Big Data-Enabled Internet of Things

2: North Dakota State University, Fargo, ND, USA
3: University of Sydney Australia, Sydney, NSW, Australia
The fields of Big Data and the Internet of Things (IoT) have seen tremendous advances, developments, and growth in recent years. The IoT is the inter-networking of connected smart devices, buildings, vehicles and other items which are embedded with electronics, software, sensors and actuators, and network connectivity that enable these objects to collect and exchange data. The IoT produces a lot of data. Big data describes very large and complex data sets that traditional data processing application software is inadequate to deal with, and the use of analytical methods to extract value from data. This edited book covers analytical techniques for handling the huge amount of data generated by the Internet of Things, from architectures and platforms to security and privacy issues, applications, and challenges as well as future directions.
Inspec keywords: Big Data; Internet; Internet of Things; data analysis
Other keywords: IoT; future trends; analytical techniques; Big data-enabled Internet of Things
Subjects: Information networks; General and management topics; Data handling techniques; Mobile, ubiquitous and pervasive computing; Computer networks and techniques
- Book DOI: 10.1049/PBPC025E
- Chapter DOI: 10.1049/PBPC025E
- ISBN: 9781785616365
- e-ISBN: 9781785616372
- Page count: 492
- Format: PDF
-
Front Matter
- + Show details - Hide details
-
p.
(1)
-
1 Introduction to big data-enabled Internet of Things
- + Show details - Hide details
-
p.
1
–10
(10)
In the last couple of years, Internet of Things (IoT) has seen tremendous advancement and growth. The huge number of devices and sensors connected through IoT generates huge amount of data, also known as big data, on a daily basis. This poses new challenges of data handling and information retrieval that not only requires expertise of IoT but also of big data analytics. In this chapter, we review the various facets of big data-enabled IoT, application areas, and challenges.
-
2 Smarter big data analytics for traffic applications in developing countries
- + Show details - Hide details
-
p.
11
–27
(17)
Internet of Things (IoT) generates a huge amount of data in real-time. Utilization of such data requires appropriate data storage, analytics, and computation techniques so that valuable information can be extracted and immediate actions could be taken place. In this chapter, we present real-time traffic applications, typical IoT-enabled big data applications in smart city context, but for unreliable and fragmented infrastructures in developing countries. We analyze a case study to show challenges that we need to address when implementing big IoT data applications in such infrastructures. Based on that we outline our key design principles and techniques. We present several examples to particularly discuss how we achieve our designs and lesson learned.
-
3 Using IoT-based big data generated inside school buildings
- + Show details - Hide details
-
p.
29
–55
(27)
The utilization of Internet of Things (IoT) in the educational domain so far has trailed other more commercial application domains. In this chapter, we study a number of aspects that are based on big data produced by a large-scale infrastructure deployed inside a fleet of educational buildings in Europe. We discuss how this infrastructure essentially enables a set of different applications, complemented by a detailed discussion regarding both performance aspects of the implementation of this IoT platform as well as results that provide insights to its actual application in real life, both from educational and business standpoints.
-
4 Autonomous collaborative learning in wearable IoT applications
- + Show details - Hide details
-
p.
57
–74
(18)
This chapter briefly overviews robust machine-learning solutions for wearable IoT applications. Furthermore, it presents one of the earliest attempts in presenting an autonomous learning framework for wearables. The focus, in particular, is on cases where a new sensor is added to the system and the new (untrained) sensor is worn/used on various body locations. The process of autonomous learning automatically leads to a new collaborative decision-making algorithm. Addressing the problem of expanding pattern-recognition capabilities from a single setting algorithm with a predefined configuration to a dynamic setting where sensors can be added, displaced, and used unobtrusively is challenging. In such cases, successful knowledge transfer is needed to improve the learning performance by avoiding expensive data collection and labeling efforts. In this chapter, a novel and generic approach to transfer learning capabilities of an existing static sensor to a newly added dynamic sensor is described.
-
5 A distributed approach to energy-efficient data confidentiality in the Internet of Things
- + Show details - Hide details
-
p.
75
–92
(18)
In the Internet of Things (IoT) everything will be connected, from refrigerators to coffee machines, to shoes. Many such “things” will have a very limited amount of energy to operate, often harvested from their own environment. Providing data confidentiality for such energy-constrained devices has proven to be a hard problem. In this article, we discuss existing approaches to data confidentiality for energyconstrained devices and propose a novel approach to drastically reduce a node's energy consumption during encryption and decryption. In particular, we propose to distribute encryption and decryption computations among a set of trusted nodes. We validate the proposed approach through both simulations and experiments. Initial results show that the proposed approach leads to energy savings (from a single node's perspective) of up to 73% and up to 81% of the energy normally spent to encrypt and decrypt, respectively. With such great savings, our approach holds the promise to enable data confidentiality also for those devices, with extremely limited energy, which will become commonplace in the IoT.
-
6 An assessment of the efficiency of smart city facilities in developing countries: the case of Yaoundé, Cameroon
- + Show details - Hide details
-
p.
93
–109
(17)
This chapter assesses the efficiency of smart city facilities in developing countries to demonstrate how smart solutions are used to address day-to-day problems and to evaluate the efficiency of these solutions in a smart city context. We start by clarifying the smart city concept in terms of characteristics, evolution, dimensions, definitions, applications, and evaluation before studying the city of Yaoundé, its problems, the solutions, and an assessment of its performance in a smart city context. Yaoundé is the densely populated city in Cameroon with an important economic life which faces daily security, environmental, infrastructural, and administrative challenges. These challenges are addressed by different institutions with solutions using information and communications technologies (ICTs) especially to be reachable. For the evaluation of smart city facilities in Yaoundé, we use the revised triple helix framework with the actors and components of smart city. The main result is the fact that Yaoundé is moving to be a smart city, but there are several things that governments and actors in the process may adopt such as the coordination that seems to be the main obstacle at the moment.
-
7 A comparative study of software programming platforms for the Internet of Things
- + Show details - Hide details
-
p.
111
–136
(26)
Internet of Things (IoT) envisages a compelling future where vehicles, machines, buildings, home appliances, and other items embedded with electronics, sensors, actuators, and software are becoming capable of sensing, actuation, communication, computation, and gain insight from collected data as well. In short, IoT brings together devices, cloud, data, and people to make networked connections more relevant and valuable than everbefore.A typical cloud-based IoT application scenario is showcased in Figure 7.1.
-
8 Fog computing-based complex event processing for Internet of Things
- + Show details - Hide details
-
p.
137
–173
(37)
This chapter addresses data collection and real-time analysis of massive IoT data using a horizontally distributed fog -computing architecture. We explain how data -analysis problem of IoT can be handled in a layered fog architecture so that information extraction can be achieved in both local and global scales. We provide a deep investigation of existing fog-computing-based IoT solutions in a categorical manner and discuss the open-research problems. In terms of big data analysis, stream data mining and CEP techniques are proven to be quite promising solutions in the literature. Currently, stream data processing tools and techniques are mainly developed for cloud -based systems. However, there is an urgent need for adapting these techniques to horizontally distribute IoT-based data collection and analysis systems. We perform an extensive survey on stream data processing techniques by focusing on their ability to work on fog-computing -based IoT systems. We document a significant survey of CEP techniques in IoT systems by providing pros and cons of each scheme. An example scenario was also provided to show that the problem of collection and real-time analysis of massive IoT data can be solved using fog-computation-based distributed architecture and CEP techniques.
-
9 Ultra-narrow-band for IoT
- + Show details - Hide details
-
p.
175
–198
(24)
LPWAN (low power wide area network) is a very recent term (appeared in 2013), referring to a very wide area network (covering up to several tens of kilometers range in rural areas with a single access point). The objective of such network is to provide connectivity to the Internet to a huge number of nodes deployed anywhere, in the Internet of Things (IoT) context. LPWAN gateways are thus needed to settle communication with the devices in their vicinity. To limit the operational cost of the operators, a limited -access infrastructure is suitable. As a consequence, a collecting point should serve nodes deployed in a very wide area. However, this cannot be obtained by tuning up the emission power, because it must be achieved while keeping a low -energy consumption for the nodes to preserve the network lifetime.
-
10 Fog-computing architecture: survey and challenges
- + Show details - Hide details
-
p.
