Frontiers in The Internet of Things最新文献

筛选
英文 中文
Digital twin—The dream and the reality 数字双胞胎——梦想与现实
Frontiers in The Internet of Things Pub Date : 2023-04-06 DOI: 10.3389/friot.2023.1108777
Juha Kortelainen, T. Minav, K. Tammi
{"title":"Digital twin—The dream and the reality","authors":"Juha Kortelainen, T. Minav, K. Tammi","doi":"10.3389/friot.2023.1108777","DOIUrl":"https://doi.org/10.3389/friot.2023.1108777","url":null,"abstract":"Digital twins (DTs) are under active research and development in the research community, industry, and in the digital engineering solution business. The roots of the concept of DT are almost 2 decades old, but the fast progress in enabling technologies, especially in data analytics, artificial intelligence, and the Internet of Things, has accelerated the evolution of DT during the last 5 years. The growing interest, increasing development activities, and increasing business opportunities of the concept are also feeding the hype in the media. Consequently, this has led to the scattering and even misuse of the concept and its definition. In this article, we discuss different applications of DTs and what kinds of solutions there are for DTs. We analyze some most cited definitions of DT in the scientific literature and discuss the interpretation of the definitions through a hypothetical case example. Furthermore, we discuss different life cycle aspects of DTs and potential risks that may arise. To further concretize the concept of DT, we introduce ten reported case examples of implemented DTs in the scientific literature and analyze their features. Finally, we discuss the future development directions of DTs and the aspects that will affect the development trends.","PeriodicalId":308773,"journal":{"name":"Frontiers in The Internet of Things","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123668489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Future scenarios for the infrastructure digitalization: The road ahead 基础设施数字化的未来设想:未来之路
Frontiers in The Internet of Things Pub Date : 2023-03-14 DOI: 10.3389/friot.2023.1140799
T. Muciaccia, Pietro Tedeschi
{"title":"Future scenarios for the infrastructure digitalization: The road ahead","authors":"T. Muciaccia, Pietro Tedeschi","doi":"10.3389/friot.2023.1140799","DOIUrl":"https://doi.org/10.3389/friot.2023.1140799","url":null,"abstract":"Nowadays, every industry across the globe is facing a disruptive transformation enabled by digitalization processes. Also, the industry of infrastructures, such as telecom, energy, transportation, and water systems, will be reshaped by the digitalization of physical assets mainly enabled by IoT technologies. An outstanding role in this scenario will be played by digital platforms, which will mediate the provisioning of services based on infrastructure. This process can revolutionize the industry-changing business models, unlocking great opportunities and posing complex challenges. In this paper, we investigate digitalization and the platformization processes and how they affect the infrastructures. We describe the models related to these processes in a systematic and interdisciplinary way and provide a comprehensive survey on technological, economic, and social issues. As a result of the research, we discuss the opportunities and risks of the processes, and we propose several approaches to address them.","PeriodicalId":308773,"journal":{"name":"Frontiers in The Internet of Things","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128291288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Situation-aware adaptation of choreographies—The DiStOPT approach 情境感知的编舞适应——DiStOPT方法
Frontiers in The Internet of Things Pub Date : 2022-12-15 DOI: 10.3389/friot.2022.1054963
Pascal Hirmer, Uwe Breitenbücher, Daniel Del Gaudio, Kálmán Képes, F. Leymann, B. Mitschang, M. Mormul, Dennis Przytarski
{"title":"Situation-aware adaptation of choreographies—The DiStOPT approach","authors":"Pascal Hirmer, Uwe Breitenbücher, Daniel Del Gaudio, Kálmán Képes, F. Leymann, B. Mitschang, M. Mormul, Dennis Przytarski","doi":"10.3389/friot.2022.1054963","DOIUrl":"https://doi.org/10.3389/friot.2022.1054963","url":null,"abstract":"The rise of the IoT and Industry 4.0 has increased the complexity of collaborating business processes, i. e., choreographies, as more partners and assets are involved. However, maintaining and executing business choreographies are complex tasks. Moreover, enabling robust and reliable execution is important, as failures or delays cause high costs among partners. For example, manufacturing companies usually depend on different suppliers, and it is crucial to be up-to-date about possible delays in shipments as this leads to delays in the manufacturing of their products. In this case, a choreography needs to be designed and operated in a way that it can adapt