Skip to main content
Log in

Leveraging power consumption for anomaly detection on IoT devices in smart homes

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Anomaly detection in smart homes is paramount in the prevailing information age as smart devices remain susceptible to sophisticated cyber-attacks. Hackers exploit vulnerabilities such as weak passwords and insecure, unencrypted data transfer to launch Distributed Denial of Service (DDoS) attacks. Sensible deployment of conventional security measures is jeopardized by the heterogeneity and resource constraints of smart devices. This article presents a novel approach that leverages the power consumption of Internet of Things (IoT) devices to detect anomalous behavior in smart home environments. We prototype a smart camera using Raspberry Pi and gather power traces for normal activity. Furthermore, we model DDoS attacks on the experimental setup and generate attack traces of power consumption. Besides, we compare the performances of several machine learning models for accurate prediction of the presence of anomalies. A deep feed-forward neural network model achieves an accuracy of 99.2% compared to other models. Empirical evaluations of the proposed concept affirm that power consumption is a promising parameter in detecting anomalies in smart homes. The proposed method is suitable for smart homes as it does not impose additional overhead on resource-constrained IoT devices.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data Availability Statement

The datasets generated during and/or analysed during the current study are available from the corresponding author on reasonable request.

References

  • Alrashdi I, Alqazzaz A, Aloufi E, Alharthi R, Zohdy M, Ming H (2019) Ad-iot: anomaly detection of iot cyberattacks in smart city using machine learning. In: 2019 IEEE 9th annual computing and communication workshop and conference (CCWC). IEEE, pp 0305–0310

    Chapter  Google Scholar 

  • Al Shorman A, Faris H, Aljarah I (2020) Unsupervised intelligent system based on one class support vector machine and grey wolf optimization for IoT botnet detection. J Ambient Intell Humaniz Comput 11(7):2809–2825

    Article  Google Scholar 

  • Amor NB, Benferhat S, Elouedi Z (2004) Naive bayes vs decision trees in intrusion detection systems. In: Proceedings of the 2004 ACM symposium on Applied computing, pp 420–424

    Chapter  Google Scholar 

  • Angrishi K (2017) Turning internet of things (IoT) into internet of vulnerabilities (IoV): Iot botnets. arXiv preprint. arXiv:1702.03681

  • Anthi E, Williams L, Burnap P (2018) Pulse: an adaptive intrusion detection for the internet of things

  • Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J et al (2017) Understanding the Mirai botnet. In: 26th \(\{\)USENIX\(\}\) security symposium (\(\{\)USENIX\(\}\) security 17), pp 1093–1110

  • Apthorpe N, Reisman D, Feamster N (2017) A smart home is no castle: privacy vulnerabilities of encrypted IoT traffic. arXiv preprint. arXiv:1705.06805

  • Dilraj M, Nimmy K, Sankaran S (2019) Towards behavioral profiling based anomaly detection for smart homes. In: TENCON 2019—2019 IEEE region 10 conference (TENCON), pp 1258–1263

  • Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using deep learning approach for Internet of Things. Future Gener Comput Syst 82:761–768

    Article  Google Scholar 

  • Doshi R, Apthorpe N, Feamster N (2018) Machine learning DDoS detection for consumer internet of things devices. In: 2018 IEEE security and privacy workshops (SPW), pp 29–35

  • Erfani SM, Rajasegarar S, Karunasekera S, Leckie C (2016) High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning. Pattern Recognit 58:121–134

    Article  Google Scholar 

  • Fahad LG, Rajarajan M (2015) Anomalies detection in smart-home activities. In: 2015 IEEE 14th international conference on machine learning and applications (ICMLA), pp 419–422

  • Ferguson P, Senie D (2000) rfc2827: network ingress filtering: defeating denial of service attacks which employ IP source address spoofing. RFC Editor

  • Fernandes E, Jung J, Prakash A (2016) Security analysis of emerging smart home applications. In: 2016 IEEE symposium on security and privacy (SP), pp 636–654

  • Goodfellow I, Bengio Y, Courville A (2016) Deep learning. MIT Press, Cambridge

    MATH  Google Scholar 

  • Haris S, Ahmad R, Ghani M (2010) Detecting TCP SYN flood attack based on anomaly detection. In: 2010 Second international conference on network applications, protocols and services, pp 240–244

  • Hasan M, Islam MM, Zarif MII, Hashem M (2019) Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet Things 7:100059

    Article  Google Scholar 

  • Horwitz L (2019) The future of IoT miniguide: the burgeoning IoT market continues [Computer software manual]. https://www.cisco.com/c/en/us/solutions/internet-of-things/ future-of-iot.html. Accessed Jan 2019

  • Hussain F, Hussain R, Hassan SA, Hossain E (2019) Machine learning in IoT security: current solutions and future challenges. arXiv preprint. arXiv:1904.05735

  • Javaheri D, Lalbakhsh P, Hosseinzadeh M (2021) A novel method for detecting future generations of targeted and metamorphic malware based on genetic algorithm. IEEE Access 9:69951–69970

