Affiliation:
1. Xidian University, Shannxi, China
2. National University of Defense Technology, Changsha, Hunan, China
3. Institute of Systems Engineering, Beijing, China
Abstract
The Device-as-a-service (DaaS) Internet of Things (IoT) business model enables distributed IoT devices to sell collected data to other devices, paving the way for machine-to-machine (M2M) economy applications. Cryptocurrencies are widely used by various IoT devices to undertake the main settlement and payment task in the M2M economy. However, the cryptocurrency market, which lacks effective supervision, has fluctuated wildly in the past few years. These fluctuations are breeding grounds for arbitrage in IoT data trading. Therefore, a practical cryptocurrency market supervision framework is very imperative in the process of IoT data trading to ensure that the trading is completed safely and fairly. The difficulty stems from how to combine these unlabeled daily trading data with supervision strategies to punish abnormal users, who disrupt the data trading market in IoT. In this article, we propose a closed-loop hybrid supervision framework based on the unsupervised anomaly detection to solve this problem. The core is to design the multi-modal unsupervised anomaly detection methods on trading prices to identify malicious users. We then design a dedicated control strategy with three levels to defend against various abnormal behaviors, according to the detection results. Furthermore, to guarantee the reliability of this framework, we evaluate the detection rate, accuracy, precision, and time consumption of single-modal and multi-modal detection methods and the contrast algorithm Adaptive KDE [
19
]. Finally, an effective prototype framework for supervising is established. The extensive evaluations prove that our supervision framework greatly reduces IoT data trading risks and losses.
Funder
National Key Research and Development Program
National Natural Science Foundation of China
Research Funding of NUDT
Publisher
Association for Computing Machinery (ACM)
Subject
Software,Information Systems,Hardware and Architecture,Computer Science Applications,Computer Networks and Communications
Reference46 articles.
1. Mennatallah Amer and Markus Goldstein. 2012. Nearest-neighbor and clustering based anomaly detection algorithms for rapidminer. In Proceedings of the 3rd RapidMiner Community Meeting and Conference (RCOMM’12). 1–12.
2. Davit Babayan. 2019. Why Winklevoss Twins Fear Investors Are Losing Confidence in Crypto. Retrieved from https://www.newsbtc.com/news/why-winklevoss-twins-fear-investors-are-losing-confidence-in-crypto/.
3. A Model for Detecting Cryptocurrency Transactions with Discernible Purpose
4. Zhipeng Cai and Zaobo He. 2019. Trading private range counting over big IoT data. In Proceedings of the IEEE 39th International Conference on Distributed Computing Systems (ICDCS’19). IEEE, 144–153.
5. Anomaly detection
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献