You are on page 1of 17

Wireless Netw (2014) 20:2201–2217

DOI 10.1007/s11276-014-0731-0

Future Internet of Things: open issues and challenges


Chun-Wei Tsai • Chin-Feng Lai • Athanasios V. Vasilakos

Published online: 13 May 2014


 Springer Science+Business Media New York 2014

Abstract Internet of Things (IoT) and its relevant tech- 1 Introduction


nologies have been attracting the attention of researchers
from academia, industry, and government in recent years. Today, we can enjoy the successful results of various
However, since the requirements of the IoT are quite dif- information systems and Internet applications because they
ferent from what the Internet today can offer, several underwent several changes and redesigns to satisfy the
innovative techniques have been gradually developed and needs of end users. With relevant technologies, systems,
incorporated into IoT, which is referred to as the Future and Internet at hand, several incredible approaches can
Internet of Things (FIoT). Among them, how to extract then be imagined and realized. The Internet applications
‘‘data’’ and transfer them into ‘‘knowledge’’ from sensing are now linked closely to the daily life of humans covering
layer to application layer has become a vital issue. This various fields from the World Wide Web to e-mail to
paper begins with an overview of IoT and FIoT, followed e-Learning to search engine to social network [1, 2]. Debut
by discussions on how to apply data mining and compu- of these applications has made our life much more con-
tational intelligence to FIoT. An intelligent data manage- venient today than in the past.
ment framework inspired by swarm optimization will then Recently, several studies from academics, industries,
given. Finally, open issues and future trends of this field and governments have attempted to connect all things in
will be addressed. the world to the Internet to provide a seamless integrated
system for enhancing their performance in the transmission
Keywords Future Internet of Things  Data mining  of information, called Internet of Things (IoT) [3, 4]. In
Cloud computing addition to providing us a better life (in terms of food,
dressing, housing, transportation, education, and enter-
tainment), the impact of IoT can also be found in the
market of renewable/sustainable energy no matter where it
is [5]. Until now, the IoT is still not well defined. That is
why several studies [4, 6–8] have focused on clarifying the
definition of IoT and discussing its future research direc-
C.-W. Tsai
Department of Applied Informatics and Multimedia, Chia Nan tions, such as smart city, global supply chain logistics, and
University of Pharmacy and Science, Tainan, Taiwan, ROC health care.
As one of the emerging industries, the IoT has been
C.-F. Lai
facing the following challenges: applying it to different
Institute of Computer Science and Information Engineering,
National Chung Cheng University, Chia-Yi, Taiwan, ROC domains and integrating it with devices, systems and net-
e-mail: cinfon@ieee.org work environments emerged and discussed in several
studies [6, 9]. One of the most important things is that
A. V. Vasilakos (&)
given an integrated architecture for IoT. Another important
Department of Computer Science, Kuwait University, Kuwait,
Kuwait thing is to solve the problems the Internet today faces. That
e-mail: vasilako@ath.forthnet.gr is why future Internet and FIoT were frequently discussed

123
2202 Wireless Netw (2014) 20:2201–2217

in recent years. Among the studies of IoT, the promising proposed framework and a simple scenario are described in
researches are (1) developing approaches for Future detail. The open issues and possible research trends are
Internet of Things from the perspective of system design discussed in Sects. 5 and 6, respectively.
and (2) using the information retrieval and data mining
technologies [10–13] to analyze the data from things or
systems of IoT from the perspective of information 2 From Internet of Things to Future Internet of Things
analysis.
With several studies of IoT and FIoT presented in recent 2.1 The Internet of Things
years, their importance has now becoming more and more
clear. First, it can be found that the marketing trends of IoT These historical development processes can be traced back
grew rapidly in the last decade [14, 15]. More preciesly, the to [3] and Auto-ID of MIT. The importance of IoT was
marketing of IoT is estimated to reach $309 billion per year quickly realized by some researchers; therefore, several
by 2020 [14]. Another technology report [15] pointed out organizations established research groups to discuss pos-
that the potential economic impact of IoT will reach $2.7 sible architectures and standards while trying to develop
trillion to $6.2 trillion per year by 2025. Although the esti- practicable IoT systems [16]. Since the concepts and pro-
mations of marketing value for IoT and its relevant appli- ducts were presented, definitions for IoT for various con-
cations from different researches are different, one thing in siderations have also been developed. One of the early
common is that they will strongly impact the industries and developments can be found in the EPC global architecture
economies in the near future. Different from the impact of framework of electronic product code (EPC) which is
marketing, althouth IoT now is just stepping into its initial focused on the radio-frequency identification (RFID)
stage, many prototype systems and applications [4, 4–8] approach which not only provides a prototype system, but
have been presented in recent years. By using technologies of also illustrates the other possibilities of IoT.
IoT in our daily life, fast and convenient environments can be As shown in Table 1, definitions of IoT can be found in
expected. Everything can be easily controlled, monitored, different researches, such as United States, European,
and cooperated with each other. For example, we can now Japan, and China. Although definitions from different
track the status (e.g., activity or location) of our shipment via organizations are somehow different, the requirements [4]
the web.1 Thus, we can monitor and manage these things for IoT are essentially the same, such as being able to
more effectively and provide better services to users. integrate heterogeneous devices, ubiquitous data exchange,
The aim of this paper is not only to provide a systematic localization and tracking capabilities, and even being able
description of IoT and data management technologies for to make the simple decision by themselves [17]. To pro-
IoT but also to discuss the characteristics of FIoT so as to vide better services for the end user, the intelligence has
provide a guideline for the researchers focusing on IoT to become a vital issue of IoT. That is why several studies [4,
shift to FIoT, especially the comparisons of their archi- 8, 17–19] are focused on making things on IoT as intelli-
tectures and systems. The main contributions of the paper gent as possible (called smart objects) instead of just fol-
can be summarized as follows: lowing the simple rules to make decisions.
The basic architecture of IoT is three-layer, , as shown
• A brief introduction to IoT and FIoT is presented the
in Fig. 1(a), which is widely used to explain the approaches
focus of which is on the design issues to provide a
of IoT [20–24]. The perception layer (also called the
simple comparison of them.
sensing layer or the edge technology layer) is the bottom
• An integrated data management framework is presented
layer which can be regarded as the hardware or physical
in this paper to integrate the information from FIoT
layer. Data collection is done on this layer. The middle
using swarm intelligence to create knowledge for us.
layer, i.e., the network layer, is responsible for connecting
• The open issues and possible research trends are given
the perception layer and the application layer so that things
to illustrate the critical research of FIoT, especially for
can be passed from the perception layer to the application
data analysis.
layer and systems, applications, services can be passed
The remainder of the paper is organized as follows. from the application layer to the perception layer. The
Section 2 gives a brief introduction to the IoT and FIoT application layer usually plays the role of providing ser-
and their variants. Section 3 then discusses computation vices or applications that integrate or analyze the infor-
intelligence and data mining to IoT. Section 4 starts with mation received from the other two layers.
the basic idea of the proposed framework. Then, the As shown in Fig. 1(b), inspired by [16], a recent study
[6] added the access gateway layer and the middleware
1
FedExr Tracking, https://www.fedex.com/fedextrack/?action= layer to the three-layer architecture of IoT. In [6], the
track perception layer at the bottom of IoT’s architecture is also

123
Wireless Netw (2014) 20:2201–2217 2203

Table 1 The definitions and standards of IoT Table 2 The definitions and standards of FIoT
Organization Web link Name Web link

Massachusetts Institute http://www.autoidlabs.org/ Future Internet Architecture http://www.nets-fia.net/


of Technology (FIA)
EPCglobal http://www.gs1.org/epcglobal Future Internet Design http://www.nets-find.net/
National Intelligence http://www.fas.org/irp/nic/disruptive (FIND)
Council Future Internet Research and http://www.ict-fire.eu/home.html
European Commission http://cordis.europa.eu/fp7/ict/enet/home_ Experimentation (FIRE)
en.html AKARI http://www.nict.go.jp/en/photonic_
European Commission http://www.smart-systems-integration.org/ nw/archi/akari/akari-top_e.html
public/internet-of-things Name Data Networking http://named-data.net/
Ubiquitous ID Center http://www.uidcenter.org/ (NDN)
Internet of Things China http://www.iotcn.org.cn/ SENSEI http://www.sensei-project.eu/
Internet of things- http://www.iot-a.eu/public
Architecture (IoT-A)

smarter planet of IBM2 and the 50 sensor applications for a


Application Layer smarter world.3 Since the potentials of IoT also can be
found in the applications for the smart grid systems [25]
Middleware Layer and smart homes [26], from the perspective of the design
concept, the IoT has been gradually shifted from extended
applications with one kind of equipment to an integration
Application Layer Network Layer
of different appliances. The design concept of integration
and flexibility has become essential because the vertical
Network Layer Access Gateway Layer and horizontal integration between different appliances,
network communication, systems, applications, services
Preception Layer Preception Layer are the characteristics of most IoT applications nowadays.

