Journal Home > Volume 19 , Issue 3

A Cyber-Physical System (CPS) integrates physical devices (i.e., sensors) with cyber (i.e., informational) components to form a context sensitive system that responds intelligently to dynamic changes in real-world situations. Such a system has wide applications in the scenarios of traffic control, battlefield surveillance, environmental monitoring, and so on. A core element of CPS is the collection and assessment of information from noisy, dynamic, and uncertain physical environments integrated with many types of cyber-space resources. The potential of this integration is unbounded. To achieve this potential the raw data acquired from the physical world must be transformed into useable knowledge in real-time. Therefore, CPS brings a new dimension to knowledge discovery because of the emerging synergism of the physical and the cyber. The various properties of the physical world must be addressed in information management and knowledge discovery. This paper discusses the problems of mining sensor data in CPS: With a large number of wireless sensors deployed in a designated area, the task is real time detection of intruders that enter the area based on noisy sensor data. The framework of IntruMine is introduced to discover intruders from untrustworthy sensor data. IntruMine first analyzes the trustworthiness of sensor data, then detects the intruders’ locations, and verifies the detections based on a graph model of the relationships between sensors and intruders.


menu
Abstract
Full text
Outline
About this article

Mining Sensor Data in Cyber-Physical Systems

Show Author's information Lu-An Tang( )Jiawei HanGuofei Jiang
NEC Laboratory America, Princeton, NJ 08540, USA.
Department of Computer Science, University of Illinois at Urbana-Champaign, Urbana, IL 61801, USA.

Abstract

A Cyber-Physical System (CPS) integrates physical devices (i.e., sensors) with cyber (i.e., informational) components to form a context sensitive system that responds intelligently to dynamic changes in real-world situations. Such a system has wide applications in the scenarios of traffic control, battlefield surveillance, environmental monitoring, and so on. A core element of CPS is the collection and assessment of information from noisy, dynamic, and uncertain physical environments integrated with many types of cyber-space resources. The potential of this integration is unbounded. To achieve this potential the raw data acquired from the physical world must be transformed into useable knowledge in real-time. Therefore, CPS brings a new dimension to knowledge discovery because of the emerging synergism of the physical and the cyber. The various properties of the physical world must be addressed in information management and knowledge discovery. This paper discusses the problems of mining sensor data in CPS: With a large number of wireless sensors deployed in a designated area, the task is real time detection of intruders that enter the area based on noisy sensor data. The framework of IntruMine is introduced to discover intruders from untrustworthy sensor data. IntruMine first analyzes the trustworthiness of sensor data, then detects the intruders’ locations, and verifies the detections based on a graph model of the relationships between sensors and intruders.

Keywords: cyber-physical system, sensor network, data trustworthiness

References(31)

