JOURNAL ARTICLE

Anomaly Detection in Aging Industrial Internet of Things

Béla GengePiroska HallerEnachescu Calin

Year: 2019 Journal:   IEEE Access Vol: 7 Pages: 74217-74230   Publisher: Institute of Electrical and Electronics Engineers

Abstract

The Industrial Internet of Things (IIoT) have been designed to perform a more agile and efficient automation, control, and orchestration of future industrial systems while improving the energy efficiency in smart factories. Unfortunately, while the benefits of the IIoT are undeniable, their pervasive adoption as key enablers for future industries also paved the way for new security risks. In fact, the damaging effects of exploiting vulnerable IIoT have been repeatedly demonstrated and publicly reported. The Mirai botnet, various reports on hackable and invasive devices, alongside the infamous Stuxnet malware, constitute significant proof on the undisputed and disruptive effect of the malware-targeting IIoT systems. As a response, a plethora of solutions has been developed to address the issue of securing IIoT systems in specific sectors. Nevertheless, we believe that the gradual decay of the IIoT's physical dimension (e.g., the physical process), also called aging, is a natural component of the IIoT's life cycle, which has not received sufficient attention from the scientific community. This paper develops a methodology for detecting abnormal behavior in the context of aging IIoT. The approach leverages multivariate statistical analysis [e.g., principle component analysis (PCA)], alongside the Hotelling's T2 statistics, and the univariate cumulative sum in order to detect abnormal process events. An innovative feature of the developed approach is the detection of stealth attacks attempting to influence the dataset in each age. The extensive experimental results on a continuous stirred-tank reactor (CSTR) model demonstrate its applicability to the IIoT and its superior performance to the recently reported techniques.

Keywords:
Computer science Malware Context (archaeology) Anomaly detection Botnet Univariate Process (computing) Malware analysis Computer security The Internet Artificial intelligence Risk analysis (engineering) Data science Machine learning World Wide Web Multivariate statistics Business

Metrics

39
Cited By
3.14
FWCI (Field Weighted Citation Impact)
33
Refs
0.92
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Fault Detection and Control Systems
Physical Sciences →  Engineering →  Control and Systems Engineering
Smart Grid Security and Resilience
Physical Sciences →  Engineering →  Control and Systems Engineering
Anomaly Detection Techniques and Applications
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Anomaly Detection for Industrial Internet of Things Cyberattacks

Rehab AlanaziAhamed Aljuhani

Journal:   Computer Systems Science and Engineering Year: 2022 Vol: 44 (3)Pages: 2361-2378
JOURNAL ARTICLE

A Robust Anomaly Detection Framework in Industrial Internet of Things

Rubina RiazGuangjie HanKamran ShaukatNaimat Ullah KhanLei Wang

Journal:   IEEE Sensors Journal Year: 2025 Vol: 25 (20)Pages: 39173-39182
JOURNAL ARTICLE

Anomaly Detection Framework in Fog-to-Things Communication for Industrial Internet of Things

Tahani AlatawiAhamed Aljuhani

Journal:   Computers, materials & continua/Computers, materials & continua (Print) Year: 2022 Vol: 73 (1)Pages: 1067-1086
© 2026 ScienceGate Book Chapters — All rights reserved.