• editor.aipublications@gmail.com
  • Track Your Paper
  • Contact Us
  • ISSN: 2456-7817

International Journal Of Engineering, Business And Management(IJEBM)

Anomaly Detection in Smart Home IoT Systems Using Machine Learning Approaches

Rajesh Rajaan , Loveleen Kumar , Nilam Choudhary , Aakriti Sharma , Mani Butwall


International Journal of Engineering, Business And Management(IJEBM), Vol-9,Issue-2, April - June 2025, Pages 43-47 , 10.22161/ijebm.9.2.5

Download | Downloads : 18 | Total View : 2039

Article Info: Received: 30 Mar 2025; Received in revised form: 25 Apr 2025; Accepted: 01 May 2025; Available online: 05 May 2025

Cite this Article: APA | ACM | Chicago | Harvard | IEEE | MLA | Vancouver | Bibtex

Share

The rise of smart home technology, driven by the Internet of Things (IoT), has introduced unprecedented convenience and control into daily life. However, these interconnected devices also introduce significant security challenges, particularly in anomaly detection due to their continuous data generation and heterogeneous nature. This paper investigates the application of machine learning techniques in detecting anomalies in smart home IoT environments. A comprehensive review of 20 existing approaches is presented, highlighting their strengths and limitations. A novel hybrid anomaly detection framework is proposed that integrates supervised and unsupervised learning techniques. Comparative analysis with traditional methods demonstrates the effectiveness of the proposed approach in improving detection accuracy and reducing false positives. The study concludes with potential future research directions aimed at enhancing the robustness and scalability of anomaly detection systems in smart home IoT networks.

Smart Home, IoT, Anomaly Detection, Machine Learning, Cybersecurity, Intrusion Detection, Data Analytics.

[1] Rajesh Rajaan, Baldev Singh, Nilam Choudhary “Advancements in IoT Anomaly Detection: Leveraging Machine Learning for Enhanced Security,” International Conference on Advancements in Computing Technologies and Artificial Intelligence (COMPUTATIA-2025), DOI:10.2991/978-94-6463-700-7_30
[2] M. Ahmed, A. N. Mahmood, and J. Hu, “A survey of network anomaly detection techniques,” Journal of Network and Computer Applications, vol. 60, pp. 19–31, Jan. 2016.
[3] Y. Meidan et al., “N-BaIoT: Network-based detection of IoT botnet attacks using deep autoencoders,” IEEE Pervasive Computing, vol. 17, no. 3, pp. 12–22, Jul.–Sept. 2017.
[4] S. Marchal et al., “Off-the-hook: An efficient and usable client-side phishing prevention application,” IEEE Trans. Comput., vol. 68, no. 3, pp. 435–448, Mar. 2019.
[5] M. Shukla and R. Sinha, “Real-time anomaly detection in IoT-based smart home environment,” International Journal of Information Security Science, vol. 9, no. 2, pp. 90–100, 2020.
[6] S. Roy, A. Chowdhury, and S. Naskar, “Ensemble learning for IoT anomaly detection,” Procedia Computer Science, vol. 167, pp. 2497–2506, 2020.
[7] R. Kumar and P. Sharma, “LSTM-based anomaly detection for time series in smart home IoT,” Journal of Ambient Intelligence and Humanized Computing, vol. 12, pp. 3259–3271, 2021.
[8] H. Yin et al., “Autoencoder-based anomaly detection for smart home networks,” Sensors, vol. 21, no. 3, pp. 1–15, 2021.
[9] L. Zhang and J. Xu, “Comparative analysis of supervised and unsupervised methods for IoT anomaly detection,” Future Internet, vol. 13, no. 2, pp. 1–16, 2021.
[10] X. Wang et al., “A CNN-based anomaly detection model for smart home IoT systems,” IEEE Internet of Things Journal, vol. 9, no. 4, pp. 2650–2660, 2022.
[11] P. Singh and A. K. Sinha, “Feature selection for improving anomaly detection accuracy in IoT systems,” Expert Systems with Applications, vol. 198, p. 116904, 2022.
[12] D. Yadav et al., “Federated learning for anomaly detection in decentralized smart home systems,” Journal of Network and Computer Applications, vol. 205, p. 103412, 2022.
[13] Z. Raza et al., “Adversarial attacks on machine learning-based IoT anomaly detection systems,” Computer Networks, vol. 208, p. 108845, 2022.
[14] Ali and M. Khan, “A hybrid approach using SVM and KNN for smart home anomaly detection,” Neural Computing and Applications, vol. 34, pp. 11203–11215, 2022.
[15] S. Sharma and R. Aggarwal, “Real-time anomaly detection for smart home traffic data using machine learning,” Sensors and Actuators A: Physical, vol. 345, p. 113740, 2023.
[16] Q. Tran et al., “Transfer learning-based IoT anomaly detection in smart homes,” IEEE Access, vol. 11, pp. 4231–4243, 2023.
[17] M. Nair and A. George, “Graph neural networks for smart home IoT anomaly detection,” IEEE Internet of Things Journal, vol. 10, no. 1, pp. 150–160, 2023.
[18] L. Zhao and H. Liu, “Adaptive anomaly detection using reinforcement learning in smart homes,” Information Sciences, vol. 625, pp. 341–355, 2023.
[19] Y. Li et al., “Self-supervised learning for smart home IoT anomaly detection,” Pattern Recognition Letters, vol. 162, pp. 29–36, 2023.
[20] L. Chen et al., “Explainable artificial intelligence (XAI) for anomaly detection in IoT: A review,” ACM Computing Surveys, vol. 56, no. 1, pp. 1–35, 2024.
[21] C. Suh et al., “IoT anomaly detection using ensemble of machine learning models,” Sensors, vol. 21, no. 19, p. 6483, 2021.
[22] M. Rahman and A. Hussain, “Lightweight intrusion detection for IoT: A survey,” Computer Communications, vol. 148, pp. 180–200, 2020.
[23] F. Restuccia and T. Melodia, “Deep learning at the edge for networked smart homes,” IEEE Wireless Communications, vol. 27, no. 4, pp. 12–18, 2020.
[24] Ferrag et al., “Anomaly detection and classification for smart home networks using LSTM,” Applied Soft Computing, vol. 113, p. 107889, 2021.
[25] R. Chandola, A. Banerjee, and V. Kumar, “Anomaly detection: A survey,” ACM Computing Surveys, vol. 41, no. 3, pp. 1–58, 2009.
[26] S. Umer et al., “Machine learning-based intrusion detection in IoT: An overview,” Computer Networks, vol. 222, p. 109353, 2023.
[27] Zolanvari et al., “Machine learning-based network vulnerability analysis of industrial Internet of Things,” IEEE Internet of Things Journal, vol. 5, no. 4, pp. 2766–2774, 2018.
[28] Liu et al., “Smart home anomaly detection using recurrent neural networks,” IEEE Access, vol. 7, pp. 53845–53856, 2019.
[29] J. Yang et al., “Unsupervised learning approaches for anomaly detection in smart homes,” Sensors, vol. 20, no. 12, p. 3420, 2020.
[30] G. Kolias et al., “Intrusion detection in smart environments using ensemble learning,” Future Generation Computer Systems, vol. 92, pp. 423–435, 2019.
[31] A. Diro and N. Chilamkurti, “Distributed attack detection scheme using deep learning approach for IoT,” Future Generation Computer Systems, vol. 82, pp. 761–768, 2018.
[32] M. Conti et al., “A survey on security and privacy issues in modern healthcare systems: Attacks and defenses,” IEEE Communications Surveys & Tutorials, vol. 20, no. 2, pp. 1123–1169, 2018.
[33] N. Khan and M. A. Kaafar, “Privacy and security in smart home: A machine learning perspective,” ACM Transactions on Internet Technology, vol. 22, no. 2, pp. 1–28, 2022.
[34] Kitchenham and S. Charters, “Guidelines for performing systematic literature reviews in software engineering,” EBSE Technical Report, 2007.
[35] S. V. Gogate and S. Bakshi, “Deep learning models for anomaly detection in smart environments,” Procedia Computer Science, vol. 171, pp. 1124–1133, 2020.
[36] Yavuz and I. Korkmaz, “Securing smart home systems using intelligent techniques,” IEEE Systems Journal, vol. 14, no. 3, pp. 3560–3570, 2020.
[37] E. Torres et al., “IoT anomaly detection using edge computing and federated learning,” Future Generation Computer Systems, vol. 137, pp. 242–253, 2023.
[38] M. Mohammadi et al., “A comprehensive review of anomaly detection techniques for high-dimensional big data,” Journal of Big Data, vol. 8, p. 37, 2021.
[39] E. Bertino and N. Islam, “Botnets and internet of things security,” Computer, vol. 50, no. 2, pp. 76–79, 2017.
[40] N. Abeshu and N. Chilamkurti, “Deep learning for anomaly detection in IoT: A survey,” Computer Communications, vol. 140, pp. 41–52, 2019.
[41] L. Xu et al., “Internet of Things security: A survey,” IEEE Internet of Things Journal, vol. 3, no. 6, pp. 1129–1149, 2016.
[42] M. A. Ferrag et al., “Security and privacy for IoT and fog computing paradigm,” Computer Communications, vol. 98, pp. 52–69, 2017.
[43] H. HaddadPajouh et al., “A survey on internet of things security: Requirements, challenges, and solutions,” Computer Networks, vol. 148, pp. 283–294, 2019.
[44] T. R. Ioannidis et al., “A robust machine learning approach for detecting anomalies in smart homes,” IEEE Access, vol. 8, pp. 210273–210283, 2020.
[45] M. Hussain et al., “A framework for anomaly detection in smart home automation systems,” IEEE Systems Journal, vol. 13, no. 4, pp. 4295–4304, 2019.
[46] M. Zhang et al., “Anomaly detection in smart homes using transformer networks,” IEEE Access, vol. 10, pp. 4300–4312, 2022.
[47] L. Han et al., “Scalable IoT anomaly detection using distributed learning,” IEEE Transactions on Network and Service Management, vol. 19, no. 1, pp. 454–467, 2022.
[48] K. Bakar et al., “A review of machine learning approaches for anomaly detection in IoT,” Wireless Personal Communications, vol. 115, pp. 3077–3101, 2020.
[49] D. Kumar and S. Tripathi, “Smart home security using anomaly detection,” Journal of Ambient Intelligence and Smart Environments, vol. 13, no. 1, pp. 25–40, 2021.
[50] L. Chen et al., “Explainable AI for trustworthy anomaly detection in IoT systems,” ACM Transactions on Internet Technology, vol. 24, no. 1, pp. 1–28, 2024.