to cope with such problems. This requires i) timely recognition and tamper-resistent logging of problems that occur at each involved partner, which are referred to as situations in the scope of this article, and ii) an approach for a timely adaptation of choreographies based on occurring situations. Therefore, in this article, we introduce DiStOPT, an approach to i) model and recognize situations in a distributed and timely manner, and ii) model and execute situation-aware choreographies based on the recognized situations. The contributions are evaluated in a manufacturing scenario and validated by a prototypical implementation.","PeriodicalId":308773,"journal":{"name":"Frontiers in The Internet of Things","volume":"693 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130910649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revisiting the internet of things: New trends, opportunities and grand challenges 重新审视物联网:新趋势、机遇和重大挑战
Frontiers in The Internet of Things Pub Date : 2022-11-14 DOI: 10.3389/friot.2022.1073780
Khalid Elgazzar, Haytham Khalil, Taghreed Alghamdi, Ahmed Badr, Ghadeer Abdelkader, Abdelrahman Elewah, R. Buyya
{"title":"Revisiting the internet of things: New trends, opportunities and grand challenges","authors":"Khalid Elgazzar, Haytham Khalil, Taghreed Alghamdi, Ahmed Badr, Ghadeer Abdelkader, Abdelrahman Elewah, R. Buyya","doi":"10.3389/friot.2022.1073780","DOIUrl":"https://doi.org/10.3389/friot.2022.1073780","url":null,"abstract":"The Internet of Things (IoT) has brought the dream of ubiquitous data access from physical environments into reality. IoT embeds sensors and actuators in physical objects so that they can communicate and exchange data between themselves to improve efficiency along with enabling real-time intelligent services and offering better quality of life to people. The number of deployed IoT devices has rapidly grown in the past five years in a way that makes IoT the most disruptive technology in recent history. In this paper, we reevaluate the position of IoT in our life and provide deep insights on its enabling technologies, applications, rising trends and grand challenges. The paper also highlights the role of artificial intelligence to make IoT the top transformative technology that has been ever developed in human history.","PeriodicalId":308773,"journal":{"name":"Frontiers in The Internet of Things","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115854427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
On trust management in vehicular ad hoc networks: A comprehensive review 车辆自组织网络信任管理研究综述
Frontiers in The Internet of Things Pub Date : 2022-10-31 DOI: 10.3389/friot.2022.995233
Haoyang Che, Yucong Duan, Chen Li, Lei Yu
{"title":"On trust management in vehicular ad hoc networks: A comprehensive review","authors":"Haoyang Che, Yucong Duan, Chen Li, Lei Yu","doi":"10.3389/friot.2022.995233","DOIUrl":"https://doi.org/10.3389/friot.2022.995233","url":null,"abstract":"Security issues have always posed a major threat and challenge to the Internet of Things (IoTs), especially the vehicular ad-hoc networks (VANETs), a subcategory of IoTs in the automotive field. The traditional methods to solve these ever-growing security issues in VANETs are mainly cryptography-based. As an effective and efficient complement to those solutions, trust management solutions and reputation models have been widely explored to deal with malicious or selfish vehicle intrusion and forged data spoofing, with the aim of enhancing the overall security, reliability, trustworthiness, and impartiality of VANETs. For the integrity of the article, this survey begins with providing the background information of VANETs, including the basic components and general architecture. Then, many attacks in VANETs are investigated, analyzed, and compared to understand the functional relevance of the following trust and reputation methods. Various approaches offer various countermeasures against these types of attacks. At the same time, the latest development of emerging technologies such as blockchain, software-defined network, and cloud computing opens up new possibilities for more and more promising trust and reputation management models and systems in VANETs. After that, the survey reviews the most important trust and reputation models and schemes which are widely mentioned in the literature based on our developed technique-based taxonomy, in contrast to the popular “entity-centric, data-centric, hybrid” taxonomy in the field, to adapt to the recent technological development of these management schemes in VANETs. Finally, discussions and speculations on the future direction of research into the trust and reputation management in VANETs are presented.","PeriodicalId":308773,"journal":{"name":"Frontiers in The Internet of Things","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123700394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sinfonia: Cross-tier orchestration for edge-native applications Sinfonia:边缘本地应用程序的跨层编排
