• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

工业传感器网络中的云边协同数据异常检测

Cloud-edge collaborative data anomaly detection in industrial sensor networks.

作者信息

Yang Tao, Jiang Xuefeng, Li Wei, Liu Peiyu, Wang Jinming, Hao Weijie, Yang Qiang

机构信息

China Tobacco Zhejiang Industrial Co., Ltd, Hangzhou, China.

College of Electrical Engineering, Zhejiang University, Hangzhou, China.

出版信息

PLoS One. 2025 Jun 11;20(6):e0324543. doi: 10.1371/journal.pone.0324543. eCollection 2025.

DOI:10.1371/journal.pone.0324543
PMID:40498796
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC12157279/
Abstract

Industrial sensor networks exhibit heterogeneous, federated, large-scale, and intelligent characteristics due to the increasing number of Internet of Things (IoT) devices and different types of sensors. Efficient and accurate anomaly detection of sensor data is essential for guaranteeing the system's operational reliability and security. However, existing research on sensor data anomaly detection for industrial sensor networks still has several inherent limitations. First, most detection models usually consider centralized detection. Thus, all sensor data have to be uploaded to the control center for analysis, leading to a heavy traffic load. However, industrial sensor networks have high requirements for reliable and real-time communication. The heavy traffic load may cause communication delays or packets lost by corruption. Second, there are complex spatial and temporal features in industrial sensor data. The full extraction of such features plays a key role in improving detection performance. Nevertheless, the majority of existing methodologies face challenges in simultaneously and comprehensively analyzing both features. To solve the limitations above, this paper develops a cloud-edge collaborative data anomaly detection approach for industrial sensor networks that mainly consists of a sensor data detection model deployed at individual edges and a sensor data analysis model deployed in the cloud. The former is implemented using Gaussian and Bayesian algorithms, which effectively filter the substantial volume of sensor data generated during the normal operation of the industrial sensor network, thereby reducing traffic load. It only uploads all the sensor data to the sensor data analysis model for further analysis when the network is in an anomalous state. The latter based on GCRL is developed by inserting Long Short-Term Memory network (LSTM) into Graph Convolutional Network (GCN), which can effectively extract the spatial and temporal features of the sensor data for anomaly detection. The proposed approach is extensively assessed through experiments using two public industrial sensor network datasets compared with the baseline anomaly detection models. The numerical results demonstrate that the proposed approach outperforms the existing state-of-the-art models.

摘要

由于物联网(IoT)设备数量的增加以及传感器类型的多样化,工业传感器网络呈现出异构、联邦、大规模和智能的特点。对传感器数据进行高效准确的异常检测对于保证系统的运行可靠性和安全性至关重要。然而,现有的关于工业传感器网络传感器数据异常检测的研究仍然存在一些固有局限性。首先,大多数检测模型通常考虑集中式检测。因此,所有传感器数据都必须上传到控制中心进行分析,这导致了沉重的流量负载。然而,工业传感器网络对可靠和实时通信有很高的要求。沉重的流量负载可能会导致通信延迟或数据包因损坏而丢失。其次,工业传感器数据中存在复杂的时空特征。充分提取这些特征对于提高检测性能起着关键作用。然而,大多数现有方法在同时全面分析这两种特征方面面临挑战。为了解决上述局限性,本文提出了一种用于工业传感器网络的云边协同数据异常检测方法,该方法主要由部署在各个边缘的传感器数据检测模型和部署在云端的传感器数据分析模型组成。前者使用高斯和贝叶斯算法实现,有效过滤工业传感器网络正常运行期间产生的大量传感器数据,从而减轻流量负载。只有在网络处于异常状态时,才会将所有传感器数据上传到传感器数据分析模型进行进一步分析。后者基于GCRL,通过将长短期记忆网络(LSTM)插入图卷积网络(GCN)中开发而成,能够有效提取传感器数据的时空特征以进行异常检测。与基线异常检测模型相比,通过使用两个公共工业传感器网络数据集进行实验,对所提出的方法进行了广泛评估。数值结果表明,所提出的方法优于现有的最先进模型。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b620/12157279/73195328129b/pone.0324543.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b620/12157279/16b96616b275/pone.0324543.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b620/12157279/f12209092c3a/pone.0324543.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b620/12157279/c435185acf9d/pone.0324543.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b620/12157279/2d78e07816d9/pone.0324543.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b620/12157279/afa2813862fc/pone.0324543.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b620/12157279/378ca4cbc6d7/pone.0324543.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b620/12157279/d4c6d2932fd6/pone.0324543.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b620/12157279/bc98546ac15f/pone.0324543.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b620/12157279/73195328129b/pone.0324543.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b620/12157279/16b96616b275/pone.0324543.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b620/12157279/f12209092c3a/pone.0324543.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b620/12157279/c435185acf9d/pone.0324543.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b620/12157279/2d78e07816d9/pone.0324543.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b620/12157279/afa2813862fc/pone.0324543.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b620/12157279/378ca4cbc6d7/pone.0324543.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b620/12157279/d4c6d2932fd6/pone.0324543.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b620/12157279/bc98546ac15f/pone.0324543.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b620/12157279/73195328129b/pone.0324543.g009.jpg

