internet of things: smart things network and communication

2
Editorial Internet of things: Smart things network and communication The internet of things(IoT) concept is used to dene or reference systems that rely on autonomous communication of a group of physical objects. The application areas of the IoT are numerous, such as smart homes, smart cities and industrial automation. IoT systems often provide great benets to numerous industries and society as a whole. Many of the IoT systems and technologies are relatively novel. Though, there are still many untapped applications areas, and numerous challenges and issues need to be tackled. The evolution of the Internet of things still poses many challenges for the future, like unsolved problems, possible improvements of current solutions and a lot of elds where it can be applied that have not yet been explored, based on the design of innovative solutions and the combination of existing technologies. This special issue selects 7 relevant papers from total 35 publications submitted. The selected papers present innovative contributions concerning the issues of interest in IoT solutions. The selected papers cover a wide range of topics related to IoT solutions and smart objects. The rst paper is titled A Survey on Trust Management for Internet of Things(Yan et al., 2014). In this research work the authors pointed out the importance of trust management IoT. In order to conduct holistic IoT trust relationships, classied them into ve categories and indicated that holistic trust management should concern part or all of them in different context and for different purposes. Based on a general IoT System model the authors propose ten objectives for holistic IoT trust management and indicated their supporting IoT layers by emphasizing vertical trust. In this research also raised future research trends by proposing a research model for holistic trust management in IoT. The second paper is titled RFID seeking: Finding a lost tag rather than only detecting its missing(Xie et al., 2014). The authors propose a novel type of Radio Frequency Identication (RFID) application protocol. This RFID protocol present novel applications and can be used to guide a user to nd a lost tagged item in a blind spot or a wanted item among a mass of similar ones. The proposed protocol have strong safety considerations, is lightweight with the privacy-friendly to both readers and tags, and is secure against common attacks such as eavesdropping, manip- ulating, replaying, tracing, and denial-of-service attacks. The third paper is titled Cooperative Articial Bee Colony Algorithm for Multi-objective RFID Network Planning(Chen et al., 2014). In this research work the authors proposes a novel approach to RFID network planning. Instead of transforming multi-objective functions into a single objective function, the proposed model focuses on the use of multi-objective algorithms to nd all the Pareto optimal solutions and to achieve the optimal planning solutions by simultaneously optimizing four conicting objectives. By applying multi-objective approaches for solving MORNP, the authors establish a new framework in which could handle different objectives and would enable the planner to nd the optimal RFID network plan based on multi-objective EAs and SI. The fourth paper is titled Optimization of the Logical Topology for Mobile MEMS Networks(Lakhlef et al., 2014). The authors propose an improvement of the logical topology by using self- reconguration protocol in MEMS microrobot networks. The proposed protocol raises an alternative solution that is not based on the map of the target shape, which makes the algorithm efcient and scalable. The proposed protocol provides a novel self-reconguration standalone and portable independent of the map that builds the target shape starting from any connected network. The fth paper is titled Vitruvius: An expert system for vehicle sensor tracking and managing application generation(Cueva- Fernandez et al., 2014). This research Q3 work focuses on the eld of interconnected road vehicles that obtain information from the environment using different types of sensors. The authors present Vitruvius, a novel platform where users with no programming knowledge can design and quickly implement rich web applica- tions based on the data consumption in real time from intercon- nected vehicles and sensors. The proposal includes a vehicle registration system and a specic domain specic language. The solution was veried with non-expert users who were able to specify and create applications based on data obtained from vehicles. The sixth paper is titled Heterogeneous-Belief Based Incentive Schemes for Crowd Sensing in Mobile Social Networks(Sun and Ma, 2014). The authors analyze the user participation incentive issue based on heterogeneous belief values for long term crowd sensing applications in mobile social networks (MSMs) and the evolution procedure of users' social state. The authors propose a belief-value based uplink scheduling algorithm DWI for joint social states, real-time throughput requirements that is feasible for users in a realistic moving scenario based on transmitting concurrently. The authors also propose a novel algorithm called DDWI which integrates DWI and the different delay demands of the ows, and simultaneously archives per ow delay differentiation. The seventh paper is titled Predicting the Content Dissemina- tion Trends by Repost Behavior Modeling in Mobile Social Net- works(Lu et al., 2014). The authors dissemination of content over a mobile social network, which has become an attractive proxy for 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 Contents lists available at ScienceDirect journal homepage: www.elsevier.com/locate/jnca Journal of Network and Computer Applications http://dx.doi.org/10.1016/j.jnca.2014.03.003 1084-8045/& 2014 Elsevier Ltd. All rights reserved. Journal of Network and Computer Applications (∎∎∎∎) ∎∎∎∎∎∎

