Advertisement

Distributed-Solver for Networked Neural Network

  • Hantao Huang
  • Hao Yu
Chapter
Part of the Computer Architecture and Design Methodologies book series (CADM)

Abstract

In this chapter, we discuss the application of distributed machine learning techniques for indoor data analytics on smart-gateway network. More specifically, this chapter investigates three IoT applications, which are indoor positioning system, energy management system and network intrusion detection system. The proposed distributed-solver can perform real-time data analytics on smart gateways with consideration of constrained computation resource. Experimental results show that such a computational intelligence technique can be compactly realized on the computational-resource limited smart-gateway networks, which is desirable to build a real cyber-physical system towards future smart home, smart building, smart community and further a smart city (Figures and illustrations may be reproduced from [24, 26, 27, 28, 48]).

Keywords

Smart building Indoor positioning Network intrusion detection system 

References

  1. 1.
    (2012) ISCX-2012 dataset. http://www.unb.ca/research/iscx/dataset/iscx-IDS-dataset.html. Accessed: 04 June 2017
  2. 2.
    (2016) Adm-pcie-7v3. http://www.alpha-data.com/dcp/products.php?product=adm-pcie-7v3. Accessed: 13 June 2016
  3. 3.
  4. 4.
    Altini M, Brunelli D, Farella E, Benini L (2010) Bluetooth indoor localization with multiple neural networks. In: International symposium on wireless pervasive computing. Modena, Italy, pp 295–300Google Scholar
  5. 5.
    Anderson JP (1980) Computer security threat monitoring and surveillance. Technical report, James P. Anderson Company, Fort Washington, PennsylvaniaGoogle Scholar
  6. 6.
    Bahl P, Padmanabhan VN (2000) Radar: An in-building RF-based user location and tracking system. In: Annual joint conference of the IEEE computer and communications societies, vol 2. Tel Aviv, Israel, pp 775–784Google Scholar
  7. 7.
    Barker S, Mishra A, Irwin D, Cecchet E, Shenoy P, Albrecht J (2012) Smart*: An open data set and tools for enabling research in sustainable homes. In: Proceedings of the 2012 workshop on data mining applications in sustainability. Beijing, China, pp 112–118Google Scholar
  8. 8.
    Brunato M, Battiti R (2005) Statistical learning theory for location fingerprinting in wireless LANs. Comput Netw 47(6):825–845Google Scholar
  9. 9.
    Cai Y, Rai SK, Yu H (2015) Indoor positioning by distributed machine-learning based data analytics on smart gateway network. In: International conference on indoor positioning and indoor navigation. Alberta, Canada, pp 1–8Google Scholar
  10. 10.
    Cannady J (2000) Next generation intrusion detection: Autonomous reinforcement learning of network attacks. In: National information systems security conference. Baltimore, Maryland, pp 1–12Google Scholar
  11. 11.
    Cheng Q, Yao J, Wu H, Chen S, Liu C, Yao P (2013) Short-term load forecasting with weather component based on improved extreme learning machine. In: Chinese automation congress. Hunan, China, pp 316–321Google Scholar
  12. 12.
    Cook DJ, Augusto JC, Jakkula VR (2009) Ambient intelligence: Technologies, applications, and opportunities. Pervasive Mob Comput 5(4):277–298Google Scholar
  13. 13.
    Dean J, Corrado G, Monga R, Chen K, Devin M, Mao M, Senior A, Tucker P, Yang K, Le QV et al (2012) Large scale distributed deep networks. In: Advances in neural information processing systems. Lake Tahoe, Nevada, pp 1223–1231Google Scholar
  14. 14.
    Donoho DL (2006) Compressed sensing. IEEE Trans Inf Theory 52(4):1289–1306Google Scholar
  15. 15.
    Drane C, Macnaughtan M, Scott C (1998) Positioning GSM telephones. IEEE Commun Mag 36(4):46–54Google Scholar
  16. 16.
    Egli P, Netmodule A (2006) Susceptibility of wireless devices to denial of service attacks. White paper, Netmodule AG, Niederwangen, SwitzerlandGoogle Scholar
  17. 17.
    Ergin MO, Handziski V, Wolisz A (2013) Node sequence discovery in wireless sensor networks. In: International conference on distributed computing in sensor systems. Massachusetts, Cambridge, pp 394–401Google Scholar
  18. 18.
    Generation SE (2016) Solar energy generation profiles, Elizabeth City State University. http://rredc.nrel.gov/solar/new_data/confrrm/ec/. Accessed Feb 2016
  19. 19.
    Hampshire N (2015) Pricing strategy for new Hampshire electric co-op. http://www.oca.nh.gov/Advisory%20Board/ArchivedMinutes/20150727Mtg/NHEC%20Presentation%20re%20AMI%20DP%20Prepaid%207-27-15.pdf. Accessed June 2015
  20. 20.
    Hippert HS, Pedreira CE, Souza RC (2001) Neural networks for short-term load forecasting: A review and evaluation. IEEE Trans Power Syst 16(1):44–55Google Scholar
  21. 21.
    Hodo E et al (2016) Threat analysis of IoT networks using artificial neural network intrusion detection system. In: International symposium on networks, computers and communications. Yasmine Hammamet, Tunisia, pp 1–6Google Scholar
  22. 22.
    Hoverstad BA, Tidemann A, Langseth H, Ozturk P (2015) Short-term load forecasting with seasonal decomposition using evolution for parameter tuning. IEEE Trans Smart Grid 6(4):1904–1913Google Scholar
  23. 23.
    Huang GB, Zhu QY, Siew CK (2006) Extreme learning machine: Theory and applications. Neurocomputing 70(1):489–501Google Scholar
  24. 24.
    Huang H, Cai Y, Yu H (2016) Distributed-neuron-network based machine learning on smart-gateway network towards real-time indoor data analytics. In: Conference on design, automation and test in Europe. Dresden, Germany, pp 720–725Google Scholar
  25. 25.
    Huang H, Cai Y, Xu H, Yu H (2017) A multi-agent minority-game based demand-response management of smart buildings towards peak load reduction. IEEE Trans Comput-Aided Des Integr Circuits Syst 36(4):573–585.  https://doi.org/10.1109/TCAD.2016.2571847
  26. 26.
    Huang H, Khalid RS, Liu W, Yu H (2017) Work-in-progress: A fast online sequential learning accelerator for IOT network intrusion detection. In: 2017 International conference on hardware/software codesign and system synthesis (CODES+ ISSS). IEEE, pp 1–2.  https://doi.org/10.1145/3125502.3125532
  27. 27.
    Huang H, Khalid RS, Yu H (2017) Distributed machine learning on smart-gateway network towards real-time indoor data analytics. Data science and big data: An environment of computational intelligence. Springer, Berlin, pp 231–263.  https://doi.org/10.1007/978-3-319-53474-9_11
  28. 28.
    Huang H, Xu H, Cai Y, Khalid RS, Yu H (2018) Distributed machine learning on smart-gateway network toward real-time smart-grid energy management with behavior cognition. ACM Trans Des Autom Electron Syst (TODAES) 23(5):56.  https://doi.org/10.1145/3209888
  29. 29.
    Kleissl J, Agarwal Y (2010) Cyber-physical energy systems: Focus on smart buildings. In: Proceeding of design automation conference. California, San Francisco, pp 749–754Google Scholar
  30. 30.
    Kuang F, Zhang S, Jin Z, Xu W (2015) A novel SVM by combining kernel principal component analysis and improved chaotic particle swarm optimization for intrusion detection. Soft Comput 19(5):1187–1199Google Scholar
  31. 31.
    Li Y, Zhang C, Yang L (2016) The research of AMI intrusion detection method using ELM in smart grid. Int J Secur Appl 10(5):283–296Google Scholar
  32. 32.
    Liang NY, Huang GB, Saratchandran P, Sundararajan N (2006) A fast and accurate online sequential learning algorithm for feedforward networks. IEEE Trans Neural Netw 17(6):1411–1423Google Scholar
  33. 33.
    Liu H, Darabi H, Banerjee P, Liu J (2007) Survey of wireless indoor positioning techniques and systems. IEEE Trans Syst Man Cybern Part C: Appl Rev 37(6):1067–1080Google Scholar
  34. 34.
