Proceedings of the XXth Conference of Open Innovations Association FRUCT (Apr 2017)

Anomaly detection in wireless sensor network of the "smart home" system

  • Anton Kanev,
  • Aleksandr Nasteka,
  • Catherine Bessonova,
  • Denis Nevmerzhitsky,
  • Aleksei Silaev,
  • Aleksandr Efremov,
  • Kseniia Nikiforova

DOI
https://doi.org/10.23919/FRUCT.2017.8071301
Journal volume & issue
Vol. 776, no. 20
pp. 118 – 124

Abstract

Read online

Subject. The paper reviews the problem of anomaly detection in home automation systems. Authors define specificities of the existing security networks and accentuate the need of the detection of informational and physical impact on sensors. Characteristics of the transmitted information and physical impacts on automation devices are analysed and used as metrics for the anomalous behavior detection. Various machine learning algorithms for anomaly detection are compared and reviewed. Methods. The paper reviews the anomaly detection method that includes artificial neural networks as a detection tool. In this method characteristics of the security network devices are analysed to detect an anomalous behaviour, and exactly this type of data should be used to train the artificial neural network. This paper describes tools that can be used to implement the offered anomaly detection method. Main results. As an experiment the scenario has been created so that the model of the “Smart home” system produces the data of network information streams and the artificial neural network decides from this data. As a result the training and testing sets has been produced. The configuration of the artificial neural network has been defined as a result of tests. The experiment shows the potential of described method due to the fact that the area under ROC curve is 0.9689, which is better than basic machine learning algorithms performance. Practical importance. The offered method can be used at the development stage while implementation of the information and security systems requiring monitoring of the connected devices. Anomaly detection technology excludes the possibility of the inconspicuous violation of the information's confidentiality and integrity.

Keywords