TrustData: trustworthy and secured data collection for event detection in industrial cyber-physical system (In Press)

Rahman, Md. Arafatur and Hai, Tao and Md Zakirul, Alam Bhuiyan and Wang, Tian and Wu, Jie and Sinan Q., Salih and Li, Yafeng and Hayajneh, Thaier (2020) TrustData: trustworthy and secured data collection for event detection in industrial cyber-physical system (In Press). IEEE Transactions on Industrial Informatics. (In Press / Online First) (In Press / Online First)

[img] Pdf
TrustData - Trustworthy and Secured Data Collection for Event Detection in Industrial Cyber-Physical System.pdf
Restricted to Repository staff only

Download (1MB)

Abstract

Industrial Cyber-physical System (ICPS) is utilized for monitoring critical events such as structural equipment conditions in industrial environments. Such a system can easily be a point of attraction for the cyberattackers, in addition to system faults, severe resource constraints (e.g., bandwidth and energy), and environmental problems. This makes data collection in the ICPS untrustworthy, even the data are altered after the data forwarding. Without validating this before data aggregation, detection of an event through the aggregation in the ICPS can be difficult. This paper introduces TrustData, a scheme for highquality data collection for event detection in the ICPS referred to as “Trustworthy and Secured Data Collection” scheme. It alleviates authentic data for accumulation at groups of sensor devices in the ICPS. Based on the application requirements, a reduced quantity of data is delivered to an upstream node, say, a cluster head. We consider this data might have sensitive information, which is vulnerable to being altered before/after transmission. The contribution of this paper is threefold. First, we provide the concept of TrustData to verify whether or not the acquired data is trustworthy (unaltered) before transmission, and whether or not the transmitted data is secured (data privacy is reserved) before aggregation. Second, we utilize a general measurement model that helps to verify acquired signal untrustworthy before transmitting towards upstream nodes. Finally, we provide an extensive performance analysis through real-world data set and our results prove the effectiveness of the TrustData.

Item Type: Article
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Faculty/Division: Centre of Excellence: IBM Centre of Excellence
Centre of Excellence: Earth Resources & Sustainability Centre (ERAS)
Faculty of Computing
Depositing User: Encik Mohd Hashim Mohd Saad
Date Deposited: 24 Dec 2019 09:09
Last Modified: 24 Dec 2019 09:09
URI: http://umpir.ump.edu.my/id/eprint/26311
Download Statistic: View Download Statistics

Actions (login required)

View Item View Item