    Article  Google Scholar 

  • Jiménez JMH, Bridges RA, Nichols JA, Goseva Popstojanova K, Prowell S (2016) Towards a malware detection framework based on power consumption monitoring

  • Kanev A, Nasteka A, Bessonova C, Nevmerzhitsky D, Silaev A, Efremov A, Nikiforova K (2017) Anomaly detection in wireless sensor network of the “smart home” system. In: 2017 20th Conference of open innovations association (FRUCT), pp 118–124

  • Ko I, Chambers D, Barrett E (2020) Feature dynamic deep learning approach for DDoS mitigation within the ISP domain. Int J Inf Secur 19(1):53–70

    Article  Google Scholar 

  • Kolahi SS, Alghalbi AA, Alotaibi AF, Ahmed SS, Lad D (2014) Performance comparison of defense mechanisms against TCP SYN flood DDoS attack. In: 2014 6th International congress on ultra modern telecommunications and control systems and workshops (ICUMT), pp 143–147

  • Kolias C, Kambourakis G, Stavrou A, Voas J (2017) DDoS in the IoT: Mirai and other botnets. Computer 50(7):80–84

    Article  Google Scholar 

  • Li S, Song H, Iqbal M (2019) Privacy and security for resource-constrained IoT devices and networks: research challenges and opportunities. Multidisciplinary Digital Publishing Institute

  • Liao Y, Vemuri VR (2002) Use of k-nearest neighbor classier for intrusion detection. Comput Secur 21(5):439–448

    Article  Google Scholar 

  • Lyu L, Jin J, Rajasegarar S, He X, Palaniswami M (2017) Fog-empowered anomaly detection in IoT using hyperellipsoidal clustering. IEEE Internet Things J 4(5):1174–1184

    Article  Google Scholar 

  • Meidan Y, Bohadana M, Mathov Y, Mirsky Y, Shabtai A, Breitenbacher D, Elovici Y (2018) N-baiot—network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Comput 17(3):12–22

    Article  Google Scholar 

  • Microsoft (2019) One-class support vector machine [Computer software manual]. https://docs.microsoft.com/en-us/azure/machine-learning/studio-module-reference/ one-class-support-vector-machine. Accessed Feb 2019

  • Mirjalili S (2015) How effective is the Grey Wolf optimizer in training multi-layer perceptrons. Appl Intell 43(1):150–161

    Article  Google Scholar 

  • Mothukuri V, Khare P, Parizi RM, Pouriyeh S, Dehghantanha A, Srivastava G (2021) Federated-learning-based anomaly detection for IoT security attacks. IEEE Internet Things J 9(4):2545–2554

    Article  Google Scholar 

  • Mukkamala S, Janoski G, Sung A (2002) Intrusion detection using neural networks and support vector machines. In: Proceedings of the 2002 international joint conference on neural networks. IJCNN’02 (cat. no. 02ch37290), vol 2, pp 1702–1707

  • Myridakis D, Spathoulas G, Kakarountas A (2017) Supply current monitoring for anomaly detection on IoT devices. In: Proceedings of the 21st Pan-Hellenic conference on informatics, p 9

  • Myridakis D, Spathoulas G, Kakarountas A, Schinianakis D, Lueken J (2019) Monitoring supply current thresholds for smart device’s security enhancement. In: 2019 15th International conference on distributed computing in sensor systems (DCOSS), pp 224–227

  • Ng A, Katanforoosh K (2017) Deep learning [Computer software manual]. Retrieved from http://cs229.stanford.edu/notes/ cs229-notes-deep learning.pdf. Accessed Mar 2019

  • Nguyen TD, Marchal S, Miettinen M, Fereidooni H, Asokan N, Sadeghi AR (2019) Dïot: a federated self-learning anomaly detection system for IoT. In: 2019 IEEE 39th international conference on distributed computing systems (ICDCS), pp 756–767

  • Nguyen H-T, Ngo Q-D, Le V-H (2020) A novel graph-based approach for IoT botnet detection. Int J Inf Secur 19(5):567–577

    Article  Google Scholar 

  • Nimmy K, Sankaran S, Achuthan K (2021a) A novel lightweight PUF based authentication protocol for IoT without explicit CRPs in verifier database. J Ambient Intell Humaniz Comput 1–16

  • Nimmy K, Sankaran S, Achuthan K, Calyam P (2021b) Lightweight and privacy-preserving remote user authentication for smart homes. IEEE Access 10:176–190

    Article  Google Scholar 

  • Novák M, Jakab F, Lain L (2013) Anomaly detection in user daily patterns in smart-home environment. J Sel Areas Health Inform 3(6):1–11

    Google Scholar 

  • O’Donnell L (2019) 2 million IoT devices vulnerable to complete takeover [Computer software manual]. https://threatpost.com/iot-devices-vulnerable-takeover/144167

  • Otoum Y, Nayak A (2021) AS-IDS: anomaly and signature based IDS for the internet of things. J Netw Syst Manag 29(3):1–26

