Editorial Wireless and Mobile Technologies for the...

3
Editorial Wireless and Mobile Technologies for the Internet of Things Jong-Hyouk Lee, 1 Kamal Deep Singh, 2 Yassine Hadjadj-Aoul, 3 and Neeraj Kumar 4 1 Department of Computer Science and Engineering, Sangmyung University, Cheonan, Republic of Korea 2 Department of Electrical Engineering, Indian Institute of Technology Bombay, Mumbai, India 3 Universite de Rennes 1, Rennes, France 4 Department of Computer Science and Engineering, apar University, Patiala, India Correspondence should be addressed to Jong-Hyouk Lee; [email protected] Received 17 July 2016; Accepted 17 July 2016 Copyright © 2016 Jong-Hyouk Lee et al. is is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Billions of interconnected devices that have limited capabil- ities in terms of computational power, memory, and battery are expected to soon form a new type of the Internet, called the Internet of ings (IoT). According to forecasts, the Internet will consist of over 50 billion connected things, that is, IoT devices, including televisions, cars, kitchen appliances, surveillance cameras, smartphones, utility meters, cardiac monitors, thermostats, and almost anything that we can imagine. is will in turn transform our ability to interact with real-world objects, process information, and make decisions in addition to saving us time and money. Already many high-tech companies over the world started developing IoT products and services and promoting their early stage of IoT products and services in all market domains. Among the most notable challenges, wireless and mobile technologies are the underlying technologies for realizing the IoT. Resource constrained devices are required to communicate with other devices in wireless networks. e devices are also required to communicate on the move. In addition to these requirements, various technical and scientific research considerations are also required. is special issue gathers high quality research and development results of wireless and mobile technologies for the IoT. In one article, R.-S. Cheng et al. target localiza- tion and guidance in indoor settings. Such technologies are easily available for outdoor settings, but a requirement exists for indoor applications. ey propose a guiding system combining GPS, Bluetooth low energy (BLE), and near field communication (NFC) technologies. In another article, A. A. Minhas et al. proposed a technique based on cognitive heterogeneous wireless grid to eliminate white spots in mobile WiMAX broadcasting regions. e idea of the technique is interesting in the sense that it uses the incorporation between mobile WiMAX and GSM, where the vertical handoff and switching towards GSM grid are triggered by mobile subscriber without suffering from the white spot problem. Y.-W. Kuo and L.-D. Chou focused on reducing power consumption of IoT devices. ey proposed a fuzzy-based power saving scheduling scheme for IoT devices which communicate using LTE/LTE-A networks. J. Guan et al. propose a PMIPv6-based group binding solution to provide the mobility support for IoT devices. e proposed solution adopts the group movement character of IoT devices and modifies the registration procedure by extending the PBU and PBA messages to reduce the redundant binding operations. C. Zhang et al. proposed a new hierarchical update mining system, which can broadcast with useful, new, and timely sentence-length updates about a develop- ing event. e proposed solution incorporates techniques from topic-level and sentence-level summarization, which allows extracting efficiently unexpected event. e solution has many applications in different topics like large human accident or natural disaster. Two other papers target vehicular networks. C.-R. Dow et al. propose a taxi management system using location based services and zone queuing techniques which allow taxi drivers to look for passengers on the road or wait in the queuing zones. Y. Zou et al. focus on communication in vehicular networks by improving Direction of Arrival estimation algorithms. Hindawi Publishing Corporation Mobile Information Systems Volume 2016, Article ID 8206548, 2 pages http://dx.doi.org/10.1155/2016/8206548

Transcript of Editorial Wireless and Mobile Technologies for the...

