首页 > 最新文献

Frontiers in The Internet of Things最新文献

英文 中文
Digital twin—The dream and the reality 数字双胞胎——梦想与现实
Pub Date : 2023-04-06 DOI: 10.3389/friot.2023.1108777
Juha Kortelainen, T. Minav, K. Tammi
Digital twins (DTs) are under active research and development in the research community, industry, and in the digital engineering solution business. The roots of the concept of DT are almost 2 decades old, but the fast progress in enabling technologies, especially in data analytics, artificial intelligence, and the Internet of Things, has accelerated the evolution of DT during the last 5 years. The growing interest, increasing development activities, and increasing business opportunities of the concept are also feeding the hype in the media. Consequently, this has led to the scattering and even misuse of the concept and its definition. In this article, we discuss different applications of DTs and what kinds of solutions there are for DTs. We analyze some most cited definitions of DT in the scientific literature and discuss the interpretation of the definitions through a hypothetical case example. Furthermore, we discuss different life cycle aspects of DTs and potential risks that may arise. To further concretize the concept of DT, we introduce ten reported case examples of implemented DTs in the scientific literature and analyze their features. Finally, we discuss the future development directions of DTs and the aspects that will affect the development trends.
数字孪生(DTs)在研究界、工业界和数字工程解决方案业务中都处于积极的研究和开发之中。DT概念的起源已有近20年的历史,但在过去的5年里,使能技术的快速发展,特别是在数据分析、人工智能和物联网方面,加速了DT的发展。对这一概念日益增长的兴趣、越来越多的开发活动和越来越多的商业机会也助长了媒体的炒作。因此,这导致了对这一概念及其定义的分散甚至误用。在本文中,我们将讨论dt的不同应用以及dt有哪些解决方案。我们分析了科学文献中引用最多的DT定义,并通过一个假设的案例讨论了这些定义的解释。此外,我们还讨论了DTs的不同生命周期方面以及可能出现的潜在风险。为了进一步具体化DT的概念,我们介绍了科学文献中报道的10个实施DT的案例,并分析了它们的特征。最后,我们讨论了DTs的未来发展方向以及影响发展趋势的方面。
{"title":"Digital twin—The dream and the reality","authors":"Juha Kortelainen, T. Minav, K. Tammi","doi":"10.3389/friot.2023.1108777","DOIUrl":"https://doi.org/10.3389/friot.2023.1108777","url":null,"abstract":"Digital twins (DTs) are under active research and development in the research community, industry, and in the digital engineering solution business. The roots of the concept of DT are almost 2 decades old, but the fast progress in enabling technologies, especially in data analytics, artificial intelligence, and the Internet of Things, has accelerated the evolution of DT during the last 5 years. The growing interest, increasing development activities, and increasing business opportunities of the concept are also feeding the hype in the media. Consequently, this has led to the scattering and even misuse of the concept and its definition. In this article, we discuss different applications of DTs and what kinds of solutions there are for DTs. We analyze some most cited definitions of DT in the scientific literature and discuss the interpretation of the definitions through a hypothetical case example. Furthermore, we discuss different life cycle aspects of DTs and potential risks that may arise. To further concretize the concept of DT, we introduce ten reported case examples of implemented DTs in the scientific literature and analyze their features. Finally, we discuss the future development directions of DTs and the aspects that will affect the development trends.","PeriodicalId":308773,"journal":{"name":"Frontiers in The Internet of Things","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123668489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Future scenarios for the infrastructure digitalization: The road ahead 基础设施数字化的未来设想:未来之路
Pub Date : 2023-03-14 DOI: 10.3389/friot.2023.1140799
T. Muciaccia, Pietro Tedeschi
Nowadays, every industry across the globe is facing a disruptive transformation enabled by digitalization processes. Also, the industry of infrastructures, such as telecom, energy, transportation, and water systems, will be reshaped by the digitalization of physical assets mainly enabled by IoT technologies. An outstanding role in this scenario will be played by digital platforms, which will mediate the provisioning of services based on infrastructure. This process can revolutionize the industry-changing business models, unlocking great opportunities and posing complex challenges. In this paper, we investigate digitalization and the platformization processes and how they affect the infrastructures. We describe the models related to these processes in a systematic and interdisciplinary way and provide a comprehensive survey on technological, economic, and social issues. As a result of the research, we discuss the opportunities and risks of the processes, and we propose several approaches to address them.
如今,全球每个行业都面临着数字化进程带来的颠覆性变革。此外,电信、能源、交通和供水系统等基础设施行业将通过物联网技术实现的实物资产数字化而重塑。在这种情况下,数字平台将扮演一个突出的角色,它将调解基于基础设施的服务供应。这个过程可以彻底改变行业的商业模式,释放巨大的机会,并提出复杂的挑战。在本文中,我们研究了数字化和平台化过程以及它们如何影响基础设施。我们以系统和跨学科的方式描述了与这些过程相关的模型,并提供了对技术,经济和社会问题的全面调查。作为研究的结果,我们讨论了这些过程的机会和风险,并提出了几种解决这些问题的方法。
{"title":"Future scenarios for the infrastructure digitalization: The road ahead","authors":"T. Muciaccia, Pietro Tedeschi","doi":"10.3389/friot.2023.1140799","DOIUrl":"https://doi.org/10.3389/friot.2023.1140799","url":null,"abstract":"Nowadays, every industry across the globe is facing a disruptive transformation enabled by digitalization processes. Also, the industry of infrastructures, such as telecom, energy, transportation, and water systems, will be reshaped by the digitalization of physical assets mainly enabled by IoT technologies. An outstanding role in this scenario will be played by digital platforms, which will mediate the provisioning of services based on infrastructure. This process can revolutionize the industry-changing business models, unlocking great opportunities and posing complex challenges. In this paper, we investigate digitalization and the platformization processes and how they affect the infrastructures. We describe the models related to these processes in a systematic and interdisciplinary way and provide a comprehensive survey on technological, economic, and social issues. As a result of the research, we discuss the opportunities and risks of the processes, and we propose several approaches to address them.","PeriodicalId":308773,"journal":{"name":"Frontiers in The Internet of Things","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128291288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Situation-aware adaptation of choreographies—The DiStOPT approach 情境感知的编舞适应——DiStOPT方法
Pub Date : 2022-12-15 DOI: 10.3389/friot.2022.1054963
Pascal Hirmer, Uwe Breitenbücher, Daniel Del Gaudio, Kálmán Képes, F. Leymann, B. Mitschang, M. Mormul, Dennis Przytarski
The rise of the IoT and Industry 4.0 has increased the complexity of collaborating business processes, i. e., choreographies, as more partners and assets are involved. However, maintaining and executing business choreographies are complex tasks. Moreover, enabling robust and reliable execution is important, as failures or delays cause high costs among partners. For example, manufacturing companies usually depend on different suppliers, and it is crucial to be up-to-date about possible delays in shipments as this leads to delays in the manufacturing of their products. In this case, a choreography needs to be designed and operated in a way that it can adapt to cope with such problems. This requires i) timely recognition and tamper-resistent logging of problems that occur at each involved partner, which are referred to as situations in the scope of this article, and ii) an approach for a timely adaptation of choreographies based on occurring situations. Therefore, in this article, we introduce DiStOPT, an approach to i) model and recognize situations in a distributed and timely manner, and ii) model and execute situation-aware choreographies based on the recognized situations. The contributions are evaluated in a manufacturing scenario and validated by a prototypical implementation.
物联网和工业4.0的兴起增加了协作业务流程的复杂性。由于涉及更多的合作伙伴和资产,因此需要编排。然而,维护和执行业务编排是一项复杂的任务。此外,启用健壮和可靠的执行非常重要,因为失败或延迟会导致合作伙伴之间的高成本。例如,制造公司通常依赖于不同的供应商,因此及时了解可能的发货延迟是至关重要的,因为这将导致其产品制造的延迟。在这种情况下,需要以一种能够适应处理此类问题的方式来设计和操作编排。这需要i)及时识别和记录发生在每个涉及的合作伙伴(本文范围内的情况)上的问题,以及ii)基于发生的情况及时调整编排的方法。因此,在本文中,我们介绍了DiStOPT,一种i)以分布式和及时的方式建模和识别情况的方法,以及ii)基于已识别的情况建模和执行情况感知编排的方法。在制造场景中评估贡献,并通过原型实现进行验证。
{"title":"Situation-aware adaptation of choreographies—The DiStOPT approach","authors":"Pascal Hirmer, Uwe Breitenbücher, Daniel Del Gaudio, Kálmán Képes, F. Leymann, B. Mitschang, M. Mormul, Dennis Przytarski","doi":"10.3389/friot.2022.1054963","DOIUrl":"https://doi.org/10.3389/friot.2022.1054963","url":null,"abstract":"The rise of the IoT and Industry 4.0 has increased the complexity of collaborating business processes, i. e., choreographies, as more partners and assets are involved. However, maintaining and executing business choreographies are complex tasks. Moreover, enabling robust and reliable execution is important, as failures or delays cause high costs among partners. For example, manufacturing companies usually depend on different suppliers, and it is crucial to be up-to-date about possible delays in shipments as this leads to delays in the manufacturing of their products. In this case, a choreography needs to be designed and operated in a way that it can adapt to cope with such problems. This requires i) timely recognition and tamper-resistent logging of problems that occur at each involved partner, which are referred to as situations in the scope of this article, and ii) an approach for a timely adaptation of choreographies based on occurring situations. Therefore, in this article, we introduce DiStOPT, an approach to i) model and recognize situations in a distributed and timely manner, and ii) model and execute situation-aware choreographies based on the recognized situations. The contributions are evaluated in a manufacturing scenario and validated by a prototypical implementation.","PeriodicalId":308773,"journal":{"name":"Frontiers in The Internet of Things","volume":"693 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130910649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revisiting the internet of things: New trends, opportunities and grand challenges 重新审视物联网:新趋势、机遇和重大挑战
Pub Date : 2022-11-14 DOI: 10.3389/friot.2022.1073780
Khalid Elgazzar, Haytham Khalil, Taghreed Alghamdi, Ahmed Badr, Ghadeer Abdelkader, Abdelrahman Elewah, R. Buyya
The Internet of Things (IoT) has brought the dream of ubiquitous data access from physical environments into reality. IoT embeds sensors and actuators in physical objects so that they can communicate and exchange data between themselves to improve efficiency along with enabling real-time intelligent services and offering better quality of life to people. The number of deployed IoT devices has rapidly grown in the past five years in a way that makes IoT the most disruptive technology in recent history. In this paper, we reevaluate the position of IoT in our life and provide deep insights on its enabling technologies, applications, rising trends and grand challenges. The paper also highlights the role of artificial intelligence to make IoT the top transformative technology that has been ever developed in human history.
物联网(IoT)将从物理环境中无处不在的数据访问的梦想变为现实。物联网将传感器和执行器嵌入到物理对象中,使它们能够相互通信和交换数据,从而提高效率,同时实现实时智能服务,为人们提供更好的生活质量。在过去五年中,部署的物联网设备数量迅速增长,使物联网成为近代历史上最具颠覆性的技术。在本文中,我们重新评估了物联网在我们生活中的地位,并就其使能技术、应用、上升趋势和重大挑战提供了深刻的见解。该文件还强调了人工智能的作用,使物联网成为人类历史上发展的顶级变革技术。
{"title":"Revisiting the internet of things: New trends, opportunities and grand challenges","authors":"Khalid Elgazzar, Haytham Khalil, Taghreed Alghamdi, Ahmed Badr, Ghadeer Abdelkader, Abdelrahman Elewah, R. Buyya","doi":"10.3389/friot.2022.1073780","DOIUrl":"https://doi.org/10.3389/friot.2022.1073780","url":null,"abstract":"The Internet of Things (IoT) has brought the dream of ubiquitous data access from physical environments into reality. IoT embeds sensors and actuators in physical objects so that they can communicate and exchange data between themselves to improve efficiency along with enabling real-time intelligent services and offering better quality of life to people. The number of deployed IoT devices has rapidly grown in the past five years in a way that makes IoT the most disruptive technology in recent history. In this paper, we reevaluate the position of IoT in our life and provide deep insights on its enabling technologies, applications, rising trends and grand challenges. The paper also highlights the role of artificial intelligence to make IoT the top transformative technology that has been ever developed in human history.","PeriodicalId":308773,"journal":{"name":"Frontiers in The Internet of Things","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115854427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
On trust management in vehicular ad hoc networks: A comprehensive review 车辆自组织网络信任管理研究综述
Pub Date : 2022-10-31 DOI: 10.3389/friot.2022.995233
Haoyang Che, Yucong Duan, Chen Li, Lei Yu
Security issues have always posed a major threat and challenge to the Internet of Things (IoTs), especially the vehicular ad-hoc networks (VANETs), a subcategory of IoTs in the automotive field. The traditional methods to solve these ever-growing security issues in VANETs are mainly cryptography-based. As an effective and efficient complement to those solutions, trust management solutions and reputation models have been widely explored to deal with malicious or selfish vehicle intrusion and forged data spoofing, with the aim of enhancing the overall security, reliability, trustworthiness, and impartiality of VANETs. For the integrity of the article, this survey begins with providing the background information of VANETs, including the basic components and general architecture. Then, many attacks in VANETs are investigated, analyzed, and compared to understand the functional relevance of the following trust and reputation methods. Various approaches offer various countermeasures against these types of attacks. At the same time, the latest development of emerging technologies such as blockchain, software-defined network, and cloud computing opens up new possibilities for more and more promising trust and reputation management models and systems in VANETs. After that, the survey reviews the most important trust and reputation models and schemes which are widely mentioned in the literature based on our developed technique-based taxonomy, in contrast to the popular “entity-centric, data-centric, hybrid” taxonomy in the field, to adapt to the recent technological development of these management schemes in VANETs. Finally, discussions and speculations on the future direction of research into the trust and reputation management in VANETs are presented.
安全问题一直是物联网(iot)面临的主要威胁和挑战,尤其是汽车领域物联网的一个子类——车辆自组织网络(VANETs)。在vanet中解决这些日益增长的安全问题的传统方法主要是基于密码学。作为这些解决方案的有效补充,信任管理解决方案和信誉模型已被广泛探索,以应对恶意或自私的车辆入侵和伪造数据欺骗,旨在提高vanet的整体安全性、可靠性、可信度和公正性。为了文章的完整性,本调查首先提供了VANETs的背景信息,包括基本组件和总体架构。然后,对vanet中的许多攻击进行了调查、分析和比较,以了解以下信任和声誉方法的功能相关性。针对这些类型的攻击,各种方法提供了各种对策。与此同时,区块链、软件定义网络、云计算等新兴技术的最新发展,为越来越多有前途的信任和声誉管理模型和系统在VANETs中开辟了新的可能性。之后,调查回顾了文献中广泛提到的最重要的信任和声誉模型和方案,基于我们开发的基于技术的分类法,与该领域流行的“以实体为中心,以数据为中心,混合”分类法形成对比,以适应VANETs中这些管理方案的最新技术发展。最后,对VANETs中信任和声誉管理的未来研究方向进行了讨论和展望。
{"title":"On trust management in vehicular ad hoc networks: A comprehensive review","authors":"Haoyang Che, Yucong Duan, Chen Li, Lei Yu","doi":"10.3389/friot.2022.995233","DOIUrl":"https://doi.org/10.3389/friot.2022.995233","url":null,"abstract":"Security issues have always posed a major threat and challenge to the Internet of Things (IoTs), especially the vehicular ad-hoc networks (VANETs), a subcategory of IoTs in the automotive field. The traditional methods to solve these ever-growing security issues in VANETs are mainly cryptography-based. As an effective and efficient complement to those solutions, trust management solutions and reputation models have been widely explored to deal with malicious or selfish vehicle intrusion and forged data spoofing, with the aim of enhancing the overall security, reliability, trustworthiness, and impartiality of VANETs. For the integrity of the article, this survey begins with providing the background information of VANETs, including the basic components and general architecture. Then, many attacks in VANETs are investigated, analyzed, and compared to understand the functional relevance of the following trust and reputation methods. Various approaches offer various countermeasures against these types of attacks. At the same time, the latest development of emerging technologies such as blockchain, software-defined network, and cloud computing opens up new possibilities for more and more promising trust and reputation management models and systems in VANETs. After that, the survey reviews the most important trust and reputation models and schemes which are widely mentioned in the literature based on our developed technique-based taxonomy, in contrast to the popular “entity-centric, data-centric, hybrid” taxonomy in the field, to adapt to the recent technological development of these management schemes in VANETs. Finally, discussions and speculations on the future direction of research into the trust and reputation management in VANETs are presented.","PeriodicalId":308773,"journal":{"name":"Frontiers in The Internet of Things","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123700394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sinfonia: Cross-tier orchestration for edge-native applications Sinfonia:边缘本地应用程序的跨层编排
Pub Date : 2022-10-19 DOI: 10.3389/friot.2022.1025247
M. Satyanarayanan, J. Harkes, J. Blakley, Marc Meunier, Govindarajan Mohandoss, Kiel Friedt, Arun Thulasi, Pranav Saxena, Brian J. Barritt
The convergence of 5G wireless networks and edge computing enables new edge-native applications that are simultaneously bandwidth-hungry, latency-sensitive, and compute-intensive. Examples include deeply immersive augmented reality, wearable cognitive assistance, privacy-preserving video analytics, edge-triggered serendipity, and autonomous swarms of featherweight drones. Such edge-native applications require network-aware and load-aware orchestration of resources across the cloud (Tier-1), cloudlets (Tier-2), and device (Tier-3). This paper describes the architecture of Sinfonia, an open-source system for such cross-tier orchestration. Key attributes of Sinfonia include: support for multiple vendor-specific Tier-1 roots of orchestration, providing end-to-end runtime control that spans technical and non-technical criteria; use of third-party Kubernetes clusters as cloudlets, with unified treatment of telco-managed, hyperconverged, and just-in-time variants of cloudlets; masking of orchestration complexity from applications, thus lowering the barrier to creation of new edge-native applications. We describe an initial release of Sinfonia (https://github.com/cmusatyalab/sinfonia), and share our thoughts on evolving it in the future.
5G无线网络和边缘计算的融合使新的边缘本地应用程序能够同时满足带宽消耗、延迟敏感和计算密集型的要求。例子包括深度沉浸式增强现实、可穿戴认知辅助、保护隐私的视频分析、边缘触发的意外发现,以及羽毛级无人机的自主群。这种边缘原生应用程序需要跨云(第1层)、云(第2层)和设备(第3层)进行网络感知和负载感知的资源编排。本文描述了Sinfonia的架构,这是一个用于跨层编排的开源系统。sinonia的关键属性包括:支持多个特定于供应商的Tier-1编配根,提供跨越技术和非技术标准的端到端运行时控制;使用第三方Kubernetes集群作为cloudlets,统一处理远程管理、超融合和即时的cloudlets变体;屏蔽应用程序的编排复杂性,从而降低创建新的边缘本地应用程序的障碍。我们描述了Sinfonia的初始版本(https://github.com/cmusatyalab/sinfonia),并分享了我们对未来发展的想法。
{"title":"Sinfonia: Cross-tier orchestration for edge-native applications","authors":"M. Satyanarayanan, J. Harkes, J. Blakley, Marc Meunier, Govindarajan Mohandoss, Kiel Friedt, Arun Thulasi, Pranav Saxena, Brian J. Barritt","doi":"10.3389/friot.2022.1025247","DOIUrl":"https://doi.org/10.3389/friot.2022.1025247","url":null,"abstract":"The convergence of 5G wireless networks and edge computing enables new edge-native applications that are simultaneously bandwidth-hungry, latency-sensitive, and compute-intensive. Examples include deeply immersive augmented reality, wearable cognitive assistance, privacy-preserving video analytics, edge-triggered serendipity, and autonomous swarms of featherweight drones. Such edge-native applications require network-aware and load-aware orchestration of resources across the cloud (Tier-1), cloudlets (Tier-2), and device (Tier-3). This paper describes the architecture of Sinfonia, an open-source system for such cross-tier orchestration. Key attributes of Sinfonia include: support for multiple vendor-specific Tier-1 roots of orchestration, providing end-to-end runtime control that spans technical and non-technical criteria; use of third-party Kubernetes clusters as cloudlets, with unified treatment of telco-managed, hyperconverged, and just-in-time variants of cloudlets; masking of orchestration complexity from applications, thus lowering the barrier to creation of new edge-native applications. We describe an initial release of Sinfonia (https://github.com/cmusatyalab/sinfonia), and share our thoughts on evolving it in the future.","PeriodicalId":308773,"journal":{"name":"Frontiers in The Internet of Things","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115328423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IoT architectures: from data to smart systems 物联网架构:从数据到智能系统
Pub Date : 2022-08-22 DOI: 10.3389/friot.2022.959268
Marco Aiello
“The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it.” It was 1991 when Mark Weiser’s pioneering article was published in the Scientific American, discussing a future where networked devices would be so ubiquitous that “no one will notice their presence” (Weiser (1991)). To a large extent, this is our reality today. We may have changed terminology and moved from ubiquitous computing to Internet of Things, but the substance has not changed. We are surrounded by data-capturing computing devices that are always on, are networked, and many of which can perform world-altering operations. Just think of hopping into a modern car. The driver is actually interacting with a distributed computing system on wheels. With up to 100 electronic control units and hundred of millions of lines of code, the modern automotive industry has become more about software than mechanics and aerodynamics. And yet, we think and interact with our car as we would have done in 1991. Or think at our symbiotic relationship with social media as experienced via our personal data capturing device: the smartphone. It is symbiotic because it satisfies the human need for emotional connectedness while it feeds content to the social media infrastructure, content that is essential for its existence and that is typically metabolized as targeted advertisement. The modern human being has feelings relatable to gymnophobia whenever leaving home without the smart phone, a fear of a sensation of nakedness, incompleteness that transcends the rational. And dually we accept any other human being we are close to or even interacting with to be concurrently doing something on their smart phone. The phone is such an integral and accepted part of who we are and how we behave that we can agree that Mark Weiser’s prediction was correct: phones are our everyday life and we do not even notice anymore. In many countries the level of penetration of mobile phones is above 80%, including population of any age (Statista (2022)). The number of active phone subscriptions is higher than 7 billion. If we consider Bluetooth, a technology often used for dynamic connectivity at the edge of the system, 4 billion Bluetooth Low Energy network interfaces are currently been shipped per year (Bluetooth SIG (2021)). Number projected to surpass 6 billions by 2025. And more generally, the predictions indicate that by 2030 the total amount of IoT devices worldwide, of any type, will reach the value of 24 billion (Transforma Insights (2020)). The unprecedented advancements in realizing IoT devices at affordable prices and the pervasive connectivity of wireless and wired Internet technologies, are essential building blocks to achieve the vision of a smart, OPEN ACCESS
“最深刻的技术是那些消失的技术。他们把自己编织到日常生活的结构中,直到与日常生活无法区分。”1991年,Mark Weiser在《科学美国人》上发表了一篇开创性的文章,讨论了未来网络设备将无处不在,以至于“没有人会注意到它们的存在”(Weiser(1991))。在很大程度上,这就是我们今天的现实。我们可能改变了术语,从普适计算转向了物联网,但本质并没有改变。我们被数据捕捉计算设备所包围,这些设备总是开着的,是联网的,其中许多可以执行改变世界的操作。想想跳上一辆现代汽车吧。司机实际上是在与车轮上的分布式计算系统进行交互。拥有多达100个电子控制单元和数亿行代码,现代汽车工业已经更多地与软件有关,而不是机械和空气动力学。然而,我们和1991年的汽车一样思考和互动。或者想想我们与社交媒体的共生关系,就像我们通过个人数据采集设备——智能手机所经历的那样。它是共生的,因为它满足了人类对情感联系的需求,同时为社交媒体基础设施提供了内容,这些内容对其存在至关重要,通常被代谢为目标广告。现代人在不带智能手机出门的时候,会有一种与体操恐惧症相关的感觉,一种对裸体感的恐惧,一种超越理性的不完整感。另一方面,我们接受任何与我们亲近甚至互动的人同时在他们的智能手机上做一些事情。手机是我们的身份和行为中不可或缺的一部分,我们可以接受马克·韦瑟的预测是正确的:手机是我们的日常生活,我们甚至都没有注意到。在许多国家,手机的普及率超过80%,包括任何年龄的人口(Statista(2022))。活跃的手机用户数量超过70亿。如果我们考虑蓝牙,一种经常用于系统边缘动态连接的技术,目前每年出货40亿个低功耗蓝牙网络接口(蓝牙SIG(2021))。预计到2025年,这一数字将超过60亿。更普遍的是,预测表明,到2030年,全球任何类型的物联网设备的总量将达到240亿美元(Transforma Insights(2020))。以可承受的价格实现物联网设备的前所未有的进步,以及无线和有线互联网技术的普遍连接,是实现智能开放接入愿景的重要基石
{"title":"IoT architectures: from data to smart systems","authors":"Marco Aiello","doi":"10.3389/friot.2022.959268","DOIUrl":"https://doi.org/10.3389/friot.2022.959268","url":null,"abstract":"“The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it.” It was 1991 when Mark Weiser’s pioneering article was published in the Scientific American, discussing a future where networked devices would be so ubiquitous that “no one will notice their presence” (Weiser (1991)). To a large extent, this is our reality today. We may have changed terminology and moved from ubiquitous computing to Internet of Things, but the substance has not changed. We are surrounded by data-capturing computing devices that are always on, are networked, and many of which can perform world-altering operations. Just think of hopping into a modern car. The driver is actually interacting with a distributed computing system on wheels. With up to 100 electronic control units and hundred of millions of lines of code, the modern automotive industry has become more about software than mechanics and aerodynamics. And yet, we think and interact with our car as we would have done in 1991. Or think at our symbiotic relationship with social media as experienced via our personal data capturing device: the smartphone. It is symbiotic because it satisfies the human need for emotional connectedness while it feeds content to the social media infrastructure, content that is essential for its existence and that is typically metabolized as targeted advertisement. The modern human being has feelings relatable to gymnophobia whenever leaving home without the smart phone, a fear of a sensation of nakedness, incompleteness that transcends the rational. And dually we accept any other human being we are close to or even interacting with to be concurrently doing something on their smart phone. The phone is such an integral and accepted part of who we are and how we behave that we can agree that Mark Weiser’s prediction was correct: phones are our everyday life and we do not even notice anymore. In many countries the level of penetration of mobile phones is above 80%, including population of any age (Statista (2022)). The number of active phone subscriptions is higher than 7 billion. If we consider Bluetooth, a technology often used for dynamic connectivity at the edge of the system, 4 billion Bluetooth Low Energy network interfaces are currently been shipped per year (Bluetooth SIG (2021)). Number projected to surpass 6 billions by 2025. And more generally, the predictions indicate that by 2030 the total amount of IoT devices worldwide, of any type, will reach the value of 24 billion (Transforma Insights (2020)). The unprecedented advancements in realizing IoT devices at affordable prices and the pervasive connectivity of wireless and wired Internet technologies, are essential building blocks to achieve the vision of a smart, OPEN ACCESS","PeriodicalId":308773,"journal":{"name":"Frontiers in The Internet of Things","volume":"194 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114059104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Practical Application of Internet of Things in the Creation of Intelligent Services and Environments 物联网在智能服务和环境创造中的实际应用
Pub Date : 2022-07-22 DOI: 10.3389/friot.2022.912388
Zhihan Lv
The information era is coming. As a popular technology in the information age, Internet of Things (IoT) can collect various types of information in real time, realize the ubiquitous connection between things and people, and process the intelligent perception, identification, and management of things, processes, and information, and environment protection through various network access methods. Applying IoT to various fields is like wrapping the Earth with a layer of “digital skin” (Gubbi et al., 2013; Bauwens et al., 2020; Li and Da Xu, 2020). Moreover, under the trend of global warming, the emergence of the theme of Energy Saving and Emission Reduction (ESER) undoubtedly poses new challenges to the development of IoT. When IoT is widely used in various life scenarios, its main purpose is to provide intelligent services and environments. IoT applications can connect any sensing device to the Internet for data transmission, so as to realize intelligent identification, tracking, positioning, and monitoring of sensing devices. In addition, IoT contains many types ofWireless Sensor Networks (WSN), which, as a part of IoT sensing layer, can meet the actual needs of people to obtain reliable data in special environments (Sadowski and Spachos, 2020). WSN is a multi-hop network which is self-organized by many sensor nodes. It has the characteristics of flexibility, fault tolerance, high awareness, low cost, strong survivability, and fast layout. Therefore, IoT has a wide range of applications, such as environmental monitoring, agriculture, military, and medical care, and can collect, process, and disseminate collected data deployed in various environments (Aman et al., 2020; Fortino et al., 2020). However, for some special scenes, many sensor nodes are often placed