Sensory IoT (Internet of Things) networks are widely applied and studied in recent years and have demonstrated their unique benefits in various areas. In this paper, we bring the sensor network to an application scenario that has rarely been studied - the academic cleanrooms. We design SENSELET++, a low-cost IoT sensing platform that can collect, manage and analyze a large amount of sensory data from heterogeneous sensors. Furthermore, we design a novel hybrid anomaly detection framework which can detect both time-critical and complex non-critical anomalies. We validate SENSELET++ through the deployment of the sensing platform in a lithography cleanroom. Our results show the scalability, flexibility, and reliability properties of the system design. Also, using real-world sensory data collected by SENSELET++, our system can analyze data streams in real-time and detect shape and trend anomalies with a 91% true positive rate.
more »
« less
Senselet: Distributed Sensing Infrastructure for Improving Process Control and Safety in Academic Cleanroom Environments
Semiconductor cleanrooms are used to fabricate devices with feature sizes that can be much smaller than a dust particle. Hence, any environmental deviations in temperature, or humidity around fabrication instruments may become the root cause of hundreds of transistors failing during the manufacturing. Furthermore, researchers work with dangerous chemicals in cleanrooms and violation of safety may lead to disastrous consequences. Therefore, we have developed an affordable, locally-controlled distributed sensing infrastructure, called SENSELET, for academic cleanrooms. It provides highly effective services for environment sensing around scientific instruments, sensory data collection and visualization, indoor localization, and instrument proximity detection for safety of researchers.
more »
« less
- Award ID(s):
- 1835543
- PAR ID:
- 10292021
- Date Published:
- Journal Name:
- GetMobile: Mobile Computing and Communications
- Volume:
- 24
- Issue:
- 2
- ISSN:
- 2375-0529
- Page Range / eLocation ID:
- 12 to 16
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
IntroductionBacteria are frequently isolated from surfaces in cleanrooms, where astromaterials are curated, at NASA’s Lyndon B. Johnson Space Center (JSC).Bacillusspecies are of particular interest because endospores can endure extreme conditions. Current monitoring programs at JSC rely on culturing microbes from swabs of surfaces followed by identification by 16S rRNA sequencing and the VITEK 2 Compact bacterial identification system. These methods have limited power to resolveBacillusspecies. Whole genome sequencing (WGS) is the current standard for bacterial identification but is expensive and time-consuming. Matrix-assisted laser desorption - time of flight mass spectrometry (MALDI-TOF MS), provides a rapid, low-cost, method of identifying bacterial isolates and has a higher resolution than 16S rRNA sequencing, particularly forBacillusspecies; however, few studies have compared this method to WGS for identification ofBacillusspecies isolated from cleanrooms. MethodsTo address this, we selected 15 isolates for analysis with WGS and MALDI-TOF MS. Hybrid next-generation (Illumina) and 3rd-generation (nanopore) sequencing were used to draft genomes. Mass spectra, generated with MALDI-TOF MS, were processed with custom scripts to identify clusters of closely related isolates. ResultsMALDI-TOF MS and WGS identified 13/15 and 9/14 at the species level, respectively, and clusters of species generated from MALDI-TOF MS showed good agreement, in terms of congruence of partitioning, with phylotypes generated with WGS. Pairs of strains that were > 94% similar to each other, in terms of average amino acid identity (AAI) predicted by WGS, consistently showed cosine similarities of mass spectra >0.8. The only discordance was for a pair of isolates that were classified asPaenibacillusspecies. This pair showed relatively high similarity (0.85) in terms of MALDI-TOF MS but only 85% similarity in terms of AAI. In addition, some strains isolated from cleanrooms at the JSC appeared closely related to strains isolated from spacecraft assembly cleanrooms. DiscussionSince MALDI-TOF MS costs less than whole genome sequencing and offers a throughput of hundreds of isolates per hour, this approach appears to offer a cost-efficient option for identifyingBacillusspecies, and related microbes, isolated during routine monitoring of cleanrooms and similar built environments.more » « less
-
Science and engineering applications are now generating data at an unprecedented rate. From large facilities such as the Large Hadron Collider to portable DNA sequencing devices, these instruments can produce hundreds of terabytes in short periods of time. Researchers and other professionals rely on networks to transfer data between sensing locations, instruments, data storage devices, and computing systems. While general-purpose networks, also referred to as enterprise networks, are capable of transporting basic data, such as e-mails and Web content, they face numerous challenges when transferring terabyte- and petabyte-scale data. At best, transfers of science data on these networks may last days or even weeks. In response to this challenge, the Science Demilitarized Zone (Science DMZ) has been proposed. The Science DMZ is a network or a portion of a network designed to facilitate the transfer of big science data. The main elements of the Science DMZ include: 1) specialized end devices, referred to as data transfer nodes (DTNs), built for sending/receiving data at a high speed over wide area networks; 2) high-throughput, friction-free paths connecting DTNs, instruments, storage devices, and computing systems; 3) performance measurement devices to monitor end-to-end paths over multiple domains; and 4) security policies and enforcement mechanisms tailored for high-performance environments. Despite the increasingly important role of Science DMZs, the literature is still missing a guideline to provide researchers and other professionals with the knowledge to broaden the understanding and development of Science DMZs. This paper addresses this gap by presenting a comprehensive tutorial on Science DMZs. The tutorial reviews fundamental network concepts that have a large impact on Science DMZs, such as router architecture, TCP attributes, and operational security. Then, the tutorial delves into protocols and devices at different layers, from the physical cyberinfrastructure to application-layer tools and security appliances, that must be carefully considered for the optimal operation of Science DMZs. This paper also contrasts Science DMZs with general-purpose networks, and presents empirical results and use cases applicable to current and future Science DMZs.more » « less
-
Privacy and surveillance are central features of public discourse around use of computing systems. As the systems we design and study are increasingly used and regulated as potential instruments of surveillance, HCI researchers— even those whose focus is not privacy—find themselves needing to understand privacy in their work. Concepts like contextual integrity and boundary regulation have become touchstones for thinking about privacy in HCI. In this paper, we draw on HCI and privacy literature to understand the limitations of commonly used theories and examine their assumptions, politics, strengths, and weaknesses. We use a case study from the HCI literature to illustrate conceptual gaps in existing frameworks where privacy requirements can fall through. Finally, we advocate vulnerability as a core concept for privacy theorizing and examine how feminist, queer-Marxist, and intersectional thinking may augment our existing repertoire of privacy theories to create a more inclusive scholarship and design practice.more » « less
-
Automotive systems have always been designed with safety in mind. In this regard, the functional safety standard, ISO 26262, was drafted with the intention of minimizing risk due to random hardware faults or systematic failure in design of electrical and electronic components of an automobile. However, growing complexity of a modern car has added another potential point of failure in the form of cyber or sensor attacks. Recently, researchers have demonstrated that vulnerability in vehicle's software or sensing units could enable them to remotely alter the intended operation of the vehicle. As such, in addition to safety, security should be considered as an important design goal. However, designing security solutions without the consideration of safety objectives could result in potential hazards. Consequently, in this paper we propose the notion of security for safety and show that by integrating safety conditions with our system-level security solution, which comprises of a modified Kalman filter and a Chi-squared detector, we can prevent potential hazards that could occur due to violation of safety objectives during an attack. Furthermore, with the help of a car-following case study, where the follower car is equipped with an adaptive-cruise control unit, we show that our proposed system-level security solution preserves the safety constraints and prevent collision between vehicle while under sensor attack.more » « less
An official website of the United States government