    Article  Google Scholar 

  • Ozawa S, Ban T, Hashimoto N, Nakazato J, Shimamura J (2020) A study of IoT malware activities using association rule learning for darknet sensor data. Int J Inf Secur 19(1):83–92

    Article  Google Scholar 

  • Pajouh HH, Javidan R, Khayami R, Dehghantanha A, Choo KKR (2016) A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans Emerg Top Comput 7(2):314–323

    Article  Google Scholar 

  • Park J, Tyagi A (2017) Using power clues to hack IoT devices: the power side channel provides for instruction-level disassembly. IEEE Consum Electron Mag 6(3):92–102

    Article  Google Scholar 

  • Pradeep P, Krishnamoorthy S, Vasilakos AV (2021) A holistic approach to a context-aware IoT ecosystem with adaptive ubiquitous middleware. Pervasive Mob Comput 72:101342

    Article  Google Scholar 

  • Priyadarsini K, Mishra N, Prasad M, Gupta V, Khasim S (2021) Detection of malware on the internet of things and its applications depends on long short-term memory network. J Ambient Intell Humaniz Comput 1–12

  • Ramapatruni S, Narayanan SN, Mittal S, Joshi A, Joshi K (2019) Anomaly detection models for smart home security. In: 2019 IEEE 5th international conference on big data security on cloud (BigDataSecurity), IEEE international conference on high performance and smart computing, (HPSC) and IEEE international conference on intelligent data and security (IDS), pp 19–24

  • Rambus (2020) Smart home: threats and countermeasures [Computer software manual]. Retrieved from https://www.rambus.com/iot/smart-home/

  • Santos J, Leroux P, Wauters T, Volckaert B, De Turck F (2018) Anomaly detection for smart city applications over 5g low power wide area networks. In: NOMS 2018—2018 IEEE/IP network operations and management symposium, pp 1–9

  • Sebyala AA, Olukemi T, Sacks L, Sacks DL (2002) Active platform security through intrusion detection using naive Bayesian network for anomaly detection. In: London communications symposium, pp 1–5

  • Shanthamallu US, Spanias A, Tepedelenlioglu C, Stanley M (2017) A brief survey of machine learning methods and their sensor and IoT applications. In: 2017 8th International conference on information, intelligence, systems applications (IISA), pp 1–8

  • Sharma R, Nori AV, Aiken A (2014) Bias-variance tradeoffs in program analysis. ACM SIGPLAN Not 49(1):127–137

    Article  MATH  Google Scholar 

  • Shon T, Kim Y, Lee C, Moon J (2005) A machine learning framework for network anomaly detection using SVM and GA. In: Proceedings from the sixth annual IEEE SMC information assurance workshop, pp 176–183

  • Shung KP (2018) Accuracy, precision, recall or f1. Retrieved from https://towardsdatascience.com/accuracy-precision-recall-or-f1-331fb37c5cb9

  • Su M-Y (2011) Real-time anomaly detection systems for denial-of-service attacks by weighted k-nearest-neighbor classifiers. Expert Syst Appl 38(4):3492–3498

    Article  Google Scholar 

  • Summerville DH, Zach KM, Chen Y (2015) Ultra-lightweight deep packet anomaly detection for internet of things devices. In: 2015 IEEE 34th international performance computing and communications conference (IPCCC), pp 1–8

  • Takase H, Kobayashi R, Kato M, Ohmura R (2020) A prototype implementation and evaluation of the malware detection mechanism for IoT devices using the processor information. Int J Inf Secur 19(1):71–81

    Article  Google Scholar 

  • Technologies K (2020) B2900 series precision source/measure units (SMU). https://www.keysight.com/in/en/products/sourcemeasure-units-smu/b2900-series-precisionsource-measure-unitssmu.html

  • Ukil A, Bandyoapdhyay S, Puri C, Pal A (2016) Iot healthcare analytics: the importance of anomaly detection. In: 2016 IEEE 30th international conference on advanced information networking and applications (AINA), pp 994–997

  • Ullah I, Mahmoud QH (2021) Design and development of a deep learning-based model for anomaly detection in IoT networks. IEEE Access 9:103906–103926

    Article  Google Scholar 

  • Wang D, Ming J, Chen T, Zhang X, Wang C (2018) Cracking IoT device user account via brute-force attack to SMS authentication code. In: Proceedings of the RST workshop on radical and experiential security, pp 57–60

  • Yamauchi M, Ohsita Y, Murata M, Ueda K, Kato Y (2019) Anomaly detection for smart home based on user behavior. In: 2019 IEEE international conference on consumer electronics (ICCE), pp 1–6

Download references

Acknowledgements

K. Nimmy would like to acknowledge the support from the Ministry of Electronics and Information Technology (MeitY), Government of India, under the Visvesvaraya PhD Scheme for Electronics and IT (Grant no. MEITY-PHD-2635).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Nimmy.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nimmy, K., Dilraj, M., Sankaran, S. et al. Leveraging power consumption for anomaly detection on IoT devices in smart homes. J Ambient Intell Human Comput 14, 14045–14056 (2023). https://doi.org/10.1007/s12652-022-04110-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-022-04110-6

Keywords

Navigation