    Maciá-Pérez F, Mora-Gimeno FJ, Marcos-Jorquera D, Gil-Martínez-Abarca JA, Ramos-Morillo H, Lorenzo-Fonseca I (2011) Network intrusion detection system embedded on a smart sensor. IEEE Trans Ind Electron 58(3):722–732Google Scholar
  35. 35.
    Mehmood H, Tripathi NK, Tipdecho T (2010) Indoor positioning system using artificial neural network. J Comput Sci 6(10):1219Google Scholar
  36. 36.
    Miller DJ, Yan L (1999) Critic-driven ensemble classification. IEEE Trans Signal Process 47(10):2833–2844Google Scholar
  37. 37.
    Minku LL, White AP, Yao X (2010) The impact of diversity on online ensemble learning in the presence of concept drift. IEEE Trans Knowl Data Eng 22(5):730–742Google Scholar
  38. 38.
    Nyakundi E (2015) Using support vector machines in anomaly intrusion detection. PhD thesis, The University of GuelphGoogle Scholar
  39. 39.
    Richardson I, Thomson M, Infield D (2008) A high-resolution domestic building occupancy model for energy demand simulations. Energy Build 40(8):1560–1566Google Scholar
  40. 40.
    Stella M, Russo M, Begusic D (2007) Location determination in indoor environment based on RSS fingerprinting and artificial neural network. In: International conference on telecommunications. Zagreb, Croatia, pp 301–306Google Scholar
  41. 41.
    Sun CC, Liu CC, Xie J (2016) Cyber-physical system security of a power grid: State-of-the-art. Electronics 5(3):40Google Scholar
  42. 42.
    Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2012) NSL-KDD dataset. http://www.iscx.ca/NSL-KDD. Accessed: 04 June 2017
  43. 43.
    Torres-Solis J, Falk TH, Chau T (2010) A review of indoor localization technologies: Towards navigational assistance for topographical disorientation. INTECHGoogle Scholar
  44. 44.
    Tsikoudis N, Papadogiannakis A, Markatos EP (2016) LEoNIDS: A low-latency and energy-efficient network-level intrusion detection system. IEEE Trans Emerg Topics Comput 4(1):142–155Google Scholar
  45. 45.
    Viegas E, Santin AO, França A, Jasinski R, Pedroni VA, Oliveira LS (2017) Towards an energy-efficient anomaly-based intrusion detection engine for embedded systems. IEEE Trans Comput 66(1):163–177Google Scholar
  46. 46.
    Wang J, Li K, Lv Q, Zhou H, Shang L (2010) Hybrid energy storage system integration for vehicles. In: International symposium on low power electronics and design. Richardson, Texas, pp 369–374Google Scholar
  47. 47.
    Weller-Fahy DJ, Borghetti BJ, Sodemann AA (2015) A survey of distance and similarity measures used within network intrusion anomaly detection. IEEE Commun Surv Tutor 17(1):70–91Google Scholar
  48. 48.
    Xu H, Huang H, Khalid RS, Yu H (2016) Distributed machine learning based smart-grid energy management with occupant cognition. In: 2016 IEEE international conference on smart grid communications (SmartGridComm). IEEE, pp 491–496.  https://doi.org/10.1109/SmartGridComm.2016.7778809
  49. 49.
    Xu J, Liu W, Lang F, Zhang Y, Wang C (2010) Distance measurement model based on RSSI in WSN. Wirel Sens Netw 2(08):606Google Scholar
  50. 50.
    Ye N, Liu Y, Wang Y (2012) Short-term power load forecasting based on SVM. In: World automation congress. Puerto Vallarta, MexicoGoogle Scholar
  51. 51.
    Zhang C, Wu W, Huang H, Yu H (2012) Fair energy resource allocation by minority game algorithm for smart buildings. In: Design automation conference in Europe. Dresden, GermanyGoogle Scholar
  52. 52.
    Zhang Y, Wang L, Sun W, Green II RC, Alam M (2011) Distributed intrusion detection system in a multi-layer network architecture of smart grids. IEEE Trans Smart Grid 2(4):796–808Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.School of Electrical and Electronic EngineeringNanyang Technological UniversitySingaporeSingapore
  2. 2.Department of Electrical and Electronic EngineeringSouthern University of Science and TechnologyShenzhenChina

Personalised recommendations