Mining sensor data in cyber-physical systems

A Cyber-Physical System (CPS) integrates physical devices (i.e., sensors) with cyber (i.e., informational) components to form a context sensitive system that responds intelligently to dynamic changes in real-world situations. Such a system has wide applications in the scenarios of traffic control, battlefield surveillance, environmental monitoring, and so on. A core element of CPS is the collection and assessment of information from noisy, dynamic, and uncertain physical environments integrated with many types of cyber-space resources. The potential of this integration is unbounded. To achieve this potential the raw data acquired from the physical world must be transformed into useable knowledge in real-time. Therefore, CPS brings a new dimension to knowledge discovery because of the emerging synergism of the physical and the cyber. The various properties of the physical world must be addressed in information management and knowledge discovery. This paper discusses the problems of mining sensor data in CPS: With a large number of wireless sensors deployed in a designated area, the task is real time detection of intruders that enter the area based on noisy sensor data. The framework of IntruMine is introduced to discover intruders from untrustworthy sensor data. IntruMine first analyzes the trustworthiness of sensor data, then detects the intruders' locations, and verifies the detections based on a graph model of the relationships between sensors and intruders.

[1]  S. Sitharama Iyengar,et al.  Distributed Bayesian algorithms for fault-tolerant event region detection in wireless sensor networks , 2004, IEEE Transactions on Computers.

[2]  Zack J. Butler,et al.  Tracking a moving object with a binary sensor network , 2003, SenSys '03.

[3]  Wei Hong,et al.  Model-Driven Data Acquisition in Sensor Networks , 2004, VLDB.

[4]  Hongyan Li,et al.  Effective variation management for pseudo periodical streams , 2007, SIGMOD '07.

[5]  Jae-Gil Lee,et al.  MoveMine: Mining moving object data for discovery of animal movement patterns , 2011, TIST.

[6]  Gustavo Alonso,et al.  Declarative Support for Sensor Data Cleaning , 2006, Pervasive.

[7]  Thomas F. La Porta,et al.  IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems , 2012, SDM.

[8]  Qiang Yang,et al.  Adaptive Localization in a Dynamic WiFi Environment through Multi-view Learning , 2007, AAAI.

[9]  M. Potkonjak,et al.  On-line fault detection of sensor measurements , 2003, Proceedings of IEEE Sensors 2003 (IEEE Cat. No.03CH37498).

[10]  Jiawei Han,et al.  Filtering and Refinement: A Two-Stage Approach for Efficient and Effective Anomaly Detection , 2009, 2009 Ninth IEEE International Conference on Data Mining.

[11]  David E. Culler,et al.  Lessons from a Sensor Network Expedition , 2004, EWSN.

[12]  Sangkyum Kim,et al.  Tru-Alarm: Trustworthiness Analysis of Sensor Networks in Cyber-Physical Systems , 2010, 2010 IEEE International Conference on Data Mining.

[13]  Thomas F. La Porta,et al.  Mining lines in the sand: on trajectory discovery from untrustworthy data in cyber-physical system , 2013, KDD.

[14]  Yu Hen Hu,et al.  Maximum likelihood multiple-source localization using acoustic energy measurements with wireless sensor networks , 2005, IEEE Transactions on Signal Processing.

[15]  Yu-Chee Tseng,et al.  Efficient in-network moving object tracking in wireless sensor networks , 2006, IEEE Transactions on Mobile Computing.

[16]  Yu Zheng,et al.  Computing with Spatial Trajectories , 2011, Computing with Spatial Trajectories.

[17]  Dimitrios Gunopulos,et al.  Online outlier detection in sensor data using non-parametric models , 2006, VLDB.

[18]  Volkan Cevher,et al.  Acoustic sensor network design for position estimation , 2009, TOSN.

[19]  Wang-Chien Lee,et al.  Using sensorranks for in-network detection of faulty readings in wireless sensor networks , 2007, MobiDE '07.

[20]  Wei Hong,et al.  A macroscope in the redwoods , 2005, SenSys '05.

[21]  Gregory J. Pottie,et al.  Bayesian Selection of Non-Faulty Sensors , 2007, 2007 IEEE International Symposium on Information Theory.

[22]  Reformatting Fighter Tactics , .

[23]  Jiming Chen,et al.  Smart community: an internet of things application , 2011, IEEE Communications Magazine.

[24]  Wen-Chih Peng,et al.  CarWeb: A Traffic Data Collection Platform , 2008, The Ninth International Conference on Mobile Data Management (mdm 2008).

[25]  Pramod K. Varshney,et al.  Tracking in Wireless Sensor Networks Using Particle Filtering: Physical Layer Considerations , 2009, IEEE Transactions on Signal Processing.

[26]  B. R. Badrinath,et al.  Cleaning and querying noisy sensors , 2003, WSNA '03.

[27]  Qiang Yang,et al.  Domain-constrained semi-supervised mining of tracking models in sensor networks , 2007, KDD '07.

[28]  Inseok Hwang,et al.  Multiple-target tracking and identity management in clutter, with application to aircraft tracking , 2004, Proceedings of the 2004 American Control Conference.

[29]  Walid G. Aref,et al.  Stream window join: tracking moving objects in sensor-network databases , 2003, 15th International Conference on Scientific and Statistical Database Management, 2003..