Page 1: Editorial Wireless and Mobile Technologies for the ...downloads.hindawi.com/journals/misy/2016/8206548.pdf · services in mobile cloud computing services. S.-H. Chang et al. focus

EditorialWireless and Mobile Technologies for the Internet of Things

Jong-Hyouk Lee,1 Kamal Deep Singh,2 Yassine Hadjadj-Aoul,3 and Neeraj Kumar4

1Department of Computer Science and Engineering, Sangmyung University, Cheonan, Republic of Korea2Department of Electrical Engineering, Indian Institute of Technology Bombay, Mumbai, India3Universite de Rennes 1, Rennes, France4Department of Computer Science and Engineering, Thapar University, Patiala, India

Correspondence should be addressed to Jong-Hyouk Lee; [email protected]

Received 17 July 2016; Accepted 17 July 2016

Copyright © 2016 Jong-Hyouk Lee et al.This is an open access article distributed under theCreativeCommonsAttribution License,which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Billions of interconnected devices that have limited capabil-ities in terms of computational power, memory, and batteryare expected to soon form a new type of the Internet, calledthe Internet of Things (IoT). According to forecasts, theInternet will consist of over 50 billion connected things, thatis, IoT devices, including televisions, cars, kitchen appliances,surveillance cameras, smartphones, utility meters, cardiacmonitors, thermostats, and almost anything that we canimagine. This will in turn transform our ability to interactwith real-world objects, process information, and makedecisions in addition to saving us time and money. Alreadymany high-tech companies over the world started developingIoT products and services and promoting their early stage ofIoT products and services in all market domains. Among themost notable challenges, wireless andmobile technologies arethe underlying technologies for realizing the IoT. Resourceconstrained devices are required to communicate with otherdevices in wireless networks. The devices are also required tocommunicate on themove. In addition to these requirements,various technical and scientific research considerations arealso required.

This special issue gathers high quality research anddevelopment results of wireless and mobile technologies forthe IoT. In one article, R.-S. Cheng et al. target localiza-tion and guidance in indoor settings. Such technologiesare easily available for outdoor settings, but a requirementexists for indoor applications. They propose a guidingsystem combining GPS, Bluetooth low energy (BLE), andnear field communication (NFC) technologies. In anotherarticle, A. A. Minhas et al. proposed a technique based

on cognitive heterogeneous wireless grid to eliminate whitespots in mobile WiMAX broadcasting regions. The idea ofthe technique is interesting in the sense that it uses theincorporation between mobile WiMAX and GSM, wherethe vertical handoff and switching towards GSM grid aretriggered by mobile subscriber without suffering from thewhite spot problem. Y.-W. Kuo and L.-D. Chou focused onreducing power consumption of IoTdevices.They proposed afuzzy-based power saving scheduling scheme for IoT deviceswhich communicate using LTE/LTE-A networks. J. Guanet al. propose a PMIPv6-based group binding solution toprovide the mobility support for IoT devices. The proposedsolution adopts the groupmovement character of IoT devicesand modifies the registration procedure by extending thePBU and PBA messages to reduce the redundant bindingoperations. C. Zhang et al. proposed a new hierarchicalupdate mining system, which can broadcast with useful,new, and timely sentence-length updates about a develop-ing event. The proposed solution incorporates techniquesfrom topic-level and sentence-level summarization, whichallows extracting efficiently unexpected event. The solutionhas many applications in different topics like large humanaccident or natural disaster.

Two other papers target vehicular networks. C.-R. Dowet al. propose a taxi management system using locationbased services and zone queuing techniques which allowtaxi drivers to look for passengers on the road or wait inthe queuing zones. Y. Zou et al. focus on communicationin vehicular networks by improving Direction of Arrivalestimation algorithms.

Hindawi Publishing CorporationMobile Information SystemsVolume 2016, Article ID 8206548, 2 pageshttp://dx.doi.org/10.1155/2016/8206548

Page 2: Editorial Wireless and Mobile Technologies for the ...downloads.hindawi.com/journals/misy/2016/8206548.pdf · services in mobile cloud computing services. S.-H. Chang et al. focus

2 Mobile Information Systems

In the article by D. Kim, the author proposes groupinterest based verification scheme for CCN using a trans-mission process to handle request messages at one time.The proposed verification method is designed to be suitablefor the proposed transmission process. Also, this hybridverification approach is first proposed so as to improve thecomputation overheads of a verification process.

Three papers focus on security and privacy issues. W.Ren et al. process a novel file access scheme for file storageservices in mobile cloud computing services. S.-H. Chang etal. focus on mobile crowd sensing paradigm which leveragescitizens for large-scale sensing by various mobile devices toefficiently collect and share local information. They focus onthe network trustworthiness problem, namely, Sybil attacksin such network. In their article, Y. Kim et al. target privacydata leaks in mobile applications and propose a methodologyand architecture for measuring user awareness of sensitivedata leakage, which features runtime application analysis overtiming distance between the user input event and actualprivacy data leak.

In the article by J. Lee and J. Lee, they propose a duplicatename prefix detection mechanism to enhance the contentsource mobility in Content Centric Networking (CCN). H.-W. Wang focuses on RFID technology which is used forrecognizing objects in Internet of Things (IoT). In orderto improve system performance, H.-W. Wang proposes anefficient scheme to estimate the number of unidentified tagsfor Dynamic Framed Slotted Aloha (DFSA) based RFIDsystem, with the view of increasing system performance.H. Kim et al. proposed a network application agent inorder to overcome the issues related to the impossibility ofcontrolling IoT devices beyond a certain threshold withoutusing the devices’ native language. The proposed solution,which is based on Cordova, is a wearable device control plat-form for the development of network applications, controlsinput/output functions of smartphones and wearable/IoT,and enables device control and information exchange byexternal users by offering a self-defined API.

In another article, X. Li et al. present a novel analyticalmodel to investigate the eavesdropping attacks in Wire-less Net of Things (WNoT). S. Kim proposed an effectiveresources’ allocation technique, which maximizes the per-formance of dynamic environment of real-time IoT systems.The main idea behind the paper is to exploit learning basedMarkov game model to optimize dynamically the alloca-tion strategy to the current system conditions. Besides, theproposed solution presents many possibilities of extension,notably in the context of uncertain system environments, inwhich the proposed iterative approach may help in optimiz-ing the resources’ usage. M. Chung and I. Ko propose a datasharing method among multi-smart devices at close range.The proposed method uses inaudible frequencies as a triggersignal andWi-Fi andGPS information in order to address theshortcomings of existing data sharing methods, specificallydata sharing using the Bump application. A. Ahmad et al.consider the challenge ofmanagingmobility inM2Mand IoTapplications and propose a novel vertical handover scheme.

Acknowledgments

Theguest editors would like to thank the significant contribu-tors to this special issue including the authors and reviewers.

Jong-Hyouk LeeKamal Deep Singh

Yassine Hadjadj-AoulNeeraj Kumar

Page 3: Editorial Wireless and Mobile Technologies for the ...downloads.hindawi.com/journals/misy/2016/8206548.pdf · services in mobile cloud computing services. S.-H. Chang et al. focus

Submit your manuscripts athttp://www.hindawi.com

Computer Games Technology

International Journal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Distributed Sensor Networks

International Journal of

Advances in

FuzzySystems

Hindawi Publishing Corporationhttp://www.hindawi.com

Volume 2014

International Journal of

ReconfigurableComputing

Hindawi Publishing Corporation http://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Applied Computational Intelligence and Soft Computing

 Advances in 

Artificial Intelligence

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Advances inSoftware EngineeringHindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Electrical and Computer Engineering

Journal of

Journal of

Computer Networks and Communications

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporation

http://www.hindawi.com Volume 2014

Advances in

Multimedia

International Journal of

Biomedical Imaging

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

ArtificialNeural Systems

Advances in

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Computational Intelligence and Neuroscience

Industrial EngineeringJournal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Modelling & Simulation in EngineeringHindawi Publishing Corporation http://www.hindawi.com Volume 2014

The Scientific World JournalHindawi Publishing Corporation http://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Human-ComputerInteraction

Advances in

Computer EngineeringAdvances in

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014