Graph Neural Networks For Anomaly Detection in Industrial Internet of Things
Graph Neural Networks For Anomaly Detection in Industrial Internet of Things
Abstract—The Industrial Internet of Things (IIoT) plays an paradigm that facilitates the process of industry digital trans-
important role in digital transformation of traditional indus- formation [4], [5]. It allows the networked interconnection
tries toward Industry 4.0. By connecting sensors, instruments, of sensors, instruments, and other Internet of Things (IoT)
and other industry devices to the Internet, IIoT facilitates the
data collection, data analysis, and automated control, thereby devices to enable data collection, data analytics and automated
improving the productivity and efficiency of the business as control in an industry environment [6]–[9]. IIoT can, in turn,
well as the resulting economic benefits. Due to the complex improve the productivity and efficiency of the business in the
IIoT infrastructure, anomaly detection becomes an important industry, as well as the resulting economic benefits. A recent
tool to ensure the success of IIoT. Due to the nature of IIoT, report of “Bringing Smart Water Networks Into Focus” men-
graph-level anomaly detection has been a promising means to
detect and predict anomalies in many different domains, such as tioned that up to 12.5 billion USD in annual savings can be
transportation, energy, and factory, as well as for dynamically achieved from a combination of actions ranging from improved
evolving networks. This article provides a useful investigation on leakage and pressure management to streamlined water qual-
graph neural networks (GNNs) for anomaly detection in IIoT- ity monitoring.1 These actions can attribute to the development
enabled smart transportation, smart energy, and smart factory. of smart water systems that can be implemented by IIoT.
In addition to the GNN-empowered anomaly detection solutions
on point, contextual, and collective types of anomalies, useful Anomaly detection is of paramount importance in
data sets, challenges, and open issues for each type of anomalies IIoT [10]–[15]. On the one hand, traditional isolated industry
in the three identified industry sectors (i.e., smart transporta- systems are now exposed to the public access due to the intro-
tion, smart energy, and smart factory) are also provided and duction of IIoT [16]–[19]. The sensors, instruments, and other
discussed, which will be useful for future research in this area. IoT devices that were originally designed with little security
To demonstrate the use of GNN in concrete scenarios, we show
three case studies in smart transportation, smart energy, and mechanisms can be easily compromised by malicious users
smart factory, respectively. such as attackers [4], [16], [20]. Efficient detection of such
anomalies is crucial to the security of IIoT and the success of
Index Terms—Anomaly detection, graph neural networks
(GNNs), Industrial Internet of Things (IIoT), industry 4.0. related businesses. On the other hand, one of the benefits of
digital transformation of many industries is to use the collected
data to detect abnormal situations in a timely manner or even
in advance of the actual happening of anomalies [21], [22].
I. I NTRODUCTION The absence of appropriate anomaly detection may result in
ANY traditional industries that were isolated from the significant economic loss. For example, British Airways IT
M public access have started their digital transformation
under the umbrella of Industry 4.0 [1]–[3]. Such industries
systems failure resulted in 58 million GBP in lost business and
follow-up compensation claims.2 Across England and Wales,
include energy, health, manufacturing, and water, just to name nearly 3 billion litres of water is lost to leaks every day,
a few. The Industrial Internet of Things (IIoT) is an emerging resulting in considerable economic loss of water companies.3
IIoT, depending on the type of devices and working condi-
tions, may generate and collect a wide variety and large vol-
Manuscript received March 31, 2021; revised May 28, 2021 and June 18,
2021; accepted June 29, 2021. Date of publication July 2, 2021; date of current ume of data that can be used for anomaly detection [10], [23].
version June 7, 2022. This work was supported in part by the Engineering and These data may include value, image, text, audio, and video,
Physical Sciences Research Council (EPSRC) under Grant EP/R030863/1; and each device may generate and/or collect a combination
in part by the Macao Science and Technology Development Fund through
Macao Funding Scheme for Key Research and Development Projects under of different types of data [24]–[26]. Artificial intelligence
Grant 0025/2019/AKP; in part by the Open Fund of Zhejiang Lab under (AI), especially machine learning and deep learning, has
Grant 2019KE0AB03; and in part by the National Natural Science Foundation been widely adopted for anomaly detection in a wide range
of China (NSFC) under Grant 52071312. (Corresponding author: Yulei Wu.)
Yulei Wu is with the College of Engineering, Mathematics and of anomaly detection tasks [27]–[35]. Given the nature of
Physical Sciences, University of Exeter, Exeter EX4 4QF, U.K. (e-mail: IIoT, where devices are interconnected and the interconnection
[email protected]). evolves as shown in Fig. 1, graph-level anomaly detection has
Hong-Ning Dai is with the Faculty of Information Technology,
Macau University of Science and Technology, Macau, China (e-mail: 1 https://www.actu-environnement.com/media/pdf/dossiers/831-sensus-
[email protected]).
Haina Tang is with the School of Artificial Intelligence, University smart-water.pdf
2 https://www.computerweekly.com/news/252468002/BA-IT-systems-
of Chinese Academy of Sciences, Beijing 100049, China (e-mail:
[email protected]). failure-results-in-cancelled-flights-and-delays-at-London-airports
Digital Object Identifier 10.1109/JIOT.2021.3094295 3 https://www.bbc.co.uk/news/business-53274914
2327-4662
c 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: Northern Illinois University. Downloaded on April 07,2025 at 05:56:22 UTC from IEEE Xplore. Restrictions apply.
WU et al.: GRAPH NEURAL NETWORKS FOR ANOMALY DETECTION IN INDUSTRIAL INTERNET OF THINGS 9215
Authorized licensed use limited to: Northern Illinois University. Downloaded on April 07,2025 at 05:56:22 UTC from IEEE Xplore. Restrictions apply.
9216 IEEE INTERNET OF THINGS JOURNAL, VOL. 9, NO. 12, JUNE 15, 2022
reported to the control center, which then takes immediate structures, such as 2-D images and 1-D text data, while
actions. Similarly, faults and anomalies should be detected GNN can process non-Euclidean data, such as social media
at IIoT-enabled smart transportation and IIoT-enabled smart networks, 3-D images, and telecom networks, and the data in
factory/manufacturing, as shown in Fig. 2. many industry settings [53], [54]. GNN propagates the node
states in an iterative manner until reaching equilibrium, using
B. Types of Anomalies in IIoT a neural network. It outputs the state representation for each
Efficient anomaly detection is a crucial factor to ensure the node. Similar to the basic graph theory, one of the important
success of IIoT. In this section, the possible types of anomalies questions in GNN is to identify which parts of the data are
in IIoT will be presented [52]. nodes and which parts are edges. Then, the graph needs to be
1) Point: Point anomalies often refer to an irregularity that translated into the features for neural networks. Essentially,
happens randomly and may have no particular reason. For each node in GNN aggregates the features of its neighboring
instance, an egress port of a router/switch in an industrial nodes and works out its own feature representation. In recent
network with an instantaneous high volume of traffic seems a years, different variants of GNNs are being developed. Readers
point anomaly since it significantly deviates from the normal can refer to some survey papers that are dedicated for GNN
volume of traffic of this port. for more details [53], [55]–[58]. As the main contribution of
2) Contextual: A contextual anomaly (a.k.a. conditional our article focuses on the application of GNN on the anomaly
anomaly) represents an abnormal behavior happening within detection in different industry sectors, the specific details of
some specific context. This type of anomalies can be identi- GNN models will not be included. In this section, we will
fied by considering both contextual and behavioral features. briefly review some important variants of GNN that would
Time and space are usually used as the contextual features. be useful for facilitating the understanding of the rest of this
The behavioral features may be a pattern of network traffic, article.
e.g., the network traffic of an industry office at weekdays is
usually much higher than that at weekends. A. Graph Convolutional Networks
3) Collective: A collection of individual data points show- GCN is considered as one of the basic variants of GNN,
ing anomalies can be treated as collective anomalies. In this and thus, it shares some key features of GNN such as working
type of anomalies, each individual data point in isolation with non-Euclidean data. The way of how convolution works
appears as normal data instances while observed in a group in GCN is the same as that in CNN, where input neurons are
exhibit unusual behaviors. For example, the past five days multiplied by a set of weights (kernels). There are basically
at 1 A . M . the network traffic of an industry production line two types of GCN: 1) spectral GCN and 2) spatial GCN. The
is slightly higher than normal; this seems to be a potential spectral GCN can be treated as a message passing along the
case for collective anomalies. In addition, collective anoma- nodes within the graph. The convolutional operation calculates
lies may also happen when the program of IIoT devices is the eigen-decomposition of the graph Laplacian that helps to
patched/upgraded, but the controller that manages the behavior understand the graph structure [40]. It considers both node
of these devices is not upgraded. features and nodes connectivity as input features so that the
model can learn the features of neighboring nodes.
III. G RAPH N EURAL N ETWORKS As GCN does not consider the ordering of node neighbors,
GNN is a more generalized convolutional neural network it cannot handle the graph data with such features, e.g., some
(CNN). CNN can only handle the data with regular (Euclidean) IIoT data sets such as smart factory data have geometric
Authorized licensed use limited to: Northern Illinois University. Downloaded on April 07,2025 at 05:56:22 UTC from IEEE Xplore. Restrictions apply.
