Remote Anomaly Detection in Industry 4.0 Using Resource-Constrained Devices

A central use case for the Internet of Things (IoT) is the adoption of sensors to monitor physical processes, such as the environment and industrial manufacturing processes, where they provide data for predictive maintenance, anomaly detection, or similar. The sensor devices are typically resource-constrained in terms of computation and power, and need to rely on cloud or edge computing for data processing. However, the capacity of the wireless link and their power constraints limit the amount of data that can be transmitted to the cloud. While this is not problematic for the monitoring of slowly varying processes such as temperature, it is more problematic for complex signals such as those captured by vibration and acoustic sensors. In this paper, we consider the specific problem of remote anomaly detection based on signals that fall into the latter category over wireless channels with resource-constrained sensors. We study the impact of source coding on the detection accuracy with both an anomaly detector based on Principal Component Analysis (PCA) and one based on an autoencoder. We show that the coded transmission is beneficial when the signal-to-noise ratio (SNR) of the channel is low, while uncoded transmission performs best in the high SNR regime.

[1]  Michael Gastpar,et al.  To code, or not to code: lossy source-channel communication revisited , 2003, IEEE Trans. Inf. Theory.

[2]  Laszlo Toka,et al.  5G support for Industrial IoT Applications— Challenges, Solutions, and Research gaps , 2020, Sensors.

[3]  Soma Bandyopadhyay,et al.  IoT Healthcare Analytics: The Importance of Anomaly Detection , 2016, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA).

[4]  Allen Gersho,et al.  Vector quantization and signal compression , 1991, The Kluwer international series in engineering and computer science.

[5]  Kuang-Ching Wang,et al.  Review of Internet of Things (IoT) in Electric Power and Energy Systems , 2018, IEEE Internet of Things Journal.

[6]  Deniz Gündüz,et al.  Joint Device-Edge Inference over Wireless Links with Pruning , 2020, 2020 IEEE 21st International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[7]  Mark Crovella,et al.  Diagnosing network-wide traffic anomalies , 2004, SIGCOMM '04.

[8]  Heiko Hoffmann,et al.  Kernel PCA for novelty detection , 2007, Pattern Recognit..

[9]  A. M. Mathai,et al.  Quadratic forms in random variables : theory and applications , 1992 .

[10]  Deniz Gündüz,et al.  Wireless Image Retrieval at the Edge , 2020, IEEE Journal on Selected Areas in Communications.

[11]  J. E. Jackson,et al.  Control Procedures for Residuals Associated With Principal Component Analysis , 1979 .

[12]  Sergio Verdú,et al.  Lossy Joint Source-Channel Coding in the Finite Blocklength Regime , 2012, IEEE Transactions on Information Theory.

[13]  Takehisa Yairi,et al.  Anomaly Detection Using Autoencoders with Nonlinear Dimensionality Reduction , 2014, MLSDA'14.

[14]  Jianhua Ma,et al.  Variational LSTM Enhanced Anomaly Detection for Industrial Big Data , 2021, IEEE Transactions on Industrial Informatics.

[15]  Yohei Kawaguchi,et al.  MIMII Dataset: Sound Dataset for Malfunctioning Industrial Machine Investigation and Inspection , 2019, DCASE.

[16]  D. R. Jensen,et al.  A Gaussian Approximation to the Distribution of a Definite Quadratic Form , 1972 .

[17]  S. P. Lloyd,et al.  Least squares quantization in PCM , 1982, IEEE Trans. Inf. Theory.