相似文献

1
Cloud-edge collaborative data anomaly detection in industrial sensor networks.工业传感器网络中的云边协同数据异常检测
PLoS One. 2025 Jun 11;20(6):e0324543. doi: 10.1371/journal.pone.0324543. eCollection 2025.
2
Integrating meta-heuristic with named data networking for secure edge computing in IoT enabled healthcare monitoring system.将元启发式与命名数据网络集成到物联网支持的医疗保健监测系统中的安全边缘计算中。
Sci Rep. 2024 Sep 15;14(1):21532. doi: 10.1038/s41598-024-71506-z.
3
Optimized intrusion detection in IoT and fog computing using ensemble learning and advanced feature selection.使用集成学习和先进特征选择技术实现物联网和雾计算中的优化入侵检测。
PLoS One. 2024 Aug 1;19(8):e0304082. doi: 10.1371/journal.pone.0304082. eCollection 2024.
4
Security importance of edge-IoT ecosystem: An ECC-based authentication scheme.边缘物联网生态系统的安全重要性:一种基于椭圆曲线密码体制的认证方案。
PLoS One. 2025 Jun 4;20(6):e0322131. doi: 10.1371/journal.pone.0322131. eCollection 2025.
5
Design of an improved graph-based model for real-time anomaly detection in healthcare using hybrid CNN-LSTM and federated learning.基于混合卷积神经网络-长短期记忆网络(CNN-LSTM)和联邦学习的医疗保健实时异常检测改进图模型设计
Heliyon. 2024 Dec 7;10(24):e41071. doi: 10.1016/j.heliyon.2024.e41071. eCollection 2024 Dec 30.
6
Edge-to-Cloud IIoT for Condition Monitoring in Manufacturing Systems with Ubiquitous Smart Sensors.边缘到云的 IIoT 用于制造系统中的状态监测,采用无处不在的智能传感器。
Sensors (Basel). 2022 Aug 7;22(15):5901. doi: 10.3390/s22155901.
7
WSNEAP: An Efficient Authentication Protocol for IIoT-Oriented Wireless Sensor Networks.WSNEAP:面向工业物联网的无线传感器网络的高效认证协议。
Sensors (Basel). 2022 Sep 29;22(19):7413. doi: 10.3390/s22197413.
8
Customised Intrusion Detection for an Industrial IoT Heterogeneous Network Based on Machine Learning Algorithms Called FTL-CID.基于机器学习算法的工业物联网异构网络的定制入侵检测,称为 FTL-CID。
Sensors (Basel). 2022 Dec 28;23(1):321. doi: 10.3390/s23010321.
9
An analytical model to minimize the latency in healthcare internet-of-things in fog computing environment.一种在雾计算环境中最小化医疗物联网中延迟的分析模型。
PLoS One. 2019 Nov 13;14(11):e0224934. doi: 10.1371/journal.pone.0224934. eCollection 2019.
10
Real-Time Energy Data Acquisition, Anomaly Detection, and Monitoring System: Implementation of a Secured, Robust, and Integrated Global IIoT Infrastructure with Edge and Cloud AI.实时能源数据采集、异常检测和监测系统:实现安全、稳健和集成的全球工业物联网基础设施,具有边缘和云人工智能。
Sensors (Basel). 2022 Nov 20;22(22):8980. doi: 10.3390/s22228980.

引用本文的文献

1
An optimized stacking-based TinyML model for attack detection in IoT networks.一种用于物联网网络攻击检测的基于优化堆叠的 TinyML 模型。
PLoS One. 2025 Aug 1;20(8):e0329227. doi: 10.1371/journal.pone.0329227. eCollection 2025.

本文引用的文献

1
Anomaly detection in multivariate time series data using deep ensemble models.基于深度集成模型的多元时间序列数据异常检测。
PLoS One. 2024 Jun 6;19(6):e0303890. doi: 10.1371/journal.pone.0303890. eCollection 2024.
2
Enhancing anomaly detection in distributed power systems using autoencoder-based federated learning.基于自动编码器的联邦学习增强分布式电力系统中的异常检测。
PLoS One. 2023 Aug 18;18(8):e0290337. doi: 10.1371/journal.pone.0290337. eCollection 2023.
3
Anomaly detection method for building energy consumption in multivariate time series based on graph attention mechanism.
基于图注意力机制的多元时间序列建筑能耗异常检测方法。
PLoS One. 2023 Jun 8;18(6):e0286770. doi: 10.1371/journal.pone.0286770. eCollection 2023.
4
Anomaly Detection Using Autoencoder Reconstruction upon Industrial Motors.基于工业电机的自编码器重构的异常检测。
Sensors (Basel). 2022 Apr 20;22(9):3166. doi: 10.3390/s22093166.
5
Lightweight Driver Behavior Identification Model with Sparse Learning on In-Vehicle CAN-BUS Sensor Data.基于车载 CAN-BUS 传感器数据的稀疏学习轻量化驾驶员行为识别模型。
Sensors (Basel). 2020 Sep 4;20(18):5030. doi: 10.3390/s20185030.
6
An Integrated Intrusion Detection Model of Cluster-Based Wireless Sensor Network.一种基于簇的无线传感器网络的集成入侵检测模型。
PLoS One. 2015 Oct 8;10(10):e0139513. doi: 10.1371/journal.pone.0139513. eCollection 2015.
7
Long short-term memory.长短期记忆
Neural Comput. 1997 Nov 15;9(8):1735-80. doi: 10.1162/neco.1997.9.8.1735.