Topics In Demand
Notification
New

No notification found.

Blog
Blockchain Meets Machine Learning and IoT - Power of Three

June 16, 2018

462

0

 

Future is coming at us very fast! This future will be based on convergence of three technologies: a) Blockchain, b) IoT , and c) Machine learning [1].

The world surrounding us consists of huge IoT (Sensor) networks recording every action we take. AI technology can help in analyzing these actions, detecting anomalies, identifying security threats and in taking appropriate measures.

Blockchain technology when combined with this vision of AI powered IoT networks has the potential to provide a secure environment with an immutable audit trail of events.

In this blog, we are going to expound on the use of AI in anomaly detection. In subsequent blogs, we will cover structuring and optimizing IoT networks.

So, What Is Anomaly Detection?

Anomaly detection is a technique used to identify unusual patterns that do not conform to expected behavior, called outliers [2]. It has many applications in business, from intrusion detection (identifying strange patterns in network traffic that could signal a hack) to system health monitoring, and from fraud detection in credit card transactions to fault detection in operating environments.

A good survey on anomaly detection technique is in [3]. The most common techniques fall into the scope of statistics, clustering and machine learning. Depending on the types of samples necessary to process the data, these techniques are divided into supervised, semi-supervised or unsupervised.

Supervised techniques require a training dataset with labels indicating the category of each sample (e.g., ‘no attack’, ‘jamming’ or ‘selective forwarding’) [4]. Then, a model is generated to classify new unlabeled samples into one of the defined categories. Semi-supervised techniques require a training dataset with samples of a single category in order to create a model that classifies new samples as belonging to that category or not. Finally, unsupervised techniques do not require labeled training data and are capable of dividing a dataset into various subsets without a previously learnt model.

Depending on the characteristics of the specific scenario and on the requirements of the application, some algorithms perform better than others [5].

More about anomaly detection is going to be covered in subsequent blogs.

DomaniSystems’ security approach for IoT networks combine Machine Learning with Blockchain technology.

 

For more details about DomaniSystems, visit our Website at https://www.domanisystems.com

 

We encourage open discussion on Smart Contracts, Blockchain,

Security and IoT for mutual benefit and enhancement of knowledge and understanding. You can start your discussion or questions here. You can also contact us directly; all the information is on our Website.

 

References:

[1] https://www.forbes.com/sites/oracle/2018/01/10/iot-ai-and-blockchain-time-to-reimagine-the-art-of-the-possible/#5648f5253107

[2] https://dzone.com/articles/anomaly-detection-in-mobile-sensor-data-using-ml

[3] Victor Garcia-Font , Carles Garrigues and Helena Rifà-Pous. A Comparative Study of Anomaly Detection Techniques for Smart City Wireless Sensor Networks., June, 2016 (file:///C:/Users/Dae%20Han/Downloads/sensors-16-00868.pdf)

[4] Kim, I.; Oh, D.; Yoon, M.K.; Yi, K.; Ro, W.W. A Distributed Signature Detection Method for Detecting Intrusions in Sensor Systems. Sensors 2013, 13, 3998–4016

[5] Chandola, V.; Banerjee, A.; Kumar, V. Anomaly Detection: A Survey. ACM Comput. Surv. 2009, 41, 15:1–15:58.

 


That the contents of third-party articles/blogs published here on the website, and the interpretation of all information in the article/blogs such as data, maps, numbers, opinions etc. displayed in the article/blogs and views or the opinions expressed within the content are solely of the author's; and do not reflect the opinions and beliefs of NASSCOM or its affiliates in any manner. NASSCOM does not take any liability w.r.t. content in any manner and will not be liable in any manner whatsoever for any kind of liability arising out of any act, error or omission. The contents of third-party article/blogs published, are provided solely as convenience; and the presence of these articles/blogs should not, under any circumstances, be considered as an endorsement of the contents by NASSCOM in any manner; and if you chose to access these articles/blogs , you do so at your own risk.


dalemontrone

© Copyright nasscom. All Rights Reserved.