Remote Anomaly Detection in Industry 4.0 Using Resource-Constrained Devices

被引:2
|
作者
Kalor, Anders E. [1 ]
Michelsanti, Daniel [1 ]
Chiariotti, Federico [1 ]
Tan, Zheng-Hua [1 ]
Popovski, Petar [1 ]
机构
[1] Aalborg Univ, Dept Elect Syst, Aalborg, Denmark
关键词
Remote monitoring; anomaly detection; source coding; channel coding;
D O I
10.1109/SPAWC51858.2021.9593188
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A central use case for the Internet of Things (IoT) is the adoption of sensors to monitor physical processes, such as the environment and industrial manufacturing processes, where they provide data for predictive maintenance, anomaly detection, or similar. The sensor devices are typically resource-constrained in terms of computation and power, and need to rely on cloud or edge computing for data processing. However, the capacity of the wireless link and their power constraints limit the amount of data that can be transmitted to the cloud. While this is not problematic for the monitoring of slowly varying processes such as temperature, it is more problematic for complex signals such as those captured by vibration and acoustic sensors. In this paper, we consider the specific problem of remote anomaly detection based on signals that fall into the latter category over wireless channels with resource-constrained sensors. We study the impact of source coding on the detection accuracy with both an anomaly detector based on Principal Component Analysis (PCA) and one based on an autoencoder. We show that the coded transmission is beneficial when the signal-to-noise ratio (SNR) of the channel is low, while uncoded transmission performs best in the high SNR regime.
引用
收藏
页码:251 / 255
页数:5
相关论文
共 50 条
  • [1] Remote Gaming on Resource-Constrained Devices
    Reza, Waazim
    Kalva, Hari
    Kaufman, Richard
    [J]. APPLICATIONS OF DIGITAL IMAGE PROCESSING XXXIII, 2010, 7798
  • [2] An Affordance Detection Pipeline for Resource-Constrained Devices
    Apicella, Tommaso
    Cavallaro, Andrea
    Berta, Riccardo
    Gastaldo, Paolo
    Bellotti, Francesco
    Ragusa, Edoardo
    [J]. 2021 28TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS, AND SYSTEMS (IEEE ICECS 2021), 2021,
  • [3] Image Polarity Detection on Resource-Constrained Devices
    Ragusa, Edoardo
    Gianoglio, Christian
    Zunino, Rodolfo
    Gastaldo, Paolo
    [J]. IEEE INTELLIGENT SYSTEMS, 2020, 35 (06) : 50 - 57
  • [4] SIMPLE: A Remote Attestation Approach for Resource-constrained IoT devices
    Ammar, Mahmoud
    Crispo, Bruno
    Tsudik, Gene
    [J]. 2020 ACM/IEEE 11TH INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS (ICCPS 2020), 2020, : 247 - 258
  • [5] Efficient Pattern Detection in Extremely Resource-Constrained Devices
    Zoumboulakis, Michael
    Roussos, George
    [J]. 2009 6TH ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR, MESH AND AD HOC COMMUNICATIONS AND NETWORKS (SECON 2009), 2009, : 10 - +
  • [6] Sleep Apnea Detection System Using Machine Learning on Resource-Constrained Devices
    Mallick, Sayani
    Gawali, Shubhangi
    Onime, Clement
    Goveas, Neena
    [J]. 2023 IEEE INTERNATIONAL SYSTEMS CONFERENCE, SYSCON, 2023,
  • [7] Unobtrusive Occupancy Detection with FastGRNN on Resource-Constrained BLE Devices
    Billah, Md Fazlay Rabbi Masum
    Campbell, Bradford
    [J]. PROCEEDINGS OF THE 1ST ACMWORKSHOP ON DEVICE-FREE HUMAN SENSING (DFHS 19), 2019, : 1 - 5
  • [8] Anomaly detection on compressed data in resource-constrained smart water meters
    Klein, Sarah
    Hristoskova, Anna
    Rath, Annanda
    Gonce, Renaud
    [J]. PROCEEDINGS OF THE 2022 17TH CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENCE SYSTEMS (FEDCSIS), 2022, : 635 - 639
  • [9] Quantized autoencoder (QAE) intrusion detection system for anomaly detection in resource-constrained IoT devices using RT-IoT2022 dataset
    Sharmila, B. S.
    Nagapadma, Rohini
    [J]. CYBERSECURITY, 2023, 6 (01)
  • [10] Quantized autoencoder (QAE) intrusion detection system for anomaly detection in resource-constrained IoT devices using RT-IoT2022 dataset
    B S Sharmila
    Rohini Nagapadma
    [J]. Cybersecurity, 6