2022
DOI: 10.1016/j.iot.2022.100568
|View full text |Cite
|
Sign up to set email alerts
|

IoT anomaly detection methods and applications: A survey

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
37
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 134 publications
(38 citation statements)
references
References 102 publications
0
37
0
1
Order By: Relevance
“…where y is the ultimate prediction and Tree i(x) is the i-th decision tree's forecast. (15) where y lr , y hgbc , and y cnn represent the predictions of LR, HGBC, and the CNN, respectively. Each model's contribution is weighted differently based on its performance or some other criterion, and these weights are denoted by the variables w lr , w hgbc , and w cnn as shown in Figure 18.…”
Section: Lr-hgbc-cnnmentioning
confidence: 99%
“…where y is the ultimate prediction and Tree i(x) is the i-th decision tree's forecast. (15) where y lr , y hgbc , and y cnn represent the predictions of LR, HGBC, and the CNN, respectively. Each model's contribution is weighted differently based on its performance or some other criterion, and these weights are denoted by the variables w lr , w hgbc , and w cnn as shown in Figure 18.…”
Section: Lr-hgbc-cnnmentioning
confidence: 99%
“…As effects of sensor tampering are huge on IoT devices and sometimes it may lead to the fall down of the entire IoT network. 5 So, in this work, we developed an effective detection system that detects anomalies, especially for sensor tampering cases.…”
Section: Introductionmentioning
confidence: 99%
“…Sensor tampering is nothing but physically modifying the devices, and connections between the nodes in the network or manipulating the data, etc. As effects of sensor tampering are huge on IoT devices and sometimes it may lead to the fall down of the entire IoT network 5 . So, in this work, we developed an effective detection system that detects anomalies, especially for sensor tampering cases.…”
Section: Introductionmentioning
confidence: 99%
“…Although no unified taxonomy of AD methods exists in the literature, these methods are generally divided into three categories according to a previous study [13]. The first category comprises geometric methods.…”
Section: Introductionmentioning
confidence: 99%
“…Conventional geometric and statistical methods require a deep study of the ground truth [13]. Moreover, the model or threshold is not invariable in engineering applications, and these methods are often perplexed by the time dependency of the model.…”
Section: Introductionmentioning
confidence: 99%