process..

[27]  Arthur Zimek,et al.  There and back again: Outlier detection between statistical reasoning and data mining algorithms , 2018, WIREs Data Mining Knowl. Discov..

[28]  David A. Clifton,et al.  A review of novelty detection , 2014, Signal Process..

[29]  Xinyu Yang,et al.  A Survey on the Edge Computing for the Internet of Things , 2018, IEEE Access.

[30]  Yen Kheng Tan,et al.  Energy Harvesting Autonomous Sensor Systems: Design, Analysis, and Practical Implementation , 2013 .

[31]  Charu C. Aggarwal,et al.  Mining Text Data , 2012 .

[32]  Antonio Liotta,et al.  Spatial anomaly detection in sensor networks using neighborhood information , 2017, Inf. Fusion.

[33]  SalehiMahsa,et al.  A Survey on Anomaly detection in Evolving Data , 2018 .

[34]  Ramesh Govindan,et al.  Sensor faults: Detection methods and prevalence in real-world datasets , 2010, TOSN.

[35]  Alex Lu,et al.  Anomaly detection on the edge , 2017, MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM).

[36]  Biming Tian,et al.  Anomaly detection in wireless sensor networks: A survey , 2011, J. Netw. Comput. Appl..

[37]  A. Rama Mohan Reddy,et al.  BARTD: Bio-inspired anomaly based real time detection of under rated App-DDoS attack on web , 2020, J. King Saud Univ. Comput. Inf. Sci..

[38]  Maurizio Longo,et al.  Cyber-Threat Mitigation Exploiting the Birth–Death–Immigration Model , 2018, IEEE Transactions on Information Forensics and Security.

[39]  Subutai Ahmad,et al.  Evaluating Real-Time Anomaly Detection Algorithms -- The Numenta Anomaly Benchmark , 2015, 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA).

[40]  Muhammad Shafique,et al.  An overview of next-generation architectures for machine learning: Roadmap, opportunities and challenges in the IoT era , 2018, 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[41]  Foster J. Provost,et al.  Learning When Training Data are Costly: The Effect of Class Distribution on Tree Induction , 2003, J. Artif. Intell. Res..

[42]  Giovanni De Magistris,et al.  Spatio-Temporal Anomaly Detection for Industrial Robots through Prediction in Unsupervised Feature Space , 2017, 2017 IEEE Winter Conference on Applications of Computer Vision (WACV).

[43]  Geoffrey E. Hinton,et al.  Deep Learning , 2015, Nature.

[44]  Peter Stone,et al.  Scalable training of artificial neural networks with adaptive sparse connectivity inspired by network science , 2017, Nature Communications.

[45]  Rong Zhou,et al.  5G NFV-Based Tactile Internet for Mission-Critical IoT Services , 2020, IEEE Internet of Things Journal.

[46]  Vipin Kumar,et al.  Anomaly Detection for Discrete Sequences: A Survey , 2012, IEEE Transactions on Knowledge and Data Engineering.

[47]  Je-Won Kang,et al.  Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security , 2016, PloS one.

[48]  Yong Haur Tay,et al.  Abnormal Event Detection in Videos using Spatiotemporal Autoencoder , 2017, ISNN.

[49]  Ganesh Kumar,et al.  Anomaly Detection System in Cloud Environment Using Fuzzy Clustering Based ANN , 2015, Mobile Networks and Applications.

[50]  Kristian Kersting,et al.  Stochastic Online Anomaly Analysis for Streaming Time Series , 2017, IJCAI.

[51]  Joel J. P. C. Rodrigues,et al.  Hybrid Deep-Learning-Based Anomaly Detection Scheme for Suspicious Flow Detection in SDN: A Social Multimedia Perspective , 2019, IEEE Transactions on Multimedia.

[52]  Maurizio Longo,et al.  Botnet identification in randomized DDoS attacks , 2016, 2016 24th European Signal Processing Conference (EUSIPCO).

[53]  Guangquan Xu,et al.  A Secure Random Key Distribution Scheme Against Node Replication Attacks in Industrial Wireless Sensor Systems , 2020, IEEE Transactions on Industrial Informatics.

[54]  Jian Pei,et al.  Data Mining Trends and Research Frontiers , 2012 .

[55]  Randy C. Paffenroth,et al.  Anomaly Detection with Robust Deep Autoencoders , 2017, KDD.

