Distributed Deployment of Anomaly Detection Scheme in Resource-Limited IoT Devices

Qun Du,Yunkai Wei,Yuming Mao
DOI: https://doi.org/10.1109/icct46805.2019.8947005
2019-01-01
Abstract:Internet of Things (IoT) is facing increasingly serious security threats. Various studies have been carried out to deploy anomaly detection schemes in some center points (e.g., sinks, edge/center servers) to protect the security of IoTs. However, in many IoTs, end-devices have mutual communications besides those converging to center points, and traditional anomaly detection schemes can hardly work in such scenario since they ignore the communications among end-devices. Worse still, the resources of end-devices are usually too limited to be deployed with any anomaly detection scheme. In this paper we propose a novel method to distribute an integrated anomaly detection scheme across several cooperative end-devices. We model the deployment problem with an integer optimization, and solve it with an improved genetic algorithm. Simulation results show that the distributed deployment can better accommodate to resource-limited end-devices in IoTs in terms of detection effect and computing resources.
What problem does this paper attempt to address?