skip to main content
research-article

A Framework of Mining Trajectories from Untrustworthy Data in Cyber-Physical System

Published: 17 February 2015 Publication History

Abstract

A cyber-physical system (CPS) integrates physical (i.e., sensor) devices with cyber (i.e., informational) components to form a context-sensitive system that responds intelligently to dynamic changes in real-world situations. The CPS has wide applications in scenarios such as environment monitoring, battlefield surveillance, and traffic control. One key research problem of CPS is called mining lines in the sand. With a large number of sensors (sand) deployed in a designated area, the CPS is required to discover all trajectories (lines) of passing intruders in real time. There are two crucial challenges that need to be addressed: (1) the collected sensor data are not trustworthy, and (2) the intruders do not send out any identification information. The system needs to distinguish multiple intruders and track their movements. This study proposes a method called LiSM (Line-in-the-Sand Miner) to discover trajectories from untrustworthy sensor data. LiSM constructs a watching network from sensor data and computes the locations of intruder appearances based on the link information of the network. The system retrieves a cone model from the historical trajectories to track multiple intruders. Finally, the system validates the mining results and updates sensors’ reliability scores in a feedback process. In addition, LoRM (Line-on-the-Road Miner) is proposed for trajectory discovery on road networks—mining lines on the roads. LoRM employs a filtering-and-refinement framework to reduce the distance computational overhead on road networks and uses a shortest-path-measure to track intruders. The proposed methods are evaluated with extensive experiments on big datasets. The experimental results show that the proposed methods achieve higher accuracy and efficiency in trajectory mining tasks.

References

[1]
Anish Arora, Prabal Dutta, Sandip Bapat, Vinod Kulathumani, Hongwei Zhang, Vinayak Naik, Vineet Mittal, Hui Cao, Murat Demirbas, Mohamed G. Gouda, Young-ri Choi, Ted Herman, Sandeep S. Kulkarni, Umamaheswaran Arumugam, Mikhail Nesterenko, Adnan Vora, and Mark Miyashita. 2004. A line in the sand: A wireless sensor network for target detection, classification, and tracking. Computer Networks 46, 5, 605--634.
[2]
Javed Aslam, Zack Butler, Florin Constantin, Valentino Crespi, George Cybenko, and Daniela Rus. 2003. Tracking a moving object with a binary sensor network. In Proceedings of the 1st International Conference on Embedded Networked Sensor Systems. 150--161.
[3]
Sotiris Brakatsoulas, Dieter Pfoser, Randall Salas, and Carola Wenk. 2005. On map-matching vehicle tracking data. In Proceedings of the 31st International Conference on Very Large Data Bases. 853--864.
[4]
Volkan Cevher and Lance M. Kaplan. 2007. Acoustic sensor network design for position estimation. In ACM Transactions on Sensor Networks 5, 3, Article No. 21.
[5]
Valentino Crespi, George Cybenko, and Guofei Jiang. 2008. The theory of trackability with applications to sensor networks. ACM Transaction on Sensor Networks 4, 3, Article No. 16.
[6]
Raghu K. Ganti, Yu-En Tsai, and Tarek F. Abdelzaher. 2008. SenseWorld: Towards cyber-physical social networks. In Proceedings of the International Conference on Information Processing in Sensor Networks. 563--564.
[7]
Oliviu Ghica, Goce Trajcevski, Fan Zhou, Roberto Tamassia, and Peter Scheuermann. 2010. Selecting tracking principals with epoch awareness. In Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems. 222--231.
[8]
Joshua Greenfeld. 2002. Matching GPS observations to locations on a digital map. In Proceedings of the 81st Annual Meeting of the Transportation Research Board.
[9]
Moustafa A. Hammad, Walid G. Aref, and Ahmed K. Elmagarmid. 2003. Stream window join: Tracking moving objects in sensor network databases. In Proceedings of the 15th International Conference on Scientific and Statistical Database Management. 75--84.
[10]
Mark Hewish. 2001. Reformatting fighter tactics. In Jane’s International Defense Review.
[11]
Britta Hummel and Karin Tischler. 2005. GPS-only map matching: Exploiting vehicle position history, driving restriction information and road network topology in a statistical framework. In Proceedings of the GIS Research UK Conference.
[12]
Inseok Hwang, Hamsa Balakrishnan, Kaushik Roy, and Claire Tomlin. 2004. Multiple-target tracking and identity management in clutter, with application to aircraft tracking. In Proceedings of the 2004 American Control Conference. 3422--3428.
[13]
Taylor Johnson and Sayan Mitra. 2009. Handling failures in cyber-physical systems: Potential directions. In Proceedings of the Real-Time Systems Symposium.
[14]
Tim Krout. 2007. CB MANET scenario data distribution. In BBN Technique Report.
[15]
Bart Kuijpers, Harvey J. Miller, Tijs Neutens, and Walied Othman. 2010. Anchor uncertainty and space-time prisms on road networks. International Journal of Geographical Information Science 24, 8, 1223--1248.
[16]
Bart Kuijpers and Walied Othman. 2010. Trajectory databases: Data models, uncertainty and complete query languages. Journal of Computer and System Sciences 76, 7, 538--560.
[17]
Xu Li, Rongxing Lu, Xiaohui Liang, Xuemin Shen, Jiming Chen, and Xiaodong Lin. 2011b. Smart community: An internet of things application. IEEE Communications Magazine 49, 11, 68--75.
[18]
Zhenhui Li, Jiawei Han, Ming Ji, Lu An Tang, Yintao Yu, Bolin Ding, Jae-Gil Lee, and Roland Kays. 2011a. MoveMine: Mining moving object data for discovery of animal movement patterns. ACM Transactions on Intelligent Systems and Technology 2, 4, Article No. 37.
[19]
Chih-Yu Lin, Wen-Chih Peng, and Yu-Chee Tseng. 2006. Efficient in-network moving object tracking in wireless sensor network. IEEE Transactions on Mobile Computing 5, 8, 1044--1056.
[20]
Juan Liu, Maurice Chu, Jie Liu, Jim Reich, and Feng Zhao. 2004. Distributed state representation for tracking problems in sensor networks. In Proceedings of the 3rd Workshop on Information Processing in Sensor Networks. 234--242.
[21]
Chia-Hao Lo, Wen-Chih Peng, Chien-Wen Chen, Ting-Yu Lin, and Chun-Shuo Lin. 2008. CarWeb: A traffic data collection platform. In Proceedings of the 9th International Conference on Mobile Data Management. 221--222.
[22]
Fillia Makedon, Zhengyi Le, Heng Huang, Eric Becker, and Dimitrios Kosmopoulos. 2009. An event driven framework for assistive CPS environments. ACM SIGBED Review 6, 2, Article No. 3.
[23]
National Science Foundation. 2008. Cyber-physical systems. In Program Announcements and Information.
[24]
Songhwai Oh, Stuart Russell, and Shankar Sastry. 2009. Markov chain Monte Carlo data association for multi-target tracking. IEEE Transactions on Automatic Control 54, 3, 481--497.
[25]
Onur Ozdemir, Ruixin Niu, and Pramod K. Varshney. 2009. Tracking in wireless sensor networks using particle filtering: Physical layer considerations. IEEE Transactions on Signal Processing 57, 5, 1987--1999.
[26]
Rong Pan, Junhui Zhao, Vincent Wenchen Zheng, Jeffrey Junfeng Pan, Dou Shen, Sinno Jialin Pan, and Qiang Yang. 2007b. Domain constrained semi-supervised mining of tracking models in sensor networks. In Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 1023--1027.
[27]
Sinno Jialin Pan, James T. Kwok, Qiang Yang, and Jeffrey Junfeng Pan. 2007a. Adaptive localization in a dynamic WiFi environment through multi-view learning. In Proceedings of the 22nd National Conference on Artificial Intelligence (AAAI’07). 1108--1113.
[28]
Dieter Pfoser and Christian S. Jensen. 1999. Capturing the uncertainty of moving-object representations. In Proceedings of the 6th International Symposium on Advances in Spatial Databases (SSD’09). 111--132.
[29]
Oliver Pink and Britta Hummel. 2008. A statistical approach to map matching using road network geometry, topology and vehicular motion constraints. In Proceedings of the 11th International IEEE Conference on Intelligent Transportation Systems. 862--867.
[30]
Lui Sha, Sathish Gopalakrishnan, Xue Liu, and Qixin Wang. 2008. Cyber-physical systems: A new frontier. In Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. 1--9.
[31]
Xiaohong Sheng and Yu-Hen Hu. 2005. Maximum likelihood multiple source localization using acoustic energy measurements with wireless sensor networks. IEEE Transactions on Signal Processing. 44--53.
[32]
Fikret Sivrikaya and Bülent Yener. 2004. Time synchronization in sensor networks: A survey. IEEE Network 18, 4, 45--50.
[33]
Robert Szewczyk, Joseph Polastre, Alan Mainwaring, and David Culler. 2004. Lessons from a sensor network expedition. In Wireless Sensor Networks. Lecture Notes in Computer Science, Vol. 2920. Springer, 307--322.
[34]
Lu-An Tang, Quanquan Gu, Xiao Yu, Jiawei Han, Thomas La Porta, Alice Leung, Tarek Abdelzaher, and Lance Kaplan. 2012a. IntruMine: Mining intruders in untrustworthy data of cyber-physical systems. In Proceedings of the SIAM International Conference on Data Mining (SDM).
[35]
Lu-An Tang, Xiao Yu, Quanquan Gu, Jiawei Han, Alice Leung, and Thomas La Porta. 2013. Mining lines in the sand: On trajectory discovery from untrustworthy data in cyber-physical system. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.
[36]
Lu-An Tang, Xiao Yu, Sangkyum Kim, Quanquan Gu, Jiawei Han, Alice Leung, and Thomas La Porta. 2012b. Trustworthiness analysis of sensor data in cyber-physical systems. Journal of Computer and System Sciences 79, 3, 383--401.
[37]
Lu-An Tang, Xiao Yu, Sangkyum Kim, Jiawei Han, Chih-Chieh Hung, and Wen-Chih Peng. 2010. Tru-Alarm: Trustworthiness analysis of sensor networks in cyber-physical systems. In Proceedings of the 2010 IEEE 10th International Conference on Data Mining. 1079--1084.
[38]
Gilman Tolle, Joseph Polastre, Robert Szewczyk, David E. Culler, Neil Turner, Kevin Tu, Stephen Burgess, Todd Dawson, Philip Buonadonna, David Gay, and Wei Hong. 2005. A macroscope in the redwoods. In Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems. 51--63.
[39]
Goce Trajcevski, Oliviu Ghica, and Peter Scheuermann. 2010. Tracking-based trajectory data reduction in wireless sensor networks. In Proceedings of the 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. 99--106.
[40]
Goce Trajcevski, Ouri Wolfson, Klaus Hinrichs, and Sam Chamberlain. 2004. Managing uncertainty in moving objects databases. ACM Transactions on Database Systems 29, 3, 463--507.
[41]
Ouri Wolfson. 2002. Moving objects information management: The database challenge. In Proceedings of the 5th International Workshop on Next Generation Information Technologies and Systems. 75--89.
[42]
Huabei Yin and Ouri Wolfson. 2004. A weight-based map matching method in moving objects databases. In Proceedings of the 16th International Conference on Scientific and Statistical Database Management. 437--438.
[43]
Kai Zheng, Goce Trajcevski, Xiaofang Zhou, and Peter Scheuermann. 2011. Probabilistic range queries for uncertain trajectories on road networks. In Proceedings of the 14th International Conference on Extending Database Technology. 283--294.
[44]
Yu Zheng and Xiaofang Zhou. 2011. Computing with Spatial Trajectories. Springer.
[45]
Ziguo Zhong, Ting Zhu, Dan Wang, and Tian He. 2009. Tracking with unreliable node sequences. In Proceedings of IEEE INFOCOM. 1215--1223.

Cited By

View all
  • (2022)Efficient Mobile Location Tracking and Data Reduction for Proximity Detection ApplicationsIEEE Access10.1109/ACCESS.2022.322997110(134172-134182)Online publication date: 2022
  • (2021)Passive BLE Sensing for Indoor Pattern Recognition and TrackingProcedia Computer Science10.1016/j.procs.2021.07.028191(223-229)Online publication date: 2021
  • (2020)A systematic review of cyber-resilience assessment frameworksComputers & Security10.1016/j.cose.2020.101996(101996)Online publication date: Aug-2020
  • Show More Cited By

Index Terms

  1. A Framework of Mining Trajectories from Untrustworthy Data in Cyber-Physical System

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Knowledge Discovery from Data
    ACM Transactions on Knowledge Discovery from Data  Volume 9, Issue 3
    TKDD Special Issue (SIGKDD'13)
    April 2015
    313 pages
    ISSN:1556-4681
    EISSN:1556-472X
    DOI:10.1145/2737800
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 17 February 2015
    Accepted: 01 September 2014
    Revised: 01 July 2014
    Received: 01 October 2013
    Published in TKDD Volume 9, Issue 3

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Cyber-physical system
    2. sensor network
    3. trajectory

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    • National Science Foundation IIS-1017362, IIS-1320617, and IIS-1354329
    • Army Research Office under Cooperative Agreement No. W911NF-13-1-0193
    • U.S. Army Research Lab under Cooperative Agreement No. W911NF-09-2-0053 (NSCTA)
    • HDTRA1-10-1-0120
    • DHS-IDS Center for Multimodal Information Access and Synthesis at UIUC
    • MIAS

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)5
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 23 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Efficient Mobile Location Tracking and Data Reduction for Proximity Detection ApplicationsIEEE Access10.1109/ACCESS.2022.322997110(134172-134182)Online publication date: 2022
    • (2021)Passive BLE Sensing for Indoor Pattern Recognition and TrackingProcedia Computer Science10.1016/j.procs.2021.07.028191(223-229)Online publication date: 2021
    • (2020)A systematic review of cyber-resilience assessment frameworksComputers & Security10.1016/j.cose.2020.101996(101996)Online publication date: Aug-2020
    • (2018)A Data Cleaning Method for Big Trace Data Using Movement ConsistencySensors10.3390/s1803082418:3(824)Online publication date: 9-Mar-2018
    • (2018)Towards Reliable Storage for Cloud Systems with Selective Data Encryption and Splitting StrategyAdvances in Data Science10.1007/978-981-13-3582-2_5(61-74)Online publication date: 29-Nov-2018
    • (2017)Cyber Physical System (CPS)-Based Industry 4.0: A SurveyJournal of Industrial Integration and Management10.1142/S242486221750014202:03(1750014)Online publication date: Sep-2017
    • (2017)Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud ComputingIEEE Transactions on Big Data10.1109/TBDATA.2017.2705807(1-1)Online publication date: 2017

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media