Sensors 23 08286
Sensors 23 08286
Article
Anomaly Detection in a Smart Industrial Machinery Plant
Using IoT and Machine Learning
Angel Jaramillo-Alcazar , Jaime Govea and William Villegas-Ch *
Citation: Jaramillo-Alcazar, A.; Keywords: IoT; machine learning; anomaly detection; operating efficiency
Govea, J.; Villegas-Ch, W. Anomaly
Detection in a Smart Industrial
Machinery Plant Using IoT and
Machine Learning. Sensors 2023, 23, 1. Introduction
8286. https://doi.org/10.3390/
Smart manufacturing has entered suddenly into industrial use. This practice has the
s23198286
transformative potential to redefine the way manufacturing plants operate and deliver high-
Academic Editor: Rodrigo quality products to market. At the center of this revolution is the convergence of the Internet
Román-Castro of Things (IoT) and machine learning [1]. These two disruptive technologies have come
Received: 5 September 2023
together to drive efficiency and security in highly specialized production environments. In
Revised: 25 September 2023
this work, a smart manufacturing plant is considered a space where innovation is found at
Accepted: 2 October 2023 the intersection of industrial machinery, construction equipment, and industrial tools [2].
Published: 7 October 2023 IoT and machine learning are becoming vital tools for meeting critical challenges.
Robust construction equipment, tools, and machinery are produced in an intelligent
manufacturing plant. Every component of this plant plays a vital role in building infrastruc-
ture, industrial development, and improving productivity worldwide. This plant is not just
Copyright: © 2023 by the authors. an example of traditional manufacturing, but paradigmatic of what smart manufacturing
Licensee MDPI, Basel, Switzerland. represents today [3]. Every machine, piece of equipment, and tool are connected via IoT,
This article is an open access article
generating a constant stream of data that becomes valuable information. Sensors embedded
distributed under the terms and
in the machinery capture real-time data on temperature, pressure, speed, and other crucial
conditions of the Creative Commons
parameters for the production process [4]. Data flow through a secure network and reach
Attribution (CC BY) license (https://
machine learning systems capable of analyzing them, identifying patterns, and making
creativecommons.org/licenses/by/
informed decisions.
4.0/).
and highlight the importance of our work in IoT security and machine learning in industrial
environments.
• Machine learning for anomaly detection: This phrase refers to the use of machine
learning algorithms, such as support vector machines, random forests, or neural
networks, to identify abnormal patterns in data collected using IoT sensors. These
algorithms learn from historical data and can automatically detect anomalies without
the need for predefined rules.
• False positives and false negatives: In anomaly detection, false positives are cases
where the system identifies an anomaly that is not an anomaly, while false negatives
are cases where the system does not detect a genuine issue. Balancing the rate of
false positives and false negatives is essential to guaranteeing the effectiveness of an
abnormality detection system.
Security in IoT devices and networks involves several fundamental concepts that
protect the integrity and confidentiality of data and devices:
• Encryption: Encryption protects the confidentiality of data transmitted via an IoT
network [22]. The data are converted into an unreadable format for unauthorized
persons, and only those with the proper decryption key can access the information.
• Authentication: Authentication ensures that IoT devices only communicate with
authorized systems. Devices must prove their identity before accessing the network
or exchanging data.
• Access Control: Access control establishes who has permission to perform specific
actions on the IoT network. This ensures that only authorized people and devices can
access specific resources and features.
• Network Security: Network security protects the IoT communications infrastructure
against cyber threats. This includes the use of firewalls, intrusion detection systems,
and network segmentation to prevent unauthorized access.
• Key Management: Key management involves the generation, secure storage, and peri-
odic rotation of encryption keys used in the IoT network [23]. Proper key management
is essential to prevent security breaches.
These concepts and their interpretation are crucial to designing and applying effec-
tive anomaly detection and security solutions in IoT systems, especially in a specialized
environment such as an intelligent manufacturing plant.
including convolutional neural networks (CNN) and hidden Markov models (HMM), is
chosen due to their ability to capture complex patterns and subtle changes in sensor data.
CNN models
chosen due to aretheirused to to
ability analyze
capturedata from sensors
complex patternsthat
and represent thermal
subtle changes and visual
in sensor data.
CNN
imagesmodels are used
of industrial to analyze
machinery data
[25]. Thisfrom
allowssensors that
for the represent
detection thermaland
of optical andthermal
visual
images
anomaliesof industrial machinery
in the operation [25]. ThisHMMs
of machines. allowsareforapplied
the detection
to timeofseries
optical and
data thermal
recording
anomalies in the operation
the performance of devicesofover
machines. HMMs
time. This are applied
combination to time series
of algorithms data recording
enables accurate,
the performance ofanomaly
multidimensional devices detection.
over time. This combination of algorithms enables accurate,
multidimensional anomaly detection.
