Outlier Detection for IoT Frameworks using Machine Learning Techniques

Abstract

In "Outlier Detection for IoT Frameworks Using Isolation Forest," it highlights the need of identifying anomalous data in Internet of Things (IOT) environments, where enormous volumes of sensor data are transmitted over wireless networks. In IoT frameworks, identifying anomalies is crucial for network security, problem solving, and efficient data management. Issues in this field include high data volume and velocity, resource constraints on IoT devices, fluctuating network conditions, and the difficulty of distinguishing between real outliers and assaults or sensor faults. These problems are addressed by a variety of machine learning algorithms, such as K-Means Clustering and DBSCAN for classifying similar patterns and identifying outliers, Isolation Forest and One-Class SVM for unsupervised anomaly detection, and Neural Networks and Auto encoders for deep learning-based anomaly detection in complex, high- dimensional IoT data. These techniques look at network traffic, sensor readings, and device behaviors to improve system security and efficiency. This approach guarantees intelligent, safe, and dependable IoT activities in wireless settings. Among its uses are traffic optimization in smart transportation networks, network anomaly detection in healthcare monitoring systems, fault prediction in industrial IoT, and intrusion detection in smart cities.

Country : India

1 V.Lakshmi Chaitanya2 G.Anju Sree3 D.Aisha Thabusum4 U.Sravani5 G.Sneha6 K.Jyotshna

  1. Assistant Professor, Department of Computer Science & Engineering, Santhiram Engineering College, Nandyal, A.P., India
  2. Student, Department of Computer Science & Engineering, Santhiram Engineering College, Nandyal, A.P., India
  3. Student, Department of Computer Science & Engineering, Santhiram Engineering College, Nandyal, A.P., India
  4. Student, Department of Computer Science & Engineering, Santhiram Engineering College, Nandyal, A.P., India
  5. Student, Department of Computer Science & Engineering, Santhiram Engineering College, Nandyal, A.P., India
  6. Student, Department of Computer Science & Engineering, Santhiram Engineering College, Nandyal, A.P., India

IRJIET, Volume 9, Special Issue of INSPIRE’25 April 2025 pp. 180-184

doi.org/10.47001/IRJIET/2025.INSPIRE30

References

  1. V. Reppa, P. Papadopoulos, M. M. Polycarpou, and C. G. Panayiotou, “A distributed architecture for hvac sensor fault detection and isolation,” IEEE Transactions on Control Systems Technology, vol. 23, no. 4, pp. 1323–1337, July 2015.
  2. M. Alotaibi, “Security to wireless sensor networks against malicious attacks using hamming residue method,” EURASIP Journal on Wireless Communications and Networking, vol. 2019, no. 1, p. 8, Jan 2019.
  3. Sandhya G and A. Julian, “Intrusion detection in wireless sensor network using genetic k-means algorithm,” in 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies, May 2014, pp. 1791–1794.
  4. M. Xie, J. Hu, S. Han, and H. Chen, “Scalable hypergrid k-nnbased online anomaly detection in wireless sensor networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 8, pp. 1661–1670, Aug 2013.
  5. Mahammad, Farooq Sunar, et al. "Key distribution scheme for preventing key reinstallation attack in wireless networks." AIP Conference Proceedings. Vol. 3028. No. 1. AIP Publishing, 2024.
  6. Suman, Jami Venkata, et al. "Leveraging natural language processing in conversational AI agents to improve healthcare security." Conversational Artificial Intelligence (2024): 699-711.
  7. Sunar, Mahammad Farooq, and V. Madhu Viswanatham. "A fast approach to encrypt and decrypt of video streams for secure channel transmission." World Review of Science, Technology and Sustainable Development 14.1 (2018): 11-28.
  8. Mahammad, Farooq Sunar, Karthik Balasubramanian, and T. Sudhakar Babu. "A comprehensive research on video imaging techniques." All Open Access, Bronze (2019).
  9. Mahammad, Farooq Sunar, and V. Madhu Viswanatham. "Performance analysis of data compression algorithms for heterogeneous architecture through parallel approach." The Journal of Supercomputing 76.4 (2020): 2275-2288.
  10. Devi, M. Sharmila, et al. "Extracting and Analyzing Features in Natural Language Processing for Deep Learning with English Language." Journal of Research Publication and Reviews 4.4 (2023): 497-502.
  11. Devi, M. Sharmila, et al. "Machine Learning Based Classification and Clustering Analysis of Efficiency of Exercise Against Covid-19 Infection." Journal of Algebraic Statistics 13.3 (2022): 112-117.
  12. Mandalapu, Sharmila Devi, et al. "Rainfall prediction using machine learning." AIP Conference Proceedings. Vol. 3028. No. 1. AIP Publishing, 2024.
  13. Chaitanya, V. Lakshmi, et al. "Identification of traffic sign boards and voice assistance system for driving." AIP Conference Proceedings. Vol. 3028. No. 1. AIP Publishing, 2024.
  14. Chaitanya, V. Lakshmi. "Machine Learning Based Predictive Model for Data Fusion Based Intruder Alert System." journal of algebraic statistics 13.2 (2022): 2477-2483.
  15. Chaitanya, V. Lakshmi, and G. Vijaya Bhaskar. "Apriori vs Genetic algorithms for Identifying Frequent Item Sets." International journal of Innovative Research & Development 3.6 (2014): 249-254.
  16. Parumanchala Bhaskar, et al. "Incorporating Deep Learning Techniques to Estimate the Damage of Cars During the Accidents" AIP Conference Proceedings. Vol. 3028. No. 1. AIP Publishing, 2024.
  17. Parumanchala Bhaskar, et al “Cloud Computing Network in Remote Sensing-Based Climate Detection Using Machine Learning Algorithms” remote sensing in earth systems sciences (springer).
  18. Parumanchala Bhaskar, et al. "Machine Learning Based Predictive Model for Closed Loop Air Filtering System." Journal of Algebraic Statistics 13.3 (2022): 416-423.
  19. Paradesi Subba Rao, “Detecting malicious Twitter bots using machine learning” AIP Conf. Proc. 3028, 020073 (2024), https://doi.org/10.1063/5.0212693.
  20. Paradesi Subba Rao, “Morphed Image Detection using Structural Similarity Index Measure”M6 Volume 48 Issue 4 (December 2024), https://powertechjournal.com