Monitoring Approach of Cyber-Physical Systems by Quality Measures

  • Pedro Merino LasoEmail author
  • David Brosset
  • John Puentes
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 205)


Modern cities, industrial plants, cars, trucks, and vessels, among others, make extensive use of cyber-physical systems and sensors. These systems are very critical and contribute to assist decision making. Large data streams are thus produced and analyzed to extract information that allows building knowledge through a set of principles called wisdom. However, because of multiple imperfections, as well as intrinsic, contextual, and extrinsic conditions that alter data, the quality of the generated streams must be evaluated, to determine how relevant they are for decision support. This paper presents a methodology to monitor cyber-physical systems by quality estimation, which defines suitable evaluation characteristics for pertinent analysis. Quality assessment is defined for data imperfections, information dimensions, knowledge factors, and wisdom aspects. The case study of a cyber-physical network of a liquid container training platform is presented in detail, to show how the approach can be applied. Obtained measures are multidimensional, heterogeneous, and variable.


Monitoring Sensor data processing Multi-source sensor network Cyber-physical system Data quality Information quality 


  1. 1.
    Batini, C., Scannapieco, M.: Data Quality: Concepts, Methodologies and Techniques. Data-Centric Systems and Applications. Springer, New York (2006)zbMATHGoogle Scholar
  2. 2.
    De Amicis, B.: A methodology for data quality assessment on financial data. Stud. Commun. Sci. 4, 115–136 (2004)Google Scholar
  3. 3.
    English, L.P.: Improving Data Warehouse and Business Information Quality: Methods for Reducing Costs and Increasing Profits. Wiley, New York (1999)Google Scholar
  4. 4.
    Guo, J., Liu, F.: Automatic data quality control of observations in wireless sensor network. IEEE Geosci. Remote Sens. Lett. 12(4), 716–720 (2015)CrossRefGoogle Scholar
  5. 5.
    Lee, Y.W., Strong, D.M., Kahn, B.K., Wang, R.Y.: AIMQ: a methodology for information quality assessment. Inf. Manag. 40(2), 133–146 (2002)CrossRefGoogle Scholar
  6. 6.
    Loshin, D.: Enterprise Knowledge Management. The Data Quality Approach. Academic Press, San Diego (2001)Google Scholar
  7. 7.
    Motro, A., Smets, P.: Uncertainty Management in Information Systems: From Needs to Solutions. Springer Science & Business Media, New York (1996)zbMATHGoogle Scholar
  8. 8.
    Pipino, L.L., Lee, Y.W., Wang, R.Y.: Data quality assessment. Commun. ACM 45(4), 211–218 (2002)CrossRefGoogle Scholar
  9. 9.
    Puentes, J., Montagner, J., Lecornu, L., Lähteenmäki, J.: Quality analysis of sensors data for personal health records on mobile devices. In: Bali, R., Troshani, I., Goldberg, S., Wickramasinghe, N. (eds.) Pervasive Health Knowledge Management. Healthcare Delivery in the Information Age, pp. 103–133. Springer, New York (2013)CrossRefGoogle Scholar
  10. 10.
    Scannapieco, M., Virgillito, A., Marchetti, C., Mecella, M., Baldoni, R.: The DaQuinCIS architecture: a platform for exchanging and improving data quality in cooperative information systems. Inf. Syst. 29(7), 551–582 (2004)CrossRefGoogle Scholar
  11. 11.
    Todoran, I.-G., Lecornu, L., Khenchaf, A., Le Caillec, J.-M.: Information quality evaluation in fusion systems. In: 16th International Conference on Information Fusion (FUSION), pp. 906–913, July 2013Google Scholar
  12. 12.
    Wang, R.Y., Strong, D.M.: Beyond accuracy: what data quality means to data consumers. J. Manag. Inf. Syst. 12(4), 5–33 (1996)CrossRefGoogle Scholar
  13. 13.
    Zeleny, M.: Human Systems Management: Integrating Knowledge, Management and Systems. World Scientific Publishing Co., Pte. Ltd., London (2005)Google Scholar
  14. 14.
    Zins, C.: Conceptual approaches for defining data, information, and knowledge. J. Am. Soc. Inform. Sci. Technol. 58(4), 479–493 (2007)CrossRefGoogle Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2017

Authors and Affiliations

  • Pedro Merino Laso
    • 1
    Email author
  • David Brosset
    • 1
    • 2
  • John Puentes
    • 1
    • 3
  1. 1.Chair of Naval Cyber DefenseÉcole navale - CC 600Brest Cedex 9France
  2. 2.Naval Academy Research InstituteÉcole navale - CC 600Brest Cedex 9France
  3. 3.Département ITI - Institut Mines-TelecomTelecom Bretagne Lab-STICC UMR CNRS 6285 Équipe DECIDE, CS 83818BrestFrance

Personalised recommendations