in areas that cannot be accessed by human beings. While enjoying the convenience brought by WSN, people are also faced with the problems that illegal personnel obtain illegitimate interests by intercepting the monitoring data transmitted in the public channel. Therefore, the attention to security issues in IoT cannot be ignored. With the increasing commercial scope of 5th Generation Mobile Communication Technology (5G) communication technology in cities, the application of IoT in power, construction, industry, intelligent transportation, agriculture, logistics, intelligence, high efficiency, and ESER is being promoted (Verma et al., 2020). Of course, applying IoT is also inseparable from the combination of 5G communication, Cloud Computing (CC), Edge Computing (EC), blockchain, AI, and other technologies. IoT can collect many data from the environment, effectively monitor, analyze, and manage energy consumption, and reasonably improve IoT by identifying and analyzing opportunities of energy efficiency improvement (Khan et al., 2020; Liao et al., 2020; Saračević et al., 2020). In summary, in today’s high-speed 5G communication technology, IoT is widely applied, and guaranteeing its performance
信息时代即将来临。物联网(Internet of Things, IoT)作为信息时代的流行技术,可以实时采集各类信息,实现物与人的无所不在连接,通过各种网络接入方式,对物、过程、信息、环境进行智能感知、识别、管理和保护。将物联网应用于各个领域,就像给地球裹上一层“数字皮肤”(Gubbi et al., 2013;Bauwens et al., 2020;李大旭,2020)。此外,在全球变暖的趋势下,节能减排(ESER)主题的出现无疑对物联网的发展提出了新的挑战。当物联网广泛应用于各种生活场景时,其主要目的是提供智能的服务和环境。物联网应用可以将任何传感设备接入互联网进行数据传输,从而实现对传感设备的智能识别、跟踪、定位和监控。此外,物联网包含多种类型的无线传感器网络(WSN),作为物联网传感层的一部分,可以满足人们在特殊环境下获取可靠数据的实际需求(Sadowski and Spachos, 2020)。WSN是由多个传感器节点自组织的多跳网络。它具有灵活、容错、高感知、低成本、强生存性和快速布局等特点。因此,物联网具有广泛的应用范围,如环境监测、农业、军事和医疗保健,并可以收集、处理和传播部署在各种环境中的收集数据(Aman et al., 2020;Fortino et al., 2020)。然而,对于一些特殊的场景,很多传感器节点往往被放置在人类无法进入的区域。人们在享受无线传感器网络带来的便利的同时,也面临着不法人员通过截取在公共信道上传输的监控数据获取不正当利益的问题。因此,对物联网安全问题的关注不容忽视。随着第五代移动通信技术(5G)通信技术在城市商用范围的不断扩大,物联网在电力、建筑、工业、智能交通、农业、物流、智能、高效、ESER等领域的应用正在推进(Verma et al., 2020)。当然,应用物联网也离不开5G通信、云计算(CC)、边缘计算(EC)、区块链、AI等技术的结合。物联网可以从环境中收集大量数据,有效监测、分析和管理能耗,通过识别和分析能效提升的机会,合理改善物联网(Khan et al., 2020;廖等,2020;sara eviki et al., 2020)。综上所述,在高速5G通信技术的今天,物联网应用广泛,保证其性能具有重要意义。因此,本工作以物联网的实际应用为主题,探索智能电力、智能建筑、智能工业、智能交通、智能农业、智能物流等方面的应用。编辑和评审:Rajkumar Buyya,澳大利亚墨尔本大学
{"title":"Practical Application of Internet of Things in the Creation of Intelligent Services and Environments","authors":"Zhihan Lv","doi":"10.3389/friot.2022.912388","DOIUrl":"https://doi.org/10.3389/friot.2022.912388","url":null,"abstract":"The information era is coming. As a popular technology in the information age, Internet of Things (IoT) can collect various types of information in real time, realize the ubiquitous connection between things and people, and process the intelligent perception, identification, and management of things, processes, and information, and environment protection through various network access methods. Applying IoT to various fields is like wrapping the Earth with a layer of “digital skin” (Gubbi et al., 2013; Bauwens et al., 2020; Li and Da Xu, 2020). Moreover, under the trend of global warming, the emergence of the theme of Energy Saving and Emission Reduction (ESER) undoubtedly poses new challenges to the development of IoT. When IoT is widely used in various life scenarios, its main purpose is to provide intelligent services and environments. IoT applications can connect any sensing device to the Internet for data transmission, so as to realize intelligent identification, tracking, positioning, and monitoring of sensing devices. In addition, IoT contains many types ofWireless Sensor Networks (WSN), which, as a part of IoT sensing layer, can meet the actual needs of people to obtain reliable data in special environments (Sadowski and Spachos, 2020). WSN is a multi-hop network which is self-organized by many sensor nodes. It has the characteristics of flexibility, fault tolerance, high awareness, low cost, strong survivability, and fast layout. Therefore, IoT has a wide range of applications, such as environmental monitoring, agriculture, military, and medical care, and can collect, process, and disseminate collected data deployed in various environments (Aman et al., 2020; Fortino et al., 2020). However, for some special scenes, many sensor nodes are often placed in areas that cannot be accessed by human beings. While enjoying the convenience brought by WSN, people are also faced with the problems that illegal personnel obtain illegitimate interests by intercepting the monitoring data transmitted in the public channel. Therefore, the attention to security issues in IoT cannot be ignored. With the increasing commercial scope of 5th Generation Mobile Communication Technology (5G) communication technology in cities, the application of IoT in power, construction, industry, intelligent transportation, agriculture, logistics, intelligence, high efficiency, and ESER is being promoted (Verma et al., 2020). Of course, applying IoT is also inseparable from the combination of 5G communication, Cloud Computing (CC), Edge Computing (EC), blockchain, AI, and other technologies. IoT can collect many data from the environment, effectively monitor, analyze, and manage energy consumption, and reasonably improve IoT by identifying and analyzing opportunities of energy efficiency improvement (Khan et al., 2020; Liao et al., 2020; Saračević et al., 2020). In summary, in today’s high-speed 5G communication technology, IoT is widely applied, and guaranteeing its performance ","PeriodicalId":308773,"journal":{"name":"Frontiers in The Internet of Things","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115011267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Specialty Grand Challenge: IoT Communication and Networking Protocols 专业大挑战:物联网通信和网络协议
Pub Date : 2022-07-12 DOI: 10.3389/friot.2022.948558
Deze Zeng
In the last decade, various kinds of smart end devices and sensors have been widely deployed and applied, and become the necessities in modern society Chettri and Bera (2019). It is also widely recognized that these devices should well collaborate with each other. This also catalyses the birth of Internet-of-Things (IoT) Hassan. (2019). IoT allows various devices, such as sensors, actuators, smart phones, and any smart devices, to connect with each other via the network, and to work together for providing better services eventually. Thanks to the fast development in the last decades, IoT has been applied in various aspects successfully, i.e., smart home Yang et al. (2018), smart city Kim et al. (2017) and smart health Sun et al. (2020), greatly reshaping our society. As communication is the core to realize collaboration, the communication and networking protocol plays a critical role in implementing an IoT system. As already widely discussed, due to the limitation of size, power and computation capability, traditional Internet oriented communication and networking protocols are not quite suitable to IoT. To this end, many protocols, such as Bluetooth Low Energy, ZigBee, Lora, NB-IoT, CoAP, 6LoWPAN, MQTT, have been proposed with different characteristics (e.g., power consumption, transmission rate, transmission range, etc.,) and application domains Dizdarević et al. (2019). In addition, the recent 5G, B5G, and 6G networks are also well known for their special support to IoT communications. Besides, Artificial Intelligence (AI) technology also become an essential part of IoT systems. Besides exploring AI technology to process the IoT data, the system could be also manipulated by AI for autonomous performance or resource efficiency optimization. Recognizing the fact that one protocol may not fit for all scenarios, the coordination and the compatibility between different protocols thus become critical issues. Besides, various IoT applications also urge us to optimize the communication and network protocols to satisfy diverse Quality-of-Experience (QoE). Therefore, in the past decades, many efforts has been devoted to optimizing the IoT communication and networking protocols from various aspects. Nonetheless, with the emergence of new technologies (e.g., Software Define Networking, backscatter communications, Blockchain), new trend (e.g., in-network computing), new applications (e.g., autonomous driving), the protocol design is still a hot topic as it still confronts many challenges. As a result, in this article, we will discuss the main challenges imposed by these new technologies, concept, and trends to the design of IoT communication and networking protocols. The rest of the paper is organized as follows: Section 2 discusses eight main challenges in the development of IoT communication and networking protocols. Section 3 summarizes these challenges and concludes this article. Edited and reviewed by: Rajkumar Buyya, The University of Melbourne, Aust
在过去的十年中,各种智能终端设备和传感器得到了广泛的部署和应用,成为现代社会的必需品。Chettri和Bera(2019)。人们也普遍认为,这些设备应该很好地相互协作。这也促进了物联网(IoT)哈桑的诞生。(2019)。物联网允许各种设备,如传感器、执行器、智能手机和任何智能设备,通过网络相互连接,并共同工作,最终提供更好的服务。由于过去几十年的快速发展,物联网已成功应用于各个方面,即智能家居Yang等人(2018),智能城市Kim等人(2017)和智能健康Sun等人(2020),极大地重塑了我们的社会。通信是实现协作的核心,因此通信和网络协议在物联网系统的实现中起着至关重要的作用。正如已经被广泛讨论的那样,由于尺寸、功率和计算能力的限制,传统的面向互联网的通信和网络协议不太适合物联网。为此,人们提出了许多协议,如低功耗蓝牙、ZigBee、Lora、NB-IoT、CoAP、6LoWPAN、MQTT等,它们具有不同的特性(如功耗、传输速率、传输范围等)和应用领域(dizdarevic等,2019)。此外,最近的5G、B5G和6G网络也因其对物联网通信的特殊支持而闻名。此外,人工智能(AI)技术也成为物联网系统的重要组成部分。除了探索人工智能技术来处理物联网数据外,系统还可以被人工智能操纵,以实现自主性能或资源效率优化。认识到一个协议可能不适合所有场景,因此不同协议之间的协调和兼容性成为关键问题。此外,各种物联网应用也要求我们优化通信和网络协议,以满足不同的体验质量(QoE)。因此,在过去的几十年里,人们从各个方面对物联网通信和网络协议进行了大量的优化。尽管如此,随着新技术(如软件定义网络,反向散射通信,区块链),新趋势(如网络内计算),新应用(如自动驾驶)的出现,协议设计仍然是一个热门话题,因为它仍然面临许多挑战。因此,在本文中,我们将讨论这些新技术、概念和趋势对物联网通信和网络协议设计带来的主要挑战。本文的其余部分组织如下:第2节讨论了物联网通信和网络协议开发中的八个主要挑战。第3节总结了这些挑战并总结了本文。编辑和评审:Rajkumar Buyya,澳大利亚墨尔本大学
{"title":"Specialty Grand Challenge: IoT Communication and Networking Protocols","authors":"Deze Zeng","doi":"10.3389/friot.2022.948558","DOIUrl":"https://doi.org/10.3389/friot.2022.948558","url":null,"abstract":"In the last decade, various kinds of smart end devices and sensors have been widely deployed and applied, and become the necessities in modern society Chettri and Bera (2019). It is also widely recognized that these devices should well collaborate with each other. This also catalyses the birth of Internet-of-Things (IoT) Hassan. (2019). IoT allows various devices, such as sensors, actuators, smart phones, and any smart devices, to connect with each other via the network, and to work together for providing better services eventually. Thanks to the fast development in the last decades, IoT has been applied in various aspects successfully, i.e., smart home Yang et al. (2018), smart city Kim et al. (2017) and smart health Sun et al. (2020), greatly reshaping our society. As communication is the core to realize collaboration, the communication and networking protocol plays a critical role in implementing an IoT system. As already widely discussed, due to the limitation of size, power and computation capability, traditional Internet oriented communication and networking protocols are not quite suitable to IoT. To this end, many protocols, such as Bluetooth Low Energy, ZigBee, Lora, NB-IoT, CoAP, 6LoWPAN, MQTT, have been proposed with different characteristics (e.g., power consumption, transmission rate, transmission range, etc.,) and application domains Dizdarević et al. (2019). In addition, the recent 5G, B5G, and 6G networks are also well known for their special support to IoT communications. Besides, Artificial Intelligence (AI) technology also become an essential part of IoT systems. Besides exploring AI technology to process the IoT data, the system could be also manipulated by AI for autonomous performance or resource efficiency optimization. Recognizing the fact that one protocol may not fit for all scenarios, the coordination and the compatibility between different protocols thus become critical issues. Besides, various IoT applications also urge us to optimize the communication and network protocols to satisfy diverse Quality-of-Experience (QoE). Therefore, in the past decades, many efforts has been devoted to optimizing the IoT communication and networking protocols from various aspects. Nonetheless, with the emergence of new technologies (e.g., Software Define Networking, backscatter communications, Blockchain), new trend (e.g., in-network computing), new applications (e.g., autonomous driving), the protocol design is still a hot topic as it still confronts many challenges. As a result, in this article, we will discuss the main challenges imposed by these new technologies, concept, and trends to the design of IoT communication and networking protocols. The rest of the paper is organized as follows: Section 2 discusses eight main challenges in the development of IoT communication and networking protocols. Section 3 summarizes these challenges and concludes this article. Edited and reviewed by: Rajkumar Buyya, The University of Melbourne, Aust","PeriodicalId":308773,"journal":{"name":"Frontiers in The Internet of Things","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128561018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Estimating indoor crowd density and movement behavior using WiFi sensing 利用WiFi传感技术估算室内人群密度和运动行为
Pub Date : 2022-07-04 DOI: 10.3389/friot.2022.967034
Syed Alam, Muhammad Al-Qurishi, R. Souissi
The fact that almost every person owns a smartphone device that can be precisely located is both empowering and worrying. If methods for accurate tracking of devices (and their owners) via WiFi probing are developed in a responsible way, they could be applied in many different fields, from data security to urban planning. Numerous approaches to data collection and analysis have been covered, some of which use active sensing equipment, while others rely on passive probing, which takes advantage of nearly universal smartphone usage and WiFi network coverage. In this study, we introduce a system that uses WiFi probing technologies aimed at tracking user locations and understanding individual behavior. We built our own devices to passively capture WiFi request probe packets from smartphones, without the phones being connected to the network. The devices were tested at the headquarters of the research sector of the Elm Company. The results of the analyses carried out to estimate the crowd density in offices and the flows of the crowd from one place to another are promising and illustrate the importance of such solutions in indoor and closed spaces.
几乎每个人都拥有一台可以精确定位的智能手机,这一事实既赋予了人们力量,也令人担忧。如果以负责任的方式开发出通过WiFi探测准确跟踪设备(及其所有者)的方法,它们可以应用于许多不同的领域,从数据安全到城市规划。本文涵盖了多种数据收集和分析方法,其中一些使用主动传感设备,而另一些则依赖于被动探测,利用了几乎普遍使用的智能手机和WiFi网络覆盖。在本研究中,我们介绍了一个使用WiFi探测技术的系统,旨在跟踪用户位置并了解个人行为。我们建立了自己的设备来被动地捕获来自智能手机的WiFi请求探测数据包,而无需手机连接到网络。这些设备在榆树公司研究部门的总部进行了测试。对办公室的人群密度和人群从一个地方到另一个地方的流动进行了分析,结果很有希望,并说明了这种解决方案在室内和封闭空间中的重要性。
{"title":"Estimating indoor crowd density and movement behavior using WiFi sensing","authors":"Syed Alam, Muhammad Al-Qurishi, R. Souissi","doi":"10.3389/friot.2022.967034","DOIUrl":"https://doi.org/10.3389/friot.2022.967034","url":null,"abstract":"The fact that almost every person owns a smartphone device that can be precisely located is both empowering and worrying. If methods for accurate tracking of devices (and their owners) via WiFi probing are developed in a responsible way, they could be applied in many different fields, from data security to urban planning. Numerous approaches to data collection and analysis have been covered, some of which use active sensing equipment, while others rely on passive probing, which takes advantage of nearly universal smartphone usage and WiFi network coverage. In this study, we introduce a system that uses WiFi probing technologies aimed at tracking user locations and understanding individual behavior. We built our own devices to passively capture WiFi request probe packets from smartphones, without the phones being connected to the network. The devices were tested at the headquarters of the research sector of the Elm Company. The results of the analyses carried out to estimate the crowd density in offices and the flows of the crowd from one place to another are promising and illustrate the importance of such solutions in indoor and closed spaces.","PeriodicalId":308773,"journal":{"name":"Frontiers in The Internet of Things","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132987871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Frontiers in The Internet of Things
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1