WWW.ABSTRACT.DISLIB.INFO
FREE ELECTRONIC LIBRARY - Abstracts, online materials
 
<< HOME
CONTACTS



Pages:   || 2 | 3 | 4 |

«Opportunistic IoT: Exploring the Harmonious Interaction between Human and the Internet of Things Bin Guo1 Daqing Zhang1,2 Zhu Wang1 Zhiwen Yu1 ...»

-- [ Page 1 ] --

Opportunistic IoT: Exploring the Harmonious Interaction

between Human and the Internet of Things

Bin Guo1 Daqing Zhang1,2 Zhu Wang1 Zhiwen Yu1 Xingshe Zhou1

1. Northwestern Polytechnical University, China

2. Institut TELECOM SudParis, France

guob@nwpu.edu.cn

Abstract

The traditional view of Internet of Things (IoT) attempts to connect all the physical

objects to build a global, infrastructure-based IoT. In this paper, however, we will

present opportunistic IoT, which is formed based on the ad hoc, opportunistic networking of devices (e.g., mobile phones, smart vehicles) using short-range radio techniques (e.g., Bluetooth, Wi-Fi). The opportunistic IoT demonstrates inherently the close relationship between human and opportunistic connection of smart things. It enables information forwarding and dissemination within and among the opportunistic communities formed based on the movement and opportunistic contact nature of human. We characterize the bi-directional effects between human and opportunistic IoT, discuss the technical challenges faced by this new research field, and propose a reference architecture for developing opportunistic IoT systems. Some of our ongoing practices, including opportunistic mobile social networking, opportunistic marketing, and community service provision are further presented to demonstrate the potential application areas and technical solutions of opportunistic IoT.

Keywords: opportunistic IoT, opportunistic mobile social networking, heterogeneous community orchestration, information dissemination, human-centric sensing

1. Introduction The Internet of Things (IoT) refers to the emerging trend of augmenting physical objects and devices with sensing, computing, and communication capabilities, connecting them to form a network and making use of the collective effect of the networked objects. Under the vision of IoT, the next-generation Internet will promote the harmonious interaction between human, societies, and smart things [1].

In the past few years, significant research efforts have been made on IoT, mainly from a thing-oriented perspective. A wide range of areas are covered, including object identification and tracking, object networking, sensing data visualization, privacy control, and so on [2]. Nevertheless, the “harmonious” interaction between human and IoT, or in other words ― the social side of IoT, has yet little been explored.

In terms of its topology features, we can broadly category network connection into two types: infrastructure-enabled connection and ad hoc or opportunistic connection.

The prior type uses pre-existing infrastructure (e.g., base stations, routers, access points) and manages the data in a centralized manner. The latter one, however, is founded on the development of opportunistic networks [3], which uses infrastructure-free, shortrange radio techniques (Bluetooth, Wi-Fi, etc.) to build decentralized, ad hoc networks.

Opportunistic networks are human-centric because they inherently follow the way that people opportunistically get into contact. For instance, customer A can connect with other customers that opportunistically meet in a coffee shop to build an ad-hoc mobile phone network. Information sharing and communication can be further conducted among the members of this “opportunistic, physical-proximity-triggered” community.

When A leaves the coffee shop, the information she obtained from this opportunistic community (e.g., there will be an open-air concert in the Central Park tomorrow night) can be further disseminated to other newly-formed opportunistic communities (e.g., with his/her colleagues in the working place, with other passengers on the bus).

The traditional view of IoT attempts to connect all the physical objects to build a global, infrastructure-based IoT. In this paper, however, we will present opportunistic IoT, which addresses information dissemination and sharing within and among opportunistic communities (with pairs of devices) that are formed based on the movement and opportunistic contact nature of human. Various personal devices, such as mobile phones, wearable devices, vehicles, can form opportunistic IoT when they are equipped with the short-range communication and sensing modules. We illustrate the concept of opportunistic IoT through the following “opportunistic trading” use case.

Different from traditional market-based trading and online shopping, opportunistic trading is founded on the disseminating and matching of trading requests in opportunistic IoT environments. For example, Bob wants to buy a second-hand “Harry Potter” via the opportunistic trading agent (OTA) running on his mobile phone. While Bob moves each day, his trading request is shared by people in the vicinity (forming an opportunistic community using mobile phones). Since the moving range and mobility pattern of Bob is roughly fixed (the number of people he can encounter is thus limited), to increase the number of trading request receivers and speed up the request dissemination process, OTA will employ other mobile nodes as “brokers” to help store and forward Bob’s request. How to select brokers becomes a significant yet difficult problem, where we should consider the popularity of the node (in terms of its mobility patterns) and other social features (e.g., willingness to act as a broker). Two days later, Alice (the book seller), who lives in another district of the city, is found by OTA and the brokers.





