Encyclopedia of Wireless Networks

Living Edition
| Editors: Xuemin (Sherman) Shen, Xiaodong Lin, Kuan Zhang

Anomaly Detection for IoT Systems

Living reference work entry
DOI: https://doi.org/10.1007/978-3-319-32903-1_183-1



Anomaly detection for Internet of Things (IoT) system is to automatically detect whether the IoT devices, components, or systems operate normally or not. Usually there are multiple sensors or external monitors that observe the signals sent from the operating IoT systems. The detection module analyzes the signals to determine whether the system’s behavior is normal or abnormal.

Historical Background

The IoT systems link the heterogeneous sensors and IoT servers to provide the IoT applications such as healthcare, industrial automation, environment monitoring, and so on. Because the decade aged IoT systems and new IoT systems may coexist, it is not easy to implement the monitors into the integrated IoT systems. It is usually to treat the integrated IoT system as a black box. Furthermore, because the signals come from one or more types of sensors (i.e., heterogeneous sensors), it is complicated for the monitors to analyze the signals...

This is a preview of subscription content, log in to check access.


  1. Breunig MM, Kriegel H-P, Ng RT, Sander J (2000) LOF: identifying density-based local outliers. ACM SIGMOD Rec 29(2):93–104CrossRefGoogle Scholar
  2. Difallah DE, Cudre-Mauroux P, McKenna SA (2013) Scalable anomaly detection for smart city infrastructure networks. IEEE Internet Comput 17(6):39–47CrossRefGoogle Scholar
  3. Fahad LG, Rajarajan M (2015) Anomalies detection in smart-home activities. In: Proceedings of IEEE international conference on machine learning and applicationsGoogle Scholar
  4. Hodo E, Bellekens X, Hamilton A, Dubouilh PL, Iorkyase E, Tachtatzis C, Atkinson R (2016) Threat analysis of IoT networks using artificial neural network intrusion detection system. In: Proceedings of IEEE international symposium on networks, computers and communicationsGoogle Scholar
  5. Juvonen A, Sipola T, Hämäläinen T (2015) Online anomaly detection using dimensionality reduction techniques for http log analysis. Comput Netw Int J Comput Telecommun Netw 91:46–56Google Scholar
  6. Kwak BI, Woo J, Kim HK (2016) Know your master: driver profiling-based anti-theft method. In: Proceedings of IEEE annual conference on privacy, security and trustGoogle Scholar
  7. Porkodi R, Bhuvaneswari V (2014) The internet of things applications and communication enabling technology standards: an overview. In: Proceedings of the international conference on intelligent computing applicationsGoogle Scholar
  8. Shin JK, Lee B, Park KS (2011) Detection of abnormal living patterns for elderly living alone using support vector data description. IEEE Trans Inf Technol Biomed 15(3):438–448CrossRefGoogle Scholar
  9. Stojanovic L, Dinic M, Stojanovic N, Stojadinovic A (2016) Big-data-driven anomaly detection in industry (4.0): an approach and a case study. In: Proceedings of IEEE international conference on big dataGoogle Scholar
  10. Valenzuela J, Wang J, Bissinger N (2013) Real-time intrusion detection in power system operations. IEEE Trans Power Syst 28(2):1052–1062CrossRefGoogle Scholar
  11. Xie M, Hu J, Guo S, Zomaya AY (2017) Distributed segment-based anomaly detection with Kullback–Leibler divergence in wireless sensor networks. IEEE Trans Inf Forensics Secur 12(1):101–110CrossRefGoogle Scholar
  12. Zhang Z, Wang X, Lin S (2016) Mobile payment anomaly detection mechanism based on information entropy. IET Netw 5(1):1–7CrossRefGoogle Scholar
  13. Zong B, Song Q, Min MR, Cheng W, Lumezanu C, Cho D, Chen H (2018) Deep autoencoding gaussian mixture model for unsupervised anomaly detection. In: Proceedings of international conference on learning representationsGoogle Scholar

Authors and Affiliations

  1. 1.Department of Computer Science and Information EngineeringNational Taiwan UniversityTaipeiTaiwan

Section editors and affiliations

  • Phone Lin
    • 1
  1. 1.TaipeiTaiwan