Mining lines in the sand: on trajectory discovery from untrustworthy data in cyber-physical system

  • Authors:
  • Lu-An Tang;Xiao Yu;Quanquan Gu;Jiawei Han;Alice Leung;Thomas La Porta

  • Affiliations:
  • Uniersity of Illinois at Urbana-Champaign, Champaign, Illinois, USA;Uniersity of Illinois at Urbana-Champaign, Champaign, Illinois, USA;Uniersity of Illinois at Urbana-Champaign, Champaign, Illinois, USA;Uniersity of Illinois at Urbana-Champaign, Champaign, Illinois, USA;BBN Technology, Boston, Massachusetts, USA;Pennsylvania State University, University Park, Pennsylvania, USA

  • Venue:
  • Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

A Cyber-Physical System (CPS) integrates physical (i.e., sensor) devices with cyber (i.e., informational) components to form a context sensitive system that responds intelligently to dynamic changes in real-world situations. The CPS has wide applications in scenarios such as environment monitoring, battlefield surveillance and traffic control. One key research problem of CPS is called "mining lines in the sand". With a large number of sensors (sand) deployed in a designated area, the CPS is required to discover all the trajectories (lines) of passing intruders in real time. There are two crucial challenges that need to be addressed: (1) the collected sensor data are not trustworthy; (2) the intruders do not send out any identification information. The system needs to distinguish multiple intruders and track their movements. In this study, we propose a method called LiSM (Line-in-the-Sand Miner) to discover trajectories from untrustworthy sensor data. LiSM constructs a watching network from sensor data and computes the locations of intruder appearances based on the link information of the network. The system retrieves a cone-model from the historical trajectories and tracks multiple intruders based on this model. Finally the system validates the mining results and updates the sensor's reliability in a feedback process. Extensive experiments on big datasets demonstrate the feasibility and applicability of the proposed methods.