Ullah I. Future Communication Systems Using Artificial Intelligence, IoT,... 2024
Ullah I. Future Communication Systems Using Artificial Intelligence, IoT,... 2024
Edited by
Dr Inam Ullah, Dr Inam Ullah Khan, Dr Mariya Ouaissa,
Dr Mariyam Ouaissa and Dr Salma El Hajjami
Designed cover image: Shutterstock Images
© 2024 selection and editorial matter, Dr Inam Ullah, Dr Inam Ullah Khan, Dr Mariya Ouaissa, Dr Mariyam Ouaissa,
Dr Salma El Hajjami; individual chapters, the contributors
Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot
assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers
have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright
holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowl‑
edged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or
utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including pho‑
tocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission
from the publishers.
For permission to photocopy or use material electronically from this work, access www.copyright.com or contact the
Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978‑750‑8400. For works that are
not available on CCC please contact [email protected]
Trademark notice: Product or corporate names may be trademarks or registered trademarks and are used only for
identification and explanation without intent to infringe.
DOI: 10.1201/9781032648309
Typeset in Minion
by codeMantra
Contents
Preface, vii
Editors, ix
Contributors, xiii
v
vi ◾ Contents
Chapter 12 ◾ Edge Computing in the Digital Era: The Nexus of 5G, IoT
and a Seamless Digital Future 213
Zahid R asheed, Yong‑Kui Ma, Inam Ullah, Yuning Tao, Ijaz Khan, Habib Khan
and Muhammad Shafiq
INDEX, 235
Preface
vii
viii ◾ Preface
ix
x ◾ Editors
Dr. Inam Ullah Khan is the founder of the Internet of Flying Vehicles Lab at AI‑EYS.
Currently, he has been working as Global Mentor/Guest Lecturer at Impact Xcelerator,
IE School of Science and Technology, Madrid, Spain. Previously, he was working as
Visiting Researcher at King’s College London, United Kingdom. Also, he was Faculty
Member at different universities in Pakistan, which include the Center for Emerging
Sciences, Engineering & Technology (CESET), Islamabad; Abdul Wali Khan University,
Garden Campus, Timergara Campus; University of Swat; and Shaheed Zulfikar Ali
Bhutto Institute of Science and Technology (SZABIST), Islamabad Campus. He completed
his Ph.D. in Electronics Engineering from the Department of Electronics Engineering,
Isra University, Islamabad Campus, School of Engineering & Applied Sciences (SEAS).
Also, he did his M.S. degree in Electronics Engineering at the Department of Electronics
Engineering, Isra University, Islamabad Campus, School of Engineering & Applied
Sciences (SEAS). He had a bachelor’s degree in Computer Science from Abdul Wali Khan
University Mardan, Pakistan. He authored/coauthored more than 50 research articles in
reputable journals, conferences and book chapters. His research interests include Network
System Security, Intrusion Detection, Intrusion Prevention, Cryptography, Optimization
Techniques, WSN, IoT, Mobile Ad Hoc Networks (MANETS), Flying Ad Hoc Networks
and Machine Learning. He served in many international conferences as Session Chair/
Technical Program Committee Member. Also, he served as Guest Editor with many pres‑
tigious international journals. Apart from that, he is General Chair at the International
Conference on Trends and Innovations in Smart Technologies (ICTIST’22), virtually from
London, United Kingdom. In addition, he also served as Editor of several books. More
interestingly, he was invited as a technology expert many times on Pakistan National
Television and other media outlets.
Dr. Mariya Ouaissa i s currently a professor in Cybersecurity and Networks at the Faculty
of Sciences Semlalia, Cadi Ayyad University, Marrakech, Morocco. She earned her Ph.D.
degree in Computer Science and Networks in 2019 at the Laboratory of Modelisation of
Mathematics and Computer Science from ENSAM‑Moulay Ismail University, Meknes,
Morocco. She is a networks and telecoms engineer, who graduated in 2013 from the National
School of Applied Sciences, Khouribga, Morocco. She is a co‑founder and IT consultant
at IT Support and Consulting Center. She worked as a visiting professor at the School of
Technology of Meknes, Morocco, from 2013 to 2021. She is Member of the International
Association of Engineers and the International Association of Online Engineering, and
since 2021, she has been an “ACM Professional Member.” She is Expert Reviewer with
Academic Exchange Information Centre (AEIC) and Brand Ambassador with Bentham
Science. She has served and continues to serve on technical program and organizer commit‑
tees of several conferences and events and has organized many Symposiums/Workshops/
Conferences as a general chair and also as a reviewer of numerous international journals.
She has made contributions in the fields of information security and privacy, IoT security
and wireless and constrained networks security. Her main research topics are IoT, M2M,
D2D, WSN, Cellular Networks and Vehicular Networks. She has published over 40 papers
Editors ◾ xi
Dr. Mariyam Ouaissa is currently an assistant professor in Networks and Systems at
ENSA, Chouaib Doukkali University, El Jadida, Morocco. She received her Ph.D. degree
in 2019 from the National Graduate School of Arts and Crafts, Meknes, Morocco, and
her Engineering degree in 2013 from the National School of Applied Sciences, Khouribga,
Morocco. She is a communication and networking researcher and practitioner with indus‑
try and academic experience. Her research is multidisciplinary, and it focuses on the IoT,
M2M, WSN, vehicular communications and cellular networks, security networks, con‑
gestion overload problem and resource allocation management and access control. She is
serving as a reviewer for international journals and conferences including IEEE Access,
Wireless Communications and Mobile Computing. Since 2020, she has been a member of
the “International Association of Engineers (IAENG)” and “International Association of
Online Engineering,” and since 2021, she has been an “ACM Professional Member.” She
has published more than 30 research papers (this includes book chapters, peer‑reviewed
journal articles and peer‑reviewed conference manuscripts), 10 edited books and 6 spe‑
cial issues (as guest editor). She has served on Program Committees and Organizing
Committees of several conferences and events and has organized many Symposiums/
Workshops/Conferences as a general chair.
Dr. Salma El Hajjami has been an assistant professor and researcher at the Faculty of
Science, Ibn Zohr University, Agadir, Morocco, since 2021. She earned her Ph.D. degree
in Computer Science in 2021 at the Laboratory of Artificial Intelligence, Data Science and
Emerging Systems from ENSA, Sidi Mohammed Ben Abdellah University, Fez, Morocco.
She is a computer science engineer, who graduated in 2015 from the National School of
Applied Sciences Fez, Morocco. She has previous expertise acting in the Ministry of Interior
Morocco as Research and Development Engineer from 2017 to 2021. She is Member of
the International Association of Engineers (IAENG) and the International Association of
Online Engineering. Dr. Salma has made contributions in the fields of Social Big Data,
Semantics Analytics, Anomaly Detection and Imbalanced Big Data published at interna‑
tional conferences and journals. Her main research topics are Machine Learning, Deep
Learning, Imbalanced Big Data, Data Science and Blockchain. She has served and contin‑
ues to serve on technical program and organizer committees of several conferences and
also as a reviewer of numerous international journals.
Contributors
xiii
xiv ◾ Contributors
1
Chapter 1
Artificial Intelligence in
the Internet of Things,
Recent Challenges and
Future Prospects
Fazal Wahab
Northeastern University
Mosa Khan
University of Malakand
Inam Ullah
Gachon University
Yuning Tao
South China University of Technology
1.1 INTRODUCTION
In this chapter, we will explain Artificial Intelligence (AI) in the Internet of Things (IoT),
Machine Learning (ML), and their applications in IoT.
DOI: 10.1201/9781032648309-2 3
4 ◾ Future Communication Systems Using AI, IoT and Data Science
dissemination, and independent analysis of data on an unparalleled level. The IoT has sig‑
nificantly transformed the way individuals establish connections, engage in communication,
and interact with the tangible environment [1]. The acronym IoT refers to a sophisticated
network of interconnected objects, sensors, and systems with autonomous capabilities to col‑
lect, exchange, and analyse data. In contrast, artificial intelligence (AI) comprises a variety
of technologies, including ML and deep learning, which facilitate the emulation of human
intellect by machines. These technologies enable machines to acquire knowledge from data
and utilise it to make informed judgements. The integration of AI and IoT, referred to as
AIoT, offers substantial prospects for enhancing efficacy, security, and convenience across
several industries, such as manufacturing, healthcare, and intelligent communities.
The immense potential of AIoT becomes apparent when we contemplate the boundless
opportunities it holds for the future. The potential of AIoT capabilities is set to be enhanced
by the emergence of technologies such as 5G connectivity and edge computing, hence
expanding the boundaries of what can be achieved. AI algorithm sophistication contin‑
ues to rise, promising deeper insights from IoT‑generated data, more exact forecasts, and a
higher level of automation. The stage is set for more innovation, with AIoT serving as the
driving force behind transformative advances in various industries and aspects of human
existence [2]. Together, AI and IoT build a new paradigm in which data play a central role,
intelligence permeates all aspects, and the only thing limiting the possibilities is our ingenu‑
ity. In the dynamic environment of technological advancements, the partnership between
human creativity and machine intelligence is limitless, leading us to a future where the inte‑
gration of AI and IoT fundamentally transforms our global reality. Every industry and area
of study feels the effects of smarter applications’ improved use of data insights. Technology
and methods for learning from and acting on the massive volumes of data created daily are
the main forces behind this shift. Deep neural networks, conventional ML methods, and
scalable GPU computing have all contributed to the tremendous development and reduced
impediments in adoption [3]. Python is widely regarded as the most prevalent programming
language for scientific computing, data research, and ML due to its extensive collection of
low‑level libraries and intuitive high‑level application programming interfaces (APIs).
This study thoroughly examines the interconnected domains of AI and IoT. This anal‑
ysis will explore the complex dynamics of their interaction, highlighting the significant
influence they have already exerted across multiple industries and providing informa‑
tion on future prospects. The exploration will encompass the domains of enhanced data
analytics, energy optimisation, healthcare, smart cities, and manufacturing, allowing
us to observe the integration of intelligence via AIoT into the fundamental structure of
these areas. However, it is essential to acknowledge that along with the potential ben‑
efits, significant responsibilities must be addressed. As we embrace this technological
revolution, we will carefully discuss the various problems and factors that come with it.
These include ensuring data interoperability, security, scalability, and energy efficiency.
of the twentieth century, researchers developed a subfield of AI called ML, which sought
to mimic the brain’s conceptual structure and function in order to create AI [4–6]. The
utilisation of ML continues to be imperative in the advancement of AI. ML is widely
recognised as a scientific discipline that centres on the advancement of computer models
and algorithms capable of executing specific tasks, often including the identification of
patterns, without the requirement of explicitly coding them. Computer programming is
a fascinating and complicated field focusing on automating and improving routine tasks.
For the purpose of automating mail sorting, for instance, a programmer can employ zip
code recognition software. Developing a comprehensive set of rules that can be imple‑
mented in a computer program to effectively execute this activity is frequently a laborious
and demanding process. In the present context, the term “ML” pertains to the research
and development of technologies that enable computers to automatically make complex
decisions by recognising patterns in labelled data and drawing inferences about the rel‑
evance of those patterns without being explicitly programmed with the rules to follow.
In the previous example of zip code identification, ML was used to develop a model from
labelled cases, resulting in very accurate recognition of both machine‑generated and
hand‑written zip codes.
The term “artificial intelligence” (AI) refers to a type of technology that aspires to endow
computers with the ability to reason in a manner like that of humans. The process by which
different industries are digitally reforming themselves will be sped up as a result of this
recent revelation. Enabling interconnectedness and augmenting decision‑making capa‑
bilities across various entities, including individuals, animals, plants, robots, appliances,
natural elements, and infrastructure, have the potential to transform the global landscape
into a more self‑sustaining ecosystem [7–9]. This transformation will take place regard‑
less of whether it is people, animals, plants, machines, or appliances. Suppose we want to
achieve our goal of providing the environment and the physical things in its full autonomy.
In that case, the system will need to incorporate not only a data analysis (DA) module but
also an ML module that models human learning. ML is credited for developing method‑
ologies that facilitate autonomous and self‑sustaining learning in different components
and devices within a network. On the contrary, data analytics (DA) focuses on evaluating
and examining the data generated over a period of time to identify historical patterns and
enhance future efficiency and effectiveness. The observed trend has exhibited growth, and
ongoing efforts are being made to integrate ML and DA into the sensors and embedded
systems of intelligent systems. The scientific underpinnings of AI are highly intriguing,
prompting a reevaluation of our understanding of existential concepts, such as the purpose
of human existence and the nature of employment [10]. The lightning‑fast speed at which
ML and DA are driving AI makes it necessary for us to have a dialogue about the tenden‑
cies, challenges, and dangers that will eventually become more serious.
Despite the efficient elimination of redundant human labour and the ability of AI‑based
systems to provide outputs in a shorter timeframe, it can be argued that human inven‑
tiveness will always serve a distinct purpose in productive endeavours. The vast bulk of
ongoing research and development in AI fall under the umbrella term of “Narrow AI.”
This suggests that the employment of technology is only beneficial to a select few endeav‑
ours and not all of them. Despite this, our goal is to achieve something that is orders of
6 ◾ Future Communication Systems Using AI, IoT and Data Science
magnitude more significant than that. Keeping this in view, experts from a wide variety
of fields have worked together to accelerate the development of AI. The multidisciplinary
nature of AI has been reinforced via the collaborative endeavours of numerous academic
fields, such as statistics, philosophy, physics, computer science, sociology, mathematics,
biology, and psychology, among various others. The accumulation of data in each of
these areas is crucial in the growth of intelligence [11,12]. To understand what the under‑
lying principles are, some sort of analysis of these facts must be performed. In spite of
the fact that the human brain is fully capable of performing the task, it takes a significant
amount of time to do so.
This phenomenon can be ascribed to the existence of numerous undesirable attributes
in the data acquired from sources in the real world, encompassing but not restricted to the
subsequent:
Furthermore, there exist supplementary attributes, such as volatility and virility, among
others. AI is a systematic approach that aims to optimise the utilisation of data in a man‑
ner that ensures comprehensibility for data providers, allows for modifications to rectify
errors, has value within the specific application environment, and possesses meaningful‑
ness. Hence, AI exhibits a significant reliance on the approaches employed within the field
of data science. In a more expansive context, data science can be delineated as the scientific
discipline concerned with the development of tools and methodologies for the purpose
of scrutinising vast quantities of data with the objective of extracting valuable insights.
Consequently, the discipline represents an amalgamation of various distinct research sub‑
disciplines. The primary source of inspiration for the advancement of tools stems from the
domain of computer science, which predominantly focuses on the efficacy of algorithms
and the expandability of storage [13].
ML is often categorised as a “general purpose technology” akin to the steam engine and
electricity, facilitating a wide range of innovative developments and prospects, this statement
remains valid. The consequences pertaining to employment exhibit a level of complexity that
surpasses the simplistic focus on replacement and substitution. On the contrary, it is possible
that specific individuals may lack these particular attributes. Although the notion of the “end
of work” is not expected to occur in the near future, it is important to recognise the signifi‑
cant long‑term implications of ML on the economy and the labour force.
When addressing the potential benefits and drawbacks of ML and its possible effects on
the economy, there are two fundamental considerations to keep in mind. Significant prog‑
ress is yet to be made in developing highly intelligent machines [16]. According to scholarly
research, it has been observed that humans possess a more comprehensive array of skills
compared to machines [17]. The impact of technological advancements on wage inequality
is significant despite the positive effects they have had on income and living standards. The
initial wave of pre‑ML information technology (IT) systems, mainly, has generated tril‑
lions of dollars in economic value. However, there is substantial evidence supporting the
argument that technological progress has played a role in exacerbating wage disparities.
Numerous reasons, including the expanding process of globalisation, contribute to the
presence of inequality. However, it is important to acknowledge that the economic con‑
sequences of this phenomenon can be highly disruptive. The rapid and profound changes
that can be brought about by ML are primarily responsible for this upheaval. These changes
can take place in as little as ten years. Policymakers, business executives, engineers, and
academics all have a role to play here.
As robots replace more and more human workers in a process or industry, the value
of non‑SML occupations may rise. Technology can help people reach their full potential
and introduce them to new ways of doing things. Therefore, even within highly mecha‑
nised professions, the overall effect on the need for labour could be either positive or nega‑
tive. Jobs that are close substitutes for the capabilities of ML are more likely to see a drop
in labour demand, whereas jobs that are complements to these systems are more likely
to experience an increase in demand, but the broader economic effects can be complex
[14,18,19]. When an ML system can complete a task as well as a human but for less money,
profit maximisation is the goal. More and more bosses and CEOs are looking for ways to
automate human jobs. Impacts on productivity, prices, labour demand, and the structure
of diverse industries could have far‑reaching effects on the economy.
In comparison to traditional computer applications, the IoT introduces a situation where
the speed, diversity, volume, and intricacy of data are so immense that it becomes unfea‑
sible for a human programmer to provide specific, detailed, and precise job requirements
that can be utilised to execute the tasks. Consequently, the concept of ML is around the
acquisition of implicit learning abilities, enabling a computer or system to autonomously
educate itself, adapt to its surroundings, and make independent decisions. The smart con‑
cept in CPS or IoT can thus be made up for by using ML in this way [13,20].
ML is an approach to attaining AI that revolves around the concept of providing
computers with access to data, enabling them to acquire knowledge autonomously. This
concept is known as the “data‑driven learning hypothesis.” Researchers often assume a
8 ◾ Future Communication Systems Using AI, IoT and Data Science
premise that they possess the knowledge necessary to predict the future development of
AI that can rival human capabilities. Undoubtedly, significant advancements are being
made towards the objective at an increasingly rapid pace. A significant proportion of the
advancements achieved in recent years can be ascribed to the fundamental paradigm shifts
that have occurred in our comprehension of the operational mechanisms of AI. ML has
predominantly been the catalyst for these advances. Consequently, the decision to associ‑
ate ML with the capacity to bestow intelligence upon computers is a justifiable one.
Even just a few decades ago, the idea of being able to have a video conversation with
family members who lived on another continent was unfathomable to everyone. These
days, it is an everyday occurrence. All of these things are the result of technology becoming
more affordable and new devices appearing on the market with enhanced and augmented
capabilities [21]. Paying bills, sending emails, transferring money, or even scheduling a
taxi are some things that can be accomplished with a button on a smartphone. The term
“Internet of Computers” (IoC) has been in use since 1991, and it steadily expanded in scope
as an ever‑increasing number of individuals began to make use of it.
Data science and AI studies have been concentrating on this problem as their primary
focus. Therefore, IoT and AI together may represent a significant step forward. It’s not
just about cutting costs, being resourceful, reducing manual labour, or following the lat‑
est fashion. More than just making people’s lives simpler is at stake here. Many serious
issues, such as ethical and security problems, beset the IoT and are not going away anytime
soon. What counts is not how fascinating the IoT plus AI appears to be but rather how
the ordinary person perceives it [27]. As time goes on, the internet’s capabilities will shift
from those associated with the “Internet of Computers (IoC)” to those associated with the
“IoT.” Furthermore, integrating many elements, such as infrastructure, embedded devices,
human agents, intelligent objects, and physical surroundings, leads to the emergence of
highly interconnected systems commonly referred to as Cyber‑Physical Systems (CPS). In
the future, we will live in a world where the “Internet of Everything” is seamlessly con‑
nected to the “Smart Cyber‑Physical Earth.” There is hope that “data science,” in concert
with IoT and Cyber‑Physical Systems, will spark the next “smart revolution.” The primary
concern arises in determining the most effective approach to manage the vast quantities of
data given the limited processing capabilities presently accessible.
Being “smart” as a notion fascinates us much. However, the current state of our
resources is still quite a way off from matching human intelligence. Let’s use a smartphone
as an example, which, despite its “smart” label, can’t handle anything independently. For
instance, the gadget cannot put itself into “silent mode” for notifications and message
alerts when the owner is behind the wheel of a car. It would be a more useful piece of
technology if it could reduce the number of disruptions caused by notifications while the
owner is behind the wheel. For this system to operate, it is necessary to establish a wireless
connection between the individual, their smartphone, and the vehicle. If the smartphone’s
owner suddenly gets ill, a distress call should be placed to a member of the owner’s family
or a nearby medical facility.
To actualise this vision, it will once again be imperative to establish specific connections
and acquire comprehensive data pertaining to the individuals comprising the family unit
and the healthcare facilities involved. By consistently presenting such instances, it becomes
evident that in order to satisfy various sets of criteria, practically all entities in the physical
realm must establish connections with one another. If we want these things to have intel‑
ligence, we are going to have to resort to some form of AI.
personal computers, mobile phones, laptops, and tablet computers to the general popula‑
tion. Based on the forecasts provided by Gartner Inc., the global use of connected devices
is expected to reach 6.4 billion in 2016, reflecting a growth rate of 30% compared to the
previous year. According to the cited source [31], the figure is projected to increase to 20.8
billion by 2020. In 2016, it was observed that daily, an average of more than 5.5 million new
devices were being connected to the internet. These data highlight the significant capac‑
ity and possibilities presented by the IoT. The IoT encompasses diverse sectors due to its
fundamental characteristic of facilitating continuous connectivity among various things.
Consequently, the IoT might be construed as a means of amalgamating several disciplines.
Figure 1.1 provides a list of domains that are illustrative of those that are included in the
IoT [32]. These domains make up the IoT. Most of these fields have similar conceptual
underpinnings and methodological techniques. The IoT is basically a network that con‑
nects humans and a variety of inanimate and live creatures, such as appliances, crop fields,
plants, and animals. It is also known as the Internet of Everything (IoE). Using intelligent
devices hooked to both technologies and able to transmit, receive, and process data is the
means by which humans are connected to them. These intelligent things can send, receive,
and process data. These intelligent objects represent the entity (either a living being or an
inanimate object) to which they are connected in the network. This entity may be a living
being or an inanimate object [33,34].
Over the past decade, there has been a notable surge in the quantity of internet‑connected
gadgets, coinciding with the proliferation of concerns pertaining to cybersecurity. AI plays
a pivotal role in the vanguard of cybersecurity endeavours due to its capability to facilitate
the creation of intricate algorithms aimed at safeguarding critical infrastructure, including
the IoT. Nevertheless, hackers have successfully harnessed the potential of AI and have been
employing adversarial AI in their illicit activities. The utilisation of AI by cyber criminals
has been observed. This review study integrates information from many prior surveys and
research articles about IoT, AI, and attacks involving AI, as referenced by source [35–37].
12 ◾ Future Communication Systems Using AI, IoT and Data Science
augmenting the security of the IoT. This section encompasses a range of methodologies
that employ AI for the purpose of safeguarding the IoT infrastructure against malevo‑
lent hackers. In contrast, the IoT provides hackers with a significant advantage as they
only need to identify a single vulnerability to target an entire network, while cybersecurity
experts are tasked with safeguarding several entities. Consequently, there has been a rise in
the utilisation of AI by malevolent actors in the realm of cybersecurity as they endeavour
to evade detection by intricate algorithms designed to identify abnormal activities [38].
They do this to circumvent the algorithms.
• Data Protection and Privacy: The proliferation of data created by IoT devices gives
rise to substantial apprehensions over preserving data security and privacy. The
implementation of robust procedures is crucial in securing sensitive information.
• Scalability: The problem of controlling the growing number of networked devices
and guaranteeing smooth integration with AI systems becomes significant as IoT
networks expand in size and complexity.
• Interoperability: Interoperability is a critical factor in maximising the capabilities of
varied IoT devices and AI platforms. The process entails creating effective communi‑
cation and collaboration among various technologies.
• Energy Efficiency: The consideration of energy efficiency is of utmost importance for
IoT devices that are dependent on battery power. In order to optimise longevity and
reduce the need for maintenance, it is crucial to utilise energy‑efficient AI algorithms.
1.6 SUMMARY
The integration of AI with the IoT, known as AIoT, is a transformative occurrence that
is bringing about significant changes in several industries and impacting our daily lives.
The integration of AI with the IoT (AIoT) holds the potential to bring about significant
transformations in multiple sectors, including data analytics, energy efficiency, healthcare,
and urban development. Nonetheless, it also poses certain difficulties pertaining to the
protection of data privacy, the ability to handle larger volumes of data, the compatibility
between different systems, and the energy efficiency of the technology. The ongoing devel‑
opment of AI and IoT technologies holds significant promise for innovation and benefi‑
cial societal outcomes, therefore establishing AIoT as a crucial area of academic inquiry
and practical implementation. This article comprehensively analyses the intricate inter‑
play between AI and IoT, delving into their collective potential, existing implementations,
accompanying obstacles, and prospective developments. This article seeks to pro‑
vide insights into AI’s dynamic evolution and crucial function within the IoT domain.
By comprehensively evaluating relevant literature, this chapter attempts to highlight the
significance of AI in the context of linked smart systems.
Artificial Intelligence in the Internet of Things ◾ 15
REFERENCES
[1] Raschka, S, Patterson J, Nolet C. Machine learning in Python: Main developments and tech‑
nology trends in data science, machine learning, and artificial intelligence. Information.
2020;11(4):193.
[2] McCulloch WS, Pitts W. A logical calculus of the ideas immanent in nervous activity. The
Bulletin of the Mathematical Biophysics. 1943;5:115–133.
[3] Rosenblatt F. The perceptron: A probabilistic model for information storage and organization
in the brain. Psychological Review. 1958;65:386.
[4] LeCun Y, Boser B, Denker JS, Henderson D, Howard RE, Hubbard W, Jackel LD.
Backpropagation applied to handwritten zip code recognition. Neural Computation.
1989;1:541–551.
[5] Brynjolfsson E, Mitchell T. What can machine learning do? Workforce implications. Science.
2017;358(6370):1530–1534.
[6] Wahab F, Ullah I, Shah A, Khan RA, Choi A, Anwar MS. Design and implementation of a
real‑time object detection system based on a single shot detector and OpenCV. Frontiers in
Psychology. 2022;13:1039645.
[7] Khan HU, Hussain A, Nazir S, Ali F, Khan MZ, Ullah I. A service‑efficient proxy mobile IPv6
extension for IoT domain. Information. 2023;14(8):459.
[8] Mazhar T, Talpur DB, Shloul TA, Ghadi YY, Haq I, Ullah I, Ouahada K, Hamam H. Analysis
of IoT security challenges and its solutions using artificial intelligence. Brain Sciences.
2023;13(4):683.
[9] Khan I, Tian YB, Ullah I, Kamal MM, Ullah H, Khan A. Designing of E‑shaped microstrip
antenna using artificial neural network. International Journal of Computing, Communication
and Instrumentation Engineering. 2018;5(1):23–26.
[10] Tufail AB, Ma YK, Kaabar MK, Martínez F, Junejo AR, Ullah I, Khan R. Deep learning in
cancer diagnosis and prognosis prediction: A minireview on challenges, recent trends, and
future directions. Computational and Mathematical Methods in Medicine. 2021;2021:28
pages.
[11] Legg S, Hutter M, A collection of definitions of intelligence. Frontiers in Artificial Intelligence
and Applications. 2007;157:17.
[12] Wahab F, Zhao Y, Javeed D, Al‑Adhaileh MH, Almaaytah SA, Khan W, Saeed MS, Kumar
Shah R. An AI‑driven hybrid framework for intrusion detection in IoT‑enabled E‑health.
Computational Intelligence and Neuroscience. 2022;2022:11 pages.
[13] Ng A. What artificial intelligence can and can’t do right now. Harvard Business Review.
2016;9:1–4.
[14] Jia, J, Wang W. Review of reinforcement learning research. In 2020 35th Youth Academic
Annual Conference of Chinese Association of Automation (YAC), Zhanjiang, China, 2020,
pp. 186–191. IEEE.
[15] Liu X, Zhao Y, Xu T, Wahab F, Sun Y, Chen C. Efficient false positive control algorithms in big
data mining. Applied Sciences. 2023;13(8):5006.
[16] Khan I, Tian YB, Vllah H, Rahman SU, Kamal MM. Design an annular ring microstrip
antenna based on an artificial neural network. In 2018 2nd IEEE Advanced Information
Management, Communicates, Electronic and Automation Control Conference (IMCEC), Xi’an,
China, May 25, 2018, pp. 2033–2037. IEEE.
[17] Khan S, Ullah I, Ali F, Shafiq M, Ghadi YY, Kim T. Deep learning‑based marine big data
fusion for ocean environment monitoring: Towards shape optimization and salient objects
detection. Frontiers in Marine Science. 2023;9:1094915.
[18] Abideen ZU, Mazhar T, Razzaq A, Haq I, Ullah I, Alasmary H, Mohamed HG. Analysis of
enrollment criteria in secondary schools using machine learning and data mining approach.
Electronics. 2023;12(3):694.
16 ◾ Future Communication Systems Using AI, IoT and Data Science
[41] Linthicum D. App nirvana: When the internet of things meets the API economy. https://
techbeacon.com/app‑dev‑testing/app‑nirvana‑wheninternet‑things‑meets‑api‑economy.
Accessed 15 November 2019.
[42] Lu Y, Xu LD. Internet of Things (IoT) cybersecurity research: A review of current research
topics. IEEE Internet of Things Journal. 2019;6(2):2103–2115.
[43] Vorakulpipat C, Rattanalerdnusorn E, Thaenkaew P, Hai HD. Recent challenges, trends, and
concerns related to IoT security: An evolutionary study. In 2018 20th International Conference
on Advanced Communication Technology (ICACT), Chuncheon‑si Gangwon‑do, Korea
(South), 2018, pp. 405–410.
[44] Lakhani A. The role of artifcial intelligence in IoT and OT security. https://www.csoonline.
com/article/3317836/the‑role‑of‑artificial‑intelligen ce‑in‑iot‑and‑ot‑security.html. Accessed
11 February 2020.
[45] Pal R, Adhikari D, Heyat MB, Ullah I, You Z. Yoga meets intelligent Internet of Things: Recent
challenges and future directions. Bioengineering. 2023;10(4):459.
[46] Asif M, Khan WU, Afzal HR, Nebhen J, Ullah I, Rehman AU, Kaabar MK. Reduced‑complexity
LDPC decoding for next‑generation IoT networks. Wireless Communications and Mobile
Computing. 2021;2021:1–10.
[47] Waleed S, Ullah I, Khan WU, Rehman AU, Rahman T, Li S. Resource allocation of 5G
network by exploiting particle swarm optimization. Iran Journal of Computer Science.
2021;4(3):211–219.
[48] Khan HU, Sohail M, Ali F, Nazir S, Ghadi YY, Ullah I. Prioritizing the multi‑criterial fea‑
tures based on comparative approaches for enhancing security of IoT devices. Physical
Communication. 2023;59:102084.
[49] Mazhar T, Irfan HM, Haq I, Ullah I, Ashraf M, Shloul TA, Ghadi YY, Imran, Elkamchouchi
DH. Analysis of challenges and solutions of IoT in smart grids using AI and machine learning
techniques: A review. Electronics. 2023;12(1):242.
[50] Pendse A. Transforming cybersecurity with AI and ML: View. https://ciso.economictimes.indi‑
atimes.com/news/transforming‑cybersecuritywith‑ai‑and‑ml/67899197. Accessed 12 February
2020.
[51] Sethi P & Sarangi SR. Internet of things: architectures, protocols, and applications. Journal of
Electrical and Computer Engineering. 2017; 2017:25 pages.
[52] Yaqoob I, Hashem IAT, et al. Internet of Things forensics: Recent advances, taxonomy,
requirements, and open challenges. Future Generation Computer Systems. 2019;92:265–275.
[53] Topol EJ. High‑performance medicine: The convergence of human and artificial intelligence.
Nature Medicine. 2019;25:44–56.
[54] Al‑Fuqaha A, et al. Internet of Things: A survey on enabling technologies, protocols, and
applications. IEEE Communications Surveys & Tutorials. 2015;17:2347–2376.
Chapter 2
Artificial Intelligence
(AI)‑Powered Internet
of Things (IoT)
Smartening Up IoT
Amal Saif
Prince Sumaya University for Technology
2.1 INTRODUCTION
Artificial Intelligence (AI) and the Internet of Things (IoT) are concepts associated in many
studies, although each constitutes a pure science. IoT has become widely available, as many
of the devices present in our daily lives produce vast amounts of data that are transmitted,
analyzed, stored necessary, and made decisions based on these data. These devices include
computers, smartphones, wearable devices, and sensors that collect environmental infor‑
mation, medical instruments, etc.
By 2025, the number of IoT devices will reach more than 30 billion, predicts Gartner [1].
Also, according to a McKinsey estimate, the IoT sector will make between $2.7 and $6.2
trillion in economic contributions to the world economy by 2025 [2].
As PWC mentioned, AI and IoT are the main pillars of the Fourth Industrial Revolution,
improving the capability of different industry fields, increasing productivity, and decreas‑
ing costs [3]. AI with IoT is called a digital twin [4]. This twin creates smart cities with
intelligent lighting and safety control systems. This twin also shows in monitoring and
controlling water quality and management systems. It also exists in the healthcare sector.
There are light and dark sides in the realm where AI meets IoT. This cooperation benefits
18 DOI: 10.1201/9781032648309-3
Artificial Intelligence (AI)-Powered Internet of Things ◾ 19
the economics, livelihood, production, and sustainability levels. But it also has severe secu‑
rity, privacy, and complexity severe issues.
This merger has increased the presence of IoT devices, as applying it to various sectors
has become possible, leading to an energy drain. And for this reason, a new concept also
appeared, which is known as green IoT. Green IoT aims to have an energy‑efficient con‑
cern in the IoT design and to consider environmental sustainability. Many methods exist
to achieve these goals, such as making the devices work with minimal energy consump‑
tion, paying attention to recycling, and depending on renewable energy [5]. This chapter
provides different applications that merge these two concepts where the Internet of Things
devices provide massive data being analyzed through AI, lists some challenges, and pro‑
vides a brief background about these two technologies.
There are many definitions of smart cities, but they all agree that smart cities raise liv‑
ing standards through the use of innovative technologies and provide the citizens with
knowledge about what is happening around them through the communications that occur
between systems to achieve high standards of economics, education, health, safety, and
education. It is achieving sustainability in all areas of life, as shown in Figure 2.3. There is
real competition between countries to reach the best model of smart cities [14].
This methodology of combining these two terms in the energy generation field was pro‑
posed in Refs. [25,26]. They employed the ANN model to predict the total generated
power, providing good results among root mean square error (RMSE) and R2 metrics.
As this digital twin is a promising technology for raising living standards in all fields, and
many publications and articles have been discussed in detail and proposed unlimited con‑
tributions, it still has many challenges and gaps that innovative ideas can improve.
REFERENCES
1. H. Song, J. Bai, Y. Yi, J. Wu, and L. Liu, “Artificial intelligence enabled Internet of things:
Network architecture and spectrum access,” IEEE Computational Intelligence Magazine,
vol. 15, no. 1, pp. 44–51, 2020.
2. J. Zhang and D. Tao, “Empowering things with intelligence: A survey of the progress, chal‑
lenges, and opportunities in artificial intelligence of things,” IEEE Internet of Things Journal,
vol. 8, no. 10, pp. 7789–7817, 2020.
3. M. Anshari, “Workforce mapping of the fourth industrial revolution: Optimization to iden‑
tity,” Journal of Physics: Conference Series, vol. 1477, p. 072023, 2020.
4. E. B. Hansen and S. Bøgh, “Artificial intelligence and internet of things in small and medium‑sized
enterprises: A survey,” Journal of Manufacturing Systems, vol. 58, pp. 362–372, 2021.
5. M. F. Tuysuz and R. Trestian, “From serendipity to sustainable green IoT: Technical, indus‑
trial and political perspective,” Computer Networks, vol. 182, p. 107469, 2020.
6. G. S. Blair, K. Beven, R. Lamb, R. Bassett, K. Cauwenberghs, B. Hankin, G. Dean, N. Hunter,
L. Edwards, V. Nundloll, et al., “Models of everywhere revisited: A technological perspective,”
Environmental Modelling & Software, vol. 122, p. 104521, 2019.
7. A. Ghasempour, “Internet of things in smart grid: Architecture, applications, services, key
technologies, and challenges,” Inventions, vol. 4, no. 1, p. 22, 2019.
8. N. A. Jebril and Q. Abu Al‑Haija, “Artificial intelligence and machine learning methods in
bioinformatics and medical informatics,” Emerging Technologies in Biomedical Engineering
and Sustainable Telemedicine, pp. 13–30, 2021.
9. M. M. Belal and D. M. Sundaram, “Comprehensive review on intelligent security defenses in the
cloud: Taxonomy, security issues, ML/DL techniques, challenges and future trends,” Journal of
King Saud University‑Computer and Information Sciences, vol. 34, no. 10, pp. 9102–9131, 2022.
10. F. Liang, W. G. Hatcher, W. Liao, W. Gao, and W. Yu, “Machine learning for security and the
Internet of things: The good, the bad, and the ugly,” IEEE Access, vol. 7, pp. 158126–158147, 2019.
11. P. Malhotra, Y. Singh, P. Anand, D. K. Bangotra, P. K. Singh, and W.‑C. Hong, “Internet of
things: Evolution, concerns and security challenges,” Sensors, vol. 21, no. 5, p. 1809, 2021.
12. Z. Zhang, F. Wen, Z. Sun, X. Guo, T. He, and C. Lee, “Artificial intelligence‑enabled sensing
technologies in the 5g/internet of things era: From virtual reality/augmented reality to the
digital twin,” Advanced Intelligent Systems, vol. 4, no. 7, p. 2100228, 2022.
13. M. E. E. Alahi, A. Sukkuea, F. W. Tina, A. Nag, W. Kurdthongmee, K. Suwannarat, and S. C.
Mukhopadhyay, “Integration of IoT‑enabled technologies and artificial intelligence (AI) for
smart city scenario: Recent advancements and future trends,” Sensors, vol. 23, p. 5206, 2023.
14. C. S. Lai, Y. Jia, Z. Dong, D. Wang, Y. Tao, Q. H. Lai, R. T. Wong, A. F. Zobaa, R. Wu, and
L. L. Lai, “A review of technical standards for smart cities,” Clean Technologies, vol. 2, no. 3,
pp. 290–310, 2020.
15. H. Herath and M. Mittal, “Adoption of artificial intelligence in smart cities: A comprehen‑
sive review,” International Journal of Information Management Data Insights, vol. 2, no. 1,
p. 100076, 2022.
16. Q. Abu Al‑Haija, O. Mohamed, and W. Abu Elhaija, Predicting global energy demand for the
next decade: A time‑series model using nonlinear autoregressive neural networks. Energy
Exploration & Exploitation, vol. 41, no. 6, pp. 1884–1898, 2023. doi:10.1177/01445987231181919.
28 ◾ Future Communication Systems Using AI, IoT and Data Science
17. S. Bi, C. Wang, J. Zhang, W. Huang, B. Wu, Y. Gong, and W. Ni, “A survey on artificial intel‑
ligence aided internet‑of‑things technologies in emerging smart libraries,” Sensors, vol. 22,
no. 8, p. 2991, 2022.
18. S. Sepasgozar, R. Karimi, L. Farahzadi, F. Moezzi, S. Shirowzhan, S. M. Ebrahimzadeh, F. Hui,
and L. Aye, “A systematic content review of artificial intelligence and the internet of things
applications in smart home,” Applied Sciences, vol. 10, no. 9, p. 3074, 2020.
19. J. Oh, S. Yu, J. Lee, S. Son, M. Kim, and Y. Park, “A secure and lightweight authentication
protocol for IoT‑based smart homes,” Sensors, vol. 21, no. 4, p. 1488, 2021.
20. X. Zhang, Z. Cao, and W. Dong, “Overview of edge computing in the agricultural internet of
things: Key technologies, applications, challenges,” IEEE Access, vol. 8, pp. 141748–141761, 2020.
21. A. Casta˜neda‑Miranda and V. M. Casta˜no‑Meneses, “Internet of things for smart farm‑
ing and frost intelligent control in greenhouses,” Computers and Electronics in Agriculture,
vol. 176, p. 105614, 2020.
22. N. Misra, Y. Dixit, A. Al‑Mallahi, M. S. Bhullar, R. Upadhyay, and A. Martynenko, “IoT,
big data, and artificial intelligence in agriculture and food industry,” IEEE Internet of Things
Journal, vol. 9, no. 9, pp. 6305–6324, 2020.
23. Q. Abu Al‑Haija, “SysML‑based design of autonomous multi‑robot cyber‑physical system
using smart IoT modules: A case study,” In: Hemanth, D. J. (ed) Machine Learning Techniques
for Smart City Applications: Trends and Solutions. Advances in Science, Technology &
Innovation. Springer, Cham, pp. 203–219, 2022. doi:10.1007/978‑3‑031‑08859‑9_16.
24. Y. Lu, X. Xu, and L. Wang, “Smart manufacturing process and system automation – A critical
review of the standards and envisioned scenarios,” Journal of Manufacturing Systems, vol. 56,
pp. 312–325, 2020.
25. V. Puri, S. Jha, R. Kumar, I. Priyadarshini, M. Abdel‑Basset, M. Elhoseny, H. V. Long, et al.,
“A hybrid artificial intelligence and internet of things model for generation of renewable
resource of energy,” IEEE Access, vol. 7, pp. 111181–111191, 2019.
26. Q. A. Al‑Haija, M. I. Al Tarayrah and H. M. Enshasy, “Time‑series model for forecasting
short‑term future additions of renewable energy to worldwide capacity,” In: 2020 International
Conference on Data Analytics for Business and Industry: Way Towards a Sustainable Economy
(ICDABI), Sakheer, Bahrain, 2020, pp. 1–6, doi:10.1109/ICDABI51230.2020.9325625.
27. R. F. Mansour, A. El Amraoui, I. Nouaouri, V. G. D´ıaz, D. Gupta, and S. Kumar, “Artificial
intelligence and internet of things enabled disease diagnosis model for smart healthcare sys‑
tems,” IEEE Access, vol. 9, pp. 45137–45146, 2021.
28. A. Kishor and C. Chakraborty, “Artificial intelligence and internet of things‑based health‑
care 4.0 monitoring system,” Wireless Personal Communications, vol. 127, no. 2, pp. 1615–
1631, 2022.
29. D. Nahavandi, R. Alizadehsani, A. Khosravi, and U. R. Acharya, “Application of artificial
intelligence in wearable devices: Opportunities and challenges,” Computer Methods and
Programs in Biomedicine, vol. 213, p. 106541, 2022.
30. Q. Shi, B. Dong, T. He, Z. Sun, J. Zhu, Z. Zhang, and C. Lee, “Progress in wearable electron‑
ics/photonics‑moving toward the era of artificial intelligence and internet of things,” InfoMat,
vol. 2, no. 6, pp. 1131–1162, 2020.
31. M. Kuzlu, C. Fair, and O. Guler, “Role of artificial intelligence in the Internet of things (IoT)
cybersecurity,” Discover the Internet of Things, vol. 1, pp. 1–14, 2021.
32. H. Wu, H. Han, X. Wang, and S. Sun, “Research on artificial intelligence enhancing Internet
of things security: A survey,” IEEE Access, vol. 8, pp. 153826–153848, 2020.
33. A.A. Alsulami, Q. Abu Al‑Haija, A. Tayeb, and A. Alqahtani, “An intrusion detection and
classification system for IoT traffic with improved data engineering,” Applied Sciences, vol. 12,
p. 12336, 2022. doi:10.3390/app122312336.
34. V. Prutyanov, N. Melentev, D. Lopatkin, A. Menshchikov, and A. Somov, “Developing IoT
devices empowered by artificial intelligence: Experimental study,” In: 2019 Global IoT Summit
(GIoTS), Aarhus, Denmark, 2019, pp. 1–6, IEEE.
Artificial Intelligence (AI)-Powered Internet of Things ◾ 29
35. H. Wang, L. Li, Y. Cui, N. Wang, F. Shen, and T. Wei, “Mbsnn: A multi‑branch scalable neu‑
ral network for resource‑constrained IoT devices,” Journal of Systems Architecture, vol. 142,
p. 102931, 2023.
