Big Data Platforms for the Internet of Things

  • Radu-Ioan Ciobanu
  • Valentin Cristea
  • Ciprian Dobre
  • Florin Pop
Part of the Studies in Computational Intelligence book series (SCI, volume 546)


This chapter discusses the challenges, state of the art, and future trends in context-aware environments (infrastructure and services) for the Internet of Things, an open and dynamic environment where new Things can join in at any time, and offer new services or improvements of old services in terms of performance and quality of service. The dynamic behavior is supported by mechanisms for Things publishing, notification, search, and/or retrieval. Self-adaptation is important in this respect. For example, when things are unable to establish direct communication, or when communication should be offloaded to cope with large throughputs, mobile collaboration can be used to facilitate communication through opportunistic networks. These types of networks, formed when mobile devices communicate only using short-range transmission protocols, usually when users are close, can help applications still exchange data. Routes are built dynamically, since each mobile device is acting according to the store-carry-and-forward paradigm. Thus, contacts are seen as opportunities to move data towards the destination. In such networks data dissemination is usually based on a publish/subscribe model. We make a critical analysis of current opportunistic approaches using the elements of a newly defined taxonomy. We review current state-of-the-art work in this area, from an IoT perspective.


Mobile Device Data Dissemination Community Detection Smart City Bloom Filter 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.



The work was partially supported by the project “SideSTEP—Scheduling Methods for Dynamic Distributed Systems: a self-* approach”, PN-II-CT-RO-FR-2012-1-0084.


