


Volume 20 No 10 (2022)
Download PDF
Development of IoT-based Machine Learning Application for Data Anomaly Detection With in a Smart Manufacturing Plant
T.G Kukuni ,E. Markus, B. Kotze, A.M. Abu-Mahfouz
Abstract
The application of machine learning in resolving complex cyber-security challenges in
smart manufacturing plant is growing. Network intrusion and anomaly detection is posing
high risks in sensory data integrity and optimisation of processes leading to high efficiency
and high profits within smart manufacturing plants. This research paper makes use of
interquartile range algorithm for the detection of anomalies. The data is collected within a 5-
hour period and is transmitted to Google sheets via WiFi connectivity. However, the data
transfer requires the user to permit access to the google account for this process to take
place. After the addition of errors for every 11th entry, the file is resent back to Raspberry PI
for the execution of interquartile range algorithm. Once the results are obtained, the results
file is transmitted via WiFi connectivity to the output monitor. This research results
demonstrates that if the data collected is higher or lower than the required threshold (11-
14oC for temperature and 45-50% for humidity) the system will automatically detect and flag
the anomaly. This paper therefore concludes that the use of interquartile range algorithm for
anomaly detection based on sensory data is relevant and efficient for such an investigation.
Keywords
Anomaly, Intrusion Detection System, Machine Learning, Cyber-security, IoT, Sensory Data, Smart Manufacturing Plant
Copyright
Copyright © Neuroquantology
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.