Research Article Energy Consumption of On-Device Machine Learning Models for IoT Intrusion Detection
| dc.contributor.author | Tekin, Nazli | |
| dc.contributor.author | Acar, Abbas | |
| dc.contributor.author | Aris, Ahmet | |
| dc.contributor.author | Uluagac, A. Selcuk | |
| dc.contributor.author | Gungor, Vehbi Cagri | |
| dc.date.accessioned | 2025-09-25T10:56:29Z | |
| dc.date.available | 2025-09-25T10:56:29Z | |
| dc.date.issued | 2023 | |
| dc.description | Tekin, Nazli/0000-0002-4275-8544; | en_US |
| dc.description.abstract | Recently, Smart Home Systems (SHSs) have gained enormous popularity with the rapid development of the Internet of Things (IoT) technologies. Besides offering many tangible benefits, SHSs are vulnerable to attacks that lead to security and privacy concerns for SHS users. Machine learning (ML)-based Intrusion Detection Systems (IDS) are proposed to address such concerns. Conventionally, ML models are trained and tested on computationally powerful platforms such as cloud services. Nevertheless, the data shared with the cloud is vulnerable to privacy attacks and causes latency, which decreases the performance of real-time applications like intrusion detection systems. Therefore, on-device ML models, in which the user data is kept locally, have emerged as promising solutions to ensure the security and privacy of the data for real-time applications. However, performing ML tasks requires high energy consumption. To the best of our knowledge, no study has been conducted to analyze the energy consumption of ML-based IDS. Therefore, in this paper, we perform a comparative analysis of on-device ML algorithms in terms of energy consumption for IoT intrusion detection applications. For a thorough analysis, we study the training and inference phases separately. For training, we compare the cloud computing-based ML, edge computing-based ML, and IoT device-based ML approaches. For the inference, we evaluate the TinyML approach to run the ML algorithms on tiny IoT devices such as Micro Controller Units (MCUs). Comparative performance evaluations show that deploying the Decision Tree (DT) algorithm on-device gives better results in terms of training time, inference time, and power consumption. | en_US |
| dc.description.sponsorship | U.S. National Science Foundation [NSF-CAREER CNS-1453647]; Microsoft Research, USA Grant; Scientific and Technological Research Council of Turkey (TUBITAK-BIDEB) 2219-International Postdoctoral Research Scholarship Program | en_US |
| dc.description.sponsorship | This work was partially supported by the U.S. National Science Foundation (Award: NSF-CAREER CNS-1453647) and Microsoft Research, USA Grant. Dr. N. Tekin was supported by Scientific and Technological Research Council of Turkey (TUBITAK-BIDEB) 2219-International Postdoctoral Research Scholarship Program. The views expressed are those of the authors only, not of the funding agencies. | en_US |
| dc.description.sponsorship | Air Force Office of Sponsored Research; TUBITAK-BIDEB; US Dept. of Labor; National Science Foundation, NSF, (NSF-CAREER CNS-1453647); U.S. Department of Energy, USDOE; Microsoft; Microsoft Research, MSR; Air Force Research Laboratory, AFRL; Google; Università degli Studi di Padova, UNIPD; Türkiye Bilimsel ve Teknolojik Araştırma Kurumu, TÜBİTAK | |
| dc.description.sponsorship | A. Selcuk Uluagac is currently an Eminent Scholar Chaired Associate Professor in the Department of Electrical and Computer Engineering at FIU, where he leads the Cyber-Physical Systems Security Lab, with an additional courtesy appointment in the Knight Foundation School of Computing and Information Science. Before FIU, he was a Senior Research Engineer at Georgia Tech and Symantec. He holds a PhD from Georgia Tech and MS from Carnegie Mellon University. He received US National Science Foundation (NSF) CAREER Award (2015), Air Force Office of Sponsored Research’s Summer Faculty Fellowship (2015), and University of Padova (Italy)’s Faculty Fellowship (2016), and Google’s ASPIRE Research award in security and privacy (2021). He is an expert in the areas of cybersecurity and privacy with an emphasis on their practical and applied aspects and teaches classes in these areas. He has hundreds of research papers/studies/publications in the most reputable venues. His research in cybersecurity and privacy has been funded by numerous government agencies and