WU et al.: GRAPH NEURAL NETWORKS FOR ANOMALY DETECTION IN INDUSTRIAL INTERNET OF THINGS 9217
TABLE I
T YPES OF GNN S AND T HEIR A PPLICATIONS IN A NOMALY D ETECTION
interpretation of the graph that shows an order according (GGSNNs) used several GGNNs operating in sequence to pro-
to their spatial positions. To address this issue, the spatial duce an output sequence. Besides GGNN, graph recurrent
GCN was developed [59]. It uses the spatial features of nodes neural networks (GRNNs) [65] were also developed to analyze
to aggregate information from the neighboring nodes. Graph dynamic graphs.
sample and aggregate (GraphSAGE) [60] worked out the fea-
ture representation of a node by aggregating the features over a D. Jump Knowledge Networks
fixed-size neighboring nodes in an inductive manner. It works
Many GNN models, such as GCN, GAN, and GraphSAGE,
well on large-scale inductive benchmarks. In addition to spatial
use the fixed number of neighboring nodes to aggregate the
GCN, spatial–temporal GCN (STGCN) can characterize cor-
representation of a central node, either in one-hop neighbor-
relations of both spatial and temporal features, thereby being
hood or multiple hops. This may not work well in certain
used in smart transportation, smart energy, and smart factory.
circumstances depending on the graph structure. Xu et al. [66]
explored the jumping knowledge networks to develop a rep-
B. Graph Attention Networks
resentation learning on graphs, where each node can flexibly
GCN works for the situation where a node has the same leverage different neighborhood ranges (i.e., different num-
weights to all its neighboring nodes, i.e., each neighboring bers of neighboring nodes) to enable better structure-aware
node contributes equally to the calculation of the feature repre- representation.
sentation of the central node. However, there are certain cases,
where assigning different importance to each neighbor’s con-
E. Self-Enhanced GNN
tribution is needed when calculating the aggregated features
of the central node. Such cases include smart grid, IoT, and Most of GNN models focus on developing effective mod-
some biological networks. GAN [42] was then developed to els without considering the quality of the input data. To this
address this limitation of GCN. In this work, the model can end, Yang et al. [67] proposed a self-enhanced GNN model to
be applicable to inductive learning problems where the model improve the quality of the input data using the outputs of exist-
can generalize to unseen graphs. ing GNN models for enhanced performance on semisupervised
classification problems, hence being named self-enhanced.
C. Gated Graph (Sequence) Neural Networks In summary, Table I summarizes major types of GNNs and
their IIoT-applications in anomaly detection. It is worth men-
GCN and GAN focus on models that produce a single out- tioning that GNNs can be used for the three types anomalies,
put such as classification. However, many real-world problems namely, point, contextual, and collective anomalies.
require outputting a sequence, such as network planning [61]
and virtual network embedding [62]. To address this issue, gate
mechanisms, such as gated recurrent unit (GRU) [63] and long IV. II OT-E NABLED S MART T RANSPORTATION
short-term memory (LSTM) [64], are used in the propaga- We are experiencing the urbanization and the proliferation
tion step to improve the long-term propagation of information of various vehicles. It has been a hot topic to implement
in the graph. Li et al. [37] developed gated GNNs (GGNN) highly efficient intelligent transportation systems (ITSs) and
where they used GRU and unrolled the recurrence for a fixed develop autonomous vehicles (AVs), consequently realizing
number of steps T, and used backpropagation through time smart transportation [68]–[72]. Meanwhile, diverse traffic sen-
to compute gradients. Gated graph sequence neural networks sors, global navigation satellite system (GNSS), radar, loop
Authorized licensed use limited to: Northern Illinois University. Downloaded on April 07,2025 at 05:56:22 UTC from IEEE Xplore. Restrictions apply.
9218 IEEE INTERNET OF THINGS JOURNAL, VOL. 9, NO. 12, JUNE 15, 2022
Authorized licensed use limited to: Northern Illinois University. Downloaded on April 07,2025 at 05:56:22 UTC from IEEE Xplore. Restrictions apply.
WU et al.: GRAPH NEURAL NETWORKS FOR ANOMALY DETECTION IN INDUSTRIAL INTERNET OF THINGS 9219
TABLE II
S UMMARY OF THE GNN-BASED A NOMALY D ETECTION S OLUTIONS IN II OT-E NABLED S MART T RANSPORTATION
extensive attention. The work [76] presents a differential time- Besides traffic accidents, extreme weather events also affect
varying GNN (DTGN) to analyze traffic data and achieve a the traffic. Wang et al. [80] investigated the transportation
minute-level accident forecasting. The DTGN is essentially resilience under extreme weather events based GNNs. In
an extension from GCN by incorporating time-varying overall particular, they propose a graph convolutional recurrent neu-
affinity and differential GCN. The experimental results vali- ral network (GCRNN) to predict the traffic patterns under
date the effectiveness of the proposed framework. Moreover, extreme weather events. Moreover, the authors also conduct
Zhou et al. [77] proposed a framework to predict traffic acci- experiments on DiDi Chuxing, i.e., an on-demand riding ser-
dents after considering both spatial–temporal features of traffic vice in China. The experimental results also demonstrate the
data and context factors. effectiveness of the proposed method.
In addition to vehicular transportation, the railway delay
analysis based on STGCN was also conducted in [81]. In par-
C. Collective ticular, the authors in this article adopt STGCN to predict
Collective anomaly refers to a situation that a collection cascading delays in the British railway, where cascading delays
of data samples is anomalous to normal values while each are also regarded as anomalies since they are often deviated
individual sample may be within a normal range. For example, from normal operations of railways. Although the authors do
the event that a fleet of vehicles is moving slowly in a high not provide the data set for their experiments, they explicitly
way can be regarded as a collective anomaly. describe the data collection approach to crawling the railway
1) Public Data Sets: There are several public traffic data from National Rail Enquiries Data Feeds.12 The experi-
data sets available for collective anomalies. Liu et al. [78] mental results also demonstrate the superior performance than
obtained a new anomaly data set based on NYC taxi other statistical methods.
data set [89] and NYC Bike data set10 after inserting a number
of anomalies based on anomaly reports of NYC. In addition, D. Challenges and Open Issues
the work [91] presents a study on detecting collective anoma- Although GNNs have shown their strengths in anomaly
lies in crowds based on the University of Minnesota (UMN) detection in smart transportation, there are still some chal-
data set, which contains videos of escaping scenarios.11 lenges that need to be well addressed before the formal
Moreover, the work [79] also conducts anomaly detection on adoption of GNNs in smart transportation. We next present
a data set obtained from social networks (e.g., traffic acci- several representative open issues as follows.
dent reports at Twitter), remote sensing data set and vehicle 1) Data Heterogeneity: In urban transportation systems,
accidents. there are multiple types of traffic data, such as videos
2) GNN Solutions to Anomaly Detection: There are several (from surveillance cameras), traffic speeds, crowd flows,
studies toward addressing anomaly detection in traffic data. In traveling time, etc. Moreover, external factors, such as
particular, the work [78] presents a spatiotemporal multimodal road structures and weather conditions, can also influ-
fusion model (ST-MFM) to extract features from multiple ence traffic flows [92]. It is challenging to train GNNs
crowd-flow data sets and predict anomalies. In the proposed to learn from heterogeneous traffic data.
ST-MFM, a GCN was adopted to extract spatial features. It 2) Imbalance of Traffic Anomaly Data: Most of public traf-
is worth mentioning that the authors also construct a new fic data sets only contain normal traffic data samples
anomaly data set based on anomaly reports, bicycle traffic, and while few of them provide traffic anomalies. Many stud-
taxi traffic. Extensive experiments also validate the effective- ies either manually inject traffic anomalies [75] or insert
ness of the proposed model. Moreover, the work [79] presents traffic anomalies through external sources from accident
a multimodal GNN to forecast traffic risks. In this frame- reports or social networks [78]. Compared with nor-
work, GANs were leveraged to further improve the forecasting mal traffic data samples, traffic anomalies only occupy
accuracy. Extensive experiments on a real-world data set con- a small portion of the entire data set. The imbalanced
structed from traffic accidents, social networks, and remote data set often leads to poor performance [93]. It is
sensing imagery also demonstrate the superior performance of a future direction to address the imbalanced traffic-
the proposed model. anomaly data.
3) Dynamics of Traffic Data: Both the road structure and
10 https://github.com/toddwschneider/nyc-citibike-data transportation infrastructure are suffering from dynamics
11 The UMN data set is available through https://www.crcv.ucf.edu/projects/
Abnormal_Crowd/ 12 https://www.nationalrail.co.uk/46391.aspx
Authorized licensed use limited to: Northern Illinois University. Downloaded on April 07,2025 at 05:56:22 UTC from IEEE Xplore. Restrictions apply.
9220 IEEE INTERNET OF THINGS JOURNAL, VOL. 9, NO. 12, JUNE 15, 2022
due to multiple factors, such as removal, relocation, and happen in this complex energy infrastructure, efficient detec-
adding of road segments, intersections, and links. As a tion or prediction would save significant loss and even human
result, the well-trained GNN models based on massive lives. Since the integration of IIoT with smart energy systems
historical traffic data cannot well handle these new sce- becomes an inevitable trend, it is a necessity to assure the relia-
narios. Meanwhile, it also takes a long time to retrain bility and security of IIoT. Anomaly detection is a prerequisite
the entire GNN model. Thus, it is expected to address to assure reliable and secure IIoT systems, as faults, errors,
this emerging issue in the future, especially for anomaly abnormal behaviors, and malicious activities can be identi-
detection in smart transportation. fied to offer early warnings [99]. Table III summarizes the
GNN-based solutions for anomaly detection in smart energy.
We next enumerate the solutions for detecting anomalies in
V. II OT-E NABLED S MART E NERGY energy systems as follows.
The ever-growing global population drives the huge demand
on energy. However, the current energy supplies heavily A. Point
depend on fossil fuels, consequently bringing huge Carbon
Faults can happen at every stage from power genera-
dioxide (CO2 ) emissions to the atmosphere. The recent
tion to power consumption. The point anomaly in smart
renewable energies (REs), such as wind power, photovoltaic
energy system is often the event that diverges from normal
(PV) energy, and hydroelectric power, can provide alter-
measurements.
native energy sources to reduce the dependence on fossil
1) Public Data Sets: There are several public data sets
fuels [94]. The new REs sources also promote the revolu-
for point anomalies. In particular, the insulation at electricity
tionary upgrading of smart energy systems, which consist
transformers is a necessity to guarantee the safety of electric-
of distributed energy generation components, energy trans-
ity systems. As one of widely used insulation methods, the
mission, and energy consumption networks. However, both
oil-paper insulation often suffers from aging and dissolving.
decentralization and complexity of the system also pose chal-
The discharge faults or thermal faults at the transformers can
lenges of maintaining the reliability, safety, and security of
fasten the dissolving process of oil-paper insulators. Since the
smart energy systems.
dissolved process of oil-paper insulators also emits chemical
The recent advances of IIoT bring opportunities to address
gas, such as C2 H2 , C2 H4 , and C2 H6 , the analysis of dissolved
the challenges of smart energy systems. First, the wide adop-
gas can be used to detect insulation faults at transformers.
tion of IIoT can establish the advanced metering infrastructure
Li [110] presented a dissolved-gas data set offered by State
(AMI) for energy systems. AMI equipped with sensors, smart
Grid Corporation of China (SGCC). This data set contains a
meters, and controllers can measure the energy data from
number of point anomalies, which deviate from normal values.
energy generation to energy consumption so as to provide
2) GNN Solutions to Anomaly Detection: There are sev-
better services [95]. Second, REs sources often suffer from
eral studies toward solving anomaly detection. In particular,
unstable energy supply due to the fluctuated weather condition
as shown in [111], there are strong correlations between the
(e.g., wind and drought). Thus, the auxiliary energy storage
emitted gases and the fault types of transformers. However,
devices are often accompanied by REs sources to balance
it is challenging for traditional machine learning models to
the supply while IoT devices deployed at both energy stor-
characterize the complex nonlinear relationship between the
age devices and REs sources can measure the voltage level to
types of dissolved gases and the types of transformer faults.
balance the entire system [96].