36. Z. Lv, L. Qiao, S. Verma, and Kavita, “AI‑enabled iot‑edge data analytics for connected living,”
ACM Transactions on Internet Technology, vol. 21, no. 4, pp. 1–20, 2021.
37. R. Younisse, A. Ahmad, and Q. Abu Al‑Haija, “Explaining intrusion detection‑based convolu‑
tional neural networks using Shapley additive explanations (SHAP),” Big Data and Cognitive
Computing, vol. 6, no. 4, p. 126, 2022.
38. M. Younan, E. H. Houssein, M. Elhoseny, and A. A. Ali, “Challenges and recommended tech‑
nologies for the industrial Internet of things: A comprehensive review,” Measurement, vol.
151, p. 107198, 2020.
39. B. Mao, Y. Kawamoto, and N. Kato, “AI‑based joint optimization of QoS and security for 6g
energy harvesting Internet of things,” IEEE Internet of Things Journal, vol. 7, no. 8, pp. 7032–
7042, 2020.
40. S. Hadzovic, S. Mrdovic, and M. Radonjic, “A path towards an internet of things and arti‑
ficial intelligence regulatory framework,” IEEE Communications Magazine, vol. 61, no. 7,
pp. 90–96, 2023.
41. D. C. Nguyen, M. Ding, P. N. Pathirana, A. Seneviratne, J. Li, D. Niyato, O. Dobre, and H. V.
Poor, “6g Internet of things: A comprehensive survey,” IEEE Internet of Things Journal, vol. 9,
no. 1, pp. 359–383, 2021.
42. Q. A. Al‑Haija and N. A. Jebril, “ARM cortex based modeling and implementation of a
self‑controlled traffic light system,” In: IET Conference Proceedings, pp. 607–612, 2021,
doi:10.1049/icp.2021.0942.
Chapter 3
Sher Taj
Northeastern University
Daqing Normal University
Hina Hassan
Harbin Normal University
Inam Ullah
Gachon University
Abdullah Alwabli
Umm Al‑Qura University
Yuning Tao
South China University of Technology
Habib Ullah
Nanjing University of Aeronautics and Astronautics
30 DOI: 10.1201/9781032648309-4
Bridging the Future ◾ 31
3.1 INTRODUCTION
In the ever‑evolving landscape of technology, two groundbreaking innovations have
emerged as catalysts for transformative change: AI and IoT [1]. These two technological
giants have not only redefined the way we connect and communicate but also paved the
way for a future where our devices, systems, and environments become more intelligent
and interconnected than ever.
In this chapter, we embark on a journey into the fascinating world of IoT and AI, explor‑
ing their individual realms and uncovering the profound impact they have on communica‑
tion systems. We will delve into the fundamental concepts, mechanics, and applications of
both IoT and AI, shedding light on how they work in tandem to revolutionize the way we
monitor, control, and interact with the world around us.
From the foundational principles of IoT and its ecosystem components to the intricate
workings of AI, we will unravel the complexities of these technologies. We will discuss the
myriad benefits and challenges that arise from their convergence, as well as the boundless
possibilities they offer for shaping our future. As we navigate through this chapter, you will
gain a comprehensive understanding of not only what IoT and AI are but also how they
synergize to create AI‑aided IoT technologies.
Yet, with these advancements come significant concerns, primarily about security and
privacy. Our devices often transmit information to external entities, including home secu‑
rity providers, energy suppliers, and vehicle makers. Online, smart assistants analyze our
spoken instructions, which could potentially lead to data being compromised. Such data,
if misappropriated, could compromise our security and privacy. Questions about the data
type and volume collected, and who has access to it, remain pertinent. Each improperly
managed device can become a security vulnerability, regardless of its user—be it an indi‑
vidual, a business, or a government entity. All stakeholders need to proactively address
these security concerns.
Many are unaware of the depth and breadth of data collection by their smart devices.
This finding serves as the main argument of my thesis, which seeks to answer questions
such as: How does your smart TV observe your activities? How might hackers exploit
security weaknesses in everyday items like light bulbs? Or why might your heating
system request your phone number, potentially relaying it to marketers? It’s high time
we prioritize security, privacy, and safety. Consumers should be discerning about the
smart devices they purchase and the paramount considerations when using them.
In conclusion, manufacturers bear a significant responsibility. As connected devices
become prime targets for hackers and cybercriminals, manufacturers must ensure the
security of their products, routinely update them, and empower consumers to counteract
the ongoing threats posed by malicious cyber activities.
IoT is essentially a network of uniquely identifiable devices that are connected to the inter‑
net everywhere. This network allows these objects to relay information to manufactur‑
ers, operators, and other interconnected devices using the Internet’s telecommunications
infrastructure. It enables tangible objects to relay specific data and to be remotely managed
over the Internet. This facilitates a more seamless merger between our physical environ‑
ment and digital systems, enhancing efficiency, precision, and economic advantage. Every
object is distinctively identified through its in‑built computing mechanism, enabling it to
function within the broader Internet framework.
There is a consensus among businesses and tech experts about the exponential growth
in the number of IoT‑connected items. Gartner envisaged a future where the operational
count of devices would reach a staggering 20 billion by 2020. On the other hand, Cisco’s
Bridging the Future ◾ 33
homeowners by showing them outdated footage while a burglary is underway. For sectors
with high stakes, such as patient health monitoring or banking, the need for tight control
is even more pronounced.
For example, consider owning a sports clothing and accessory business and wanting to
ascertain the popularity of various optional sports gear, such as fishing equipment, skat‑
ing gear, or skiing accessories. Through IoT solutions, sensors can be employed to monitor
which sections of the store attract the most traffic and where customers linger the longest.
Leveraging these data, one can refine the business approach, identify top‑selling items,
ensure popular products remain in stock, and optimize both time and resources.
The reach of IoT is vast, spanning numerous economic sectors. Its commercial uses span
the gamut, from household gadgets to transportation to factories to hospitals to banks to
the military [13]. Moreover, IoT systems can integrate AI and machine learning (ML) to
enhance and streamline data collection.
3.8.1 Devices
IoT devices encompass various hardware forms such as sensors, gadgets, household appli‑
ances, and machines designed for specific tasks and with the capability to transmit data
online. Mobile phones, factory gear, military hardware, healthcare gadgets, environmental
sensors, and more might all benefit from using these components [14]. Consequently, these
devices find their application in a wide range of products, from lights, refrigerators, secu‑
rity systems, and printers to mobile phones, washing machines, headphones, and wearable
gadgets. Their complexity varies, and they can gather and disseminate data, facilitated by
the affordability of computer chips and the existence of swift wireless networks.
3.8.2 Sensors
Sensors are an indispensable part of the IoT infrastructure. They have the capability to
detect and observe changes in their surroundings and convert these observations into
signals comprehensible to both humans and machines [15]. There are two main types of
sensors: active and passive, as well as analog and digital. Common types of sensors used
in the IoT include thermometers, accelerometers, gyroscopes, gas analyzers, hygrometers,
barometers, light detectors, and infrared cameras. Their pivotal role enhances operational
efficacy, reduces costs, and boosts worker safety and productivity [16].
Bridging the Future ◾ 37
3.8.3 Connectivity
The essence of IoT devices lies in their ability to connect via the internet. The scale of these
networks can be adapted based on the size and reach of the IoT system [17]:
and fifth‑generation mobile networks; and geographic information systems are all essen‑
tial to the smooth functioning of the IoT. Of these technologies, IPv6, RFID, and WSN are
deemed fundamental for the optimal functioning of the IoT. Figure 3.6 showcases various
technologies implemented in different IoT systems.
3.10.1 Connectivity
The global reach of the internet has expanded, yet many remote areas and small vil‑
lages remain offline. Companies like Google have explored innovative solutions like bal‑
loon‑powered internet, but universal internet coverage remains elusive. A foundational
assumption of IoT is the availability of consistent, fast, and reliable network connectivity,
which is currently one of the biggest hurdles.
3.10.3 Interoperability
Establishing meaningful connections between a myriad of devices is challenging. For
seamless functioning, IoT demands standardized platforms that ensure connectiv‑
ity, remote operability, cross‑device programmability, and independence from specific
models, manufacturers, or industries. Essentially, IoT should be platform‑agnostic and
compatible with varied operating systems, OEMs, connectors, versions, and protocol
standards.
Bridging the Future ◾ 39
3.11.1 Agriculture
With the escalating need for food, there is immense strain on agricultural production.
IoT can enhance agricultural yield and productivity, as well as modernize storage and
distribution methods. In developing nations, high initial investment costs often hinder
growth in this sector. M2M or IoT solutions can alleviate these challenges. Presently, devel‑
oped regions like North America are leading in satellite‑based M2M/IoT adoption, while
regions like the Middle East and Africa anticipate a 5.2% annual growth. In Asia, agricul‑
ture’s potential growth could double revenues by 2023, raising its global share from 17.6%
in 2013 to 23.2% in 2023.
3.11.3 Healthcare
In developing nations, dropping sensor costs will soon amplify IoT’s advantages. These
reduced expenses will foster the increased application of IoT in healthcare, exemplified by
innovations like smart bandages. These bandages, with integrated sensors, can notify both
patients and doctors about healing complications. Very Small Aperture Terminal networks
are also essential, acting as a fallback for terrestrial networks, especially vital in healthcare
in developing regions. The adoption of IoT tools, such as wearables and remote monitoring
40 ◾ Future Communication Systems Using AI, IoT and Data Science
instruments, will surge, particularly after the COVID‑19 pandemic, which hastened tele‑
health efforts.
FIGURE 3.7 Evolution from conventional libraries to intelligent libraries through the
implementation of AI and IoT.
Presently, most AI initiatives fall under “Narrow AI,” which enhances specific tasks. Yet,
the aspiration is to surpass this limitation.
The development of AI is being driven by a convergence of fields such as computing,
philosophy, mathematics, biology, statistics, psychology, physics, and sociology. These
fields collaborate to accentuate AI’s interdisciplinary character. The essence of intelligence
lies in the vast data emerging from these domains. Analyzing these data to discern under‑
lying principles is crucial. While the human brain can achieve this, it is often a lengthy
process due to the challenging characteristics of real‑world data, such as its immense vol‑
ume, unstructured format, diverse origins, the requirement for real‑time processing, and
constant flux. Other nuances include volatility and virality.
In essence, AI represents a sophisticated approach to effectively harness these data,
making it comprehensible, amendable (especially when inaccuracies arise), relevant, and
insightful. Central to AI’s prowess is its dependency on data science techniques. Broadly
speaking, data science crafts tools and methodologies to scrutinize vast datasets and extract
valuable insights. Thus, data science emerges as a convergence of multiple research areas.
In contrast to conventional libraries, individuals can primarily experience the advan‑
tages of library advancement propelled by AI and IoT across three main areas: intelligent
services, sustainable smart solutions, and enhanced security, as illustrated in Figure 3.7.
end user. When active, IoT devices generate and collect data, which AI then evaluates to
offer insights, enhancing efficiency and productivity. These insights are derived through
techniques like data learning.
AIoT systems can be classified into two primary categories: cloud‑based and edge‑based.
1. Device Layer: This layer encompasses diverse hardware types such as tags, beacons,
sensors, vehicles, industrial equipment, embedded systems, and health and fitness
gadgets.
2. Connectivity Layer: This segment includes field and cloud gateways, which can be
either hardware or software components, connecting cloud storage to controllers,
sensors, and other smart devices.
3. Cloud Layer: This layer is responsible for data processing through an AI engine, data
storage, visualization, analytics, and data accessibility via an API.
4. User Communication Layer: This section involves web portals and mobile apps.
the implementation of AIoT architecture at the edge. The edge‑based AIoT is divided into
three key layers:
1. Collection Terminal Layer: This layer spans a variety of hardware devices such as
embedded systems, vehicles, industrial machinery, tags, beacons, sensors, mobility
gadgets, and health and fitness devices, all linked to the gateway over existing power
lines.
2. Connectivity Layer: This layer includes the field gateways to which the collection
terminal layer connects over existing power lines.
3. Edge Layer: This part provides facilities for data storage, processing, and generating
insights.
• Operational Efficiency: IoT devices with AI capabilities can interpret data to identify
patterns and insights, allowing systems to adjust operations for greater efficiency.
• Real‑Time Adjustments: Systems can produce and evaluate data to pinpoint failures
and make necessary modifications immediately.
• Data Analysis Efficiency: Less human intervention is needed to monitor IoT devices,
leading to cost savings.
• Scalability: The number of devices within an IoT framework can be augmented to
refine existing processes or add new functionalities.
• Innovative Technology Synergy: AIoT is revolutionary, providing mutual advantages
for both AI and IoT. IoT improves AI by increasing connection and data exchange,
whereas AI enhances ML and decision‑making in IoT. Enhanced value extraction
from IoT data is one way in which this consolidation might help businesses improve
their products and services.
Bridging the Future ◾ 45
However, AIoT is not without potential pitfalls. For instance, a malfunctioning autono‑
mous delivery robot could delay product deliveries. Smart retail outlets might misread a
customer’s facial features, leading to unintentional shoplifting, or a self‑driving car might
overlook an approaching stop sign, resulting in an accident.
AIoT also presents several challenges:
which use a lot of power, are installed in study nooks, data centers, and compact stacks.
Overusing these devices in low‑traffic areas is inefficient and wastes resources. This issue
can be addressed by either placing the right number of air conditioners or dynamically
adjusting their operational modes, informed by historical environmental data.
Regarding security, potential malicious borrowing activities can be preemptively iden‑
tified through AI’s analysis of past borrowing data collected from RFID self‑checkout
machines. This can then initiate further verification steps, such as confirming alert mes‑
sages from the AI system. Generally, AI can swiftly detect anomalies when there’s a notice‑
able departure from standard operations.
However, solely relying on AI has its limitations. For instance, the RFID monitoring
system might alert staff if someone with bad intentions tries to leave the library with stolen
books in their luggage. Moreover, without IoT devices, it’s impossible to gather and analyze
the reader data essential for AI algorithms [35–38].
The benefits of both AI and IoT in the setting of a Smart Library can be amplified
by the other. A holistic exploration of how AI supports IoT in the “Smart Library” is
approached from three distinct perspectives.
FIGURE 3.10 A diagram depicting how the classroom’s available seats are assigned and used.
Bridging the Future ◾ 47
FIGURE 3.11 Depicting the flow chart of the personalized activities learning system.
students to form study groups based on real‑time location and interests, thus optimizing
space and enhancing smart service efficiency.
Book sorting is crucial for enhancing the efficacy of the book circulation service.
Barcode and DL‑powered optical character recognition (OCR) work together to dramati‑
cally improve productivity [45]. Figure 3.11 depicts the organizational structure of the sys‑
tem, including the components of the Data Collection Model as well as the Data Process
Model. In Ref. [46], a drone robot equipped with visual localization and OCR assists with
book inventory tasks. The setup in Refs. [47–49] uses CC and recommendation systems to
suggest books to students based on their reading history, saving time and costs. For the
visually impaired, the solution in Refs. [50–52] uses OCR, deep learning, and sensors to
convert physical book content into audio. Lastly, Ref. [53] introduces an innovative model
for online teaching. Using real‑time class interaction data and ML, the system updates
cloud‑stored data, offering tailored evaluations of students’ cognitive features.
In Ref. [54], a set of solutions is presented to address the issue of incorrectly reading
RFID tags during the circulation process. By using prior received signal strength (RSS)
measurements combined with KNN, it is possible to accurately locate the RFID tags on
books. This aids in differentiating between correctly identified books and those that were
misread. Similarly, Ref. [55] presents a technique that uses RFID and ML methods to pre‑
cisely localize bookshelves. This method significantly enhances the precision in identifying
books situated in specific rows, cabinets, and racks. Another technique, as mentioned in
Refs. [56–58], relies on RSS data from RFID combined with DL to locate books on shelves.
The success of a personalized book service may be evaluated in part by how well it
captures the reader’s attention to a certain title. In Ref. [59], researchers combine RNN
DL with CRFID to record users’ book‑related behaviors, including browsing, rearrang‑
ing, page‑turning, borrowing, and reading. Data on these activities are gathered through
CRFID, which inherently has sequential characteristics, making it particularly suited for
RNN‑based ML. This approach aids in offering valuable recommendations to meet reader
demands. The detailed process of Ref. [59] is depicted in Figure 3.12.
including carbon footprints. Therefore, there is an urgent need to manage resource consump‑
tion sustainably. AI‑enhanced IoT can strategically schedule sustainability based on real‑world
requirements. As documented in Ref. [61], a series of AI‑supported IoT methods have been
introduced to adjust the lighting in libraries, optimizing natural light usage. The smart mode
may be activated by going into the device’s settings menu. The system’s sensors then mea‑
sure light intensity and angle, adjusting autonomously based on user settings, as depicted in
Figure 3.13. In another study [62], a system designed to boost sustainability efficiency in smart
libraries is introduced. Several sensor networks, servers, as well as sensors are all part of this
system. These sensors gather data on aspects like temperature, humidity, and user details, as
illustrated in Figure 3.14. All data are harmonized with the server, allowing the server’s control
FIGURE 3.13 Depicts the smart light shade system’s management structure.
Bridging the Future ◾ 49
FIGURE 3.14 The smart sustainability managing framework’s practical procedure for accomplish‑
ing tasks.
center to make smart decisions on equipment operation. For instance, lighting can be adjusted
based on historical and real‑time data. Lastly, Ref. [63] presents an innovative approach to
maintaining optimal environmental conditions. This approach utilizes multiple sensors and
visual data monitoring to ensure the best possible environment for preservation.
FIGURE 3.16 Illustrates the structure of an IoT warning system enhanced with AI workflow.
3.17 CONCLUSION
In conclusion, the convergence of the Internet of Things (IoT) and Artificial Intelligence
(AI) marks a significant milestone in technological advancement, offering groundbreaking
possibilities that promise to redefine our interaction with the physical and digital worlds.
This confluence, often referred to as AIoT, amalgamates the pervasive connectivity of IoT
with the cognitive capabilities of AI, paving the way for smarter devices, more intuitive
interfaces, and streamlined operations.
Both IoT and AI independently have brought about significant changes, making our
lives more convenient, efficient, and interconnected. When fused, they promise a world
where cities are smarter, industries are more automated, and everyday experiences, from
household tasks to library visits, are enhanced. The potential applications span from
urban planning and traffic management to revolutionizing the library experience with
AIoT‑driven solutions, such as personalized book services, intelligent seat management,
and efficient resource consumption.
However, the marriage of these two domains is not without its challenges. The extensive
data collection and sharing brought about by IoT devices, coupled with the processing
Bridging the Future ◾ 51
power and decision‑making capabilities of AI, amplify concerns related to security, pri‑
vacy, and complexity. As these technologies become more intertwined, the vulnerabilities
they may introduce become more intricate, requiring a proactive approach from all stake‑
holders. Cybersecurity, privacy risks, and the complexities in integrating and managing
AIoT technologies are issues that need earnest attention. The cost implications, while pro‑
viding transformative outcomes, must also be assessed judiciously.
It is of paramount importance for manufacturers, developers, governments, and con‑
sumers to prioritize security, privacy, and ethical considerations. Only with a balanced
approach can we harness the full potential of the AIoT synergy, ensuring that the benefits
are maximized, and the associated risks are minimized. As we step into this new era of
interconnected intelligence, the challenge lies not just in technological innovation but in
responsible and informed adoption. The future beckons a world transformed by AIoT, but
it is up to us to navigate this journey wisely and ethically.
REFERENCES
[1] Riahi A, Challal Y, Natalizio E, Chtourou Z, Bouabdallah A, “A systemic approach for IoT
security,” In 2013 IEEE International Conference on Distributed Computing in Sensor Systems,
Cambridge, MA, USA, 2013, pp. 351–355.
[2] Chan M, Campo E, Estève D, Fourniols JY, “Smart homes‑current features and future per‑
spectives,” Maturitas, vol. 64, no. 2, pp. 90–97, 2009.
[3] Stojkoska BLR, Trivodaliev KV, “A review of Internet of Things for smart home: Challenges
and solutions,” Journal of Cleaner Production, vol. 140, pp. 1454–1464, 2017.
[4] Khan WU, Imtiaz N, Ullah I, “Joint optimization of NOMA‐enabled backscatter communi‑
cations for beyond 5G IoT networks,” Internet Technology Letters, vol. 4, no. 2, p. e265, 2021.
[5] Gupta D, Juneja S, Nauman A, Hamid Y, Ullah I, Kim T, Tag eldin EM, Ghamry NA,
“Energy saving implementation in hydraulic press using industrial Internet of Things (IIoT),”
Electronics, vol. 11, no.23, p. 4061, 2022.
[6] Vermesan O, Friess P, Internet of Things: Converging Technologies for Smart Environments and
Integrated Ecosystems, Aalborg: River Publishers, 2013.
[7] Ullah I, Qian S, Deng Z, Lee JH, “Extended Kalman filter‑based localization algorithm by
edge computing in wireless sensor networks,” Digital Communications and Networks, vol. 7,
no. 2, pp. 187–195, 2021.
[8] Mazhar T, Irfan HM, Haq I, Ullah I, Ashraf M, Shloul TA, Ghadi YY, Imran, Elkamchouchi
DH, “Analysis of challenges and solutions of IoT in smart grids using AI and machine learn‑
ing techniques: A review,” Electronics, vol. 12, no.1, p. 242, 2023.
[9] Suciu G, Vulpe A, Halunga S, Fratu O, Todoran G, Suciu V, “Smart cities built on resilient
cloud computing and secure Internet of Things,” In 2013 19th International Conference on
Control Systems and Computer Science, Bucharest, Romania, May 2013, pp. 513–518.
[10] Pal R, Adhikari D, Heyat MB, Ullah I, You Z, “Yoga meets intelligent Internet of Things:
Recent challenges and future directions,” Bioengineering, vol. 10, no. 4, p. 459, 2023.
[11] Khan HU, Hussain A, Nazir S, Ali F, Khan MZ, Ullah I, “A service‑efficient proxy mobile
IPv6 extension for IoT domain,” Information, vol. 14, no. 8, p. 459, 2023.
[12] Al‑Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M, “Internet of Things: A
survey on enabling technologies, protocols, and applications,” IEEE Communications Surveys
& Tutorials, vol. 17, no. 4, pp. 2347–2376, 2015.
[13] Alcaide A, Palomar E, Montero‑Castillo J, Ribagorda A, “Anonymous authentication for pri‑
vacy‑preserving IoT target‑driven applications,” Computers & Security, vol. 37, pp. 111–123,
2013.
52 ◾ Future Communication Systems Using AI, IoT and Data Science
[14] Miorandi D, Sicari S, De Pellegrini F, Chlamta I, “Internet of Things: Vision, applications and
research challenges,” Ad Hoc Networks, vol. 10, no. 7, pp. 1497–1516, 2012.
[15] Abdmeziem MR, Tandjaoui D, “Tailoring mikey‑ticket to e‑health applications in the con‑
text of Internet of Things,” In International Conference on Advanced Networking, Distributed
Systems and Applications (Short Papers), 2014, Bejaia, Algeria, pp. 72–77.
[16] Schurgers C, Srivastava MB, “Energy efficient routing in wireless sensor networks,” IEEE
Military Communications Conference MILCOM. Communications for Network‑Centric
Operations: Creating the Information Force, 200, pp. 357–361, 2001.
[17] Guoqiang H, Wee Peng T, Yonggang W, “Cloud robotics: Architecture, challenges and appli‑
cations,” IEEE Network, vol. 26, no. 3, pp. 21–28, 2012.
[18] Michalski RS, Carbonell JG, Mitchell TM, Machine Learning: An Artificial Intelligence
Approach, Berlin, Germany: Springer Science & Business Media, 2013.
[19] Witten IH, Frank E, “Data mining: Practical machine learning tools and techniques,”
In Morgan Kaufmann. Amsterdam: Elsevier, 2006, 558 pages.
[20] Monostori L, Kádár B, Bauernhansl T, et al., “Cyber‑physical systems in manufacturing,”
CIRP Annals, vol. 65, no. 2, pp. 621–641, 2016.
[21] Lee EA, Seshia SA, Introduction to Embedded Systems: A Cyber‑Physical Systems Approach,
Cambridge, MA: MIT Press, 2016.
[22] Hassan QF, Khan AR, Madani SA, “Internet of Things: Challenges, advances, and applica‑
tions,” In Chapman & Hall/CRC Computer and Information Science Series, Boca Raton, FL:
CRC Press, 2017, 436 pages.
[23] Asif M, Khan WU, Afzal HR, Nebhen J, Ullah I, Rehman AU, Kaabar MK, “Reduced‑complexity
LDPC decoding for next‑generation IoT networks,” Wireless Communications and Mobile
Computing, vol. 2021, pp. 1–10, 2021.
[24] Mazhar T, Talpur DB, Shloul TA, Ghadi YY, Haq I, Ullah I, Ouahada K, Hamam H, “Analysis
of IoT security challenges and its solutions using artificial intelligence,” Brain Sciences, vol. 13,
no. 4, p. 683, 2023.
[25] Fortino G, Trunfio P, Internet of Things Based on Smart Objects: Technology, Middleware and
Applications, New York: Springer, 2014.
[26] Khan HU, Sohail M, Ali F, Nazir S, Ghadi YY, Ullah I, “Prioritizing the multi‑criterial fea‑
tures based on comparative approaches for enhancing security of IoT devices,” Physical
Communication, vol. 59, p. 102084, 2023.
[27] Ullah I, Chen J, Su X, Esposito C, Choi C, “Localization and detection of targets in underwater
wireless sensor using distance and angle‑based algorithms,” IEEE Access, vol. 7, pp. 45693–
45704, 2019.
[28] Yang LT, Di Martino B, Zhang Q, “Internet of everything,” Mobile Information System, vol. 17,
pp. 1–3, 2017.
[29] Baheti R, Gill H, “Cyber‑physical systems,” Impact Control Technology, vol. 12, no. 1, pp. 161–
166, 2011.
[30] Gorman MM, Database Management Systems: Understanding and Applying Database
Technology. Butterworth‑Heinemann, Oxford, 2014.
[31] Theodoridis S, Koutroumbas K, Pattern Recognition, Elsevier Science, 2008.
[32] Marz N, Warren J, Big Data: Principles and Best Practices of Scalable Real‑Time Data Systems,
Simon and Schuster, New York, 2015.
[33] Raza MA, Abolhasan M, Lipman J, Shariati N, Ni W, Jamalipour A, “Statistical learning‑based
grant‑free access for delay‑sensitive Internet of Things applications,” IEEE Transactions on
Vehicular Technology, vol. 71, no. 5, pp. 5492–5506, 2022.
[34] Mazhar T, Irfan HM, Khan S, Haq I, Ullah I, Iqbal M, Hamam H, “Analysis of cyber security
attacks and its solutions for the smart grid using machine learning and blockchain methods,”
Future Internet, vol. 15, no. 2, p. 83, 2023.
Bridging the Future ◾ 53
[35] Khan I, Tian YB, Ullah I, Kamal MM, Ullah H, Khan A, “Designing of E‑shaped microstrip
antenna using artificial neural network,” International Journal of Computing, Communication
and Instrumentation Engineering, vol. 5, no.1, pp. 23–26, 2018.
[36] Cui Q, Zhang Z, Shi Y, Ni W, Zeng M, Zhou M, “Dynamic multichannel access based on deep
reinforcement learning in distributed wireless networks,” IEEE Systems Journal, vol. 16, no. 4,
pp. 5831–5834, 2021.
[37] Emami Y, Wei B, Li K, Ni W, Tovar E, “Joint communication scheduling and velocity con‑
trol in multi‑UAV‑assisted sensor networks: A deep reinforcement learning approach,” IEEE
Transactions on Vehicular Technology, vol. 70, no. 10, pp. 10986–10998, 2021.
[38] Li K, Ni W, Dressler F, “LSTM‑characterized deep reinforcement learning for continuous
flight control and resource allocation in UAV‑assisted sensor network,” IEEE Internet of
Things Journal, vol. 9, no. 6, pp. 4179–4189, 2021.
[39] Daniel OC, Ramsurrun V, Seeam AK, “Smart library seat, occupant and occupancy informa‑
tion system, using pressure and RFID sensors,” In Proceedings of the 2019 Conference on Next
Generation Computing Applications (NextComp), Mauritius, 2019, pp. 1–5.
[40] Maepa MR, Moeti MN, “IoT‑based smart library seat occupancy and reservation system using
RFID and FSR technologies for South African Universities of Technology,” In Proceedings of
the International Conference on Artificial Intelligence and its Applications, Association for
Computing Machinery, New York, 2021, pp. 1–8.
[41] Liu Y, Ye H, Sun H, “Mobile phone library service: Seat management system based on
WeChat,” Library Management, vol. 42, no. 6/7, pp. 421–435, 2021.
[42] Zhou D, “Case study on seat management of university library based on WeChat public
number client‑taking Jianghan University library as an example,” In Proceedings of the 2019
4th International Conference on Mechanical, Control and Computer Engineering (ICMCCE),
Hohhot, China, 2019, pp. 630–6303.
[43] Upala M, Wong WK, “IoT solution for smart library using facial recognition,” In IOP
Conference Series: Materials Science and Engineering, vol. 495, no. 1, pp. 012030, 2019.
[44] Antevski K, Redondi AEC, Pitic R, “A hybrid BLE and Wi‑Fi localization system for the cre‑
ation of study groups in smart libraries,” In Proceedings of the 2016 9th IFIP Wireless and
Mobile Networking Conference (WMNC), Colmar, France, 2016, pp. 41–48.
[45] Shi X, Tang K, Lu H, “Smart library book sorting application with intelligence computer
vision technology,” Library Hi Tech, vol. 39, no. 1, pp. 220–232, 2021.
[46] Martinez‑Martin E, Ferrer E, Vasilev I, del Pobil AP, “The UJI aerial librarian robot: A quad‑
copter for visual library inventory and book localisation,” Sensors, vol. 21, no. 4, p. 1079, 2021.
[47] Anoop A, Ubale NA, “Cloud based collaborative filtering algorithm for library book recom‑
mender system,” In Proceedings of the 2020 Third International Conference on Smart Systems
and Inventive Technology (ICSSIT), Tirunelveli, India, 2020, pp. 695–703.
[48] Khalil H, Rahman SU, Ullah I, Khan I, Alghadhban AJ, Al‑Adhaileh MH, Ali G, ElAffendi
M, “A UAV‑swarm‑communication model using a machine‑learning approach for
search‑and‑rescue applications,” Drones, vol. 6, no. 12, p. 372, 2022.
[49] Abideen ZU, Mazhar T, Razzaq A, Haq I, Ullah I, Alasmary H, Mohamed HG. “Analysis of
enrollment criteria in secondary schools using machine learning and data mining approach,”
Electronics, vol. 12, no. 3, p. 694, 2023.
[50] Karthikeyan D, Arumbu VP, Surendhirababu K, Selvakumar K, Divya P, Suhasini P,
Palanisamy R, “Sophisticated and modernized library running system with OCR algorithm
using IoT,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 24, no. 3,
pp. 1680–1691, 2021.
[51] Ahmad S, Ullah T, Ahmad I, Al‑Sharabi A, Ullah K, Khan RA, Rasheed S, Ullah I, Uddin MN,
Ali MS, “A novel hybrid deep learning model for metastatic cancer detection,” Computational
Intelligence and Neuroscience, vol. 2022, 2022, 14 pages.
54 ◾ Future Communication Systems Using AI, IoT and Data Science
[52] Khan S, Ullah I, Ali F, Shafiq M, Ghadi YY, Kim T, “Deep learning‑based marine big data
fusion for ocean environment monitoring: Towards shape optimization and salient objects
detection,” Frontiers in Marine Science, vol. 9, p. 1094915, 2023.
[53] Li J, Liu Y, Wang L, “Design and development of promotion APP of university smart library
service platform based on network teaching,” In Proceedings of the 2021 Fifth International
Conference on I‑SMAC (IoT in Social, Mobile, Analytics and Cloud) (I‑SMAC), Palladam,
India, 2021, pp. 1344–1347.
[54] Bi S, Wang C, Wu B, Gong Y, Ni W, “An accurate book‑localization approach based on pas‑
sive ultra‑high‑frequency RFID,” In International Conference on Computing, Control and
Industrial Engineering, Springer Nature Singapore, Singapore, 2021, pp. 584–591.
[55] Yaman O, Ertam F, Tuncer T, Firat Kilincer I, “Automated UHF RFID‑based book position‑
ing and monitoring method in smart libraries,” IET Smart Cities, vol. 2, no. 4, pp. 173–180,
2020.
[56] Cheng S, Wang S, Guan W, Xu H, Li P, “3DLRA: An RFID 3D indoor localization method
based on deep learning,” Sensors, vol. 20, no. 9, pp. 2731, 2020.
[57] Waleed S, Ullah I, Khan WU, Rehman AU, Rahman T, Li S, “Resource allocation of 5G net‑
work by exploiting particle swarm optimization,” Iran Journal of Computer Science, vol. 4,
no. 3, pp. 211–219, 2021.
[58] Rasheed Z, Ma YK, Ullah I, Al Shloul T, Tufail AB, Ghadi YY, Khan MZ, Mohamed HG,
“Automated classification of brain tumors from magnetic resonance imaging using deep
learning,” Brain Sciences, vol. 13, no. 4, p. 602, 2023.
[59] Bai R, Zhao J, Li D, Lv X, Wang Q, Zhu B, “RNN‑based demand awareness in smart library
using CRFID, China Communications, vol. 17, no. 5, pp. 284–294, 2020.
[60] Bi S, Fang Z, Yuan X, Wang X, “Joint base station activation and coordinated downlink beam‑
forming for HetNets: Efficient optimal and suboptimal algorithms,” IEEE Transactions on
Vehicular Technology, vol. 68, no. 4, pp. 3702–3712, 2019.
[61] Xue J, Wang Y, Wang M, “Smart design of portable indoor shading device for visual com‑
fort‑A case study of a college library,” Applied Sciences, vol. 11, no. 22, p. 10644, 2021.
[62] Yang CJ, Kang HB, Zhang L, Zhang RY, “A design of smart library sustainability consumption
monitoring and management system based on IoT,” In Advances in Intelligent Systems and
Computing, Proceedings of the Fifth Euro‑China Conference on Intelligent Data Analysis and
Applications (ECC 2018), Springer International Publishing, Xian, China, 2019, pp. 217–224.
[63] Monti L, Mirri S, Prandi C, Salomoni P, “Preservation in smart libraries: An experiment
involving IoT and indoor environmental sensing,” In Proceedings of the 2019 IEEE Global
Communications Conference (GLOBECOM), Waikoloa, HI, 2019, pp. 1–6.
[64] Adeniji OD, Rukayat O, Solomon A, “Securing privacy risks associated with radio frequency
identification based library management system,” International Journal of Academic and
Applied Research (IJAAR), vol. 4, pp. 178–182, 2020.
[65] Xie Y, Liu J, Zhu S, Chong D, Shi H, Chen Y, “An IoT‑based risk warning system for smart
libraries,” Library Hi Tech, vol. 37, no. 4, pp. 918–932, 2019.
II
The Future of Data Analytics in Communication
55
Chapter 4
Tanweer Sohail
University of Jhang
Rabia Afzaal
Lahore Garrison University
AI is already being applied in various industries, including the news industry, where
it is used for news gathering, content production, distribution, and consumer consump‑
tion [6]. In the field of smart grid, AI techniques are being used to address the challenges
of integrating renewable energy sources into the electrical grid [7]. The development and
deployment of AI have economic, social, and geopolitical implications, which require
international policy coordination and cooperation [8]. AI technology is still in the research
and development stage, with the potential to enhance human welfare and benefit human‑
ity. Overall, AI is poised to reshape the way we connect and interact, offering new possibili‑
ties and opportunities for communication.
This chapter explores the exciting prospects of AI in the future of communication, delv‑
ing into the transformative impact it is expected to have on various aspects of human
interaction.
4.1.1 AI in Communication
One of the most significant benefits of AI in communication is its ability to improve acces‑
sibility and efficiency. For example, chatbots and virtual assistants can provide instant
responses to inquiries and customer service requests, freeing up human customer service
agents to focus on more complex tasks. This can lead to high availability, customer satis‑
faction, low response time, and cost savings [9]; they can be used in various settings such
as care management for monitoring patients’ health conditions and recovery, resulting in
improved outcomes and strong trusting relationships with care managers [10]. Firms using
virtual agents (VAs) in service encounters should maximize perceived VA humanness, as
it positively affects customer satisfaction [11]. Systems and methods that manage conversa‑
tions in real time with human customers based on a dynamic and unscripted conversation
flow with a virtual assistant can offer significant improvements to chatbot conversational
experiences, providing a more natural and efficacious dialogue experience. Overall, chat‑
bots and virtual assistants have the potential to enhance customer service experiences
and optimize resource allocation. AI‑powered translation services can also break down
language barriers and facilitate communication between individuals who speak different
languages [12].
AI can also enhance the personalization of communication. With access to large
amounts of data [13,14]. AI can also be used to create personalized symbols for individuals
who struggle with speech or writing [13]. Additionally, AI can enable the personalization
of wireless networks based on each user’s actual quality of service requirements and con‑
text, optimizing user satisfaction levels [14]. Furthermore, AI can be used for hyper‑per‑
sonalization in online business, addressing users’ real‑time needs and delivering the right
information at the right time to the right customer through the right channel [15].
AI‑powered tools can analyze user behavior and preferences, tailoring communication
to suit the individual’s needs. Additionally, AI can use predictive capabilities to antici‑
pate what a user may need or want, providing suggestions and recommendations that can
enhance the user’s experience. For example, Spotify uses AI to curate personalized playlists
for its users, based on their listening history and preferences [16,17].
The Future of Artificial Intelligence in Communication ◾ 59
patients. AI is also being used to develop personalized educational content and provide
students with individualized feedback.
AI into translation services brings forth a set of pivotal challenges. First, the advancement
of accuracy and fluency is ongoing, yet concerns linger over potential misunderstandings
and communication breakdowns due to lingering inaccuracies and awkward phrasing.
Second, the issue of cultural sensitivity emerges as AI language models inherit biases from
training data, potentially leading to unjust treatment or bias against certain groups. Third,
despite its transformational potential, user apprehension and distrust pose obstacles to the
acceptance and deployment of AI‑powered translation. Fourth, as AI‑driven translation
becomes more complex, more user data must be accessed, raising issues with data security
and privacy. Finally, the transformative power of AI translation also poses a dilemma of
potential job displacement, demanding deliberate strategies to ensure the fair distribution
of AI’s advantages [32]. Beyond these, other potential challenges include the potential mis‑
use of AI for censorship, propaganda, or criminal purposes, such as generating fake news
or impersonation. The deployment of strong safeguards and a thorough knowledge of AI’s
ethical implications are required to address these issues and enable its appropriate and
beneficial inclusion into international communication.
as AI platforms struggle to fully grasp and respond to human emotions, impacting the
nuanced nature of communication. The potential for AI‑powered platforms to spread mis‑
information, erode trust, and disrupt human control raises critical concerns. To guarantee
that AI is responsibly included in the future of communication, these problems should be
addressed and reduced by thorough ethical considerations and strong protections [37,38].
As AI’s capacity to analyze enormous volumes of data in real‑time grows, it creates oppor‑
tunities for more strategic and intelligent communication. AI has the potential to custom‑
ize communications, optimize marketing campaigns, uncover consumer behavior trends,
and anticipate attrition. To ensure ethical and secure use, it is crucial to remember that AI
is still a new technology, therefore these improvements must be treated with careful con‑
sideration of problems.
technology [44]. AI makes communication more accessible, benefiting those with disabili‑
ties through text‑to‑speech and speech‑to‑text technologies [45]. In the realm of AI‑driven
innovation, ONPASSIVE stands out as a trailblazer. AI‑based companies pioneer cut‑
ting‑edge solutions, striving to provide fully autonomous products to a global clientele
[46].
Researchers have studied how AI is changing conventional communication paradigms.
The way users engage with technology is changing thanks to chatbots, virtual assistants,
and AI‑driven recommendation systems. By automating customer service and increas‑
ing user engagement, chatbots powered by AI enable real‑time conversations [47]. Virtual
assistants like Siri and Google Assistant have revolutionized device‑human interactions,
making tasks hands‑free and intuitive [48].
Personalized communication experiences are now possible because of AI’s capacity to
comprehend user preferences, actions, and language subtleties. User data are analyzed
by AI algorithms to give customized content, increasing engagement and pleasure. User
engagement and conversion rates have grown as a result of personalized marketing tech‑
niques that are fueled by AI analytics [49].
Language boundaries have been removed by AI‑driven language translation systems,
allowing for seamless communication across borders. With the use of real‑time translation
services, people may engage with others throughout the world more effectively by commu‑
nicating in their native tongue [50]. AI‑powered translation tools are gaining traction in
fields like diplomacy, international business, and cross‑cultural collaboration.
AI’s introduction into communication raises several moral questions. Concerns con‑
cerning fairness and equitable representation have been highlighted as a result of bias in AI
models caused by skewed training data [51]. Researchers emphasize the need for ethical AI
development to mitigate biases and ensure unbiased communication outcomes.
With AI’s growing dependence on user data, safeguarding privacy and security has
become paramount. Ensuring user trust by transparently handling data and implement‑
ing stringent security measures is essential [52]. AI‑driven encryption techniques and pri‑
vacy‑preserving protocols are emerging to protect sensitive communication data.
AI’s integration in communication extends to enhancing collaborative and multimodal
interactions. Collaborative platforms empowered by AI enable effective teamwork, proj‑
ect management, and coordination across geographies [53]. The incorporation of AI in
interactive visualization tools offers new avenues for data‑driven communication, aiding
decision‑making and information dissemination.
The literature emphasizes how AI is used in a variety of fields, including healthcare,
finance, marketing, and education. Virtual financial advisers give individualized financial
advice, medical chatbots powered by AI in the healthcare industry simplify patient con‑
tacts, and AI‑driven educational platforms provide individualized learning opportunities
[54,55].
Future study focuses on improving AI’s comprehension of sarcasm in communication,
cultural settings, and human emotions as it develops [56]. The ethical dimensions of AI in
communication, along with addressing privacy concerns and ensuring transparency, are
areas that require continuous exploration [57].
64 ◾ Future Communication Systems Using AI, IoT and Data Science
systems can limit their accessibility to a broader audience. Building and maintaining user
trust is paramount, as transparency in decision‑making and the absence of biases are criti‑
cal for retaining user confidence in AI systems [61]. To navigate these intricate challenges
in communication, fostering innovation and addressing ethical concerns are imperative.
Current strategies to enhance explainability and interpretability encompass Explainable
AI (XAI), interpretable machine learning, visualization techniques, natural language
explanations, and human‑in‑the‑loop approaches. As AI continues to advance, the evolu‑
tion of strategies to tackle these challenges will continue to shape the future of AI‑powered
communication [62].
The efficient processing of feedback appears as a crucial obstacle for future progress in
the field of AI‑driven communication. AI systems when required to continuously learn
and improve, user feedback must be understood and interpreted appropriately. Users must
receive feedback quickly in order to learn from mistakes and improve their communica‑
tion abilities. Personalized criticism is equally important since it allows for efficient prog‑
ress by adapting advice to specific requirements. Scalability is crucial because AI systems
need to effectively handle massive amounts of feedback for continuous improvement [63].
Security is still of utmost importance, protecting user privacy and preventing any unau‑
thorized use of feedback data. To avoid bias and discrimination in feedback, it’s critical to
uphold ethical standards. These difficulties span the development of AI in communication,
highlighting the demand for prompt action to enable AI systems for iterative learning and
development. At the moment, AI is being used to improve feedback and learning using
machine learning, natural language processing, reinforcement learning, and active learn‑
ing approaches. Privacy‑preserving safeguards are being incorporated to assure user data
safety. Innovative solutions will continue to influence how these difficulties are faced and
overcome as AI develops [64].
communication models must be carefully thought out in light of ethical issues, which also
play a crucial role [66,67]. This includes addressing the potential for misuse and discrimi‑
nation, which could have far‑reaching societal implications. Current efforts are actively
addressing these multifaceted challenges. Researchers are working on more efficient data
collection techniques, striving to enhance model interpretability, and implementing bias
mitigation strategies [68]. Additionally, security measures are being fortified to safeguard
both the privacy of users and the integrity of AI systems. Ethical guidelines are being
established to ensure responsible and equitable deployment.
