Remote Anomaly Detection in Industry 4.0 Using Resource-Constrained Devices

被引:2
|
作者
Kalor, Anders E. [1 ]
Michelsanti, Daniel [1 ]
Chiariotti, Federico [1 ]
Tan, Zheng-Hua [1 ]
Popovski, Petar [1 ]
机构
[1] Aalborg Univ, Dept Elect Syst, Aalborg, Denmark
关键词
Remote monitoring; anomaly detection; source coding; channel coding;
D O I
10.1109/SPAWC51858.2021.9593188
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A central use case for the Internet of Things (IoT) is the adoption of sensors to monitor physical processes, such as the environment and industrial manufacturing processes, where they provide data for predictive maintenance, anomaly detection, or similar. The sensor devices are typically resource-constrained in terms of computation and power, and need to rely on cloud or edge computing for data processing. However, the capacity of the wireless link and their power constraints limit the amount of data that can be transmitted to the cloud. While this is not problematic for the monitoring of slowly varying processes such as temperature, it is more problematic for complex signals such as those captured by vibration and acoustic sensors. In this paper, we consider the specific problem of remote anomaly detection based on signals that fall into the latter category over wireless channels with resource-constrained sensors. We study the impact of source coding on the detection accuracy with both an anomaly detector based on Principal Component Analysis (PCA) and one based on an autoencoder. We show that the coded transmission is beneficial when the signal-to-noise ratio (SNR) of the channel is low, while uncoded transmission performs best in the high SNR regime.
引用
收藏
页码:251 / 255
页数:5
相关论文
共 50 条
  • [31] An Authentication Client Proxy Mechanism for Resource-Constrained Devices
    Ohba, Yoshihiro
    Kanda, Mitsuru
    [J]. 2012 IEEE PES TRANSMISSION AND DISTRIBUTION CONFERENCE AND EXPOSITION (T&D), 2012,
  • [32] Jini lookup service for resource-constrained mobile devices
    Kim, CH
    Oh, M
    Choi, H
    [J]. PDPTA'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS 1-4, 2003, : 1575 - 1578
  • [33] A Study of Emergency Siren Recognition on Resource-Constrained Devices
    Caetano dos Santos, Davi Francisco
    Boccato, Levy
    [J]. INTELLIGENT SYSTEMS, PT II, 2022, 13654 : 154 - 168
  • [34] Runtime Classification of Mobile Malware for Resource-Constrained Devices
    Milosevic, Jelena
    Malek, Miroslaw
    Ferrante, Alberto
    [J]. E-BUSINESS AND TELECOMMUNICATIONS (ICETE 2016), 2017, 764 : 195 - 215
  • [35] Resource-Constrained Neural Architecture Search on Edge Devices
    Lyu, Bo
    Yuan, Hang
    Lu, Longfei
    Zhang, Yunye
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (01): : 134 - 142
  • [36] A Survey on Federated Learning for Resource-Constrained IoT Devices
    Imteaj, Ahmed
    Thakker, Urmish
    Wang, Shiqiang
    Li, Jian
    Amini, M. Hadi
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (01) : 1 - 24
  • [37] Attacks on Resource-Constrained IoT Devices and Security Solutions
    Sharma, Ravi
    Sharma, Nonita
    [J]. INTERNATIONAL JOURNAL OF SOFTWARE SCIENCE AND COMPUTATIONAL INTELLIGENCE-IJSSCI, 2022, 14 (01):
  • [38] A Distributed Security Mechanism for Resource-Constrained IoT Devices
    King, James
    Awad, Ali Ismail
    [J]. INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2016, 40 (01): : 133 - 143
  • [39] Distributed Execution for Resource-Constrained Mobile Consumer Devices
    Kim, Seonggun
    Rim, Heungsoon
    Han, Hwansoo
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2009, 55 (02) : 376 - 384
  • [40] Masked encryption algorithm mCrypton for resource-constrained devices
    Karpinskyy, M.
    Korkishko, L.
    Furmanyuk, A.
    [J]. IDAACS 2007: PROCEEDINGS OF THE 4TH IEEE WORKSHOP ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2007, : 628 - +