The above scenario demonstrates the bi-directional relationship between human and opportunistic IoT. On one hand, opportunistic IoT becomes the primary media to sense and monitor human behaviours (e.g., mobility patterns can be learned from the GPS trajectories collected from user-carried mobile phones); on the other hand, the performance of IoT is also affected by human behaviours (e.g., social features are important for broker selection). In summary, opportunistic IoT presents a promising research domain to study the social side of the IoT. Further, according to the Oxford English Dictionary [4], collaboration is the act of working with another person or group of people to create or produce something. In technology, it encompasses a broad range of tools that enable groups of people to work together including social networking, instant messaging, web sharing, and so on. Wikipedia, Blogs, and Twitter are good examples of collaborative tools. By leveraging the opportunistic connection among people in the proximity, opportunistic IoT facilitates information dissemination and sharing, as well as spontaneous social networking (when the information exchanged is user profile [5]) among people in opportunistic communities, presenting a promising way to enhance instant human collaboration and data sharing.

In the following sections, we first describe the relations between our work and several closely-related research areas. The bi-directional effects between human and IoT will then be characterized. In Section 4, we discuss the research challenges on opportunistic IoT, followed by the description of a conceptual architecture in Section 5.

Our ongoing efforts to opportunistic IoT are presented in Section 6. Finally, we conclude the paper and present the future work.

2. Research Background and Related Work Research on opportunistic IoT can benefit from the ongoing and past research outcomes in pervasive computing, opportunistic networking, social computing, and mobile social networking.

In his seminal paper [6], Mark Weiser prophesied that pervasive computing can learn and adapt to human needs in an unobtrusive, ubiquitous manner. Over the last decade, mainframe studies on pervasive computing are about ubiquitous tracking/sensing [7], context-aware computing [8], personalization [9], mainly relying on the wireless infrastructure support (e.g., cellular networks, WLAN). Opportunistic IoT, however, addresses the limitation of wireless infrastructures, such as lacking network coverage, high cost, etc. In addition, the core of pervasive computing is context-awareness. Opportunistic IoT takes pervasive computing further, to explore the learned human behavior and social connection to enhance opportunistic data sharing.

Opportunistic networking is based on spontaneous connectivity between users with wireless devices [3], facilitating inter-device data routing and forwarding. Opportunistic IoT extends the opportunistic networking concept from two aspects: 1) it is rooted from the Internet of Things vision, which inherits the nature of smart things on ambient sensing. Local-sensed information (traffic dynamics, noise levels) can thus be opportunistically shared by others, i.e., supporting the so-called participatory sensing [10]; 2) it particularly explores the co-existing of opportunistic communities in the physical world and online communities in the virtual world, and study the interaction and collaboration between heterogeneous communities. There are also several studies that try to introduce the opportunistic element into IoT systems. For instance, Blackstock et al. have developed Magic Broker 2 [11], a lightweight middleware that supports spontaneous interaction between smart devices (public displays, mobile phones). Rohokale et al. have proposed a novel cooperative approach for the analysis of receiver sensitivity to enhance relay-based communication in wireless sensor networks [12]. However, none of them explore human factors in IoT systems, especially the interaction and interplay between online and offline social communities.

Social computing refers to the computational facilitation of social studies and human interaction analysis as well as the design and use of technologies that consider social context [13]. Similar to opportunistic IoT, social computing takes human factors and social behaviour analysis as key dimensions. However, social computing emphasis mainly on the analysis of human interaction using Web data, it does not target at the study of physical communities.

Mobile social networking (MSN) refers to social networking where individuals with similar interests connect with one another through their mobile devices [14]. Similar to Web-based social networking, existing MSN services (e.g., Foursquare) occur in the virtual world, relying on full mobile access of the Internet. The opportunistic IoT, however, will drive a different form of MSN – the Opportunistic MSN [5], which aims to enhance spontaneous interaction/communication among people that opportunistically encounter in the physical world, without leveraging any infrastructure support.

In summary, opportunistic IoT shares many things in common with the aforementioned research areas, yet it goes beyond all those areas in terms of its focus and research challenges. Different from those areas that either focus on human behaviour/context analysis or opportunistic data sharing, the opportunistic IoT particularly addresses the interaction of the two research directions. Moreover, opportunistic IoT also studies the interlinking and collaboration between online communities and physical communities, as we present in the latter sections.