A historical data set collected over a significant period at the plant is used to train the
A historical
machine learningdata set collected
models. These dataover a significant
include detailedperiod at thelogs
operating plantandis sensor
used tomeas-
train
the machine
urements. learning
Cases models.
of known These data
anomalies in theinclude detailed
data are taggedoperating
for use inlogsthe and sensor
supervised
measurements. Cases of
training of the models known
[26]. anomalies
The models arein the dataadjusted
carefully are tagged forthe
to fit useplant
in the supervised
environment
training of the models [26]. The models are carefully adjusted to fit the
and to minimize false positives and negatives. This involves parameter optimization andplant environment
and to minimize to
cross-validation false positives
ensure and negatives.
the accuracy This involves
and reliability parameter
of real-time optimization
anomaly and
detections.
cross-validation to ensure the accuracy and reliability of real-time anomaly
Machine learning implementation is rigorously carried out, and the trained models are detections.
Machine
integratedlearning
into theimplementation is rigorously
plant’s IoT infrastructure, carriedcontinuous
enabling out, and the traineddetection
anomaly models are in
integrated into the
the production plant’s IoTmachinery,
of industrial infrastructure, enabling equipment,
construction continuous anomaly detection
and industrial in the
tools.
production of industrial machinery, construction equipment, and industrial tools.
2.4. Method Design
2.4. Method Design
The method design addresses safety and efficiency challenges in a highly specialized
The method design addresses safety and efficiency challenges in a highly specialized
smart manufacturing facility for producing industrial machinery and other construction
smart manufacturing facility for producing industrial machinery and other construction
equipment. The primary purpose of this process is to strengthen the security in IoT sys-
equipment. The primary purpose of this process is to strengthen the security in IoT systems
tems that support the operation of the plant, identifying and mitigating possible cyber
that support the operation of the plant, identifying and mitigating possible cyber threats
threats and guaranteeing the integrity of the data [27]. In addition, it seeks to improve the
and guaranteeing the integrity of the data [27]. In addition, it seeks to improve the plant’s
plant’s efficiency by implementing anomaly detection solutions based on automatic learn-
efficiency by implementing anomaly detection solutions based on automatic learning
ing algorithms.
algorithms.
The research
The research follows
follows aamethodological
methodologicalapproach,
approach,combining
combiningqualitative
qualitativeand
andquantita-
quanti-
tative analysis elements [28]. This choice is based on the need to address both technical
tive analysis elements [28]. This choice is based on the need to address both technical and
and quantifiable
quantifiable aspects
aspects related
related to security
to security andand efficiency
efficiency in IoT
in IoT systems
systems andand
the the qualita-
qualitative
tive factors
factors that influence
that can can influence the implementation
the implementation of solutions
of solutions in a specialized
in a specialized manufac-
manufacturing
turing environment. Figure 1 shows the general flow of the methodology
environment. Figure 1 shows the general flow of the methodology used. used.
Figure 1. Flowchart illustrating the methodological process of investigation in the smart manufactur-
ing plant.
In the first phase, the analysis of the existing IoT infrastructure in the smart manufac-
turing plant is carried out. This includes identifying sensors, devices, and communication
protocols used in data collection. Subsequently, historical data covering a significant period
are collected [29]. These data are used to train and validate the machine learning models
Sensors 2023, 23, 8286 6 of 22
captured using the IoT cameras represented around 50,000 high-resolution images. Data
were collected and stored with a high degree of integrity and accuracy. Quality control
measures were implemented to identify and correct possible errors in data collection.
Properly and accurately labeled data enabled the practical training of machine learning
models. The collection of historical data provided a solid information base for research,
allowing us to advance the implementation of anomaly detection solutions based on
machine learning algorithms and strengthen security in IoT systems on the intelligent
manufacturing floor.
To effectively manage the 15 terabytes of data, a scalable and redundant storage
system was implemented to ensure the integrity and continuous availability of the data.
Additionally, data compression techniques were applied to optimize the use of storage
resources without compromising data quality.
Image data captured by IoT cameras were instrumental in our approach to IoT security.
These images were used for both the real-time diagnosis and training of ML models. In
real time, image analysis algorithms visually processed and evaluated situations on the
manufacturing floor, allowing for more accurate and faster anomaly detection. Images
were also integrated into ML models, significantly improving the algorithms’ ability to
understand and evaluate complex situations.
