PreprintPDF Available

A Holistic Overview of Anticipatory Learning for the Internet of Moving Things: Research Challenges and Opportunities

Authors:

Abstract and Figures

The proliferation of IoT systems has received much attention from the research community, and it has brought many innovations to smart cities, particularly through the Internet of Moving Things (IoMT). The dynamic geographic distribution of IoMT devices enables the devices to sense themselves and their surroundings at multiple spatio-temporal scales, interact with each other across a vast geographical area, and perform automated analytical tasks everywhere and anytime. Currently, most of the geospatial applications of IoMT systems are developed for abnormal detection and control monitoring. However, it is expected that, in the near future, optimization and prediction tasks will have a larger impact on the way citizens interact with smart cities. This paper examines the state-of-the-art of IoMT systems and discusses their crucial for supporting anticipatory learning. The maximum potential of IoMT systems in our future smart cities can be fully exploited in terms of proactive decision making and decision delivery via an anticipatory action/feedback loop. We also examine the challenges and opportunities of anticipatory learning for IoMT systems in contrast to GIS. The holistic overview provided in this paper highlights the guidelines and directions for future research on this emerging topic.
Content may be subject to copyright.
Review
A Holistic Overview of Anticipatory Learning for the
Internet of Moving Things: Research Challenges and
Opportunities
Hung Cao * and Monica Wachowicz
People in Motion Lab, University of New Brunswick, Fredericton, NB E3B 5A3, Canada
*Correspondence: hcao3@unb.ca
Version April 3, 2020 submitted to ISPRS Int. J. Geo-Inf.
Abstract:
The proliferation of IoT systems has received much attention from the research community,
and it has brought many innovations to smart cities, particularly through the Internet of Moving
Things (IoMT). The dynamic geographic distribution of IoMT devices enables the devices to sense
themselves and their surroundings at multiple spatio-temporal scales, interact with each other across
a vast geographical area, and perform automated analytical tasks everywhere and anytime. Currently,
most of the geospatial applications of IoMT systems are developed for abnormal detection and
control monitoring. However, it is expected that, in the near future, optimization and prediction
tasks will have a larger impact on the way citizens interact with smart cities. This paper examines
the state-of-the-art of IoMT systems and discusses their crucial for supporting anticipatory learning.
The maximum potential of IoMT systems in our future smart cities can be fully exploited in terms of
proactive decision making and decision delivery via an anticipatory action/feedback loop. We also
examine the challenges and opportunities of anticipatory learning for IoMT systems in contrast to
GIS. The holistic overview provided in this paper highlights the guidelines and directions for future
research on this emerging topic.
Keywords: IoT; Internet of Moving Things; Anticipatory Learning; GIS; Smart Cities
1. Introduction
The Internet of Things (IoT) has received a significant attention from the research community
since its first introduction by Kevin Ashton in 1999 [
1
3
]. The basic concept of IoT is that every physical
thing in a smart city is connected, and can function as a sensor embedded in tiny computers, which
are then geographically distributed over a vast area of a smart city. An IoT device is always connected
through a communication network, ranging from short range networks (e.g. Bluetooth, Zigbee, NFD),
to medium range networks (e.g. Wi-Fi, Digi Mesh), to large range networks (e.g. LoRaWan, cellular,
WiMax). Today, IoT devices are usually expected to collect sensor data, communicate with each other,
and make decisions without human intervention [
4
7
]. Some examples of IoT devices include smart
traffic lights, smart parking meters, smart home meters, smartphones, and wearable devices [813].
The IoT market in smart cities has not really taken off yet due to a number of technical, political
and financial barriers; however, previous survey papers have already shown different points of view
on the role of IoT in smart cities. These are mainly related to IoT architecture concerns such as elements,
facilities, protocols, and standards for IoT[
14
19
], as well as the development of new IoT applications
such as smart factories [20], smart homes [21], and smart hospitals[22].
Taking it a step further is the Internet of Moving Things (IoMT), which can be defined by extending
the concept of the IoT to moving things which are essentially any IoT device that moves. Instead of
having a fixed location in a smart city, an IoMT device can be anything people wear or carry around,
Submitted to ISPRS Int. J. Geo-Inf., pages 1 – 20 www.mdpi.com/journal/ijgi
Version April 3, 2020 submitted to ISPRS Int. J. Geo-Inf. 2 of 20
such as clothes, smartphones, and wearables; or things used for transportation, such as cars, trucks,
trains, bikes, and planes. When these IoMT devices are connected to each other, not only can they
sense themselves (e.g. speed, acceleration, and direction) and their surrounding environment (e.g.
temperature, noise and air pollution), they can also exploit the resources made available by edge, fog
and cloud computing.
Therefore, IoMT devices generate unbounded data streams from a vast amount of indoor and
outdoor locations that will require a low-latency database for storing and exploring data in space. Time
is an important dimension because different time windows used to handle IoMT data streams will
have an impact on pre-processing, analytical and visualization tasks. Some examples include landmark
windows [
23
], sliding windows [
24
], damped widows [
25
], and tilted windows [
26
]. Different time
windows have been proposed to cope with transporting data streams where the data rate could
overwhelm the processing power of the computation resources at the edge, fog and cloud. In contrast,
the space dimension has been overlooked until now, despite the fact that the data streams are being
generated by IoMT devices moving over large geographical areas and having fine spatial granularity.
There is now a growing interest and demand for developing IoT-GIS platforms that can handle data
streams generated by IoMT devices. This paper is one step in this direction, mainly because IoMT is
paving the way for anticipatory learning.
As indicated in [
27
], anticipatory learning is an often-misused term. Rosen defined it as “a system
whose current state is determined by a (predicted) future state", while Nadin has defined it as “a system whose
current state is determined not only by a past state, but also by possible future states" [
28
31
]. Nevertheless,
both authors agree that prediction and anticipation are not interchangeable concepts. The consensus is
that an anticipatory system makes a decision to impact the future in order to benefit a user; meanwhile
a predictive system uses a predictive model that can foresee the future state of the system itself.
In this paper, anticipatory learning for IoMT is defined as “a system where the current state is
determined by the past and future behaviour of IoMT devices that is represented by the dynamic geographical
distribution of IoMT devices over time". This is critical for building context intelligence for anticipatory
learning models. Mainly because IoMT devices are equipped with different sensors, which generate
data streams of spatio-temporal information used to infer contextual intelligence on what is happening,
where and why it is happening, and what should be done about it. In other words, contextual
intelligence requires that anticipatory learning models have (1) a context sensing strategy of relevant past
events detected or monitored by IoMT devices; (2) spatio-temporal awareness of present contextual variables
being continuously used for gathered IoMT data; and (3) user-driven awareness of the preferred future so the
system can exert influence and help a user to make appropriate decisions.
Current edge-fog-cloud computing is the technology allowing us to run machine learning
algorithms and build anticipatory learning models [
32
,
33
]. In contrast, our current GIS technology
has been primarily developed for supporting predictive systems. Recent attempts in designing
IoMT-GIS have shown the main limitations of GIS in processing IoMT data streams [
34
,
35
]. Adding
the functionalities of an anticipatory learning model to GIS will only create more barriers to using GIS
for running streaming machine learning for building anticipatory learning models.
Since a fairly systematic overview of IoT systems has been recently published elsewhere [
36
], our
paper focuses on IoMT systems. Our purpose is not only to give a holistic overview of IoMT research
that is relevant to each stage of an anticipatory learning model but also to provide some guidelines
and future research directions for building anticipatory learning models for IoMT systems.
The rest of the paper is organized as follows. Section 2introduces the main concepts of IoMT
systems and compares the data collection strategies currently being used in research projects. Section
3describes the main steps involved in building Anticipatory Models for IoMT systems. Section 4
describes the research being carried out on context sensing at the edge of a network, while Section
5introduces context intelligence using fog computing. Section 6delineates the prediction and
intelligent actions for anticipatory learning. Section 7gives a a holistic overview of the challenges and
Version April 3, 2020 submitted to ISPRS Int. J. Geo-Inf. 3 of 20
opportunities for building anticipatory learning for IoMT systems. Finally, conclusions and future
research are given in Section 8.
2. Internet of Moving Things
In general, IoMT devices are equipped with many types of sensors, from accelerometers and
gyroscopes to proximity, light, and ambient sensors, as well as microphones, and cameras. They also
have the capability of computing by using a wide range of communication interfaces, such as Wi-Fi,
Bluetooth, or NFC (Near-Field Communication). The ability to sense themselves and their surrounding
environments is key to generating “small data streams” over space and time in such a way that they
share many characteristics of big data, including the five V’s: Variety, Velocity, Volume, Veracity, and
Value [3741].
The nature of IoMT data streams is multi-model, diverse, heterogeneous, and voluminous; often
supplied at high speed, and with a degree of uncertainty. In general, these data streams also have
distinctive characteristics that make obsolete the traditional storage, management, and processing of
current GIS. [42]. These characteristics can be described as one of the following:
Data in Motion: the IoMT devices not only have the ability to sense themselves using context
variables such as velocity, acceleration, and direction at a specific location and time, but they
can also sense their surrounding environments using context variables such as temperature,
noise and air pollution, and depending on the type of sensor deployed inside an IoMT device,
these variables might have a variety of spatial ranges (e.g. from 1 and 10m to 100m and 1km) as
well time granularities (e.g. from milliseconds and seconds to hours and days). Overall context
sensing data is constantly moving from the IoMT devices to edge and fog nodes, up to the cloud
depending on the processing power and storage resources available.
Data in Many Forms: Depending on the context intelligence envisaged for an Anticipatory
Learning model, each IoMT device can perform different sensing functions for collecting
time-series and event triggered data. This leads to different data types including structured,
semi-structured, unstructured, and mixed data streams.
Data at Rest: It is indisputable that IoMT devices produce a large amount of data streams that
are always tied with a location over time. This poses a challenge to capturing, processing, and
managing the data within an appropriate spatio-temporal scale that is needed to be a-priori
known when developing Anticipatory Learning models.
Data in Suspicion: The uncertainty refers to the biases, noise and abnormalities in the data streams
for reasons such as data inconsistency and incompleteness, latency, ambiguity, deception, and
approximation.
Data of Many Values: the potential context hidden deeply in the IoMT data streams is significant
and it has not yet been fully exploited. By processing, computing, analyzing and making
decisions based on this context could help us support decision making actions. Anticipatory
computing is considered in this paper as a key approach to exploiting that potential.
Table 1compares some selected research projects where the data from IoMT devices was collected
using several different sensors, such as GPS, RFIDs tags, and cameras. They have been categorized
into four common types: Structured, Unstructured, Semi-structured, and Mixed. Structured data is
the information that complies with a formal schema and data models; meanwhile unstructured data
does not follow any pre-defined data model. Semi-structured data does not reside in a data model,
but it does have some organizational structures that make it easier to analyze (e.g.: CSV, XML, JSON
File). Mixed data is the combination of many types of data together. It is argued that a large part of
IoMT data produced today is either semi-structured or unstructured data [
38
]. Our literature review of
selected projects confirms this hypothesis, and it also reveals the following main issues in GIS:
Uniqueness: The IoMT data streams are an unique type of spatio-temporal data because they
represent an immense cloud of location points over time in such a way that current spatial
Version April 3, 2020 submitted to ISPRS Int. J. Geo-Inf. 4 of 20
representations (e.g. trajectories, time geography and layers) can not handle the volume of these
data points and their assigned semi-structured and unstructured data.
Propagation: We consider propagation as a discrete-time process starting from one data point
to another data point that is able to accumulate context information and is governed by the
progress speed between the two or more data points. Spatio-temporal progress matrices have
been used in the past, but they can not handle non-structured and unstructured data streams.
More research work is needed in this domain.
Multiprocessing: It is easy to see from Table 1 that accumulated data streams can arrive and
require processing at various speeds from batch to near-real time, or real-time processing. Most
of the research projects have used batch processing to analyze their data. The development of
streaming GIS is needed for analyzing the data streams as they arrive.
Version April 3, 2020 submitted to ISPRS Int. J. Geo-Inf. 5 of 20
Table 1. Overview of IoMT research projects.
Data in Many
Forms
Data at Rest Goal Sensors/IoMT devices Reference
Mixed
Batch
Moving Object Map
Analytics (MOMA) for
connected vehicles
GPS, Camera, Environmental
Sensors
[43]
Location Prediction
GSM traces, Cellular calls,
survey data
[44]
Real-time
Mobility-aware trustworthy
crowdsourcing (MATCS)
Crowdsourced data [45]
Urban Trajectory Data
Analytics System
GPS, Rain Gauge Data,
Road Incident Report, Social
Media
[46]
Semi-structured Real-time Smart Object framework Sensors [47]
Traffic Monitoring Traffic lights [48]
Structured Batch
Clustering of IoT devices UAVs [49]
CityPulse framework Bus [50]
IoT-Based Smart Parking Ultrasonic [51]
Real-time
Analyzing people’s activities
RFID tags [52]
Unstructured
Batch
Ambient intelligence with
adaptive decisions
Internet Packet [53]
Ambient intelligence with
adaptive decisions
Internet Packet [54]
Media-aware security RFID tags, IPTV, VoIP, VoD [55]
Locationing phone
Wifi Scanner, Bluetooth
Scanner
[56]
UBICON (Anticipatory
Ubiquitous Computing)
RFID tags, Bluetooth Signal [57]
Traffic Congestion Prediction
GPS [58]
Complex Event Processing RFID, GPS [59]
Mode Transportation
Prediction
Crowdsourced data [60,61]
Mobility Prediction Smart Card [62]
Mining the semantics of
origin-destination flows
GPS, Mobile Phone [63]
Optimizing the mobility
models and communication
performance
GPS [64]
CarStream Services
driving data including
vehicle status, driver
activity, and passenger-trip
information
[65]
Traffic monitoring and alert
notification
Geo-location and speed data [66]
Transportation Network
Optimization
GIS and the Internet of
multimedia
[67]
Emissions and traffic-related
impacts
Crowdsourced data [68]
Multi Access Physical
Monitoring System
wearable smart-log data [69]
Wearable health monitoring
system
RFID, ECG Sensor, Body
Temperature Sensor, Blood
Pressure Sensor
[70]
Early detection of Alzheimer
disease
Motion Sensor data [70]
Near real-time Transportation Planning Bluetooth Signal [71]
Real-time Pedestrian Safety Detection Phone Camera [72]
Version April 3, 2020 submitted to ISPRS Int. J. Geo-Inf. 6 of 20
3. Anticipatory Learning Model
“Anticipation pertains to change, that is, to a sense of the future" [
30
]. From an IoMT perspective, we
need to be able to acquire data streams that can be used to sense a comprehensive context in space
and time, and infer anticipatory actions based on predictions of the future state of this context. To that
end, Figure 1illustrates four main steps in building anticipatory learning models which are (1) context
sensing,(2) context intelligence,(3) context prediction, and (4) anticipatory action/feedback loop, as previously
proposed in [
73
,
74
]. Most state-of-the-art research is currently limited to the first three steps. Pejovic
and Musolesi [
27
] stated that the main barrier to further proliferation of anticipatory computing is
the inability of IoMT devices (and IoT in general) to seamlessly interact with humans and generate
feedback, which is vital to guiding an anticipatory learning process. The literature review described
in this paper also reveals another barrier to the proliferation of anticipatory learning models that is
the lack of approaches to represent a-priori spatio-temporal knowledge of a particular context. This is
crucial for avoiding an Internet of “Useless" Mobile Things in guiding anticipatory learning processes
in the near future.
Trains
Bikes
Cars
Smartphones
Body Sensor
Networks
RFIDs
...
Edge Node
Gateway
Router
Modem
Switch
...
Fog Node
Rack Servers
Industrial
controllers
Embedded
Servers
...
Applications
Services
Big Data Analytics
Predictive
Services
Data Mining
Data
Visualizations
...
Context Sensing
Context Intelligence
Context Prediction
Anticipatory Action/Feedback Loop
Anticipatory Learning
Key Steps
IoMT Systems
Figure 1.
Overview of the main steps involved in building Anticipatory Learning Models using IoMT
Systems.
4. Context Sensing at the Edge of a Network
For an anticipatory learning model, sensing plays an important role in delivering the data used
to generate context intelligence. Context may be divided into various categories ( location, identity,
activity, time) [
75
] and may have numerous aspects, such as geographical, physical, social, and
temporal [
76
]. Contextual sensing aims to provide an interface between IoMT devices (things) in the
physical world and a person or a group of people.
Version April 3, 2020 submitted to ISPRS Int. J. Geo-Inf. 7 of 20
In-vehicular context sensing, IoMT devices in a vehicle can detect important aspects of driver
behavior and the surrounding environment over time. On-board sensors on the vehicle, as well as
sensors built into mobile devices carried by the driver, can also be used to gather IoMT data streams.
Furthermore, IoMT data streams from different cars can provide increased spatial coverage to better
understand the context, and can also help to reduce disambiguation. Context sensing can provide
information on drivers changing lanes, stop signs, obstructions and potholes. These features can the
be further used to infer a context that will be used within an anticipatory learning model to improve
driver safety and engine efficiency.
In order to achieve that, data pre-processing is necessary to extract features from IoMT data
streams and use those features to provide context intelligence. The availability of edge computing
power promisingly allows us to run many pre-processing techniques near to an IoMT device, rather
than having all IoMT data streams sent to a data center [
77
81
]. The correct choice of pre-processing
techniques will be vital in the later steps of building an anticipatory learning model. A brief description
of each pre-processing step is presented as follows:
Dealing with missing data: For a large accumulated data streams, deleting observations based on
missing values is usually not considered as to be a problem, but for a continuous data stream, it
may affect our later steps in anticipatory learning. Therefore, missing values could be replaced
based on predictive models [82,83].
Filtering: IoMT devices usually produce noise data streams. In order to minimize the impact on
succeeding steps, a clear set of automated tasks are needed to define, detecting, and correcting
errors. Some new approaches can be found in [84,85].
Summarization and Aggregation: For some applications, the summary form of accumulated data
streams might be enough for statistical analysis [
86
,
87
]; other applications may require data
aggregation to diminish the bandwidth consumption as well as the data latency [88].
Cleaning: IoMT data streams sometimes originate irrelevant or inaccurate data. Cleaning
techniques are needed to reduce computational time and complexity, and to improve the
performance of the predictive model, due to fewer data features [83,89].
Transforming: to deal with the complexity of the IoMT data streams, Principal Component
Analysis (PCA) is a commonly used technique to reduce the number of the data features [
90
].
Another technique, Latent Dirichlet Allocation (LDA) is used to find a linear combination of
features that characterizes or separates two or more classes [
91
,
92
]. Recently, Pattern Reduction
(PR) was presented in [93] for reducing the number of patterns.
It is of paramount importance that IoMT data streams are pre-processed before passing to the
next step (i.e. context intelligence). Should we, therefore, stream all of our IoMT data to the cloud
(data centers)? Our answer to this question is no. The closer to the data source that pre-processing is
performed, the more advantages the IoMT system has. With the huge volume of IoMT data streams
produced by a variety of sensors, it is highly possible to flood and overwhelm the networks and data
centers (i.e. cloud). In addition, some pre-processing tasks can be implemented using a specific set of
IoMT devices which can help to improve the interactions between devices and improve the efficiency
of the whole system.
5. Context Intelligence at the Fog Layer of a Network
Context intelligence requires inductive reasoning to infer higher-level concepts from pre-processed
IoMT data streams. With academic references from as early as the 1980s, this is not a new theory;
however, IoMT systems have revealed that context intelligence requires anticipatory learning models
which understand the limitations of our algorithms in generating new knowledge, and are able to
adapt this knowledge to an environment different from the one in which the learning model was
trained. Contextual intelligence requires moving far beyond an analysis of economic, urban, rural and
many others spaces. It is common to rely on simple explanations for complex high-level concepts (i.e.
Version April 3, 2020 submitted to ISPRS Int. J. Geo-Inf. 8 of 20
complex phenomena as human behavior). The most difficult task in this step is adjusting our persistent
mental models and learning to differentiate between universal beliefs and their specific patterns and
standards.
Our vision of context intelligence is to distribute streaming analytics into a hierarchical order,
starting with descriptive analytics, which can be processed on edge nodes themselves (i.e. gateways),
and performing more complex diagnostic analytics on fog nodes. Bonomi et al. [
77
,
78
] have previously
proposed a hierarchical distributed architecture based on fog computing to process IoT data with low
latency, location awareness, and mobility support. We have extended this distributed architecture with
the following elements:
Scalability: By distributing automated analytical tasks, context intelligence depends on the
scalability of IoMT devices. Many context models will require simple machine learning
algorithms such as Linear Spanish Inquisition Protocol (L-SIP) which has been applied to reduce
data transmission; Filtered State Classification (ClassAct) as a human posture/activity classifier
based on decision tree; and Time-Discounted Histogram Encoding (Bare Necessities) which is
used for summarizing the relative time spent in given contexts [94].
