Anomaly Detection in Industrial Machinery Using IoT Devices and Machine Learning A Systematic Mapping
Anomaly Detection in Industrial Machinery Using IoT Devices and Machine Learning A Systematic Mapping
a
SENAI Institute of Innovation for Information and Communication Technologies
(ISI-TICs), Recife, Brazil
b
Department of Computing at the Federal Rural University of Pernambuco (UFRPE),
Recife, Brazil
Abstract
Anomaly detection is critical in the smart industry for preventing equip-
ment failure, reducing downtime, and improving safety. Internet of Things
(IoT) has enabled the collection of large volumes of data from industrial
machinery, providing a rich source of information for Anomaly Detection.
However, the volume and complexity of data generated by the Internet of
Things ecosystems make it difficult for humans to detect anomalies man-
ually. Machine learning (ML) algorithms can automate anomaly detection
in industrial machinery by analyzing generated data. Besides, each tech-
nique has specific strengths and weaknesses based on the data nature and its
corresponding systems. However, the current systematic mapping studies on
Anomaly Detection primarily focus on addressing network and cybersecurity-
related problems, with limited attention given to the industrial sector. Ad-
ditionally, these studies do not cover the challenges involved in using ML for
Anomaly Detection in industrial machinery within the context of the IoT
∗
Corresponding author
Email addresses: [email protected] (Sérgio F.
Chevtchenko), [email protected] (Elisson da Silva Rocha),
[email protected] (Monalisa Cristina Moura Dos Santos),
[email protected] (Ricardo Lins Mota),
[email protected] (Diego Moura Vieira),
[email protected] (Ermeson Carneiro de Andrade),
[email protected] (Danilo Ricardo Barbosa de Araújo)
1. Introduction
In recent years, many tasks previously performed by humans have been
automated through smart technologies. In the Smart Industry or Indus-
try 4.0, for example, these technologies have made it possible to monitor
production lines and detect potential problems before they become serious,
leading to fewer delays and increasing productivity [1, 2]. These industries
are constantly present in our daily lives and disruptions can negatively af-
fect productivity and cause economical losses. Generally, these disruptions
come from various types of unexpected and non-standard behaviors that
can occur in these environments, known as anomalies [3]. In industrial ma-
chinery, anomalies can occur due to equipment malfunctions, environmental
conditions, and changes in operating conditions. Therefore, detecting these
anomalies as early as possible is essential to prevent equipment failure, reduce
downtime, and minimize repair costs [3].
IoT ecosystems have enabled the collection of large volumes of data from
industrial machinery, providing a rich source of information for Anomaly De-
tection (AD) [4]. These ecosystems are composed of sensors and monitoring
systems that can collect data such as temperature, pressure, vibration, and
power consumption. This data enables engineers and specialists to monitor
the health of industrial machinery in real-time and take immediate action to
diagnose and address the underlying problem before it causes a significant
disruption to the production process. However, the volume and complexity
of data generated by IoT ecosystems make it difficult to detect anomalies
manually, increasing the number of corrective and preventive maintenance.
ML algorithms can help automate the process of AD by analyzing the data
2
generated by these environments [5]. Despite the fact that there are several
ML techniques used for AD, each technique has its strengths and weaknesses
and can be used depending on the nature of the data and the specifics of the
industrial contexts.
Most of the current systematic mapping study on AD is in Network
Anomaly Detection (NAD), considering the cybersecurity context [6, 7, 8].
They are widely used for fraud detection, network security breaches, and
environmental monitoring. Very few of them have focused on AD in the in-
dustry [9, 10]. In [9], the authors applied a systematic literature review to
identify frameworks, architectures, and tools in the area of predictive main-
tenance. Similarly, Zonta et al. [10] present a survey, discussing the current
challenges and limitations in predictive maintenance and proposing a new
taxonomy to classify this research area considering Industry 4.0. However,
to the best of our knowledge, no related work presents and discusses the
challenges in using ML for the detection of anomalies in industrial machines
using IoT.
Considering these issues and challenges described above, and the grow-
ing acknowledgment of the necessity for AD solutions, a systematic mapping
study on the AD topic is highly necessary. This paper presents a systematic
mapping of AD for industrial machinery using IoT devices and ML algo-
rithms conducted between October 2022 and January 2023. In this study,
84 papers dating from 2016 to 2023 are evaluated. This systematic mapping
aims to provide a comprehensive review of AD research, including an anal-
ysis of current methodologies, a synthesis of evidence, an identification of
applications, a discussion of research issues, and an identification of future
challenges.
This mapping study provides insights into key aspects of AD research in
the context of industrial machinery, addressing the following questions: (i)
What type of machinery is most commonly monitored and why? (ii) What
are the types of sensors and variables employed for detecting anomalies?
(iii) What are the types of machine learning techniques used for anomaly
detection in industrial machinery? (iv) How is the anomaly detection method
computed and evaluated? In this way, this work can help to direct future
efforts regarding AD solutions, as well as promote a discussion about AD
studies, their implications, and challenges for the future.
The remainder of the paper is organized as follows. Section 2 presents
existing reviews regarding the AD field. Section 3 introduces the protocol
used to conduct the research. Section 4 presents the findings for the estab-
3
lished research questions. Section 5 presents the open challenges. Section 6
presents the limitation of this mapping study. Finally, Section 7 presents the
conclusions, the limitations, and the future work for this study.
2. Related Work
In recent years, there has been considerable interest in AD for industrial
machinery using IoT devices and ML. However, the majority of studies have
primarily focused on network anomaly detection. To position our paper and
emphasize its contributions, we start by presenting a concise introduction
to mapping studies that concentrate on network anomaly detection. Subse-
quently, we provide a summary of previous research on surveys conducted on
AD and predictive maintenance in the industry, employing ML techniques.