Frontiers in The Internet of Things Pub Date : 2022-10-19 DOI: 10.3389/friot.2022.1025247
M. Satyanarayanan, J. Harkes, J. Blakley, Marc Meunier, Govindarajan Mohandoss, Kiel Friedt, Arun Thulasi, Pranav Saxena, Brian J. Barritt
{"title":"Sinfonia: Cross-tier orchestration for edge-native applications","authors":"M. Satyanarayanan, J. Harkes, J. Blakley, Marc Meunier, Govindarajan Mohandoss, Kiel Friedt, Arun Thulasi, Pranav Saxena, Brian J. Barritt","doi":"10.3389/friot.2022.1025247","DOIUrl":"https://doi.org/10.3389/friot.2022.1025247","url":null,"abstract":"The convergence of 5G wireless networks and edge computing enables new edge-native applications that are simultaneously bandwidth-hungry, latency-sensitive, and compute-intensive. Examples include deeply immersive augmented reality, wearable cognitive assistance, privacy-preserving video analytics, edge-triggered serendipity, and autonomous swarms of featherweight drones. Such edge-native applications require network-aware and load-aware orchestration of resources across the cloud (Tier-1), cloudlets (Tier-2), and device (Tier-3). This paper describes the architecture of Sinfonia, an open-source system for such cross-tier orchestration. Key attributes of Sinfonia include: support for multiple vendor-specific Tier-1 roots of orchestration, providing end-to-end runtime control that spans technical and non-technical criteria; use of third-party Kubernetes clusters as cloudlets, with unified treatment of telco-managed, hyperconverged, and just-in-time variants of cloudlets; masking of orchestration complexity from applications, thus lowering the barrier to creation of new edge-native applications. We describe an initial release of Sinfonia (https://github.com/cmusatyalab/sinfonia), and share our thoughts on evolving it in the future.","PeriodicalId":308773,"journal":{"name":"Frontiers in The Internet of Things","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115328423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IoT architectures: from data to smart systems 物联网架构:从数据到智能系统
Frontiers in The Internet of Things Pub Date : 2022-08-22 DOI: 10.3389/friot.2022.959268
Marco Aiello
{"title":"IoT architectures: from data to smart systems","authors":"Marco Aiello","doi":"10.3389/friot.2022.959268","DOIUrl":"https://doi.org/10.3389/friot.2022.959268","url":null,"abstract":"“The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it.” It was 1991 when Mark Weiser’s pioneering article was published in the Scientific American, discussing a future where networked devices would be so ubiquitous that “no one will notice their presence” (Weiser (1991)). To a large extent, this is our reality today. We may have changed terminology and moved from ubiquitous computing to Internet of Things, but the substance has not changed. We are surrounded by data-capturing computing devices that are always on, are networked, and many of which can perform world-altering operations. Just think of hopping into a modern car. The driver is actually interacting with a distributed computing system on wheels. With up to 100 electronic control units and hundred of millions of lines of code, the modern automotive industry has become more about software than mechanics and aerodynamics. And yet, we think and interact with our car as we would have done in 1991. Or think at our symbiotic relationship with social media as experienced via our personal data capturing device: the smartphone. It is symbiotic because it satisfies the human need for emotional connectedness while it feeds content to the social media infrastructure, content that is essential for its existence and that is typically metabolized as targeted advertisement. The modern human being has feelings relatable to gymnophobia whenever leaving home without the smart phone, a fear of a sensation of nakedness, incompleteness that transcends the rational. And dually we accept any other human being we are close to or even interacting with to be concurrently doing something on their smart phone. The phone is such an integral and accepted part of who we are and how we behave that we can agree that Mark Weiser’s prediction was correct: phones are our everyday life and we do not even notice anymore. In many countries the level of penetration of mobile phones is above 80%, including population of any age (Statista (2022)). The number of active phone subscriptions is higher than 7 billion. If we consider Bluetooth, a technology often used for dynamic connectivity at the edge of the system, 4 billion Bluetooth Low Energy network interfaces are currently been shipped per year (Bluetooth SIG (2021)). Number projected to surpass 6 billions