Mobility and geographic distribution: These are indispensable requirements for context intelligence,
however an anticipatory learning system also requires a rich scenario of communication and
interaction between all available computational resources. To achieve this, a-priori data pipelines
must be designed that will support an analytics everywhere framework [9597].
Heterogeneity and Interoperability: Obviously, terminal devices in the IoMT system can collect data
with different timestamps, formats, and locations. Additionally, the edge network computing
devices which deploy the IoT gateways could seamlessly support the interoperability between
terminal devices. For example, an array of devices including an armband sensor, a Bluetooth
headset, a smartphone, an external antenna for GPS receiver, and a light laptop with transceiver
in [
98
] were combined together to collect human activity data, then processed to predict the
context around them.
6. Context Prediction and Anticipatory Actions
Context Prediction and Anticipatory Action are the two important steps for anticipatory learning
models. Anticipatory action is referring to the act (behavior), including actual decision making; internal
preparatory mechanisms; or learning that is dependent on predictions, expectations, aims, or beliefs
about future states. According to [
31
], anticipation focuses on the impact of a prediction or expectation
of current behavior. Stated in another way, anticipatory actions are not only about predicting the future
or expecting a future event but also about changing behavior (or behavioral biases and predispositions)
according to this prediction or expectation. For anticipatory learning models to assist citizens in
changing their behaviour, context prediction and intelligent-driven actions must play a major role.
Previous research has described different prediction models used to predict the behavior of people
or IoMT devices. Tsai, Chun-Wei, et al. [
99
] gives a brief review of data mining techniques for IoT
systems. Figure 2illustrates the state-of-the-art research for context prediction using different analytical
algorithms and a variety of data sources, while Table 2below summarizes the approaches used for
building a prediction model based on supervised and unsupervised prediction techniques [
100
102
].
Supervised techniques rely on labeled data and training to find a model that can afterwards be applied
to a new data set. Unsupervised techniques, in contrast, use unlabeled data and attempt to predict
common patterns.
Version April 3, 2020 submitted to ISPRS Int. J. Geo-Inf. 9 of 20
Context
Prediction
Data Source
Analytical
Algorithms
(iii) Spatial-Temporal Data
(xx) Camera
(xxi) Internet Packet
(xv) Survey data
(xiii) RFID tags
(viii) Sensors
(xvii) Traffic lights
(v) Crowdsourced data
(xvi) Rain Gauge Data
(xxii) Road Incident
Report
(xii) Smart Card
(xi) Mobile Phone
(vi) Ultra-Wide Band
(x) Online location-based
(xix) social networks
(ii) Bluetooth and WLAN
history
(i) WiFi and GSM radio
fingerprints
(vii) Community well-
being census data
(xviii) Public transport
mobility data
(xiv) GPS data
(ix) Passenger-side-facing
ultrasonic rangefinder
(iv) Trace of the mobility
patterns
(2) Bayesian coalition game based on
the concepts of game theory and
Learning Automata (LA)
(12) Emperical Study, Bayesian
(5) Support Vector Machine (SVM)
(6) Deep Restricted Boltzmann
Machine
(8) Markov Chain Monte Carlo in
Bayesian Model Averaging
(4) Kernel Regression
(3) Gradient Boosting Trees
(10) Mobile probability tree
(13) Decision Tree Algorithms
(14) Multivariate nonlinear time
series prediction techniques
(15) Naïve Bayes
(17) Regression
(18) Bayesian Network
(19) Pearson correlation coefficient
(20) Conditional Random Fields
(22) Nonlinear time series analysis
(21) Markov-based and compression-
based predictors (LZ-based
predictors)
(23) T-pattern Tree
(11) Artificial Neural Networks (ANN)
(16) Dynamical Bayesian Network
(DBN)
(1) Linear Discriminant Analysis (LDA)
(9) Recurrent Neural Network
(7) Gaussian Mixture Models with
Expectation Maximization
Figure 2. Overview of different approaches developed for prediction models.
Version April 3, 2020 submitted to ISPRS Int. J. Geo-Inf. 10 of 20
Table 2. State of the art projects using approaches in Figure 2.
Analytical Algorithms References Data Sources References
(1) [103](i) [48,49,104107]
(2) [53](ii) [48,57,108,109]
(3) [60,109](iii) [43,110,111]
(4) [46](iv) [112]
(5) [46,48,61,113](v) [60,61,110,113116]
(6) [58](vi) [104,117]
(7) [71](vii) [118]
(8) [71,111,117](viii) [103,111,119]
(9) [58,112](ix) [120]
(10) [121](x) [122]
(11) [63,109](xi) [63,108,109,121124]
(12) [49](xii) [62]
(13) [57,115,119](xiii) [57,104]
(14) [108](xiv) [43,46,58,63,103,106,108,114,117,125127]
(15) [48,103](xv) [49]
(16) [109](xvi) [46]
(17) [124,128](xvii) [43]
(18) [123](xviii) [118]
(19) [118](xix) [46,122]
(20) [62,126](xx) [43,117,129]
(21) [43,105,107,114](xxi) [53]
(22) [106](xxii) [46]
(23) [127]
7. Research Challenges and Opportunities
While the principles of anticipatory learning modelling have been studied for several decades
[
28
,
130
], IoMT is actually in its infancy. Although recently, researchers attempted to integrate an
anticipatory process into artificial learning systems [
131
135
], few attempts can be found on research
applications that apply the theory of anticipatory computing to building context intelligence in IoMT
devices [
136
,
137
]. We advocate that the proliferation of IoMT devices has created a unique opportunity
to explore anticipatory learning models using the vast amount of IoMT data streams. This section
discusses the research challenges in applying anticipatory computing for IoMT systems.
7.1. Research Challenges
Anticipatory learning for IoMT systems is reliant on multi-disciplinary research fields such as
Internet of Things; Big Data Analytics; GeoSpatial Data Science; Cloud Computing; Edge Computing;
Machine Learning; and Data Mining. Inherent challenges to this are discussed below.
Privacy: One of the main concerns about deploying IoMT devices around a smart city is how
to generate anticipatory actions from IoMT data streams without violating user privacy. Some
examples of sensitive information gathered by IoMT devices include locations, activities, and
emotions, For example, anticipatory computing can be misused to predict the future user
locations or activities for an individual. Preserving privacy becomes even more complex when
it comes to considering the inconsistent privacy policies among multiple users. One example
includes the case of one user who may only want to donate one type of data (i.e. Bluetooth
data), while another one donates two types (e.g. Bluetooth and Wi-Fi usage data). When these
data are combined and co-location patterns are found, the information of the first user can be
unintentionally exposed.
Security: The diversity of IoMT devices that we expect in smart cities poses a significant challenge
to ensuring the security of the entire anticipatory learning process, especially, when it comes to
particularly with wearable devices, body sensor networks, or carried items (such as smartphones).
IoMT devices may pose a threat to users, due to susceptibility to hacking. Although there is
Version April 3, 2020 submitted to ISPRS Int. J. Geo-Inf. 11 of 20
currently some attention on the issue of security for the IoMT systems [
138
140
], there is no
common standard, protocol, or security framework for IoMT devices. Therefore, addressing
security issues for IoMT is now an urgent concern in our research work.
Connection: One of the key factors to making IoMT devices to work effectively is the
communication networks used by them. Mobility poses a challenge for always keeping to
maintaining a stable connection among IoMT devices in a smart city. In the future, new
networking technology is expected to be used to keep IoMT devices collecting data seamlessly
and independently of their location over a short and long periods of time [141145].
Turbulence: Different from the fixed-location based IoT devices, the mobility of the devices
usually creates chaotic and unstable interactions between these devices. For example, IoT
devices deployed at a fixed-location always know to which neighbors they are communicating.
In contrast, IoMT devices do not know a-priori about their close neighbors. The first Law
of Geography needs to be further explored in terms of potential impact of geographical
proximity on the interoperability, power usage, automation of analytical tasks, data pipelines
and communication protocols of IoMT devices.
Management: Selecting the right type of an IoMT device to support a specific anticipatory task is
not an easy choice. If we choose many IoMT devices it may cause many problems such as power
drains, noises, and data latency, to mention a few. Alternatively, if fewer devices, edge nodes
and fog nodes are deployed over a large geographical area, there may be gaps in data collection.
Another challenge is how to efficiently manage the energy usage patterns of IoMT devices as
they move.
Information Loss: Processing data streams at the edge of a network brings potential information
loss, a risk that must be balanced between the efficiency of the system and the value of contextual
information lost. It also raises the an important question about possible geographical divide,
where regions of a smart city will determine which data streams should be processed at the
edge nodes, and which data streams should be processed in a cloud computing environment.
Determining which types of data streams and mobility behaviour of IoMT devices and where
they should be used for data processing remains an interesting research challenge.
Streaming Geospatial Analytics: the spatial relationship among the locations of the measured
contextual variables using a sequence of accumulated data streams is demanding new methods
that do not rely on density and proximity, but on the connectivity of a massive cloud of data
points. The research challenge is three-fold: (1) how to develop new spatial interpolation processes for
determining which data points from the current data streams should be used to estimate values at other
unknown points; (2) how to select the type of time windows that should be used for streaming geospatial
analytics; (3) geospatial summarization where the connectivity of the IoMT devices is used to summarize
accumulated data streams over space and time.
Analytics Everywhere Frameworks: From our literature review, there are over 400 architectures
that were developed to handle the incoming IoT data streams using different strategies such
as streaming, micro-batch, and batch processing. These strategies have been designed to work
towards an asynchronous approach for static IoT devices. For developing anticipatory learning
models using IoMT systems, we identified the need for Analytics Everywhere frameworks
that are capable of breaking down the processing and analytical capabilities into a network
of streaming tasks and distributing them into different compute nodes in an edge-fog-cloud
continuum. The research challenge is to develop location aware analytical capabilities to support
streaming descriptive, diagnostic and predictive analytics.
7.2. Opportunities
Along with the above-mentioned challenges, there are always some opportunities. We illustrate
some of these toward the anticipatory computing for IoMT systems.
