Pub Date : 2016-08-01DOI: 10.1109/W-FiCloud.2016.41
N. Miloslavskaya, A. Tolstoy
Today we witness the appearance of some additional to Big Data concepts: data lakes and fast data. Are they simply the new marketing labels for the old Big Data IT or really new ones? Thus the key goal of the paper is to identify the relationship between these three concepts, giving special attention to their application to information security (IS) issues. The reason lies in the fact that volumes of IS-related information is one thing, but the real problem for securing enterprises' IT infrastructure assets is the speed with which things related to IS happen.
{"title":"Application of Big Data, Fast Data, and Data Lake Concepts to Information Security Issues","authors":"N. Miloslavskaya, A. Tolstoy","doi":"10.1109/W-FiCloud.2016.41","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.41","url":null,"abstract":"Today we witness the appearance of some additional to Big Data concepts: data lakes and fast data. Are they simply the new marketing labels for the old Big Data IT or really new ones? Thus the key goal of the paper is to identify the relationship between these three concepts, giving special attention to their application to information security (IS) issues. The reason lies in the fact that volumes of IS-related information is one thing, but the real problem for securing enterprises' IT infrastructure assets is the speed with which things related to IS happen.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"257 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122885974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/W-FiCloud.2016.34
P. Farkaš, M. Staron, F. Schindler
In this paper a new very simple distributed method for interference alignment is proposed. It is applicable to partially connected interference networks. In contrast to the known topological interference alignment techniques it does not need full topological knowledge in transmitters at the start of the procedure.
{"title":"Distributed Interference Alignment in Partially Connected Networks without Preliminary Topological Knowledge","authors":"P. Farkaš, M. Staron, F. Schindler","doi":"10.1109/W-FiCloud.2016.34","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.34","url":null,"abstract":"In this paper a new very simple distributed method for interference alignment is proposed. It is applicable to partially connected interference networks. In contrast to the known topological interference alignment techniques it does not need full topological knowledge in transmitters at the start of the procedure.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124611076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/W-FiCloud.2016.66
L. Tawalbeh, Waseem Bakhader
Enhancements of mobile devices capabilities resulted in an increasing usage of them among people all over the world. These smart devices including the smart phones changed our life style forever, and they are considered by many people as an inseparable part of their daily activities. We are using these mobile devices to do many useful activities such as: stay in touch with others through audio and video calls, run health and GIS applications, and do online shopping. However, there are some weakness aspects of these devices that limit their functionality: short battery and small memory. Mobile Cloud Computing promises to overcome such mobile device's limitations. The large files can be stored at the cloud, and the execution of huge jobs will be done at cloud also, and the mobile device will receive the results only. In this paper, we will build a mobile cloud system (MCS) for university applications. The proposed system can perform different tasks based on the types of the sensors used (motion, fire, or health sensors). We will present the design of two main applications of the proposed MCS which are in fire detection and traffic management inside the university. The data collected by the sensors will be transferred and analyzed in MCS to extract the suitable decision.
{"title":"A Mobile Cloud System for Different Useful Applications","authors":"L. Tawalbeh, Waseem Bakhader","doi":"10.1109/W-FiCloud.2016.66","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.66","url":null,"abstract":"Enhancements of mobile devices capabilities resulted in an increasing usage of them among people all over the world. These smart devices including the smart phones changed our life style forever, and they are considered by many people as an inseparable part of their daily activities. We are using these mobile devices to do many useful activities such as: stay in touch with others through audio and video calls, run health and GIS applications, and do online shopping. However, there are some weakness aspects of these devices that limit their functionality: short battery and small memory. Mobile Cloud Computing promises to overcome such mobile device's limitations. The large files can be stored at the cloud, and the execution of huge jobs will be done at cloud also, and the mobile device will receive the results only. In this paper, we will build a mobile cloud system (MCS) for university applications. The proposed system can perform different tasks based on the types of the sensors used (motion, fire, or health sensors). We will present the design of two main applications of the proposed MCS which are in fire detection and traffic management inside the university. The data collected by the sensors will be transferred and analyzed in MCS to extract the suitable decision.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116465721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/W-FiCloud.2016.37
Hari Kumar, Sandhya Baskaran, S. Hariraj, V. Krishnan, B. Tech
Aquaponics is a groundbreaking food production technique that combines both traditional methods of aquaculture and hydroponics to grow both fish and crops in a single integrated system. Aquaponics system uses fish wastes to provide essential nutrients to the plants. In return plants serve as a bio-filter for the fish in a symbiotic relationship. The purpose of this paper is to showcase how to build an efficient Internet of Things (IoT) application for aquaponics in order to create an autonomous, self-regulating system with the help of Wireless Sensor Network (WSN). An open standard of WSN called 6LoWPAN is being used in this system which helps us to construct a global infrastructure. The designed aquaponic system is composed of sensor devices that can sense and collect information of the various dimensions of the water quality involved and store it in a cloud database. This means that the human intervention would be considerably less when compared to the traditional methods of aquaponics. In addition to the traditional technique, with the help of Next-Gen Telco technologies, i.e., using their high bandwidth and low latency, infected fishes are detected automatically on time and treat them to ensure the balance in our aquaponics ecosystem. In this paper we propose an end-to-end system to enable "Connected Aquaponics" which includes WSN and Next-Gen Telco to increase the crop yield and provide organic sustainable food to the world community.
{"title":"An Autonomous Aquaponics System Using 6LoWPAN Based WSN","authors":"Hari Kumar, Sandhya Baskaran, S. Hariraj, V. Krishnan, B. Tech","doi":"10.1109/W-FiCloud.2016.37","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.37","url":null,"abstract":"Aquaponics is a groundbreaking food production technique that combines both traditional methods of aquaculture and hydroponics to grow both fish and crops in a single integrated system. Aquaponics system uses fish wastes to provide essential nutrients to the plants. In return plants serve as a bio-filter for the fish in a symbiotic relationship. The purpose of this paper is to showcase how to build an efficient Internet of Things (IoT) application for aquaponics in order to create an autonomous, self-regulating system with the help of Wireless Sensor Network (WSN). An open standard of WSN called 6LoWPAN is being used in this system which helps us to construct a global infrastructure. The designed aquaponic system is composed of sensor devices that can sense and collect information of the various dimensions of the water quality involved and store it in a cloud database. This means that the human intervention would be considerably less when compared to the traditional methods of aquaponics. In addition to the traditional technique, with the help of Next-Gen Telco technologies, i.e., using their high bandwidth and low latency, infected fishes are detected automatically on time and treat them to ensure the balance in our aquaponics ecosystem. In this paper we propose an end-to-end system to enable \"Connected Aquaponics\" which includes WSN and Next-Gen Telco to increase the crop yield and provide organic sustainable food to the world community.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116200470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/W-FiCloud.2016.62
Gianluca Papaleo, E. Cambiaso, L. Patti, M. Aiello
Mobile devices are nowadays adopted almost in every corner of the world. Being them crucial elements of people lives, in direct contact with their owners for the entire day and gathering sensitive information, they unwillingly attract cyber-criminals. The mobile malware phenomenon is currently a serious threat in this context. In this paper, we evaluate the rationale behind the development of a trojan horse: considering the Android platform, we describe the implementation and functional choices we have made by developing a mobile malware called Android Total Control.
如今,移动设备几乎遍布世界的每个角落。作为人们生活中至关重要的元素,它们整天与主人直接接触并收集敏感信息,它们不情愿地吸引了网络罪犯。在这种情况下,移动恶意软件现象目前是一个严重的威胁。在本文中,我们评估了特洛伊木马开发背后的基本原理:考虑到Android平台,我们描述了我们通过开发名为Android Total Control的移动恶意软件所做的实现和功能选择。
{"title":"Malware Development on Mobile Environments","authors":"Gianluca Papaleo, E. Cambiaso, L. Patti, M. Aiello","doi":"10.1109/W-FiCloud.2016.62","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.62","url":null,"abstract":"Mobile devices are nowadays adopted almost in every corner of the world. Being them crucial elements of people lives, in direct contact with their owners for the entire day and gathering sensitive information, they unwillingly attract cyber-criminals. The mobile malware phenomenon is currently a serious threat in this context. In this paper, we evaluate the rationale behind the development of a trojan horse: considering the Android platform, we describe the implementation and functional choices we have made by developing a mobile malware called Android Total Control.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127108653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/W-FiCloud.2016.61
Jukka Ruohonen, S. Šćepanović, S. Hyrynsalmi, I. Mishkovski, T. Aura, V. Leppänen
This short exploratory empirical paper examines a question of how important the Internet protocol (IP) addresses of name servers are in linking together Internet domains that have distributed malware or otherwise having been associated with malicious computer networks. By using the domain name system (DNS) for building a relational representation, the found importance is elaborated with a dataset comprised of nearly sixty thousand domains. Besides the empirical exploration related to these domains, the paper provides a stylized discussion on the construction of empirical DNS graphs, including the concrete reduction and learning of the observed malware graph. With these two deliverables, the paper contributes to the active research field of DNS mining, further pinpointing a number of relevant research challenges for applications of complex network analysis for studying computer networking and cyber security.