Image data are justified by the need for a richer and more detailed understanding
of situations on the manufacturing floor. These images provide visual information that
complements the numerical data collected using telemetry sensors. Visual information not
only helps to detect anomalies but also contributes to developing a better understanding
and evaluation of critical situations. In IoT security applications, visual information can
be essential to making informed decisions and responding effectively to unusual events.
Table 1 presents the summary of the values considered in the data collection.
Parameter Value
Telemetry sensors 50 sensors
Sampling rate 1 time per second
Data format CSV and JPEG image format
Historical data volume 15 terabytes (sensors)
Captured images 50,000 images (cameras)
Data quality High integrity and precision
variational autoencoders (VAE), the number of units in the latent layers and the learning
rate were adjusted.
Since sensor data anomalies were relatively rare compared to everyday situations, class
balancing techniques were used during training. This technique ensures that the model is
not biased towards classifying everyday situations to the detriment of abnormalities. The
training process was carried out in a high-performance computing environment to handle
the large volume of data and the complexity of machine learning models [33]. Detailed
model evaluation results are presented in the results section of the article, along with
specific performance metrics.
Data augmentation to camera images is carried out through several techniques,
such as:
• Random rotation: Random rotations were applied to the images to different orienta-
tions and perspectives. This helped the models recognize anomalies from multiple
angles.
• Random shift: Images were randomly shifted in different directions in response to
variations in the location of objects. This improved the model’s ability to detect
anomalies at various positions.
• Random rescaling: Random rescaling was performed on the images, allowing the
model to identify anomalies in both large and small objects, regardless of their relative
size in the picture.
• Horizontal mirroring: By applying horizontal mirroring, mirror versions of the images
were created, helping models to recognize mirror anomalies or object inversions.
• Noise addition: Random noise was added to images of varying lighting and visibility
conditions in the manufacturing plant environment.
In addition to these techniques, other data augmentation methods were used to
diversify the training set. These data augmentation strategies ensured that the model was
trained in various situations and conditions, improving its ability to detect anomalies in
the smart manufacturing plant environment.
Figure 3. 3.
Figure IoT Security
IoT SecurityTuning
Tuning and
and Optimization Flow.
Optimization Flow.
AA constantdata
constant data collection
collection process
processisisestablished in real
established timetime
in real by implementing
by implementingsecurity
secu-
solutions. This process allows for the continuous acquisition of information about
rity solutions. This process allows for the continuous acquisition of information about in- incidents,
generated alerts, responses to incidents, and any changes in system configuration. It is
cidents, generated alerts, responses to incidents, and any changes in system configuration.
essential to implement a performance monitoring system in real time. This system actively
It is essential to implement a performance monitoring system in real time. This system
monitors the behavior of the security system and generates performance data in real time.
actively
Specificmonitors the behavior
performance of the
metrics such securitydetection
as anomaly system andrate, generates performance
false positive data in
rate, and other
real time.
vital Specificwere
indicators performance
defined formetrics such These
the process. as anomaly
metricsdetection rate, false
are constantly positive
evaluated overrate,
and other vital indicators were defined for
time to measure the security system’s performance.the process. These metrics are constantly eval-
uated over
One time
of thetocritical
measure the security
approaches system’s performance.
to optimization is tuning the hyperparameters of
One ofdetection
anomaly the critical approaches
models. Systematic to experiments
optimizationareisusually
tuningcarried
the hyperparameters
out to find the of
optimal combination of hyperparameters for maximizing detection
anomaly detection models. Systematic experiments are usually carried out precision and
to mini-
find the
mizing false positives. A periodic update strategy is implemented to ensure that anomaly
detection models are kept up to date. The models are retrained with new data collected
from the plant environment to ensure they are aware of the latest trends in abnormal
behavior. The adjustment and optimization process must be carried out continuously to
maintain high effectiveness and efficiency in IoT security solutions. These actions allowed
us to proactively address challenges that arose over time and ensured that the security
system remained adapted to the changing conditions of the plant environment.
Sensors 2023, 23, 8286 12 of 22
3. Results
The results obtained in this study represent a significant step towards improving
security in IoT systems in the context of a smart manufacturing plant. Through continuous
tuning and optimization, notable advances have been made in anomaly detection and
the protection of IoT infrastructure. This section will present and analyze the critical
data obtained during the research, highlighting how these results align with previously
established research objectives. In addition, the impact of these improvements on the
efficiency of the plant and the security of operations will be discussed, thus supporting the
relevance of this study in the security field in IoT systems and machine learning.