[1]
I. Hwang, H. Balakrishnan, K. Roy, and C. Tomlin, Multiple-target tracking and identity management in clutter, with application to aircraft tracking, in Proceedings of the American Control Conference, 2004.
[2]
M. Hewish, Reformatting fighter tactics, http://www.cs.berkeley.edu/∼prabal/nest/resources/Hewish2001.pdf, 2001.
[3]
L. Tang, X. Yu, Q. Gu, J. Han, A. Leung, and T. La Porta, Mining lines data in cyber-physical system, in KDD, 2013.
[4]
C. Lo, W. Peng, C. Chen, T. Lin, and C. Lin, Carweb: A traffic data collection platform, in International Conference on Mobile Data Management, 2008.
DOI
[5]
Y. Zheng and X. Zhou, Computing with Spatial Trajectories. Springer, 2011.
DOI
[6]
X. Li, R. Lu, X. Liang, X. Shen, J. Chen, and X. Lin, Smart community: An internet of things application, IEEE Communications Magazine, vol. 49, no. 11, pp. 68-75, 2011.
[7]
G. Tolle, J. Polastre, R. Szewczyk, D. E. Culler, N. Turner, K. Tu, S. Burgess, T. Dawson, P. Buonadonna, D. Gay, and W. Hong, A macroscope in the redwoods, in the ACM Conference on Embedded Networked Sensor Systems, 2005.
DOI
[8]
Z. Li, J. Han, M. Ji, L. Tang, Y. Yu, B. Ding, J. Lee, and R. Kays, Movemine: Mining moving object data for discovery of animal movement patterns, ACM Transactions on Intelligent Systems and Technology, vol. 2, no. 4, p. 27, 2011.
[9]
R. Szewczyk, J. Polastre, A. Mainwaring, and D. Culler, Lessons from a sensor network expedition, in European Workshop on Wireless Sensor Networks, 2004.
DOI
[10]
X. Sheng and Y. Hu, Maximum likelihood multiple source localization using acoustic energy measurements with wireless sensor networks, IEEE Transactions on Signal Processing, 2005.
[11]
M. A. Hammad, W. G. Aref, and A. K. Elmagarmid, Stream window join: Tracking moving objects in sensor network databases, in International Conference on Scientific and Statistical Database Management, 2003.
[12]
J. Aslam, Z. Butler, F. Constantin, V. Crespi, G. Cybenko, and D. Rus, Tracking a moving object with a binary sensor network, in the ACM Conference on Embedded Networked Sensor Systems, 2003.
DOI
[13]
O. Ozdemir, R. Niu, and P. K. Varshney, Tracking in wireless sensor network using particle filtering: Physical layer considerations, IEEE Transactions on Signal Processing, 2009.
[14]
S. J. Pan, J. T. Kwok, Q. Yang, and J. J. Pan, Adaptive localization in a dynamic wifi environment through multi-view learning, in AAAI, 2007.
[15]
R. Pan, J. Zhao, V. W. Zheng, J. J. Pan, D. Shen, S. J. Pan, and Q. Yang, Domain constrained semisupervised mining of tracking models in sensor networks, in KDD, 2007.
DOI
[16]
L. Tang, X. Yu, S. Kim, J. Han, C. Hung, and W. Peng, Trualarm: Trustworthiness analysis of sensor networks in cyber-physical systems, in ICDM, 2010.
DOI
[17]
L. Tang, Q. Gu, X. Yu, J. Han, T. La Porta, A. Leung, T. Abdelzaher, and L. Kaplan, Intrumine: Mining intruders in untrustworthy data of cyber-physical systems, in Proc. of SIAM International Conference on Data Mining (SDM), 2012.
DOI
[18]
A. Deshpande, C. Guestrin, S. Madden, J. M. Hellerstein, and W. Hong, Model-driven data acquisition in sensor networks, in VLDB, 2004.
DOI
[19]
E. Elnahrawy and B. Nath, Cleaning and querying noisy sensors, in WSNA, 2003.
DOI
[20]
F. Koushanfar, M. Potkonjak, and A. Sangiovanni-Vincentelli, On-line fault detection of sensor measurements, in IEEE Conference on Sensors, 2003.
[21]
B. Krishnamachari and S. Iyengar, Distributed bayesian algorithms for fault-tolerant event region detection in wireless sensor networks, IEEE Trans. Comput., vol. 53, no. 3, pp. 241-250, 2004.
[22]
S. R. Jeffery, G. Alonso, M. J. Franklin, W. Hong, and J. Widom, Declarative support for sensor data cleaning, in ICPC, 2006.
DOI
[23]
S. Subramaniam, T. Palpanas, D. Papadopoulos, V. Kalogeraki, and D. Gunopulos, Online outlier detection in sensor data using non-parametric models, in VLDB, 2006.
[24]
X. Xiao, W. Peng, C. Hung, and W. Lee, Using sensorranks for in-network detection of faulty readings in wireless sensor networks, in DEWMA, 2007.
DOI
[25]
K. Ni, N. Ramanathan, M. N. H. Chehade, L. Balzano, S. Nair, S. Zahedi, E. Kohler, G. J. Pottie, M. H. Hansen, and M. B, Srivastava, Sensor network data fault types, ACM Transactions on Sensor Networks, 2009.
[26]
K. Ni and G. Pottie, Bayesian selection of non-faulty sensors, in IEEE International Symposium on Information Theory, 2007.
DOI
[27]
L. Tang, B. Cui, H. Li, G. Miao, D. Yang, and X. Zhou, Effective variation management for pseudo periodical streams, in SIGMOD, 2007.
DOI
[28]
X. Yu, L. Tang, and J. Han, Filtering and refinement: A two-stage approach for efficient and effective anomaly detection, in ICDM, 2009.
DOI
[29]
C. Lin, W. Peng, and Y. Tseng, Efficient in-network moving object tracking in wireless sensor network, IEEE Transaction on Mobile Computing, vol. 5, no. 8, pp. 1044-1056, 2006.
[30]
V. Cevher and L. M. Kaplan, Acoustic sensor network design for position estimation, ACM Transactions on Sensor Networks, vol. 5, no. 3, 2009.
[31]
T. Krout, Cb manet scenario data distribution, in BBN Technique Report, 2007.
Publication history
Copyright
Acknowledgements
Rights and permissions

Publication history

Received: 07 May 2014
Accepted: 09 May 2014
Published: 18 June 2014
Issue date: June 2014

Copyright

© The author(s) 2014

Acknowledgements

The work was supported in part by the U.S. Army Research Laboratory under Cooperative Agreement Nos. W911NF-09-2-0053 (NS-CTA) and W911NF-11-2-0086 (Cyber-Security), the U.S. Army Research Office under Cooperative Agreement No. W911NF-13-1-0193, DTRA, and U.S. National Science Foundation grants CNS-0931975, IIS-1017362, IIS-1320617, and IIS-1354329. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation here on.

Rights and permissions

Return