As AI continues to evolve, it is anticipated that innovative solutions will emerge, reshap‑
ing the landscape of specialized communication. These solutions will not only tackle the
complexities outlined above but also enable complexity, meta‑communication stands
essential, demanding AI’s finesse in deciphering context and intentions. Privacy‑preserving
techniques ensure data security, while collaborative communication relies on AI’s orches‑
tration of tasks and conflict resolution.
Currently, AI showcases its potential in virtual reality experiences, art generation, and
enhanced understanding of human dialogues. Yet, the true crescendo lies ahead. As AI
evolves, it’s set to redefine communication, harmonizing technology and human creativity
to unlock experiential, generative, meta, secure, and collaborative communication. This
impending revolution promises to reshape how we connect, transcending the boundaries
of imagination [69,70].
4.4 DISCUSSION
The study under consideration examines the evolving field of AI‑powered commu‑
nication, highlighting both its problems and opportunities. In order to enable genuine
human‑machine interactions, it emphasizes the significance of naturalness, empathy,
creativity, privacy, security, and responsibility in AI systems. While acknowledging the
importance of these characteristics, the study falls short in offering a thorough examina‑
tion of the technical difficulties at play. Additionally, it emphasizes the difficulties associ‑
ated with machine‑to‑machine communication, with particular emphasis on data privacy,
interpretability, and bias avoidance, but it might benefit from providing more specific
solutions and examples from actual applications. The study emphasizes the necessity for
explainability and interpretability in AI systems, although it might go further into the
state of research and development at this time. Additionally, it recognizes the difficulty of
efficiently managing user comments, but it lacks specific details on workable solutions. The
study focuses on data gathering and bias concerns when considering specialized commu‑
nication, but it might include more vivid case cases. Providing examples from the actual
world and taking into account potential limits might be helpful when presenting advanced
communication and complete communication paradigms. However, the article offers a
useful starting point for additional investigation and debate in this developing area of
AI‑powered communication.
4.5 CONCLUSION
AI’s incorporation into communication has developed from a purely theoretical idea to an
irrefutable reality that is changing the way we connect. This revolutionary change opens
up a wide range of potential outcomes, from the enhancement of customization and the
removal of language barriers to the facilitation of remote cooperation and the foresight of
forthcoming communication trends. This vast potential of AI calls for a careful exami‑
nation of its ethical implications since it promises to take communication to previously
unimaginable heights. We begin on a journey that takes communication to new heights,
enabling connection and creativity that were previously restricted to the realms of fantasy
by embracing AI’s power for transformation while preserving ethical issues. In conclusion,
understanding how AI may change communication is still in its infancy. We can change
accessibility and efficiency, enhance personalization, and use predictive insights by utiliz‑
ing AI’s capabilities. However, just like with the introduction of any innovative technology,
it is crucial to be aware of the dangers and difficulties that come with integrating AI. We
68 ◾ Future Communication Systems Using AI, IoT and Data Science
may work together to steer toward a future in which AI‑driven communication serves as a
testimony to both efficacy and ethics by deliberately addressing these concerns.
These are only a few of the issues that must be resolved as AI advances and permeates
more aspects of our daily life. To maximize the advantages of this technology while lower‑
ing the hazards, it is crucial to take a careful and moral approach to its development and
usage in communication.
REFERENCES
[1] H. Hassani, E. S. Silva, S. Unger, M. TajMazinani, and S. Mac Feely, “Artificial intelligence
(AI) or intelligence augmentation (IA): What is the future?,” Artif. Intell., vol. 1, no. 2,
pp. 143–155, 2020, doi:10.3390/AI1020008.
[2] Z. Shao et al., “AI 2000: A decade of artificial intelligence,” In WebSci ’20: 12th ACM Conference
on Web Science, Southampton, UK, pp. 345–354, 2020, doi:10.1145/3394231.3397925.
[3] C. Liu, D. Jiao, and Z. Liu, “Artificial intelligence (AI)‑aided disease prediction,” BIO Integr.,
vol. 1, no. 3, pp. 130–136, 2020, doi:10.15212/BIOI‑2020‑0017.
[4] Y. Feng and X. Lv(U), “Frontier application and development trend of artificial intelligence in
new media in the AI era,” Lect. Notes Data Eng. Commun. Technol., vol. 97, pp. 58–64, 2022,
doi:10.1007/978‑3‑030‑89508‑2_8/COVER.
[5] M. Massaoudi, S. S. Refaat, and H. Abu‐Rub, “On the pivotal role of artificial intelligence
toward the evolution of smart grids,” Smart Grid Enabling Technol., pp. 359–420, 2021,
doi:10.1002/9781119422464.CH15.
[6] C. Feijóo et al., “Harnessing artificial intelligence (AI) to increase wellbeing for all: The case for
a new technology diplomacy,” Telecomm. Policy, vol. 44, no. 6, p. 101988, 2020, doi:10.1016/J.
TELPOL.2020.101988.
[7] A. L. Guzman and S. C. Lewis, “Artificial intelligence and communication: A human‑machine
communication research agenda,” New Media & Society, vol. 22, no. 1, pp. 70–86, 2019,
doi:10.1177/1461444819858691.
[8] J. Tong, “Research on the influence of the new media era on the rise and development of arti‑
ficial intelligence technology,” In 6th Asia‑Pacific Conference on Social Sciences, Humanities
(APSSH 2019), Manila, Philippines, pp. 580–584, 2019, doi:10.25236/apssh.2019.115.
[9] M. E. Schario, C. A. Bahner, T. V. Widenhofer, J. I. Rajaballey, and E. J. Thatcher,
“Chatbot‑assisted care management,” Prof. Case Manag., vol. 27, no. 1, pp. 19–25, 2022,
doi:10.1097/NCM.0000000000000504.
[10] M. Söderlund and E. L. Oikarinen, “Service encounters with virtual agents: An examination
of perceived humanness as a source of customer satisfaction,” Eur. J. Mark., vol. 55, no. 13,
pp. 94–121, 2021, doi:10.1108/EJM‑09‑2019‑0748/FULL/HTML.
[11] M. Ashfaq, J. Yun, S. Yu, and S. M. C. Loureiro, “I, Chatbot: Modeling the determinants
of users’ satisfaction and continuance intention of AI‑powered service agents,” Telemat.
Informatics, vol. 54, p. 101473, 2020, doi:10.1016/J.TELE.2020.101473.
[12] P. Singh, A. Verma, S. Vij, and J. Thakur. “Implications & Impact of Artificial Intelligence in
Digital Media: With Special Focus on Social Media Marketing”. In E3S Web of Conferences
(Vol. 399, p. 7006). EDP Sciences, 2023.
[13] M. Wald, “AI data‑driven personalisation and disability inclusion,” Front. Artif. Intell., vol. 3,
pp. 571955–571955, 2021, doi:10.3389/FRAI.2020.571955/PDF.
[14] R. Alkurd, I. Abualhaol, and H. Yanikomeroglu, “Big‑data‑driven and AI‑based framework to
enable personalization in wireless networks,” IEEE Commun. Mag., vol. 58, no. 3, pp. 18–24,
2020, doi:10.1109/MCOM.001.1900533.
[15] O. Soffer, “Algorithmic personalization and the two‑step flow of communication,” Commun.
Theory, vol. 31, no. 3, pp. 297–315, 2021, doi:10.1093/CT/QTZ008.
The Future of Artificial Intelligence in Communication ◾ 69
[16] P. Álvarez, J. García de Quirós, and S. Baldassarri, “A web system based on spotify for the
automatic generation of affective playlists,” Commun. Comput. Inf. Sci., vol. 1291 CCIS,
pp. 124–137, 2020, doi:10.1007/978‑3‑030‑61218‑4_9.
[17] N. Dauban, C. Senac, J. Pinquier, and P. Gaillard, “Towards a content‑based prediction of
personalized musical preferences using transfer learning,” Proc. ‑ Int. Work. Content‑Based
Multimed. Index., vol. 2021, pp. 1–6, 2021, doi:10.1109/CBMI50038.2021.9461911.
[18] J. Hohenstein et al., “Artificial intelligence in communication impacts language and social
relationships,” Sci. Rep., vol. 13, no. 1, pp. 1–9, 2023, doi:10.1038/s41598‑023‑30938‑9.
[19] S. Natale, “Communicating through or communicating with: Approaching artificial intel‑
ligence from a communication and media studies perspective,” Commun. Theory, vol. 31,
no. 4, pp. 905–910, 2021, doi:10.1093/CT/QTAA022.
[20] P. P. Liang, C. Wu, L. P. Morency, and R. Salakhutdinov, “Towards understanding and miti‑
gating social biases in language models,” Proc. Mach. Learn. Res., vol. 139, pp. 6565–6576,
2021, https://arxiv.org/abs/2106.13219v1.
[21] L. Kim, D. S. Smith, B. Hofstra, and D. A. McFarland, “Gendered knowledge in fields and
academic careers,” Res. Policy, vol. 51, no. 1, p. 104411, 2022, doi:10.1016/j.respol.2021.104411.
[22] M. O. R. Prates, P. H. Avelar, and L. C. Lamb, “Assessing gender bias in machine trans‑
lation – A case study with google translate,” Neural Comput. Appl., vol. 32, no. 10,
pp. 6363–6381, 2018, doi:10.1007/s00521‑019‑04144‑6.
[23] E. A. López Jiménez and T. Ouariachi, “An exploration of the impact of artificial intelligence
(AI) and automation for communication professionals,” J. Inform. Commun. Ethics Soc.,
vol. 19, no. 2, pp. 249–267, 2020, doi:10.1108/JICES‑03‑2020‑0034/FULL/HTML.
[24] A. Holzinger, E. Weippl, A. M. Tjoa, and P. Kieseberg, “Digital transformation for sustainable
development goals (SDGs) – A security, safety and privacy perspective on AI,” Lect. Notes
Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 12844
LNCS, pp. 1–20, 2021, doi:10.1007/978‑3‑030‑84060‑0_1.
[25] H. Abdalkaream Mardan and S. Kakil Ahmed, “Using AI in wireless communication
system for resource management and optimisation,” Period. Eng. Nat. Sci., vol. 8, no. 4,
pp. 2068–2074, 2020, doi:10.21533/PEN.V8I4.1677.G689.
[26] M. Szollosy, “Shifting the goalposts: Reconceptualizing robots, AI, and humans,” In Minding
the Future, B. W. S. A. T. Dainton, Ed. Liverpool: Springer, 2021, pp. 219–242. doi:10.1007/978
‑3‑030‑64269‑3_11.
[27] M. Liao and S. S. Sundar, “How should AI systems talk to users when collecting their per‑
sonal information? Effects of role framing and self‑referencing on human‑ai interaction,” In
CHI ’21: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems,
Yokohama, Japan, May 2021, doi:10.1145/3411764.3445415.
[28] E. Aizenberg and J. van den Hoven, “Designing for human rights in AI,” arXiv Comput. Soc.,
vol. 7, no. 2, 2020, doi:10.1177/2053951720949566.
[29] L. Crompton, “The decision‑point‑dilemma: Yet another problem of responsibility in
human‑AI interaction,” J. Responsible Technol., vol. 7–8, p. 100013, 2021, doi:10.1016/J.
JRT.2021.100013.
[30] E. Goldenthal, J. Park, S. X. Liu, H. Mieczkowski, and J. T. Hancock, “Not all AI are equal:
Exploring the accessibility of AI‑mediated communication technology,” Comput. Human
Behav., vol. 125, p. 106975, 2021, doi:10.1016/j.chb.2021.106975.
[31] G. I. Winata, A. Madotto, Z. Lin, R. Liu, J. Yosinski, and P. Fung, “Language models are few‑shot
multilingual learners,” In Proceedings of the 1st Workshop on Multilingual Representation
Learning, Punta Cana, Dominican Republic, pp. 1–15, 2021, doi:10.18653/v1/2021.mrl‑1.1.
[32] G. G. Palmer, “AI ethics: Four key considerations for a globally secure future,” In Artificial
Intelligence and Global Security, Y. R. Masakowski, Ed. Bingley: Emerald Publishing Limited,
2020, pp. 167–176. doi:10.1108/978‑1‑78973‑811‑720201010.
70 ◾ Future Communication Systems Using AI, IoT and Data Science
[33] E. Johnson, “Just @Me: Digitally‑mediated team communication in a pandemic,” The 39th
ACM International Conference on Design of Communication, SIGDOC 2021, Virtual Event,
pp. 315–318, 2021, doi:10.1145/3472714.3473658.
[34] W. A. Adah, N. A. Ikumapayi, and H. B. Muhammed, “The ethical implications of advanced
artificial general intelligence: Ensuring responsible AI development and deployment,” SSRN
Electron. J., 2023, 11 pages. doi:10.2139/SSRN.4457301.
[35] J. Naidoo and R. E. Dulek, “Artificial intelligence in business communication: A snapshot,”
Int. J. Bus. Commun., vol. 59, no. 1, pp. 126–147, J2022, doi:10.1177/2329488418819139.
[36] A. Zerfass, J. Hagelstein, and R. Tench, “Artificial intelligence in communication manage‑
ment: A cross‑national study on adoption and knowledge, impact, challenges and risks,” J.
Commun. Manag., vol. 24, no. 4, pp. 377–389, 2020, doi:10.1108/JCOM‑10‑2019‑0137/FULL/
HTML.
[37] Y. T. Lin, T. W. Hung, and L. T. L. Huang, “Engineering equity: How AI can help reduce
the harm of implicit bias,” Philos. Technol., vol. 34, no. 1, pp. 65–90, 2021, doi:10.1007/
S13347‑020‑00406‑7/TABLES/2.
[38] P. Moradi and K. Levy, The Future of Work in the Age of AI. Cornell University, New York,
2020. doi:10.1093/oxfordhb/9780190067397.013.17.
[39] H. Aldboush and M. Ferdous, “Building trust in fintech: An analysis of ethical and privacy
considerations in the intersection of big data, AI, and customer trust,” Int. J. Financ. Stud.,
vol. 11, no. 3, p. 90, 2023, doi:10.3390/IJFS11030090.
[40] B. Li et al., “Trustworthy AI: From principles to practices,” ACM Comput. Surv., vol. 55, no. 9,
2023, p. 90, doi:10.1145/3555803.
[41] J. Chen, J. P. Morgan, V. Storchan, and E. Kurshan, “Beyond Fairness Metrics: Roadblocks
and Challenges for Ethical AI in Practice,” 2021, Accessed: September 12, 2023. [Online].
Available: https://arxiv.org/abs/2108.06217v1.
[42] B. Shneiderma. “Human‑centered AI”. Issues in Science and Technology, vol. 37, no. 2,
pp. 56–61, 2021.
[43] S. C. Slota et al., “Many hands make many fingers to point: challenges in creating accountable
AI,” AI Soc., vol. 38, pp. 1–13, 2021, doi:10.1007/S00146‑021‑01302‑0.
[44] B. Savic, M. Milic, and S. Vlajic, “Analysis and development of the model for Google
Assistant and Amazon Alexa Voice Assistants integration,” In 2023 27th International
Conference on Information Technology (IT), Zabljak, Montenegro, pp. 1–4, 2023, doi:10.1109/
IT57431.2023.10078705.
[45] J. F. de Almeida, W. Gottardi, and C. H. S. Tumolo, “Automatic speech recognition and
text‑to‑speech technologies for L2 pronunciation improvement: Reflections on their affor‑
dances,” Texto Livre, vol. 15, p. e36736, 2022, doi:10.35699/1983‑3652.2022.36736.
[46] “Top Artificial Intelligence Companies in India 2019 | GoodFirms,” Accessed September 3,
2023. Available: https://innohealthmagazine.com/2020/innovation/top‑artificial‑intelligence‑
orga n i z at ion s ‑i n‑he a lt hc a re ‑i n‑i nd i a /% 0A ht t ps://w w w.go o d f i r m s .c o/a r t i f i‑
cia l‑i ntel l igence/i nd ia%0A ht t ps://i n nohea lt h maga zi ne.com /2020/i n novat ion /
top‑artificial‑intelligence‑organiza.
[47] S. I. Malik, M. W. Ashfque, R. M. Tawafak, G. Al‑Farsi, N. A. Usmani, and B. H. Khudayer, “A
chatbot to facilitate student learning in a programming 1 course: A gendered analysis,” Int. J.
Virtual Pers. Learn. Environ., vol. 12, no. 1, pp. 1–20, 2022, doi:10.4018/IJVPLE.310007.
[48] G. Caldarini, S. Jaf, and K. McGarry, “A literature survey of recent advances in chatbots,”
Information, vol. 13, no. 1, p. 41, 2022, doi:10.3390/INFO13010041.
[49] S. Chandra, S. Verma, W. M. Lim, S. Kumar, and N. Donthu, “Personalization in personal‑
ized marketing: Trends and ways forward,” Psychol. Mark., vol. 39, no. 8, pp. 1529–1562, 2022,
doi:10.1002/MAR.21670.
The Future of Artificial Intelligence in Communication ◾ 71
[50] D. Moroni and M. A. Pascali, “Learning topology: Bridging computational topology and
machine learning,” Pattern Recognit. Image Anal., vol. 31, no. 3, pp. 443–453, 2021, doi:10.1134/
S1054661821030184/FIGURES/3.
[51] N. Kordzadeh and M. Ghasemaghaei, “Algorithmic bias: Review, synthesis, and future
research directions,” Eur. J. Inf. Syst., vol. 31, no. 3, pp. 388–409, 2022, doi:10.1080/09600
85X.2021.1927212.
[52] A. Fathalizadeh, V. Moghtadaiee, and M. Alishahi, “On the privacy protection of indoor loca‑
tion dataset using anonymization,” Comput. Secur., vol. 117, 2022, p. 102665. doi:10.1016/J.
COSE.2022.102665.
[53] J. S. Dhatterwal, K. S. Kaswan, A. Baliyan, and V. Jain, “Integration of cloud and IoT for smart
e‑healthcare,” Stud. Comput. Intell., vol. 1021, pp. 1–31, 2022, doi:10.1007/978‑3‑030‑97929‑4_1.
[54] M. Poser, G. C. Küstermann, N. Tavanapour, and E. A. C. Bittner, “Design and evaluation of a
conversational agent for facilitating idea generation in organizational innovation processes,”
Inf. Syst. Front., vol. 24, no. 3, pp. 771–796, 2022, doi:10.1007/S10796‑022‑10265‑6.
[55] M. Krishna Enduri et al., “Comparative study on sentimental analysis using machine learn‑
ing techniques,” Mehran Univ. Res. J. Eng. Technol., vol. 42, no. 1, p. 207, 2023, doi:10.22581/
MUET1982.2301.19.
[56] E. Yücel Karamustafa and B. Arsan, “The future of artificial intelligence: How will emotions
affect AI?,” J. Bus. Digit. Age, vol. 5, no. 1, pp. 58–64, 2022, doi:10.46238/JOBDA.1070090.
[57] D. García‑Gasulla, A. Cort’es, S. Álvarez‑Napagao, and U. Cort’es, “Signs for ethical AI: A
route towards transparency,” arXiv preprint arXiv:2009.13871, 2020.
[58] R. Girju, “Adaptive Multimodal and Multisensory Empathic Technologies for Enhanced
Human Communication,” 2021, Accessed: September 12, 2023. [Online]. Available: https://
www.hkuriich.org.
[59] M. Antona, G. Margetis, S. Ntoa, and H. Degen, “Special issue on AI in HCI,” Int. J. Hum.
Comput. Interact., vol. 39, no. 9, pp. 1723–1726, 2023, doi:10.1080/10447318.2023.2177421.
[60] M. Mozgovoy and C. Suero Montero, “Special issue on machine learning and natural lan‑
guage processing,” Appl. Sci., vol. 12, no. 17, pp. 8894–8894, 2022, doi:10.3390/APP12178894.
[61] V. F. de Santana, L. M. D. F. Galeno, E. V. Brazil, A. Heching, and R. Cerqueira, “Retrospective
End‑User Walkthrough: A Method for Assessing How People Combine Multiple AI Models in
Decision‑Making Systems,” 2023, Accessed: September 12, 2023. [Online]. Available: https://
arxiv.org/abs/2305.07530v1.
[62] F. Sovrano, F. Vitali, and M. Palmirani, “Making things explainable vs explaining:
Requirements and challenges under the GDPR,” Lect. Notes Comput. Sci. (including Subser.
Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 13048 LNAI, pp. 169–182, 2021,
doi:10.1007/978‑3‑030‑89811‑3_12.
[63] K. Lee, L. Smith, and P. Abbeel, “PEBBLE: Feedback‑efficient interactive reinforcement
learning via relabeling experience and unsupervised pre‑training,” Proc. Mach. Learn. Res.,
vol. 139, pp. 6152–6163, 2021.
[64] E. Panadero and A. A. Lipnevich, “A review of feedback models and typologies: Towards an
integrative model of feedback elements,” Educ. Res. Rev., vol. 35, p. 100416, 2022, doi:10.1016/J.
EDUREV.2021.100416.
[65] N. Picchiotti and M. Gori, “Logic constraints to feature importance,” Lect. Notes Comput.
Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 13196 LNAI,
pp. 389–402, 2022, doi:10.1007/978‑3‑031‑08421‑8_27/COVER.
[66] Z. K. Younis and B. Mahmood, “Towards the impact of security vunnerabilities in software
design: A complex network‑based approach,” In 6th International Engineering Conference
“Sustainable Technology and Development” IEC 2020, Erbil, Iraq, pp. 157–162, 2020,
doi:10.1109/IEC49899.2020.9122923.
72 ◾ Future Communication Systems Using AI, IoT and Data Science
Ijaz Ahamd
University of Chinese Academy of Sciences
Yuning Tao
South China University of Technology
Muhammad Shafiq
Guangzhou University
5.1 INTRODUCTION
The fusion of data science and the Internet of Things (IoT) has heralded a new age of tech‑
nical innovation and intelligent decision‑making [1]. The IoT is a networked system of
different computing devices and digital machineries that digitalize the physical world.
IoT has already had an impact on people’s lives in areas such as housing, transportation,
health, food, clothes, and remote controlling. Numerous home applications can be moni‑
tored by mobile and voice commands. Various programs help users advance their life stan‑
dard and even make it easier for the old and crippled to live. According to MGI’s report,
IoT will generate an output of $3.9–11.1 trillion in nine different surroundings, including
retail, workshops, and towns, beginning in 2025, and the sum of IoT devices is projected to
increase to 754 100 million, which is correspondent to adding 127 devices/sec beginning in
DOI: 10.1201/9781032648309-7 73
74 ◾ Future Communication Systems Using AI, IoT and Data Science
2020 [2]. The following three phases summarize the operation of IoT systems: the position‑
ing of sensors for data collection, the adaptation of collected data into valuable information
that can be stowed and retrieved, and the alteration of data to domain knowledge that will
be used by the IoT controller for user or system responses. If all tasks comprising the three
stages of IoT operations can be automated, an IoT system becomes intelligent [3–5].
Data science is a versatile method of identifying, mining, and giving visions from data
through data collecting, data storage and access, data examination, and data communica‑
tion approaches [6]. Data science is capable of being descriptive, diagnostic, predictive, and
prescriptive. It means that administrators can utilize data science to govern what occurred,
why it occurred, what transpired, and what they should do given projected consequences.
Because the automation of an intelligent IoT system necessitates all data science duties,
data science will be the best candidate technology able to address the difficulties that intel‑
ligent IoT systems confront [7]. The first major issue for intelligent IoT is how to gather data
for IoT application features, as well as how to design sensor placement and connectivity
through communication systems or networks. The next stage is to figure out how to use
machine learning or artificial intelligence (AI) algorithms [8] to examine and understand
the obtained intelligent IoT data. Lastly, it is critical to properly interconnect analytical
results with the users of intelligent IoT strategies or devices.
We believe that the succeeding types of challenges should advantage from data sci‑
ence‑related skills in the development of upcoming intelligent IoT schemes. The first issue
is determining how to cope with the intelligent IoT data. The sum of data generated in
each application unit of the intelligent IoT system is at least on the terabyte (TB) scale.
Because the processing and communication capabilities of intelligent IoT devices are rela‑
tively restricted, collecting, exchanging, storing, and accessing such a massive volume of
data at an intelligent IoT device is an extremely difficult operation [9–11]. Deep learning
is a game‑changing technology in machine learning and AI [12]. The applications of deep
learning on IoT devices are frequently required to operate in real time. For instance, secu‑
rity camera‑based object‑recognition jobs often need a discovery dormancy of less than
400 ms to collect and reply to target events in a quick response time, such as aberrant tar‑
gets (recognized by deep learning technology) coming within a building.
The existing IoT devices frequently offload intelligent computing to the cloud platform.
But, constant and dependable wireless communication associations, which are only acces‑
sible in a few areas and at a high charge, represent one of the key challenges for these intel‑
ligent IoT devices to meet real‑time needs. As a result, the second class of intelligent IoT
difficulties is the lack of powerful machine learning and AI algorithms capable of carrying
out data analysis with input data influenced by unstable communication lines [13,14]. But,
providing machine learning and AI abilities on the intelligent IoT device side is a difficult
task. Intelligent IoT devices have modest memory sizes, have minimal power consump‑
tion, and are distributed. The third group of difficulties is to create new machine learning
and AI algorithms that can be distributedly applied to IoT devices with limited memory
and power [15,16]. Finally, for any new technology, the trust, security, and privacy of intel‑
ligent IoT operators are constantly top priorities. With such many intelligent IoT devices,
it is difficult to apply data science to improve trust management, access control systems,
Data Science Meets Intelligent Internet of Things ◾ 75
and safe data sharing while keeping privacy in mind across intelligent IoT schemes. The
taxonomy of this chapter is illustrated in Figure 5.1.
The rest of this chapter is ordered as follows: Section 5.2 presents the basics of data sci‑
ence and IoT, while Section 5.3 presents data collection and integration in IoT. Section 5.4
describes data analysis and machine learning in IoT, whereas Section 5.5 explains real‑time
data processing and edge computing. Furthermore, Section 5.6 focuses on security and
privacy enhancement in IoT with data science, and Section 5.7 presents case studies and
applications. Finally, this chapter concludes in Section 5.8.
5.2.1.4 Communication
Finally, insights are supplied in the form of information and other data visualizations to
assist business experts and other decision‑makers in understanding the insights and their
impact on the firm. Data scientists can generate visuals using a data science programming
language such as R or Python, or they can use specialized visualization tools.
Data Science Meets Intelligent Internet of Things ◾ 77
maximizing the value of IoT data. Prescriptive analytics extends predictive analytics by
not only forecasting future results but also recommending the optimal course of action
to attain desired outcomes. Prescriptive analytics in the context of IoT systems leverages
historical and real‑time data to optimize decision‑making processes. Prescriptive analyt‑
ics can determine the most effective actions to take in response to changing situations,
probable abnormalities, or specified goals by utilizing advanced algorithms and machine
learning models. Prescriptive analytics, for example, might prescribe maintenance activi‑
ties in industrial IoT applications to decrease downtime and increase the lifespan of equip‑
ment, thereby enhancing operational efficiency and lowering costs. Prescriptive analytics
in healthcare can provide individualized treatment strategies for patients based on their
medical history and real‑time health data [38]. Prescriptive analytics guarantees that
IoT systems function at top performance by providing decision‑makers with actionable
insights. This results in increased efficiency, productivity, and improved user experiences.
streaming data from IoT devices [40]. As IoT use grows, organizations across all indus‑
tries fight to keep up with the huge datasets that are increasing at an exponential rate.
IoT devices and sensors, for instance, may collect gigabytes of data in minutes and that is
before you factor in data from CRM, financial reports, social media stations, etc.
Simultaneously, AI, machine learning, and big data analytics are advancing at break‑
neck speed. Organizations can swiftly extract important evidence from these enormous,
diverse data sets and adapt to real‑time situations by considering AI for IoT data man‑
agement and analytics. These technologies, when combined, are enabling game‑changing
advancements. For example, the intrinsic properties of big data are ideal for rapidly train‑
ing AI and machine learning systems.
Following that, in real‑time, intelligent software can be considered to organize opera‑
tions, predict equipment failures, and identify security risks. In fully autonomous systems,
AI takes control while being directed by a network of interconnected IoT devices.
and sensors as well as expanding values and best practices. As a result, there are increas‑
ingly more interconnected “Things” gathering nonstop data streams and metrics to assess
machine performance, environmental circumstances, and other variables.
make the most of their reserves, businesses must make sure that they have the structure in
place to conduct real‑time dispensation at gage.
5.5.9 Challenges
Edge computing is fundamentally an extension of cloud computing, with the caveat that,
due to the inherent mobility requirements of IoT, it is more fragmented and scattered than
normal cloud computing. The degree of distribution near IoT locations differs significantly
from that on the back‑end server. While edge computing, by definition, tries to be as close
to IoT devices as possible, businesses continue to utilize edge computing in the same way
that they do cloud computing for the following important reasons:
a. The security of edge computing solutions and procedures is still growing, and it is
evident that edge devices can be simple targets for hackers.
84 ◾ Future Communication Systems Using AI, IoT and Data Science
b. Architecture patterns for edge computing are still emerging. Even though the perfor‑
mance and latency requirements for edge computing differ, data generated by edge
devices are still saved in cloud storage systems that are centrally managed.
c. In the traditional cloud computing environment, the memory‑intensive,
CPU‑intensive, and low‑latency disk resources required for performing complicated
machine learning and deep data processing models are more voluntarily available
than at the edge [50–52].
d. Other cloud‑based technology abilities and services, such as serverless and succeeded
container services, are significantly more mature and cooler to acquire.
As a result of these considerations, data insights and intelligence that drive meaning‑
ful IoT decisions must rely on centralized high‑performance cloud computing. Cloud
computing adds network and processor latency, which is unacceptable in time‑critical,
sense‑and‑respond IoT solutions.
governed by a few rules and conventions. In addition, most customers are uninformed of
the integral dangers of IoT devices [55]. Also, they do not have an idea of how thoughtful
the IoT security issues are. Among the many worries about IoT security are listed below:
• Deficiency of Visibility: The operators regularly install IoT devices without the
information of IT sectors, creating a precise record of what desires to be protected
and observed impracticable.
• Incomplete Security Combination: Mixing IoT devices into security systems is
problematic to unbearable due to their variety and scale.
• Open‑source Code Susceptibilities: Firmware for IoT devices regularly incorporates
open‑source software that is disposed to faults and susceptibilities [56].
• Devastating Data Volume: Due to the data volume shaped by IoT devices, data man‑
agement, management, and defense are challenging.
• Deprived Testing: Because utmost IoT designers do not list security, they do not
undergo behavior‑effective susceptibility testing to uncover faults in IoT schemes.
• Unpatched Susceptibilities: Numerous IoT devices are unpatched due to various fac‑
tors, such as a lack of updates and difficulties retrieving and applying patches.
• Susceptible APIs: APIs are widely utilized as points of entry into command‑and‑con‑
trol (CC) centers, from which SQL injection, man‑in‑the‑middle (MITM), distrib‑
uted denial of service (DDoS), and network‑breaking assaults are launched.
• Feeble Passwords: IoT devices commonly come with default passwords that numer‑
ous users refuse to update, allowing cyber attackers’ easy access. In other cases, users
generate passwords that are easily guessable.
86 ◾ Future Communication Systems Using AI, IoT and Data Science
• Learn: Use safety keys that empower network perceptibility to learn about the envi‑
ronment and the hazard outlines for every set of IoT devices.
• Protect: Inspect, monitor, and impose IoT security strategies in conjunction with
activity at various locations throughout the structure.
• Segment: In the equivalent way that networks are isolated, IoT schemes can be seg‑
mented based on strategy clusters and risk outlines.
However, the same technology poses issues for enterprises and governments in terms of
defending sensitive data. Furthermore, perspectives on data privacy differ around the
world. Government bodies frequently issue regulations that outline the requirements for
how data privacy should be handled in a certain location. Compliance with data privacy is
determined by these government regulations. In the energy systems business in the United
States (US), for example, the Federal Energy Regulatory Commission oversees compli‑
ance with privacy regulations. Different governing organizations specify what compliance
entails in other locations or businesses in order to guarantee data privacy.
5.8 CONCLUSION
The combination of data science with IoT has opened a new world of options and possi‑
bilities. This chapter underlines the revolutionary potential of this synergy and the signifi‑
cance of responsible and ethical data use in order to create a smarter and more sustainable
future. As technology advances, integrating data science and the IoT is critical for realizing
the full promise of intelligent connection and data‑driven decision‑making.
REFERENCES
[1] Qin X, Gu Y. Data fusion in the Internet of Things. Procedia Engineering. 2011;15:3023–6.
[2] Diechmann J, Heineke K, Reinbacher T, Wee D. The Internet of Things: How to Capture the
Value of IoT. Technical Report, McKinsey & Company, NY, USA, pp. 1–124, 2018.
[3] Khan WU, Imtiaz N, Ullah I. Joint optimization of NOMA‐enabled backscatter communica‑
tions for beyond 5G IoT networks. Internet Technology Letters. 2021;4(2):e265.
[4] Gupta D, Juneja S, Nauman A, Hamid Y, Ullah I, Kim T, Tag eldin EM, Ghamry NA.
Energy saving implementation in hydraulic press using industrial Internet of Things (IIoT).
Electronics. 2022;11(23):4061.
[5] Asif M, Khan WU, Afzal HR, Nebhen J, Ullah I, Rehman AU, Kaabar MK. Reduced‑complexity
LDPC decoding for next‑generation IoT networks. Wireless Communications and Mobile
Computing. 2021;2021:1–10.
[6] Piccialli F, Cuomo S, Bessis N, Yoshimura Y. Data science for the Internet of Things. IEEE
Internet of Things Journal. 2020;7(5):4342–6.
Data Science Meets Intelligent Internet of Things ◾ 89
[7] Stoyanova M, Nikoloudakis Y, Panagiotakis S, Pallis E, Markakis EK. A survey on the Internet
of Things (IoT) forensics: Challenges, approaches, and open issues. IEEE Communications
Surveys & Tutorials. 2020;22(2):1191–221.
[8] Helm JM, Swiergosz AM, Haeberle HS, Karnuta JM, Schaffer JL, Krebs VE, Spitzer AI,
Ramkumar PN. Machine learning and artificial intelligence: Definitions, applications, and
future directions. Current Reviews in Musculoskeletal Medicine. 2020;13:69–76.
[9] Lockl J, Schlatt V, Schweizer A, Urbach N, Harth N. Toward trust in Internet of Things
ecosystems: Design principles for blockchain‑based IoT applications. IEEE Transactions on
Engineering Management. 2020;67(4):1256–70.
[10] Tufail AB, Ullah I, Khan R, Ali L, Yousaf A, Rehman AU, Alhakami W, Hamam H,
Cheikhrouhou O, Ma YK. Recognition of ziziphus lotus through aerial imaging and deep
transfer learning approach. Mobile Information Systems. 2021;2021:1–10.
[11] Yousafzai BK, Khan SA, Rahman T, Khan I, Ullah I, Ur Rehman A, Baz M, Hamam H,
Cheikhrouhou O. Student‑performulator: Student academic performance using hybrid deep
neural network. Sustainability. 2021;13(17):9775.
[12] Ghosh A, Chakraborty D, Law A. Artificial intelligence in Internet of Things. CAAI
Transactions on Intelligence Technology. 2018;3(4):208–18.
[13] Mazhar T, Irfan HM, Haq I, Ullah I, Ashraf M, Shloul TA, Ghadi YY, Imran, Elkamchouchi
DH. Analysis of challenges and solutions of IoT in smart grids using AI and machine learning
techniques: A review. Electronics. 2023;12(1):242.
[14] Salau BA, Rawal A, Rawat DB. Recent advances in artificial intelligence for wireless Internet of
Things and cyber‑physical systems: A comprehensive survey. IEEE Internet of Things Journal.
2022;9(15):12916–30.
[15] Baccour E, Mhaisen N, Abdellatif AA, Erbad A, Mohamed A, Hamdi M, Guizani M. Pervasive
AI for IoT applications: A survey on resource‑efficient distributed artificial intelligence. IEEE
Communications Surveys & Tutorials, vol. 24, no. 4, pp. 2366–2418, 2022.
[16] Mazhar T, Talpur DB, Shloul TA, Ghadi YY, Haq I, Ullah I, Ouahada K, Hamam H. Analysis
of IoT security challenges and its solutions using artificial intelligence. Brain Sciences.
2023;13(4):683.
[17] Gokhale P, Bhat O, Bhat S. Introduction to IOT. International Advanced Research Journal in
Science, Engineering and Technology. 2018;5(1):41–4.
[18] Kaur H, Nori H, Jenkins S, Caruana R, Wallach H, Wortman Vaughan J. Interpreting inter‑
pretability: understanding data scientists’ use of interpretability tools for machine learning.
In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, Honolulu
HI, USA, April 21, 2020, pp. 1–14.
[19] Khalil H, Rahman SU, Ullah I, Khan I, Alghadhban AJ, Al‑Adhaileh MH, Ali G, ElAffendi M.
A UAV‑swarm‑communication model using a machine‑learning approach for search‑and‑res‑
cue applications. Drones. 2022;6(12):372.
[20] Mazhar T, Malik MA, Haq I, Rozeela I, Ullah I, Khan MA, Adhikari D, Ben Othman MT,
Hamam H. The role of ML, AI and 5G technology in smart energy and smart building man‑
agement. Electronics. 2022;11(23):3960.
[21] Davenport TH, Patil DJ. Data scientist. Harvard Business Review. 2012;90(5):70–6.
[22] Rayes A, Salam S. Internet of Things from Hype to Reality. Springer, Switzerland, 2017.
[23] Ullah A, Jami A, Aziz MW, Naeem F, Ahmad S, Anwar MS, Jing W. Deep facial expression
recognition of facial variations using fusion of feature extraction with classification in end to
end model. In 2019 4th International Conference on Emerging Trends in Engineering, Sciences
and Technology (ICEEST), Karachi, Pakistan, December 10, 2019, pp. 1–6. IEEE.
[24] Ahmad S, Anwar MS, Ebrahim M, Khan W, Raza K, Adil SH, Amin A. Deep network for the
iterative estimations of students’ cognitive skills. IEEE Access. 2020;8:103100–13.
90 ◾ Future Communication Systems Using AI, IoT and Data Science
[25] Ullah A, Wang J, Anwar MS, Ahmad U, Saeed U, Fei Z. Facial expression recognition of
nonlinear facial variations using deep locality de‑expression residue learning in the wild.
Electronics. 2019;8(12):1487.
[26] Khan HU, Sohail M, Ali F, Nazir S, Ghadi YY, Ullah I. Prioritizing the multi‑criterial fea‑
tures based on comparative approaches for enhancing security of IoT devices. Physical
Communication. 2023;59:102084.
[27] Mazhar T, Irfan HM, Khan S, Haq I, Ullah I, Iqbal M, Hamam H. Analysis of cyber security
attacks and its solutions for the smart grid using machine learning and blockchain methods.
Future Internet. 2023;15(2):83.
[28] Shafique K, Khawaja BA, Sabir F, Qazi S, Mustaqim M. Internet of Things (IoT) for next‑gen‑
eration smart systems: A review of current challenges, future trends and prospects for emerg‑
ing 5G‑IoT scenarios. IEEE Access. 2020;8:23022–40.
[29] Plaza‑Hernández M, Gil‑González AB, Rodríguez‑González S, Prieto‑Tejedor J,
Corchado‑Rodríguez JM. Integration of IoT technologies in the maritime industry. In
Distributed Computing and Artificial Intelligence, Special Sessions, 17th International
Conference, Aquila, Italy, 2021, pp. 107–115. Springer International Publishing.
[30] Li S, Da Xu L, Wang X. Compressed sensing signal and data acquisition in wireless sensor net‑
works and internet of things. IEEE Transactions on Industrial Informatics. 2012;9(4):2177–86.
[31] Ding W, Jing X, Yan Z, Yang LT. A survey on data fusion in internet of things: Towards secure
and privacy‑preserving fusion. Information Fusion. 2019;51:129–44.
[32] Abideen ZU, Mazhar T, Razzaq A, Haq I, Ullah I, Alasmary H, Mohamed HG. Analysis of
enrollment criteria in secondary schools using machine learning and data mining approach.
Electronics. 2023;12(3):694.
[33] Haq I, Mazhar T, Malik MA, Kamal MM, Ullah I, Kim T, Hamdi M, Hamam H. Lung nod‑
ules localization and report analysis from computerized tomography (CT) scan using a novel
machine learning approach. Applied Sciences. 2022;12(24):12614.
[34] Fagroud FZ, Ajallouda L, Toumi H, Achtaich K, El Filali S. IOT search engines: Exploratory
data analysis. Procedia Computer Science. 2020;175:572–7.
[35] Ullah I, Su X, Zhu J, Zhang X, Choi D, Hou Z. Evaluation of localization by extended Kalman
filter, unscented Kalman filter, and particle filter‑based techniques. Wireless Communications
and Mobile Computing. 2020;2020:1–5.
[36] Pal R, Adhikari D, Heyat MB, Ullah I, You Z. Yoga meets intelligent Internet of Things: Recent
challenges and future directions. Bioengineering. 2023;10(4):459.
[37] Rasheed Z, Ma YK, Ullah I, Al Shloul T, Tufail AB, Ghadi YY, Khan MZ, Mohamed HG.
Automated classification of brain tumors from magnetic resonance imaging using deep
learning. Brain Sciences. 2023;13(4):602.
[38] Ahmad S, Ullah T, Ahmad I, Al‑Sharabi A, Ullah K, Khan RA, Rasheed S, Ullah I, Uddin MN,
Ali MS. A novel hybrid deep learning model for metastatic cancer detection. Computational
Intelligence and Neuroscience. 2022;2022, 14 pages.
[39] Ullah I, Qian S, Deng Z, Lee JH. Extended Kalman filter‑based localization algorithm by
edge computing in wireless sensor networks. Digital Communications and Networks.
2021;7(2):187–95.
[40] Simmhan Y, Perera S. Big data analytics platforms for real‑time applications in IoT. Big Data
Analytics: Methods and Applications. 2016:115–35.
[41] Anwar MS, Wang J, Khan W, Ullah A, Ahmad S, Fei Z. Subjective QoE of 360‑degree virtual
reality videos and machine learning predictions. IEEE Access. 2020;8:148084–99.
[42] Ullah A, Wang J, Anwar MS, Ahmad A, Nazir S, Khan HU, Fei Z. Fusion of machine learning
and privacy preserving for secure facial expression recognition. Security and Communication
Networks. 2021;2021:1–2.
Data Science Meets Intelligent Internet of Things ◾ 91
[43] Javaid S, Javaid N, Alhussein M, Aurangzeb K, Iqbal S, Anwar MS. Towards efficient
human‑machine interaction for home energy management with seasonal scheduling using
deep fuzzy neural optimizer. Cognition, Technology & Work. 2023;25:1–4.
[44] Anwar MS, Wang J, Ahmad S, Khan W, Ullah A, Shah M, Fei Z. Impact of the impairment
in 360‑degree videos on users VR involvement and machine learning‑based QoE predictions.
IEEE Access. 2020;8:204585–96.
[45] ur Rehman MH, Yaqoob I, Salah K, Imran M, Jayaraman PP, Perera C. The role of big data ana‑
lytics in industrial Internet of Things. Future Generation Computer Systems. 2019;99:247–59.
[46] Waleed S, Ullah I, Khan WU, Rehman AU, Rahman T, Li S. Resource allocation of 5G network
by exploiting particle swarm optimization. Iran Journal of Computer Science. 2021;4(3):211–9.
[47] Ge M, Bangui H, Buhnova B. Big data for Internet of Things: A survey. Future Generation
Computer Systems. 2018;87:601–14.
[48] Ren J, Zhang D, He S, Zhang Y, Li T. A survey on end‑edge‑cloud orchestrated network com‑
puting paradigms: Transparent computing, mobile edge computing, fog computing, and
cloudlet. ACM Computing Surveys (CSUR). 2019;52(6):1–36.
[49] Ullah I, Shen Y, Su X, Esposito C, Choi C. A localization based on unscented Kalman filter
and particle filter localization algorithms. IEEE Access. 2019;8:2233–46.
[50] Ullah A, Wang J, Anwar MS, Whangbo TK, Zhu Y. Empirical investigation of multimodal sen‑
sors in novel deep facial expression recognition in‑the‑wild. Journal of Sensors. 2021;2021:1–3.
[51] Ahmad S, Anwar MS, Khan MA, Shahzad M, Ebrahim M, Memon I. Deep frustration sever‑
ity network for the prediction of declined students’ cognitive skills. In 2021 4th International
Conference on Computing & Information Sciences (ICCIS), Karachi, Pakistan, November 29,
2021, pp. 1–6. IEEE.
[52] Ullah N, Khan MS, Khan JA, Choi A, Anwar MS. A robust end‑to‑end deep learning‑based
approach for effective and reliable BTD using MR images. Sensors. 2022;22(19):7575.
[53] Aqeel‑ur‑Rehman SU, Khan IU, Moiz M, Hasan S. Security and privacy issues in IoT.
International Journal of Communication Networks and Information Security (IJCNIS).
2016;8(3):147–57.
[54] Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B. A survey on IoT security:
Application areas, security threats, and solution architectures. IEEE Access. 2019;7:82721–43.
[55] Zhou W, Jia Y, Peng A, Zhang Y, Liu P. The effect of iot new features on security and pri‑
vacy: New threats, existing solutions, and challenges yet to be solved. IEEE Internet of Things
Journal. 2018;6(2):1606–16.
[56] Khan HU, Ali F, Ghadi YY, Nazir S, Ullah I, Mohamed HG. Human‑computer interaction
and participation in software crowdsourcing. Electronics. 2023;12(4):934.
[57] Karale A. The challenges of IoT addressing security, ethics, privacy, and laws. Internet of
Things. 2021;15:100420.
[58] Elijah O, Rahman TA, Orikumhi I, Leow CY, Hindia MN. An overview of Internet of Things
(IoT) and data analytics in agriculture: Benefits and challenges. IEEE Internet of Things
Journal. 2018;5(5):3758–73.
[59] AboBakr A, Azer MA. IoT ethics challenges and legal issues. In 2017 12th International
Conference on Computer Engineering and Systems (ICCES), Cairo, Egypt, December 19, 2017,
pp. 233–237. IEEE.
[60] Raza M, Barket AR, Rehman AU, Rehman A, Ullah I. Mobile crowdsensing based architecture
for intelligent traffic prediction and quickest path selection. In 2020 International Conference
on UK‑China Emerging Technologies (UCET), Glasgow, UK, August 20, 2020, pp. 1–4. IEEE.
Chapter 6
Muhammad Muneer
University of Mianwali
Naveed Riaz
National University of Science and Technology (NUST)
6.1 INTRODUCTION
There is an enormous amount of data processing taking place online. The National
Security Agency claims to process an astounding 1,826 petabytes (PB) of data each day
[1]. Data generation per day surpassed 2.5 quintillion bytes in 2018 [2]. The amount of
created data is expected to double every two years, according to an earlier prediction by
the International Data Corporation (IDC) [3]. It has been observed that 90% of the data
created worldwide occurred in the previous two years, indicating an even quicker growth
rate. Popular platforms such as Google process over 99,000 searches every single second.
This makes more than 8.5 billion searches per day. Big data and data science are rap‑
idly expanding fields due to increasing interest and demand. “Data science” has become
increasingly popular as a result of its applicability in a variety of sectors, while “big data”
has gained traction as businesses realize the benefit of processing and analyzing enor‑
mous amounts of data to gather knowledge and make wise decisions. Figure 6.1 shows a
comparative graph of data science and big data trends.
92 DOI: 10.1201/9781032648309-8
Data Science and Big Data Analytics ◾ 93
FIGURE 6.1 A comparative graph of data science and big data trends.
To extract meaningful insights from enormous datasets, advanced data analysis tech‑
niques are essential for transforming big data into smart data [4]. Smart data provides
organizations and businesses with useful information that improves their ability to make
decisions. Healthcare professionals can be empowered to provide patients with efficient
and cost‑effective solutions by evaluating large datasets from programs like Clinical
Decision Systems and Electronic Health Records [5]. Better judgments may be made by
looking at overall patient history patterns as opposed to merely relying on localized or
recent data. The 17 Vs of big data, which are validity, velocity, versatility, volume, veracity,
value, variety, voluntariness, volatility, venue, vagueness, viscosity, variability, visualiza‑
tion, vocabulary, virality, and verbosity [6], provide difficulties for traditional data ana‑
lytics when dealing with big data analysis. These characteristics might cause traditional
data analytics to lose their efficacy. Advanced data analysis methods are needed to extract
valuable insights from huge and complicated datasets to address these difficulties. Several
artificial intelligence approaches, including deep learning, natural language processing
(NLP), data mining, machine learning (ML), and expert systems, have been developed to
solve the difficulties of large data analytics [7]. For managing enormous amounts of data,
these approaches provide quicker, more accurate, and more exact solutions [8]. These cut‑
ting‑edge analytical methods’ main goal is to unearth important data, obscure patterns,
and undiscover relationships inside huge datasets. For instance, by carefully examining
past patient data, it is possible to spot potentially harmful illnesses early, which might
result in better treatment strategies or a cure [9]. Additionally, complex business decisions
like entering new markets or launching new goods can be supported by simulations with
increased decision‑making capabilities, resulting in better decisions. The broad discipline
of deriving information and insights from data is covered by data science. Big Data refers
94 ◾ Future Communication Systems Using AI, IoT and Data Science
FIGURE 6.2 The relationship between data science, big data, big data analytics, and data analytics.
to huge and complicated datasets, whereas Data Analytics and Big Data Analytics both
include the study of data, with the latter addressing data analysis more generally and the
former concentrating primarily on large‑scale datasets shown in Figure 6.2.
AI‑powered big data analytics holds tremendous potential; however, it also brings mul‑
tiple drawbacks, especially when confronted with uncertainty. There are seven impor‑
tant big data Vs—velocity, verbosity, variety, versatility, volume, veracity, and value, all
introduce different types of uncertainty that can affect the quality and reliability of data.
Some types of uncertainty in big data include measurement uncertainty, incompleteness,
and imperfect, or noisy data. The whole analytics process, including data gathering, orga‑
nization, and analysis, can be affected by uncertainty. The majority of data mining and
ML approaches face a significant hurdle when handling ambiguous and incomplete data.
Furthermore, biased training data may prevent ML algorithms from producing optimal
results. According to Wang et al. [10], uncertainty considerably influences how well big
data analytics function, highlighting six primary problems. Dealing with the uncertainty
present in large datasets is a different issue, and data mining and ML algorithms frequently
face similar difficulties.
These uncertainties might exacerbate any mistakes or shortfalls in the whole analytics
process when grown up to the big data level. Because uncertainty may greatly affect the
accuracy of an automated technique’s output, minimizing uncertainty in big data analytics
becomes a primary concern for all automated techniques. Uncertainty management must
be done well for big data analytics to produce trustworthy and valuable insights.
Our review of the literature revealed that limited study to understand how uncertainty
influences the fusion of big data and applied analytics methodologies. This chapter pro‑
vides a summary of current AI methods in the context of big data analytics, including
NLP, Computational Intelligence (CI), and ML, to fill this gap [11]. A particular emphasis is
placed on the issues posed by uncertainty. The report also suggests future fields of inquiry
for this type of study.
Data Science and Big Data Analytics ◾ 95
• We investigate how different variables affect the crucial Vs of big data features in data
science and big data analytics.
• We examine how each of the different big data analytics methods is impacted by
uncertainty.
• We go over many approaches that may be used to successfully address the problems
that uncertainty presents.
the type of data being analyzed and the time period. Big data is now typically categorized
as datasets in the Exabyte (EB) or Zettabyte (ZB) categories [8]. However, smaller datasets
still provide difficulties. For instance, Walmart gathers 2.5 petabytes (PB) of data per hour
[17] from more than a million consumers, which might lead to scalability and uncertainty
problems. Managing exceedingly large datasets can be a challenge for database tools.
Moreover, many current data analysis methodologies are not tailored for handling massive
databases and may prove inadequate when processing and comprehending information at
such vast scales [8,18].
6.2.1.2 Variety
The term “variety” is used to describe the many types of data that can be encountered
within a big data dataset, including unstructured, semi‑structured, and structured infor‑
mation. Structured data, similar to the information stored in relational databases, are well
organized and easy to categorize. In contrast, unstructured data, such as text and multi‑
media content, lack a predefined format and are difficult to evaluate. Semi‑structured data,
often found in NoSQL databases, use tags to distinguish between different data elements
but rely on database users to enforce the structure [19]. Uncertainty arises when dealing
with mixed data types, converting between multiple data formats, or when the underlying
dataset structure changes over time. Traditional big data analytics algorithms face difficul‑
ties when handling multi‑modal, imperfect, and noisy data from various sources.
It might be difficult to effectively analyze unstructured and semi‑structured data
since they originate from many sources and have various forms and representations. In
real‑world databases, the analysis process is significantly impacted by inconsistent, short,
and noisy data. Data cleaning, data integration, and data transformation are only a few of
the data preparation approaches used to solve the problems brought on by the diversity
in large data, such as noise and inconsistent data. The goals of data cleaning procedures
are to enhance data quality and reduce data elements. These methods can greatly improve
data analysis performance by eliminating noisy components throughout the analysis pro‑
cess. For instance, data cleaning can enhance classification accuracy in ML by identifying
and removing mislabeled training examples, which can assist in discovering and repairing
problems [20].
6.2.1.3 Velocity
The term “velocity” in the context of big data refers to the speed at which data are pro‑
cessed. This velocity can be categorized into real‑time, streaming, and near‑real‑time. It is
crucial that the processing speed matches the rate of data generation [8]. Devices connected
to the Internet of Things (IoT) produce sensor data continually [21]. Delays in processing
and delivering these data to relevant parties, especially when it contains critical medical
information, can have severe consequences, such as patient harm or even loss of life, as
exemplified by a pacemaker reporting a medical emergency [16]. Similarly, cyber‑physical
devices rely on real‑time operating systems that adhere to exact timing specifications. As
a result, when data from a big data application are not supplied on time, issues may arise.
Data Science and Big Data Analytics ◾ 97
6.2.1.4 Veracity
Veracity relates to the data’s accuracy, which might be unclear or uncertain. For exam‑
ple, according to IBM’s estimate, poor data quality costs the US economy approximately
$3.1 trillion a year [22]. The quality of data is often assessed as good, poor, or undefined
due to inconsistencies, noise, ambiguity, or incompleteness. Building accuracy and con‑
fidence in big data analytics gets increasingly difficult as data sources and types become
more diverse. For example, data from platforms like Twitter may pose issues because users
sometimes mix their personal opinions with official company information on the same
account. Using methods created for Twitter datasets might result in problems because of
this. Similarly, ambiguity or irregularities in the dataset might impair the accuracy of the
analytics process when evaluating millions of records in the healthcare industry to identify
disease patterns for breakout mitigation [22].
6.2.1.5 Value
In contrast to the preceding Vs, which mostly concentrated on the difficulties presented
by big data, “value” refers to the relevance and utility of data for making informed deci‑
sions. Notable businesses that have successfully tapped into the potential of big data
through analytics in their products include Facebook, Google, and Amazon. To provide
users with individualized product suggestions and increase sales and user engagement,
Amazon, for instance, analyzes large user datasets and purchase data. Google improves
location services in Google Maps by using location information provided by Android
users. In a similar vein, Facebook uses user activity to deliver relevant ads and friend
suggestions. These businesses have shown great success by deriving insightful knowl‑
edge from sizable raw data collections, which has helped them make wiser business deci‑
sions [23].
6.2.1.6 Verbosity
Big data is a massive collection of information from several sources that can be well orga‑
nized or poorly structured and contain both accurate and inaccurate information. Bad
data is inaccurate or lacking, and storing it might be dangerous. It is crucial to ensure that
the data we retain are secure, relevant, comprehensive, and reliable to avoid wasting stor‑
age space and processing time. Early in the data management process, it’s crucial to employ
appropriate procedures to determine the worthiness of the information, thus conserving
valuable resources. Big data has a trait known as “verbosity,” which refers to the possibil‑
ity of repeating or overlapping information from numerous sources, making it difficult to
efficiently manage and analyze.
6.2.1.7 Versatility
Big data is becoming increasingly vital for several enterprises, academics, and govern‑
ments. It is used for a variety of things, including urban planning, environment model‑
ing, visualization, analysis, environmental security, quality categorization, computational
analysis, comprehending biology, and developing and manufacturing processes. It also
aids in the development of affordable models and the tasteful exploration of outcomes. Big
98 ◾ Future Communication Systems Using AI, IoT and Data Science
data has this ability to be resourceful and adaptable, which is why we call it “versatility,”
which means that it may be used flexibly for many contexts and objectives.
Indeed, several cutting‑edge data analysis methods, including data mining, NLP, ML,
and CI, are crucial in the field of big data analytics. To break down complicated big data
issues into smaller, more manageable jobs, other possible tactics including instance selec‑
tion, parallelization, sampling, incremental learning, feature selection, granular comput‑
ing, and divide‑and‑conquer are used. Firms may maximize the advantages of big data by
implementing these tactics and strategies, which help firms make more informed choices,
save operating costs, and allow more effective data processing.
• Parallelization is a potent tool used in big data analytics that shortens computing
times by splitting up complex issues into simpler ones and carrying out these smaller
jobs concurrently. This entails splitting up the job among several threads, cores, or
processors, so they may focus on various aspects of the data concurrently. Because
smaller activities are executed concurrently rather than sequentially, parallelization
considerably accelerates the data processing process, increasing the overall effective‑
ness of big data analytics [10]. Parallelization is an essential strategy for managing
large‑scale data processing because, while it doesn’t lower the quantity of work per‑
formed, it does effectively shorten the time required to finish the analysis.
• The divide‑and‑conquer tactic is a vital method for handling huge data. It entails
three steps: (1) breaking a huge issue down into minor issues; (2) solving each of the
minor issues independently in a way that helps to solve the larger overall problem;
and (3) combining the smaller problem solutions to come up with a solution for the
entire large problem. For many years, this method has been used extensively in man‑
aging enormous databases because it enables the editing of records in groups rather
than the processing of all the data at once. Divide‑and‑conquer techniques make big
Data Science and Big Data Analytics ◾ 101
data processing easier to control and more effective, allowing for faster analysis of
massive datasets with less computing work.
• A popular learning approach for streaming data is incremental learning. Traditional
batch learning trains the model using historical data, whereas incremental learn‑
ing only uses fresh data. This indicates that the algorithm changes its parameters
throughout time, integrating fresh input data just once for training purposes [10].
• By selecting, modifying, and investigating a smaller portion of the data, sampling
is a data reduction technique used in big data analytics to detect trends in massive
datasets [10]. The factors employed for data selection affect the efficacy of sampling.
• A huge space’s constituents are broken down into smaller sets, or granules, using
granular computing. By condensing several huge objects into a more manageable and
compact search area, this method efficiently characterizes uncertainty in the search
space.
• A common strategy for dealing with huge data is feature selection, which aims to pick
a subset of pertinent characteristics for a more accurate data representation. It turns
out to be an effective data mining technique for creating large datasets.
• In many ML and data mining jobs that include data preprocessing, instance selection
is a useful feature. Instance selection can be used to reduce the number of training
sets and the length of the categorization or phase of training.
Techniques used in feature learning allow a system to robotically find the illustrations
required for identifying and categorizing features from raw data. The choice of data for‑
mat has a big impact on how well ML algorithms perform. Deep learning algorithms were
created expressly to sift through and extract useful information from the large volumes
of data gathered from multiple sources, including the minute differences found within a
picture, such as differing materials, lighting conditions, and forms. However, because of
their complexity and the vast amounts of data they handle, current deep learning models
have the issue of incurring a significant computational cost. Distributed learning is a tech‑
nique that may be used to scale up the learning process and overcome the scalability prob‑
lem with classical ML. By properly transferring knowledge from a related area, transfer
learning effectively improves a learner’s performance by using knowledge obtained in one
domain and applying it to new situations. The use of adaptive data collection approaches
by active learning, on the other hand, addresses labeling issues and accelerates ML pro‑
cesses by automatically modifying settings to acquire the most valuable data quickly. The
main sources of the uncertainty problems that ML approaches encounter include learning
from data that have poor accuracy (i.e., incomplete and uncertain data) and small value
(i.e., irrelevant to the present situation). Other ML methods, such as fuzzy logic theory,
deep learning, and active learning, have shown special usefulness in addressing the issue
of reducing uncertainty [33]. The efficiency of various methods for dealing with uncer‑
tainty in ML problems is shown in Figure 6.5. Machine learning (ML) can be affected by
uncertainty in several ways, including when dealing with inadequate or inaccurate train‑
ing samples that result in ambiguous categorization boundaries and a restricted compre‑
hension of the target data. Data may occasionally lack labels, which present a problem for
conventional ML methods. Learning from unlabeled data is challenging because imprecise
instructions can produce confusing outcomes, and manually labeling huge datasets can be
costly and time‑consuming. By picking the most important examples for labeling, active
learning has proven successful in resolving this problem and improving the effectiveness
and efficiency of the learning process. Another ML approach that can address concerns
with consistency and incompleteness in the classification process is deep learning [18].
It allows for the automated extraction of pertinent characteristics from data, minimiz‑
ing the requirement for manually created features and enhancing the model’s resilience.
Another method for modeling uncertainty effectively is fuzzy logic theory. By adding a
fuzzy relationship to each SVM input idea, fuzzy support vector machines (FSVMs) allow
for a more flexible and adaptive classification process. Fuzzy logic helps FSVMs manage
uncertain and imprecise input effectively, improving performance in classification tasks.
Due to the flexibility offered by fuzzy logic’s application in the learning process, support
vector machines (SVMs) are improved by lessening the effect of data point noise. In light
of this, even while insecurity is a substantial badly behaved for ML algorithms, including
efficient methods to quantify and describe insecurity can lead to organizations that are
more adaptable and successful. ML models may produce more accurate and trustworthy
results by addressing uncertainty effectively, improving their overall performance across a
range of applications.
intended dataset (e.g., a database or document). The accuracy of keyword searches might be
impacted by uncertainty, though, as the inclusion of a term does not ensure the relevancy
of the content. For instance, a keyword search may miss words with spelling mistakes that
are nevertheless significant since they frequently match precise strings. To overcome this,
fuzzy search technologies and Boolean operators provide greater flexibility by letting the
search for words that have the intended spelling but are spelled differently. Although a
useful strategy in text mining, keyword or keyphrase search has its drawbacks. A limited
choice of search keywords might result in the omission of crucial information, while a larger
set could provide a significant number of unrelated false positive results. Automatic POS
taggers provide yet another noteworthy illustration of how uncertainty impacts NLP. In
some terms, such as “bimonthly,” which might indicate depending on the situation, every
two months or twice a month, these taggers run into ambiguity. Furthermore, terms like
“quite” could have distinct connotations for audiences in the United States and the United
Kingdom. Additionally, there may be difficulties with correct tagging and interpretation
due to the ambiguity of periods (‘.’), which can be read as either punctuation (such as a full
stop) or a token (such as an abbreviation). Utilizing IBM Content Analytics (ICA), accord‑
ing to a recent study, may assist in mitigating these problems. The issue of handling mas‑
sive amounts of data, meanwhile, has yet to be overcome in this field. Additionally, when
working with biological language, which differs much from Standard English, uncertainty
and ambiguity have a major influence on part‑of‑speech (POS) labeling. When employing
trained taggers from the Treebank corpus on biological data [34], there are concerns with
uncertainty and poor tagging accuracy, according to studies. Stream processing systems
are being utilized to handle massive volumes of data fast and with short reaction times
to solve this issue. Large‑scale textual data may be handled in real time by combining
NLP approaches with uncertainty modelings. To properly explore and develop these skills,
more study in this field is necessary.
data analysis. These methods are used to develop empirical statistical prediction models,
collaborative filtering, and train computers to execute predictive analysis tasks. Using
CI‑based big data analytics solutions makes it feasible to analyze enormous amounts of
data more accurately and with less complexity and ambiguity.
By enabling approximation reasoning and modeling of qualitative data using linguis‑
tic quantifiers (fuzzy sets), fuzzy logic is an effective strategy for addressing uncertainty
concerns in big data analytics. It enables the encoding of ambiguous user‑defined and
real‑world ideas, as well as interpretable fuzzy rules that support inference and deci‑
sion‑making. Data noise presents problems for big data analytics because it causes outlier
artifacts and high levels of uncertainty. Fuzzy logic methods effectively manage the data’s
innate uncertainties. Another study used Map Reduce and fuzzy logic‑based matching
algorithms for experimental decision provision to do big data analytics, demonstrating
significant flexibility in managing data from multiple bases. An additional helpful CI
approach for overcoming the difficulties of large data analytics is evolutionary algorithms.
By gradually building up a population of potential solutions, EAs imitate the evolution
process to find the best answers to challenging issues. Big data is notoriously difficult to
analyze because of its huge volume, diversity, and poor degree of authenticity. For instance,
utilizing parallel genetic algorithms to analyze medical images has produced successful
outcomes in a Hadoop‑based system. However, it is crucial to recognize that motion, noise,
and unexpected situations may influence the results of CI‑based algorithms. Additionally,
an algorithm that successfully solves one of these issues may struggle to do so when several
variables are in play at once [37].
results, classifying each AI approach as NLP, ML, or CI. The second attribute indicates
how each approach is impacted by uncertainty, both how the technique itself and the data
are uncertain. An overview of the suggested mitigating tactics for dealing with the prob‑
lems brought on by uncertainty is given in the third column. For instance, the first row
of Table 6.2 shows how inadequate training data can cause ambiguity in ML. Using the
method of active learning that chooses a subclass of the data is thought to be very impor‑
tant, thus solving the issue of little practice data, is one potential strategy for overcoming
this specific uncertainty.
Keep in mind that we went over each big data aspect individually. However, integrating
one or more big data qualities will result in an exponential increase in uncertainty, neces‑
sitating much more research.
Numerous issues are presented in the fields of data science and big data analytics and are
strongly related to human applications and processes. A major challenge is managing enor‑
mous and constantly growing amounts of data, which calls for sophisticated infrastructure
and quick processing techniques. Structured, unstructured, and semi‑structured data are
all different and varied, which complicates their integration and analysis. To reach valid
findings and make wise judgments, it is essential to guarantee the trustworthiness and
quality of the data. To foster trust and protect sensitive information, it is crucial to address
privacy issues and ensure data security. Deep knowledge of the data and the issue at hand
is necessary to choose the best algorithms for a given task. To gain significant insights from
complicated datasets, it is crucial to bridge the gap between domain knowledge and techni‑
cal competence. In dynamic contexts, real‑time data analysis and prompt decision‑making
are becoming more and more crucial. Additionally, as data analytics is influencing a vari‑
ety of sectors in an ever‑increasing way, addressing ethical issues and potential biases in
data utilization is essential for providing accurate and impartial insights. Data science and
big data analytics may realize their true potential to improve human experiences and spur
innovation in a variety of industries by overcoming these obstacles [41].
6.8 CONCLUSION
This chapter has provided an in‑depth review of big data, covering and improving the
functionality and intelligence of an application. We have also represented the contempo‑
rary appeal of big data and data science. Big data is a collection of datasets that are always
expanding since data are produced by everyone and for every purpose, including call cen‑
ters and handheld electronics. The seven critical big data Vs—velocity, verbosity, variety,
versatility, volume, veracity, and value—are also discussed in this chapter. The emphasized
features will likely provide straightforward and efficient big data management that may be
used for value‑added applications and research settings. We have now covered the difficul‑
ties we encountered within the parameters of our study, as well as potential future areas
and lines of inquiry. When processing vast amounts of data, typical pattern analysis meth‑
ods might be difficult to use. However, uncertainty exists in many different forms, which
results in findings of low quality and low accuracy. Overall, we conclude that our investiga‑
tion into sophisticated analytical and uncertainty solutions based on big data techniques
and data science is fruitful and can serve as a model for future work in the field of data
science and its practical applications.
REFERENCES
[1] K. U. Jaseena and J. M. David, “Issues, challenges, and solutions: Big data mining,” CS &
IT‑CSCP, vol. 4, no. 13, pp. 131–140, 2014.
[2] B. Marr, “How much data do we create every day? The mind‑blowing stats everyone should
read,” Forbes, vol. 21, pp. 1–5, 2018.
[3] A. McAfee, E. Brynjolfsson, T. H. Davenport, D. J. Patil, and D. Barton, “Big data: The man‑
agement revolution,” Harvard Business Review, vol. 90, no. 10, pp. 60–68, 2012.
[4] A. Lenk, L. Bonorden, A. Hellmanns, N. Roedder, and S. Jaehnichen, “Towards a taxonomy of
standards in smart data,” In 2015 IEEE International Conference on Big Data (Big Data), Santa
Clara, CA, USA, IEEE, 2015, pp. 1749–1754.
108 ◾ Future Communication Systems Using AI, IoT and Data Science
[5] S. Hayat, F. Rehman, N. Riaz, H. Sharif, S. Irshad, and S. Shareef, “Using machine learning
algorithms to detect dysplasia in Barrett’s esophagus,” In 2022 2nd International Conference
on Digital Futures and Transformative Technologies (ICoDT2), Rawalpindi, Pakistan, IEEE,
2022, pp. 1–6.
[6] A. Panimalar, V. Shree, and V. Kathrine, “The 17 V’s of big data,” International Research
Journal of Engineering and Technology (IRJET), vol. 4, no. 9, pp. 3–6, 2017.
[7] N. Sarfraz, F. Rehman, H. Sharif, S. Akram, B. H. Mughal, and A. Ashfaq, “Efficient energy
storage systems management in power plants with artificial intelligence and price control,” In
2022 3rd International Conference on Innovations in Computer Science & Software Engineering
(ICONICS), Karachi, Pakistan, IEEE, 2022, pp. 1–5.
[8] M. Chen, S. Mao, and Y. Liu, “Big data: A survey,” Mobile Networks and Applications, vol. 19,
pp. 171–209, 2014.
[9] S. Pouyanfar, Y. Yang, S.‑C. Chen, M.‑L. Shyu, and S. S. Iyengar, “Multimedia big data analyt‑
ics: A survey,” ACM Computing Surveys (CSUR), vol. 51, no. 1, pp. 1–34, 2018.
[10] X. Wang and Y. He, “Learning from uncertainty for big data: Future analytical challenges and
strategies,” IEEE Systems, Man, and Cybernetics Magazine, vol. 2, no. 2, pp. 26–31, 2016.
[11] I. Manan, F. Rehman, H. Sharif, N. Riaz, M. Atif, and M. Aqeel, “Quantum computing and
machine learning algorithms – A review,” In 2022 3rd International Conference on Innovations
in Computer Science & Software Engineering (ICONICS), Karachi, Pakistan, IEEE, 2022,
pp. 1–6.
[12] B. Brown et al., Big Data: The Next Frontier for Innovation, Competition, and Productivity,
McKinsey Global Institute, New York, pp. 1–156, 2011.
[13] R. L. Villars, C. W. Olofson, and M. Eastwood, “Big data: What it is and why you should care,”
White Paper, IDC, vol. 14, pp. 1–14, 2011.
[14] D. Laney, “3D data management: Controlling data volume, velocity and variety,” META
Group Research Note, vol. 6, no. 70, p. 1, 2001.
[15] J. Gantz and D. Reinsel, “Extracting value from chaos,” IDC Iview, vol. 1142, no. 2011, pp. 1–12,
2011.
[16] A. Jain, The 5 Vs of Big Data, IBM Watson Health Perspectives, New York, 2017.
[17] B. Marr, “Really big data at walmart: Real‑time insights from their 40+ petabyte data cloud,”
Forbes, vol. 23, p. 1–3, 2017.
[18] D. Saidulu and R. Sasikala, “Machine learning and statistical approaches for big data: Issues,
challenges and research directions,” International Journal of Applied Engineering Research,
vol. 12, no. 21, pp. 11691–11699, 2017.
[19] A. Gandomi and M. Haider, “Beyond the hype: Big data concepts, methods, and analytics,”
International Journal of Information Management, vol. 35, no. 2, pp. 137–144, 2015.
[20] H. Xiong, G. Pandey, M. Steinbach, and V. Kumar, “Enhancing data analysis with noise
removal,” IEEE transactions on knowledge and data engineering, vol. 18, no. 3, pp. 304–319,
2006.
[21] M. H. Khalid et al., “A brief overview of deep learning approaches for IoT security,” In 2023
4th International Conference on Computing, Mathematics and Engineering Technologies
(iCoMET), Sukkur, Pakistan, IEEE, 2023, pp. 1–5.
[22] I. B. M. B. Data and A. Hub, “Extracting business value from the 4 V’s of big data,” Retrieved
July, vol. 19, no. 2017, pp. 25–60, 2016.
[23] D. Court, “Getting big impact from big data,” McKinsey Quarterly, vol. 1, no. 1, pp. 52–60,
2015.
[24] F. H. Knight, “Risk, uncertainty, and profit. Library of economics and liberty,” Acceso, vol. 31,
p. 2017, 1921.
[25] C.‑W. Tsai, C.‑F. Lai, H.‑C. Chao, and A. V Vasilakos, “Big data analytics: A survey,” Journal
of Big Data, vol. 2, no. 1, pp. 1–32, 2015.
Data Science and Big Data Analytics ◾ 109
[26] R. DeLine, “Research opportunities for the big data era of software engineering,” In 2015
IEEE/ACM 1st International Workshop on Big Data Software Engineering, Florence, Italy,
IEEE, 2015, pp. 26–29.
[27] V. López, S. Del Río, J. M. Benítez, and F. Herrera, “Cost‑sensitive linguistic fuzzy rule based
classification systems under the MapReduce framework for imbalanced big data,” Fuzzy Sets
and Systems, vol. 258, pp. 5–38, 2015.
[28] R. H. Hariri, E. M. Fredericks, and K. M. Bowers, “Uncertainty in big data analytics: Survey,
opportunities, and challenges,” Journal of Big Data, vol. 6, no. 1, pp. 1–16, 2019.
[29] A. Skowron, J. Komorowski, Z. Pawlak, and L. Polkowski, “Rough sets perspective on data
and knowledge,” In Willi Klösgen, Jan M. Zytkow (eds.), Handbook of Data Mining and
Knowledge Discovery, Oxford University Press, New York, 2002, pp. 134–149.
[30] I. Düntsch and G. Gediga, “Rough set dependency analysis in evaluation studies: An applica‑
tion in the study of repeated heart attacks,” Informatics Research Reports, vol. 10, pp. 25–30,
1995.
[31] D. G. Brown, “Classification and boundary vagueness in mapping presettlement forest types,”
International Journal of Geographical Information Science, vol. 12, no. 2, pp. 105–129, 1998.
[32] M. A. Mudassir Khan, “Big data analytics evaluation,” International Journal of Engineering
Research in Computer Science and Engineering (IJERCSE), vol. 5, no. 2, pp. 25–28, 2018.
[33] K. Weiss, T. M. Khoshgoftaar, and D. Wang, “A survey of transfer learning,” Journal of Big
Data, vol. 3, no. 1, pp. 1–40, 2016.
[34] Y. Tsuruoka et al., “Developing a robust part‑of‑speech tagger for biomedical text,”
In Advances in Informatics: 10th Panhellenic Conference on Informatics, PCI 2005, Volas,
Greece, November 11–13, 2005, Proceedings 10, Springer, 2005, pp. 382–392.
[35] J. Fulcher and L. C. Jain, Computational Intelligence: A Compendium, vol. 21, Springer,
New York, 2008.
[36] A. Gupta, “Big data analysis using computational intelligence and Hadoop: A study,” In 2015
2nd International Conference on Computing for Sustainable Global Development (INDIACom),
New Delhi, India, IEEE, 2015, pp. 1397–1401.
[37] F. Doctor, C.‑H. Syue, Y.‑X. Liu, J.‑S. Shieh, and R. Iqbal, “Type‑2 fuzzy sets applied to mul‑
tivariable self‑organizing fuzzy logic controllers for regulating anesthesia,” Applied Soft
Computing, vol. 38, pp. 872–889, 2016.
[38] C. Ma, H. H. Zhang, and X. Wang, “Machine learning for big data analytics in plants,” Trends
in Plant Science, vol. 19, no. 12, pp. 798–808, 2014.
[39] L. Wang, G. Wang, and C. A. Alexander, “Natural language processing systems and big
data analytics,” International Journal of Computational Systems Engineering, vol. 2, no. 2,
pp. 76–84, 2015.
[40] A. A. Tole, “Big data challenges,” Database Systems Journal, vol. 4, no. 3, pp. 31–40, 2013.
[41] R. Agarwal and V. Dhar, “Big data, data science, and analytics: The opportunity and challenge
for IS research,” Information Systems Research, vol. 25, no. 3, pp. 443–448, 2014.
Chapter 7
7.1 INTRODUCTION
Machine Learning and Artificial Intelligence (MAI) have emerged as revolutionary tech‑
nologies shaping the future world. These technologies have the potential to revolutionize
industries, improve efficiency, and enhance decision‑making processes [1]. AI refers to the
simulation of human intelligence in machines, enabling them to perform tasks that typi‑
cally require human intelligence, such as learning, reasoning, and problem‑solving. ML, a
subset of AI, focuses on algorithms and statistical models that allow machines to learn and
make predictions or decisions without being explicitly programmed [2]. MAI have gained
significant traction in recent years across various fields, including healthcare, finance,
transportation, and communication. Their applications range from medical diagnosis and
personalized recommendations to autonomous vehicles and natural language processing.
The rapid advancements in MAI have led to unprecedented opportunities and challenges
for individuals, organizations, and society [3].
As MAI technologies become increasingly pervasive, it is crucial to consider the ethical
implications associated with their development and deployment. Cyber ethics, a branch of
applied ethics, focuses on the moral and ethical issues arising in the context of technol‑
ogy, particularly concerning information security, privacy, and human values [4]. In MAI,
cyber ethics is critical in ensuring these technologies are developed and used responsibly,
ethically, and in line with societal values. This research explores the intersection of MAI
with cyber ethics and sheds light on the importance of ethical considerations in shap‑
ing the future world [5]. It examines MAI applications’ challenges and dilemmas, such
• Automation and Efficiency: MAI technologies can automate repetitive and mun‑
dane tasks, increasing efficiency and productivity [14]. This allows human workers to
focus on more complex and creative endeavors.
• Data‑Driven Decision‑Making: ML algorithms can analyze large volumes of data
and extract valuable insights, enabling data‑driven decision‑making and improving
the accuracy of predictions and recommendations [12].
• Personalization: MAI algorithms can personalize experiences, such as personalized
product recommendations in e‑commerce, personalized learning in education, or
personalized healthcare treatments [15].
• Improved Customer Service: AI‑powered chatbots and virtual assistants can pro‑
vide immediate and personalized customer support, improving customer satisfac‑
tion and reducing response times [16].
However, along with the benefits, there are also challenges associated with MAI adoption:
• Job Displacement: Automating certain tasks through MAI may lead to job displace‑
ment or require individuals to acquire new skills to adapt to changing job require‑
ments [18].
• Data Bias and Quality: ML algorithms heavily rely on data, and biases or poor data
quality can lead to biased or inaccurate outcomes [5]. Care must be taken to ensure
diverse and representative datasets.
• Security and Privacy: MAI technologies raise data security and privacy concerns.
Safeguarding sensitive information and preventing unauthorized access is crucial
[18].
7.3.1 Healthcare
ML and AI play a decisive role in healthcare. They are used in medical imaging analysis
to detect and diagnose diseases such as cancer. ML algorithms can analyze large volumes
of medical images, such as X‑rays and MRI scans, to identify patterns and anomalies [19].
AI‑powered systems assist in treatment planning, predicting patient outcomes, and per‑
sonalized medicine. Additionally, MAI facilitate drug discovery by analyzing vast datasets
and identifying potential candidates for new medications.
AI algorithms can scrutinize patient data and recognize potential health issues, allow‑
ing for treatment and early intervention. Moreover, AI has the potential to revolutionize
drug discovery and development, enlightening the efficiency and speed of the process [18].
In addition to its benefits in specific industries, AI has become essential for data analy‑
sis and management in the digital era. As more data is generated and collected, AI algo‑
rithms can analyze and identify patterns, insights, and trends, helping organizations make
data‑driven decisions [20]. Moreover, AI can improve data security by detecting and miti‑
gating cyber threats; some applications are presented in Figure 7.2 and the way it fosters
manufacturing.
7.3.2 Finance
In the finance industry, ML algorithms are employed in fraud detection systems. By
analyzing patterns and anomalies in transaction data, AI can identify fraudulent activi‑
ties and alert financial institutions. AI‑powered chatbots and virtual assistants provide
Artificial Intelligence and Machine Learning ◾ 115
personalized customer support and enhance user experiences [21]. Furthermore, ML algo‑
rithms analyze financial data and market trends to predict stock prices, optimize invest‑
ment strategies, and perform algorithmic trading.
7.3.3 Transportation
MAI technologies are transforming transportation, particularly in developing autono‑
mous vehicles. ML algorithms enable vehicles to perceive their surroundings through
sensors and make real‑time decisions based on the collected data [17]. This technology is
crucial for safe navigation and collision avoidance. Additionally, AI‑powered systems opti‑
mize traffic flow by analyzing historical and real‑time data, predicting congestion patterns,
and suggesting alternate routes [10]. Logistic companies utilize AI to optimize routing and
delivery processes, reducing costs and improving efficiency.
7.3.8 Cybersecurity
ML and AI are instrumental in combating cyber threats. ML algorithms analyze network
traffic and user behavior, identifying patterns of malicious activity and anomalies that
could indicate a potential attack [24]. By continuously learning from new data, these algo‑
rithms can detect and prevent various cyber threats, such as malware, phishing attacks,
and network intrusions. AI systems also help identify vulnerabilities in systems and net‑
works, enhancing overall cybersecurity.
addressing these ethical concerns, we can maximize the benefits of ML while minimizing
potential harms and building a responsible and inclusive technological future.
MAI systems that are fair, transparent, accountable, and aligned with human values. The
collaborative effort of researchers, policymakers, industry leaders, and the public is crucial
to ensure that MAI technologies are developed and deployed responsibly, promoting soci‑
etal well‑being, and minimizing potential ethical risks.
help identify emerging ethical challenges, update guidelines, and address biases or unin‑
tended consequences [15]. Ethical considerations should be integrated into regular evalua‑
tions to ensure the continuous improvement of MAI systems and practices.
7.8 CONCLUSION
This rapid advancement of these technologies calls for responsible practices that prioritize
fairness, transparency, accountability, privacy, and the promotion of human well‑being.
This chapter underscores the need to address biases and ensure fairness in algorithmic
decision‑making. It emphasizes protecting privacy and implementing robust data gov‑
ernance practices to safeguard personal data. Transparency and explainability in MAI
systems are essential for building trust, enabling accountability, and understanding algo‑
rithmic decisions. Maintaining human oversight and control over these technologies
strikes a balance between system autonomy and human intervention. Collaboration and
multidisciplinary approaches are vital for addressing the ethical challenges associated with
MAI. Comprehensive ethical guidelines and frameworks can be developed by involving
researchers, policymakers, industry experts, ethicists, and the public. Continuous moni‑
toring, evaluation, and adaptation are necessary to identify emerging ethical challenges
and ensure the ongoing improvement of MAI systems. Public engagement and inclusion
play a crucial role in ensuring that MAI technologies align with societal values and address
the concerns of diverse communities. Regulatory frameworks and international collabo‑
ration are necessary to establish clear ethical standards and promote responsible prac‑
tices globally. Education and awareness initiatives are essential for fostering a responsible
Artificial Intelligence and Machine Learning ◾ 127
REFERENCES
[1] T. Mazhar, H. M. Irfan, I. Haq, I. Ullah, M. Ashraf, et al., “Analysis of challenges and solu‑
tions of IoT in smart grids using AI and machine learning techniques: A review,” Electronics,
12(1):242, 2023, https://doi.org/10.3390/electronics12010242.
[2] I. H. Sarker, A. I. Khan, Y. B. Abushark and F. Alsolami, “Internet of things (iot) security
intelligence: A comprehensive overview, machine learning solutions and research direc‑
tions,” Mobile Networks and Applications, 28(1):296–312, 2023, https://doi.org/10.1007/
s11036‑022‑01937‑3.
[3] W. Shafik, “IoT‑based energy harvesting and future research trends in wireless sensor net‑
works,” In K. Hemant Kumar Reddy, Diptendu Sinha Roy, Tapas Kumar Mishra, Mir Wajahat
Hussain (eds.). Handbook of Research on Network‑Enabled IoT Applications for Smart City
Services, IGI Global, pp. 282–306, 2023, https://doi.org/10.4018/979‑8‑3693‑0744‑1.ch016.
[4] A. A. Khan, A. A. Laghari, P. Li, M. A. Dootio and S. Karim, “The collaborative role of
blockchain, artificial intelligence, and industrial internet of things in digitalization of small
and medium‑size enterprises,” Scientific Reports, 13(1):1656, 2023, https://doi.org/10.1038/
s41598‑023‑28707‑9.
[5] W. Shafik, “Making cities smarter: IoT and SDN applications, challenges, and future trends,”
In Poshan Yu, Xiaohan Hu, Ajai Prakash, Nyaribo Wycliffe Misuko, and Gu Haiyue (eds.),
Opportunities and Challenges of Industrial IoT in 5G and 6G Networks, pp. 73–94, 2023, IGI
Global, https://doi.org/10.4018/978‑1‑7998‑9266‑3.ch004.
[6] A. Mitra, B. Bera, A. K. Das, S. S. Jamal and I. You, “Impact on blockchain‑based AI/
ML‑enabled big data analytics for Cognitive Internet of Things environment,” Computer
Communications, 197:173–185, 2023, https://doi.org/10.1016/j.comcom.2022.10.010.
[7] C. Greco, G. Fortino, B. Crispo and K. K. Choo, “AI‑enabled IoT penetration testing:
State‑of‑the‑art and research challenges,” Enterprise Information Systems, 17(9):2130014,
2023, https://doi.org/10.1080/17517575.2022.2130014.
[8] T. M. Ghazal, M. K. Hasan, M. Ahmad, H. M. Alzoubi and M. Alshurideh, “Machine learn‑
ing approaches for sustainable cities using internet of things,” In Muhammad Alshurideh,
Barween Hikmat Al Kurdi , Ra’ed Masa’deh, Haitham M. Alzoubi, and Said Salloum (eds.).
The Effect of Information Technology on Business and Marketing Intelligence Systems, pp. 1969–
1986, 2023, Cham: Springer International Publishing, https://doi.org/10.1007/978‑3‑031‑1238
2‑5_108.
[9] W. Shafik, “A comprehensive cybersecurity framework for present and future global infor‑
mation technology organizations,” In Festus Fatai Adedoyin and Bryan Christiansen (eds.).
Effective Cybersecurity Operations for Enterprise‑Wide Systems, pp. 56–79, 2023, IGI Global,
https://doi.org/10.4018/978‑1‑6684‑9018‑1.ch002.
[10] M. Chandra, K. Kumar, P. Thakur, S. Chattopadhyaya, F. Alam and S. Kumar, “Digital tech‑
nologies, healthcare and Covid‑19: Insights from developing and emerging nations,” Health
and Technology, 12(2):547–568, 2022, https://doi.org/10.1007/s12553‑022‑00650‑1.
[11] H. Wang, K. Qin, R.Y. Zakari, G. Lu and J. Yin, “Deep neural network‑based relation extrac‑
tion: An overview,” Neural Computing and Applications, 34:1–21, 2022, https://doi.org/10.1007/
s00521‑021‑06667‑3.
128 ◾ Future Communication Systems Using AI, IoT and Data Science
[12] P. Nilsen, J. Reed, M. Nair, C. Savage, C. Macrae, et al., “Realizing the potential of artifi‑
cial intelligence in healthcare: learning from intervention, innovation, implementation and
improvement sciences,” Frontiers in Health Services, 2:961475, 2022, https://doi.org/10.3389/
frhs.2022.961475.
[13] E. Tokgöz and M. A. Carro, “Applications of artificial intelligence, machine learning, and deep
learning on facial plastic surgeries,” In Emre Tokgöz and Marina A. Carro (eds.). Cosmetic
and Reconstructive Facial Plastic Surgery: A Review of Medical and Biomedical Engineering
and Science Concepts, pp. 281–306, 2023, Cham: Springer Nature Switzerland, https://doi.org
/10.1007/978‑3‑031‑31168‑0_9.
[14] S. N. Alaziz, B. Albayati, A. A. El‑Bagoury and W. Shafik, “Clustering of covid‑19 multi‑time
series‑based k‑means and PCA with forecasting,” International Journal of Data Warehousing
and Mining, 19(3):1–25, 2023, https://doi.org/10.4018/IJDWM.317374.
[15] W. Shafik, “Cyber security perspectives in public spaces: Drone case study,” In Festus
Fatai Adedoyin and Bryan Christiansen (eds.). Handbook of Research on Cybersecurity
Risk in Contemporary Business Systems, pp. 79–97, 2023, IGI Global, https://doi.
org/10.4018/978‑1‑6684‑7207‑1.ch004.
[16] Z. Yang, L. Jianjun, H. Faqiri, W. Shafik, A. Talal Abdulrahman, M. Yusuf and A. M. Sharawy,
“Green internet of things and big data application in smart cities development,” Complexity,
2021, 15 pages, 2021, https://doi.org/10.1155/2021/4922697.
[17] K. Baum, S. Mantel, E. Schmidt and T. Speith, “From responsibility to reason‑giving
explainable artificial intelligence,” Philosophy and Technology, 35(1), p. 12, 2022, https://doi.
org/10.1007/s13347‑022‑00510‑w.
[18] T. Veiga, H. A. Asad, F. A. Kraemer and K. Bach, “Towards containerized, reuse‑oriented AI
deployment platforms for cognitive IoT applications,” Future Generation Computer Systems,
142:4–13, 2023, https://doi.org/10.1016/j.future.2022.12.029.
[19] X. Jin, X. Wang, X. Cao and C. Xue, “Construction and recognition of acoustic ID of ancient
coins based on deep learning of artificial intelligence for audio signals,” Heritage Science,
11(1), p. 46, 2023, https://doi.org/10.1186/s40494‑023‑00891‑x.
[20] Y. G. Butler, “Language education in the era of digital technology,” JALT Journal, 44(1), p. 137,
2022, https://doi.org/10.37546/JALTJJ44.1‑7.
[21] R. Kumar, N. Grover, R. Singh, S. Kathuria, A. Kumar and A. Bansal, “Imperative role of artifi‑
cial intelligence and big data in finance and banking sector,” In 2023 International Conference
on Sustainable Computing and Data Communication Systems, Erode, India, pp. 523–527,
2023, https://doi.org/10.1109/ICSCDS56580.2023.10105062.
[22] S. Knapič, A. Malhi, R. Saluja and K. Främling, “Explainable artificial intelligence for
human decision support system in the medical domain,” Machine Learning and Knowledge
Extraction, 3(3), pp. 740–770, 2021, https://doi.org/10.3390/make3030037.
[23] H. Hu, J. Xu, M. Liu and M. K. Lim, “Vaccine supply chain management: An intelligent system
utilizing blockchain, IoT and machine learning,” Journal of Business Research, 156:113480,
2023, https://doi.org/10.1016/j.jbusres.2022.113480.
[24] W. Shafik, S. M. Matinkhah, F. Shokoor and L. Sharif, “A reawakening of machine learn‑
ing application in unmanned aerial vehicle: Future research motivation,” EAI Endorsed
Transactions on Internet of Things, 8:29, 2022, https://doi.org/10.4108/eetiot.v8i29.987.
[25] Y. Jun, A. Craig, W. Shafik and L. Sharif, “Artificial intelligence application in cybersecurity
and cyberdefense,” Wireless Communications and Mobile Computing, 2021. 10 pages, 2021,
https://doi.org/10.1155/2021/3329581.
[26] K. D. Gronwald, “Machine learning, deep learning und artificial intelligence,” In Klaus‑Dieter
Gronwald (ed.). Globale Kommunikation und Kollaboration: Globale Supply Chain
Netzwerk‑Integration, interkulturelle Kompetenzen, Arbeit und Kommunikation in virtuellen
Teams, pp. 85–107, 2023, Wiesbaden: Springer Fachmedien Wiesbaden. https://doi.org/10.100
7/978‑3‑658‑39099‑0_6.
Artificial Intelligence and Machine Learning ◾ 129
[27] Y. A. Qadri, A. Nauman, Y. Zikria, Y. Bin, A. V. Vasilakos and S. W. Kim, “The future of
healthcare internet of things: A survey of emerging technologies,” IEEE Communications
Surveys and Tutorials, 22(2):1121–1167, 2020, https://doi.org/10.1109/COMST.2020.2973314.
[28] L. Zhao, D. Zhu, W. Shafik, S. M. Matinkhah, Z. Ahmad, et al., “Artificial intelligence analysis
in cyber domain: A review,” International Journal of Distributed Sensor Networks, 18(4), 2022,
https://doi.org/10.1177/15501329221084882.
[29] Y. B. Bakare, “Machine learning‑based smart irrigation system and soil nutrients analysis to
increase productivity in agriculture field,” AIP Conference Proceedings, 2523, 2023, p. 020030.
https://doi.org/10.1063/5.0116007.
[30] M. M. Kamruzzaman, S. Alanazi, M. Alruwaili, N. Alshammari, S. Elaiwat, et al., “AI‑and
IoT‑assisted sustainable education systems during pandemics, such as covid‑19, for smart cit‑
ies,” Sustainability, 15(10):8354, 2023, https://doi.org/10.3390/su15108354.
[31] K. Kumar, P. Kumar, D. Deb, M. L. Unguresan and V. Muresan, “Artificial intelligence and
machine learning based intervention in medical infrastructure: A review and future trends,”
Healthcare, 11(2):207, 2023, https://doi.org/10.3390/healthcare11020207.
[32] H. Yu, S. Luo, J. Ji, Z. Wang, W. Zhi, N. Mo, et al., “A deep‑learning‑based artificial intelli‑
gence system for the pathology diagnosis of uterine smooth muscle tumor,” Life, 13(1):3, 2022,
https://doi.org/10.3390/life13010003.
[33] Q. Wu, H. Ma, J. Sun, C. Liu, J. Fang, et al., “Application of deep‑learning‑based artificial
intelligence in acetabular index measurement,” Frontiers in Pediatrics, 10, p. 1049575, 2023 .
https://doi.org/10.3389/fped.2022.1049575.
[34] S. Aminizadeh, A. Heidari, S. Toumaj, M. Darbandi, N. J. Navimipour, et al., “The applica‑
tions of machine learning techniques in medical data processing based on distributed com‑
puting and the Internet of Things,” Computer Methods and Programs in Biomedicine, 107745,
241, 2023, https://doi.org/10.1016/j.cmpb.2023.107745.
[35] W. Shafik, S. M. Matinkhah, F. Shokoor, and M. N. Sanda, “Internet of things‑based energy
efficiency optimization model in fog smart cities,” International Journal on Informatics
Visualization, 5(2), pp. 105–112, 2021, https://doi.org/10.30630/joiv.5.2.373.
[36] M. Ryo, “Explainable artificial intelligence and interpretable machine learning for agricul‑
tural data analysis,” Artificial Intelligence in Agriculture, 6, pp. 257–265, 2022. https://doi.
org/10.1016/j.aiia.2022.11.003.
[37] W. Shafik, S. M. Matinkhah and M. Ghasemzadeh, “Theoretical understanding of deep learn‑
ing in uav biomedical engineering technologies analysis,” SN Computer Science, 1(6), pp. 1–13,
2020, https://doi.org/10.1007/s42979‑020‑00323‑8.
[38] W. Shafik, “Wearable medical electronics in artificial intelligence of medical things,” In
Agbotiname Lucky Imoize, Valentina Emilia Balas, Vijender Kumar Solanki, Cheng‑Chi Lee,
Mohammad S. Obaidat (eds.). Handbook of Security and Privacy of AI‑Enabled Healthcare
Systems and Internet of Medical Things, CRC Press, Boca Raton, pp. 21–40, 2024, https://doi.
org/10.1201/9781003370321‑2.
[39] W. Shafik, S. M. Matinkhah and F. Shokoor, “Cybersecurity in unmanned aerial vehicles: A
review,” International Journal on Smart Sensing and Intelligent Systems, 16(1), pp. 1–16, 2023,
https://doi.org/10.2478/ijssis‑2023‑0012.
[40] S. S. Alghamdi, “The application of artificial intelligence in detecting breast lesions with med‑
ical imaging: A literature review,” International Journal of Biomedicine, 13(1), pp, 9–13, 2023,
https://doi.org/10.21103/Article13(1)_RA1.
[41] H. Hua, Y. Li, T. Wang, N. Dong, W. Li, et al., “Edge computing with artificial intelligence:
A machine learning perspective,” ACM Computing Surveys, 55(9):1–35, 2023, https://doi.
org/10.1145/3555802.
[42] M. Soori, B. Arezoo and R. Dastres, “Artificial intelligence, machine learning and deep
learning in advanced robotics, A review,” Cognitive Robotics, 3:54–70, 2023, https://doi.
org/10.1016/j.cogr.2023.04.001.
130 ◾ Future Communication Systems Using AI, IoT and Data Science
[43] L. Rubinger, A. Gazendam, S. Ekhtiari and M. Bhandari, “Machine learning and artificial
intelligence in research and healthcare,” Injury, 54:S69–S73, 2023, https://doi.org/10.1016/j.
injury.2022.01.046.
[44] A. Gaurav, B. B. Gupta and P. K. Panigrahi. “A comprehensive survey on machine learning
approaches for malware detection in IoT‑based enterprise information system,” Enterprise
Information Systems, 17(3):2023764, 2023, https://doi.org/10.1080/17517575.2021.2023764.
[45] N. Prazeres, R. L. Costa, L. Santos and C. Rabadão, “Engineering the application of machine
learning in an IDS based on IoT traffic flow,” Intelligent Systems with Applications, 17:200189,
2023, https://doi.org/10.1016/j.iswa.2023.200189.
III
IoT‑Based Techniques for Smart Future Architectures
131
Chapter 8
Internet of Metaverse
Things (IoMT)
Applications, Technology Challenges
and Security Consideration
Wadee Alhalabi
King Abdulaziz University
Ahyoung Choi
Gachon University
Inam Ullah
Gachon University
Ahad Alhudali
King Abdulaziz University
Platforms, has been at the forefront of developing technology for virtual worlds and has
become extremely well known and influential in new markets. As a result, global business
units, tech industries, and researchers are actively involved in the Metaverse’s evolution
into a fully‑fledged corporate area. Tech specialists have identified a preferred location
within the Metaverse for experimentation, looking at fresh approaches to take advantage of
its potential for industrial innovation. The IoT has grown four times more significantly in
this environment since this growth cannot be achieved in isolation. This chapter discusses
briefly the convergence of IoT and Metaverse with significant applications in different sec‑
tors. Figure 8.1 shows the complete outline of this chapter.
common objects to the internet, allowing for data sharing and automation. It enables gad‑
gets to collect, share, and act on data, resulting in a smarter, more efficient environment.
Understanding the IoT is critical for capitalizing on its potential across industries, improv‑
ing lives, and increasing productivity. IoT has a multidisciplinary vision to help several
areas such as transportation, public/private, the environment, industry, medical, and
smart grid [4] to name a few. Researchers have discussed the IoT in different ways based on
their specific interests and concerns [5–8].
The popular area of IoT application is smart cities, which also includes smart houses
that are made up of IoT‑enabled daily life home appliances such as air‑conditioning, televi‑
sion, video/audio streaming devices, heating system, and security arrangements [9]. These
devices communicate with one another to deliver optimal comfort, security, and energy
usage. All of this communication takes place over the Internet via an IoT‑based central
control unit. Some potential IoT applications for smart cities are traffic management, pub‑
lic safety solutions, air quality control, smart parking, smart lightening, and smart waste
collection.
experience that is centered on them. This combination allows for optimum data flow to
facilitate data‑driven decision‑making while requiring less training and effort. In other
words, IoT will be the essential link enabling individuals to move seamlessly between the
Metaverse and the real world. Furthermore, for a better user experience in the Metaverse, it
is necessary to develop a far‑advanced IoT technology that can easily support virtual space
activities and complexities.
With the integration of IoT and Metaverse, the e‑commerce virtual experiences of the
virtual fitting room will also be improved, where IoT devices are utilized to detect the
user’s body movement. Data from images obtained on the user’s mobile phone or other
smart weighing scales, for example, might be used to update the user’s personal body infor‑
mation. This allows Metaverse users to fully immerse themselves in a virtual depiction of
the store, overcoming the experience limitations associated with traditional online pur‑
chasing. Furthermore, IoT data can be used by the latest Tactile Internet, which creates a
network or network of networks for humans or machines to remotely access or control real
or virtual things in real time [13,14]. IoT data can give AR/VR applications perspective and
contextual awareness of physical objects while also initiating data interchange between the
digital and real worlds [15]. For this purpose, AR attached device can respond to the user’s
finger motions or initiate a cyber‑physical function in response to a physical occurrence.
The Metaverse is a linked network of popular 3D simulations and worlds in which the
users are denoted by virtual avatars with a sense of social presence and geographical aware‑
ness and engage in a huge virtual economy. IoT is critical for connecting the Metaverse to
real‑world objects or devices. When linked gadgets in the Metaverse can smoothly share
and receive information resulting in an extra well‑organized copy of the actual environ‑
ment. IoT sensors connect the physical and virtual worlds, and they play a critical role in
data capture from physical assets. Digital twins (DTs) are necessary to virtualize a physical
138 ◾ Future Communication Systems Using AI, IoT and Data Science
object. To join the virtual world, XR devices are required, and IoT semiconductors are the
key component.
In addition, edge computing and 5G are critical enablers of Metaverse technology.
Various businesses are progressively financing to spot themselves in the Metaverse mar‑
ket, and the Metaverse’s diverse applications can lead to new commercial prospects. The
Metaverse is quickly spreading across multiple businesses, and related technology is
expected to offer income opportunities across a wide range of verticals. According to the
research, the combination of IoT and Metaverse will create new prospects for growth and
development in the digital industry, such as IoT companies extending and improving their
capabilities and forming strategic collaborations.
The interplay of the real world and the virtual environment enabled by IoT helps to gen‑
erate a digital twin, a digital mirror of a unique physical thing’s physical state and condi‑
tion [16]. The Metaverse strives to guarantee that the reflection is as near to the real‑time
physical condition as feasible to establish a viable digital twin. Because of this distinguish‑
ing feature, digital twins are becoming one of the most important uses in the Metaverse.
In professional situations, digital twins can be built using the Tactile Internet and Haptic
Codecs (IEEE P1918.1.1) [17] to establish a group meeting more effectively by allowing
users to engage with one another while operating or showing a replica of the hardware or
software prototype. Digital twins assist engineers in directly operating 3‑D representations
of complex systems in technical training programs [18].
This chapter explains how the convergence of IoT and the Metaverse brings the actual
world closer to the ever‑changing virtual world. This chapter starts with the introduction
of IoT and explains the emerging Metaverse technology and potential use cases. It then
gives an overview of the Convergence of IoT and the Metaverse. Section 8.2 describes the
potential application of Metaverse technologies in different sectors. Section 8.3 presents
significant applications that show how IoT can be used in the Metaverse. Furthermore,
the IoT‑Metaverse and digital twin technology challenges are discussed in Section 8.4. The
security attacks and threats in IoT‑Metaverse are briefly described in Section 8.5, while
the security challenges of IoT‑Metaverse are presented in Section 8.6. Finally, Section 8.7
concludes this chapter with some final thoughts and discussion.
study report, the immersive learning or AR/VR‑based education market can increase at an
18.2% compound annual growth rate (CAGR) during the next five years (2024 - 2028) [20].
Figure 8.3 depicts the Metaverse’s application scenarios, which include healthcare and
therapy [21], education and training [22], smart cities [23], gaming and entertainment
[24–30], real estate [31], and sociability [32], retail and virtual commerce, virtual collabora‑
tion and work, and virtual advertising and marketing.
8.2.6 Socialization
The Metaverse surpasses time and space, allowing for numerous forms of social interaction
and bringing people closer together. People can seek out remote social networks to foster
a more authentic social atmosphere. In terms of human social formations, the Metaverse
brings up a new application field [32]. The Metaverse transcends time and space, allowing
for numerous forms of social interaction and bringing individuals closer together [54].
People can use virtual offices, and virtual dating, and can pursue virtual meetings to meet
higher‑level demands beyond the physical world.
The effect of the COVID‑19 epidemic has highlighted the relevance of teleworking and
remote social networking [55]. To build a more authentic social environment, the Metaverse
can compensate for the constraints of existing models and increase the functionality of
telecommuting and remote social platforms.
142 ◾ Future Communication Systems Using AI, IoT and Data Science
made possible by IoT devices. These gadgets enable users to communicate with their home
appliances in the Metaverse in several ways. These communications can regulate appli‑
ances, lighting, temperature, and other home comforts. This can be done by using their
VR headset to adjust the thermostat, turn on the lights, or start the coffee maker. The users
can also use their voice to control these appliances or engage with them through gestures.
Virtual smart houses have numerous conceivable advantages, including the ability to oper‑
ate them from anywhere in the globe with an internet connection. Users may keep an eye
on their houses for security issues like unauthorized entry or equipment problems. Users’
virtual homes can be customized to their satisfaction, and they can even create many ver‑
sions of their homes for different purposes. Virtual smart houses are likely to become
increasingly common as the Metaverse evolves. They provide a novel way to engage with
our houses, as well as a variety of conveniences and security benefits.
Metaverse, virtual smartwatches, fitness trackers, and other IoT gadgets can offer users
virtual health and activity monitoring. With the integration of IoT and Metaverse, several
smart product interactions, virtual representation of IoT devices, real‑time data visualiza‑
tion, virtual shopping with IoT products, virtual shopping analytics, IoT‑driven events and
experiences, enhanced VR and AR experiences, remote virtual shopping, secure transac‑
tions, and authentication became possible for the users.
one another as avatars. IoT data can be integrated into these virtual environments to pro‑
vide dynamic and context‑aware interactions. With the use of IoT data, it can improve the
experience of virtual meetups, virtual social events, and virtual conferences. Besides, in
the virtual fitness classes, the participants may have their connected fitness trackers’ heart
rates and activity levels shown within the Metaverse.
However, privacy and security concerns must be considered to maintain a safe and
interesting virtual social experience. These virtual social environments are shared virtual
spaces, IoT‑enabled avatars, virtual social events, personalized social interactions, and
remote social presence.
to develop robust data pipelines and standardization procedures to ensure seamless data
integration.
trolling are privacy and security problems that arise from the Metaverse’s radical behav‑
ior and polarization [64]. To enable the widespread adoption of the Metaverse, significant
attention must be paid to all of the aforementioned security and privacy concerns.
8.6.2 Scalability
The difficulties and obstacles that develop while attempting to handle increasing demands
and expansion in the interconnected virtual environment are referred to as scalability
challenges and issues in an IoT‑based Metaverse. As the Metaverse grows and accommo‑
dates more IoT devices, users, and interactions, numerous scaling issues may arise. Some
of the major obstacles and issues are network congestion, data processing and storage,
latency and response time, device heterogeneity, scalable infrastructure, resource manage‑
ment, content delivery, and user experience. The popularity of Metaverse has been growing
and named one of the future’s top five evolving technologies in the coming 10 years. The
investment in IoT development is predicted to increase from $12 billion in 2020 to $72.8
billion in 2024 globally. Over 200 big firms including Samsung, JP Morgan, and Nike have
already applied and moved some of their customer‑facing activities to the Metaverse. It is
possible that an increasing number of IoT devices would be able to develop and populate
virtual worlds for users in social media with reasonable ease and minimal barriers to ser‑
vice access. Scalability will be a big challenge with any Metaverse platform as IoT applica‑
tions expand.
Internet of Metaverse Things (IoMT) ◾ 153
8.6.3 Interoperability
When integrating IoT devices into the Metaverse, interoperability and consistency of vir‑
tual platforms are critical difficulties. These difficulties include enabling flawless commu‑
nication and interaction between various IoT devices and virtual environments, as well
as preserving consistency across multiple platforms. One of the Metaverse’s significant
accomplishments is the creation of a virtual environment [81] where the participants can
join and collaborate on various activities such as gaming, viewing movies, and other work.
According to the current scenario, more than one company is creating Metaverse plat‑
forms [82]. Facebook, Microsoft, and Apple are prominent examples [83]. Different devices
are also required for IoT networks to connect to many Metaverse platforms and communi‑
cate with various groups. Furthermore, establishing interoperability [84] comprises com‑
patibility across diverse Metaverse events, places, and measures, as well as interoperability
of mixed networks in the platform.
Interoperability includes guaranteeing user and platform compatibility in Metaverse
along with the compatibility between platforms and operating systems. There are several
challenges and obstacles such as cross‑platform content sharing, device variety, protocol
integration, virtual environment, data format standardization, virtual environment, and
synchronization and timing. Resolving these difficulties requires a combination of tech‑
nical solutions, industry collaboration, and the formation of standards and conventions.
Implementing open standards and supporting interoperable design principles would aid in
the formation of a more united and coherent IoT‑based Metaverse, boosting user experi‑
ences and stimulating innovation.
8.7 CONCLUSION
This chapter presents the Internet of Metaverse Things and its groundbreaking vision
of the future, where the boundaries between the virtual and real‑world blur, and where
the integration of IoT and the Metaverse brings forth an unparalleled level of immersion,
intelligence, and interconnectedness. By shedding light on the potential applications of
IoT in Metaverse. Moreover, this chapter discusses and explains the Metaverse applica‑
tions that will bring major changes in the industry and address the associated challenges.
The transformation into IoMT provides users with unparalleled possibilities, setting the
path for disruptive applications in a variety of industries such as healthcare, education,
gaming, smart cities, and others. While IoMT offers doors to new experiences, obstacles
such as technological barriers, security concerns, and regulatory requirements loom. As
IoMT reshapes our digital ecosystem, addressing challenges such as privacy, data security,
154 ◾ Future Communication Systems Using AI, IoT and Data Science
scalability, and interoperability will be critical. Embracing this transition has enormous
promise, but it will require joint efforts to create a secure and prosperous IoMT ecosystem.
REFERENCES
[1] N. Stephenson, Snow Crash. Bantam Books, New York, USA, 1992.
[2] S.‑M. Park and Y.‑G. Kim, “A metaverse: Taxonomy, components, applications, and open
challenges.” IEEE Access, vol. 10, pp. 4209–4251, 2022.
[3] A.R. Sfar, C. Zied, and Y. Challal, “A systematic and cognitive vision for IoT security: A
case study of military live simulation and security challenges.” In: Proceedings of the 2017
International Conference on Smart, Monitored and Controlled Cities (SM2C), Sfax, Tunisia,
17–19 February, 2017. https://doi.org/10.1109/sm2c.2017.8071828.
[4] W. U. Khan, N. Imtiaz, and I. Ullah, “Joint optimization of NOMA‐enabled backscatter com‑
munications for beyond 5G IoT networks.” Internet Technology Letters, vol. 4, no. 2, p. e265,
2021.
[5] M. Asif, W. U. Khan, H. M. Rehan Afzal, J. Nebhen, I. Ullah, A. Ur Rehman, and M. K. A.
Kaabar, “Reduced‑complexity LDPC decoding for next‑generation IoT networks.” Wireless
Communications and Mobile Computing, vol. 2021, pp. 1–10, 2021.
[6] D. Gupta, S. Juneja, A. Nauman, Y. Hamid, I. Ullah, T. Kim, E. M. Tag eldin, and N. A.
Ghamry, “Energy saving implementation in hydraulic press using industrial Internet of
Things (IIoT).” Electronics, vol. 11, no. 23, p. 4061, 2022.
[7] T. Mazhar, H. M. Irfan, I. Haq, I. Ullah, M. Ashraf, T. Al Shloul, Y. Y. Ghadi, Imran, and D.
H. Elkamchouchi, “Analysis of challenges and solutions of IoT in smart grids using AI and
machine learning techniques: A review.” Electronics, vol. 12, no. 1, p. 242, 2023.
[8] H. U. Khan, M. Sohail, F. Ali, S. Nazir, Y. Y. Ghadi, and I. Ullah, “Prioritizing the multi‑criterial
features based on comparative approaches for enhancing security of IoT devices.” Physical
Communication, vol. 59, p. 102084, 2023.
[9] T. Mazhar, D. B. Talpur, T. Al Shloul, Y. Y. Ghadi, I. Haq, I. Ullah, K. Ouahada, and H.
Hamam, “Analysis of IoT security challenges and its solutions using artificial intelligence.”
Brain Sciences, vol. 13, no. 4, p. 683, 2023.
[10] T. G. Kanter, “The metaverse and extended reality with distributed IoT.” IEEE IoT Newsletter,
November 2021. [Online]. Available: https://iot.ieee.org/newsletter/november‑2021/the‑
Metaverse‑andextended‑reality‑with‑distributed‑iot.
[11] N. Pereira, A. Rowe, M. W. Farb, I. Liang, E. Lu, and E. Riebling, “Arena: The augmented real‑
ity edge networking architecture.” In: Proceedings of the IEEE International Symposium on
Mixed Augmented Reality (ISMAR), Bari, Italy, 2021, pp. 479–488.
[12] A. H. Sodhro, S. Pirbhulal, and A. K. Sangaiah, “Convergence of IoT and product life‑
cycle management in medical health care.” Future Generation Computer Systems, vol. 86,
pp. 380–391, 2018.
[13] N. Promwongsa et al., “A comprehensive survey of the tactile Internet: State‑of‑the‑art and
research directions.” IEEE Communications Surveys and Tutorials, vol. 23, no. 1, pp. 472–523,
2020.
[14] A. Aijaz and M. Sooriyabandara, “The tactile Internet for industries: A review.” Proceedings of
the IEEE, vol. 107, no. 2, pp. 414–435, 2019.
[15] E. Lu, J. Miller, N. Pereira, and A. Rowe, “FLASH: Video‑embeddable AR anchors for live
events.” In: Proceedings of the IEEE International Symposium on Mixed Augmented Reality
(ISMAR), Bari, Italy, 2021, pp. 489–497.
[16] R. Minerva, G. M. Lee, and N. Crespi, “Digital twin in the IoT context: A survey on techni‑
cal features, scenarios, and architectural models.” Proceedings of the IEEE, vol. 108, no. 10,
pp. 1785–1824, 2020.
Internet of Metaverse Things (IoMT) ◾ 155
[17] E. Steinbach et al., “Haptic codecs for the tactile Internet.” Proceedings of the IEEE, vol. 107,
no. 2, pp. 447–470, 2019.
[18] N. Stojanovic and D. Milenovic, “Data‑driven digital twin approach for process optimization:
An industry use case.” In: Proceedings of the IEEE International Conference on Big Data (Big
Data), Seattle, WA, USA, 2018, pp. 4202–4211.
[19] M. Slovick. “The AR‑VR age has begun in health care.” November 2020. [Online]. Available:
https://www.cta.tech/Resources/i3‑Magazine/i3‑Issues/2020/November‑December/The‑AR‑
VR‑Age‑has‑Begun‑inHealth‑Care.
[20] “AR and VR in education market.” June 2022. [Online]. Available: https://www.market‑
researchfuture.com/reports/ar‑vr‑in‑educationmarket‑10834.
[21] J. Thomason, “MetaHealth‑how will the metaverse change health care?” Journal of Metaverse,
vol. 1, no. 1, pp. 13–16, 2021.
[22] B. Kye, N. Han, E. Kim, Y. Park, and S. Jo, “Educational applications of metaverse: Possibilities
and limitations.” Journal of Educational Evaluation for Health Professions, vol. 18, p. 32, 2021.
[23] T. Ruohomäki, E. Airaksinen, P. Huuska, O. Kesäniemi, M. Martikka, and J. Suomisto,
“Smart city platform enabling digital twin.” In: Proceedings of the International Conference
on Intelligent Systems (IS), Funchal, Portugal, 2018, pp. 155–161.
[24] J. Y. Lee, “A study on metaverse hype for sustainable growth.” International Journal of
Advanced Smart Convergence, vol. 10, no. 3, pp. 72–80, 2021.
[25] M.S. Anwar, J. Wang, W. Khan, A. Ullah, S. Ahmad, and Z. Fei, “Subjective QoE of 360‑degree
virtual reality videos and machine learning predictions.” IEEE Access, vol. 8, pp. 148084–148099,
2020.
[26] M.S. Anwar, J. Wang, A. Ullah, W. Khan, S. Ahmad, and Z. Fei, “Measuring quality of expe‑
rience for 360‑degree videos in virtual reality.” Science China Information Sciences, vol. 63,
pp. 1–15, 2020.
[27] M. Shahid Anwar, J. Wang, S. Ahmad, A. Ullah, W. Khan, and Z. Fei, “Evaluating the factors
affecting QoE of 360‑degree videos and cybersickness levels predictions in virtual reality.”
Electronics, vol. 9, no. 9, p. 1530, 2020.
[28] M.S. Anwar, J. Wang, A. Ullah, W. Khan, Z. Li, and S. Ahmad, “User profile analysis for
enhancing QoE of 360 panoramic videos in virtual reality environment.” In: 2018 International
Conference on Virtual Reality and Visualization (ICVRV), Qingdao, China, 2018, pp. 106–111.
IEEE.
[29] M.S. Anwar, J. Wang, A. Ullah, W. Khan, S. Ahmad, and Z. Li, “Impact of stalling on QoE
for 360‑degree virtual reality videos.” In: 2019 IEEE International Conference on Signal,
Information and Data Processing (ICSIDP), Chongqing, China, 2019, pp. 1–6. IEEE.
[30] M.S. Anwar, J. Wang, S. Ahmad, W. Khan, A. Ullah, M. Shah, and Z. Fei, “Impact of the
impairment in 360‑degree videos on users’ VR involvement and machine learning‑based QoE
predictions.” IEEE Access, vol. 8, pp. 204585–204596, 2020.
[31] K. G. Nalbant and S. Uyanik, “Computer vision in the metaverse.” Journal of Metaverse,
vol. 1, no. 1, pp. 9–12, 2021.
[32] H. Ning et al., “A survey on metaverse: The state‑of‑the‑art, technologies, applications, and
challenges.” arXiv:2111.09673, 2021.
[33] H. B. Demeke et al., “Trends in use of telehealth among health centers during the COVID‑19
pandemic‑United States, June 26‑November 6, 2020.” Morbidity and Mortality Weekly Report,
vol. 70, no. 7, p. 240, 2021.
[34] A. Musamih et al., “Metaverse in healthcare: Applications, challenges, and future directions.”
IEEE Consumer Electronics Magazine, vol. 12, no. 4, pp. 33–46, 2022. https://doi.org/10.1109/
MCE.2022.3223522.
[35] K. Li et al., “An experimental study for tracking crowd in smart cities.” IEEE Systems Journal,
vol. 13, no. 3, pp. 2966–2977, 2019.
156 ◾ Future Communication Systems Using AI, IoT and Data Science
[36] B. Wei, K. Li, C. Luo, W. Xu, J. Zhang, and K. Zhang, “No need of data pre‑processing: A gen‑
eral framework for radio‑based device free context awareness.” ACM Transactions on Internet
of Things, vol. 2, no. 4, pp. 1–26, 2021.
[37] B. P. L. Lau, T. Chaturvedi, B. K. K. Ng, K. Li, M. S. Hasala, and C. Yuen, “Spatial and temporal
analysis of urban space utilization with renewable wireless sensor network.” In: Proceedings
of the 3rd IEEE/ACM International Conference on Big Data Computing, Applications and
Technologies, New York, USA, 2016, pp. 133–142.
[38] K. Li, C. Yuen, and S. Kanhere, “Senseflow: An experimental study of people tracking.” In:
Proceedings of the 6th ACM Workshop on Real World Wireless Sensor Networks, New York,
USA, 2015, pp. 31–34.
[39] M. G. Hanna, I. Ahmed, J. Nine, S. Prajapati, and L. Pantanowitz, “Augmented reality tech‑
nology using microsoft HoloLens in anatomic pathology.” Archives of Pathology & Laboratory
Medicine, vol. 142, no. 5, pp. 638–644, 2018.
[40] K. Yue, “Breaking down the barrier between teachers and students by using metaverse tech‑
nology in education: Based on a survey and analysis of Shenzhen City, China.” In: Proceedings
of the 13th International Conference on E‑Education, E‑Business, E‑Management, and
E‑Learning (IC4E 2022), Tokyo, Japan, 14–17 January 2022, pp. 40–44.
[41] Z. Li, J. Wang, Z. Yan, X. Wang, and M. S. Anwar, “An interactive virtual training system
for assembly and disassembly based on precedence constraints.” In: Advances in Computer
Graphics: 36th Computer Graphics International Conference, CGI 2019, Calgary, AB, Canada,
17–20 June 2019, Proceedings 36, 2019, pp. 81–93. Springer International Publishing.
[42] Z. Li, J. Wang, M. S. Anwar, and Z. Zheng, “An efficient method for generating assembly
precedence constraints on 3D models based on a block sequence structure.” Computer‑Aided
Design, vol. 118, p. 102773, 2020.
[43] Z. Li, S. Zhang, M. S. Anwar, and J. Wang, “Applicability analysis on three interaction para‑
digms in immersive vr environment.” In: 2018 International Conference on Virtual Reality
and Visualization (ICVRV), Qingdao, China, 2018, pp. 82–85. IEEE.
[44] N. Rajagopal, J. Miller, K. K. R. Kumar, A. Luong, and A. Rowe, “Improving augmented real‑
ity relocalization using beacons and magnetic field maps.” In: Proceedings of the International
Conference on Indoor Positioning and Indoor Navigation (IPIN), Pisa, Italy, 2019, pp. 1–8.
[45] S. Han and L. Ci, “Research trends on augmented reality education in Korea from 2008 to
2019.” Journal of Educational Technology, vol. 36, pp. 505–528, 2020.
[46] A. Tlili, R. Huang, B. Shehata, D. Liu, A. Hosny, S. Metwally, H. Wang, M. Denden, A.
Bozkurt, L.‑H. Lee et al., “Is metaverse in education a blessing or a curse: A combined content
and bibliometric analysis.” Smart Learning Environments, vol. 9, p. 24, 2022.
[47] C. Meier, J. Saorín, A. B. de León, and A. G. Cobos, “Using the roblox video game engine for
creating virtual tours and learning about the sculptural heritage.” International Journal of
Emerging Technologies in Learning, vol. 15, no. 20, pp. 268–280, 2020.
[48] B. Ryskeldiev, Y. Ochiai, M. Cohen, and J. Herder, “Distributed metaverse: Creating decen‑
tralized blockchain‑based model for peer‑to‑peer sharing of virtual spaces for mixed real‑
ity applications.” In: Proceedings of the 9th Augmented Human International Conference,
New York, USA, 2018, p. 39. [Online]. Available: https://doi.org/10.1145/3174910.3174952.
[49] H. C. Hou and H. Wu, “Technology for real estate education and practice: A VR technology
perspective.” Property Management, vol. 38, no. 2, pp. 311–324, 2020.
[50] M. Izani, S. Aalkhalidi, A. Razak, and S. Ibrahim, “Economical VR/AR method for interior
design programme.” In: Proceedings of the Advances in Science and Engineering Technology
International Conference (ASET), Dubai, United Arab Emirates, February 2022, pp. 1–5.
[51] C. Aiello, J. Bai, J. Schmidt, and Y. Vilchynskyi, “Probing reality and myth in the metaverse.”
McKinsey & Company, 2022. Retrieved from: https://www.mckinsey.com/industries/retail/
our‑insights/probing‑reality‑and‑myth‑in‑the‑metaverse.
Internet of Metaverse Things (IoMT) ◾ 157
[52] WGSN Insight Team, Luxury brand strategies 2022. WGSN, 2022. Retrieved from: https://
www‑wgsn‑com.ezproxy.lb.polyu.edu.hk/insight/article/93198#page2.
[53] M. Blázquez, “Fashion shopping in multichannel retail: The role of technology in enhanc‑
ing the customer experience.” International Journal of Electronic Commerce, vol. 18, no. 4,
pp. 97–116, 2014.
[54] J.‑G. Kim, “A study on metaverse culture contents matching platform.” The International
Journal of Advanced Culture Technology, vol. 9, no. 3, pp. 232–237, 2021.
[55] T. Lyttelton, E. Zang, and K. Musick, “Telecommuting and gender inequalities in parents’
paid and unpaid work before and during the COVID‑19 pandemic.” Journal of Marriage and
the Family, vol. 84, no. 1, pp. 230–249, 2022.
[56] K. Li, W. Ni, B. Wei, and M. Guizani, “An experimental study of twoway ranging optimiza‑
tion in UWB‑based simultaneous localization and wall‑mapping systems.” In: Proceedings
of the International Wireless Communications and Mobile Computing (IWCMC), Dubrovnik,
Croatia, 2022, pp. 871–876.
[57] K. Li, W. Ni, and P. Zhang, “Poster: An experimental localizationtestbed based on UWB chan‑
nel impulse response measurements.” In: Proceedings of the 21st ACM/IEEE International
Conference on Information Processing in Sensor Networks (IPSN), Milano, Italy, 2022,
pp. 515–516.
[58] F. Tao, H. Zhang, A. Liu, and A. Y. C. Nee, “Digital twin in industry: State‑of‑the‑art.” IEEE
Transactions on Industrial Informatics, vol. 15, no. 4, pp. 2405–2415, 2019.
[59] D. Chen, D. Wang, Y. Zhu, and Z. Han, “Digital twin for federated analytics using a Bayesian
approach.” IEEE Internet of Things Journal, vol. 8, no. 22, pp. 16301–16312, 2021.
[60] M. M. Rathore, S. A. Shah, D. Shukla, E. Bentafat, and S. Bakiras, “The role of AI, machine
learning, and big data in digital twinning: A systematic literature review, challenges, and
opportunities.” IEEE Access, vol. 9, pp. 32030–32052, 2021.
[61] D. Gelernter, Mirror Worlds: Or the Day Software Puts the Universe in a Shoebox...How It Will
Happen and What It Will Mean. Oxford, UK: Oxford University Press, 1993.
[62] Y. K. Dwivedi et al., “Metaverse beyond the hype: Multidisciplinary perspectives on emerging
challenges, opportunities, and agenda for research, practice and policy.” International Journal
of Information Management, vol. 66, 2022, Art. no. 102542.
[63] A. Kuppa and N.‑A. Le‑Khac, “Black box attacks on explainable artificial intelligence (XAI)
methods in cyber security.” In: Proceedings of the International Joint Conference on Neural
Networks (IJCNN), Glasgow, UK, 2020, pp. 1–8.
[64] “Metaverse security threats in the future of internet.” [Online]. Available: https://www.
juegostudio.com/blog/Metaverse‑security‑threats‑in‑the‑future‑of‑internet [Accessed on:
February 22, 2023].
[65] S. Qamar, Z. Anwar, and M. Afzal, “A systematic threat analysis and defense strategies for the
metaverse and extended reality systems.” Computers Security, vol. 128, p. 103127, 2023.
[66] T. Oleksy, A. Wnuk, and M. Piskorska, “Migration to the metaverse and its predictors:
Attachment to virtual places and metaverse‑related threat.” Computers in Human Behavior,
vol. 141, p. 107642, 2023.
[67] S.‑Y. Kuo, F.‑H. Tseng, and Y.‑H. Chou, “Metaverse intrusion detection of wormhole attacks
based on a novel statistical mechanism.” Future Generation Computer Systems, vol. 143,
pp. 179–190, 2023.
[68] A. K. Ghosh, A. S. Ullah, R. Teti, and A. Kubo, “Developing sensor signal‑based digital twins
for intelligent machine tools.” Journal of Industrial Information Integration, vol. 24, 2021, Art.
no. 100242.
[[69] K. Li, W. Ni, E. Tovar, and M. Guizani, “Optimal rate‑adaptive data dissemination in vehicular
platoons.” IEEE Transactions on Intelligent Transportation Systems, vol. 21, no. 10, pp. 4241–4251,
2020.
158 ◾ Future Communication Systems Using AI, IoT and Data Science
[70] R. S. Kenett and J. Bortman, “The digital twin in industry 4.0: A wideangle perspective.”
Quality and Reliability Engineering International, vol. 38, no. 3, pp. 1357–1366, 2022.
[71] K. Li, L. Lu, W. Ni, E. Tovar, and M. Guizani, “Secret key agreement for data dissemination in
vehicular platoons.” IEEE Transactions on Vehicular Technology, vol. 68, no. 9, pp. 9060–9073,
2019.
[72] S. Boschert and R. Rosen, “Digital twin‑The simulation aspect.” In: Mechatronic Futures:
Challenges and Solutions for Mechatronic Systems and Their Designers, P. Hehenberger and D.
Bradley, Eds. Cham, Switzerland: Springer Int., 2016, pp. 59–74.
[73] K. Li, R. C. Voicu, S. S. Kanhere, W. Ni, and E. Tovar, “Energy efficient legitimate wireless
surveillance of UAV communications.” IEEE Transactions on Vehicular Technology, vol. 68,
no. 3, pp. 2283–2293, 2019.
[74] Y. Jiang, S. Yin, K. Li, H. Luo, and O. Kaynak, “Industrial applications of digital twins.”
Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering
Sciences, vol. 379, no. 2207, 2021, Art. no. 20200360.
[75] K. Li, W. Ni, M. Abolhasan, and E. Tovar, “Reinforcement learning for scheduling wire‑
less powered sensor communications.” IEEE Transactions on Green Communications and
Networking, vol. 3, no. 2, pp. 264–274, 2019.
[76] E. U. Haque, W. Abbasi, S. Murugesan, M. S. Anwar, F. Khan, and Y. Lee, “Cyber forensic
investigation infrastructure of Pakistan: An analysis of cyber threat landscape and readi‑
ness.” IEEE Access, vol. 11, pp. 40049–40063, 2023.
[77] K. Li et al., “Fair scheduling for data collection in mobile sensor networks with energy har‑
vesting.” IEEE Transactions on Mobile Computing, vol. 18, no. 6, pp. 1274–1287, 2019.
[78] Z. Liu, N. Meyendorf, and N. Mrad, “The role of data fusion in predictive maintenance using
digital twin.” In: Proceedings of the AIP Conference, Provo, Utah, USA, 2018, Art. no. 20023.
[Online]. Available: https://aip.scitation.org/doi/abs/10.1063/1.5031520.
[79] K. Li, N. Lu, J. Zheng, P. Zhang, W. Ni, and E. Tovar, “Bloothair: A secure aerial relay sys‑
tem using Bluetooth connected autonomous drones.” ACM Transactions on Cyber‑Physical
Systems, vol. 5, no. 3, pp. 1–22, 2021.
[80] K. Li et al., “Design and implementation of secret key agreement for platoon‑based vehicular
cyber‑physical systems.” ACM Transactions on Cyber‑Physical Systems, vol. 4, no. 2, pp. 1–20,
2019.
[81] D.‑I. D. Han, Y. Bergs, and N. Moorhouse, “Virtual reality consumer experience escapes:
Preparing for the metaverse.” Virtual Reality, vol. 26, pp. 1443–1458, 2022.
[82] S. Mystakidis, “Metaverse.” Encyclopedia, vol. 2, no. 1, pp. 486–497, 2022.
[83] M. A. I. Mozumder, M. M. Sheeraz, A. Athar, S. Aich, and H.‑C. Kim, “Overview: Technology
roadmap of the future trend of Metaverse based on IoT, blockchain, AI technique, and
medical domain metaverse activity.” In: Proceedings of the International Conference on
Advanced Communication Technology (ICACT), PyeongChang Kwangwoon Do, Korea, 2022,
pp. 256–261.
[84] T. R. Gadekallu et al., “Blockchain for the metaverse: A review.” arXiv:2203.09738, 2022.
Chapter 9
Social Internet of
Things (SIoT)
Recent Trends and Its Applications
Irshad Khalil
Gachon University
Adnan Khalil
University of Malakand
Inam Ullah
Gachon University
Yuning Tao
South China University of Technology
Ijaz Khan
Harbin Institute of Technology
Shahzad Ashraf
NFC Institute of Engineering and Technology
Waleed M. Ismael
Azal University for Human Development
9.1 INTRODUCTION
Kevin Ashton was the first person who introduced the idea of Internet of Things (IoT) and
proposed the idea of linking Radio Frequency Identification (RFID) to the internet [1]. By
using this approach, each physical object becomes a smart object when it is connected to
the internet, i.e., wall, door, and other appliances. These technologies may include differ‑
ent sensors, wireless, and web technologies. These devices have different features such as
architecture, operating system, platform, and communication protocols, and they are con‑
nected to each other to exchange data and fulfill the need of the end users [2]. According
to the forecast of Cisco [3] and Garter [4], the number of these smart devices may increase
from 20 to 50 billion in 2022, which greatly increases the IoT network complexities [5].
Managing such a huge network of billions of devices is very difficult because of the lack of
universal standards, and the current IoT standards and protocols are not cost‑effective and
avoid the realization of IoT’s true potential [6].
In recent years, research has been carried out, which shows that the concept behind
Social Networks (SN) and IoT show underlying similarities [7], and different research
efforts are made on the integration of SN in the IoT world to solve different implementa‑
tion problems [8–11]. The Social Internet of Things (SIoT) is a newly described term in
computer network, which relates the concept of SN to the IoT. Reference [12] proposed a
new approach based on the concept of relationships in social objects in IoT networks with‑
out human intervention. Using this approach, smart objects become social objects when
social value or properties are added to the smart objects. These social properties enable the
social objects to build/establish social relationship autonomously with other social objects
to carry out different tasks. These tasks may form simple (using smart mobile) to very com‑
plex tasks sharing the very complicated infrastructure of the city. SIoT uses all the devices
connected from anywhere to create relationships based on some common interest and pro‑
vide better services to the end users [13]. Different types of relationships are established
among different social objects, which include parental object, colocation, co‑work, and
social object relation to fulfill different types of needs according to user needs and require‑
ments. In the SIoT network, social objects communicate like social agents to exchange
information against generated queries [14]. Social interaction in the SIoT was inspired
from the well‑known statistical theory called Fiske theory [15], which shows the real com‑
munication pattern among human beings and the types of relationships in communities.
The main objective of enabling SN in IoT is to allow users to set the rules for social
objects to protect the privacy of the smart/social device and only access the throughput/
results of inter‑object interaction [16]. Enabling the SN for smart objects can improve dif‑
ferent network parameters such as service discovery, trustworthiness, friendship selection,
and network navigability [12] and suggested that by having an SN capability for social
objects, one can efficiently achieve network navigability, friendship management, interop‑
erability in a trustworthy environment, and service discovery efficiently.
Using the concept of SN and IoT greatly improves and explains well the complexity of
interaction among users and social things in the network [17]. The concept of SIoT started
in 2011, and still now, many efforts are being made to improve the different concepts of
SIoT [18]. The concept of SIoT is at its earlier stage, and effort has been made to propose the
Social Internet of Things (SIoT) ◾ 161
idea of integrating SIoT into actual application [19,20]. Despite the increasing popularity
of this active research area, there are very few related research studies that have reviewed
different notions of SN in SIoT (e.g., [12,18,21,22]).
the concept of SIoT and its application are included in our critical review. Figure 9.1 shows
the proposed method for this review.
After a thorough review and selection process, we only included papers that were rel‑
evant to the concept of either SIoT or Social Web of Things. All other papers were excluded
from this review. We considered articles that proposed theoretical solutions, conceptual
approaches, architectures, frameworks for integrating SN and IoT in SIoT/SWoT, and
real‑world applications of the SIoT concept, as well as partially or fully completed proto‑
types or applications using the SIoT concept.
The total number of papers that matched the exact term “Social Internet of Things” in the
different scientific libraries mentioned previously were considered for further evaluation
FIGURE 9.2 Number of papers matching the exact term “Social Internet of Things.”
and analysis. Figure 9.2 illustrates the number of papers in each repository that exactly
matched the term “Social Internet of Things.”
These papers are analyzed for their relationship, platform, and different implementa‑
tions, as well as cloud‑based applications and real‑world scenarios where the concept of
SIoT is fully implemented.
9.4 BACKGROUND
In recent years, the idea of converging the concept of SN with IoT has gained more impor‑
tance. Kleinberg [27] first introduced the concept of converging the idea of SN with IoT
applications through which smart objects are capable of creating a social relationship with
each other to fulfill a common goal. The most important step in the direction of SIoT has
been considered in Ref. [26]. In this paper, the integration between SN and IoT and how SN
is used to bring social aspects in smart objects are discussed. The author does not propose
the required architecture for SIoT and does not describe how social relationships are estab‑
lished among social objects. These social attributes are explained in Ref. [28], which enable
social interaction among social objects. The relationship model for SIoT was inspired from
the well‑known Fiske theory [15], which presents a complete relationship model for human
society. These objects can communicate with each other and behave like social agents in
the social network. These social agents can request and respond from/to other social agents
to provide social services [14]. Each social object can directly communicate with each other
to improve and with humans based on a set of rules set by humans such as how to select
friends and make friendship or how to provide services [12]. The most recent advance‑
ment in SIoT Social Collaborative smart thing [29] is by which social objects collaborate
164 ◾ Future Communication Systems Using AI, IoT and Data Science
and create social relationship with others. For the readers, Refs. [30] and [16] present the
complete evaluation history of how a smart object becomes a social object. In SIoT, differ‑
ent relations are created, which provide service in a distributed manner rather than relying
on simple server‑client architectures [29]. Unique benefits of using the concept of SIoT are
as follows:
• Object Layer: This layer comprises of physical devices and their communication
interfaces. It represents the physical entities that are connected to the network and
can be represented by an object identifier. The object layer is responsible for the man‑
agement of the physical devices, their location, and their current state.
• Component Layer: The component layer is responsible for managing different com‑
ponents of the SIoT system, including Object Profiling, Identification Management,
Owner Control, Relationship Management, Service Discovery, and Composition
components. The Object Profiling component is responsible for managing the charac‑
teristics of the objects and their description. The Identification Management compo‑
nent is responsible for managing the unique identification of the objects. The Owner
Control (OC) component is responsible for managing the ownership of the objects.
The Relationship Management Component (MC) is responsible for managing the
relationships between the objects. The Service Discovery component is responsible
for discovering the services offered by the objects. The Composition component is
responsible for managing the interactions between the objects. Additionally, there
Social Internet of Things (SIoT) ◾ 165
• Gateway Layer: This layer is responsible for providing a bridge between the SIoT
server and the objects, enabling communication and interaction between them. This
layer is responsible for managing the communication protocols between the objects
and the SIoT server and for managing the data flow between them.
• Object Layer: This layer comprises of physical devices and their communication
interfaces. It represents the physical entities that are connected to the network and
can be represented by an object identifier. The object layer is responsible for the man‑
agement of physical devices, their location, and their current state. This variation of
the architecture combines the three layers into a single component, the SIoT Server
layer, which simplifies the management of the different components of the SIoT sys‑
tem. The SIoT Server layer provides an integrated solution for managing the different
components of the SIoT system and enables efficient communication and interac‑
tion between the objects, services, and users. The gateway layer is responsible for
managing the communication protocols between the objects and the SIoT server,
and for managing the data flow between them. Moreover, the object layer represents
the physical entities that are connected to the network and can be represented by
an object identifier. In Ref. [33], another architecture for SIoT is presented based on
the Web of Things (WoT) and SN. This architecture utilizes machine learning for
processing and interpreting natural languages into machine language, making the
devices understandable by human beings. The status of the devices is then shared
with other devices through social networks.
Communication between devices is enabled using Restful APIs. This proposed Social Web
of Things architecture is composed of three layers:
• External Resource Layer: This layer consists of any smart devices that can connect
to the internet through Restful APIs. These devices include sensors, actuators, and
other third‑party vendor sensors.
• Platform Layer: This layer is the core of the proposed architecture and includes all
functionalities such as the processing of natural languages to machine languages,
interpretation of natural languages, identifying resources, and Business Process
Management tasks.
• Application Layer: This layer is responsible for presenting the information to the
user and other third‑party applications. It provides information to the end users. The
Lilliput architecture, as presented by Byun et al. [34], is a system designed to manage
and interact with IoT devices. It comprises several functional components, including
the following: The Reflection Manager, which is responsible for receiving and storing
online information about entities in a social graph; the IoT Social Graph Manager,
which builds and maintains a social graph of IoT components and directly interacts
with four different sub‑components; the Entity Manager, which manages the IDs of IoT
devices and verifies their class or object type; the Relationship Manager, which man‑
ages all the relationships that occur within the system; the Synchronization Manager,
which maintains a list of callback receivers; the Change Notification Manager, which
Social Internet of Things (SIoT) ◾ 167
notifies users when changes occur in the social graph; the Graph Utilization Manager,
which receives queries from users and returns results; the Modification Manager,
which modifies the IoT social graph using knowledge base APIs; the Reflection
Manager, which performs bi‑directional reflection between cloud space and IoT social
networks; the Invoker component, which invokes different smart services on social
things and displays results for the application; and the Security Manager, which deter‑
mines whether requests from applications are suitable or not. The Lilliput architecture
also provides RESTful APIs for interaction with the system.
Kim et al. [35] proposed a three‑layer architecture for the SIoT called Socialite. This archi‑
tecture is designed to provide a flexible and scalable solution for managing and interacting
with IoT devices in a social context. The first layer is the Socialite client application layer,
which is reliable for providing access to the different devices and services in the system.
This layer is also responsible for programming the rules and communication mechanisms
that govern the interactions between devices and users. The client application layer can be
programmed using a variety of programming languages, providing flexibility and ease of
use for developers. The second layer is the Socialite Server layer, which acts as a gateway
between the client application layer and the different types of devices and services in the
system. This layer is responsible for providing access to devices of different architectures
and protocols and for managing the interactions between devices and the client appli‑
cation layer. Finally, at the third layer, the database layer, all the information about the
devices and their relationships is stored. This layer allows for efficient storage and retrieval
of data and is designed to handle large amounts of data and the scalability of the system.
The database layer also helps in maintaining the state of the devices and the relationships
that have been established between them. Overall, the Socialite architecture is designed to
provide a flexible and scalable solution for managing and interacting with IoT devices in a
social context by providing a three‑layer architecture that separates the different function‑
alities of the system.
Alam et al. [36] proposed a six‑layered architecture for the SIoVT. The architecture is
designed to provide a comprehensive solution for managing and interacting with con‑
nected vehicles in a social context. The proposed architecture consists of six layers, each
with specific functions and responsibilities. The first layer is the Home Base Unit (HBU)
layer, which is responsible for managing data, handling the dispatching of messages, and
setting privacy settings. This layer is the primary point of interaction between the vehicle
and the user. It includes a Data Manager, Dispatcher, and Privacy settings. The second
layer is the On‑Board Unit (OBU) layer, which is responsible for managing the identity
of the vehicle, building messages, managing data, and handling dispatching. This layer
includes an Identity Manager, Message Builder, Data Manager, and Dispatcher. The third
layer is the tNote Message layer, which is responsible for handling dedicated Short Range
Communications and Advanced Traveler Information System (ATIS) for the vehicle. This
layer is responsible for sending and receiving messages between vehicles and other road
users. The fourth layer is the Road Side Unit (RSU) layer, which is responsible for man‑
aging the identity of the vehicle, handling data management, dispatching messages, and
managing social tags. This layer includes an Identity Manager, Data Manager, Dispatcher,
168 ◾ Future Communication Systems Using AI, IoT and Data Science
and Social Tag Manager. The fifth layer is the tNote Cloud layer, which is responsible for
handling the topology optimization, query processing, data management, and providing a
user interface for managing routes, friends, and groups and generating social graphs. This
layer includes a Topology Optimizer, Query Processor, Data Manager, and User Interface.
Lastly, the sixth layer is the User Interface layer, which is responsible for providing a
user‑friendly interface for managing user profiles, routes, friends, and groups and generat‑
ing social graphs. This layer includes features for managing routes, friends, and groups and
generating social graphs. Overall, the proposed six‑layered architecture for SIoVT provides
a comprehensive solution for managing and interacting with connected vehicles in a social
context, by providing a structured and organized way to handle the different functional‑
ities of the system. Reference [37] proposed a four‑layered architecture for implementing
the concept of SIoT in the IoV domain. The proposed architecture also consists of six layers
that include the following: (1) Physical world layer, which consists of real‑world objects, i.e.,
cars and other transportation vehicles; (2) Gateway layer, which consists of smart vehicles
and other roadside units; (3) Fog layer, which is used for the management of Fog nodes
components in the SIoV networks; (4) Cloud layer, which is responsible for the big data,
resource, and analytic; (5) Application layer, which is used for application management
and services; and (6) User layer users, pedestrians, and Intellection traffic system units.
Reference [38] proposed an architecture that implements both the functionality of IoT and
SIoT. There are four components in the Social Pal platform, which are as follows: (1) Actor
is any device or person who interacts with the system; (2) Social Pal is responsible for the
discovery of the service for the social objects; (3) Interface is responsible for making new
connection for social objects; and (4) Internet provides a way of access to each component
in the platform. This SIoT platform has inherent important features of friendship manage‑
ment, services decomposition, and others from social networks.
Gulati et al. [19] proposed a semantic‑oriented architecture model as reference for SIoT.
The proposed architecture consists of four layers. Object layer is referred to the collection
of all social objects that may be included in the network. Communication layer is respon‑
sible for communication among all social objects. Social management layer is responsible
for managing the relationship and assigning ID to each object. Presentation layer aims to
provide information to the end users and consists of mobile and web‑based applications.
Voutyras et al. [39] proposed an SIoT architectural model, which is quiet similar to Ref. [12]
except two new modules, namely, Mobile object relationship and Explorer object relation‑
ship, which are added to the main component. The functionality of the proposed archi‑
tecture is the same as in Ref. [12]. The EoR module is responsible for creating connections
with movable and static objects, while the MoR module is used to establish the relationship
with smart objects that travel among them. Reference [40] proposed a unified architecture
for the IoT that integrates smart objects and RFID devices to create a social network and
explore a social feature of the smart object. In this architecture, smart objects create a con‑
nection with other smart objects and create a social relationship to deliver services to other
objects. However, the proposed unified architecture in not implemented. Reference [41]
proposed an SIoT architecture based on a relational model including four different groups
as a basic design element. These smart objects are integrated with SN and other social
objects to form relationships using the module of COSMOS management frameworks.
Social Internet of Things (SIoT) ◾ 169
1. UO Relationship:
• Ownership Object Relationship (OOR): OOR is created among objects of the
same user, i.e., personal laptop, personal mobiles, smart car, and all other smart
objects belonging to the same user.
• Social Object Relationship (SOR): SOR belongs to friends, i.e., interchange of
phone numbers when friends are in contact with others [43].
• Sibling Object Relationship (SiOR): This relationship is created among different
smart objects that belong to a family member [33].
• Guest Object Relationship (GOR): This relationship is created by smart objects
owned by the users as a guest in a specific role.
2. OO Relationship:
• Parental Object Relationship (POR): This relationship is created among similar
objects of the same company or distributor.
• Co‑location Object Relationship: This relationship is established among objects
in the same location.
• Co‑work Object Relationship: This relationship is established by smart objects
that work together to provide service for a common IoT application.
• Guardian Object Relationship (GoR): This relationship is established when
social vehicles turn into child objects in association with the super objects of
Road Side Units [34].
• Stranger Object Relationship: This relationship is established among objects in
a public gathering.
• Service Object Relationship: This type of relationship is established among
smart objects that fulfill the required services that are requested by coordinating
the same service composition.
170 ◾ Future Communication Systems Using AI, IoT and Data Science
online ID for each object, which is accessible via a link address. These objects can be linked
with others via relationships and exchange information with other objects and humans.
Social web of thing is a new platform developed by scientists at the Erosion Institute, which
aims to use social media to greatly improve human presence. Interaction among objects is
enabled using social media. Third‑party applications like Xively and Paraimpu support the
creation of web‑based applications that can link smart objects in a social network. Pintus
et al. [44] proposed Paraimpu, which added value to the smart objects using Http‑enabled
connection. The proposed architecture was based on Social Web of Thing concept. Using
this platform, end users can register new smart objects and build a wide range of person‑
alized applications in a user‑friendly way. The main limitation of the proposed algorithm
was that there is no mechanism for handling the heterogeneous devices and API offered
for different architectures. However, using this approach, no social interaction and rela‑
tionship can be utilized and hence restricts the user and device collaboration. Pintus et al.
[45] proposed another improved architecture using the concept of Social Web of Thing.
This architecture explains the way how different heterogeneous devices can be added to a
social‑enabled platform. It is a web‑enabled platform that adds a virtual device, adds social
value to the social device, shows how to collect information from the devices, and shares
data from heterogeneous devices using programming panel.
Girau et al. [46] proposed an architecture called based on ThingSpeak server and the
concept of SIoT. ThingSpeak server is used to manage the social interaction of the social
objects and provide the features of how to add new devices and add rules about the social
relationship. Web server provides the objects with the required information whenever this
information is required by the smart object. However, the proposed platform does not
define and determine the trustworthiness of the services received. Reference [47] also pro‑
posed a web‑enabled platform for SIoT utilizing semantic web service and social network.
The proposed architecture utilized the SN as a service creation platform where the end
users/admin can create services for their smart devices. The main aims of this platform
were to collect information from different devices and share them with friend’s devices in
a social network. Danielle Sheridan et al. [48] introduced the concept of using Twitter and
IoT devices for the development of social IoT system. In this architecture, APIs provided by
Twitter are utilized for human‑to‑machine communication. REST and MQTT protocols
are used for human‑to‑machine communication, and the result indicates that the pro‑
posed system is ideal for SIoT networks. Byun et al. [34] proposed Lilliput for IoT devices.
This architecture improves social graph by improving the social interaction among social
objects. The proposed platform enables end users to develop SIoT‑based application with‑
out prior knowledge of programming and skills. Three types of bi‑directional relationships
can be created, and they are divided into human to human, place to place, and object to
object relationships. The main advantage of this platform is that it studies all aspects of
social relationship and proposes an efficient hybrid model for both SN and IoT. The limi‑
tation of the proposed platform is that the temporal social relationship between people,
devices, and locations is not expressed, and it can increase the cost because of the utiliza‑
tion of ML methods.
Zhang et al. [33] proposed an architecture design for SIoT application based on the con‑
cept of Social Web of Thing, Restful web services, and SN structure. The proposed platform
172 ◾ Future Communication Systems Using AI, IoT and Data Science
makes use of web technologies and SN to bring the social relationship in smart objects.
In this platform, semantic web technologies are used to convert the raw data into differ‑
ent natural languages allowing smart devices to interact with each other. The proposed
platform also provides API to provide access to their database services for third‑party
users. Socialite is another platform proposed by Kim et al. [35] for the development of SIoT
applications. In this platform, a set of relationship is predefined and can be used for the
development of SIoT applications. It allows the user to integrate devices having different
underlying architectures, with various types of interface, and to allow defining the rela‑
tionships. Socialite attains effective RM for the SIoT by developing the relationship ontol‑
ogy. Girau et al. [49] introduced Lysis for the deployment of IoT applications. This is a
cloud‑based platform having four major features, i.e., social agent, PaaS model, reusability,
and cloud storage for information storage and operation. Both users and developers use
the PaaS for the development of applications. Relationships are established among social
objects to locate information and make the network more scalable. Built‑in templates are
provided to the user and entire community to develop and deploy an SIoT‑based applica‑
tion. Data generated by the devices are stored in the server, which is controlled by the
developers. Cicirelli et al. [50] developed iSapiens (a java based) platform for implementing
SIoT‑based applications. iSapiens allow the user to add new objects having social capabili‑
ties and interaction with other devices and objects. The proposed platform allows the user
to create smart environments and manage cloud storage and other resources. iSapiens is
designed and implemented for the development of smart city services and applications
[51]. Reference [52] proposed a platform in which users can automatically add new devices,
allow end user to deploy different protocols, and analyze the result in a visualized form. In
this system, MQTT and CoAP protocols can be implemented for data communication. The
proposed platform is integrated with the social media application through which the user
can get notifications about any event. The proposed framework was implemented for the
smart home scenario. In this system, a cloud‑based server (ThingSpeak) is used to collect
the sensor data where these data are further analyzed (Table 9.3).
1. Transitive Trust: This type of trust is established between different objects that may
not know each other directly, e.g., if object A trusts B and B trusts C, then in this type
of trust, A must be confident on C directly.
2. Direct Trust: Direct trust is based on direct mutual understanding and perception
between smart objects.
3. Indirect Trust: Indirect trust is based on other smart object reputations and
recommendations.
4. Local Trust: This type of trust is different for smart objects. For example, object A
trusts B and object B trusts C, where C does not trust A.
Social Internet of Things (SIoT) ◾ 175
5. Subjective Trust: This type of trust is based on individual object opinions, while
objective trust between social objects is based on each other social/smart object’s
quality of service provided.
6. Composite Trust: This trust is a composite of friend recommendations and opinions,
which may lead to establish trust or distrust about another object.
7. Dynamic Trust: This trust is not static during different time durations and may
change over time, whether the conditions are altered.
Abdelghani et al. [58] proposed two types of trust between objects in the SIoT: Quality of
Service (QoS) trust and social trust. QoS trust pertains to the ability of a device to provide
high‑quality service in response to a request for these services. It is evaluated using metrics
such as reliability and cooperativeness. Social trust, on the contrary, is more common in
the SIoT context and refers to the level of trust between the owners with each other. Trust is
evaluated using factors such as connectivity and honesty. Reference [54] proposed to study
the amount and degree of trust in the SIoT against different types of attacks such as On‑Off
selective forwarding attacks. This model is unique as it categorizes trust into three different
types: centrality, energy, and service score. Centrality refers to the importance of smart/
social objects for other objects to protect the SIoT network from malicious objects and
reduce the number of communications between objects trying to achieve harmful goals to
disturb the normal working of the network. Energy is another matric for trust evaluation,
specifically in the case of On‑Off attacks with in the network. Service score refers to the
evaluation of the quality of service provided by an object. This dynamic trust model takes
into account these three factors to provide a comprehensive and robust approach to trust
evaluation in SIoT systems [59].
all network objects. The strength of this research is that it can separate distrustful objects
from the network effects, by analyzing the technical trust metrics between related objects
that cooperate. However, the weakness of this study is that it does not use direct observa‑
tions to evaluate trust metrics and relies only on indirect trust observations. Reference
[60] proposed a trust evaluation model for the SIoT that is based on objects’ behavior. This
model, called the SIoT Guarantor and Reputation Trust Evaluation Model, aims to provide
a proper service response by evaluating the degree of trust between objects. The model
employs techniques such as credit rating and reputation rating to assess trust. Objects that
provide complete services are given more rank than those that do not collaborate or provide
appropriate services. Objects with a lower rank are considered malicious. This approach is
effective in identifying dishonest objects, but it does not consider all the important aspects
of trust in large‑scale networks.
Chen et al. [61] proposed a social trust evaluation model in SIoT networks that takes
into account the interactions between owners of different objects. They identified three
main factors that influence trust: Social Contact, Friendship, and Community of Interest.
Friendship trust is based on the degree of closeness between the owners of two objects.
Social Contact trust is based on the frequency of interactions between the owners.
Community of Interest trust is based on the common interests shared by the owners. This
model also considers the resiliency of the system against opportunistic service attacks.
However, it does not consider different types of attacks and their potential impact on the
trust evaluation. This may limit the effectiveness of the model in protecting against mali‑
cious objects or threats in the network. However, this study does not consider dynamic
environmental factors, which may be a limitation. Sharma et al. [62] proposed a model
that utilizes Fission Computing and edge‑crowdsourcing network to evaluate trust and
privacy. This model uses a combination of theoretical analysis and numerical simulations
to evaluate the effectiveness of the proposed method using real data. Fission Computing
helps balance the load in the network, while edge‑crowdsourcing network allows for the
evaluation of trust and privacy in a decentralized manner. This is the first model to use
Fission Computing and edge‑crowdsourcing network for trust and privacy evaluation in
SIoT. The main advantage of this model is that it can effectively evaluate trust and privacy
in a decentralized manner, which is essential for large‑scale SIoT networks. Truong et al.
[63] proposed a comprehensive approach for assessing trust in SIoT, which encompasses
all components of the system. They developed a smart platform that evaluates trust ser‑
vices within the network, comprising three key elements: Reputation, Recommendation,
and Knowledge. The Reputation aspect is based on user feedback, where the trustworthi‑
ness of an object is evaluated based on factors such as QoS, response time, and reliabil‑
ity. The Recommendation aspect is based on user recommendations to trust or distrust
an object. The Knowledge aspect is based on the default knowledge of each object. The
authors also used a car‑sharing service use case to demonstrate the implementation and
effectiveness of their approach. This approach is a holistic one, and it considers multiple
factors and perspectives to evaluate trust, which makes it more reliable and accurate.
Table 9.5 shows recent works related to the trust model.
Social Internet of Things (SIoT) ◾ 177
request delay, network stability, packet overhead and energy consumption. The proposed
protocol, called Trendy, utilizes an efficient discovery technique along with a context‑aware
selection mechanism for IoT web services. This approach aims to increase the efficiency of
service discovery by reducing the number of packets in the network, thus improving net‑
work scalability. Additionally, the protocol is designed to minimize the delay in service
invocation and energy consumption during the network life cycle. Overall, this protocol
aims to provide an efficient and effective solution for service discovery in IoT environments.
Wei and Jin [66] proposed a concept of “contextual similarity” to measure the similarity
between services and context information, which can be used to improve the accuracy
and effectiveness of service discovery in IoT. They also proposed a context‑aware service
discovery algorithm that utilizes the contextual similarity concept, which can improve the
matching between services and context information.
Furthermore, they evaluated the proposed context‑aware service discovery algorithm
using a simulated dataset and demonstrated that it can significantly improve the efficiency
and effectiveness of service discovery in IoT. However, it is worth noting that this study
does not provide any real‑world evaluation or experimental results to validate the pro‑
posed approach. Xia et al. [67] proposed a service discovery mechanism called Scalable and
Lightweight Service Discovery for SIoT that aims to improve the performance of service
discovery in terms of three main metrics: success rate of queries, average path length of
searches, and average number of relay nodes. The goal of SLSA is to provide an efficient
and secure way of discovering web services in a large‑scale network. The authors com‑
pared SLSA with three other mechanisms and evaluated their performance by classifying
web services into 50 different subgroups, each containing 10 types of specific services.
The results of the evaluation showed that SLSA has a higher success rate in queries, more
energy effective in terms of the average number of relay nodes, and a shorter average path
length of the discovery process compared to the other mechanisms. Additionally, the
authors pointed out that SLSA’s evaluation is based on a dynamic behavior in a large‑scale
network, and it can address resource limitations in SIoT. This study is significant as it pro‑
vides a comprehensive evaluation of SLSA’s performance and demonstrates its effective‑
ness in addressing the challenges of service discovery in SIoT. Reference [68] proposed a
DNS‑SD approach for discovering different web services for resource‑constrained devices
in SIoT environment. The proposed approach is based on combining three different proto‑
cols, known as uBonjour, to improve interoperability between different devices to discover
desired services within the network. The main advantage of this approach is to promote
the concept of service discovery process. However, they did not mention any possible flaws
or limitations of the proposed approach in their study. Additionally, their implementation
testbed is relatively small, and it would be beneficial to test the approach in a more exten‑
sive and realistic environment.
In addition, further investigation should be conducted to assess the scalability and
robustness of the proposed approach in a large‑scale IoT network. Reference [69] proposed
an efficient method for sharing resources and selecting the appropriate objects to deliver a
service based on QoS criteria in SIoT. They use a programming approach to develop their
approach, and the strength of this study is its high level of flexibility in resource sharing.
180 ◾ Future Communication Systems Using AI, IoT and Data Science
However, they do not fully address the entire system in terms of QoS and leave it as a future
area of research. The proposed solution aims to optimize the use of resources by consider‑
ing the QoS criteria of the services and the devices, which leads to improved performance
and better user satisfaction. Furthermore, the study highlights the importance of secure
communication in resource sharing and selection in SIoT, which is a critical aspect to con‑
sider in the development of IoT systems. Reference [70] proposed an energy‑efficient ser‑
vice composition method for SIoT services. This approach aims to minimize the number
of different web services, which are very important to handle energy consumption for SIoT
devices while satisfying all user requirements. A strength of this research is the high per‑
formance and energy efficiency as compared to other approaches; however, it does not take
into account the security aspect of the service composition method. Reference [71] pro‑
posed a new algorithm for service composition that utilizes recommendation‑based IoT
services to meet the needs of users. They implemented a Typed Attribute Graph framework
to recommend available services in IoT network, making it easier for smart objects to com‑
municate with one another. A key aspect of their study is the use of an efficient algorithm
to calculate service signatures, allowing for seamless service interactions. However, they
did not perform any simulations to evaluate the effectiveness of their approach. It would
be useful to have some form of simulation or testing to understand how well the proposed
approach performs in a real‑world scenario. Reference [72] proposed an approach using
Genetic Programming along with a greedy search algorithm for web service composi‑
tion. They tested their approach using built real test bed scenarios such as WSC‑2008 and
WSC‑2009 to evaluate their performance. They compared their proposed approach with
GP‑based algorithm without greedy search implementation and found that the proposed
method is more accurate and efficient as compared to that without a greedy search algo‑
rithm. The proposed algorithm also evaluated the approach in both dynamic and static
environments.
Some of the other advantages of using cloud computing are being cost‑effective and having
high security, reliability, and high scalability [75]. Besides these advantages, cloud comput‑
ing is not suitable for developing real‑time applications because these storages are far away
from the user’s devices and have a WAN delay/latency [76,77].
This section reviews the latest cloud computation paradigm and Edge computing
invested for the mentioned projects. In V. Doctor project, Cloud‑based solution is pre‑
sented in which unlimited requests from patients are handled.
In Ref. [78], scalability is improved by using cloud as there are a large number of simul‑
taneous search queries from different devices. In Ref. [79], the author developed a smart
home based on SIoT to optimize the energy usage of the building. There are other methods
for energy management but in this chapter, the author developed a user‑centric approach
while keeping the comfort level on first priority. In this project, a social virtual object is
created, which represents a real‑world object in the cloud. Different sensors are deployed,
which send data to the cloud‑based server (Lysis Platform).
In social beach application [80], the concept of SIoT was used to find the best‑ever beach
according to user preference. This system consists of a control unit along with ultraviolet
sensors, sensor for humidity detection, mobile devices, beach station, and camera device
for crowd estimation using a combination of support vector machine and computer vision
algorithms. First, data are collected from these devices and then send the data to the
cloud‑based server (Lysis Platform) where information about the beach and user preference
is estimated, and the users are informed about the nearest beach according to their choice.
In smart office project [81], social objects are organized by their location and their services.
Their services are treated as their operations. In smart office, they used the Xively Platform
1 as the cloud server, which is a real‑time network. In that platform, data can be exchanged
using the standard REST protocol. In Airport Dynamic Social [82], a cloud‑based system
was developed, which enables the end user to interact with the smart objects in the airport,
i.e., sensors installed at check‑in for airport counters, boarding gates, flights information,
and other services within the airport. Additionally, the developed application aims at aid‑
ing from Internet Protocol version 6 in order to show the effectiveness of the proposed
system by adding several heterogeneous devices in a smart space. In Ref. [50], the author
proposed a smart home solution based on the concept of SIoT and Edge computing. Edge
computing [83] is a powerful and dynamic technology offering a high speed computation
and storage facilities at the edge for developing real‑time applications. In this application
[50], a smart environment is created as a proof of concept, specifically for managing and
recovery in a dangerous situations. In MagicHome application [33], the author proposed
a cloud‑based approach for developing a smart home application based on the concept of
SIoT. In this application, different sensors are deployed at different locations in the home
which continually sense environmental parameters and send it to the centralized domain.
The author in Ref. [84] developed two different applications, namely, Vehicle Diagnosis
System and Smart Parking based on the concept of SIoT. In these applications, data are col‑
lected to a cloud‑based server for car diagnosis services and vacant parking location infor‑
mation. The application enables the owner to monitor the Engine Control Unit parameters
and can be viewed via a webpage available from a personal computer and other networking
182 ◾ Future Communication Systems Using AI, IoT and Data Science
devices or even other rendering devices in the car. Similarly, in Smart Parking application,
information is provided to the users about vacant locations. In these applications, the data
are first sent to cloud‑based platform (Lysis) where these data are processed.
Vehicular Social Network project for the interaction of vehicles and raising the level of
driving knowledge [94]. Similarly, in tNote project [36], an SIoV based on Vehicular Ad
Hoc Networks has been proposed. In this system, users (vehicle) share their information
with other vehicles. In Ref. [84], the author developed two different applications based on
SIoT in the SIoV domain. The first application is a Vehicle Diagnostic application, which
allows vehicle owners to access information about their vehicles through a proposed SIoV
platform. This application enables users to monitor various Engine Control Unit param‑
eters, such as engine revolution speed, vehicle speed, and oil temperature, through an
onboard unit. This information is then made available to other social objects via a web
page, a smartphone application, or even the vehicle’s own display. The second application
is a Smart Parking application, which demonstrates how SIoV applications can be used
to share important information about car parking spaces in a smart city. In this applica‑
tion, social relationships are created among social vehicles and smart parking locations
to share alerts about the availability of free parking spaces. Only registered vehicles can
access information about free parking locations by creating a social relationship, allowing
users to make informed decisions about where to park at a given time. SIoT can improve
the quality of life by providing smart services and applications such as these.
Smart Place is a concept where the use of IoT devices and advanced applications is applied
to improve the life standard [95]. Smart building has various capabilities [94] as compared
to other traditional buildings including safety, temperature control, etc. Several projects
employed the concept of SIoT in a smart place to enhance the existing system. One solution
based on SIoT was proposed by Ref. [51], which aims to study the security issue, large‑scale
heterogeneous device management, friendship discovery, and trust in large‑scale smart
environment. In this SIoT‑based project, a new middleware layered is introduced to effi‑
ciently manage the heterogeneous devices and mobility model of the devices in any smart
environments. In Ref. [79], the author efficiently applied the concept of SIoT paradigm
for a Smart Heating, Ventilation, and Air Conditioning system, which is used to develop
a tradeoff model for energy being consumed, and the thermal comfort of users inside a
building is achieved. In Ref. [79], the author first developed the thermal profile of the con‑
sidered building which is being characterized and also other parameters such as external
environment and room occupancy. From the simulation results, the implemented system
can reduce energy costs as compared to other traditional methods while keeping the user’s
comfort levels and needs. In order to ease interactions and context awareness among differ‑
ent sensors and actuators, the concept of SIoT is applied. In Ref. [96], the author proposed
an SIoT platform for the detection and identification of vacant space in smart car parking.
In this system, a platform called Lysis [49], which is a cloud‑based platform, is used to
create a virtual object in the cloud, which is involved in the real world for smart parking.
Magnetometer was used to detect the vacant space in the car parking, and a control dash‑
board was designed to manage the vacant car space in the smart car parking. Experimental
testbed along with an android application was also implemented to prove the effectiveness
of the proposed system. In Ref. [97], the author proposed an SIoT platform for the monitor‑
ing of the sea and providing meaningful information to the visitor. In this system, a small
buoy was created to be placed on different positions at the sea which are integrated into a
184 ◾ Future Communication Systems Using AI, IoT and Data Science
cloud‑based platform for managing and information to the visitors. Another SIoT‑based
beach monitoring system was proposed by Ref. [80]. In this system, the concept of SIoT was
used to find the best beach according to user preference. This system consists of a control
unit along with ultraviolet sensors, sensor for humidity detection, mobile devices, beach
station, and camera device for crowd estimation using a combination of support vector
machine and computer vision algorithms. Also in this system, local environmental data
are collected using these sensors. Data from those devices are sent to a cloud‑based plat‑
form that provides users about the beach and suggestions about where to go based on the
preferences set by the users. These preferences are weather information, total time taken to
reach a beach, crowdedness information, and so on.
In Ref. [81] the author developed an SIoT‑based smart office environment in which dif‑
ferent social objects are categorized based on their dynamic location. In this application,
social objects are organized by their location and their services. Their services are treated
as their operations. In this paper, the author has used the Xively Platform 2 as the cloud
server, which is a real‑time network. In that platform, data can be exchanged using the
standard REST protocol. In Ref. [82], an application is provided for smart airport, namely,
Airport Dynamic Social. The aim of the developed system is to allow users to directly
interact with all available social objects and their smart services in smart airport. These
social objects and smart services are different sensors at different sections within the air‑
port. Additionally, this application takes benefits from IPV6 in order to cope with several
heterogeneous devices in a smart space as well as to manage resource‑constraint devices.
In Ref.[33], the author developed and deployed an SIoT‑based smart home solution called
MagicHome. This application was based on the Social Web of Thing Framework, which
relies on the Social Network and Restful Web Service. In MagicHome, there are lot num‑
ber of sensors deployed for sensing purposes. In this application, a social agent posts their
sensed information to other social things who are friends, follow new feeds, and chat with
other social objects. In short, MagicHome is a society whose members are the different
social devices having their own social networks? In Ref. [50], the author developed a proj‑
ect based on SIoT concept called iSapiens. ISapiens implements the concept of SIoT that
allows objects to establish social relationships to handle emergency (Table 9.6).
time, the interoperability of these heterogenous devices is a challenging task. The data
transferred from each device have their own formats according to their underlying archi‑
tecture and operating system, and it is very difficult in such an environment to manage,
analyze, and process these data for decision‑making.
In the SIoT environment, the total time taken by the social objects to communicate with
each other and to understand each other in such heterogenous environments also degrades
the overall performance of the system. In the SIoT environment, different smart objects
and humans as an entity should interact in a machine and human‑friendly manner. In fact,
there is no total interoperability for diverse devices architectures of different mechanisms
that exist for IoT which effect the development of SIoT applications [18,98].
to be addressed. For this, Ref. [100] proposed an enhanced link selection algorithm based
on the application of a genetic algorithm [101].
• What will happen to the collected data if it is not used by other social objects?
• What degree of privacy is maintained while creating social relationship with other
social nodes?
• How trustworthy the collected data are?
In the SIoT environment, issues related to privacy and trust arise as there are specific rules
to which the social object should interact with other social objects because of security con‑
cerns that arise when data are freely accessed between devices.
network navigation which can serve as a reference model for network navigation in SIoT,
but still there is a need for an efficient navigational scheme.
9.13 CONCLUSION
In few last decades, the number of smart objects connected to the internet grows exponen‑
tially. Social Internet of Things is a new paradigm by which different smart objects have
become social objects and created social relationship with each other and with their owner.
This chapter has reviewed the latest papers regarding the development of Social Internet
of Things, types of relationships, different platforms and SIoT architecture, and applica‑
tion of SIoT in different domains. Finally, we have discussed several challenges and issues
regarding SIoT.
REFERENCES
[1] K. Ashton et al., “That Internet of Things,” RFID Journal, vol. 22, no. 7, pp. 97–114, 2009.
[2] S. Efremov, N. Pilipenko, and L. Voskov, “An integrated approach to common problems in the
Internet of Things,” Procedia Engineering, vol. 100, pp. 1215–1223, 2015.
[3] U. Cisco, “Cisco annual internet report (2018‑2023) white paper. 2020,” Acessado em, vol. 10,
no. 01, pp. 1–35, 2021.
[4] G. I. Top, “Strategic IoT technologies and trends,” in Analysts Explore Internet of Things
Opportunities and Pitfalls at Gartner Symposium/ITxpo 2018, November 4–8, 2018, Barcelona,
p. 10.
[5] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of Things (IoT): A vision,
architectural elements, and future directions,” Future Generation Computer Systems, vol. 29,
no. 7, pp. 1645–1660, 2013.
[6] D. Goad and U. Gal, “IoT design challenges and the social IoT solution,” Twenty‑third
Americas Conference on Information Systems, Boston, AIS Electronic Library (AISeL), 2017.
[7] G. Panda, B. Tripathy, and M. Padhi, “Evolution of social IoT world: Security issues and
research challenges,” Internet of Things (IoT), pp. 77–98, 2017.
[8] L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A survey,” Computer Networks,
vol. 54, no. 15, pp. 2787–2805, 2010.
[9] D. Gupta et al., “Energy saving implementation in hydraulic press using industrial Internet of
Things (IIoT),” Electronics, vol. 11, no. 23, p. 4061, 2022.
[10] T. Mazhar et al., “Analysis of challenges and solutions of IoT in smart grids using AI and
machine learning techniques: A review,” Electronics, vol. 12, no. 1, p. 242, 2023.
[11] R. Pal, D. Adhikari, M. B. B. Heyat, I. Ullah, and Z. You, “Yoga meets intelligent Internet of
Things: Recent challenges and future directions,” Bioengineering, vol. 10, no. 4, p. 459, 2023.
[12] L. Atzori, A. Iera, G. Morabito, and M. Nitti, “The social Internet of Things (SIoT)‑when social
networks meet the Internet of Things: Concept, architecture and network characterization,”
Computer Networks, vol. 56, no. 16, pp. 3594–3608, 2012.
[13] S. Rho and Y. Chen, “Social Internet of Things: Applications, architectures and protocols,”
Future Generation Computer Systems, vol. 82, pp. 667–668, 2018.
[14] P. Kumaran and R. Sridhar, “Social Internet of Things (SIoT): Techniques, applications and
challenges,” in 2020 4th International Conference on Trends in Electronics and Informatics
(ICOEI) (48184), Tirunelveli, India, 2020, pp. 445–450.
[15] A. P. Fiske, “The four elementary forms of sociality: Framework for a unified theory of social
relations,” Psychological Review, vol. 99, no. 4, p. 689, 1992.
188 ◾ Future Communication Systems Using AI, IoT and Data Science
[16] B. Tripathy, D. Dutta, and C. Tazivazvino, “On the research and development of social Internet
of Things,” in Constandinos X. Mavromoustakis, George Mastorakis, and Jordi Mongay
Batalla (eds.). Internet of Things (IoT) in 5G Mobile Technologies, Springer, Switzerland, 2016,
pp. 153–173.
[17] J. Formo, J. Laaksolahti, and M. Gårdman, “Internet of Things marries social media,” in
Proceedings of the 13th International Conference on Human Computer Interaction with Mobile
Devices and Services, Stockholm, Sweden, 2011, pp. 753–755.
[18] A. M. Ortiz, D. Hussein, S. Park, S. N. Han, and N. Crespi, “The cluster between Internet of
Things and social networks: Review and research challenges,” IEEE Internet of Things Journal,
vol. 1, no. 3, pp. 206–215, 2014.
[19] N. Gulati and P. D. Kaur, “When things become friends: A semantic perspective on the
Social Internet of Things,” in Bijaya Ketan Panigrahi, Munesh C. Trivedi, Krishn K. Mishra,
Shailesh Tiwari, and Pradeep Kumar Singh (eds.). Smart Innovations in Communication and
Computational Sciences, Springer, Singapore, 2019, pp. 149–159.
[20] T. Mazhar et al., “Analysis of IoT security challenges and its solutions using artificial intel‑
ligence,” Brain Sciences, vol. 13, no. 4, p. 683, 2023.
