Abstract
Anomaly detection in smart homes is paramount in the prevailing information age as smart devices remain susceptible to sophisticated cyber-attacks. Hackers exploit vulnerabilities such as weak passwords and insecure, unencrypted data transfer to launch Distributed Denial of Service (DDoS) attacks. Sensible deployment of conventional security measures is jeopardized by the heterogeneity and resource constraints of smart devices. This article presents a novel approach that leverages the power consumption of Internet of Things (IoT) devices to detect anomalous behavior in smart home environments. We prototype a smart camera using Raspberry Pi and gather power traces for normal activity. Furthermore, we model DDoS attacks on the experimental setup and generate attack traces of power consumption. Besides, we compare the performances of several machine learning models for accurate prediction of the presence of anomalies. A deep feed-forward neural network model achieves an accuracy of 99.2% compared to other models. Empirical evaluations of the proposed concept affirm that power consumption is a promising parameter in detecting anomalies in smart homes. The proposed method is suitable for smart homes as it does not impose additional overhead on resource-constrained IoT devices.








Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Data Availability Statement
The datasets generated during and/or analysed during the current study are available from the corresponding author on reasonable request.
References
Alrashdi I, Alqazzaz A, Aloufi E, Alharthi R, Zohdy M, Ming H (2019) Ad-iot: anomaly detection of iot cyberattacks in smart city using machine learning. In: 2019 IEEE 9th annual computing and communication workshop and conference (CCWC). IEEE, pp 0305–0310
Al Shorman A, Faris H, Aljarah I (2020) Unsupervised intelligent system based on one class support vector machine and grey wolf optimization for IoT botnet detection. J Ambient Intell Humaniz Comput 11(7):2809–2825
Amor NB, Benferhat S, Elouedi Z (2004) Naive bayes vs decision trees in intrusion detection systems. In: Proceedings of the 2004 ACM symposium on Applied computing, pp 420–424
Angrishi K (2017) Turning internet of things (IoT) into internet of vulnerabilities (IoV): Iot botnets. arXiv preprint. arXiv:1702.03681
Anthi E, Williams L, Burnap P (2018) Pulse: an adaptive intrusion detection for the internet of things
Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J et al (2017) Understanding the Mirai botnet. In: 26th \(\{\)USENIX\(\}\) security symposium (\(\{\)USENIX\(\}\) security 17), pp 1093–1110
Apthorpe N, Reisman D, Feamster N (2017) A smart home is no castle: privacy vulnerabilities of encrypted IoT traffic. arXiv preprint. arXiv:1705.06805
Dilraj M, Nimmy K, Sankaran S (2019) Towards behavioral profiling based anomaly detection for smart homes. In: TENCON 2019—2019 IEEE region 10 conference (TENCON), pp 1258–1263
Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using deep learning approach for Internet of Things. Future Gener Comput Syst 82:761–768
Doshi R, Apthorpe N, Feamster N (2018) Machine learning DDoS detection for consumer internet of things devices. In: 2018 IEEE security and privacy workshops (SPW), pp 29–35
Erfani SM, Rajasegarar S, Karunasekera S, Leckie C (2016) High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning. Pattern Recognit 58:121–134
Fahad LG, Rajarajan M (2015) Anomalies detection in smart-home activities. In: 2015 IEEE 14th international conference on machine learning and applications (ICMLA), pp 419–422
Ferguson P, Senie D (2000) rfc2827: network ingress filtering: defeating denial of service attacks which employ IP source address spoofing. RFC Editor
Fernandes E, Jung J, Prakash A (2016) Security analysis of emerging smart home applications. In: 2016 IEEE symposium on security and privacy (SP), pp 636–654
Goodfellow I, Bengio Y, Courville A (2016) Deep learning. MIT Press, Cambridge
Haris S, Ahmad R, Ghani M (2010) Detecting TCP SYN flood attack based on anomaly detection. In: 2010 Second international conference on network applications, protocols and services, pp 240–244
Hasan M, Islam MM, Zarif MII, Hashem M (2019) Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet Things 7:100059
Horwitz L (2019) The future of IoT miniguide: the burgeoning IoT market continues [Computer software manual]. https://www.cisco.com/c/en/us/solutions/internet-of-things/ future-of-iot.html. Accessed Jan 2019
