doi: 10.17586/2226-1494-2017-17-3-450-456


ANOMALY DETECTION IN WIRELESS SENSOR NETWORKS OF «SMART HOME» SYSTEM

A. V. Nasteka, A. N. Kanev, E. . Bessonova


Read the full article  ';
Article in Russian

For citation: Nasteka A.V., Kanev A.N., Bessonova C.E. Anomaly detection in wireless sensor networks of «smart home» system. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2017, vol. 17, no. 3, pp. 450–456 (in Russian). doi: 10.17586/2226-1494-2017-17-3-450-456

Abstract

Subject of Research.The paper reviews the problem of anomaly detection in home automation systems. The authors define present security networks specificities and highlight the need of informational and physical impact detection on sensors aimed at information security. Method. Artificial neural network is proposed for anomaly detection. This method processes the data on characteristics of security network devices for anomalous behavior detection. The artificial neural network should be preliminarily trained on the data of that type. The implementation tools for the proposed method of anomaly detection are described. Main Results. The scenario has been created for the experiment so that the model of «Smart home» system produces the data of network information streams and the artificial neural network makes decisions based on this data. As a result, the training and testing sets have been created. The anomaly has been considered to be a state with the artificial neural network result less than 0.9. Based on the test results the artificial neural network determines the network node state with 91% precision. Practical Relevance. The proposed method can be used in information and security systems when connected devices should be monitored. Anomaly detection technology excludes inconspicuous violation of information confidentiality and integrity.


Keywords: information security, room automation, automation device, artificial neural network

Acknowledgements. We thank the Chair of Secure Information Technologies of ITMO University for supporting and facilitating this research

References
1.     Nasteka A.V., Bessonova E.E. Automation device authentication at «Smart Home». Vestnik Policii, 2015, vol. 4, no. 2, pp. 68–74. doi: 10.13187/vesp.2015.4.68 (In Russian)
2.     Mafrur R., Khusumanegara P., Bang G.H., Lee D.K., Nugraha I.G.D., Choi D. Developing and evaluating mobile sensing for smart home control. International Journal of Smart Home, 2015, vol. 9, no. 3, pp. 215–230. doi: 10.14257/ijsh.2015.9.3.20
3.     Bessonova E.E., Efremov A.A., Nasteka A.V. et. al. Security analysis of smart home system. Proc. Conf. on Regional Informatics RI-2014. St. Petersburg, 2014. (In Russian)
4.     Pang Y., Jia S. Wireless smart home system based on Zigbee. International Journal of Smart Home, 2016, vol. 10, no. 4, pp. 209–220. doi: 10.14257/ijsh.2016.10.4.19
5.     Belaidouni S., Miraoui M., Tadj C. Towards an efficient smart space architecture. International Journal of Advanced Studies in Computer Science and Engineering, 2016, vol. 5, no. 1,
pp. 18–27.
6.     Barcena M.B., Wueest C. Insecurity in the Internet of Things. Symantec, Report 21349619, 2015.
7.     Starikovskii A.V., Zhukov I.Yu., Mikhailov D.M. et. al. Vulnerability research of smart home systems. Spetstekhnika i Svyaz', 2012, no. 2, pp. 55–57. (In Russian)
8.     Jurdak R., Wang X.R., Obst O., Valencia P. Wireless sensor network anomalies: diagnosis and detection strategies. Intelligence-Based Systems Engineering, 2011, vol. 10, pp. 309–325. doi: 10.1007/978-3-642-17931-0_12
9.     Pachauria G., Sharma S. Anomaly detection in medical wireless sensor networks using machine learning algorithms. Procedia Computer Science, 2015, vol. 70, pp. 325–333. doi: 10.1016/j.procs.2015.10.026
10.  Son S.-Y. Home electricity consumption monitoring enhancement using smart device status information. International Journal of Smart Home, 2015, vol. 9, no. 10, pp. 189–196. doi: 10.14257/ijsh.2015.9.10.21
11.  Osowski S. Sieci Neuronowe do Przetwarzania Informacji. Warszawa, 2000.
12.  User Manual OMNeT++ version 4.6. Available at: https://omnetpp.org/doc/omnetpp/manual/usman.html.
13.  Manning C.D., Raghavan P., Schutze H. Introduction to Informational Retrieval. Cambridge University Press, 2008, 504 p.
14.  Bhattacharyya D.K., Kalita J.K. Network Anomaly Detection. A Machine Learning Perspective. CRC Press, 2014, 364 p.
Balagani K.S. K-Means+ID3 and Dependence Tree Methods for Supervised Anomaly Detection. PhD, Louisiana Tech University, 2008, 98 p.


Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Copyright 2001-2024 ©
Scientific and Technical Journal
of Information Technologies, Mechanics and Optics.
All rights reserved.

Яндекс.Метрика