  1. 1.
    Athanasopoulos, D., Zarras, A.V., Issarny, V., Pitoura, E., Vassiliadis, P.: Cowsami: interface-aware context gathering in ambient intelligence environments. Pervasive Mob. Comput. 4(3), 360–389 (2008)CrossRefGoogle Scholar
  2. 2.
    Bardram, J.E.: The java context awareness framework (jcaf)-a service infrastructure and programming framework for context-aware applications. In: Pervasive Computing, pp. 98–115. Springer (2005)Google Scholar
  3. 3.
    Bjurefors, F., Gunningberg, P., Nordstrom, E., Rohner, C.: Interest dissemination in a searchable data-centric opportunistic network. In: Wireless Conference (EW), 2010 European, pp. 889–895. IEEE (2010)Google Scholar
  4. 4.
    Boldrini, C., Conti, M., Passarella, A.: Contentplace: social-aware data dissemination in opportunistic networks. In: Proceedings of the 11th International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems, pp. 203–210. ACM (2008)Google Scholar
  5. 5.
    Chen, C., Helal, S.: A device-centric approach to a safer internet of things. In: Proceedings of the 2011 International Workshop on Networking and Object Memories for the Internet of things, pp. 1–6. ACM (2011)Google Scholar
  6. 6.
    Chen, L.J., Sun, T., Liang, N.C.: An evaluation study of mobility support in zigbee networks. J. Signal Process. Syst. 59(1), 111–122 (2010)CrossRefGoogle Scholar
  7. 7.
    Chourabi, H., Nam, T., Walker, S., Gil-Garcia, J.R., Mellouli, S., Nahon, K., Pardo, T.A., Scholl, H.J.: Understanding smart cities: an integrative framework. In: 2012 45th Hawaii International Conference on System Science (HICSS), pp. 2289–2297. IEEE (2012)Google Scholar
  8. 8.
    Christensen, H.B.: Using logic programming to detect activities in pervasive healthcare. In: Logic Programming, pp. 421–436. Springer (2002)Google Scholar
  9. 9.
    Ciobanu, R.I., Dobre, C.: Predicting encounters in opportunistic networks. In: Proceedings of the 1st ACM Workshop on High Performance Mobile Opportunistic Systems, pp. 9–14. ACM (2012)Google Scholar
  10. 10.
    Conti, M., Crowcroft, J., Giordano, S., Hui, P., Nguyen, H.A., Passarella, A.: Routing issues in opportunistic networks. In: Middleware for Network Eccentric and Mobile Applications, pp. 121–147. Springer (2009)Google Scholar
  11. 11.
    Conti, M., Giordano, S., May, M., Passarella, A.: From opportunistic networks to opportunistic computing. IEEE Commun. Mag. 48(9), 126–139 (2010)CrossRefGoogle Scholar
  12. 12.
    Costa, P.D., Guizzardi, G., Almeida, J.P.A., Pires, L.F., van Sinderen, M.: Situations in conceptual modeling of context. In: EDOC Workshops, p. 6 (2006)Google Scholar
  13. 13.
    Coutaz, J., Crowley, J.L., Dobson, S., Garlan, D.: Context is key. Commun. ACM 48(3), 49–53 (2005)CrossRefGoogle Scholar
  14. 14.
    Cristea, V., Dobre, C., Costan, A., Pop, F.: Middleware and architectures for space-based and situated computing. Int. J. Space-Based Situated Comput. 1(1), 43–58 (2011)CrossRefGoogle Scholar
  15. 15.
    Cugola, G., Migliavacca, M.: Multicar: Remote invocation for large scale, context-aware applications. In: Proceedings of the IEEE Symposium on Computers and Communications, ISCC ’10, pp. 570–576. IEEE Computer Society, Washington, D.C., USA (2010). doi: 10.1109/ISCC.2010.5546718.
  16. 16.
    Denœux, T.: A k-nearest neighbor classification rule based on dempster-shafer theory. In: Classic Works of the Dempster-Shafer Theory of Belief Functions, pp. 737–760. Springer (2008)Google Scholar
  17. 17.
    Desta, M.S., Hyytiä, E., Ott, J., Kangasharju, J.: Characterizing content sharing properties for mobile users in open city squares. In: 10th Annual IEEE/IFIP Conference on Wireless On-Demand Network Systems and Services (WONS), Banff, Canada (2013)Google Scholar
  18. 18.
    Dey, A.K., Abowd, G.D., Salber, D.: A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications. Hum. Comput. Interact. 16(2), 97–166 (2001)CrossRefGoogle Scholar
  19. 19.
    Dobre, C., Manea, F., Cristea, V.: Capim: A context-aware platform using integrated mobile services. In: 2011 IEEE International Conference on Intelligent Computer Communication and Processing (ICCP), pp. 533–540. IEEE (2011)Google Scholar
  20. 20.
    Doukas, C., Maglogiannis, I., Tragas, P., Liapis, D., Yovanof, G.: Patient fall detection using support vector machines. In: Artificial Intelligence and Innovations 2007: From Theory to Applications, pp. 147–156. Springer (2007)Google Scholar
  21. 21.
    Greifenberg, J., Kutscher, D.: Efficient publish/subscribe-based multicast for opportunistic networking with self-organized resource utilization. In: 22nd International Conference on Advanced Information Networking and Applications—Workshops, 2008. AINAW 2008, pp. 1708–1714. IEEE (2008)Google Scholar
  22. 22.
    Gu, T., Pung, H.K., Zhang, D.Q.: A service-oriented middleware for building context-aware services. J. Network Comput. Appl. 28(1), 1–18 (2005)CrossRefGoogle Scholar
  23. 23.
    Haddadi, H., Hui, P., Henderson, T., Brown, I.: Targeted advertising on the handset: privacy and security challenges. In: Pervasive Advertising, pp. 119–137. Springer (2011)Google Scholar
  24. 24.
    He, J., Zhang, Y., Huang, G., Cao, J.: A smart web service based on the context of things. ACM Trans. Internet Technol. (TOIT) 11(3), 13 (2012)CrossRefGoogle Scholar
  25. 25.
    Henricksen, K., Robinson, R.: A survey of middleware for sensor networks: state-of-the-art and future directions. In: Proceedings of the International Workshop on Middleware for Sensor Networks, pp. 60–65. ACM (2006)Google Scholar
  26. 26.
    Hui, P., Crowcroft, J., Yoneki, E.: Bubble rap: Social-based forwarding in delay-tolerant networks. IEEE Trans. Mobile Comput. 10(11), 1576–1589 (2011)CrossRefGoogle Scholar
  27. 27.
    Hui, P., Yoneki, E., Chan, S.Y., Crowcroft, J.: Distributed community detection in delay tolerant networks. In: Proceedings of 2nd ACM/IEEE International Workshop on Mobility in the Evolving Internet Architecture, p. 7. ACM (2007)Google Scholar
  28. 28.
    Kalyan, A., Gopalan, S., Sridhar, V.: Hybrid context model based on multilevel situation theory and ontology for contact centers. In: Third IEEE International Conference on Pervasive Computing and Communications Workshops, 2005. PerCom 2005 Workshops, pp. 3–7. IEEE (2005)Google Scholar
  29. 29.
    Kanda, T., Glas, D.F., Shiomi, M., Ishiguro, H., Hagita, N.: Who will be the customer? A social robot that anticipates people’s behavior from their trajectories. In: Proceedings of the 10th International Conference on Ubiquitous Computing, pp. 380–389. ACM (2008)Google Scholar
  30. 30.
    Kim, H., Cho, Y.J., Oh, S.R.: Camus: A middleware supporting context-aware services for network-based robots. In: IEEE Workshop on Advanced Robotics and its Social Impacts, 2005, pp. 237–242. IEEE (2005)Google Scholar
  31. 31.
    Kortuem, G., Kawsar, F., Fitton, D., Sundramoorthy, V.: Smart objects as building blocks for the internet of things. IEEE Internet Comput. 14(1), 44–51 (2010)CrossRefGoogle Scholar
  32. 32.
    Lenders, V., Karlsson, G., May, M.: Wireless ad hoc podcasting. In: 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2007. SECON’07, pp. 273–283. IEEE (2007)Google Scholar
  33. 33.
    Lilien, L., Gupta, A., Yang, Z.: Opportunistic networks for emergency applications and their standard implementation framework. In: IEEE International Performance, Computing, and Communications Conference, 2007. IPCCC 2007, pp. 588–593. IEEE (2007)Google Scholar
  34. 34.
    McKeever, S., Ye, J., Coyle, L., Dobson, S.: Using dempster-shafer theory of evidence for situation inference. In: Smart Sensing and Context, pp. 149–162. Springer (2009)Google Scholar
  35. 35.
    Ngo, H.Q., Shehzad, A., Liaquat, S., Riaz, M., Lee, S.: Developing context-aware ubiquitous computing systems with a unified middleware framework. In: Embedded and Ubiquitous Computing, pp. 672–681. Springer (2004)Google Scholar
  36. 36.
    Pelusi, L., Passarella, A., Conti, M.: Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. IEEE Commun. Mag. 44(11), 134–141 (2006)CrossRefGoogle Scholar
  37. 37.
    Project, C.E.F.: RFID and the inclusive model for the internet of things. (2012). Accessed 15 July 2013
  38. 38.
    Society, E.C.I., DG, M.: Infso d.4 networked enterprise & rfid, working group rfid of the etp eposs. internet of things in 2020. roadmap for the future. (2009). Accessed 15 August 2013
  39. 39.
    Tan, L., Wang, N.: Future internet: The internet of things. In: 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), vol. 5, pp. V5–376. IEEE (2010)Google Scholar
  40. 40.
    Truong, H.L., Dustdar, S.: A survey on context-aware web service systems. Int. J. Web Inf. Syst. 5(1), 5–31 (2009)Google Scholar
  41. 41.
    Van Kasteren, T., Noulas, A., Englebienne, G., Kröse, B.: Accurate activity recognition in a home setting. In: Proceedings of the 10th International Conference on Ubiquitous Computing, pp. 1–9. ACM (2008)Google Scholar
  42. 42.
    Vergori, P., Ntanos, C., Gavelli, M., Askounis, D.: The webinos architecture: a developern++s point of view. In: Mobile Computing, Applications, and Services, pp. 391–399. Springer (2013)Google Scholar
  43. 43.
    Vermesan, O., Friess, P., Guillemin, P., Gusmeroli, S., Sundmaeker, H., Bassi, A., Jubert, I.S., Mazura, M., Harrison, M., Eisenhauer, M., et al.: Internet of things strategic research roadmap. In: Vermesan, O., Friess, P., Guillemin, P., Gusmeroli, S., Sundmaeker, H., Bassi, A., et al. (eds.) Internet of Things: Global Technological and Societal Trends, pp. 9–52 (2011)Google Scholar
  44. 44.
    Wu, J.: Small worlds: the dynamics of networks between order and randomness—Book review. SIGMOD Rec. 31(4), 74–75 (2002)CrossRefGoogle Scholar
  45. 45.
    Yau, S.S., Karim, F.: A context-sensitive middleware for dynamic integration of mobile devices with network infrastructures. J. Parallel Distrib. Comput. 64(2), 301–317 (2004)CrossRefGoogle Scholar
  46. 46.
    Yau, S.S., Liu, J.: Hierarchical situation modeling and reasoning for pervasive computing. In: The Fourth IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, 2006 and the 2006 Second International Workshop on Collaborative Computing, Integration, and Assurance. SEUS 2006/WCCIA 2006, pp. 6–15. IEEE (2006)Google Scholar
  47. 47.
    Ye, J., Dobson, S., McKeever, S.: Situation identification techniques in pervasive computing: a review. Pervasive Mob. Comput. 8(1), 36–66 (2012)CrossRefGoogle Scholar
  48. 48.
    Yoneki, E., Hui, P., Chan, S., Crowcroft, J.: A socio-aware overlay for publish/subscribe communication in delay tolerant networks. In: Proceedings of the 10th ACM Symposium on Modeling, Analysis, and Simulation of Wireless and Mobile Systems, pp. 225–234. ACM (2007)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.University Politehnica of BucharestBucharestRomania

Personalised recommendations