Upload: bin

Post on 21-Dec-2016

218 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Internet of things: Smart things network and communication

Editorial

Internet of things: Smart things network and communication

The “internet of things” (IoT) concept is used to define orreference systems that rely on autonomous communication of agroup of physical objects. The application areas of the IoT arenumerous, such as smart homes, smart cities and industrialautomation. IoT systems often provide great benefits to numerousindustries and society as a whole. Many of the IoT systems andtechnologies are relatively novel. Though, there are still manyuntapped applications areas, and numerous challenges and issuesneed to be tackled.

The evolution of the Internet of things still poses manychallenges for the future, like unsolved problems, possibleimprovements of current solutions and a lot of fields where itcan be applied that have not yet been explored, based on thedesign of innovative solutions and the combination of existingtechnologies.

This special issue selects 7 relevant papers from total 35publications submitted. The selected papers present innovativecontributions concerning the issues of interest in IoT solutions. Theselected papers cover a wide range of topics related to IoTsolutions and smart objects.

The first paper is titled “A Survey on Trust Management forInternet of Things” (Yan et al., 2014). In this research work theauthors pointed out the importance of trust management IoT. Inorder to conduct holistic IoT trust relationships, classified theminto five categories and indicated that holistic trust managementshould concern part or all of them in different context and fordifferent purposes. Based on a general IoT System model theauthors propose ten objectives for holistic IoT trust managementand indicated their supporting IoT layers by emphasizing verticaltrust. In this research also raised future research trends byproposing a research model for holistic trust management in IoT.

The second paper is titled “RFID seeking: Finding a lost tagrather than only detecting its missing” (Xie et al., 2014). Theauthors propose a novel type of Radio Frequency Identification(RFID) application protocol. This RFID protocol present novelapplications and can be used to guide a user to find a lost taggeditem in a blind spot or a wanted item among a mass of similarones. The proposed protocol have strong safety considerations, islightweight with the privacy-friendly to both readers and tags, andis secure against common attacks such as eavesdropping, manip-ulating, replaying, tracing, and denial-of-service attacks.

The third paper is titled “Cooperative Artificial Bee ColonyAlgorithm for Multi-objective RFID Network Planning” (Chen etal., 2014). In this research work the authors proposes a novelapproach to RFID network planning. Instead of transformingmulti-objective functions into a single objective function, theproposed model focuses on the use of multi-objective algorithms

to find all the Pareto optimal solutions and to achieve the optimalplanning solutions by simultaneously optimizing four conflictingobjectives. By applying multi-objective approaches for solvingMORNP, the authors establish a new framework in which couldhandle different objectives and would enable the planner to findthe optimal RFID network plan based on multi-objective EAsand SI.

The fourth paper is titled “Optimization of the Logical Topologyfor Mobile MEMS Networks” (Lakhlef et al., 2014). The authorspropose an improvement of the logical topology by using self-reconfiguration protocol in MEMS microrobot networks. Theproposed protocol raises an alternative solution that is not basedon the map of the target shape, which makes the algorithmefficient and scalable. The proposed protocol provides a novelself-reconfiguration standalone and portable independent of themap that builds the target shape starting from any connectednetwork.

The fifth paper is titled “Vitruvius: An expert system for vehiclesensor tracking and managing application generation” (Cueva-Fernandez et al., 2014). This research Q3work focuses on the field ofinterconnected road vehicles that obtain information from theenvironment using different types of sensors. The authors presentVitruvius, a novel platform where users with no programmingknowledge can design and quickly implement rich web applica-tions based on the data consumption in real time from intercon-nected vehicles and sensors. The proposal includes a vehicleregistration system and a specific domain specific language. Thesolution was verified with non-expert users who were able tospecify and create applications based on data obtained fromvehicles.