industry, including the US NSF, the US Dept. of Energy, US Air Force Research Lab, US Dept. of Labor, Cyber Florida, Google, Microsoft, Trend Micro, and Cisco, inter alia. He is very entrepreneurial and visionary with his research. Many of his research ideas have resulted in patents with one licensed to a company recently. He has served on the program committees of top-tier security conferences such as IEEE Security & Privacy (“Oakland”), NDSS, Usenix Security, inter alia. He was the General Chair of ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec) in 2019. Currently, he serves on the editorial boards of IEEE Transactions on Mobile Computing, Elsevier Computer Networks Journal, and the IEEE Communications and Surveys and Tutorials (network security lead). | |
| dc.identifier.doi | 10.1016/j.iot.2022.100670 | |
| dc.identifier.issn | 2543-1536 | |
| dc.identifier.issn | 2542-6605 | |
| dc.identifier.scopus | 2-s2.0-85145727099 | |
| dc.identifier.uri | https://doi.org/10.1016/j.iot.2022.100670 | |
| dc.identifier.uri | https://hdl.handle.net/20.500.12573/4567 | |
| dc.language.iso | en | en_US |
| dc.publisher | Elsevier | en_US |
| dc.relation.ispartof | Internet of Things | en_US |
| dc.rights | info:eu-repo/semantics/closedAccess | en_US |
| dc.subject | On-Device Machine Learning | en_US |
| dc.subject | Energy Consumption | en_US |
| dc.subject | Intrusion Detection | en_US |
| dc.subject | Smart Home | en_US |
| dc.subject | IoT | en_US |
| dc.title | Research Article Energy Consumption of On-Device Machine Learning Models for IoT Intrusion Detection | en_US |
| dc.type | Article | en_US |
| dspace.entity.type | Publication | |
| gdc.author.id | Tekin, Nazli/0000-0002-4275-8544 | |
| gdc.author.scopusid | 57200131283 | |
| gdc.author.scopusid | 57201944908 | |
| gdc.author.scopusid | 53879369200 | |
| gdc.author.scopusid | 22735196300 | |
| gdc.author.scopusid | 10739803300 | |
| gdc.author.wosid | Arış, Ahmet/Abi-6679-2020 | |
| gdc.author.wosid | Tekin, Nazli/Hhc-2733-2022 | |
| gdc.author.wosid | Uluagac, A./P-9997-2015 | |
| gdc.bip.impulseclass | C3 | |
| gdc.bip.influenceclass | C4 | |
| gdc.bip.popularityclass | C3 | |
| gdc.coar.access | metadata only access | |
| gdc.coar.type | text::journal::journal article | |
| gdc.collaboration.industrial | false | |
| gdc.description.department | Abdullah Gül University | en_US |
| gdc.description.departmenttemp | [Tekin, Nazli; Acar, Abbas; Aris, Ahmet; Uluagac, A. Selcuk] Florida Int Univ, Dept Elect & Comp Engn, Cyber Phys Syst Secur Lab, Miami, FL 33174 USA; [Tekin, Nazli] Erciyes Univ, Dept Software Engn, TR-38280 Kayseri, Turkey; [Gungor, Vehbi Cagri] Abdullah Gul Univ, Dept Comp Engn, TR-38080 Kayseri, Turkey | en_US |
| gdc.description.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
| gdc.description.scopusquality | Q1 | |
| gdc.description.volume | 21 | en_US |
| gdc.description.woscitationindex | Science Citation Index Expanded | |
| gdc.description.wosquality | Q1 | |
| gdc.identifier.openalex | W4312055178 | |
| gdc.identifier.wos | WOS:000997502100001 | |
| gdc.index.type | WoS | |
| gdc.index.type | Scopus | |
| gdc.oaire.diamondjournal | false | |
| gdc.oaire.impulse | 82.0 | |
| gdc.oaire.influence | 7.8890405E-9 | |
| gdc.oaire.isgreen | true | |
| gdc.oaire.popularity | 6.417271E-8 | |
| gdc.oaire.publicfunded | false | |
| gdc.oaire.sciencefields | 0202 electrical engineering, electronic engineering, information engineering | |
| gdc.oaire.sciencefields | 02 engineering and technology | |
| gdc.openalex.collaboration | International | |
| gdc.openalex.fwci | 12.9843 | |
| gdc.openalex.normalizedpercentile | 0.99 | |
| gdc.openalex.toppercent | TOP 1% | |
| gdc.opencitations.count | 65 | |
| gdc.plumx.crossrefcites | 76 | |
| gdc.plumx.mendeley | 133 | |
| gdc.plumx.newscount | 1 | |
| gdc.plumx.scopuscites | 95 | |
| gdc.scopus.citedcount | 100 | |
| gdc.wos.citedcount | 60 | |
| relation.isOrgUnitOfPublication | 665d3039-05f8-4a25-9a3c-b9550bffecef | |
| relation.isOrgUnitOfPublication.latestForDiscovery | 665d3039-05f8-4a25-9a3c-b9550bffecef |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- 1-s2.0-S2542660522001512-main.pdf
- Size:
- 1.59 MB
- Format:
- Adobe Portable Document Format
- Description:
- Makale Dosyası
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.44 KB
- Format:
- Item-specific license agreed upon to submission
- Description:
