Skip to main content

Pattern Detection in Extremely Resource-Constrained Devices

  • Chapter

Part of the book series: Studies in Computational Intelligence ((SCI,volume 347))

Abstract

Pervasive computing anticipates a future with billions of data producing devices of varying capabilities integrated into everyday objects or deployed in the physical world. In event-based systems, such devices are required to make timely autonomous decisions in response to occurrences, situations or states. Purely decentralised pattern detection in systems that lack time synchronisation, reliable communication links and continuous power remains an active and open research area. We review challenges and solutions for pattern detection in distributed networked sensing systems without a reliable core infrastructure. Specifically, we discuss localised pattern detection in resource-constrained devices that compriseWireless Sensor and Actuator Networks. We focus on online data mining, statistical and machine learning approaches that aim to augment decentralised pattern detection and illustrate the properties of this new computing paradigm that requires stability and robustness while accommodating severe resource limitations and frequent failures.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Basha, E.A., Ravela, S., Rus, D.: Model-based monitoring for early warning flood detection. In: SenSys 2008: Proceedings of the 6th ACM conference on Embedded network sensor systems, pp. 295–308. ACM, New York (2008)

    Chapter  Google Scholar 

  2. Bettencourt, L.M.A., Hagberg, A.A., Larkey, L.B.: Separating the wheat from the chaff: practical anomaly detection schemes in ecological applications of distributed sensor networks. In: Aspnes, J., Scheideler, C., Arora, A., Madden, S. (eds.) DCOSS 2007. LNCS, vol. 4549, pp. 223–239. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  3. Bose, R.: Information theory, coding and cryptography. Tata McGraw-Hill, New York (2002)

    Google Scholar 

  4. Branch, J., Szymanski, B., Giannella, C., Wolff, R., Kargupta, H.: In-network outlier detection in wireless sensor networks. In: 26th IEEE International Conference on Distributed Computing Systems, ICDCS 2006, pp. 51–59 (2006)

    Google Scholar 

  5. Bu, Y., Chen, L., Fu, A.W.-C., Liu, D.: Efficient anomaly monitoring over moving object trajectory streams. In: KDD 2009: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 159–168 (2009)

    Google Scholar 

  6. Castano, R., Wagstaff, K.L., Chien, S., Stough, T.M., Tang, B.: On-board analysis of uncalibrated data for a spacecraft at mars. In: KDD 2007: Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 922–930 (2007)

    Google Scholar 

  7. Chandola, V., Banerjee, A., Kumar, V.: Anomaly Detection: A Survey. ACM Computing Surveys (2009)

    Google Scholar 

  8. Cheng, Y.: Mean Shift, Mode Seeking, and Clustering. IEEE Trans. Pattern Anal. Mach. Intell. 17(8), 790–799 (1995)

    Article  Google Scholar 

  9. Chin, J.-C., Yau, D.K.Y., Rao, N.S.V., Yang, Y., Ma, C.Y.T., Shankar, M.: Accurate localization of low-level radioactive source under noise and measurement errors. In: SenSys 2008: Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems, pp. 183–196. ACM, New York (2008)

    Chapter  Google Scholar 

  10. Desnoyers, P., Ganesan, D., Li, H., Li, M., Shenoy, P.: PRESTO: A predictive storage architecture for sensor networks. In: Tenth Workshop on Hot Topics in Operating Systems, HotOS X (2005)

    Google Scholar 

  11. Drozda, M., Schaust, S., Szczerbicka, H.: Is AIS based misbehavior detection suitable for wireless sensor networks. In: Proc. IEEE Wireless Communications and Networking Conference (WCNC), Citeseer (2007)

    Google Scholar 

  12. Durkin, J., Tallo, D., Petrik, E.J.: FIDEX: An expert system for satellite diagnostics. In: In its Space Communications Technology Conference: Onboard Processing and Switching, pp. 143–152 (1991) (see N92-14202 05-32)

    Google Scholar 

  13. Dutta, R., Dutta, R.: Maximum Probability Rule based classification of MRSA infections in hospital environment: Using electronic nose. Sensors and Actuators B: Chemical 120(1), 156–165 (2006)

    Article  Google Scholar 

  14. Faloutsos, C., Ranganathan, M., Manolopoulos, Y.: Fast subsequence matching in time-series databases. SIGMOD Rec. 23(2), 419–429 (1994)

    Article  Google Scholar 

  15. Fujimaki, R., Yairi, T., Machida, K.: An approach to spacecraft anomaly detection problem using kernel feature space. In: KDD 2005: Proceedings of the eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, pp. 401–410 (2005)

    Google Scholar 

  16. Gusfield, D.: Algorithms on Strings, Trees and Sequences: Computer Science and Computational Biology. Cambridge University Press, Cambridge (1997)

    Book  MATH  Google Scholar 

  17. Hamid, R., Maddi, S., Bobick, A., Essa, I.: Unsupervised analysis of activity sequences using event-motifs. In: VSSN 2006: Proceedings of the 4th ACM International Workshop on Video Surveillance and Sensor Networks, pp. 71–78 (2006)

    Google Scholar 

  18. Hawkins, D.M.: Identification of outliers. Monographs on applied probability and statistics. Chapman and Hall, Boca Raton (1980)

    MATH  Google Scholar 

  19. Huang, L., Garofalakis, M., Hellerstein, J., Joseph, A., Taft, N.: Toward sophisticated detection with distributed triggers. In: MineNet 2006: Proceedings of the 2006 SIGCOMM workshop on Mining network data, pp. 311–316. ACM, New York (2006)

    Chapter  Google Scholar 

  20. Intel. Lab Data, Berkeley (2004), http://db.csail.mit.edu/labdata/labdata.html

  21. Janakiram, D., Reddy, V.A., Kumar, A.: Outlier detection in wireless sensor networks using bayesian belief networks. In: First International Conference on Communication System Software and Middleware, Comsware 2006, pp. 1–6 (2006)

    Google Scholar 

  22. Karpi´nski, M., Cahill, V.: Stream-based macro-programming of wireless sensor, actuator network applications with SOSNA. In: DMSN 2008: Proceedings of the 5th workshop on Data management for sensor networks, pp. 49–55. ACM, New York (2008)

    Chapter  Google Scholar 

  23. Keogh, E., Lin, J., Fu, A.: HOT SAX: Efficiently Finding the Most Unusual Time Series Subsequence. In: IEEE International Conference on Data Mining, pp. 226–233 (2005)

    Google Scholar 

  24. Keogh, E., Lonardi, S., Ratanamahatana, C.A.: Towards parameter-free data mining. In: KDD 2004: Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 206–215. ACM, New York (2004)

    Chapter  Google Scholar 

  25. Kompis, C., Aliwell, S.: Energy Harvesting Technologies to Enable Wireless and Remote Sensing — Sensors & Instrumentation KTN Action Group Report (June 2008), http://server.quid5.net/~koumpis/pubs/pdf/energyharvesting08.pdf

  26. Krishnamachari, B.: Networking Wireless Sensors. Cambridge University Press, Cambridge (2005)

    Book  Google Scholar 

  27. Lane, T., Brodley, C.E.: Temporal sequence learning and data reduction for anomaly detection. ACM Trans. Inf. Syst. Secur. 2(3), 295–331 (1999)

    Article  Google Scholar 

  28. Levis, P., Culler, D.: Maté: A Tiny Virtual Machine for Sensor Networks. In: ASPLOS-X: Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems, New York, NY, USA, pp. 85–95 (2002)

    Google Scholar 

  29. Levis, P., Patel, N., Culler, D., Shenker, S.: Trickle: a self-regulating algorithm for code propagation and maintenance in wireless sensor networks. In: NSDI 2004: Proceedings of the 1st Conference on Symposium on Networked Systems Design and Implementation, vol. 2, USENIX Association, Berkeley (2004)

    Google Scholar 

  30. Lin, J., Keogh, E., Lonardi, S., Chiu, B.: A symbolic representation of time series, with implications for streaming algorithms. In: DMKD 2003: Proceedings of the 8th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery, pp. 2–11. ACM, New York (2003)

    Chapter  Google Scholar 

  31. Loo, C.E., Ng, M.Y., Leckie, C., Palaniswami, M.: Intrusion detection for routing attacks in sensor networks. International Journal of Distributed Sensor Networks 2(4), 313–332 (2006)

    Article  Google Scholar 

  32. Oza, N., Schwabacher, M., Matthews, B.: Unsupervised Anomaly Detection for Liquid-Fueled Rocket Propulsion Health Monitoring. Journal of Aerospace Computing, Information, and Communication 6(7), 464–482 (2007)

    Google Scholar 

  33. Ma, J., Perkins, S.: Online novelty detection on temporal sequences. In: KDD 2003: Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 613–618. ACM, New York (2003)

    Chapter  Google Scholar 

  34. Madden, S., Franklin, M.J., Hellerstein, J.M., Hong, W.: The design of an acquisitional query processor for sensor networks. In: SIGMOD 2003: Proceedings of the 2003 ACM SIGMOD international conference on Management of data, pp. 491–502. ACM, New York (2003)

    Chapter  Google Scholar 

  35. Markou, M., Singh, S.: Novelty detection: a review–part 1: statistical approaches. Signal Processing 83(12), 2481–2497 (2003)

    Article  MATH  Google Scholar 

  36. Patnaik, D., Marwah, M., Sharma, R., Ramakrishnan, N.: Sustainable operation and management of data center chillers using temporal data mining. In: KDD 2009: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 1305–1314 (2009)

    Google Scholar 

  37. Rajasegarar, S., Bezdek, J.C., Leckie, C., Palaniswami, M.: Elliptical anomalies in wireless sensor networks. ACM Trans. Sen. Netw. 6(1), 1–28 (2009)