[56]  Maurizio Longo,et al.  Multiple Cyber-Threats Containment Via Kendall's Birth-Death-Immigration Model , 2018, 2018 26th European Signal Processing Conference (EUSIPCO).

[57]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[58]  Mikael Gidlund,et al.  A Machine-Learning-Based Technique for False Data Injection Attacks Detection in Industrial IoT , 2020, IEEE Internet of Things Journal.

[59]  T. Tsvetkov,et al.  RPL: IPv6 Routing Protocol for Low power and Lossy Networks , 2010 .

[60]  Shin Ando,et al.  Clustering Needles in a Haystack: An Information Theoretic Analysis of Minority and Outlier Detection , 2007, Seventh IEEE International Conference on Data Mining (ICDM 2007).

[61]  David Zaldivar,et al.  Investigating the Security Threats on Networked Medical Devices , 2020, 2020 10th Annual Computing and Communication Workshop and Conference (CCWC).

[62]  Arif Sari,et al.  A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications , 2015 .

[63]  Azzedine Boukerche,et al.  A multi-stage anomaly detection scheme for augmenting the security in IoT-enabled applications , 2020, Future Gener. Comput. Syst..

[64]  Pietro Ducange,et al.  Smart Audio Sensors in the Internet of Things Edge for Anomaly Detection , 2018, IEEE Access.

[65]  Elena Sitnikova,et al.  Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset , 2018, Future Gener. Comput. Syst..

[66]  Mykola Pechenizkiy,et al.  Sparse evolutionary deep learning with over one million artificial neurons on commodity hardware , 2019, Neural Computing and Applications.

[67]  Rajkumar Buyya,et al.  Fog Computing: A Taxonomy, Survey and Future Directions , 2016, Internet of Everything.

[68]  Giancarlo Fortino,et al.  Internet of Things Based on Smart Objects, Technology, Middleware and Applications , 2014, Internet of Things Based on Smart Objects, Technology, Middleware and Applications.

[69]  Antonio Skarmeta,et al.  Virtual IoT HoneyNets to Mitigate Cyberattacks in SDN/NFV-Enabled IoT Networks , 2020, IEEE Journal on Selected Areas in Communications.

[70]  Victoria J. Hodge,et al.  A Survey of Outlier Detection Methodologies , 2004, Artificial Intelligence Review.

[71]  Giancarlo Fortino,et al.  Autonomic computation offloading in mobile edge for IoT applications , 2019, Future Gener. Comput. Syst..

[72]  Zaigham Mahmood,et al.  Cloud Computing: Concepts, Technology & Architecture , 2013 .

[73]  Helena Rifà-Pous,et al.  A Comparative Study of Anomaly Detection Techniques for Smart City Wireless Sensor Networks , 2016, Sensors.

[74]  Brian Litt,et al.  Semi-Supervised Anomaly Detection for EEG Waveforms Using Deep Belief Nets , 2010, 2010 Ninth International Conference on Machine Learning and Applications.

[75]  Weihua Zhuang,et al.  SDN/NFV-Empowered Future IoV With Enhanced Communication, Computing, and Caching , 2020, Proceedings of the IEEE.

[76]  Susan A. Murphy,et al.  Monographs on statistics and applied probability , 1990 .

[77]  Philip Levis,et al.  RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.

[78]  Lei Shi,et al.  MAD-GAN: Multivariate Anomaly Detection for Time Series Data with Generative Adversarial Networks , 2019, ICANN.

[79]  Ling Huang,et al.  In-Network PCA and Anomaly Detection , 2006, NIPS.

[80]  J. Wenny Rahayu,et al.  Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..

[81]  Giancarlo Fortino,et al.  Intelligence at the Edge of Complex Networks: The Case of Cognitive Transmission Power Control , 2019, IEEE Wireless Communications.

[82]  Zeyu Sun,et al.  An Energy-Efficient Cross-Layer-Sensing Clustering Method Based on Intelligent Fog Computing in WSNs , 2019, IEEE Access.

[83]  Tie Luo,et al.  Distributed Anomaly Detection Using Autoencoder Neural Networks in WSN for IoT , 2018, 2018 IEEE International Conference on Communications (ICC).

[84]  Giancarlo Fortino,et al.  A framework for anomaly detection and classification in Multiple IoT scenarios , 2021, Future Gener. Comput. Syst..