Finally, we present a comparative analysis of our work in relation to these
studies, considering factors such as scope and evaluation methods.
There is a significant body of literature comprising systematic mapping
studies that specifically concentrate on NAD [11, 12].Ahmed et al. [6] explore
various NAD techniques and elaborate on the use of different categories of
detection methods as solutions for this problem. The authors also discuss
the limitations of using publicly available intrusion detection datasets and
provide a comparison of the effectiveness of presented AD techniques based
on specific criteria. In more recent work, Eltanbouly et al. [7] examine ML
algorithms applied to NAD and analyze the performance of the surveyed
papers. The study provides an overview of their main positive and negative
characteristics, along with numerical analyses of algorithms learned on the
same datasets. Wang et al. [8] discuss different types of ML approaches in
the context of AD, comparing their merits within the scope of NAD. The
authors also address the key challenges faced in detecting various anomalies
in networks with varying complexities. Additionally, they present use cases
for different types of networks, considering IoT networks, though with limited
scope.
Very few mapping studies have focused on AD and predictive maintenance
in the industry. Gaddam et al. [13] investigate AD techniques to identify
sensor faults and outliers in the IoT context, without specific emphasis on
industrial equipment. Their survey comprehensively describes the primary
sources of sensor outliers within the IoT environment and discusses detection
models that are suitable for IoT systems. The authors further provide a com-
parative analysis of these techniques, highlighting their respective strengths
4
and weaknesses. With a focus on Industry 4.0, Kamat and Sugandhi [14]
provide a discussion about the main challenges associated with traditional
equipment maintenance strategies in the manufacturing industry. As a way
to address this problem, the study suggests the adoption of AD in predic-
tive maintenance as a more suitable approach for handling the specific data
characteristics present in this environment. Additionally, the paper briefly
explores alternative approaches to AD found in the literature and discusses
publicly available datasets relevant to the manufacturing scenario.
Dalzochio et al. [9] present important considerations regarding the ap-
plication of predictive maintenance, such as the abundance of data, the crit-
icality of the equipment, the need for redundancy and the availability of
failure-related data for modeling purposes. The researchers address several
key research questions, including the challenges associated with applying ML
to predictive maintenance, commonly employed ML techniques in this con-
text, and the utilization of ontologies in predictive maintenance scenarios. In
terms of ML techniques, the analyzed works were grouped into three main
categories: (i) based on artificial neural networks (ANN); (ii) based on deep
learning (DL); and (iii) based on other ML approaches, such as k-nearest
neighbors (kNN), support vector machines (SVM), and random forest (RF).
The authors suggest that different ML models are better suited for AD/fault
classification and prognostics. While classification or clustering ML models
can address AD and fault classification, regression models such as autoregres-
sive integrated moving averages (ARIMA) are better suited for prognostics
tasks. Furthermore, the paper provides a concise exploration of the use of
ontologies in predictive maintenance, aiming to facilitate decision-making
processes.
Zonta et al. [10] present a systematic literature review that explores ini-
tiatives related to predictive maintenance in the context of Industry 4.0. The
authors analyze 47 articles and, as the main contribution, propose a taxon-
omy for predictive maintenance in the context of Industry 4.0. Schwende-
mann et al. [15] conduct a survey that specifically explores ML techniques
for predictive maintenance of bearings in grinding machines. The selected
works encompass a range of approaches, including ANNs, Hidden Markov
Models (HMMs), and SVMs.
Kang et al. [16] conduct a systematic literature review that specifically
examines the applications of ML in production lines and their components.
Their analysis included 39 primary studies that predominantly concentrated
on quality control within the production lines. The most frequently utilized
5
dependent variables in the ML methods were identified as Fail/Pass indica-
tors, physical properties of materials, and object dimensions.
With a focus on the railway industry, Davari et al. [17] present a survey
on data-driven predictive maintenance. Within this context, they emphasize
real-time AD from time-series data and the need for automatic reasoning
capabilities to explain causality as major challenges faced by the industry.
Nor et al. [18] present an analysis with a specific focus on explainable artificial
intelligence (XAI) applied to prognostics and health management (PHM)
of industrial assets. The authors adopt the preferred reporting items for
systematic reviews and meta-analyses (PRISMA) methodology in their study.
They analyzed a total of 35 selected works, with 13% of them incorporating
an AD approach. It is worth highlighting that the analyzed studies primarily
feature case studies based on real industrial data. This demonstrates the
practical application of AI models in industrial settings and contributes to
an increasing level of confidence in adopting such models within the industry.
The present work distinguishes itself from the related literature above for
the following reasons. Firstly, AD-based predictive maintenance is recognized
as a promising area in several of the related literature reviews with broader
scopes. Thus, the present work offers a state-of-the-art review with a focused
approach on the use of ML techniques for detecting anomalies in industrial
machinery. Secondly, unlike previous studies, we do not limit our analysis
to specific industrial machinery, aiming to provide a more comprehensive
perspective on existing industrial practices. As a result, our work seeks to
offer an up-to-date review of the state-of-the-art, emphasizing the application
of machine learning methods for AD in the industry. Finally, the present work
incorporates the most recent findings from the literature, ensuring that our
review is current and reflective of the latest advancements in the field.
6
Figure 1: Steps of the adopted protocol.
• RQ2: What are the types of sensors and variables employed for detect-
ing anomalies?
• RQ3: What are the types of machine learning techniques used for
7
anomaly detection in industrial machinery?
• RQ4: How is the anomaly detection method computed and evaluated?
Step 3. To compile primary research, we employed automatic database
searches utilizing a search string. The following procedures were undertaken
to elaborate the search phrase for the automatic search [20, 21]: (i) extract
phrases from the study questions; (ii) find alternate spellings and synonyms;
(iii) validate the keywords; and IV. combine search strings using Boolean
operators (OR, AND). The search string was (("Anomaly Detection" OR
"Anomalous Behavior") AND ("IoT" OR "Internet of Things" OR "Sen-
sors") AND ("Machine Learning" OR "Deep Learning" OR "Artificial Intel-
ligence")).
Step 4. The following digital libraries were considered as the primary
sources for our research: IEEE Xplore1 , ACM Digital Library2 , Science Di-
rect3 and Web of Science4 .
Step 5. As numerous papers unrelated to our research topics may be
found, we have established specific inclusion and exclusion criteria. These
criteria are intended to narrow down our search and ensure that the identified
literature is relevant to our assessment research. For the inclusion criteria, we
focused on papers published within the last ten years that explicitly address
the AD using ML and IoT sensors in their abstracts. We excluded, on the
other hand, duplicate, unavailable, or foreign-language articles, as well as
editorials, posters, tutorials, and secondary or tertiary articles.
Step 6. After applying the inclusion and exclusion criteria and utilizing
the search string in the digital libraries, we successfully located the primary
studies.
Step 7. We extracted pertinent information from the primary studies
by thoroughly reading the entire paper and answering the RQs.
Step 8. To classify and organize the articles in accordance with our
research questions stated in Step 2, an overview of all articles is provided in
this stage (see Subsection 4.1).
Step 9. Finally, in Section 4, we present the responses we found to
the RQs posed in Step 2, which details the current state of the literature
1
IEEExplore.ieee.org/Xplore/home.jsp
2
https://dl.acm.org
3
https://www.sciencedirect.com/
4
https://www.webofscience.com
8
regarding the utilization of ML and sensors to identify anomalies in industrial
machinery.
Table 1: Search results obtained before and after applying the inclusion and exclusion
criteria.
Among the databases searched Science Direct yielded the highest number
of selected works, with 40 articles. This was followed by Web of Science with
27, IEEE Xplore with 11, and finally ACM DL with only 6 articles. In terms
of the proportion between the number of selected articles and the original
9
search, Web of Science achieved the best result with approximately 2.16%
(27/1249) of the selected base, followed by IEEE Xplore with 1.12% (11/979).
Based on the selected articles, Figure 2 presents the number of primary
studies in relation to the year of publication. Although our search aimed to
include articles from 2012 onwards, the first selected study was from 2016.
Notably, no articles were selected for 2017 and 2018. However, we observed
a growing trend in the literature regarding the detection of anomalies in
industrial machinery using sensors and ML from 2019 onwards. In 2019, 9
studies were selected, increasing to 21 in 2020, 28 in 2021, and reaching 39
in 2022. It is worth mentioning that even though our search was conducted
up until November 2022, some studies have already been published in 2023,
indicating that research in this area is ongoing.
10
opment of research studies over time may have contributed to the increase
in journal publications.
11
occurrences in each group, we ranked the groups to observe the types of
machinery most monitored in the primary studies.
12
out due to intensive usage, they can directly impact the quality of manufac-
tured products and even cause damage to the machinery itself. In some cases,
routine maintenance involves replacing these worn-out parts, even when it
might still be possible to continue using them [22].
Hydraulic systems consist of several components, such as accumulators,
coolers, valves, pumps, compressors, and more. Depending on the applica-
tion, these systems can operate either as standalone units or as part of larger
systems. For example, in aviation, hydraulic systems play a crucial role in
controlling mechanical parts of aircraft, while in other applications, they may
be integrated into cooling systems [30]. It is important to note that some hy-
draulic systems operate under high pressure and deal with toxic or flammable
fluids, emphasizing the criticality of proper maintenance for safety. Tradi-
tionally, manual monitoring of these hydraulic systems has been employed,
relying on the extensive knowledge and judgment of operators. However,
this approach can be subjective and may lead to inefficiencies. Therefore,
researchers advocate for the adoption of automatic monitoring techniques
using IA models to detect anomalies in hydraulic systems [31, 32, 33, 34].
Bearings are the third most monitored component in industrial machinery.
Due to their critical role in supporting rotating parts and reducing friction,
monitoring the condition of bearings is of utmost importance to ensure the
smooth operation and longevity of various machines and equipment [35, 36].
For instance, a recurrent issue arises when wind turbines operate at low
speeds, subjecting the bearings to significant stress due to the considerable
weight of the turbine’s components [37]. Predicting abnormal behavior in
bearing wear is essential in such scenarios. Furthermore, in this mapping
study, several other machinery were identified, including electric motors and
industrial robots. However, milling and cutting tools, hydraulic systems, and
bearings were found to be prevalent.
Given their extensive use in almost all industrial environments, it is im-
perative for these machines to operate smoothly and consistently even un-
der demanding conditions for extended periods. Consequently, predicting
anomalous behavior in industrial machinery is essential to avoid negative
impacts on productivity, as it allows for the early detection of potential
faults and the implementation of preventive maintenance measures. It is
worth highlighting that many of the analyzed studies do not focus on evalu-
ating specific machinery but rather on exploring new ML and DL approaches
using datasets containing data related to various machinery types. Nonethe-
less, they contribute to the overall understanding of AD techniques and their
13
applicability in the context of industrial machinery.
4.3. What are the types of sensors and variables employed for detecting anoma-
lies?
The majority of the primary studies focused on AD modeling and, as a
result, lacked detailed technical information on the types of sensors used for
machinery monitoring. This focus on AD over the whole system monitor-
ing pipeline, which includes data acquisition, processing, and information
delivery, limits the depth of our analysis. Moreover, many studies vali-
dated the proposed methodologies using well-established datasets, such as
C-MAPSS5 [38] and the NASA Ames Prognostic Data Repository6 [24, 39,
40, 22]. While these datasets serve as benchmarks for experimental purposes,
it is important to test these methodologies in real-world industrial settings
for practical applications. Despite these limitations, the majority of the stud-
ies did reveal the variables used for detecting AD. We have categorized these
variables based on the type of sensor used, such as vibration, electric cur-
rent, temperature, noise, pressure, among others. Table 2 lists the studies
that employed each sensor type, either individually or in combination with
each other.
5
https://data.nasa.gov/dataset/C-MAPSS-Aircraft-Engine-Simulator-Data/
xaut-bemq
6
https://www.nasa.gov/content/prognostics-center-of-excellence-data-set-repository
14
Table 2: Sensors used in selected works. (Continued)
Electric
Article Vibration Temperature Noise Pressure Others
current
[76, 77] ✓
[27, 40] ✓ ✓ ✓ ✓
[78, 26] ✓ ✓
[28, 22] ✓ ✓ ✓
[79, 80] ✓ ✓ ✓ ✓
[81, 82] ✓
[83, 84] ✓ ✓
[85, 86] ✓ ✓ ✓ ✓
[36] ✓ ✓ ✓
[37] ✓ ✓ ✓
[87] ✓ ✓ ✓ ✓ ✓
[88] ✓ ✓
[89] ✓ ✓
[90] ✓ ✓
[91] ✓ ✓
[92] ✓ ✓ ✓ ✓
[93] ✓ ✓
[94] ✓ ✓ ✓ ✓
[95] ✓ ✓ ✓ ✓
[24] ✓ ✓ ✓
15
electric current sensors [60, 61, 62, 63, 30], while two used only temperature
sensors [76, 77]. Finally, two papers solely relied on pressure sensors [81, 82].
This suggests that roughly 28.57% of the selected studies focus on a single
type of sensor.
While there are certain cases where a single sensor may be sufficient, there
are potential benefits in using multiple sensor types in the field of AD [103].
As an example, multiple sensors can be used to infer new information about
the physical system under observation. Through the combined analysis of
data from these varied sensors, one can extrapolate novel information not
directly observed. This technique is referred to as the “virtual sensors” in
the literature [104]. Nevertheless, many studies employed a combination of
sensors, with five works opting to use the vibration, electric current, tem-
perature and pressure sensors, along with an additional unclassified sensor
type [60, 61, 62, 63, 30]. In three studies vibration, electric current and
temperature sensors are combined [74, 75, 23].
As depicted in Figure 5, the distribution of sensor types across the pri-
mary studies reveals a clear preference for certain sensors. The most fre-
quently employed sensor was the vibration sensor, utilized in 40 studies.
Temperature sensors were the second most common, appearing in 30 stud-
ies, closely followed by electric current sensors, which were used in 29 studies.
Pressure sensors found application in 20 studies, while noise sensors were in-
corporated in 16 studies. A variety of other sensor types, accounting for
variables such as speed, torque, RPM, humidity, viscosity, and proximity,
were collectively used in 38 studies.
Despite noise sensors being the exclusive focus in seven studies as pre-
sented earlier, they were, in fact, the least frequently used when we consider
the overall usage of sensor types across all studies, with just 16 occurrences.
This suggests that a mix of sensor types is proffered to relying solely on noise
sensors or other single sensor type. It is worth mentioning that cameras,
while traditionally used for tasks like segmentation, edge detection, object
classification, recognition, and tracking, also serve as a viable sensor type
for AD. Yet, none of the primary studies in our review employed cameras
for this purpose. Nevertheless, the integration of general-purpose or special-
ized cameras in AD systems could provide valuable insights and broaden the
scope of detectable anomalies. For instance, the use of event-based cameras
for vibration analysis is a promising application, as they provide superior
spatio-temporal resolution in comparison to traditional sensors [105].
16
Figure 5: Number of primary studies by sensors type.
4.4. What are the types of Machine Learning techniques used for anomaly
detection in industrial machinery?
There are two critical stages in the development of an effective AD tech-
nique for industrial machinery: data preprocessing and the application of AI
algorithms. Both stages are equally important and play fundamental roles in
the ability to accurately and timely detect anomalies. In the following sub-
sections, we provide a detailed description of the preprocessing techniques
and algorithms used in the selected primary studies for AD in industrial
machinery.
17
some preprocessing technique applied to the data used in the research. The
techniques involved in preprocessing could range from feature selection to
dimensionality reduction, and data transformations aimed at enhancing the
quality of the input data. This reinforces the critical role of preprocessing
in AD for industrial machinery, as the use of appropriate techniques can
significantly improve the efficiency and accuracy of the detection process.
Figure 6 illustrates the most frequently employed preprocessing tech-
niques in the selected primary studies. The most commonly adopted data
preprocessing technique was the Autoencoder, which is a powerful technique
for dimensionality reduction [107]. Autoencoders use neural networks to
learn a compressed representation of the input data. This technique can be
especially useful for nonlinear and high-dimensional data, where traditional
methods such as Principal Component Analysis (PCA) may not be as effec-
tive [108]. Other techniques were categorized together because they served
a similar purpose. For instance, statistical methods such as mean, median,
standard deviation, and variance were used to measure the central tendency
and variability of the data and were grouped together. This group is referred
as “Statistical” and is ranked as the second most commonly utilized tech-
nique for preprocessing. These statistical methods enable researchers to gain
insights into the distribution of data, identify outliers, and detect trends or
patterns [109].
Fast Fourier Transform (FFT), another frequently used technique, and
Short-Time Fourier Transform (STFT) both operate in the frequency do-
main, enabling the time-based analysis of signals. However, FFT is bet-
ter suited for stationary signals, while STFT is more appropriate for non-
stationary signals [110]. Among the identified techniques, FFT was the most
widely used, appearing in 13 studies, while STFT was used in 4 studies. An-
other highly adopted technique for data preprocessing was PCA (Principal
Component Analysis). It identifies the most important variables in a dataset
and reduces the number of dimensions while preserving the most significant
information. By transforming the data into a new coordinate system that
maximizes the variance of the data, PCA helps to eliminate redundant or
noisy features that may hinder the analysis [111]. Normalization is another
widely adopted preprocessing technique that is commonly found in primary
studies. Its importance lies in transforming data into a standardized scale,
allowing for the easy comparison and analysis of data from diverse sources.
Additionally, it helps mitigate any inherent bias in the data that may arise
due to differences in units of measurement or data collection procedures [112].
18
Figure 6: Number of primary studies by preprocessing techniques.
From the selected primary studies, it was found that PCA was utilized in 10
studies, and normalization was employed in an equal number of studies.
Another preprocessing technique that was moderately used in the primary
studies was Convolutional Neural Network (CNN). It is a deep learning (DL)
architecture that has achieved remarkable success in image and signal pro-
cessing tasks, thanks to its ability to learn hierarchical representations of the
input data. Besides its primary application in image and signal processing,
CNN can also be used for feature extraction in various applications [113].
The popularity of these techniques highlights their importance in data
preprocessing and analysis, as they enable researchers to reduce the dimen-
sionality of complex data and extract relevant features that can improve the
accuracy and efficiency of subsequent analysis.
While less commonly used, several other preprocessing techniques were
also found in the selected studies. These include bandpass and low-pass
filters [65, 47, 49, 29, 56], wavelet transformations [24, 53, 49], sliding win-
dow techniques [99, 114], and others. However, it is worth mentioning that
the selection of the most appropriate preprocessing techniques depends on
19
the nature and specificity of the data being analyzed, and researchers must
consider the advantages and limitations of each technique before making a
decision.
Additionally, some studies combined preprocessing techniques to try to
improve AD. For instance, a notable example is the utilization of autoen-
coders in conjunction with other preprocessing methods. Among the studies
that employed autoencoders, five studies used normalization or statistics in
conjunction with autoencoder, while four studies combined FFT or PCA with
autoencoder, as shown in Figure 7. These results suggest that using multi-
ple preprocessing techniques together can be an effective way to enhance AD
accuracy.
4.4.2. Algorithms
Various ML-based algorithms have been employed to detect anomalies in
industrial machinery. Figure 8 presents these algorithms grouped into differ-
ent levels of categorization. Vertical categories indicate further subdivisions,
while horizontal categories represent the final categorization. The initial
grouping divides the algorithms into three categories: Supervised, Unsuper-
vised, and Heuristics. Supervised models were divided into two categories:
Classification and Regression. Classification models were subdivided into
several types: tree-based models, ensemble models, SVM, neural networks,
distance-based models, time-series models, and others. Regression models,
in turn, were the final categorization. The unsupervised models, on the other
hand, were divided into three final categories: outlier detection, clustering,
and density estimation. Another separate final grouping was the Heuristic.
20
Figure 8: Algorithms categorization.
21
Figure 9 shows the number of primary studies that used each final al-
gorithm categorization. There are 12 final categorizations in total. This
includes seven groups for classification, one for regression, three for unsuper-
vised learning, and one for heuristic. It is important to note that a single
study might use more than one technique. The results of the studies demon-
strate the effectiveness of various algorithms and approaches for identifying
anomalies in industrial machinery. Heuristic-based approaches were the most
common, used in 28 studies. Neural network methods were also widely used,
found in 24 primary studies. Outlier detection was another common method
for finding anomalies in sensor data, used in 16 primary studies. On the other
hand, time-series-based and density estimate approaches were less frequently
used, with only 2 [76, 83] and 1 [61] primary studies, respectively.
22
Figure 10 illustrates the most frequently employed neural network tech-
niques in the primary studies related to ML-based AD. Multilayer percep-
tron (MLP) was the most widely used technique, with 11 primary studies,
which involves multiple layers of artificial neurons used to recognize patterns
in data. Long short-term memory (LSTM) was the second most popular
technique with five primary studies [99, 98, 64, 78, 82], which is a type of re-
current neural network (RNN) architecture designed to remember past data
over time. CNN was used in three primary studies [53, 52, 54], which is a
type of feed-forward neural network that was also employed in the prepro-
cessing step, as mentioned previously. One-class neural network (OCNN)
was employed in three primary studies [43, 39, 32], which is a neural network
architecture specifically designed for AD problems. Finally, Generative Ad-
versarial Networks (GANs) were employed in two primary studies [34, 115],
which is a type of neural network that involves two models trained simulta-
neously, where one model generates samples, and the other model evaluates
their authenticity [116]. The less frequent implementation of GANs, rela-
tive to other DL architectures, may not be a reflection of its applicability
for anomaly detection, but rather of its relative novelty in the field, which
suggest that this approach could be explored further.
23
The outlier detection category has also received significant attention in
the literature. Figure 11 shows the specific techniques employed in this cate-
gory. The most commonly used techniques among the primary studies were
One-class support vector machine (OCSVM) with 10 studies, followed by Iso-
lation Forest (Iforest) and Local Outlier Factor (LOF), with 6 studies each.
OCSVM is a well-known method for outlier detection that separates inliers
from outliers by identifying a boundary around the inliers [117]. Iforest is
a tree-based algorithm that isolates outliers by constructing separation trees
[118, 119]. LOF is a density-based method that measures the local devi-
ation of a data point with respect to its neighbors [119]. Although other
techniques such as Histogram-based Outlier Score (HBOS), Dynamic Time
Warping (DTW), and Angle-Based Outlier Detection (ADBOD) were also
adopted, their usage was relatively limited in comparison to the previously
mentioned approaches.