    Article  Google Scholar 

  38. Intel Research. WISP: Wireless Identification and Sensing Platform (2008), http://seattle.intel-research.net/wisp/

  39. Roundy, S., Wright, P.-K., Rabaey, J.: Energy Scavenging for Wireless Sensor Networks: with Special Focus on Vibrations, 1st edn. Springer, Heidelberg (2003)

    Google Scholar 

  40. MoteIV (later renamed to Sentilla). TMote Sky Datasheets and Downloads (2008), http://www.sentilla.com/pdf/eol/tmote-sky-datasheet.pdf

  41. Shi, L., Janeja, V.P.: Anomalous window discovery through scan statistics for linear intersecting paths (SSLIP). In: KDD 2009: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 767–776 (2009)

    Google Scholar 

  42. Sipser, M.: Introduction to the Theory of Computation. PWS Pub Co, Boston (1996)

    Google Scholar 

  43. Song, X., Wu, M., Jermaine, C., Ranka, S.: Statistical change detection for multi-dimensional data. In: KDD 2007: Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 667–676. ACM, New York (2007)

    Chapter  Google Scholar 

  44. Stiefmeier, T., Roggen, D., Tröster, G.: Gestures are strings: efficient online gesture spotting and classification using string matching. In: BodyNets 2007: Proceedings of the ICST 2nd international conference on Body area networks, pp. 1–8 (2007)

    Google Scholar 

  45. Subramaniam, S., Palpanas, T., Papadopoulos, D., Kalogeraki, V., Gunopulos, D.: Online Outlier Detection in Sensor Data Using Non-Parametric Models. In: Dayal, U., Whang, K.-Y., Lomet, D.B., Alonso, G., Lohman, G.M., Kersten, M.L., Cha, S.K., Kim, Y.-K. (eds.) VLDB, pp. 187–198. ACM, New York (2006)

    Google Scholar 

  46. Riverside University of California. The UCR Time Series Data Mining Archive (2008), http://www.cs.ucr.edu/~eamonn/TSDMA

  47. Vatturi, P., Wong, W.-K.: Category detection using hierarchical mean shift. In: KDD 2009: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 847–856 (2009)

    Google Scholar 

  48. Wagner, W.P.: Issues in knowledge acquisition. In: SIGBDP 1990: Proceedings of the 1990 ACM SIGBDP conference on Trends and directions in expert systems, pp. 247–261 (1990)

    Google Scholar 

  49. Welch, G., Bishop, G.: An Introduction to the Kalman Filter. Technical Report 95-041. Chapel Hill, NC, USA (1995)

    Google Scholar 

  50. Werner-Allen, G., Dawson-Haggerty, S., Welsh, M.: Lance: optimizing high-resolution signal collection in wireless sensor networks. In: SenSys 2008: Proceedings of the 6th ACM conference on Embedded network sensor systems, New York, NY, USA, pp. 169–182 (2008)

    Google Scholar 

  51. Xue, W., Luo, Q., Chen, L., Liu, Y.: Contour map matching for event detection in sensor networks. In: SIGMOD 2006: Proceedings of the 2006 ACM SIGMOD international conference on Management of data, pp. 145–156. ACM, New York (2006)

    Chapter  Google Scholar 

  52. Zhang, J., Wang, H.: Detecting outlying subspaces for high-dimensional data: the new task, algorithms, and performance. Knowledge and Information Systems 10(3), 333–355 (2006)

    Article  Google Scholar 

  53. Zoumboulakis, M., Roussos, G.: Efficient pattern detection in extremely resource-constrained devices. In: SECON 2009: Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 10–18 (2009)

    Google Scholar 

  54. Zoumboulakis, M., Roussos, G.: Estimation of Pollutant-Emitting Point-Sources Using Resource-Constrained Sensor Networks. In: Trigoni, N., Markham, A., Nawaz, S. (eds.) GSN 2009. LNCS, vol. 5659, pp. 21–30. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  55. Zoumboulakis, M., Roussos, G.: In-network Pattern Detection on Intel WISPs (Demo Abstract). In: Proceedings of Wireless Sensing Showcase (2009)

    Google Scholar 

  56. Zoumboulakis, M., Roussos, G.: Integer-Based Optimisations for Resource-Constrained Sensor Platforms. In: Hailes, S., Sicari, S., Roussos, G. (eds.) S-CUBE 2009. LNICIST, vol. 24, pp. 144–157. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Zoumboulakis, M., Roussos, G. (2011). Pattern Detection in Extremely Resource-Constrained Devices. In: Helmer, S., Poulovassilis, A., Xhafa, F. (eds) Reasoning in Event-Based Distributed Systems. Studies in Computational Intelligence, vol 347. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19724-6_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-19724-6_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-19723-9

  • Online ISBN: 978-3-642-19724-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics