Anomaly classification in IIoT edge devices

An early Industrial Internet of Things (IIoT) Anomaly Detection reduces maintenance costs, minimizes machine downtime, increases safety, and improves product quality. A multi-class classifier that detects events, failures, or attacks is much more efficient than a simple binary classifier, as it rel...

Full description

Saved in:
Bibliographic Details
Main Authors: Danny Alexandro Múnera-Ramírez, Diana Patricia Tobón-Vallejo, Martha Lucía Rodríguez-López
Format: Article
Language:English
Published: Universidad de Antioquia 2025-03-01
Series:Revista Facultad de Ingeniería Universidad de Antioquia
Subjects:
Online Access:https://revistas.udea.edu.co/index.php/ingenieria/article/view/356269
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849775109758255104
author Danny Alexandro Múnera-Ramírez
Diana Patricia Tobón-Vallejo
Martha Lucía Rodríguez-López
author_facet Danny Alexandro Múnera-Ramírez
Diana Patricia Tobón-Vallejo
Martha Lucía Rodríguez-López
author_sort Danny Alexandro Múnera-Ramírez
collection DOAJ
description An early Industrial Internet of Things (IIoT) Anomaly Detection reduces maintenance costs, minimizes machine downtime, increases safety, and improves product quality. A multi-class classifier that detects events, failures, or attacks is much more efficient than a simple binary classifier, as it relieves a human operator of the task of identifying anomaly causes, thereby avoiding wasted time that could compromise process performance and security. With these issues in mind, this paper aims to determine whether it can differentiate between a failure that generates a temperature increase in an IIoT device processor, a denial-of-service attack on an MQTT broker, and an event caused by an application executing on the IIoT edge device. Data used to perform the classification comes from a Raspberry Pi 3, specifically from its CPU (e.g., temperature, load, free memory, Wi-Fi sent and received packets). A k-nearest neighbors (KNN), random forest (RF), support vector machine (SVM), and Multilayer Perceptron (MLP) algorithms were trained. Considering metrics such as false positive rate, false negative rate, accuracy, F1-score, and execution time, we concluded that SVM and MLP were the best methods for the case study because of their accuracy (78.6 and 76.1, respectively) and low execution time (17.3ms and 0.35ms).
format Article
id doaj-art-b6eff7ed07044d7cae6bd4e4ae262b5d
institution DOAJ
issn 0120-6230
2422-2844
language English
publishDate 2025-03-01
publisher Universidad de Antioquia
record_format Article
series Revista Facultad de Ingeniería Universidad de Antioquia
spelling doaj-art-b6eff7ed07044d7cae6bd4e4ae262b5d2025-08-20T03:01:32ZengUniversidad de AntioquiaRevista Facultad de Ingeniería Universidad de Antioquia0120-62302422-28442025-03-0110.17533/udea.redin.20250368Anomaly classification in IIoT edge devicesDanny Alexandro Múnera-Ramírez0Diana Patricia Tobón-Vallejo1Martha Lucía Rodríguez-López2Universidad de AntioquiaUniversidad de AntioquiaUniversidad de Antioquia An early Industrial Internet of Things (IIoT) Anomaly Detection reduces maintenance costs, minimizes machine downtime, increases safety, and improves product quality. A multi-class classifier that detects events, failures, or attacks is much more efficient than a simple binary classifier, as it relieves a human operator of the task of identifying anomaly causes, thereby avoiding wasted time that could compromise process performance and security. With these issues in mind, this paper aims to determine whether it can differentiate between a failure that generates a temperature increase in an IIoT device processor, a denial-of-service attack on an MQTT broker, and an event caused by an application executing on the IIoT edge device. Data used to perform the classification comes from a Raspberry Pi 3, specifically from its CPU (e.g., temperature, load, free memory, Wi-Fi sent and received packets). A k-nearest neighbors (KNN), random forest (RF), support vector machine (SVM), and Multilayer Perceptron (MLP) algorithms were trained. Considering metrics such as false positive rate, false negative rate, accuracy, F1-score, and execution time, we concluded that SVM and MLP were the best methods for the case study because of their accuracy (78.6 and 76.1, respectively) and low execution time (17.3ms and 0.35ms). https://revistas.udea.edu.co/index.php/ingenieria/article/view/356269Anomaly detectionanomaly classificationneural networksIndustrial Internet of Things.
spellingShingle Danny Alexandro Múnera-Ramírez
Diana Patricia Tobón-Vallejo
Martha Lucía Rodríguez-López
Anomaly classification in IIoT edge devices
Revista Facultad de Ingeniería Universidad de Antioquia
Anomaly detection
anomaly classification
neural networks
Industrial Internet of Things.
title Anomaly classification in IIoT edge devices
title_full Anomaly classification in IIoT edge devices
title_fullStr Anomaly classification in IIoT edge devices
title_full_unstemmed Anomaly classification in IIoT edge devices
title_short Anomaly classification in IIoT edge devices
title_sort anomaly classification in iiot edge devices
topic Anomaly detection
anomaly classification
neural networks
Industrial Internet of Things.
url https://revistas.udea.edu.co/index.php/ingenieria/article/view/356269
work_keys_str_mv AT dannyalexandromuneraramirez anomalyclassificationiniiotedgedevices
AT dianapatriciatobonvallejo anomalyclassificationiniiotedgedevices
AT marthaluciarodriguezlopez anomalyclassificationiniiotedgedevices