Smart connected devices create what has been denominated as the Internet of Things (IoT). The combined and cohesive use of these devices prompts the emergence of Ambient Intelligence (AmI). One of the current key issues in the IoT domain has to do with the detection and prevention of security breaches and intrusions. In this paper, we introduce the use of the Voronoi diagram-based Evolutionary Algorithm (VorEAl) in the context of IoT intrusion detection. In order to cope with the dimensions of the problem, we propose a modification of VorEAl that employs a proxy for the volume that approximates it using a heuristic surrogate. The proxy has linear complexity and, therefore, highly scalable. The experimental studies carried out as part of the paper show that our approach is able to outperform other approaches that have been previously used to address the problem of interest.
CITATION STYLE
Sanchez-Pi, N., Martí, L., & Molina, J. M. (2018). Applying VorEAl for IoT intrusion detection. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10870 LNAI, pp. 363–374). Springer Verlag. https://doi.org/10.1007/978-3-319-92639-1_30
Mendeley helps you to discover research relevant for your work.