by 2025. And more generally, the predictions indicate that by 2030 the total amount of IoT devices worldwide, of any type, will reach the value of 24 billion (Transforma Insights (2020)). The unprecedented advancements in realizing IoT devices at affordable prices and the pervasive connectivity of wireless and wired Internet technologies, are essential building blocks to achieve the vision of a smart, OPEN ACCESS","PeriodicalId":308773,"journal":{"name":"Frontiers in The Internet of Things","volume":"194 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114059104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Practical Application of Internet of Things in the Creation of Intelligent Services and Environments 物联网在智能服务和环境创造中的实际应用
Frontiers in The Internet of Things Pub Date : 2022-07-22 DOI: 10.3389/friot.2022.912388
Zhihan Lv
{"title":"Practical Application of Internet of Things in the Creation of Intelligent Services and Environments","authors":"Zhihan Lv","doi":"10.3389/friot.2022.912388","DOIUrl":"https://doi.org/10.3389/friot.2022.912388","url":null,"abstract":"The information era is coming. As a popular technology in the information age, Internet of Things (IoT) can collect various types of information in real time, realize the ubiquitous connection between things and people, and process the intelligent perception, identification, and management of things, processes, and information, and environment protection through various network access methods. Applying IoT to various fields is like wrapping the Earth with a layer of “digital skin” (Gubbi et al., 2013; Bauwens et al., 2020; Li and Da Xu, 2020). Moreover, under the trend of global warming, the emergence of the theme of Energy Saving and Emission Reduction (ESER) undoubtedly poses new challenges to the development of IoT. When IoT is widely used in various life scenarios, its main purpose is to provide intelligent services and environments. IoT applications can connect any sensing device to the Internet for data transmission, so as to realize intelligent identification, tracking, positioning, and monitoring of sensing devices. In addition, IoT contains many types ofWireless Sensor Networks (WSN), which, as a part of IoT sensing layer, can meet the actual needs of people to obtain reliable data in special environments (Sadowski and Spachos, 2020). WSN is a multi-hop network which is self-organized by many sensor nodes. It has the characteristics of flexibility, fault tolerance, high awareness, low cost, strong survivability, and fast layout. Therefore, IoT has a wide range of applications, such as environmental monitoring, agriculture, military, and medical care, and can collect, process, and disseminate collected data deployed in various environments (Aman et al., 2020; Fortino et al., 2020). However, for some special scenes, many sensor nodes are often placed in areas that cannot be accessed by human beings. While enjoying the convenience brought by WSN, people are also faced with the problems that illegal personnel obtain illegitimate interests by intercepting the monitoring data transmitted in the public channel. Therefore, the attention to security issues in IoT cannot be ignored. With the increasing commercial scope of 5th Generation Mobile Communication Technology (5G) communication technology in cities, the application of IoT in power, construction, industry, intelligent transportation, agriculture, logistics, intelligence, high efficiency, and ESER is being promoted (Verma et al., 2020). Of course, applying IoT is also inseparable from the combination of 5G communication, Cloud Computing (CC), Edge Computing (EC), blockchain, AI, and other technologies. IoT can collect many data from the environment, effectively monitor, analyze, and manage energy consumption, and reasonably improve IoT by identifying and analyzing opportunities of energy efficiency improvement (Khan et al., 2020; Liao et al., 2020; Saračević et al., 2020). In summary, in today’s high-speed 5G communication technology, IoT is widely applied, and guaranteeing its performance ","PeriodicalId":308773,"journal":{"name":"Frontiers in The Internet of Things","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115011267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Specialty Grand Challenge: IoT Communication and Networking Protocols 专业大挑战:物联网通信和网络协议
Frontiers in The Internet of Things Pub Date : 2022-07-12 DOI: 10.3389/friot.2022.948558
Deze Zeng
{"title":"Specialty Grand Challenge: IoT Communication and Networking Protocols","authors":"Deze Zeng","doi":"10.3389/friot.2022.948558","DOIUrl":"https://doi.org/10.3389/friot.2022.948558","url":null,"abstract":"In the last decade, various kinds of smart end devices and sensors have been widely deployed and applied, and become the necessities in modern society Chettri and Bera (2019). It is also widely recognized that these devices should well collaborate with each other. This also catalyses the birth of Internet-of-Things (IoT) Hassan. (2019). IoT allows various devices, such as sensors, actuators, smart phones, and any smart devices, to connect with each other via the network, and to work together for providing better services eventually. Thanks to the fast development in the last decades, IoT has been applied in various aspects successfully, i.e., smart home Yang et al. (2018), smart city Kim et al. (2017) and smart health Sun et al. (2020), greatly reshaping our society. As communication is the core to realize collaboration, the communication and networking protocol plays a critical role in implementing an IoT system. As already widely discussed, due to the limitation of size, power and computation capability, traditional Internet oriented communication and networking protocols are not quite suitable to IoT. To this end, many protocols, such as Bluetooth Low Energy, ZigBee, Lora, NB-IoT, CoAP, 6LoWPAN, MQTT, have been proposed with different characteristics (e.g., power consumption, transmission rate, transmission range, etc.,) and application domains Dizdarević et al. (2019). In addition, the recent 5G, B5G, and 6G networks are also well known for their special support to IoT communications. Besides, Artificial Intelligence (AI) technology also become an essential part of IoT systems. Besides exploring AI technology to process the IoT data, the system could be also manipulated by AI for autonomous performance or resource efficiency optimization. Recognizing the fact that one protocol may not fit for all scenarios, the coordination and the compatibility between different protocols thus become critical issues. Besides, various IoT applications also urge us to optimize the communication and network protocols to satisfy diverse Quality-of-Experience (QoE). Therefore, in the past decades, many efforts has been devoted to optimizing the IoT communication and networking protocols from various aspects. Nonetheless, with the emergence of new technologies (e.g., Software Define Networking, backscatter communications, Blockchain), new trend (e.g., in-network computing), new applications (e.g., autonomous driving), the protocol design is still a hot topic as it still confronts many challenges. As a result, in this article, we will discuss the main challenges imposed by these new technologies, concept, and trends to the design of IoT communication and networking protocols. The rest of the paper is organized as follows: Section 2 discusses eight main challenges in the development of IoT communication and networking protocols. Section 3 summarizes these challenges and concludes this article. Edited and reviewed by: Rajkumar Buyya, The University of Melbourne, Aust","PeriodicalId":308773,"journal":{"name":"Frontiers in The Internet of Things","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128561018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Estimating indoor crowd density and movement behavior using WiFi sensing 利用WiFi传感技术估算室内人群密度和运动行为
Frontiers in The Internet of Things Pub Date : 2022-07-04 DOI: 10.3389/friot.2022.967034
Syed Alam, Muhammad Al-Qurishi, R. Souissi
{"title":"Estimating indoor crowd density and movement behavior using WiFi sensing","authors":"Syed Alam, Muhammad Al-Qurishi, R. Souissi","doi":"10.3389/friot.2022.967034","DOIUrl":"https://doi.org/10.3389/friot.2022.967034","url":null,"abstract":"The fact that almost every person owns a smartphone device that can be precisely located is both empowering and worrying. If methods for accurate tracking of devices (and their owners) via WiFi probing are developed in a responsible way, they could be applied in many different fields, from data security to urban planning. Numerous approaches to data collection and analysis have been covered, some of which use active sensing equipment, while others rely on passive probing, which takes advantage of nearly universal smartphone usage and WiFi network coverage. In this study, we introduce a system that uses WiFi probing technologies aimed at tracking user locations and understanding individual behavior. We built our own devices to passively capture WiFi request probe packets from smartphones, without the phones being connected to the network. The devices were tested at the headquarters of the research sector of the Elm Company. The results of the analyses carried out to estimate the crowd density in offices and the flows of the crowd from one place to another are promising and illustrate the importance of such solutions in indoor and closed spaces.","PeriodicalId":308773,"journal":{"name":"Frontiers in The Internet of Things","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132987871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信