(a) (b) 2.2 The Future Internet of Things

Fig. 1 The architecture of IoT. a Three-layer architecture b five-layer With advance of internet technology and development of
architecture
social network, it is reasonable to expect that a new gen-
eration of Internet (also called future Internet) that will
appear in the near future. In [27], several key technical
called the edge layer, which provides the definition of issues of IoT were pointed out, such as heterogeneity,
gathering the data. Different from the three-layer archi- connectivity, scale, naming, addressing, identification, and
tecture of IoT that uses only the network layer to connect privacy. These challenges and open issues clarify that the
the perception and application layers, the access gateway dilemma of current Internet architecture requires great
layer is added to the five-layer architecture of IoT, together efforts to change. The design of IoT that will accompany
with network layer, to manage the communications in the future Internet has to be redesigned. Similar to the devel-
IoT environment and to transmit messages between the opment of FIoT, several governments and organizations
objects and systems. The middleware layer is another layer have focused on defining and determining the possible
for the five-layer architecture of IoT which is usually used standards, architectures, and relevant technologies for this
to provide a more flexible association interface between the new generation IoT, which are FIA, FIND, FIRE, and
hardware and applications. Finally, the top layer of this AKARI, as shown in Table 2. Contemporaneous with the
five-layer architecture is the application layer. The defini- above programs, the proliferation can be found on several
tion of this layer is similar to that in the three-layer studies [21, 22, 24, 27–34]. They were presented for
architecture. enduing FIoT that has more different characteristics to
With the advance of IoT, many innovative services and satisfy the need of end users, such as reliability or security.
applications now are no longer imagination, they will be
presented to the public with good possibilities, which can 2
http://www.ibm.com/smarterplanet/us/en/
be found on some well-known examples, such as the 3
http://www.libelium.com/

123
2204 Wireless Netw (2014) 20:2201–2217

In [28, 34], brief reviews and comparisons for FIoT and Fig. 2 One architecture of FIoT
[29] Social Layer
the possible research trends are given. Based on these
studies, one of the characteristics in the design of FIoT is to
change the way information is extracted. To solve the Application Layer
problem of the Internet today that has to know the IP
address to get the contents, a different content dissemina- Network Layer
tion model was employed for the NDN of FIA to change
the way information is transmitted between the end users. Preception Layer
In other words, the end users just need to concern ‘‘what’’
the contents are instead of ‘‘where’’ the contents are [28].
To provide a comprehensive and high performance Internet
Table 3 Research topics on IoT and FIoT
architecture, the major concerns of the NEBULA [35] of
FIA are supporting cloud computing and highly reliable Level Research topics References
applications. The design of NEBULA also takes into System design Standard and [6, 22, 29, 33, 35, 36],
account integrating with other future Internet architectures. framework Tables 1 and 2
Different from the NDN and NEBULA of FIA from the Security and [37–40]
United States, the SENSEI is from seventh framework privacy
programme (FP7) of European Union. Similar to other Applications/ Smart city and [25, 26, 41–44]
FIoT architectures, of course, the major concern of SEN- services smart home
SEI is also on providing a highly scalable architectural Transportation [45–49]
framework and open service interface, but one of the main Health care [7, 50, 51]
focuses is on the integration of the resources between real Social network [16, 30, 52, 53]
world and digital world (SENSEI system) with the resource Education [54–56]
and entity abstraction levels. According to the observations Algorithms/ Data mining [10–13, 57–61]
technologies Computational [62–66]
of [34], SENSEI can provide more flexible services than
intelligence
Auto-ID. IoT-A is another FIoT of FP7. Similar to the
SENSEI, IoT-A also considers how to integrate the Smart object [8, 17–19]
resource of IoT and entity of real world with other future Overall Survey and review [4, 6–9, 16, 28, 31]
discussions Comparision and [21, 24, 27, 32, 34]
Internet. In addition, one of the focuses of IoT-A is
discussion
machine-to-machine communication.
In order to provide better services to end users, self-
management capabilities of IoT are a necessary rather than security, physical security, and management security.
a comprehensive framework. Recently, some researches Another promising research of FIoT is the social internet of
[22, 29, 30] have focused on integrating artificial intelligent things (SIoT) [30]. The basic idea of SIoT is to integrate
and social network concepts into FIoT. In [22], a man-like the social network with IoT to provide better services for
nervous (MLN) architecture was presented for FIoT. An the end users of such a system. Under this kind of archi-
interesting characteristic of MLN is the emphasis of the tecture, the definitions of social relationships and social
intelligent control. To realize this kind of intelligent FIoT network structures are the essential to success. Applying
architecture, the management and centralized data center intelligent technologies to make the FIoT smart has also
(M&DC), distributed control nodes, and IoT network and appeared in the studies of SIoT, such as employing the
sensors are generally regarded as brain, spinal cord, and ontologies to represent the social activities with semantic
nerves. In the same study [22], Ning and Wang also pre- view.
sented social-based framework for FIoT, called social
organization framework (SOF). Based on the definitions 2.3 Summarization
given to different levels of M&DC, SOF can construct and
manage an integrated ubiquitous IoT. In a nutshell, for A summarization of the researches on IoT and FIoT is
MLN, neuron represents the sensor, neural network rep- given in this section. As shown in Table 3, they can be
resents the Internet, and M&DC is the brain. The data categorized as system design, applications/services, algo-
collection procedure from sensors (neurons) to brain rithms/technologies, and overall discussions. In other
(M&DC) is just like the process of human to sense the words, these studies can be regarded as an epitome of
events or to get the data. As shown in Fig. 2, the focus of research trends and topics on IoT. For the system design
later study [29] (IPM) has then been changed to the net- point of view, several organizations proposed frameworks
work security from the perspectives of information as well as standards for the IoT and FIoT. Among these

123
Wireless Netw (2014) 20:2201–2217 2205

organizations are research teams, societies, and govern- systems. For these reasons, in addition to surveys and
ments. These researches usually involved in the definitions, reviews [4, 6–9, 16, 28, 31] for IoT and FIoT, some
communication protocols, data types, and system models comparisons and discussions [21, 24, 27, 32, 34] are pre-
of IoT. However, although a large number of studies focus sented to point out some promising and possible solutions
on how to realize the IoT by using their frameworks, that may help us understand the critical points of IoT so as
exchanging data between IoTs still is a problem faced by to enhance its performance.
these researches. While most researches pay their attention In summary, the differences between IoT and FIoT are
to defining the standards, frameworks, and system models not only in the environment, infrastructures, protocols,
of IoT, security and privacy [37–40] are another two crit- standards, and systems, but also in some integrated issues
ical issues to be addressed for the IoT. This can be easily which are given as follows:
justified because this kind of system will own much more
data about us, i.e., not only the data recorded by the IoT but • Finding the needed contents and resources: How to find
also the data created by such systems. Thus, how to protect the useful contents will become an important issue for
our assets on IoT has become a very important issue. FIoT because every ‘‘thing’’ needs them to finish its job
Different from system design, because of the maturity of or provide better services. Different from the fact that
some systems and technologies of IoT, a greater number of IPv6 is used to increase the number of addresses to
researches have been focusing on presenting the innovative satisfy a much larger number of things, as we
applications for our daily life, such as smarter planet of mentioned previously, the name data networking is
IBM, plug-in hybrid electric vehicle (PHEV), intelligent expected for FIoT because the trend is content-oriented,
appliances for smart home, health care, social network, and not host-oriented. Of course, this is just the first step,
e-Learning [7, 16, 25, 26, 30, 41–56]. It is expected that but it may give us a helpful starting point to make
most touchable ‘‘things’’ in our life will be connected to an things be able to find useful information by themselves
IoT system, and the service provider will be able to provide or to automatically exchange the information.
us suitable and necessary services, by analyzing the data • Infrastructures: In addition to IPv6 and NDN, the
collected by IoT. For example, the data collected from infrastructures of FIoT will also differ from IoT
different sensors (e.g., driving behavior, power consump- because many IoT approaches are designed and devel-
tion, and location information) can provide sufficient oped with the current internet environment. We can say
information for PHEV to predict the best time to charge. Of that FIoT will bring a revolution of the internet. But the
course, the things of IoT (e.g., sensors and cameras) can only one thing we know is that the FIoT will not be
also be employed to predict the conditions of human falling designed and developed on the current internet envi-
for health care applications. In brief, the applications of IoT ronment; rather, it will be designed and developed on
will be indispensable to our life in the near future. an environment that integrates internet, cloud comput-
To develop better services and applications, some ing, and smart grid.
researches are focused on developing smart ‘‘thing’’ (also • Smartness to intelligenc: Making things more intelli-
called smart object) [8, 17–19] from the intelligent per- gent has always been the ultimate goal of computer
spective of IoT. It means that each sensor or appliance may systems, including IoT and FIoT. According to our
be able to think by itself or be able to cooperate with other observations, the early studies of IoT usually use rule-
devices. The other two research trends are applying the based mechanisms to provide smart services, such as
data mining [10–13, 57–61] and computational intelligence turning on the light because the sensor detected
(CI) [62–66] technologies to IoT, such as suggesting a new someone is entering the room. Nowadays, the research
path for a driver to avoid traffic jam or automatically trends have been employing much more intelligent
turning lights on or off. Among them, clustering, classifi- mechanisms to replace the rule-based mechanisms to
cation, and associate rule are the typical data mining make things think as much as the way humans think.
technologies for IoT to provide a convenient life. In these For this reason, the modern computational intelligence
researches, the environment of IoT will generally be will also be employed in FIoT.
modeled as a data mining approach first and then a tradi- • Colletive intelligence: Since social networks have
tional mining algorithm is used to solve it. The results of changed the using behavior of internet users which
using data mining for IoT are promising in terms of both also changed the marketing strategies of companies.
the accuracy rate and computation time, but not many Another important characteristic is that the discussion
studies pay attention to integrate these mining technologies forum between users will have more members and will
for different IoT systems to do a single task, such as falling transmit information much faster. Although not many
detection system for the elder that needs information from studies of IoT focus on colletive intelligence, we all
different detection systems and even from the notification know that social networks will accelerate the