The recent study [100] proposes using GCNs for analyzing
Fig. 4 shows an IIoT-enabled smart energy industry. The
the nonlinear relationship mapping from the types of dissolved
energy comes from a wide range of sources, including coal,
gases to the types of transformer faults. Extensive experiments
hydro, wind, natural gas, nuclear, solar, and so on, forming a
on the above dissolved-gas data set demonstrate a much higher
complex infrastructure for the energy industry. The data gen-
diagnostic accuracy than other conventional machine learning
erated and/or collected by IIoT devices at each source site
methods.
can be first processed by edge AI (i.e., edge computing and
Besides the fault detection of transformers, GNN can also
AI processing models) [97] and the results can be uploaded
be used for fault classification in PV arrays as in [101]. As one
to the cloud AI (i.e., cloud computing and AI models) for
of the main RE sources, PV panels have been widely deployed
further processing [98]. Alternatively, local IIoT data at each
in harsh environments causing faults of PV arrays. However,
site can be partitioned and uploaded to both edge AI and
it is challenging to achieve automatic detection of the faults of
cloud AI for processing, according to the application needs
PV arrays. Specifically, a spatial GCN is adopted in [101] for
and the computing capacity at the edge. Data analysis in such
detecting PV faults with a limited number of labeled samples.
an energy industry can benefit many aspects of business oper-
ations, e.g., balancing the energy requirement between energy
sources, adjusting energy demands of a source site in the event B. Contextual
of an anomaly happening at another source site, and facilitat- Smart energy systems often consist of sensors, smart meters,
ing the strategic policy changes such as reducing the nuclear and phasor measurement units (PMUs) [112], which are
energy demands. However, if the collected/generated data are interconnected through power line communications and wire-
tampered, the resulting decision from the data analysis may less communications. These IIoT devices can collect and
harm the business operation. In addition, if certain faults would generate massive smart energy data, which can be used
Authorized licensed use limited to: Northern Illinois University. Downloaded on April 07,2025 at 05:56:22 UTC from IEEE Xplore. Restrictions apply.
WU et al.: GRAPH NEURAL NETWORKS FOR ANOMALY DETECTION IN INDUSTRIAL INTERNET OF THINGS 9221
TABLE III
S UMMARY OF THE GNN-BASED A NOMALY D ETECTION S OLUTIONS IN II OT-E NABLED S MART E NERGY
to analyze faults, errors, and abnormal customer behaviors. work [102] presents a study on power outages in NYC influ-
Contextual anomalies in smart energy refer to data samples, enced by weather conditions. In particular, this study collects
which are anomalous to the remaining data samples in a cer- the energy information administration (EIA) energy distur-
tain context. For example, an extremely high temperature of bance events (containing outages) occurred from January 2011
a power line in winter can be regarded as an anomaly but to December 2013 among 26 304 data samples14 as well as
be regarded as a normal value in summer. For another exam- weather measurement data according to historical observa-
ple, some malicious activities on energy consumption may be tions15 at the same period and weather stations at the same
regarded as normal while the given reference electricity con- region. Moreover, the work [113] presents a labeled energy-
sumption can help to detect the abnormal energy consumption consumption data set from 500 energy customers in Ireland16
behaviors [113]. though the labeled data set is not officially released (available
1) Public Data Sets: There are some public data sets avail- upon request to the authors).
able for contextual anomalies. In particular, the work [114] 2) GNN Solutions to Anomaly Detection: There are several
presents a study on investigating electricity thefts, whose elec- attempts in applying GNNs in contextual anomaly detec-
tricity consumption is essentially anomalous to other normal tion. In particular, the work [102] leverages GCN [103] to
electricity customers. The abnormal behaviors of electricity learn from weather measurement data to predict the power
thefts include no obvious periodicity of electricity consump- outages at a given region. The power-outage problem is con-
tion in contrast to normal customers. The electricity-theft verted into a contextual-anomaly detection problem, which
data set13 was adopted in this study that was released by is modeled by a graph, in which weather stations are nodes
SGCC, which contains the electricity consumption data of
42 372 electricity customers within more than two years 14 From January 2011 to December 2013 https://wwweia.gov/electricity/
(from January 1, 2014 to October 31, 2016). Meanwhile, the monthly/
15 http://wcai.wharton.upenn.edu/earth-networks-data-portal/
13 https://github.com/henryRDlab/ElectricityTheftDetection/ 16 https://www.ucd.ie/issda/data/commissionforenergyregulationcer/
Authorized licensed use limited to: Northern Illinois University. Downloaded on April 07,2025 at 05:56:22 UTC from IEEE Xplore. Restrictions apply.
9222 IEEE INTERNET OF THINGS JOURNAL, VOL. 9, NO. 12, JUNE 15, 2022
Authorized licensed use limited to: Northern Illinois University. Downloaded on April 07,2025 at 05:56:22 UTC from IEEE Xplore. Restrictions apply.
WU et al.: GRAPH NEURAL NETWORKS FOR ANOMALY DETECTION IN INDUSTRIAL INTERNET OF THINGS 9223
Authorized licensed use limited to: Northern Illinois University. Downloaded on April 07,2025 at 05:56:22 UTC from IEEE Xplore. Restrictions apply.
9224 IEEE INTERNET OF THINGS JOURNAL, VOL. 9, NO. 12, JUNE 15, 2022
TABLE IV
S UMMARY OF THE GNN-BASED A NOMALY D ETECTION S OLUTIONS IN II OT-E NABLED S MART FACTORY
B. Contextual this purpose, the modeling purpose shall shift to finding the
The smart factory and manufacturing system usually con- relationship among multiple variables.
sists of a considerable number of sensors, instruments, and To comprehensively consider all possible structural, context,
other IoT devices interconnected to achieve many produc- and temporal features in anomaly detection, Zheng et al. [126]
tion purposes. Certain components may also connect with proposed an end-to-end anomalous edge detection framework,
other systems in the factory, across factories, or even a third- called AddGraph, based on an extended temporal GCN with
party system. With such a distributed environment, accurate the attention mechanism. The proposed model can capture both
anomaly detection shall consider contextual information. Such short-term and long-term patterns in dynamic graphs.
information may include temporal context, spatial context, and Statistical features of the data, such as network traffic, are
external context [141]. The temporal context is the one that very important for detecting contextual anomalies, but they
is usually shown in the time-series data where the temporal were usually carried out manually using expert knowledge. To
correlation exists between observations. The spatial context avoid manual extraction of statistical features, Xiao et al. [127]
usually refers to the position information of the devices where developed an approach with two graphs: 1) first-order graph
the spatial correlation exists when the devices are working and 2) second-order graph. The former learns the latent fea-
together to carry out one task in the production environment. tures from a single entity, such as a host or a variable, and the
The external context explains how the externally connected latter learns the latent features from a global point of view. The
systems affect the internal monitoring system. For example, automatically extracted features can be used to train machine
temperature control of a production system might be related learning models for classifying network anomalies.
to the weather condition outside the factory. The weather con- A graph-based method was proposed in [128] to learn
dition could be measured by additional sensors from outside dependencies between variables in time-series data. Nodes in
of the building. the graph represent individual observations or sequences of
1) Public Data Sets: Both SWaT and WADI data sets observations, where the weighting of the link between nodes
mentioned in Section VI-A1 contain the contextual data as represents the degree of dependencies on other nodes. Low
well. Supervisory control and data acquisition (SCADA) is an weighting shows that node is flagged as anomalous.
important control and data collection mechanism in the indus-
trial system. BATADAL data are the data on hourly historical C. Collective
SCADA operations.19 It contains three data sets, where the
Different from the contextual anomalies, which focus on
first one contains the data for one-year-long normal opera-
a data instance, collective anomalies essentially are a collec-
tions, and the second and the third ones contain the data with
tion of related data instances where they are anomalous as a
14 attacks. The Xcos software20 developed by SciLab is an
group with respect to the entire data set. Note that the indi-
open-source software that can design hybrid dynamical system
vidual data instance in a collective anomaly may not show
models with the functionalities for modeling of mechanical
abnormal behaviors but their occurrence as a group exhibits
systems (e.g., automotive and aeronautics), hydraulic circuits
the anomalous behavior. For example, in an industry setting,
(e.g., dam and pipe modeling), control systems, etc. This
the memory usage of a server may be normal individually
software can be used to general industrial operational contex-
compared with the historical records. But if the pattern of
tual data [142]. Meanwhile, epanetCPA21 is an open-source
the memory consumption, as time goes, meets certain crite-
MATLAB toolbox for modeling the hydraulic response of
ria, it could show a memory leak as result of a collective
WADI systems to cyber–physical attacks. It can be used to
anomaly. In addition, on the way toward Industry 4.0, many
generate contextual data set for anomaly detection.
industry devices/sensors will adopt machine learning mod-
2) GNN Solutions to Anomaly Detection: Some of the
els to make autonomous decisions. Some potential ethical
methods mentioned in Section VI-A2 for anomaly detection
issues may surface, resulting from a collection of sensors
on multivariate time-series data can also be adopted here for
collectively behaving some anomalous actions, e.g., mak-
detecting contextual anomalies (e.g., [124], [125]). To achieve
ing bias decisions. This can also be treated as collective
19 http://www.batadal.net/data.html anomalies.
