447 research outputs found

    Context-awareness for mobile sensing: a survey and future directions

    Get PDF
    The evolution of smartphones together with increasing computational power have empowered developers to create innovative context-aware applications for recognizing user related social and cognitive activities in any situation and at any location. The existence and awareness of the context provides the capability of being conscious of physical environments or situations around mobile device users. This allows network services to respond proactively and intelligently based on such awareness. The key idea behind context-aware applications is to encourage users to collect, analyze and share local sensory knowledge in the purpose for a large scale community use by creating a smart network. The desired network is capable of making autonomous logical decisions to actuate environmental objects, and also assist individuals. However, many open challenges remain, which are mostly arisen due to the middleware services provided in mobile devices have limited resources in terms of power, memory and bandwidth. Thus, it becomes critically important to study how the drawbacks can be elaborated and resolved, and at the same time better understand the opportunities for the research community to contribute to the context-awareness. To this end, this paper surveys the literature over the period of 1991-2014 from the emerging concepts to applications of context-awareness in mobile platforms by providing up-to-date research and future research directions. Moreover, it points out the challenges faced in this regard and enlighten them by proposing possible solutions

    A Comprehensive Survey on the Cooperation of Fog Computing Paradigm-Based IoT Applications: Layered Architecture, Real-Time Security Issues, and Solutions

    Get PDF
    The Internet of Things (IoT) can enable seamless communication between millions of billions of objects. As IoT applications continue to grow, they face several challenges, including high latency, limited processing and storage capacity, and network failures. To address these stated challenges, the fog computing paradigm has been introduced, purpose is to integrate the cloud computing paradigm with IoT to bring the cloud resources closer to the IoT devices. Thus, it extends the computing, storage, and networking facilities toward the edge of the network. However, data processing and storage occur at the IoT devices themselves in the fog-based IoT network, eliminating the need to transmit the data to the cloud. Further, it also provides a faster response as compared to the cloud. Unfortunately, the characteristics of fog-based IoT networks arise traditional real-time security challenges, which may increase severe concern to the end-users. However, this paper aims to focus on fog-based IoT communication, targeting real-time security challenges. In this paper, we examine the layered architecture of fog-based IoT networks along working of IoT applications operating within the context of the fog computing paradigm. Moreover, we highlight real-time security challenges and explore several existing solutions proposed to tackle these challenges. In the end, we investigate the research challenges that need to be addressed and explore potential future research directions that should be followed by the research community.©2023 The Authors. Published by IEEE. This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/fi=vertaisarvioitu|en=peerReviewed

    The Internet of Robotic Things:A review of concept, added value and applications

    Get PDF
    The Internet of Robotic Things is an emerging vision that brings together pervasive sensors and objects with robotic and autonomous systems. This survey examines how the merger of robotic and Internet of Things technologies will advance the abilities of both the current Internet of Things and the current robotic systems, thus enabling the creation of new, potentially disruptive services. We discuss some of the new technological challenges created by this merger and conclude that a truly holistic view is needed but currently lacking.Funding Agency:imec ACTHINGS High Impact initiative</p

    open PDS: Protecting the Privacy of Metadata through SafeAnswers.

    Get PDF
    The rise of smartphones and web services made possible the large-scale collection of personal metadata. Information about individuals' location, phone call logs, or web-searches, is collected and used intensively by organizations and big data researchers. Metadata has however yet to realize its full potential. Privacy and legal concerns, as well as the lack of technical solutions for personal metadata management is preventing metadata from being shared and reconciled under the control of the individual

    Direct Marketing, Mobile Phones, and Consumer Privacy: Ensuring Adequate Disclosure and Consent Mechanisms for Emerging Mobile Advertising Practices

    Get PDF
    Advertisers are poised to deliver advertising to cell phones in the U.S. This emerging advertising context is called mobile advertising. It will generate a host of privacy and personal data issues for consumers and for mobile advertisers, mobile phone manufacturers, and mobile carriers. This Article focuses on the existing federal regulatory environment applicable to mobile advertising and consumer privacy, the role of federal administrative agencies that enforce consumer privacy regulation, and the potential for industry selfregulation, particularly privacy policies, to enhance consumer privacy. It assesses the adequacy of the existing federal consumer privacy regulation as well as potential consumer remedies under contract theories and privacy tort laws. Concluding that meaningful disclosure of privacy practices and obtaining adequate consumer consent are essential privacy concerns in mobile advertising, the Article identifies weaknesses in the current regulatory system and offers simple suggestions for regulatory improvements to bolster consumers\u27 privacy protections

    ieee access special section editorial intelligent systems for the internet of things

