Enhancing Smart Home Security: Anomaly Detection and Face Recognition in Smart Home IoT Devices Using Logit-Boosted CNN Models
Abstract
:1. Introduction
- Utilization of gradient-boosting classifiers: Gradient-boosting classifiers have shown exceptional performance in handling complex datasets and capturing intricate data patterns. By combining GBC with LR and CNN models, we can enhance the system’s ability to discriminate between different individuals and improve its accuracy in challenging scenarios.
- Multi-class anomaly classification: Modify the proposed procedure so that anomalies can be sorted into more than one group. The purpose of the system is to identify specific types of anomalies, such as malfunctioning devices, attempted intrusions, and strange sensor readings, rather than simply labeling them as “normal” or “abnormal”. With this enhancement, threats to smart home security may be identified and classified with more precision.
- Adaptive learning for anomaly detection: Adaptive learning approaches could be useful in an anomaly detection system. It is often necessary to manually update and retrain conventional anomaly detection techniques as new abnormalities emerge. The goal of this study is to develop a system of adaptive learning capable of automatically adapting the anomaly detection model to novel danger scenarios.
- User behavior profiling: Protect your smart home even more by creating a user profile. Authorized user profiles can be built using the technology to record users’ typical actions and interactions. By analyzing users’ habits, the system can better detect any unusual behavior and take appropriate action to prevent intrusion.
- Seamless integration with smart home automation: Facilitate interaction between the security system and the rest of the smart home’s features. By merging the proposed anomaly detection and facial recognition technologies, this study aims to automate intelligent decision making based on discovered anomalies and confirmed user profiles. In order to improve safety, trigger safety features, and provide a more personalized experience, smart home settings can now be dynamically altered in reaction to known individuals.
- Integration of convolutional neural networks: CNNs have revolutionized image processing and analysis tasks, including face recognition and anomaly detection. By leveraging the power of CNNs, our proposed method can effectively extract discriminative facial features and detect abnormalities in the IoT environment to improve the system’s ability to handle variations in lighting conditions, pose, and facial expressions.
- Improved accuracy and robustness: By leveraging LR, GBC, and CNN models, our proposed method aims to improve the accuracy and robustness of face recognition systems. This is crucial for real-world applications where reliable identification is essential for security and access control.
2. Related Work
3. Materials and Methods
3.1. Dataset Collection
3.1.1. Dataset 1: Sensor and Device Data
3.1.2. Dataset 2: Facial Images
3.2. Dataset Description
3.2.1. Dataset 1
3.2.2. Dataset 2
3.3. Data Preprocessing
3.3.1. Data Preprocessing for Dataset 1
3.3.2. Data Preprocessing for Dataset 2
3.4. Data Feature Engineering
3.5. Model Training
3.5.1. Model Training for Anomaly Detection
- Train–Test Split: Dataset 1, after preprocessing, is divided into a training set and a test set. The models are “trained” on the training set, and their efficacy is “tested” on the testing set.
- Model Architecture and Hyperparameter Selection: Previous research and best practices inform the choices used for the logit-boosted CNN models’ architecture, which includes the number of layers, the number of neurons in each layer, the activation functions, and other hyperparameters. Different methods of hyperparameter tuning, such as grid search and random search, can be used to determine the best hyperparameter settings.
- Model Training: Dataset 1 is used to train the logit-boosted CNN models. During training, the model’s weights and biases are updated using a combination of forward propagation, backpropagation, and gradient descent optimization. This procedure is repeated over and over again until the model converges or reaches some other predetermined stopping point.
- Model Evaluation: The models are then tested on a subset of dataset 1 that was not used during training. The effectiveness of anomaly detection models can be evaluated using many measures such as accuracy, precision, recall, F1 score, and the receiver operating characteristic (ROC) curve. In addition, methods such as cross-validation and bootstrapping can be used to reliably estimate performance.
- Model Selection and Deployment: The best performing logit-boosted CNN model is chosen for use as the final anomaly detection model based on the evaluation findings. This model can then be used in an IoT system for smart homes to monitor and report unusual activity as it occurs.
3.5.2. Model Training for Face Recognition
- Face Detection and Alignment: The faces in the preprocessed dataset 2 must be recognized and aligned before the facial recognition model can be trained. Aligning the face guarantees that the features are in the right places for reliable identification.
- Divide and Conquer: Dataset 2 is split into training and testing subsets in the same way that anomaly detection datasets are. The facial recognition model is trained using the training set, and its accuracy is then tested using the testing set.
- Feature Extraction: In face recognition, the images of faces are often converted into a feature representation that captures the distinctive qualities of each face. Deep neural networks (for example, extracting features from intermediate layers) and more conventional feature extraction methods such as principal component analysis (PCA) and local binary patterns (LBP) are also common approaches.
- Model Training: Using the retrieved facial features, the face recognition model is trained on a subset of dataset 2. During training, the system learns to connect the dots between the features it has retrieved and the labels it has been given (legitimate or fraudulent). The algorithm and training process will be unique to the selected model.
- Model Evaluation: The trained face recognition model is tested on the testing subset of dataset 2. Metrics such as accuracy, precision, recall, and F1 score can be computed to evaluate the model’s ability to distinguish between authorized and unauthorized faces.
- Model Selection and Deployment: The best face recognition model is chosen as the final model based on the evaluation findings. This model can then be used in a smart home system to enable instantaneous facial recognition and comprehensive safety monitoring. Developing trustworthy anomaly detection and facial recognition systems for smart homes relies heavily on the model training stage. Models are chosen, hyperparameters are optimized, the models are trained on the preprocessed datasets, their results are analyzed, and the best models are chosen for deployment.
3.6. LR-XGB-CNN
3.7. LR-GBC-CNN
3.8. LR-CBC-CNN
3.9. LR-HGBC-CNN
3.10. LR-ABC-CNN
3.11. LR-LGBM-CNN Model
3.12. Performance Metrics
4. Results and Discussion
4.1. Performance of LR-XGB-CNN
4.2. Performance of LR-GBC-CN
4.3. Performance of LR-CBC-CNN
4.4. Performance of LR-HGBC-CNN
4.5. Performance of LR-ABC-CNN
4.6. Performance of LR-LGBM-CNN
4.7. Comparative Analysis
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
CNN | Convolutional neural network |
LR | Logistic regression |
GBC | gradient-boosting classifier |
XGB | Extreme gradient boosting |
CBC | CatBoost classifier |
HGBC | HistGradient boosting classifier |
LGBM | Light gradient-boosting machine |
ABC | Adaptive boosting classifier |
AUC-ROC | Area under the receiver operating characteristic curve |
References
- Alsheakh, H.; Bhattacharjee, S. Towards a Unified Trust Framework for Detecting IoT Device Attacks in Smart Homes. In Proceedings of the 2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), Delhi, India, 10–13 December 2020; pp. 613–621. [Google Scholar]
- Talal, M.; Zaidan, A.A.; Zaidan, B.B.; Albahri, A.S.; Alamoodi, A.H.; Albahri, O.S.; Alsalem, M.A.; Lim, C.K.; Tan, K.L.; Shir, W.L.; et al. Smart home-based IoT for real-time and secure remote health monitoring of triage and priority system using body sensors. Multi-driven systematic review. J. Med. Syst. 2019, 43, 42. [Google Scholar] [CrossRef] [PubMed]
- TAlrawi, O.; Lever, C.; Antonakakis, M.; Monrose, F. Sok: Security evaluation of home-based iot deployments. In Proceedings of the MIn2019 IEEE symposium on security and privacy (sp), San Francisco, CA, USA, 19–23 May 19; pp. 1362–1380.