20 https://www.scilab.org/software/xcos 1) Public Data Sets: The Xcos software and the epanetCPA
21 https://github.com/rtaormina/epanetCPA tool mentioned in Section VI-B1 can be used to generate
Authorized licensed use limited to: Northern Illinois University. Downloaded on April 07,2025 at 05:56:22 UTC from IEEE Xplore. Restrictions apply.
WU et al.: GRAPH NEURAL NETWORKS FOR ANOMALY DETECTION IN INDUSTRIAL INTERNET OF THINGS 9225
collective data sets for anomaly detection. In addition, Denial- 2) Combination of Point, Collective, and Contextual
of-Service/Distributed Denial-of-Service (DoS/DDoS) attack Anomalies: It is more challenging for anomaly detec-
is a good example of collective anomalies. LITNET-2020 is tion if a combination of types of anomalies shows,
an annotated network benchmark data set obtained from the such as detecting collective contextual anomalies.
real-world academic network. It contains 85 network flow Dou et al. [144] proposed a framework for discov-
features of the data set and 12 attack types. “M2M Using ering this type of anomalies in multiple time series
OPC UA” [143] is a data set generated by injecting vari- based on a combination of several techniques, including
ous attacks on a OPC UA-based cyber–physical production deep learning, time-series modeling, and graph analy-
systems testbed. The attacks include DoS, eavesdropping, sis. In addition, a recent study used graph autoencoders
or man-in-the-middle attacks, and impersonation or spoof- for group anomaly detection, where graph representa-
ing attacks.22 “WUSTL-IIoT-2018” is a data set used for the tion learning is achieved to detect collective anomalies
SCADA cybersecurity research, where the attacks include port by exploiting their graph structures.25 The research in
scanner, address scan, device identification, device identifi- this horizon is still in its infancy especially in the
cation (aggressive mode), and exploit.23 It is also a useful field of anomaly detection in the smart factory and
data set for carrying out the research of the detection on col- manufacturing.
lective anomalies. In addition, the KDD 1999 data set24 has 3) Working With Other Machine Learning Techniques:
also been widely used to validate the effectiveness of collective GNN is a model to effectively learn the node repre-
anomaly detection algorithms. sentation. This representation can then be used to work
2) GNN Solutions to Anomaly Detection: Jiang et al. [129] with other machine learning and deep learning tech-
devised a GCN-based anomaly detection model that can cap- niques for carrying out anomaly detection. Factory and
ture the entities’ properties and structural information between manufacturing environment is complex. It is important
them into graphs. With the proposed model, both abnormal to carefully consider the output of GNN and the input
behaviors of individuals and the associated anomalous groups of other machine learning models for more effective and
can be detected. accurate anomaly detection.
Botnets are a major source for DoS/DDoS attacks, which
can result in collective anomalies. Zhou et al. [130] developed VII. C ASE S TUDIES
a GNN-based approach to detect the hierarchical structure of
centralized botnets and the fast-mixing structure for decen- In this section, we present several representative case stud-
tralized botnets. The outcome will then be used for learning ies to illustrate how GNN-based models work for anomaly
policies for automatic botnet detection. detection.
Protogerou et al. [131] developed a multiagent system to
exploit the collaborative and cooperative nature of intelligent A. STGNN-Based Model for Detecting Collective Anomalies
agents for anomaly detection. Each agent will be implemented in Public Transportation System
using a GNN that can learn the representation of physical The collective anomalies in public transportation systems
networks. This distributed detection approach can carry out are often the root cause of traffic jams. It is a necessity to
the efficient monitoring of the entire network infrastructure and detect traffic anomalies in public transportation systems though
can be treated as a potential candidate solution for detecting it is often a challenging task since traffic anomalies are affected
collective anomalies. by multiple factors, such as accidents, gathering, criminals,
and public events. However, existing deep learning models
D. Challenges and Open Issues can either capture spatial features (e.g., road structures) or
Although GNN has been used for enhancing the temporal features (e.g., number of vehicles across a road per
performance of anomaly detection in smart factory and man- hour), but not both. Thus, GNN-based models have potential
ufacturing systems, there are still several challenges and open to address this challenge since they have strong capability to
issues that need to investigate in future studies. learn from spatial–temporal features together.
1) Effectiveness of GNN Modeling: Some data have a clear We will next demonstrate that an STGNN-based model can
indication of node and link representation in GNN, while be used for detecting collective anomalies in a public trans-
some may be not that straightforward. For example, portation system. Fig. 7 depicts the proposed STGNN for
the node in GNN can directly model the node in an traffic anomaly detection. The proposed method works in the
industrial device/sensor, and the edge is the relationship following three steps.
between devices. In addition, the node in GNN could In step 1, we need to obtain historical traffic-flow data
model a variable in a data set, and the edge is the rela- from the public transportation system. The traffic-flow data
tionship between variables. It is still an important issue include station ID, station location, and historical crowd flows
that which part of the data is the node in GNN and at a certain station and a certain time. The crowd flows can
which part is the edge. be essentially obtained by check-in/out records (i.e., recorded
by NFC-based tokens or cards) of the public transportation
22 https://ieee-dataport.org/open-access/m2m-using-opc-ua system. In particular, we denote the incoming crowd flows
23 https://www.cse.wustl.edu/ jain/iiot/index.html
24 http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html 25 https://grlearning.github.io/papers/85.pdf
Authorized licensed use limited to: Northern Illinois University. Downloaded on April 07,2025 at 05:56:22 UTC from IEEE Xplore. Restrictions apply.
9226 IEEE INTERNET OF THINGS JOURNAL, VOL. 9, NO. 12, JUNE 15, 2022
Fig. 7. Spatial–temporal GNN for traffic anomaly detection in public transportation systems.
Authorized licensed use limited to: Northern Illinois University. Downloaded on April 07,2025 at 05:56:22 UTC from IEEE Xplore. Restrictions apply.
WU et al.: GRAPH NEURAL NETWORKS FOR ANOMALY DETECTION IN INDUSTRIAL INTERNET OF THINGS 9227
VIII. C ONCLUSION
This article provided a useful investigation for GNN-
empowered anomaly detection solutions for IIoT-enabled
smart transportation, smart energy, and smart factory. In partic-
ular, a deeper understanding of three types of anomalies, i.e.,
point, contextual, and collective anomalies, in the context of
above IIoT applications was provided. In addition, the useful
public data sets were provided for each type of anomalies in
the corresponding IIoT applications. Furthermore, important
Fig. 9. GCN for anomaly detection in smart factory. research challenges and open issues of GNN-based anomaly
detection solutions for the three investigated IIoT applications
were provided and discussed. Finally, we show three case
GNN can be used to detect collective anomalies in the smart studies of the use of GNN in addressing anomaly detection
factory. problems in IIoT-enabled smart transportation, smart energy,
In a smart factory as shown in Fig. 9, PLC is an industrial and smart factory. We hope that this article provides useful
digital computer that is designed for the control of man- guidance for the future research in this area.
ufacturing processes. Each PLC is associated with several
IIoT devices, and a PLC is often networked to other PLC. R EFERENCES
IIoT devices usually need to be patched due to, e.g., security [1] Y. Wu, H.-N. Dai, and H. Wang, “Convergence of blockchain and
reasons. Collective anomalies may happen when the pro- edge computing for secure and scalable IIoT critical infrastructures in
gram of several IIoT devices, such as environmental control industry 4.0,” IEEE Internet Things J., vol. 8, no. 4, pp. 2300–2317,
Feb. 2021.
devices and robot control devices, is changed/patched but the [2] D. Wang, “An enterprise data pathway to industry 4.0,” IEEE Eng.
corresponding programmable logic controller (PLC) is not Manag. Rev., vol. 46, no. 3, pp. 46–48, Sep. 2018.
upgraded. [3] N. Zhang, Y. Li, Y. Wu, and Q. Zhang, “Guest editorial: Ai empow-
ered communication and computing systems for industrial Internet of
Many traditional anomaly detection methods only consider Things,” IEEE Trans. Ind. Informat., vol. 17, no. 7, pp. 4914–4916,
the features of IIoT devices or PLC. However, in order to Jul. 2021.
detect collective anomalies, the relationships between IIoT [4] Y. Wu, Z. Wang, Y. Ma, and V. C. Leung, “Deep reinforce-
ment learning for blockchain in industrial IoT: A survey,” Comput.
devices or PLC are also important. GNN is a good candidate Netw., vol. 191, May 2021, Art. no. 108004. [Online]. Available:
to capture such relationships, and thus, it has the potential to https://www.sciencedirect.com/science/article/pii/S1389128621001213
effectively detect collective anomalies. [5] G. Culot, F. Fattori, M. Podrecca, and M. Sartor, “Addressing industry
4.0 cybersecurity challenges,” IEEE Eng. Manag. Rev., vol. 47, no. 3,
In this case study, we resort to a typical example of GNN pp. 79–86, Sep. 2019.
and GCN for the detection of collective anomalies. First, [6] R. D. Raut, A. Gotmare, B. E. Narkhede, U. H. Govindarajan, and
we transform the industrial communication network and the S. U. Bokade, “Enabling technologies for industry 4.0 manufacturing
and supply chain: Concepts, current status, and adoption challenges,”
behaviors of IIoT devices and PLC into a graph. The nodes of IEEE Eng. Manag. Rev., vol. 48, no. 2, pp. 83–102, Jun. 2020.
the graph denote the IIoT devices and PLC, as well as other [7] P. Patel, M. I. Ali, and A. Sheth, “From raw data to smart manufac-
possible factory devices, and the edges between nodes are the turing: Ai and semantic Web of Things for industry 4.0,” IEEE Intell.
