skip to main content
10.1145/2487575.2487585acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

Mining lines in the sand: on trajectory discovery from untrustworthy data in cyber-physical system

Published: 11 August 2013 Publication History

Abstract

A Cyber-Physical System (CPS) integrates physical (i.e., sensor) devices with cyber (i.e., informational) components to form a context sensitive system that responds intelligently to dynamic changes in real-world situations. The CPS has wide applications in scenarios such as environment monitoring, battlefield surveillance and traffic control. One key research problem of CPS is called "mining lines in the sand". With a large number of sensors (sand) deployed in a designated area, the CPS is required to discover all the trajectories (lines) of passing intruders in real time. There are two crucial challenges that need to be addressed: (1) the collected sensor data are not trustworthy; (2) the intruders do not send out any identification information. The system needs to distinguish multiple intruders and track their movements. In this study, we propose a method called LiSM (Line-in-the-Sand Miner) to discover trajectories from untrustworthy sensor data. LiSM constructs a watching network from sensor data and computes the locations of intruder appearances based on the link information of the network. The system retrieves a cone-model from the historical trajectories and tracks multiple intruders based on this model. Finally the system validates the mining results and updates the sensor's reliability in a feedback process. Extensive experiments on big datasets demonstrate the feasibility and applicability of the proposed methods.

References

[1]
A. Arora, P. Dutta, and S. Bapat. A line in the sand: a wireless sensor network for target detection, classification, and tracking. Computer Networks, 46(5):605--634, 2004.
[2]
T. N. S. Foundation. Cyber-physical systems. In Program Announcements and Information, 2008.
[3]
M. Hewish. Reformatting fighter tactics. In Jane's International Defense Review, 2001.
[4]
I. Hwang, H. Balakrishnan, K. Roy, and C. Tomlin. Multiple-target tracking and identity management in clutter, with application to aircraft tracking. In Proceedings of the American Control Conference, 2004.
[5]
T. Krout. Cb manet scenario data distribution. In BBN Tech. Report, 2007.
[6]
X. Li, R. Lu, X. Liang, X. Shen, J. Chen, and X. Lin. Smart community: an internet of things application. IEEE Communications Magazine, 49(11), 2011.
[7]
Z. Li, J. Han, M. Ji, L. A. Tang, Y. Yu, B. Ding, J.-G. Lee, and R. Kays. Movemine: Mining moving object data for discovery of animal movement patterns. ACM Transactions on Intelligent Systems and Technology, 2(4), 2011.
[8]
C. Lin, W. Peng, and Y. Tseng. Efficient in-network moving object tracking in wireless sensor network. IEEE Transaction on Mobile Computing, 5(8), 2006.
[9]
C. Lo and W. Peng. Carweb: A traffic data collection platform. In International Conference on Mobile Data Management, 2008.
[10]
S. Oh, S. Russell, and S. Sastry. Markov chain monte carlo data association for multi-target tracking. IEEE Trans. Automat. Contr., 54(3), 2009.
[11]
O. Ozdemir, R. Niu, and P. K. Varshney. Tracking in wireless sensor network using particle filtering: Physical layer considerations. In IEEE Trans. on Signal Processing, 2009.
[12]
X. Sheng and Y. Hu. Maximum likelihood multiple source localization using acoustic energy measurements with wireless sensor networks. In IEEE Trans. on Signal Processing, 2005.
[13]
R. Szewczyk, J. Polastre, and J. Mainwaring. Lessons from a sensor network expedition. In European Workshop on Wireless Sensor Networks, 2004.
[14]
L. Tang, X. Yu, S. Kim, J. Han, C. Hung, and W. Peng. Tru-alarm: Trustworthiness analysis of sensor networks in cyber-physical systems. In ICDM, 2010.
[15]
L. A. Tang, Q. Gu, X. Yu, J. Han, T. F. L. Porta, A. Leung, T. F. Abdelzaher, and L. M. Kaplan. Intrumine: Mining intruders in untrustworthy data of cyber-physical systems. In SDM, 2012.
[16]
G. Tolle, J. Polastre, and R.Szewczyk. A macroscope in the redwoods. In The ACM Conference on Embedded Networked Sensor Systems, 2005.
[17]
Y. Zheng and X. Zhou. Computing with Spatial Trajectories. Springer, 2011.
[18]
Z. Zhong, T. Zhu, D. Wang, and T. He. Tracking with unreliable node sequences. In INFOCOM, 2009.

Cited By

View all
  • (2016)Efficient Hidden Trajectory Reconstruction from Sparse DataProceedings of the 25th ACM International on Conference on Information and Knowledge Management10.1145/2983323.2983796(821-830)Online publication date: 24-Oct-2016
  • (2015)A Framework of Mining Trajectories from Untrustworthy Data in Cyber-Physical SystemACM Transactions on Knowledge Discovery from Data10.1145/27003949:3(1-35)Online publication date: 17-Feb-2015
  • (2014)Traffic Pattern Based Data Recovery Scheme for Cyber-Physical SystemsIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences10.1587/transfun.E97.A.1926E97.A:9(1926-1936)Online publication date: 2014

Index Terms

  1. Mining lines in the sand: on trajectory discovery from untrustworthy data in cyber-physical system

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    KDD '13: Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
    August 2013
    1534 pages
    ISBN:9781450321747
    DOI:10.1145/2487575
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 August 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. cyber-physical system
    2. sensor network
    3. trajectory

    Qualifiers

    • Research-article

    Conference

    KDD' 13
    Sponsor:

    Acceptance Rates

    KDD '13 Paper Acceptance Rate 125 of 726 submissions, 17%;
    Overall Acceptance Rate 1,133 of 8,635 submissions, 13%

    Upcoming Conference

    KDD '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 02 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2016)Efficient Hidden Trajectory Reconstruction from Sparse DataProceedings of the 25th ACM International on Conference on Information and Knowledge Management10.1145/2983323.2983796(821-830)Online publication date: 24-Oct-2016
    • (2015)A Framework of Mining Trajectories from Untrustworthy Data in Cyber-Physical SystemACM Transactions on Knowledge Discovery from Data10.1145/27003949:3(1-35)Online publication date: 17-Feb-2015
    • (2014)Traffic Pattern Based Data Recovery Scheme for Cyber-Physical SystemsIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences10.1587/transfun.E97.A.1926E97.A:9(1926-1936)Online publication date: 2014

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media