- Ghayvat, H.; Mukhopadhyay, S.; Gui, X.; Suryadevara, N. WSN-and IOT-based smart homes and their extension to smart buildings. Sensors 2015, 15, 10350–10379. [Google Scholar] [CrossRef] [PubMed]
- Yang, J.; Sun, L. A Comprehensive Survey of Security Issues of Smart Home System: “Spear” and “Shields”, Theory and Practice. IEEE Access 2022, 10, 124167–124192. [Google Scholar] [CrossRef]
- Paudel, R.; Muncy, T.; Eberle, W. Detecting dos attack in smart home iot devices using a graph-based approach. In Proceedings of the 2019 IEEE international conference on big data (big data), Los Angeles, CA, USA, 9–12 December 2019; pp. 5249–5258. [Google Scholar]
- Kumar, S.; Benedict, S.; Ajith, S. Application of natural language processing and IoTCloud in smart Homes. In Proceedings of the 2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT), Jaipur, India, 28–29 September 2019; p. 2025. [Google Scholar]
- Eleyan, A.; Fallon, J. IoT-based home automation using android application. In Proceedings of the 2020 International Symposium on Networks, Computers and Communications (ISNCC), Montreal, QC, Canada, 20–22 October 2020; pp. 1–4. [Google Scholar]
- Stolojescu-Crisan, C.; Crisan, C.; Butunoi, B.P. An IoT-based smart home automation system. Sensors 2021, 21, 3784. [Google Scholar] [CrossRef] [PubMed]
- Shah, S.K.; Mahmood, W. Smart home automation using IOT and its low cost implementation. Int. J. Eng. Manuf. IJEM 2020, 10, 28–36. [Google Scholar]
- Shukla, V.K.; Singh, B. Conceptual framework of smart device for smart home management based on rfid and iot. In Proceedings of the 2019 Amity International Conference on Artificial Intelligence (AICAI), Dubai, United Arab Emirates, 4–6 February 2019; pp. 787–791. [Google Scholar]
- De Melo, P.H.; Miani, R.S.; Rosa, P.F. FamilyGuard. A Security Architecture for Anomaly Detection in Home Networks. Sensors 2022, 22, 787–791. [Google Scholar]
- Geneiatakis, D.; Kounelis, I.; Neisse, R.; Nai-Fovino, I.; Steri, G.; Baldini, G. Security and privacy issues for an IoT based smart home. In Proceedings of the 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia, 22–26 May 2017; pp. 1292–1297. [Google Scholar]
- Pirbhulal, S.; Zhang, H.; Alahi, M.E.; Ghayvat, H.; Mukhopadhyay, S.C.; Zhang, Y.T.; Wu, W. Erratum: Sandeep P.; et al. A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network. Sensors 2017, 17, 606. [Google Scholar]
- Chatterjee, A.; Ahmed, B.S. IoT Anomaly Detection methods and applications: A survey. Internet Things 2022, 19, 100568. [Google Scholar] [CrossRef]
- Alexakis, G.; Panagiotakis, S.; Fragkakis, A.; Markakis, E.; Vassilakis, K. Control of smart home operations using natural language processing, voice recognition and IoT technologies in a multi-tier architecture. Designs 2019, 3, 32. [Google Scholar]
- Hoque, M.A.; Davidson, C. Design and implementation of an IoT-based smart home security system. Int. J. Netw. Distrib. Comput. 2019, 7, 85–92. [Google Scholar] [CrossRef] [Green Version]
- HAbdulraheem, A.S.; Salih, A.A.; Abdulla, A.I.; Sadeeq, M.A.; Salim, N.O.; Abdullah, H.; Khalifa, F.M.; Saeed, R.A. Home automation system based on IoT. Technol. Rep. Kansai Univ. 2020, 62, 2453–2464. [Google Scholar]
- Shouran, Z.; Ashari, A.; Priyambodo, T. Internet of things (IoT) of smart home: Privacy and security. Int. J. Comput. Appl. 2019, 182, 3–8. [Google Scholar]
- Ali, B.; Awad, A.I. Cyber and physical security vulnerability assessment for IoT-based smart homes. Sensors 2018, 18, 817. [Google Scholar]
- Machorro-Cano, I.; Alor-Hernández, G.; Paredes-Valverde, M.A.; Rodríguez-Mazahua, L.; Sánchez-Cervantes, J.L.; Olmedo-Aguirre, J.O. HEMS-IoT: A big data and machine learning-based smart home system for energy saving. Energies 2020, 13, 1097. [Google Scholar]
- Alsakran, F.; Bendiab, G.; Shiaeles, S.; Kolokotronis, N. Intrusion detection systems for smart home IoT devices: Experimental comparison study. In Proceedings of the In Security in Computing and Communications: 7th International Symposium, SSCC 2019, Trivandrum, India, 18–21 December 2019; Revised Selected Papers. Springer: Singapore, 2020; p. 1097. [Google Scholar]
- Preethi, S.; Neelofar, S.; Chandralekha, T.; Rishikanth, S.; Mohiddin, S.K. An Enhanced Efficient Approach For Spam Detection In IOT Devices Using Machine Learning. IEEE Trans. Ind. Inform. 2021, 17, 903–912. [Google Scholar]
- Spanos, G.; Giannoutakis, K.M.; Votis, K.; Tzovaras, D. Combining statistical and machine learning techniques in IoT Anomaly Detection for smart homes. In Proceedings of the 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Limassol, Cyprus, 11–13 September 2019; pp. 1–6. [Google Scholar]
- Alshammari, T.; Alshammari, N.; Sedky, M.; Howard, C. Evaluating machine learning techniques for activity classification in smart home environments. Int. J. Inf. Commun. Eng. 2018, 12, 72–78. [Google Scholar]
- Zainab, A.S.; Refaat, S.; Bouhali, O. Ensemble-based spam detection in smart home IoT devices time series data using machine learning techniques. Information 2020, 11, 344. [Google Scholar]
- Rani, P.J.; Bakthakumar, J.; Kumaar, B.P.; Kumaar, U.P.; Kumar, S. Ensemble-based spam detection in smart home IoT devices time series data using machine learning techniquesVoice controlled home automation system using natural language processing (NLP) and internet of things (IoT). In Proceedings of the 2017 Third International Conference on Science Technology Engineering & Management (ICONSTEM), Chennai, India, 23 March 2017; pp. 368–373. [Google Scholar]
- Li, T.; Hong, Z.; Yu, L. Machine learning-based intrusion detection for iot devices in smart home. In Proceedings of the 2020 IEEE 16th International Conference on Control & Automation (ICCA), Singapore, 9–11 October 2020; pp. 277–282. [Google Scholar]
- Gordon, H.; Batula, C.; Tushir, B.; Dezfouli, B.; Liu, Y. Securing smart homes via software-defined networking and low-cost traffic classification. In Proceedings of the 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC), Madrid, Spain, 12–16 July 2021; pp. 1049–1057. [Google Scholar]
- Khare, S.; Totaro, M. Ensemble learning for detecting attacks and anomalies in IoT smart home. In Proceedings of the 2020 3rd International Conference on Data Intelligence and Security (ICDIS), South Padre Island, TX, USA, 24–26 June 2020; pp. 56–63. [Google Scholar]
- Butt, N.; Shahid, A.; Qureshi, K.N.; Haider, S.; Ibrahim, A.O.; Binzagr, F.; Arshad, N. Intelligent Deep Learning for Anomaly-Based Intrusion Detection in IoT Smart Home Networks. Mathematics 2022, 10, 4598. [Google Scholar]
- Anthi, E.; Williams, L.; Slowinska, M.; Theodorakopoulos, G.; Burnap, P. A supervised intrusion detection system for smart home IoT devices. IEEE Internet Things 2019, 6, 9042–9053. [Google Scholar]
- Dhobale, M.R.; Biradar, R.Y.; Pawar, R.R.; Awatade, S.A. Smart Home Security System using Iot, Face Recognition, and Raspberry Pi. IEEE Int. J. Comput. Appl. 2020, 176, 45–47. [Google Scholar]
- Gajewski, M.; Mongay Batalla, J.; Mastorakis, G.; Mavromoustakis, C.X. Anomaly traffic detection and correlation in smart home automation IoT systems. IEEE Ransactions Emerg. Telecommun. Technol. 2022, 33, e4053. [Google Scholar]
- Nguyen, T.D.; Marchal, S.; Miettinen, M.; Fereidooni, H.; Asokan, N.; Sadeghi, A.R. DÏoT: A federated self-learning Anomaly Detection system for IoT. In Proceedings of the 2019 IEEE 39th International conference on distributed computing systems (ICDCS), Dallas, TX, USA, 7–10 July 2019; pp. 756–767. [Google Scholar]
- Rahim, A.; Zhong, Y.; Ahmad, T.; Islam, U. An Intelligent Approach for Preserving the Privacy and Security of a Smart Home Based on IoT Using LogitBoost Techniques. J. Hunan Univ. Nat. Sci. 2022, 49, 372–388. [Google Scholar]
- Rahim, A.; Zhong, Y.; Ahmad, T. A Deep Learning-Based Intelligent Face Recognition Method in the Internet of Home Things for Security Applications. J. Hunan Univ. Nat. Sci. 2022, 49, 39–52. [Google Scholar]
- Hosni, A.I.E.; Li, K.; Ahmad, S. DARIM: Dynamic approach for rumor influence minimization in online social networks. In Proceedings of the Neural Information Processing: 26th International Conference, ICONIP 2019, Sydney, Australia, 12–15 December 2019; pp. 619–630. [Google Scholar]
- Hosni, A.I.E.; Li, K.; Ahmed, S. HISBmodel: A rumor diffusion model based on human individual and social behaviors in online social networks. In Proceedings of the Neural Information Processing: 25th International Conference, ICONIP 2018, Siem Reap, Cambodia, 13–16 December 2018; pp. 4–27. [Google Scholar]
- Ahmad, T.; Wu, J.; Alwageed, H.S.; Khan, F.; Khan, J.; Lee, Y. Human Activity Recognition Based on Deep-Temporal Learning Using Convolution Neural Networks Features and Bidirectional Gated Recurrent Unit With Features Selection. IEEE Access 2023, 11, 33148–33159. [Google Scholar]
- Ahmad, T.; Wu, J. SDIGRU: Spatial and deep features integration using multilayer gated recurrent unit for human activity recognition. IEEE Trans. Comput. Soc. Syst. 2023, 1–13. [Google Scholar] [CrossRef]
- Rodrigues, J.; Liu, H.; Folgado, D.; Belo, D.; Schultz, T.; Gamboa, H. Feature-based information retrieval of multimodal biosignals with a self-similarity matrix: Focus on automatic segmentation. Biosensors 2022, 12, 1182. [Google Scholar]
- Xue, T.; Liu, H. Hidden Markov Model and its application in human activity recognition and fall detection: A review. In Proceedings of the International Conference in Communications, Signal Processing, and Systems, Chang Bai Shan, China, 21 August 2021; Springer: Singapore, 2021; pp. 863–869. [Google Scholar]
- Kayan, H. AnoML-IoT—The Anomaly Detection Dataset. Available online: https://www.kaggle.com/datasets/hkayan/anomliot (accessed on 7 May 2023).
- Nam, S. Real and Fake Face Detection. Available online: https://www.kaggle.com/datasets/ciplab/real-and-fake-face-detection (accessed on 7 May 2023).
Study | Anomaly Detection Approach | Architecture | Face Recognition Approach | Integration Approach | Key Findings |
---|---|---|---|---|---|
[1] | Support vector machines (SVMs) | 1D machine learning | ML models | Intrusion detection | Accurate anomaly detection in smart home devices. |
[2] | Long short-term memory (LSTM) networks | 1D machine learning | ML models | Intrusion detection | Efficient capture of device behavior dependencies. |
[4] | CNN | 3D CNN architecture | Convolutional neural networks (CNNs) | Intrusion detection | Accurate face recognition for user authentication. |
[6] | CNN | 3D CNN architecture | Privacy-preserving face recognition scheme | Anomaly detection | Confidentiality ensured with high accuracy for facial data. |
[7] | Deep-learning-based anomaly detection | 3D CNN architecture | Face recognition algorithms | Combined anomaly detection and face recognition | Real-time anomaly detection and precise user identification. |
[9] | Machine learning algorithms | 3D CNN architecture | Face recognition | Combined anomaly detection and face recognition | Improved accuracy and efficiency in smart home security. |
[10] | Adaptive learning framework | 1D machine learning | Smart home anomaly | Intrusion detection | Dynamic model updates for evolving device behavior anomalies. |
[11] | Adaptive-learning-based intrusion detection | 1D machine learning | Smart home anomaly | Intrusion detection | Continuous learning to adapt to evolving attack patterns. |
[14] | CNN | 3D CNN architecture | Privacy-preserving face recognition | Intrusion detection | Privacy protection via encrypted facial templates. |
[15] | CNN | 3D CNN architecture | Federated-learning-based face recognition | Intrusion detection | Privacy preserved with accurate face recognition. |
Proposed Models (Current) | Logit-boosted CNN models | 2D CNN architecture | Integration with anomaly detection | Integration with face recognition | Advancements in anomaly detection, face recognition, and integration. |
Attribute | Description |
---|---|
Timestamp | Date and time of the sensor reading. |
Device ID | Unique identifier for each IoT device. |
Sensor Type | Type of sensor (e.g., temperature, motion). |
Sensor Reading | Value recorded by the sensor. |
Device Log | Log entries capturing device activities. |
Label | Anomaly label (1 if anomaly, 0 if normal). |
Attribute | Description |
---|---|
User ID | Unique identifier for each authorized user. |
Image | Facial image of the user. |
Label | User label (1 if authorized, 0 if unauthorized). |
Metric | Equation |
---|---|
Accuracy | |
Precision | |
Recall | |
F1 Score | |
TP | TP (true positive): The number of samples that are correctly identified as positive (anomalies or faces) by the model. |
TN | TN (true negative): The number of samples that are correctly identified as negative (normal or non-faces) by the model. |
FP | FP (false positive): The number of samples that are incorrectly classified as positive (anomalies or faces) by the model when they are negative (normal or non-faces). |
FN | FN (false negative): The number of samples that are incorrectly classified as negative (normal or non-faces) by the model when they are positive (anomalies or faces). |
Metric | Value |
---|---|
Accuracy | 0.92 |
Precision | 0.89 |
Recall | 0.94 |
F1 Score | 0.91 |
AUC-ROC | 0.95 |
Metric | Value |
---|---|
Accuracy | 0.85 |
Precision | 0.83 |
Recall | 0.88 |
F1 Score | 0.85 |
AUC-ROC | 0.91 |
Metric | Value |
---|---|
Accuracy | 0.91 |
Precision | 0.88 |
Recall | 0.93 |
F1 Score | 0.91 |
AUC-ROC | 0.94 |
Matrix | Value |
