Ensemble-based spam detection in smart home IOT devices time series data using machine learning techniques

Ameema Zainab*, Shady S. Refaat, Othmane Bouhali

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

30 Citations (Scopus)

Abstract

The number of Internet of Things (IoT) devices is growing at a fast pace in smart homes, producing large amounts of data, which are mostly transferred over wireless communication channels. However, various IoT devices are vulnerable to different threats, such as cyber-attacks, fluctuating network connections, leakage of information, etc. Statistical analysis and machine learning can play a vital role in detecting the anomalies in the data, which enhances the security level of the smart home IoT system which is the goal of this paper. This paper investigates the trustworthiness of the IoT devices sending house appliances' readings, with the help of various parameters such as feature importance, root mean square error, hyper-parameter tuning, etc. A spamicity score was awarded to each of the IoT devices by the algorithm, based on the feature importance and the root mean square error score of the machine learning models to determine the trustworthiness of the device in the home network. A dataset publicly available for a smart home, along with weather conditions, is used for the methodology validation. The proposed algorithm is used to detect the spamicity score of the connected IoT devices in the network. The obtained results illustrate the efficacy of the proposed algorithm to analyze the time series data from the IoT devices for spam detection.

Original languageEnglish
Article number344
JournalInformation (Switzerland)
Volume11
Issue number11
DOIs
Publication statusPublished - Jul 2020
Externally publishedYes

Keywords

  • IoT devices
  • IoT security
  • Machine learning
  • Smart home
  • Spamicity score

Fingerprint

Dive into the research topics of 'Ensemble-based spam detection in smart home IOT devices time series data using machine learning techniques'. Together they form a unique fingerprint.

Cite this