Locations offer many opportunities to geospatial research: The context sensing ability of an
IoMT system usually produces data streams that bring the opportunity for developing new
Version April 3, 2020 submitted to ISPRS Int. J. Geo-Inf. 12 of 20
location-aware applications. The mobility of these devices can also be examined using different
spatial and temporal scales. New location prediction and mobility prediction models are needed
to support anticipatory learning models, especially in the case for smart cities.
Real-time anticipatory actions: Having a learning engine close to an IoMT device, and combining
the knowledge and insight which is computed in a cloud environment, can anticipate the needs
of citizens in real-time. As delineated in [
146
], “if this real-time analytics is fed into some kind
of a predictive model and the results are used to take the user current decisions, then we have what is
defined as anticipatory computing. If the output of the predictive model is directly fed into an automated
decision-making process, it ensures a desired outcome. This is prescriptive analytics. This roadmap
essentially is shaping the future."
Integration with opportunistic computing: There is a concern for how users carrying IoMT devices
could interact with each other opportunistically [
147
]. IoMT could be an enabler by providing
more interaction between users through moving devices. Some typical applications might
include human-centric sensing, and data sharing.
Combination of different research fields to mimic human anticipatory actions: Recently, some digital
assistants such as Apple Siri, Google Now, Microsoft Cortana [
148
] are able to help people
do things such as sending a text, playing a song, adding a reminder, etc. None of these tasks
required anticipatory actions. Researchers are looking for a tool that can give instantaneous
delivery, understand surrounding context, and be able to analyze a huge amount of streaming
data [
149
]. To achieve this, anticipatory computing needs to combine many fields of research
such as geography, deep learning, humanoid robots, artificial general intelligence, and big data
analytics.
8. Conclusions
This paper discusses anticipatory computing, which refers to systems that are focused on
anticipating what is most relevant to users and acting accordingly, rather than only reacting to user
commands. Anticipatory actions rely on different predictive models by combining processing levels
such as cloud, edge, and fog nodes deployed around a smart city. It is important to point out that
anticipatory computing and IoMT systems are continuously changing. In addition, the proliferation of
IoMT devices offers many related research challenges and opportunities as discussed in this paper.
The promising trend toward IoMT (and IoT in general) has already attracted researchers from
different industries, academic fields, research groups, government departments, etc., who are laying
the foundation for smart cities. We have identified a gap in this foundation: the anticipation actions,
which are expected to have a strong impact on the way smart cities will operate in the future. Hopefully,
the path laid out in this paper will give useful guidelines for further research in this emerging topic.
Author Contributions: These authors contributed equally to this work.
Funding: This research was supported by the NSERC/Cisco Industrial Research Chair [Grant IRCPJ 488403-14].
Acknowledgments:
The authors would like to thank Ms. Alica Farnham for proofreading this paper. The authors
also appreciate the insightful comments and suggestions provided by three anonymous reviewers and the guest
editors on the previous version of this manuscript.
Conflicts of Interest: The authors declare no conflict of interest.
Abbreviations
The following abbreviations are used in this manuscript:
Version April 3, 2020 submitted to ISPRS Int. J. Geo-Inf. 13 of 20
ANN Artificial Neural Network
DBN Dynamical Bayesian Network
ECG Electrocardiogram
GIS Geographic Information System
GPS Global Positioning System
GSM Global System for Mobile communication
LDA Latent Dirichlet Allocation
IoMT Internet of Moving Things
IoT Internet of Things
IPTV Internet Protocol television
NFC Near-Field Communication
PCA Principal Component Analysis
PR Pattern Reduction
RFID Radio-frequency Identification
SVM Support Vector Machine
UAV Unmanned Aerial Vehicle
VoD Video on Demand
VoIP Voice over Internet Protocol
References
1. Ashton, K. That ’internet of things’ thing. RFiD Journal 2009,22, 97–114.
2.
Höller, J.; Tsiatsis, V.; Mulligan, C.; Karnouskos, S.; Avesand, S.; Boyle, D. From Machine-to-Machine to the
Internet of Things: Introduction to a New Age of Intelligence; Academic Press, 2014; p. 352.
3.
Firouzi, F.; Farahani, B.; Weinberger, M.; DePace, G.; Aliee, F.S. IoT Fundamentals: Definitions,
Architectures, Challenges, and Promises. In Intelligent Internet of Things; Springer, 2020; pp. 3–50.
4.
Fleisch, E.; others. What is the internet of things? An economic perspective. Economics, Management, and
Financial Markets 2010,5, 125–157.
5.
Khan, W.; Rehman, M.; Zangoti, H.; Afzal, M.; Armi, N.; Salah, K. Industrial internet of things: Recent
advances, enabling technologies and open challenges. Computers & Electrical Engineering
2020
,81, 106522.
6.
Asghari, P.; Rahmani, A.M.; Javadi, H.H.S. Internet of Things applications: A systematic review. Computer
Networks 2019,148, 241–261.
7.
Nord, J.H.; Koohang, A.; Paliszkiewicz, J. The Internet of Things: Review and theoretical framework.
Expert Systems with Applications 2019.
8.
Joseph Bradley.; Barbier, J.; Handler, D. Embracing the Internet of Everything To Capture Your Share of $
14 . 4 Trillion. Cisco Ibsg Group 2013, p. 2013.
9.
Oliveira, L.; Manera, L.; Luz, P. Smart Traffic Light Controller System. 2019 Sixth International Conference
on Internet of Things: Systems, Management and Security (IOTSMS). IEEE, 2019, pp. 155–160.
10.
Sotres, P.; Lanza, J.; Sánchez, L.; Santana, J.R.; López, C.; Muñoz, L. Breaking vendors and city locks
through a semantic-enabled global interoperable internet-of-things system: A smart parking case. Sensors
2019,19, 229.
11.
Zemrane, H.; Baddi, Y.; Hasbi, A. Internet of Things Smart Home Ecosystem. In Emerging Technologies for
Connected Internet of Vehicles and Intelligent Transportation System Networks; Springer, 2020; pp. 101–125.
12.
Sadoughi, F.; Behmanesh, A.; Sayfouri, N. Internet of Things in Medicine: A Systematic Mapping Study.
Journal of Biomedical Informatics 2020, p. 103383.
13.
Langley, D.J.; van Doorn, J.; Ng, I.C.; Stieglitz, S.; Lazovik, A.; Boonstra, A. The Internet of Everything:
Smart things and their impact on business models. Journal of Business Research 2020.
14.
Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of Things (IoT): A vision, architectural
elements, and future directions. Future Generation Computer Systems
2013
,29, 1645–1660, [1207.0203].
doi:10.1016/j.future.2013.01.010.
15.
Gluhak, A.; Krco, S.; Nati, M.; Pfisterer, D.; Mitton, N.; Razafindralambo, T. A survey on
facilities for experimental internet of things research. IEEE Communications Magazine
2011
,49, 58–67.
doi:10.1109/MCOM.2011.6069710.
Version April 3, 2020 submitted to ISPRS Int. J. Geo-Inf. 14 of 20
16.
Sheng, Z.; Yang, S.; Yu, Y.; Vasilakos, A.; McCann, J.; Leung, K. A survey on the ietf protocol suite for the
internet of things: Standards, challenges, and opportunities. IEEE Wireless Communications
2013
,20, 91–98.
doi:10.1109/MWC.2013.6704479.
17.
Mainetti, L.; Patrono, L.; Vilei, A. Evolution of wireless sensor networks towards the Internet of Things:
A survey. 2011 International Conference on Software, Telecommunications and Computer Networks,
SoftCOM 2011, 2011, pp. 16–21.
18.
Xu, L.D.; He, W.; Li, S. Internet of things in industries: A survey. IEEE Transactions on Industrial Informatics
2014,10, 2233–2243. doi:10.1109/TII.2014.2300753.
19.
Whitmore, A.; Agarwal, A.; Da Xu, L. The Internet of Things—A survey of topics and trends. Information
Systems Frontiers 2015,17, 261–274. doi:10.1007/s10796-014-9489-2.
20.
Shariatzadeh, N.; Lundholm, T.; Lindberg, L.; Sivard, G. Integration of Digital Factory with Smart Factory
Based on Internet of Things. Procedia CIRP 2016,50, 512–517. doi:10.1016/j.procir.2016.05.050.
21.
Soliman, M.; Abiodun, T.; Hamouda, T.; Zhou, J.; Lung, C.H. Smart home: Integrating internet of things
with web services and cloud computing. Proceedings of the International Conference on Cloud Computing
Technology and Science, CloudCom, 2013, Vol. 2, pp. 317–320. doi:10.1109/CloudCom.2013.155.
22.
Bui, N.; Zorzi, M. Health care applications: A solution based on the Internet of Things. ACM International
Conference Proceeding Series, 2011, pp. 0–4. doi:10.1145/2093698.2093829.
23.
Leung, C.K.S.; Cuzzocrea, A.; Jiang, F. Discovering frequent patterns from uncertain data streams with
time-fading and landmark models. In Transactions on Large-Scale Data-and Knowledge-Centered Systems VIII;
Springer, 2013; pp. 174–196.
24.
Lee, G.; Yun, U.; Ryu, K.H. Sliding window based weighted maximal frequent pattern mining over data
streams. Expert Systems with Applications 2014,41, 694–708.
25.
Carnein, M.; Trautmann, H. Optimizing data stream representation: An extensive survey on stream
clustering algorithms. Business & Information Systems Engineering 2019,61, 277–297.
26.
Giannella, C.; Han, J.; Pei, J.; Yan, X.; Yu, P.S. Mining frequent patterns in data streams at multiple time
granularities. Next generation data mining 2003,212, 191–212.
27.
Pejovic, V.; Musolesi, M. Anticipatory mobile computing: A survey of the state of the art and research
challenges. ACM Computing Surveys 2015,47, 1–29, [arXiv:1306.2356v2]. doi:10.1145/2693843.
28. Rosen, R. Anticipatory systems. In Anticipatory systems; Springer, 2012; pp. 313–370.
29.
Nadin, M. Anticipatory Computing: from a High-Level Theory to Hybrid Computing Implementations.
International Journal of Applied Research on Information Technology and Computing
2010
,1, 1.
doi:10.5958/j.0975-8070.1.1.001.
30.
Nadin, M. Can Predictive Computation Reach the Level of Anticipatory Computing? International Journal of
Applied Research on Information Technology and Computing
2014
,5, 171. doi:10.5958/0975-8089.2014.00011.6.
31.
Butz, M.V.; Sigaud, O.; Gérard, P. Anticipatory behavior: Exploiting knowledge about the future to improve
current behavior. Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science),
2003, Vol. 2684, pp. 1–10. doi:10.1007/978-3-540-45002-3_1.
32.
Cao, H.; Wachowicz, M.; Renso, C.; Carlini, E. An edge-fog-cloud platform for anticipatory learning
process designed for internet of mobile things. arXiv preprint arXiv:1711.09745 2017.
33.
Hernandez, L.; Cao, H.; Wachowicz, M. Implementing an edge-fog-cloud architecture for stream data
management. 2017 IEEE Fog World Congress (FWC). IEEE, 2017, pp. 1–6.
34.
Cao, H.; Wachowicz, M. The design of a streaming analytical workflow for processing massive transit
feeds. 2nd International Symposium on Spatiotemporal Computing. Harvard University, Cambridge, MA,
USA, 2017.
35.
Cao, H.; Wachowicz, M. The design of an IoT-GIS platform for performing automated analytical tasks.
Computers, Environment and Urban Systems 2019,74, 23–40.
36. Li, S.; Da Xu, L.; Zhao, S. The internet of things: a survey. Information Systems Frontiers 2015,17, 243–259.
37.
Bajari, P.; Chernozhukov, V.; Hortaçsu, A.; Suzuki, J. The impact of big data on firm performance: An
empirical investigation. AEA Papers and Proceedings, 2019, Vol. 109, pp. 33–37.
38.
Assunção, M.D.; Calheiros, R.N.; Bianchi, S.; Netto, M.A.; Buyya, R. Big Data computing and clouds:
Trends and future directions. Journal of Parallel and Distributed Computing
2015
,79-80, 3–15, [1312.4722].
doi:10.1016/j.jpdc.2014.08.003.
Version April 3, 2020 submitted to ISPRS Int. J. Geo-Inf. 15 of 20
39.
McAfee, A.; Brynjolfsson, E.; Davenport, T.H.; Patil, D.; Barton, D. Big data: the management revolution.
Harvard business review 2012,90, 60–68.
40. Marz, N.; Warren, J. Big Data: Principles and best practices of scalable realtime data systems; 2015; p. 328.
41.
Dai, H.N.; Wang, H.; Xu, G.; Wan, J.; Imran, M. Big data analytics for manufacturing internet of things:
opportunities, challenges and enabling technologies. Enterprise Information Systems 2019, pp. 1–25.
42.
Qin, Y.; Sheng, Q.Z.; Falkner, N.J.; Dustdar, S.; Wang, H.; Vasilakos, A.V. When things matter: A
survey on data-centric internet of things. Journal of Network and Computer Applications
2016
,64, 137–153.
doi:10.1016/j.jnca.2015.12.016.
43.
Sun, W.; Zhu, J.; Duan, N.; Gao, P.; Hu, G.Q.; Dong, W.S.; Wang, Z.H.; Zhang, X.; Ji, P.; Ma, C.Y.; Huang,
J.C. Moving object map analytics: A framework enabling contextual spatial-temporal analytics of Internet
of Things applications. Proceedings - 2016 IEEE International Conference on Service Operations and
Logistics, and Informatics, SOLI 2016, 2016, pp. 101–106. doi:10.1109/SOLI.2016.7551669.
44.
Zhang, D.; Zhao, S.; Yang, L.T.; Chen, M.; Wang, Y.; Liu, H. NextMe: Localization Using
Cellular Traces in Internet of Things. IEEE Transactions on Industrial Informatics
2015
,11, 302–312.
doi:10.1109/TII.2015.2389656.
45.
Kantarci, B.; Mouftah, H.T. Mobility-aware trustworthy crowdsourcing in cloud-centric Internet
of Things. Proceedings - International Symposium on Computers and Communications, 2014.
doi:10.1109/ISCC.2014.6912581.
46.
Vieira, M.R.; Barbosa, L.; Kormáksson, M.; Zadrozny, B. USapiens: A System for Urban Trajectory Data
Analytics. Proceedings - IEEE International Conference on Mobile Data Management, 2015, Vol. 1, pp.
255–262. doi:10.1109/MDM.2015.35.
47.
Sánchez López, T.; Ranasinghe, D.C.; Harrison, M.; McFarlane, D. Adding sense to the Internet of Things:
An architecture framework for Smart Object systems. Personal and Ubiquitous Computing
2012
,16, 291–308.
doi:10.1007/s00779-011-0399-8.
48.
Somov, A.; Dupont, C.; Giaffreda, R. Supporting smart-city mobility with cognitive internet of things. 2013
Future Network and Mobile Summit, FutureNetworkSummit 2013 2013.
49.
Mozaffari, M.; Saad, W.; Bennis, M.; Debbah, M. Mobile internet of things: Can UAVs provide an
energy-efficient mobile architecture?, 2016, [1607.02766]. doi:10.1109/GLOCOM.2016.7841993.
50.
Puiu, D.; Bischof, S.; Serbanescu, B.; Nechifor, S.; Parreira, J.; Schreiner, H. A public transportation journey
planner enabled by IoT data analytics. 2017 20th Conference on Innovations in Clouds, Internet and
Networks (ICIN). IEEE, 2017, pp. 355–359.
51.
Araújo, A.; Kalebe, R.; Girao, G.; Gonçalves, K.; Neto, B.; others. Reliability analysis of an IoT-based smart
parking application for smart cities. 2017 IEEE International Conference on Big Data (Big Data). IEEE,
2017, pp. 4086–4091.
52.
Welbourne, E.; Battle, L.; Cole, G.; Gould, K.; Rector, K.; Raymer, S.; Balazinska, M.; Borriello, G. Building
the internet of things using RFID: The RFID ecosystem experience. IEEE Internet Computing
2009
,13, 48–55,
[96332259]. doi:10.1109/MIC.2009.52.
53.
Kumar, N.; Chilamkurti, N.; Misra, S. Bayesian coalition game for the internet of things:
An ambient intelligence-based evaluation. IEEE Communications Magazine
2015
,53, 48–55.
doi:10.1109/MCOM.2015.7010515.
54.
D’Oro, S.; Galluccio, L.; Morabito, G.; Palazzo, S. Exploiting object group localization in the internet
of things: Performance analysis. IEEE Transactions on Vehicular Technology
2015
,64, 3645–3656.
doi:10.1109/TVT.2014.2356231.
55.
Zhou, L.; Chao, H.C. Multimedia traffic security architecture for the internet of things. IEEE Network
2011
,
25, 35–40. doi:10.1109/MNET.2011.5772059.
56.
Nahrstedt, K.; Li, H.; Nguyen, P.; Chang, S.; Vu, L. Internet of mobile things: Mobility-driven challenges,
designs and implementations. Proceedings - 2016 IEEE 1st International Conference on Internet-of-Things
Design and Implementation, IoTDI 2016, 2016, pp. 25–36. doi:10.1109/IoTDI.2015.41.
57.
Atzmueller, M.; Fries, B.; Hayat, N. Sensing, processing and analytics - Augmenting the ubicon
platform for anticipatory ubiquitous computing. UbiComp 2016 Adjunct - Proceedings of the 2016
ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016, pp. 1239–1246.
doi:10.1145/2968219.2968438.
Version April 3, 2020 submitted to ISPRS Int. J. Geo-Inf. 16 of 20
58.
Ma, X.; Yu, H.; Wang, Y.; Wang, Y. Large-scale transportation network congestion evolution prediction
using deep learning theory. PLoS ONE 2015,10. doi:10.1371/journal.pone.0119044.
59.
Zhu, X.; Kui, F.; Wang, Y. Predictive analytics by using bayesian model averaging for large-scale internet of
things. International Journal of Distributed Sensor Networks 2013,2013. doi:10.1155/2013/723260.
60.
Semanjski, I.; Gautama, S. Smart city mobility application—gradient boosting trees for mobility
prediction and analysis based on crowdsourced data. Sensors (Switzerland)
2015
,15, 15974–15987.
doi:10.3390/s150715974.
61.
Semanjski, I.; Lopez, A.J.; Gautama, S. Forecasting Transport Mode Use with Support Vector Machines
Based Approach. Transactions on Maritime Science 2016,5, 111–120. doi:10.7225/toms.v05.n02.002.
62.
Zhang, F.; Yuan, N.J.; Wang, Y.; Xie, X. Reconstructing individual mobility from smart card transactions:
a collaborative space alignment approach. Knowledge and Information Systems
2015
,44, 299–323.
doi:10.1007/s10115-014-0763-x.
63.
Zhang, W.; Li, S.; Pan, G. Mining the semantics of origin-destination flows using taxi traces. UbiComp
2012
,
p. 943. doi:10.1145/2370216.2370425.
64.
Wang, J.; Jiang, C.; Han, Z.; Ren, Y.; Hanzo, L. Internet of vehicles: Sensing-aided transportation information
collection and diffusion. IEEE Transactions on Vehicular Technology 2018,67, 3813–3825.
65.
Zhang, M.; Wo, T.; Xie, T.; Lin, X.; Liu, Y. Carstream: an industrial system of big data processing for
internet-of-vehicles. Proceedings of the VLDB Endowment 2017,10, 1766–1777.
66.
Celesti, A.; Galletta, A.; Carnevale, L.; Fazio, M.; ´
Lay-Ekuakille, A.; Villari, M. An IoT cloud system for
traffic monitoring and vehicular accidents prevention based on mobile sensor data processing. IEEE
Sensors Journal 2017,18, 4795–4802.
67.
Yang, J.; Han, Y.; Wang, Y.; Jiang, B.; Lv, Z.; Song, H. Optimization of real-time traffic network assignment
based on IoT data using DBN and clustering model in smart city. Future Generation Computer Systems
2017
.
68.
Tafidis, P.; Teixeira, J.; Bahmankhah, B.; Macedo, E.; Coelho, M.C.; Bandeira, J. Exploring crowdsourcing
information to predict traffic-related impacts. 2017 IEEE International Conference on Environment and
Electrical Engineering and 2017 IEEE Industrial and Commercial Power Systems Europe (EEEIC/I&CPS
Europe). IEEE, 2017, pp. 1–6.
69.
Manogaran, G.; Shakeel, P.M.; Fouad, H.; Nam, Y.; Baskar, S.; Chilamkurti, N.; Sundarasekar, R. Wearable
IoT smart-log patch: An edge computing-based Bayesian deep learning network system for multi access
physical monitoring system. Sensors 2019,19, 3030.
70.
Wan, J.; Al-awlaqi, M.A.; Li, M.; O’Grady, M.; Gu, X.; Wang, J.; Cao, N. Wearable IoT enabled real-time
health monitoring system. EURASIP Journal on Wireless Communications and Networking 2018,2018, 298.