24
ods, the autoencoder technique was the most commonly utilized, with 16 in-
stances. Several studies have demonstrated the integration of this technique
with threshold-based rule-based AD, where the threshold is established based
on the autoencoder reconstruction error. Other techniques such as FFT, nor-
malization, and statistics were also widely used to assist in diagnosis using
thresholds. These findings demonstrate that the heuristics-based approach
for AD is promising, but requires careful consideration in selecting an appro-
priate preprocessing technique and defining the threshold for each specific
application.
Figure 12: Number of primary studies categorized by preprocessing techniques and filtered
by the heuristic approach.
25
Figure 13: Number of primary studies by metrics.
26
metric in 15 primary studies. Additionally, the TPR and FPR metrics, which
are foundational for calculating the ROC curve, were found in 10 and 8 stud-
ies, respectively. Consequently, it can be deduced that binary classification
is the most frequently performed and evaluated task within the context of
AD.
Other metrics employed in binary classification include Matthews Correla-
tion Coefficient (MCC), frequently used metric for unbalanced classes, which
combines true positive, true negative, false positive, and false negative rates
to evaluate overall model quality, used in 3 studies [93, 85, 115]; False alarm
rate, also known as FPR, which quantifies the proportion of negatives mis-
takenly classified as positives, also used in 3 studies [102, 24, 25]; and Kappa,
which measures the level of agreement between observers or classifiers in a
classification problem, present in 2 studies [93, 45].
In addition to classification-focused metrics, there are also metrics that
specifically target regression models. Mean Absolute Error (MAE), Mean
Absolute Percentage Error (MAPE), Root Mean Square Error (RMSE), Mean
Squared Error (MSE), and Coefficient of Determination (R2) are a few of
these. By quantifying the discrepancy between predicted values and actual
values, these metrics seek to assess the precision of numerical predictions and
offer information about how well the model fits the regression data. MAE,
MAPE, and RMSE were the most commonly employed regression metrics,
appearing in 3 studies each [74, 89, 61, 36, 69]. R2 and MSE were present in
2 studies [74, 53, 42].
Most regression-based models are commonly applied in solving Prognos-
tics and Health Management (PHM) problems, as demonstrated in the works
by [121, 122, 123]. These studies primarily focus on predicting the remaining
lifetime of systems using monitoring data as input. An alternative approach
to tackle this scenario is through the application of a time series approach,
as observed in the works by [124, 125]. However, this approach often em-
phasizes predicting the future state of systems rather than real-time state
identification. Within this context, the Health Indicator (HI) metric, as em-
ployed in Zhai et al. (2021) [28] and Guo et al. (2022) [27], aims to evaluate
the health status of monitored equipment.
Metrics concerning time performance, such as training time and predic-
tion time, were also identified in 5 [33, 46, 54, 66, 42] and 4 [33, 59, 54, 66]
studies, respectively. These metrics are not unique to any specific model
type but serve to assess the efficiency and duration of model training and
prediction generation. They offer valuable insights into the scalability and
27
practical feasibility of implementing the model, considering computational
resources and processing time. These metrics are crucial for optimizing re-
source allocation, determining model suitability for real-time applications,
and evaluating overall system performance in time-sensitive scenarios.
Finally, it is clear that there is a lack of research in the literature on the
assessment of inference time, i.e. the time the proposed approach takes to
process the data stream and classify it as normal or anomalous. Importantly,
only 4 of the 84 works in this mapping report the inference time of the pro-
posed model. This emphasizes the necessity for additional study to address
this issue and develop a thorough grasp of the computational needs and ap-
plicability of AD methods in real-time. By examining prediction time along-
side other performance metrics, we can improve decision-making processes
and identify models that strike a balance between accuracy and efficiency in
time-critical domains.
5. Open Challenges
While AD techniques for industry 4.0 are gaining attention in recent years,
several open challenges have been identified by this SM. This section high-
lights these challenges and provides insights into potential areas for future
research.
Anomaly detection on the edge: The rise of edge computing offers
promising potential for real-time AD, particularly for industrial internet of
things (IIoT) sensors. However, edge devices are constrained by limited re-
sources, such as processing power and memory, making complex anomaly
detection tasks challenging to execute on these devices. To address this chal-
lenge, there is a need to develop suitably optimized AD algorithms that can
navigate the trade-off between precision and computational resources. Mul-
tiobjective optimization algorithms can be used to finetune solutions under
simultaneous conflicting objectives, such as power consumption, accuracy
and inference speed [126]. Additionally, spiking neural networks and neuro-
morphic computing are emerging technologies that can be used for real-time
anomaly detection with significantly lower computational resources than tra-
ditional approaches [127].
Usage of low-cost and off-the-shelf sensors: The adoption of IIoT
devices with low-cost sensors could facilitate a wider implementation of pre-
dictive maintenance in the industry. However, a prominent challenge lies in
the quality and reliability of the data collected from these sensors. Low-cost
28
sensors may exhibit higher noise levels, lower accuracy, and reduced stabil-
ity over time compared to their more expensive counterparts. These factors
can significantly impact the performance of AD algorithms, resulting in a
higher rate of false positives. Consequently, AD algorithms would require
additional adjustments, such as implementing an automatic update routine
to compensate for the lower reliability and potential sensory drift over time.
Identification of the anomaly source: While AD techniques can in-
dicate the occurrence of an anomaly based on normal operation data alone,
fault diagnosis remains a challenging next step. Fault diagnosis is crucial for
understanding the root cause of the anomaly and taking appropriate actions.
