With the widespread application of mobile edge computing (MEC), MEC is serving as a bridge to narrow the gaps between medical staff and patients. Relatedly, MEC is also moving toward supervising ...individual health in an automatic and intelligent manner. One of the main MEC technologies in healthcare monitoring systems is human activity recognition (HAR). Built-in multifunctional sensors make smartphones a ubiquitous platform for acquiring and analyzing data, thus making it possible for smartphones to perform HAR. The task of recognizing human activity using a smartphone’s built-in accelerometer has been well resolved, but in practice, with the multimodal and high-dimensional sensor data, these traditional methods fail to identify complicated and real-time human activities. This paper designs a smartphone inertial accelerometer-based architecture for HAR. When the participants perform typical daily activities, the smartphone collects the sensory data sequence, extracts the high-efficiency features from the original data, and then obtains the user’s physical behavior data through multiple three-axis accelerometers. The data are preprocessed by denoising, normalization and segmentation to extract valuable feature vectors. In addition, a real-time human activity classification method based on a convolutional neural network (CNN) is proposed, which uses a CNN for local feature extraction. Finally, CNN, LSTM, BLSTM, MLP and SVM models are utilized on the UCI and Pamap2 datasets. We explore how to train deep learning methods and demonstrate how the proposed method outperforms the others on two large public datasets: UCI and Pamap2.
Benefiting from the real-time processing ability of edge computing, computing tasks requested by smart devices in the Internet of Things are offloaded to edge computing devices (ECDs) for ...implementation. However, ECDs are often overloaded or underloaded with disproportionate resource requests. In addition, during the process of task offloading, the transmitted information is vulnerable, which can result in data incompleteness. In view of this challenge, a blockchain-enabled computation offloading method, named BeCome, is proposed in this article. Blockchain technology is employed in edge computing to ensure data integrity. Then, the nondominated sorting genetic algorithm III is adopted to generate strategies for balanced resource allocation. Furthermore, simple additive weighting and multicriteria decision making are utilized to identify the optimal offloading strategy. Finally, performance evaluations of BeCome are given through simulation experiments.
With the ever-increasing popularity of mobile computing technology, a wide range of computational resources or services (e.g., movies, food, and places of interest) are migrating to the mobile ...infrastructure or devices (e.g., mobile phones, PDA, and smart watches), imposing heavy burdens on the service selection decisions of users. In this situation, service recommendation has become one of the promising ways to alleviate such burdens. In general, the service usage data used to make service recommendation are produced by various mobile devices and collected by distributed edge platforms, which leads to potential leakage of user privacy during the subsequent cross-platform data collaboration and service recommendation process. Locality-Sensitive Hashing (LSH) technique has recently been introduced to realize the privacy-preserving distributed service recommendation. However, existing LSH-based recommendation approaches often consider only one quality dimension of services, without considering the multidimensional recommendation scenarios that are more complex but more common. In view of this drawback, we improve the traditional LSH and put forward a novel LSH-based service recommendation approach named SerRecmulti-qos, to protect users’ privacy over multiple quality dimensions during the distributed mobile service recommendation process.
To maximize the economic benefits, a cloud service provider needs to recommend its services to as many users as possible based on the historical user-service quality data. However, when a cloud ...platform (e.g., Amazon) intends to make a service recommendation decision, considering only its own user-service quality data is insufficient, because a cloud user may invoke services from multiple distributed cloud platforms (e.g., Amazon and IBM). In this situation, it is promising for Amazon to collaborate with other cloud platforms (e.g., IBM) to utilize the integrated data for the service recommendation to improve the recommendation accuracy. However, two challenges are present in the above-mentioned collaboration process, where we attempt to use multi-source data for the service recommendation. First, protecting users' privacy is challenging when IBM releases its own data to Amazon. Second, the recommendation efficiency and scalability are often low when the user-service quality data of Amazon and IBM update frequently. Considering these challenges, a privacy-preserving and scalable service recommendation approach based on distributed locality-sensitive hashing, i.e., SerRec distri-LSH , is proposed in this paper to handle the service recommendation in a distributed cloud environment. Extensive experiments on the WS-DREAM data set validate the feasibility of our approach in terms of service recommendation accuracy, scalability, and privacy preservation.
Various cyber attacks often occur in logistics network of the Industry 4.0, which poses a threat to Internet security. Intrusion detection can intelligently detect anomalous activities and secure the ...Internet with the help of anomaly detection algorithms. Different from static data, intrusion detection data are a dynamic data form and have the following characteristics. First, it is multiaspect. Second, it contains point anomalies and group anomalies. Third, there are correlations between different attributes. Nevertheless, these properties pose a challenge on existing anomaly detection approaches. Thus, a novel anomaly detection approach MDS_AD is proposed in this article to deal with the challenges. It combines locality-sensitive hashing (LSH), isolation forest, and PCA techniques. MDS_AD has the following properties. 1) The introduced LSH can operate on multiaspect data. 2) MDS_AD can effectively catch group anomalies from the experimental results. 3) The PCA is utilized to reduce dimensionality for correlations between different attributes. 4) MDS_AD is a streaming approach, which can perform model update and process data in constant memory and time. To confirm the performance of MDS_AD, multiple experiments are designed and implemented on UNSW-NB15 dataset. Experimental results show that MDS_AD outperforms state-of-the-art baselines.
