Mining lines in the sand: on trajectory discovery from untrustworthy data in cyber-physical system

A Cyber-Physical System (CPS) integrates physical (i.e., sensor) devices with cyber (i.e., informational) components to form a context sensitive system that responds intelligently to dynamic changes in real-world situations. The CPS has wide applications in scenarios such as environment monitoring, battlefield surveillance and traffic control. One key research problem of CPS is called "mining lines in the sand". With a large number of sensors (sand) deployed in a designated area, the CPS is required to discover all the trajectories (lines) of passing intruders in real time. There are two crucial challenges that need to be addressed: (1) the collected sensor data are not trustworthy; (2) the intruders do not send out any identification information. The system needs to distinguish multiple intruders and track their movements. In this study, we propose a method called LiSM (Line-in-the-Sand Miner) to discover trajectories from untrustworthy sensor data. LiSM constructs a watching network from sensor data and computes the locations of intruder appearances based on the link information of the network. The system retrieves a cone-model from the historical trajectories and tracks multiple intruders based on this model. Finally the system validates the mining results and updates the sensor's reliability in a feedback process. Extensive experiments on big datasets demonstrate the feasibility and applicability of the proposed methods.

[1]  Yu Hen Hu,et al.  Maximum likelihood multiple-source localization using acoustic energy measurements with wireless sensor networks , 2005, IEEE Transactions on Signal Processing.

[2]  Dan Wang,et al.  Tracking with Unreliable Node Sequences , 2009, IEEE INFOCOM 2009.

[3]  Pramod K. Varshney,et al.  Tracking in Wireless Sensor Networks Using Particle Filtering: Physical Layer Considerations , 2009, IEEE Transactions on Signal Processing.

[4]  Jiming Chen,et al.  Smart community: an internet of things application , 2011, IEEE Communications Magazine.

[5]  Wen-Chih Peng,et al.  CarWeb: A Traffic Data Collection Platform , 2008, The Ninth International Conference on Mobile Data Management (mdm 2008).

[6]  Yu-Chee Tseng,et al.  Efficient in-network moving object tracking in wireless sensor networks , 2006, IEEE Transactions on Mobile Computing.

[7]  Yu Zheng,et al.  Computing with Spatial Trajectories , 2011, Computing with Spatial Trajectories.

[8]  Reformatting Fighter Tactics , .

[9]  Inseok Hwang,et al.  Multiple-target tracking and identity management in clutter, with application to aircraft tracking , 2004, Proceedings of the 2004 American Control Conference.

[10]  Wayne H. Wolf,et al.  Cyber-physical Systems , 2009, Computer.

[11]  Vinayak S. Naik,et al.  A line in the sand: a wireless sensor network for target detection, classification, and tracking , 2004, Comput. Networks.

[12]  Helen Gill,et al.  Cyber-Physical Systems , 2019, 2019 IEEE International Conference on Mechatronics (ICM).

[13]  Ilya V. Kolmanovsky,et al.  Predictive energy management of a power-split hybrid electric vehicle , 2009, 2009 American Control Conference.

[14]  S. Shankar Sastry,et al.  Markov Chain Monte Carlo Data Association for Multi-Target Tracking , 2009, IEEE Transactions on Automatic Control.

[15]  Sangkyum Kim,et al.  Tru-Alarm: Trustworthiness Analysis of Sensor Networks in Cyber-Physical Systems , 2010, 2010 IEEE International Conference on Data Mining.

[16]  Thomas F. La Porta,et al.  IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems , 2012, SDM.

[17]  David E. Culler,et al.  Lessons from a Sensor Network Expedition , 2004, EWSN.

[18]  Wei Hong,et al.  A macroscope in the redwoods , 2005, SenSys '05.

[19]  Jae-Gil Lee,et al.  MoveMine: Mining moving object data for discovery of animal movement patterns , 2011, TIST.