Detection of Untrustworthy IoT Measurements Using Expert Knowledge of Their Joint Distribution

  • Ilia NouretdinovEmail author
  • Salaheddin Darwish
  • Stephen Wolthusen
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10898)


The aim of this work is to discuss abnormality detection and explanation challenges motivated by Medical Internet of Things. First, any feature is a measurement taken by a sensor at a time moment, so abnormality detection also becomes a sequential process. Second, an anomaly detection process could not rely on having a large collection of data records, but instead there is a knowledge provided by the experts.


Anomaly explanation Untrustworthy data Internet of Things 



This work was supported by Technology Integrated Health Management (TIHM) project awarded to the School of Mathematics and Information Security at Royal Holloway as part of an initiative by NHS England supported by InnovateUK, by European Union grant 671555 (“ExCAPE"), and AstraZeneca grant R10911.


  1. 1.
    Micenkova, B., Ng, R.T., Dang, X.-H., Assent, I.: Explaining outliers by subspace separability. In: Data Mining (ICDM), pp. 518–527. IEEE (2013)Google Scholar
  2. 2.
    Siddiqui, M.A., Fern, A., Dietterich, Th.G., Wong, W.-K.: Sequential Feature Explanations for Anomaly Detection. arXiv:1503.00038 [cs.AI] (2015)
  3. 3.
    Bottou, L.: Online Algorithms and Stochastic Approximations. Cambridge University Press, Cambridge (1998). ISBN 978-0-521-65263-6zbMATHGoogle Scholar
  4. 4.
    Mo, Y., Weerakkody, S., Sinopoli, B.: Physical authentication of control systems. IEEE Control Syst. Mag. 35(1), 93–109 (2015)CrossRefGoogle Scholar
  5. 5.
    Zagorecki, A., Orzechowski, P., Holownia, K.: A system for automated general medical diagnosis using Bayesian networks. In: Lehmann, C.U., et al. (eds.) MEDINFO (2013).
  6. 6.
    Franklin, S.S., Khan, S.A., Wong, N.D., Larson, M.G., Levy, D.: Is pulse pressure useful in predicting risk for coronary heart disease? The Framingham heart study. Circulation 100(4), 354–360 (1999)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Ilia Nouretdinov
    • 1
    Email author
  • Salaheddin Darwish
    • 1
  • Stephen Wolthusen
    • 1
  1. 1.Information Security GroupRHULEghamUK

Personalised recommendations