Trustworthiness analysis of sensor data in cyber-physical systems

Lu An Tang, Xiao Yu, Sangkyum Kim, Quanquan Gu, Jiawei Han, Alice Leung, Thomas La Porta

Research output: Contribution to journalArticlepeer-review

48 Scopus citations

Abstract

A Cyber-Physical System (CPS) is an integration of sensor networks with informational devices. CPS can be used for many promising applications, such as traffic observation, battlefield surveillance, and sensor-network-based monitoring. One key issue in CPS research is trustworthiness analysis of sensor data. Due to technology limitations and environmental influences, the sensor data collected by CPS are inherently noisy and may trigger many false alarms. It is highly desirable to sift meaningful information from a large volume of noisy data. In this study, we propose a method called Tru-Alarm, which increases the capability of a CPS to recognize trustworthy alarms. Tru-Alarm estimates the locations of objects causing alarms, constructs an object-alarm graph and carries out trustworthiness inference based on the graph links. The study also reveals that the alarm trustworthiness and sensor reliability could be mutually enhanced. The property is used to help prune the large search space of object-alarm graph, filter out the alarms generated by unreliable sensors and improve the algorithmÊs efficiency. Extensive experiments are conducted on both real and synthetic datasets, and the results show that Tru-Alarm filters out noise and false information efficiently and effectively, while ensuring that no meaningful alarms are missed.

Original languageEnglish (US)
Pages (from-to)383-401
Number of pages19
JournalJournal of Computer and System Sciences
Volume79
Issue number3
DOIs
StatePublished - May 2013

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science
  • Computer Networks and Communications
  • Computational Theory and Mathematics
  • Applied Mathematics

Fingerprint

Dive into the research topics of 'Trustworthiness analysis of sensor data in cyber-physical systems'. Together they form a unique fingerprint.

Cite this