2023 IEEE 20th Consumer Communications &Amp; Networking Conference (CCNC) 2023
DOI: 10.1109/ccnc51644.2023.10060415
|View full text |Cite
|
Sign up to set email alerts
|

LE3D: A Lightweight Ensemble Framework of Data Drift Detectors for Resource-Constrained Devices

Abstract: Data integrity becomes paramount as the number of Internet of Things (IoT) sensor deployments increases. Sensor data can be altered by benign causes or malicious actions. Mechanisms that detect drifts and irregularities can prevent disruptions and data bias in the state of an IoT application. This paper presents LE3D, an ensemble framework of data drift estimators capable of detecting abnormal sensor behaviours. Working collaboratively with surrounding IoT devices, the type of drift (natural/abnormal) can also… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 19 publications
0
1
0
Order By: Relevance
“…Therefore, a single attack could exhibit multiple data flows across the data surface. In terms of potential CAV cyber-attacks that constitute the attack surface, an attacker may exploit vulnerabilities within the physical infrastructure (e.g., electric charging stations), perform adversarial modifications to sensor data [23,24], perform poisoning attacks to intelligent agents [25], or perform network attacks that disrupt communications (e.g., a Denial-of-Service (DoS) attack [26]). For a comprehensive overview of various attack points that constitute the CAV attack surface, we refer the reader to [13,14,27,28].…”
Section: C-its Communication Domainsmentioning
confidence: 99%
“…Therefore, a single attack could exhibit multiple data flows across the data surface. In terms of potential CAV cyber-attacks that constitute the attack surface, an attacker may exploit vulnerabilities within the physical infrastructure (e.g., electric charging stations), perform adversarial modifications to sensor data [23,24], perform poisoning attacks to intelligent agents [25], or perform network attacks that disrupt communications (e.g., a Denial-of-Service (DoS) attack [26]). For a comprehensive overview of various attack points that constitute the CAV attack surface, we refer the reader to [13,14,27,28].…”
Section: C-its Communication Domainsmentioning
confidence: 99%