These values provide a quantitative view of how IoT security solutions evolved
and improved throughout the study. There was a significant increase in the anomaly
detection rate, which went from 85% in the initial phases of the study to a robust 96%
after optimizations. In addition, the false positive rate was significantly reduced to 3%,
indicating a substantial improvement in system accuracy. One of the most notable changes
was the reduction in the average response time, which was reduced to less than 2 s. This
enhancement ensured a fast and efficient response to abnormal situations, which is essential
for security on the smart manufacturing floor. The frequency of alerts generated by the
system also decreased, indicating a reduction in non-critical situations that require attention.
These results highlight the positive impact of tuned and optimized security solutions on
the plant environment.
example of two hyperparameter configurations for the SVM model with an RBF kernel and
their respective results after the test set. These examples demonstrate how hyperparameters
can affect model performance. Configuration B achieved a higher anomaly detection rate,
although this was with a slightly lower false positive rate in this case.
Configuration A:
• Parameter C: 1.0
• Gamma parameter: 0.01
• Results in the test set:
• False positive rate: 5%
• Rate of true positives: 90%
Configuration B:
• Parameter C: 0.5
• Gamma parameter: 0.001
• Results in the test set:
• False positive rate: 3%
• Rate of true positives: 95%
The analysis is divided into categories of sensors and IoT devices, allowing us to
assess the performance of security solutions in each category. Table 3 summarizes the data
analysis results by type of sensor and IoT device before and after the implementation of
optimization. These results show each category’s anomaly detection rate and false positive
rate, along with the change in these metrics after optimizations.
• Before optimizations, telemetry sensors achieved an anomaly detection rate of 78%.
After the optimizations, this rate increased significantly to 91%, representing a 13%
increase in anomaly detection capability. Additionally, the false positive rate decreased
from 9% to 6%, indicating a 3% improvement in detection accuracy.
• For IoT cameras, the anomaly detection rate before optimizations was 88%. After
optimizations, this rate increased to 94%, which equated to a 6% increase in anomaly
detection capability. The false positive rate also decreased from 7% to 5%, representing
a 2% improvement in accuracy.
• IoT control data showed an 82% anomaly detection rate before optimizations. After
optimizations, this rate increased to 90%, reflecting an 8% increase in anomaly de-
tection capability. The false positive rate decreased from 10% to 7%, indicating a 3%
improvement in detection accuracy.
machine learning can be detected and rapidly generate responses to threats in real time,
thus strengthening the security of IoT systems at the manufacturing plant.
Detection Detection
Incident Threat Type Action Taken
Before After
Unauthorized Access Isolation and
Intrusion No Yes
Attempt to Device Notification
Denial of Service Traffic Activation of Mitigation
No Yes
(DDoS) attack overload Protocols
Sensor Data Sensor Data Data Restoration and
No Yes
Manipulation Manipulation Enhanced Security
The table presents a series of security-related incidents in IoT systems, details their
detection, and describes actions taken before and after optimizations. These incidents
represent situations evaluated in an innovative manufacturing plant environment, where
specific tests were conducted to assess the performance of the safety and anomaly detection
system. However, it is essential to note that the lack of detection of these attacks in the
past should not be attributed solely to security or software deficiencies. In many cases,
detecting cyber threats and anomalies in IoT systems is a complex challenge that requires the
implementation of advanced machine learning algorithms and updated security measures.
It is important to note that the incidents mentioned are not actual events at the smart
manufacturing plant during its regular operation. Instead, these are carefully designed
scenarios to test our system’s ability to detect cyber threats and anomalies in a controlled
environment. These tests are essential to evaluating the effectiveness of our security solu-
tions and ensuring that they can adequately respond to potential hazards in the production
environment. The actions taken after detecting these incidents represent recommended re-
sponses and preventative measures in the event of an attack. These actions are designed to
ensure the integrity and security of the smart manufacturing plant and have been optimized
due to our research and testing in simulated situations.
The average response time is critical for evaluating efficiency and safety in a smart
manufacturing environment. After optimizing our security solutions based on IoT and
machine learning, we significantly reduced the average response time to less than 2 s for
anomaly detection. This improvement was instrumental in proactively addressing unusual
events and minimizing potential negative impacts on production and safety.
However, this decrease in average response time was identified as raising questions
about the ability of security personnel to respond effectively in such a short period. To
address this issue, additional measures were implemented to ensure an appropriate and
timely response:
• Response automation: Part of our optimization strategy involved implementing au-
tomated responses to predefined, less severe anomalies. This means that specific
corrective actions are performed automatically, without human intervention, when cer-
tain common abnormalities are detected. This frees up security personnel to address
more critical events.
• Response hierarchy: A response hierarchy system was established to classify anomalies
based on their severity and potential risk. Critical anomalies are prioritized and
assigned to security personnel appropriately. This ensures that human resources focus
on events that require immediate attention.
• Training and drills: Security personnel have received specific training to respond
effectively to high-pressure, low-latency situations. In addition, regular drills are
carried out to ensure that staff are prepared to act quickly and accurately when
anomalies are detected.
Sensors 2023, 23, 8286 16 of 22
These measures ensure that security personnel can access the centralized dashboard
and take corrective action effectively, despite the speedy required response time. Automa-
tion and hierarchical response management have proven valuable in balancing detection
speed with security personnel’s responsiveness.
before after
Metrics Change
Optimizations Optimizations
Precision 0.87 0.92 +0.05
recall 0.78 0.91 +0.13
F1-Score 0.82 0.91 +0.09
False positive rate 0.12 0.07 −0.05
Positive prediction Value 0.89 0.94 +0.05
Area under the ROC Curve
0.92 0.96 +0.04
(AUC-ROC)
Area under the PR Curve
0.85 0.92 +0.07
(AUC-PR)
Before the optimizations, the system had a response time of 60 milliseconds, a process-
ing speed of 100 transactions per second, and an efficiency of 85%. After implementing
the optimizations, we saw significant performance improvements. The response time was
reduced to an average of 48 milliseconds across data collections, while the processing speed
increased to 129 transactions per second. The system’s efficiency improved by around 7%
on average, reaching values close to 94%. This direct comparison between performance be-
fore and after optimizations provides a clear view of how the improvements have positively
impacted system efficiency and responsiveness, resulting in a higher quality of service and
a better user experience in a smart manufacturing plant environment.
These results demonstrate that the optimizations applied to the smart manufacturing
plant’s IoT system improved security and increased operational efficiency. Reducing
response time and increasing processing speed are especially beneficial in critical situations
where anomaly detection and decision making must occur in real time. The system’s
high efficiency ensures that anomalies can be detected and addressed effectively without
compromising overall plant performance. These results support the implementation of
machine learning-based security solutions in IoT-based industrial environments.
The results show that all three evaluated machine learning algorithms achieved out-
standing performances when detecting anomalies in the smart manufacturing floor. How-
ever, the CNN algorithm stood out with the highest accuracy, recall, and F1-Score, along
Sensors 2023, 23, 8286 18 of 22
with the lowest false positive rate. This indicates that the CNN algorithm is especially
effective at detecting anomalies in this IoT-based industrial environment. It is important
to note that the choice of machine learning algorithm may depend on the specifics of the
environment and security goals. In this case, the high performance of the CNN algorithm
demonstrates its ability to improve both efficiency and security in IoT systems in a smart
manufacturing plant. The comparison between algorithms provides valuable information
for decision making in implementing anomaly detection solutions in similar environments.
Notably, CNN has demonstrated an exceptional performance in terms of accuracy
and F1-Score in anomaly detection. However, it is true that CNN requires more significant
computational resources than SVM and random forest techniques. This difference in
computational power requirements must be considered when selecting an algorithm for
implementation in a real-time application.
To implement CNNs in real-time applications, despite their considerable computa-
tional power requirements, several strategies should be considered:
• Model optimization: Model optimization techniques can be applied to reduce the
complexity of the neural network without significantly compromising its performance.
This may include reducing layers or adjusting hyperparameters.
• Use of specialized hardware: In cases where a high performance is required, you can
choose to use specialized hardware, such as graphics processing units (GPU) or tensor
processing units (TPU), designed to accelerate deep learning tasks.
• Requirement-based decision making: The choice between SVM, random forest, and
CNN should be based on the application’s specific requirements. If accuracy is critical
and adequate computational resources are available, CNN can be a solid choice.
However, if real-time responses are needed in a situation with limited resources, SVM
or random forest may be more suitable.
• Parallel implementation: Parallel CNN implementation can help improve processing
efficiency and speed, essential for real-time applications. The use of distributed
systems or parallelization of tasks can be crucial considerations.
The choice of an anomaly detection algorithm must balance performance with avail-
able computational resources and real-time requirements. Despite its computational power
requirements, CNN can be successfully implemented in real-time applications using op-
timization techniques, specialized hardware, and decisions based on specific application
requirements. This selection must be carefully evaluated according to the individual needs
of each case.
4. Discussion
During the development of this research, we faced certain limitations and challenges
that it is essential to recognize. One of the significant challenges was the availability and
quality of historical data. Although considerable effort was to generate representative data,
there is always the possibility that the data may vary in its complexity and distribution [39].
Additionally, the lack of labeled data in some anomaly situations could affect the model’s
ability to detect these anomalies [40].
