IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems

A Cyber-Physical System (CPS) integrates physical (i.e., sensor) devices with cyber (i.e., informational) components to form a situation-aware system that responds intelligently to dynamic changes in real-world. It has wide application to scenarios of traffic control, environment monitoring and battlefield surveillance. This study investigates the specific problem of intruder mining in CPS: With a large number of sensors deployed in a designated area, the task is real time detection of intruders who enter the area, based on untrustworthy data. We propose a method called IntruMine to detect and verify the intruders. IntruMine constructs monitoring graphs to model the relationships between sensors and possible intruders, and computes the position and energy of each intruder with the link information from these monitoring graphs. Finally, a confidence rating is calculated for each potential detection, reducing false positives in the results. IntruMine is a generalized approach. Two classical methods of intruder detection can be seen as special cases of IntruMine under certain conditions. We conduct extensive experiments to evaluate the performance of IntruMine on both synthetic and real datasets and the experimental results show that IntruMine has better effectiveness and efficiency than existing methods.

[1]  Vinayak S. Naik,et al.  A line in the sand: a wireless sensor network for target detection, classification, and tracking , 2004, Comput. Networks.

[2]  Chee-Yee Chong,et al.  Sensor networks: evolution, opportunities, and challenges , 2003, Proc. IEEE.

[3]  Hui Xiong,et al.  Detecting Blackholes and Volcanoes in Directed Networks , 2010, ArXiv.

[4]  Hui Xiong,et al.  Mining blackhole and volcano patterns in directed graphs: a general approach , 2012, Data Mining and Knowledge Discovery.

[5]  Qiang Yang,et al.  Domain-constrained semi-supervised mining of tracking models in sensor networks , 2007, KDD '07.

[6]  Qiang Yang,et al.  Adaptive Localization in a Dynamic WiFi Environment through Multi-view Learning , 2007, AAAI.

[7]  Sangkyum Kim,et al.  Tru-Alarm: Trustworthiness Analysis of Sensor Networks in Cyber-Physical Systems , 2010, 2010 IEEE International Conference on Data Mining.

[8]  Yu-Chee Tseng,et al.  Efficient in-network moving object tracking in wireless sensor networks , 2006, IEEE Transactions on Mobile Computing.

[9]  Yu Zheng,et al.  Computing with Spatial Trajectories , 2011, Computing with Spatial Trajectories.

[10]  Wen-Chih Peng,et al.  CarWeb: A Traffic Data Collection Platform , 2008, The Ninth International Conference on Mobile Data Management (mdm 2008).

[11]  Walid G. Aref,et al.  Stream window join: tracking moving objects in sensor-network databases , 2003, 15th International Conference on Scientific and Statistical Database Management, 2003..

[12]  Yu Hen Hu,et al.  Maximum likelihood multiple-source localization using acoustic energy measurements with wireless sensor networks , 2005, IEEE Transactions on Signal Processing.

[13]  Volkan Cevher,et al.  Acoustic sensor network design for position estimation , 2009, TOSN.

[14]  Zack J. Butler,et al.  Tracking a moving object with a binary sensor network , 2003, SenSys '03.

[15]  Pramod K. Varshney,et al.  Tracking in Wireless Sensor Networks Using Particle Filtering: Physical Layer Considerations , 2009, IEEE Transactions on Signal Processing.

[16]  David E. Culler,et al.  Lessons from a Sensor Network Expedition , 2004, EWSN.

[17]  Wei Hong,et al.  A macroscope in the redwoods , 2005, SenSys '05.