Fog Computing Architecture-Based Data Acquisition for WSN Applications

被引:16
作者
Zhang, Guangwei [1 ,2 ]
Li, Ruifan [2 ,3 ]
机构
[1] Beijing Univ Posts & Telecommun, Inst Network Technol, Beijing 100876, Peoples R China
[2] Minist Educ, Engn Res Ctr Informat Networks, Beijing 100876, Peoples R China
[3] Beijing Univ Posts & Telecommun, Sch Comp Sci, Beijing 100876, Peoples R China
基金
中国国家自然科学基金;
关键词
WSN; fog computing; abnormal data; data filtering; intrusion tolerance; WIRELESS SENSOR NETWORKS;
D O I
10.1109/CC.2017.8233652
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Efficient and effective data acquisition is of theoretical and practical importance in WSN applications because data measured and collected by WSN is often unreliable, such as those often accompanied by noise and error, missing values or inconsistent data. Motivated by fog computing, which focuses on how to effectively offload computation-intensive tasks from resource-constrained devices, this paper proposes a simple but yet effective data acquisition approach with the ability of filtering abnormal data and meeting the real-time requirement. Our method uses a cooperation mechanism by leveraging on both an architectural and algorithmic approach. Firstly, the sensor node with the limited computing resource only accomplishes detecting and marking the suspicious data using a light weight algorithm. Secondly, the cluster head evaluates suspicious data by referring to the data from the other sensor nodes in the same cluster and discard the abnormal data directly. Thirdly, the sink node fills up the discarded data with an approximate value using nearest neighbor data supplement method. Through the architecture, each node only consumes a few computational resources and distributes the heavily computing load to several nodes. Simulation results show that our data acquisition method is effective considering the real-time outlier filtering and the computing overhead.
引用
收藏
页码:69 / 81
页数:13
相关论文
共 31 条
[1]   A Data Acquisition Protocol for a Reactive Wireless Sensor Network Monitoring Application [J].
Aderohunmu, Femi A. ;
Brunelli, Davide ;
Deng, Jeremiah D. ;
Purvis, Martin K. .
SENSORS, 2015, 15 (05) :10221-10254
[2]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[3]   Malicious Node Detection in Wireless Sensor Networks [J].
Atassi, Alaa ;
Sayegh, Naoum ;
Elhajj, Imad ;
Chehab, Ali ;
Kayssi, Ayman .
2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, :456-461
[4]  
Bonomi F, 2012, P 1 ED MCC WORKSH MO, P13, DOI [DOI 10.1145/2342509.2342513, 10.1145/2342509.2342513]
[5]   In-network outlier detection in wireless sensor networks [J].
Branch, Joel W. ;
Giannella, Chris ;
Szymanski, Boleslaw ;
Wolff, Ran ;
Kargupta, Hillol .
KNOWLEDGE AND INFORMATION SYSTEMS, 2013, 34 (01) :23-54
[6]   Energy-efficient signal acquisition in wireless sensor networks: a compressive sensing framework [J].
Chen, W. ;
Wassell, I. J. .
IET WIRELESS SENSOR SYSTEMS, 2012, 2 (01) :1-8
[7]   Cost Efficient Resource Management in Fog Computing Supported Medical Cyber-Physical System [J].
Gu, Lin ;
Zeng, Deze ;
Guo, Song ;
Barnawi, Ahmed ;
Xiang, Yong .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2017, 5 (01) :108-119
[8]   An Anomaly Detection Based on Data Fusion Algorithm in Wireless Sensor Networks [J].
Guo, Xingfeng ;
Wang, Dianhong ;
Chen, Fenxiong .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
[9]  
Heiniger R. W., 2000, Proceedings of the 5th International Conference on Precision Agriculture, Bloomington, Minnesota, USA, 16-19 July, 2000, P1
[10]   Detecting Malicious Data Injections in Wireless Sensor Networks: A Survey [J].
Illiano, Vittorio P. ;
Lupu, Emil C. .
ACM COMPUTING SURVEYS, 2015, 48 (02)