Loading…

TrustData: Trustworthy and Secured Data Collection for Event Detection in Industrial Cyber-Physical System

In this article, an industrial cyber-physical system (ICPS) is utilized for monitoring critical events such as structural equipment conditions in industrial environments. Such a system can easily be a point of attraction for the cyberattackers, in addition to system faults, severe resource constrain...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on industrial informatics 2020-05, Vol.16 (5), p.3311-3321
Main Authors: Tao, Hai, Bhuiyan, Md Zakirul Alam, Rahman, Md Arafatur, Wang, Tian, Wu, Jie, Salih, Sinan Q., Li, Yafeng, Hayajneh, Thaier
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c291t-f94794398d5b3f2cb6cda5a30c95e1d3d3577fd40ff7b537d603e8d1960499473
cites cdi_FETCH-LOGICAL-c291t-f94794398d5b3f2cb6cda5a30c95e1d3d3577fd40ff7b537d603e8d1960499473
container_end_page 3321
container_issue 5
container_start_page 3311
container_title IEEE transactions on industrial informatics
container_volume 16
creator Tao, Hai
Bhuiyan, Md Zakirul Alam
Rahman, Md Arafatur
Wang, Tian
Wu, Jie
Salih, Sinan Q.
Li, Yafeng
Hayajneh, Thaier
description In this article, an industrial cyber-physical system (ICPS) is utilized for monitoring critical events such as structural equipment conditions in industrial environments. Such a system can easily be a point of attraction for the cyberattackers, in addition to system faults, severe resource constraints (e.g., bandwidth and energy), and environmental problems. This makes data collection in the ICPS untrustworthy, even the data are altered after the data forwarding. Without validating this before data aggregation, detection of an event through the aggregation in the ICPS can be difficult. This article introduces TrustData, a scheme for high-quality data collection for event detection in the ICPS, referred to as "Trust worthy and secured Data collection" scheme. It alleviates authentic data for accumulation at groups of sensor devices in the ICPS. Based on the application requirements, a reduced quantity of data is delivered to an upstream node, say, a cluster head. We consider that these data might have sensitive information, which is vulnerable to being altered before/after transmission. The contribution of this article is threefold. First, we provide the concept of TrustData to verify whether or not the acquired data are trustworthy (unaltered) before transmission, and whether or not the transmitted data are secured (data privacy is preserved) before aggregation. Second, we utilize a general measurement model that helps to verify acquired signal untrustworthy before transmitting toward upstream nodes. Finally, we provide an extensive performance analysis through a real-world dataset, and our results prove the effectiveness of TrustData.
doi_str_mv 10.1109/TII.2019.2950192
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_TII_2019_2950192</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8886398</ieee_id><sourcerecordid>2358912983</sourcerecordid><originalsourceid>FETCH-LOGICAL-c291t-f94794398d5b3f2cb6cda5a30c95e1d3d3577fd40ff7b537d603e8d1960499473</originalsourceid><addsrcrecordid>eNo9UE1Lw0AQXUTBWr0LXhY8p87uZpOsN4lVAwWF1nPY7AdNSZO6u1Xy793a4um9mXlvZngI3RKYEQLiYVVVMwpEzKjgEegZmhCRkgSAw3nknJOEUWCX6Mr7DQDLgYkJ2qzc3odnGeQj_qM_gwvrEcte46VRe2c0PkxxOXSdUaEdemwHh-ffpg_42YRTr-1x1evod63scDk2xiUf69G3KpbL0QezvUYXVnbe3Jxwij5f5qvyLVm8v1bl0yJRVJCQWJHmImWi0LxhlqomU1pyyUAJbohmmvE8tzoFa_OGs1xnwEyhicggFdHLpuj-uHfnhq-98aHeDHvXx5M1ZbwQhIqCRRUcVcoN3jtj651rt9KNNYH6kGgdE60PidanRKPl7mhpjTH_8qIosvgt-wVLx3JG</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2358912983</pqid></control><display><type>article</type><title>TrustData: Trustworthy and Secured Data Collection for Event Detection in Industrial Cyber-Physical System</title><source>IEEE Xplore (Online service)</source><creator>Tao, Hai ; Bhuiyan, Md Zakirul Alam ; Rahman, Md Arafatur ; Wang, Tian ; Wu, Jie ; Salih, Sinan Q. ; Li, Yafeng ; Hayajneh, Thaier</creator><creatorcontrib>Tao, Hai ; Bhuiyan, Md Zakirul Alam ; Rahman, Md Arafatur ; Wang, Tian ; Wu, Jie ; Salih, Sinan