71.
Herrera-Quintero, L.F.; Banse, K.; Vega-Alfonso, J.; Venegas-Sanchez, A. Smart ITS sensor for
the transportation planning using the IoT and Bigdata approaches to produce ITS cloud services.
2016 8th Euro American Conference on Telematics and Information Systems, EATIS 2016, 2016.
doi:10.1109/EATIS.2016.7520096.
72.
Wang, T.; Cardone, G.; Corradi, A.; Torresani, L.; Campbell, A.T. WalkSafe: A pedestrian safety app for
mobile phone users who walk and talk while crossing roads. HotMobile 2012 - 13th Workshop on Mobile
Computing Systems and Applications, 2012, p. 1. doi:10.1145/2162081.2162089.
73.
Meurisch, C. Intelligent personal guidance of human behavior utilizing anticipatory models. UbiComp
2016 Adjunct - Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous
Computing, 2016, pp. 441–445. doi:10.1145/2968219.2971355.
74.
Meurisch, C.; Janssen, F.; Naeem, U.; Schmidt, B.; Azam, M.A.; Möhlhäuser, M. Smarticipation-intelligent
personal guidance of human behavior utilizing anticipatory models. UbiComp 2016 Adjunct - Proceedings
of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016, pp.
1227–1230. doi:10.1145/2968219.2968436.
75.
Abowd, G.D.; Dey, A.K.; Brown, P.J.; Davies, N.; Smith, M.; Steggles, P. Towards a Better Understanding of
Context and Context-Awareness. Handheld and Ubiquitous Computing; Gellersen, H.W., Ed.; Springer
Berlin Heidelberg: Berlin, Heidelberg, 1999; pp. 304–307.
76.
Turner, E.H.; Turner, R.M.; Phelps, J.; Neal, M.; Grunden, C.; Mailman, J. Aspects of context for
understanding multi-modal communication. Lecture Notes in Computer Science (including subseries
Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 1999, Vol. 1688, pp. 523–526.
doi:10.1007/3-540-48315-2_54.
Version April 3, 2020 submitted to ISPRS Int. J. Geo-Inf. 17 of 20
77.
Bonomi, F.; Milito, R.; Natarajan, P.; Zhu, J., Fog Computing: A Platform for Internet of Things and
Analytics. In Big Data and Internet of Things: A Roadmap for Smart Environments; Springer International
Publishing: Cham, 2014; pp. 169–186. doi:10.1007/978-3-319-05029-4_7.
78.
Bonomi, F.; Milito, R.; Zhu, J.; Addepalli, S. Fog Computing and Its Role in the Internet of
Things. Proceedings of the first edition of the MCC workshop on Mobile cloud computing
2012
, pp. 13–16.
doi:10.1145/2342509.2342513.
79.
Maduako, I.; Cao, H.; Hernandez, L.; Wachowicz, M. Combining edge and cloud computing for mobility
analytics. Proceedings of the Second ACM/IEEE Symposium on Edge Computing, 2017, pp. 1–3.
80.
Ning, Z.; Huang, J.; Wang, X. Vehicular fog computing: Enabling real-time traffic management for smart
cities. IEEE Wireless Communications 2019,26, 87–93.
81.
Bellavista, P.; Berrocal, J.; Corradi, A.; Das, S.K.; Foschini, L.; Zanni, A. A survey on fog computing for the
Internet of Things. Pervasive and mobile computing 2019,52, 71–99.
82.
Larose, D.T.; Larose, C.D. Discovering knowledge in data: an introduction to data mining; Vol. 4, John Wiley &
Sons, 2014.
83.
Kuhn, M.; Johnson, K. Applied predictive modeling; Springer, 2013; pp. 1–600. doi:10.1007/978-1-4614-6849-3.
84.
Sáez, J.A.; Galar, M.; Luengo, J.; Herrera, F. INFFC: An iterative class noise filter based on the fusion of
classifiers with noise sensitivity control. Information Fusion
2016
,27, 19–32. doi:10.1016/j.inffus.2015.04.002.
85.
Sáez, J.A.; Luengo, J.; Herrera, F. Predicting noise filtering efficacy with data complexity measures for
nearest neighbor classification. Pattern Recognition 2013,46, 355–364. doi:10.1016/j.patcog.2012.07.009.
86.
Barnaghi, P.; Sheth, A.; Henson, C. From data to actionable knowledge: Big data challenges in the web of
things. IEEE Intelligent Systems 2013,28, 6–11.
87.
Liu, L.; Hou, A.; Biderman, A.; Ratti, C.; Chen, J. Understanding individual and collective mobility patterns
from smart card records: A case study in Shenzhen. IEEE Conference on Intelligent Transportation Systems,
Proceedings, ITSC, 2009, pp. 842–847. doi:10.1109/ITSC.2009.5309662.
88.
Cao, H.; Brown, M.; Chen, L.; Smith, R.; Wachowicz, M. Lessons learned from integrating batch and
stream processing using IoT data. 2019 Sixth International Conference on Internet of Things: Systems,
Management and Security (IOTSMS). IEEE, 2019, pp. 32–34.
89.
Tuv, E.; Borisov, A.; Runger, G.; Torkkola, K. Feature selection with ensembles, artificial variables, and
redundancy elimination. Journal of Machine Learning Research 2009,10, 1341–1366.
90.
Abdi, H.; Williams, L.J. Principal component analysis. Wiley Interdisplinary Reviews: Computational Statistics
2010.
91.
Prince, S.J.; Elder, J.H. Probabilistic linear discriminant analysis for inferences about identity. Proceedings
of the IEEE International Conference on Computer Vision, 2007. doi:10.1109/ICCV.2007.4409052.
92.
Liu, Y.; Zeng, J.; Bao, J.; Xie, L. A unified probabilistic monitoring framework for multimode processes
based on probabilistic linear discriminant analysis. IEEE Transactions on Industrial Informatics 2020.
93.
Chiang, M.C.; Tsai, C.W.; Yang, C.S. A time-efficient pattern reduction algorithm for k-means clustering.
Information Sciences 2011,181, 716–731. doi:10.1016/j.ins.2010.10.008.
94.
Gaura, E.I.; Brusey, J.; Allen, M.; Wilkins, R.; Goldsmith, D.; Rednic, R. Edge mining the internet of things.
IEEE Sensors Journal 2013,13, 3816–3825. doi:10.1109/JSEN.2013.2266895.
95.
Cao, H.; Wachowicz, M.; Renso, C.; Carlini, E. Analytics everywhere: generating insights from the internet
of things. IEEE Access 2019,7, 71749–71769. doi:10.1109/ACCESS.2019.2919514.
96.
Cao, H.; Wachowicz, M. An Edge-Fog-Cloud Architecture of Streaming Analytics for Internet of Things
Applications. Sensors 2019,19, 3594. doi:10.3390/s19163594.
97.
Cao, H.; Wachowicz, M. Analytics Everywhere for streaming IoT data. 2019 Sixth International
Conference on Internet of Things: Systems, Management and Security (IOTSMS). IEEE, 2019, pp. 18–25.
doi:10.1109/IOTSMS48152.2019.8939171.
98.
Krause, A.; Smailagic, A.; Siewiorek, D.P. Context-aware mobile computing: Learning context-dependent
personal preferences from a wearable sensor array. IEEE Transactions on Mobile Computing
2006
,5, 113–127.
doi:10.1109/TMC.2006.18.
99.
Tsai, C.W.; Lai, C.F.; Chiang, M.C.; Yang, L.T. Data mining for internet of things: A survey. IEEE
Communications Surveys and Tutorials 2014,16, 77–97. doi:10.1109/SURV.2013.103013.00206.
100. Burbey, I.; Martin, T.L. A survey on predicting personal mobility, 2012. doi:10.1108/17427371211221063.
Version April 3, 2020 submitted to ISPRS Int. J. Geo-Inf. 18 of 20
101.
Ali, N.A.; Abu-Elkheir, M. Data management for the Internet of Things: Green directions. 2012 IEEE
Globecom Workshops, GC Wkshps 2012 2012, pp. 386–390. doi:10.1109/GLOCOMW.2012.6477602.
102.
Bin, S.; Yuan, L.; Xiaoyi, W. Research on data mining models for the internet of things. IASP
10 - 2010 International Conference on Image Analysis and Signal Processing, 2010, pp. 127–132.
doi:10.1109/IASP.2010.5476146.
103.
Gruenerbl, A.; Osmani, V.; Bahle, G.; Carrasco, J.C.; Oehler, S.; Mayora, O.; Haring, C.; Lukowicz, P. Using
smart phone mobility traces for the diagnosis of depressive and manic episodes in bipolar patients. ACM
International Conference Proceeding Series, 2014, p. 38. doi:10.1145/2582051.2582089.
104.
Anastasiou, N.; Horng, T.C.; Knottenbelt, W. Deriving generalised stochastic Petri Net performance
models from high-precision location tracking data. VALUETOOLS 2011 - 5th International
ICST Conference on Performance Evaluation Methodologies and Tools, 2011, pp. 91–100.
doi:10.4108/icst.valuetools.2011.245715.
105.
Bhattacharya, A.; Das, S.K. LeZi-update: An information-theoretic framework for personal mobility
tracking in PCS networks. Wireless Networks 2002,8, 121–135. doi:10.1023/A:1013759724438.
106.
Scellato, S.; Musolesi, M.; Mascolo, C.; Latora, V.; Campbell, A.T. NextPlace: A spatio-temporal
prediction framework for pervasive systems. Lecture Notes in Computer Science (including subseries
Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2011
,6696 LNCS, 152–169.
doi:10.1007/978-3-642-21726-5_10.
107.
Song, L.; Kotz, D.; Jain, R.; He, X. Evaluating location predictors with extensive Wi-Fi mobility data.
Proceedings - IEEE INFOCOM, 2004, Vol. 2, pp. 1414–1424. doi:10.1145/965732.965747.
108.
De Domenico, M.; Lima, A.; Musolesi, M. Interdependence and predictability of human mobility and social
interactions. Pervasive and Mobile Computing, 2013, Vol. 9, pp. 798–807. doi:10.1016/j.pmcj.2013.07.008.
109.
Etter, V.; Kafsi, M.; Kazemi, E.; Grossglauser, M.; Thiran, P. Where to go from here? Mobility prediction from
instantaneous information. Pervasive and Mobile Computing
2013
,9, 784–797. doi:10.1016/j.pmcj.2013.07.006.
110.
Kong, F.; Li, J.; Jiang, B.; Song, H. Short-term traffic flow prediction in smart multimedia system for Internet
of Vehicles based on deep belief network. Future Generation Computer Systems 2019,93, 460–472.
111.
Atif, Y.; Kharrazi, S.; Jianguo, D.; Andler, S.F. Internet of Things data analytics for parking availability
prediction and guidance. Transactions on Emerging Telecommunications Technologies 2020, p. e3862.
112.
Liu, W.; Shoji, Y. DeepVM: RNN-based vehicle mobility prediction to support intelligent vehicle
applications. IEEE Transactions on Industrial Informatics 2019.
113.
Semanjski, I.; Gautama, S. Crowdsourcing mobility insights–Reflection of attitude based segments on high
resolution mobility behaviour data. Transportation Research Part C: Emerging 2016.
114.
Chen, X.; Xu, S.; Han, J.; Fu, H.; Pi, X.; Joe-Wong, C.; Li, Y.; Zhang, L.; Noh, H.Y.; Zhang, P. PAS: Prediction
Based Actuation System for City-scale Ride Sharing Vehicular Mobile Crowdsensing. IEEE Internet of
Things Journal 2020.
115.
Perera, K.; Dias, D. An intelligent driver guidance tool using location based services. ICSDM 2011 -
Proceedings 2011 IEEE International Conference on Spatial Data Mining and Geographical Knowledge
Services, 2011, pp. 246–251. doi:10.1109/ICSDM.2011.5969041.
116.
Wu, F.; Lei, T.K.H.; Li, Z.; Han, J. MoveMine 2.0: Mining object relationships from movement data.
Proceedings of the VLDB Endowment 2014,7, 1613–1616. doi:10.14778/2733004.2733043.
117.
Wang, H.; Gu, M.; Wu, S.; Wang, C. A driver’s car-following behavior prediction model based on
multi-sensors data. EURASIP Journal on Wireless Communications and Networking 2020,2020, 1–12.
118.
Lathia, N.; Quercia, D.; Crowcroft, J. The hidden image of the city: sensing community well-being from
urban mobility. International conference on pervasive computing. Springer, 2012, pp. 91–98.
119.
Brodie, M.A.D.; Coppens, M.J.M.; Lord, S.R.; Lovell, N.H.; Gschwind, Y.J.; Redmond, S.J.; Del Rosario,
M.B.; Wang, K.; Sturnieks, D.L.; Persiani, M.; Delbaere, K. Wearable pendant device monitoring using
new wavelet-based methods shows daily life and laboratory gaits are different. Medical and Biological
Engineering and Computing 2016,54, 663–674. doi:10.1007/s11517-015-1357-9.
120.
Mathur, S.; Jin, T.; Kasturirangan, N.; Chandrashekharan, J.; Xue, W.; Gruteser, M.; Trappe, W.
ParkNet: Drive-by sensing of road-side parking statistics. MobiSys’10 - Proceedings of the
8th International Conference on Mobile Systems, Applications, and Services, 2010, pp. 123–136.
doi:10.1145/1814433.1814448.
Version April 3, 2020 submitted to ISPRS Int. J. Geo-Inf. 19 of 20
121.
An, J.; Gui, X.; Zhang, W.; Jiang, J. Nodes social relations cognition for mobility-aware in the internet of
things. Proceedings - 2011 IEEE International Conferences on Internet of Things and Cyber, Physical and
Social Computing, iThings/CPSCom 2011, 2011, pp. 687–691. doi:10.1109/iThings/CPSCom.2011.118.
122.
Cho, E.; Myers, S.A.; Leskovec, J. Friendship and mobility: User movement in location-based social
networks. Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data
Mining, 2011, pp. 1082–1090. doi:10.1145/2020408.2020579.
123.
Horvitz, E.; Apacible, J.; Sarin, R.; Liao, L. Prediction, expectation, and surprise: Methods, designs, and
study of a deployed traffic forecasting service. Proceedings of the 21st Conference on Uncertainty in
Artificial Intelligence, UAI 2005, 2005, pp. 275–284, [1207.1352].
124.
Isaacman, S.; Becker, R.; Cáceres, R.; Kobourov, S.; Martonosi, M.; Rowland, J.; Varshavsky, A. Identifying
important places in people’s lives from cellular network data. Lecture Notes in Computer Science
(including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2011, Vol.
6696 LNCS, pp. 133–151. doi:10.1007/978-3-642-21726-5_9.
125.
Munoz-Organero, M.; Ruiz-Blaquez, R.; Sánchez-Fernández, L. Automatic detection of traffic lights, street
crossings and urban roundabouts combining outlier detection and deep learning classification techniques
based on GPS traces while driving. Computers, Environment and Urban Systems 2018,68, 1–8.
126.
Liao, L.; Fox, D.; Kautz, H. Extracting places and activities from gps traces using hierarchical conditional
random fields. The International Journal of Robotics 2007.
127.
Monreale, A.; Pinelli, F.; Trasarti, R. WhereNext : a Location Predictor on Trajectory Pattern Mining.
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining - KDD
’09 2009, pp. 637–645. doi:10.1145/1557019.1557091.
128.
Chung, Y.W.; Khaki, B.; Li, T.; Chu, C.; Gadh, R. Ensemble machine learning-based algorithm for electric
vehicle user behavior prediction. Applied Energy 2019,254, 113732.
129.
Kwon, D.; Park, S.; Baek, S.; Malaiya, R.K.; Yoon, G.; Ryu, J.T. A study on development of the blind spot
detection system for the IoT-based smart connected car. 2018 IEEE International Conference on Consumer
Electronics (ICCE). IEEE, 2018, pp. 1–4.
130. Nadin, M. Anticipatory computing. Ubiquity 2000,2000, 2–es. doi:10.1145/356503.357520.
131.
Volodymyr, M.; Koray, K.; David, S.; Rusu Andrei A.; Joel, V.; Bellemare Marc G.; Alex, G.; Martin, R.;
Fidjeland Andreas K.; Georg, O. Human-level control through deep reinforcement learning. Nature
2015
,
518, 529.
132.
Henderson, P.; Islam, R.; Bachman, P.; Pineau, J.; Precup, D.; Meger, D. Deep reinforcement learning that
matters. Thirty-Second AAAI Conference on Artificial Intelligence, 2018.
133.
Radu, V.; Tong, C.; Bhattacharya, S.; Lane, N.D.; Mascolo, C.; Marina, M.K.; Kawsar, F. Multimodal deep
learning for activity and context recognition. Proceedings of the ACM on Interactive, Mobile, Wearable and
Ubiquitous Technologies 2018,1, 1–27.
134. Lecun, Y.; Bengio, Y.; Hinton, G. Deep learning. Nature 2015,521, 436–444. doi:10.1038/nature14539.
135.
Butz, M.V. Learning classifier systems. In Springer Handbook of Computational Intelligence; 2015; pp. 961–981.
doi:10.1007/978-3-662-43505-2_47.
136.
Holmberg, S.C. Anticipatory computing with a spatio temporal fuzzy model. The first international
conference on computing, 2009, pp. 419–432. doi:10.1063/1.56315.
137.
Pejovic, V.; Musolesi, M. Anticipatory mobile computing for behaviour change interventions. UbiComp
2014 - Adjunct Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous
Computing, 2014, pp. 1025–1034. doi:10.1145/2638728.2641284.
138.
Neshenko, N.; Bou-Harb, E.; Crichigno, J.; Kaddoum, G.; Ghani, N. Demystifying IoT security: an
exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations. IEEE
Communications Surveys & Tutorials 2019,21, 2702–2733.
139.
Hassija, V.; Chamola, V.; Saxena, V.; Jain, D.; Goyal, P.; Sikdar, B. A survey on IoT security: application
areas, security threats, and solution architectures. IEEE Access 2019,7, 82721–82743.
140.
Butun, I.; Österberg, P.; Song, H. Security of the internet of things: vulnerabilities, attacks and
countermeasures. IEEE Communications Surveys & Tutorials 2019.
141.
Lu, N.; Cheng, N.; Zhang, N.; Shen, X. Connected vehicles: Solutions and challenges. IEEE Internet of
Things Journal 2014,1, 289–299.
Version April 3, 2020 submitted to ISPRS Int. J. Geo-Inf. 20 of 20
142.
Tuohy, S.; Glavin, M.; Jones, E.; Trivedi, M.; Kilmartin, L. Next generation wired intra-vehicle
networks, a review. IEEE Intelligent Vehicles Symposium, Proceedings, 2013, pp. 777–782.
doi:10.1109/IVS.2013.6629561.
143.
Bas, C.U.; Ergen, S.C. Ultra-wideband channel model for intra-vehicular wireless sensor networks beneath
the chassis: From statistical model to simulations. IEEE Transactions on Vehicular Technology
2013
,62, 14–25.
doi:10.1109/TVT.2012.2215969.
144.
Luan, T.H.; Shen, X.; Bai, F. Integrity-oriented content transmission in highway vehicular ad hoc networks.
Proceedings - IEEE INFOCOM, 2013, pp. 2562–2570. doi:10.1109/INFCOM.2013.6567063.
145.
Tang, F.; Kawamoto, Y.; Kato, N.; Liu, J. Future Intelligent and Secure Vehicular Network Toward 6G:
Machine-Learning Approaches. Proceedings of the IEEE 2019.
146. Nicoletti, B. Digital Insurance: Business Innovation in the Post-Crisis Era; Springer, 2016.
147.
Conti, M.; Kumar, M. Opportunities in opportunistic computing. Computer
2010
,43, 42–50.
doi:10.1109/MC.2010.19.
148.
Strayer, D.L.; Cooper, J.M.; Turrill, J.; Coleman, J.R.; Hopman, R.J. The smartphone and the driver’s
cognitive workload: A comparison of Apple, Google, and Microsoft’s intelligent personal assistants.
Canadian Journal of Experimental Psychology 2017,71, 93–110. doi:10.1037/cep0000104.
149.
Reed, D.; Larus, J.; Gannon, D. Imagining the future: Thoughts on computing. Computer
2012
,45, 25–30.
doi:10.1109/MC.2011.327.
c
2020 by the authors. Submitted to ISPRS Int. J. Geo-Inf. for possible open access
publication under the terms and conditions of the Creative Commons Attribution (CC BY) license
(http://creativecommons.org/licenses/by/4.0/).
