sensors-logo

Journal Browser

Journal Browser

Internet of Things, Big Data and Smart Systems

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Internet of Things".

Deadline for manuscript submissions: closed (31 August 2022) | Viewed by 76748

Special Issue Editors


E-Mail Website
Guest Editor
1. National Research Council of Canada, Ottawa, ON, Canada
2. Department of Electrical and Computer Engineering, University of Western Ontario, London, ON, Canada
Interests: computer-supported collaborative work; modeling and implementation of decision support systems; agent-based systems; disaster management; distributed computing; wireless sensor networks; Internet of Things; smart cities; supply chain; manufacturing systems; process optimization and scheduling
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Faculty of Computer Science, Free University of Bozen-Bolzano, 39100 Bolzano, Italy
Interests: data analsis; machine learning; smart systems
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
School of Computer Science and Technology, Tianjin University, No.135 Yaguan Road, Haihe Education Park, Tianjin 300050, China
Interests: internet of things; big data; wireless sensor networks
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Logistics Engineering, Wuhan University of Technology, Wuhan, China
Interests: body area networks; internet of things; logistics
Special Issues, Collections and Topics in MDPI journals
School of Mechanical Engineering, Dalian University of Technology, Dalian, China
Interests: connected and automated vehicles; V2X; industrial IoT; digital twins; big data; intelligent machines; cooperative connected technologies
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

The Internet of Things (IoT) has been widely accepted as a novel paradigm that can radically transform industry and society. It can achieve the seamless integration of various devices equipped with sensing, identification, processing, communication, actuation, and networking capabilities. Along these lines, Big Data is considered technology and has become a very active research area, primarily involving topics related to machine learning, database, and distributed computing. The fast development of IoT and Big Data technologies, together with 5G Communication, Edge/Cloud Computing, and Artificial Intelligence, provides great opportunities for novel smart systems and applications, including smart cities, smart manufacturing, smart transportation and logistics, smart building, smart homes, and smart healthcare.

The topics of interest include, but are not limited to:

  • Collaborative wireless sensor networks;
  • IoT architectures, protocols, and algorithms;
  • Positioning and localization in IoT;
  • Data and information management in IoT-based smart systems, including distributed storage, collaborative processing, query, manipulation, data cleaning, data fusion, and data mining;
  • Big Data analytics (including machine learning and deep learning) in IoT-based smart systems;
  • Edge/Fog/Cloud collaboration in IoT-based smart systems;
  • Intelligent decision making and control in IoT-based smart systems;
  • Reliability, security, and privacy in IoT-based smart systems;
  • Smart systems and applications (smart cities, smart manufacturing, smart transportation and logistics, smart building, smart homes, and smart healthcare).
Dr. Weiming Shen
Prof. Dr. Giancarlo Fortino
Dr. Tie Qiu
Prof. Dr. Antonio Liotta
Prof. Wenfeng Li
Dr. Yanjun Shi
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (19 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

21 pages, 1868 KiB  
Article
Pedestrian Flow Prediction and Route Recommendation with Business Events
by Jiqing Gu, Chao Song, Zheng Ren, Li Lu, Wenjun Jiang and Ming Liu
Sensors 2022, 22(19), 7478; https://doi.org/10.3390/s22197478 - 2 Oct 2022
Viewed by 1801
Abstract
Due to the potential economic benefits, pedestrian flow is considered an essential indication of public spaces. Pedestrian flow prediction is designed to assist operators in making decisions (such as shopping center owners). Operators hold certain events, such as sales promotions, to attract surrounding [...] Read more.
Due to the potential economic benefits, pedestrian flow is considered an essential indication of public spaces. Pedestrian flow prediction is designed to assist operators in making decisions (such as shopping center owners). Operators hold certain events, such as sales promotions, to attract surrounding pedestrians; we refer to this type of event as a business event. Business events attract pedestrian flows, which means business opportunities for the merchants. Moreover, their placement will affect the distributions of the pedestrian flows. However, deciding which route is chosen for a specified event is difficult. To the best of our knowledge, we are the first to consider business events when predicting pedestrian flow. In this paper, we investigate two problems: one is pedestrian flow prediction with business events, and the other is route recommendation for business events. First, we propose an Attraction-Based Matrix Factorization model (ABMF) to efficiently predict the pedestrian flow with business events, which introduces the attraction index of different categories to pedestrians in matrix factorization. Second, we leverage the Skip-gram mode to learn the latent representations and improve the pair-wise ranking loss to a flow-aware-based method (SG-FWARP), which aims to learn events’ latent representations for route recommendation. Compared with other state-of-the-art methods, the experimental results show ABMF can predict pedestrian flow matrix with a similarity of over 0.9 compared with the ground truth, and SG-FWARP can recommend routes for business events with high accuracy. Full article
(This article belongs to the Special Issue Internet of Things, Big Data and Smart Systems)
Show Figures

