{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:08:15Z","timestamp":1760242095939,"version":"build-2065373602"},"reference-count":19,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2018,12,26]],"date-time":"2018-12-26T00:00:00Z","timestamp":1545782400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003329","name":"Ministerio de Econom\u00eda y Competitividad","doi-asserted-by":"publisher","award":["TEC2015-69417-C2-2-R"],"award-info":[{"award-number":["TEC2015-69417-C2-2-R"]}],"id":[{"id":"10.13039\/501100003329","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The Internet of Things (IoT) contains sets of hundreds of thousands of network-enabled devices communicating with central controlling nodes or information collectors. The correct behaviour of these devices can be monitored by inspecting the traffic that they create. This passive monitoring methodology allows the detection of device failures or security breaches. However, the creation of hundreds of thousands of traffic time series in real time is not achievable without highly optimised algorithms. We herein compare three algorithms for time-series extraction from traffic captured in real time. We demonstrate how a single-core central processing unit (CPU) can extract more than three bidirectional traffic time series for each one of more than 20,000 IoT devices in real time using the algorithm DStries with recursive search. This proposal also enables the fast reconfiguration of the analysis computer when new IoT devices are added to the network.<\/jats:p>","DOI":"10.3390\/s19010078","type":"journal-article","created":{"date-parts":[[2018,12,26]],"date-time":"2018-12-26T11:31:21Z","timestamp":1545823881000},"page":"78","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Computation of Traffic Time Series for Large Populations of IoT Devices"],"prefix":"10.3390","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2770-912X","authenticated-orcid":false,"given":"Mikel","family":"Izal","sequence":"first","affiliation":[{"name":"Electrical, Electronic and Communications Engineering Department, Universidad P\u00fablica de Navarra, 31006 Pamplona, Spain"},{"name":"Smart Cities Institute, Universidad P\u00fablica de Navarra, 31006 Pamplona, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0831-4042","authenticated-orcid":false,"given":"Daniel","family":"Morat\u00f3","sequence":"additional","affiliation":[{"name":"Electrical, Electronic and Communications Engineering Department, Universidad P\u00fablica de Navarra, 31006 Pamplona, Spain"},{"name":"Smart Cities Institute, Universidad P\u00fablica de Navarra, 31006 Pamplona, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6851-3414","authenticated-orcid":false,"given":"Eduardo","family":"Maga\u00f1a","sequence":"additional","affiliation":[{"name":"Electrical, Electronic and Communications Engineering Department, Universidad P\u00fablica de Navarra, 31006 Pamplona, Spain"},{"name":"Smart Cities Institute, Universidad P\u00fablica de Navarra, 31006 Pamplona, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8313-2986","authenticated-orcid":false,"given":"Santiago","family":"Garc\u00eda-Jim\u00e9nez","sequence":"additional","affiliation":[{"name":"Electrical, Electronic and Communications Engineering Department, Universidad P\u00fablica de Navarra, 31006 Pamplona, Spain"}]}],"member":"1968","published-online":{"date-parts":[[2018,12,26]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","article-title":"Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications","volume":"17","author":"Guizani","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Guo, H., and Heidemann, J. (2018, January 20\u201325). IP-Based IoT Device Detection. Proceedings of the 2018 Workshop on IoT Security and Privacy\u2014IoT S&P \u203218, Budapest, Hungary.","DOI":"10.1145\/3229565.3229572"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Perera, C., Zaslavsky, A., Christen, P., and Georgakopoulos, D. (2014). Sensing as a service model for smart cities supported by Internet of Things. Trans. Emerg. Telecommun. Technol.","DOI":"10.1002\/ett.2704"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Marwat, S., Mehmood, Y., Khan, A., Ahmed, S., Hafeez, A., Kamal, T., and Khan, A. (2018). Method for Handling Massive IoT Traffic in 5G Networks. Sensors, 18.","DOI":"10.3390\/s18113966"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Shafiq, M.Z., Ji, L., Liu, A.X., Pang, J., and Wang, J. (2013). Large-scale measurement and characterization of cellular machine-to-machine traffic. IEEE\/ACM Trans. Netw.","DOI":"10.1145\/2254756.2254767"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Lakhina, A., Crovella, M., and Diot, C. (2004, January 25\u201327). Characterization of network-wide anomalies in traffic flows. Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement\u2014IMC \u203204, Sicily, Italy.","DOI":"10.1145\/1028788.1028813"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Kolias, C., Kambourakis, G., Stavrou, A., and Voas, J. (2017). DDoS in the IoT: Mirai and other botnets. Computer.","DOI":"10.1109\/MC.2017.201"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Kuang, J., Waddington, D.G., and Lin, C. (November, January 29). Techniques for fast and scalable time series traffic generation. Proceedings of the 2015 IEEE International Conference on Big Data, Santa Clara, CA, USA.","DOI":"10.1109\/BigData.2015.7363747"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Bull, P., Austin, R., Popov, E., Sharma, M., and Watson, R. (2016, January 22\u201324). Flow based security for IoT devices using an SDN gateway. Proceedings of the 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), Vienna, Austria.","DOI":"10.1109\/FiCloud.2016.30"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Miguel, M.L.F., Penna, M.C., Nievola, J.C., and Pellenz, M.E. (2012, January 16\u201320). New models for long-term Internet traffic forecasting using artificial neural networks and flow based information. Proceedings of the 2012 IEEE Network Operations and Management Symposium, Maui, HI, USA.","DOI":"10.1109\/NOMS.2012.6212033"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Malott, L., and Chellappan, S. (2014, January 4\u20137). Investigating the fractal nature of individual user netflow data. Proceedings of the 2014 23rd International Conference on Computer Communication and Networks (ICCCN), Shanghai, China.","DOI":"10.1109\/ICCCN.2014.6911837"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/65.912717","article-title":"Algorithms for packet classification","volume":"15","author":"Gupta","year":"2001","journal-title":"IEEE Netw."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"3010","DOI":"10.1016\/j.comnet.2012.04.014","article-title":"A new hierarchical packet classification algorithm","volume":"56","author":"Lim","year":"2012","journal-title":"Comput. Netw."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.comcom.2017.05.001","article-title":"BitCuts: A fast packet classification algorithm using bit-level cutting","volume":"109","author":"Liu","year":"2017","journal-title":"Comput. Commun."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Orosz, P., T\u00f3thfalusi, T., and Varga, P. (2018). FPGA-Assisted DPI Systems: 100 Gbit\/s and Beyond. IEEE Commun. Surv. Tutor., 1.","DOI":"10.1109\/COMST.2018.2876196"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1145\/362686.362692","article-title":"Space\/Time Trade-offs in Hash Coding with Allowable Errors","volume":"13","author":"Bloom","year":"1970","journal-title":"Commun. ACM"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Tur\u010dan\u00edk, M. (2015, January 19\u201321). Packet filtering by artificial neural network. Proceedings of the International Conference on Military Technologies (ICMT), Brno, Czech Republic.","DOI":"10.1109\/MILTECHS.2015.7153739"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1145\/285243.285282","article-title":"Fast and scalable layer four switching","volume":"28","author":"Srinivasan","year":"1998","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"ref_19","unstructured":"(2018, October 24). Packet Capture Library LIBPCAP. Available online: http:\/\/www.tcpdump.org."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/1\/78\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:36:13Z","timestamp":1760196973000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/1\/78"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,26]]},"references-count":19,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2019,1]]}},"alternative-id":["s19010078"],"URL":"https:\/\/doi.org\/10.3390\/s19010078","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2018,12,26]]}}}