[21] T.‑Y. Chung et al., “MUL‑SWoT: A social web of things platform for internet of things appli‑
cation development,” in 2014 IEEE International Conference on Internet of Things (iThings),
and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and
Social Computing (CPSCom), Taipei, Taiwan, 2014, pp. 296–299.
[22] I. Mashal, O. Alsaryrah, T.‑Y. Chung, C.‑Z. Yang, W.‑H. Kuo, and D. P. Agrawal, “Choices
for interaction with things on Internet and underlying issues,” Ad Hoc Networks, vol. 28,
pp. 68–90, 2015.
[23] C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, “Context aware computing for
the Internet of Things: A survey,” IEEE Communications Surveys & Tutorials, vol. 16, no. 1,
pp. 414–454, 2013.
[24] J. Ye, S. Dobson, and S. McKeever, “Situation identification techniques in pervasive comput‑
ing: A review,” Pervasive and Mobile Computing, vol. 8, no. 1, pp. 36–66, 2012.
[25] Y. LeCun, Y. Bengio, and G. Hinton, “Deep learning,” Nature, vol. 521, no. 7553, pp. 436–444,
2015.
[26] M. Kranz, P. Holleis, and A. Schmidt, “Embedded interaction: Interacting with the Internet
of Things,” IEEE Internet Computing, vol. 14, no. 2, pp. 46–53, 2009.
[27] J. Kleinberg, “The convergence of social and technological networks,” Communications of the
ACM, vol. 51, no. 11, pp. 66–72, 2008.
[28] J. An, X. Gui, W. Zhang, and J. Jiang, “Nodes social relations cognition for mobility‑aware in
the internet of things,” in Internet of Things (iThings/CPSCom), 2011 International Conference
on and 4th International Conference on Cyber, Physical and Social Computing, Dalian, China,
2011, pp. 687–691.
[29] W. Z. Khan, M. Y. Aalsalem, M. K. Khan, and Q. Arshad, “When social objects collaborate:
Concepts, processing elements, attacks and challenges,” Computers & Electrical Engineering,
vol. 58, pp. 397–411, 2017.
[30] D. Dutta, T. Ch, S. Das, and B. Tripathy, “Social Internet of Things (SIoT): Transforming
smart object to social object,” in NCMAC Conference, Washington, USA, 2015.
[31] J. Guth et al., “A detailed analysis of IoT platform architectures: Concepts, similarities, and
differences,” in Beniamino Di Martino, Kuan‑Ching Li, Laurence T. Yang, and Antonio
Esposito (eds.). Internet of Everything, Springer, Singapore, 2018, pp. 81–101.
[32] L. Atzori, A. Iera, and G. Morabito, “Siot: Giving a social structure to the Internet of Things,”
IEEE Communications Letters, vol. 15, no. 11, pp. 1193–1195, 2011.
[33] C. Zhang, C. Cheng, and Y. Ji, “Architecture design for social web of things,” in Proceedings of
the 1st International Workshop on Context Discovery and Data Mining, Beijing, China, 2012,
pp. 1–7.
Social Internet of Things (SIoT) ◾ 189
[34] J. Byun, S. H. Kim, and D. Kim, “Lilliput: Ontology‑based platform for IoT social networks,”
in 2014 IEEE International Conference on Services Computing, Anchorage, AK, USA, 2014,
pp. 139–146.
[35] J. E. Kim, A. Maron, and D. Mosse, “Socialite: A flexible framework for social Internet of
Things,” in 2015 16th IEEE International Conference on Mobile Data Management, Pittsburgh,
PA, USA, 2015, pp. 94–103.
[36] K. M. Alam, M. Saini, and A. El Saddik, “tnote: A social network of vehicles under Internet of
Things,” in International Conference on Internet of Vehicles, Beijing, China, 2014, pp. 227–236.
[37] T. A. Butt, R. Iqbal, S. C. Shah, and T. Umar, “Social internet of vehicles: Architecture and
enabling technologies,” Computers & Electrical Engineering, vol. 69, pp. 68–84, 2018.
[38] F. Amin and G. S. Choi, “Social pal: A combined platform for Internet of Things and social
networks,” in 2020 5th International Conference on Computer and Communication Systems
(ICCCS), Shanghai, China, 2020, pp. 786–790.
[39] O. Voutyras, P. Bourelos, S. Gogouvitis, D. Kyriazis, and T. Varvarigou, “Social monitor‑
ing and social analysis in Internet of Things virtual networks,” in 2015 18th International
Conference on Intelligence in Next Generation Networks, Paris, France, 2015, pp. 244–251.
[40] E. A. Kosmatos, N. D. Tselikas, A. C. Boucouvalas, “Integrating RFIDs and smart objects into
a UnifiedInternet of Things architecture,” Advances in Internet of Things, vol. 2011, pp. 5–12,
2011.
[41] O. Voutyras, P. Bourelos, D. Kyriazis, and T. Varvarigou, “An architecture supporting knowl‑
edge flow in Social Internet of Things systems,” in 2014 IEEE 10th International Conference
on Wireless and Mobile Computing, Networking and Communications (WiMob), Larnaca,
Cyprus, 2014, pp. 100–105.
[42] M. Roopa, S. Pattar, R. Buyya, K. R. Venugopal, S. Iyengar, and L. Patnaik, “Social Internet of
Things (SIoT): Foundations, thrust areas, systematic review and future directions,” Computer
Communications, vol. 139, pp. 32–57, 2019.
[43] R. Abdul, A. Paul, J. Gul M, W.‑H. Hong, and H. Seo, “Exploiting small world problems in a
SIoT environment,” Energies, vol. 11, no. 8, p. 2089, 2018.
[44] A. Pintus, D. Carboni, and A. Piras, “Paraimpu: A platform for a social web of things,” in
Proceedings of the 21st International Conference on World Wide Web, Lyon, France, 2012,
pp. 401–404.
[45] A. Piras, D. Carboni, and A. Pintus, “A platform to collect, manage and share heterogeneous
sensor data,” in 2012 Ninth International Conference on Networked Sensing (INSS), Antwerp,
Belgium, 2012, pp. 1–2.
[46] R. Girau, M. Nitti, and L. Atzori, “Implementation of an experimental platform for the social
Internet of Things,” in 2013 Seventh International Conference on Innovative Mobile and
Internet Services in Ubiquitous Computing, Taichung, Taiwan, 2013, pp. 500–505.
[47] V. Beltran, A. M. Ortiz, D. Hussein, and N. Crespi, “A semantic service creation platform for
Social IoT,” in 2014 IEEE World Forum on Internet of Things (WF‑IoT), Seoul, Korea (South),
2014, pp. 283–286.
[48] D. Sheridan, A. A. Simiscuka, and G.‑M. Muntean, “Design, implementation and analy‑
sis of a Twitter‑based social IoT network,” in 2019 International Conference on Sensing and
Instrumentation in IoT Era (ISSI), Lisbon, Portugal, 2019, pp. 1–6.
[49] R. Girau, S. Martis, and L. Atzori, “Lysis: A platform for IoT distributed applications over
socially connected objects,” IEEE Internet of Things Journal, vol. 4, no. 1, pp. 40–51, 2016.
[50] F. Cicirelli, A. Guerrieri, G. Spezzano, A. Vinci, O. Briante, and G. Ruggeri, “iSapiens: A
platform for social and pervasive smart environments,” in 2016 IEEE 3rd World Forum on
Internet of Things (WF‑IoT), 2016, Reston, VA, USA, pp. 365–370.
[51] F. Cicirelli, A. Guerrieri, G. Spezzano, and A. Vinci, “An edge‑based platform for dynamic
smart city applications,” Future Generation Computer Systems, vol. 76, pp. 106–118, 2017.
190 ◾ Future Communication Systems Using AI, IoT and Data Science
[52] B.‑S. Chen, V. A. Kshirsagar, and S.‑C. Lo, “Platform design for social Internet of Things,”
in 2017 IEEE International Conference on Consumer Electronics‑Taiwan (ICCE‑TW), Taipei,
Taiwan, 2017, pp. 67–68.
[53] V. Mohammadi, A. M. Rahmani, A. M. Darwesh, and A. Sahafi, “Trust‑based recommenda‑
tion systems in Internet of Things: A systematic literature review,” Human‑Centric Computing
and Information Sciences, vol. 9, no. 1, pp. 1–61, 2019.
[54] A. M. Kowshalya and M. Valarmathi, “Trust management in the social Internet of Things,”
Wireless Personal Communications, vol. 96, no. 2, pp. 2681–2691, 2017.
[55] M. Nitti, R. Girau, and L. Atzori, “Trustworthiness management in the social Internet of
Things,” IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 5, pp. 1253–1266,
2013.
[56] A. Kurniawan and M. Kyas, “A trust model‑based Bayesian decision theory in large scale
Internet of Things,” in 2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor
Networks and Information Processing (ISSNIP), Singapore, 2015, pp. 1–5.
[57] M. Nitti, “Managing the Internet of Things based on its social structure,” 2014.
[58] W. Abdelghani, C. A. Zayani, I. Amous, and F. Sèdes, “Trust management in social Internet
of Things: A survey,” in Conference on e‑Business, e‑Services and e‑Society, Swansea, UK, 2016,
pp. 430–441.
[59] A. Meena Kowshalya and M. Valarmathi, “Trust management for reliable decision making
among social objects in the Social Internet of Things,” IET Networks, vol. 6, no. 4, pp. 75–80,
2017.
[60] H. Xiao, N. Sidhu, and B. Christianson, “Guarantor and reputation based trust model for
social Internet of Things,” in 2015 International Wireless Communications and Mobile
Computing Conference (IWCMC), 2015, pp. 600–605.
[61] R. Chen, J. Guo, and F. Bao, “Trust management for SOA‑based IoT and its application to ser‑
vice composition,” IEEE Transactions on Services Computing, vol. 9, no. 3, pp. 482–495, 2014.
[62] V. Sharma, I. You, D. N. K. Jayakody, and M. Atiquzzaman, “Cooperative trust relaying and
privacy preservation via edge‑crowdsourcing in social Internet of Things,” Future Generation
Computer Systems, vol. 92, pp. 758–776, 2019.
[63] N. B. Truong, T.‑W. Um, and G. M. Lee, “A reputation and knowledge based trust service
platform for trustworthy social Internet of Things,” in Innovations in Clouds, Internet and
Networks (ICIN), 2016, Paris, France, pp. 104–111.
[64] A. Kouicem, A. Chibani, A. Tari, Y. Amirat, and Z. Tari, “Dynamic services selection approach
for the composition of complex services in the web of objects,” in 2014 IEEE World Forum on
Internet of Things (WF‑IoT), Seoul, Korea (South), 2014, pp. 298–303.
[65] G. Chen, J. Huang, B. Cheng, and J. Chen, “A social network based approach for IoT device
management and service composition,” in 2015 IEEE World Congress on Services, New York,
NY, USA, 2015, pp. 1–8.
[66] Q. Wei and Z. Jin, “Service discovery for Internet of Things: A context‑awareness perspec‑
tive,” in Proceedings of the Fourth Asia‑Pacific Symposium on Internetware, New York, NY,
USA, 2012, pp. 1–6.
[67] H. Xia, C. Hu, F. Xiao, X. Cheng, and Z. Pan, “An efficient social‑like semantic‑aware ser‑
vice discovery mechanism for large‑scale Internet of Things,” Computer Networks, vol. 152,
pp. 210–220, 2019.
[68] R. Klauck and M. Kirsche, “Bonjour contiki: A case study of a DNS‑based discovery service
for the Internet of Things,” in International Conference on Ad‑Hoc Networks and Wireless,
Belgrade, Serbia, 2012, pp. 316–329.
[69] Z. U. Shamszaman and M. I. Ali, “Toward a smart society through semantic virtual‑object
enabled real‑time management framework in the social Internet of Things,” IEEE Internet of
Things Journal, vol. 5, no. 4, pp. 2572–2579, 2017.
Social Internet of Things (SIoT) ◾ 191
[70] T. Baker, M. Asim, H. Tawfik, B. Aldawsari, and R. Buyya, “An energy‑aware service compo‑
sition algorithm for multiple cloud‑based IoT applications,” Journal of Network and Computer
Applications, vol. 89, pp. 96–108, 2017.
[71] M. Le Pallec, M. O. Mazouz, and L. Noirie, “Physical‑interface‑based IoT service charac‑
terization,” in Proceedings of the 6th International Conference on the Internet of Things,
New York, NY, USA, 2016, pp. 63–71.
[72] H. Ma, A. Wang, and M. Zhang, “A hybrid approach using genetic programming and greedy
search for QoS‑aware web service composition,” in Abdelkader Hameurlain, Josef Küng,
Roland Wagner, Hendrik Decker, Lenka Lhotska, and Sebastian Link (eds.). Transactions on
Large‑Scale Data‑and Knowledge‑Centered Systems XVIII, Springer, Berlin, Germany , 2015,
pp. 180–205.
[73] H. Vahdat‑Nejad, Z. Mazhar‑Farimani, and A. Tavakolifar, “Social Internet of Things and
new generation computing‑A survey,” in Aboul Ella Hassanien, Roheet Bhatnagar, Nour
Eldeen M. Khalifa, and Mohamed Hamed N. Taha (eds.). Toward Social Internet of Things
(SIoT): Enabling Technologies, Architectures and Applications, Springer, Switzerland, 2020,
pp. 139–149.
[74] B. P. Rimal, E. Choi, and I. Lumb, “A taxonomy and survey of cloud computing systems,” in
2009 Fifth International Joint Conference on INC, IMS and IDC, Seoul, Korea (South), 2009,
pp. 44–51.
[75] C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward secure and dependable storage services
in cloud computing,” IEEE Transactions on Services Computing, vol. 5, no. 2, pp. 220–232, 2011.
[76] W. Yu et al., “A survey on the edge computing for the Internet of Things,” IEEE Access, vol. 6,
pp. 6900–6919, 2017.
[77] Y. Mao, C. You, J. Zhang, K. Huang, and K. B. Letaief, “A survey on mobile edge computing:
The communication perspective,” IEEE Communications Surveys & Tutorials, vol. 19, no. 4,
pp. 2322–2358, 2017.
[78] G. Ruggeri and O. Briante, “A framework for iot and e‑health systems integration based
on the social Internet of Things paradigm,” in 2017 International Symposium on Wireless
Communication Systems (ISWCS), Bologna, Italy, 2017, pp. 426–431.
[79] C. Marche, M. Nitti, and V. Pilloni, “Energy efficiency in smart building: A comfort aware
approach based on Social Internet of Things,” in 2017 Global Internet of Things Summit
(GIoTS), Geneva, Switzerland, 2017, pp. 1–6.
[80] R. Girau, E. Ferrara, M. Pintor, M. Sole, and D. Giusto, “Be right beach: A social IoT system
for sustainable tourism based on beach overcrowding avoidance,” in 2018 IEEE International
Conference on Internet of Things (iThings) and IEEE Green Computing and Communications
(GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data
(SmartData), Halifax, NS, Canada, 2018, pp. 9–14.
[81] Y. Zhang, J. Wen, and F. Mo, “The application of Internet of Things in social network,” in
2014 IEEE 38th International Computer Software and Applications Conference Workshops,
Vasteras, Sweden, 2014, pp. 223–228.
[82] D. Hussein, S. N. Han, G. M. Lee, N. Crespi, and E. Bertin, “Towards a dynamic discovery of
smart services in the social Internet of Things,” Computers & Electrical Engineering, vol. 58,
pp. 429–443, 2017.
[83] P. Garcia Lopez et al., “Edge‑centric computing: Vision and challenges,” ACM SIGCOMM
Computer Communication Review, vol. 45, no. 5, pp. 37–42, 2015.
[84] L. Atzori, A. Floris, R. Girau, M. Nitti, and G. Pau, “Towards the implementation of the social
internet of vehicles,” Computer Networks, vol. 147, pp. 132–145, 2018.
[85] H. Z. Asl, A. Iera, L. Atzori, and G. Morabito, “How often social objects meet each other?
Analysis of the properties of a social network of IoT devices based on real data,” in 2013 IEEE
Global Communications Conference (GLOBECOM), Atlanta, GA, USA, 2013, pp. 2804–2809.
192 ◾ Future Communication Systems Using AI, IoT and Data Science
[86] C. Turcu and C. Turcu, “The social internet of things and the RFID‑based robots,” in 2012
IV International Congress on Ultra Modern Telecommunications and Control Systems, St.
Petersburg, Russia, 2012, pp. 77–83.
[87] S. R. Islam, D. Kwak, M. H. Kabir, M. Hossain, and K.‑S. Kwak, “The Internet of Things for
health care: A comprehensive survey,” IEEE Access, vol. 3, pp. 678–708, 2015.
[88] V. Miori and D. Russo, “Improving life quality for the elderly through the Social Internet of
Things (SIoT),” in 2017 Global Internet of Things Summit (GIoTS), Geneva, Switzerland, 2017,
pp. 1–6.
[89] P. Hao and X. Wang, “A PHY‑aided secure IoT healthcare system with collaboration of social
networks,” in 2017 IEEE 86th Vehicular Technology Conference (VTC‑Fall), Toronto, ON,
Canada, 2017, pp. 1–6.
[90] N. Gulati and P. D. Kaur, “FriendCare‑AAL: A robust social IoT based alert generation system
for ambient assisted living,” Journal of Ambient Intelligence and Humanized Computing, vol.
13, no. 4, pp. 1735–1762, 2022.
[91] J. A. Guerrero‑Ibanez, S. Zeadally, and J. Contreras‑Castillo, “Integration challenges of
intelligent transportation systems with connected vehicle, cloud computing, and Internet of
Things technologies,” IEEE Wireless Communications, vol. 22, no. 6, pp. 122–128, 2015.
[92] M. Whaiduzzaman, M. Sookhak, A. Gani, and R. Buyya, “A survey on vehicular cloud com‑
puting,” Journal of Network and Computer Applications, vol. 40, pp. 325–344, 2014.
[93] O. Kaiwartya et al., “Internet of vehicles: Motivation, layered architecture, network model,
challenges, and future aspects,” IEEE Access, vol. 4, pp. 5356–5373, 2016.
[94] B. L. R. Stojkoska and K. V. Trivodaliev, “A review of Internet of Things for smart home:
Challenges and solutions,” Journal of Cleaner Production, vol. 140, pp. 1454–1464, 2017.
[95] P. Rashidi, D. J. Cook, L. B. Holder, and M. Schmitter‑Edgecombe, “Discovering activities
to recognize and track in a smart environment,” IEEE Transactions on Knowledge and Data
Engineering, vol. 23, no. 4, pp. 527–539, 2010.
[96] A. Floris, S. Porcu, L. Atzori, and R. Girau, “A Social IoT‑based platform for the deployment
of a smart parking solution,” Computer Networks, vol. 205, p. 108756, 2022.
[97] A. Piras, S. Mirri, M. Sole, D. Giusto, G. Pau, and R. Girau, “Implementation of a sea moni‑
toring system based on social Internet of Things,” in 2022 IEEE 19th Annual Consumer
Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 2022, pp. 687–690.
[98] Y.‑K. Chen, “Challenges and opportunities of Internet of Things,” in 17th Asia and South
Pacific Design Automation Conference, Sydney, NSW, Australia, 2012, pp. 383–388.
[99] S. Ali, M. G. Kibria, M. A. Jarwar, H. K. Lee, and I. Chong, “A model of socially connected web
objects for IoT applications,” Wireless Communications and Mobile Computing, vol. 2018, 20
pages, 2018.
[100] W. Mardini, Y. Khamayseh, M. B. Yassein, and M. H. Khatatbeh, “Mining Internet of Things
for intelligent objects using genetic algorithm,” Computers & Electrical Engineering, vol. 66,
pp. 423–434, 2018.
[101] K. Venugopal, K. Srinivasa, and L. M. Patnaik, Soft Computing for Data Mining Applications,
Springer, Berlin Heidelberg, Germany, 2009.
[102] M. Nitti, L. Atzori, and I. P. Cvijikj, “Network navigability in the social Internet of Things,”
in 2014 IEEE World Forum on Internet of Things (WF‑IoT), Seoul, Korea (South), 2014,
pp. 405–410.
Chapter 10
Ahthasham Sajid
Capital University of Science and Technology
10.1 BACKGROUND
Software‑Defined Networks (SDN) and the Internet of Things (IoT) are two cutting‑edge
technologies. SDN provides network management orchestration by isolating the control
plane from the data plane, while the Internet of Things tries to connect things through the
Internet. There are billions of linked objects, making governing and controlling these dif‑
ficult over an extensive dispersed network. SDN adds programmability and flexibility to
the IoT network without interfering with existing solutions’ underlying architecture. The
IoT will not exist without software‑defined networks. SDN virtualizes IoT networks at a
cheap cost, enabling autonomous bandwidth allocation, device reconfiguration, and traffic
rerouting to increase efficiency and simplify operations [1].
In recent years, cloud computing has been considered one of the most recent and emerg‑
ing computing systems. Cloud computing, like numerous other technologies, originated
from methodologies utilized by distributed systems and utility computing [2]. Distributed
systems enabled capabilities like scalability, parallelism, continuous availability, hetero‑
geneity, and fault isolation to fulfill the requirement of efficient and effective exploitation
of shared resources across networks. Despite this, issues such as poor resource allocation
and use across various administrative domains or organizations occurred [2]. To tackle
this problem, the concept of grid computing was proposed, with the goal of offering a
framework that solves the challenges that traditional distributed systems face in regard to
scalability, resource heterogeneity, collaboration, policy‑based management, and dynamic
DOI: 10.1201/9781032648309-13 193
194 ◾ Future Communication Systems Using AI, IoT and Data Science
provisioning [3]. Cloud computing is frequently referred to as the “successor of grid com‑
puting” [4]. Virtualization was launched about 40 years back as a result of advances in
research in collaborative computing. It refers to the process of constructing a virtual layer
on top of hardware that enables users to run numerous instances on the hardware at the
same time. Virtualization is a fundamental cloud computing technology that serves as a
foundation for major cloud services such as EC2 from Amazon [5]. Virtualization pio‑
neered the way with functions that operated as intermediaries.
10.2 INTRODUCTION
Before we begin the survey of SDN in cloud computing, we explain the fundamental his‑
tory of SDN in Section 10.2.1, the addition of SDN in cloud computing in Section 10.2.2,
the basic architecture of an SDN network in Section 10.2.3, and example applications of
SDN in cloud computing in Section 10.2.4. Section 10.3 summarized related works, while
Section 10.4 gave a survey study of them. Section 10.5 discusses this chapter conclusion
and potential future research.
separation of data and control plane, which in turn proved to have served as a stimulus
for that research. Although it solved many of the issues that the network operators were
facing at the time, ForCES along with other APIs were not widely implemented because
they placed significant limitations on the amount of functionality that a programmable
controller could provide. It did not provide a wide variety of capabilities including altering,
flooding, and discarding packets for an extensive variety of protocols (like TCP and UDP
protocols) and header field contents (like IP and MAC addresses). Further innovative tech‑
niques were however made possible by the concept of splitting the control and data planes
through an open interface [7].
Notably, the Ethane project worked on a logically centralized controller that would
maintain the global network policy that would regulate all incoming and outgoing packets
in the mid‑2000s, further investigating the control plane interface [10]. It is composed of
switches that connect to the central controller and store basic flow tables. Upon receiving
data packets, switches transmit them to the controller, which has the authority to authorize
them. The establishment of the current OpenFlow API was made possible by the accom‑
plishments of the Ethane project. OpenFlow enabled fully programmable networks and
presented a workable solution for enabling real‑world implementation, thereby addressing
the shortcomings and constraints of the previous approaches. By adding new features and
enhancing the capabilities of the switch gear already in place, it made their lives easier [7].
The idea of implementing OpenFlow in an intranet on a college campus to improve its
programming was first proposed by a group of researchers from Stanford University [11].
The study’s objective was to determine the OpenFlow protocol’s capabilities by testing it
on networks that spanned several schools as well as a single campus. Software Defined
Networking, often known as SDN, was gradually implemented in networks other than
campus networks, like a data center network, after the usefulness of OpenFlow was seen.
When network designers realized that it was less expensive to source proprietary network
software for commodity switches than to buy custom switches that required to be fre‑
quently renewed since they couldn’t run the newest capabilities offered by suppliers, SDN
reduced operating costs. SDN is the required paradigm that provides a programmable
interface through which developers can construct software that can manipulate routing
and access control features [12].
(Facebook), have adopted and invested in cloud computing due to its many benefits [14].
These companies changed from using traditional networking models to cloud computing
models by leasing services from cloud service providers.
Cloud service providers oversee various enormous data centers with a vast number of
servers connected to a network that is controlled by a multitude of switches and other
devices [15]. Although these data center networks are dispersed among several physical
locations, they are all connected to create a single cloud network. Every server makes avail‑
able processing power in response to user requests.
Since so many switches and routers are utilized in data centers, setting up and maintain‑
ing these networks may be very complicated. Furthermore, because the control logic and
data planes are grouped inside the devices, they function as separate autonomous systems
and decide on their own routes [16]. Consequently, every switch and router on the network
needs to have its configuration changed if any changes are to be made. This conventional
networking method exacerbates the already expensive network design and damages the
network as a whole.
To counteract the shortcomings of the conventional network method, cloud data center
networks began implementing Software Defined Networking (SDN). SDN makes network
administration easier by converting switches and routers into forwarding devices and
eliminating the clustering data planes and control logic. As previously said, SDN imple‑
ments a logically centralized controller that oversees all network forwarding elements,
separating the control plane from the data plane. Since the controller is software‑based, its
underlying network functions are abstracted [17]. Because SDN is flexible and allows net‑
work operators to dynamically alter network traffic, it is ideal for cloud computing. SDN
can be advantageous to a cloud computing architecture because it offers a global view of
the cloud’s data center network, dynamic workload balancing, and network security and
virtualization through its programmable interface.
returns the packets to the controller, which decides whether to discard them or create a
new match field that is specific to each packet [24].
10.2.4.1 Security
Distributed Denial of Service (DDoS) attacks are the most dangerous ones when it comes
to seriously jeopardizing the security of SDN‑enabled clouds. The network is unable to
provide regular client service due to the enormous volume of heavy traffic. A Distributed
SDN Controller was suggested as a solution to this issue. A vulnerability study was con‑
ducted to protect real‑time cloud data centers against DDoS attacks. For the purpose of this
investigation, Open Daylight (ODL) and Open Networking Operating System (ONOS),
two well‑known SDN controllers, were used in this report. DDoS assaults were launched
against the ONOS regulator and the ODL‑3 node cluster regulator using various scripts.
The ODL 3‑node cluster was shown to be superior to the ONOS regulator [25]. Similarly,
a hardware platform that speeds up packet processing in virtual switches and a security
cluster‑based SDN controller that monitors and controls cloud networks were built and put
into place while testing the resilience and security of an SDN‑enabled cloud. It was found
that the SDN controller cluster enhanced network strength in the event of an assault, even
in the face of extremely unusual network traffic. Switches with hardware acceleration per‑
form well and fit in well with cloud systems. The highly accessible and secure SDN‑enabled
cloud computing approach utilized in the integration of Open Stack and Open Daylight
was first presented in this research study [26].
Moreover, work on a DistB‑SDCloud architecture was done to improve the security
of IOT apps that are cloud‑enabled. They suggested a BlockChain (BC) architecture to
preserve and enable network security, integrity, privacy, and confidentiality. By combin‑
ing SDN with BC, they came to the conclusion that response times, throughput, and CPU
utilization measures are secure even in the face of network attacks [23].
10.2.4.2 Virtualization
Blue Bird proposed a sophisticated network virtualization technique with excellent per‑
formance for a minimally functional cloud service on Azure. In order to prevent severe
performance loss as a result of increased demand or scaling up, Bluebird uses a few
well‑established specialized principles in the control plane, guaranteeing that the network
stays resilient and fault‑tolerant. By incorporating route caching techniques, generalizing
and abstracting network interface devices, and severing the centralized controller’s func‑
tions from the agents embedded in switches, these objectives are satisfied. The network
design can now be more flexible, scalable, and fault‑tolerant thanks to this decoupling. By
observing data plane traffic, the research paper’s authors demonstrated how route caching
can reduce network latency [27].
The Role of Software Defined Internet of Things (SDIoT) ◾ 199
A complete and in‑depth analysis of SDN usage studies for cloud computing was carried
out by Jungmin Son and Rajkumar Buyya. The main foci of their analysis were network
virtualization and security, data center energy efficiency, and network optimization for
packet handling procedures. Furthermore, the QoS management techniques of an SDN
network were outlined and expanded upon based on several research instruments for
optimizing energy consumption, modeling, and utilization maximization. Their analysis,
however, lacked the literature necessary to close the knowledge gap between the state of the
art and cloud‑optimized data centers, as well as their eventual autonomy [15].
Similarly, the control, infrastructure, and application layers are the three separate lev‑
els that Shiva Rowshanra et al. used to characterize the SDN architecture. Lastly, SDN
research trends and applications were unveiled, including virtual data centers and mobile
and wireless networks [17].
Additionally, Siamak Azodolmlky et al. discussed interconnection issues and net‑
work issues inIaaS, which are presently being resolved by current technology. This article
focused on virtual networking and cloud interconnection to illustrate the architecture of
Infrastructure as a Service (IaaS) and its increasing limitations. A collection of an SDN
architecture’s Application Programming Interfaces (APIs) was highlighted in order to
illustrate how ordinary network functions might be made simpler. An SDN‑based federa‑
tion that makes it easier for customers and service providers to choose a good cloud data
center for their needs was covered in the article. However, the scalability of this kind of
network was not investigated [29].
Similar to this, Nick Feamster et al. covered the history and development of program‑
mable networks, including active networks, control and data planes, and recent technolog‑
ical advancements that opened the door for SDN development, but they also covered all the
pertinent information regarding the ideas that were put forth at the time and the workable
solutions that made them a reality. The authors outlined a precise path that led from ear‑
lier iterations of network architectures to the creation of SDN. However, since some of the
features and functions in OpenFlow are outdated and need to be improved, the limitations
of the protocols were also covered, including the need to transparently examine problems
before using them in SDN applications [7].
The evolution of SDN and contemporary logically centralized SDN controller technolo‑
gies, like Generalized Multi‑Protocol Label Switching (GMPLS), were the subject of Arturo
Mayoral et al.’s study. GPLS necessitates coordination between multiple supervised and
regulated networks in order to offer third‑party vendors highly manageable and open con‑
nectivity solutions. To determine the possible benefits and drawbacks of the two designs,
they specifically contrasted the Application‑Based Network Operations (ABNO) architec‑
ture with a single SDN controller orchestration method. The problem of network coordina‑
tion in multi‑domain networks was thoroughly examined in this study [30], which covered
a wide range of technologies in the transport and control planes.
aspect: managing big datasets and capable of building extended models to successfully
solve the overfitting issue:
REFERENCES
[1] Y. İnağ, M. Demirci, and S. Özemir, “Implementation of an SDN based IoT network model
for efficient transmission of sensor data,” 2019 4th International Conference on Computer
Science and Engineering (UBMK), Samsun, Turkey, 2019, pp. 682–687, doi:10.1109/
UBMK.2019.8907119.
[2] R. P. Padhy and M. R. Patra, “Evolution of cloud computing and enabling technologies,”
International Journal of Cloud Computing and Services Science (IJ‑CLOSER), vol. 1, no. 4,
pp. 183–191, 2012.
[3] J. Joseph, M. Ernest, and C. Fellenstein, “Evolution of grid computing architecture and grid
adoption models,” IBM Systems Journal, vol. 43, no. 4, pp. 624–645, 2004.
[4] R. Kaur and A. Kaur, “A review paper on evolution of cloud computing, its approaches and
comparison with grid computing,” p. 6062, Accessed: July 06, 2023. [Online]. https://citese‑
erx.ist.psu.edu/document?repid=rep1&type=pdf&doi=7d94150feaeeddd1cba7f1bd8ca92a50f
c0efb3c
[5] Y. Xing and Y. Zhan, “Virtualization and cloud computing,” In: Zhang, Y. (eds) Future
Wireless Networks and Information Systems. Lecture Notes in Electrical Engineering, vol 143.
Springer, Berlin, Heidelberg, p. 306, 2012.
[6] K. Calvert, “Reflections on network architecture,” Computer Communication Review, vol. 36,
no. 2, p. 27, 2006.
[7] N. Feamster, J. Rexford, and E. Zegura, “The road to SDN,” ACM SIGCOMM Computer
Communication Review, vol. 44, no. 2, pp. 2–4, 2014.
[8] J. M. Smith, K. L. Calvert, S. L. Murphy, H. K. Orman, and L. L. Peterson, “Activating net‑
works: A progress report,” Computer, vol. 32, no. 4, pp. 32–41, 1999.
[9] L. Yang, R. Dantu, T. J. Anderson, and R. Gopal, “Forwarding and control element separation
(ForCES) framework,” 2004. https://www.rfc‑editor.org/rfc/rfc3746.html
[10] M. Casado, M. Freedman, J. Pettit, J. Luo, N. Mckeown, and S. Shenker, “Ethane: Taking
control of the enterprise,” ACM SIGCOMM computer communication review, 37(4), pp. 1–12,
2023.
[11] N. McKeown et al., “OpenFlow,” ACM SIGCOMM Computer Communication Review, vol. 38,
no. 2, p. 70, 2008.
[12] T. Koponen et al., “Onix: A distributed control platform for large‑scale production networks,”
In 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10),
Vancouver, BC, Canada, pp. 351–364, 2010.
[13] M. Malathi, “Cloud computing concepts,” 2011 3rd International Conference on Electronics
Computer Technology, Kanyakumari, India, 2011, pp. 236–239.
[14] L. Golightly, V. Chang, Q. A. Xu, X. Gao, and B. S. Liu, “Adoption of cloud computing as
innovation in the organization,” International Journal of Engineering Business Management,
vol. 14, p. 18479790221093992, 2022.
204 ◾ Future Communication Systems Using AI, IoT and Data Science
[15] J. Son and R. Buyya, “A taxonomy of software‑defined networking (SDN)‑enabled cloud com‑
puting,” ACM Computing Surveys, vol. 51, no. 3, pp. 59.2–69.4, 2018.
[16] T. Zhang, “Distributed controllers in software defined networks”, pp. 5–6, 2014.
[17] S. Rowshanrad, S. Namvarasl, V. Abdi, M. Hajizadeh, and M. Keshtgary, “A survey on SDN,
the future of networking,” Journal of Advanced Computer Science & Technology, vol. 3, no. 2,
p. 232, 2014.
[18] M. Banikazemi, D. Olshefski, A. Shaikh, J. Tracey, and G. Wang, “Meridian: an SDN plat‑
form for cloud network services,” IEEE Communications Magazine, vol. 51, no. 2, pp. 120–127,
2013.
[19] Y.‑H. Chu, Y.‑T. Chen, Y.‑C. Chou, and M.‑C. Tseng, “A simplified cloud computing net‑
work architecture using future internet technologies,” International Journal of Networks and
Communications, vol. 2, no. 5, pp. 105–111, 2012.
[20] D. Erickson, “The beacon openflow controller,” Proceedings of the Second ACM SIGCOMM
Workshop on Hot Topics in Software Defined Networking (HotSDN ’13). Association for
Computing Machinery, New York, pp. 13–18, 2013.
[21] OpenDayLight, 2013. [Online]. Available: https://www.opendaylight.org/.
[22] “Floodlight,” 2012. Available: https://floodlight.openflowhub.org.
[23] A. Rahman, M. J. Islam, S. S. Band, G. Muhammad, K. Hasan, and P. Tiwari, “Towards a
blockchain‑SDN‑based secure architecture for cloud computing in smart industrial IoT,”
Digital Communications and Networks, vol. 9, no. 2, pp. 411–421, 2022.
[24] K. Govindarajan, K. C. Meng and H. Ong, “A literature review on Software‑Defined
Networking (SDN) research topics, challenges and solutions,” 2013 Fifth International
Conference on Advanced Computing (ICoAC), Chennai, 2013, pp. 293–299.
[25] S. Badotra et al., “A DDoS vulnerability analysis system against distributed SDN controllers
in a cloud computing environment,” Electronics, vol. 11, no. 19, p. 3120, 2022.
[26] L. T. Le and T. N. Thinh, “Enhancing security and robustness for SDN‑EnabledCloud net‑
works,” REV Journal on Electronics and Communications, vol. 12, no. 1–2, p. 8, 2021.
[27] M. Arumugam, D. Bansal, N. Bhatia, and J. Boerner, “Bluebird: High‑performance SDN for
bare‑metal cloud services,” USENIX, pp. 2–10, 2022.
[28] S.K. Tayyaba et al., “Software defined network (SDN) based internet of things (IOT),”
Proceedings of the International Conference on Future Networks and Distributed Systems
[Preprint], Cambridge, United Kingdom, 2017. doi:10.1145/3102304.3102319.
[29] S. Azodolmolky, P. Wieder, and R. Yahyapour, “Cloud computing networking: Challenges
and opportunities for innovations,” IEEE Communications Magazine, vol. 51, no. 7, pp. 54–62,
2013.
[30] A. Mayoral, R. Vilalta, R. Muñoz, R. Casellas, and R. Martínez, “SDN orchestration archi‑
tectures and their integration with cloud computing applications,” Optical Switching and
Networking, vol. 26, pp. 2–13, 2017.
Chapter 11
Mariya Ouaissa
Cadi Ayyad University
Mariyam Ouaissa
Chouaib Doukkali University
Zakaria Boulouard
Hassan II University
Sarah El Himer
Sidi Mohamed Ben Abdellah University
11.1 INTRODUCTION
Recently, Internet of Vehicles (IoV) occupies an important place in research fields. This
research is linked with the development of the automotive industry and wireless com-
munication technologies. Nowadays, the use of vehicles is increasing rapidly, and this can
lead to road blockages. Consequently, the problem of traffic congestion intervenes and cre-
ates an imbalance in the flow of traffic, especially when vehicles circulate in specific areas
during peak hours. At that time, the number of cars exceeds the maximum capacity of
the roads. To avoid traffic congestion, researchers have developed connected vehicles to
improve the action plans present in the automotive industry, and they also improve travel
by choosing the most optimal routes. Several researches on data processing and security
have been made in order to choose the best decisions to improve traffic in urban areas. The
use of the IoV has made it possible to control contact between vehicles and with the outside
world; thus, it plays an important role when collecting and processing data in an environ‑
ment. Quality of Service (QoS) is mandatory in the design of connected vehicles [1,2].
This chapter is organized into the following sections. In Section 11.2, we present
an overview of IoV. Section 11.3 presents the challenges faced by connected vehicles.
Section 11.4 discusses IoV routing protocols. Section 11.5 illustrates the design of some
architectures that guarantee security and reliability during a communication exchange.
In Section 11.6, we describe the performance of using RPL under IoV system. We con‑
clude in Section 11.7.
responsible for the management of the applications, the management of the final data, and
their security during the communication (Figure 11.1).
In recent years, the IoV platform improves transport and safety, reduces fuel use, and
also reduces the number of accidents on the road. Several researches are in progress, so
that this system is universal and it is integrated between hardware technologies and soft‑
ware applications.
network topology. However, this high mobility often leads to loss of connection between
nodes [6] (Figure 11.2).
Hybrid protocols are considered as a new innovation and discovery made by research‑
ers. This type of protocol is analyzed in detail in Ref. [9]. This approach focuses on network
design architecture more than performance analysis and improvement (Figure 11.3).
use of several certified public keys instead of a single key. In Ref. [21], the author illustrates
a security method that requires nodes to provide secure sender authentication even if the
number of vehicles is large and the human factor exists in the environment. This study
emphasizes obtaining node authentication trust.
RPL is suitable for dynamic network topology. And since IoV have high mobility, they
suffer from frequent link disconnections. Also, the network density is high. These char‑
acteristics make data communication very difficult in the IoV. IoV communication is
vehicle‑to‑vehicle (V2V) or vehicle‑to‑infrastructure (V2I). For this, we must find an effec‑
tive way to make communication reliable by ensuring security, confidentiality, and data
storage.
The reason the RPL protocol is the best to use for IoV is that its design is easy to modify
to match the rate at which the parent node is updated. The RPL protocol is characterized
by a better response time compared to other existing protocols. It is also characterized by
high road availability. Another advantage of the RPL protocol is that it only requires the
local information of the neighboring nodes to exchange the information, it does not take
into account the global information on the network topology. So, the RPL protocol is the
most suitable protocol for large‑scale networks such as IoV.
11.7 CONCLUSION
This chapter presents a set of problems suffered by the Internet of Vehicles; thus, some
research challenges are presented in relation to the security and confidentiality of vehicu‑
lar communication. Also, it presents the architecture and routing protocols used to ensure
communication between IoV. Several approaches carried out at the IoV level are cited in
order to improve the security of communication exchanges. In addition, when it comes to
data reporting, IoV presents several challenges. This is because this technology is charac‑
terized by several constraints such as high mobility, high network density, dynamic topol‑
ogy, and frequent disconnections of links. The advantage of the RPL protocol is that it is
suitably modifiable so that it can work in a vehicular network. After some studies, it is clear
that the RPL protocol provides better packet forwarding in vehicular networks.
REFERENCES
[1] S. R. Boualam, M. Ouaissa, M. Ouaissa, and A. Ezzouhairi, “Internet of connected vehicles:
Challenges and opportunities,” AIP Conference Proceedings, vol. 2814, no.1, pp. 1–6, 2023.
[2] M. Ouaissa, M. Ouaissa, M. Houmer, S. El Hamdani, and Z. Boulouard, “A secure vehicle to
everything (V2X) communication model for intelligent transportation system,” In Mariya
Ouaissa, Zakaria Boulouard, Mariyam Ouaissa, and Bassma Guermah (eds.). Computational
Intelligence in Recent Communication Networks, Cham: Springer International Publishing,
2022, pp. 83–102.
[3] N. Liu, “Internet of vehicles: Your next connection,” Huawei WinWin, vol. 11, pp. 23–28, 2011.
[4] K. Golestan et al., “Situation awareness within the context of connected cars: A comprehen‑
sive review and recent trends,” Information Fusion, vol. 29, pp. 68–83, 2016.
[5] M. D. Felice, I. V. Calcagni, F. Pesci, F. Cuomo and A. Baiocchi, “Self‑healing infotainment
and safety application for VANET dissemination,” In IEEE ICC, London, UK, 2015.
[6] S. Zeadally, R. Hunt, Y.‑S. Chen, A. Irwin, and A. Hassan, “Vehicular ad hoc networks
(VANETS): Status, results, and challenges,” Telecommunication Systems, vol. 50, no. 4,
pp. 217–241, 2012.
[7] W. Liang, Z. Li, H. Zhang, S. Wang, and R. Bie, “Vehicular ad hoc networks: Architectures,
research issues, methodologies, challenges, and trends,” International Journal of Distributed
Sensor Networks, vol. 5, p. 745303, 2015.
212 ◾ Future Communication Systems Using AI, IoT and Data Science
[8] M. S. Talib, B. Hussin, and A. Hassan, “Converging VANET with vehicular cloud networks
to reduce the traffic congestions: A review,” International Journal of Applied Engineering
Research, vol. 12, no. 21, pp. 10646–10654, 2017.
[9] V. Nundloll, G. S. Blair, and P. Grace, “A component‑based approach for (re)‑configurable rout‑
ing in VANETs,” In Proceedings of the 8th International Workshop on Adaptive and Reflective
Middleware, Urbana Champaign, Illinois, December 2009.
[10] S. ur Rehman, “Vehicular ad‑hoc networks (VANETs) – An overview and challenges,” Journal
of Wireless Networking and Communications, vol. 3, no. 3, pp. 29–38, 2013.
[11] F. Dotzer, “Privacy issues in vehicular ad hoc networks,” In Proceedings of the 5th International
Workshop on Privacy Enhancing Technologies (PET ’05), Cavtat, Croatia, 2005, pp. 197–209.
[12] J. M. de Fuentes, A. I. Gonzlez‑Tablas, and A. Ribagorda, Overview of Security Issues in
Vehicular Ad‑Hoc Networks, In: Handbook of research on mobility and computing: Evolving
technologies and ubiquitous impacts. IGI global, pp. 894–911, 2011.