123
2206 Wireless Netw (2014) 20:2201–2217

development of colletive intelligence in the forthcom- the design of GA can be easily understood and applied to
ing future. Thus, the colletive intelligence will certainly parallel computing system, it was spread very fast and has
play a critical role in the provisioning of applicable been applied to several research and practical problems.
services by FIoT. From the perspective of the search probability of diversi-
fication and intensification, because GA has multiple
chromosomes4 to represent the candidate solutions and
search directions, the global search ability and its search
3 Smartness for IoT
diversification are better than single-solution-based search
algorithms.5 Also because the crossover and mutation
As we mentioned in Sect. 2.3, data mining and computa-
operators play the role of exchanging the information
tion intelligence are the two critical technologies to make
between chromosomes and disturbing the current solutions,
IoT provide better services for us. In this section, we will
respectively, the GA is able to fine an approximate solution
start with a brief introduction to CI which contains the
within a shorter period of computation time.
basic ideas and comparisons of CI methods, especially the
More recently, nature-inspired algorithms, collectively
evolutionary computing and swarm optimization. We will
called swarm intelligence [78], presented continuously
then turn the discussion to the applications of IoT by using
after the 1990s, has attracted researchers from different
CI methods. The basic idea of data mining and its appli-
domains. The behaviors of ants, bees, fireflies, or bats are
cations in IoT will also be given in this section.
used as models to study. The ant colony optimization
(ACO) [75, 76] and particle swarm optimization (PSO)
3.1 Computational intelligence [77] are two representatives of swarm optimization for
discrete and continuous problems, respectively. According
The CI [67] is definitely one of the vital branches of the to our observation, the main features of SI are social
history and evolution of computers, which is aimed at behaviors and common information communication. For
making computers be able to ‘‘think by themselves.’’ To example, ACO [75, 76] uses pheromone and heuristic
imitate the brain of human to make decisions or to emulate information to construct the partial routing paths step by
the genius of nature to solve complex problems are all the step, as shown in Eq. (1). More precisely, each ant has
possible models of CI. Moreover, the technologies of CI more than one routing path (also called edge) that can be
now cover and overlap a large number of research domains. selected when it is at a node i (also called the subsolution)
Examples are neural network, fuzzy logic, evolutionary with probability
computation, and nature-inspired algorithms. The nature- 8
>
< ½sij a ½gij b k
inspired algorithm is one of the important CI methods P if j 2 N i ;
which uses the heuristic and strategic guess to find the pkij ¼ a
k ½sij  ½gij 
b
ð1Þ
>
: j2N i
possible solutions. Based on the observation of [68, 69], the 0 otherwise;
computation time of nature-inspired algorithms is usually
faster than brute-force or exhaustive search. That is why a where i and j denote the jthe subsolution of the ith solution;
k
large number of researches have attempted to apply the k the kth ant; N i the set of candidate subsolutions; sij the
nature-inspired algorithm to solve the complex and large pheromone value, and gij the heuristic value. Based on
scale problems in recent years. Eq. (1) and pheromone update operator, each ant then can
The neural network and fuzzy logic were spread fast in share the search experience and information with other ants
the 1980s or even earlier. Several applications of neural via a common pheromone matrix. Another interesting
network and fuzzy logic can be found in industry and example is particle swarm optimization [77] which origi-
commercial today [70, 71]. On the other hand, the nature- nates from an observation of the social behavior of bird
inspired algorithms are expanded in the 1990s even though flock or fish school. Different from ACO, PSO uses the
some of them were presented in 1960s or even earlier. In velocity and position of each particle to define the search
brief, let alone the timing to spread, most of the CI algo- strategy. As shown in Eq. (2), three different kinds of
rithms have now taken their place and have also been forces, inertial velocity v, personal best pb, and global best
accepted as a search method for complex problems. The gb, will impact on the search direction of each particle. In
evolutionary computing [72–74] and swarm intelligence
(SI) [75–77] are two promising kinds of search algorithms. 4
The chromosome of GA, ant of ACO, particle or PSO are generally
For instance, genetic algorithm (GA) [72–74], a well-
regarded as the candidate solution.
known evolutionary computing, employs the crossover, 5
Single-solution-based search algorithm uses a single search direc-
mutation, and selection operators to emulate the process of tion while population-based search algorithm uses multiple search
natural selection to find better candidate solutions. Because directions to find the solution at the same time.

123
Wireless Netw (2014) 20:2201–2217 2207

found in the predecessor of IoT or relevant systems, such as


smart home, information appliance system, and smart grid.
Knowledge
Interpreation 3.2 Data mining for FIoT

In addition to the CI, many recent studies [10–13, 79, 80]


has applied data mining or CI-based mining technologies to
IoT. Figure 3 presents the steps of the knowledge discov-
Pattern Data Mining ery in databases (KDD) [81] process. Among these steps is
the data mining technologies. After these steps, an infor-
mation system can efficiently and effectively extract, filter,
manage, and analyze data captured from the lower layer or
the perception layer. The details of KDD can be found in
Transformed Data Transformation [81].
The main reasons of using these technologies are: (1) a
large amount of data captured by the sensors and other
appliances of IoT need to be effectively managed and
analyzed, and (2) data mining may be able to find out
Preprocessed Data Preprocessing meaningful hidden information from this large amount of
data. It is expected that the first issue the IoT designers
have to solve is that a deluge of data will enter to the IoT.
The existing sampling, compression, or filtering technolo-
gies [82] can only mitigate the symptoms but not treat the
Target Data Selection cause from the root. In addition, the importance of effec-
tively managing and analyzing the data is not only for the
system performance but also for finding useful information
from the captured data. As a result, rather than applying the
CI or data mining technologies to the systems of IoT or
Data
FIoT, ‘‘rethinking’’ of the overall architecture of IoT and
Fig. 3 Outline of KDD [81] then ‘‘constructing’’ a novel CI system would have a much
stronger impact. For the details of other data mining
technologies for IoT, you are referred to [83].
addition, the search experience can be exchanged and
shared via the global best value.
vtþ1 t t t t t
ij ¼ xvij þ a1 u1 ðpbij  pij Þ þ a2 u2 ðgbj  pij Þ; ð2Þ 4 The proposed framework for FIoT

and 4.1 The basic idea


ptþ1
ij ¼ ptij þ vtþ1
ij ; ð3Þ
For FIoT is now in its initial stage, we generally believe
where vtij and ptij denote the velocity and position of the jth that there is plenty of room for improvement. For example,
dimension of the ith particle at iteration t; x an inertial first, the CI technologies can be used to replace or combine
weight; u1 and u2 two uniformly distributed random with the rule-based technologies to further increase the
numbers; and a1 and a2 two constant values. flexibility of the systems and things of IoT. Although XML
After these discussions, we now know that CI is able to and other relevant technologies can provide gateway
find the approximate solution within a reasonable time. between information systems, exchanging inforamtion
Some pioneer researches [62–64] also attempted to apply between these systems still is a difficult problem. This
CI to IoT and applications relevant to it, such as localiza- dilemma is now still in the IoT and FIoT. In addition, a
tion, data aggregation and sensor fusion, clustering, and large scale of data will be created or detected from the
scheduling. For this reason, CI has the potential of making things and systems of FIoT, how to handle these data will
IoT and FIoT provide smarter services, besides to also become a problem. For these reasons, to enhance the
enhancing the performance of these systems. In fact, some performance of FIoT and to provide applicable services for
studies [65, 66] showed that the CI technologies can also be the end user, two possible solutions are (1) data

123
2208 Wireless Netw (2014) 20:2201–2217

Interpreation Layer

u1 u2 u3 u4 u5 u6

S.N.
Social Layer
u7 u8 u9 u10 u11 u12
APP1 APP3 Mangment and
Application Layer Mining Layer
APP2 APP4

cloud
GDB
Network Layer
LDB LDB LDB

Preception Layer Extraction Layer


a1 b1 c1 c3
a2 a3 b2 c2 c4

Fig. 4 The proposed framework

management and mining and (2) CI. The basic idea of the appliances (sensor, RFID, or near field communication tag)
proposed framework can be divided into twofold: for data collection, data extraction, and data filtering pro-
cess. Different from the traditional approaches of IoT, the
• Data management and mining technologies for Future
data on different appliances or devices will not be inde-
Internet of Things: As mentioned previously, data
pendent in the perception layer of the proposed framework
mining and its relevant technologies [13, 84] can be
because different appliances and devices can communicate
used for an IoT system to effectively manage and
and coordinate to process data via the communication
analyze the data from the perception layer. A design
among agents.
using the concept of data management and mining is
Similar to the study of [22], the data storage of the
needed for Future Internet of Things, especially when
proposed framework will be centralized for the small scale
the amount of data is too large, thus making it difficult
systems but will be distributed for the large scale systems.
to handle, manage, and analyze.
Data collected by the perception layer’s devices will be
• Computational intelligence and social network for
uploaded to the local database (LB) first. The data collected
Future Internet of Things: The concepts of computa-
from different devices in the perception layer will be stored
tional intelligence and social network can also be
in the same local database because they are close to each
employed in the design of IoT and FIoT [22, 85–87].
other. The global database (GDB) in the proposed frame-
Because the social networks in digital world will
work plays the role of integrating data from the LDBs.
become much more large and complex, how to design a
More precisely, the local data of the proposed framework
high performance of IoT will also become an important
will be centralized, thus the data can be preprocessed or
research issue.
processed (i.e., data reduction, compression, and refor-
Based on these observations, an intelligent data man- matting) more effectively before they become too large to
agement framework based on the swarm optimization, be processed at a machine. Then, the GDB can integrate
called Data Management Framework based Swarm Opti- less data from different LDBs. The applications can access
mization (DMFSO), will be presented in this paper. the needed data via the GDB while the user can use these
applications through a cloud environment. Note that in
4.2 Data management framework based swarm Fig. 4, APP denotes application; S.N. the social network;
optimization and u the user.
As shown in the right side of Fig. 4, we condensed the
As shown in Figure 4, the proposed framework is designed KDD into the extraction, management and mining, and
to conform to the architecture of FIoT, especially for the interpretation layers. The extraction layer maps to the
support of social network and cloud computing. The per- perception layer. Different from the traditional KDD, the
formance of data management and analysis is also con- extraction layer of the proposed framework also takes into
sidered for the DMFSO. consideration the behavior of agents for its devices. The
As shown in the middle of Fig. 4, each sensor or management and mining layer of DMFSO consists of the
appliance is associated with a simple agent of the percep- network layer, the application layer, and the social layer
tion layer. These agents play the role of controlling the because it can be employed to manage and analyze the data

123
Wireless Netw (2014) 20:2201–2217 2209

for these layers of FIoT. Different from the design of [13], Table 4 Outline of information exchange between agents on the
the proposed framework adds an interpretation layer, which proposed framework
plays the role of summarizing the information from the 1. Receive event (Ea ) and information (I a ) from other agent Aa .
data mining tools, making the decisions via the information 2. Compute the relevance (dab ) between agent Aa and agent Ab .
from the management and mining layer. 3. Compute the importance (iab ) of information from agent a for
The design of the agent for the proposed framework is agent b.
inspired by the ACO and PSO, especially by the informa- 4. Make the decision of agent Ab by using the information I a , I b ,
tion and experience sharing between ants or particles using dab , iab , and Eq. (4).
Eq. (1) and (eq:velocity). As a result, the agents are 5. Update the information I b by using Eq. (3) and global
designed as follows: experience matrix M.
6. Output Ea and I b to its neighbors.
• For its neighbors: The information sharing and
exchange will exist between agents that are either at importance iab can be regarded as the importance of
the same region or very close to each other. For information even though agents Aa and Ab are not in the
example, assume that there are some devices in the same group. With relevance, importance, and Eq. (1), the
same room all of which are in the power saving mode. proposed algorithm can then make the decision to conform
If one of the devices wakes up because of the event of to the current situation of other agents. For example, agent
someone entering this room, the other devices will also Ab has more than one procedure to use, and the probability
be waken up by the agents. In addition, if the devices of performing which procedure (or work) can be repre-
are close to each other and collect the same data, they sented by paj where j is the index of the possible proce-
can be compressed to reduce the size of the data before dures. An agent can easily know which procedure to invoke
they are saved to the database. when it is triggered by some event or receives the infor-
• For a particular propose: One of the purposes of mation from other agents by using
information sharing is for the same application or the
same service. Different devices need to upload the paj ¼ dab  iab  paj ð4Þ
information they have to the application or its database In addition, IEA will also update the information of agent
even though they are close to each other. For example, Ab by using Eq. (3) for the local experience and the
after negotiation between the agents and application, experience matrix M for the global experience. The event
instead of uploading all the data collected by all the Ea and information of agent Ab will then also be passed to
devices to the application, the device just needs to the other agents.
upload the needed and useful data to the application. To increase the transparency of data and devices of the
The other information the application needs can be proposed framework, four kinds of grouping methods are
obtained from the global information database. This employed for the devices. As shown in Fig. 5, they are
way, the size of data can be reduced. Thus, the database device-based, hold-based, location-based, and services-
does not need to store the redundant data, and the based grouping methods. The device-based grouping
transmission of information can sped up. method is for collecting data from the same type of device
In summary, agents in the proposed framework act like the which can be used by applications, which need a large
swarm, and the information can be transited quickly. The number of devices of the same type, such as the pressure
size of data can also be reduced because some of the sensor in a parking area. The hold-based grouping method
redundant data can be detected and removed by the agents. is for collecting data from the same user or particular users.
As shown in Table 4, each agent will make the decision, For example, for a smart home, different types of sensor
update its own information and the global information by are employed to collect the data for the same application.
using Eqs. (1) and (2) of the information exchange algo- The location-based grouping method is for applications in a
rithm (IEA) we proposed. In this case, agent Ab will make particular region, such as an e-Learning approach with
the decision and update the information, when agent Ab particular classrooms. The service-based grouping method
received the event Ea and information I a from agent Aa . usually exists in the IoT approach, because most services
Upon receiving the event and information, IEA will first and applications need more than one type of devices to
compute the relevance and importance between agents Aa collect the data, such as IoT for public transit system.
and Ab which can then be used to determine the impact of
Ea and I a on agent Ab . The relevance information can be 4.3 A simple scenario
used to differentiate the relevance between agents Aa and
Ab for different methods, such as relevance for applications In this section, we use a smart city approach of FIoT as a
or services. Different from the relevance information, the simple scenario to elaborate the basic concept of the

123
2210 Wireless Netw (2014) 20:2201–2217

Fig. 5 Different grouping


methods of sensors and its
a2
agents
b1 a1

b2 c1 b2
b1

Device−based Hold−based

APP1 APP3

APP2 APP4 a1

cloud
GDB a1 c1 b1
LDB LDB LDB b1 a2
b2
a1 b1 c1 c3
a2 a3 b2 c2 c4

Location−based Service−based

front door
camera 1 camera 2
light 1

light 3
light 2

camera 3

camera 4
light 5 light 5
camera 5

Fig. 6 A example of information exchange between agents of a smart home

DMFSO. As shown in Fig. 6, a simple example for smart the information of cameras 1 and 2 to predict the timing to
home is used to show how agents exchange the information automatically turn light 2 on.
and make the decision on their own. In this smart home To realize a smart city with FIoT, in addition to con-
example, ten agents are employed to control five cameras sidering the public things and the overall situations (i.e.,
and five lights. For the agent of camera, one possible environment, energy, and transportation), the big data [88],
application is using Eq. (2) to trace a particular object or cloud computing, [89], smart grid [90–92] are the prom-
thing. if someone enters the home from the front door, ising research trends. Imagine that this FIoT system has to
agents of cameras 2 and 3 will know that a particular object integrate data from a large number of devices of different
should be traced because the agent of camera 1 will detect types and regions for different applications and services. In
this person and pass this information to the others. As a this case, different kinds of grouping methods can be used
result, these cameras will then act like a swarm to detect to differentiate what kinds of data should be put together
the events we want to monitor. For the agent of light, by for analysis. For example, a public transit system needs
using Eq. (1) in the same situation that someone enters the different types of devices to monitor the passengers as the
home and opens light 1, the agent of light 2 can then use service-based grouping method, but a school needs the

123
Wireless Netw (2014) 20:2201–2217 2211

devices in a particular region to monitor the events. employed, several foundation problems still exist as far as
Although these two approaches employ more than one type the IoT is concerned.
of devices, the main difference is that the public transit In [16], Antonio et al. pointed out that IoT nowadays
system may cover the whole city but the school does not. still has some open issues, such as (1) standardizations of
To manage data from this intricate system (or environ- IoT are not integrated into a comprehensive framework, (2)
ment), effectively grouping the devices is one possible the current network and communication designs are not
solution. Another problem we need to face is the big data able to provide a complete IoT service, and (3) the security
issue, especially when a large amount of data or events on and privacy issues still exist in IoT. According to our
every thing can be collected. For example, the light sensor observation, the open issues of IoT can be viewed from
of every street light can be used to detect the light. The three different perspectives:
other devices in a smart city, such as the surveillance
• Infrastructure perspective: A unified IoT framework is
cameras, can also be used to collect a large amount of data
usually expected to be presented to provide an
every day. Now, the problem is which parts of the data are
integrated solution to develop the IoT system in the
useful. The light information may not be useful for the
near future. An alternative solution is to have a general
residents but could be very useful for the city government
communication interface that will be able to provide a
for the meteorological observation or environmental mon-
more flexible service for exchanging the information
itoring for the public. The video data from the surveillance
between different IoT systems. Even though the
cameras can be used for the same purpose. Its importance
characteristics of decentralization and heterogeneity
depends on the kind of application, such as traffic jam vs.
[94] will have an impact on the design of IoT, more are
traffic accident (inconvenience vs. danger). For these rea-
discussed about which parts need to be centralized or
sons, dropping the data is not a good idea. But the fact is
decentralized [22] for the development of IoT. Differ-
that even the best computers available today cannot store
ent from the standardizations, communication inter-
all the data we created. How to manage the data has thus
faces, number of IP addresses, and (de)centralization
become the first problem we have to face when handling
management issues [16], another issue is that the
the so-called ‘‘big data.’’ The proposed framework builds
development of IoT has to be compatible with the
on the concept of centralizing the local data and distrib-
current systems and technologies [27].
uting the global data. Thus, the data can be easily prepro-
• Data management perspective: The first problem that
cessed because the local data are generally much smaller.
the developer of IoT needs to consider is the data
The data can also be easily integrated because the data in
extraction which can be regarded as the work on how to
the local database are more useful, meaningful, and much
collect the data from the appliances and then to extract
less than raw data.
useful information from the collected data. Apparently,
how data are extracted will have a strong impact on the
5 The open issues and challenges performance of such a system, especially when the
number of appliances are increased to a certain number.
5.1 The open issues and challenge of IoT The memory size, computation power, and network
bandwidth can be used to measure whether we need to
Although the success of IoT has witnessed the possibilities redesign the whole system. However, the study [95]
and potentials, we now have to face the other research believes that the data management issues (i.e., data
issues and challenges of IoT. An interesting example is that acquisition, deposition, analysis, and integration) may
data collected from sensors or other appliances of IoT will strongly impact the performance of IoT. Different from
become very large because of our attempt to have every- the data extraction issues, the data representation is
thing connect to the Internet and collect data for the sys- another important research topic because the common
tems we design. It is easy to imagine that the data thus data representation may be conducive to information
collected will be huge, even too huge to be handled by the exchange between the IoT system and others, such as
current computer systems. That is why the issues about big ontology and semantic web technologies [96].
data [93] have attracted many researchers from different • Computational intelligence perspective: When the IoT
disciplines in recent years [6, 9, 10]. Another problem that is able to manage the data efficiently, another corner-
can also be found from this example is that some of the stone is how to make it smart and make useful
data need to be processed at real time in IoT. The reason decisions. Even though the smart object [17] of IoT
could be that the sensor does not have enough storage to has been considered, the data mining and other
keep all the data collected or that the sensor needs to make computational intelligence technologies still are at their
decision on its own. No matter which architecture of IoT is infancy. The present situation is that even though there

123
2212 Wireless Netw (2014) 20:2201–2217

exist several successful smart home approaches [26, 97, open issues of FIoT are similar to IoT, recent innovation on
98] and their relevant technologies can be employed for the internet technologies may strongly impact FIoT which
smart city, we still have many things to do for a can be viewed from two different perspectives:
successful and complete smart city. Since the compu-
• Cloud computing perspective: The unlimited comput-
tational intelligence for IoT is also still at its infancy,
ing resource and abundant storage are the main
most studies attempt to apply the simple or original
characteristics of cloud computing. However, how to
intelligent method to IoT. For this reason, the advanced
integrate FIoT to different cloud computing systems
intelligence technologies can be expected to be applied
will become an important issue because it will become
to IoT to provide better services.
part of the Internet. As a result, the integration issue is
In summary, these infrastructure, data management, and CI not only how to integrate FIoT to a cloud system but
perspectives can be regarded as the internets, things, and also how to transmit data between these two different
intelligent methods for IoT, respectively. The applications environments. An alternative solution described in [35]
of IoT also confront the issue of handling large scale is the design of FIoT takes into consideration the
datasets (also called big data)6 from sensor data analysis support of cloud computing systems.
[79] and the issues of integrating different systems. • Social network perspective: According to [106], the
Because the Internet today is more than 40 years old, and digital natives were born in the last decade of the 20th
several parts of the design are out of date; therefore, the century while the digital technologies have been
Internet has to be redesigned to satisfy the demand today surrounded in their daily life for a long time. The
[28]. A simple example is that the number of IP addresses social network shocked not only the daily life of the
may be not enough for the large number of appliances of digital natives but also the daily life of digital
IoT. To solve the problems of Internet today, the devel- immigrants. Using the digital social behavior to
opment of next generation Internet (also called future enhance the performance of FIoT [29, 30] is a possible
Internet) is emerging in several recent studies [32, 99]. solution. For instance, instead of finding out the IP
address to get the needed contents, we may ask friends
5.2 The open issues and challenge of FIoT who have the contents to shorten the search time to find
the needed contents.
Generally speaking, the contents, services, and things are
In summary, besides the intrinsic open issues of IoT, the
the essential components of future Internet [100]. Since
design of FIoT need take into account the cloud computing
most of the developments on FIoT were focused on solving
and social network issues. Fortunately, most concerns of
the problems the Internet today faces. Even if the number
these two open issues are the compatible issues although it
of IP addresses can be solved by using IPv6, however,
is expected that these two innovation internet technologies
based on the observations of [89, 100, 101], until now,
will provide much more information for the FIoT. More
there still exist many open issues that have to be solved.
details of the open issues of future Internet and FIoT can be
For instance, the disruption-tolerant networking (DTN)
found in [100, 101].
[102–105] seems to be applicable to FIoT, becuase this
new environment will generally composed of heteroge-
neous networks and the connectivity may not always be
continuous. Due to the considerations of FIoT (i.e., data 6 Conclusion
exchange between things or systems), the concept of self-
ishless behavior for data forwarding may need to be added In this paper, we first review studies on IoT and FIoT,
to DTN or such approaches. But these adjustments may including not only the basic concepts and architectures but
also bring up the privacy and security issues or degrade the also the discussions and comparisons. The open issues and
performance of the whole environment of FIoT. As a challenges of IoT and FIoT are also given. Then, an
result, a much more comprehensive consideration from the intelligent data management framework, which is inspired
infrastructure all the way up to the services will be needed. by the swarm intelligence to collect the resources by using
In [100], Issarny et al. pointed out the five challenges of all the capabilities of the whole swarm, is presented for the
future Internet, namely, scalability, heterogeneity, mobil- FIoT to provide a high-performance method to manage the
ity, awareness and adaptability, security, and privacy and data. The cloud computing and social network environ-
trust. The challenges of future Internet also exist in the ments are also considered in the proposed framework.
Internet today. According to our observations, although the Based on these observations, a brief discussion of the
research trends for FIoT is given to help the audience of the
paper to find possible solutions in solving these problems,
6
http://www.sciencemag.org/site/special/data/ as follows:

123
Wireless Netw (2014) 20:2201–2217 2213

• Communication between the agents and devices is no industries, or even the user behavior. Of couse, it will bring
doubt an important research topic of FIoT. The problem better services for users and make the environments,
of how to integrate the agents and devices can be information systems, and applications much faster and
regarded as a resource management of FIoT. Thus, the more precise. However, something that we need to take
mechanisms for communication and negotiation into account is that some unexpected issues usually
between agents have become a very important issue accompany these successful results. For instance, we may
which may have a strong impact on the performance of lose our privacy if the design and using of FIoT did not
the FIoT. To make the agents more smart, ontology and take care of this issue. In other words, since every thing
semantic web technologies provide some possible will be connected to the internet and every event will be
solutions. recorded, all our behaviors will leave us nowhere to hide.
• The cloud computing, social network, and big data For these reasons, when we make great progress in FIoT to
issues have attracted attention of researchers from further improve our daily life, how to prevent these tech-
different disciplines in recent years because these nologies from bringing us undesirable impact will be a
technologies may have a strong impact on the devel- critical issue.
opment of computer and information systems. For this
reason, these three promising issues will also affect the Acknowledgments The authors would like to thank the editors and
anonymous reviewers for their valuable comments and suggestions on
development of FIoT. A possible solution is to integrate
the paper that greatly improve the quality of the paper. This work was
them into the FIoT system, which can be found in some supported in part by the Ministry of Science and Technology of
recent studies, such as NEBULA [35] for cloud. Taiwan, R.O.C., under Contracts NSC102-2221-E-041-006, NSC102-
• The data mining technologies will also play an 2219-E-194-002, NSC102-2219-E-027-002, NSC101-2628-E-194-
003-MY3, and NSC101-2221-E-197-008-MY3.
important role in finding useful information of FIoT
for different purposes. One of the reasons is that the
current mining technologies need to be redesigned to fit References
the need because FIoT will cover social network and
cloud computing, especially the computing environ- 1. Schmidt, W. (1997). World-wide web survey research: Benefits,
ments and data will be distributed. Thus, data prepro- potential problems, and solutions. Behavior Research Methods,
cessing, data fusion, data abstraction, data mining, and Instruments, and Computers, 29(2), 274–279.
2. Wasserman, S., Faust, K., & Iacobucci, D. (1994). Social net-
data summarization need to be modified or redesigned. work analysis: Methods and applications (structural analysis in
• The power management and smart grid issues also will the social sciences). Cambridge: Cambridge University Press.
be covered in the researches of FIoT because the 3. Ashton, K. (2014). That ‘Internet of Things’ thing, 2009. RFID
technologies of how to use them are relevant. For Journal. http://www.rfidjournal.com/article/print/4986;. Acces-
sed 12 Jan.
example, embedded systems and their relevant tech- 4. Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012).
nologies will be employed in power management, smart Internet of things: Vision, applications and research challenges.
grid, and FIoT. For this reason, integrating them into a Ad Hoc Networks, 10(7), 1497–1516.
single system would provide a better solution to the 5. M&M Research Group. (2012). Internet of Things (IoT) &
M2M communication market: Advanced technologies, future
integration of different resources and systems. Also, the cities & adoption trends, roadmaps & worldwide forecasts
systems can get the additional information from others 2012–2017, technical report, Electronics.ca Publications.
to enhance their performance. 6. Bandyopadhyay, D., & Sen, J. (2011). Internet of things:
• After the FIoT and relevant systems are realized, system Applications and challenges in technology and standardization.
Wireless Personal Communications, 58(1), 49–69.
intelligence will become an important research subject. 7. Domingo, M. C. (2012). An overview of the internet of things
Today, several studies argue that their systems are for people with disabilities. Journal of Network and Computer
intelligent, but according to our observation, this is not Applications, 35(2), 584–596.
the case because most of these system are based on rule- 8. Sánchez López, T., Ranasinghe, D. C., Harrison, M., &
Mcfarlane, D. (2012). Adding sense to the internet of things.
based mechanisms which cannot inference or make the Personal and Ubiquitous Computing, 16(3), 291–308.
decision by themselves for unknown situations. A possible 9. Chen, Y. K. (2012). Challenges and opportunities of internet of
solution is based on machine learning, but it is not the things. In Proceedings of the Asia and South Pacific design
ultimate solution. An alternative solution is to integrate the automation conference, pp. 383–388.
10. Cantoni, V., Lombardi, L., & Lombardi, P. (2006). Challenges
feedback and interaction mechanisms to associate the for data mining in distributed sensor networks. In Proceedings
system and human which may be more possibly to make of the international conference on pattern recognition, vol. 1,
the FIoT able to ‘‘think’’ and ‘‘be smart.’’ pp. 1000–1007.
11. Keller, T. (2011). Mining the internet of things: Detection of
FIoT will become a part of our daily life as expected. false-positive RFID tag reads using low-level reader data. PhD
The impact of IoT can be easily found in marketing, thesis, The University of St. Gallen, Germany.

123
2214 Wireless Netw (2014) 20:2201–2217

12. Masciari, E. (2007). A framework for outlier mining in RFID internet of things: Concept, architecture and network charac-
data. In Proceedings of the international database engineering terization. Computer Networks, 56(16), 3594–3608.
and applications symposium, pp. 263–267. 31. Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013).
13. Bin, S., Yuan, L., & Xiaoyi, W. (2010). Research on data mining Internet of things (Iot): A vision, architectural elements, and
models for the internet of things. In Proceedings of the inter- future directions. Future Generation Computer Systems, 29(7),
national conference on image analysis and signal processing, 1645–1660.
pp. 127–132. 32. Paul, S., Pan, J., & Jain, R. (2011). Architectures for the future
14. van der Meulen, R. (2014). Gartner says personal worlds and networks and the next generation internet: A survey. Computer
the internet of everything are colliding to create new markets, Communications, 34(1), 2–42.
Gartner, 2013. http://www.gartner.com/newsroom/id/2621015;. 33. Uckelmann, D., Harrison, M., & Michahelles, F. (2011). An
Accessed 12 Jan 2014. architectural approach towards the future internet of things. In
15. Manyika, J., Chui, M., Bughin, J., Dobbs, R., Bisson, P., & Architecting the internet of things, pp. 1–24.
Marrs, A. (2014). Disruptive technologies: Advances that will 34. Chen, H.-M., Gui, L., & Xie, K.-B. (2011). A comparative study
transform life, business, and the global economy. In Technical on architecture and implementation methodologies of internet of
report, McKinsey Global Institute, 2013. http://www.mckinsey. things. Chinese Journal of Computer, 36(1), 168–188.
com/insights/business_technology/disruptive_technologies. 35. Anderson, T., Birman, K., Broberg, R., Caesar, M., Comer, D.,
Accessed 12 Jan 2014. Cotton, C. et al. (2013). The NEBULA future internet archi-
16. Atzori, L., Iera, A., & Morabito, G. (2010). The internet of tecture. In A. Galis & A. Gavras (Eds.), The future internet, vol.
things: A survey. Computer Networks, 54(15), 2787–2805. 7858 of lecture notes in computer science, pp. 16–26.
17. López, T. S., Ranasinghe, D. C., Patkai, B., & McFarlane, D. C. 36. Palattella, M., Accettura, N., Vilajosana, X., Watteyne, T.,
(2011). Taxonomy, technology and applications of smart Grieco, L., Boggia, G., et al. (2013). Standardized protocol stack
objects. Information Systems Frontiers, 13(2), 281–300. for the internet of (important) things. In IEEE communications
18. Siegemund, F. (2004). A context-aware communication plat- surveys tutorials, in press, 2013.
form for smart objects. In Proceedings of the international 37. Internet of things new security and privacy challenges. Com-
conference on pervasive computing, pp. 69–86. puter Law & Security Review, 26( 1), 23–30, 2010.
19. Kortuem, G., Kawsar, F., Sundramoorthy, V., & Fitton, D. 38. Sarma, A., & Girão, Ja. (2009). Identities in the future internet
(2010). Smart objects as building blocks for the internet of of things. Wireless Personal Communications, 49(3), 353–363.
things. IEEE Internet Computing, 14(1), 44–51. 39. Medaglia, C., & Serbanati, A. (2010). An overview of privacy
20. Ning, H., & Hu, S. (2012). Technology classification, industry, and security issues in the internet of things. In D. Giusto, A. Iera,
and education for future internet of things. International Journal G. Morabito, & L. Atzori (Eds.), The Internet of Things (pp.
of Communication Systems, 25(9), 1230–1241. 389–395). New York: Springer.
21. Chang, K.-D., Chen, J.-L., Chen, C.-Y., & Chao, H.-C. (2012). 40. Oleshchuk, V. (2009). Internet of things and privacy preserving
IoT operations management and traffic analysis for future technologies. In Proceedings of the international conference on
internet. In Proceedings of the conference on computing, com- wireless communication, vehicular technology, information the-
munications and applications, pp. 138–142. ory and aerospace electronic systems technology, pp. 336–340.
22. Ning, H., & Wang, Z. (2011). Future internet of things archi- 41. Hu, M., & Li, C. (2012). Design smart city based on 3s, internet
tecture: Like mankind neural system or social organization of things, grid computing and cloud computing technology. In
framework? IEEE Communications Letters, 15(4), 461–463. Y. Wang & X. Zhang (Eds.), Internet of things (Vol. 312,
23. Li, T., & Chen, L. (2012). Internet of things: Principle, frame- pp. 466–472). Berlin: Springer.
work and application. In Proceedings of the future computing, 42. Somov, A., Dupont, C., & Giaffreda, R. (2013). Supporting
communication, control and management, vol. 144, smart-city mobility with cognitive internet of things. In Pro-
pp. 477–482. ceedings of the future network and mobile Summit, Lisbon,
24. Khan, R., Khan, S., Zaheer, R., & Khan, S. (2012). Future pp. 1–10.
internet: The internet of things architecture, possible applica- 43. Darianian, M., & Michael, M. (2008). Smart home mobile rfid-
tions and key challenges. In Proceedings of the international based internet-of-things systems and services. In Proceedings of
conference on frontiers of information technology, pp. 257–260. the international conference on advanced computer theory and
25. Yun, M., and Yuxin, B. (2010). Research on the architecture and engineering, pp. 116–120.
key technology of internet of things (IoT) applied on smart grid. 44. Chong, G., Zhihao, L., & Yifeng, Y. (2011). The research and
In Proceedings of the international conference on advances in, implement of smart home system based on internet of things. In
energy engineering, pp. 69–72. Proceedings of the international conference on electronics,
26. Rashidi, P., Cook, D. J., Holder, L. B., & Schmitter-Edgecombe, communications and control, pp. 2944–2947.
M. (2011). Discovering activities to recognize and track in a 45. Lingling, H., Haifeng, L., Xu, X., & Jian, L. (2011). An intel-
smart environment. IEEE Transactions on Knowledge and Data ligent vehicle monitoring system based on internet of things. In
Engineering, 23(4), 527–539. Proceedings of the international conference on computational
27. Zorzi, M., Gluhak, A., Lange, S., & Bassi, A. (2010). From intelligence and security, pp. 231–233.
today’s intranet of things to a future internet of things: A 46. Moreno, J., Ortuzar, M., & Dixon, J. (2006). Energy-manage-
wireless- and mobility-related view. IEEE Wireless Communi- ment system for a hybrid electric vehicle, using ultracapacitors
cations, 17(6), 44–51. and neural networks. IEEE Transactions on Industrial Elec-
28. Pan, J., Paul, S., & Jain, R. (2011). A survey of the research on tronics, 53(2), 614–623.
future internet architectures. IEEE Communications Magazine, 47. Chunli, L. (2012). Intelligent transportation based on the internet
49(7), 26–36. of things. In Proceedings of the international conference on
29. Ning, H., & Liu, H. (2012). Cyber-physical-social based security consumer electronics, communications and networks,
architecture for future internet of things. Advances in Internet of pp. 360–362.
Things, 2(1), 1–7. 48. Yongjun, Z., Xueli, Z., Shuxian, Z., & shenghui, G. (2012).
30. Atzori, L., Iera, A., Morabito, G., & Nitti, M. (2012). The social Intelligent transportation system based on internet of things. In
internet of things (SIoT)—When social networks meet the Proceedings of the world automation congress, pp. 1–3.