3. The Bi-directional Effects between Human and Opportunistic IoT By analyzing the tight-coupled relationship between human and opportunistic connection of smart things, we present the bi-directional effects between human/societies and opportunistic IoT, as shown in Fig.1.

Figure 1: The bi-directional effects between human, societies and IoT.

3.1. Human-Centric Sensing with Opportunistic IoT Various IoT devices (equipped with sensing and short-range communication capabilities) are weaved deeply into the fabric of everyday life. The diverse features of these devices present unprecedented opportunities to understand the aspects of interaction between humans and real-world entities. We characterize these humancentric interactions as human-object, human-environment, and human-human interactions. By analyzing the collected interaction data with advanced machine learning and data mining techniques, the opportunistic IoT is equipped with three sensing capabilities: user awareness, ambient awareness, and social awareness [15].

We characterize the attributes of them as follows.

 User awareness refers to the ability to understand personal contexts and behavioral patterns. Examples include human activity, human popularity, preferences, etc.

 Ambient awareness concerns status information on a particular space. Examples include space status and traffic dynamics (e.g., traffic jams).

 Social awareness goes beyond personal contexts and extends to group and community levels. The objective is to reveal the patterns of social interaction (e.g., group detection, friendship prediction, situation reasoning), human mobility, etc.

3.2. The Impact of Human Behaviors on the Opportunistic IoT Data sharing is the major application area of opportunistic IoT, which exploits humans’ mobility and their gregarious nature to transmit information. Since the source node and destination nodes might be unaware of each other (e.g., in the opportunistic trading use case, Bob and Alice are unaware of each other) and may never meet in opportunistic networks, forwarding a message (e.g., selling a book called “Harry Potter”) from its sender to the nodes of interest (e.g., from Bob to Alice) becomes a big challenge. A trivial solution would be to flood the whole network with the message [16], but this would clearly saturate both network resources (in terms of available bandwidth) and device resources (e.g., in terms of energy, storage, and so on).

A better solution is to replicate the content to only selected nodes that have more chances to contact and influence others, and thus the broker-based solution is proposed (as demonstrated in the opportunistic trading use case). With this solution, each node (e.g., node Bob) carrying a message evaluates the suitability of any other node it makes contacts with as the broker (many social features are measured, as depicted later).

Messages are thus opportunistically disseminated by exploiting both the source node (e.g., node Bob) and the brokers selected, until they reach a node of interest (i.e., node Alice who lives in another district of the city wants to buy the book).

In opportunistic IoT, contacts between nodes are inherently tied with users’ social behaviors (e.g., two mobile phones contact when user A and B meet in a coffee shop).



Pages:   || 2 | 3 | 4 |


Similar works:

«COOPER & HEMINGWAY: THE TRUE GEN By John Mulholland ERNEST HEMINGWAY: Writer, war correspondent, international adventurer, lover, drinker, brawler. The tabloid reputation filled with truths, half-truths and flat-out untruths grows ever-wider. If you made up a character like Ernest Hemingway, how many would believe it? The mercurial Hemingway left people enchanted, hostile, endeared, confused, charmed, bruised, engaged, bitter. He was an extraordinary, unforgettable presence. As more than one...»

«HOUSE OF LORDS SESSION 2004–05 [2005] UKHL 16 on appeal from: [2003] EWCA Civ 138 OPINIONS OF THE LORDS OF APPEAL FOR JUDGMENT IN THE CAUSE Hinchy (Respondent) v. Secretary of State for Work and Pensions (Appellant) ON THURSDAY 3 MARCH 2005 The Appellate Committee comprised: Lord Hoffmann Lord Hope of Craighead Lord Scott of Foscote Lord Walker of Gestingthorpe Baroness Hale of Richmond HOUSE OF LORDS OPINIONS OF THE LORDS OF APPEAL FOR JUDGMENT IN THE CAUSE Hinchy (Respondent) v. Secretary...»

«1 Why Cities Exist 1.1 Introduction In most countries, the population is highly concentrated in a spatial sense. For example, cities occupy only about 2 percent of the land area of the United States, with the rest vacant or inhabited at very low population densities. Even in countries that lack America’s wide-open spaces, spatial concentration of the population can be substantial, with much of the land vacant. This chapter identifies some forces that lead to the spatial concentration of...»

«© 2008 Deeahn Johnson – All Rights Reserved What linguistic genius set up the sneeze and wheeze To rhyme so very perfectly with the word for allergies? ~Charlie N. Abbers TABLE OF CONTENTS ABOUT THE AUTHOR INTRODUCTION CHAPTER 1 – MY STORY CHAPTER 2 – THE MISSING PUZZLE PIECE CHAPTER 3 – HOW DOES IT WORK? CHAPTER 4 – TYPES OF ALLERGENS CHAPTER 5 – ALLERGIES AND ILLNESS CHAPTER 6 – EMOTIONAL ALLERGIES CHAPTER 7 – COMBINATION & MISC. ALLERGIES CHAPTER 8 – IDENTIFYING ALLERGIES...»

«CO-OPERATIVE CAPITAL UNITS AND CO-OPERATIVE PRINCIPLES SUMMARY Unique to the co-operatives legislation of NSW is a financial instrument named a Cooperative Capital Unit (CCU). The device was introduced as part of a major overhaul of the State’s co-operatives legislation in the early 1990’s that culminated in the passage of the Co-operatives Act 1992. Although co-operatives have always been able to raise additional capital needs from non-members through the issue of debentures or...»

«UC Santa Cruz Saint Louis Imagining a Saint-King Grant Shryock Saints and Holiness: HIS 196Y Polecritti 3/16/16 Shryock 2 Louis IX of France, or as he will be referred to throughout this paper, St Louis, was one of the more remarkable royal personalities of the High Middle Ages. He began his reign in 1226 at the age of twelve and excepting the years of the regency, ruled until his death in 1270 as the ninth sovereign of the Capetian royal house. These years represent the apogee of Capetian...»

«m m m O T P S h n y n n d h n o o n o n n d e a c a a e e a e a c a e s r r f f f –  –  – In the opinion of Bond Counsel, under existing statutes, regulations, administrative rulings, and court decisions, and assuming continuing compliance by the County with its covenants relating to certain requirements contained in the Internal Revenue Code of 1986, as amended (the “Code”), and the accuracy of certain representations made by the County, interest on the Bonds is excluded from...»

«1 THE COURT OF APPEAL PRESIDING AT PUTRAJAYA CIVIL APPEAL NO: W-02-431-2006 BETWEEN (1) SANMARU OVERSEAS MARKETING SDN BHD (2) YEOH JIN BENG. APPELLANTS DEFENDANTS AND (1) P.T. INDOFOOD INTERNA CORP. (2) P.T. SANMARU FOOD MANUFACTURING CO. LTD (3) P.T. INDOFOOD SUKSES MAKMUR TBK. RESPONDENTS PLAINTIFFS CORAM: (1) Zaleha Zahari, JCA (2) Abdul Malik bin Ishak, JCA (3) Abu Samah bin Nordin, JCA JUDGMENT OF ABDUL MALIK BIN ISHAK, JCA Introduction [1] Before the High Court, there were three...»

«MYTHS AND FACTS ABOUT MUSLIM PEOPLE AND ISLAM There are 1.6 billion Muslim people worldwide and an CONTENTS estimated 2.75 million Muslims living in the United States. Myth and Facts Islam is currently the second largest religion in the world next to Christianity. Despite the fact that there are so many 3 Things Educators Can Do. 5 Muslims in the world, in many places there is a lack of Key Words and Definitions. 5 understanding about Muslim people and Islam. The emergence of ISIS and the...»

«BANNING THE SALE OF CATS, DOGS AND RABBITS IN OTTAWA PET STORES AND OTHER RETAIL AVENUES SUBMISSION TO CITY OF OTTAWA February 16, 2016 ` RECOMMENDATIONS RE BANNING THE SALE OF CATS, DOGS AND RABBITS IN OTTAWA PET STORES About PAWS Puppymill Awareness Working Solutions (PAWS) is a volunteer, non-profit organization in Ottawa, Ontario dedicated to raising public awareness and educating the public at large regarding the cruelty and abuse associated with puppy mills. This includes selling puppies...»

«Artification and the Ontology of Art Adam Andrzejewski* University of Warsaw Abstract. The aim of this paper is to show that the ontology of artworks, as traditionally understood, may draw valuable theoretical inspiration from the latest manifestations of artistic activities which often go beyond art traditionally recognised as such by the institutional art world. Artification — that is combining art with non-art — is an example of this phenomenon. The goal is achieved in three steps....»

«Psicopatología de la ansiedad La ansiedad es una reacción emocional normal necesaria para la supervivencia de los individuos y de nuestra especie. No obstante, las reacciones de ansiedad pueden alcanzar niveles excesivamente altos o pueden ser poco adaptativas en determinadas situaciones. En este caso la reacción deja de ser normal y se considera patológica. Los trastornos que pueden producirse cuando la ansiedad es muy elevada tradicionalmente se dividen en: − trastornos físicos y −...»





 
<<  HOME   |    CONTACTS
2017 www.abstract.dislib.info - Abstracts, online materials

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.