Sensor anomaly detection in the industrial internet of things based on edge computing

Sensor anomaly detection in the industrial internet of things based on edge computing

In the industrial internet of things (IIoT), because thousands of pieces of hardware, instruments, and variouscontrollers are involved, the core problem is the sensors. Detection using sensors is the bottom line of the IIoT, directlyaffecting the detection accuracy and control indicators of the IIoT system. However, when a large number of realtime data generated by IIoT devices are transferred to cloud computing centers, large-scale data will inevitably bringcomputing load, which will affect the computing speed of cloud computing centers and increase the computing load ofcloud computing data centers. These factors directly lead to instability and delay in sensor data collected in real timein the IIoT. In this paper, a sensor outlier detection algorithm based on edge calculation is proposed. Firstly, focusingon the problem of the large amount of data in terminal equipment of the IIoT, the edge technology method of datacompression is used to optimize the compression of sensor data, and different thresholds are set according to differentindustrial process requirements, so as to ensure the real-time aspect and authenticity of the data. Then, using theK-means clustering algorithm, the compressed test data sets are analyzed and the abnormal sensor detection values andlabels are obtained. Finally, the effectiveness of such an approach is evaluated through a sample case study involving atemperature control system.

___

  • [1] Boyes H, Hallaq B, Cunningham J. The industrial internet of things (IIoT): an analysis framework. Computers in Industry 2018; 101: 1-12.
  • [2] Atzori L, Iera A, Morabito G. The internet of things: a survey. Computer Networks 2010; 54 (15): 2787-2805.
  • [3] Huang Z, Chen J, Lin Y, You P, Peng Y. Minimizing data redundancy for high reliable cloud storage systems. Computer Networks the International Journal of Computer & Telecommunications Networking 2015; 81: 164-177.
  • [4] Zhang Q, Zhu C, Yang LT, Chen Z, Zhao L et al. An incremental CFS algorithm for clustering large data in industrial internet of things. IEEE Transactions on Industrial Informatics 2017; 99: 1-8.
  • [5] Wang K, Wang Y, Sun Y, Guo S, Wu J. Green industrial internet of things architecture: an energy-efficient perspective. IEEE Communications Magazine 2016; 54 (12): 48-54.
  • [6] Cui L, Yu F R, Yan Q. When big data meets software-defined networking: SDN for big data and big data for SDN. IEEE Network 2016; 30 (1): 58-65.
  • [7] Al-Rubaye S, Kadhum E, Ni Q, Anpalagan A. Industrial internet of things driven by SDN platform for smart grid resiliency. IEEE Internet of Things Journal 2017; 99: 1-1.
  • [8] Mollah MB, Azad MAK, Vasilakos A. Secure data sharing and searching at the edge of cloud-assisted internet of things. IEEE Cloud Computing 2017; 4 (1): 34-42.
  • [9] Pan J, McElhannon J. Future edge cloud and edge computing for internet of things applications. IEEE Internet of Things Journal 2018; 5 (1): 439-449.
  • [10] Chen CY, Hasan M, Mohan S. Securing real-time internet of things. Sensors 2018; 18 (12): 4356.
  • [11] Kang KD, Chen L, Yi H, Wang B, Sha M. Real-time information derivation from big sensor data via edge computing. Big Data Cognitive Computing 2017; 1 (1): 5.
  • [12] Khaleghi B, Khamis A, Karray F, Razavi SN. Multisensor data fusion: a review of the state-of-the-art. Information Fusion 2013; 14 (1): 28-44.
  • [13] Castanedo F. A review of data fusion techniques. The Scientific World Journal 2013; 2013 (2): 704504.
  • [14] Li S. The approach of dynamic data fusion based on multi-sensor temperature data. Bulletin of Science & Technology 2015; 31 (1): 146-149.
  • [15] Ananthanarayanan G, Kandula S, Greenberg A, Stocia L, Lu Y et al. Reining in the outliers in map-reduce clusters using Mantri. Usenix Conference on Operating Systems Design and Implementation. USENIX Association 2010; 64 (2): 265-278.
  • [16] Yang H, Fong S, Sun G, Wong R. A very fast decision tree algorithm for real-time data mining of imperfect data streams in a distributed wireless sensor network. International Journal of Distributed Sensor Networks 2014; 2012 (4): 16.
  • [17] Shi W, Sun H, Cao J, Zhang Q. Edge computing—an emerging computing model for the internet of everything era. Journal of Computer Research & Development 2017; 54 (5): 907-924.
  • [18] Raufi B, Ismaili F, Ajdari J, Zenuni X. Web personalization issues in big data and Semantic Web: challenges and opportunities. Turkish Journal of Electrical Engineering and Computer Science 2019; 27 (4): 2379-2394.
  • [19] Sharma M, Arunachalam K, Sharma D. Analyzing the data center efficiency by using PUE to make the data centers more energy efficient by reducing the electrical consumption and exploring new strategies. Procedia Computer Science 2015; 48: 142-148.
  • [20] Li H, Ota K, Dong M. Learning IoT in edge: deep learning for the internet of things with edge computing. IEEE Network 2018; 32 (1): 96-101.
  • [21] Peralta G, Iglesiasurkia M, Barcelo M, Gomez R, Moran A et al. Fog computing based efficient IoT scheme for the Industry4.0. In: IEEE International Workshop of Electronics, Control, Measurement, Signals and Their Application to Mechatronics 2017; 24 (3): 1-6.
  • [22] Sun X, Ansari N. Edge IoT: mobile edge computing for the internet of things. IEEE Communications Magazine 2016; 54 (12): 22-29.
  • [23] Cho Y, Paek Y, Ahmed E, Ko K. A survey and design of a scalable mobile edge cloud platform for the Smart IoT Devices and it’s applications. In: Park J, Pan Y, Yi G, Loia V (editors). Advances in Computer Science and Ubiquitous Computing, Lecture Notes in Electrical Engineering. Singapore: Springer 2016; pp. 694-698.
  • [24] Chandola V, Banerjee A, Kumar V. Anomaly detection: a survey. ACM Computing Survey (CSUR) 2009; 41 (3): 1-72.
  • [25] King S, King D, Astley K, Tarassenko L, Hayton P et al. The use of novelty detection techniques for monitoring high-integrity plant. In: Proceedings of the 2002 International Conference on Control Applications; Glasgow, UK 2002; pp. 221-226.
  • [26] Borrajo ML, Baruque B, Corchado E, Bajo J, Corchado JM. Hybrid neural intelligent system to predict business failure in small-to-medium-size enterprises. International Journal of Neural Systems 2011; 21: 277-296.
  • [27] Zheng Y, Rajasegarar S, Leckie C, Palaniswami M. Smart car parking: temporal clustering and anomaly detection in urban car parking. In: IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing; Singapore 2014; pp. 1-6.
  • [28] Kiss I, Genge B, Haller P, Gheorghe S. Data clustering-based anomaly detection in industrial control systems. IEEE International Conference on Intelligent Computer Communication and Processing. IEEE 2014; 5: 275-281.
  • [29] Garces H, Sbarbaro D. Outliers detection in environmental monitoring databases. Engineering Applications of Artificial Intelligence 2011; 24 (2): 341-349.
  • [30] Chen Z, Huang Y, Zou H. Anomaly detection of industrial control system based on outlier mining. Computer Science 2014; 41 (5): 178-203.
  • [31] Luceno A. Detecting possibly non-consecutive outliers in industrial time series. Journal of the Royal Statistical Society 2010; 60 (2): 295-310.
  • [32] Han LB, Wang Q, Jiang ZF, Hao ZQ. Improved k-means initial clustering center selection algorithm. Computer Engineering and Applications 2010; 46 (17): 150-153.
Turkish Journal of Electrical Engineering and Computer Sciences-Cover
  • ISSN: 1300-0632
  • Yayın Aralığı: 6
  • Yayıncı: TÜBİTAK
Sayıdaki Diğer Makaleler

Estimation of distribution-based multiobjective design space exploration for energy and throughput-optimized MPSoCs

Nadia N. QADRI, Maryam MURAD, Ishfaq HUSSAIN, Muhammad Yasir QADRI, Ayaz AHMAD

A review on embedded field programmable gate array architectures and configuration tools

Khouloud BOUAZIZ, Abdulfattah M. OBEID, Mohamed ABID, Sonda CHTOUROU

On the automorphisms and isomorphisms of MDS matrices and their efficient implementations

Sedat AKLEYLEK, Vincent RIJMEN, Kemal AKKANAT, Muharrem Tolga SAKALLI

Reliability comparisons of mobile network operators: an experimental case study from a crowdsourced dataset

Ahmet YILDIRIM, Engin ZEYDAN

Optimal fractional-order PID controller of inverter-based power plants for power systems LFO damping

Soodabeh SOLEYMANI, Gevork B. GHAREHPETIAN, Mahdi SAADATMAND, Babak MOZAFARI

Dynamically updated diversified ensemble-based approach for handling concept drift

Shalini BATRA, Kanu GOEL

Context-aware system for glycemic control in diabetic patients using neural networks

Owais BHAT, Dawood A. KHAN

Operation scheme for MMC-based STATCOM using modified instantaneous symmetrical components

Qing DUAN, Chunyan MA, Guanglin SHA, Zhen LI, Caihong ZHAO, Wanxing SHENG, Penghua LI

A power and area efficient approximate carry skip adder for error resilient applications

Shireesh Kumar RAI, Sujit Kumar PATEL, Bharat GARG

Detailed modeling of a thermoelectric generator for maximum power point tracking

Yusuf ÇOBAN, Hayati MAMUR