Syst., vol. 33, no. 4, pp. 79–86, Jul./Aug. 2018.
structural information of these devices. [8] W. Liang, W. Huang, J. Long, K. Zhang, K.-C. Li, and D. Zhang,
Then, we can design a GCN-based anomaly detection “Deep reinforcement learning for resource protection and real-time
model. It can be an n-layers GCN model with a softmax layer detection in iot environment,” IEEE Internet Things J., vol. 7, no. 7,
pp. 6392–6401, Jul. 2020.
to train a binary classification model for “normal” and “abnor- [9] Z. Cai and Z. He, “Trading private range counting over big IoT data,”
mal.” A softmax activation function, shown in (2), can be used in Proc. IEEE 39th Int. Conf. Distrib. Comput. Syst. (ICDCS), 2019,
to calculate the classification of each node pp. 144–153.
[10] Y. Liu et al., “Deep anomaly detection for time-series data in indus-
trial IoT: A communication-efficient on-device federated learning
ezi approach,” IEEE Internet Things J., vol. 8, no. 8, pp. 6348–6358,
zi ) = 2
σ ( (2) Apr. 2021.
zk
i=1 e [11] Y. Liu, N. Kumar, Z. Xiong, W. Y. B. Lim, J. Kang, and D. Niyato,
“Communication-efficient federated learning for anomaly detection in
industrial Internet of Things,” in Proc. IEEE Global Commun. Conf.
where σ denotes the softmax, zi represents the input vector, GLOBECOM, 2020, pp. 1–6.
ezi is the standard exponential function for the input vector, [12] B. Genge, P. Haller, and C. Enächescu, “Anomaly detection in aging
and ezk is the standard exponential function for the output industrial Internet of Things,” IEEE Access, vol. 7, pp. 74217–74230,
2019.
vector. The input of the GCN model is the graph containing [13] P. Sun et al., “Context-aware learning for anomaly detection with
the IIoT devices and PLC as the nodes with features, and the imbalanced log data,” in Proc. IEEE 22nd Int. Conf. High Perform.
connections between nodes as edges of the graph. In practice, Comput. Commun. IEEE 18th Int. Conf. Smart City IEEE 6th Int. Conf.
Data Sci. Syst. (HPCC/SmartCity/DSS), 2020, pp. 449–456.
the inputs are two matrices, one is the node feature matrix [14] Y. Guo, Y. Wu, Y. Zhu, B. Yang, and C. Han, “Anomaly detection
and the other is the node adjacency matrix. Batch gradient using distributed log data: A lightweight federated learning approach,”
descent can be used to train the weights of the GCN model. in Proc. Int. Joint Conf. Neural Netw. (IJCNN), 2021, pp. 106–116.
[15] H. Cao, H. Tang, Y. Wu, F. Wang, and Y. Xu, “On accurate computation
The GCN model can output the binary classification of normal of trajectory similarity via single image super-resolution,” in Proc. Int.
and abnormal for each node. Joint Conf. Neural Netw. (IJCNN), 2021, pp. 1–9.
Authorized licensed use limited to: Northern Illinois University. Downloaded on April 07,2025 at 05:56:22 UTC from IEEE Xplore. Restrictions apply.
9228 IEEE INTERNET OF THINGS JOURNAL, VOL. 9, NO. 12, JUNE 15, 2022
[16] Y. Wu, Y. Ma, H.-N. Dai, and H. Wang, “Deep learning for privacy [38] H. Wang, Y. Wu, G. Min, and W. Miao, “A graph neural network-
preservation in autonomous moving platforms enhanced 5G heteroge- based digital twin for network slicing management,” IEEE Trans. Ind.
neous networks,” Comput. Netw., vol. 185, Feb. 2021, Art. no. 107743. Informat., early access, Dec. 29, 2020, doi: 10.1109/TII.2020.3047843.
[Online]. Available: https://www.sciencedirect.com/science/article/pii/ [39] K. Li, G. Lu, G. Luo, and Z. Cai, “Seed-free graph de-anonymiztiation
S138912862031327X with adversarial learning,” in Proc. CIKM, 2020, pp. 745–754.
[17] W. Ding, X. Jing, Z. Yan, and L. T. Yang, “A survey on data fusion [Online]. Available: https://doi.org/10.1145/3340531.3411970
in Internet of Things: Towards secure and privacy-preserving fusion,” [40] T. N. Kipf and M. Welling, “Semi-supervised classification with
Inf. Fusion, vol. 51, pp. 129–144, Nov. 2019. [Online]. Available: graph convolutional networks,” in Proc. 5th Int. Conf. Learn.
https://www.sciencedirect.com/science/article/pii/S1566253518304731 Represent. (ICLR), Toulon, France, Apr. 2017. [Online]. Available:
[18] X. Jing, Z. Yan, X. Jiang, and W. Pedrycz, “Network traffic fusion and https://openreview.net/forum?id=SJU4ayYgl
analysis against DDoS flooding attacks with a novel reversible sketch,” [41] J. M.-T. Wu, Z. Li, G. Srivastava, M.-H. Tasi, and J. C.-W. Lin,
Inf. Fusion, vol. 51, pp. 100–113, Nov. 2019. [Online]. Available: “A graph-based convolutional neural network stock price
https://www.sciencedirect.com/science/article/pii/S1566253518305815 prediction with leading indicators,” Softw. Pract. Exp.,
[19] Y. Liang, Z. Cai, J. Yu, Q. Han, and Y. Li, “Deep learning based infer- vol. 51, no. 3, pp. 628–644, 2021. [Online]. Available:
ence of private information using embedded sensors in smart devices,” https://onlinelibrary.wiley.com/doi/abs/10.1002/spe.2915
IEEE Netw., vol. 32, no. 4, pp. 8–14, Jul./Aug. 2018. [42] P. Velickovic, G. Cucurull, A. Casanova, A. Romero, P. Liò, and
[20] H. Wang, S. Ma, C. Guo, Y. Wu, H.-N. Dai, and D. Wu, Y. Bengio, “Graph attention networks,” in Proc. 6th Int. Conf. Learn.
“Blockchain-based power energy trading management,” ACM Trans. Represent. (ICLR), Vancouver, BC, Canada, Apr./May 2018, pp. 1–9.
Internet Technol., vol. 21, no. 2, pp. 1–16, 2021. [Online]. Available: [Online]. Available: https://openreview.net/forum?id=rJXMpikCZ
https://doi.org/10.1145/3409771 [43] L. Akoglu, H. Tong, and D. Koutra, “Graph based anomaly
[21] Y. Zuo, Y. Wu, G. Min, C. Huang, and K. Pei, “An intelligent anomaly detection and description: A survey,” Data Min. Knowl.
detection scheme for micro-services architectures with temporal and Disc., vol. 29, no. 3, pp. 626–688, 2015. [Online]. Available:
spatial data analysis,” IEEE Trans. Cogn. Commun. Netw., vol. 6, no. 2, https://doi.org/10.1007/s10618-014-0365-y
pp. 548–561, Jun. 2020. [44] D. Miller, “Blockchain and the Internet of Things in the industrial
[22] C. Huang, G. Min, Y. Wu, Y. Ying, K. Pei, and Z. Xiang, “Time sector,” IT Prof., vol. 20, no. 3, pp. 15–18, 2018.
series anomaly detection for trustworthy services in cloud comput- [45] P. Lade, R. Ghosh, and S. Srinivasan, “Manufacturing analytics and
ing systems,” IEEE Trans. Big Data, early access, Jun. 1, 2017, industrial Internet of Things,” IEEE Intell. Syst., vol. 32, no. 3,
doi: 10.1109/TBDATA.2017.2711039. pp. 74–79, May/Jun. 2017.
[23] X. Zheng and Z. Cai, “Privacy-preserved data sharing towards multiple [46] Y. Wu, H. Huang, C. Wang, and Y. Pan, 5G-Enabled Internet of Things.
parties in industrial IoTs,” IEEE J. Sel. Areas Commun., vol. 38, no. 5, Boca Raton, FL, USA: CRC Press, 2019.
pp. 968–979, May 2020. [47] X. Cheng, Y. Wu, G. Min, A. Y. Zomaya, and X. Fang, “Safeguard
[24] M. Aazam, S. Zeadally, and K. A. Harras, “Deploying fog computing network slicing in 5G: A learning augmented optimization approach,”
in industrial Internet of Things and industry 4.0,” IEEE Trans. Ind. IEEE J. Sel. Areas Commun., vol. 38, no. 7, pp. 1600–1613, Jul. 2020.
Informat., vol. 14, no. 10, pp. 4674–4682, Oct. 2018. [48] Y. Wu et al., 6G Mobile Wireless Networks. Cham, Switzerland:
[25] Z. Zhao, Y. Shi, B. Diao, and B. Wu, “Optimal data caching and for- Springer Int., 2021.
warding in industrial IoT with diverse connectivity,” IEEE Trans. Ind. [49] Y. Wu, “Cloud-edge orchestration for the Internet-of-Things:
Informat., vol. 15, no. 4, pp. 2288–2296, Apr. 2019. Architecture and Ai-powered data processing,” IEEE Internet Things
[26] X. Jing, H. Han, Z. Yan, and W. Pedrycz, “SuperSketch: A multi- J., early access, Aug. 7, 2020, doi: 10.1109/JIOT.2020.3014845.
dimensional reversible data structure for super host identification,” [50] Y. Wu, “Robust learning enabled intelligence for the Internet-of-Things:
IEEE Trans. Depend. Secure Comput., early access, Apr. 9, 2011, A survey from the perspectives of noisy data and adversarial examples,”
doi: 10.1109/TDSC.2021.3072295. IEEE Internet Things J., vol. 8, no. 12, pp. 9568–9579, Jun. 2021.
[27] L. Ruff et al., “A unifying review of deep and shallow anomaly [51] Y. Wu, F. Hu, G. Min, and A. Zomaya, Big Data and Computational
detection,” Proc. IEEE, vol. 109, no. 5, pp. 756–795, May 2021. Intelligence in Networking. Hoboken, NJ, USA: CRC Press, 2017.