[13] F. Kargl, L. Buttyan, D. Eckhoff, P. Papadimitratos, and E. Schoch, Working Group on Security
and Privacy, Karlsruhe Institute of Technology, Karlsruhe, Germany, 2011.
[14] M. Gerlach, A. Festag, T. Leinmller, G. Goldacker, and C. Harsch, “Security architecture for
vehicular communication,” In Proceedings of the 5th International Workshop on Intelligent
Transportation (WIT ’07), Hamburg, Germany, 2007.
[15] P. Papadimitratos, L. Buttyan, T. Holczer et al., “Secure vehicular communication systems:
Design and architecture,” IEEE Communications Magazine, vol. 46, no. 11, pp. 100–109, 2008.
[16] M. Raya and J.‑P. Hubaux, “Securing vehicular ad hoc networks,” Journal of Computer
Security, vol. 15, no. 1, pp. 39–68, 2007.
[17] M. Raya and J.‑P. Hubaux, “The security of vehicular ad hoc networks,” In Proceedings of the
3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN ’05), Alexandria VA,
USA, November 2005, pp. 11–21.
[18] N. W. Wang, Y. M. Huang, and W. M. Chen, “A novel secure communication scheme in vehic‑
ular ad hoc networks,” Journal Computer Communications, vol. 31, no. 12, pp. 2827–2837,
2008.
[19] G. Samara, W. A. H. Al‑Salihy, and R. Sures, “Security issues and challenges of vehicular ad
hoc networks (VANET),” In Proceedings of the 4th International Conference on New Trends in
Information Science and Service Science (NISS ’10), Gyeongju‑si, Republic of Korea, May 2010,
pp. 393–398.
[20] G. Calandriello, P. Papadimitratos, J.‑P. Hubaux, and A. Lioy, “Efficient and robust pseudony‑
mous authentication in VANET,” In Proceedings of the Fourth ACM International Workshop
on Vehicular Ad Hoc Networks ‑ VANET ’07, Montreal Quebec, Canada, 2007, p. 19.
[21] S. Zeadally, R. Hunt, Y. S. Chen, A. Irwin, and A. Hassan, “Vehicular ad hoc networks
(VANETS): Status, results, and challenges,” Telecommunication Systems, vol. 50, pp. 217–241,
2010.
[22] T. Winter, “RPL: Ipv6 routing protocol for low‑power and lossy networks,” No. rfc6550. 2012.
https://www.rfc‑editor.org/rfc/rfc6550.html
[23] C. Cobarzan, J. Montavont, and T. Noel, “Analysis and performance evaluation of rpl under
mobility,” In 2014 IEEE Symposium on Computers and Communication (ISCC), 2014, Funchal,
Portugal, pp. 1–6. IEEE.
Chapter 12
Edge Computing in
the Digital Era
The Nexus of 5G, IoT and a
Seamless Digital Future
Inam Ullah
Gachon University
Yuning Tao
South China University of Technology
Ijaz Khan
Harbin Institute of Technology
Habib Khan
Islamia College University
Muhammad Shafiq
Guangzhou University
12.1 INTRODUCTION
The evolution of wireless communication has profoundly impacted various aspects
of human life [1]. In the early days of commercial mobile services in the 1980s, mobile
devices were primarily used for voice communication, with data transfer rates capped at
2.4 kbps. Since then, the wireless telecommunications sector has made significant strides
in speed, latency, security, and mobility. Present considerations are centered on improving
data transmission speeds beyond the one terabits per second (Tbps) mark, with the fifth
generation (5G) rollout already in motion and the sixth generation (6G) in its developmen‑
tal phase. High data rates and superior mobility are expected to drive novel applications,
including the tactile internet, fully autonomous vehicles, and holographic communication.
Figure 12.1 shows the evolutionary journey of wireless technology from its first generation
(1G) to the upcoming 6G, highlighting each generation’s defining attributes, data rates,
latency, and mobility specifics.
Edge computing, or Mobile Edge Computing or Multi‑Access Edge Computing in
telecommunications, provides computational and storage resources closer to end users.
Edge computing can be found in various settings, including manufacturing hubs, homes,
transportation systems, and personal vehicles. Service providers, including telecommuni‑
cation entities, are in charge of the edge infrastructure. Diverse use cases necessitate the
deployment of various applications across numerous locations. A distributed cloud, recog‑
nized for hosting applications across several sites under a unified operational framework,
is particularly effective in such instances. The merits of edge technology comprise reduced
latency, higher bandwidth, advanced device processing, efficient data offloading, and reli‑
able computing and storage. Edge computing [3] is a unique computational paradigm
facilitating seamless applications between the device and the extensive cloud. It notably
reduces latency by shifting processing closer to users, apparatus, or data sources. Telecom
edge computing refers to decentralizing data processing beyond the network edge. It also
extends to the user edge, regulated by the telecommunication operator. Users can substan‑
tially reduce backhaul traffic costs and volume by deploying low‑latency applications and
employing near‑source data processing or caching. On‑premise edge computing leverages
computing assets on a client’s site, typically under a network operator’s supervision. It is
tailored to support applications and services. These processes develop within a distrib‑
uted edge architecture in virtualized environments, especially concerning cloud‑based
Edge Computing in the Digital Era ◾ 215
activities. Employing on‑premise edge computing ensures the retention of sensitive infor‑
mation within local infrastructure while capitalizing on the edge cloud’s adaptive prowess.
The edge cloud concept blends the advantages of edge computing, a virtualized infra‑
structure, and commercial models. It integrates the perks of cloud computing with on‑site
servers, bestowing improved adaptability and scalability to efficiently cater to unexpected
workload surges due to increased user activity. A private cloud is a model exclusive to select
users via a private network. While it offers similar benefits to a public cloud, including scal‑
ability and flexibility, it provides enhanced security and data privacy through on‑site cloud
technologies. The network edge signifies the juncture where networks owned by enter‑
prises intersect with external ones. As shown in Figure 12.2, the edge is the transitional
zone between the end device and the wider internet or cloud. In this context, telco edge
computing can be seen as a subset. Many locations exist to deploy telecom edge computing
within public and private network sectors; cellular towers have more extensive coverage
closer to end users than street cabinets. Low‑latency communication systems can be vital
for autonomous vehicles, allowing real‑time reactions based on immediate surroundings
and distant occurrences.
Telco Edge represents the combined benefits of local computing, such as on‑site infra‑
structure and cloud computing. By employing edge computing, clients can efficiently
reduce backhaul traffic costs and volume through the efficient execution of low‑latency
applications and data processing or caching closer to its origin. Moreover, it’s crucial for
telco edge computing to match the flexibility and scalability of traditional cloud comput‑
ing. Telco edge computing can propel rapid organizational expansion by accommodating
sudden workload surges due to unanticipated spikes in end‑user traffic. This adaptabil‑
ity, especially in mobile applications, mandates the dynamic allocation and adjustment of
computational resources across different telecom edge sites.
Edge computing, a relatively nascent domain in computing, brings cloud services and
utilities closer to users. It stands out for its swift data processing and application response
capabilities. Applications like surveillance, virtual reality, and real‑time traffic monitor‑
ing, which demand speedy processing and response times, often operate on mobile devices
with constrained resources [4,5]. The primary service and processing duties are executed
on cloud servers. As depicted in Figure 12.3, mobile devices face significant challenges in
latency and mobility when leveraging cloud services [6].
Edge computing provides to application demands by shifting processing capabilities
closer to the network’s periphery [7]. Within edge computing, three primary approaches
have been highlighted as alternatives to tackle the challenges associated with traditional
cloud computing: Cloudlets [8], Fog Computing [9], and Mobile Edge Computing [10].
Mobile Edge Computing, an initiative by the European Telecommunications Standards
Institute (ETSI), offers computing services at base stations (BS), thereby enhancing acces‑
sibility for mobile users. Fog Computing, a concept promoted by Cisco, allows applications
to operate right at the network edge through a host of smart connected devices. Cloudlets,
introduced by Satya Narayanan et al., answered latency concerns associated with cloud
access. They leveraged local computing resources to alleviate these latency issues.
Figure 12.4 illustrates that Edge computing boasts mobility support, location awareness,
ultra‑low latency, and user proximity. These features make it ideal for applications ranging
from industrial automation to smart maritime monitoring. Devices like routers, access
points, and BS function as intermediaries, bridging the gap between intelligent mobile
devices and the cloud [11].
FIGURE 12.5 Graphically represents the major distinctions between edge and cloud computing.
See [21].
attacks. Despite their myriad benefits, edge computing does face scalability limitations due
to its hardware constraints.
Fog Computing: Introduced by Cisco in 2012, this model decentralizes cloud computing
infrastructure, transferring nodes closer to the network’s periphery, thereby better manag‑
ing applications and addressing high‑speed internet demands [22]. It lessens the network
load, alleviates traffic delays, and simplifies network and device management. One can dis‑
cern a difference between fog computing and MEC. At the same time, the former involves
resource relocation from the central cloud to the network’s edge; MEC implements fog
computing with computational resources moved closest to the network’s edge, usually at
BS [23].
Moisture Computing: An innovative distributed computing paradigm introduced
around 2021, moisture computing marries the advantages of cloud and mobile edge com‑
puting [24]. It positions its processing and storage infrastructure closer to the end user,
offering a middle ground between MEC and traditional cloud computing. Table 12.1 sum‑
marizes the distributed computing paradigms.
computer paradigm composed of dispersed heterogeneous devices that interface with the
network and execute computing functions, including storage and processing [25].
These responsibilities may also contribute to the delivery of lease‑based services, in
which a user leases a device in exchange for incentives. According to Cisco, fog computing
is an extension of cloud computing that transfers resources and services to the periphery
network. The edge network is a virtualized platform with storage, computation, and net‑
working capabilities. Cloudlet and mobile edge computing [12] are concepts comparable
to the Fog computing paradigm. The purpose of cloudlet and mobile edge computing is to
provide services to mobile users while enabling them to utilize locally accessible resources.
In contrast, fog relies on Cisco‑designed equipment with computational, router, and switch
capabilities.
12.5.4 Proximity
Edge computing involves the relocation of processing resources and services in closer
proximity to end users, hence enhancing their overall user experience. Users can employ
network context information to make offloading and service consumption decisions. These
decisions are dependent on the presence of computing resources and services within their
local vicinity. Similarly, the service provider can leverage the knowledge of mobile users
to enhance their services and optimize resource allocation. It can be achieved through the
extraction of device‑specific data and the evaluation of user behavior.
12.5.6 Context‑Awareness
Context awareness is a characteristic shown by mobile devices, which can be defined in
conjunction with location awareness. Using context information from the mobile device
can inform decision‑making regarding offloading choices and accessing edge services in
edge computing [29]. Context‑aware services can be delivered to users at the edge by lever‑
aging real‑time network data, including information on network load and user location.
In addition, the service provider can utilize contextual information to enhance customer
satisfaction and improve the overall quality of the customer experience.
Edge Computing in the Digital Era ◾ 221
12.5.7 Heterogeneity
Edge computing systems utilize many platforms, topologies, infrastructures, processing
mechanisms, and communication technologies, together known as heterogeneity. This
heterogeneity encompasses a range of components such as end devices, edge servers, and
networks. Several primary factors contribute to heterogeneity in end devices, namely
software, hardware, and technical variations. Various factors, including the utilization
of APIs, the implementation of custom‑built rules, and the deployment of different plat‑
forms, influence the heterogeneity of edge servers. These variations give rise to obstacles in
achieving interoperability, posing a significant undertaking in successfully deploying edge
computing. The concept of “network heterogeneity” pertains to the diverse array of com‑
munication technologies that impact the provision of edge services.
edge computing concepts, whereby computational tasks were shifted toward the network’s
periphery. MEC has led to the development of various technologies, including fog comput‑
ing, cloudlet computing, and mobile cloud computing. Nevertheless, each approach has its
distinct limitations. For instance, fog computing depends on cloud computing data centers
and cannot function autonomously with its own managed data center. The integration of
this system into the mobile network is limited, and it frequently works independently [32].
In contrast, the telecoms industry exhibited a significant interest in MEC. The MEC‑ISG
initiative was introduced by the ETSI in 2014 to promote the concept of mobile edge com‑
puting. The authors wanted to integrate MEC into the CRAN architecture [33]. The ter‑
minology of mobile edge computing was altered to multi‑access edge computing, a term
that specifically pertains to the C‑RAN 5G architecture. The objective of this Mobile Edge
Computing Industry Specification Group (MEC ISG) was to establish a standardized
framework for mobile edge computing in the context of 5G technology. The focus of their
efforts was directed towards enhancing network optimization and user service efficiency
by bringing computer capabilities in closer proximity to the end user [34]. The intricacy of
the framework is depicted in Figure 12.6, which provides a visual depiction that clarifies
the numerous interactions among different components within the MEC ecosystem. This
diagram offers a comprehensive visual understanding of the functional structure of the
framework. The mobile edge host level, a crucial component of the MEC infrastructure,
encompasses the mobile edge host and its related management systems. These systems are
responsible for providing the necessary virtualized architecture and platform required
for mobile edge applications. The network level complements the core by facilitating con‑
nectivity across various networks, including 3GPP mobile networks and the Internet. The
structure, overseen by the mobile edge system level management, is designed to abstract
the complexities of lower‑level operations. This abstraction enhances user and third‑party
access, optimizing interactions within the MEC framework.
Several industry initiatives have been implemented to establish standardization for
MEC and its associated technologies in the context of 5G. One such project is the Open Fog
Consortium, established in 2015 to develop a unified open framework for distributed com‑
puting. Furthermore, the development of 5G MEC has led to setting 3GPP standards [36].
and 5G technologies, emphasizing the necessity for ongoing innovation and resolution of
issues during this integration procedure. The research discussed in citation [45] examined
the relationship between MEC, 5G, and the Internet of Things (IoT), shedding light on
the crucial technologies that facilitate the efficient utilization of MEC within this inter‑
connected framework. The topics covered in this study encompass an examination of
cloud computing, SDN/NFV, virtual machines (VMs), and intelligent devices, all of which
have the potential to benefit from the implementation of MEC. In summary, the authors
presented a comprehensive assessment of the role of MEC in the context of the 5G and
Internet of Things (IoT) frameworks. They delved into several approaches for integrating
MEC into these paradigms while highlighting the ongoing obstacles and unresolved mat‑
ters that define the convergence of MEC, 5G, and IoT.
FIGURE 12.7 The mobile edge cloud computing (MECC) architecture. See [48].
region, or domain while adhering to local security limitations [48]. It is achieved by lever‑
aging public or private cloud resources and local computing capabilities. Edge computing
refers to the practice of doing data processing close to the network’s edge. The architecture
of edge computing is characterized by its distributed nature and adherence to an open
information technology framework. The scope of the system encompasses a wide range of
components, spanning from end users through the edge, core, and cloud [49–52].
efficient traffic management during peak hours, and timely provision of emergency ser‑
vices. Cities can undergo transformations that result in enhanced cleanliness and environ‑
mental sustainability.
Smart cities can be categorized into three distinct layers or tiers. At a fundamental level,
it is possible to analyze the many technological devices employed for data collection that
are readily accessible. Mobile phones and sensors exemplify these technological devices.
Generally, these devices are connected to a highly efficient communication network, such
as the 5G network. All programs on these devices can be categorized at the second level.
In machine‑to‑machine (M2M) communication, these applications facilitate data trans‑
formation into meaningful information for end users or other interconnected devices. At
this stage, the stakeholders involved in the application development and the companies
responsible for providing the necessary technology are identified. The third level of analysis
focuses on consumers’ actual utilization of the programs. Individuals and inhabitants are
unlikely to avail themselves of services unless they are deemed advantageous and feasible.
The issue of privacy and security breaches represents a significant concern within the
context of smart cities. The enhancement of urban security can be achieved by implement‑
ing various intelligent devices, such as digital cameras, intelligent transportation systems,
and people monitoring systems designed to ensure the safety of citizens. Nevertheless, it is
important to acknowledge that all of these methods possess the capacity to infringe upon
individuals’ privacy. Consequently, achieving a harmonious equilibrium between these
two constituent elements is imperative. Numerous research endeavors are underway to
support attaining diverse objectives associated with smart city initiatives. In reference [43],
the authors aim to enhance the user experience of video streaming applications within
the context of smart cities. They proposed the utilization of MEC technology as a means
to improve the quality of service delivery. The main focus areas revolved around mobil‑
ity, latency, and network congestion. Establishing a MEC service is recommended to offer
users expedited accessibility. Nevertheless, the writers do not address using 5G technology
to accomplish their goals.
Likewise, the authors of reference [53] provided an analysis and discourse on the devel‑
opment and functionality of 5G technology. This article examined the security ramifica‑
tions of 5G technology and its impact on existing technologies such as the IoT, autonomous
vehicles, and artificial intelligence (AI). Once the challenges of implementing the 5G net‑
work are effectively addressed, it can serve as a fundamental framework for integrating
intelligent urban applications encompassing several domains, including transportation,
public services, healthcare, and infrastructure. The scholarly article [54] examined the
impact and ramifications of 5G technology on Intelligent Transportation Systems (ITS),
among the several applications within smart cities. The article discussed the technological
dimensions of the economic benefits and sectors that might be influenced by smart cities,
including but not limited to public transit, manufacturing, health care, and energy. In
many urban centers across the globe, many endeavors have been initiated and continue to
be in progress. The provided data presents a compilation of several smart cities across the
world. Based on the rankings provided by Forbes, the ten leading smart cities globally are
London, New York, Paris, Tokyo, Reykjavik, Copenhagen, Berlin, Amsterdam, Singapore,
Edge Computing in the Digital Era ◾ 227
and Hong Kong, arranged in ascending order from one to ten. Based on the findings of
Cities in Motion, the United States’ top ten smart cities are ranked as follows: New York,
Los Angeles, Chicago, San Francisco, Washington, Boston, Miami, Phoenix, Dallas, and
San Diego, respectively, in descending order from first to tenth. Based on a report from the
computer world, the United Kingdom’s leading smart cities are ranked as follows: Milton
Keynes, Glasgow, Nottingham, Cambridge, Bristol, London, Manchester, Birmingham,
and Leeds, in ascending order from first to tenth place.
Using wireless sensor networks [55], digital networks, and apps contributes to advancing
technology in smart cities by integrating the IoT and facilitating the Internet of Vehicles
(IoV). The objective of converting a city into an intelligent environment is to address the
challenges posed by urbanization and population expansion. A smart city is an urban area
that effectively attains sustainable economic development while upholding a superior qual‑
ity of life. Several technologies have been identified as potential contributors to sustainable
urbanization. These include intelligent solutions to mitigate transportation congestion,
implementing environmentally friendly structures, and utilizing advanced industrial
control systems (ICS). A smart city encompasses the strategic utilization of technology
to optimize various aspects of human life, including living conditions, work environ‑
ments, commuting systems, and information exchange. Next‑generation autos, integral to
the broader concept of the IoT and include advanced sensing, communication, and social
functionalities, represent a significant component of smart cities [56–61]. Vehicles have
the potential to contribute to the realization of smart cities through their capacity to pro‑
vide mobile wireless sensing and communication capabilities. Intelligent automobiles will
establish communication links with navigation, broadcast satellites, passenger cell phones,
roadside gadgets, and other intelligent vehicles. This integration positions them as a pivotal
element within the IoT framework and the advancement of smart city infrastructure [62].
glasses to edge servers, the hardware can potentially be made more compact and
user‑friendly.
• Tactile Internet: This innovation heralds a new chapter in the Internet of Things. The
tactile internet enables the instantaneous transmission of control signals and tangible
sensations over vast distances. It promises an exceptionally responsive and stable net‑
work connectivity, expanding IoT capabilities.
• URLLC (Ultra Reliable Low Latency Communications): Ensuring robust reliabil‑
ity, especially in Machine‑to‑Machine (M2M) communication, URLLC focuses on
transmitting short data packets with minimal delay. It ensures high reliability, criti‑
cal for applications like fire alarms and emergency response systems.
• IoT: Many intelligent devices, from household appliances to industrial sensors, con‑
nect to the internet, streamlining processes and enhancing user experience. With
edge computing, these devices can process data locally, reducing latency and improv‑
ing responsiveness.
• Advanced Manufacturing: The future of manufacturing lies in automation and pre‑
cision. Edge computing facilitates remote operation of heavy machinery, especially in
hazardous or hard‑to‑reach areas, ensuring both efficiency and operator safety.
• Emergency Response: In critical situations, swift decision‑making is paramount.
Edge computing aids in collecting diverse data in real‑time, ensuring emergency
response teams, such as firefighters, receive real‑time insights before reaching an inci‑
dent scene. It enables a more proactive and informed approach to crisis management.
• Intelligent Transportation System (ITS): ITS is transforming road safety by pro‑
viding drivers with real‑time data from traffic centers; potential hazards can be pre‑
emptively addressed. Furthermore, with the advent of autonomous vehicles, edge
computing plays a pivotal role in real‑time data processing, ensuring they navigate
their environment safely [53].
12.13 DISCUSSION
The modern digital landscape is experiencing a transformative shift as the contours of data
processing evolve. A closer examination of edge computing, set against the backdrop of
innovations like 5G, IoT, and the visionary concept of smart cities, reveals deep intrica‑
cies and vast potentialities. Historically, dependence on centralized cloud configurations
dominated the approach to data processing. Yet, the journey from these traditional setups
through intermediary stages like fog and moisture computing has culminated in the rise
of edge computing. This decentralized approach is a testament to the ongoing metamor‑
phosis in managing and processing data. One cannot overlook its significant impact on
latency and overall network performance. Fields such as healthcare, where the millisec‑
onds matter—for instance, in remote surgeries—benefit immensely from this reduction in
latency. But this revolution is multi‑dimensional; the emergence and growth of 5G tech‑
nology, characterized by its high‑speed data transfers, promises to catapult the advantages
230 ◾ Future Communication Systems Using AI, IoT and Data Science
of edge computing to newer zeniths. Especially when considering the interaction of MEC
with 5G, potentially looking at a seamless digital realm with minimized delays and an
exponentially enhanced user experience. Yet, in every transformation lies inherent chal‑
lenges. The distributed nature of edge computing, while safeguarding against large‑scale
centralized attacks, brings forth a spectrum of security concerns. Each edge device, poten‑
tially devoid of centralized monitoring, becomes vulnerable if not updated and secured.
However, the silver lining might be found in the inherent nature of 5G, which could facili‑
tate rapid security updates, creating a dynamic shield against potential threats.
The strategic implications of edge computing span beyond just security. Organizations
grapple with the logistical challenges of establishing and maintaining this expansive net‑
work. The economic repercussions also demand attention, weighing the undeniable ben‑
efits against the fiscal demands of such an extensive, decentralized model. IoT’s explosion
further accentuates the role of edge computing. With countless devices transmitting data,
the need for real‑time, localized processing has never been more pronounced. This inter‑
dependence forms the bedrock for future smart cities, wherein the symbiotic relationship
will be crucial for operations ranging from intelligent traffic systems to energy‑efficient
smart grids. While lauding the strides edge computing has taken, it’s imperative to main‑
tain a balanced perspective. Its myriad advantages, from latency reductions to user experi‑
ence enhancements, are juxtaposed against its challenges. Yet, as sectors from healthcare
to transportation stand to be revolutionized by this technological marvel, the future is
undeniably promising. As the 5G era dawns upon us, the convergence of this high‑speed
technology with edge computing signals a paradigm shift in our digital narrative. It’s a
future laden with potential, but it calls for industry‑wide collaboration, persistent research,
and significant investment to unlock this digital amalgamation’s wonders.
12.14 CONCLUSION
In our comprehensive exploration of the contemporary digital realm, edge computing
emerges as a concept and a transformative force driving the next wave of technological
advancement. Its significance is underscored by its departure from traditional comput‑
ing paradigms, leading to a decentralized model that brings computation closer to data
sources. This shift promotes enhanced responsiveness, marked by characteristics like
reduced latency, robust mobility support, and improved geographical distribution. The
advent of MEC elevates this proposition further. MEC optimizes network resources as a
bridge between edge devices and centralized systems, and its integration with 5G tech‑
nology crystallizes this. The fusion promises ultra‑fast data transmission and a robust
infrastructure that supports the burgeoning demands of modern applications. The IoT and
edge computing are symbiotic. With billions of interconnected devices generating vast
amounts of data, edge computing provides the perfect platform for timely data process‑
ing and decision‑making right at the source. It is particularly salient in smart cities, where
real‑time data can be harnessed for many functions—traffic management and energy
conservation. Yet, as with any significant technological evolution, edge computing also
brings challenges. Given the dispersed nature of devices, infrastructure overheads, and
the financial nuances of deploying such a widespread network, these encompass security
Edge Computing in the Digital Era ◾ 231
REFERENCES
[1] I. Haq et al., “Impact of 3G and 4G technology performance on customer satisfaction in
the telecommunication industry,” Electronics, vol. 12, no. 7, pp. 1–24, 2023, doi:10.3390/
electronics12071697.
[2] A. Tufail, A. Namoun, A. Alrehaili, and A. Ali, “A survey on 5G enabled multi‑access edge
computing for smart cities: Issues and future prospects,” IJCSNS Int. J. Comput. Sci. Netw.
Secur., vol. 21, no. 6, pp. 107–118, 2021, doi:10.22937/IJCSNS.2021.21.6.15.
[3] I. Ullah, S. Qian, Z. Deng, and J. H. Lee, “Extended Kalman Filter‑based localization algo‑
rithm by edge computing in wireless sensor networks,” Digit. Commun. Networks, vol. 7,
no. 2, pp. 187–195, 2021, doi:10.1016/j.dcan.2020.08.002.
[4] N. U. Hassan, B. Tunaboylu, and M. Yasin, “Development and technological steps for real‑
ization of AB‑PEM Fuel cell‑a step towards clean & sustainable energy solutions,” In 4th
International Conference on Power Generation Systems and Renewable Energy Technologies,
PGSRET 2018, Islamabad, Pakistan, 2019, pp. 0–5. doi:10.1109/PGSRET.2018.8685934.
[5] M. Liu, F. R. Yu, Y. Teng, V. C. M. Leung, and M. Song, “Distributed resource allocation in
blockchain‑based video streaming systems with mobile edge computing,” IEEE Trans. Wirel.
Commun., vol. 18, no. 1, pp. 695–708, 2019, doi:10.1109/TWC.2018.2885266.
[6] P. Pace, G. Aloi, R. Gravina, G. Caliciuri, G. Fortino, and A. Liotta, “An edge‑based architec‑
ture to support efficient applications for healthcare industry 4.0,” IEEE Trans. Ind. Informatics,
vol. 15, no. 1, pp. 481–489, 2019, doi:10.1109/TII.2018.2843169.
[7] U. Shaukat, E. Ahmed, Z. Anwar, and F. Xia, “Cloudlet deployment in local wireless net‑
works: Motivation, architectures, applications, and open challenges,” J. Netw. Comp. Appl.,
vol. 62, no. January. pp. 18–40, 2016. doi:10.1016/j.jnca.2015.11.009.
[8] M. Satyanarayanan, P. Bahl, R. Cáceres, and N. Davies, “The case for VM‑based cloudlets
in mobile computing,” IEEE Pervasive Comput., vol. 8, no. 4, pp. 14–23, 2009, doi:10.1109/
MPRV.2009.82.
[9] W. Bao et al., “Follow me fog: Toward seamless handover timing schemes in a fog com‑
puting environment,” IEEE Commun. Mag., vol. 55, no. 11, pp. 72–78, 2017, doi:10.1109/
MCOM.2017.1700363.
[10] E. Ahmed and M. H. Rehmani, “Mobile edge computing: Opportunities, solutions, and chal‑
lenges,” Futur. Gener. Comput. Syst., vol. 70, pp. 59–63, 2017, doi:10.1016/j.future.2016.09.015.
[11] Z. Zhang, W. Zhang, and F. H. Tseng, “Satellite mobile edge computing: Improving QoS
of high‑speed satellite‑terrestrial networks using edge computing techniques,” IEEE Netw.,
vol. 33, no. 1, pp. 70–76, 2019, doi:10.1109/MNET.2018.1800172.
[12] W. Z. Khan, E. Ahmed, S. Hakak, I. Yaqoob, and A. Ahmed, “Edge computing: A sur‑
vey,” Futur. Gener. Comput. Syst., vol. 97, no. February, pp. 219–235, 2019, doi:10.1016/j.
future.2019.02.050.
232 ◾ Future Communication Systems Using AI, IoT and Data Science
[13] Z. Ning, X. Kong, F. Xia, W. Hou, and X. Wang, “Green and sustainable cloud of things:
Enabling collaborative edge computing,” IEEE Commun. Mag., vol. 57, no. 1, pp. 72–78, 2019,
doi:10.1109/MCOM.2018.1700895.
[14] K. Yeow, A. Gani, R. W. Ahmad, J. J. P. C. Rodrigues, and K. Ko, “Decentralized consensus for
edge‑centric Internet of Things: A review, taxonomy, and research issues,” IEEE Access, vol. 6,
pp. 1513–1524, 2018, doi:10.1109/ACCESS.2017.2779263.
[15] W. Hu et al., “Quantifying the impact of edge computing on mobile applications,” In
Proceedings of the 7th ACM SIGOPS Asia‑Pacific Workshop on Systems, APSys 2016, Hong
Kong, 2016, March. doi:10.1145/2967360.2967369.
[16] E. Simmon, “Evaluation of cloud computing services based on NIST 800‑145,” Natl. Inst.
Stand. Technol., vol. 500, no. 322, pp. 1–24, 2018.
[17] I. Yaqoob, E. Ahmed, A. Gani, A., S. Mokhtar, and M. Imran, “Heterogeneity‑aware task allo‑
cation in mobile ad hoc cloud,” IEEE Access, vol. 5, pp. 1779–1795, 2017.
[18] P. Wang, C. Yao, Z. Zheng, G. Sun, and L. Song, “Joint task assignment, transmission, and
computing resource allocation in multilayer mobile edge computing systems,” IEEE Internet
Things J., vol. 6, no. 2, pp. 2872–2884, 2019, doi:10.1109/JIOT.2018.2876198.
[19] Y. Sahni, J. Cao, and L. Yang, “Data‑aware task allocation for achieving low latency in collab‑
orative edge computing,” IEEE Internet Things J., vol. 6, no. 2, pp. 3512–3524, 2019, doi:10.1109/
JIOT.2018.2886757.
[20] W. Li, Z. Chen, X. Gao, W. Liu, J. Wang, and S. Member, “Multimodel framework for indoor
localization under mobile edge computing environment,” IEEE Internet Things J., vol. 6, no. 3,
pp. 4844–4853, 2019.
[21] N. Hassan, K. L. A. Yau, and C. Wu, “Edge computing in 5G: A review,” IEEE Access, vol. 7,
pp. 127276–127289, 2019, doi:10.1109/ACCESS.2019.2938534.
[22] Y. Liu, M. Peng, G. Shou, Y. Chen, and S. Chen, “Toward edge intelligence: Multiaccess edge
computing for 5G and Internet of Things,” IEEE Internet Things J., vol. 7, no. 8, pp. 6722–6747,
2020, doi:10.1109/JIOT.2020.3004500.
[23] M. Aazam, S. Zeadally, and K. A. Harras, “Fog computing architecture, evaluation, and
future research directions,” IEEE Commun. Mag., vol. 56, no. 5, pp. 46–52, 2018, doi:10.1109/
MCOM.2018.1700707.
[24] K. Dolui and S. K. Datta, “Comparison of edge computing implementations: Fog comput‑
ing, cloudlet and mobile edge computing,” GIoTS 2017‑ Glob. Internet Things Summit, Proc.,
Geneva, Switzerland, June 2017, doi:10.1109/GIOTS.2017.8016213.
[25] L. M. Vaquero and L. Rodero‑Merino, “Finding your way in the fog: Towards a compre‑
hensive definition of fog computing,” Comp. Commun. Rev., vol. 44, no. 5, pp. 27–32, 2014.
doi:10.1145/2677046.2677052.
[26] M. Satyanarayanan, “How we created edge computing,” Nat. Electron., vol. 2, no. 1, p. 42,
2019, doi:10.1038/s41928‑018‑0194‑x.
[27] E. Ahmed et al., “The role of big data analytics in Internet of Things,” Comput. Networks,
vol. 129, pp. 459–471, 2017, doi:10.1016/j.comnet.2017.06.013.
[28] S. Josilo and G. Dan, “Selfish decentralized computation offloading for mobile cloud comput‑
ing in dense wireless networks,” IEEE Trans. Mob. Comput., vol. 18, no. 1, pp. 207–220, 2019,
doi:10.1109/TMC.2018.2829874.
[29] B. Han, S. Wong, C. Mannweiler, M. R. Crippa, and H. D. Schotten, “Context‑awareness
enhances 5G multi‑access edge computing reliability,” IEEE Access, vol. 7, pp. 21290–21299,
2019, doi:10.1109/ACCESS.2019.2898316.
[30] M. Fahad et al., “Grey wolf optimization based clustering algorithm for vehicular ad‑hoc net‑
works,” Comput. Electr. Eng., vol. 70, pp. 853–870, 2018, doi:10.1016/j.compeleceng.2018.01.002.
[31] P. Porambage, J. Okwuibe, M. Liyanage, M. Ylianttila, and T. Taleb, “Survey on multi‑access
edge computing for Internet of Things realization,” IEEE Commun. Surv. Tutorials, vol. 20,
no. 4, pp. 2961–2991, 2018. doi:10.1109/COMST.2018.2849509.
Edge Computing in the Digital Era ◾ 233
[32] M. W. Akhtar, S. A. Hassan, R. Ghaffar, H. Jung, S. Garg, and M. S. Hossain, “The shift to 6G
communications: Vision and requirements,” Human‑centric Comput. Inf. Sci., vol. 10, no. 1,
pp. 1–27, 2020, doi:10.1186/s13673‑020‑00258‑2.
[33] M. Mukherjee, L. Shu, and D. Wang, “Survey of fog computing: Fundamental, network
applications, and research challenges,” IEEE Commun. Surv. Tutorials, vol. 20, no. 3, pp. 1826–1857,
2018, doi:10.1109/COMST.2018.2814571.
[34] A. Mughees, M. Tahir, M. A. Sheikh, and A. Ahad, “Towards energy efficient 5G networks
using machine learning: Taxonomy, research challenges, and future research directions,”
IEEE Access, vol. 8, pp. 187498–187522, 2020, doi:10.1109/ACCESS.2020.3029903.
[35] T. Taleb, K. Samdanis, B. Mada, H. Flinck, S. Dutta, and D. Sabella, “On multi‑access edge
computing: A survey of the emerging 5G network edge cloud architecture and orches‑
tration,” IEEE Commun. Surv. Tutorials, vol. 19, no. 3, pp. 1657–1681, 2017, doi:10.1109/
COMST.2017.2705720.
[36] S. R. Bader, M. Maleshkova, and S. Lohmann, “Structuring reference architectures for the
industrial Internet of Things,” Futur. Internet, vol. 11, no. 7, pp. 1–23, 2019, doi:10.3390/
fi11070151.
[37] Z. Rasheed et al., “Brain tumor classification from MRI using image enhancement and con‑
volutional neural network techniques,” Brain Sci., vol. 13, no. 1320, p. 22, 2023, doi:10.3390/
brainsci13091320.
[38] Q. V. Pham et al., “A survey of multi‑access edge computing in 5G and beyond: Fundamentals,
technology integration, and state‑of‑the‑art,” IEEE Access, vol. 8, pp. 116974–117017, 2020.
doi:10.1109/ACCESS.2020.3001277.
[39] S. Waleed, I. Ullah, W. U. Khan, A. U. Rehman, T. Rahman, and S. Li, “Resource allocation
of 5G network by exploiting particle swarm optimization,” Iran J. Comput. Sci., vol. 4, no. 3,
pp. 211–219, 2021, doi:10.1007/s42044‑021‑00091‑5.
[40] I. Khan, Q. Wu, I. Ullah, S. U. Rahman, H. Ullah, and K. Zhang, “Designed circularly polar‑
ized two‑port microstrip MIMO antenna for WLAN applications,” Appl. Sci., vol. 12, no. 3,
p. 1068, 2022, doi:10.3390/app12031068.
[41] R. Khan et al., “3D convolutional neural networks based automatic modulation classification
in the presence of channel noise,” IET Commun., vol. 16, no. 5, pp. 497–509, 2022, doi:10.1049/
cmu2.12269.
[42] H. A. Belghol and A. Idrissi, “MEC towards 5G : A survey of concepts, use cases, location
trade‑offs MEC towards 5G : A survey of concepts, use cases, location trade‑offs,” August,
vol. 5, no. 4, pp. 1–10, 2017, doi:10.14738/tmlai.54.3215.
[43] T. X. Tran, A. Hajisami, P. Pandey, and D. Pompili, “Collaborative mobile edge computing in
5G networks: New paradigms, scenarios, and challenges,” IEEE Commun. Mag., vol. 55, no. 4,
pp. 54–61, 2017, doi:10.1109/MCOM.2017.1600863.
[44] T. Mazhar et al., “The role of ML, AI and 5G technology in smart energy and smart building
management,” Electronics, vol. 11, no. 23, pp. 1–21, 2022, doi:10.3390/electronics11233960.
[45] A. Gohar and G. Nencioni, “The role of 5g technologies in a smart city: The case for intelligent
transportation system,” Sustainability (Switzerland), vol. 13, no. 9. pp. 1–24, 2021, doi:10.3390/
su13095188.
[46] M. Asif et al., “Reduced‑complexity LDPC decoding for next‑generation IoT networks,”
Wirel. Commun. Mob. Comput., vol. 2021, pp. 1–10, 2021, doi:10.1155/2021/2029560.
[47] W. U. Khan, N. Imtiaz, and I. Ullah, “Joint optimization of NOMA ‐enabled backscatter com‑
munications for beyond 5G IoT networks,” Internet Technol. Lett., vol. 4, no. 2, p. e265, 2021,
doi:10.1002/itl2.265.
[48] M. H. Ur Rehman, P. P. Jayaraman, S. Ur Rehman Malik, A. Ur Rehman Khan, and M. M.
Gaber, “RedEdge: A novel architecture for big data processing in mobile edge computing
environments,” J. Sens. Actuator Netw., vol. 6, no. 3, pp. 1–22, 2017, doi:10.3390/jsan6030017.
234 ◾ Future Communication Systems Using AI, IoT and Data Science
[49] M. Chiang, S. Ha, I. Chih‑Lin, F. Risso, and T. Zhang, “Clarifying fog computing and net‑
working: 10 Questions and answers,” IEEE Commun. Mag., vol. 55, no. 4. pp. 18–20, 2017.
doi:10.1109/MCOM.2017.7901470.
[50] Sumit et al., “Energy saving implementation in hydraulic press using industrial Internet of
Things (IIoT),” Electronics, vol. 11, no. 23, p. 4061, 2022, doi:10.3390/electronics11234061.
[51] F. Wahab, I. Ullah, A. Shah, R. A. Khan, A. Choi, and M. S. Anwar, “Design and implementa‑
tion of real‑time object detection system based on single‑shoot detector and OpenCV,” Front.
Psychol., vol. 13, no. November, pp. 1–17, 2022, doi:10.3389/fpsyg.2022.1039645.
[52] A. Iqbal et al., “Bidirectional CPW fed quad‑band DRA for WLAN/WiMAX applications,”
Wirel. Commun. Mob. Comput., vol. 2022, 9 pages, 2022, doi:10.1155/2022/3763555.
[53] TSGS, “System architecture for the 5G system (5GS) (3GPP TS 23.501 version 16.6.0 Release
16),” vol. 0. 2020.
[54] National Academies of Sciences, Engineering, and Medicine. “The Transformational Impact
of 5G: Proceedings of a Workshop–in Brief (2019),” 2019.
[55] I. Ullah, J. Chen, X. Su, C. Esposito, and C. Choi, “Localization and detection of targets in
underwater wireless sensor using distance and angle based algorithms,” IEEE Access, vol. 7,
pp. 45693–45704, 2019, doi:10.1109/ACCESS.2019.2909133.
[56] H. U. Khan, M. Sohail, F. Ali, S. Nazir, Y. Y. Ghadi, and I. Ullah, “Prioritizing the multi‑criterial
features based on comparative approaches for enhancing security of IoT devices,” Phys.
Commun., vol. 59, p. 102084, 2023, doi:10.1016/j.phycom.2023.102084.
[57] R. Pal, D. Adhikari, M. B. Bin Heyat, I. Ullah, and Z. You, “Yoga meets intelligent Internet of
Things: Recent challenges and future directions,” Bioengineering, vol. 10, no. 4, pp. 1–25, 2023,
doi:10.3390/bioengineering10040459.
[58] A. Shah, B. Ali, M. Habib, J. Frnda, I. Ullah, and M. Shahid Anwar, “An ensemble face rec‑
ognition mechanism based on three‑way decisions,” J. King Saud Univ. ‑ Comput. Inf. Sci.,
vol. 35, no. 4, pp. 196–208, 2023, doi:10.1016/j.jksuci.2023.03.016.
[59] S. M. Shah et al., “Advancements in neighboring‑based energy‑efficient routing protocol
(NBEER) for underwater wireless sensor networks,” Sensors, vol. 23, no. 13, p. 6025, 2023,
doi:10.3390/s23136025.
[60] H. U. Khan, A. Hussain, S. Nazir, F. Ali, M. Z. Khan, and I. Ullah, “A service‑efficient proxy
mobile IPv6 extension for IoT domain,” Information, vol. 14, no. 8, p. 459, 2023, doi:10.3390/
info14080459.
[61] J. Rao and S. Vrzic, “Packet duplication for URLLC in 5G: Architectural enhance‑
ments and performance analysis,” IEEE Netw., vol. 32, no. 2, pp. 32–40, 2018, doi:10.1109/
MNET.2018.1700227.
[62] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of Things (IoT): A vision,
architectural elements, and future directions,” Futur. Gener. Comput. Syst., vol. 29, no. 7,
pp. 1645–1660, 2013, doi:10.1016/j.future.2013.01.010.
Index
5G 4, 14, 24, 35, 40, 81–82, 86, 138, 214, 216, 221, IoT 3–4, 6–14, 31–46, 133–134, 136–138, 144, 160,
226, 228 202–203, 224, 226
6G 14, 214 IoV 168, 182, 205–211, 227
AI 3–5, 20, 23–25, 31–32, 37, 41–43, 57–60, 110, 202 M2M 35, 39, 64, 226, 229
AIoT 4, 13–14, 41–45, 50–51 machine learning 3, 36, 62, 64–65, 74–76, 78–81, 84,
102, 152, 161, 166, 202
big data 25, 41, 49, 80–82, 92–101, 103–107, Metaverse 133–134, 136–150
168, 219
NLP 21, 60, 62, 93–94, 100–101, 103–104, 106, 115
cloud computing 37, 81, 83–84, 174, 178, 180–181,
193–200, 215–219, 221–225 reinforcement learning 8, 19–20, 23, 65
communication systems 31, 37, 62, 64, 66, 74, 215 routing 111, 115, 194–195, 197, 206, 208–211
cyber ethics 110, 112, 116–118 RPL 206, 210–211
data science 6, 9, 42, 73–76, 84–88, 92, 107 SDN 193–199, 201–204, 223–224
deep learning 4, 19, 21, 40, 47, 74, 76, 93, 101–103, sensor 10, 20, 31–32, 39–40, 74, 78, 112, 116, 136,
113, 134, 161 181, 184, 206, 227
digital twins 137–138, 141, 146–149 SIoT 160–169, 171–172, 174–186
smart cities 4, 13, 18, 20–21, 31, 77–78, 87, 136, 139,
edge computing 14, 25, 75, 80–81, 83, 181, 141, 153, 225–227, 229
214–220 social networks 98, 141, 160, 166, 168, 170, 182, 184
235
Taylor & Francis eBooks
www.taylorfrancis.com
Improved
A streamlined A single point search and
experience for of discovery discovery of
our library for all of our content at both
customers eBook content book and
chapter level