The results obtained in this work compare favorably with those of previous research
related to IoT security and anomaly detection in similar environments. Implementing
tight and optimized security solutions has significantly improved efficiency and security in
IoT systems in a smart manufacturing plant [41]. These findings support and expand the
existing knowledge base in IoT security and provide additional evidence for the efficacy of
machine-learning approaches in anomaly detection. While no specific case studies were
included in this article, it is essential to note that the results and methodologies presented
apply to various IoT environments [42]. The adaptability of the proposed solutions allows
for their implementation in different industrial and commercial settings, which broadens
their relevance and applicability.
This study is relevant in the current context of the increasing adoption of IoT in in-
dustrial and commercial environments. Security in IoT systems is a critical concern, and
Sensors 2023, 23, 8286 19 of 22
5. Conclusions
This paper presents a detailed study of security solution in a smart manufacturing
plant using IoT and machine learning. Throughout the research, security challenges in an
IoT system were addressed, and strategies were developed in order to detect anomalies
effectively. The security solutions implemented in the intelligent manufacturing plant sig-
nificantly impacted the efficiency and security of operations. Improved anomaly detection
made it possible to identify abnormal situations in real time, resulting in a faster and more
effective response to unusual events. This led to a decrease in critical incidents and an
overall improvement in plant safety.
The optimization of machine learning algorithms and IoT infrastructure led to a
noticeable improvement in the operational efficiency of the plant. Tuned and optimized
anomaly detection models enabled accurate detection with reduced false favorable rates,
reducing unscheduled downtime and improving resource utilization. The results obtained
in this study compare favorably with previous research related to IoT security and anomaly
detection in industrial environments. The implementation of security solutions based
on machine learning proved to be effective in the early detection of anomalies and the
improvement of security in IoT systems.
It is essential to recognize the limitations and challenges encountered during the
investigation. The availability and quality of historical data may vary compared to actual
data. Additionally, the lack of labeled data in some anomaly situations could affect the
model’s ability to detect these anomalies. The field of security in IoT systems and machine
learning continues to evolve. Future research could incorporate emerging technologies,
such as natural language and advanced image processing, in order to improve anomaly
Sensors 2023, 23, 8286 20 of 22
detection. Integrating cloud-based, real-time security solutions could also expand detection
and response capabilities.
References
1. Wu, H.-T. The internet-of-vehicle traffic condition system developed by artificial intelligence of things. J. Supercomput. 2022, 78,
2665–2680. [CrossRef]
2. He, M.; Petering, M.; LaCasse, P.; Otieno, W.; Maturana, F. Learning with supervised data for anomaly detection in smart
manufacturing. Int. J. Comput. Integr. Manuf. 2023, 36, 1331–1344. [CrossRef]
3. Mendia, I.; Gil-Lopez, S.; Grau, I.; Del Ser, J. A novel approach for the detection of anomalous energy consumption patterns in
industrial cyber-physical systems. Expert Syst. 2022, e12959. [CrossRef]
4. Zhang, Q.; Han, R.; Xin, G.; Liu, C.H.; Wang, G.; Chen, L.Y. Lightweight and Accurate DNN-based Anomaly Detection at Edge.
IEEE Trans. Parallel Distrib. Syst. 2022, 33, 2927–2942. [CrossRef]
5. Louk, M.H.L.; Tama, B.A. Revisiting Gradient Boosting-Based Approaches for Learning Imbalanced Data: A Case of Anomaly
Detection on Power Grids. Big Data Cogn. Comput. 2022, 6, 41. [CrossRef]
6. Concetti, L.; Mazzuto, G.; Ciarapica, F.E.; Bevilacqua, M. An Unsupervised Anomaly Detection Based on Self-Organizing Map for
the Oil and Gas Sector. Appl. Sci. 2023, 13, 3725. [CrossRef]
7. Chen, P.-Y.; Yang, S.; McCann, J.A. Distributed Real-Time Anomaly Detection in Networked Industrial Sensing Systems. IEEE
Trans. Ind. Electron. 2015, 62, 3832–3842. [CrossRef]
8. Nizam, H.; Zafar, S.; Lv, Z.; Wang, F.; Hu, X. Real-Time Deep Anomaly Detection Framework for Multivariate Time-Series Data in
Industrial IoT. IEEE Sens. J. 2022, 22, 22836–22849. [CrossRef]
9. Rousopoulou, V.; Vafeiadis, T.; Nizamis, A.; Iakovidis, I.; Samaras, L.; Kirtsoglou, A.; Georgiadis, K.; Ioannidis, D.; Tzovaras, D.