---|---|
Accuracy | 0.84 |
Precision | 0.82 |
Recall | 0.86 |
F1 Score | 0.84 |
AUC-ROC | 0.90 |
Metric | Value |
---|---|
Accuracy | 0.89 |
Precision | 0.86 |
Recall | 0.91 |
F1 Score | 0.88 |
AUC-ROC | 0.92 |
Metric | Value |
---|---|
Accuracy | 0.83 |
Precision | 0.80 |
Recall | 0.85 |
F1 Score | 0.82 |
AUC-ROC | 0.88 |
Metric | Value |
---|---|
Accuracy | 0.94 |
Precision | 0.91 |
Recall | 0.96 |
F1 Score | 0.93 |
AUC-ROC | 0.96 |
Metric | Value |
---|---|
Accuracy | 0.88 |
Precision | 0.86 |
Recall | 0.90 |
F1 Score | 0.88 |
AUC-ROC | 0.92 |
Metric | Value |
---|---|
Accuracy | 0.90 |
Precision | 0.87 |
Recall | 0.92 |
F1 Score | 0.89 |
AUC-ROC | 0.93 |
Metric | Value |
---|---|
Accuracy | 0.86 |
Precision | 0.84 |
Recall | 0.88 |
F1 Score | 0.86 |
AUC-ROC | 0.91 |
Metric | Value |
---|---|
Accuracy | 0.93 |
Precision | 0.90 |
Recall | 0.95 |
F1 Score | 0.92 |
AUC-ROC | 0.95 |
Metric | Value |
---|---|
Accuracy | 0.87 |
Precision | 0.85 |
Recall | 0.89 |
F1 Score | 0.87 |
AUC-ROC | 0.92 |
Metric | LR-XGB-CNN | LR-GBC-CNN | LR-CBC-CNN | LR-HGBC-CNN | LR-ABC-CNN | LR-LGBM-CNN |
---|---|---|---|---|---|---|
Accuracy | 0.92 | 0.91 | 0.89 | 0.94 | 0.90 | 0.93 |
Precision | 0.8 | 0.88 | 0.86 | 0.91 | 0.87 | 0.90 |
Recall | 0.94 | 0.93 | 0.91 | 0.96 | 0.92 | 0.95 |
F1 Score | 0.91 | 0.91 | 0.88 | 0.93 | 0.89 | 0.92 |
AUC-ROC | 0.95 | 0.94 | 0.92 | 0.96 | 0.93 | 0.95 |
Metric | LR-XGB-CNN | LR-GBC-CNN | LR-CBC-CNN | LR-HGBC-CNN | LR-ABC-CNN | LR-LGBM-CNN |
---|---|---|---|---|---|---|
Accuracy | 0.85 | 0.84 | 0.83 | 0.88 | 0.86 | 0.87 |
Precision | 0.83 | 0.82 | 0.80 | 0.86 | 0.84 | 0.85 |
Recall | 0.88 | 0.86 | 0.85 | 0.90 | 0.88 | 0.89 |
F1 Score | 0.85 | 0.84 | 0.82 | 0.88 | 0.86 | 0.87 |
AUC-ROC | 0.91 | 0.90 | 0.88 | 0.92 | 0.91 | 0.92 |
Study | Previous Anomaly Detection Approach | Previous Face Recognition Approach | Integration Approach | Key Findings |
---|---|---|---|---|
[7] | Deep-learning-based anomaly detection | Face recognition algorithms | Combined anomaly detection and face recognition | Real-time detection of anomalies and accurate user identification. |
[9] | Machine learning algorithms | Face recognition | Combined anomaly detection and face recognition | Improved accuracy and efficiency in smart home security. |
Proposed Models (Current) | Logit-boosted CNN models | Integration with anomaly detection | Integration with face recognition | Advancements in anomaly detection, face recognition, and their integration. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Rahim, A.; Zhong, Y.; Ahmad, T.; Ahmad, S.; Pławiak, P.; Hammad, M. Enhancing Smart Home Security: Anomaly Detection and Face Recognition in Smart Home IoT Devices Using Logit-Boosted CNN Models. Sensors 2023, 23, 6979. https://doi.org/10.3390/s23156979
Rahim A, Zhong Y, Ahmad T, Ahmad S, Pławiak P, Hammad M. Enhancing Smart Home Security: Anomaly Detection and Face Recognition in Smart Home IoT Devices Using Logit-Boosted CNN Models. Sensors. 2023; 23(15):6979. https://doi.org/10.3390/s23156979
Chicago/Turabian StyleRahim, Asif, Yanru Zhong, Tariq Ahmad, Sadique Ahmad, Paweł Pławiak, and Mohamed Hammad. 2023. "Enhancing Smart Home Security: Anomaly Detection and Face Recognition in Smart Home IoT Devices Using Logit-Boosted CNN Models" Sensors 23, no. 15: 6979. https://doi.org/10.3390/s23156979
APA StyleRahim, A., Zhong, Y., Ahmad, T., Ahmad, S., Pławiak, P., & Hammad, M. (2023). Enhancing Smart Home Security: Anomaly Detection and Face Recognition in Smart Home IoT Devices Using Logit-Boosted CNN Models. Sensors, 23(15), 6979. https://doi.org/10.3390/s23156979