The sixth paper is titled “Heterogeneous-Belief Based IncentiveSchemes for Crowd Sensing in Mobile Social Networks” (Sun andMa, 2014). The authors analyze the user participation incentiveissue based on heterogeneous belief values for long term crowdsensing applications in mobile social networks (MSMs) and theevolution procedure of users' social state. The authors propose abelief-value based uplink scheduling algorithm DWI for jointsocial states, real-time throughput requirements that is feasiblefor users in a realistic moving scenario based on transmittingconcurrently. The authors also propose a novel algorithm calledDDWI which integrates DWI and the different delay demands ofthe flows, and simultaneously archives per flow delaydifferentiation.

The seventh paper is titled “Predicting the Content Dissemina-tion Trends by Repost Behavior Modeling in Mobile Social Net-works” (Lu et al., 2014). The authors dissemination of content overa mobile social network, which has become an attractive proxy for

123456789

101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566

676869707172737475767778798081828384858687888990919293949596979899

100101102103104105106107108109110111112113114115116

Contents lists available at ScienceDirect

journal homepage: www.elsevier.com/locate/jnca

Journal of Network and Computer Applications

http://dx.doi.org/10.1016/j.jnca.2014.03.0031084-8045/& 2014 Elsevier Ltd. All rights reserved.

Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎

Page 2: Internet of things: Smart things network and communication

investigating human behaviors due to the rapid development ofmobile phones. The authors explore different approaches topredict the amount of reposts any given post will obtain in popularmobile social networking service (Sina Weibo-China) and proposea RepostsTree based method to model the reposting process in atemporal dynamic manner. The obtained results indicate that theproposed method is effective on content diffusion prediction inmobile social networks.

We really hope this special issue will give some insights intothe recent research results in the field of internet of things. Thisspecial issue also provides certain guidance for academic andindustrial research, offering several innovative solutions and manypossible research directions.

Finally, the guest editors want to express our gratitude to allthe authors and reviewers who have collaborated in this specialissue. A special gratitude to Dr. Mohammed Atiquzzaman theEditor in Chief of Journal of Network and Computer Application forgiving to us the opportunity to present this special issue and alsofor all the support and collaboration throughout the entire pub-lication process.

Uncited referencesQ2

Zheng and Vasilakos (2014) and Guillermo et al. (2014).

References

Chen Hanning, Ma Lianbo, Hu Kunyuan. Cooperative artificial bee colony algorithmfor multi-objective RFID network planning. J Netw Comput Appl 2014 ([X(x):X–X]).

Guillermo Cueva-Fernandez, Jordán Pascual Espada, Vicente García-Díaz, CristianGonzalez García, Nestor Garcia-Fernandez. Vitruvius: an expert system forvehicle sensor tracking and managing application generation. J Netw ComputAppl 2014 ([X(x): X–X]).

Lakhlef Hicham, Mabed Hakim, Bourgeois Julien. Optimization of the LogicalTopology for Mobile MEMS Networks. J Netw Comput Appl 2014 ([X(x): X–X]).

Lu Xinjiang, Yu Zhiwen, Guo Bin, Zhou Xingshe. Predicting the content dissemina-tion trends by repost behavior modeling in mobile social networks. J NetwComput Appl 2014 ([X(x): X–X]).

Sun Jiajun, Ma Huadong. Heterogeneous-belief based incentive schemes for crowdsensing in mobile social networks. J Netw Comput Appl 2014 ([X(x): X–X]).

Xie Wei, Xie Lei, Zhang Chen, Wang Qiang, Xu Jian, Zhang Quan, et al. RFID seeking:finding a lost tag rather than only detecting its missing. J Netw Comput Appl2014 ([X(x): X–X]).

Zheng Yan, Vasilakos Athanasios V. A survey on trust management for internet ofthings. J Netw Comput Appl 2014 ([X(x): X–X]).

Guest EditorsJordán Pascual Espada n Q1

Department of Computer Science, University of Oviedo, SpainE-mail address: [email protected]

Ronald R. YagerMachine Intelligence Institute, Iona College, NY, United States

E-mail address: [email protected]

Bin GuoSchool of Computer Science, Northwestern Polytechnical University,

ChinaE-mail address: [email protected]

Received 10 March 2014; accepted 10 March 2014

123456789

101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566

676869707172737475767778798081828384858687888990919293949596979899

100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132n Corresponding author.

Editorial / Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎2