Sensor anomaly detection in the industrial internet of things based on edge computing
Sensor anomaly detection in the industrial internet of things based on edge computing
In the industrial internet of things (IIoT), because thousands of pieces of hardware, instruments, and variouscontrollers are involved, the core problem is the sensors. Detection using sensors is the bottom line of the IIoT, directlyaffecting the detection accuracy and control indicators of the IIoT system. However, when a large number of realtime data generated by IIoT devices are transferred to cloud computing centers, large-scale data will inevitably bringcomputing load, which will affect the computing speed of cloud computing centers and increase the computing load ofcloud computing data centers. These factors directly lead to instability and delay in sensor data collected in real timein the IIoT. In this paper, a sensor outlier detection algorithm based on edge calculation is proposed. Firstly, focusingon the problem of the large amount of data in terminal equipment of the IIoT, the edge technology method of datacompression is used to optimize the compression of sensor data, and different thresholds are set according to differentindustrial process requirements, so as to ensure the real-time aspect and authenticity of the data. Then, using theK-means clustering algorithm, the compressed test data sets are analyzed and the abnormal sensor detection values andlabels are obtained. Finally, the effectiveness of such an approach is evaluated through a sample case study involving atemperature control system.
___
- [1] Boyes H, Hallaq B, Cunningham J. The industrial internet of things (IIoT): an analysis framework. Computers in
Industry 2018; 101: 1-12.
- [2] Atzori L, Iera A, Morabito G. The internet of things: a survey. Computer Networks 2010; 54 (15): 2787-2805.
- [3] Huang Z, Chen J, Lin Y, You P, Peng Y. Minimizing data redundancy for high reliable cloud storage systems.
Computer Networks the International Journal of Computer & Telecommunications Networking 2015; 81: 164-177.
- [4] Zhang Q, Zhu C, Yang LT, Chen Z, Zhao L et al. An incremental CFS algorithm for clustering large data in
industrial internet of things. IEEE Transactions on Industrial Informatics 2017; 99: 1-8.
- [5] Wang K, Wang Y, Sun Y, Guo S, Wu J. Green industrial internet of things architecture: an energy-efficient
perspective. IEEE Communications Magazine 2016; 54 (12): 48-54.
- [6] Cui L, Yu F R, Yan Q. When big data meets software-defined networking: SDN for big data and big data for SDN.
IEEE Network 2016; 30 (1): 58-65.
- [7] Al-Rubaye S, Kadhum E, Ni Q, Anpalagan A. Industrial internet of things driven by SDN platform for smart grid
resiliency. IEEE Internet of Things Journal 2017; 99: 1-1.
- [8] Mollah MB, Azad MAK, Vasilakos A. Secure data sharing and searching at the edge of cloud-assisted internet of
things. IEEE Cloud Computing 2017; 4 (1): 34-42.
- [9] Pan J, McElhannon J. Future edge cloud and edge computing for internet of things applications. IEEE Internet of
Things Journal 2018; 5 (1): 439-449.
- [10] Chen CY, Hasan M, Mohan S. Securing real-time internet of things. Sensors 2018; 18 (12): 4356.
- [11] Kang KD, Chen L, Yi H, Wang B, Sha M. Real-time information derivation from big sensor data via edge computing.
Big Data Cognitive Computing 2017; 1 (1): 5.
- [12] Khaleghi B, Khamis A, Karray F, Razavi SN. Multisensor data fusion: a review of the state-of-the-art. Information
Fusion 2013; 14 (1): 28-44.
- [13] Castanedo F. A review of data fusion techniques. The Scientific World Journal 2013; 2013 (2): 704504.
- [14] Li S. The approach of dynamic data fusion based on multi-sensor temperature data. Bulletin of Science & Technology
2015; 31 (1): 146-149.