Hussain F, Hussain R, Hassan SA, Hossain E (2019) Machine learning in IoT security: current solutions and future challenges. arXiv preprint. arXiv:1904.05735
Javaheri D, Lalbakhsh P, Hosseinzadeh M (2021) A novel method for detecting future generations of targeted and metamorphic malware based on genetic algorithm. IEEE Access 9:69951–69970
Jiménez JMH, Bridges RA, Nichols JA, Goseva Popstojanova K, Prowell S (2016) Towards a malware detection framework based on power consumption monitoring
Kanev A, Nasteka A, Bessonova C, Nevmerzhitsky D, Silaev A, Efremov A, Nikiforova K (2017) Anomaly detection in wireless sensor network of the “smart home” system. In: 2017 20th Conference of open innovations association (FRUCT), pp 118–124
Ko I, Chambers D, Barrett E (2020) Feature dynamic deep learning approach for DDoS mitigation within the ISP domain. Int J Inf Secur 19(1):53–70
Kolahi SS, Alghalbi AA, Alotaibi AF, Ahmed SS, Lad D (2014) Performance comparison of defense mechanisms against TCP SYN flood DDoS attack. In: 2014 6th International congress on ultra modern telecommunications and control systems and workshops (ICUMT), pp 143–147
Kolias C, Kambourakis G, Stavrou A, Voas J (2017) DDoS in the IoT: Mirai and other botnets. Computer 50(7):80–84
Li S, Song H, Iqbal M (2019) Privacy and security for resource-constrained IoT devices and networks: research challenges and opportunities. Multidisciplinary Digital Publishing Institute
Liao Y, Vemuri VR (2002) Use of k-nearest neighbor classier for intrusion detection. Comput Secur 21(5):439–448
Lyu L, Jin J, Rajasegarar S, He X, Palaniswami M (2017) Fog-empowered anomaly detection in IoT using hyperellipsoidal clustering. IEEE Internet Things J 4(5):1174–1184
Meidan Y, Bohadana M, Mathov Y, Mirsky Y, Shabtai A, Breitenbacher D, Elovici Y (2018) N-baiot—network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Comput 17(3):12–22
Microsoft (2019) One-class support vector machine [Computer software manual]. https://docs.microsoft.com/en-us/azure/machine-learning/studio-module-reference/ one-class-support-vector-machine. Accessed Feb 2019
Mirjalili S (2015) How effective is the Grey Wolf optimizer in training multi-layer perceptrons. Appl Intell 43(1):150–161
Mothukuri V, Khare P, Parizi RM, Pouriyeh S, Dehghantanha A, Srivastava G (2021) Federated-learning-based anomaly detection for IoT security attacks. IEEE Internet Things J 9(4):2545–2554
Mukkamala S, Janoski G, Sung A (2002) Intrusion detection using neural networks and support vector machines. In: Proceedings of the 2002 international joint conference on neural networks. IJCNN’02 (cat. no. 02ch37290), vol 2, pp 1702–1707
Myridakis D, Spathoulas G, Kakarountas A (2017) Supply current monitoring for anomaly detection on IoT devices. In: Proceedings of the 21st Pan-Hellenic conference on informatics, p 9
Myridakis D, Spathoulas G, Kakarountas A, Schinianakis D, Lueken J (2019) Monitoring supply current thresholds for smart device’s security enhancement. In: 2019 15th International conference on distributed computing in sensor systems (DCOSS), pp 224–227
Ng A, Katanforoosh K (2017) Deep learning [Computer software manual]. Retrieved from http://cs229.stanford.edu/notes/ cs229-notes-deep learning.pdf. Accessed Mar 2019
Nguyen TD, Marchal S, Miettinen M, Fereidooni H, Asokan N, Sadeghi AR (2019) Dïot: a federated self-learning anomaly detection system for IoT. In: 2019 IEEE 39th international conference on distributed computing systems (ICDCS), pp 756–767
Nguyen H-T, Ngo Q-D, Le V-H (2020) A novel graph-based approach for IoT botnet detection. Int J Inf Secur 19(5):567–577
Nimmy K, Sankaran S, Achuthan K (2021a) A novel lightweight PUF based authentication protocol for IoT without explicit CRPs in verifier database. J Ambient Intell Humaniz Comput 1–16
Nimmy K, Sankaran S, Achuthan K, Calyam P (2021b) Lightweight and privacy-preserving remote user authentication for smart homes. IEEE Access 10:176–190
Novák M, Jakab F, Lain L (2013) Anomaly detection in user daily patterns in smart-home environment. J Sel Areas Health Inform 3(6):1–11
O’Donnell L (2019) 2 million IoT devices vulnerable to complete takeover [Computer software manual]. https://threatpost.com/iot-devices-vulnerable-takeover/144167
Otoum Y, Nayak A (2021) AS-IDS: anomaly and signature based IDS for the internet of things. J Netw Syst Manag 29(3):1–26
Ozawa S, Ban T, Hashimoto N, Nakazato J, Shimamura J (2020) A study of IoT malware activities using association rule learning for darknet sensor data. Int J Inf Secur 19(1):83–92
Pajouh HH, Javidan R, Khayami R, Dehghantanha A, Choo KKR (2016) A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans Emerg Top Comput 7(2):314–323
Park J, Tyagi A (2017) Using power clues to hack IoT devices: the power side channel provides for instruction-level disassembly. IEEE Consum Electron Mag 6(3):92–102
Pradeep P, Krishnamoorthy S, Vasilakos AV (2021) A holistic approach to a context-aware IoT ecosystem with adaptive ubiquitous middleware. Pervasive Mob Comput 72:101342
Priyadarsini K, Mishra N, Prasad M, Gupta V, Khasim S (2021) Detection of malware on the internet of things and its applications depends on long short-term memory network. J Ambient Intell Humaniz Comput 1–12
Ramapatruni S, Narayanan SN, Mittal S, Joshi A, Joshi K (2019) Anomaly detection models for smart home security. In: 2019 IEEE 5th international conference on big data security on cloud (BigDataSecurity), IEEE international conference on high performance and smart computing, (HPSC) and IEEE international conference on intelligent data and security (IDS), pp 19–24
Rambus (2020) Smart home: threats and countermeasures [Computer software manual]. Retrieved from https://www.rambus.com/iot/smart-home/
Santos J, Leroux P, Wauters T, Volckaert B, De Turck F (2018) Anomaly detection for smart city applications over 5g low power wide area networks. In: NOMS 2018—2018 IEEE/IP network operations and management symposium, pp 1–9
Sebyala AA, Olukemi T, Sacks L, Sacks DL (2002) Active platform security through intrusion detection using naive Bayesian network for anomaly detection. In: London communications symposium, pp 1–5
Shanthamallu US, Spanias A, Tepedelenlioglu C, Stanley M (2017) A brief survey of machine learning methods and their sensor and IoT applications. In: 2017 8th International conference on information, intelligence, systems applications (IISA), pp 1–8
Sharma R, Nori AV, Aiken A (2014) Bias-variance tradeoffs in program analysis. ACM SIGPLAN Not 49(1):127–137
Shon T, Kim Y, Lee C, Moon J (2005) A machine learning framework for network anomaly detection using SVM and GA. In: Proceedings from the sixth annual IEEE SMC information assurance workshop, pp 176–183
Shung KP (2018) Accuracy, precision, recall or f1. Retrieved from https://towardsdatascience.com/accuracy-precision-recall-or-f1-331fb37c5cb9
Su M-Y (2011) Real-time anomaly detection systems for denial-of-service attacks by weighted k-nearest-neighbor classifiers. Expert Syst Appl 38(4):3492–3498
Summerville DH, Zach KM, Chen Y (2015) Ultra-lightweight deep packet anomaly detection for internet of things devices. In: 2015 IEEE 34th international performance computing and communications conference (IPCCC), pp 1–8
Takase H, Kobayashi R, Kato M, Ohmura R (2020) A prototype implementation and evaluation of the malware detection mechanism for IoT devices using the processor information. Int J Inf Secur 19(1):71–81
Technologies K (2020) B2900 series precision source/measure units (SMU). https://www.keysight.com/in/en/products/sourcemeasure-units-smu/b2900-series-precisionsource-measure-unitssmu.html
Ukil A, Bandyoapdhyay S, Puri C, Pal A (2016) Iot healthcare analytics: the importance of anomaly detection. In: 2016 IEEE 30th international conference on advanced information networking and applications (AINA), pp 994–997
Ullah I, Mahmoud QH (2021) Design and development of a deep learning-based model for anomaly detection in IoT networks. IEEE Access 9:103906–103926
Wang D, Ming J, Chen T, Zhang X, Wang C (2018) Cracking IoT device user account via brute-force attack to SMS authentication code. In: Proceedings of the RST workshop on radical and experiential security, pp 57–60
Yamauchi M, Ohsita Y, Murata M, Ueda K, Kato Y (2019) Anomaly detection for smart home based on user behavior. In: 2019 IEEE international conference on consumer electronics (ICCE), pp 1–6
Acknowledgements
K. Nimmy would like to acknowledge the support from the Ministry of Electronics and Information Technology (MeitY), Government of India, under the Visvesvaraya PhD Scheme for Electronics and IT (Grant no. MEITY-PHD-2635).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Nimmy, K., Dilraj, M., Sankaran, S. et al. Leveraging power consumption for anomaly detection on IoT devices in smart homes. J Ambient Intell Human Comput 14, 14045–14056 (2023). https://doi.org/10.1007/s12652-022-04110-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-022-04110-6