[28] X. Zhang, X. Ma, N. Huyan, J. Gu, X. Tang, and L. Jiao, “Spectral- [52] R. Chalapathy and S. Chawla. (2019). Deep Learning for
difference low-rank representation learning for hyperspectral anomaly Anomaly Detection: A Survey. [Online]. Available: http://arxiv.org/abs/
detection,” IEEE Trans. Geosci. Remote Sens., early access, Jan. 13, 1901.03407.
2021, doi: 10.1109/TGRS.2020.3046727. [53] J. Zhou, G. Cui, Z. Zhang, C. Yang, Z. Liu, and M. Sun. (2018). Graph
[29] J. Lu, S. Jin, J. Liang, and C. Zhang, “Robust few-shot learning for Neural Networks: A Review of Methods and Applications. [Online].
user-provided data,” IEEE Trans. Neural Netw. Learn. Syst., vol. 32, Available: http://arxiv.org/abs/1812.08434.
no. 4, pp. 1433–1447, Apr. 2021. [54] Z. Guo, K. Yu, Y. Li, G. Srivastava, and J. C.-W. Lin, “Deep
[30] D. Zhu, Y. Sun, H. Du, N. Cao, T. Baker, and G. Srivastava, “HUNA: learning-embedded social Internet of Things for ambiguity-aware social
A method of hierarchical unsupervised network alignment for IoT,” recommendations,” IEEE Trans. Netw. Sci. Eng., early access, Jan. 5,
IEEE Internet Things J., vol. 8, no. 5, pp. 3201–3210, Mar. 2021. 2021, doi: 10.1109/TNSE.2021.3049262.
[31] C. Huang, Y. Wu, Y. Zuo, K. Pei, and G. Min, “Towards experienced [55] Z. Wu, S. Pan, F. Chen, G. Long, C. Zhang, and P. S. Yu, “A compre-
anomaly detector through reinforcement learning,” in Proc. AAAI Conf. hensive survey on graph neural networks,” IEEE Trans. Neural Netw.
Artif. Intell., vol. 32, Apr. 2018, pp. 8087–8088. [Online]. Available: Learn. Syst., vol. 32, no. 1, pp. 4–24, Jan. 2021.
https://ojs.aaai.org/index.php/AAAI/article/view/12130 [56] S. Georgousis, M. P. Kenning, and X. Xie, “Graph deep learning: State
[32] C. Huang, Y. Wu, G. Min, and Y. Ying, “Kernelized convex hull of the art and challenges,” IEEE Access, vol. 9, pp. 22106–22140, 2021.
approximation and its applications in data description tasks,” in Proc. [57] Z. Zhang, P. Cui, and W. Zhu, “Deep learning on graphs: A sur-
Int. Joint Conf. Neural Netw. (IJCNN), 2018, pp. 1–8. vey,” IEEE Trans. Knowl. Data Eng., early access, Mar. 17, 2020,
[33] Y. Wu, F. Hu, G. Min, and A. Zomaya, Big Data and Computational doi: 10.1109/TKDE.2020.2981333.
Intelligence in Networking. Boca Raton, FL, USA: CRC Press, 2017. [58] N. Vesselinova, R. Steinert, D. F. Perez-Ramirez, and M. Boman,
[34] C. Zhang, M. Dong, and K. Ota, “Accelerate deep learning in “Learning combinatorial optimization on graphs: A survey with appli-
IoT: Human-interaction co-inference networking system for edge,” in cations to networking,” IEEE Access, vol. 8, pp. 120388–120416,
Proc. 13th Int. Conf. Human Syst. Interact. (HSI), 2020, pp. 1–6. 2020.
[35] C. Zhang, M. Dong, and K. Ota, “Enabling computational intelli- [59] T. Danel et al., “Spatial graph convolutional networks,” in Neural
gence for green Internet of Things: Data-driven adaptation in LPWA Information Processing, H. Yang, K. Pasupa, A. C.-S. Leung,
networking,” IEEE Comput. Intell. Mag., vol. 15, no. 1, pp. 32–43, J. T. Kwok, J. H. Chan, and I. King, Eds. Cham, Switzerland: Springer
Feb. 2020. Int., 2020, pp. 668–675.
[36] M. Gori, G. Monfardini, and F. Scarselli, “A new model for learning [60] W. L. Hamilton, R. Ying, and J. Leskovec, “Inductive representation
in graph domains,” in Proc. IEEE Int. Joint Conf. Neural Netw., vol. 2, learning on large graphs,” in Proc. 31st Int. Conf. Neural Inf. Process.
2005, pp. 729–734. Syst. (NIPS), 2017, pp. 1025–1035.
[37] Y. Li, D. Tarlow, M. Brockschmidt, and R. S. Zemel, “Gated [61] Y. Zuo, Y. Wu, G. Min, and L. Cui, “Learning-based network path
graph sequence neural networks,” in Proc. 4th Int. Conf. planning for traffic engineering,” Future Gener. Comput. Syst., vol. 92,
Learn. Represent. (ICLR), 2016, p. 6. [Online]. Available: pp. 59–67, Mar. 2019. [Online]. Available: https://www.sciencedirect.
http://arxiv.org/abs/1511.05493. com/science/article/pii/S0167739X18313244
Authorized licensed use limited to: Northern Illinois University. Downloaded on April 07,2025 at 05:56:22 UTC from IEEE Xplore. Restrictions apply.
WU et al.: GRAPH NEURAL NETWORKS FOR ANOMALY DETECTION IN INDUSTRIAL INTERNET OF THINGS 9229
[62] Z. Yan, J. Ge, Y. Wu, L. Li, and T. Li, “Automatic virtual network [83] L. Tišljarić, S. Fernandes, T. Carić, and J. Gama, “Spatiotemporal
embedding: A deep reinforcement learning approach with graph con- traffic anomaly detection on urban road network using tensor decom-
volutional networks,” IEEE J. Sel. Areas Commun., vol. 38, no. 6, position method,” in Discovery Science. Cham, Switzerland: Springer
pp. 1040–1057, Jun. 2020. Int., 2020, pp. 674–688.
[63] K. Cho et al., “Learning phrase representations using RNN encoder– [84] W. Jiang and J. Luo. (2021). Graph Neural Network
decoder for statistical machine translation,” in Proc. Conf. Empirical for Traffic Forecasting: A Survey. [Online]. Available:
Methods Nat. Lang. Process. (EMNLP), Oct. 2014, pp. 1724–1734. https://arxiv.org/abs/2101.11174.
[Online]. Available: https://doi.org/10.3115/v1/d14-1179 [85] W. Li, V. Mahadevan, and N. Vasconcelos, “Anomaly detection and
[64] S. Hochreiter and J. Schmidhuber, “Long short-term memory,” Neural localization in crowded scenes,” IEEE Trans. Pattern Anal. Mach.
Comput., vol. 9, no. 8, pp. 1735–1780, 1997. [Online]. Available: Intell., vol. 36, no. 1, pp. 18–32, Jan. 2014.
https://doi.org/10.1162/neco.1997.9.8.1735 [86] Y. Benezeth, P. Jodoin, V. Saligrama, and C. Rosenberger, “Abnormal
[65] A. Hasanzadeh, E. Hajiramezanali, K. Narayanan, N. Duffield, events detection based on spatio-temporal co-occurences,” in Proc.
M. Zhou, and X. Qian, “Variational graph recurrent neural networks,” in IEEE Conf. Comput. Vis. Pattern Recognit., 2009, pp. 2458–2465.
Proc. Adv. Neural Inf. Process. Syst., vol. 32, 2019, pp. 10700–10710. [87] K. K. Santhosh, D. P. Dogra, and P. P. Roy, “Anomaly detection
[66] K. Xu, C. Li, Y. Tian, T. Sonobe, K. Kawarabayashi, and in road traffic using visual surveillance: A survey,” ACM Comput.
S. Jegelka, “Representation learning on graphs with jumping knowl- Surveys, vol. 53, no. 6, pp. 1–26, Dec. 2020. [Online]. Available:
edge networks,” in Proc. 35th Int. Conf. Mach. Learn. (ICML), vol. 80. https://doi.org/10.1145/3417989
Stockholm, Sweden, Jul. 2018, pp. 5449–5458. [Online]. Available: [88] V. Chandola, A. Banerjee, and V. Kumar, “Anomaly detection: A
http://proceedings.mlr.press/v80/xu18c.html survey,” ACM Comput. Surveys, vol. 41, no. 3, pp. 1–58, Jul. 2009.
[67] H. Yang, X. Yan, X. Dai, and J. Cheng. (2020). Self-Enhanced GNN: [Online]. Available: https://doi.org/10.1145/1541880.1541882
Improving Graph Neural Networks Using Model Outputs. [Online]. [89] (2021). New York City (NYC) Taxi Dataset. [Online]. Available:
Available: https://arxiv.org/abs/2002.07518. https://www1.nyc.gov/site/tlc/index.page
[68] H. Li, G. Zhao, L. Qin, H. Aizeke, X. Zhao, and Y. Yang, “A survey of [90] W. Yu, W. Cheng, C. C. Aggarwal, K. Zhang, H. Chen, and W. Wang,
safety warnings under connected vehicle environments,” IEEE Trans. “NetWalk: A flexible deep embedding approach for anomaly detection
Intell. Transp. Syst., vol. 22, no. 5, pp. 2572–2588, May 2021. in dynamic networks,” in Proc. 24th ACM SIGKDD Int. Conf. Knowl.
[69] K. Ren, Q. Wang, C. Wang, Z. Qin, and X. Lin, “The security of Disc. Data Min., 2018, pp. 2672–2681.
autonomous driving: Threats, defenses, and future directions,” Proc. [91] R. Mehran, A. Oyama, and M. Shah, “Abnormal crowd behavior detec-
IEEE, vol. 108, no. 2, pp. 357–372, Feb. 2020. tion using social force model,” in Proc. IEEE Conf. Comput. Vis.
