Anomaly Detection Using RFID-Based Information Management in an IoT Context

Anomaly Detection Using RFID-Based Information Management in an IoT Context

Raúl Parada, Joan Melià-Seguí, Rafael Pous
Copyright: © 2018 |Pages: 23
DOI: 10.4018/JOEUC.2018070101
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

IoT-based environments may infer anomalies based on the data processed from their heterogeneous sensors. Within the technologies evolving the IoT concept, nowadays the Radio Frequency Identification (RFID) technology is a de facto standard in areas like retail or logistics. For instance, most retailers attach RFID-labels to their items to avoid stock-out in the inventory or speed up cash processes. Besides identification, RFID provides further RF data which can be used for information management like anomaly detection (i.e. a shoplifting in a RFID loss prevention system). This manuscript presents two IoT scenarios to detect anomalies using multivariate outlier detection methods, uniquely using RFID data. This research empirically evaluates the authors' proposed methods by reproducing a RFID-enabled store, and the two proposed scenarios. The evaluation achieved a False Positive Rate around 0.1% and a True Positive Rate around 87%.
Article Preview
Top

Introduction

Nowadays, the rapid advancement in miniaturizing technologies allows an easier adaptation of heterogeneous data generators to our daily lives such as sensors and actuators. The communication between these heterogeneous elements brings up the paradigm of the Internet of Things (IoT) technology. The ubiquity of heterogeneous technologies opens new ways of solving current issues in the context of IoT-based environments. For instance, thanks to data collected by IoT sensors, a wide range of events may be detected such as traffic patterns, citizen preferences, or energy consumption. Moreover, IoT-based scenarios may also infer anomalies based on the information managed by their heterogeneous sensors.

The detection of anomalies in IoT spaces can go from network security breaches to machinery performance, including human activity recognition. Within the technologies evolving the IoT concept, nowadays the Radio Frequency Identification (RFID) technology is well known. The RFID technology allows the identification to item-level through wireless communication. The Ultra High Frequency (UHF) RFID, is defined in the Electronic Product Class 1 Gen2 (EPC Gen2) (EPCglobal, 2013), is the de facto standard in retail. Retailers attach RFID-labels to their items to avoid stock-out in the inventory or speed up cash processes. Besides its own identification, RFID tags generate useful data based on Radio Frequency (RF) indicators such as Received Signal Strength Indicator (RSSI) or tag reading rate. These data may provide useful insights on context-aware information like classifying user-interest. RFID may be also used for anomaly detection, based on managing outlier information.

An IoT-based environment where the management of RFID-based outliers information can be applied to anomaly detection is retail stores. Loss prevention systems are installed in most retails in order to avoid shoplifting or at least to dissuade from doing it. Throughout the years, different technologies to detect theft acts were implemented in loss prevention systems or within the store such as Electronic Article Surveillance (EAS), Closed-circuit television (CCTV), Dye Ampule, and nowadays in RFID. Even with the implementation of disruptive technologies such as RFID, there are still some security issues out of scope from off-the-shelf RFID equipment. Loss prevention systems together with RFID allows the detection and identification of heterogeneous objects within its read range, even those near the gate. That fact can cause an infinite acoustic alarm indicating the loss prevention system is detecting a product within the read range. One solution could be the deactivation of RFID from those particular products. Although the alarm from the loss prevention system would stop, these products would be more vulnerable to thieves for being stolen.

This paper evaluates the implementation of different methods for detecting secured products leaving the loss prevention system zone. By analyzing the RFID system, these stolen heterogeneous objects can be identified as outliers in the data, that is, detecting an anomaly. By definition, outliers are difficult to detect due to their scarcity. Literature provides definitions about outliers. Hawkins (Hawkins, 1980) defines it as “an observation which deviates so much from other observations as to arouse suspicions that it was generated by a different mechanism”. In most of the applications, outliers appear along with a sequence of normal samples where those possible anomalies can be detected by comparing them with previous and posterior data after post-processing the dataset. Nevertheless, that is not suitable in situations where a fast outlier detection is needed.

We envision a retail store equipped with an RFID loss prevention system where even shopliftings occurred near the gate can be detected and the product(s) identified and displayed on a screen. Figure 1 represents a shoplifting event where the user is leaving the retail store without paying a garment located near the gate, and the system detects it. A screen displays the detected product for a faster identification by employees or the security guard.

Figure 1.

Shoplifting event in an IoT retail store scenario with a RFID loss prevention system

JOEUC.2018070101.f01

The overall goal of this work is to improve the state-of-the-art of anomaly detection in IoT spaces based on RFID outliers identification. We provide the following contributions:

Complete Article List

Search this Journal:
Reset
Volume 36: 1 Issue (2024)
Volume 35: 3 Issues (2023)
Volume 34: 10 Issues (2022)
Volume 33: 6 Issues (2021)
Volume 32: 4 Issues (2020)
Volume 31: 4 Issues (2019)
Volume 30: 4 Issues (2018)
Volume 29: 4 Issues (2017)
Volume 28: 4 Issues (2016)
Volume 27: 4 Issues (2015)
Volume 26: 4 Issues (2014)
Volume 25: 4 Issues (2013)
Volume 24: 4 Issues (2012)
Volume 23: 4 Issues (2011)
Volume 22: 4 Issues (2010)
Volume 21: 4 Issues (2009)
Volume 20: 4 Issues (2008)
Volume 19: 4 Issues (2007)
Volume 18: 4 Issues (2006)
Volume 17: 4 Issues (2005)
Volume 16: 4 Issues (2004)
Volume 15: 4 Issues (2003)
Volume 14: 4 Issues (2002)
Volume 13: 4 Issues (2001)
Volume 12: 4 Issues (2000)
Volume 11: 4 Issues (1999)
Volume 10: 4 Issues (1998)
Volume 9: 4 Issues (1997)
Volume 8: 4 Issues (1996)
Volume 7: 4 Issues (1995)
Volume 6: 4 Issues (1994)
Volume 5: 4 Issues (1993)
Volume 4: 4 Issues (1992)
Volume 3: 4 Issues (1991)
Volume 2: 4 Issues (1990)
Volume 1: 3 Issues (1989)
View Complete Journal Contents Listing