Applying VorEAl for IoT intrusion detection

4Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Smart connected devices create what has been denominated as the Internet of Things (IoT). The combined and cohesive use of these devices prompts the emergence of Ambient Intelligence (AmI). One of the current key issues in the IoT domain has to do with the detection and prevention of security breaches and intrusions. In this paper, we introduce the use of the Voronoi diagram-based Evolutionary Algorithm (VorEAl) in the context of IoT intrusion detection. In order to cope with the dimensions of the problem, we propose a modification of VorEAl that employs a proxy for the volume that approximates it using a heuristic surrogate. The proxy has linear complexity and, therefore, highly scalable. The experimental studies carried out as part of the paper show that our approach is able to outperform other approaches that have been previously used to address the problem of interest.

Cite

CITATION STYLE

APA

Sanchez-Pi, N., Martí, L., & Molina, J. M. (2018). Applying VorEAl for IoT intrusion detection. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10870 LNAI, pp. 363–374). Springer Verlag. https://doi.org/10.1007/978-3-319-92639-1_30

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free