As one of the cyber-physical-social systems that plays a key role in people's daily activities, a smart city is producing a considerable amount of industrial data associated with transportation, ...healthcare, business, social activities, and so on. Effectively and efficiently fusing and mining such data from multiple sources can contribute much to the development and improvements of various smart city applications. However, the industrial data collected from the smart city are often sensitive and contain partial user privacy such as spatial-temporal context information. Therefore, it is becoming a necessity to secure user privacy hidden in the smart city data before these data are integrated together for further mining, analyses, and prediction. However, due to the inherent tradeoff between data privacy and data availability, it is often a challenging task to protect users' context privacy while guaranteeing accurate data analysis and prediction results after data fusion. Considering this challenge, a novel privacy-aware data fusion and prediction approach for the smart city industrial environment is put forward in this article, which is based on the classic locality-sensitive hashing technique. At last, our proposal is evaluated by a set of experiments based on a real-world dataset. Experimental results show better prediction performances of our approach compared to other competitive ones.
Greenhouses can grow many off‐season vegetables and fruits, which improves people's quality of life. Greenhouses can also help crops resist natural disasters and ensure the stable growth of crops. ...However, it is highly challenging to carefully control the greenhouse climate. Therefore, the proposal of a greenhouse climate prediction model provides a way to solve this challenge. We focus on the six climatic factors that affect crops growth, including temperature, humidity, illumination, carbon dioxide concentration, soil temperature and soil humidity, and propose a GCP_lstm model for greenhouse climate prediction. The climate change in greenhouse is nonlinear, so we use long short‐term memory (LSTM) model to capture the dependence between historical climate data. Moreover, the short‐term climate has a greater impact on the future trend of greenhouse climate change. Therefore, we added a 5‐min time sliding window through the analysis experiment. In addition, sensors sometimes collect wrong climate data. Based on the existence of abnormal data, our model still has good robustness. We experienced our method on the data sets of three vegetables: tomato, cucumber and pepper. The comparison shows that our method is better than other comparison models.
Millions of sensors continuously produce and transmit data to control real-world infrastructures using complex networks in the Internet of Things (IoT). However, IoT devices are limited in ...computational power, including storage, processing, and communication resources, to effectively perform compute-intensive tasks locally. Edge computing resolves the resource limitation problems by bringing computation closer to the edge of IoT devices. Providing distributed edge nodes across the network reduces the stress of centralized computation and overcomes latency challenges in the IoT. Therefore, edge computing presents low-cost solutions for compute-intensive tasks. Software-Defined Networking (SDN) enables effective network management by presenting a global perspective of the network. While SDN was not explicitly developed for IoT challenges, it can, however, provide impetus to solve the complexity issues and help in efficient IoT service orchestration. The current IoT paradigm of massive data generation, complex infrastructures, security vulnerabilities, and requirements from the newly developed technologies make IoT realization a challenging issue. In this research, we provide an extensive survey on SDN and the edge computing ecosystem to solve the challenge of complex IoT management. We present the latest research on Software-Defined Internet of Things orchestration using Edge (SDIoT-Edge) and highlight key requirements and standardization efforts in integrating these diverse architectures. An extensive discussion on different case studies using SDIoT-Edge computing is presented to envision the underlying concept. Furthermore, we classify state-of-the-art research in the SDIoT-Edge ecosystem based on multiple performance parameters. We comprehensively present security and privacy vulnerabilities in the SDIoT-Edge computing and provide detailed taxonomies of multiple attack possibilities in this paradigm. We highlight the lessons learned based on our findings at the end of each section. Finally, we discuss critical insights toward current research issues, challenges, and further research directions to efficiently provide IoT services in the SDIoT-Edge paradigm.
The Internet of mobile things is a burgeoning technique that generates, stores and processes big real-time data to render rich services for mobile users. In order to mitigate conflicts between the ...resource limitation of mobile devices and users’ demands of decreasing processing latency as well as prolonging battery life, it spurs a popular wave of offloading mobile applications for execution to centralized and decentralized data centers, such as cloud and edge servers. Due to the complexity and difference of mobile big data, arbitrarily offloading the mobile applications poses a remarkable challenge to optimizing the execution time and the energy consumption for mobile devices, despite the improved performance of Internet of Things (IoT) in cloud-edge computing. To address this challenge, we propose a computation offloading method, named COM, for IoT-enabled cloud-edge computing. Specifically, a system model is investigated, including the execution time and energy consumption for mobile devices. Then dynamic schedules of data/control-constrained computing tasks are confirmed. In addition, NSGA-III (non-dominated sorting genetic algorithm III) is employed to address the multi-objective optimization problem of task offloading in cloud-edge computing. Finally, systematic experiments and comprehensive simulations are conducted to corroborate the efficiency of our proposed method.
•Analyze the dynamic schedules according to the data or control dependencies of the computing tasks.•Adopt NSGA-III to address the multi-objective optimization problem in IoT.•Select the optimal schedule strategy by leveraging SAW and MCDM techniques.
Summary
With the advent of Internet of Things (IoT) age, the variety and volume of web services have been increasing at a fast speed. This often leads to users' selections for web services more ...complicated. Under the circumstance, a variety of methods such as collaborative filtering are adopted to deal with this challenging situation. While traditional collaborative filtering method has some shortcomings, one of which is that only centralized user‐service data are considered while distributed quality data from multiple platform are ignored. Generally, service recommendation across different platforms often involves data communication among multiple platforms, during which user privacy may be disclosed and much computational time is required. Considering these challenges, a unique amplified locality‐sensitive hashing (LSH)‐based service recommendation method, that is, SRAmplified‐LSH, is proposed in the article. SRAmplified‐LSH can guarantee a good balance between accuracy and efficiency of recommendation and user privacy information. Finally, extensive experiments deployed on WS‐DREAM dataset validate the feasibility of our proposed method.