199
–223
(25)
Emerging technologies that generate a huge amount of data such as the Internet of Things (IoT) services need latency-aware computing platforms to support time critical applications. Due to the on-demand services and scalability features of cloud computing, Big Data application processing is done in the cloud infrastructure. Managing Big Data applications exclusively in the cloud is not an efficient solution for latency -sensitive applications related to smart transportation systems, healthcare solutions, emergency response systems and content delivery applications. Thus, the fog -computing paradigm that allows applications to perform computing operations in-between the cloud and the end devices has emerged. In fog architecture, IoT devices and sensors are connected to the fog devices which are located in close proximity to the users, and it is also responsible for intermediate computation and storage. Most computations will be done on the edge by eliminating full dependencies on the cloud resources. In this chapter, we investigate and survey fog-computing architecture which have been proposed over the past few years. Moreover, we study the requirements of IoT applications and platforms, and the limitations faced by cloud systems when executing IoT applications. Finally, we review current research works that particularly focus on Big Data application execution on fog and address several open challenges as well as future-research directions.
-
11 A survey on outlier detection in Internet of Things big data
- + Show details - Hide details
-
p.
225
–272
(48)
In this chapter, more than one criteria are combined for better review and characterization of OD techniques. First, we classified the solutions based on big data phase criteria into data-generation and data-acquisition phases. Then, we categorized the techniques that detect outlier in data-acquisition phase on outlier type into fault detection, event detection, and intrusion detection. We classified the fault-detection techniques based on OD method into statistical based, machine learning, distance based, and density based. Thereafter, based on if the techniques assume the underlying distribution model and estimate the parameters of the model or not, are classified into parametric based and nonparametric based, respectively. We classified the machine learning techniques depending on if the user influences machine-learning technique or not, into supervised and unsupervised techniques, which are classified further based on the analyzing approach. Moreover, we categorized the distance-based and density-based techniques based on distance and density measurements.
-
12 Supporting Big Data at the vehicular edge
- + Show details - Hide details
-
p.
273
–297
(25)
The discussion of supporting Big Data at the vehicular edge will focus on a simple case of parked vehicles. A model will be created to evaluate processing Big Data using a datacenter comprising these parked vehicles. The model will simulate a datacenter implemented on the vehicles in the parking lot of a business that operates 24 h a day, 7 days a week. The employees of the business work in staggered 8-h shifts. This provides a pool of vehicles that can serve as the basis for a datacenter for the business. The vehicles in the parking lot are provided a standard power outlet for charging their vehicles in return for the use of their computing resources. The challenge of facing the implementation of the datacenter is to maintain high availability and reliability.
-
13 Big data-oriented unit and ubiquitous Internet of Things (BD-U2IoT) security
- + Show details - Hide details
-
p.
299
–305
(7)
With the abrupt increase in the number of online devices, Internet of Things (IoT) has evolved as a promising solution that comprises a large set of enabling technologies to support intercormectivity among the smart devices. A huge amount of sensing, computation, communication and storage resources involve the unit and ubiquitous things that cannot be handled by just increasing the resources. It needs a new architecture that can manage the sensing bottlenecks from physical space and appropriately grows the cyber space to meet the challenging requirements. In future IoT, social impact should also be considered in designing new architecture so as to support big data. To address huge storage and computation requirements, a cloud is considered to be the promising solution along with a set of services. Third party cloud -service providers are also managing the big data repositories for users, organization and applications. The role of unit and ubiquitous IoT (U2IoT) is essential for providing sensed data from a large number of devices to local, industrial and national-level management and data centers that are linked with cloud servers for central storage and analysis of big data. We have presented a security architecture that comprises physical security, information security and management security in the prospective of big data -oriented U2IoT.
-
14 Confluence of Big Data and Internet of Things—relationship, synergization, and convergence
- + Show details - Hide details
-
p.
307
–336
(30)
As Big Data and Internet of Things (IoT) keep evolving and play an increasingly important role in the digitization, it is crucial to crystalize how these two are related to each other. This article investigates the correlation between Big Data and IoT systematically and introduces a comprehensive relationship model to synergize IoT and Big Data. The overarching model is broken down into pillars to manage the complexity: independent, interconnecting, interacting, and intertwined (i4). The independent pillar is concerned with stand-alone operations and distinct functionalities, composed of four components: difference, implementation, similarity, and capability (DISC). The interconnecting pillar deals with the structural connections with four units: composition, realization, atomicity, and multiplicity (CRAM). The interacting pillar covers four behavioral styles with four modules: control, association, range, and dependency (CARD). Lastly, the intertwined pillar is in regard to the intermesh of working together cohesively, consisting of four parts: touchpoints, integration, mapping, and enablement (TIME). We delve into each individual element in greater detail, followed by the guidelines and best practices on how to effectively apply the i4 model in real-life initiatives.
-
15 Application of Internet of Things and big data for sustainability in water
- + Show details - Hide details
-
p.
337
–351
(15)
The increasing world population and rapid industrial development is driving the need for sustainable management solutions and preservation of the natural resources and the ecosystem. The Internet of Things (IoT) and big data (BD) analytics are expected to play key role toward sustainability in areas such as water, agriculture, energy, transportation and smart city. In this chapter, the focus is sustainability in water. To address the issues of sustainability of clean accessible water for human use and other living things, a water ecosystem is presented. The water ecosystem consists of five major elements which are water source, treatment, reservoir, consumption and wastage. There are several issues faced in sustainable water supply such as decreasing fresh water resources, loss of revenue due to water loss, complexity in managing the increasing demands. Existing water-management models are not efficient in addressing these issues. In addition, due to seasonal variations, changes in environmental laws, varying plant-operating conditions and other factors, there is a need for effective and efficient monitoring. The application of IoT and BD analytics technology is promising and can provide sustainable management solution in water. The practical deployment of IoT and BD analytics consists of four major components which are IoT devices, communication technology, internet and BD. The emerging low power wide area (LPWA) communication technology is expected to enhance massive connectivity required for water monitoring, data acquisition and promote sustainability in water. Hence, in this chapter, the features of the water ecosystem, the system architecture of IoT and BD and the application in water sustainability, challenges such as cyber security, policy and regulations, accuracy of the data and technology interoperability are discussed.
-
16 IoT-based smart transportation system under real-time environment
- + Show details - Hide details
-
p.
353
–372
(20)
This book chapter represents an overall idea of the Internet of Things (IoT)-based smart transportation system under real-time environment. IoT technology is growing very fast in recent years in the industry and business areas with lots of opportunities. IoT is used to connect between different objects or things in the real world to the internet. IoT is a new concept area, which is also known as a riskless, powerful and precise architectural infrastructure which is very much related to our daily life. IoT is continuously reducing cost and also power consumption. IoT is known as an emerging technological world where anyone or anything can be connected, interacted and communicated with each other anytime and anywhere in a perceptive way through different types of gadgets like smartphones and computers. In IoT, physical objects like actuators and sensors are wirelessly or physically connected to the internet. An enormous amount of data is produced by the network to the analytical devices to scrutinize it. IoT is known as an infrastructural environment where communication and computing system consistently embedded to achieve some specified targets. In the IoT, multiple physical objects of the real world associated with each other to collect and interchange the data. The application areas of IoT spread out at various segments, including transportation, health-care environments, home automation, agriculture, smart appliances and smart city. The IoT technology along with the Big Data framework is created a huge change in the transportation sector, especially in motorways. Nowadays, traffic congestion is a very serious problem throughout the world. Moreover, day by day the number of vehicles is also increased in a terrible way to create an inescapable traffic condition. After that, this disorganized and chaotic traffic situation is also responsible to increase the pollution level and wastage of natural resources because most of the vehicles keep their engine active at any traffic congestion. Apart from this, it is also seen that using the same lane for heavy and light vehicles, the number of accidents is also increased day by day. So those aforesaid issues are very much responsible to create terrible congestion on the road, which is the prime suspect for several crashes of vehicles and the violation of safety environment on road. The performance of most of the existing techniques is not good enough to provide the solution of the aforesaid problem because those techniques are itself very costly and always face various maintenance issues. So to overcome the aforesaid problems and to give more safety on the road, intelligent transportation system (ITS) or smart transportation system performs an active role to increase the efficiency of the transportation system on road. This smart transportation system is developed with the help of lots of sensors such as pressure sensors, proximity sensors, light sensors, humidity sensors, temperature sensors and wireless sensor network (WSN) such as Zigbee, Xbee and Wi-Fi. This book chapter presents an overview of the data acquisition (DAQ), data-processing and data-analysis technique, various work, existing trends, challenges and future scope of this smart transportation system.
-
17 Edge computing: a future trend for IoT and big data processing
- + Show details - Hide details
-
p.
373
–386
(14)
The huge amount of data generated by IoT devices at the edge of network has been imposing significant burden on cloud computing in terms of network latency and bandwidth in particular. Edge computing provides a way to address several latency -related limitations of cloud computing. Nevertheless, edge computing does not aim to replace cloud computing; instead, it can be implemented to cooperate with the data centre to address several limitations of cloud computing, including, but not limit to, reduce latency and bandwidth consumption, provide location -awareness service and improve computing performance and QoS. Although the implementation of edge computing can face a variety of issues, especially in the security and resource -allocation aspects, edge computing can create a new value chain and thus benefits all participants, including customers, service providers, and application and network equipment vendors. The driving forces behind the development of edge computing may include the demand for the applications and IoT devices which require low -latency and real-time processing. Currently, many organisations have realised the potential of edge computing, including Amazon and Dell, and thus they have been developing corresponding products and services. Edge computing can be the next era after cloud computing which brings benefits to all participants as well as changes the world.
-
18 Edge computing-based architectures for big data-enabled IoT
- + Show details - Hide details
-
p.
387
–409
(23)
This chapter presents the detailed discussion on EC-based architecture for big data enabled IoT with their advantages and disadvantages. The EC-based architecture provide closer proximity-based solutions avoiding latency and limited bandwidth issues. However, to support big data handling and management of IoT sensors and smart city infrastructure, load balancing and resource sharing features are required. We can conclude from the earlier discussion that increased number of devices and data generated by them have posed resource-scarcity challenges at edge devices. In the worst case, the edge device is forced to forward the request to a distant remote cloud eliminating the beneficial features of reduced latency and Internet dependency offered by EC architecture.
-
19 Information-centric trust management for big data-enabled IoT
- + Show details - Hide details
-
p.
411
–431
(21)
Trust management (TM) plays a significant role in big data-enabled Internet of Things (IoT) for trustworthy data mining and fusion operations. It helps to deal with uncertainty and risk when users engage in an increased consumption of IoT services and applications. However, big data-enabled IoT has introduced newer challenges for TM. These challenges are due to the information-centric nature of the IoT rather than the trivial device-centric nature of legacy networks. Given the heterogeneous nature of IoT systems, this has initiated a new debate on ways to manage trust for big data-enabled IoT in a holistic context-dependent way with greater interoperability. From a user's perspective, a fully acceptable IoT-based analytics must be a trustworthy system that offers a range of competent context-aware services, along with effective security and privacy for its personalized data. Focused on this discussion, this chapter first tends to offer the reader with a general understanding of definitions, objectives and necessity of trust. Then it aims to identify the trust requirements of big data-enabled IoT systems such as interoperability, security, privacy, identity and policy requirements. Afterwards, along with an overview of information-centric trusted systems, it discusses the state-of-the-art frameworks, models and methods for information-centric TM in big data-enabled IoT systems and also tries to identify the future trends and open challenges in these areas.
-
20 Dependability analysis of IoT systems using dynamic fault trees analysis
- + Show details - Hide details
-
p.
433
–453
(21)
The Internet of Things (IoT) is proving to be an essential part of the fourth industrial revolution (4IR). In highly critical environments, IoT systems are required to be secure, reliable and available. Although there are many investigations on the security and privacy of IoT systems, there are relatively far fewer efforts expended on their dependability. The individual `things' of an IoT system may be unfailing, but that does not make the complete IoT system - from sensor to server - dependable. In this chapter, a technique is proposed to evaluate the dependability of a complete IoT ecosystem by using a modified version of the classical fault tree analysis (FTA) and Monte Carlo simulation techniques. The propose technique is applied to a hypothetical case study, and the results are promising.
-
Back Matter
- + Show details - Hide details
-
p.
(1)
Related content