Q. ; Li, Yafeng ; Hayajneh, Thaier</creatorcontrib><description>In this article, an industrial cyber-physical system (ICPS) is utilized for monitoring critical events such as structural equipment conditions in industrial environments. Such a system can easily be a point of attraction for the cyberattackers, in addition to system faults, severe resource constraints (e.g., bandwidth and energy), and environmental problems. This makes data collection in the ICPS untrustworthy, even the data are altered after the data forwarding. Without validating this before data aggregation, detection of an event through the aggregation in the ICPS can be difficult. This article introduces TrustData, a scheme for high-quality data collection for event detection in the ICPS, referred to as "Trust worthy and secured Data collection" scheme. It alleviates authentic data for accumulation at groups of sensor devices in the ICPS. Based on the application requirements, a reduced quantity of data is delivered to an upstream node, say, a cluster head. We consider that these data might have sensitive information, which is vulnerable to being altered before/after transmission. The contribution of this article is threefold. First, we provide the concept of TrustData to verify whether or not the acquired data are trustworthy (unaltered) before transmission, and whether or not the transmitted data are secured (data privacy is preserved) before aggregation. Second, we utilize a general measurement model that helps to verify acquired signal untrustworthy before transmitting toward upstream nodes. Finally, we provide an extensive performance analysis through a real-world dataset, and our results prove the effectiveness of TrustData.</description><identifier>ISSN: 1551-3203</identifier><identifier>EISSN: 1941-0050</identifier><identifier>DOI: 10.1109/TII.2019.2950192</identifier><identifier>CODEN: ITIICH</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Agglomeration ; Data acquisition ; Data collection ; Data management ; Data privacy ; data trustworthiness ; Event detection ; fault tolerance ; industrial cyber-physical environments ; industrial event monitoring ; Informatics ; Monitoring ; privacy ; Reliability ; Security ; Trustworthiness ; Upstream</subject><ispartof>IEEE transactions on industrial informatics, 2020-05, Vol.16 (5), p.3311-3321</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c291t-f94794398d5b3f2cb6cda5a30c95e1d3d3577fd40ff7b537d603e8d1960499473</citedby><cites>FETCH-LOGICAL-c291t-f94794398d5b3f2cb6cda5a30c95e1d3d3577fd40ff7b537d603e8d1960499473</cites><orcidid>0000-0002-8221-6168 ; 0000-0002-8952-1499 ; 0000-0002-9513-9990 ; 0000-0003-4819-621X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8886398$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,54796</link.rule.ids></links><search><creatorcontrib>Tao, Hai</creatorcontrib><creatorcontrib>Bhuiyan, Md Zakirul Alam</creatorcontrib><creatorcontrib>Rahman, Md Arafatur</creatorcontrib><creatorcontrib>Wang, Tian</creatorcontrib><creatorcontrib>Wu, Jie</creatorcontrib><creatorcontrib>Salih, Sinan Q.</creatorcontrib><creatorcontrib>Li, Yafeng</creatorcontrib><creatorcontrib>Hayajneh, Thaier</creatorcontrib><title>TrustData: Trustworthy and Secured Data Collection for Event Detection in Industrial Cyber-Physical System</title><title>IEEE transactions on industrial informatics</title><addtitle>TII</addtitle><description>In this article, an industrial cyber-physical system (ICPS) is utilized for monitoring critical events such as structural equipment conditions in industrial environments. Such a system can easily be a point of attraction for the cyberattackers, in addition to system faults, severe resource constraints (e.g., bandwidth and energy), and environmental problems. This makes data collection in the ICPS untrustworthy, even the data are altered after the data forwarding. Without validating this before data aggregation, detection of an event through the aggregation in the ICPS can be difficult. This article introduces TrustData, a scheme for high-quality data collection for event detection in the ICPS, referred to as "Trust worthy