[70] B. Yin, Y. Wu, T. Hu, J. Dong, and Z. Jiang, “An efficient collaboration Pattern Recognit., 2009, pp. 935–942.
and incentive mechanism for Internet of Vehicles (IoV) with secured [92] Z. Zheng, Y. Yang, J. Liu, H. Dai, and Y. Zhang, “Deep and embed-
information exchange based on blockchains,” IEEE Internet Things J., ded learning approach for traffic flow prediction in urban informatics,”
vol. 7, no. 3, pp. 1582–1593, Mar. 2020. IEEE Trans. Intell. Transp. Syst., vol. 20, no. 10, pp. 3927–3939,
[71] L. Cheng et al., “SCTSC: A semicentralized traffic signal control mode Oct. 2019.
with attribute-based blockchain in IoVs,” IEEE Trans. Comput. Soc. [93] J. Fang, D. Yan, J. Qiao, J. Xue, and H. Yu, “DADA: Driver attention
Syst., vol. 6, no. 6, pp. 1373–1385, Dec. 2019. prediction in driving accident scenarios,” IEEE Trans. Intell. Transp.
[72] L. Cui, D. Su, Y. Zhou, L. Zhang, Y. Wu, and S. Chen, “Edge learning Syst., early access, Jan. 1, 2021, doi: 10.1109/TITS.2020.3044678.
for surveillance video uploading sharing in public transport systems,” [94] S. S. Ali and B. J. Choi, “State-of-the-art artificial intelligence tech-
IEEE Trans. Intell. Transp. Syst., vol. 22, no. 4, pp. 2274–2285, niques for distributed smart grids: A review,” Electronics, vol. 9, no. 6,
Apr. 2021. p. 1030, 2020.
[73] J.-X. Zhong, N. Li, W. Kong, S. Liu, T. H. Li, and G. Li, “Graph [95] P. Gope, “PMAKE: Privacy-aware multi-factor authenticated key
convolutional label noise cleaner: Train a plug-and-play action classifier establishment scheme for advance metering infrastructure in smart
for anomaly detection,” in Proc. IEEE/CVF Conf. Comput. Vis. Pattern grid,” Comput. Commun., vol. 152, pp. 338–344, Feb. 2020.
Recognit. (CVPR), Jun. 2019, pp. 1237–1246. [Online]. Available: https://www.sciencedirect.com/science/article/
[74] L. Yu, B. Du, X. Hu, L. Sun, L. Han, and W. Lv, “Deep pii/S0140366419313210
spatio-temporal graph convolutional network for traffic accident [96] L. Al-Ghussain, R. Samu, O. Taylan, and M. Fahrioglu, “Sizing renew-
prediction,” Neurocomputing, vol. 423, pp. 135–147, Jan. 2021. able energy systems with energy storage systems in microgrids for max-
[Online]. Available: https://www.sciencedirect.com/science/article/pii/ imum cost-efficient utilization of renewable energy resources,” Sustain.
S092523122031451X Cities Soc., vol. 55, Apr. 2020, Art. no. 102059. [Online]. Available:
[75] Y. Hu, A. Qu, and D. Work. (2020). Graph Convolutional Networks for https://www.sciencedirect.com/science/article/pii/S2210670720300469
Traffic Anomaly. [Online]. Available: https://arxiv.org/abs/2012.13637. [97] J. Zhang, Y. Wu, G. Min, F. Hao, and L. Cui, “Balancing energy
[76] Z. Zhou, Y. Wang, X. Xie, L. Chen, and H. Liu, “RiskOracle: A minute- consumption and reputation gain of uav scheduling in edge comput-
level citywide traffic accident forecasting framework,” in Proc. AAAI ing,” IEEE Trans. Cogn. Commun. Netw., vol. 6, no. 4, pp. 1204–1217,
Conf. Artif. Intell., vol. 34, 2020, pp. 1258–1265. Dec. 2020.
[77] Z. Zhou, Y. Wang, X. Xie, L. Chen, and C. Zhu, “Foresee urban [98] D. Liu, Z. Yan, W. Ding, and M. Atiquzzaman, “A survey on secure
sparse traffic accidents: A spatiotemporal multi-granularity perspec- data analytics in edge computing,” IEEE Internet Things J., vol. 6,
tive,” IEEE Trans. Knowl. Data Eng., early access, Oct. 28, 2020, no. 3, pp. 4946–4967, Jun. 2019.
doi: 10.1109/TKDE.2020.3034312. [99] W. Liao, B. Bak-Jensen, J. R. Pillai, Y. Wang, and Y. Wang. (2021).
[78] R. Liu, S. Zhao, B. Cheng, H. Yang, H. Tang, and F. Yang, “ST- A Review of Graph Neural Networks and Their Applications in Power
MFM: A spatiotemporal multi-modal fusion model for urban anomalies Systems. [Online]. Available: https://arxiv.org/abs/2101.10025.
prediction,” in Proc. 24th Eur. Conf. Artif. Intell., 2020, pp. 1922–1929. [100] W. Liao, D. Yang, Y. Wang, and X. Ren, “Fault diagnosis of power
[79] Y. Zhang, X. Dong, L. Shang, D. Zhang, and D. Wang, “A multi-modal transformers using graph convolutional network,” CSEE J. Power
graph neural network approach to traffic risk forecasting in smart urban Energy Syst., vol. 7, no. 2, pp. 241–249, 2021.
sensing,” in Proc. 17th Annu. IEEE Int. Conf. Sens. Commun. Netw. [101] J. Fan, S. Rao, G. Muniraju, C. Tepedelenlioglu, and A. Spanias,
(SECON), 2020, pp. 1–9. “Fault classification in photovoltaic arrays using graph signal process-
[80] H.-W. Wang et al., “Evaluation and prediction of transportation ing,” in Proc. IEEE Conf. Ind. Cyberphys. Syst. (ICPS), vol. 1, 2020,
resilience under extreme weather events: A diffusion graph convolu- pp. 315–319.
tional approach,” Transp. Res. C Emerg. Technol., vol. 115, Jun. 2020, [102] D. Owerko, F. Gama, and A. Ribeiro, “Predicting power outages using
Art. no. 102619. [Online]. Available: https://www.sciencedirect.com/ graph neural networks,” in Proc. IEEE Global Conf. Signal Inf. Process.
science/article/pii/S0968090X19305868 (GlobalSIP), 2018, pp. 743–747.
[81] J. S. W. Heglund, P. Taleongpong, S. Hu, and H. T. Tran, “Railway [103] F. Gama, A. G. Marques, G. Leus, and A. Ribeiro, “Convolutional
delay prediction with spatial–temporal graph convolutional networks,” neural network architectures for signals supported on graphs,” IEEE
in Proc. IEEE 23rd Int. Conf. Intell. Transp. Syst. (ITSC), 2020, Trans. Signal Process., vol. 67, no. 4, pp. 1034–1049, Feb. 2019.
pp. 1–6. [104] Z. Chen, J. Xu, T. Peng, and C. Yang, “Graph convolutional network-
[82] M. Zhang, T. Li, Y. Yu, Y. Li, P. Hui, and Y. Zheng, “Urban anomaly based method for fault diagnosis using a hybrid of measurement and
analytics: Description, detection and prediction,” IEEE Trans. Big Data, prior knowledge,” IEEE Trans. Cybern., early access, Mar. 12, 2021,
early access, Mar. 28, 2021, doi: 10.1109/TBDATA.2020.2991008. doi: 10.1109/TCYB.2021.3059002.
Authorized licensed use limited to: Northern Illinois University. Downloaded on April 07,2025 at 05:56:22 UTC from IEEE Xplore. Restrictions apply.
9230 IEEE INTERNET OF THINGS JOURNAL, VOL. 9, NO. 12, JUNE 15, 2022
[105] Y. Luo, C. Lu, L. Zhu, and J. Song, “Data-driven short-term [126] L. Zheng, Z. Li, J. Li, Z. Li, and J. Gao, “AddGraph: Anomaly detection
voltage stability assessment based on spatial-temporal graph in dynamic graph using attention-based temporal GCN,” in Proc. 28th
convolutional network,” Int. J. Elect. Power Energy Syst., Int. Joint Conf. Artif. Intell. (IJCAI), Jul. 2019, pp. 4419–4425.
vol. 130, Sep. 2021, Art. no. 106753. [Online]. Available: [Online]. Available: https://doi.org/10.24963/ijcai.2019/614
https://www.sciencedirect.com/science/article/pii/S0142061520342988 [127] Q. Xiao, J. Liu, Q. Wang, Z. Jiang, X. Wang, and Y. Yao,
[106] K. Chen, J. Hu, Y. Zhang, Z. Yu, and J. He, “Fault location in power “Towards network anomaly detection using graph embedding,” in
distribution systems via deep graph convolutional networks,” IEEE J. Computational Science—ICCS, V. V. Krzhizhanovskaya et al., Eds.
Sel. Areas Commun., vol. 38, no. 1, pp. 119–131, Jan. 2020. Cham, Switzerland: Springer Int., 2020, pp. 156–169.
[107] M. Defferrard, X. Bresson, and P. Vandergheynst, “Convolutional neu- [128] H. Cheng, P.-N. Tan, C. Potter, and S. Klooster, “Detection
ral networks on graphs with fast localized spectral filtering,” in Proc. and characterization of anomalies in multivariate time series,”
Neural Inf. Process. Syst. (NIPS), 2016, pp. 3844–3852. in Proc. SDM, 2009, pp. 413–424. [Online]. Available:
[108] D. Wang, K. Zheng, Q. Chen, G. Luo, and X. Zhang, “Probabilistic https://epubs.siam.org/doi/abs/10.1137/1.9781611972795.36
power flow solution with graph convolutional network,” in Proc. [129] J. Jiang et al., “Anomaly detection with graph convolutional networks
IEEE PES Innov. Smart Grid Technol. Europe (ISGT-Europe), 2020, for insider threat and fraud detection,” in Proc. IEEE Mil. Commun.
pp. 650–654. Conf. (MILCOM), 2019, pp. 109–114.
