Sensor anomaly detection in the industrial internet of things based on edge computing

In the industrial internet of things IIoT , because thousands of pieces of hardware, instruments, and various controllers are involved, the core problem is the sensors. Detection using sensors is the bottom line of the IIoT, directly affecting the detection accuracy and control indicators of the IIoT system. However, when a large number of realtime data generated by IIoT devices are transferred to cloud computing centers, large-scale data will inevitably bring computing load, which will affect the computing speed of cloud computing centers and increase the computing load of cloud computing data centers. These factors directly lead to instability and delay in sensor data collected in real time in the IIoT. In this paper, a sensor outlier detection algorithm based on edge calculation is proposed. Firstly, focusing on the problem of the large amount of data in terminal equipment of the IIoT, the edge technology method of data compression is used to optimize the compression of sensor data, and different thresholds are set according to different industrial process requirements, so as to ensure the real-time aspect and authenticity of the data. Then, using the K-means clustering algorithm, the compressed test data sets are analyzed and the abnormal sensor detection values and labels are obtained. Finally, the effectiveness of such an approach is evaluated through a sample case study involving a temperature control system

___

  • 1] Boyes H, Hallaq B, Cunningham J. The industrial internet of things (IIoT): an analysis framework. Computers in Industry 2018; 101: 1-12.
  • [2] Atzori L, Iera A, Morabito G. The internet of things: a survey. Computer Networks 2010; 54 (15): 2787-2805.
  • [3] Huang Z, Chen J, Lin Y, You P, Peng Y. Minimizing data redundancy for high reliable cloud storage systems. Computer Networks the International Journal of Computer & Telecommunications Networking 2015; 81: 164-177.
  • [4] Zhang Q, Zhu C, Yang LT, Chen Z, Zhao L et al. An incremental CFS algorithm for clustering large data in industrial internet of things. IEEE Transactions on Industrial Informatics 2017; 99: 1-8.
  • [5] Wang K, Wang Y, Sun Y, Guo S, Wu J. Green industrial internet of things architecture: an energy-efficient perspective. IEEE Communications Magazine 2016; 54 (12): 48-54.
  • [6] Cui L, Yu F R, Yan Q. When big data meets software-defined networking: SDN for big data and big data for SDN. IEEE Network 2016; 30 (1): 58-65.
  • [7] Al-Rubaye S, Kadhum E, Ni Q, Anpalagan A. Industrial internet of things driven by SDN platform for smart grid resiliency. IEEE Internet of Things Journal 2017; 99: 1-1.
  • [8] Mollah MB, Azad MAK, Vasilakos A. Secure data sharing and searching at the edge of cloud-assisted internet of things. IEEE Cloud Computing 2017; 4 (1): 34-42.
  • [9] Pan J, McElhannon J. Future edge cloud and edge computing for internet of things applications. IEEE Internet of Things Journal 2018; 5 (1): 439-449.
  • [10] Chen CY, Hasan M, Mohan S. Securing real-time internet of things. Sensors 2018; 18 (12): 4356.
  • [11] Kang KD, Chen L, Yi H, Wang B, Sha M. Real-time information derivation from big sensor data via edge computing. Big Data Cognitive Computing 2017; 1 (1): 5.
  • [12] Khaleghi B, Khamis A, Karray F, Razavi SN. Multisensor data fusion: a review of the state-of-the-art. Information Fusion 2013; 14 (1): 28-44.
  • [13] Castanedo F. A review of data fusion techniques. The Scientific World Journal 2013; 2013 (2): 704504.
  • [14] Li S. The approach of dynamic data fusion based on multi-sensor temperature data. Bulletin of Science & Technology 2015; 31 (1): 146-149.
  • [15] Ananthanarayanan G, Kandula S, Greenberg A, Stocia L, Lu Y et al. Reining in the outliers in map-reduce clusters using Mantri. Usenix Conference on Operating Systems Design and Implementation. USENIX Association 2010; 64 (2): 265-278.
  • [16] Yang H, Fong S, Sun G, Wong R. A very fast decision tree algorithm for real-time data mining of imperfect data streams in a distributed wireless sensor network. International Journal of Distributed Sensor Networks 2014; 2012 (4): 16.
  • [17] Shi W, Sun H, Cao J, Zhang Q. Edge computing—an emerging computing model for the internet of everything era. Journal of Computer Research & Development 2017; 54 (5): 907-924.
  • [18] Raufi B, Ismaili F, Ajdari J, Zenuni X. Web personalization issues in big data and Semantic Web: challenges and opportunities. Turkish Journal of Electrical Engineering and Computer Science 2019; 27 (4): 2379-2394.
  • [19] Sharma M, Arunachalam K, Sharma D. Analyzing the data center efficiency by using PUE to make the data centers more energy efficient by reducing the electrical consumption and exploring new strategies. Procedia Computer Science 2015; 48: 142-148.
  • [20] Li H, Ota K, Dong M. Learning IoT in edge: deep learning for the internet of things with edge computing. IEEE Network 2018; 32 (1): 96-101.
  • [21] Peralta G, Iglesiasurkia M, Barcelo M, Gomez R, Moran A et al. Fog computing based efficient IoT scheme for the Industry4.0. In: IEEE International Workshop of Electronics, Control, Measurement, Signals and Their Application to Mechatronics 2017; 24 (3): 1-6.
  • [22] Sun X, Ansari N. Edge IoT: mobile edge computing for the internet of things. IEEE Communications Magazine 2016; 54 (12): 22-29.
  • [23] Cho Y, Paek Y, Ahmed E, Ko K. A survey and design of a scalable mobile edge cloud platform for the Smart IoT Devices and it’s applications. In: Park J, Pan Y, Yi G, Loia V (editors). Advances in Computer Science and Ubiquitous Computing, Lecture Notes in Electrical Engineering. Singapore: Springer 2016; pp. 694-698.
  • [24] Chandola V, Banerjee A, Kumar V. Anomaly detection: a survey. ACM Computing Survey (CSUR) 2009; 41 (3): 1-72.
  • [25] King S, King D, Astley K, Tarassenko L, Hayton P et al. The use of novelty detection techniques for monitoring high-integrity plant. In: Proceedings of the 2002 International Conference on Control Applications; Glasgow, UK 2002; pp. 221-226.
  • [26] Borrajo ML, Baruque B, Corchado E, Bajo J, Corchado JM. Hybrid neural intelligent system to predict business failure in small-to-medium-size enterprises. International Journal of Neural Systems 2011; 21: 277-296.
  • [27] Zheng Y, Rajasegarar S, Leckie C, Palaniswami M. Smart car parking: temporal clustering and anomaly detection in urban car parking. In: IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing; Singapore 2014; pp. 1-6.
  • [28] Kiss I, Genge B, Haller P, Gheorghe S. Data clustering-based anomaly detection in industrial control systems. IEEE International Conference on Intelligent Computer Communication and Processing. IEEE 2014; 5: 275-281.
  • [29] Garces H, Sbarbaro D. Outliers detection in environmental monitoring databases. Engineering Applications of Artificial Intelligence 2011; 24 (2): 341-349.
  • [30] Chen Z, Huang Y, Zou H. Anomaly detection of industrial control system based on outlier mining. Computer Science 2014; 41 (5): 178-203.
  • [31] Luceno A. Detecting possibly non-consecutive outliers in industrial time series. Journal of the Royal Statistical Society 2010; 60 (2): 295-310.
  • [32] Han LB, Wang Q, Jiang ZF, Hao ZQ. Improved k-means initial clustering center selection algorithm. Computer Engineering and Applications 2010; 46 (17): 150-153.