Cognitive analytics platform with AI solutions for anomaly detection. Comput. Ind. 2022, 134, 103555. [CrossRef]
10. Liu, X.; Deng, R.H.; Miao, Y.; Vasilakos, A.V. Guest Editorial: 5G-Enabled Intelligent Application for Distributed Industrial
Internet-of-Thing System. IEEE Trans. Ind. Inform. 2022, 18, 2807–2810. [CrossRef]
11. Buzau, M.M.; Tejedor-Aguilera, J.; Cruz-Romero, P.; Gomez-Exposito, A. Detection of Non-Technical Losses Using Smart Meter
Data and Supervised Learning. IEEE Trans. Smart Grid 2019, 10, 2661–2670. [CrossRef]
12. Ahmad, H.S.; Arshad, M.J.; Akram, M.S. Device Authentication and Data Encryption for IoT Network by Using Improved
Lightweight SAFER Encryption with S-Boxes. Int. J. Embed. Real-Time Commun. Syst. 2021, 12, 1–13. [CrossRef]
13. Kim, S.-G.; Park, D.; Jung, J.-Y. Evaluation of One-Class Classifiers for Fault Detection: Mahalanobis Classifiers and the
Mahalanobis–Taguchi System. Processes 2021, 9, 1450. [CrossRef]
Sensors 2023, 23, 8286 21 of 22
14. Saba, T.; Rehman, A.; Sadad, T.; Kolivand, H.; Bahaj, S.A. Anomaly-based intrusion detection system for IoT networks through
deep learning model. Comput. Electr. Eng. 2022, 99, 107810. [CrossRef]
15. Mian, T.; Choudhary, A.; Fatima, S.; Panigrahi, B.K. Artificial intelligence of things based approach for anomaly detection in
rotating machines. Comput. Electr. Eng. 2023, 109, 108760. [CrossRef]
16. Park, M.; Jeong, J. Design and Implementation of Machine Vision-Based Quality Inspection System in Mask Manufacturing
Process. Sustainability 2022, 14, 6009. [CrossRef]
17. Abdel-Basset, M.; Moustafa, N.; Hawash, H. Privacy-Preserved Generative Network for Trustworthy Anomaly Detection in
Smart Grids: A Federated Semisupervised Approach. IEEE Trans. Ind. Inform. 2022, 19, 995–1005. [CrossRef]
18. Huang, M.; Liu, Z.; Tao, Y. Mechanical fault diagnosis and prediction in IoT based on multi-source sensing data fusion. Simul.
Model. Pract. Theory 2020, 102, 101981. [CrossRef]
19. Bin Mofidul, R.; Alam, M.; Rahman, H.; Jang, Y.M. Real-Time Energy Data Acquisition, Anomaly Detection, and Monitoring
System: Implementation of a Secured, Robust, and Integrated Global IIoT Infrastructure with Edge and Cloud AI. Sensors 2022,
22, 8980. [CrossRef]
20. Lu, S.; Lu, J.; An, K.; Wang, X.; He, Q. Edge Computing on IoT for Machine Signal Processing and Fault Diagnosis: A Review.
IEEE Internet Things J. 2023, 10, 11093–11116. [CrossRef]
21. Serradilla, O.; Zugasti, E.; de Okariz, J.R.; Rodriguez, J.; Zurutuza, U. Adaptable and Explainable Predictive Maintenance:
Semi-Supervised Deep Learning for Anomaly Detection and Diagnosis in Press Machine Data. Appl. Sci. 2021, 11, 7376.
[CrossRef]
22. Hlávka, J.P. Security, Privacy, and Information-Sharing Aspects of Healthcare Artificial Intelligence. In Artificial Intelligence in
Healthcare; Academic Press: Cambridge, MA, USA, 2020.
23. Tange, K.; De Donno, M.; Fafoutis, X.; Dragoni, N. A Systematic Survey of Industrial Internet of Things Security: Requirements
and Fog Computing Opportunities. IEEE Commun. Surv. Tutor. 2020, 22, 2489–2520. [CrossRef]
24. Bourdon, M.; Gimenez, P.F.; Alata, E.; Kaaniche, M.; Migliore, V.; Nicomette, V.; Laarouchi, Y. Hardware-Performance-Counters-
Based Anomaly Detection in Massively Deployed Smart Industrial Devices. In Proceedings of the 2020 IEEE 19th International
Symposium on Network Computing and Applications, NCA 2020, Cambridge, MA, USA, 24–27 November 2021.
