SlideShare a Scribd company logo
Distributed Anomaly Detection using
Autoencoder Neural Networks in WSN for IoT
SPEAKER: Shun-Yu, Ko
ID:107598068
Outline
1. Introduction
2. Anomaly detection
3. Autoencoder neural network
4. System architecture and two-part algorithm
5. Performance evaluation
6. Results
7. Conclusion
8. Reference
Introduction
Introduction
Introduction
1. In this paper, we propose to use autoencoder neural networks
for anomaly detection in WSN.
2. It has the minimal communication and computation requirements
and the distributed advantage.
3. This work is the first to introduce Autoencoder into WSN.
5
Autoencoder neural network
6
Autoencoder neural network
7
The hyper parameters
• Neural Network=input+Weight+Bias+Activation function
8
System Architecture
9
WSN Computational complexity
• MAX Dimension : M ( Ex : 720 )
• Computation time : O(M2)
According to the paper : Scalable hypergrid
k-Nnbased online anomaly detection in wireless
sensor networks , IEEE Transactions on Parallel and
Distributed Systems, vol. 24, no. 8, pp. 1661–1670,
2013 ,it cost O(2M-1) Computation time !
10
PERFORMANCE EVALUATION
WSN Testbed and Dataset
1. 8 sensor nodes that monitor temperature and relative humidity.
2. 720 daily readings from a single sensor
3. Run for 4 months.
11
ROC Curve(receiver operating characteristic curve)
12
有高血壓 無高血壓
ROC Curve
• Accuracy = (TP + TN) / (P + N)
13
Area under the Curve of ROC (AUC ROC))
14
Results- Varying anomaly magnitude:
1. Vary the magnitude v of spikes and
bursts .
2. Fixing the frequency of anomalies at K =
100 per day.
3. AUC > 0.8 most of the time, which
indicates a good classifier.
15
Results- Varying anomaly frequency:
16
CONCLUSION
1. This paper presents the first effort of introducing autoencoder
neural networks into WSN to perform anomaly detection.
2. Communication overhead is minimized and computational load is
allocated to the most suitable entities.
3. Single hidden layer of neurons and the corresponding
computational complexity is only polynomial O(M2) in order to suit
resource-limited sensors.
4. Unsupervised learning is able to adapt to unforeseeable and new
changes in a non-stable environment.
17
Reference
• T. Luo and S. G. Nagarajan, "Distributed Anomaly Detection Using
Autoencoder Neural Networks in WSN for IoT," 2018 IEEE
International Conference on Communications (ICC), Kansas City, MO,
2018, pp. 1-6.
doi: 10.1109/ICC.2018.8422402
18

More Related Content

PDF
Security based Clock Synchronization technique in Wireless Sensor Network for...
PDF
An optimal algorithm for coverage hole healing
PDF
Ijarcet vol-2-issue-3-916-919
PDF
Localization for wireless sensor
PDF
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...
PDF
5.a robust frame of wsn utilizing localization technique 36-46
PDF
Kn2518431847
PDF
Greedy – based Heuristic for OSC problems in Wireless Sensor Networks
Security based Clock Synchronization technique in Wireless Sensor Network for...
An optimal algorithm for coverage hole healing
Ijarcet vol-2-issue-3-916-919
Localization for wireless sensor
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...
5.a robust frame of wsn utilizing localization technique 36-46
Kn2518431847
Greedy – based Heuristic for OSC problems in Wireless Sensor Networks

What's hot (16)

PDF
D0371028039
PDF
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
PDF
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
DOCX
NS2 Projects 2014
PDF
Significant Storage on Sensor Storage Space, Energy Consumption and Better Se...
PDF
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
DOCX
Secure data aggregation technique for wireless
DOCX
Secure data aggregation technique for wireless sensor networks in the presenc...
PDF
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
PDF
International Journal of Engineering Research and Development (IJERD)
PDF
F33022028
PDF
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
PDF
International Journal of Engineering Research and Development (IJERD)
PDF
A Distributed Cut Detection Method for Wireless Sensor Networks
PDF
Energy efficient approach based on evolutionary algorithm for coverage contro...
PDF
Masters_Thesis_ver.1.02
D0371028039
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
NS2 Projects 2014
Significant Storage on Sensor Storage Space, Energy Consumption and Better Se...
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Secure data aggregation technique for wireless
Secure data aggregation technique for wireless sensor networks in the presenc...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
International Journal of Engineering Research and Development (IJERD)
F33022028
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
International Journal of Engineering Research and Development (IJERD)
A Distributed Cut Detection Method for Wireless Sensor Networks
Energy efficient approach based on evolutionary algorithm for coverage contro...
Masters_Thesis_ver.1.02
Ad

Similar to 【Machine Lewarning】 Paper Presentation (20)

PDF
ANOMALY DETECTION IN WIRELESS SENSOR NETWORKS M.Sc. Thesis
PDF
Deep Learning Fault Detection Algorithms in WSNs
PPTX
Sensing the Future: Anomaly Detection and Event Prediction in Sensor Networks
PDF
Autoencoder Forest for Anomaly Detection from IoT Time Series
PPTX
Anomaly Detection using Deep Auto-Encoders | Gianmario Spacagna
PDF
A Brief Study on Different Intrusions and Machine Learning-based Anomaly Dete...
PDF
Cao nicolau-mc dermott-learning-neural-cybernetics-2018-preprint
PDF
Detecting anomalies on rotating equipment using Deep Stacked Autoencoders - b...
PDF
Anomaly Detection using Deep Auto-Encoders
PDF
Anomaly detection using deep learning based model with feature attention
PPTX
An Asynchronous Distributed Deep Learning Based Intrusion Detection System fo...
PPTX
Machine Learning Algorithms for Anomaly Detection in Particles Accelerators T...
PDF
2007.02500.pdf
PPTX
first_ppt[1] (1).pptx
PDF
PERFORMANCE EVALUATION OF MACHINE LEARNING TECHNIQUES FOR DOS DETECTION IN WI...
PDF
EMT machine learning 12th weeks : Anomaly detection
PPTX
Evaluation of Different Machine.pptx
PPTX
Introduction_PPT.pptx
DOCX
http://odmt.in
PPTX
Anomaly detection, part 1
ANOMALY DETECTION IN WIRELESS SENSOR NETWORKS M.Sc. Thesis
Deep Learning Fault Detection Algorithms in WSNs
Sensing the Future: Anomaly Detection and Event Prediction in Sensor Networks
Autoencoder Forest for Anomaly Detection from IoT Time Series
Anomaly Detection using Deep Auto-Encoders | Gianmario Spacagna
A Brief Study on Different Intrusions and Machine Learning-based Anomaly Dete...
Cao nicolau-mc dermott-learning-neural-cybernetics-2018-preprint
Detecting anomalies on rotating equipment using Deep Stacked Autoencoders - b...
Anomaly Detection using Deep Auto-Encoders
Anomaly detection using deep learning based model with feature attention
An Asynchronous Distributed Deep Learning Based Intrusion Detection System fo...
Machine Learning Algorithms for Anomaly Detection in Particles Accelerators T...
2007.02500.pdf
first_ppt[1] (1).pptx
PERFORMANCE EVALUATION OF MACHINE LEARNING TECHNIQUES FOR DOS DETECTION IN WI...
EMT machine learning 12th weeks : Anomaly detection
Evaluation of Different Machine.pptx
Introduction_PPT.pptx
http://odmt.in
Anomaly detection, part 1
Ad

Recently uploaded (20)

PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Spectroscopy.pptx food analysis technology
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Machine learning based COVID-19 study performance prediction
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
MYSQL Presentation for SQL database connectivity
Advanced methodologies resolving dimensionality complications for autism neur...
Digital-Transformation-Roadmap-for-Companies.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Spectroscopy.pptx food analysis technology
A comparative analysis of optical character recognition models for extracting...
Reach Out and Touch Someone: Haptics and Empathic Computing
Machine learning based COVID-19 study performance prediction
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Mobile App Security Testing_ A Comprehensive Guide.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Encapsulation_ Review paper, used for researhc scholars
Chapter 3 Spatial Domain Image Processing.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
20250228 LYD VKU AI Blended-Learning.pptx

【Machine Lewarning】 Paper Presentation

  • 1. Distributed Anomaly Detection using Autoencoder Neural Networks in WSN for IoT SPEAKER: Shun-Yu, Ko ID:107598068
  • 2. Outline 1. Introduction 2. Anomaly detection 3. Autoencoder neural network 4. System architecture and two-part algorithm 5. Performance evaluation 6. Results 7. Conclusion 8. Reference
  • 5. Introduction 1. In this paper, we propose to use autoencoder neural networks for anomaly detection in WSN. 2. It has the minimal communication and computation requirements and the distributed advantage. 3. This work is the first to introduce Autoencoder into WSN. 5
  • 8. The hyper parameters • Neural Network=input+Weight+Bias+Activation function 8
  • 10. WSN Computational complexity • MAX Dimension : M ( Ex : 720 ) • Computation time : O(M2) According to the paper : Scalable hypergrid k-Nnbased online anomaly detection in wireless sensor networks , IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 8, pp. 1661–1670, 2013 ,it cost O(2M-1) Computation time ! 10
  • 11. PERFORMANCE EVALUATION WSN Testbed and Dataset 1. 8 sensor nodes that monitor temperature and relative humidity. 2. 720 daily readings from a single sensor 3. Run for 4 months. 11
  • 12. ROC Curve(receiver operating characteristic curve) 12 有高血壓 無高血壓
  • 13. ROC Curve • Accuracy = (TP + TN) / (P + N) 13
  • 14. Area under the Curve of ROC (AUC ROC)) 14
  • 15. Results- Varying anomaly magnitude: 1. Vary the magnitude v of spikes and bursts . 2. Fixing the frequency of anomalies at K = 100 per day. 3. AUC > 0.8 most of the time, which indicates a good classifier. 15
  • 16. Results- Varying anomaly frequency: 16
  • 17. CONCLUSION 1. This paper presents the first effort of introducing autoencoder neural networks into WSN to perform anomaly detection. 2. Communication overhead is minimized and computational load is allocated to the most suitable entities. 3. Single hidden layer of neurons and the corresponding computational complexity is only polynomial O(M2) in order to suit resource-limited sensors. 4. Unsupervised learning is able to adapt to unforeseeable and new changes in a non-stable environment. 17
  • 18. Reference • T. Luo and S. G. Nagarajan, "Distributed Anomaly Detection Using Autoencoder Neural Networks in WSN for IoT," 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, 2018, pp. 1-6. doi: 10.1109/ICC.2018.8422402 18

Editor's Notes

  • #5: The task of anomaly detection could be undertaken by a central IoT entity such as “back-end” as often referred to, such a scheme tends to cause highly inefficient resource utilization. Because of the large amount of data that needs to be transmitted from sensors to the central entity, which entails substantial channel interference and energy consumption. 1.異常檢測可以利用集中式的方式進行,但往往導致資源利用非常沒有效率。 2.因為Sensor需要持續傳輸data到sink點,需要大量的通道干擾和能源的消耗。 而且事實上只有很小一部分的資料是異常的