With the emergence of XAI, there is an increasing demand for models that
not only detect anomalies but also provide interpretable information about
their likely causes. This explanation of the potential causes of the anomaly is
even more valuable in environments where downtime is critical, as it enables
operators to make faster decisions.
Lack of fault data: In industrial settings, it is often the case that there is
an abundance of non-anomalous data, representing healthy machinery, while
the amount of anomalous data is relatively small or even non-existent. This
represents a significant challenge when it comes to using supervised learn-
ing approaches, as these methods heavily rely on labeled anomalous data for
training and generalization of the models. Therefore, addressing this chal-
lenge becomes crucial. One possible solution to tackle the lack of anomalous
data is to leverage a combination of simulation and experimental data. By
utilizing simulated scenarios and conducting controlled experiments, it be-
comes possible to generate synthetic anomalous data. This synthetic data
can then be used for the initial validation and fine-tuning of the AD algorithm
in a more controlled and manageable environment.
Integration with existing infrastructure: One of the key challenges
in AD is the integration of AD systems with the pre-existing infrastructure in
industrial environments. Industrial systems often have well-established data
collection mechanisms and processes in place. Therefore, it is essential for
AD solutions to be compatible with these existing systems and seamlessly
integrate into the infrastructure without causing disruptions or requiring sig-
nificant changes. The integration aspect should be a primary consideration
in research studies, and future works should emphasize how their approaches
can effectively adapt to the already consolidated industrial environments, en-
suring smooth incorporation without major interruptions or modifications.
Retraining of ML models The retraining of ML models is a crucial
29
aspect that requires attention and careful discussion regarding its adaptabil-
ity to the evolution of industries, changes in the environment and new data
collected. Ensuring the continued effectiveness of ML models in detecting
anomalies depends on their ability to adapt to changes that occur over time
in industries. As industries undergo operational changes, these models need
to be capable of adjusting and learning from the new environment. Fur-
thermore, the inclusion of newly collected data and exposure to new failures
is essential to improve the generalizability of the models, enabling them to
identify anomalies with greater precision.
30
7. Conclusions and next steps
This SM focused on the topic of AD in industrial machinery using IoT de-
vices and ML algorithms. The study aimed to fill the gap in existing research
by providing a comprehensive review of current methodologies, synthesis of
evidence, areas of application, research questions and future challenges in
this domain. Through the analysis of 84 studies dating from 2016 to 2023,
several important findings emerged. First, it was observed that the types
of machinery most commonly monitored include milling and cutting tools,
hydraulic systems, and bearings. The analysis suggests that these types of
machinery are often subjected to conditions that can lead to anomalies, such
as wear and tear in milling and cutting tools, fluctuations in temperature
and pressure in hydraulic systems, and heat-related failures in bearings.
Second, a wide range of sensors were employed to detect anomalies. The
primary works often did not detail specific characteristics of the sensors, but
we were able to highlight the most used sensors, such as vibration and tem-
perature. A combination of these sensors is observed as a common strategy
to efficiently detect and monitor anomalies in machines. Third, several ML
techniques have been used for AD, including supervised, unsupervised and
heuristic methods. In addition to highlighting preprocessing techniques, we
were able to highlight the most used and also those that normally worked
together. Combination of these techniques, such as FFT and autoencoders,
are found to be effective to enhance AD accuracy.
The review also identified several open challenges in the field of AD.
These challenges include detecting anomalies at the edge using off-the-shelf,
low-cost sensors, identifying the source of anomalies, addressing the lack of
fault data, integrating AD into existing infrastructure, and retraining ML
models to adapt to evolving industrial environments. In summary, this SM
clarified the state of the art of AD in industrial machinery using IoT devices
and ML. It identified key research areas, highlighted current methodologies,
and outlined open challenges. By addressing these challenges, we aim to
contribute to the development of more accurate, efficient, and interpretable
AD systems, thereby enhancing industrial productivity, safety, and efficiency
in the era of smart manufacturing
For future work, our intention is to develop an anomaly detection solu-
tion based on low-cost and off-the-shelf components for rotating machinery.
Additionally, we aim to focus on developing anomaly detection on embedded
devices, with a priority on low power consumption and local processing of
31
most of the data. As our research progresses, we plan to make newly created
anomaly datasets publicly accessible, contributing to the broader research
community’s resources
Acknowledgment
The authors would like to thank the ’Brazilian Agency for Industrial
Development - ABDI’ for financial support.
32
[5] F. Huch, M. Golagha, A. Petrovska, A. Krauss, Machine learning-
based run-time anomaly detection in software systems: An industrial
evaluation, in: 2018 IEEE Workshop on Machine Learning Techniques
for Software Quality Evaluation (MaLTeSQuE), IEEE, pp. 13–18.
[6] M. Ahmed, A. N. Mahmood, J. Hu, A survey of network anomaly
detection techniques, Journal of Network and Computer Applications
60 (2016) 19–31.
[7] S. Eltanbouly, M. Bashendy, N. AlNaimi, Z. Chkirbene, A. Erbad, Ma-
chine learning techniques for network anomaly detection: A survey, in:
2020 IEEE International Conference on Informatics, IoT, and Enabling
Technologies (ICIoT), IEEE, pp. 156–162.
[8] S. Wang, J. F. Balarezo, S. Kandeepan, A. Al-Hourani, K. G. Chavez,
B. Rubinstein, Machine learning in network anomaly detection: A
survey, IEEE Access 9 (2021) 152379–152396.
[9] J. Dalzochio, R. Kunst, E. Pignaton, A. Binotto, S. Sanyal, J. Favilla,
J. Barbosa, Machine learning and reasoning for predictive maintenance
in industry 4.0: Current status and challenges, Computers in Industry
123 (2020) 103298.