25. Susto, G.A.; Terzi, M.; Beghi, A. Anomaly Detection Approaches for Semiconductor Manufacturing. Procedia Manuf. 2017, 11,
2018–2024. [CrossRef]
26. Alfeo, A.L.; Cimino, M.G.; Manco, G.; Ritacco, E.; Vaglini, G. Using an autoencoder in the design of an anomaly detector for
smart manufacturing. Pattern Recognit. Lett. 2020, 136, 272–278. [CrossRef]
27. Gültekin, Ö.; Cinar, E.; Özkan, K.; Yazıcı, A. Real-Time Fault Detection and Condition Monitoring for Industrial Autonomous
Transfer Vehicles Utilizing Edge Artificial Intelligence. Sensors 2022, 22, 3208. [CrossRef]
28. Tran, D.H.; Nguyen, V.L.; Nguyen, H.; Jang, Y.M. Self-Supervised Learning for Time-Series Anomaly Detection in Industrial
Internet of Things. Electronics 2022, 11, 2146. [CrossRef]
29. Yazdinejad, A.; Dehghantanha, A.; Parizi, R.M.; Hammoudeh, M.; Karimipour, H.; Srivastava, G. Block Hunter: Federated
Learning for Cyber Threat Hunting in Blockchain-Based IIoT Networks. IEEE Trans. Ind. Inform. 2022, 18, 8356–8366. [CrossRef]
30. Gamec, J.; Basan, E.; Basan, A.; Nekrasov, A.; Fidge, C.; Sushkin, N. An Adaptive Protection System for Sensor Networks Based
on Analysis of Neighboring Nodes. Sensors 2021, 21, 6116. [CrossRef]
31. Chakravarthi, S.S.; Kannan, R.J.; Natarajan, V.A.; Gao, X.-Z. Deep Learning Based Intrusion Detection in Cloud Services for
Resilience Management. Comput. Mater. Contin. 2022, 71, 5117–5133. [CrossRef]
32. Rosa, L.; Cruz, T.; de Freitas, M.B.; Quitério, P.; Henriques, J.; Caldeira, F.; Monteiro, E.; Simões, P. Intrusion and anomaly detection
for the next-generation of industrial automation and control systems. Futur. Gener. Comput. Syst. 2021, 119, 50–67. [CrossRef]
33. Fahim, M.; Sillitti, A. Anomaly Detection, Analysis and Prediction Techniques in IoT Environment: A Systematic Literature
Review. IEEE Access 2019, 7, 81664–81681. [CrossRef]
34. Benaddi, H.; Jouhari, M.; Ibrahimi, K.; Ben Othman, J.; Amhoud, E.M. Anomaly Detection in Industrial IoT Using Distributional
Reinforcement Learning and Generative Adversarial Networks. Sensors 2022, 22, 8085. [CrossRef]
35. Tanuska, P.; Spendla, L.; Kebisek, M.; Duris, R.; Stremy, M. Smart Anomaly Detection and Prediction for Assembly Process
Maintenance in Compliance with Industry 4.0. Sensors 2021, 21, 2376. [CrossRef]
36. Guan, S.; Zhao, B.; Dong, Z.; Gao, M.; He, Z. GTAD: Graph and Temporal Neural Network for Multivariate Time Series Anomaly
Detection. Entropy 2022, 24, 759. [CrossRef]
37. Kong, F.; Li, J.; Jiang, B.; Wang, H.; Song, H. Integrated Generative Model for Industrial Anomaly Detection via Bidirectional
LSTM and Attention Mechanism. IEEE Trans. Ind. Inform. 2021, 19, 541–550. [CrossRef]
38. Mansouri, A.; Majidi, B.; Shamisa, A. Metaheuristic neural networks for anomaly recognition in industrial sensor networks with
packet latency and jitter for smart infrastructures. Int. J. Comput. Appl. 2021, 43, 257–266. [CrossRef]
39. Truong, H.T.; Ta, B.P.; Le, Q.A.; Nguyen, D.M.; Le, C.T.; Nguyen, H.X.; Do, H.T.; Nguyen, H.T.; Tran, K.P. Light-weight federated
learning-based anomaly detection for time-series data in industrial control systems. Comput. Ind. 2022, 140, 103692. [CrossRef]
40. Ibrahim, M.; Alsheikh, A.; Awaysheh, F.M.; Alshehri, M.D. Machine Learning Schemes for Anomaly Detection in Solar Power
Plants. Energies 2022, 15, 1082. [CrossRef]
Sensors 2023, 23, 8286 22 of 22
41. Li, Z.; Fei, F.; Zhang, G. Edge-to-Cloud IIoT for Condition Monitoring in Manufacturing Systems with Ubiquitous Smart Sensors.
Sensors 2022, 22, 5901. [CrossRef]
42. Savic, M.; Lukic, M.; Danilovic, D.; Bodroski, Z.; Bajovic, D.; Mezei, I.; Vukobratovic, D.; Skrbic, S.; Jakovetic, D. Deep Learning
Anomaly Detection for Cellular IoT with Applications in Smart Logistics. IEEE Access 2021, 9, 59406–59419. [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.