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
Abstract The prerequisite for the effective operation of vehicle collision warning system is that the necessary operation is not implemented. Therefore, the behavior prediction that the driver should perform when the preceding vehicle braking is the key to improve the effectiveness of the warning system. This study was conducted to acquire characteristics in the car-following behavior when confronted by the braking of the preceding vehicle, including the reaction time and operation behavior, and establish a behavior prediction model. A driving experiment on the expressway was conducted using devices, such as millimeter-wave radars and controller area network (CAN) bus data, to acquire 845 segments of car following when the brake lamps of the car ahead are on. Data analysis demonstrates that the mean of time distance of car following, mean of car-following distance, and time-to-collision (TTC) mean are closely related with whether or not the driver slowed the car down. The operation states of the driver were divided into keeping the unchanged state of the degree of accelerator pedal opening, loosening of accelerator pedal without braking, braking, and other special situations with the input variables of car-following distance, speed of driver’s car, relative speed, time distance, and TTC using the support vector machine (SVM) method to build a prediction model for the operation behavior of the driver. The verification result showed that the model predicts driving behavior with an accuracy rate of 80%. It reflects the actual decision-making process of the driver, especially the normal operation of the driver, to loosen the accelerator pedal without braking. This model can help to optimize the algorithm of the rear-end accident warning system and improve intelligent system acceptance.
Article
Full-text available
Cutting‐edge sensors and devices are increasingly deployed within urban areas to make‐up the fabric of transmission control protocol/internet protocol connectivity driven by Internet of Things (IoT). This immersion into physical urban environments creates new data streams, which could be exploited to deliver novel cloud‐based services. Connected vehicles and road‐infrastructure data are leveraged in this article to build applications that alleviate notorious parking and induced traffic‐congestion issues. To optimize the utility of parking lots, our proposed SmartPark algorithm employs a discrete Markov‐chain model to demystify the future state of a parking lot, by the time a vehicle is expected to reach it. The algorithm features three modular sections. First, a search process is triggered to identify the expected arrival‐time periods to all parking lots in the targeted central business district (CBD) area. This process utilizes smart‐pole data streams reporting congestion rates across parking area junctions. Then, a predictive analytics phase uses consolidated historical data about past parking dynamics to infer a state‐transition matrix, showing the transformation of available spots in a parking lot over short periods of time. Finally, this matrix is projected against similar future seasonal periods to figure out the actual vacancy‐expectation of a lot. The performance evaluation over an actual busy CBD area in Stockholm (Sweden) shows increased scalability capabilities, when further parking resources are made available, compared to a baseline case algorithm. Using standard urban‐mobility simulation packages, the traffic‐congestion‐aware SmartPark is also shown to minimize the journey duration to the selected parking lot while maximizing the chances to find an available spot at the selected lot. Parking as a service.
Article
Full-text available
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium technologies and have wide range of applications in our surrounding environment. The reason behind the vast adoption of WSNs in various applications is that they have tremendously appealing features, e.g., low production cost, low installation cost, unattended network operation, autonomous and longtime operation. WSNs have started to merge with the Internet of Things (IoT) through the introduction of Internet access capability in sensor nodes and sensing ability in Internet-connected devices. Thereby, the IoT is providing access to huge amount of data, collected by the WSNs, over the Internet. Hence, the security of IoT should start with foremost securing WSNs ahead of the other components. However, owing to the absence of a physical line-of-defense, i.e. there is no dedicated infrastructure such as gateways to watch and observe the flowing information in the network, security of WSNs along with IoT is of a big concern to the scientific community. More specifically, for the application areas in which CIA (confidentiality, integrity, availability) has prime importance, WSNs and emerging IoT technology might constitute an open avenue for the attackers. Besides, recent integration and collaboration of WSNs with IoT will open new challenges and problems in terms of security. Hence, this would be a nightmare for the individuals using these systems as well as the security administrators who are managing those networks. Therefore, a detailed review of security attacks towards WSNs and IoT, along with the techniques for prevention, detection, and mitigation of those attacks are provided in this paper. In this text, attacks are categorized and treated into mainly two parts, most or all types of attacks towards WSNs and IoT are investigated under that umbrella: “Passive Attacks” and “Active Attacks”. Understanding these attacks and their associated defense mechanisms will help paving a secure path towards the proliferation and public acceptance of IoT technology.
Article
Full-text available
Internet of things (IoT) is the next era of communication. Using IoT, physical objects can be empowered to create, receive and exchange data in a seamless manner. Various IoT applications focus on automating different tasks and are trying to empower the inanimate physical objects to act without any human intervention. The existing and upcoming IoT applications are highly promising to increase the level of comfort, efficiency, and automation for the users. To be able to implement such a world in an ever growing fashion requires high security, privacy, authentication, and recovery from attacks. In this regard, it is imperative to make the required changes in the architecture of IoT applications for achieving end-to-end secure IoT environments. In this paper, a detailed review of the security-related challenges and sources of threat in IoT applications is presented. After discussing the security issues, various emerging and existing technologies focused on achieving a high degree of trust in IoT applications are discussed. Four different technologies: Blockchain, fog computing, edge computing, and machine learning to increase the level of security in IoT are discussed.
Article
Full-text available
The security issue impacting the Internet-of-Things (IoT) paradigm has recently attracted significant attention from the research community. To this end, several surveys were put forward addressing various IoT-centric topics including intrusion detection systems, threat modeling and emerging technologies. In contrast, in this work, we exclusively focus on the ever-evolving IoT vulnerabilities. In this context, we initially provide a comprehensive classification of state-of-the-art surveys, which address various dimensions of the IoT paradigm. This aims at facilitating IoT research endeavors by amalgamating, comparing and contrasting dispersed research contributions. Subsequently, we provide a unique taxonomy, which sheds the light on IoT vulnerabilities, their attack vectors, impacts on numerous security objectives, attacks which exploit such vulnerabilities, corresponding remediation methodologies and currently offered operational cyber security capabilities to infer and monitor such weaknesses. This aims at providing the reader with a multidimensional research perspective related to IoT vulnerabilities, including their technical details and consequences, which is postulated to be leveraged for remediation objectives. Additionally, motivated by the lack of empirical (and malicious) data related to the IoT paradigm, this work also presents a first look on Internet-scale IoT exploitations by drawing upon more than 1.2 GB of macroscopic, passive measurements' data. This aims at practically highlighting the severity of the IoT problem, while providing operational situational awareness capabilities, which undoubtedly would aid in the mitigation task, at large. Insightful findings, inferences and outcomes in addition to open challenges and research problems are also disclosed in this work, which we hope would pave the way for future research endeavors addressing theoretical and empirical aspects related to the imperative topic of IoT security.
Article
This research investigates electric vehicle (EV) charging behavior and aims to find the best method for its prediction in order to optimize the EV charging schedule. This paper discusses several commonly used machine learning algorithms to predict charging behavior, including stay duration and energy consumption based on historical charging records. It is noted that prediction error increases along with the rise of data entropy or the decrease of data sparsity. Thus, this paper accounts for both indicators by defining the entropy/sparsity ratio (R). When R is low, support vector regression (SVR) and random forest (RF) regression show better accuracy for stay duration and energy consumption predictions, respectively. While R is high, a diffusion-based kernel density estimator (DKDE) performs better for both predictions. The three methods are assembled as the proposed Ensemble Predicting Algorithm (EPA) to improve predicting performance by decreasing 11 of the duration and 22 of the energy consumption prediction errors. The prediction results are then applied to an optimal EV charging scheduling algorithm to minimize load variance while reducing the EV charging cost. A numerical simulation using real charging data is conducted to show the effectiveness of improved predictions and EV load management. The results show that the charging scheduling combined with EPA prediction can reduce 27% of peak load, 10% of load variation, and 4% cost reduction, compared to uncoordinated charging.
Article
The recent advances in vehicle industry and vehicle-to-everything communications are creating a huge potential market of intelligent vehicle applications, and exploiting vehicle mobility is of great importance in this field. Hence, this paper proposes a novel vehicle mobility prediction algorithm to support intelligent vehicle applications. First, a theoretical analysis is given to quantitatively reveal the predictability of vehicle mobility. Based on the knowledge earned from theoretical analysis, a deep recurrent neural network (RNN)-based algorithm called DeepVM is proposed to predict vehicle mobility in a future period of several or tens of minutes. Comprehensive evaluations have been carried out based on the real taxi mobility data in Tokyo, Japan. The results have not only proved the correctness of our theoretical analysis, but also validated that DeepVM can significantly improve the quality of vehicle mobility prediction compared with other state-of-art algorithms.
Article
In the multimedia system for Internet of Vehicles (IoVs), accurate traffic flow information processing and feedback can give drivers guidance. In traditional information processing for IoVs, few researches deal with traffic flow information processing by deep learning. Specially, most of the existing prediction technologies adopt shallow neural network, and their models for chaotic time series are prone to be restricted by multiple parameters. Over the last few years, the dawning of the big data era creates opportunities for the intelligent traffic control and management. In this paper, we take Restricted Boltzmann Machine (RBM) as the method for traffic flow prediction, which is a typical algorithm based on deep learning architecture. Considering traffic big data aggregation in IoVs, multimedia technologies provide enough real sample data for model training. RBM constructs the long-term model of polymorphic for chaotic time series, using phase space reconstruction to recognize the data. To the best of our knowledge, it is the first time apply RBM model to short-term traffic flow prediction, which can improve the performance of multimedia system in IoVs. Moreover, experimental results show that the proposed method has superior performance than traditional shallow neural network prediction methods.
Article
The automatic generation of street networks is attracting the attention of research and industry communities in areas such as routable map generation. This paper presents a novel mechanism that focuses on the automatic detection of street elements such as traffic lights, street crossings and roundabouts which could be used to generate street maps and populate them with traffic influencing infrastructural elements such as traffic lights. In order to minimize the system requirements and simplify the data collection from many users with minimal impact for them, only traces of GPS data from a mobile device while driving are used. Speed and acceleration time series are derived from the GPS data. An outlier detection algorithm is used first in order to detect abnormal driving locations (which can be due to infrastructural elements or particular traffic conditions). Using deep learning, speed and acceleration patterns are automatically analyzed at each outlier in order to extract relevant features which are then classified into a traffic light, street crossing, urban roundabout or other element. The classification results are enhanced by adding the degree of atypicity for each point calculated as the percentage of times that a particular location is detected as an outlier in several drives. The proposed algorithm achieves a combined recall of 0.89 and a combined precision of 0.88 for classification.