and secured Data collection" scheme. It alleviates authentic data for accumulation at groups of sensor devices in the ICPS. Based on the application requirements, a reduced quantity of data is delivered to an upstream node, say, a cluster head. We consider that these data might have sensitive information, which is vulnerable to being altered before/after transmission. The contribution of this article is threefold. First, we provide the concept of TrustData to verify whether or not the acquired data are trustworthy (unaltered) before transmission, and whether or not the transmitted data are secured (data privacy is preserved) before aggregation. Second, we utilize a general measurement model that helps to verify acquired signal untrustworthy before transmitting toward upstream nodes. Finally, we provide an extensive performance analysis through a real-world dataset, and our results prove the effectiveness of TrustData.</description><subject>Agglomeration</subject><subject>Data acquisition</subject><subject>Data collection</subject><subject>Data management</subject><subject>Data privacy</subject><subject>data trustworthiness</subject><subject>Event detection</subject><subject>fault tolerance</subject><subject>industrial cyber-physical environments</subject><subject>industrial event monitoring</subject><subject>Informatics</subject><subject>Monitoring</subject><subject>privacy</subject><subject>Reliability</subject><subject>Security</subject><subject>Trustworthiness</subject><subject>Upstream</subject><issn>1551-3203</issn><issn>1941-0050</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><recordid>eNo9UE1Lw0AQXUTBWr0LXhY8p87uZpOsN4lVAwWF1nPY7AdNSZO6u1Xy793a4um9mXlvZngI3RKYEQLiYVVVMwpEzKjgEegZmhCRkgSAw3nknJOEUWCX6Mr7DQDLgYkJ2qzc3odnGeQj_qM_gwvrEcte46VRe2c0PkxxOXSdUaEdemwHh-ffpg_42YRTr-1x1evod63scDk2xiUf69G3KpbL0QezvUYXVnbe3Jxwij5f5qvyLVm8v1bl0yJRVJCQWJHmImWi0LxhlqomU1pyyUAJbohmmvE8tzoFa_OGs1xnwEyhicggFdHLpuj-uHfnhq-98aHeDHvXx5M1ZbwQhIqCRRUcVcoN3jtj651rt9KNNYH6kGgdE60PidanRKPl7mhpjTH_8qIosvgt-wVLx3JG</recordid><startdate>20200501</startdate><enddate>20200501</enddate><creator>Tao, Hai</creator><creator>Bhuiyan, Md Zakirul Alam</creator><creator>Rahman, Md Arafatur</creator><creator>Wang, Tian</creator><creator>Wu, Jie</creator><creator>Salih, Sinan Q.</creator><creator>Li, Yafeng</creator><creator>Hayajneh, Thaier</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-8221-6168</orcidid><orcidid>https://orcid.org/0000-0002-8952-1499</orcidid><orcidid>https://orcid.org/0000-0002-9513-9990</orcidid><orcidid>https://orcid.org/0000-0003-4819-621X</orcidid></search><sort><creationdate>20200501</creationdate><title>TrustData: Trustworthy and Secured Data Collection for Event Detection in Industrial Cyber-Physical System</title><author>Tao, Hai ; Bhuiyan, Md Zakirul Alam ; Rahman, Md Arafatur ; Wang, Tian ; Wu, Jie ; Salih, Sinan Q. ; Li, Yafeng ; Hayajneh, Thaier</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c291t-f94794398d5b3f2cb6cda5a30c95e1d3d3577fd40ff7b537d603e8d1960499473</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Agglomeration</topic><topic>Data acquisition</topic><topic>Data collection</topic><topic>Data management</topic><topic>Data privacy</topic><topic>data trustworthiness</topic><topic>Event detection</topic><topic>fault tolerance</topic><topic>industrial cyber-physical environments</topic><topic>industrial event monitoring</topic><topic>Informatics</topic><topic>Monitoring</topic><topic>privacy</topic><topic>Reliability</topic><topic>Security</topic><topic>Trustworthiness</topic><topic>Upstream</topic><toplevel>online_resources</toplevel><creatorcontrib>Tao, Hai</creatorcontrib><creatorcontrib>Bhuiyan, Md Zakirul Alam</creatorcontrib><creatorcontrib>Rahman, Md Arafatur</creatorcontrib><creatorcontrib>Wang, Tian</creatorcontrib><creatorcontrib>Wu, Jie</creatorcontrib><creatorcontrib>Salih, Sinan Q.</creatorcontrib><creatorcontrib>Li, Yafeng</creatorcontrib><creatorcontrib>Hayajneh, Thaier</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE Xplore (Online service)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on industrial informatics</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Tao, Hai</au><au>Bhuiyan, Md Zakirul Alam</au><au>Rahman, Md Arafatur</au><au>Wang, Tian</au><au>Wu, Jie</au><au>Salih, Sinan Q.