[109] J. Huang, L. Guan, Y. Su, H. Yao, M. Guo, and Z. Zhong, [130] J. Zhou, Z. Xu, A. M. Rush, and M. Yu. (2020). Automating
“Recurrent graph convolutional network-based multi-task transient sta- Botnet Detection With Graph Neural Networks. [Online]. Available:
bility assessment framework in power system,” IEEE Access, vol. 8, https://arxiv.org/abs/2003.06344.
pp. 93283–93296, 2020. [131] A. Protogerou, S. Papadopoulos, A. Drosou, D. Tzovaras, and
[110] E. Li. (2019). Dissolved Gas Data in Transformer Oil—Fault Diagnosis I. Refanidis, “A graph neural network method for distributed anomaly
of Power Transformers With Membership Degree. [Online]. Available: detection in IoT,” Evol. Syst., vol. 12, no. 1, pp. 19–36, 2021. [Online].
https://ieee-dataport.org/documents/dissolved-gas-data-transformer-oil- Available: https://doi.org/10.1007/s12530-020-09347-0
fault-diagnosis-power-transformers-membership-degree [132] X. Cheng, Y. Wu, G. Min, and A. Y. Zomaya, “Network function
[111] Y. Benmahamed, M. Teguar, and A. Boubakeur, “Application of SVM virtualization in dynamic networks: A stochastic perspective,” IEEE J.
and KNN to Duval Pentagon 1 for transformer oil diagnosis,” IEEE Sel. Areas Commun., vol. 36, no. 10, pp. 2218–2232, Oct. 2018.
Trans. Dielectr. Electr. Insul., vol. 24, no. 6, pp. 3443–3451, Dec. 2017. [133] W. Miao et al., “Stochastic performance analysis of network function
virtualization in future Internet,” IEEE J. Sel. Areas Commun., vol. 37,
[112] G. Dileep, “A survey on smart grid technologies and appli-
no. 3, pp. 613–626, Mar. 2019.
cations,” Renew. Energy, vol. 146, pp. 2589–2625, Feb. 2020.
[134] B. Yin, H. Yin, Y. Wu, and Z. Jiang, “FDC: A secure federated deep
[Online]. Available: https://www.sciencedirect.com/science/article/pii/
learning mechanism for data collaborations in the Internet of Things,”
S0960148119312790
IEEE Internet Things J., vol. 7, no. 7, pp. 6348–6359, Jul. 2020.
[113] A. A. Korba, N. Tamani, Y. Ghamri-Doudane, and N. E. I. Karabadji,
[135] Y. Wu, H. N. Dai, H. Wang, and K. K. R. Choo, “Blockchain-based pri-
“Anomaly-based framework for detecting power overloading cyber-
vacy preservation for 5G-enabled drone communications,” IEEE Netw.,
attacks in smart grid AMI,” Comput. Security, vol. 96, Sep. 2020,
vol. 35, no. 1, pp. 50–56, Jan./Feb. 2021.
Art. no. 101896. [Online]. Available: https://www.sciencedirect.com/
[136] H. Huang, Ed., Blockchains for Network Security: Principles,
science/article/pii/S0167404820301693
Technologies and Applications. London, U.K.: Inst.
[114] Z. Zheng, Y. Yang, X. Niu, H. Dai, and Y. Zhou, “Wide and deep Eng. Technol., 2020. [Online]. Available: https://digital-
convolutional neural networks for electricity-theft detection to secure library.theiet.org/content/books/pc/pbpc029e
smart grids,” IEEE Trans. Ind. Informat., vol. 14, no. 4, pp. 1606–1615, [137] Y. Ma, Y. Wu, and J. Ge, Accountability and Privacy in Network
Apr. 2018. Security. Heidelberg, Germany: Springer, 2020.
[115] G. Dudgeon. (2021). IEEE 123 Node Test Feeder in Simscape [138] F. Lopez et al., “Categorization of anomalies in smart manufacturing
Power Systems. [Online]. Available: https://www.mathworks. systems to support the selection of detection mechanisms,” IEEE Robot.
com/matlabcentral/fileexchange/66599-ieee-123-node-test-feeder- Autom. Lett., vol. 2, no. 4, pp. 1885–1892, Oct. 2017.
in-simscape-power-systems [139] V. Sharma, G. Choudhary, Y. Ko, and I. You, “Behavior and vulnerabil-
[116] M. Cupelli, C. D. Cardet, and A. Monti, “Voltage stability indices ity assessment of drones-enabled Industrial Internet of Things (IIoT),”
comparison on the IEEE-39 bus system using RTDS,” in Proc. IEEE IEEE Access, vol. 6, pp. 43368–43383, 2018.
Int. Conf. Power Syst. Technol. (POWERCON), 2012, pp. 1–6. [140] J. Zhao, X. Jing, Z. Yan, and W. Pedrycz, “Network traf-
[117] M. Khodayar, G. Liu, J. Wang, and M. E. Khodayar, “Deep learning fic classification for data fusion: A survey,” Inf. Fusion,
in power systems research: A review,” CSEE J. Power Energy Syst., vol. 72, pp. 22–47, Aug. 2021. [Online]. Available:
vol. 7, no. 2, pp. 209–220, 2021. https://www.sciencedirect.com/science/article/pii/S156625352100018X
[118] H. Karimipour and H. Leung, “Relaxation-based anomaly detection in [141] A. A. Cook, G. Mısırlı, and Z. Fan, “Anomaly detection for IoT
cyber-physical systems using ensemble Kalman filter,” IET Cyber Phys. time-series data: A survey,” IEEE Internet Things J., vol. 7, no. 7,
Syst. Theory Appl., vol. 5, pp. 49–58, Mar. 2020. pp. 6481–6494, Jul. 2020.
[119] H. M. Rouzbahani, H. Karimipour, A. Rahimnejad, A. Dehghantanha, [142] K. Zope, K. Singh, S. Nistala, A. Basak, P. Rathore, and V. Runkana,
and G. Srivastava, Anomaly Detection in Cyber-Physical Systems “Anomaly detection and diagnosis in manufacturing systems: A com-
Using Machine Learning. Cham, Switzerland: Springer Int., 2020, parative study of statistical, machine learning and deep learning
pp. 219–235. techniques,” in Proc. Annu. Conf. PHM Soc., vol. 11, Sep. 2019.
[120] A. K. Singh et al., “Report on the 68-bus, 16-machine, 5- [143] R. Pinto. (2020). M2M Using OPC UA. [Online]. Available:
area system,” IEEE PES Task Force, University of Lincoln, https://ieee-dataport.org/open-access/m2m-using-opc-ua
Lincoln, U.K., Rep. 28771, 2013. [Online]. Available: [144] S. Dou, K. Yang, and H. V. Poor, “PC2A: Predicting collective contex-
https://eprints.lincoln.ac.uk/id/eprint/28771/ tual anomalies via LSTM with deep generative model,” IEEE Internet
[121] A. Barua, D. Muthirayan, P. P. Khargonekar, and M. A. Al Faruque, Things J., vol. 6, no. 6, pp. 9645–9655, Dec. 2019.
“Hierarchical temporal memory based machine learning for real-
time, unsupervised anomaly detection in smart grid: WiP abstract,” Yulei Wu (Senior Member, IEEE) received the B.Sc. degree (First Class
in Proc. ACM/IEEE 11th Int. Conf. Cyber Phys. Syst. (ICCPS), 2020, Hons.) in computer science and the Ph.D. degree in computing and mathe-
pp. 188–189. matics from the University of Bradford, Bradford, U.K., in 2006 and 2010,
[122] H. Yuan, H. Yu, S. Gui, and S. Ji. (2020). Explainability in respectively.
Graph Neural Networks: A Taxonomic Survey. [Online]. Available: He is a Senior Lecturer with the Department of Computer Science,
https://arxiv.org/abs/2012.15445. College of Engineering, Mathematics and Physical Sciences, University of
[123] X. Wang, B. Jin, Y. Du, P. Cui, and Y. Yang, “One-class graph neu- Exeter, Exeter, U.K. His expertise is on intelligent networking, and his main
ral networks for anomaly detection in attributed networks,” Neural research interests include computer networks, networked systems, software-
Comput. Appl., to be published. defined networks and systems, network management, and network security
[124] A. Deng and B. Hooi, “Graph neural network-based anomaly detection and privacy.
in multivariate time series,” in Proc. AAAI, 2021, pp. 4027–4035. Dr. Wu is an Associate Editor of IEEE T RANSACTIONS ON N ETWORK
[125] H. Zhao et al., “Multivariate time-series anomaly detection via AND S ERVICE M ANAGEMENT , IEEE T RANSACTIONS ON N ETWORK
graph attention network,” in Proc. 20th IEEE Int. Conf. Data Min. S CIENCE AND E NGINEERING, and IEEE ACCESS, and an Area Editor of
(ICDM), Sorrento, Italy, Nov. 2020, pp. 841–850. [Online]. Available: Computer Networks (Elsevier). He is a Senior Member of the ACM and a
https://doi.org/10.1109/ICDM50108.2020.00093 fellow of the Higher Education Academy.
Authorized licensed use limited to: Northern Illinois University. Downloaded on April 07,2025 at 05:56:22 UTC from IEEE Xplore. Restrictions apply.
WU et al.: GRAPH NEURAL NETWORKS FOR ANOMALY DETECTION IN INDUSTRIAL INTERNET OF THINGS 9231
Hong-Ning Dai (Senior Member, IEEE) received the Ph.D. degree in com- Haina Tang received the Ph.D. degree in computer software and theory from
puter science and engineering from the Department of Computer Science and the School of Information Science and Technology, Sun Yat-sen University,
Engineering, Chinese University of Hong Kong, Hong Kong, in 2008. Guangzhou, China, in 2012.
He is currently with the Faculty of Information Technology, Macau She is an Associate Professor with the School of Artificial Intelligence,
University of Science and Technology, Macau, China, as an Associate University of Chinese Academy of Sciences, Beijing, China. Her current
Professor. His current research interests include Internet of Things, big data, research interests include network measurement, spatiotemporal data mining,
and blockchain technology. social network analysis, and graph mining.
Dr. Dai has served as an Associate Editor/Editor for IEEE T RANSACTIONS
ON I NDUSTRIAL I NFORMATICS , IEEE S YSTEMS J OURNAL , IEEE ACCESS ,
Ad Hoc Networks, and Connection Science. He is also a Senior Member of
Association for Computing Machinery.
Authorized licensed use limited to: Northern Illinois University. Downloaded on April 07,2025 at 05:56:22 UTC from IEEE Xplore. Restrictions apply.