    Get PDF
    The underlying concept of the Internet of Things (IoT) is simply to connect all devices and systems together via the Internet so that more suitable services can be provided to users. Many infrastructures, systems, and devices of the IoT have matured while some are still being developed. This is why several recent studies have claimed that IoT will dramatically change our lives. Today, we can find research topics driven by IoT technologies and can imagine that the era of smart homes and cities will be coming in the foreseeable future. The development of the IoT has reached a crossroad. One of the current research trends is to make this kind of system smarter, by using intelligent technologies to provide a much more convenient environment for humans. Among the intelligent technologies, how to handle the massive amount of data generated by the systems and devices of the IoT has been widely considered. Many other technologies, such as data mining, big data analytics, statistical and other analysis technologies, have also been used for analyzing data generated from the IoT. In addition to the analysis technologies, intelligent system technologies also provide many possibilities for the IoT because they can be used to enhance not only the performance of a system and its devices, but they can also be aware of events that have occurred

    Measuring the global recursive DNS infrastructure: a view from the edge

    Get PDF
    The Domain Name System (DNS) is one of the most critical Internet subsystems. While the majority of ISPs deploy and operate their own DNS infrastructure, many end users resort to third-party DNS providers with hopes of enhancing their privacy, security, and web performance. However, bad user choices and the uneven geographical deployment of DNS providers could render insecure and inef cient DNS con gurations for millions of users. In this paper, we propose a novel and exible measurement method to (1) study the infrastructure of recursive DNS resolvers, including both ISP's and third-party DNS providers' deployment strategies; and (2) study end-user DNS choices, both in a timely manner and at a global scale. For that, we leverage the outreach capacity of online advertising networks to distribute lightweight JavaScriptbased DNS measurement scripts. To showcase the potential of our technique, we launch two separate ad campaigns that triggered more than 3M DNS lookups, which allow us to identify and study more than 76k recursive DNS resolvers giving support to more than 25k eyeball ASes in 178 countries. The analysis of the data offers new insights into the DNS infrastructure, such as user preferences towards third-party DNS providers (namely, Google, OpenDNS, Level3, and Cloud are recursive DNS resolvers account for ~13% of the total DNS requests triggered by our campaigns), and into deployment decisions of many ISPs providing both mobile and xed access networks to separate the DNS infrastructure serving each type of access technology.This work was supported in part by the Spanish Grant TIN2017-88749-R (DiscoEdge), in part by the Region of Madrid EdgeData-CM Program under Grant P2018/TCS-4499, in part by the Ministerio de Economía y Empresa, Spain, under Project TEC2016-76795-C6-3-R and Grant RyC-2015-17732, and in part by the European H2020 Project SMOOTH under Grant 786741

    Health systems readiness for adopting mhealth interventions for addressing non-communicable diseases in low- and middle-income countries: A current debate

    Get PDF
    In low-and-middle-income countries, epidemiologic transition is taking place very rapidly from communicable diseases to non-communicable diseases. NCDs mortality rates are increasing faster and nearly 80% of NCDs deaths occur in LMICs. Existing weak health systems of LMICs are undergoing a devastating human and economic toll as a result of increasing treatment costs and losses to productivity from NCDs. At the same time, the increasing penetration of mobile phone technology and the spread of cellular network and infrastructure have led to the introduction of the mHealth field. While mHealth field offers a great promise to prevent and control non-communicable diseases in low-and-middle-income countries: there is a great debate going on to explore health systems readiness for adopting mHealth technology to address NCDs in LMICs. There are a number of factors which determine health systems readiness and response for adoption of mHealth technology including preparedness of healthcare institutions, availability of the resources, willingness of healthcare providers and communities. We have discussed these factors to understand health systems preparedness to adopt mHealth field for prevention and control of NCDs. To adequately integrate mobile-phone-based health interventions into existing health systems, these factors should be dealt up-front through constant effort to improve health systems response for NCDs. Currently, there is insufficient empirical and policy evidence on this research area and therefore future research and policy dialogue should be directed to assess the health systems willingness for mHealth adoption principally to address NCDs in the context of LMICs

    Wanted: New Business Models for Profitable Expansion of Mobile Telephony in Rural India

    Get PDF
    Mobile network operators' agendas for profitable growth include expansion into rural areas of developing countries, especially India. However, capitalizing on that opportunity will not be easy. Our research suggests that operators have yet to create and implement business models capable of driving profitable growth through rural expansion. We found that mobile network operators hold some mistaken assumptions about rural consumers’ needs and desires regarding mobile services. To achieve profitable growth and high performance through rural expansion, operators must develop a more accurate understanding of the mobile value proposition in rural communities, as well as potential barriers to adoption. . Mobile operators in rural markets must also build business models that work in the short term as well as the long term. Sacrificing short-term revenues to expand market footprint may not be the best strategy, because stiffening competition in urban markets will likely prevent operators from cross-subsidizing their rural expansion strategies. This report serves as a “midpoint review” of some key presumptions, strategies and models companies have used to drive their rural strategies over recent years
    corecore