LE3D: A Lightweight Ensemble Framework of Data Drift Detectors for Resource-Constrained Devices

11/03/2022
by   Ioannis Mavromatis, et al.
0

Data integrity becomes paramount as the number of Internet of Things (IoT) sensor deployments increases. Sensor data can be altered by benign causes or malicious actions. Mechanisms that detect drifts and irregularities can prevent disruptions and data bias in the state of an IoT application. This paper presents LE3D, an ensemble framework of data drift estimators capable of detecting abnormal sensor behaviours. Working collaboratively with surrounding IoT devices, the type of drift (natural/abnormal) can also be identified and reported to the end-user. The proposed framework is a lightweight and unsupervised implementation able to run on resource-constrained IoT devices. Our framework is also generalisable, adapting to new sensor streams and environments with minimal online reconfiguration. We compare our method against state-of-the-art ensemble data drift detection frameworks, evaluating both the real-world detection accuracy as well as the resource utilisation of the implementation. Experimenting with real-world data and emulated drifts, we show the effectiveness of our method, which achieves up to 97 while requiring minimal resources to run.

READ FULL TEXT

page 1

page 7

research
11/03/2022

Demo: LE3D: A Privacy-preserving Lightweight Data Drift Detection Framework

This paper presents LE3D; a novel data drift detection framework for pre...
research
10/14/2022

A Lightweight Moving Target Defense Framework for Multi-purpose Malware Affecting IoT Devices

Malware affecting Internet of Things (IoT) devices is rapidly growing du...
research
10/11/2020

Improved Fault Analysis on SIMECK Ciphers

The advances of the Internet of Things (IoT) have had a fundamental impa...
research
09/02/2021

Assessing Machine Learning Approaches to Address IoT Sensor Drift

The proliferation of IoT sensors and their deployment in various industr...
research
02/15/2023

ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks

IoT application domains, device diversity and connectivity are rapidly g...
research
12/13/2021

On The Reliability Of Machine Learning Applications In Manufacturing Environments

The increasing deployment of advanced digital technologies such as Inter...
research
02/28/2023

Security in Distributed Systems by Verifiable Location-Based Identities

Proof-of-Location (PoL) is a lightweight security concept for Internet-o...

Please sign up or login with your details

Forgot password? Click here to reset