[10] T. Zonta, C. A. Da Costa, R. da Rosa Righi, M. J. de Lima, E. S.
da Trindade, G. P. Li, Predictive maintenance in the industry 4.0: A
systematic literature review, Computers & Industrial Engineering 150
(2020) 106889.
[11] R. Kumar, A. Malik, V. Ranga, An intellectual intrusion detection
system using hybrid hunger games search and remora optimization al-
gorithm for iot wireless networks, Knowledge-Based Systems 256 (2022)
109762.
[12] L. Gupta, T. Salman, A. Ghubaish, D. Unal, A. K. Al-Ali, R. Jain,
Cybersecurity of multi-cloud healthcare systems: A hierarchical deep
learning approach, Applied Soft Computing 118 (2022) 108439.
[13] A. Gaddam, T. Wilkin, M. Angelova, Anomaly detection models for
detecting sensor faults and outliers in the iot-a survey, in: 2019 13th
International Conference on Sensing Technology (ICST), IEEE, pp. 1–
6.
33
[14] P. Kamat, R. Sugandhi, Anomaly detection for predictive maintenance
in industry 4.0-a survey, in: E3S web of conferences, volume 170, EDP
Sciences, p. 02007.
34
auditing, in: 2022 IEEE Aerospace Conference (AERO), IEEE, pp.
1–11.
[30] D. Kim, T.-Y. Heo, Anomaly detection with feature extraction based
on machine learning using hydraulic system iot sensor data, Sensors
22 (2022) 2479.
35
[33] E. Di Fiore, A. Ferraro, A. Galli, V. Moscato, G. Sperlì, An anoma-
lous sound detection methodology for predictive maintenance, Expert
Systems with Applications 209 (2022) 118324.
36
[42] A. Mostafavi, A. Sadighi, A novel online machine learning approach
for real-time condition monitoring of rotating machines, in: 2021 9th
RSI International Conference on Robotics and Mechatronics (ICRoM),
pp. 267–273.
[44] Y.-C. Yu, S.-W. Chuang, H.-H. Shuai, C.-Y. Lee, Fast adaption for
multi motor anomaly detection via meta learning and deep unsuper-
vised learning, in: 2022 IEEE 31st International Symposium on Indus-
trial Electronics (ISIE), pp. 1186–1189.
[47] S. Jian, S. Ishida, Y. Arakawa, Initial attempt on wi-fi csi based vi-
bration sensing for factory equipment fault detection, in: Adjunct
Proceedings of the 2021 International Conference on Distributed Com-
puting and Networking, pp. 163–168.
37
[51] A. L. Alfeo, M. G. Cimino, G. Manco, E. Ritacco, G. Vaglini, Using
an autoencoder in the design of an anomaly detector for smart manu-
facturing, Pattern Recognition Letters 136 (2020) 272–278.
38
[60] S. Panagou, F. Fruggiero, M. Lerra, C. del Vecchio, F. Menchetti,
L. Piedimonte, O. R. Natale, S. Passariello, Feature investigation with
digital twin for predictive maintenance following a machine learning
approach, IFAC-PapersOnLine 55 (2022) 132–137.
39
[68] W.-T. Yang, M. S. Reis, V. Borodin, M. Juge, A. Roussy, An inter-
pretable unsupervised bayesian network model for fault detection and
diagnosis, Control Engineering Practice 127 (2022) 105304.
[69] E.-S. Apostol, C.-O. Truică, F. Pop, C. Esposito, Change point en-
hanced anomaly detection for iot time series data, Water 13 (2021)
1633.
40
[77] X. Wang, J. Lin, N. Patel, M. Braun, A self-learning and online algo-
rithm for time series anomaly detection, with application in cpu man-
ufacturing, in: Proceedings of the 25th ACM International on Confer-
ence on Information and Knowledge Management, pp. 1823–1832.
41
in: Proceedings of the 39th International Conference on Computer-
Aided Design, pp. 1–9.
42
[95] H. Choi, D. Kim, J. Kim, J. Kim, P. Kang, Explainable anomaly detec-
tion framework for predictive maintenance in manufacturing systems,
Applied Soft Computing 125 (2022) 109147.
[99] D. Wu, Z. Jiang, X. Xie, X. Wei, W. Yu, R. Li, Lstm learning with
bayesian and gaussian processing for anomaly detection in industrial
iot, IEEE Transactions on Industrial Informatics 16 (2019) 5244–5253.
43
of Wireless, Mobile and Multimedia Networks (WoWMoM’06), IEEE,
pp. 6–pp.
44
[114] H. Zhou, K. Yu, X. Zhang, G. Wu, A. Yazidi, Contrastive autoencoder
for anomaly detection in multivariate time series, Information Sciences
610 (2022) 266–280.
[118] F. T. Liu, K. M. Ting, Z.-H. Zhou, Isolation forest, in: 2008 eighth
ieee international conference on data mining, IEEE, pp. 413–422.
[119] Z. Cheng, C. Zou, J. Dong, Outlier detection using isolation forest and
local outlier factor, in: Proceedings of the conference on research in
adaptive and convergent systems, pp. 161–168.
45
[124] S. Fu, S. Zhong, L. Lin, M. Zhao, A novel time-series memory auto-
encoder with sequentially updated reconstructions for remaining useful
life prediction, IEEE Transactions on Neural Networks and Learning
Systems 33 (2022) 7114–7125.
[125] C.-P. Lin, J. Cabrera, F. Yang, M.-H. Ling, K.-L. Tsui, S.-J. Bae,
Battery state of health modeling and remaining useful life prediction
through time series model, Applied Energy 275 (2020) 115338.
46