123
Wireless Netw (2014) 20:2201–2217 2215

49. Raghavan, S., & Khaligh, A. (2012). Impact of plug-in hybrid International Journal on Artificial Intelligence Tools, 13(1),
electric vehicle charging on a distribution network in a smart 81–99.
grid environment. In Proceedings of the innovative smart grid 66. Sousa, T., Morais, H., Vale, Z., Faria, P., & Soares, J. (2012).
technologies, pp. 1–7. Intelligent energy resource management considering vehicle-to-
50. Bui, N., & Zorzi, M. (2011). Health care applications: A solu- grid: A simulated annealing approach. IEEE Transactions on
tion based on the internet of things. In Proceedings of the Smart Grid, 3(1), 535–542.
international symposium on applied sciences in biomedical and 67. Engelbrecht, A. P. (2007). Computational intelligence: An
communication technologies, pp. 131:1–131:5. introduction. New York: Wiley.
51. Diaz, M., Juan, G., Lucas, O., & Ryuga, A. (2012). Big data on 68. Reeves, C. R. (Ed.). (1993). Modern heuristic techniques for
the internet of things: An example for the e-health. In Pro- combinatorial problems. New York, NY: Wiley.
ceeding of the international conference on innovative mobile 69. Blum, C., & Merkle, D. (Eds.). (2008). Swarm intelligence:
and internet services in ubiquitous, computing, pp. 898–900. Introduction and applications. Natural computing series. New
52. Bhaumik, C., Agrawal, A. K., & Sinha, P. (2012). Using social York: Springer.
network graphs for search space reduction in internet of things. 70. Hagan, M. T., Demuth, H. B., & Beale, M. (1996). Neural
In Proceedings of the ACM conference on ubiquitous, comput- network design. Boston, MA: PWS Publishing Co.
ing, pp. 602–603. 71. Sugeno, M. (1985). An introductory survey of fuzzy control.
53. Misra, S., Barthwal, R., & Obaidat, M. (2012). Community detection Information sciences, 36(1–2), 59–83.
in an integrated internet of things and social network architecture. In 72. Holland, J. H. (1992). Adaptation in natural and artificial sys-
Proceedings of the global communications conference. tems. Boston, MA: MIT Press.
54. Learning in a u-museum: Developing a context-aware ubiqui- 73. Goldberg, D. E. (1989). Genetic algorithms in search, optimi-
tous learning environment. Computers & Education, 59 (3), zation, and machine learning. Boston: Addison-Wesley
873–883, 2012. Professional.
55. Gonzalez, G., Organero, M., & Kloos, C. (2008). Early infra- 74. Michalewicz, Z. (1996). Genetic algorithms ? data structures =
structure of an internet of things in spaces for learning. In evolution programs. Berlin: Springer.
Proceedings fo the IEEE international conference on advanced 75. Dorigo, M., Maniezzo, V., & Colorni, A. (1996). The ant sys-
learning technologies, pp. 381–383. tem: Optimization by a colony of cooperating agents. IEEE
56. Domingo, M., & Forner, J. (2010). Expanding the learning Transactions on Systems, Man, and Cybernetics-Part B, 26(1),
environment: Combining physicality and virtuality—the internet 29–41.
of things for elearning. In Proceedings of the IEEE international 76. Dorigo, M., & Gambardella, L. M. (1997). Ant colony system:
conference on advanced learning technologies, pp. 730–731. A cooperative learning approach to the traveling salesman
57. Schuster, E., Kumar, S., Sarma, S., Willers, J., & Milliken, G. problem. IEEE Transactions on Evolutionary Computation,
(2011). Infrastructure for data-driven agriculture: Identifying 1(1), 53–66.
management zones for cotton using statistical modeling and 77. Kennedy, J., & Eberhart, R. C. (1995). Particle swarm optimi-
machine learning techniques. In International conference expo zation. In Proceedings of the IEEE international conference on
on emerging technologies for a smarter, world, pp. 1–6. neural networks, pp. 1942–1948.
58. Min, Z., Bei, W., Chunyuan, G., & Zhao qian, S. (2011). Application 78. Engelbrecht, A. P. (2006). Fundamentals of computational
study of precision agriculture based on ontology in the internet of swarm intelligence. New York: Wiley.
things environment. In J. Zhang (Ed.), Applied informatics and 79. Aggarwal, C. C. (Ed.). (2013). Managing and mining sensor
communication (Vol. 227, pp. 374–380). Berlin: Springer. data. Berlin: Springer.
59. Horvitz, E., Apacible, J., Sarin, R., & Liao, L. (2005). Predic- 80. Aggarwal, C. C., Ashish, N., & Sheth, A. (2013). The internet of
tion, expectation, and surprise: Methods, designs, and study of a things: A survey from the data-centric perspective. In C.
deployed traffic forecasting service. In Proceedings of the con- C. Aggarwal (Ed.), Managing and mining sensor data (pp.
ference on uncertainty in, artificial intelligence. 383–428). New York: Springer.
60. Thompson, C., White, J., Dougherty, B., Albright, A., & 81. Fayyad, U. M., Piatetsky-Shapiro, G., & Smyth, P. (1996). From
Schmidt, D. C. (2010). Using smartphones to detect car acci- data mining to knowledge discovery in databases. AI Magazine,
dents and provide situational awareness to emergency 17(3), 37–54.
responders. In Proceedings of the international conference on 82. Xu, R., & Wunsch-II, D. C. (2008). Clustering. New York: Wiley.
mobile wireless middleware, operating systems, and applica- 83. Tsai, C. W., Lai, C. F., Chiang, M. C., & Yang, L. T. (2014).
tions, vol. 48, pp. 29–42. Data mining for internet of things: A survey. IEEE Communi-
61. Li, X., Liu, J., Sheng, Q., Zeadally, S., & Zhong, W. (2011). cations Surveys and Tutorials, 16(1), 77–97.
TMS-RFID: Temporal management of large-scale RFID appli- 84. Ali, N., & Abu-Elkheir, M. (2012). Data management for the
cations. Information Systems Frontiers, 13, 481–500. internet of things: Green directions. In Proceedings of the IEEE
62. Kulkarni, R., Forster, A., & Venayagamoorthy, G. (2011). globecom workshops, pp. 386–390.
Computational intelligence in wireless sensor networks: A sur- 85. Said, O., & Masud, M. (2013). Towards internet of things:
vey. IEEE Communications Surveys Tutorials, 13(1), 68–96. Survey and future vision. International Journal of Computer
63. Del Valle, Y., Venayagamoorthy, G., Mohagheghi, S., Hernan- Networks, 5(1), 1–17.
dez, J.-C., & Harley, R. (2008). Particle swarm optimization: 86. Choi, H.-S., & Rhee, W.-S. (2012). Distributed semantic sensor
Basic concepts, variants and applications in power systems. IEEE web architecture. In Proceedings of the IEEE TENCON Con-
Transactions on Evolutionary Computation, 12(2), 171–195. ference, pp. 1–6.
64. Ngatchou, P., Fox, W. L. J., & El-Sharkawi, M. (2005). Dis- 87. Zhang, M., Zhao, H., Zheng, R., Wu, Q., & Wei, W. (2012).
tributed sensor placement with sequential particle swarm opti- Cognitive internet of things: Concepts and application example.
mization. In Proceedings the IEEE swarm intelligence International Journal of Computer Science Issues, 9(9–3),
symposium, pp. 385–388. 151–158.
65. Rao, S. P., & Cook, D. J. (2004). Predicting inhabitant action 88. Madden, S. (2012). From databases to big data. IEEE Internet
using action and task models with application to smart homes. Computing, 16(3), 4–6.

123
2216 Wireless Netw (2014) 20:2201–2217

89. Chang, K.-D., Chen, C.-Y., Chen, J.-L., & Chao, H.-C. (2011). 105. Chaintreau, A., Hui, P., Crowcroft, J., Diot, C., Gass, R., &
Internet of things and cloud computing for future internet. In C.- Scott, J. (2007). Impact of human mobility on opportunistic
H. Hsu, L. T. Yang, J. Ma & C. Zhu, (Eds.), Ubiquitous intel- forwarding algorithms. IEEE Transactions on Mobile Comput-
ligence and computing, vol. 6905 of lecture notes in computer ing, 6(6), 606–620.
science, pp. 1–10, Springer, Berlin. 106. Prensky, M. (2001). Digital natives, digital immigrants. On the
90. Cunjiang, Y., Huaxun, Z., & Lei, Z. (2012). Architecture design Horizon, 9(5), 1–6.
for smart grid. Energy Procedia, Part B, 17, 1524–1528.
91. Moslehi, K., & Kumar, R. (2010). A reliability perspective of
the smart grid. Smart Transmission Grid: Vision and Frame- Chun-Wei Tsai received the
work, 1(1), 57–64. M.S. degree in Management
92. Li, F., Qiao, W., Sun, H., Wan, H., Wang, J., Xia, Y., et al. Information System from
(2010). Smart transmission grid: Vision and framework. IEEE National Pingtung University of
Transactions on Smart Grid, 1(2), 168–177. Science and Technology, Ping-
93. Berkovich, S., & Liao, D. (2012). On clusterization of ’’big data’’ tung, Taiwan in 2002, and the
streams. In Proceedings of the international conference on Ph.D. degree in Computer Sci-
computing for geospatial research and applications, pp. 3:1–3:1. ence from National Sun Yat-sen
94. de Saint-Exupery, A. (2009). Internet of things strategic research University, Kaohsiung, Taiwan
roadmap. In Technical report, European research cluster on the in 2009. He was also a post-
internet of things. doctoral fellow with the
95. Reichman, O. J., Jones, M. B., & Schildhauer, M. P. (2011). Department of Electrical Engi-
Challenges and opportunities of open data in ecology. Science, neering, National Cheng Kung
331, 703–705. University, Tainan, Taiwan
96. Katasonov, A., Kaykova, O., Khriyenko, O., Nikitin, S., & before joining the faculty of
Terziyan, V. Y. (2008). Smart semantic middleware for the Applied Geoinformatics and then the faculty of Applied Informatics
internet of things. In Proceedings of the international confer- and Multimedia, Chia Nan University of Pharmacy & Science, Ta-
ence on informatics in control, automation and robotics, intel- inan, Taiwan in 2010 and 2012, respectively, where he is currently an
ligent control systems and optimization, pp. 169–178. Assistant Professor. His research interests include data mining,
97. Fleury, A., Vacher, M., & Noury, N. (2010). SVM-based multimodal internet technology, and metaheuristic algorithms.
classification of activities of daily living in health smart homes:
Sensors, algorithms, and first experimental results. IEEE Transac- Chin-Feng Lai is an assistant
tions on Information Technology in Biomedicine, 14(2), 274–283. professor at Department of
98. Nguyen, Q. C., Shin, D., Shin, D., & Kim, J. (2009). Real-time Computer Science and Infor-
human tracker based on location and motion recognition of user mation Engineering, National
for smart home. In Proceedings of the international conference Chung Cheng University since
on multimedia and ubiquitous, engineering, pp. 243–250. 2013. He received the Ph.D.
99. Rexford, J., & Dovrolis, C. (2010). Future internet architecture: degree in department of engi-
Clean-slate versus evolutionary research. Communications of the neering science from the
ACM, 53(9), 36–40. National Cheng Kung Univer-
100. Issarny, V., Georgantas, N., Hachem, S., Zarras, A., Vassiliadist, sity, Taiwan, in 2008. He
P., Autili, M., et al. (2011). Service-oriented middleware for the received Best Paper Award
future internet: State of the art and research directions. Journal from IEEE EUC 2012. He has
of Internet Services and Applications, 2(1), 23–45. more than 100 paper publica-
101. Brito Carvalho, T., Miers, C., Dominicini, C., & Redı́golo, F. tions. He is an associate editor-
(2010). Key issues on future internet. In T. Tronco (Ed.), New in-chief for Journal of Internet
Network architectures, vol. 297 of studies in computational Technology and serves as editor or associate editor for IET Networks,
intelligence, pp. 221–236. Springer, Berlin. International Journal of Internet Protocol Technology, KSII Trans-
102. Fall, K. (2003). A delay-tolerant network architecture for chal- actions on Internet and Information Systems. He is TPC Co-Chair for
lenged internets. In Proceedings of the conference on applica- the 12th IEEE International Conference on Computer and Information
tions, technologies, architectures, and protocols for, computer Technology (IEEE CIT-2012) and was selected an honorary member
communications, pp. 27–34. of the Phi Tau Phi Scholastic Honor Society of the Republic of China
103. Li, Y., Wang, Z., Jin, D., Zeng, L., & Chen, S. (2012). Col- in 2009, TC member of Multimedia Systems & Applications Tech-
laborative vehicular content dissemination with directional nical Committee (MSATC), IEEE Circuits and Systems Society, 2009
antennas. IEEE Transactions on Wireless Communications, and Co-Chair of the Interest Group on Multimedia Services and
11(4), 1301–1306. Applications over Emerging Networks of the IEEE Multimedia
104. Li, Y., Su, G., Hui, P., Jin, D., Su, L., & Zeng, L. (2011). Communication Technical Committee During 2012–2014. His
Multiple mobile data offloading through delay tolerant net- research focuses on Internet of Things, Body Sensor Networks,
works. In Proceedings of the ACM workshop on challenged, E-healthcare, Mobile Cloud Computing, Cloud-Assisted Multimedia
networks, pp. 43–48. Network, Embedded Systems, etc. He is an IEEE Member since 2007.

123
Wireless Netw (2014) 20:2201–2217 2217

Athanasios V. Vasilakos conferences. He served or is serving as an Editor or/and Guest Editor


received his Ph.D. degree in for many technical journals, such as the IEEE TRANSACTIONS ON
computer engineering from the NETWORK AND SERVICES MANAGEMENT, IEEE TRANS-
University of Patras, Patras, ACTIONS ON SYSTEMS, MAN, AND CYBERNETICSPART
Greece. He is currently Profes- B:CYBERNETICS, IEEE TRANSACTIONS ON INFORMATION
sor at Kuwait university, Com- TECHNOLOGY IN BIOMEDICINE, IEEE TRANSACTIONS ON
puter Science Dept. He has COMPUTERS, ACM TRANSACTIONS ON AUTONOMOUS AND
authored or co-authored over ADAPTIVE SYSTEMS, the IEEE Communications Magazine,
250 technical papers in major ACM/Springer Wireless Networks(WINET), ACM/Springer Mobile
international journals and con- Networks and Applications(MONET). He is founding Editor-in-Chief
ferences. He is author/coauthor of the InternationalJournal of Adaptive and Autonomous Communi-
of five books and 20 book cations Systems (IJAACS,http://www.inderscience.com/ijaacs) and
chapters in the areas of com- the International Journal of Arts andTechnology (IJART, http://www.
munications. Prof. Vasilakos inderscience.com/ijart). He is General Chair of the European Alli-
has served as General Chair, ances for Innovation, http://eai.eu/, (funded by the EU Parliament).
Technical Program Committee Chair for many international

123

You might also like