- [15] Ananthanarayanan G, Kandula S, Greenberg A, Stocia L, Lu Y et al. Reining in the outliers in map-reduce clusters
using Mantri. Usenix Conference on Operating Systems Design and Implementation. USENIX Association 2010; 64
(2): 265-278.
- [16] Yang H, Fong S, Sun G, Wong R. A very fast decision tree algorithm for real-time data mining of imperfect data
streams in a distributed wireless sensor network. International Journal of Distributed Sensor Networks 2014; 2012
(4): 16.
- [17] Shi W, Sun H, Cao J, Zhang Q. Edge computing—an emerging computing model for the internet of everything era.
Journal of Computer Research & Development 2017; 54 (5): 907-924.
- [18] Raufi B, Ismaili F, Ajdari J, Zenuni X. Web personalization issues in big data and Semantic Web: challenges and
opportunities. Turkish Journal of Electrical Engineering and Computer Science 2019; 27 (4): 2379-2394.
- [19] Sharma M, Arunachalam K, Sharma D. Analyzing the data center efficiency by using PUE to make the data centers
more energy efficient by reducing the electrical consumption and exploring new strategies. Procedia Computer
Science 2015; 48: 142-148.
- [20] Li H, Ota K, Dong M. Learning IoT in edge: deep learning for the internet of things with edge computing. IEEE
Network 2018; 32 (1): 96-101.
- [21] Peralta G, Iglesiasurkia M, Barcelo M, Gomez R, Moran A et al. Fog computing based efficient IoT scheme for the
Industry4.0. In: IEEE International Workshop of Electronics, Control, Measurement, Signals and Their Application
to Mechatronics 2017; 24 (3): 1-6.
- [22] Sun X, Ansari N. Edge IoT: mobile edge computing for the internet of things. IEEE Communications Magazine
2016; 54 (12): 22-29.
- [23] Cho Y, Paek Y, Ahmed E, Ko K. A survey and design of a scalable mobile edge cloud platform for the Smart
IoT Devices and it’s applications. In: Park J, Pan Y, Yi G, Loia V (editors). Advances in Computer Science and
Ubiquitous Computing, Lecture Notes in Electrical Engineering. Singapore: Springer 2016; pp. 694-698.
- [24] Chandola V, Banerjee A, Kumar V. Anomaly detection: a survey. ACM Computing Survey (CSUR) 2009; 41 (3):
1-72.
- [25] King S, King D, Astley K, Tarassenko L, Hayton P et al. The use of novelty detection techniques for monitoring
high-integrity plant. In: Proceedings of the 2002 International Conference on Control Applications; Glasgow, UK
2002; pp. 221-226.
- [26] Borrajo ML, Baruque B, Corchado E, Bajo J, Corchado JM. Hybrid neural intelligent system to predict business
failure in small-to-medium-size enterprises. International Journal of Neural Systems 2011; 21: 277-296.
- [27] Zheng Y, Rajasegarar S, Leckie C, Palaniswami M. Smart car parking: temporal clustering and anomaly detection in
urban car parking. In: IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information
Processing; Singapore 2014; pp. 1-6.
- [28] Kiss I, Genge B, Haller P, Gheorghe S. Data clustering-based anomaly detection in industrial control systems. IEEE
International Conference on Intelligent Computer Communication and Processing. IEEE 2014; 5: 275-281.
- [29] Garces H, Sbarbaro D. Outliers detection in environmental monitoring databases. Engineering Applications of
Artificial Intelligence 2011; 24 (2): 341-349.
- [30] Chen Z, Huang Y, Zou H. Anomaly detection of industrial control system based on outlier mining. Computer
Science 2014; 41 (5): 178-203.
- [31] Luceno A. Detecting possibly non-consecutive outliers in industrial time series. Journal of the Royal Statistical
Society 2010; 60 (2): 295-310.
- [32] Han LB, Wang Q, Jiang ZF, Hao ZQ. Improved k-means initial clustering center selection algorithm. Computer
Engineering and Applications 2010; 46 (17): 150-153.