</au><au>Li, Yafeng</au><au>Hayajneh, Thaier</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>TrustData: Trustworthy and Secured Data Collection for Event Detection in Industrial Cyber-Physical System</atitle><jtitle>IEEE transactions on industrial informatics</jtitle><stitle>TII</stitle><date>2020-05-01</date><risdate>2020</risdate><volume>16</volume><issue>5</issue><spage>3311</spage><epage>3321</epage><pages>3311-3321</pages><issn>1551-3203</issn><eissn>1941-0050</eissn><coden>ITIICH</coden><abstract>In this article, an industrial cyber-physical system (ICPS) is utilized for monitoring critical events such as structural equipment conditions in industrial environments. Such a system can easily be a point of attraction for the cyberattackers, in addition to system faults, severe resource constraints (e.g., bandwidth and energy), and environmental problems. This makes data collection in the ICPS untrustworthy, even the data are altered after the data forwarding. Without validating this before data aggregation, detection of an event through the aggregation in the ICPS can be difficult. This article introduces TrustData, a scheme for high-quality data collection for event detection in the ICPS, referred to as "Trust worthy and secured Data collection" scheme. It alleviates authentic data for accumulation at groups of sensor devices in the ICPS. Based on the application requirements, a reduced quantity of data is delivered to an upstream node, say, a cluster head. We consider that these data might have sensitive information, which is vulnerable to being altered before/after transmission. The contribution of this article is threefold. First, we provide the concept of TrustData to verify whether or not the acquired data are trustworthy (unaltered) before transmission, and whether or not the transmitted data are secured (data privacy is preserved) before aggregation. Second, we utilize a general measurement model that helps to verify acquired signal untrustworthy before transmitting toward upstream nodes. Finally, we provide an extensive performance analysis through a real-world dataset, and our results prove the effectiveness of TrustData.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/TII.2019.2950192</doi><tpages>11</tpages><orcidid>https://orcid.org/0000-0002-8221-6168</orcidid><orcidid>https://orcid.org/0000-0002-8952-1499</orcidid><orcidid>https://orcid.org/0000-0002-9513-9990</orcidid><orcidid>https://orcid.org/0000-0003-4819-621X</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1551-3203
ispartof IEEE transactions on industrial informatics, 2020-05, Vol.16 (5), p.3311-3321
issn 1551-3203
1941-0050
language eng
recordid cdi_crossref_primary_10_1109_TII_2019_2950192
source IEEE Xplore (Online service)
subjects Agglomeration
Data acquisition
Data collection
Data management
Data privacy
data trustworthiness
Event detection
fault tolerance
industrial cyber-physical environments
industrial event monitoring
Informatics
Monitoring
privacy
Reliability
Security
Trustworthiness
Upstream
title TrustData: Trustworthy and Secured Data Collection for Event Detection in Industrial Cyber-Physical System
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-25T07%3A41%3A17IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=TrustData:%20Trustworthy%20and%20Secured%20Data%20Collection%20for%20Event%20Detection%20in%20Industrial%20Cyber-Physical%20System&rft.jtitle=IEEE%20transactions%20on%20industrial%20informatics&rft.au=Tao,%20Hai&rft.date=2020-05-01&rft.volume=16&rft.issue=5&rft.spage=3311&rft.epage=3321&rft.pages=3311-3321&rft.issn=1551-3203&rft.eissn=1941-0050&rft.coden=ITIICH&rft_id=info:doi/10.1109/TII.2019.2950192&rft_dat=%3Cproquest_cross%3E2358912983%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c291t-f94794398d5b3f2cb6cda5a30c95e1d3d3577fd40ff7b537d603e8d1960499473%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2358912983&rft_id=info:pmid/&rft_ieee_id=8886398&rfr_iscdi=true