AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
PDF (814 KB)
Collect
Submit Manuscript AI Chat Paper
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Open Access

Mining Sensor Data in Cyber-Physical Systems

NEC Laboratory America, Princeton, NJ 08540, USA.
Department of Computer Science, University of Illinois at Urbana-Champaign, Urbana, IL 61801, USA.
Show Author Information

Abstract

A Cyber-Physical System (CPS) integrates physical devices (i.e., sensors) with cyber (i.e., informational) components to form a context sensitive system that responds intelligently to dynamic changes in real-world situations. Such a system has wide applications in the scenarios of traffic control, battlefield surveillance, environmental monitoring, and so on. A core element of CPS is the collection and assessment of information from noisy, dynamic, and uncertain physical environments integrated with many types of cyber-space resources. The potential of this integration is unbounded. To achieve this potential the raw data acquired from the physical world must be transformed into useable knowledge in real-time. Therefore, CPS brings a new dimension to knowledge discovery because of the emerging synergism of the physical and the cyber. The various properties of the physical world must be addressed in information management and knowledge discovery. This paper discusses the problems of mining sensor data in CPS: With a large number of wireless sensors deployed in a designated area, the task is real time detection of intruders that enter the area based on noisy sensor data. The framework of IntruMine is introduced to discover intruders from untrustworthy sensor data. IntruMine first analyzes the trustworthiness of sensor data, then detects the intruders’ locations, and verifies the detections based on a graph model of the relationships between sensors and intruders.

References

[1]
I. Hwang, H. Balakrishnan, K. Roy, and C. Tomlin, Multiple-target tracking and identity management in clutter, with application to aircraft tracking, in Proceedings of the American Control Conference, 2004.
[2]
M. Hewish, Reformatting fighter tactics, http://www.cs.berkeley.edu/∼prabal/nest/resources/Hewish2001.pdf, 2001.
[3]
L. Tang, X. Yu, Q. Gu, J. Han, A. Leung, and T. La Porta, Mining lines data in cyber-physical system, in KDD, 2013.
[4]
C. Lo, W. Peng, C. Chen, T. Lin, and C. Lin, Carweb: A traffic data collection platform, in International Conference on Mobile Data Management, 2008.
[5]
Y. Zheng and X. Zhou, Computing with Spatial Trajectories. Springer, 2011.
[6]
X. Li, R. Lu, X. Liang, X. Shen, J. Chen, and X. Lin, Smart community: An internet of things application, IEEE Communications Magazine, vol. 49, no. 11, pp. 68-75, 2011.
[7]
G. Tolle, J. Polastre, R. Szewczyk, D. E. Culler, N. Turner, K. Tu, S. Burgess, T. Dawson, P. Buonadonna, D. Gay, and W. Hong, A macroscope in the redwoods, in the ACM Conference on Embedded Networked Sensor Systems, 2005.
[8]
Z. Li, J. Han, M. Ji, L. Tang, Y. Yu, B. Ding, J. Lee, and R. Kays, Movemine: Mining moving object data for discovery of animal movement patterns, ACM Transactions on Intelligent Systems and Technology, vol. 2, no. 4, p. 27, 2011.
[9]
R. Szewczyk, J. Polastre, A. Mainwaring, and D. Culler, Lessons from a sensor network expedition, in European Workshop on Wireless Sensor Networks, 2004.
[10]
X. Sheng and Y. Hu, Maximum likelihood multiple source localization using acoustic energy measurements with wireless sensor networks, IEEE Transactions on Signal Processing, 2005.
[11]
M. A. Hammad, W. G. Aref, and A. K. Elmagarmid, Stream window join: Tracking moving objects in sensor network databases, in International Conference on Scientific and Statistical Database Management, 2003.
[12]
J. Aslam, Z. Butler, F. Constantin, V. Crespi, G. Cybenko, and D. Rus, Tracking a moving object with a binary sensor network, in the ACM Conference on Embedded Networked Sensor Systems, 2003.
[13]
O. Ozdemir, R. Niu, and P. K. Varshney, Tracking in wireless sensor network using particle filtering: Physical layer considerations, IEEE Transactions on Signal Processing, 2009.
[14]
S. J. Pan, J. T. Kwok, Q. Yang, and J. J. Pan, Adaptive localization in a dynamic wifi environment through multi-view learning, in AAAI, 2007.
[15]
R. Pan, J. Zhao, V. W. Zheng, J. J. Pan, D. Shen, S. J. Pan, and Q. Yang, Domain constrained semisupervised mining of tracking models in sensor networks, in KDD, 2007.
[16]
L. Tang, X. Yu, S. Kim, J. Han, C. Hung, and W. Peng, Trualarm: Trustworthiness analysis of sensor networks in cyber-physical systems, in ICDM, 2010.
[17]
L. Tang, Q. Gu, X. Yu, J. Han, T. La Porta, A. Leung, T. Abdelzaher, and L. Kaplan, Intrumine: Mining intruders in untrustworthy data of cyber-physical systems, in Proc. of SIAM International Conference on Data Mining (SDM), 2012.
[18]
A. Deshpande, C. Guestrin, S. Madden, J. M. Hellerstein, and W. Hong, Model-driven data acquisition in sensor networks, in VLDB, 2004.
[19]
E. Elnahrawy and B. Nath, Cleaning and querying noisy sensors, in WSNA, 2003.
[20]
F. Koushanfar, M. Potkonjak, and A. Sangiovanni-Vincentelli, On-line fault detection of sensor measurements, in IEEE Conference on Sensors, 2003.
[21]
B. Krishnamachari and S. Iyengar, Distributed bayesian algorithms for fault-tolerant event region detection in wireless sensor networks, IEEE Trans. Comput., vol. 53, no. 3, pp. 241-250, 2004.
[22]
S. R. Jeffery, G. Alonso, M. J. Franklin, W. Hong, and J. Widom, Declarative support for sensor data cleaning, in ICPC, 2006.
[23]
S. Subramaniam, T. Palpanas, D. Papadopoulos, V. Kalogeraki, and D. Gunopulos, Online outlier detection in sensor data using non-parametric models, in VLDB, 2006.
[24]
X. Xiao, W. Peng, C. Hung, and W. Lee, Using sensorranks for in-network detection of faulty readings in wireless sensor networks, in DEWMA, 2007.
[25]
K. Ni, N. Ramanathan, M. N. H. Chehade, L. Balzano, S. Nair, S. Zahedi, E. Kohler, G. J. Pottie, M. H. Hansen, and M. B, Srivastava, Sensor network data fault types, ACM Transactions on Sensor Networks, 2009.
[26]
K. Ni and G. Pottie, Bayesian selection of non-faulty sensors, in IEEE International Symposium on Information Theory, 2007.
[27]
L. Tang, B. Cui, H. Li, G. Miao, D. Yang, and X. Zhou, Effective variation management for pseudo periodical streams, in SIGMOD, 2007.
[28]
X. Yu, L. Tang, and J. Han, Filtering and refinement: A two-stage approach for efficient and effective anomaly detection, in ICDM, 2009.
[29]
C. Lin, W. Peng, and Y. Tseng, Efficient in-network moving object tracking in wireless sensor network, IEEE Transaction on Mobile Computing, vol. 5, no. 8, pp. 1044-1056, 2006.
[30]
V. Cevher and L. M. Kaplan, Acoustic sensor network design for position estimation, ACM Transactions on Sensor Networks, vol. 5, no. 3, 2009.
[31]
T. Krout, Cb manet scenario data distribution, in BBN Technique Report, 2007.
Tsinghua Science and Technology
Pages 225-234
Cite this article:
Tang L-A, Han J, Jiang G. Mining Sensor Data in Cyber-Physical Systems. Tsinghua Science and Technology, 2014, 19(3): 225-234. https://doi.org/10.1109/TST.2014.6838193

619

Views

40

Downloads

22

Crossref

N/A

Web of Science

33

Scopus

0

CSCD

Altmetrics

Received: 07 May 2014
Accepted: 09 May 2014
Published: 18 June 2014
© The author(s) 2014
Return