[85]  Antonio Ortega,et al.  Spectral anomaly detection using graph-based filtering for wireless sensor networks , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[86]  Weiming Shen,et al.  Agent-Oriented Cooperative Smart Objects: From IoT System Design to Implementation , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[87]  Lovekesh Vig,et al.  Anomaly detection in ECG time signals via deep long short-term memory networks , 2015, 2015 IEEE International Conference on Data Science and Advanced Analytics (DSAA).

[88]  Antonio Liotta,et al.  Transmission power control in WSNs : from deterministic to cognitive methods , 2018, IoT 2018.

[89]  Onur Mutlu,et al.  Gaia: Geo-Distributed Machine Learning Approaching LAN Speeds , 2017, NSDI.

[90]  Kevin P. Murphy,et al.  Machine learning - a probabilistic perspective , 2012, Adaptive computation and machine learning series.

[91]  Laurence T. Yang,et al.  A survey on data fusion in internet of things: Towards secure and privacy-preserving fusion , 2019, Inf. Fusion.

[92]  Edwin Lughofer,et al.  Fault detection in multi-sensor networks based on multivariate time-series models and orthogonal transformations , 2014, Inf. Fusion.

[93]  Georgios Kambourakis,et al.  DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.

[94]  Dong Xiang,et al.  Information-theoretic measures for anomaly detection , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[95]  Arthur Zimek,et al.  On the evaluation of unsupervised outlier detection: measures, datasets, and an empirical study , 2016, Data Mining and Knowledge Discovery.

[96]  Sanjay Chawla,et al.  Deep Learning for Anomaly Detection: A Survey , 2019, ArXiv.

[97]  MengChu Zhou,et al.  Security and trust issues in Fog computing: A survey , 2018, Future Gener. Comput. Syst..

[98]  Witold Pedrycz,et al.  A survey on machine learning for data fusion , 2020, Inf. Fusion.

[99]  Artur Tomaszewski,et al.  Energy-Optimal Data Aggregation and Dissemination for the Internet of Things , 2018, IEEE Internet of Things Journal.

[100]  Hubert Eichner,et al.  Towards Federated Learning at Scale: System Design , 2019, SysML.

[101]  Andreas Dengel,et al.  FuseAD: Unsupervised Anomaly Detection in Streaming Sensors Data by Fusing Statistical and Deep Learning Models , 2019, Sensors.

[102]  Christian Igel,et al.  An Introduction to Restricted Boltzmann Machines , 2012, CIARP.

[103]  Alfredo De Santis,et al.  Network anomaly detection with the restricted Boltzmann machine , 2013, Neurocomputing.

[104]  Daniel Kudenko,et al.  Multi-agent Reinforcement Learning for Intrusion Detection , 2007, Adaptive Agents and Multi-Agents Systems.

[105]  Antonio Liotta,et al.  Self-Learning Power Control in Wireless Sensor Networks , 2018, Sensors.

[106]  M. Palaniswami,et al.  Distributed Anomaly Detection in Wireless Sensor Networks , 2006, 2006 10th IEEE Singapore International Conference on Communication Systems.

[107]  Hhwj Hedde Bosman,et al.  Anomaly detection in networked embedded sensor systems , 2016 .

[108]  Lovekesh Vig,et al.  LSTM-based Encoder-Decoder for Multi-sensor Anomaly Detection , 2016, ArXiv.

[109]  Albert Y. Zomaya,et al.  En-ABC: An ensemble artificial bee colony based anomaly detection scheme for cloud environment , 2020, J. Parallel Distributed Comput..

[110]  Hamed S. Al-Raweshidy,et al.  Intelligent Traffic Management and Load Balance Based on Spike ISDN-IoT , 2020 .

[111]  Tim Kraska,et al.  MLbase: A Distributed Machine-learning System , 2013, CIDR.

[112]  Estevam R. Hruschka,et al.  Roles Played by Bayesian Networks in Machine Learning: An Empirical Investigation , 2013 .

[113]  Giancarlo Fortino,et al.  Modelling and simulation of Opportunistic IoT Services with Aggregate Computing , 2019, Future Gener. Comput. Syst..

[114]  Mazhar Ali,et al.  Towards a Fog Enabled Efficient Car Parking Architecture , 2019, IEEE Access.

[115]  Giancarlo Fortino,et al.  Environment-fusion multipath routing protocol for wireless sensor networks , 2020, Inf. Fusion.

[116]  Yao Zhang,et al.  Vehicular Blockchain-Based Collective Learning for Connected and Autonomous Vehicles , 2020, IEEE Wireless Communications.

[117]  Saeed Amizadeh,et al.  Generic and Scalable Framework for Automated Time-series Anomaly Detection , 2015, KDD.

[118]  Alberto Del Bimbo,et al.  Deep Learning Based Surveillance System for Open Critical Areas , 2018 .

[119]  Yoshua Bengio,et al.  Generative Adversarial Nets , 2014, NIPS.

[120]  Urbashi Mitra,et al.  Security Against False Data-Injection Attack in Cyber-Physical Systems , 2018, IEEE Transactions on Control of Network Systems.

[121]  Hamadoun Tall,et al.  BAIWL: Blacklisting Approach to Improve Wireless Sensor Network Lifetime , 2020, 2020 IEEE International Conf on Natural and Engineering Sciences for Sahel's Sustainable Development - Impact of Big Data Application on Society and Environment (IBASE-BF).

[122]  Sridhar Adepu,et al.  Anomaly Detection in Cyber Physical Systems Using Recurrent Neural Networks , 2017, 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE).

[123]  Libing Wu,et al.  A New Proposed Sensor Cloud Architecture Based on Fog Computing for Internet of Things , 2019, 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[124]  Zachary Chase Lipton A Critical Review of Recurrent Neural Networks for Sequence Learning , 2015, ArXiv.

[125]  Hui Yang,et al.  Convolutional Neural Network Analysis of Recurrence Plots for Anomaly Detection , 2020, Int. J. Bifurc. Chaos.

[126]  Qihui Wu,et al.  A survey of machine learning for big data processing , 2016, EURASIP Journal on Advances in Signal Processing.

[127]  Jianguo Liu,et al.  A Hybrid Anomaly Detection Framework in Cloud Computing Using One-Class and Two-Class Support Vector Machines , 2012, ADMA.

[128]  Salvatore J. Stolfo,et al.  Real time data mining-based intrusion detection , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[129]  Mahsa Salehi,et al.  A Survey on Anomaly detection in Evolving Data: [with Application to Forest Fire Risk Prediction] , 2018, SKDD.

[130]  Axel Jantsch,et al.  Neural network based ECG anomaly detection on FPGA and trade-off analysis , 2017, 2017 IEEE International Symposium on Circuits and Systems (ISCAS).

[131]  Jaromir Konecny,et al.  Environmental WSN Edge Computing Concept by Wavelet Transform Data Compression in a Sensor Node , 2019, IFAC-PapersOnLine.

[132]  Hamed Haddadi,et al.  Deep Learning in Mobile and Wireless Networking: A Survey , 2018, IEEE Communications Surveys & Tutorials.

[133]  Sanjay Chawla,et al.  On local spatial outliers , 2004, Fourth IEEE International Conference on Data Mining (ICDM'04).

[134]  Hamid Reza Shahriari,et al.  A Survey of Anomaly Detection Approaches in Internet of Things , 2018, ISC Int. J. Inf. Secur..

[135]  Md Zahangir Alom,et al.  Intrusion detection using deep belief networks , 2015, 2015 National Aerospace and Electronics Conference (NAECON).

[136]  Charu C. Aggarwal,et al.  Outlier Analysis , 2013, Springer New York.

[137]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[138]  Kai Ming Ting,et al.  An Instance-weighting Method to Induce Cost-sensitive Trees , 2001 .

[139]  Mouzhi Ge,et al.  Big Data for Internet of Things: A Survey , 2018, Future Gener. Comput. Syst..

[140]  Raghavendra Chalapathy University of Sydney,et al.  Deep Learning for Anomaly Detection: A Survey , 2019, ArXiv.

[141]  Subutai Ahmad,et al.  Unsupervised real-time anomaly detection for streaming data , 2017, Neurocomputing.

[142]  Oliver Obst,et al.  Spatiotemporal Anomaly Detection in Gas Monitoring Sensor Networks , 2008, EWSN.

[143]  Prem Prakash Jayaraman,et al.  Deep Osmosis: Holistic Distributed Deep Learning in Osmotic Computing , 2018, IEEE Cloud Computing.

[144]  Mansoor Alam,et al.  A Deep Learning Approach for Network Intrusion Detection System , 2016, EAI Endorsed Trans. Security Safety.