{"title":"The Black Mark beside My Name Server: Exploring the Importance of Name Server IP Addresses in Malware DNS Graphs","authors":"Jukka Ruohonen, S. Šćepanović, S. Hyrynsalmi, I. Mishkovski, T. Aura, V. Leppänen","doi":"10.1109/W-FiCloud.2016.61","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.61","url":null,"abstract":"This short exploratory empirical paper examines a question of how important the Internet protocol (IP) addresses of name servers are in linking together Internet domains that have distributed malware or otherwise having been associated with malicious computer networks. By using the domain name system (DNS) for building a relational representation, the found importance is elaborated with a dataset comprised of nearly sixty thousand domains. Besides the empirical exploration related to these domains, the paper provides a stylized discussion on the construction of empirical DNS graphs, including the concrete reduction and learning of the observed malware graph. With these two deliverables, the paper contributes to the active research field of DNS mining, further pinpointing a number of relevant research challenges for applications of complex network analysis for studying computer networking and cyber security.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"04 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127217781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/W-FiCloud.2016.56
Muhannad Quwaider, Mosab Alfaqeeh
Social Network Analysis becomes an important field of research focusing on studying users' data and its contributions on social network media. The goal of this study is to build relations between people in the disease field and to analyze certain knowledge or activities. In order to accomplish these goals, investigators become very interest in social network analysis to conclude certain behavior or prediction from various data in social networks. People in the field of sociology expect that the relationship between people and the real-life style can be mirrored in the social networks. On the other hand, manual classification of unstructured data from social networks is almost impossible. Therefore, there is a required for an automatic classification method in order to formulate this data and to be more convenient and accessible. In this paper we are studying data of diseases from Facebook pages. These diseases are associated to the categories of popular diseases such as Ebola, Malaria and HIV/AIDS. In this paper we addressed classifier as a supervised learning task and an innovative dataset named Benchmark Dataset for Diseases Classification (BDDC) is created. BDDC is well-documented dataset and its file formats and compatible with recognized text mining tools and to be utilized in the comparative experiments by other researchers. Three commonly classifiers are used and two versions are BDDC are used. The performance results show that BDDC with stemmer performs better than the one without stemmer because of using stop words filtering and porter.
{"title":"Social Networks Benchmark Dataset for Diseases Classification","authors":"Muhannad Quwaider, Mosab Alfaqeeh","doi":"10.1109/W-FiCloud.2016.56","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.56","url":null,"abstract":"Social Network Analysis becomes an important field of research focusing on studying users' data and its contributions on social network media. The goal of this study is to build relations between people in the disease field and to analyze certain knowledge or activities. In order to accomplish these goals, investigators become very interest in social network analysis to conclude certain behavior or prediction from various data in social networks. People in the field of sociology expect that the relationship between people and the real-life style can be mirrored in the social networks. On the other hand, manual classification of unstructured data from social networks is almost impossible. Therefore, there is a required for an automatic classification method in order to formulate this data and to be more convenient and accessible. In this paper we are studying data of diseases from Facebook pages. These diseases are associated to the categories of popular diseases such as Ebola, Malaria and HIV/AIDS. In this paper we addressed classifier as a supervised learning task and an innovative dataset named Benchmark Dataset for Diseases Classification (BDDC) is created. BDDC is well-documented dataset and its file formats and compatible with recognized text mining tools and to be utilized in the comparative experiments by other researchers. Three commonly classifiers are used and two versions are BDDC are used. The performance results show that BDDC with stemmer performs better than the one without stemmer because of using stop words filtering and porter.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"24 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130676769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/W-FiCloud.2016.64
M. Ghazal, Samr Ali, Marah Al Halabi, Nada Ali, Yasmina Alkhalil
Mobile government is an innovative research area where efforts are made to advance governmental and public services. As such, in this paper, we propose a crisis management system for real-time emergency notification of users using mobile applications and smart watches. We develop an intuitive web portal using a client server architecture for governmental agencies to easily and efficiently notify users within the range of danger in the occurrence of a disaster through SMS or push notifications to the mobile application or the smart watch, if the latter is available. Moreover, real-time mapping for indoor localization systems are utilized for user navigation to the nearest exit with the added feature of floor plans for public locations that may be accessed offline for the convenience of the users. The system is also designed for instant emergency aid assistance in case of a medical personal difficulty through the use of the developed dedicated bilingual multi-platform mobile application.
{"title":"Smart Mobile-Based Emergency Management and Notification System","authors":"M. Ghazal, Samr Ali, Marah Al Halabi, Nada Ali, Yasmina Alkhalil","doi":"10.1109/W-FiCloud.2016.64","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.64","url":null,"abstract":"Mobile government is an innovative research area where efforts are made to advance governmental and public services. As such, in this paper, we propose a crisis management system for real-time emergency notification of users using mobile applications and smart watches. We develop an intuitive web portal using a client server architecture for governmental agencies to easily and efficiently notify users within the range of danger in the occurrence of a disaster through SMS or push notifications to the mobile application or the smart watch, if the latter is available. Moreover, real-time mapping for indoor localization systems are utilized for user navigation to the nearest exit with the added feature of floor plans for public locations that may be accessed offline for the convenience of the users. The system is also designed for instant emergency aid assistance in case of a medical personal difficulty through the use of the developed dedicated bilingual multi-platform mobile application.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"113 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114097136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/W-FiCloud.2016.49
Hadi Hashem, D. Ranc
Social Media is experiencing an ongoing significant growth worldwide. It has changed the way society and economy work. Social Media channels continuously gain importance for companies and brands in interacting with their target groups. The enormous increase of Social Media use develops its own dynamics. A short post can turn into a critical damage to organizations and assets. Thus, powerful monitoring tools and optimized processing data models are absolutely necessary. In this paper, we offer a new dynamic model of a 3-step data processing sequence: data capture, data modeling and data computing. We are using case-based reasoning for known situations and self-learning capacity for new situations. This toolbox shows interesting results in terms of data processing costs and green computing.
{"title":"Data Modeling and Case-Based Reasoning for Social Monitoring","authors":"Hadi Hashem, D. Ranc","doi":"10.1109/W-FiCloud.2016.49","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.49","url":null,"abstract":"Social Media is experiencing an ongoing significant growth worldwide. It has changed the way society and economy work. Social Media channels continuously gain importance for companies and brands in interacting with their target groups. The enormous increase of Social Media use develops its own dynamics. A short post can turn into a critical damage to organizations and assets. Thus, powerful monitoring tools and optimized processing data models are absolutely necessary. In this paper, we offer a new dynamic model of a 3-step data processing sequence: data capture, data modeling and data computing. We are using case-based reasoning for known situations and self-learning capacity for new situations. This toolbox shows interesting results in terms of data processing costs and green computing.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123849444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/W-FiCloud.2016.73
Dong-hyu Kim, Heejin Lee
This paper investigates how formal standards shape the M2M/IoT technological trajectory. We, firstly, visualized the patent citation networks of M2M/IoT, drawing upon the social network analysis and Hummon and Dereian's (1989) connectivity measure, and identified the technological trajectory of M2M/IoT. Through the examination, we found that 3GPP standards regarding the overall M2M/IoT system architecture (TR 22.868, TR 33.812, TS 22.368, TR 22.888, in particular) host a crucial role in setting the boundary conditions of the M2M/IoT variation and selection process. Second, we found the importance of formal standards on path-creation by catch-up firms (e.g. LG and Huawei), since they provide access to external knowledge and opportunities to build up their knowledge base. These findings are expected to make contributions to innovation and standards studies by empirically clarifying the relationship between a technological trajectory and standards. Furthermore, they may cast light on the ongoing M2M/IoT standards rivalry and offer practical implications for catch-up strategies.
本文探讨了正式标准如何塑造M2M/IoT技术轨迹。首先,我们利用社会网络分析和Hummon and Dereian(1989)的连接性测量,对M2M/IoT的专利引用网络进行了可视化,并确定了M2M/IoT的技术轨迹。通过研究,我们发现关于M2M/IoT整体系统架构的3GPP标准(特别是TR 22.868, TR 33.812, TS 22.368, TR 22.888)在设定M2M/IoT变化和选择过程的边界条件方面发挥了至关重要的作用。其次,我们发现正式标准对追赶企业(如LG和华为)创造路径的重要性,因为它们提供了获取外部知识和建立知识基础的机会。这些发现有望通过实证澄清技术轨迹和标准之间的关系,为创新和标准研究做出贡献。此外,它们可能会阐明正在进行的M2M/IoT标准竞争,并为追赶战略提供实际意义。
{"title":"An Investigation on the M2M/IoT Trajectory and Its Relationship with Formal Standards","authors":"Dong-hyu Kim, Heejin Lee","doi":"10.1109/W-FiCloud.2016.73","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.73","url":null,"abstract":"This paper investigates how formal standards shape the M2M/IoT technological trajectory. We, firstly, visualized the patent citation networks of M2M/IoT, drawing upon the social network analysis and Hummon and Dereian's (1989) connectivity measure, and identified the technological trajectory of M2M/IoT. Through the examination, we found that 3GPP standards regarding the overall M2M/IoT system architecture (TR 22.868, TR 33.812, TS 22.368, TR 22.888, in particular) host a crucial role in setting the boundary conditions of the M2M/IoT variation and selection process. Second, we found the importance of formal standards on path-creation by catch-up firms (e.g. LG and Huawei), since they provide access to external knowledge and opportunities to build up their knowledge base. These findings are expected to make contributions to innovation and standards studies by empirically clarifying the relationship between a technological trajectory and standards. Furthermore, they may cast light on the ongoing M2M/IoT standards rivalry and offer practical implications for catch-up strategies.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127589897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}