Figure 1

14 pages, 1067 KiB  
Article
A New Wavelet-Based Privatization Mechanism for Probability Distributions
by Hélio M. de Oliveira, Raydonal Ospina, Víctor Leiva, Carlos Martin-Barreiro and Christophe Chesneau
Sensors 2022, 22(10), 3743; https://doi.org/10.3390/s22103743 - 14 May 2022
Cited by 4 | Viewed by 1738
Abstract
In this paper, we propose a new privatization mechanism based on a naive theory of a perturbation on a probability using wavelets, such as a noise perturbs the signal of a digital image sensor. Wavelets are employed to extract information from a wide [...] Read more.
In this paper, we propose a new privatization mechanism based on a naive theory of a perturbation on a probability using wavelets, such as a noise perturbs the signal of a digital image sensor. Wavelets are employed to extract information from a wide range of types of data, including audio signals and images often related to sensors, as unstructured data. Specifically, the cumulative wavelet integral function is defined to build the perturbation on a probability with the help of this function. We show that an arbitrary distribution function additively perturbed is still a distribution function, which can be seen as a privatized distribution, with the privatization mechanism being a wavelet function. Thus, we offer a mathematical method for choosing a suitable probability distribution for data by starting from some guessed initial distribution. Examples of the proposed method are discussed. Computational experiments were carried out using a database-sensor and two related algorithms. Several knowledge areas can benefit from the new approach proposed in this investigation. The areas of artificial intelligence, machine learning, and deep learning constantly need techniques for data fitting, whose areas are closely related to sensors. Therefore, we believe that the proposed privatization mechanism is an important contribution to increasing the spectrum of existing techniques. Full article
(This article belongs to the Special Issue Internet of Things, Big Data and Smart Systems)
Show Figures

Figure 1

28 pages, 2690 KiB  
Article
A Hybrid Water Balance Machine Learning Model to Estimate Inter-Annual Rainfall-Runoff
by Amir Aieb, Antonio Liotta, Ismahen Kadri and Khodir Madani
Sensors 2022, 22(9), 3241; https://doi.org/10.3390/s22093241 - 23 Apr 2022
Cited by 2 | Viewed by 2601
Abstract
Watershed climatic diversity poses a hard problem when it comes to finding suitable models to estimate inter-annual rainfall runoff (IARR). In this work, a hybrid model (dubbed MR-CART) is proposed, based on a combination of MR (multiple regression) and CART (classification and regression [...] Read more.
Watershed climatic diversity poses a hard problem when it comes to finding suitable models to estimate inter-annual rainfall runoff (IARR). In this work, a hybrid model (dubbed MR-CART) is proposed, based on a combination of MR (multiple regression) and CART (classification and regression tree) machine-learning methods, applied to an IARR predicted data series obtained from a set of non-parametric and empirical water balance models in five climatic floors of northern Algeria between 1960 and 2020. A comparative analysis showed that the Yang, Sharif, and Zhang’s models were reliable for estimating input data of the hybrid model in all climatic classes. In addition, Schreiber’s model was more efficient in very humid, humid, and semi-humid areas. A set of performance and distribution statistical tests were applied to the estimated IARR data series to show the reliability and dynamicity of each model in all study areas. The results showed that our hybrid model provided the best performance and data distribution, where the R2Adj and p-values obtained in each case were between (0.793, 0.989), and (0.773, 0.939), respectively. The MR model showed good data distribution compared to the CART method, where p-values obtained by signtest and WSR test were (0.773, 0.705), and (0.326, 0.335), respectively. Full article
(This article belongs to the Special Issue Internet of Things, Big Data and Smart Systems)
Show Figures

Figure 1

15 pages, 1271 KiB  
Article
TraceBERT—A Feasibility Study on Reconstructing Spatial–Temporal Gaps from Incomplete Motion Trajectories via BERT Training Process on Discrete Location Sequences
by Alessandro Crivellari, Bernd Resch and Yuhui Shi
Sensors 2022, 22(4), 1682; https://doi.org/10.3390/s22041682 - 21 Feb 2022
Cited by 5 | Viewed by 2967
Abstract
Trajectory data represent an essential source of information on travel behaviors and human mobility patterns, assuming a central role in a wide range of services related to transportation planning, personalized recommendation strategies, and resource management plans. The main issue when dealing with trajectory [...] Read more.
Trajectory data represent an essential source of information on travel behaviors and human mobility patterns, assuming a central role in a wide range of services related to transportation planning, personalized recommendation strategies, and resource management plans. The main issue when dealing with trajectory recordings, however, is characterized by temporary losses in the data collection, causing possible spatial–temporal gaps and missing trajectory segments. This is especially critical in those use cases based on non-repetitive individual motion traces, when the user’s missing information cannot be directly reconstructed due to the absence of historical individual repetitive routes. Inserted in the context of location-based trajectory modeling, we tackle the problem by proposing a technical parallelism with the natural language processing domain. Specifically, we introduce the use of the Bidirectional Encoder Representations from Transformers (BERT), a state-of-the-art language representation model, into the trajectory processing research field. By training deep bidirectional representations from unlabeled location sequences, jointly conditioned on both left and right context, we derive an explicit predicted estimation of the missing locations along the trace. The proposed framework, named TraceBERT, was tested on a real-world large-scale trajectory dataset of short-term tourists, exploring an effective attempt of adapting advanced language modeling approaches into mobility-based applications and demonstrating a prominent potential on trajectory reconstruction over traditional statistical approaches. Full article
(This article belongs to the Special Issue Internet of Things, Big Data and Smart Systems)
Show Figures

Figure 1

15 pages, 4215 KiB  
Article
A Control Method with Reinforcement Learning for Urban Un-Signalized Intersection in Hybrid Traffic Environment
by Yanjun Shi, Yuanzhuo Liu, Yuhan Qi and Qiaomei Han
Sensors 2022, 22(3), 779; https://doi.org/10.3390/s22030779 - 20 Jan 2022
Cited by 14 | Viewed by 3443
Abstract
To control autonomous vehicles (AVs) in urban unsignalized intersections is a challenging problem, especially in a hybrid traffic environment where self-driving vehicles coexist with human driving vehicles. In this study, a coordinated control method with proximal policy optimization (PPO) in Vehicle-Road-Cloud Integration System [...] Read more.
To control autonomous vehicles (AVs) in urban unsignalized intersections is a challenging problem, especially in a hybrid traffic environment where self-driving vehicles coexist with human driving vehicles. In this study, a coordinated control method with proximal policy optimization (PPO) in Vehicle-Road-Cloud Integration System (VRCIS) is proposed, where this control problem is formulated as a reinforcement learning (RL) problem. In this system, vehicles and everything (V2X) was used to keep communication between vehicles, and vehicle wireless technology can detect vehicles that use vehicles and infrastructure (V2I) wireless communication, thereby achieving a cost-efficient method. Then, the connected and autonomous vehicle (CAV) defined in the VRCIS learned a policy to adapt to human driving vehicles (HDVs) across the intersection safely by reinforcement learning (RL). We have developed a valid, scalable RL framework, which can communicate topologies that may be dynamic traffic. Then, state, action and reward of RL are designed according to urban unsignalized intersection problem. Finally, how to deploy within the RL framework was described, and several experiments with this framework were undertaken to verify the effectiveness of the proposed method. Full article
(This article belongs to the Special Issue Internet of Things, Big Data and Smart Systems)
Show Figures

Figure 1

17 pages, 3278 KiB  
Article
Embedded Data Imputation for Environmental Intelligent Sensing: A Case Study
by Laura Erhan, Mario Di Mauro, Ashiq Anjum, Ovidiu Bagdasar, Wei Song and Antonio Liotta
Sensors 2021, 21(23), 7774; https://doi.org/10.3390/s21237774 - 23 Nov 2021
Cited by 12 | Viewed by 2520
Abstract
Recent developments in cloud computing and the Internet of Things have enabled smart environments, in terms of both monitoring and actuation. Unfortunately, this often results in unsustainable cloud-based solutions, whereby, in the interest of simplicity, a wealth of raw (unprocessed) data are pushed [...] Read more.
Recent developments in cloud computing and the Internet of Things have enabled smart environments, in terms of both monitoring and actuation. Unfortunately, this often results in unsustainable cloud-based solutions, whereby, in the interest of simplicity, a wealth of raw (unprocessed) data are pushed from sensor nodes to the cloud. Herein, we advocate the use of machine learning at sensor nodes to perform essential data-cleaning operations, to avoid the transmission of corrupted (often unusable) data to the cloud. Starting from a public pollution dataset, we investigate how two machine learning techniques (kNN and missForest) may be embedded on Raspberry Pi to perform data imputation, without impacting the data collection process. Our experimental results demonstrate the accuracy and computational efficiency of edge-learning methods for filling in missing data values in corrupted data series. We find that kNN and missForest correctly impute up to 40% of randomly distributed missing values, with a density distribution of values that is indistinguishable from the benchmark. We also show a trade-off analysis for the case of bursty missing values, with recoverable blocks of up to 100 samples. Computation times are shorter than sampling periods, allowing for data imputation at the edge in a timely manner. Full article
(This article belongs to the Special Issue Internet of Things, Big Data and Smart Systems)
Show Figures

Figure 1

19 pages, 914 KiB  
Article
Quantitative Study on the Impact of Energy Consumption Based Dynamic Selfishness in MANETs
by Axida Shan, Xiumei Fan, Celimuge Wu, Xinghui Zhang and Shujia Fan
Sensors 2021, 21(3), 716; https://doi.org/10.3390/s21030716 - 21 Jan 2021
Cited by 14 | Viewed by 2847
Abstract
Cooperative communication and resource limitation are two main characteristics of mobile ad hoc networks (MANETs). On one hand, communication among the nodes in MANETs highly depends on the cooperation among nodes because of the limited transmission range of the nodes, and multi-hop communications [...] Read more.
Cooperative communication and resource limitation are two main characteristics of mobile ad hoc networks (MANETs). On one hand, communication among the nodes in MANETs highly depends on the cooperation among nodes because of the limited transmission range of the nodes, and multi-hop communications are needed in most cases. On the other hand, every node in MANETs has stringent resource constraints on computations, communications, memory, and energy. These two characteristics lead to the existence of selfish nodes in MANETs, which affects the network performance in various aspects. In this paper, we quantitatively investigate the impacts of node selfishness caused by energy depletion in MANETs in terms of packet loss rate, round-trip delay, and throughput. We conducted extensive measurements on a proper simulation platform incorporating an OMNeT++ and INET Framework. Our experimental results quantitatively indicate the impact of node selfishness on the network performance in MANETs. The results also imply that it is important to evaluate the impact of node selfishness by jointly considering selfish nodes’ mobility models, densities, proportions, and combinations. Full article
(This article belongs to the Special Issue Internet of Things, Big Data and Smart Systems)
Show Figures

Figure 1

28 pages, 9356 KiB  
Article
An AI-Application-Oriented In-Class Teaching Evaluation Model by Using Statistical Modeling and Ensemble Learning
by Junqi Guo, Ludi Bai, Zehui Yu, Ziyun Zhao and Boxin Wan
Sensors 2021, 21(1), 241; https://doi.org/10.3390/s21010241 - 1 Jan 2021
Cited by 32 | Viewed by 5819
Abstract
In-class teaching evaluation, which is utilized to assess the process and effect of both teachers’ teaching and students’ learning in a classroom environment, plays an increasingly crucial role in supervising and promoting education quality. With the rapid development of artificial intelligence (AI) technology, [...] Read more.
In-class teaching evaluation, which is utilized to assess the process and effect of both teachers’ teaching and students’ learning in a classroom environment, plays an increasingly crucial role in supervising and promoting education quality. With the rapid development of artificial intelligence (AI) technology, the concept of smart education has been constantly improved and gradually penetrated into all aspects of education application. Considering the dominant position of classroom teaching in elementary and undergraduate education, the introduction of AI technology into in-class teaching evaluation has become a research hotspot. In this paper, we propose a statistical modeling and ensemble learning-based comprehensive model, which is oriented towards in-class teaching evaluation by using AI technologies such as computer vision (CV) and intelligent speech recognition (ISR). Firstly, we present an index system including a set of teaching evaluation indicators combining traditional assessment scales with new values derived from CV and ISR-based AI analysis. Next, we design a comprehensive in-class teaching evaluation model by using both the analytic hierarchy process-entropy weight (AHP-EW) and AdaBoost-based ensemble learning (AdaBoost-EL) methods. Experiments not only demonstrate that the two modules in the model are respectively applicable to the calculation of indicators with different characteristics, but also verify the performance of the proposed model for AI-based in-class teaching evaluation. In this comprehensive in-class evaluation model, for students’ concentration and participation, ensemble learning module is chosen with less root mean square error (RMSE) of 8.318 and 9.375. In addition, teachers’ media usage and teachers’ type evaluated by statistical modeling module approach higher accuracy with 0.905 and 0.815. Instead, the ensemble learning approaches the accuracy of 0.73 in evaluating teachers’ style, which performs better than the statistical modeling module with the accuracy of 0.69. Full article
(This article belongs to the Special Issue Internet of Things, Big Data and Smart Systems)
Show Figures

Figure 1

19 pages, 3934 KiB  
Article
An Ultra-Short Baseline Underwater Positioning System with Kalman Filtering
by Qinghua Luo, Xiaozhen Yan, Chunyu Ju, Yunsai Chen and Zhenhua Luo
Sensors 2021, 21(1), 143; https://doi.org/10.3390/s21010143 - 28 Dec 2020
Cited by 26 | Viewed by 6224
Abstract
The ultra-short baseline underwater positioning is one of the most widely applied methods in underwater positioning and navigation due to its simplicity, efficiency, low cost, and accuracy. However, there exists environmental noise, which has negative impacts on the positioning accuracy during the ultra-short [...] Read more.
The ultra-short baseline underwater positioning is one of the most widely applied methods in underwater positioning and navigation due to its simplicity, efficiency, low cost, and accuracy. However, there exists environmental noise, which has negative impacts on the positioning accuracy during the ultra-short baseline (USBL) positioning process, which results in a large positioning error. The positioning result may lead to wrong decision-making in the latter processing. So, it is necessary to consider the error sources, and take effective measurements to minimize the negative impact of the noise. In our work, we propose a USBL positioning system with Kalman filtering to improve the positioning accuracy. In this system, we first explore a new kind of element array to accurately capture the acoustic signals from the object. We then organically combine the Kalman filters with the array elements to filter the acoustic signals, using the minimum mean-square error rule to obtain accurate acoustic signals. We got the high-precision phase difference information based on the non-equidistant quaternary original array and the phase difference acquisition mechanism. Finally, on account of the obtained accurate phase difference information and position calculation, we determined the coordinates of the underwater target. Comprehensive evaluation results demonstrate that our proposed USBL positioning method based on the Kalman filter algorithm can effectively enhance the positioning accuracy. Full article
(This article belongs to the Special Issue Internet of Things, Big Data and Smart Systems)
Show Figures

Figure 1

19 pages, 3303 KiB  
Article
Understanding Data-Driven Cyber-Physical-Social System (D-CPSS) Using a 7C Framework in Social Manufacturing Context
by Dao Yin, Xinguo Ming and Xianyu Zhang
Sensors 2020, 20(18), 5319; https://doi.org/10.3390/s20185319 - 17 Sep 2020
Cited by 35 | Viewed by 4824
Abstract
The trend towards socialization, personalization and servitization in smart manufacturing has attracted the attention of researchers, practitioners and governments. Social manufacturing is a novel manufacturing paradigm responding to this trend. However, the current cyber–physical system (CPS) merges only cyber and physical space; social [...] Read more.
The trend towards socialization, personalization and servitization in smart manufacturing has attracted the attention of researchers, practitioners and governments. Social manufacturing is a novel manufacturing paradigm responding to this trend. However, the current cyber–physical system (CPS) merges only cyber and physical space; social space is missing. A cyber–physical–social system (CPSS)-based smart manufacturing is in demand, which incorporates cyber space, physical space and social space. With the development of the Internet of Things and social networks, a large volume of data is generated. A data-driven view is necessary to link tri-space. However, there is a lack of systematical investigation on the integration of CPSS and the data-driven view in the context of social manufacturing. This article proposes a seven-layered framework for a data-driven CPSS (D-CPSS) along the data–information–knowledge–wisdom (DIKW) pyramid under a social manufacturing environment. The evolution, components, general model and framework of D-CPSS are illustrated. An illustrative example is provided to explain the proposed framework. Detailed discussion and future perspectives on implementation are also presented. Full article
(This article belongs to the Special Issue Internet of Things, Big Data and Smart Systems)
Show Figures

Figure 1

17 pages, 38886 KiB  
Article
A Novel Method about the Representation and Discrimination of Traffic State
by Junfeng Jiang, Qiushi Chen, Jie Xue, Haobo Wang and Zhijun Chen
Sensors 2020, 20(18), 5039; https://doi.org/10.3390/s20185039 - 4 Sep 2020
Cited by 3 | Viewed by 2516
Abstract
The representation and discrimination of various traffic states play an essential role in solving traffic accidents and congestion as the foundation of traffic state prediction. However, the existing representation of the traffic state usually only considers the road congestion layer and divides the [...] Read more.
The representation and discrimination of various traffic states play an essential role in solving traffic accidents and congestion as the foundation of traffic state prediction. However, the existing representation of the traffic state usually only considers the road congestion layer and divides the traffic state into congested and unblocked. Representation only at the congestion layer is difficult to reflect the road traffic state comprehensively. Therefore, we select three indicators from the layers of road congestion, road safety, and road stability, respectively, then utilizing K-means to cluster the traffic state. The clustering results can be regarded as a new type for the representation of a traffic state. As a result, the traffic states are divided into four classes, which comprehensively reflects the level of road congestion, safety, and stability. Using the four traffic states obtained from the clustering results as class labels, we applied a multi-layer perceptron (MLP) to classify the different traffic states, and the receiver operating characteristic (ROC) curve is assessed to verify the superiority of the classification results. Finally, a visual display of the real-time traffic state in a city’s central area was given. Full article
(This article belongs to the Special Issue Internet of Things, Big Data and Smart Systems)
Show Figures

Figure 1

17 pages, 506 KiB  
Article
Probe Request Based Device Identification Attack and Defense
by Xiaolin Gu, Wenjia Wu, Xiaodan Gu, Zhen Ling, Ming Yang and Aibo Song
Sensors 2020, 20(16), 4620; https://doi.org/10.3390/s20164620 - 17 Aug 2020
Cited by 15 | Viewed by 5168
Abstract
Wi-Fi network has an open nature so that it needs to face greater security risks compared to wired network. The MAC address represents the unique identifier of the device, and is easily obtained by an attacker. Therefore MAC address randomization is proposed to [...] Read more.
Wi-Fi network has an open nature so that it needs to face greater security risks compared to wired network. The MAC address represents the unique identifier of the device, and is easily obtained by an attacker. Therefore MAC address randomization is proposed to protect the privacy of devices in a Wi-Fi network. However, implicit identifiers are used by attackers to identify user’s device, which can cause the leakage of user’s privacy. We propose device identification based on 802.11ac probe request frames. Here, a detailed analysis on the effectiveness of 802.11ac fields is given and a novel device identification method based on deep learning whose average f1-score exceeds 99% is presented. With a purpose of preventing attackers from obtaining relevant information by the device identification method above, we design a novel defense mechanism based on stream cipher. In that case, the original content of probe request frame is hidden by encrypting probe request frames and construction of probe request is reserved to avoid the finding of attackers. This defense mechanism can effectively reduce the performance of the proposed device identification method whose average f1-score is below 30%. In general, our research on attack and defense mechanism can preserve device privacy better. Full article
(This article belongs to the Special Issue Internet of Things, Big Data and Smart Systems)
Show Figures

Figure 1

17 pages, 1473 KiB  
Article
Real-Time Production and Logistics Self-Adaption Scheduling Based on Information Entropy Theory
by Wenchao Yang, Wenfeng Li, Yulian Cao, Yun Luo and Lijun He
Sensors 2020, 20(16), 4507; https://doi.org/10.3390/s20164507 - 12 Aug 2020
Cited by 12 | Viewed by 3297
Abstract
In recent years, the individualized demand of customers brings small batches and diversification of orders towards enterprises. The application of enabling technologies in the factory, such as the industrial Internet of things (IIoT) and cloud manufacturing (CMfg), enhances the ability of customer requirement [...] Read more.
In recent years, the individualized demand of customers brings small batches and diversification of orders towards enterprises. The application of enabling technologies in the factory, such as the industrial Internet of things (IIoT) and cloud manufacturing (CMfg), enhances the ability of customer requirement automatic elicitation and the manufacturing process control. The job shop scheduling problem with a random job arrival time dramatically increases the difficulty in process management. Thus, how to collaboratively schedule the production and logistics resources in the shop floor is very challenging, and it has a fundamental and practical significance of achieving the competitiveness for an enterprise. To address this issue, the real-time model of production and logistics resources is built firstly. Then, the task entropy model is built based on the task information. Finally, the real-time self-adaption collaboration of production and logistics resources is realized. The proposed algorithm is carried out based on a practical case to evaluate its effectiveness. Experimental results show that our proposed algorithm outperforms three existing algorithms. Full article
(This article belongs to the Special Issue Internet of Things, Big Data and Smart Systems)
Show Figures

Figure 1

16 pages, 1806 KiB  
Article
An Edge Based Multi-Agent Auto Communication Method for Traffic Light Control
by Qiang Wu, Jianqing Wu, Jun Shen, Binbin Yong and Qingguo Zhou
Sensors 2020, 20(15), 4291; https://doi.org/10.3390/s20154291 - 31 Jul 2020
Cited by 19 | Viewed by 5045
Abstract
With smart city infrastructures growing, the Internet of Things (IoT) has been widely used in the intelligent transportation systems (ITS). The traditional adaptive traffic signal control method based on reinforcement learning (RL) has expanded from one intersection to multiple intersections. In this paper, [...] Read more.
With smart city infrastructures growing, the Internet of Things (IoT) has been widely used in the intelligent transportation systems (ITS). The traditional adaptive traffic signal control method based on reinforcement learning (RL) has expanded from one intersection to multiple intersections. In this paper, we propose a multi-agent auto communication (MAAC) algorithm, which is an innovative adaptive global traffic light control method based on multi-agent reinforcement learning (MARL) and an auto communication protocol in edge computing architecture. The MAAC algorithm combines multi-agent auto communication protocol with MARL, allowing an agent to communicate the learned strategies with others for achieving global optimization in traffic signal control. In addition, we present a practicable edge computing architecture for industrial deployment on IoT, considering the limitations of the capabilities of network transmission bandwidth. We demonstrate that our algorithm outperforms other methods over 17% in experiments in a real traffic simulation environment. Full article
(This article belongs to the Special Issue Internet of Things, Big Data and Smart Systems)
Show Figures

Figure 1

21 pages, 981 KiB  
Article
Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things
by Abid Rauf, Zhaohong Wang, Hasan Sajid and Muhammad Ali Tahir
Sensors 2020, 20(15), 4221; https://doi.org/10.3390/s20154221 - 29 Jul 2020
Cited by 4 | Viewed by 2930
Abstract
As accessibility of networked devices becomes more and more ubiquitous, groundbreaking applications of the Internet of Things (IoT) find their place in many aspects of our society. The exploitation of these devices is the main reason for the cyberattacks in IoT networks. Security [...] Read more.
As accessibility of networked devices becomes more and more ubiquitous, groundbreaking applications of the Internet of Things (IoT) find their place in many aspects of our society. The exploitation of these devices is the main reason for the cyberattacks in IoT networks. Security design is still an open problem and a crucial step in making IoT applications successful. In dicey environments, such as e-health, smart grid, and smart cities, real-time commands must reach the end devices in the scale of milliseconds. Traditional public-key cryptosystem, albeit necessary in the context of general Internet security, falls short in establishing new session keys in the scale of milliseconds for critical messages. In this paper, a systematic perspective for securing IoT communication, specifically satisfying the real-time constraint against certain adversaries in realistic settings. First, at the network layer, we propose a secret random route computation scheme using the software-defined network (SDN) based on a capability scheme using the network actions. The computed routes are random in the eyes of the eavesdropper. Second, at the application layer, the source breaks command messages into secret shares and sends them through the network to the destination. Only the legitimate destination device can reconstruct the command. The secret sharing scheme is efficient compared to PKI and comes with information-theoretic security against adversaries. Our proof formalizes the notion of security of the proposed scheme, and our simulations validate our design. Full article
(This article belongs to the Special Issue Internet of Things, Big Data and Smart Systems)
Show Figures

Figure 1

13 pages, 1748 KiB  
Article
Towards Attention-Based Convolutional Long Short-Term Memory for Travel Time Prediction of Bus Journeys
by Jianqing Wu, Qiang Wu, Jun Shen and Chen Cai
Sensors 2020, 20(12), 3354; https://doi.org/10.3390/s20123354 - 12 Jun 2020
Cited by 23 | Viewed by 3678
Abstract
Travel time prediction is critical for advanced traveler information systems (ATISs), which provides valuable information for enhancing the efficiency and effectiveness of the urban transportation systems. However, in the area of bus trips, existing studies have focused on directly using the structured data [...] Read more.
Travel time prediction is critical for advanced traveler information systems (ATISs), which provides valuable information for enhancing the efficiency and effectiveness of the urban transportation systems. However, in the area of bus trips, existing studies have focused on directly using the structured data to predict travel time for a single bus trip. For state-of-the-art public transportation information systems, a bus journey generally has multiple bus trips. Additionally, due to the lack of study on data fusion, it is even inadequate for the development of underlying intelligent transportation systems. In this paper, we propose a novel framework for a hybrid data-driven travel time prediction model for bus journeys based on open data. We explore a convolutional long short-term memory (ConvLSTM) model with a self-attention mechanism that accurately predicts the running time of each segment of the trips and the waiting time at each station. The model is more robust to capture long-range dependence in time series data as well. Full article
(This article belongs to the Special Issue Internet of Things, Big Data and Smart Systems)
Show Figures

Figure 1

18 pages, 1380 KiB  
Article
A Two-Stage Service Migration Algorithm in Parked Vehicle Edge Computing for Internet of Things
by Shuxin Ge, Meng Cheng, Xin He and Xiaobo Zhou
Sensors 2020, 20(10), 2786; https://doi.org/10.3390/s20102786 - 14 May 2020
Cited by 12 | Viewed by 2867
Abstract
Parked vehicle edge computing (PVEC) utilizes both idle resources in parked vehicles (PVs) and roadside units (RSUs) as service providers (SPs) to improve the performance of vehicular internet of things (IoT). However, it is difficult to make optimal service migration decisions in PVEC [...] Read more.
Parked vehicle edge computing (PVEC) utilizes both idle resources in parked vehicles (PVs) and roadside units (RSUs) as service providers (SPs) to improve the performance of vehicular internet of things (IoT). However, it is difficult to make optimal service migration decisions in PVEC networks due to the uncertain parking duration and resources heterogeneity of PVs. In this paper, we formulate the service migration of all the vehicles as an optimization problem with the objective of minimizing the average latency. We propose a two-stage service migration algorithm for PVEC networks, which divides the original problem into the service migration between SPs and the serving PV selection in parking lots. The service migration between SPs is transformed to an online problem based on Lyapunov optimization, where the expected parking duration of PVs is utilized. A modified Hungarian algorithm is proposed to select the PVs for migration. A series of simulation experiments based on the real-world vehicle traces are conducted to verify the superior performance of the proposed two-stage service migration (SEA) algorithm as compared with the state-of- art solutions. Full article
(This article belongs to the Special Issue Internet of Things, Big Data and Smart Systems)
Show Figures

Figure 1

17 pages, 3466 KiB  
Article
A Novel Point Cloud Encoding Method Based on Local Information for 3D Classification and Segmentation
by Yanan Song, Liang Gao, Xinyu Li and Weiming Shen
Sensors 2020, 20(9), 2501; https://doi.org/10.3390/s20092501 - 28 Apr 2020
Cited by 11 | Viewed by 3798
Abstract
Deep learning is robust to the perturbation of a point cloud, which is an important data form in the Internet of Things. However, it cannot effectively capture the local information of the point cloud and recognize the fine-grained features of an object. Different [...] Read more.
Deep learning is robust to the perturbation of a point cloud, which is an important data form in the Internet of Things. However, it cannot effectively capture the local information of the point cloud and recognize the fine-grained features of an object. Different levels of features in the deep learning network are integrated to obtain local information, but this strategy increases network complexity. This paper proposes an effective point cloud encoding method that facilitates the deep learning network to utilize the local information. An axis-aligned cube is used to search for a local region that represents the local information. All of the points in the local region are available to construct the feature representation of each point. These feature representations are then input to a deep learning network. Two well-known datasets, ModelNet40 shape classification benchmark and Stanford 3D Indoor Semantics Dataset, are used to test the performance of the proposed method. Compared with other methods with complicated structures, the proposed method with only a simple deep learning network, can achieve a higher accuracy in 3D object classification and semantic segmentation. Full article
(This article belongs to the Special Issue Internet of Things, Big Data and Smart Systems)
Show Figures

Figure 1

Review

Jump to: Research

35 pages, 2138 KiB  
Review
Internet of Everything (IoE) Taxonomies: A Survey and a Novel Knowledge-Based Taxonomy
by Viviane Cunha Farias da Costa, Luiz Oliveira and Jano de Souza
Sensors 2021, 21(2), 568; https://doi.org/10.3390/s21020568 - 14 Jan 2021
Cited by 50 | Viewed by 9345
Abstract
The paradigm of the Internet of everything (IoE) is advancing toward enriching people’s lives by adding value to the Internet of things (IoT), with connections among people, processes, data, and things. This paper provides a survey of the literature on IoE research, highlighting [...] Read more.
The paradigm of the Internet of everything (IoE) is advancing toward enriching people’s lives by adding value to the Internet of things (IoT), with connections among people, processes, data, and things. This paper provides a survey of the literature on IoE research, highlighting concerns in terms of intelligence services and knowledge creation. The significant contributions of this study are as follows: (1) a systematic literature review of IoE taxonomies (including IoT); (2) development of a taxonomy to guide the identification of critical knowledge in IoE applications, an in-depth classification of IoE enablers (sensors and actuators); (3) validation of the defined taxonomy with 50 IoE applications; and (4) identification of issues and challenges in existing IoE applications (using the defined taxonomy) with regard to insights about knowledge processes. To the best of our knowledge, and taking into consideration the 76 other taxonomies compared, this present work represents the most comprehensive taxonomy that provides the orchestration of intelligence in network connections concerning knowledge processes, type of IoE enablers, observation characteristics, and technological capabilities in IoE applications. Full article
(This article belongs to the Special Issue Internet of Things, Big Data and Smart Systems)
Show Figures

Figure 1

Back to TopTop