IEEE Access (Jan 2024)

A Review of Deep Learning-Based Anomaly Detection Strategies in Industry 4.0 Focused on Application Fields, Sensing Equipment, and Algorithms

  • Adriano Liso,
  • Angelo Cardellicchio,
  • Cosimo Patruno,
  • Massimiliano Nitti,
  • Pierfrancesco Ardino,
  • Ettore Stella,
  • Vito Reno

DOI
https://doi.org/10.1109/ACCESS.2024.3424488
Journal volume & issue
Vol. 12
pp. 93911 – 93923

Abstract

Read online

Anomaly detection is a topic of interest in several areas, ranging from Industry 4.0 to Energy Management, Smart Agriculture, Cybersecurity, and Bioinformatics. In a wide sense, detecting anomalies implies finding samples generated within a process that differs from its standard data generation mechanisms. Identifying these samples is extremely important for a variety of reasons, depending on the specific application and scenario, ranging from the minimization of production costs to maintaining the required safety standards. As such, the increasing availability of wide networks of sensors that yield large amounts of data characterizing the processes under observation allowed the large adoption of deep learning techniques, which proved worthy of attention due to their capability of identifying anomalies with large precision, accuracy and reproducibility. Consequently, there is an extensive need to consolidate research results to provide a common framework to understand the topic and ensure a common foundation to establish future research trends. To respond to this need, this work systematically reviews the state of the art of anomaly detection in Industry 4.0, evaluating gaps in the current knowledge and proposing future directions of interest. To pursue this objective, three main dimensions have been considered: the scenario where the anomaly detection methodologies were applied, the sensing equipment used to gather data characterizing the underlying process, and the algorithm employed to properly interpret the phenomena. The study was conducted following the PRISMA protocol, which allowed the identification of a relevant selection of papers by extracting a meaningful dataset of 78 papers of interest. The analysis highlighted the diffusion of autoencoders in several configurations and application scenarios, highlighting their effectiveness and flexibility for anomaly detection.

Keywords